Please wait a minute...
New Technology of Library and Information Service  2012, Vol. Issue (11): 60-64    DOI: 10.11925/infotech.1003-3513.2012.11.10
Current Issue | Archive | Adv Search |
Study on Detection Method of Similarity Patents
Zhou Qunfang
Baoshan Iron and Steel Co., Ltd., Shanghai 201900, China
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  In order to get similar patents from patent databases, based on merging similar concepts on Ontology-based identification replacement, this paper constructs a vector space model by estimating the TFIDF values of the concepts, and eventually gets a collection of similar clause on similarity matching sentences by orderly longest common subsequence identification method to match the results of previous similar patent document extraction. This method can help enterprises intelligence detect similar patents effectively.
Key wordsOntology      Similar patent detection      Patent infringement     
Received: 02 November 2012      Published: 06 February 2013
:  TP391  

Cite this article:

Zhou Qunfang. Study on Detection Method of Similarity Patents. New Technology of Library and Information Service, 2012, (11): 60-64.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2012.11.10     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2012/V/I11/60

[1] Fujii A, Ishikawa T. Document Structure Analysis for the NTCIR-5 Patent Retrieval[C]. In: Proceedings of the 5th NTCIR Workshop on Evaluation of Information Access Technologies, Information Retrieval, Question Answering and Cross-Lingual Information Access,Tokyo, Japan.2005.
[2] Park H, Yoon J, Kim K. Identifying Patent Infringement Using SAO Based Semantic Technological Similarities[J]. Scientometrics, 2012, 90(2):515-529.
[3] 汪雪锋,刘玉琴,刘佳. 中文专利侵权检索模型研究[J]. 计算机工程与应用,2009,45(9):212-215.(Wang Xuefeng, Liu Yuqin, Liu Jia. Research on Chinese Patent Infringement Retrieval Model[J]. Computer Engineering and Applications,2009,45(9):212-215.)
[4] 马文姗,赵海宁,翟东升.中文专利侵权检索模型研究[J]. 情报杂志,2012 (4):175-179.(Ma Wenshan, Zhao Haining, Zhai Dongsheng. Research on Chinese Patent Infringement Retrieval Model[J]. Journal of Intelligence,2012 (4):175-179.)
[5] Brin S, Davis J, Garcia-Molina H. Copy Detection Mechanisms for Digital Documents[C].In: Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data (SIGMOD'95). New York: ACM, 1995: 398-409.
[6] Shivakumar N, Garcia-Molina H. SCAM: A Copy Detection Mechanism for Digital Documents[C]. In: Proceedings of the 2nd International Conference on Theory and Practice of Digital Libraries, Austin, Texas,USA.1995.
[7] Si A, Leong H V, Lau R W H. CHECK: A Document Plagiarism Detection System[C]. In: Proceedings of the 1997 ACM Symposium on Applied Computing (SAC'97). New York: ACM, 1997:70-77.
[8] 杨思春. 一种改进的句子相似度计算模型[J]. 电子科技大学学报, 2006, 35(6): 956-959.(Yang Sichun. An Improved Model for Sentence Similarity Computing[J]. Journal of University of Electronic Science and Technology of China, 2006, 35(6): 956-959.)
[9] 秦新国. 基于句子相似度的文档复制检测算法研究[J]. 现代图书情报技术, 2007(11): 63-66.(Qin Xinguo. Research on the Copy Detection Based on the Similarity of Sentences[J]. New Technology of Library and Information Service, 2007(11): 63-66.)
[10] 王森, 王宇. 基于文本结构树的论文复制检测算法[J]. 现代图书情报技术, 2009(10): 50-55.(Wang Sen, Wang Yu. Algorithm of the Text Copy Detection Based on Text Structure Tree[J]. New Technology of Library and Information Service, 2009(10): 50-55.)
[11] 孙伟, 邢长征. 关于中文文档复制检测算法的改进[J]. 计算机工程与科学, 2010, 32(8): 101-103.(Sun Wei, Xing Changzheng. An Improved Copy Detection Algorithm for the Chinese Documents[J]. Computer Engineering and Science, 2010, 32(8): 101-103.)
[12] 张培颖. 多特征融合的语句相似度计算模型[J]. 计算机工程与应用, 2010, 46(26): 136-137.(Zhang Peiying. Model for Sentence Similarity Computing Based on Multi-features Combination[J]. Computer Engineering and Applications, 2010, 46(26): 136-137.)
[13] 谷俊,朱紫阳. 基于聚类算法的本体层次关系获取研究[J]. 现代图书情报技术, 2011(12):46-51.(Gu Jun, Zhu Ziyang. Study on Ontology Hierarchy Relation Induction on Clustering Algorithm[J]. New Technology of Library and Information Service, 2011(12):46-51.)
[14] GUID[EB/OL].[2012-05-27]. http://baike.baidu.com/view/185358.htm.
[15] Wikipedia. Cosine Similarity[EB/OL].[2012-05-27]. http://en.wikipedia.org/wiki/Cosine_similarity.
[16] Hirschberg D S. Algorithms for the Longest Common Subsequence Problem[J]. Journal of the ACM, 1977, 24(4): 664-675.
[17] 冷强奎, 秦玉平, 王春立. 基于句子相似度的论文抄袭检测模型研究[J]. 计算机工程与应用, 2011, 47(24): 199-201.(Leng Qiangkui,Qin Yuping,Wang Chunli. Study on Model for Plagiarism-detection of Scientific Papers Based on Sentence Similarity[J].Computer Engineering and Applications, 2011, 47(24): 199-201.)
[1] Lv Xueqiang,Luo Yixiong,Li Jiaquan,You Xindong. Review of Studies on Detecting Chinese Patent Infringements[J]. 数据分析与知识发现, 2021, 5(3): 60-68.
[2] Sheng Shu, Huang Qi, Yang Yang, Xie Qiwen, Qin Xinguo. Exchanging Chinese Medical Information Based on HL7 FHIR[J]. 数据分析与知识发现, 2021, 5(11): 13-28.
[3] Zeng Zhen,Li Gang,Mao Jin,Chen Jinghao. Data Governance and Domain Ontology of Regional Public Security[J]. 数据分析与知识发现, 2020, 4(9): 41-55.
[4] Li Jiaquan,Li Baoan,You Xindong,Lü Xueqiang. Computing Similarity of Patent Terms Based on Knowledge Graph[J]. 数据分析与知识发现, 2020, 4(10): 104-112.
[5] Shaohua Qiang,Yunlu Luo,Yupeng Li,Peng Wu. Ontology Reasoning for Financial Affairs with RBR and CBR[J]. 数据分析与知识发现, 2019, 3(8): 94-104.
[6] Shiqi Deng,Liang Hong. Constructing Domain Ontology for Intelligent Applications: Case Study of Anti Tele-Fraud[J]. 数据分析与知识发现, 2019, 3(7): 73-84.
[7] Zhu Fu,Yuefen Wang,Xuhui Ding. Semantic Representation of Design Process Knowledge Reuse[J]. 数据分析与知识发现, 2019, 3(6): 21-29.
[8] Guangshang Gao. A Survey of User Profiles Methods[J]. 数据分析与知识发现, 2019, 3(3): 25-35.
[9] Ying Wang,Li Qian,Jing Xie,Zhijun Chang,Beibei Kong. Building Knowledge Graph with Sci-Tech Big Data[J]. 数据分析与知识发现, 2019, 3(1): 15-26.
[10] He Youshi,He Shufang. Sentiment Mining of Online Product Reviews Based on Domain Ontology[J]. 数据分析与知识发现, 2018, 2(8): 60-68.
[11] Tang Huihui,Wang Hao,Zhang Zixuan,Wang Xueying. Extracting Names of Historical Events Based on Chinese Character Tags[J]. 数据分析与知识发现, 2018, 2(7): 89-100.
[12] Pang Beibei,Gou Juanqiong,Mu Wenxin. Extracting Topics and Their Relationship from College Student Mentoring[J]. 数据分析与知识发现, 2018, 2(6): 92-101.
[13] Ding Shengchun,Liu Menglu,Fu Zhu. Unified Multidimensional Model Based on Knowledge Flow in Conceptual Design[J]. 数据分析与知识发现, 2018, 2(2): 11-19.
[14] Tu Haili,Tang Xiaobo. Building Product Recommendation Model Based on Tags[J]. 数据分析与知识发现, 2017, 1(9): 28-39.
[15] Chen Erjing,Jiang Enbo. Review of Studies on Text Similarity Measures[J]. 数据分析与知识发现, 2017, 1(6): 1-11.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn