영어에서 User request 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
If the user request.
LowGeneral information, instructions, user request.
Com. net TLDZ User Request(DOC).
At user request, boiler could use PLC control, and reserve interface remotely operated.
Weekly updates based on user request.
The"explicit user request" is expressed in one of the following ways.
To assist and solve any user request or issue.
User Request Block(URB): Request Block submitted by a user. .
H83: Using the target attribute to open a new window on user request and indicating this in link text.
Typically, a user request requires one of performing an answer or task to provide information via a digital assistant system.
Or it is 15-50 days if the Equipment is designed for user request according to different type of work piece need to be cleaned.
In yet other examples, the generated response can be data content relevant to satisfying a user request in the speech input.
If the user request seeks an informational answer, the confirmation response presents the requested information to the user. .
Task Queue API: The Task Queue API allows applications to perform work initiated by a user request, outside of that request. .
If the user request seeks an informational answer, the confirmation response presents the requested information to the user. .
The effectiveness of the digital assistant system 106′, however, is also dependent on the digital assistant system's ability to deduce the correct“actionable intent(s)” from the user request expressed in natural language.
If the user request requires an answer that provides the information, the acknowledgment displays the requested information to the user. .
When the SAP ERP system is connected to the SAPGUI from the user's desktop PC, the ABAP Dispatcher first receives the user request and delivers the user's request to the Dialog Work Process.
A satisfactory response to a user request may be the provision of the requested informative answer, the performance of the requested task, or a combination of the two.
In some implementations, the digital assistant system 300 also stores names of specific entities in the vocabulary index 344, so thatwhen one of these names is detected in the user request, the natural language processor 332 will be able to recognize that the name refers to a specific instance of a property or sub-property in the ontology.
A satisfactory response to the user request is either provision of the requested informational answer, performance of the requested task, or a combination of the two.
In some implementations, the digital assistant system 300 also stores names of specific entities in the vocabulary index 344, so thatwhen one of these names is detected in the user request, the natural language processor 332 will be able to recognize that the name refers to a specific instance of a property or sub-property in the ontology.
A satisfactory response to the user request is generally either provision of the requested informational answer, performance of the requested task, or a combination of the two.
In some examples, once natural language processing module 732 identifies an actionable intent(or domain) based on the user request, natural language processing module 732 can generate a structured query to represent the identified actionable intent.
For example, the user request 806 may specify the last known location of the requested wireless identity transmitter, and the central server may transmit the alert 1252 to proximity broadcast receivers in sectors near that location.
Support for a variety of HTTP authentication controls including centralized authentication(where protected content resides on Akamai's edge servers but end user request are authenticated by your origin servers) and edge authentication(where Akamai's edge servers implement user authentication, using mechanisms that you designate).
When a user request is received by I/O processing module 728 and the user request can include speech input, I/O processing module 728 can forward the speech input to STT processing module 730(or speech recognizer) for speech-to-text conversions.
The threat map shows the geographic location of where a user request is being made from and the intended geographic destination location if the request had not been blocked by Enterprise Threat Protector.
For example, for a user request" Invite my friends to my birthday party", the natural language processor 332 does not require the user to explicitly provide this information in his request, And can access the user data 348 to determine when and where the" birthday party".
A satisfactory response to the user request can include provision of the requested informational answer, performance of the requested task, or a combination of the two.