Next Article in Journal
Assessing Green Approaches and Digital Marketing Strategies for Twin Transition via Fermatean Fuzzy SWARA-COPRAS
Next Article in Special Issue
Goodness-of-Fit Test for the Bivariate Hermite Distribution
Previous Article in Journal
A Modified Generalized Analytic Feynman Integral Associated with the Bounded Linear Operator
Previous Article in Special Issue
New Financial Ratios Based on the Compositional Data Methodology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Technology Opportunity Analysis Based on Machine Learning

1
Institute of Machine Learning and Big Data, Korea University, Seoul 02841, Republic of Korea
2
Department of Big Data Statistics, Cheongju University, Cheongju 28503, Republic of Korea
3
Institute of Engineering Research, Korea University, Seoul 02841, Republic of Korea
*
Authors to whom correspondence should be addressed.
Axioms 2022, 11(12), 708; https://doi.org/10.3390/axioms11120708
Submission received: 17 October 2022 / Revised: 28 November 2022 / Accepted: 3 December 2022 / Published: 8 December 2022
(This article belongs to the Special Issue Statistical Methods and Applications)

Abstract

:
The sustainable growth of a company requires a differentiated research and development strategy through the discovery of technology opportunities. However, previous studies fell short of the need for utilizing outlier keywords, based on approaches from various perspectives, to discover technology opportunities. In this study, a technology opportunity discovery method utilizing outlier keywords is proposed. First, the collected patent data are divided into several subsets, and outlier keywords are derived using the W2V and LOF. The derived keywords are clustered through the K-means algorithm. Finally, the similarity between the clusters is evaluated to determine the cluster with the most similarity as a potential technology. In this study, 5679 cases of unmanned aerial vehicle (UAV) patent data were utilized, from which three technology opportunities were derived: UAV defense technology, UAV charging station technology, and UAV measurement precision improvement technology. The proposed method will contribute to discovering differentiated technology fields in advance using technologies with semantic differences and outlier keywords, in which the meaning of words is considered through W2V application.
MSC:
62H25; 62P99; 63H30; 68T50

1. Introduction

The development of differentiated core technology through continuous research and development (R&D) is essential for increased market competitiveness and the growth of a company. In R&D, the potential for technological progress is defined as a technology opportunity, the swift discovery and preemption of which are crucial [1,2]. The technology opportunity analysis (TOA) can facilitate strategic decisions on technology for decision makers and managers. Porter and Detampel (1995) previously proposed a TOA approach through a monitoring framework based on bibliometric analysis to discover differentiated technology opportunities [1]. Meanwhile, many studies have recently been conducted using intellectual property data to discover technology opportunities [3,4,5,6,7,8,9,10]. For example, Yoon and Park (2005) proposed a method to apply a morphology analysis to patents to identify technology opportunities [3]. In the proposed method, an analysis is performed by deriving keywords through text mining and by constructing a form matrix based on the keywords representing the characteristics of technology. Ma et al. (2013) proposed a TOA framework with an R&D analysis–competitor analysis–market analysis linking [4]. The proposed method extracts technical components through text mining and expert opinions and derives technology opportunities by comprehensively considering technology trends, secured national patent ratio by technology, and applicant ratio by technology. Lee et al. (2015) presented a patent map for the technology opportunity analysis [5]. They created a morphological patent context through text mining and morphological analysis and described a method for discovering novel patents by utilizing a local outlier factor (LOF) algorithm. Furthermore, they introduced a patent identification map, which visualized patents using citations and the number of claims. Further, Song et al. (2017) proposed another method for discovering technology opportunities [6]. The concept of the proposed method is to find new technology opportunities through benchmarking by finding and presenting technologies with properties similar to the target technology through text mining for F-term, a Japanese patent classification system. Yoon and Magee (2018) proposed a patent map based on generative topographic mapping for technology opportunity discovery, and finally a TOA methodology through link prediction [7]. In the proposed method, keywords were extracted from patents to create GTM. Previous studies were typically based on the text-mining technique, deriving significant keywords for analysis. Ultimately, there is a risk of keywords with important meaning being removed from the analysis target owing to their low frequency, which may result in difficulties in discovering new opportunities. In other words, in statistical analysis, an outlier affects the result and needs to be removed. However, from a data mining point of view, outliers can be viewed as data that can provide new information. Therefore, the aim of this study is to introduce a method of utilizing outlier keywords from the viewpoint of discovering technology opportunities.
The proposed method is as follows. The collected patent data are divided into n subsets, and text is extracted from each set. The data are refined through text preprocessing, such as removing unnecessary stopwords and punctuation marks from the extracted text data and integrating uppercase and lowercase letters. The refined data are converted into word embeddings through Word2Vec (W2V), and t-SNE is used to represent word vectors in a low-dimensional space. The LOF algorithm is applied to distinguish outlier keywords from keywords expressed in a low-dimensional space. The LOF calculated for each keyword that deviates from the interquartile range (IQR) is selected as an outlier keyword, and the selected keywords are clustered by utilizing the K-means algorithm to generate a technology cluster. Finally, a cluster with many similar clusters is defined as a potential technology with potential for development through similarity analysis between clusters.
The major characteristics of the method for technology opportunity discovery using outlier keywords proposed in this study are as follows. First, the collected data were divided into subsets, and each subset was analyzed according to the proposed method, as well as the similarity between the derived clusters in the last step. Thus, technologies with many similar clusters were selected as potential technologies to reduce the possibility of selecting the wrong technology. Second, the analysis was attempted considering the similarity of technology words. This approach may provide more useful information for analysts in deriving technical differentiation by considering the context.
Acronyms used in this paper are summarized in Table A1 (Appendix A). The remainder of this paper is organized as follows. Section 2 introduces the patent analysis with respect to technology management, as well as the machine-learning algorithm regarding W2V and the LOF. Section 3 introduces our study process in detail. Next, the results of the research are given in Section 4. Finally, the conclusions of this work and future work are presented in Section 5.

2. Background

2.1. Importance of Patent in Technology Management

In technology management, identifying technology trends and preparing in advance is crucial. For this purpose, research on intellectual property analytics (IPA) that analyzes patent big data through artificial intelligence has recently been conducted [11]. IPA is a technique that discovers information such as patterns or trends from intellectual property data for decision making. Ernst (2003) stated that technology management comprises management of technology creation, technology storage, and use of technical knowledge and that the functions of protection and information provision in patents correspond to this construction [12]. The applicant applies for a patent, and it is registered; they acquire the exclusive rights for the invention. Though they can protect their own invention, the drawback is that the content of the invention is disclosed. Nevertheless, the advantage is that the invention is protected and can be used rightfully by the owner only. Therefore, many researchers and inventors apply for a patent. These unique characteristics of patents are sufficient for supporting Ernst’s claim. Patents that provide information and protect inventions can also be considered technical documents. A patent document includes both structured and unstructured parts, which can be divided into (a) bibliographic information on technology, and (b) unstructured data related to technology [8]. This specificity of patents is applied to the following research fields in technology management: (a) discovery of promising technologies, (b) search for vacant technologies, (c) technology prediction, (d) analysis of technology trends, and (e) technology opportunity analysis [13,14]. Grzegorczyk and Glowinski (2020) introduced the concept of patent management strategy through literature review to secure sustainable technological competitiveness of companies in a fiercely competitive environment [15]. They conducted a literature review to divide patent management strategies into three categories: offensive patent strategy, defensive patent strategy, and leveraging patent strategy. Moreover, they emphasized that patent management is essential as competition becomes more intense in the high-tech field, while there is a general lack of related research.

2.2. Word2Vec

Words need to be vectorized for information processing using natural language, such as in text classification, sentiment analysis, and machine translation. Count-based representation is a method of vectorizing words by utilizing word frequency, term frequency–inverse document frequency (TF–IDF) score, and bag of words. Despite its wide applications, this method is disadvantageous in that it cannot reflect the position or meaning of words [16]. Word embedding is a method that can overcome the problems present in the count-based representation method, and the representative model is W2V, proposed by Mikolov et al. (2013) [17]. Two types of architectures were proposed for W2V as shown in Figure 1: the continuous bag-of-words (CBOW) model and continuous skip-gram model.
The CBOW model uses a continuous distributed representation of the context. This model is characterized by predicting the current word (center word) in context. In particular, given the context, the missing word is predicted according to the window size. By comparison, the continuous skip-gram model, which is similar to CBOW, strives to maximize the classification of words based on other words in the same sentence. Because a word having low relevance to the current word is located farther than a related word, less weights are assigned to the farther-located words than nearby words by a smaller number of samples for the corresponding word.

2.3. Local Outlier Factor

The LOF algorithm, proposed by Breunig et al. (2000), is a density-based anomaly detection technique [18]. Outliers refer to data that deviate from the normal pattern among the observed data [19,20].
The mechanism for calculating LOF using the LOF algorithm is as follows. First, the distance to the k-th nearest neighbor excluding itself (p) is calculated, where the parameter k is a positive integer. As the k increases, more objects with similar reachability distances are included in the same neighborhood. The reachability distance is selected as a maximum among its k-distance of o or Euclidian distance between objects p and o, as represented in Equation (1).
R e a c h a b i l i t y   d i s t a n c e k ( p , o ) = m a x { k   d i s t a n c e   o f   o ,   d ( p , o ) }
Thus, if there are many other objects near object p, k-distance of o and d(p, o) are similar, but if there are few or no other objects around object p, d(p, o) then k-distance of o will be large.
Local reachability distance (lrd) means density around the object p. Therefore, lrd is represented as shown in Equation (2), where N k ( p ) is a set of objects within k-th nearest object for object p.
l r d k ( p ) = ( R e a c h a b i l i t y   d i s t a n c e k ( p , o ) | N k ( p ) | ) 1
Finally, the LOF with respect to the object p, can be calculated through Equation (3), where LOF refers to the average of rations of local reachability distance with respect to the object p and o.
LOF k ( p ) = l r d k ( o ) l r d k ( p ) | N k ( p ) |
As shown in Equation (3), LOF ( p ) is the average of the ratio of the local reachability density of p to the local reachability density of neighbor o. Thus, inliers have approximately 1, and outliers have values far from 1. Figure 2 shows the cases for object p as an inlier and outlier.
LOF is often utilized for identifying novelty [5,9,21]. Lee et al. (2015) used LOF for identifying the novelty of patents [5]. Moreover, Jeon et al. (2022) aimed to apply LOF to a document vectorized through doc2vec to determine the novelty of a patent and further proposed a novelty score [21]. Further, Choi et al. (2022) proposed an approach using a language model and LOF for business opportunity analysis [9]. The present study utilizes the abovementioned values for discovering outlier keywords with novelty to discover technology opportunities.

3. Methodology

3.1. Introduce to Methodology

The proposed methodology—the technology opportunity analysis based on machine learning—is described in this section. Figure 3 shows the concept for the designed methodology and Figure 4 shows our research process.
(Step 1) Collecting the patent data of specific technology:
-
Collecting the data of the drone technology field from the patent database;
-
Randomly splitting the patent dataset into subsets.
(Step 2) Splitting the patent dataset into subsets and representing the words in vector space:
-
Creating the corpus;
-
Cleaning the text data using text preprocessing technique, for example, removing punctuation, stopwords, and numbers;
-
Constructing the document-term matrix (DTM);
-
Applying DTM to W2V words represented in vector space;
-
Reducing the dimensionality from high-dimensional to two-dimensional using t-SNE algorithm.
(Step 3) Modeling for detecting the outlier keyword using LOF:
-
Estimating the anomaly score using the LOF technique;
-
Extracting the outlier keywords using IQR for each subset.
(Step 4) Clustering outlier keywords using the K-means algorithm:
-
Checking the elbow point from 1 to 10 and selecting the optimal k for each subset;
-
Clustering outlier keywords for each subset.
-
(Step 5) Similarity analysis and discovering the technology opportunity:
-
Analyzing the similarity between clusters;
-
Identifying the technology opportunity through results of similarity analysis and establishing the R&D strategy.

3.2. Collecting the Data—Patent Data Related to UAV

The purpose of the present study is to propose a method to find important technical information from outliers based on the scientific method so that it can be used in R&D strategy establishment. In this study, we intended to discover technology opportunities by applying the proposed method to the unmanned aerial vehicle (UAV) technology field, which is a representative high-tech field. Patent data were employed to apply the proposed method. A patent is a technical document. Therefore, in this work, we used patent data to explain the proposed method. Table 1 presents the information for collected patents.
For our study, we collected patents on UAV-related technology from WISDOMAIN, which is a patent database provider. The collected patent data included 5679 patents applied in the US during 2000–2021. A patent includes various types of information, such as the title, abstract, and claims. In this study, the main subject of analysis was the text. Therefore, text information from patents, titles, abstracts, and claims were used.

3.3. Data Preprcessing

In this stage, the text data were cleaned to conclude the precise analysis result. The patent document is written grammar, spelling, and well expression. However, as mentioned above, several sentences include unimportant information, such as punctuation, numbers, and stopwords. A stopword denotes a word that is not necessary for analysis, for example, “I”, “by”, and “to.” They do not affect the result, cannot positively influence the result of the analysis, and can increase the computation complexity. Therefore, they need to be removed before analysis. In addition, the point of text cleaning is word form. Although words may be synonymous but not the same part of speech, the feature is recognized as another form in text mining. For example, “means” and “mean” have the same meaning; however, because the subject is not the same, they are written in different forms. These add to the problem of sparsity and make analysis difficult. Therefore, to avoid this problem, stemming needs to be used in general. It is effective in text mining, but identifying the meaning only based on stemming is sometimes difficult. Accordingly, a lemma was extracted using WordNet Lemmatizer from the NLTK package of Python in our experiment, and only their nouns were extracted.
After text preprocessing, the words were embedded as vectors using Word2Vec. The W2V hyperparameters are given in Table 2.
The preprocessed text data had high dimensionality. Accordingly, using W2V, they were transformed into 100-dimensional data. Although the dimension was reduced, the representation visuality was insufficient for applying LOF. Therefore, the embedded vectors were represented in 2D space by applying the t-SNE algorithm [22]. Table 3 presents the t-SNE hyperparameters used. The described models were applied to each subset.

3.4. Extracting the Outlier Keywords Using Local Outlier Factor

The aim of this study is to identify the technology opportunity on target technology from outlier keywords using machine learning techniques. The data were processed into an analytic form via the text-preprocessing process described in Section 2. In this study, we attempted to apply the LOF algorithm to determine the outliers. The hyperparameters used to compute the LOF are listed in Table 4.
The LOF can be calculated using the LOF algorithm described in Section 2. In this study, the final outlier keyword was selected by applying IQR Rules to the LOF. The IQR is a range that is a difference between the third quantile Q 3 and the first quantile Q 1 of a dataset. The formula for calculating the IQR is as follows Equation (4):
IQR = Q 3 Q 1
Thus, if the LOF of the keyword is smaller than Q 1 1.5 × IQR or larger than Q 3 + 1.5 × IQR , it is selected as an outlier keyword. The final outlier keyword is extracted using the IQR calculated for each subset.

3.5. Analyzing the Technology Using Clustering Technique

This stage extracts and analyzes the technology information from outlier keywords. To derive the technology opportunity, the K-means clustering algorithm [23,24,25], which is one of the unsupervised machine learning techniques, is applied in the proposed methodology. This algorithm aims to divide a given dataset into a set of k clusters. The algorithm process is shown in Figure 5.
In the first step, the k objects, which is the mean or centroids of a cluster, are placed in vector space randomly. As shown in (2) of Figure 5, each of the remaining objects are assigned to a closet centroid, where the closet is calculated as the Euclidean distance between the centroid and an object as in Equation (5).
dist ( x , c ) = i = 1 n ( x i c ) 2
where c means the centroid of each cluster. Next, the location of centroids is updated and minimizes the within-cluster sum of squares (WCSS) between the object and centroid, continuously. This step is repeated until the centroid is not changed. If the centroid changes no more, the algorithm is stopped. The objective of this algorithm is represented as Equation (6).
argmin S i = 1 k x S i d i s t ( x , c i ) 2
To find the optimal K, the elbow method based on the WCSS is used in our experiment. It is one of the methods for finding the optimal k. According to the k, compute the WCSS, and then choose the k for which it first starts to diminish. This point is considered optimal k.
This algorithm plays a role that helps to identify the technology information from the outlier keyword sets.

3.6. Discovering the Technology Opportunity

The potential technology opportunities are extracted by the k-means algorithm. In order to identify the most important technology opportunities, the proposed methodology uses similarity analysis. The similarity analysis is the simplest and more powerful method to find similarities [23,24]. Equation (7) shows the cosine similarity analysis.
s i m i l a r i t y ( x , y ) = x · y x y
Finally, a similarity analysis between each pair of clusters was conducted to determine a technology cluster with high similarity values as a field with a technology opportunity. A cluster that has a higher similarity average than others is considered a technology opportunity.

4. Experiments and Results

This section describes the experimental process and results. Figure 6 presents the data that were previously collected.
Figure 6 shows the collected data on the number of patent applications, showing a low number of applications from 2000 to 2015. However, a sharp increase in the number of applications is seen from 2016, which reaches the highest in 2018.
In this study, word embedding was performed using W2V, as described in Section 3.2 and 3.3, to represent the words of the collected UAV patent data in word vector space, rather than those that were determined to be outliers because of their relatively low frequency compared to other keywords. A text refinement process proceeds for embedding. Sentences comprise unnecessary symbols, numbers, and punctuation marks in addition to letters. For constructing sentences, there are various forms of words, such as nouns, verbs, and adjectives according to grammar. However, punctuation marks, symbols, general verbs, and modifiers have no significant effect on the analysis. Thus, we utilized WordNet Lemmatizer and part-of-speech tagging (POS tagging) in NLTK to best restore words to their original form and extracted nouns alone. POS tagging, as shown in Figure 7, identifies the parts-of-speech of words in sentences and adds tags.
The t-SNE algorithm was applied to the refined text data to represent the 100-dimensional embedded words in 2D space. Figure 8 shows some keywords of the subset in two dimensions.
The LOF algorithm was applied to calculate the LOF for each word. Table 5 presents the corresponding results. The LOFs of 20,652 words could be obtained from a total of 10 subsets. Table 6 and Figure 9 show the basic statistics for the LOF of each subset.
The IQR was utilized to select the final outlier keyword. Accordingly, a total of 1390 keywords, including duplicates, were determined to be outliers. The keywords extracted from each subset were clustered using the K-means algorithm to identify the technology information indicated by these outliers. In this study, the elbow method was utilized to determine the optimal number of clusters, k. To apply the elbow method, the WCSS is used as a measurement. Figure 10 shows plots to identify the elbow points, and Table 7 presents the optimal number of clusters, k, for each subset.
The results of the elbow points revealed that a total of 38 clusters could be created. Further, a similarity analysis among clusters was conducted to find the hidden technology field. The similarity analysis utilized cosine similarity. The results of the similarity analysis among 38 clusters were presented using a heat map, as shown in Figure 11.
The similarity analysis utilized to determine the similarity among the 38 clusters revealed that the average similarity among clusters 7, 20, and 16 was high. Keywords were identified, and technology definitions were realized for the top three clusters with high average similarity. Table 8 presents the average similarity for each cluster, and Table 9 presents keywords and technology definitions for major clusters.
Clustering outlier keywords using K-means clustering indicated that there were many clusters similar to the clusters in Table 9. The keywords included in the three clusters revealed the following potential technologies: (1) UAV defense technology, (2) UAV charging station technology, and (3) UAV measurement precision improvement technology. Thus, based on the above results, important findings can be identified. First, technologies related to defense, charging, and measurement precision improvement can be determined as technology opportunities in the UAV field, owing to a relative lack of technological development. Second, our method can be applied to actual patent data. In other words, this experiment shows that extracting information is possible from outliers. Therefore, we are able to recognize the important fact that outliers can be usefully utilized.

5. Conclusions and Future Works

In this study, we proposed a method for discovering technology opportunities utilizing outlier keywords. Outliers typically occur because of mismeasured values or abnormal behavior. The anomaly detection aims to discover patterns found in outliers and utilize them as significant information. Previous studies explored technology predictions, promising technology extractions, and a vacant technology search methodology using major keywords. However, the keyword outliers could be attributed with relatively less frequency than that of other keywords, resulting in statistically classified outliers, rather than erroneous entries or abnormal behavior. Thus, there is a need for the cautious removal of outliers in data analysis using keywords because of the high likelihood of a loss of significant information if the outlier is unconditionally excluded from the analysis.
Through this study, we intend to present a method for discovering technology opportunities by utilizing outlier keywords. To validate the proposed methodology, a case study was conducted using UAV patent data, a new technology field. In this study, texts are targeted. Thus, the dataset comprises titles, summaries, and claims from patent documents. The constructed dataset is structured through data cleansing and preprocessing. The structured text data are difficult to analyze as high-dimensional data. Thus, word embedding and dimension reduction are performed using W2V and t-SNE. The LOF algorithm is further applied to find outlier keywords among data expressed in a 2D vector space. The final outlier keywords are selected by applying the IQR method to the anomaly score obtained through the LOF. Finally, clustering is performed by applying the K-means algorithm to derive significant meanings among the selected outlier keywords. The analysis of the UAV patent data collected through the proposed method revealed that the following technologies were potential technologies: (1) UAV defense technology, (2) UAV charging station technology, and (3) UAV measurement precision improvement technology. From the perspective of the technology opportunity, the abovementioned technologies can be interpreted as follows. There may be a relative lack of research on the technology information derived through analysis among other UAV technology studies derived from outliers. Therefore, these technology fields can be considered to have sufficient potential for development.
In this study, we present a methodology to discover technology opportunities based on scientific methods, with the following contributions. In the count-based word representation method, even though the meaning is similar, it is sometimes divided as an outlier due to a difference in frequency, resulting in a difficulty in interpreting the meaning. However, the proposed method utilizes W2V to select outlier keywords. This approach is meaningful in that the positional information of the words is used to semantically divide the main technology and the technology containing outlier keywords. Second, this study is meaningful in that it presents a method that can discover potential technologies with potential for development through outlier keywords from the perspective of technology opportunities. This method will significantly contribute to differentiated technology development strategies. Technological development is also related to changes in time and society. However, the proposed method has a limitation in that it omits and leaves time series factors in the analysis up to the analyst. In addition, this study has a limitation in that it was analyzed with interest only in the contents of the document. Therefore, to promote technology intelligence activities based on scientific methodologies, there is a need to present a method that considers various factors, such as financial, society, and market, in future research, which can consider technological development.

Author Contributions

J.L. (Junseok Lee) conceptualized and designed this research and conducted the experiment as described. S.P. collected the data set for the experiment. J.L. (Juhyun Lee) analyzed the data to show the validity of this paper. In addition, all authors have co-operated with each other in revising the paper. All authors have read and agreed to the published version of the manuscripts.

Funding

This research was supported by the MOTIE (Ministry of Trade, Industry, and Energy) in Korea, under the Human Resource Development Program for Industrial Innovation (Global) (P0017311), supervised by the Korea Institute for Advancement of Technology (KIAT). This work was supported by the National Research Foundation of Korea (NRF) grant, funded by the Korean government (MSIT) (No. NRF-2020R1A2C1005918). This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Education (No. NRF-2022R1I1A1A01069422).

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. List of Acronyms.
Table A1. List of Acronyms.
AcronymsExplanation
W2VWord2Vec
LOFLocal outlier factor
UAVUnmanned aerial vehicle
R&DResearch and Development
TOATechnology opportunity analysis
GTMGenerative topology mapping
IQRInterquartile range
IPAIntellectual property analytics
TF-IDFTerm frequency-Inverse document frequency
CBOWContinuous bag-of-words
DTMDocument-Term matrix
t-SNEt-distributed stochastic neighbor embedding
PCAPrincipal component analysis
POSPart-of-speech

References

  1. Porter, A.L.; Detampel, M.J. Technology Opportunities Analysis. Technol. Forecast. Soc. Chang. 1995, 49, 237–255. [Google Scholar] [CrossRef]
  2. Olsson, O. Technological Opportunity and Growth. J. Econ. Growth 2005, 10, 31–53. [Google Scholar] [CrossRef]
  3. Yoon, B.; Park, Y. A Systematic Approach for Identifying Technology Opportunities: Keyword-Based Morphology Analysis. Technol. Forecast. Soc. Chang. 2005, 72, 145–160. [Google Scholar] [CrossRef]
  4. Ma, T.; Porter, A.L.; Guo, Y.; Ready, J.; Xu, C.; Gao, L. A Technology Opportunities Analysis Model: Applied to Dye-Sensitised Solar Cells for China. Technol. Anal. Strateg. Manag. 2014, 26, 87–104. [Google Scholar] [CrossRef]
  5. Lee, C.; Kang, B.; Shin, J. Novelty-Focused Patent Mapping for Technology Opportunity Analysis. Technol. Forecast. Soc. Chang. 2015, 90, 355–365. [Google Scholar] [CrossRef]
  6. Song, K.; Kim, K.S.; Lee, S. Discovering New Technology Opportunities Based on Patents: Text-Mining and F-Term Analysis. Technovation 2017, 60–61, 1–14. [Google Scholar] [CrossRef]
  7. Yoon, B.; Magee, C.L. Exploring Technology Opportunities by Visualizing Patent Information Based on Generative Topographic Mapping and Link Prediction. Technol. Forecast. Soc. Chang. 2018, 132, 105–117. [Google Scholar] [CrossRef]
  8. Wang, J.; Chen, Y.J. A Novelty Detection Patent Mining Approach for Analyzing Technological Opportunities. Adv. Eng. Inform. 2019, 42, 100941. [Google Scholar] [CrossRef]
  9. Choi, J.; Jeong, B.; Yoon, J. Identification of Emerging Business Areas for Business Opportunity Analysis: An Approach Based on Language Model and Local Outlier Factor. Comput. Ind. 2022, 140, 103677. [Google Scholar] [CrossRef]
  10. Park, H.; Yoon, J.; Kim, K. Using Function-Based Patent Analysis to Identify Potential Application Areas of Technology for Technology Transfer. Expert. Syst. Appl. 2013, 40, 5260–5265. [Google Scholar] [CrossRef]
  11. Aristodemou, L.; Tietze, F. The State-of-the-Art on Intellectual Property Analytics (IPA): A Literature Review on Artificial Intelligence, Machine Learning and Deep Learning Methods for Analysing Intellectual Property (IP) Data. World Patent Inf. 2018, 55, 37–51. [Google Scholar] [CrossRef]
  12. Ernst, H. Patent Information for Strategic Technology Management. World Patent Inf. 2003, 25, 233–242. [Google Scholar] [CrossRef]
  13. Abbas, A.; Zhang, L.; Khan, S.U. A Literature Review on the State-of-the-Art in Patent Analysis. World Patent Inf. 2014, 37, 3–13. [Google Scholar] [CrossRef]
  14. Lee, C. A Review of Data Analytics in Technological Forecasting. Technol. Forecast. Soc. Chang. 2021, 166, 120646. [Google Scholar] [CrossRef]
  15. Grzegorczyk, T.; Głowiński, R. Patent Management Strategies: A Review. J. Econ. Manag. 2020, 40, 36–51. [Google Scholar] [CrossRef]
  16. Al-Saqqa, S.; Awajan, A. The Use of Word2vec Model in Sentiment Analysis: A Survey. In Proceedings of the ACM International Conference Proceeding Series, Egypt, Cairo, 14–16 December 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 39–43. [Google Scholar]
  17. Mikolov, T.; Chen, K.; Corrado, G.; Dean, J. Efficient Estimation of Word Representations in Vector Space. arXiv preprint 2013, arXiv:1301.3781. [Google Scholar]
  18. Breunig, M.M.; Kriegel, H.-P.; Ng, R.T.; Sander, J. LOF: Identifying Density-Based Local Outliers. In Proceedings of the Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data—SIGMOD ’00, Dallas, Texas, USA, 15–18 May 2000; ACM Press: New York, NY, USA, 2000; pp. 93–104. [Google Scholar]
  19. Chandola, V.; Banerjee, A.; Kumar, V. Outlier Detection: A Survey. ACM Comput. Surv. 2007, 14, 15. [Google Scholar]
  20. Singh, K.; Upadhyaya, S. Outlier Detection: Applications and Techniques. Int. J. Comput. Sci. Issues (IJCSI) 2012, 9, 307. [Google Scholar]
  21. Jeon, D.; Ahn, J.M.; Kim, J.; Lee, C. A Doc2vec and Local Outlier Factor Approach to Measuring the Novelty of Patents. Technol. Forecast. Soc. Chang. 2022, 174, 121294. [Google Scholar] [CrossRef]
  22. van der Maaten, L.; Hinton, G. Visualizing Data Using T-SNE. J. Mach. Learn. Res. 2008, 9, 2579–2605. [Google Scholar]
  23. Lloyd, S.P. Least Squares Quantization in PCM. IEEE Trans. Inf. Theory 1982, 28, 129–137. [Google Scholar] [CrossRef] [Green Version]
  24. Kanungo, T.; Mount, D.M.; Netanyahu, N.S.; Piatko, C.D.; Silverman, R.; Wu, A.Y. An Efficient K-Means Clustering Algorithms: Analysis and Implementation. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 881–892. [Google Scholar] [CrossRef]
  25. Jiawei, H.; Micheline, K.; Jian, P. Data Mining: Concepts and Techniques, 3rd ed.; Morgan Kaufmann Publishers: Waltham, MA, USA, 2011; ISBN 978-0-12-381479-1. [Google Scholar]
Figure 1. W2V architecture: (a) CBOW, (b) skip-gram [17].
Figure 1. W2V architecture: (a) CBOW, (b) skip-gram [17].
Axioms 11 00708 g001
Figure 2. Example of (a) p is an inlier (b) p is an outlier where k is set to 5.
Figure 2. Example of (a) p is an inlier (b) p is an outlier where k is set to 5.
Axioms 11 00708 g002
Figure 3. Concept diagram for the proposed methodology.
Figure 3. Concept diagram for the proposed methodology.
Axioms 11 00708 g003
Figure 4. Proposed methodology process.
Figure 4. Proposed methodology process.
Axioms 11 00708 g004
Figure 5. K-means clustering algorithm process: (a) initial step, (b) centroid update step, (c) completed step.
Figure 5. K-means clustering algorithm process: (a) initial step, (b) centroid update step, (c) completed step.
Axioms 11 00708 g005
Figure 6. Collected UAV patent data.
Figure 6. Collected UAV patent data.
Axioms 11 00708 g006
Figure 7. Example of POS tagging.
Figure 7. Example of POS tagging.
Axioms 11 00708 g007
Figure 8. Example of word embedding results.
Figure 8. Example of word embedding results.
Axioms 11 00708 g008
Figure 9. Boxplot of LOF of subsets.
Figure 9. Boxplot of LOF of subsets.
Axioms 11 00708 g009
Figure 10. Plot for within-cluster-sum of squared errors for k.
Figure 10. Plot for within-cluster-sum of squared errors for k.
Axioms 11 00708 g010
Figure 11. Heat map for similarity analysis.
Figure 11. Heat map for similarity analysis.
Axioms 11 00708 g011
Table 1. Collected patent data.
Table 1. Collected patent data.
Technology FieldNumber of DocumentsPatent DB
UAV5679WISDOMAIN
Table 2. W2V hyperparameters.
Table 2. W2V hyperparameters.
HyperparameterCandidates
Vector Size100
Window3
AlgorithmSkip-gram
Table 3. t-SNE hyperparameters.
Table 3. t-SNE hyperparameters.
HyperparameterCandidates
N_component2
Initialization of embeddingPCA
Table 4. LOF algorithm hyperparameters.
Table 4. LOF algorithm hyperparameters.
HyperparameterCandidates
n_neighbors20
metricminkowski
Table 5. Sample for LOF of keywords.
Table 5. Sample for LOF of keywords.
WordSubset No.XYLOF
vehicle055.023−6.4051.088
drone055.342−5.3651.093
system052.801−8.0321.033
device157.626−0.0780.963
localizing1−59.189−27.4791.103
traffic747.54317.1321.344
part725.86636.1171.482
station854.892−17.7961.465
receiving828.82426.1380.938
tag935.0947.8391.448
Table 6. Descriptive statistics for keywords of subsets.
Table 6. Descriptive statistics for keywords of subsets.
Subset No.MeanStd.MinMaxQ1Q3IQR
01.026980.0615750.9365171.4538690.9877851.0439470.056163
11.0212180.0532110.9422011.4481780.9898041.0346620.044858
21.0283860.067830.9367251.6088260.9892021.0420440.052841
31.02430.0558790.9347081.454170.9886641.0431120.054447
41.0269690.0584550.9377831.4391780.9902051.0475070.057302
51.0243950.0639140.9361381.6406140.9894061.0355720.046166
61.0264920.0613540.9312281.5150980.9877731.0428350.055062
71.024190.0585580.9414421.5700520.9881691.0394460.051278
81.0282240.0648220.9278071.5369860.9885371.0443260.055789
91.0299980.0684920.9318281.4480940.984591.0522090.067619
Table 7. Optimal k for each subset.
Table 7. Optimal k for each subset.
Subset 0.Subset 1.Subset 2.Subset 3.Subset 4.Subset 5.Subset 6.Subset 7.Subset 8.Subset 9.
4344444542
Table 8. Similarity average for each cluster.
Table 8. Similarity average for each cluster.
Subset IndexCluster IndexRepresentative Index Similarity Average
0000.057
110.059
220.034
330.033
1040.065
150.058
260.031
2070.079
180.045
290.034
3100.029
30110.059
1120.054
2130.034
3140.037
40150.057
1160.066
2170.032
3180.031
50190.054
1200.069
2210.035
3220.029
60230.061
1240.058
2250.030
3260.035
70270.066
1280.051
2290.041
3300.029
4310.031
80320.061
1330.057
2340.031
3350.031
90360.049
1370.038
Table 9. Keywords and technology definition for major clusters.
Table 9. Keywords and technology definition for major clusters.
Cluster No.KeywordTechnology Definition
7
(2-0)
phenomenon, drones, transformer, intent, oscillator, inhouse, lag, holding, rectifier, interdiction, concern, multi trigger, low rate, analyzing, sram, throttle, dc, diversity, nonoverlapping, disengagement, prevent, po, practice, dsl, constellation, system one, extremity, exporting, firefighting, multitab, display, derivativesUAV defense technology
20
(5-1)
power, air, surface, base, station, platform, frame, housing, ground, direction, axis, battery, center, source, material, channel, rotation, space, angle, layer, element, weight, plane, contact, block, prepreg, sensory, gate, ply, plate, synchronization, metal, cradle, cue, hanger, av, substrate, oblique, mobility, glide, vias, systemUAV charging station(platform) technology
16
(4-1)
stack, ml, nonce, root, mask, magnetization, exhibition, interrogation, police, charging, dummy, provider, foam, redistribution, passivation, threat, heathing, reinforcement, operate, inhibitor, bounding, timestamp, dial, rearend, tracer, releasing, signaltonoise, cuav, spotlight, cone, metaloxide, molding, send, ingestion, pipeline, merkel, surrounding, higherlevel, fit, cap, metallization, blendTo improve the UAV measurement technology
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lee, J.; Park, S.; Lee, J. Technology Opportunity Analysis Based on Machine Learning. Axioms 2022, 11, 708. https://doi.org/10.3390/axioms11120708

AMA Style

Lee J, Park S, Lee J. Technology Opportunity Analysis Based on Machine Learning. Axioms. 2022; 11(12):708. https://doi.org/10.3390/axioms11120708

Chicago/Turabian Style

Lee, Junseok, Sangsung Park, and Juhyun Lee. 2022. "Technology Opportunity Analysis Based on Machine Learning" Axioms 11, no. 12: 708. https://doi.org/10.3390/axioms11120708

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop