Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

7363 results about "Index term" patented technology

An index term, subject term, subject heading, or descriptor, in information retrieval, is a term that captures the essence of the topic of a document. Index terms make up a controlled vocabulary for use in bibliographic records. They are an integral part of bibliographic control, which is the function by which libraries collect, organize and disseminate documents. They are used as keywords to retrieve documents in an information system, for instance, a catalog or a search engine. A popular form of keywords on the web are tags which are directly visible and can be assigned by non-experts. Index terms can consist of a word, phrase, or alphanumerical term. They are created by analyzing the document either manually with subject indexing or automatically with automatic indexing or more sophisticated methods of keyword extraction. Index terms can either come from a controlled vocabulary or be freely assigned.

Methods, systems, and computer program products for facilitating user interaction with customer relationship management, auction, and search engine software using conjoint analysis

Methods, systems, and computer program products for combining conjoint analysis with customer relationship management software, search engine software, and auction software are disclosed. According to one method, conjoint analysis is used to facilitate user interaction with a search engine. According to the method, search keywords are received as a user and treated as attributes by a conjoint analysis application. The conjoint analysis application presents the user with paired trade-off questions regarding the search keywords. Conjoint analysis is performed based on user responses to the questions. Based on the user's responses to the questions, relative importance weightings are computed for keywords. The keywords and the relative importance weightings are input to a search engine. The search is performed using the keywords. Results to be output to the user are selected based on occurrences of the keywords in the search results and the relative importance weightings.
Owner:ADP

Method of promoting strategic documents by bias ranking of search results

InactiveUS7249058B2Remove information source biasIncrease probabilityMarketingWeb siteDocumentation procedure
A method, software and apparatus are provided which enable promotion of products and services in a deterministic manner free of conflicting actions modifying raw ranking data based on merchants interests. For this purpose, an information consolidator is provided to obtain search results for a plurality of sources including directly from merchants. When a shopper enters a set of key words in an entry field in an on-screen form for a web server to obtain a list of items (products and / or services) of interest to the shopper, the documents describing the items can be prioritized by the information provided by the information source based on the web sites owner's priorities. The information consolidator receives ranking information taking the highest ranked products and obtains the product information for the most highly ranked products. The information consolidator then reranks the products using a preferred ranking algorithm to remove information sources biases in this ranking of the products. The information consolidator can add weighting factors such as those covered in the copending applications by the merchant. The weighting factors are combined with the mentioned ranking mechanisms to the documents to increase the probability that certain items come to the top when the search results are presented to the shopper. These pages could be used to promote products or otherwise direct the selection shoppers. The weighting factors are configured so as to not decrease the shoppers confidence in the ranking process.
Owner:IBM CORP

Searchable encryption method based on Chinese in cloud environment

ActiveCN105681280ASearchable implementationSearchable encryption implementationTransmissionSpecial data processing applicationsDocument preparationSearch function
The invention discloses a searchable encryption method based on Chinese in a cloud environment. A dynamic searchable encryption scheme is finished based on the features of a PEKS scheme and a Bloom filter; a ciphertext search function is finished in an insecure channel; fuzzy keyword search based on a public key searchable encryption scheme is supported; multi-keyword search of the Chinese is supported; the keywords in a document are dynamically added or deleted; according to the method provided by the invention, an inner product operation is carried out through constructing a search vector and a file vector so as to finish a fuzzy search matching function; the similarity weight of the keywords in the document and the keywords of a search trap door is calculated through importing the vectors; the ciphertext search function and the fuzzy keyword search function are realized; the ciphertext keywords can be securely transmitted on a public channel in adoption of a server and user double-key pair mode; in application of a hash function and a pseudo-random function, through the scheme, the keyword selection attack can be resisted effectively; and the ciphertext is searched under a condition that the cloud server is semi-trusted.
Owner:XIDIAN UNIV

Text content auditing method and system based on sensitive word

The invention discloses a text content auditing method based on a sensitive word. The text content auditing method comprises the following steps of: receiving a text to be audited, carrying out parsing and word segmentation on the text to be audited, and obtaining all keywords in the text to be audited; according to all keywords, inquiring a preset sensitive word database, and obtaining the sensitive word in the text to be audited, wherein the sensitive word database comprises sensitive words and the synonyms or the homoionyms of the sensitive words; obtaining the co-occurrence keyword of the sensitive word in a preset text length, calculating the violation weight of the sensitive word and the co-occurrence keyword of the sensitive word, and judging whether the violation weight is greater than a preset violation threshold value or not; and if the violation weight is greater than the preset violation threshold value, proving that the text to be audited is a violation text, and otherwise, proving that the text to be audited is a normal text. By use of the text content auditing method, a misjudgment probability is effectively lowered, auditing accuracy is improved, and the text content auditing method has quick reaction capacity for anagrams and net neologisms.
Owner:DATAGRAND TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products