Abstract:
An antenna includes a first antenna having a first feeding portion and at least one stub, and a second antenna having a second feeding portion and at least one stub. The first feeding portion is disposed on a first side of a first diagonal line of the rectangular region. The at least one stub of the first antenna extends from the first feeding portion in a first direction. A first angle is between the first direction and a long-edge direction of the rectangular region. The second feeding portion is disposed on a second side of the first diagonal line of the rectangular region. The at least one stub of the second antenna extends from the second feeding portion in a second direction. A second angle is between the second direction and the long-edge direction of the rectangular region and is different from the first angle.
Abstract:
A method applied to a terminal device includes displaying a first home screen, detecting a preset first input, opening, in response to the first input, a first application, displaying a screen of the first application, where the first input is an input of a user for opening the first application, detecting a preset second input, displaying a second home screen in response to the second input, where the second home screen is a home screen on which an icon of the first application is located, where the preset second input is an input of the user for exiting the screen of the first application, and the first home screen is different from the second home screen.
Abstract:
A recording method, a recording play method, apparatuses and terminals, where the recording method comprises obtaining, by a terminal, recording data in all sound source directions input by at least three microphones, and generating, by the terminal, a recording file according to the obtained recording data, wherein the recording file saves the recording data in all the sound source directions.
Abstract:
A file protection method, to resolve a problem that privacy of a file cannot be ensured by manually hiding the file or manually encrypting the file, is presented. The method includes obtaining, by a terminal device, a target file; determining, by the terminal device, whether the target file satisfies a preset file condition; when the target file satisfies the preset file condition, determining, by the terminal device, whether the target file satisfies a corresponding preset protection condition; and when the target file satisfies the preset protection condition, applying, by the terminal device, a corresponding protection solution to the target file. The embodiments of the present disclosure further provide a corresponding file protection apparatus.
Abstract:
This application discloses a display method when an application is exited and a terminal. The method includes: receiving, by a terminal, a keyword entered by a user into a search bar; displaying, by the terminal, a search result associated with the keyword; receiving, by the terminal, a first operation of the user for opening a first application from the search result; opening, by the terminal, the first application in response to the first operation; receiving, by the terminal, a second operation of the user for exiting the first application; and exiting, by the terminal, the first application in response to the second operation, and displaying a display screen on which an icon of the first application is located, where a size of the icon of the first application on the display screen is a first size.
Abstract:
A resource scheduling method and a related resource scheduling apparatus to improve data input/output (I/O) efficiency, where the method includes determining a current task queue, where the current task queue includes a plurality of to-be-executed application tasks, determining, for data blocks on a disk to be accessed by the application tasks, a quantity of times that each data block is to be accessed by the application tasks, determining a hotspot data block according to the quantity of times that each data block is to be accessed by the application tasks, and sending a move-in instruction to a local node of the hotspot data block, where the move-in instruction instructs to move the hotspot data block into a memory such that the hotspot data block can be accessed in the memory.
Abstract:
A resource scheduling method and a related resource scheduling apparatus to improve data input/output (IO) efficiency, where the method includes determining a current task queue, where the current task queue includes a plurality of to-be-executed application tasks, determining, for data blocks on a disk to be accessed by the application tasks, a quantity of times that each data block is to be accessed by the application tasks, determining a hotspot data block according to the quantity of times that each data block is to be accessed by the application tasks, and sending a move-in instruction to a local node of the hotspot data block, where the move-in instruction instructs to move the hotspot data block into a memory such that the hotspot data block can be accessed in the memory.
Abstract:
A synchronous rectifier control circuit an includes a current transformer (CT), a bridge rectifier, and a comparator, where the CT is connected in series to a secondary side, performs sampling on a loop current of the secondary side to obtain a current detection signal, and outputs the obtained current detection signal to the bridge rectifier; the bridge rectifier acquires a secondary-side sampling current according to the current detection signal, and outputs the secondary-side sampling current to the comparator so that the comparator generates a voltage difference; and an output signal of the comparator turns over so as to control on and off of a synchronous rectifier transistor. In this way, high-speed and high-precision control over a synchronous rectifier transistor can be implemented. The control is simple and is low in cost.
Abstract:
This application discloses a text processing method and apparatus in the natural language processing field in the artificial intelligence field. The method includes: obtaining a to-be-processed text; performing error detection processing on the to-be-processed text to obtain a non-word in the to-be-processed text; and if the non-word in the to-be-processed text belongs to a first type of non-word, skipping correcting the non-word in the to-be-processed text; or if the non-word in the to-be-processed text belongs to a second type of non-word, a third type of non-word, or a fourth type of non-word, selecting a correction mode matching the type of the non-word in the to-be-processed text to correct the non-word in the to-be-processed text and obtain a correction result of the non-word in the to-be-processed text. According to the technical solutions of this application, a plurality of types of character strings can be detected and filtered.
Abstract:
A method applied to a terminal device includes displaying a first home screen, detecting a preset first input, opening, in response to the first input, a first application, displaying a screen of the first application, where the first input is an input of a user for opening the first application, detecting a preset second input, displaying a second home screen in response to the second input, where the second home screen is a home screen on which an icon of the first application is located, where the preset second input is an input of the user for exiting the screen of the first application, and the first home screen is different from the second home screen.