QA Official

(3) Speech Recognition Overview

https://qaofficial.com/post/2019/04/05/69013-3-speech-recognition-overview.html 2019-04-05
Speech Recognition Step 3: Understand the Background of Speech Recognition 1. History of Speech Recognition As the leading direction of intelligent computer research and the key technology of man-machine voice communication, voice recognition technology has been widely concerned by scientific circles in various countries.The products developed by voice recognition have a wide range of applications, including voice-controlled telephone exchange, voice dial system, information network inquiry, home service, hotel service, travel service system, booking system, voice-controlled intelligent toy, medical service, banking service, stock inquiry service, computer control, industrial control, voice communication system, military monitoring, information retrieval, emergency service, translation system, etc.

(Computer Network) JAVA Implementation of Slotted ALOHA Simulation Experiment

https://qaofficial.com/post/2019/04/05/69028-computer-network-java-implementation-of-slotted-aloha-simulation-experiment.html 2019-04-05
The protocol used to determine the next user on the multi-access channel belongs to a sublayer of the data link layer, called Medium Access Control (MAC) sublayer. Many local area networks use the multi-access channel as their communication basis.The simplest Channel allocation schemes are FDM (which assigns a frequency to each station) and TDM (which assigns a time slot to each station). When the number of stations is relatively large

28 of Linux Operation and Maintenance Learning Notes: Shell Advanced Programming

https://qaofficial.com/post/2019/04/05/69069-28-of-linux-operation-and-maintenance-learning-notes-shell-advanced-programming.html 2019-04-05
Chapter 39 Shell Advanced Programming 1. Shell Function 1, syntax format (1) simple syntax fun_name(){ instruction... return n } (2) Standardized Grammar function fun_name(){ instruction... return n } 2, function execution (1) Method 1: Directly Execute Function Name a, format fun_name b, precautions (i) Do not bring bracket. (ii) The function definition and function body must precede the name of the function to be executed, because the shell is executed

Batch Script Learning Notes-Programmer Version

https://qaofficial.com/post/2019/04/05/69083-batch-script-learning-notes-programmer-version.html 2019-04-05
batch script learning notes Original works are allowed to be reprinted. Please indicate the original source, author information and this statement in hyperlink form when reprinting.Otherwise, legal responsibility will be investigated.http://blog.csdn.net/taotaoyouarebaby/article/details/23958897 Note: This document is published under LGPL LESSER GENERAL PUBLIC LICENSE的.This document treats batch processing as a programming language, organizing content by elements of the programming language.The

Briefly explain the working process of slotted ALOHA algorithm in RFID system

https://qaofficial.com/post/2019/04/05/69044-briefly-explain-the-working-process-of-slotted-aloha-algorithm-in-rfid-system.html 2019-04-05
ALOHA algorithm is a random access method. The basic idea is to take the way that the tag speaks first. When the tag enters the identification area of the reader-writer, it will automatically send its own id number to the reader-writer transmitter. In the process of sending data to the tag, if other tags are also sending data, the signals will overlap, resulting in conflicts.The reader-writer detects whether there is any conflict in the received signals.

Computer Network Experiment-Reliable Data Transfer Protocol-Design and Implementation of-GBN Protocol

https://qaofficial.com/post/2019/04/05/69030-computer-network-experiment-reliable-data-transfer-protocol-design-and-implementation-of-gbn-protocol.html 2019-04-05
This week has done a computer network experiment, named the Design and Implementation of Reliable Data Transfer Protocol-GBN Protocol I feel that I have done it seriously and achieved good results. I will record my own process and results. for this experiment, the experimental requirements say that the implementation of SR protocol is a bonus, and SR protocol is based on GBN protocol, so I directly put it in place

Computer Network-Media Access Control Sublayer

https://qaofficial.com/post/2019/04/05/69038-computer-network-media-access-control-sublayer.html 2019-04-05
the medium access control sublayer-a sublayer of the data link layer Function: Determines how channels are allocated. 1.Wired MAC protocol (multiple access control multiple access control, Medium access control medium access control) 1. pure ALOHA and slotted ALOHA Derivation of Peak Value of Throughput S per Frame. 1) Pure ALOHA System basic idea: transmit data when users have data to send.After each station sends a frame to the central computer, the computer rebroadcasts the frame to all stations, and the sending station can listen to the broadcast from the hub to determine whether its frame was successfully sent.

Design Mode Learning Note 15 (Command Command Mode)

https://qaofficial.com/post/2019/04/05/69079-design-mode-learning-note-15-command-command-mode.html 2019-04-05
Motivation: In the process of software construction, " behavior requester" and " behavior implementer" usually present a " tight coupling".However, in some situations, such as the need to " record, undo/redo (undo/redo), transaction" and so on, this tight coupling that cannot resist changes is inappropriate.In this case, how to decouple the " behavior requester" from the " behavior implementer"?Abstracting a group of behaviors as objects can realize loose coupling between them.

Fingerprint Identification and Login under Android

https://qaofficial.com/post/2019/04/05/68905-fingerprint-identification-and-login-under-android.html 2019-04-05
1. Overview Fingerprint recognition under Android is a function added after Android6.0. Therefore, it is necessary to judge whether the user machine supports it or not during implementation. Then for development, there are two usage scenarios, namely, local recognition and interaction with the server. 1. Local identification: after the fingerprint identification is completed locally, bind with local information and log in; 2. Background interaction: after the identification is completed locally,

Flume Learning Notes+Practice

https://qaofficial.com/post/2019/04/05/69070-flume-learning-notes-practice.html 2019-04-05
# Download flume from http://flume.apache.org/download.html ############################################# # Overview: Flume is a highly available, highly reliable and distributed software for massive log collection, aggregation and transmission provided by Cloudera. # The core of Flume is to collect the data from the source and sink it to the designated destination.In order to ensure that the conveying process is certain # Successful, cache the data (channel) before sending it to the destination (sink), and delete the data from after the data actually reaches the destination (sink)