1597 - Searching the Web

The word �search engine� may not bestrange to you. Generally speaking, a search engine searches the web pagesavailable in the Internet, extracts and organizes the information and respondsto users� queries with the most relevant pages. World famous search engines,like GOOGLE, have become very important tools for us to use when we visit theweb. Such conversations are now common in our daily life:

�What does the word like ****** mean?�
�Um� I am not sure, just google it.�

In this problem, you are required toconstruct a small search engine. Sounds impossible, does it? Don�t worry, hereis a tutorial teaching you how to organize large collection of textsefficiently and respond to queries quickly step by step. You don�t need toworry about the fetching process of web pages, all the web pages are providedto you in text format as the input data. Besides, a lot of queries are alsoprovided to validate your system.

Modern search engines use a technique calledinversion for dealing with very large sets of documents. The method relies onthe construction of a data structure, called an inverted index, whichassociates terms (words) to their occurrences in the collection of documents.The set of terms of interest is called the vocabulary, denoted as V. In itssimplest form, an inverted index is a dictionary where each search key is aterm   V.The associated value b()is a pointer to an additional intermediate data structure, called a bucket. Thebucket associated with a certain term  isessentially a list of pointers marking all the occurrences of  inthe text collection. Each entry in each bucket simply consists of the documentidentifier (DID), the ordinal number of the document within the collection andthe ordinal line number of the term�s occurrence within the document.

Let�s takeFigure-1 for an example, which describes the general structure. Assuming thatwe only have three documents to handle, shown at the right part in Figure-1;first we need to tokenize the text for words (blank, punctuations and othernon-alphabetic characters are used to separate words) and construct ourvocabulary from terms occurring in the documents. For simplicity, we don�t need toconsider any phrases, only a single word as a term. Furthermore, the terms arecase-insensitive (e.g. we consider �book� and �Book� to be thesame term) and we don�t consider any morphological variants (e.g. we consider �books� and �book�, �protected� and �protect� to bedifferent terms) and hyphenated words (e.g. �middle-class� is not asingle term, but separated into 2 terms �middle� and �class� by thehyphen). The vocabulary is shown at the left part in Figure-1. Each term of thevocabulary has a pointer to its bucket. The collection of the buckets is shownat the middle part in Figure-1. Each item in a bucket records the DID of theterm�s occurrence.

After constructing the whole inverted indexstructure, we may apply it to the queries. The query is in any of the followingformats:

term term AND term term OR term NOT term

A single term can be combined by Booleanoperators: AND, OR and NOT (�term1 AND term2� means to query the documents including term1 and term2; �term1 ORterm2� means to query the documents including term1 or term2; �NOT term1� means toquery the documents not including term1). Terms are single words as definedabove. You are guaranteed that no non-alphabetic characters appear in a term,and all the terms are in lowercase. Furthermore, some meaningless stop words(common words such as articles, prepositions, and adverbs, specified to be �the, a, to,and, or, not� in our problem) will not appear in the query, either.

For each query, the engine based on theconstructed inverted index searches the term in the vocabulary, compares theterms� bucket information, and then gives the result to user. Now can youconstruct the engine?

Input 

The input starts with integer N (0 < N< 100) representing N documents provided. Then the next N sections are Ndocuments. Each section contains the document content and ends with a singleline of ten asterisks.

**********

You may assume that each line contains nomore than 80 characters and the total number of lines in the N documents willnot exceed 1500.

Next, integer M (0 < M ≤ 50000) is givenrepresenting the number of queries, followed by M lines, each query in oneline. All the queries correspond to the format described above.

Output 

For each query, you need to find thedocument satisfying the query, and output just the lines within the documentsthat include the search term (For a NOT query, you need to output the wholedocument). You should print the lines in the same order as they appear in theinput. Separate different documents with a single line of 10 dashes.

----------

If no documents matching the query arefound, just output a single line: �Sorry, I found nothing.� The outputof each query ends with a single line of 10 equal signs.

==========

SampleInput 

4

A manufacturer, importer, or seller of

digital media devices may not (1) sell,

or offer for sale, in interstate commerce,

or (2) cause to be transported in, or in a

manner affecting, interstate commerce,

a digital media device unless the device

includes and utilizes standard security

technologies that adhere to the security

system standards.

**********

Of course, Lisa did not necessarily

intend to read his books. She might

want the computer only to write her

midterm. But Dan knew she came from

a middle-class family and could hardly

afford the tuition, let alone her reading

fees. Books might be the only way she

could graduate

**********

Research in analysis (i.e., the evaluation

of the strengths and weaknesses of

computer system) is essential to the

development of effective security, both

for works protected by copyright law

and for information in general. Such

research can progress only through the

open publication and exchange of

complete scientific results

**********

I am very very very happy!

What about you?

**********

6

computer

books AND computer

books OR protected

NOT security

very

slick

SampleOutput 

want the computer only to write her

----------

computer system) is essential to the

==========

intend to read his books. She might

want the computer only to write her

fees. Books might be the only way she

==========

intend to read his books. She might

fees. Books might be the only way she

----------

for works protected by copyright law

==========

Of course, Lisa did not necessarily

intend to read his books. She might

want the computer only to write her

midterm. But Dan knew she came from

a middle-class family and could hardly

afford the tuition, let alone her reading

fees. Books might be the only way she

could graduate

----------

I am very very very happy!

What about you?

==========

I am very very very happy!

==========

Sorry, I found nothing.

==========

 

以下是对提供的参考资料的总结,按照要求结构化多个要点分条输出: 4G/5G无线网络优化与网规案例分析: NSA站点下终端掉4G问题:部分用户反馈NSA终端频繁掉4G,主要因终端主动发起SCGfail导致。分析显示,在信号较好的环境下,终端可能因节能、过热保护等原因主动释放连接。解决方案建议终端侧进行分析处理,尝试关闭节电开关等。 RSSI算法识别天馈遮挡:通过计算RSSI平均值及差值识别天馈遮挡,差值大于3dB则认定有遮挡。不同设备分组规则不同,如64T和32T。此方法可有效帮助现场人员识别因环境变化引起的网络问题。 5G 160M组网小区CA不生效:某5G站点开启100M+60M CA功能后,测试发现UE无法正常使用CA功能。问题原因在于CA频点集标识配置错误,修正后测试正常。 5G网络优化与策略: CCE映射方式优化:针对诺基亚站点覆盖农村区域,通过优化CCE资源映射方式(交织、非交织),提升RRC连接建立成功率和无线接通率。非交织方式相比交织方式有显著提升。 5G AAU两扇区组网:与三扇区组网相比,AAU两扇区组网在RSRP、SINR、下载速率和上传速率上表现不同,需根据具体场景选择适合的组网方式。 5G语音解决方案:包括沿用4G语音解决方案、EPS Fallback方案和VoNR方案。不同方案适用于不同的5G组网策略,如NSA和SA,并影响语音连续性和网络覆盖。 4G网络优化与资源利用: 4G室分设备利旧:面对4G网络投资压减与资源需求矛盾,提出利旧多维度调优策略,包括资源整合、统筹调配既有资源,以满足新增需求和提质增效。 宏站RRU设备1托N射灯:针对5G深度覆盖需求,研究使用宏站AAU结合1托N射灯方案,快速便捷地开通5G站点,提升深度覆盖能力。 基站与流程管理: 爱立信LTE基站邻区添加流程:未提供具体内容,但通常涉及邻区规划、参数配置、测试验证等步骤,以确保基站间顺畅切换和覆盖连续性。 网络规划与策略: 新高铁跨海大桥覆盖方案试点:虽未提供详细内容,但可推测涉及高铁跨海大桥区域的4G/5G网络覆盖规划,需考虑信号穿透、移动性管理、网络容量等因素。 总结: 提供的参考资料涵盖了4G/5G无线网络优化、网规案例分析、网络优化策略、资源利用、基站管理等多个方面。 通过具体案例分析,展示了无线网络优化中的常见问题及解决方案,如NSA终端掉4G、RSSI识别天馈遮挡、CA不生效等。 强调了5G网络优化与策略的重要性,包括CCE映射方式优化、5G语音解决方案、AAU扇区组网选择等。 提出了4G网络优化与资源利用的策略,如室分设备利旧、宏站RRU设备1托N射灯等。 基站与流程管理方面,提到了爱立信LTE基站邻区添加流程,但未给出具体细节。 新高铁跨海大桥覆盖方案试点展示了特殊场景下的网络规划需求。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值