首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
温芳芳 《现代情报》2018,38(7):142-147
[目的/意义]企业间的技术相似性能否转化为现实的合作关系,专利耦合所揭示的潜在关联究竟预示着合作还是竞争,这些问题需要在实证研究中寻找答案。[方法/过程]以德温特专利分类号为媒介构建专利耦合网络,采用可视化和因子分析方法考察企业的技术相似性及其聚类结构、发掘技术派系及其研究方向,对专利耦合网络与现实合作网络进行比较。[结果/结论]单纯的技术相似性不能作为潜在合作关系的有效判定依据,基于专利耦合形成的潜在合作关系难以转化为现实,社会关系因素对于专利合作的影响程度远甚技术相似性。  相似文献   

2.
基于专利耦合的企业技术竞争情报分析   总被引:1,自引:0,他引:1       下载免费PDF全文
本文以美国专利与商标局(USPTO)专利数据库收录的1995-2004年的有关专利数据为基础,利用关键词检索与专利引文检索相结合的方法构建DVD激光头相关主题的专利数据集,运用专利文献耦合的文献计量学方法分析、确定和可视化表达DVD激光头技术发展中的主要竞争对手及其技术优势,为企业技术竞争情报分析提供有效的方法和示范。  相似文献   

3.
洪勇  康宇航 《科研管理》2012,33(7):81-87
专利间的引用关系是研究技术溢出的重要途径之一,为分析技术知识的流动提供了客观的测度依据。本研究以专利引文作为衡量技术溢出的途径,从当前特定技术领域内企业间技术溢出研究的薄弱环节——研究内容和结果表达上入手,提出了专利互引、专利他引和专利自引3种专利引文形式在企业间技术溢出分析中的具体应用,创新性地引入可视化概念,构建了基于专利引文的企业间技术溢出研究框架与方法体系。并以公路工程领域为例,对该领域组群层面和个体层面的企业间技术溢出情况进行深入细致的可视化分析,以图为技术创新实践提供决策信息支持。  相似文献   

4.
科技计划项目后评估中的专利评价方法研究   总被引:1,自引:0,他引:1       下载免费PDF全文
 以科技项目成果中的技术专利群为研究对象,从实际需求出发,构建了专利价值评价流程。运用基于数据挖掘的专利情报分析方法,得到可以操作的专利指标值,并使用基于层次分析和模糊评判法的专利测评模型,对整个专利群的数量和质量进行综合评价。  相似文献   

5.
合理的技术创新合作预测方法是企业寻找合适的技术创新合作伙伴以提升技术创新绩效的有效手段。论文基于企业专利数据,构建专利所有权人共现网络,应用Katz指标计算企业之间的路径相似性,应用TF-IDF算法构建企业关键词向量,结合余弦相似性计算企业之间的内容相似性,应用社会网络分析方法中的中心性指标计算企业的位置相似性,将三者进一步融合得到企业之间合作的潜在可能性。通过对石墨烯领域企业专利数据分析预测企业间合作的可能性,证实该方法有效,AUC指标值为0.7242,优于单一指标相似性推荐方法,能够提升合作推荐中合适匹配的精确度。  相似文献   

6.
SNA在专利分析中的应用研究   总被引:1,自引:0,他引:1  
对社会网络分析方法在专利分析中的应用进行探讨.在研究社会网络分析原理和专利情报分析内容的基础上,以集成电路中的半导体芯片相关专利为研究对象进行实证分析.实证研究表明,应用社会网络分析方法能使专利分析的结果更加全面、丰富.社会网络分析在情报获取、战略制定等方面能给专利分析提供更多有价值的参考信息.  相似文献   

7.
专利的相关性检索与集成应用研究   总被引:1,自引:1,他引:0       下载免费PDF全文
摘要:阐述了专利分析技术和专业应用系统的现状和特点,提出通过专利模型树来描述专利文档,并以专利模型树为基础,建立了基于向量空间模型的专利分类方法和专利相似性检索方法。基于上述方法,在工作流管理系统中集成专利管理系统,建立了集成框架,开发了集成系统,实现了在企业工作流程中的每个工作单元与专利相似性检索模块的集成。最后,在某企业的电缓速器设计的工作流系统中得以应用。  相似文献   

8.
从竞争对手、竞争环境和企业自身的角度强调了专利情报分析的作用,阐述了专利情报分析的3种方法即定量分析、定性分析和拟定量分析,并从工作流程、数据采集、分析工具以及人员队伍等3方面探讨了企业专利竞争情报系统的构建,为企业专利竞争情报工作的思路和方法提供参考。  相似文献   

9.
李铮 《情报杂志》2023,(2):36-43+111
[研究目的]基于作战指挥机构情报分析部门角度构建目标情报分析流程,与目标情报分析相关的多学科研究成果搭建学理联系,从而为创造知识共享式情报分析环境提供机会窗口,以此提高我军目标工作和目标情报分析水平。[研究方法]综合运用文献研究法和理论融合法,在美军目标工作组织方法、目标情报产品标准、目标情报分析实践方法基础上,结合相关情报分析理论,构建目标情报分析流程与目标工作周期互动模型,并对基于模型的目标开发和基于效果的战斗评估两类目标情报分析流程进行详细阐述。[研究结论]通过研究,该文阐明了目标情报分析与目标工作的互动关系,辨明了目标情报分析相较一般情报分析的独特性和共通性,并在总结出美军目标情报分析的主要分析内容的同时,构建起了具有一定普适性的目标情报分析流程。  相似文献   

10.
专利情报分析技术及其分析指标体系建构   总被引:1,自引:0,他引:1  
韩彩云  龚勋 《情报杂志》2007,26(10):78-79,77
在经济全球化和知识经济的时代,专利情报越来越受到企业的重视,逐渐成为企业竞争的利器。为指导企业正确、有效地应用专利文献,详细介绍了几种主要的专利情报分析技术,并从公司和技术两个层面,初步构建了专利情报分析指标体系,以期为企业专利情报工作提供帮助。  相似文献   

11.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
Prof. SUN Changpu from the CAS Institute of Theoretical Physics and coworkers from University of Basel in Switzerland have worked out a way --at least in theory --to split a beam of molecules according to their chirality. The technique involves passing the molecules through three different laser beams and is similar to the famous Stern-Gerlach effect, whereby a beam of atoms passing through a magnetic field is split in two according to the atoms' spin states (Phys. Rev. Lett. 99 130403).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号