US20160092528A1 - Techniques for creating computer generated notes - Google Patents
Techniques for creating computer generated notes Download PDFInfo
- Publication number
- US20160092528A1 US20160092528A1 US14/964,960 US201514964960A US2016092528A1 US 20160092528 A1 US20160092528 A1 US 20160092528A1 US 201514964960 A US201514964960 A US 201514964960A US 2016092528 A1 US2016092528 A1 US 2016092528A1
- Authority
- US
- United States
- Prior art keywords
- token
- notes
- sequence
- nodes
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G06F17/30569—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/258—Data format conversion from or to a database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/93—Document management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G06F17/277—
-
- G06F17/30011—
-
- G06F17/30876—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/237—Lexical tools
- G06F40/247—Thesauruses; Synonyms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/258—Heading extraction; Automatic titling; Numbering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
- G06F40/284—Lexical analysis, e.g. tokenisation or collocates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
- G06N5/022—Knowledge engineering; Knowledge acquisition
Definitions
- the invention is related to information technology and, more particularly, to the use of computer generated notes to improve comprehension and utilization of digitized information.
- Note taking is a basic function of human knowledge acquisition from printed or digitized information sources, familiar to every student, professional, or worker who must select words or phrases of interest from a page or a document.
- the user may perform or seek the reduction and/or distillation of a page or document for the purposes of review and study—or for the purpose of correlating the resulting notes together to produce facts, assertions and conclusions.
- notes generated by a human note taker may sometimes be phrases, sentences or paragraphs captured or paraphrased specifically to be quoted elsewhere
- manual note taking for the purpose of knowledge acquisition typically aims to capture from a page or document some fragments which convey meaning—the fragments having a significance subjectively determined by a user.
- the user may seek only a more or less minimal description of what the document or page “is about”.
- a number of software program products have been developed over time to assist and facilitate the note taking function.
- Document summarization is related to note taking in that the summarization function attempts to distill the contents of a page or document into a paraphrased form which is ideally of the minimum word length while including the maximum of the page or document's relevant content. Academic and commercial attention to page and document summarization has increased over recent years, especially as part of the effort to improve internet search. Text summarization is difficult, computationally expensive, and requires extremely sophisticated algorithms operating upon extensive supporting semantic, lexical and database infrastructure. Because of these factors, true text summarization is not yet considered practical. “Extractor” (a product of DBI Technologies, Inc. of Canada) illustrates the current limitations of the technology.
- Questia is an online research and library service with an extensive user interface that presents each page of a user selected digitized reference (such as a digitized encyclopedia) to the user. The user can then highlight and capture as a note any text fragment, phrase, paragraph or larger text fragment and store that fragment in an online project folder, preserving the location from which the fragment was copied. Questia then supports composition of research papers by allowing the easy pasting of the captured text fragments into a document, and then automatically generating and placing correctly formed bibliographic references.
- a user selected digitized reference such as a digitized encyclopedia
- the present invention automatically generates notes from a page or document—or from any other digitized infonnation source. None of the currently available products is able to do so. Further, as described more hereinafter, the novel features and uses of the present invention optimize the utility of the generated notes.
- the present invention discloses a method and apparatus for utilizing the nodes generated by the decomposition function described more hereinafter and in said Ser. No. 11/273,568 as notes.
- a decomposition function creates nodes from documents, emails, relational database tables and other digitized information sources.
- Nodes are a particular data structure that stores elemental units of information. The nodes can convey meaning because they relate a subject term or phrase to an attribute term or phrase.
- the node contents take the form of a text fragment which conveys meaning, i.e., a note.
- the notes generated from each digital resource are associated with the digital resource from which they are captured. The notes are then stored, organized and presented in several ways which facilitate knowledge acquisition and utilization by a user.
- FIG. 1 is a functional diagram of a computer generated note taking system in accordance with one aspect of the invention.
- FIG. 2 is a high-level diagram showing how a user interacts with the system for computer generation of notes in accordance with one aspect of the invention.
- FIG. 3 is a block diagram showing the decomposition function of FIG. 1 in accordance with one aspect of the invention.
- FIG. 4 illustrates that operation of the node to note conversion function of FIG. 1 in accordance with one aspect of the invention.
- FIG. 5 is a flow chart of the note-taking program in accordance with one aspect of the invention.
- FIG. 6 illustrates a software architecture preferably used for the computer generation of notes.
- FIG. 7 is a block diagram of a hardware architecture of an exemplary personal computer used in carrying out the invention.
- FIG. 8 is a block diagram showing use of the note taking functionality in a network environment.
- FIG. 9 is an illustration of an exemplary screen view of a note selection window and related control buttons in accordance with one aspect of the invention.
- FIG. 10A illustrates the contents of a note created from a four-part node in accordance with one aspect of the invention.
- FIG. 10B illustrates the contents of a quotation node in accordance with one aspect of the invention.
- FIG. 1 is a flow chart of the process by which the nodes generated by the decomposition function described in said Ser. No. 11/273,568 are converted into notes and then stored, organized, and presented to the user in accordance with one preferred embodiment of the invention.
- a digital resource 128 is input to a decomposition function 130 , generating nodes 180 a - 180 n as described hereinafter and in said Ser. No. 11/273,568 and said Ser. No. 11/314,835.
- the nodes are self contained and require nothing else to convey meaning.
- the contents of each generated node 180 is extracted and converted into a note 160 by a note conversion function 163 .
- a note 160 is a text object.
- notes 160 a - 160 n generated from the same digital resource 128 or discrete part thereof are together referred to as a note set 165 .
- the note set 165 is placed in a note container 168 , which is a data structure suitable for storing notes 160 a - 160 n and associating a note set 165 with the digital resource 128 from which the notes 160 a - 160 n were generated.
- FIG. 2 is a high-level diagram showing how a user interacts with the system for computer generation of notes in accordance with one aspect of the invention.
- user 305 utilities a personal computer 200 with a display 210 to view a graphical user interface ( 172 of FIG. 1 ) which displays the text of the resource 128 in a document window 260 .
- the document window 260 is displayed on the display 210 in a window 270 for viewing using, e.g., an Internet browser.
- On the browser screen in addition to the document 260 , there is a “take notes” button 410 preferably in the shape of a notes icon.
- the text of the resource 128 is extracted and passed to a decomposition function 130 which is shown more in detail in conjunction with FIG. 3 .
- the decomposition function then passes the output, described hereinafter, to a note conversion function 163 , more particularly described in conjunction with FIG. 4 .
- a note taking program 170 then receives the output of the note conversion function 163 and displays the document 260 in the window together with a notes selection window 176 containing notes 160 and with one or more save notes buttons 181 .
- FIG. 3 is a block diagram showing the decomposition function of FIG. 1 in accordance with one aspect of the invention.
- the diagram is a somewhat simplified illustration of the document decomposition Function 130 .
- a Document 260 is first subjected to processing by specific components of a Natural Language Parser 310 .
- Natural Language Parser 310 Although there a number of Natural Language Parsers 310 available, and all available Natural Language Parsers 310 have widely differing implementations, one well known example is part of the GATE Natural Language Processor. GATE stands for “General Architecture for Text Engineering” and is a project of the University of Sheffield in the United Kingdom. GATE has a very large number of components, most of which have no bearing upon the present invention.
- One embodiment of the current invention utilizes a small subset of GATE components—a Serial Analyzer (called the “ANNIE Serial Analyzer”) 320 , a Document of Sentences 330 , a Tagger (called the “Hepple Tagger”) 340 —to extract Sentence + Token Sequence Pairs 360 . It is the Sentence + Token Sequence Pairs 360 that are utilized by the Document Decomposition Function 130 .
- the set of Sentence + Token Sequence Pairs 360 are produced in GATE as follows:
- the Serial Analyzer 320 extracts “Sentences” from an input Document 260 .
- the “Sentences” do not need to conform to actual sentences in an input text, but often do.
- the sentences are “aligned” in a stack termed a Document of Sentences 330 .
- Each Sentence in the Document of Sentences 330 is then run through the Tagger 340 which assigns to each word in the Sentence a part of speech token.
- the parts of speech are for the most part the same parts of speech well known to school children, although among Taggers 340 , there is no standard for designating tokens.
- a significant element of the present invention are novel Patterns of Tokens (“Patterns”) 370 and Per-Pattern Token Seeking Behavior Constraints (“Constraints”) 375 which are applied to the Sentence + Token Sequence Pair 360 within the Node Generation Function 380 to produce Nodes 180 , where such Nodes 180 are specifically intended to be converted into Notes 160 , where said Notes 160 conform—with specific exceptions—to notes composed by hand and ad hoc by a human reviewer of the underlying Document 260 , and where the set of said Notes 160 represents—with specific exceptions—an exhaustive extraction of all knowledge from said Document 260 .
- NP Phrases
- VP Verb Phrases
- Adjective Phrases Adjective Phrases
- Adverbial Phrases the word phrase may be defined as any proper name (for example “New York City”). Most definitions require that a phrase contain multiple words, although at least one definition permits even a single word to be considered a phrase.
- Some search engine implementations utilize a lexicon (a pre-canned list) of phrases.
- the WordNet Lexical Database is a common source of phrases.
- the Notes 160 generated by the preset invention can not be classified as keywords, phrases, clauses, or sentences (or any larger text unit) using the well known definitions of these terms, except by serendipitous execution of the described functions.
- the word concept generally refers to one of two constructs.
- the first construct is concept as a cluster of related words, similar to a thesaurus, associated with a keyword. In a number of implementations, this cluster is made available to a user—via a Graphic User Interface (GUI) for correction and customization. The user can tailor the cluster of words until the resulting concept is most representative of the user's understanding and intent.
- the second construct is concept as a localized semantic net of related words around a keyword. Here, a local or public ontology and taxonomy is consulted to create a semantic net around the keyword.
- Some implementations of concept include images and other non-text elements. Topics in general practice need to be identified or “detected” from a applying a specific set of operations against a body of text. Different methodologies for identification and/or detection of topics have been described in the literature. The Notes 160 generated by the current invention can not be classified as concepts or topics using the well know definitions of these terms, except by serendipitous execution of the described functions
- Pattern 370 and Constraints 375 are designed and intended to produce optimally correlatable Nodes 180 , such Nodes 180 ideally capturing a Relation (value of Bond 184 ) between the values of Subject 182 and Attribute 186 .
- the present invention sets no such standard for Node 180 creation, but instead, establishes Patterns 370 and Constraints 375 which can ultimately produce Notes 160 at machine speed.
- word classification identifies words as instances of parts of speech (e.g. nouns, verbs, adjectives). Correct word classification often requires a text called a corpus because word classification is dependent upon not what a word is, but how it is used. Although the task of word classification is unique for each human language, all human languages can be decomposed into parts of speech.
- the human language decomposed by word classification in the preferred embodiment is the English language, and the means of word classification is a natural language parser (NLP) (e.g. GATE, a product of the University of Sheffield, UK).
- NLP natural language parser
- the method is:
- decomposition is applied only to the English language content enclosed by XML element opening and closing tags with the alternative being that decomposition is applied to the English language content enclosed by XML element opening and closing tags, and any English language tag values of the XML element opening and closing tags.
- This embodiment is useful in cases of the present invention that seek to harvest metadata label values in conjunction with content and informally propagate those label values into the nodes composed from the element content. In the absence of this capability, this embodiment relies upon the XML file being processed by a NLP as a plain text file containing special characters.
- HTML HyperText Markup Language
- XHTMLTM Extensible HyperText Markup Language
- RuleML a project of the RuleML Initiative
- Standard Generalized Markup Language SGML
- XSL Extensible Stylesheet Language
- Email messages and email message attachments are decomposed using word classification in a preferred embodiment of the present invention.
- the same programmatically invoked utilities used to access and search email repositories on individual computers and servers are directed to the extraction of English language text from email message and email attachment files.
- the NLP used by the present invention will process the extracted text as plain text or plain text containing special characters.
- Email attachments are decomposed as described earlier for each respective file format.
- the other means of decomposition is decomposition of the information from a resource using an intermediate format.
- the intermediate format is a first term or phrase paired with a second term or phrase.
- the first term or phrase has a relation to the second term or phrase. That relation is either an implicit relation or an explicit relation, and the relation is defined by a context.
- that context is a schema.
- the context is a tree graph.
- that context is a directed graph (also called a digraph).
- the context is supplied by the resource from which the pair of terms or phrases was extracted.
- the context is supplied by an external resource.
- the relation is an explicit relation defined by a context
- that relation is named by that context.
- the context is a schema
- the resource is a Relational Database (RDB).
- the relation from the first term or phrase to the second term or phrase is an implicit relation, and that implicit relation is defined in an RDB.
- the decomposition method supplies the relation with the pair of concepts or terms, thereby creating a node.
- the first term is a phrase, meaning that it has more than one part (e.g. two words, a word and a numeric value, three words)
- the second term is a phrase, meaning that it has more than one part (e.g. two words, a word and a numeric value, three words).
- the decomposition function takes as input the RDB schema plus at least two values from a row in the table.
- the method includes
- the entire contents of the RDB can be decomposed, and because of the implicit relationship being immediately known by the semantics of the RDB, the entire contents of the RDB can be composed into nodes without additional processing of the intermediate format pair of terms or phrases.
- the decomposition function will capture all the hierarchical relations in the taxonomy.
- the decomposition method is a graph traversal function, meaning that the method will visit every vertex of the taxonomy graph. In a tree graph, a vertex (except for the root) can have only one parent, but many siblings and many children.
- the method includes:
- the relation from the first term or phrase to the second term or phrase is an explicit relation, and that explicit relation is defined in an ontology.
- the decomposition function will capture all the semantic relations of semantic degree 1 in the ontology.
- the decomposition method is a graph traversal function, meaning that the method will visit every vertex of the ontology graph.
- semantic relations of degree 1 are represented by all vertices exactly 1 link (“hop”) removed from any given vertex. Each link must be labeled with the relation between the vertices.
- the method includes:
- the degree one relations of entire ontology tree can be decomposed, and because of the explicit relationship being immediately known by the labeled relation semantics of the ontology, the entire contents of the ontology can be composed into nodes without additional processing of the intermediate format pair of terms or phrases.
- a node is comprised of parts.
- the node parts can hold data types including, but not limited to text, numbers, mathematical symbols, logical symbols, URLs, URIs, and data objects.
- the node data structure is sufficient to independently convey meaning, and is able to independently convey meaning because the node data structure contains a relation.
- the relation manifest by the node is directional, meaning that the relationships between the relata may be uni-directional or bi-directional.
- a uni-directional relationship exists in only a single direction, allowing a traversal from one part to another but no traversal in the reverse direction.
- a bi-directional relationship allows traversal in both directions.
- a node is a data structure comprised of three parts in one preferred embodiment, and the three parts contain the relation and two relata.
- the arrangement of the parts is:
- a node is a data structure and is comprised of four parts.
- the four parts contain the relation, two relata, and a source.
- One of the four parts is a source, and the source contains a URL or URI identifying the resource from which the node was extracted.
- the source contains a URL or URI identifying an external resource which provides a context for the relation contained in the node.
- the four parts contain the relation, two relata, and a source, and the arrangement of the parts is:
- nodes 180 A, 180 B The generation of nodes 180 A, 180 B is achieved using the products of decomposition by a natural language processor (NLP) 410 , including at least one sentence of words and a sequence of tokens where the sentence and the sequence must have a one-to-one correspondence 415 . All nodes 180 A, 180 B that match at least one syntactical pattern 420 can be constructed.
- NLP natural language processor
- Steps (a)-(l) represent an example of a per pattern token seeking behavior constraint 375 n of FIG. 3 .
- NIT natural language processor
- Steps (r)-(bb) represent another example of a per pattern token seeking behavior constraint 375 of FIG. 3 .
- the per pattern token seeking behavior constraints are not necessarily those normally associated with the semantic patterns of a language.
- a preferred embodiment of the present invention is directed to the generation of nodes using all sentences which are products of decomposition of a resource.
- the method includes an inserted step (q) which executes steps (a) through (p) for all sentences generated by the decomposition function of an NLP.
- Nodes can be constructed using more than one pattern.
- the method is:
- nodes are constructed using more than one pattern, and the method for constructing nodes uses a sorted list of patterns.
- the method for constructing nodes uses a sorted list of patterns.
- the inserted step (a 2 ) sorts the list of patterns by the center token, then left token then right token (example: ⁇ adjective> before ⁇ noun> before ⁇ preposition>), meaning that the search order for the set of patterns (i) through (v) would become (iii)(ii)(iv)(v)(i), and that patterns with the same center token would become a group.
- Additional interesting nodes can be extracted from a sequence of tokens using patterns of only two tokens.
- the method searches for the right token in the patterns, and the bond value of constructed nodes is supplied by the node constructor.
- the bond value is determined by testing the singular or plural form of the subject (corresponding to the left token) value.
- the method for constructing nodes searches for the left token in the patterns, the bond value of constructed nodes is supplied by the node constructor, and the bond value is determined by testing the singular or plural form of the subject (corresponding to the left token) value.
- the bond value is determined by testing the singular or plural form of the subject (corresponding to the left token) value.
- Nodes are constructed using patterns where the left token is promoted to a left pattern containing two or more tokens, the center token is promoted to a center pattern containing no more than two tokens, and the right token is promoted to a right pattern containing two or more tokens.
- the NLP's use of the token “TO” to represent the literal “to” can be exploited. For example,
- Those filters include, but are not limited to:
- the fourth part contains a URL or URI of the resource from which the node was extracted.
- the URL or URI from which the sentence was extracted is passed to the node generation function.
- the URL or URI is loaded into the fourth part, called the Sequence 186 , of the node data structure.
- the RDB decomposition function will place in the fourth (sequence) part of the node the URL or URI of the RDB resource from which the node was extracted, typically, the URL by which the RDB decomposition function itself created a connection to the database.
- the URL might be the file path, for example: “c: ⁇ anydatabase.mdb”. This embodiment is constrained to those RDBMS implementations where the URL for the RDB is accessible to the RDB decomposition function. Note that the URL of a database resource is usually not sufficient to programmatically access the resource.
- FIG. 4 illustrates the operation of the node to note conversion function of FIG. 1 in accordance with one aspect of the invention.
- the Note Conversion Function 163 is simply illustrated in FIG. 4 .
- the products of the Decomposition Function 130 are Nodes 180 .
- An example Node 180 is given.
- the example Node 180 is composed of three parts.
- the first part of the example Node 180 is a Subject 182 , which contains the value “GOLD”.
- the second part of the example Node 180 is a Bond 184 , which contains the value “IS”.
- the third part of the example Node 180 is an Attribute 186 , which contains the value “STANDARD”.
- the Note Conversion Function extracts the value from the Subject 182 (“GOLD”), converts it to text if the value is not already in text form, and places the text in the leftmost position of the Note 160 , which is, in this embodiment a text data object.
- the Note Conversion Program 163 then concatenates a space character to the current rightmost character of the Note 160 text value.
- the Note Conversion Function then extracts the value from the Bond 184 (“IS”), converts it to text if the value is not already in text form, and places the text in the leftmost position of the Note 160 .
- the Note Conversion Program 163 then concatenates a space character to the current rightmost character of the Note 160 text value.
- the Note Conversion Function then extracts the value from the Attribute 186 (“STANDARD”), converts it to text if the value is not already in text form, and places the text in the leftmost position of the Note 160 .
- STANDARD Attribute 186
- the Conversion 163 of the Node 180 into a Note 160 is then complete, and the Note 160 is placed in the Note Container 168 .
- FIG. 5 is a flow chart of the functionality of Note Taking Program 170 .
- a User 305 clicks on the Notes Icon 410 to Start.
- the Note Taking Program 170 will first check that a Document 260 is displayed in the Program 270 e.g., an Internet Browser program. If a Document 260 is in fact displayed, the Note Taking Program 170 will invoke the Document Decomposition Function 130 . As is illustrated in FIG. 3 , the Decomposition Function 130 will create Nodes 180 , from which the Note Conversion Function 163 will create Notes 160 . Referring again to FIG. 5 , the Note Conversion Function 163 will then place in Memory 220 a Note Container 168 with all Notes 160 that have been created.
- the Note Taking Function 170 will fetch the Note Container 168 from Memory 220 , render a Note Selection Window 176 on the Display 210 , render the Controls 181 on the Display 210 , and populate the Note Selection Window 176 with Notes 160 rendered for display. Then the Note Taking Program 170 will enable all Controls 181 which bind to all Notes (as opposed to Selected Notes). When the User 305 selects on of the enabled functions and activates the Control 181 , the Note Taking Program 170 executes the selected function and Ends. Alternately, if the User 305 selects Notes 160 from the Note Selection Window 176 , the Note Taking Program 170 will enable the Controls 181 that operate on selected Notes only.
- the Note Taking Program 270 will check the default directory on Hard Disk 190 for extant Note Container 168 files. If such files exist, the Note Taking Program will prompt the User 305 to select a Note Container 168 file. The Note Taking Program will retrieve the Note Container 168 from Hard Disk 190 and render the Note Selection Window 176 , the Controls 181 , and the Notes 160 on the Display 210 for further interactive interface with the User 305 .
- FIG. 6 illustrates a software architecture preferable used for the computer generation of notes.
- FIG. 6 is a representation of how Documents 260 , whether residing on a Personal Computer 200 , in Personal Computer Memory 220 , on Personal Computer Hard Disk 190 , on Personal Computer Removable Media 250 or on a Network Server 350 , can be presented to a User 305 using the present invention. Also shown are the components of the Personal Computer 200 used in the process, including Main Memory 220 , Display 210 , Hard Disk 190 , and Removable Media Drive 250 . Finally, the use of Hard Disk 190 and Removable Media to permanently store (persist) the Notes 160 contained in the Note Container 168 is illustrated.
- FIG. 7 is a block diagram of a hardware architecture of a personal computer used in carrying out the invention.
- FIG. 7 is an illustration of the internal components of a typical laptop or desktop personal computer 700 .
- Programs 770 and data are stored on Hard Disk 190 or Removable Media Drive 750 , and are placed into Main Memory 720 via the System Bus 730 .
- User interface and results are rendered on the Display 710 .
- Documents 760 may be stored on Hard Disk 190 or Removable Media read by a Removable Media Drive 750 , and placed in Main Memory where the Documents 760 and their content can be manipulated by Computer Program 770 , of which one embodiment of the present invention is an example, as is an Internet Browser such as Internet Explorer, a product of Microsoft, Inc.
- FIG. 8 is a block diagram showing use of the note taking functionality in a networked environment.
- FIG. 8 is an illustration of a Personal Computer 700 connected to Network Servers 850 .
- the connections are through Communication Links 860 .
- the types of connections that can be made include connection via a Broadband Network 810 , which can directly connect to a Network Server 850 or can connect to a Network Server 850 through the Internet 840 .
- a Personal Computer 700 can be connected to a Network Server 850 via Wireless Access 820 to the Internet 840 .
- Documents 760 can be stored on a Network Server 850 .
- Documents 760 can be retrieved from a Network Server 850 and transmitted over Communication Links 860 to the Personal Computer 700 for use in Software Program 770 such as that which is one embodiment of the present invention.
- FIG. 9 is an illustration of an exemplary screen view of a notes selection window and related control buttons in accordance with one aspect of the invention.
- a note selection window 176 is shown associated with two save buttons 181 A and 181 B. If it is desirable only to save certain notes from the note selection window, those notes will be selected, using, typically, standard operating system functionality followed by selection of the save selection button 181 A. When button 181 A is activated, the items that were identified for saving are stored on a hard disk, for example hard disk 190 using the save function 182 of FIG. 1 . If it is desirable to save all of the notes that have been generated, the save all button, 181 B can be selected.
- the Nodes 180 B generated by the Document Decomposition Function 130 are composed of four parts, the fourth part of such Nodes 180 B containing bibliographic information.
- the fourth part of such Nodes 180 B is referred to as a Sequence or Source 188 .
- the type of bibliographic information that may be captured in the fourth part of such Nodes 180 B will vary depending upon the application programming interfaces (API) extent for each type of Document 260 and each type of Computer Program 270 used to display the Document 260 .
- the bibliographic information captured in the fourth part of said Node 180 B will include the URL or URI of the Document 260 .
- the title, author, publication date of the Document 260 may be captured in the fourth part of said Node 180 B.
- the chapter, page, paragraph or line of the Document 260 where the text which served as the basis for creation of the Node 180 B will be captured in the fourth part of said Node 180 B.
- Nodes 180 which are acquired from a Document 260 by the Document Decomposition Function 130 are not clipped or cut and pasted from the text of a Document 260 .
- Nodes 180 may be said to be associated with a location in the text of a Document 260 , that location being the location in the text corresponding to the location in the Sentence + Token Sequence Pair 760 where the first token of a Pattern 770 was found by the Constraint 775 as it operated upon the Sentence + Token Sequence Pair 760 and was successfully able to complete the generation of a Node 180 .
- that location will be captured in the fourth, Sequence 188 part of the Node 180 B.
- note 160 B made from a four-part Node 180 B is composed of two parts, a Note Content part 161 , and a Note Source part 162 .
- the bibliographic material in the Note Source 162 also can be displayed in the Note Selection Window 176 , and subsequently printed or emailed.
- the current invention excludes quotations found in text from the default Tagger 740 algorithm.
- the Tagger 740 will, when encountering either an open or a close quotation marks character, utilize a created part of speech token, “QS” for a open quotation and “QT” for a closed quotation, to delimit the quotation in the Token Sequence.
- the Node Generation Function 780 when processing the Sentence + Token Sequence Pair 760 will use a special Constraint 775 when a “QS” token is encountered.
- the Constraint 775 will then seek the following complementary closed quotation mark “QT” token.
- the Node Generation Function 780 will construct a two part Quotation Node 1010 , as shown in FIG. 10B , the Quotation Node 1010 having a first part called the Quote 1013 and the Quotation Node 1010 having a second part called the Sequence or Source 1088 .
- the Quote 1013 part of the Quotation Node 1010 holds the entire quoted text and the Sequence 1088 part holding bibliographic information. For a Note 160 B made from a Quotation Node 1010 , the entire quoted text will be placed in the Note Content 161 , and the available bibliographic information will be placed in the Note Source 162 .
- the User 305 can elect to not respect quotations, in which case quoted text will be processed by the Tagger 740 and the Node Generation Function 780 , as is other text in the Document 260 .
- the User 305 can elect to respect quotations, but not to preserve quotations in Quotation Nodes 1010 .
- quotation token delimited words and tokens from the Sentence + Token Sequence Pair 760 will be processed into Nodes 180 by the Node Generation Function 780 independently of the other words and tokens in the Sentence + Token Sequence Pair 760 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- General Business, Economics & Management (AREA)
- Business, Economics & Management (AREA)
- Machine Translation (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Text is extracted from and information resource such as documents, emails, relational database tables and other digitized information sources. The extracted text is processed using a decomposition function to create. Nodes are a particular data structure that stores elemental units of information. The nodes can convey meaning because they relate a subject term or phrase to an attribute term or phrase. Removed from the node data structure, the node contents are or can become a text fragment which conveys meaning, i.e., a note. The notes generated from each digital resource are associated with the digital resource from which they are captured. The notes are then stored, organized and presented in several ways which facilitate knowledge acquisition and utilization by a user.
Description
- This application claims priority to provisional application Ser. No. 60/804,495, filed Jun. 12, 2006, entitled “Techniques for Use of Computer Generated Notes” the contents of which are hereby incorporated into this application by reference in their entirety. This application is also a continuation-in-part of and claims priority to both (1) U.S. Ser. No. 11/273,568, filed Nov. 14, 2005 entitled Techniques For Knowledge Discovery By Constructing Knowledge Correlations Using Concepts Or Terms, by inventors Mark Bobick and Carl Wimmer (Attorney docket no. 83071), and (2) U.S. Ser. No. 11/314,835, filed Dec. 21, 2005, entitled Techniques For Knowledge Discovery By Constructing Knowledge Correlations Using Concepts Or Terms, by inventors Mark Bobick and Carl Wimmer (Attorney docket no. 83071_CIP), the contents of both of which are hereby incorporated into this application by reference in their entirety.
- 1. Field of the Invention
- The invention is related to information technology and, more particularly, to the use of computer generated notes to improve comprehension and utilization of digitized information.
- 2. Description of Related Art
- Note taking is a basic function of human knowledge acquisition from printed or digitized information sources, familiar to every student, professional, or worker who must select words or phrases of interest from a page or a document. Like the manual process of note taking, computer-facilitated or computer-automated implementations of note taking—including the current invention—all produce value to a user by distillation and/or reduction of the original text of a document into a form more readily managed by a user. The user may perform or seek the reduction and/or distillation of a page or document for the purposes of review and study—or for the purpose of correlating the resulting notes together to produce facts, assertions and conclusions. While notes generated by a human note taker may sometimes be phrases, sentences or paragraphs captured or paraphrased specifically to be quoted elsewhere, manual note taking for the purpose of knowledge acquisition typically aims to capture from a page or document some fragments which convey meaning—the fragments having a significance subjectively determined by a user. Alternatively, the user may seek only a more or less minimal description of what the document or page “is about”. A number of software program products have been developed over time to assist and facilitate the note taking function.
- Manual note taking for the purpose of creating and publishing study guides is familiar to every student. In the United States, Cliffs Notes (a product of Wiley Publishing, Inc.) are fixtures of secondary school homework regimes.
- Document summarization is related to note taking in that the summarization function attempts to distill the contents of a page or document into a paraphrased form which is ideally of the minimum word length while including the maximum of the page or document's relevant content. Academic and commercial attention to page and document summarization has increased over recent years, especially as part of the effort to improve internet search. Text summarization is difficult, computationally expensive, and requires extremely sophisticated algorithms operating upon extensive supporting semantic, lexical and database infrastructure. Because of these factors, true text summarization is not yet considered practical. “Extractor” (a product of DBI Technologies, Inc. of Canada) illustrates the current limitations of the technology.
- Many so-called note taking software products currently available are used as a simple means to capture, store, and organize the text fragment notes generated by the user while reviewing documents, web pages, or other material—either digitized or printed. An example is MagicNotes (a product of Rose City Software, Inc.). Other products capture some or all of digitized source page or document, but require the user to edit out any unwanted material. An example is Zoot (a product of Zoot Software, Inc.). In this group of software products that capture, store and organize user generated or user edited notes, the most sophisticated is Questia, (a product of Questia Media America, Inc.). Questia is an online research and library service with an extensive user interface that presents each page of a user selected digitized reference (such as a digitized encyclopedia) to the user. The user can then highlight and capture as a note any text fragment, phrase, paragraph or larger text fragment and store that fragment in an online project folder, preserving the location from which the fragment was copied. Questia then supports composition of research papers by allowing the easy pasting of the captured text fragments into a document, and then automatically generating and placing correctly formed bibliographic references.
- The present invention automatically generates notes from a page or document—or from any other digitized infonnation source. None of the currently available products is able to do so. Further, as described more hereinafter, the novel features and uses of the present invention optimize the utility of the generated notes.
- The present invention discloses a method and apparatus for utilizing the nodes generated by the decomposition function described more hereinafter and in said Ser. No. 11/273,568 as notes. A decomposition function creates nodes from documents, emails, relational database tables and other digitized information sources. Nodes are a particular data structure that stores elemental units of information. The nodes can convey meaning because they relate a subject term or phrase to an attribute term or phrase. Removed from the node data structure, the node contents take the form of a text fragment which conveys meaning, i.e., a note. The notes generated from each digital resource are associated with the digital resource from which they are captured. The notes are then stored, organized and presented in several ways which facilitate knowledge acquisition and utilization by a user.
-
FIG. 1 is a functional diagram of a computer generated note taking system in accordance with one aspect of the invention. -
FIG. 2 is a high-level diagram showing how a user interacts with the system for computer generation of notes in accordance with one aspect of the invention. -
FIG. 3 is a block diagram showing the decomposition function ofFIG. 1 in accordance with one aspect of the invention. -
FIG. 4 illustrates that operation of the node to note conversion function ofFIG. 1 in accordance with one aspect of the invention. -
FIG. 5 is a flow chart of the note-taking program in accordance with one aspect of the invention. -
FIG. 6 illustrates a software architecture preferably used for the computer generation of notes. -
FIG. 7 is a block diagram of a hardware architecture of an exemplary personal computer used in carrying out the invention. -
FIG. 8 is a block diagram showing use of the note taking functionality in a network environment. -
FIG. 9 is an illustration of an exemplary screen view of a note selection window and related control buttons in accordance with one aspect of the invention. -
FIG. 10A illustrates the contents of a note created from a four-part node in accordance with one aspect of the invention. -
FIG. 10B illustrates the contents of a quotation node in accordance with one aspect of the invention. -
FIG. 1 is a flow chart of the process by which the nodes generated by the decomposition function described in said Ser. No. 11/273,568 are converted into notes and then stored, organized, and presented to the user in accordance with one preferred embodiment of the invention. Adigital resource 128 is input to adecomposition function 130,generating nodes 180 a-180 n as described hereinafter and in said Ser. No. 11/273,568 and said Ser. No. 11/314,835. The nodes are self contained and require nothing else to convey meaning. Referring once again toFIG. 1 , the contents of each generatednode 180 is extracted and converted into anote 160 by anote conversion function 163. Anote 160 is a text object. Allnotes 160 a-160 n generated from the samedigital resource 128 or discrete part thereof are together referred to as anote set 165. The note set 165 is placed in anote container 168, which is a data structure suitable for storingnotes 160 a-160 n and associating anote set 165 with thedigital resource 128 from which thenotes 160 a-160 n were generated. - When the note set 165 is complete all
notes 160 a-160 n are placed into thenote container 168 by thenote conversion function 163. -
FIG. 2 is a high-level diagram showing how a user interacts with the system for computer generation of notes in accordance with one aspect of the invention. InFIG. 2 ,user 305 utilities apersonal computer 200 with adisplay 210 to view a graphical user interface (172 ofFIG. 1 ) which displays the text of theresource 128 in adocument window 260. Thedocument window 260 is displayed on thedisplay 210 in awindow 270 for viewing using, e.g., an Internet browser. On the browser screen, in addition to thedocument 260, there is a “take notes”button 410 preferably in the shape of a notes icon. When the user selects or otherwise activates the notes icon, the text of theresource 128 is extracted and passed to adecomposition function 130 which is shown more in detail in conjunction withFIG. 3 . The decomposition function then passes the output, described hereinafter, to anote conversion function 163, more particularly described in conjunction withFIG. 4 . - A
note taking program 170 then receives the output of thenote conversion function 163 and displays thedocument 260 in the window together with anotes selection window 176 containingnotes 160 and with one or more savenotes buttons 181. -
FIG. 3 is a block diagram showing the decomposition function ofFIG. 1 in accordance with one aspect of the invention. The diagram is a somewhat simplified illustration of thedocument decomposition Function 130. ADocument 260 is first subjected to processing by specific components of aNatural Language Parser 310. Although there a number ofNatural Language Parsers 310 available, and all availableNatural Language Parsers 310 have widely differing implementations, one well known example is part of the GATE Natural Language Processor. GATE stands for “General Architecture for Text Engineering” and is a project of the University of Sheffield in the United Kingdom. GATE has a very large number of components, most of which have no bearing upon the present invention. One embodiment of the current invention utilizes a small subset of GATE components—a Serial Analyzer (called the “ANNIE Serial Analyzer”) 320, a Document ofSentences 330, a Tagger (called the “Hepple Tagger”) 340—to extract Sentence + Token Sequence Pairs 360. It is the Sentence + Token Sequence Pairs 360 that are utilized by theDocument Decomposition Function 130. - The set of Sentence + Token Sequence Pairs 360 are produced in GATE as follows: The
Serial Analyzer 320 extracts “Sentences” from aninput Document 260. The “Sentences” do not need to conform to actual sentences in an input text, but often do. The sentences are “aligned” in a stack termed a Document ofSentences 330. Each Sentence in the Document ofSentences 330 is then run through theTagger 340 which assigns to each word in the Sentence a part of speech token. The parts of speech are for the most part the same parts of speech well known to school children, although amongTaggers 340, there is no standard for designating tokens. In the Hepple Tagger, a singular Noun is assigned the token “NN”, an adjective is assigned the token “JJ”, an adverb is assigned the token “RB” and so on. Sometimes, additional parts of speech are created for the benefit of downstream uses. In the described embodiment, theHepple Tagger 340 created part of speech “TO” is an example. The part of speech tokens are maintained in a token sequence which is checked for one-to-one correspondence with the actual words of the sentence upon which the token sequence is based. The Sentence +Token Sequence Pair 760 is then presented to theNode Generation Function 380. - A significant element of the present invention are novel Patterns of Tokens (“Patterns”) 370 and Per-Pattern Token Seeking Behavior Constraints (“Constraints”) 375 which are applied to the Sentence +
Token Sequence Pair 360 within theNode Generation Function 380 to produceNodes 180, wheresuch Nodes 180 are specifically intended to be converted intoNotes 160, where saidNotes 160 conform—with specific exceptions—to notes composed by hand and ad hoc by a human reviewer of theunderlying Document 260, and where the set of saidNotes 160 represents—with specific exceptions—an exhaustive extraction of all knowledge from saidDocument 260. - There are several uses for part of speech patterns and token seeking rules documented in the literature of Information Extraction, the domain with which the current invention is associated, and in the related field of Information Retrieval. Text analysis for the purpose of automated document classification or indexing for search engine-based retrieval is a primary use of part of speech patterns. Part of speech patterns and token seeking rules are used in text analysis to discover keywords, phrases, clauses, sentences, paragraphs, concepts and topics. Although the meanings of keyword, clause, sentence, and paragraph conform to the common understanding of the terms, the meanings of phrase, concept, and topic varies by implementation. Sometimes, the word phrase is defined using its traditional meaning in grammar. In this use, types of phrases include Prepositional Phrases (PP), Noun. Phrases (NP), Verb Phrases (VP), Adjective Phrases, and Adverbial Phrases. For other implementations, the word phrase may be defined as any proper name (for example “New York City”). Most definitions require that a phrase contain multiple words, although at least one definition permits even a single word to be considered a phrase. Some search engine implementations utilize a lexicon (a pre-canned list) of phrases. The WordNet Lexical Database is a common source of phrases. The
Notes 160 generated by the preset invention can not be classified as keywords, phrases, clauses, or sentences (or any larger text unit) using the well known definitions of these terms, except by serendipitous execution of the described functions. - The word concept generally refers to one of two constructs. The first construct is concept as a cluster of related words, similar to a thesaurus, associated with a keyword. In a number of implementations, this cluster is made available to a user—via a Graphic User Interface (GUI) for correction and customization. The user can tailor the cluster of words until the resulting concept is most representative of the user's understanding and intent. The second construct is concept as a localized semantic net of related words around a keyword. Here, a local or public ontology and taxonomy is consulted to create a semantic net around the keyword. Some implementations of concept include images and other non-text elements. Topics in general practice need to be identified or “detected” from a applying a specific set of operations against a body of text. Different methodologies for identification and/or detection of topics have been described in the literature. The
Notes 160 generated by the current invention can not be classified as concepts or topics using the well know definitions of these terms, except by serendipitous execution of the described functions. - In the prior art, necessary use of part of speech pattern examination is applied within the boundaries of an individual text (intralinguistic), to resolve endophoric ambiguity. For example, in the text, “I had a professor who always carried an umbrella. He never opened it even when it rained.”, the second sentence is endophora because it refers to something (the professor) who was mentioned earlier in the text but is not clearly named in the second sentence. Likewise, one “it” in the second sentence refers to “umbrella” in the first sentence. For those applications which require determining what a document “is about”, such use of part of speech patterns is critical. A token seeking rule which might be applied in this case—when processing the second sentence—might be to “go back” to find the noun in the first sentence to which the “He” (or the “it”) in the second sentence applies. The Constraints 375 described herein do not mirror the token seeking rules present in the prior art except in the most abstract of characteristics. The Constraints 375 can not be used to identify keywords, phrases, clauses, sentences, concepts or topics. The Patterns 370 crafted for the present invention can not be used to identify keywords, phrases, clauses, sentences, concepts or topics in the formally accepted structures of instantiations of those terms. Further, the Patterns 370 and Constraints 375 required for the current invention differ from those required for Ser. No. 11/273,568 and Ser. No. 11/314,835. The fundamental difference is that the Pattern 370 and Constraints 375 are designed and intended to produce optimally
correlatable Nodes 180,such Nodes 180 ideally capturing a Relation (value of Bond 184) between the values ofSubject 182 andAttribute 186. The present invention sets no such standard forNode 180 creation, but instead, establishes Patterns 370 and Constraints 375 which can ultimately produceNotes 160 at machine speed. - The two methods of resource decomposition applied in current embodiments of the present invention are word classification and intermediate format. Word classification identifies words as instances of parts of speech (e.g. nouns, verbs, adjectives). Correct word classification often requires a text called a corpus because word classification is dependent upon not what a word is, but how it is used. Although the task of word classification is unique for each human language, all human languages can be decomposed into parts of speech. The human language decomposed by word classification in the preferred embodiment is the English language, and the means of word classification is a natural language parser (NLP) (e.g. GATE, a product of the University of Sheffield, UK). In one embodiment,
- (a) text is input to the NLP;
- (b) the NLP restructures the text into a “document of sentences”;
- (c) for each “sentence”,
-
- (c1) the NLP encodes a sequence of tokens, where each token is a code for the part of speech of the corresponding word in the sentence.
- Where the resource contains at least one formatting, processing, or special character not permitted in plain text, the method is:
- (a) text is input to the NLP;
- (b) the NLP restructures the text into a “document of sentences”;
- (c) for each “sentence”,
-
- (c1) the NLP encodes a sequence of tokens, where each token is a code for the part of speech of the corresponding word in the sentence.
- (c2) characters or words that contain characters not recognizable to the NLP are discarded from both the sentence and the sequence of tokens.
By using this second method, resources containing any English language text may be decomposed into nodes, including resources formatted as: - (i) text (plain text) files.
- (ii) Rich Text Format (RTF) (a standard developed by Microsoft, Inc.). An alternative method is to first obtain clean text from RTF by the intermediate use of a RTF-to-text conversion utility (e.g. RTF-Parser-1.09, a product of Pete Sergeant).
- (iii) Extended Markup Language (XML) (a project of the World Wide Web Consortium) files as described more immediately hereinafter.
- (iv) any dialect of markup language files, including, but not limited to: HyperText Markup Language (HTML) and Extensible HyperText Markup Language (XHTML™) (projects of the World Wide Web Consortium), RuleML (a project of the RuleML Initiative), Standard Generalized Markup Language (SGML) (an international standard), and Extensible Stylesheet Language (XSL) (a project of the World Wide Web Consortium) as described more immediately hereinafter.
- (v) Portable Document Format (PDF) (a proprietary format of Adobe, Inc.) files (by means of the intermediate use of a PDF-to-text conversion utility).
- (vi) MS WORD files e.g. DOC files used to store documents by MS WORD (a word processing software product of Microsoft, Inc.) This embodiment programmatically utilizes a MS Word-to-text parser (e.g. the Apache POI project, a product of Apache.org). The POI project API also permits programmatically invoked text extraction from Microsoft Excel spreadsheet files (XLS). An MS Word file can also be processed by a NLP as a plain text file containing special characters, although XLS files can not.
- (vii) event-information capture log files, including, but not limited to: transaction logs, telephone call records, employee timesheets, and computer system event logs.
- (viii) web pages
- (ix) blog pages
- For decomposition XML files by means of word classification, decomposition is applied only to the English language content enclosed by XML element opening and closing tags with the alternative being that decomposition is applied to the English language content enclosed by XML element opening and closing tags, and any English language tag values of the XML element opening and closing tags. This embodiment is useful in cases of the present invention that seek to harvest metadata label values in conjunction with content and informally propagate those label values into the nodes composed from the element content. In the absence of this capability, this embodiment relies upon the XML file being processed by a NLP as a plain text file containing special characters. Any dialect of markup language files, including, but not limited to: HyperText Markup Language (HTML) and Extensible HyperText Markup Language (XHTML™) (projects of the World Wide Web Consortium), RuleML (a project of the RuleML Initiative), Standard Generalized Markup Language (SGML) (an international standard), and Extensible Stylesheet Language (XSL) (a project of the World Wide Web Consortium) is processed in essentially identical fashion by the referenced embodiment.
- Email messages and email message attachments are decomposed using word classification in a preferred embodiment of the present invention. As described earlier, the same programmatically invoked utilities used to access and search email repositories on individual computers and servers are directed to the extraction of English language text from email message and email attachment files. Depending upon how “clean” the resulting extracted English language text can be made, the NLP used by the present invention will process the extracted text as plain text or plain text containing special characters. Email attachments are decomposed as described earlier for each respective file format.
- Decomposition by means of word classification being only one of two methods for decomposition supported by the present invention, the other means of decomposition is decomposition of the information from a resource using an intermediate format. The intermediate format is a first term or phrase paired with a second term or phrase. In a preferred embodiment, the first term or phrase has a relation to the second term or phrase. That relation is either an implicit relation or an explicit relation, and the relation is defined by a context. In one embodiment, that context is a schema. In another embodiment, the context is a tree graph. In a third embodiment, that context is a directed graph (also called a digraph). In these embodiments, the context is supplied by the resource from which the pair of terms or phrases was extracted. In other embodiments, the context is supplied by an external resource. In accordance with one embodiment of the present invention, where the relation is an explicit relation defined by a context, that relation is named by that context.
- In an example embodiment, the context is a schema, and the resource is a Relational Database (RDB). The relation from the first term or phrase to the second term or phrase is an implicit relation, and that implicit relation is defined in an RDB. The decomposition method supplies the relation with the pair of concepts or terms, thereby creating a node. The first term is a phrase, meaning that it has more than one part (e.g. two words, a word and a numeric value, three words), and the second term is a phrase, meaning that it has more than one part (e.g. two words, a word and a numeric value, three words).
- The decomposition function takes as input the RDB schema. The method includes:
- (A) A first phase, where
-
- (a) the first term or phrase is the database name, and the second term or phrase is a database table name. Example: database name is “ACCOUNTING”, and database table name is “Invoice”;
- (b) The relation (e.g. “has”) between the first term or phrase (“ACCOUNTING”) and the second term or phrase (“Invoice”) is recognized as implicit due to the semantics of the RDB schema;
- (c) A node is produced (“Accounting—has—Invoice”) by supplying the relation (“has”) between the pair of concepts or terms;
- (d) For each table in the RDB, the steps (a) fixed as the database name ,(b) fixed as the relation, (c) where the individual table names are iteratively used, produce a node; and
- (B) A second phase, where
-
- (a) the first term or phrase is the database table name, and the second term or phrase is the database table column name. Example: database table name is “Invoice” and column name is “Amount Due”;
- (b) The relation (e.g. “has”) between the first temi or phrase (“Invoice”) and the second term or phrase (“Amount Due”) is recognized as implicit due to the semantics of the RDB schema;
- (c) A node is produced (“Invoice—has—Amount Due”) by supplying the relation (“has”) between the pair of concepts or terms;
- (d) For each column in the database table, the steps (a) fixed as the database table name, (b) fixed as the relation, (c) where the individual column names are iteratively used, produce a node;
- (e) For each table in the RDB, step (d) is followed, with the steps (a) where the database table names are iteratively used, (b) fixed as the relation, (c) where the individual column names are iteratively used, produce a node;
In this embodiment, the entire schema of the RDB is decomposed, and because of the implicit relationship being immediately known by the semantics of the RDB, the entire schema of the RDB can be composed into nodes without additional processing of the intermediate format pair of concepts or terms.
- In another embodiment, the decomposition function takes as input the RDB schema plus at least two values from a row in the table. The method includes
-
- (a) the first term or phrase is a compound term, with
- (b) the first part of the compound term being the database table column name which is the name of the “key” column of the table (for example for table “Invoice”, the key column is “Invoice No”), and
- (c) the second part of the compound term being the value for the key column from the first row of the table (for example, for the “Invoice” table column “Invoice No.” the row 1 value of “Invoice No.” is “500024”, the row being called the “current row”,
- (d) the third part of the compound is the column name of a second column in the table (example “Status”),
- (e) resulting in the first term or phrase being “Invoice No. 500024 Status”;
- (f) the second term or phrase is the value from second column, current row Example: second column name is “Status”, value of row 1 is “Overdue”;
- (g) The relation (e.g. “is”) between the first term or phrase (“Invoice No. 500024 Status”) and the second term or phrase (“Overdue”) is recognized as implicit due to the semantics of the RDB schema;
- (h) A node is produced (“Invoice No. 500024 Status—is—Overdue”) by supplying the relation (“is”) between the pair of concepts or terms;
- (i) For each row in the table, the steps (b) fixed as the key column name, (c) varying with each row, (d) fixed as name of second column, (f) varying with the value in the second column for each row, with (g) the fixed relation (“is”), produces a node (h);
- (j) For each column in the table, step (i) is run;
- (k) For each table in the database, step (j) is run;
- The entire contents of the RDB can be decomposed, and because of the implicit relationship being immediately known by the semantics of the RDB, the entire contents of the RDB can be composed into nodes without additional processing of the intermediate format pair of terms or phrases.
- Where the context is a tree graph, and the resource is a taxonomy, the relation from the first term or phrase to the second term or phrase is an implicit relation, and that implicit relation is defined in a taxonomy.
- The decomposition function will capture all the hierarchical relations in the taxonomy. The decomposition method is a graph traversal function, meaning that the method will visit every vertex of the taxonomy graph. In a tree graph, a vertex (except for the root) can have only one parent, but many siblings and many children. The method includes:
-
- (a) Starting from the root vertex of the graph,
- (b) visit a vertex (called the current vertex);
- (c) If a child vertex to the current vertex exists;
- (d) The value of the child vertex is the first term or phrase (example “mammal”);
- (e) The value of the current vertex is the second term or phrase (example “living organism”);
- (f) The relation (e.g. “is”) between the first term or phrase (child vertex value) and the second term or phrase (parent vertex value) is recognized as implicit due to the semantics of the taxonomy;
- (g) A node is produced (“mammal—is—living organism”) by supplying the relation (“is”) between the pair of concepts or terms;
- (h) For each vertex in the taxonomy graph, the steps of (b), (c), (d), (e), (f), (g) are executed;
- The parent/child relations of entire taxonomy tree can be decomposed, and because of the implicit relationship being immediately known by the semantics of the taxonomy, the entire contents of the taxonomy can be composed into nodes without additional processing of the intermediate format pair of concepts or terms.
- In another embodiment, the decomposition function will capture all the sibling relations in the taxonomy. The method includes:
-
- (a) Starting from the root vertex of the graph,
- (b) visit a vertex (called the current vertex);
- (c) If more than one child vertex to the current vertex exists;
- (d) using a left-to-right frame of reference;
- (e) The value of the first child vertex is the first term or phrase (example “humans”);
- (f) The value of the closest sibling (proximal) vertex is the second term or phrase (example “apes”);
- (g) The relation (e.g. “related”) between the first term or phrase (first child vertex value) and the second term or phrase (other child vertex value) is recognized as implicit due to the semantics (i.e. sibling relation) of the taxonomy;
- (h) A node is produced (“humans—related—apes”) by supplying the relation (“related”) between the pair of concepts or terms;
- (i) For each other child (beyond the first child) vertex of the current vertex, the steps of (e), (f), (g), (h) are executed;
- (j) For each vertex in the taxonomy graph, the steps of (b), (c), (d), (i) are executed;
- All sibling relations in the entire taxonomy tree can be decomposed, and because of the implicit relationship being immediately known by the semantics of the taxonomy, the entire contents of the taxonomy can be composed into nodes without additional processing of the intermediate format pair of terms or phrases.
- Where the context is a digraph, and the resource is an ontology, the relation from the first term or phrase to the second term or phrase is an explicit relation, and that explicit relation is defined in an ontology.
- The decomposition function will capture all the semantic relations of semantic degree 1 in the ontology. The decomposition method is a graph traversal function, meaning that the method will visit every vertex of the ontology graph. In an ontology graph, semantic relations of degree 1 are represented by all vertices exactly 1 link (“hop”) removed from any given vertex. Each link must be labeled with the relation between the vertices. The method includes:
-
- (a) Starting from the root vertex of the graph,
- (b) visit a vertex (called the current vertex);
- (c) If a link from the current vertex to another vertex exists;
- (d) Using a clockwise frame of reference;
- (e) The value of the current vertex is the first term or phrase (example “husband”);
- (f) The value of the first linked vertex is the second term or phrase (example “wife”);
- (g) The relation (e.g. “spouse”) between the first term or phrase (current vertex value) and the second term or phrase (linked vertex value) is explicitly provided due to the semantics of the ontology;
- (h) A node is produced (“husband—spouse—wife”) (meaning formally that “there exists a husband who has a spouse relation with a wife”) by supplying the relation (“spouse”) between the pair of terms or phrases;
- (i) For each vertex in the taxonomy graph, the steps of (b), (c), (d), (e), (f), (g), (h) are executed;
- The degree one relations of entire ontology tree can be decomposed, and because of the explicit relationship being immediately known by the labeled relation semantics of the ontology, the entire contents of the ontology can be composed into nodes without additional processing of the intermediate format pair of terms or phrases.
- A node is comprised of parts. The node parts can hold data types including, but not limited to text, numbers, mathematical symbols, logical symbols, URLs, URIs, and data objects. The node data structure is sufficient to independently convey meaning, and is able to independently convey meaning because the node data structure contains a relation. The relation manifest by the node is directional, meaning that the relationships between the relata may be uni-directional or bi-directional. A uni-directional relationship exists in only a single direction, allowing a traversal from one part to another but no traversal in the reverse direction. A bi-directional relationship allows traversal in both directions.
- A node is a data structure comprised of three parts in one preferred embodiment, and the three parts contain the relation and two relata. The arrangement of the parts is:
-
- (a) the first part contains the first relatum;
- (b) the second part contains the relation;
- (c) the third part contains the second relatum;
The naming of the parts is: - (a) the first part, containing the first relatum, is called the subject;
- (b) the second part, containing the relation, is called the bond;
- (c) the third part, containing the second relatum, is called the attribute;
- In another preferred embodiment, a node is a data structure and is comprised of four parts. The four parts contain the relation, two relata, and a source. One of the four parts is a source, and the source contains a URL or URI identifying the resource from which the node was extracted. In an alternative embodiment, the source contains a URL or URI identifying an external resource which provides a context for the relation contained in the node. In these embodiments, the four parts contain the relation, two relata, and a source, and the arrangement of the parts is:
-
- (a) the first part contains the first relatum;
- (b) the second part contains the relation;.
- (c) the third part contains the second relatum;
- (d) the fourth part contains the source;
The naming of the parts is: - (a) the first part, containing the first relatum, is called the subject;
- (b) the second part, containing the relation, is called the bond;
- (c) the third part, containing the second relatum, is called the attribute;
- (d) the fourth part, containing the source, is called the sequence;
- The generation of nodes 180A, 180B is achieved using the products of decomposition by a natural language processor (NLP) 410, including at least one sentence of words and a sequence of tokens where the sentence and the sequence must have a one-to-one correspondence 415. All nodes 180A, 180B that match at least one syntactical pattern 420 can be constructed. The method is:
-
- (a) A syntactical pattern 420 of tokens is selected (example: <noun><preposition><noun>);
- (b) Moving from left to right;
- (c) The sequence of tokens is searched for the center token (<preposition>) of the pattern;
- (d) If the correct token (<preposition>) is located in the token sequence;
- (e) The <preposition> token is called the current token;
- (f) The token to the left of the current token (called the left token) is examined;
- (g) If the left token does not match the pattern,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <preposition> token is located;
- d. or the end of the sequence of tokens is encountered;
- (h) if the left token does match the pattern,
- (i) the token to the right of the current token (called the right token) is examined;
- (j) If the right token does not match the pattern,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <preposition> token is located;
- d. or the end of the sequence of tokens is encountered;
- (k) if the right token matches the pattern,
- (l) a node 180A, 180B is created;
- (m) using the words from the word list that correspond to the <noun><preposition><noun> pattern, example “action regarding inflation”;
- (n) searching of the sequence of tokens is continued from the current token position;
- (o) until a next matching <preposition> token is located;
- (p) or the end of the sequence of tokens is encountered;
- Steps (a)-(l) represent an example of a per pattern token seeking behavior constraint 375 n of
FIG. 3 . - The generation of nodes is achieved using the products of decomposition by a natural language processor (NIT), including at least one sentence of words and a sequence of tokens where the sentence and the sequence must have a one-to-one correspondence. All nodes that match at least one syntactical pattern can be constructed. The method is:
-
- (q) A syntactical pattern of tokens is selected (example: <noun><preposition><noun>);
- (r) Moving from left to right;
- (s) The sequence of tokens is searched for the center token (<preposition>) of the pattern;
- (t) If the correct token (<preposition>) is located in the token sequence;
- (u) The <preposition> token is called the current token;
- (v) The token to the left of the current token (called the left token) is examined;
- (w) If the left token does not match the pattern,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <preposition> token is located;
- d. or the end of the sequence of tokens is encountered;
- (x) if the left token does match the pattern,
- (y) the token to the right of the current token (called the right token) is examined;
- (z) If the right token does not match the pattern,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <preposition> token is located;
- d. or the end of the sequence of tokens is encountered;
- (aa) if the right token matches the pattern,
- (bb) a node is created;
- (cc) using the words from the word list that correspond to the <noun><preposition><noun> pattern, example “prince among men”;
- (dd) searching of the sequence of tokens is continued from the current token position;
- (ee) until a next matching <preposition> token is located;
- (ff) or the end of the sequence of tokens is encountered;
- Steps (r)-(bb) represent another example of a per pattern token seeking behavior constraint 375 of
FIG. 3 . - The per pattern token seeking behavior constraints are not necessarily those normally associated with the semantic patterns of a language.
- A preferred embodiment of the present invention is directed to the generation of nodes using all sentences which are products of decomposition of a resource. The method includes an inserted step (q) which executes steps (a) through (p) for all sentences generated by the decomposition function of an NLP.
- Nodes can be constructed using more than one pattern. The method is:
-
- (1) The inserted step (a1) is preparation of a list of patterns. Such a list of patterns is shown at item 370 of
FIG. 3 . This list can start with two patterns and extend to essentially all patterns usable in making a node, and include but are not limited to:- (i) <noun><verb><noun> example: “man bites dog”,
- (ii) <noun><adverb><verb> example: “horse quickly runs”,
- (iii) <verb><adjective><noun> example: “join big company”,
- (iv) <adjective><noun><noun> example: “silent night song”,
- (v) <noun><preposition><noun> example: “voters around country”;
- (2) The inserted step (p1) where steps (a) through (p) are executed for each pattern in the list of patterns;
- (1) The inserted step (a1) is preparation of a list of patterns. Such a list of patterns is shown at item 370 of
- In an improved approach, nodes are constructed using more than one pattern, and the method for constructing nodes uses a sorted list of patterns. In this embodiment,
- The inserted step (a2) sorts the list of patterns by the center token, then left token then right token (example: <adjective> before <noun> before <preposition>), meaning that the search order for the set of patterns (i) through (v) would become (iii)(ii)(iv)(v)(i), and that patterns with the same center token would become a group.
-
- (b)(c)Each sequence of tokens is searched for the first center token in the pattern list i.e. <adjective>
- (d) If the correct token (<adjective>) is located in the token sequence;
- (e) The located <adjective> token is called the current token;
- (e1) Using the current token,
- (e2) Each pattern in the list with the same center token (i.e. each member of the group in the pattern list) is compared to the right token, current token, and left token in the sequence at the point of the current token;
- (e3) For each group in the search list, steps (b) through (e2) are executed;
- (q) steps (b) through (e3) are executed for all sentences decomposed from the resource;
- Additional interesting nodes can be extracted from a sequence of tokens using patterns of only two tokens. The method searches for the right token in the patterns, and the bond value of constructed nodes is supplied by the node constructor. In another variation, the bond value is determined by testing the singular or plural form of the subject (corresponding to the left token) value. In this embodiment,
-
- (a) The pattern is <noun><adjective>;
- (b) Moving from left to right;
- (c) The sequence of tokens is searched for the token <adjective>;
- (d) If the correct token (<adjective>) is located in the token sequence;
- (e) The <adjective> token is called the current token;
- (f) The token to the left of the current token (called the left token) is examined;
- (g) If the left token does not match the pattern (<noun>),
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <adjective> token is located;
- d. or the end of the sequence of tokens is encountered;
- (h) if the left token does match the pattern,
- (i) a node is created;
- (j) using the words from the word list that correspond to the <noun><adjective>pattern, example “mountain big”;
- (k) the subject value of the node (corresponding to the <noun> position in the pattern) is tested for singular or plural form
- (l) a bond value for the node is inserted based upon the test (example “is” “are”)
- (m) resulting in the node “mountain is big”
- (n) searching of the sequence of tokens is continued from the current token position;
- (o) until a next matching <adjective> token is located;
- (p) or the end of the sequence of tokens is encountered;
- (q) steps (a) through (p) are executed for all sentences decomposed from the resource;
- Using a specific pattern of three tokens, the method for constructing nodes searches for the left token in the patterns, the bond value of constructed nodes is supplied by the node constructor, and the bond value is determined by testing the singular or plural form of the subject (corresponding to the left token) value. In this embodiment,
-
- (a) The pattern is <adjective><noun><noun>;
- (b) Moving from left to right;
- (c) The sequence of tokens is searched for the token <adjective>;
- (d) If the correct token (<adjective>) is located in the token sequence;
- (e) The <adjective> token is called the current token;
- (f) The token to the right of the current token (called the center token) is examined;
- (g) If the center token does not match the pattern (<noun>),
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <adjective> token is located;
- d. or the end of the sequence of tokens is encountered;
- (h) if the center token does match the pattern,
- (i) The token to the right of the center token (called the right token) is examined;
- (j) If the right token does not match the pattern (<noun>),
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <adjective> token is located;
- d. or the end of the sequence of tokens is encountered;
- (k) if the center token does match the pattern,
- (l) a node is created;
- (m) using the words from the word list that correspond to the <adjective><noun><noun> pattern, example “silent night song”;
- (n) the attribute value of the node (corresponding to the right token <noun> position in the pattern) is tested for singular or plural form
- (o) a bond value for the node is inserted based upon the test (example “is” “are”)
- (p) resulting in the node “silent night is song”
- (q) searching of the sequence of tokens is continued from the current token position;
- (r) until a next matching <adjective> token is located;
- (s) or the end of the sequence of tokens is encountered;
- (t) steps (a) through (s) are executed for all sentences decomposed from the resource;
- Nodes are constructed using patterns where the left token is promoted to a left pattern containing two or more tokens, the center token is promoted to a center pattern containing no more than two tokens, and the right token is promoted to a right pattern containing two or more tokens. By promoting left, center, and right tokens to patterns, more complex and sophisticated nodes can be generated. In this embodiment, the NLP's use of the token “TO” to represent the literal “to” can be exploited. For example,
-
- (i) <adjective><noun><verb><adjective><noun> “large contributions fight world hunger”,
- (ii) <noun><TO><verb><noun> “legislature to consider bill”,
- (iii) <noun><adverb><verb><adjective><noun> “people quickly read local news”
For example, using <noun><TO><verb><noun> “legislature to consider bill”, - (a) Separate lists of patterns for left pattern, center pattern, and right pattern are created and referenced;
- (b) The leftmost token from the center pattern is used as the search
- (c) If the correct token (<TO>) is located in the token sequence;
- (d) The <TO> token is called the current token;
- (e) The token to the right of the current token (called the right token in the context of the center patterns) is examined;
- (f) If the token does not match any center pattern right token,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <TO> token is located;
- d. or the end of the sequence of tokens is encountered;
- (g) if the right token does match the pattern of the center pattern (<TO><verb>),
- (h) the token to the left of the current token (called the right token in the context of the left patterns) is examined;
- (i) If the right token does not match any left pattern right token,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <TO> token is located;
- d. or the end of the sequence of tokens is encountered;
- (j) if the right token matches the pattern,
- (k) The token to the right of the current token (called the right token in the context of the center patterns) becomes the current token;
- (l) The token to the right of the current token (called the left token in the context of the right patterns) is examined;
- (m) If the token does not match any right pattern left token,
- a. the attempt is considered a failure;
- b. searching of the sequence of tokens is continued from the current token position;
- c. until a next matching <TO> token is located;
- d. or the end of the sequence of tokens is encountered;
- (n) if the left token does match the pattern of the right pattern (<noun>),
- (o) a node is created;
- (p) using the words from the word list that correspond to the <noun><TO><verb><noun> “legislature to consider bill”,
- (q) searching of the sequence of tokens is continued from the current token position;
- (r) until a next matching <preposition> token is located;
- (s) or the end of the sequence of tokens is encountered.
- Under certain conditions, it is desirable to filter out certain possible node constructions. Those filters include, but are not limited to:
-
- (i) All words in subject, bond, and attribute are capitalized;
- (ii) Subject, bond, or attribute start or end with a hyphen or an apostrophe;
- (iii) Subject, bond, or attribute have a hyphen plus space (“-”) or space plus hyphen (“-”) or hyphen plus hyphen (“-”) embedded in any of their respective values;
- (iv) Subject, bond, or attribute contain sequences greater than length three (3) of the same character (ex: “FFFF”);
- (v) Subject, bond, or attribute contain a multi-word value where the first word or the last word of the multi-word value is only a single character (ex: “a big”);
- (vi) Subject and attribute are singular or plural forms of each other;
- (vii) Subject and attribute are identical or have each other's value embedded (ex: “dog” “sees” “big dog”);
- (viii) Subject, bond, or attribute respectively contain two identical words (ex: “Texas Texas” “is” “state”);
- Where the nodes are comprised of four parts, the fourth part contains a URL or URI of the resource from which the node was extracted. In this embodiment, in addition to the sentence (sequence of words and corresponding sequence of tokens), the URL or URI from which the sentence was extracted is passed to the node generation function. For every node created from the sentence by the node generation function, the URL or URI is loaded into the fourth part, called the
Sequence 186, of the node data structure. - Where the four part nodes are generated using the RDB decomposition function, the RDB decomposition function will place in the fourth (sequence) part of the node the URL or URI of the RDB resource from which the node was extracted, typically, the URL by which the RDB decomposition function itself created a connection to the database. An example using the Java language Enterprise version, using a well known RDBMS called MySQL and a database called “mydb”: “jdbc:mysql://localhost/mydb”. If the RDBMS is a Microsoft Access database, the URL might be the file path, for example: “c:\anydatabase.mdb”. This embodiment is constrained to those RDBMS implementations where the URL for the RDB is accessible to the RDB decomposition function. Note that the URL of a database resource is usually not sufficient to programmatically access the resource.
-
FIG. 4 illustrates the operation of the node to note conversion function ofFIG. 1 in accordance with one aspect of the invention. TheNote Conversion Function 163 is simply illustrated inFIG. 4 . The products of theDecomposition Function 130 areNodes 180. Anexample Node 180 is given. Theexample Node 180 is composed of three parts. The first part of theexample Node 180 is a Subject 182, which contains the value “GOLD”. The second part of theexample Node 180 is aBond 184, which contains the value “IS”. The third part of theexample Node 180 is anAttribute 186, which contains the value “STANDARD”. The Note Conversion Function extracts the value from the Subject 182 (“GOLD”), converts it to text if the value is not already in text form, and places the text in the leftmost position of theNote 160, which is, in this embodiment a text data object. TheNote Conversion Program 163 then concatenates a space character to the current rightmost character of theNote 160 text value. The Note Conversion Function then extracts the value from the Bond 184 (“IS”), converts it to text if the value is not already in text form, and places the text in the leftmost position of theNote 160. TheNote Conversion Program 163 then concatenates a space character to the current rightmost character of theNote 160 text value. The Note Conversion Function then extracts the value from the Attribute 186 (“STANDARD”), converts it to text if the value is not already in text form, and places the text in the leftmost position of theNote 160. TheConversion 163 of theNode 180 into aNote 160 is then complete, and theNote 160 is placed in theNote Container 168. -
FIG. 5 is a flow chart of the functionality ofNote Taking Program 170. In one embodiment, aUser 305 clicks on theNotes Icon 410 to Start. TheNote Taking Program 170 will first check that aDocument 260 is displayed in theProgram 270 e.g., an Internet Browser program. If aDocument 260 is in fact displayed, theNote Taking Program 170 will invoke theDocument Decomposition Function 130. As is illustrated inFIG. 3 , theDecomposition Function 130 will createNodes 180, from which theNote Conversion Function 163 will createNotes 160. Referring again toFIG. 5 , theNote Conversion Function 163 will then place in Memory 220 aNote Container 168 with allNotes 160 that have been created. TheNote Taking Function 170 will fetch theNote Container 168 fromMemory 220, render aNote Selection Window 176 on theDisplay 210, render theControls 181 on theDisplay 210, and populate theNote Selection Window 176 withNotes 160 rendered for display. Then theNote Taking Program 170 will enable allControls 181 which bind to all Notes (as opposed to Selected Notes). When theUser 305 selects on of the enabled functions and activates theControl 181, theNote Taking Program 170 executes the selected function and Ends. Alternately, if theUser 305 selectsNotes 160 from theNote Selection Window 176, theNote Taking Program 170 will enable theControls 181 that operate on selected Notes only. Alternatively, if there is noDocument 260 displayed by theProgram 270, theNote Taking Program 270 will check the default directory onHard Disk 190 forextant Note Container 168 files. If such files exist, the Note Taking Program will prompt theUser 305 to select aNote Container 168 file. The Note Taking Program will retrieve theNote Container 168 fromHard Disk 190 and render theNote Selection Window 176, theControls 181, and theNotes 160 on theDisplay 210 for further interactive interface with theUser 305. -
FIG. 6 illustrates a software architecture preferable used for the computer generation of notes.FIG. 6 is a representation of howDocuments 260, whether residing on aPersonal Computer 200, inPersonal Computer Memory 220, on PersonalComputer Hard Disk 190, on Personal ComputerRemovable Media 250 or on aNetwork Server 350, can be presented to aUser 305 using the present invention. Also shown are the components of thePersonal Computer 200 used in the process, includingMain Memory 220,Display 210,Hard Disk 190, andRemovable Media Drive 250. Finally, the use ofHard Disk 190 and Removable Media to permanently store (persist) theNotes 160 contained in theNote Container 168 is illustrated. -
FIG. 7 is a block diagram of a hardware architecture of a personal computer used in carrying out the invention.FIG. 7 is an illustration of the internal components of a typical laptop or desktop personal computer 700. Programs 770 and data are stored onHard Disk 190 or Removable Media Drive 750, and are placed into Main Memory 720 via the System Bus 730. User interface and results are rendered on the Display 710. Documents 760 may be stored onHard Disk 190 or Removable Media read by a Removable Media Drive 750, and placed in Main Memory where the Documents 760 and their content can be manipulated by Computer Program 770, of which one embodiment of the present invention is an example, as is an Internet Browser such as Internet Explorer, a product of Microsoft, Inc. -
FIG. 8 is a block diagram showing use of the note taking functionality in a networked environment.FIG. 8 is an illustration of a Personal Computer 700 connected to NetworkServers 850. The connections are throughCommunication Links 860. The types of connections that can be made include connection via aBroadband Network 810, which can directly connect to aNetwork Server 850 or can connect to aNetwork Server 850 through theInternet 840. Alternatively, a Personal Computer 700 can be connected to aNetwork Server 850 viaWireless Access 820 to theInternet 840. Also illustrated is connection of a Personal Computer 700 to aNetwork Server 850 via dial-upModem 830 access to theInternet 840. Documents 760 can be stored on aNetwork Server 850. Upon request by a User 805 using a Software Program 770 operating on a Personal Computer 700, Documents 760 can be retrieved from aNetwork Server 850 and transmitted overCommunication Links 860 to the Personal Computer 700 for use in Software Program 770 such as that which is one embodiment of the present invention. -
FIG. 9 is an illustration of an exemplary screen view of a notes selection window and related control buttons in accordance with one aspect of the invention. - A
note selection window 176 is shown associated with two savebuttons save selection button 181 A. Whenbutton 181 A is activated, the items that were identified for saving are stored on a hard disk, for examplehard disk 190 using thesave function 182 ofFIG. 1 . If it is desirable to save all of the notes that have been generated, the save all button, 181 B can be selected. - In one embodiment, associated with
FIG. 10A , the Nodes 180B generated by theDocument Decomposition Function 130 are composed of four parts, the fourth part of such Nodes 180B containing bibliographic information. With reference to FIG. 1C of Ser. No. 11/273,568, the fourth part of such Nodes 180B is referred to as a Sequence or Source 188. The type of bibliographic information that may be captured in the fourth part of such Nodes 180B will vary depending upon the application programming interfaces (API) extent for each type ofDocument 260 and each type ofComputer Program 270 used to display theDocument 260. At minimum, the bibliographic information captured in the fourth part of said Node 180B will include the URL or URI of theDocument 260. In other embodiments, the title, author, publication date of theDocument 260 may be captured in the fourth part of said Node 180B. In further embodiments, the chapter, page, paragraph or line of theDocument 260 where the text which served as the basis for creation of the Node 180B will be captured in the fourth part of said Node 180B. As previously described herein and in Ser. No. 11/273,568 and Ser. No. 11/314,835,Nodes 180 which are acquired from aDocument 260 by theDocument Decomposition Function 130 are not clipped or cut and pasted from the text of aDocument 260. Rather,Nodes 180 may be said to be associated with a location in the text of aDocument 260, that location being the location in the text corresponding to the location in the Sentence + Token Sequence Pair 760 where the first token of a Pattern 770 was found by the Constraint 775 as it operated upon the Sentence + Token Sequence Pair 760 and was successfully able to complete the generation of aNode 180. Where the type ofDocument 260 andComputer Program 270 permit, that location will be captured in the fourth, Sequence 188 part of the Node 180B. Referring toFIG. 10A , note 160B made from a four-part Node 180B is composed of two parts, aNote Content part 161, and aNote Source part 162. In one embodiment, in addition to theNote Content 161, the bibliographic material in theNote Source 162 also can be displayed in theNote Selection Window 176, and subsequently printed or emailed. - As noted above, there is specific exception to the conformity of
Notes 160 constructed by the current invention to notes constructed by hand and ad hoc by a human reviewer of thesame Document 260. That exception is for quotations—that is, text passages found inDocuments 260 delimited by a single pair of complementary quotation marks. - In the case of quotations, where strictly accurate representation of a written or spoken text is required, one embodiment the current invention excludes quotations found in text from the default Tagger 740 algorithm. Instead, the Tagger 740 will, when encountering either an open or a close quotation marks character, utilize a created part of speech token, “QS” for a open quotation and “QT” for a closed quotation, to delimit the quotation in the Token Sequence. Subsequently, the Node Generation Function 780, when processing the Sentence + Token Sequence Pair 760 will use a special Constraint 775 when a “QS” token is encountered. The Constraint 775 will then seek the following complementary closed quotation mark “QT” token. All text referenced by tokens between the complementary quotation tokens is moved into a temporary memory buffer. If no closed quotation mark token is found, no further special action will be taken by the Node Generation Function 780. If a complementary closed quotation token is found, the Node Generation Function 780 will construct a two
part Quotation Node 1010, as shown inFIG. 10B , theQuotation Node 1010 having a first part called theQuote 1013 and theQuotation Node 1010 having a second part called the Sequence orSource 1088. TheQuote 1013 part of theQuotation Node 1010 holds the entire quoted text and theSequence 1088 part holding bibliographic information. For aNote 160B made from aQuotation Node 1010, the entire quoted text will be placed in theNote Content 161, and the available bibliographic information will be placed in theNote Source 162. - In another embodiment, the
User 305 can elect to not respect quotations, in which case quoted text will be processed by the Tagger 740 and the Node Generation Function 780, as is other text in theDocument 260. In one embodiment, theUser 305, can elect to respect quotations, but not to preserve quotations inQuotation Nodes 1010. Using this method, when a open quotation token is encountered by the Node Generation Function 780 quotation token delimited words and tokens from the Sentence + Token Sequence Pair 760 will be processed intoNodes 180 by the Node Generation Function 780 independently of the other words and tokens in the Sentence + Token Sequence Pair 760. - While various embodiments of the present invention have been illustrated herein in detail, it should be apparent that modifications and adaptations to those embodiments may occur to those skilled in the art without departing from the scope of the present invention.
Claims (21)
1. Apparatus for generating notes of content from an information resource, comprising:
a. a decomposition element for decomposing textual information from said information resource into information nodes;
b. a note conversion element for converting nodes into notes; and
c. a storage element for storing said notes.
2. The apparatus of claim 1 in which said textual information is provided by an extraction element for separating textual information from said information resource from other information.
3. The apparatus of claim 1 , in which said decomposition element comprises a serial analyzer producing a document of sentences.
4. The apparatus of claim 3 , in which a tagger element associates each word of a sentence of said document of sentences with a token representing a syntactic role of said word forming a sequence of token-word pairs for each sentence.
5. The apparatus of claim 4 further comprising a node generation element which compares the sequence of token-word pairs of a sentence with a set of syntactical patterns specified for a language to produce a set of nodes.
6. The apparatus of claim 5 in which the sets of syntactical patterns includes patterns beyond the patterns utilized to interpret the language.
7. The apparatus of claim 5 in which the node generation element searches the sequence of token-word pairs in accordance with a per pattern token seeking behavioral constraint.
8. The apparatus of claim 5 , in which the node generation element searches the sequence of token-word pairs for token patterns, the elements of which are not adjacent in the sequence of token-word pairs.
9. The apparatus of claim 8 , in which the token patterns may include elements in which the elements of the token patterns are selected from token-word pairs that are separated by greater than one token-word pair of said sequence of token-word pairs.
10. The apparatus of claim 5 , in which the node generation element enforces constraints on certain token patterns.
11. The apparatus of claim 5 , in which certain nodes are eliminated from the set of nodes by post generation node filters.
12. The apparatus of claim 1 , in which the note conversion element converts the format of nodes into a format that more nearly represents a natural language statement.
13. The apparatus of claim 1 further comprising a display element for displaying notes from said storage element.
14. The apparatus of claim 13 , in which the display element allows for selective storage of notes as well as storage of all notes.
15. The apparatus of claim 1 , in which the information resource is connected to said apparatus over a network.
16. The apparatus of claim 15 , in which the network is an Internet.
17. A method for generating notes of content from an information resource, comprising the steps of:
a. decomposing textual information from said information resource into information nodes;
b. converting nodes into notes; and
c. storing said notes.
18. The method of claim 17 further comprising the step of separating textual information from said information resource from other information.
19. The method of claim 17 , further comprising the step of analyzing said textual information to produce a document of sentences.
20. The method of claim 19 , further comprising the step of associating each word of a sentence of said document of sentences with a token representing a syntactic role of said word forming a sequence of token-word pairs for each sentence.
21-27. (canceled)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/964,960 US20170147666A9 (en) | 2005-11-14 | 2015-12-10 | Techniques for creating computer generated notes |
US15/944,686 US11113304B2 (en) | 2005-11-14 | 2018-04-03 | Techniques for creating computer generated notes |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/273,568 US8108389B2 (en) | 2004-11-12 | 2005-11-14 | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US11/314,835 US8126890B2 (en) | 2004-12-21 | 2005-12-21 | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US80449506P | 2006-06-12 | 2006-06-12 | |
US11/761,839 US8024653B2 (en) | 2005-11-14 | 2007-06-12 | Techniques for creating computer generated notes |
US13/225,638 US9213689B2 (en) | 2005-11-14 | 2011-09-06 | Techniques for creating computer generated notes |
US14/964,960 US20170147666A9 (en) | 2005-11-14 | 2015-12-10 | Techniques for creating computer generated notes |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/314,835 Continuation-In-Part US8126890B2 (en) | 2004-11-12 | 2005-12-21 | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US13/225,638 Continuation US9213689B2 (en) | 2005-11-14 | 2011-09-06 | Techniques for creating computer generated notes |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/944,686 Continuation US11113304B2 (en) | 2005-11-14 | 2018-04-03 | Techniques for creating computer generated notes |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160092528A1 true US20160092528A1 (en) | 2016-03-31 |
US20170147666A9 US20170147666A9 (en) | 2017-05-25 |
Family
ID=46328869
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/761,839 Active 2028-03-01 US8024653B2 (en) | 2005-11-14 | 2007-06-12 | Techniques for creating computer generated notes |
US13/225,638 Active 2028-12-23 US9213689B2 (en) | 2005-11-14 | 2011-09-06 | Techniques for creating computer generated notes |
US14/964,960 Abandoned US20170147666A9 (en) | 2005-11-14 | 2015-12-10 | Techniques for creating computer generated notes |
US15/944,686 Active 2026-09-18 US11113304B2 (en) | 2005-11-14 | 2018-04-03 | Techniques for creating computer generated notes |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/761,839 Active 2028-03-01 US8024653B2 (en) | 2005-11-14 | 2007-06-12 | Techniques for creating computer generated notes |
US13/225,638 Active 2028-12-23 US9213689B2 (en) | 2005-11-14 | 2011-09-06 | Techniques for creating computer generated notes |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/944,686 Active 2026-09-18 US11113304B2 (en) | 2005-11-14 | 2018-04-03 | Techniques for creating computer generated notes |
Country Status (1)
Country | Link |
---|---|
US (4) | US8024653B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180276684A1 (en) * | 2017-03-23 | 2018-09-27 | International Business Machines Corporation | Real-time pattern matching of database transactions and unstructured text |
US20190156223A1 (en) * | 2017-06-22 | 2019-05-23 | International Business Machines Corporation | Relation extraction using co-training with distant supervision |
US10984032B2 (en) | 2017-06-22 | 2021-04-20 | International Business Machines Corporation | Relation extraction using co-training with distant supervision |
Families Citing this family (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8108389B2 (en) | 2004-11-12 | 2012-01-31 | Make Sence, Inc. | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US8126890B2 (en) * | 2004-12-21 | 2012-02-28 | Make Sence, Inc. | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US9330175B2 (en) | 2004-11-12 | 2016-05-03 | Make Sence, Inc. | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US8898134B2 (en) | 2005-06-27 | 2014-11-25 | Make Sence, Inc. | Method for ranking resources using node pool |
US8140559B2 (en) * | 2005-06-27 | 2012-03-20 | Make Sence, Inc. | Knowledge correlation search engine |
US20110087670A1 (en) * | 2008-08-05 | 2011-04-14 | Gregory Jorstad | Systems and methods for concept mapping |
US20140142920A1 (en) * | 2008-08-13 | 2014-05-22 | International Business Machines Corporation | Method and apparatus for Utilizing Structural Information in Semi-Structured Documents to Generate Candidates for Question Answering Systems |
US8321204B2 (en) * | 2008-08-26 | 2012-11-27 | Saraansh Software Solutions Pvt. Ltd. | Automatic lexicon generation system for detection of suspicious e-mails from a mail archive |
CA2726729C (en) * | 2008-10-03 | 2017-01-24 | Benefitfocus.Com, Inc. | Systems and methods for automatic creation of agent-based systems |
DE102009053585A1 (en) * | 2008-11-17 | 2010-05-20 | Conject Ag | System for automatically creating task list from records in multiple documents of project discussion in construction industry, has CPU generating entry in database during determining code word or character string in code word format |
US9135249B2 (en) * | 2009-05-29 | 2015-09-15 | Xerox Corporation | Number sequences detection systems and methods |
US8554542B2 (en) * | 2010-05-05 | 2013-10-08 | Xerox Corporation | Textual entailment method for linking text of an abstract to text in the main body of a document |
US8572760B2 (en) | 2010-08-10 | 2013-10-29 | Benefitfocus.Com, Inc. | Systems and methods for secure agent information |
WO2012159657A1 (en) * | 2011-05-20 | 2012-11-29 | Hewlett-Packard Development Company Lp | Data sharing agreements |
US20130013616A1 (en) * | 2011-07-08 | 2013-01-10 | Jochen Lothar Leidner | Systems and Methods for Natural Language Searching of Structured Data |
US8949212B1 (en) * | 2011-07-08 | 2015-02-03 | Hariharan Dhandapani | Location-based informaton display |
KR20140138943A (en) * | 2012-03-29 | 2014-12-04 | 가부시키가이샤 구라레 | Nonwoven fiber sheet, method for producing same, and filter |
US9268765B1 (en) | 2012-07-30 | 2016-02-23 | Weongozi Inc. | Systems, methods and computer program products for neurolinguistic text analysis |
US8914419B2 (en) | 2012-10-30 | 2014-12-16 | International Business Machines Corporation | Extracting semantic relationships from table structures in electronic documents |
US10289653B2 (en) | 2013-03-15 | 2019-05-14 | International Business Machines Corporation | Adapting tabular data for narration |
EP2973025A1 (en) | 2013-03-15 | 2016-01-20 | Mark, Bobick | Method for resource decomposition and related devices |
JP6441895B2 (en) * | 2013-04-02 | 2018-12-19 | スリーエム イノベイティブ プロパティズ カンパニー | System and method for managing notes |
US10127196B2 (en) | 2013-04-02 | 2018-11-13 | 3M Innovative Properties Company | Systems and methods for managing notes |
EP2981932B1 (en) | 2013-04-02 | 2018-11-14 | 3M Innovative Properties Company | Systems and methods for note recognition |
US9164977B2 (en) | 2013-06-24 | 2015-10-20 | International Business Machines Corporation | Error correction in tables using discovered functional dependencies |
US9600461B2 (en) | 2013-07-01 | 2017-03-21 | International Business Machines Corporation | Discovering relationships in tabular data |
WO2015006273A1 (en) | 2013-07-09 | 2015-01-15 | 3M Innovative Properties Company | Systems and methods for note content extraction and management by segmenting notes |
US9607039B2 (en) | 2013-07-18 | 2017-03-28 | International Business Machines Corporation | Subject-matter analysis of tabular data |
IN2013MU03242A (en) * | 2013-11-15 | 2015-07-31 | Tata Consultancy Services Ltd | |
US9274693B2 (en) | 2013-10-16 | 2016-03-01 | 3M Innovative Properties Company | Editing digital notes representing physical notes |
EP3058512B1 (en) | 2013-10-16 | 2022-06-01 | 3M Innovative Properties Company | Organizing digital notes on a user interface |
US9047509B2 (en) | 2013-10-16 | 2015-06-02 | 3M Innovative Properties Company | Note recognition and association based on grouping indicators |
EP3058513B1 (en) | 2013-10-16 | 2021-05-19 | 3M Innovative Properties Company | Multi-color channel detection for note recognition and management |
TWI653571B (en) | 2013-10-16 | 2019-03-11 | 3M新設資產公司 | Method for processing digital notes, computer system, non-transitory computer readable medium and computing device |
US9412174B2 (en) | 2013-10-16 | 2016-08-09 | 3M Innovative Properties Company | Note recognition for overlapping physical notes |
US9830314B2 (en) | 2013-11-18 | 2017-11-28 | International Business Machines Corporation | Error correction in tables using a question and answer system |
US9292186B2 (en) | 2014-01-31 | 2016-03-22 | 3M Innovative Properties Company | Note capture and recognition with manual assist |
US9477760B2 (en) * | 2014-02-12 | 2016-10-25 | Facebook, Inc. | Query construction on online social networks |
US9286290B2 (en) | 2014-04-25 | 2016-03-15 | International Business Machines Corporation | Producing insight information from tables using natural language processing |
US9910644B2 (en) * | 2015-03-03 | 2018-03-06 | Microsoft Technology Licensing, Llc | Integrated note-taking functionality for computing system entities |
US10095740B2 (en) | 2015-08-25 | 2018-10-09 | International Business Machines Corporation | Selective fact generation from table data in a cognitive system |
CN107291931B (en) * | 2017-06-30 | 2020-08-18 | 珠海格力电器股份有限公司 | Note generation method and device and user terminal |
US10776137B2 (en) * | 2018-11-21 | 2020-09-15 | International Business Machines Corporation | Decluttering a computer device desktop |
US11640379B2 (en) * | 2020-01-02 | 2023-05-02 | Kyndryl, Inc. | Metadata decomposition for graph transformation |
US11443119B2 (en) * | 2020-04-28 | 2022-09-13 | International Business Machines Corporation | Adapting dialog models by relevance value for concepts to complete a task |
CN112257404A (en) * | 2020-09-22 | 2021-01-22 | 陕西烽火电子股份有限公司 | QT5 software-based automatic generation method and generation device for requirement specification document |
Family Cites Families (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US32740A (en) | 1861-07-09 | Island | ||
DE3446286A1 (en) | 1984-12-19 | 1986-06-19 | Sigri GmbH, 8901 Meitingen | METHOD FOR COATING CARBON AND GRAPHITE BODIES |
US4930077A (en) | 1987-04-06 | 1990-05-29 | Fan David P | Information processing expert system for text analysis and predicting public opinion based information available to the public |
JPH04252375A (en) | 1991-01-28 | 1992-09-08 | Nippon Telegr & Teleph Corp <Ntt> | Information providing method |
US5632480A (en) | 1994-11-14 | 1997-05-27 | Huffy Corporation | Basketball goal support having removable ballast and continuously adjustable pole |
US5432118A (en) | 1994-06-28 | 1995-07-11 | Motorola, Inc. | Process for forming field isolation |
JP2855409B2 (en) * | 1994-11-17 | 1999-02-10 | 日本アイ・ビー・エム株式会社 | Natural language processing method and system |
US5684985A (en) | 1994-12-15 | 1997-11-04 | Ufil Unified Data Technologies Ltd. | Method and apparatus utilizing bond identifiers executed upon accessing of an endo-dynamic information node (EDIN) |
GB2297179B (en) | 1995-01-17 | 1997-01-08 | Nippon Telegraph & Telephone | Information navigation system using clusterized information resource topology |
US5963940A (en) | 1995-08-16 | 1999-10-05 | Syracuse University | Natural language information retrieval system and method |
JP3981170B2 (en) | 1996-10-22 | 2007-09-26 | 富士通株式会社 | Information retrieval device |
US6505150B2 (en) * | 1997-07-02 | 2003-01-07 | Xerox Corporation | Article and method of automatically filtering information retrieval results using test genre |
US6529934B1 (en) | 1998-05-06 | 2003-03-04 | Kabushiki Kaisha Toshiba | Information processing system and method for same |
JP2002514798A (en) | 1998-05-07 | 2002-05-21 | サムスン エレクトロニクス カンパニー リミテッド | Method and system for device-to-device command and control in a network |
US6141010A (en) | 1998-07-17 | 2000-10-31 | B. E. Technology, Llc | Computer interface method and apparatus with targeted advertising |
GB9821969D0 (en) | 1998-10-08 | 1998-12-02 | Canon Kk | Apparatus and method for processing natural language |
WO2000054168A2 (en) * | 1999-03-05 | 2000-09-14 | Canon Kabushiki Kaisha | Database annotation and retrieval |
US6836768B1 (en) | 1999-04-27 | 2004-12-28 | Surfnotes | Method and apparatus for improved information representation |
JP2001043221A (en) | 1999-07-29 | 2001-02-16 | Matsushita Electric Ind Co Ltd | Chinese word dividing device |
US6278987B1 (en) | 1999-07-30 | 2001-08-21 | Unisys Corporation | Data processing method for a semiotic decision making system used for responding to natural language queries and other purposes |
US6615253B1 (en) | 1999-08-31 | 2003-09-02 | Accenture Llp | Efficient server side data retrieval for execution of client side applications |
US20030050927A1 (en) * | 2001-09-07 | 2003-03-13 | Araha, Inc. | System and method for location, understanding and assimilation of digital documents through abstract indicia |
CA2360571A1 (en) | 1999-11-16 | 2001-05-25 | 01,Inc. | Method and system for executing financial transactions via a communication medium |
JP4320491B2 (en) * | 1999-11-18 | 2009-08-26 | ソニー株式会社 | Document processing system, terminal device, document providing device, document processing method, recording medium |
US6366907B1 (en) | 1999-12-15 | 2002-04-02 | Napster, Inc. | Real-time search engine |
WO2001067280A2 (en) | 2000-03-08 | 2001-09-13 | Accenture Llp | Method for a knowledge model |
US6941513B2 (en) * | 2000-06-15 | 2005-09-06 | Cognisphere, Inc. | System and method for text structuring and text generation |
AU2001275845A1 (en) * | 2000-06-26 | 2002-01-08 | Onerealm Inc. | Method and apparatus for normalizing and converting structured content |
US8396859B2 (en) | 2000-06-26 | 2013-03-12 | Oracle International Corporation | Subject matter context search engine |
US7865358B2 (en) * | 2000-06-26 | 2011-01-04 | Oracle International Corporation | Multi-user functionality for converting data from a first form to a second form |
US6778986B1 (en) | 2000-07-31 | 2004-08-17 | Eliyon Technologies Corporation | Computer method and apparatus for determining site type of a web site |
US6766320B1 (en) | 2000-08-24 | 2004-07-20 | Microsoft Corporation | Search engine with natural language-based robust parsing for user query and relevance feedback learning |
US20020152202A1 (en) | 2000-08-30 | 2002-10-17 | Perro David J. | Method and system for retrieving information using natural language queries |
US20030154266A1 (en) | 2000-09-01 | 2003-08-14 | Mark Bobick | Server system and method for discovering digital assets in enterprise information systems |
US20020059220A1 (en) | 2000-10-16 | 2002-05-16 | Little Edwin Colby | Intelligent computerized search engine |
US20020083170A1 (en) | 2000-10-26 | 2002-06-27 | Metilinx | System-wide optimization integration model |
US8176563B2 (en) * | 2000-11-13 | 2012-05-08 | DigitalDoors, Inc. | Data security system and method with editor |
US20030028564A1 (en) | 2000-12-19 | 2003-02-06 | Lingomotors, Inc. | Natural language method and system for matching and ranking documents in terms of semantic relatedness |
US7644057B2 (en) * | 2001-01-03 | 2010-01-05 | International Business Machines Corporation | System and method for electronic communication management |
EP1225517B1 (en) | 2001-01-17 | 2006-05-17 | International Business Machines Corporation | System and methods for computer based searching for relevant texts |
US20040030741A1 (en) | 2001-04-02 | 2004-02-12 | Wolton Richard Ernest | Method and apparatus for search, visual navigation, analysis and retrieval of information from networks with remote notification and content delivery |
IL142421A0 (en) * | 2001-04-03 | 2002-03-10 | Linguistic Agents Ltd | Linguistic agent system |
US6654740B2 (en) | 2001-05-08 | 2003-11-25 | Sunflare Co., Ltd. | Probabilistic information retrieval based on differential latent semantic space |
US6633742B1 (en) | 2001-05-15 | 2003-10-14 | Siemens Medical Solutions Usa, Inc. | System and method for adaptive knowledge access and presentation |
US7191115B2 (en) * | 2001-06-20 | 2007-03-13 | Microsoft Corporation | Statistical method and apparatus for learning translation relationships among words |
WO2003012576A2 (en) | 2001-07-27 | 2003-02-13 | Quigo Technologies Inc. | System and method for automated tracking and analysis of document usage |
US7284191B2 (en) | 2001-08-13 | 2007-10-16 | Xerox Corporation | Meta-document management system with document identifiers |
US7526425B2 (en) | 2001-08-14 | 2009-04-28 | Evri Inc. | Method and system for extending keyword searching to syntactically and semantically annotated data |
JP4045399B2 (en) * | 2001-08-24 | 2008-02-13 | 富士ゼロックス株式会社 | Structured document management apparatus and structured document management method |
TW551518U (en) * | 2001-09-07 | 2003-09-01 | Wistron Corp | Electronic equipment having dual-way fastened apparatus |
NO316480B1 (en) | 2001-11-15 | 2004-01-26 | Forinnova As | Method and system for textual examination and discovery |
US7072883B2 (en) | 2001-12-21 | 2006-07-04 | Ut-Battelle Llc | System for gathering and summarizing internet information |
US6978264B2 (en) | 2002-01-03 | 2005-12-20 | Microsoft Corporation | System and method for performing a search and a browse on a query |
US20050154690A1 (en) | 2002-02-04 | 2005-07-14 | Celestar Lexico-Sciences, Inc | Document knowledge management apparatus and method |
JP2003228580A (en) | 2002-02-04 | 2003-08-15 | Celestar Lexico-Sciences Inc | Controller and method for controlling document knowledge, program, and recording medium |
US7257530B2 (en) | 2002-02-27 | 2007-08-14 | Hongfeng Yin | Method and system of knowledge based search engine using text mining |
US7249117B2 (en) | 2002-05-22 | 2007-07-24 | Estes Timothy W | Knowledge discovery agent system and method |
JP3960530B2 (en) | 2002-06-19 | 2007-08-15 | 株式会社日立製作所 | Text mining program, method and apparatus |
US7277879B2 (en) | 2002-12-17 | 2007-10-02 | Electronic Data Systems Corporation | Concept navigation in data storage systems |
US20040123233A1 (en) * | 2002-12-23 | 2004-06-24 | Cleary Daniel Joseph | System and method for automatic tagging of ducuments |
US7174507B2 (en) | 2003-02-10 | 2007-02-06 | Kaidara S.A. | System method and computer program product for obtaining structured data from text |
JP4001283B2 (en) * | 2003-02-12 | 2007-10-31 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Morphological analyzer and natural language processor |
US7730407B2 (en) | 2003-02-28 | 2010-06-01 | Fuji Xerox Co., Ltd. | Systems and methods for bookmarking live and recorded multimedia documents |
JP2004280488A (en) * | 2003-03-17 | 2004-10-07 | Hitachi Ltd | Documents management method, and documents management device |
US20040193520A1 (en) * | 2003-03-27 | 2004-09-30 | Lacomb Christina | Automated understanding and decomposition of table-structured electronic documents |
US20040194009A1 (en) * | 2003-03-27 | 2004-09-30 | Lacomb Christina | Automated understanding, extraction and structured reformatting of information in electronic files |
JP2004310691A (en) * | 2003-04-10 | 2004-11-04 | Mitsubishi Electric Corp | Text information processor |
JP4252375B2 (en) | 2003-06-24 | 2009-04-08 | 株式会社生産日本社 | Bag body with occlusion device with divided openings |
GB2406399A (en) | 2003-09-23 | 2005-03-30 | Ibm | Seaching within a computer network by entering a search term and optional URI into a web browser |
TWI369616B (en) | 2004-02-27 | 2012-08-01 | Eplus Capital Inc | System and method for user creation and direction of a rich-content life-cycle |
JP4242794B2 (en) | 2004-03-10 | 2009-03-25 | 日本電信電話株式会社 | Metadata generation device |
US20050251513A1 (en) | 2004-04-05 | 2005-11-10 | Rene Tenazas | Techniques for correlated searching through disparate data and content repositories |
US20050246358A1 (en) | 2004-04-29 | 2005-11-03 | Gross John N | System & method of identifying and predicting innovation dissemination |
US7809548B2 (en) * | 2004-06-14 | 2010-10-05 | University Of North Texas | Graph-based ranking algorithms for text processing |
US7275049B2 (en) | 2004-06-16 | 2007-09-25 | The Boeing Company | Method for speech-based data retrieval on portable devices |
WO2006038924A2 (en) | 2004-06-18 | 2006-04-13 | Sap Ag | Consistent set of interfaces derived from a business object model |
US20060062470A1 (en) | 2004-09-22 | 2006-03-23 | Microsoft Corporation | Graphical user interface for expression recognition |
US8126890B2 (en) | 2004-12-21 | 2012-02-28 | Make Sence, Inc. | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US8108389B2 (en) | 2004-11-12 | 2012-01-31 | Make Sence, Inc. | Techniques for knowledge discovery by constructing knowledge correlations using concepts or terms |
US20060136295A1 (en) | 2004-11-23 | 2006-06-22 | Mark Bobick | Techniques for magazine like presentation of advertisment using computers |
US7447683B2 (en) | 2005-03-31 | 2008-11-04 | Jiles, Inc. | Natural language based search engine and methods of use therefor |
US20060242130A1 (en) | 2005-04-23 | 2006-10-26 | Clenova, Llc | Information retrieval using conjunctive search and link discovery |
US8140559B2 (en) | 2005-06-27 | 2012-03-20 | Make Sence, Inc. | Knowledge correlation search engine |
US8775224B2 (en) | 2006-01-04 | 2014-07-08 | International Business Machines Corporation | Method and apparatus for dynamic specification of a business value by a discovered resource |
US20070192319A1 (en) | 2006-01-27 | 2007-08-16 | William Derek Finley | Search engine application with ranking of results based on correlated data pertaining to the searcher |
-
2007
- 2007-06-12 US US11/761,839 patent/US8024653B2/en active Active
-
2011
- 2011-09-06 US US13/225,638 patent/US9213689B2/en active Active
-
2015
- 2015-12-10 US US14/964,960 patent/US20170147666A9/en not_active Abandoned
-
2018
- 2018-04-03 US US15/944,686 patent/US11113304B2/en active Active
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180276684A1 (en) * | 2017-03-23 | 2018-09-27 | International Business Machines Corporation | Real-time pattern matching of database transactions and unstructured text |
US10552847B2 (en) | 2017-03-23 | 2020-02-04 | International Business Machines Corporation | Real-time pattern matching of database transactions and unstructured text |
US10565597B2 (en) * | 2017-03-23 | 2020-02-18 | International Business Machines Corporation | Real-time pattern matching of database transactions and unstructured text |
US20190156223A1 (en) * | 2017-06-22 | 2019-05-23 | International Business Machines Corporation | Relation extraction using co-training with distant supervision |
US10902326B2 (en) * | 2017-06-22 | 2021-01-26 | International Business Machines Corporation | Relation extraction using co-training with distant supervision |
US10984032B2 (en) | 2017-06-22 | 2021-04-20 | International Business Machines Corporation | Relation extraction using co-training with distant supervision |
Also Published As
Publication number | Publication date |
---|---|
US9213689B2 (en) | 2015-12-15 |
US20120004905A1 (en) | 2012-01-05 |
US20190079983A1 (en) | 2019-03-14 |
US20080021701A1 (en) | 2008-01-24 |
US8024653B2 (en) | 2011-09-20 |
US11113304B2 (en) | 2021-09-07 |
US20170147666A9 (en) | 2017-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11113304B2 (en) | Techniques for creating computer generated notes | |
Laender et al. | DEByE–data extraction by example | |
McEnery et al. | Corpus linguistics: Method, theory and practice | |
US7509572B1 (en) | Automatic generation of document summaries through use of structured text | |
CN100576201C (en) | Be used for from the method and the electronic data processing system of natural language text exploitation body | |
US20090070327A1 (en) | Method for automatically generating regular expressions for relaxed matching of text patterns | |
Collard et al. | Supporting document and data views of source code | |
Baykara et al. | Abstractive text summarization and new large-scale datasets for agglutinative languages Turkish and Hungarian | |
Feinerer | A text mining framework in R and its applications | |
Sateli et al. | Automatic construction of a semantic knowledge base from CEUR workshop proceedings | |
Bolasco et al. | Automatic dictionary-and rule-based systems for extracting information from text | |
WO2008153566A1 (en) | Techniques for creating computer generated notes | |
JP2948159B2 (en) | Database device | |
Kovriguina et al. | Metadata extraction from conference proceedings using template-based approach | |
JP2997469B2 (en) | Natural language understanding method and information retrieval device | |
Litvin et al. | A New Approach to Automatic Ontology Generation from the Natural Language Texts with Complex Inflection Structures in the Dialogue Systems Development | |
Muniz et al. | Taming the Tiger Topic: An XCES Compliant Corpus Portal to Generate Subcorpora Based on Automatic Text-Topic Identification | |
Kásler et al. | Framework for semi automatically generating topic maps | |
EP2035962A1 (en) | Techniques for creating computer generated notes | |
Valkeapää et al. | An adaptable framework for ontology-based content creation on the semantic web. | |
Alrehaili et al. | Discovering Qur’anic Knowledge through AQD: Arabic Qur’anic Database, a Multiple Resources Annotation-level Search | |
US20240028630A1 (en) | Comprehension engine to comprehend contents of selected documents | |
WO2001024053A2 (en) | System and method for automatic context creation for electronic documents | |
Petraki et al. | Automated thesaurus population and management | |
Speck et al. | On extracting relations using distributional semantics and a tree generalization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |