⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 book2

📁 Best algorithm for LZW ..C language
💻
📖 第 1 页 / 共 5 页
字号:
instruction was spoken in the same format, with the same programmed pausebetween the items.A list of 58 instructions of the form shown above was recorded and usedto wire several pieces of apparatus without errors..sh "1.3  Telephone enquiry service".ppThe computer-generated wiring scheme illustrates how speech can be used to giveinstructions without diverting visual attention from the task at hand.The next system we examine shows how speech output can make the telephonereceiver into a remote computer terminal for a variety of purposes(Witten and Madams, 1977)..[Witten Madams 1977 Telephone Enquiry Service.]The caller employs the touch-tone keypad shown in Figure 1.3 for input, and thecomputer generatesa synthetic voice response..FC "Figure 1.3"Table 1.3 shows the process of makingcontact with the system..RF.fi.nh.na.in 0.3i.nr x0 \w'COMPUTER:  '.nr x1 \w'CALLER:  '.in+\n(x0u.ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Dials the service..ti-\n(x0uCOMPUTER:  Answers telephone."Hello, Telephone Enquiry Service.  Pleaseenter your user number"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters user number..ti-\n(x0uCOMPUTER:  "Please enter your password"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters password..ti-\n(x0uCOMPUTER:  Checks validity of password.If invalid, the user is asked to re-enterhis user number.Otherwise,"Which service do you require?".ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters service number..in 0.nf.FG "Table 1.3  Making contact with the telephone enquiry system".ppAdvantage is taken of the disparate speeds of input (keyboard) andoutput (speech) to hasten the dialogue by imposing a question-answer structureon it, with the computer taking the initiative.  The machine canafford to be slightly verbose if by so doing it makes the caller'sresponse easier, and therefore more rapid.  Moreover, operators whoare experienced enough with the system to anticipate questions caneasily forestall them just by typing ahead, for the computer is programmedto examine its input buffer before issuing prompts and to suppress them ifinput has already been provided..ppAn important aim of the system is to allow application programmers with nospecial knowledge of speech to write independent services for it.Table 1.4 shows an example of the use of one such application program,.RF.fi.nh.na.in 0.3i.nr x0 \w'COMPUTER:  '.nr x1 \w'CALLER:  '.in+\n(x0u.ti-\n(x0uCOMPUTER:  "Stores Information Service.  Please entercomponent name"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "SN7406#"..ti-\n(x0uCOMPUTER:  "The component name is SN7406.  Is this correct?".ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "*1#" (system convention for "yes")..ti-\n(x0uCOMPUTER:  "This component is in stores"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "*7#" (command for "price")..ti-\n(x0uCOMPUTER:  "The component price is 35 pence"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "*8#" (command for "minimum number")..ti-\n(x0uCOMPUTER:  "The minimum number of this component keptin stores is 10"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "SN7417#"..ti-\n(x0uCOMPUTER:  "The component name is SN7417.  Is this correct?".ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "*1#"..ti-\n(x0uCOMPUTER:  "This component is not in stores"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "*9#" (command for "delivery time")..ti-\n(x0uCOMPUTER:  "The expected delivery time is 14 days"..ti-\n(x0uCALLER:\h'\n(x0u-\n(x1u'  Enters "*0#"..ti-\n(x0uCOMPUTER:  "Which service do you require?".in 0.nf.FG "Table 1.4  The Stores Information Service"theStores Information Service, which permits enquiries to be made of a databaseholding information on electronic components kept in stock.This subsystem is driven by.ulalphanumericdata entered on the touch-tone keypad.  Two or three letters are associatedwith each digit, in a manner which is fairly standard in touch-tone telephoneapplications.  These are printed on a card overlaythat fits the keypad (see Figure 1.3).  Although true alphanumeric data entrywould require a multiple key press for each character,the ambiguity inherent ina single-key-per-character convention can usually be resolved by the computer,if it has a list of permissible entries.  For example, the component namesSN7406 and ZTX300 are read by the machine as "767406" and "189300", respectively.Confusion rarely occurs if the machine is expecting a valid component code.The same holds true of people's names, and file names \(em although with theseone must take care not to identify a series of files by similar names, likeTX38A, TX38B, TX38C.  It is easy for the machine to detect the rare caseswhere ambiguity occurs, and respond by requesting further information:  "Thecomponent name is SN7406.  Is this correct?"  (In fact, the Stores InformationService illustrated in Table 1.4 is defective in that it.ulalwaysrequests confirmation of an entry, even when no ambiguity exists.)  Theuse of a telephone keypad for data entry will be taken up again in Chapter 10..ppA distinction is drawn throughout the system between data entries andcommands, the latter being prefixed by a "*".  In this example, theprogrammer chose to define a command for each possible question about acomponent, so that a new component name can be entered at any timewithout ambiguity.  The price paid for the resulting brevity of dialogueis the burden of memorizing the meaning of the commands.  This is aninherent disadvantage of a one-dimensional auditory display over themore conventional graphical output:   presenting menus by speech is tedious andlong-winded.  In practice, however, for a simple task such as theStores Information Service it is quite convenient for the caller tosearch for the appropriate command by trying out all possibilities \(em thereare only a few..ppThe problem of memorizing commands is alleviated by establishing somesystem-wide conventions.  Each input is terminated by a "#", andthe meaning of standard commands is given in Table 1.5..RF.fi.nh.na.in 0.3i.nr x0 \w'# alone  '.nr x1 \w'\(em  '.ta \n(x0u +\n(x1u.nr x2 \n(x0+\n(x1.in+\n(x2u.ti-\n(x2u*#	\(em	Erase this input line, regardless of what hasbeen typed before the "*"..ti-\n(x2u*0#	\(em	Stop.  Used to exit from any service..ti-\n(x2u*1#	\(em	Yes..ti-\n(x2u*2#	\(em	No..ti-\n(x2u*3#	\(em	Repeat question or summarize state of currenttransaction..ti-\n(x2u# alone	\(em	Short form of repeat.  Repeats or summarizesin an abbreviated fashion..ta 0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i.in 0.nf.FG "Table 1.5  System-wide conventions for the service".ppA summary of services available on the system is given inTable 1.6..RF.fi.na.in 0.3i.nr x0 \w'000  '.nr x1 \w'\(em  '.nr x2 \n(x0+\n(x1.in+\n(x2u.ta \n(x0u +\n(x1u.ti-\n(x2u\0\01	\(em	tells the time.ti-\n(x2u\0\02	\(em	Biffo (a game of NIM).ti-\n(x2u\0\03	\(em	MOO (a game similar to that marketed under the name "Mastermind").ti-\n(x2u\0\04	\(em	error demonstration.ti-\n(x2u\0\05	\(em	speak a file in phonetic format.ti-\n(x2u\0\06	\(em	listening test.ti-\n(x2u\0\07	\(em	music (allows you to enter a tune and play it).ti-\n(x2u\0\08	\(em	gives the date.sp.ti-\n(x2u100	\(em	squash ladder.ti-\n(x2u101	\(em	stores information service.ti-\n(x2u102	\(em	computes means and standard deviations.ti-\n(x2u103	\(em	telephone directory.sp.ti-\n(x2u411	\(em	user information.ti-\n(x2u412	\(em	change password.ti-\n(x2u413	\(em	gripe (permits feedback on services from caller).sp.ti-\n(x2u600	\(em	first year laboratory marks entering service.sp.ti-\n(x2u910	\(em	repeat utterance (allows testing of system).ti-\n(x2u911	\(em	speak utterance (allows testing of system).ti-\n(x2u912	\(em	enable/disable user 100 (a no-password guest user number).ti-\n(x2u913	\(em	mount a magnetic tape on the computer.ti-\n(x2u914	\(em	set/reset demonstration mode (prohibits access by low-priority users).ti-\n(x2u915	\(em	inhibit games.ti-\n(x2u916	\(em	inhibit the MOO game.ti-\n(x2u917	\(em	disable password checking when users log in.ta 0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i +0.8i.in 0.nf.FG "Table 1.6  Summary of services on a telephone enquiry system"They range from simple games and demonstrations, through serious databaseservices, to system maintenance facilities.A priority structure is imposed upon them, with higherservice numbers being available only to higher priority users.Services in the lowest range (1\-99) can be obtained by all, whilethose in the highest range (900\-999) are maintenance services,available only to the system designers.  Access to the lower-numbered"games" services can be inhibited by a priority user \(em this wasfound necessary to prevent over-use of the system!  Another advantageof telephone access to an information retrieval system is that someday-to-day maintenance can be done remotely, from the office telephone..ppThis telephone enquiry service, which was built in 1974, demonstrated thatspeech synthesis had moved from a specialist phonetic discipline into theprovince of engineering practicability.  The speech was generated "by rule"from a phonetic input (the method is covered in Chapters 7 and 8), whichhas very low data storage requirements of around 75\ bit/s of speech.Thus an enormous vocabulary and range of services could be accomodated on asmall computer system.Despite the fairly low quality of the speech, the response from callers wasmost encouraging.  Admittedly the user population was a self-selected body ofUniversity staff, which one might suppose to have high tolerance to new ideas,and a system designed for the general public would require more effort to bespent on developing speech of greater intelligibility.  Although it wasobserved that some callers failed to understand parts of the responses, evenafter repetition, communication was largely unhindered in most cases; usersbeing driven by a high motivation to help the system help them..ppThe use of speech output in conjunction with a simple input device requirescareful thought for interaction to be successful and comfortable.  It isnecessary that the computer direct the conversation as much as possible,without seeming to be taking charge.  Provision for eliminating promptswhich are unwanted by sophisticated users is essential to avoid frustration.We will return to the topic of programming techniques for speech interactionin Chapter 10..ppMaking a computer system available over the telephone results in a suddenvast increase in the user population.  Although people's reaction to a newcomputer terminal in every office was overwhelmingly favourable, carefulresource allocation was essential to prevent the service being hogged by apersistent few.  As with all multi-access computer systems, it is particularlyimportant that error recovery is effected automatically and gracefully..sh "1.4  Speech output in the telephone exchange".ppThe telephone enquiry service was an experimental vehicle for research on speechinteraction, and was developed in 1974.Since then, speech has begun to be used in real commercial applications.One example is System\ X, the British Post Office's computer-controlledtelephone exchange.  This incorporates many featuresnot found in conventional telephone exchanges.For example, if a number is found to be busy, the call can be attemptedagain by a "repeat last call" command, without having to re-dial the full number.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -