<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Patent Semantic Representation Using Technical Compound Sentences</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Shuxuan Xiang</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jin Mao</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gang Li</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Center for Studies of Information Resources, Wuhan University</institution>
          ,
          <addr-line>Wuhan 430072</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Laboratory of Data Intelligence and Interdisciplinary Innovation, Nanjing University</institution>
          ,
          <addr-line>Nanjing 210000</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>School of Information Management, Wuhan University</institution>
          ,
          <addr-line>Wuhan 430072</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <fpage>44</fpage>
      <lpage>49</lpage>
      <abstract>
        <p>The claims of a patent define the scope of exclusive rights to an invention, containing all essential technical features reflecting the novelty and non-obviousness. Current patent text mining methods have not fully leveraged patent claims by considering the expression of technical features in patent claims. In this study, we clarify the textual structure of patent claims and model the claims in a patent as a tree by capturing the denpendency relationships among the patent claims. We derive patent technology compound sentences (TCS), then propose a novel patent semantic representation based on TCS. To evaluate the proposed patent representation, we apply relational and direct strategies of empirical evaluation to a dataset of USPTO. The results show that our TCS-based and quantity-quality-weighted representation for patents outperforms other methods on task of P2P similarity and automated IPC symbol classification, which suggest that TCS enables more eficient use of technical information of the patent claim. The potential application of the novel representation in novelty analysis is discussed as well. The foundamental patent representation method using TCS could unleash the value of patent claims as technical information resource, and have many potentials in improving many subsequent tasks of patent mining.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Claim tree</kwd>
        <kwd>patent semantic representation</kwd>
        <kwd>technical compound sentence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        proved methods to deal with patent claims. In this study,
we propose a method of patent technology compound
Patent documents are valuable resources for technology sentences (TCS) to structure patent claims, then apply
text mining. As a combination of legal and technical it to design a novel patent semantic representation. We
terms, patent text difers significantly from other types evaluate the proposed patent semantic representation on
of documents as scientific articles [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. The character- a patent dataset. The fundamental patent representation
istics of patent text should be considered and utilized method based on TCS could unleash the resource value
in patent text mining. To this end, many recent tech- of patent claims, and have many potentials in improving
niques of patent mining have increasingly employed a many subsequent tasks of patent mining.
few methods like information fusion and text
reorganization [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. As an important element in patent document,
patent claim outlines the scope of an invention’s exclu- 2. Related work
sive rights and include all essential technical elements
that demonstrate its novelty and non-obviousness. Patent For patent semantic representations, terms and phrases
claim has been exploited by many applications of patent [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] or original text [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20">16, 17, 18, 19, 20</xref>
        ] are used as
mining, including patent infringement detection [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5, 6, 7</xref>
        ], the input. Keywords extraction and subject-action-object
patent evaluation [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
        ], patent classification and clus- (SAO) analysis are leveraged to describe the technologies
tering [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11, 12, 13</xref>
        ], patent information representation, etc. embedded in the patent texts. These methods, however,
Therefore, it is an essential task to design text process- could be unable to capture the relationships within the
ing methods of patent claims by fully leveraging their technical concepts and might overlook some of the
techfeatures. However, current studies have not yet clarified nical specifics. The original text may be a superior option
the textual structure of patent claims, nor designed im- in terms of information integrity with the advancement
of NLP techniques. Title and abstract of patent are
dePatentSemTech’23: 4th Workshop on Patent Text Mining and sirable sources of technical information, yet the claim of
Semantic Technologies, July 27, 2023, Taipei, Taiwan. patent alone is able to achieve state-of-the-art results [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
* Corresponding author. Recently, a growing body of research has concentrated
$ xsx@smail.nju.edu.cn (S. Xiang); danveno@163.com (J. Mao); on applying patent claim in patent semantic
represenimiswhu@aliyun.com (G. Li) tation for its delicate writing [
        <xref ref-type="bibr" rid="ref14 ref18 ref19 ref20 ref21 ref3">3, 14, 18, 19, 20, 21</xref>
        ]. Yet
000000-0000-0020-0823-3362-5498-9711(6G9.(LS.i)Xiang); 0000-0001-9572-6709 (J. Mao); the virtue of patent claims’ characteristics on NLP tasks
© 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License are not always valued, and the particularities of patent
CPWrEooUrckReshdoinpgs IhStpN:/c1e6u1r3-w-0s.o7r3g ACttEribUutRion W4.0oInrtekrnsahtioonpal (PCCroBYce4.0e).dings (CEUR-WS.org) claim are not dealt with properly. There have been some
further studies which optimize the input by attending technicalities. Furthermore, TCS enables the
disambiguato characteristics that distinguish patent text from other tion of claims following the serial dependency and claims
text types, such as information enhancement with patent following the parallel dependency. The claims following
citation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], or input transformation according to claim the serial dependency add into the length of TCS, i.e., the
structure [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. These methods leverage idiosyncrasies technicalities volume of a full description. The claims
of claim text to some extent. To our knowledge, little following the parallel dependency add into the count
research on patent semantic representation utilizes the of TCS, i.e., generalize and thus expand the scope of a
specific structure and internal logic of technical informa- patent. As shown in fig.1, the example patent claim can
tion within patent claim. Therefore, we contribute to the be break down into 12 TCSs, and each of them consists
research on patent semantic representation by provid- of 5 claims.
ing an embedding method that can capture the nuance
internal logic of patent claims.
      </p>
    </sec>
    <sec id="sec-2">
      <title>3. A representation using technical compound sentence</title>
      <sec id="sec-2-1">
        <title>3.1. The tree structure of patent claims</title>
        <p>
          The claims of patent can be classified into independent
claims and dependent claims. Independent claims
describe diferent embodiments or aspects, uses, or
methods of producing the invention. Dependent claims refer
back to and further limit another claim or the claims in
the same application, to further limit the scope and
complete the description with more details. The
technological embodiments of dependent claims are embedded in
the independent claims. With such structure, the patent
claims can be model as a tree. Typically, each patent
claim is provided as a separate numbered sentence, and
the referenced claim is easily identified in the sentence.
Theoretically, it is easy to identify the dependencies of
patent claims and construct the tree structure of claims
[
          <xref ref-type="bibr" rid="ref22 ref23 ref24">22, 23, 24</xref>
          ]. We refer such tree structure of claims as
claim tree. In a claim tree, a claim follows serial
dependency refers to the previous claim, and a claim follows
parallel dependency refers to claim or claims before the
previous one. Serial dependency between claims adds
into the depth, and parallel dependency adds into the
breadth, resulting in varying structures.
We develop a method for semantic representations of
patent based on technical compound sentence (TCS). The
embedding vector of a patent is the weighted average
of the embedding vector of its TCSs, where the weights
are based on the quantity Q(s) and quality F(s) of the
information the TCS contains. The representation is
obtained through
⃗ = ∑︀
        </p>
        <p>1
∈  () ∈
∑︁ ⃗ × () ×  ()
(1)</p>
        <sec id="sec-2-1-1">
          <title>A patent claim can be represented as a graph where nodes</title>
          <p>3.2. Construction of Technical Compound are terms of the claim. The graph-of-words of patent
claim C is defined asG = (V,E) where V is the set of nodes</p>
          <p>Sentence that represents the nouns and verbs of C and E is the
The logical connections between technicalities embodied set of edges which represents the co-occurrence of the
in the claims are reeflcted by the dependencies of claims. words in a 1-size window. Information quantity Q(s) of a
Therefore, a path from the root to the leaf nodes in claim TCS is determined by its cover of level H(s) and cover of
tree denotes a chain of claims that together provide a full breadth R(s) of the claims it includes. Cover of level H(s)
statement of an aspect, use, or method of fabricating the is the maximum depth of a claim that form the TCS in the
invention. A technical compound sentence (TCS) is con- claim tree, which is positively related with more technical
structed by combining the claims of the path in sequence. details. And cover of breadth R(s) is measured by radius
It is capable of grasping the progressive and explanatory of subgraph of the TCS  , which can describe the scope
relationships of claims, as well as the superior and sub- of technical information the TCS contains. Information
ordinate relationships between technical concepts and quantity Q(s) is calculated with
() = () ×</p>
          <p>
            (2)
As for the information quality F(s) of a TCS, the k-core
approach is employed [
            <xref ref-type="bibr" rid="ref25">25</xref>
            ], which focus on cohesiveness
and connections of nodes (terms). The -core of G is a
subgraph  , in which the degree of nodes is greater
than or equal to . In the  , for the edge D(,)
linking the term  and  of G, its weight equals to
the number of co-occurrences of two terms, and its core
degree is . Weight of the edge linking two terms and
the core where those two terms appear are combined to
calculate the information quality F(s) as
          </p>
        </sec>
        <sec id="sec-2-1-2">
          <title>The TCSs are then embedded using a custom</title>
          <p>
            Bert+SimCSE-unsup model, and the claim
representation is obtained by taking weighted average of the
TCSs embeddings. The whole process is illustrated in
Figure 2.
similarities is investigated. The latter method analyzes
the representation’s performance in the prediction of the
associated IPC classes [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]. Firstly, we demonstrate the
benefit of TCS and the weighting strategy, by comparing
with: (i.) full text of claim; (ii.) the first claim; (iii.) TCS +
unweighted average; (iv.) TCS + quantity weighted
average; (v.) TCS + quality weighted average. One should
notice the above methods share the Bert+SimCSE-unsup
model for embeddings. For good measure, other baseline
models include: (vi.) PatentSBERTa [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]; (vii.)
Technological Signature [
            <xref ref-type="bibr" rid="ref18">18</xref>
            ]; (viii.) Doc2vec [
            <xref ref-type="bibr" rid="ref28">28</xref>
            ]; (ix.) tfidf-Mittens
[
            <xref ref-type="bibr" rid="ref29">29</xref>
            ]; (x.) Mittens+WR [
            <xref ref-type="bibr" rid="ref30">30</xref>
            ]. Each IPC of a patent can
be represented by a tree for it comprises a
hierarchically organized taxonomy, and the IPC tree of a patent is
structured by additionally inserting a root node to unify
the trees of all assigned IPC codes. The dissimilarity
space embedding (DSE) is adapted for IPC
representation [
            <xref ref-type="bibr" rid="ref26 ref31">26, 31</xref>
            ], which transform the IPC tree into a vector
space. Given a distance function d, the dissimilarity space
embedding of IPC is defined as
          </p>
          <p>() :  → ℜ  () = ((1, ), (2, ), . . . , (, ))
(4)
Tree edit distance (TED) is employed as distance function.
It is given by the minimal cost sequence of all operations
including insertion, deletion, and relabeling
transforming one tree to another. Then we calculate similarity by
dot product of two representation vector. Besides, the
absolute value of diference between 1 and the ratio of
two similarities (i.e., the similarity derived from the
representation and IPC assignment), which takes the form
of</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>4.3. Application</title>
        <p>
          Avg. 0.5797 0.5929 We apply technical compound sentence (TCS) on novelty
Std. 1.1598 1.3834 analysis. Innovation consists in carrying out new
combiP valuZe (voanluee-sided) -02..09031965 nations. Actually, innovation is fundamentally the
combination of facts, concepts, techniques, theories, goals,
etc. [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]. Thus, for novelty analysis, the combinations
Table 4 held by the patent are vital and the combinations should
Result of Z-Test (iii.) be considered when conducting patent semantic search
        </p>
        <p>TCS + weighted TCS + unweighted in novelty analysis. Patent claims define the boundary
Avg. 0.5409 0.5797 for an exclusive right granted by the patent ofice, and we
Std. 0.9152 1.1598 may express the same thing by saying that each patent
Z value -10.6267 occupies a certain inventive space of the protecting parts
P value (one-sided) 0.0000 of technologies that exclude other inventions. A TCS
derived from a patent claim tree, naturally, describes a
relatively separate segment of the entire space the claim
between highlighting the key details and elaborating the defines, which means it contains the implicit
combinafull scope. tions of an aspect or method the patent right intends to</p>
        <p>
          Furthermore, we examine whether the generated vec- protect. Therefore, the relevant patents can be located
tors can function as inputs for automated IPC symbol and identified by matching similar TCS. By applying TCS
classification for the main section (In this case, binary embedding as the query, we are able to retrieve more of
classification of section G and section H). An artificial relevant items which might be novelty-prejudicial to the
neural network (ANN) is deployed [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], which takes the target patent for novelty assessment. Thus, TCS could
representations as input and predicts the main section of improve the recall of patent retrieval in patent semantic
the patent. Table 5 demonstrates that our method outper- search in novelty analysis.
forms the baseline methods on this task, which indicates
the capability of the presented method in semantic
representation and proves the TCS as well as the weighting
strategy efective.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5. Conclusion</title>
      <p>A technical compound sentence (TCS) is composed of
a set of claims that on the path from the root to the
leaf nodes in a claim tree. The experiment’s findings
demonstrate that the employment of TCS enhances the
performance of patent semantic representation. This
indicates the capability of the TCS in technical information
organization of patents. Additionally, the balance of
emphasizing the key information and elaborating the full
scope is achieved by the weight of quantity and quality
built on TCS, which further improves the semantic
representation. For future work, we will further explore the
uses of TCS in the field of patent text mining,
attempting to achieve eficient processing, interpretation, and
utilization of patent texts.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Casola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lavelli</surname>
          </string-name>
          , Summarization, simplification, and generation:
          <source>The case of patents, Expert Systems with Applications</source>
          <volume>205</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          <article-title>HanTong, A two-level parser for patent claim parsing</article-title>
          ,
          <source>Advanced Engineering Informatics</source>
          <volume>29</volume>
          (
          <year>2015</year>
          )
          <fpage>431</fpage>
          -
          <lpage>439</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Lei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Patent analytic citation-based vsm: Challenges and applications</article-title>
          ,
          <source>IEEE Access 8</source>
          (
          <year>2020</year>
          )
          <fpage>17464</fpage>
          -
          <lpage>17476</lpage>
          . doi:
          <volume>10</volume>
          .1109/ ACCESS.
          <year>2020</year>
          .
          <volume>2967817</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Establish a patent risk prediction model for emerging technologies using deep learning and data augmentation</article-title>
          ,
          <source>Advanced Engineering Informatics</source>
          <volume>52</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <article-title>How to assess patent infringement risks: a semantic patent claim analysis using dependency relationships</article-title>
          ,
          <source>Technology analysis and strategic management 25</source>
          (
          <year>2013</year>
          )
          <fpage>23</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Jang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yoon</surname>
          </string-name>
          ,
          <article-title>An explainable ai (xai) model for text-based patent novelty analysis</article-title>
          ,
          <source>Available at SSRN</source>
          (
          <year>2023</year>
          ). doi:http://dx.doi.org/10. 2139/ssrn.4341594.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Du</surname>
          </string-name>
          , W. Liu,
          <string-name>
            <given-names>K.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gao</surname>
          </string-name>
          , Y. Han,
          <article-title>Technical function-efect based patent multi-to-one negation game model</article-title>
          ,
          <source>in: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1443</fpage>
          -
          <lpage>1448</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSCWD54268.
          <year>2022</year>
          .
          <volume>9776122</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wittfoth</surname>
          </string-name>
          ,
          <article-title>Measuring technological patent scope by semantic analysis of patent claims-an indicator for valuating patents</article-title>
          ,
          <source>World Patent Information</source>
          <volume>58</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>A. J. H</surname>
          </string-name>
          , Modeling patent clarity,
          <source>Research Policy</source>
          <volume>51</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Novelli</surname>
          </string-name>
          ,
          <article-title>An examination of the antecedents and implications of patent scope</article-title>
          ,
          <source>Research Policy</source>
          <volume>44</volume>
          (
          <year>2015</year>
          )
          <fpage>493</fpage>
          -
          <lpage>507</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D. H.</given-names>
            <surname>Milanez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. I. L</given-names>
            . de Faria, R. M. do
            <surname>Amaral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A. R.</given-names>
            <surname>Gregolin</surname>
          </string-name>
          ,
          <article-title>Claim-based patent indicators: A novel approach to analyze patent content and monitor technological advances</article-title>
          ,
          <source>World Patent Information</source>
          <volume>50</volume>
          (
          <year>2017</year>
          )
          <fpage>64</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hsiang</surname>
          </string-name>
          ,
          <article-title>Patent classification by nfie-tuning bert language model</article-title>
          ,
          <source>World Patent Information</source>
          <volume>61</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>Structure clustering for chinese patent documents</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>34</volume>
          (
          <year>2008</year>
          )
          <fpage>2290</fpage>
          -
          <lpage>2297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Construction and application of patent technical element dependency network</article-title>
          ,
          <source>IEEE Transactions on Engineering Management</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . doi:
          <volume>10</volume>
          .1109/TEM.
          <year>2022</year>
          .
          <volume>3227175</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Technological trend mining: identifying new technology opportunities using patent semantic analysis</article-title>
          ,
          <source>Information Processing and Management</source>
          <volume>59</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>What is your next invention?-a framework of mining technological development rules and assisting in designing new technologies based on bert as well as patent citations</article-title>
          ,
          <source>Computers in Industry</source>
          <volume>145</volume>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>deGrazia Charles</surname>
            <given-names>AW</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Frumkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Pairolero</surname>
          </string-name>
          ,
          <article-title>Embracing invention similarity for the measurement of vertically overlapping claims</article-title>
          ,
          <source>Economics of Innovation and New Technology</source>
          <volume>29</volume>
          (
          <year>2020</year>
          )
          <fpage>113</fpage>
          -
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Hain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jurowetzki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Buchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <article-title>A text-embedding-based approach to measuring patent-to-patent technological similarity</article-title>
          ,
          <source>Technological Forecasting and Social Change</source>
          <volume>177</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <article-title>Patent analytics based on feature vector space model: A case of iot</article-title>
          ,
          <year>2019</year>
          . arXiv:
          <year>1904</year>
          .08100.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Bekamiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Hain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jurowetzki</surname>
          </string-name>
          ,
          <article-title>Patentsberta: A deep nlp based hybrid model for patent distance and classification using augmented sbert</article-title>
          ,
          <year>2021</year>
          . arXiv:
          <volume>2103</volume>
          .
          <fpage>11933</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>T.</given-names>
            <surname>Roh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jeong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yoon</surname>
          </string-name>
          ,
          <article-title>Developing a methodology of structuring and layering technological information in patent documents through natural language processing</article-title>
          ,
          <source>Sustainability</source>
          <volume>11</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Y. T.</given-names>
            <surname>Demey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Golzio</surname>
          </string-name>
          ,
          <article-title>Search strategies at the european patent ofice</article-title>
          ,
          <source>World Patent Information</source>
          <volume>63</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>L.</given-names>
            <surname>FuRen</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. K. Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <article-title>SzuYin, A hybrid patent prior art retrieval approach using claim structure and description,</article-title>
          <year>2014</year>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>248</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wirth</surname>
          </string-name>
          , E. Kanoulas,
          <article-title>Query generation for patent retrieval with keyword extraction based on syntactic features</article-title>
          ,
          <year>2019</year>
          . arXiv:
          <year>1906</year>
          .07591.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>H.</given-names>
            <surname>Mirisaee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Gaussier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lagnier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guerraz</surname>
          </string-name>
          ,
          <article-title>Terminology-based text embedding for computing document similarities on technical content</article-title>
          ,
          <year>2019</year>
          . arXiv:
          <year>1906</year>
          .
          <year>01874</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>K.</given-names>
            <surname>Riesen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bunke</surname>
          </string-name>
          ,
          <article-title>Graph classification based on vector space embedding</article-title>
          ,
          <source>International Journal of Pattern Recognition and Artificial Intelligence</source>
          <volume>23</volume>
          (
          <year>2009</year>
          )
          <fpage>1053</fpage>
          -
          <lpage>1081</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y. M. G.</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bertolini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S. B.</given-names>
            <surname>Jr.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. D. C.</given-names>
            <surname>Cavalcanti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. E. S.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          ,
          <article-title>The dissimilarity approach: a review</article-title>
          ,
          <source>Artificial Intelligence Review</source>
          <volume>53</volume>
          (
          <year>2020</year>
          )
          <fpage>2783</fpage>
          -
          <lpage>2808</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Lau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Baldwin</surname>
          </string-name>
          ,
          <article-title>An empirical evaluation of doc2vec with practical insights into document embedding generation</article-title>
          ,
          <year>2016</year>
          . arXiv:
          <volume>1607</volume>
          .
          <fpage>05368</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dingwall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Potts</surname>
          </string-name>
          ,
          <string-name>
            <surname>Mittens:</surname>
          </string-name>
          <article-title>An extension of glove for learning domain-specialized representations</article-title>
          ,
          <year>2018</year>
          . arXiv:
          <year>1803</year>
          .09901.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kawin</surname>
          </string-name>
          ,
          <article-title>Unsupervised random walk sentence embeddings: A strong but simple baseline</article-title>
          ,
          <source>in: Proceedings of the Third Workshop on Representation Learning for NLP</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>100</lpage>
          . URL: https: //aclanthology.org/W18-3012. doi:
          <volume>10</volume>
          .18653/v1/
          <fpage>W18</fpage>
          -3012.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>K.</given-names>
            <surname>Frerich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bukowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Geisler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Farkas</surname>
          </string-name>
          ,
          <article-title>On the potential of taxonomic graphs to improve applicability and performance for the classification of biomedical patents</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>11</volume>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>H.</given-names>
            <surname>Michael</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kiessling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moeller</surname>
          </string-name>
          ,
          <article-title>A view of entrepreneurship and innovation from the economist “for all seasons”: Joseph s. schumpeter</article-title>
          ,
          <source>Journal of Management History</source>
          <volume>16</volume>
          (
          <year>2010</year>
          )
          <fpage>527</fpage>
          -
          <lpage>531</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>