It’s a long story on paper. This is an idea in Zhu Tao’s heart. When he saw that Mark had taken over the recording of audio, he went on to say.
"I think this intelligent voice should have two major functions.
First, it should be that a member of the family should know some daily conversations and polite language.
There is great technical difficulty in this. It’s not just the grammar database. The difficulty key is our method to predict the name. What should each member of the family call?
We certainly can’t unify the host instead of calling Mr. and Ms. XXX, especially in foreign countries. Are we going to make a huge name database?
Also, the current computer performance is limited, and it can find 32 bits, so it is impossible to make this voice database too big.
So I said that the technology of intelligent voice seems to be very beautiful, but it is still a bit ahead. "
"No, no, no! This has nothing to do with the computer’s addressing ability, but is determined by our database construction technology.
We need a fuzzy search technology. Just when Han Naiping is studying fuzzy algorithms, he will form a technical research and development team.
However, in view of the difficulty, we still need to simplify and refine some daily polite expressions with very high frequency and do not support dialogue
We don’t want to improve our production once, but we can continue to upgrade in the future, which is also a lot of income. "
Mark Ma made a decision and showed his extraordinary disposal ability.
"What about the name of the unknown person?" Zhu Tao asked again
"If the technical difficulty is too great, you can also remove this function." Mark definitely answered.
"That’s good! You are the team leader and you have the final say, so the difficulty of this voice database will be much reduced, and it will be a good thing when the results are produced.
I went on to say that the second function of intelligent voice is to realize automatic control of simple voice commands.
This function should be connected with the brain host, but we should convert voice commands into control commands and build an instruction database.
If we want to realize voice control, we may not be able to do it. Should we also practice some common instructions? Such as opening or closing curtains, opening or closing lights in windows, etc. "
"well! But I think it is enough for the first intelligent voice to do this. "
Mark is unusual after all. He is not slow-witted, and he can make decisions decisively according to technical difficulties.
As the saying goes, he can take up courage, which may be the difference between him and ordinary people, which Zhu Tao lacks.
Chapter 136 Investment
Intelligent voice is not as complicated as we thought. The programmer just built two databases, a voice database and a control instruction database.
Programmers in these two databases just do some simple equal signs, such as lamp voice data corresponding to a control instruction to control lamps.
Its real difficulty is that the data of micro-control program with fuzzy recognition function can be entered by ordinary programmers.
A master must be able to design databases and micro-control programs.
It is difficult to build a database because it is generally a little more complicated. The database is a tree structure, and it is not a straight line.
The tree structure has primary and secondary image structures, and there are several possibilities that are very complicated.
Intelligent speech intelligence is realized by micro-control program. To put it bluntly, it is equal to a small search engine plus intelligent judgment program.
It should be able to understand the instruction program, and it can recognize that digital voice instructions are converted into data, which is also called light tone and loud voice. The data generated by small men and women are different.
This is to grasp the key features in the voice data of key words in the search engine of fuzzy recognition technology, and then compare the standard voice instructions to understand the meaning.
I said that there should be simple methods with higher technical difficulty but significantly higher recognition rate, that is, scene recognition and location recognition.
For example, if you happen to be in front of the window and you call the window, the program can judge your intention more accurately, so it is necessary to build multiple databases, which are not parallel, but tree-like and have primary and secondary differences
Which situation takes precedence and which situation is judged again.
Fuzzy identification key is a fuzzy algorithm. It is because of various number methods that computers have all kinds of extraordinary abilities in real computers.
Han Naiping has been studying fuzzy algorithms for a long time. He is not as distracted as Zhu Tao, and his research has also achieved some good results.
According to this situation, Mark specially asked Zhang Zhidong for two programmers who are good at building databases, plus two ordinary programmers who are responsible for code data, Zhu Tao, to be responsible for the construction of two major databases.
The remaining six programmers were all strengthened by him to the fingerprint database research team.
And he himself is Han Naiping attacking the fuzzy algorithm problem together.
Although he has a university, he and Zhang Zhidong have both studied computer knowledge since childhood, and the basic knowledge is very solid.
At that time, it was still a few years, which was the embryonic stage of computer technology. They started from the basic computer technology to specialize in software technology.
This makes their computer knowledge both soft and hard very solid, which is far from being comparable to later computer talents.
There are two kinds of knowledge to learn computer, the first is mathematics, and the second is English Institute. Mark’s mathematical attainments are not inferior to Han Naiping, a master student.
With his joining in the fuzzy algorithm research, the fuzzy identification technology is becoming more and more perfect, and it is expected to be the first technology to be produced by the access control system project team.
Since then, all departments of dolphin science and technology have entered a period of stable development, that is, everyone has something to do.
The production department continued to complete two orders for micro-hardness, and all the project teams in the technical department were immersed in coding, and the procedural department continued to apply for various patents in an endless stream.
Wang Yong also has no leisure. He is rushing to run outside the infrastructure project of the outreach company.
Although Wang Yong is a nostalgic person, the two laboratories in the company are very important and have very high quality requirements.
Neither Master Hu’s contractor nor Master Wang’s small decoration team can solve the problem. Wang Yong visited several small construction companies and decoration companies outside these days.
But he didn’t impress him very well, and he was not as real as Master Hu and Master Wang, and he was a little suspected of being false.
Judging from his manners and clothes, Zhu Tao secretly warned himself that this person should not be offended
•
•