Next Article in Journal
Risk Analysis of Chemical Plant Explosion Accidents Based on Bayesian Network
Next Article in Special Issue
Technological Opportunity Analysis: Assistive Technology for Blind and Visually Impaired People
Previous Article in Journal
Spatial Heterogeneity of Winter Wheat Yield and Its Determinants in the Yellow River Delta, China
Previous Article in Special Issue
Text Mining for Patent Analysis to Forecast Emerging Technologies in Wireless Power Transfer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Discovering Technology Opportunity by Keyword-Based Patent Analysis: A Hybrid Approach of Morphology Analysis and USIT

1
School of Management Engineering, Zhengzhou University, Zhengzhou 450001, China
2
School of Economic & Management, Shanghai Maritime University, Shanghai 201306, China
*
Author to whom correspondence should be addressed.
Sustainability 2020, 12(1), 136; https://0-doi-org.brum.beds.ac.uk/10.3390/su12010136
Submission received: 17 November 2019 / Revised: 11 December 2019 / Accepted: 19 December 2019 / Published: 23 December 2019
(This article belongs to the Special Issue Technologies and Innovations for Sustainable Growth)

Abstract

:
As innovative technology is being developed at an accelerated rate, the identification of technology opportunities is especially critical for both companies and governments. Among various approaches to search for opportunities, one of the most frequently used is to discover technology opportunity from patent data. In line with it, this paper aims to propose a hybrid approach based on morphological analysis (MA) and unified structured inventive thinking (USIT) for technology opportunity discovery (TOD) through patent analysis using text mining and Word2Vec clustering analysis to explore the intrinsic links of innovation elements. A basic morphology matrix is constructed according to patent information and then is extended using the innovation algorithms that are reorganized from USIT. Technology opportunities are analyzed at two layers to generate new technical ideas. To illustrate the research process and validate its utility, this paper selects the technology of coalbed methane (CBM) extraction as a use case. This hybrid approach contributes by suggesting a semi-autonomous and systematic procedure to perform MA for TOD. By integrating the innovation algorithms, this approach improves the procedure of value extension in MA.

1. Introduction

Recently, technology opportunity discovery (TOD) has been emphasized as a core competitive factor for companies and governments, and dominating technology in advance can provide considerable competitive advantages [1,2]. Technology opportunity contains the potential for technological progress in general or within a specific field. To capture technological opportunities successfully, technology opportunity analysis, logical forecasting, or prediction is necessary. At the national level, technology forecasting is conducted in many developed countries to forecast science and technology policy and economic growth [3,4]. At the firm level, many large companies are striving to perform technology forecasting activities to prioritize research and development (R&D) and gain the pre-emption of emerging markets’ lead position [5,6]. Thus, in both private and public spheres, many efforts have been made to discover technology opportunity.
Technological opportunity is defined as a set of possibilities or potential technological progress that can create value from new ideas within specific fields or over different industries [1]. TOD is thus the process of identifying technology characteristics and further deriving new valuable technology ideas. Scholars have studied TOD from three aspects: framework, methodology, and extension of fields. Specifically, the TOD framework has been developed from the perspective of function [7], knowledge flow [8], inner-cluster connectivity [2], key technological performance [4], etc. A large number of techniques for TOD have also been proposed by designing computer programs [9], utilizing morphology analysis (MA) [10], theory of inventive problem solving (TRIZ) [11], text mining [1], patent mapping [12,13], novelty detection [14], and others. Another important issue is its practical application in extending technological fields by linking technology with products [5], combining existing technologies [1], and linking technology information to industrial information.
A multitude of methods have been employed to identify innovative technological opportunities. Among them, qualitative methods, such as Delphi, scenario analysis, and MA, have been applied to explore innovative technological opportunities, mainly based on experts’ aid in early examinations. Quantitative methods, such as bibliometrics, patent analysis, and text mining, have been utilized to deal with the dynamic environment of the growing complexity of technology. They are valuable for considering the causal relationships among performance metrics because overall technology performance is not easy to optimize. With them, an expert’s judgement is improved by the objective results instead of narrow subjective thinking so that valuable and feasible opportunities can be focused intensively [4]. Moreover, the supporting systems for discovering technological opportunities, such as TRIZ and USIT, have been proposed conceptually and applied systematically. These frameworks, models, and systems can reflect the effect of technological opportunity on the probability that they would be commercialized through the creation of start-ups, especially small and medium enterprises (SMEs). Moreover, they can also be employed by incumbents to improve technological competitiveness by minimizing trial and error in R&D and preventing the duplication of research because TOD offers global research trends [7]. Thus, the techniques for TOD are considered to be essential and greatly impact many companies.
As a prominent tool for deriving new ideas, morphological analysis has been particularly employed for TOD, which is regarded as a strong stimulus for the invention of new alternatives. It has two strong advantages for idea generation. First, the hierarchical structure can decompose the technology into several descriptive dimensions and values and then rearrange their combinations to spark a series of creative ideas. Second, morphological analysis breaks down the target subject and reconstructs it to explore unprecedented structures, which can derive novel ideas. The success of morphology analysis is critically affected by its dimensions and values, which determine the quality and quantity of creative ideas [15]. The dimensions of the morphology show the overall coverage of technology, while values explain the components of ideas. In previous literature, the procedure of generating dimensions and values systematically rarely gained attention. Rather, the involvement of human subjectivity affects the building procedure of the morphology matrix, which leads to significant subjectivity and bias. To minimize human interference, there is a need to develop a systematic procedure for generating the morphology matrix using quantitative methods.
In response, this research aims to propose a new hybrid method of building the morphology matrix to improve the capacity to discover technological opportunities by using the innovation algorithms reorganized from unified structured inventive thinking (USIT) and patent information. We help USIT, a creative and conceptual thinking methodology in industry and technology fields, is similar to MA in that it performs innovation activities in a concise and visual way and decomposes a target hierarchically with the goal of generating new creation ideas. Because the creation of new ideas in USIT depends on an expert’s intuition, the procedure of selecting innovation algorithms from USIT needs to be improved by quantitative methods. USIT can support the extension of a morphology matrix because its solution generation methods represent a systematic approach to varying the morphological structure and discovering new values, which may be the partial elements of new ideas. Besides, as patent information contains a large amount of tacit knowledge, keyword-based patent analysis is utilized to exploit high-frequency innovation algorithms in a quantitative manner so that the innovation algorithms could better fit the circumstance of technology.
One thing to note is that the objective of this research is neither to propose the most effective method of generating creative technology ideas nor to supersede conventional idea generation techniques. The approach rather serves as a heuristic process model, contributing to the process of extending traditional morphology matrix and further supporting the process of developing more new technology ideas in wider concept. The contribution of this study is threefold. First, a hybrid approach is suggested to extract the existing patent documents, which can provide a basic data source for MA and USIT, and extend the information in a systematic fashion. In the process, keywords are extracted from patent documents as the representative information to extract the morphology of patents, which constitute the values in the morphology matrix. Second, the combination for creating new ideas is performed from two layers, i.e., dimension and value, which is advantageous for discovering technology opportunities systematically. Thus, by combining USIT and patent analysis, the basic information extracted from patents can be transformed into that with novel and valuable features. This hybrid approach can improve the limitation of MA on extending and varying the information extracted from patent documents. Third, the application of the proposed approach in the technology of coalbed methane (CBM) extraction is an initiative attempt to integrate USIT with MA, which can be further generalized in other fields.
The remainder of this paper is organized as follows. An overview of TOD, MA, USIT, and patent analysis is presented in Section 2. In Section 3, the proposed hybrid approach covers how USIT is applied for the construction of the morphology matrix, and related concepts, such as the framework and detailed overall process, are introduced. Subsequently, in Section 4, an exemplary analysis regarding CBM extraction is used to exhibit the application process of the hybrid approach. Finally, discussion, conclusions, implication, and future research topics are discussed.

2. Background

2.1. Technology Opportunity Discovery

Technology opportunity analysis (TOA) was first developed at the Georgia Tech Technology Policy in 1990 [14]. Due to the increased risks involved in launching and growing a new business, TOD mainly collects bibliometric or patent information to conduct value-added analysis as a reference for technical engineers, strategy managers, or market analysts in a suitable form [5]. The patent documents provide not only the bibliographic information but also the detailed technical information, such as the principles of function, the components of process, and the intrinsic causal relationship of each element [16]. The use of patent analysis has been increasingly significant in recent years, and patents have been applied to identify technological opportunity [17].
Since qualitative approaches such as the Delphi method and analytical hierarchy processes [18] have been employed in identifying technology opportunities, multiple quantitative approaches based on patent data have been developed as a way of minimizing the impact of experts. For example, Yoon et al. [7] applied subject-action-object (SAO) semantic mining to patent data analysis to extract technology opportunities from a functional perspective. Lee et al. [4] extracted the key information of an R&D plan from bibliometric data through chunk-based mining and transformed it into a customized and detailed R&D plan. However, due to the inconsistent and incoherent nature of bibliometric and textual data, the combination of qualitative and quantitative approaches has been considered as a remedy for TOD, such as applying factor analysis and cluster analysis to analytic hierarchy process (AHP) [19], latent Dirichlet allocation (LDA) to TRIZ [20], and Wikipedia to morphological analysis [21]. In addition, the development of TOD approaches proves that a supplementary expert’s discussion is required to select meaningful sections for the investigation of technology opportunities from the extracted data.
Nevertheless, previous research on TOD has focused on the combination of methods that could analyze a sea of patent data to discover technology opportunities, as well as decreasing expert involvement while the data are underutilized to form the paths to derive new technology ideas. The methods are bounded by complexity and randomness to discover technological opportunities. TRIZ inventive principles and engineering parameters, which are available tools for solving complicit problems, have been introduced to improve information accuracy and explore technology opportunities [22,23]. Nevertheless, due to the complexity of TRIZ, this study selects USIT, which is simplified from TRIZ and applicable for industry fields [24], and further reorganizes it to perform the function of guidelines for varying technology values in MA.

2.2. Morphology Analysis

As a powerful systematic methodology and non-quantified modelling approach, MA enables technological, organizational, and social problems to be analyzed by deriving unrealized combinations relying on expert experience and knowledge. The core of MA is that the research object is resolved into several fundamental dimensions, which depict the object from a detailed and inclusive perspective. Each dimension then can be divided into several sub-dimensions to explain the characteristics of the entire system [5]. The components of sub-dimensions are considered as values that contain the potential for discovering technology opportunities. By combining these dimensions and values of all possible forms, the new system can be invested, and unexpected creations may be discovered, which can be a strong stimulus for inventing new alternatives to meet imposed requirements. The superiority of MA lies in its intuitive form for structuring complex systems in a non-quantitative manner [25]. The analysis process can be executed and developed quickly without superfluous data.
The basic procedure of MA is as follows [26]. First, the essential functions of the subject are defined, and its characteristics are divided into several dimensions. Second, all possible values of each dimension are listed to demonstrate itself. Third, all combinations that can produce unique sets of values are investigated. The number of combinations can be calculated by multiplying the number of values associated with each dimension together. Fourth, evidence is sought for each combination by practical examples. Finally, the unfeasible combinations are eliminated, while valuable combinations are retained and ranked by their significance.
Valuable contributions have been made to the development of MA, and the major research stream lies in its application. MA has been applied to the design of materials and products in computer-based design [27,28], the development of new services [29], technology forecasting (TF) [30], TOD [15], and the generation of business models [31]. However, MA has the defect of inability to perform in a stand-alone mode. To systematize and automate the process of building the morphological matrix, other approaches have been used as a facilitator in the process of TOD. For example, text mining has been widely used to extract valuable information from the large volume of data by extracting keywords from patent documents [10,25,32] and selecting appropriate shapes based on the frequency and co-frequency of each word [5]. As a supplement, software tools have also been developed and applied to support the execution of MA [33].

2.3. USIT

Unified structured inventive thinking (USIT) was originally developed by Ed. Sickafus at the Ford Motor Company in the 1990s based on TRIZ, a theory of inventive problem solving, and SIT, a methodology of systematic inventive thinking [34] (pp. 43–46). Therefore, USIT is defined as a systematic innovation approach for providing a beginning point for creativity with the goal of generating conceptual solutions rather than engineered solutions in a concise manner. Three key elements of USIT are object, attribute, and function, which are utilized to denote the entire innovation process. To identify and characterize the effective attributes of objects, the diagram of object-attribute-function (OAF) is constructed to serve as a heuristic tool in the application of solution techniques [34] (79–83). The strength of USIT lies in its concise structuring process for setting up and settling technological problems and short turn-around time for invention [35]. Moreover, two algorithms are developed in USIT: the closed-world algorithm, which establishes a vantage point for viewing the problem situation in functional relationships between selected objects; and the particles method algorithm, which enables analysts to find a conceptual solution to a certain problem by identifying physical, chemical, biological, and geometric effects to satisfy its specific features.
USIT presents a concise and systematic process for generating elements of ideas in engineering fields. Among the previous studies on USIT, the representative is Nakagawa’s work. It proposes five categories of solution generation methods containing 32 sub-methods, called the “USIT Operators,” which were reorganized from 40 innovative principles in TRIZ by Nakagawa [36]. For instance, “1a, eliminate the object” refers to the first sub-method in the first category method, the object pluralization method, which is derived from the two inventive principles of simplification and trimming. In this study, the meaning of each method is not elaborated, while the improved USIT Operators are utilized to discover innovation algorithms. Text mining is applied to produce the occurrence frequency of each keyword extracted from USIT Operators.
Jupp, Campean, and Travcenko [37] have integrated TRIZ and USIT as an effective design development in vehicle engineering, and Schöfer, Maranzana, Aoussat, Gazo, and Bersano [38] have utilized USIT tools to analyze the outcome of the problem-solving process on non-technological domains. However, the application of USIT is still insufficient. Furthermore, the definition of objects in USIT could be a wide range, which causes some trouble in discovering the core target objects. Therefore, our study is a development of USIT by integrating the solution generation techniques with MA to apply it in technological domains. The motivation is to utilize the reorganized USIT Operators to manage the innovation dimensions extracted from the morphological matrix, extend the scope of generated potential technological ideas, and evaluate their feasibility to obtain the technology opportunities in technical engineering fields.

2.4. Patent Analysis

Patents represent a useful source of knowledge about technical innovation and R&D performance in addition to acting as a means to protect inventions. It is suggested that the source of 80% of technical information lies in patents [39]. Among multiple sources for technical information (e.g. scientific and technical publications, products, and processes), it is indicated that the capability of patents to explaining most aspects of technical innovation activities has been recognized widely [40]. Basically, patent information, such as patent documents and citations, is considered as one of the sources in transferring knowledge to promote policymakers at the worldwide level, favoring promising technologies in terms of social optimum [41] and stimulate firm’s strategy makers focusing from internal knowledge to external knowledge when developing product innovation [42,43]. Since the raw patent data offers detailed information on a specific invention (e.g., novel product or process) [44], previous studies suggested that patent analysis has long been employed as a useful analytical technique for TOD and has significantly benefited from the use of computerized methods such as patent statistics analysis and patent bibliometric analysis [45].
Since patent documents consist of two parts: structured part (e.g., patent citation, patent classification) and non-structured part (e.g., abstracts, claims, and description) [45], the techniques of patent analysis for TOD could largely be classified into two categories: the target of analysis aiming to structured part (e.g., patent co-classification analysis [46,47], patent citation analysis [48], etc.) and non-structured part (e.g., keyword analysis [10,49], patent network analysis [50], etc.). Among these techniques, keyword analysis combined with text mining techniques is particularly useful for scrutinizing the technical content of patents with the aim of decomposing technology to capture the overall technology features [30]. The keywords extracted from patent documents contain valuable information for TOD. In line with it, various studies have been conducted to discover new technology opportunities based on keywords extracted from patent data. For instance, Boon and Park [10] extracted representative keywords from 137 patent documents to establish the morphology matrix systematically and further identify technology opportunities. The analysis result indicated that the unoccupied territory of configurations was suggested as technology opportunities by listing the occupied configurations of collected patents. Also, Lee, Yoon, and Park [12] utilized text mining to identify keywords of patent documents by constructing the extracted keywords into structured vectors with the aim of creating keyword-based patent maps and identifying the vacancy containing the potential for new technology ideas. With the development of text mining techniques, the morphological analysis based on patent data has been one of the major research issues, while MA involves the implementation of text mining of patent content to identify core innovation elements and analyze them morphologically. The keyword-based morphological patent analysis can discover critical technology information from patents and thus provide our underlying motivation and is fully addressed in this study [49].

3. Methodology

3.1. Research Concepts

To overcome the drawbacks of classical MA in innovation design activities, this research proposes the integration of MA with USIT, especially the “USIT Operators.” Both methods share the same objective of deriving new ideas systematically and concisely and have the feature of hierarchical structure. MA provides a structured framework for idea generation, while USIT fills the paths to extend the values in MA. Different from the classical MA or USIT, this hybrid MA-USIT approach utilizes innovation algorithms from USIT to identify detailed technological characteristics on the basis of a basic morphological matrix to further extend the matrix.
The innovation algorithms are proposed through a semi-autonomous approach to improve the flexibility of USIT towards the target field and compatibility with MA. An innovation algorithm is the integration of the inner innovative principles to tell designers how to deal with the target innovation dimension. Compared with the USIT Operators, the innovation algorithms, which are reorganized from the solution generation methods in USIT, have simpler classifications and are also easier to be understood and used. In addition, with the inherit advantages of USIT Operators, innovation algorithms are applicable in industry fields and hardly need enormous knowledge bases except what you have learned.
In this paper, the morphology matrix is constructed with dimensions, sub-dimensions, and values. Although USIT is a systematic approach for providing a beginning point for creativity in a concise manner, the innovation paths of extending values may be equivocal. By integrating MA and reorganizing USIT, this hybrid approach could fill the morphological structure with supplementary values to discover new technology ideas from existing patent documents. Under the guidance of innovation algorithms, a systematic analysis will be employed to show what to focus on and how to generate supplementary values. In this paper, the semantic similarity of patent information and knowledge flow between patents are considered in extending the morphological structure to discover new technology opportunities.

3.2. Research Framework

The hybrid MA-USIT approach mainly includes two parts: constructing the basic morphology matrix and extending values using the innovation algorithms recognized from USIT. They are designed as two discrete sections and are executed successively.
The procedure of MA in this approach consists of seven steps, as shown in Figure 1. First, select the target technology area. In this step, the target technology that needs to be explored is selected. Second, collect relevant patent documents from the World Intellectual Property Organization (WIPO). Third, preprocess the collected patent data. In this step, function words and stop words are removed to eliminate valueless information, and keywords are extracted by text mining. Fourth, define the morphological structure by clarifying the relationships between dimensions, sub-dimensions, and values. Dimension is the preliminary level and could assist analysts in grasping the target knowledge domain effectively, while values of each sub-dimension consisting of keywords can provide detailed descriptions of the technology. Fifth, construct the basic morphological matrix by matching the values with the sub-dimensions. Sub-dimensions are concluded by combining the F-term system with the clustering results of Word2Vec to describe the technological characteristics in detail. F-term classification is a system created by the Japan patent office (JPO) to classify the detailed technical features of the inventions. The system of analyzing technical attributes from various perspectives enables the F-term to cope with the ever-increasing volume and diversification of technologies and to improve the efficiency of prior art searches for patent examination [1]. A simple example is listed in Table 1 to show the basic structure of the F-term featuring two parts. The first part consisting of five digits from the left is the “theme code”, which represents a technological field. The second part is the four-digit “term code” from the right which is split from themes to explicate various technical viewpoints. “Viewpoint” and “figure” are the component of “term code”. For example, in the F-term of 2D129AA01, 2D129 is the theme code (‘earth drilling’), AA01 is the term code, while the viewpoint “AA” refers to ‘object to be drilled’ and figure “01” represents ‘underwater’ [51]. And the Word2Vec model is utilized to transform chaotic data into a structured word vector so that we can further explore the deep connectivity of the selected keywords by the value of TF-IDF. Word2Vec model, a technique released by Google for deep learning, uses word contexts to model the semantic meaning of a word when merging synonyms. This tool adopts two main model architectures: continuous bag-of-words (CBOW) model and continuous skip-gram model, to learn the vector representations of words. The CBOW architecture predicts the current word based on the context, and the skip-gram predicts surrounding words given the current word [52,53]. The Word2Vec models semantic meaning based on the relations between words and the surrounding context word collection [54]. For example, words that “pretty”, “beautiful”, and “palace” are equally distant even though semantically, “pretty” should be closer to “beautiful” than “palace”. Semantic similarity analysis contributes to the construction of the MA matrix in discovering innovation dimensions and values. Sixth, extend the overall technological values in the morphological matrix by integrating the reorganized innovation algorithms from USIT with expert involvement. Finally, new technology ideas are derived from the combinations of values under the guideline of dimensions.
To be specific, the procedure of obtaining innovation algorithms consists of six steps to extend the morphological values, as shown in Figure 1. The first and second steps are the same as those of MA, i.e., field-selecting and data-collecting. Third, the texts are preprocessed by Python, one of the computer programming languages for deep learning. The patent data are cleaned by removing function words, stop words, and the tenses of words. Fourth, the contents of USIT Operators are analyzed by experts, and the keywords are extracted to represent USIT Operators. Fifth, the extracted keywords are further selected by their high occurrence frequency and reorganized based on semantic similarity analysis by experts’ knowledge. Sixth, the inner connectivity of the keywords is analyzed to reorganize the USIT Operators of the target technology field by expert knowledge. Seventh, the value of the new reorganized algorithms is defined to make the algorithms clear and convenient to use. In fact, these algorithms are not only applicable for the target technology field but also valuable to other fields that could be explored in further research.

3.3. Overall Process

3.3.1. Phase 1: Data Collection and Preprocessing

Since the proposed method is executed based on the patent documents in specific technical fields, structured data must be extracted to explore their inner logic and law. First, WIPO PatentScope is selected as the data source, which records many countries’ patents, including China, the Russian Federation, the United States, etc. The PatentScope database provides access to international Patent Cooperation Treaty (PCT) applications in full-text format on the day of publication, as well as the patent documents of participating national and regional patent offices. Thus, numerous patent documents from worldwide patent databases can be collected in WIPO PatentScope, and valuable information can be derived automatically. Although all patent documents can be collected and analyzed around the world, each database has its own characteristics in terms of main patent classifications and diversity of applicants, and the integration of databases may entangle valuable information when analyzing different forms of patent texts. Second, the retrieval methods in WIPO PatentScope consist of five categories. This research selects the cross lingual expansion because it can search the patent documents of various languages by inputting English keywords. The collected patent documents are ranked by their relevance in WIPO PatentScope, and each of them has IPC (international patent classes) codes to represent the target technology. According to the case in this paper, the patent documents are collected by searching the keyword of “coalbed extraction” in the search pattern of cross lingual expansion, which is effective for increasing the integrity of innovation elements. Third, the patent data is preprocessed by Python because the mass of valuable information in the patents is interfered with by meaningless information, such as the detailed parameters, effectivity, etc. Word segmentation is executed to divide the patent documents into single words and make preparations for the next step. For example, the sentence of “Well, I have an idea” is divided into “Well,” “I,” “have,” “an”, and “idea.” Fourth, function words and stop words are removed to eliminate unnecessary impact. For example, “Well” and “an” are eliminated to decrease the workload of experts. In this step, the keywords in patent documents are extracted by calculating the TF-IDF of each word in the collected patent documents. Finally, stemming is executed to transform the words from inflectional affixes into the basic form of stems. For example, “separate” is transformed into “sep,” and “measurement” is transformed into “meas.” In this step, the keywords with high frequency in patent documents are identified from USIT Operators.

3.3.2. Phase 2: Basic Morphology Matrix Construction

In the basic morphology matrix construction phase, the morphological structure of the selected technology is defined to denote the characteristics of the technology hierarchically, as illustrated in Table 2. Generally, the morphological matrix is constructed by the combination of dimensions, corresponding sub-dimensions, and specific values. In this study, sub-dimensions are integrated by multiple values to represent the main structure of the target technology. Dimensions are defined to ensure that the integration of those sub-dimensions forms a coherent whole of the target. From the perspective of dimensions, the entire morphology of the technology domain could be described in a concise manner. The values composed by keywords represent the basic innovation elements of the potential for new technological ideas, while domain-based dimensions divide the boundary of values. To make the connection between dimensions and values clear, the subordinate concept is assigned as sub-dimensions to bridge the gap between dimensions and values by F-term and a supplementary expert’s discussion. Technological opportunities are derived at the value level, while the innovation paths are performed based on dimensions and sub-dimensions.
The process of constructing the basic morphology matrix is performed as follows. First, TF-IDF is utilized to identify the keywords from preprocessed patent documents assuming that keywords are used to label the crucial contents of documents. A word whose TF-IDF is not zero is selected as a preparatory keyword. The TF-IDF matrix for identifying representative keywords is listed in the supplementary material. Second, based on the experts’ knowledge, a series of valuable keywords are screened from the preparatory keywords related to the technology. Third, the keywords are transformed into structured data to generate keyword vectors and then clustered into different groups by Word2Vec. The principle of classifying keywords lies in semantic similarity. As the details illustrated in Appendix A indicate, multiple dimensional vectors are produced from the extracted keywords based on the semantic contexts. The semantic relation among terms in the corpus comprised of extracted keywords is discovered by skip-gram technique. After the training converges, terms with similar meaning are mapped to a similar position in the vector space. Fourth, according to the F-term system and domain experts, the selected keywords in each cluster are reclassified and connected with values. The rule of reclassification is that the inner link represents the common characteristics. For instance, pulse, ultrasonic, microwave, and infrared in Cluster 2 are similar in the form that some types of energy take as they move, so they could be utilized to generate percussion in the coal seam. Finally, dimensions are concluded on the basis of values by domain experts’ analysis, and the concepts of sub-dimensions are developed from dimensions. Thus, the basic morphological matrix is constructed to portray the structure of technology in a semi-autonomous manner, as shown in Table 2. With the keywords of the collected patents, we can begin to expand the values by F-term classification, and dimensions can be further concluded on the basis of sub-dimensions to minimize the dependence of experts’ intuition. TF-IDF was first introduced as a term weighting scheme in 1972 [55] and has been the most fundamental form of document representation [56]. The basis of TF-IDF lies in the bag-of-words scheme whereby each document can be represented by a series of keywords that occur in the document. TF-IDF involves multiplying the IDF measure (the inverse document frequency of the term in the document; in this case, the less, the better) by a TF measure (the frequency of the term in the document; in this case, the more, the better), which reflects each word’s value in the document in a quantitative manner. In this research, we apply the basic formula of TF-IDF analysis as shown in Equation (1) [57]. The parameter tfij represents the number of times word i appears in document j. The parameter idf(ti) represents that term ti occurs in ni of the total number of records N:
TF-IDF = tfij × idf(ti) = tfij × log(N/ni).

3.3.3. Phase 3: Innovation Algorithm Generation

The innovation algorithms are generated on the basis of USIT Operators. In the innovation algorithm generation phase, USIT Operators are defined by main keywords to identify the representative keywords for the target technology. USIT Operators have a system of solution-generating methods containing 5 main methods with 32 sub-methods [35].
The process of extracting representative keywords from USIT is as follows. First, USIT Operators are defined by some keywords. Second, the frequency of each keyword in preprocessed patent documents is counted by CountVectorizer, a Python toolkit. Stemming is executed to transform them into the basic form of stems. For instance, “sep” means “separate,” and “meas” means “measurement.” Third, 31 keywords are selected and improved into the original form. Some invalid keywords are then eliminated due to failing to explain the original words, and some external similar words are added as keywords to increase the accuracy of actual keywords. Consequently, it is effective to analyze the link between USIT Operators and patent documents by using the keywords rather than the entire contents of the patent documents.
To simplify the application of USIT to MA, USIT Operators are reconstructed by transforming the original 32 sub-methods into five, and they are called innovation algorithms. According to the results gained from the previous step, representative keywords of USIT Operators are further grouped on the basis of semantic similarity analysis by experts. Specifically, because “movable,” “vary”, and “flexible” share the meaning of “dynamic” and both “fluid” and “liquid” describe the flowing state of a substance, which also contains the meaning of “dynamic,” these words are therefore classified into the innovation algorithm and defined as “Dynamic.” MA is widely used for its intuition and simplicity, while the innovation algorithms can improve the compatibility between USIT and MA, which provides the path for extending the basic morphology matrix.

3.3.4. Phase 4: TOD Achievement

Because the information extracted from existing patent documents is limited by the depth of values and the width of sub-dimensions, which is disadvantageous to TOD, a supplementary morphology matrix is developed to extend the values and sub-dimensions in the TOD achievement phase.

Extending Sub-Dimensions

Although the F-term classification system covers the detailed technical features of inventions, it makes the entire framework of a specific technological field absent. In response, sub-dimensions need to be expanded vertically to increase their width and develop a more structured matrix. Innovation algorithms will be beneficial to expand the hyponyms in the dimension-framework with the aid of experts. For example, when a sub-dimension in the mechanism dimension is developed, the innovation algorithm “friendly” could guide the development of hyponyms as preliminary concepts, which aims to adjust the relationship between the elements in the innovation system and environment. In this manner, numerous concepts can be extended and further developed as sub-dimensions. This is possible because the concepts are created by the interaction of the result of clustering analysis with innovation algorithms.

Extending Values

The expansion of values is mainly classified into two categories. First, it refers to the original values in the basic morphology matrix. Second, it refers to the new values developed based on the original values in the first category. Moreover, on the premise of the basic matrix, the developed values in each sub-dimension could be further expanded in the guideline of innovation algorithms. For example, the value of “reverse circulation,” which belongs to the basic matrix, could be developed into “positive cycle.” The extended morphology matrix executes the value generation process to expand the depth of values. By this, the values in the basic morphology matrix could be extended horizontally to enrich the technological values of technology in the form of nouns or noun phrases.

Identifying Technology Ideas

New technology ideas are identified from the extended morphology matrix. In this paper, the procedure of identifying new ideas composes two layers: the first layer identifies conceptual ideas, and the second layer identifies new technology ideas. The analysis in the first layer is performed in dimensions and sub-dimensions. Based on the single sub-dimension and combinations of sub-dimensions in the same or different dimensions, multiple new conceptual ideas are derived and could be developed into detailed technology ideas by domain experts. The results in the first layer provide a guideline for the latter layer, which shows the detailed description of new technology ideas. For the second layer, detailed technology ideas are derived from values on the basis of conceptual ideas. Values enrich the details under the framework of dimensions and sub-dimensions. Thus, the second layer is actually performed as a length-and-width extension of the first layer.

4. Case Study

4.1. Phase 1: Data Collection and Preprocessing

To illustrate the process of integrating basic MA with the innovation algorithms derived from USIT to explore technological opportunities, we provide an example of CBM extraction technology. The reasons for selecting CBM extraction technology are as follows. First, previous research on TOD has mainly focused on the field of product innovation but has rarely involved engineering innovation. The example will help engineers discover technological opportunities in engineering fields. Second, because CBM is an efficient, clean and environmentally friendly new energy and has become one of the emerging industries with huge development potential in the energy industry, identifying possible technological opportunities in CBM extraction is greatly significant for the industry, the nation, and all of society in that it can reduce air pollution and harness mine gas hazards.
The time window is set from 2009 to 2018, and 1385 patent documents related to coalbed methane extraction technology are collected by searching the keywords coalbed extraction in the WIPO PatentScope database with cross-lingual expansion. Before data preprocessing, we invited three researchers in the field of CBM from China University of Mining and Technology (CUMT) and Henan Coal Society (HCS). In addition, we invited one patent examiner from the Intellectual Property Office of China (SIPO). With the assistance of four experts, only 100 patent documents with high relevance to coalbed methane extraction methods remain according to the evaluation mechanism of WIPO PatentScope database, except for its devices and systems, to discover critical innovation dimensions and then technology opportunities. Table 3 indicates the high relevant IPC classes and paralleled F-term classes, which has reflected the CBM extraction technology development in the past 10 years and paved the way for discovering the values of keyword-based innovation elements.
Text mining is utilized to develop a technology dictionary that represents the major components of coalbed methane extraction. First, we extracted keywords on the basis of TF-IDF from each patent document by Python. A matrix of 100 patents and 2930 keywords [mij]100×2930 is constructed to show the TF-IDF values of keywords in each patent document. According to this matrix, 2930 keywords are originally obtained. Then, the number of keywords is decreased sharply to 168 as a result of eliminating the supplementary or superfluous words such as “ability,” “feedback,” “greatly,” etc. In this process, each keyword is selected based on its special value in coalbed methane extraction with expert assistance. With this, 168 keywords are developed without pointing out the relationship among each word. The TF-IDF matrix is shown in the supplementary material, and the clustering results is listed in Appendix B.

4.2. Phase 2: Basic Morphology Matrix Construction

To deal with the ambiguous relation of the values from different patent documents, all of them are transformed into a keyword vector and then clustered into 40 groups by the Word2Vec algorithm. For example, “discharge” and “outlet” are close to each other. With this, the values with similar meanings are grouped into the same cluster, as illustrated in Figure 2. The full result of word vectors is presented in Appendix A. The line between each associated word represents the semantic proximity. The darker the colour is, the closer these two words’ semantics are. The values in each cluster can be explained by a few dimensions with the guidance of domain experts. To make the connection between dimensions and values clear, values are first assigned into sub-dimensions, the concepts of which are subsidiary to the dimensions in Table 2. Each keyword has a specific value in the technology, which is developed by F-term and domain experts. F-term theme and viewpoint are extracted from the JPO database. Hence, the morphology of coalbed methane extraction is presented in Table 2. There are three innovation dimensions for coalbed methane extraction, including the mechanism dimension, space dimension, and material dimension. The technology can be structured in a multidimensional view according to the analysis of sub-dimensions and values. Moreover, Table 4 lists the definitions of dimensions that are used to illustrate the technology morphology.

4.3. Phase 3: Innovation Algorithm Generation

In this phase, the definitions of USIT Operators were analyzed to determine the keywords for text mining. With expert assistance, USIT Operators were divided into 70 keywords as the representative innovation elements. Appendix C shows a list of keywords extracted by the definition of solution generation methods. Their frequency is calculated by CountVectorizer. Considering the heterogeneous tense of the patent documents, the lexical form was restored to simplify the patents and USIT Operators. For example, “sep” means “separate,” and “meas” means “measurement.” Some invalid keywords were eliminated on account of failing to find the original words, such as “cont,” “in,” and “plac.” Consequently, the keywords in USIT Operators were improved in the form of complete words. The full result of improved USIT keywords is presented in Appendix D. Moreover, some supplementary words were added to enrich the meaning of USIT Operators and increase the likelihood of innovation elements appearing in the patent documents. Then, the representative keywords in the technology of CBM extraction were selected on the basis of the improved keywords of USIT Operators.
According to the results in Appendix D, those keywords with high frequency are selected and then clustered into 5 groups to identify the core innovation algorithms by experts, as shown in Table 5. The five innovation algorithms were not selected from USIT Operators but were reorganized from the high-frequency keywords in USIT Operators. The criterion of selecting the keywords were the frequency of occurrence in patent documents, and the criterion of reorganizing these keywords lied in the semantic similarity. In group 1, for example, “connect” has the meaning of joining two or more things together, while “combine” means to join two or more things or groups together to form a single one according to the Oxford English Dictionary. Thus, the two words are assigned to the same group to compose the innovation algorithm of “combination and integration”. In group 2, “gaseous,” “liquid,” and “fluid” have the characteristics of being flexible, movable, and variable. Hence, the three words are utilized to describe the change of an object’s state. In group 3, words such as “improve,” “modify,” “change,” and so on refer to making something different from what it was before. In group 4, words such as “smaller,” “separate,” “divide,” and so on share the meaning of causing something to move or be apart. In group 5, “measurement,” “detection,” and “level” are clustered in the view of human factors of engineering. Table 6 gives the definitions of innovation algorithms that may be utilized to extend the values of technology morphology. When the innovation algorithms are identified and restructured based on USIT Operators, they will be applied to extend the values of technology morphology so that the basic morphology matrix can be expanded horizontally and systematically.

4.4. Phase 4: TOD Achievement

4.4.1. Extending Sub-Dimensions

The basic morphology matrix is supplemented and reconstructed by generating additional values and sub-dimensions to yield an extended morphology matrix. Numerous concepts of sub-dimensions are developed to make the matrix more structured. For coalbed methane extraction, “fracture,” “scour,” “thermal driving,” “fusion,” etc. are extended as the new sub-dimensions that show the characteristics of the specific technology field. Based on the clustering results, corresponding values in the extended sub-dimensions are developed to enrich the matrix. Furthermore, several novel sub-dimensions are expanded, mainly based on innovation algorithms and experts’ knowledge, such as microorganism, which is proposed to adjust the relationship between the elements of the innovation system and the environment.

4.4.2. Extending Values

Via innovation algorithms, the hyponyms of basic sub-dimensions are generated to extend the values, including “positive circulation” and “shock.” For instance, if a value is selected as the target to be extended, at least one innovation algorithm will be applied to develop the hyponym in the range of dimensions and sub-dimensions. Table 7 shows the examples of value extension by coupling the innovation algorithms with the basic values. The procedure of value extension in the earth drilling method is depicted from two categories. In the first category, new values are developed from the basic matrix. For example, the new value “positive circulation” is developed from the basic value of “reverse circulation” because both of them share the meaning of the hypernym “earth drilling method.” For the second category, values are developed from the new ones in the first category. For example, “impact swing” is developed on the basis of “rotation” and “shock,” while “rotation” and “shock” are both values expanded in the first category. The extended morphology matrix by coupling innovation algorithms is presented as Table 8.

4.4.3. Identifying New Ideas

Identifying Conceptual Ideas in the First Layer

In the first layer, conceptual ideas are identified based on dimensions and sub-dimensions. To be specific, in the sub-dimension of the earth drilling method, the combination of multiple methods could derive new drilling methods. The combination of different dimensions induces the conceptual ideas. For example, in the framework of the space dimension and mechanism dimension, location of the object to be drilled could be combined with fracture, scour, etc. The new possible ideas are illustrated as Table 9.

Identifying Technology Ideas in the Second Layer

The analysis in the second layer is performed in the values. New technology ideas are identified based on the combinations of conceptual ideas derived from the above three dimensions. If the sub-dimension of the space dimension, location of the object to be drilled, and the sub-dimension fracture in the mechanism dimension are selected as the guideline, the combinations of their values will contribute to new detailed technology ideas.
Additionally, logical analysis is essential in this part. To acquire feasible technology ideas, the location value of the space dimension is first confirmed. In other words, it determines where to extract CBM. Then, the expected mechanism in the mechanism dimension is determined to apply the technology. The material dimension is then performed as an auxiliary tool to support the procedure of discovering technology opportunity. Table 10 shows the new technology ideas that are derived based on the extended morphology matrix.

5. Discussion and Conclusions

5.1. Discussion

This study employed a keyword-based hybrid approach of MA and USIT to analyzing patent information for TOD in the field of CBM extraction. Depending on the complexity of technology, two morphology matrixes: basic and extended morphology matrix were developed and three major dimensions including mechanism, space, and material dimensions, as mentioned in Table 4, were analyzed according to the results of patent analysis. Otherwise, as we may observe from Table 9 and Table 10, the analysis result showed that the mechanism dimension was critical to develop the technology of CBM extraction, while space dimension and material dimension played the role of the subsidiary. As mentioned in Table 6, five innovation algorithms were developed from USIT based on the result of patent analysis. These innovation algorithms inherited the succinctness of USIT and carry the adaptability in the CBM extraction technology. Conventionally, the process of establishing a morphology matrix was only conducted by plenty of domain experts and practitioners. Furthermore, biased knowledge bases limited the process of knowledge transfer. Thus, this research provided a systematic way to develop basic and extended morphology matrix and identify the critical innovation elements in the matrix and further discover technology opportunities for government and firms.
Several policies of the hybrid approach are worth noting. First, the dimensions and innovation algorithms in this research are defined in a generalized way, though they are derived from the specific technical field, which carries the potential to be applied to other research fields. Second, the extension of sub-dimensions and values is conducted by the guideline of innovation algorithms while basic sub-dimensions and values are developed from patent documents. Compared to the basic morphology matrix, the extended one offered more valuable information. Third, the coalition between MA and USIT is performed at the implemented level, indicating that the structure of the morphology matrix and logistic of USIT are retained in the intrinsic form. Although previous research has merged MA and other techniques, such as WordNet [15], Wikipedia [21], conjoint analysis [30] etc., the approach differs from them in the intervention of innovation algorithms in the process of extending morphology matrix.

5.2. Conclusions

As a remedy for subjective and expert-based morphology building, this research has proposed a hybrid approach for TOD on the basis of MA and five innovation algorithms developed from USIT to extend the basic morphology matrix. While technology can be visual in morphological structure, classical MA is subject to the qualitative characteristic, contributing to the fuzziness of values building in each dimension, which decreases the efficiency of exploring new technological opportunities.
Several contributions are made in this paper. From the perspective of theory, first, this paper provides a semiautonomous and systematic procedure of constructing the basic and extended morphology matrix for review research. The use of innovation algorithms in the morphology analysis extends the subjective and expert-based morphology. Second, the proposed framework provides an initial study for the concept of innovation algorithms that are derived from USIT that has not appeared in existing review research. USIT Operators are reorganized into five high-frequency innovation algorithms in the specific technology field to improve the applicability for varying the technological morphology. From the perspective of application, the procedure of deriving new technology ideas is systematically depicted from two layers, which act as a guideline for TOD, on which prior research rarely focuses. The proposed approach would show remarkable performance to discover numerous valuable technology ideas in the framework of MA.
As mentioned earlier, the proposed method could be utilized by government and industry to plan technology strategies because it can discover the potential technology opportunities based on existing patent documents. Patent analysis is employed actively in excavating the related technology information and relevant innovation algorithms for technology opportunity discovery. Thus, at the national level, a new technology idea derived by the proposed approach may accelerate the development of an emerging technology that requires government to formulate technology policy for economic growth. Based on the patent analysis, the basic and extended technological morphology matrix can be constructed to visualize the technology. When the technology is decomposed into several dimensions and new potential values are developed widely through innovation algorithms, MA as a method to structure a problem is effective to avoid legal disputes over existing patents between developers competing around the world. The hybrid approach uses innovation algorithms instead of technological content to extend the morphology matrix, thus, this approach guides a path for knowledge transfer by combining knowledge from the aspects that were undetected previously in a practical way. At the firm level, under the circumstances of increasing technology complexity, growing technology convergence, and segmented technological knowledge, the direction for TOD can help create a competitive strategy for R&D planning, especially for SMEs to gain the lead position preferentially in emerging markets by clarifying technological performance efficiently. Key information is identified for new technology opportunities that may hold great business value for companies from ambiguous patent data by automated approaches. Considering the R&D cost, this hybrid approach provides a systematic way to utilize the common patent data to analyze the complex technology systems and further pursue innovation. Although the procedure of clarifying technological performance is slightly complex to perform, experts’ participation has been reduced, and the obtained innovation paths are clearly presented, which will decrease the R&D cost.
This study still has some limitations. First, new technology ideas are derived at a theoretical level. The system for assessing each idea’s value is defective, which cuts the efficiency of discovering feasible technology opportunities from new derived ideas. Because TOD should concentrate on opportunities and the strategic use of information in terms of objects and activity [8], the link between opportunities and the use of strategy is not so explicit in this study. Second, five types of innovation algorithms were defined in this paper to further simplify the use of USIT and extend the morphology matrix. However, because they were clustered by the frequency of keywords, the results might be inappropriate for providing a generalized system of innovation algorithms. Third, bibliometric analysis is only performed by semantic similarity analysis, which might hinder it from clarifying the overall technological characteristics. The procedure to process documents is also complex compared to other improved text mining methods. This study endeavored to minimize the subjective opinions and the effort or time cost of humans with a computerized approach, but expert opinions are additionally required with the goal of analyzing and reflecting practical opinions more accurately.
Therefore, future research can focus on the following three aspects. First, an effective value assessment system needs to be generated for new technology opportunities, which can be utilized to systematize the procedure of screening feasible technology opportunities. Moreover, a generalized insight of the concepts reorganized from USIT could be further defined to explore the deep link of innovation algorithms. Third, integration with other bibliometric techniques, such as LDA [56], based on both word frequency and semantic information can distribute the topics comprehensively, and an a-priori algorithm based on the mining associate rule can also be considered to reduce the iteration times with high accuracy [58,59].

Supplementary Materials

Author Contributions

Conceptualization, Z.L.; Formal analysis, L.F.; Methodology, Z.L.; Project administration, L.F.; Resources, Y.N. and K.Z.; Supervision, L.F. and J.W.; Writing–original draft, Y.N.; Writing–review & editing, Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Innovation Method Fund of China with grant number 2018IM020300; Humanities and Social Sciences Foundation of Ministry of Education in China with grant number 17YJC630091; and Key Program of National Natural Science Foundation of China with grant number U1904210-4.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Appendix A

Table A1. Result of word vectors.
Table A1. Result of word vectors.
WordWord Vector
acetylene0.0034−0.06070.170.05530.00270.32410.3676−0.23030.79570.1951
acidification−0.169−0.10930.0163−0.1393−0.16930.44660.45990.22440.66870.0517
acoustic−0.13270.20770.34720.19770.09270.25070.451−0.16210.62820.2897
activated0.2448−0.0505−0.1649−0.6505−0.0880.23790.35320.50380.18980.0911
additive0.139−0.1714−0.11240.0959−0.30010.08790.56080.38820.6042−0.039
adhesive−0.19470.2590.4324−0.0583−0.16280.3660.42250.16280.41270.4109
adsorption0.2739−0.114−0.588−0.05590.21950.29440.08240.18070.6134−0.1125
air0.0855−0.09820.22440.54380.11650.6556−0.2691−0.09520.24180.2316
airflow0.01920.08050.41150.1163−0.41980.43850.52230.01030.40840.0452
airway−0.2755−0.03290.31220.06640.18060.54790.2493−0.11850.52010.3765
alcohol0.0835−0.064−0.10140.1152−0.0960.37160.4587−0.12530.713−0.2892
alternate−0.1559−0.0781−0.18240.0237−0.11760.48190.40540.63680.2584−0.2303
aluminum−0.25720.20630.26250.0092−0.01540.46110.3955−0.01380.5550.3805
anisotropy0.2066−0.40650.1957−0.6738−0.04090.135−0.08530.31940.3712−0.1812
annular−0.00450.27280.08270.2042−0.29210.42360.18820.0144−0.00010.7594
anthracite−0.3012−0.3888−0.0134−0.08390.0960.37450.42760.02070.6441−0.0569
aperture−0.48150.33650.5692−0.0359−0.00540.0574−0.0886−0.11750.33020.4423
arrow0.2960.11810.27190.10570.02620.36460.5707−0.46640.363−0.0688
attenuation−0.0803−0.11930.0843−0.1167−0.00430.32510.47040.1420.76360.1686
axial−0.08510.19790.8140.18940.02770.140.2131−0.04310.27590.3337
azimuth−0.27250.04490.4797−0.2191−0.06640.29870.56810.03850.47680.0182
ball−0.06240.02860.0465−0.00620.05480.53110.5232−0.14780.40730.4966
band−0.0866−0.33210.3299−0.0407−0.0620.47960.38550.18030.5973−0.0011
bedrock−0.35710.2780.3983−0.0560.08290.57760.1340.2779−0.02390.4441
bituminous−0.2297−0.28820.3709−0.1997−0.48840.6124−0.0809−0.04610.18590.1729
bitumite−0.3436−0.13750.42−0.3099−0.2630.33350.37160.11580.43750.2595
blast−0.2841−0.05810.2834−0.3467−0.24960.30860.58150.25510.01460.393
booster−0.06940.4243−0.39960.26780.25830.37730.2764−0.07990.18170.5088
borehole−0.101−0.23370.19780.5052−0.55960.47710.1148−0.17960.1744−0.1556
breathable−0.2067−0.2623−0.04240.00960.14250.79550.13590.36770.0110.2824
briquette0.09040.08240.1873−0.4756−0.02020.63520.12150.29470.41890.207
bubble0.1694−0.1322−0.08340.1749−0.38340.38350.37360.37250.52480.2618
buckling−0.00860.3038−0.0483−0.1571−0.04390.38310.3924−0.36850.15680.6462
butt−0.714−0.0240.4785−0.0451−0.04710.17250.2714−0.3375−0.15450.1236
carbon0.14350.0945−0.38960.4205−0.2790.37720.3986−0.17180.4191−0.2402
carbonaceous0.0240.0676−0.09020.042−0.26050.51550.50740.00280.5704−0.2618
cavitation−0.29890.10550.0431−0.0907−0.02790.17950.69120.37690.44150.2044
centrifugal0.05890.6556−0.23510.01830.10230.19180.42560.31630.38530.185
chloride−0.12130.1707−0.0811−0.1157−0.16850.37480.69770.24410.46840.0392
circular−0.13070.3490.2209−0.035−0.14150.55320.57840.12340.28420.2334
circulation−0.26890.38230.28630.29690.05090.0420.38990.41950.32740.4146
circumferential−0.25660.32450.7135−0.00030.0420.01830.2694−0.06780.41370.2634
coalbed−0.2497−0.4257−0.09720.41110.0470.32350.3182−0.05550.1598−0.5842
coiled−0.22920.46240.36950.14170.21220.22390.35960.39180.25660.3651
coke−0.02370.0734−0.02570.1307−0.41430.5980.21370.07750.62490.0698
columnar−0.3937−0.32890.4007−0.3974−0.15410.2784−0.0468−0.1842−0.13080.5136
compression−0.03020.1839−0.3830.59460.06360.59250.1082−0.03050.23550.2046
condensation−0.2205−0.03860.04940.139−0.1010.54750.51840.15720.48950.2917
conductivity−0.0839−0.3109−0.59710.1149−0.26190.09790.5345−0.17660.20910.2962
cone−0.12880.33540.3413−0.31310.04820.50690.43180.02850.27380.3673
cooler−0.03350.3042−0.3810.23280.29860.42650.37510.46240.07240.276
cubic−0.1884−0.21110.1101−0.109−0.13570.20590.0937−0.34120.82090.1898
curve−0.12170.0080.4405−0.1955−0.27250.36160.4088−0.25340.55150.1112
cylindrical−0.2230.1516−0.17190.01840.10750.42190.63710.21080.49850.0946
decarbonization−0.27960.0107−0.40260.2265−0.4490.24720.548−0.02020.37760.0489
depressurization−0.2908−0.1511−0.07760.05660.11990.40620.52190.53290.3762−0.0782
desorption0.1284−0.3198−0.59350.10160.18640.2136−0.01230.41290.51210.0741
destroyed−0.14720.13610.1386−0.3705−0.06310.34330.36650.13710.58550.4307
detonate−0.1831−0.4661−0.0956−0.1164−0.20080.21670.43270.45310.4269−0.2539
dioxide0.2730.1179−0.40370.4273−0.25430.32150.5236−0.02180.2919−0.1951
directional0.0034−0.13080.83160.218−0.29910.13920.3165−0.15040.02960.1061
`disc−0.5957−0.35570.43710.03510.059−0.3309−0.13420.00920.43850.055
downhole−0.2528−0.21970.5630.0563−0.06640.26030.6296−0.2653−0.12990.1087
downward−0.1765−0.190.48480.313−0.20410.3280.3591−0.0637−0.00550.5634
drilling−0.093−0.330.70610.33570.15280.28930.2270.1748−0.19440.2103
electromagnetic−0.28560.4824−0.31940.26240.27740.3630.2372−0.1010.38070.3079
ethylene−0.05570.0971−0.06750.1100.31330.4187−0.1780.81580.0093
ether−0.24420.0340.0634−0.09470.01080.4750.53390.05750.6260.1424
fiberglass−0.3330.21150.1881−0.21880.3340.48450.36770.2350.32990.34
fiber−0.49150.15750.3408−0.3905−0.10770.22380.3452−0.01740.08280.5263
fire0.0008−0.0559−0.19060.1199−0.58590.4798−0.0067−0.33070.4617−0.224
flooding−0.3050.08460.1150.2174−0.29340.2950.64810.19570.41860.1805
foam−0.04740.0395−0.10270.2816−0.25180.53780.54390.40010.2334−0.2081
fracturing−0.457−0.05680.15490.1549−0.57330.17220.17710.5878−0.0087−0.0684
gel0.04390.1972−0.23740.0339−0.19550.49280.45880.41390.46710.1434
geostress−0.0006−0.260.2581−0.1824−0.12250.30610.41020.04440.73570.1108
gradient−0.1823−0.25330.34940.17560.17720.26480.1986−0.3260.66480.2461
granular−0.05130.22290.272−0.2662−0.13030.37930.55340.16790.47390.288
groove0.080.19440.7826−0.0332−0.00510.33360.32380.02650.14230.3242
ground−0.4865−0.50950.08950.46130.29150.11360.1413−0.1832−0.10640.3467
gum−0.05760.08170.1395−0.1485−0.35710.32520.6580.38640.36050.055
hole−0.0211−0.14570.75960.46740.10110.28350.05810.17650.04240.2365
horizontal−0.7463−0.1950.41520.2287−0.28310.21760.0744−0.2114−0.02740.0433
hydraulic−0.27190.00720.2748−0.0666−0.28270.07680.41060.7417−0.16570.119
hydrocarbon−0.12460.11970.0661−0.1003−0.05130.33850.4504−0.12960.72610.3027
hydrofracture−0.2869−0.08370.02950.07750.0210.11910.66870.26670.6089−0.0082
hydrogen0.01580.0097−0.04490.1065−0.10790.35190.6627−0.10310.63230.035
inclination−0.6011−0.10760.46640.0486−0.37260.02480.2788−0.39110.0380.1886
infrared−0.3750.2825−0.6345−0.0038−0.07460.31130.3346−0.00860.31550.2511
laser−0.38460.1120.117−0.24650.24020.29740.54960.19440.49460.1857
lateral−0.35560.28010.6879−0.280.03410.02160.36760.04910.29560.1299
linear−0.15680.00560.1535−0.1369−0.06690.35520.51540.05950.72590.0798
longitudinal−0.3997−0.14280.4850.0713−0.30670.46660.3529−0.08290.35740.0932
magnetic−0.19910.3929−0.34260.06330.13990.3150.3957−0.00470.57840.2732
material0.00260.1032−0.2465−0.34260.37040.46540.34760.2270.3729−0.3822
melted−0.2173−0.0667−0.0229−0.0302−0.03910.51810.51320.16030.61540.0955
metal−0.0973−0.25050.41790.0207−0.2584−0.0063−0.1938−0.4180.54360.4221
methane−0.0278−0.3989−0.30580.39530.0180.19590.1522−0.38870.4976−0.3601
micropores−0.0205−0.03590.1094−0.38330.05580.14010.4891−0.11280.65640.366
microwave−0.25620.5107−0.36430.09870.26540.04330.38390.33450.22350.3867
molten−0.2837−0.08390.19960.12790.11010.59550.4390.33380.430.0245
motor0.02180.5108−0.51180.05740.27070.2010.369−0.18930.37030.2249
multilateral−0.423−0.08220.57820.1328−0.25980.31060.4694−0.13390.2397−0.0525
nitrogen0.09240.1064−0.33420.4512−0.15580.44030.24160.4830.3286−0.2169
oblique−0.2805−0.26980.4762−0.0131−0.02340.43520.3847−0.15650.3410.3778
opposite0.00070.15250.5856−0.0497−0.13040.28210.3763−0.44990.29260.3243
orientation−0.4253−0.00320.52−0.1327−0.04640.34240.60570.09710.16410.092
orthogonal−0.3698−0.27570.5686−0.1212−0.00750.29110.4901−0.19070.25820.1454
outer−0.25750.38720.5269−0.01270.44920.00260.03070.0050.34560.4288
overheat−0.0214−0.2382−0.22050.0997−0.3290.48280.61390.24830.3132−0.0791
overtemperature−0.3240.0955−0.0013−0.4116−0.05980.34090.21750.14410.72520.0526
oxygen0.28680.0635−0.18370.3868−0.0430.39970.1787−0.18040.6431−0.301
parallel−0.01730.04430.74770.30040.26180.34960.1964−0.20070.16090.2303
perforation−0.10170.30980.41490.1574−0.1950.30170.31980.3209−0.10750.5924
permeability0.2146−0.653−0.0062−0.213−0.05520.2766−0.05680.43030.4372−0.1517
perpendicular−0.3059−0.22020.58660.3019−0.14370.39890.238−0.16970.00620.3966
pillar−0.4998−0.28070.3408−0.29840.06640.224−0.1666−0.45590.23120.3501
pinnate−0.49180.0650.3750.2637−0.3776−0.06190.0515−0.6102−0.0979−0.1129
plastic−0.40910.03940.3305−0.5107−0.16540.13510.33920.14540.14940.5069
plate−0.0817−0.11330.2777−0.31470.20880.6315−0.33520.04980.13340.4788
plume−0.5402−0.32810.4477−0.0378−0.4392−0.3550.1271−0.1762−0.149−0.1016
polyurethane−0.43530.13240.32970.05280.12230.50720.1575−0.19320.26850.5245
pore0.2247−0.18010.1082−0.0597−0.32960.12140.3380.51050.57650.267
porosity0.1058−0.209−0.1295−0.0747−0.24290.32920.26530.3460.750.0537
potassium−0.08220.1381−0.0503−0.1285−0.16560.37510.69690.31830.4461−0.0309
powder0.2903−0.1764−0.1047−0.132−0.27820.51340.44030.45790.3237−0.0832
pressurization0.3307−0.166−0.19710.06940.21490.3726−0.2589−0.03070.51640.5475
pulse−0.21090.4211−0.59740.2788−0.17340.00610.37670.27260.15070.273
pulverized−0.03250.1263−0.05950.0456−0.17520.4930.56340.0630.58520.1993
punching0.03760.0480.52690.118−0.18790.45630.28140.46360.24620.3265
pyrolysis0.0633−0.3822−0.37720.3825−0.1490.43090.31710.13910.3793−0.2995
quartz0.24330.48790.0013−0.21−0.36570.24080.66370.13730.0250.0831
radial−0.09150.20280.730.1484−0.28260.1990.4980.1288−0.08040.0719
reaming−0.32030.16030.645−0.1836−0.18170.21790.52060.2234−0.09030.1117
rectangular−0.25010.3831−0.01060.13660.01540.29410.5477−0.11880.3840.4729
redrill0.3368−0.0037−0.08770.165−0.3330.27380.18150.05880.60450.5137
repeated0.00580.26180.0732−0.00490.22450.5714−0.00830.63720.2794−0.2548
reservoir0.1237−0.6497−0.191−0.3856−0.0770.232−0.10840.35420.4030.1343
resin−0.22570.22490.3825−0.0237−0.24240.34570.54960.02420.22520.4689
reverse0.02110.29320.28030.1188−0.30.41750.5767−0.07750.45430.1082
rheologic0.0034−0.27720.1131−0.2845−0.24410.26560.2986−0.07290.66860.3973
rotary0.27640.2771−0.34670.09520.0190.12990.52880.14540.28980.5618
round−0.31370.29650.28570.00140.24640.4690.37680.03040.34160.4379
rubber−0.43480.52310.22510.1772−0.02740.26840.1913−0.02210.13570.5718
segmented−0.58160.23320.3372−0.0363−0.51780.15770.26220.30980.09950.1572
spherical−0.25750.1790.0945−0.170.02590.36880.6294−0.1270.26290.4957
spiral−0.36030.20390.1023−0.00530.07510.42390.4950.09430.49770.3622
steam−0.06440.093−0.40350.2933−0.2960.32850.38980.39980.47140.0947
steel−0.06020.43750.15150.27290.06520.28990.16−0.05660.06710.7655
stepped−0.31410.0990.17250.09070.20170.7438−0.1250.3426−0.1201−0.3349
stope−0.18720.1359−0.04890.50080.32590.008−0.21630.2150.67010.2123
straight−0.6049−0.25520.27850.2472−0.28480.24790.357−0.0988−0.32510.2116
supercritical−0.05110.2135−0.37470.2923−0.33340.43610.04760.14980.57760.2574
superheated−0.00850.0801−0.4560.321−0.24320.5360.34360.29160.34020.1314
sur−0.2994−0.11560.0038−0.09830.05120.53060.46840.09090.59930.1276
thawing−0.2260.07620.1061−0.1192−0.09360.33380.49830.42910.59090.126
thermal−0.2896−0.0689−0.1578−0.0311−0.05210.48210.61960.38270.3371−0.0797
triangular−0.41850.23990.2413−0.09650.04450.27630.6237−0.01330.46320.1328
tubular−0.1930.31380.3796−0.1868−0.13790.35930.4854−0.0910.34560.417
tunnel−0.2339−0.51030.5671−0.01620.20280.38380.36740.09080.14490.1019
ultrasonic−0.28160.4042−0.33730.12250.1971−0.16210.54530.35480.1320.3504
underground−0.307−0.56640.13030.40870.34430.2960.35480.1203−0.1786−0.15
vapor0.12960.1094−0.40090.3259−0.11390.51280.450.19950.4303−0.0304
vertical−0.5552−0.44270.54470.2034−0.09160.19840.1424−0.0721−0.19060.2196
vibration0.0340.2926−0.0607−0.1451−0.24590.24410.47480.14750.55990.4558
waveguide−0.09760.65870.0130.1540.29660.27460.1964−0.13670.34380.4403
wellbore−0.0283−0.4565−0.03510.199−0.43220.31610.1825−0.36490.51640.1735

Appendix B

Table A2. Clustering results.
Table A2. Clustering results.
Cluster_ID012345671011
Wordouterelectromagneticpulsematerialmotormethanedownwardcarbonsteppedair
aperturewaveguideultrasonic magneticcoalbedtunneldioxiderepeated
rubberspiralmicrowave perpendicularoxygen
circumferential infrared obliquepyrolysis
polyurethane vapor
carbonaceous
alcohol
hydrogen
Cluster_ID12131617181920212223
Wordreservoirhorizontalsegmentedgroundcoolergeostressplaterotarycolumnarthermal
activatedverticalblast compressionband centrifugalpillarporosity
straightairflow orthogonal supercritical chloride
inclinationgum rheologic vibration thawing
buttquartz destroyed cavitation
downholelongitudinal potassium
pinnate attenuation
plume pulverized
condensation
melted
hydrocarbon molten
ether
acidification
linear
hydrofracture
overheat
breathable
gel
Cluster_ID24252627282930323334
Wordsteelpermeabilityboosteradsorptionwellboredrillingperforationfracturingpressurizationbriquette
annularpore desorptionethyleneholebedrockboreholestopereverse
oppositebubble conductivitycubicdirectional nitrogen orientation
lateral acetylenehydraulic fire ball
plastic radial alternate curve
fiber axial foam acoustic
circular circulation steam cylindrical
cone parallel superheated airway
buckling groove coke azimuth
spherical reaming decarbonization laser
tubular punching granular
aluminum
resin rectangular
coiled
round
adhesive
Cluster_ID35373839
Wordpowderdiscundergroundmetal
additive gradient
detonate

Appendix C

Table A3. List of USIT Operators.
Table A3. List of USIT Operators.
No.USIT OperatorsExplanationKeywords
1Object Pluralization MethodOperate on each Object to ‘Pluralize’ it. ‘Plural’, in the sense of the English language, means any number except 1; hence, 0, 2, 3, …, 1/2, 1/3, …, etc. Moreover, introduce a new/modified Object.pluralize, introduce,
1aEliminate the Object. (Simplification, Trimming)Eliminate the (subsidiary) Object in the system and reassign the Functions in the simplified system. Make it simpler and easier to understand the object’s inside principle and the reason why it happens.Eliminate, simplify, trim, reassign
1bMultiply the Object (into 2, 3, …, ∞).Multiply the Object into 2, 3, … and infinitely many, then modify the properties of the Objects (slightly or largely), and use them together.multiply
1cDivide the Object (into 1/2, 1/3, …, 1/ ∞).Divide the Object into multiple parts (1/2, 1/3, …, 1/∞), modify the parts (slightly, or differently for different parts), and combine them for using together in the system. Guidelines for the division:
- into mutually independent parts, to perform their own functions better
- easy to assemble/disassemble
- easy to replace/repair specific parts
- movable against one another
- to make the object or the system flexible
Divide the object into multiple separated parts to eliminate undesirable interference
Divide into much smaller parts and use them together.
- easy to handle/transfer
- to increase the surface area per weight and increase interaction
- more flexible
divide, combine, assemble, disassemble, replace, repair, movable, flexible, smaller, flexible
1dUnify multiple Objects into one.Combine multiple inter-related Objects in the system and turn them into one Object with unified structure and functionality.unify, combine, turn
1eIntroduce a new/modified Object.Modify the present Object in its properties or structure, or else introduce a new-type of Object having new properties and functionality, so as to achieve desirable effects and functionality.modify, introduce
1fIntroduce an Object from the Environment.Environment here means anything which is around the present system and is available easily and inexpensively. (Though this is pointed out in (1e) as the resource for obtaining an Object for modification and newly introduction, the use of the Environment is apt to be overlooked but important.) It can make the object more suitable for the system.introduce
1gReplace a solid Object with a powder/fluid/liquid/gaseous Object.Replace a solid Object in the system with powder Object, and further with fluid/liquid/gaseous Object, which may introduce characteristic properties such as fluidity, flexibility, operability, reactivity, etc. In relation to the replacement, a different kind of substance (or material) and a different mechanism of operation are often needed.
Note: This submethod (1g) may be regarded as an extension of submethod (1c) ‘division of Objects’, but is noted here because of the necessity of rather large change in the Object and in Functions.
replace, introduce, change, fluid, liquid, gaseous
2Attribute Dimensionality MethodEach Object (or substance) has different kinds of properties (where each category of properties is called ‘Attribute’); Thus, we consider to newly use/stop using/enhance/fully use such properties. Especially, it is important to distribute/vary useful properties in space (including the inner structure) and in time in an effective way. Improving the properties of the whole system is an important target, too.stop, distribute, vary, improve
2aDeactivate/make irrelevant the harmful Attribute.Find any harmful properties in the system, and do not use them/make them irrelevant/turn them harmless/turn them into useful properties in the system.deactive, irrelevant, turn
2bActivate/involve a new useful Attribute.In the Object present in the system, start utilizing the Attribute (properties) (which has not been used yet) or introduce a new Attribute by modifying the Object. Further, if appropriate, replace the present Object with a new Object (or material) having such a useful Attribute and introduce a new function (or Field) which make the new properties effective. There are different sorts of Attributes. Consider the following types of Attributes:introduce, modify, replace
2cEnhance the useful Attribute or suppress the harmful Attribute.Enhance the useful but insufficient Attribute or suppress the harmful/excessive Attribute. The same kinds of Attributes are handled as used in the previous submethod (2b).enhance, insufficient, suppress
2dIntroduce/enhance a spatial Attribute or distribute/vary in space a harmful/useful Attribute or Attribute’s value.Introduce or enhance an Attribute related to the space, or activate an Attribute (or vary the Attribute’s value) depending on different places in space (or different parts of an Object). Introduce or enhance an Attribute related to the space, or activate an Attribute (or vary the Attribute’s value) depending on different places in space (or different parts of an Object).
◎Introduce spatial order/structure:
H8 Order of objects, H9 Shape-change, H10 Change periodicity of a pattern, H13 Superpose/separate/differentiate objects
◎ Introduce a space-related Attribute:
P7 Nesting, P14 Spheroidality, P17 Another dimension
◎Introduce spatial structure or inner-structure of Object(s) and vary the Attribute (values) depending on different places
P3 Local quality, P40 Composites, S5-1 Introduction of substances under resticted conditions, T8 Increasing asymmetry, T9 Boundary breakdown
H10 Change periodicity of a pattern, H11 Symmetry, H12 Localize/delocalize the problem
◎ Introduce Attribute(s) related to the spatial motion of Object(s)
P13 Other way round, P15 DynamicityS2-2 Evolution of SFM, S2-4 Complex-forced SFMS, T10 Geometircal evolution (linear), T11 Geometric evolution (volumetric),T12Dynamization
introduce, enhance,
activate, vary, change, superpose, separate, differentiate
2eIntroduce/enhance a temporal Attribute or distribute/vary in time a harmful/useful Attribute or Attribute’s value.Introduce/enhance the temporal Attribute(s) related to the operational phases, duration of operations, time frequency, etc. of the system, and depending on such temporal conditions activate different Attributes or vary the values of the Attributes in time.introduce, enhance, activate, vary
2fChange the phase, utilize the phase change, or change the inner-structure of the Object.Change the phase (i.e., state of condensation) of Object(s), utilize the phase change, or introduce/change the inner structure at the micro level for using various Attributes thus activated/enhanced.change, introduce, micro level
2gUtilize Attributes/properties at the micro level.Consider/design the structure/properties/interactions of Object(s) at the micrometer or nanometer (or even smaller) scale, and solve the problem from the micro-level principles.micro level
2hImprove the properties/performance of the system as a whole.(Besides the Attributes and Functions of the Objects as the components of the system,) consider the properties (or Attributes) and Functions of the system as a whole and improve them by designing/implementing/improving the system and its components.improve
3Function Distribution MethodFor the purpose of achieving/improving the principal useful Function of the system, distribute/rearrange various useful Functions (and some harmful Functions subsequently appearing) among the Objects which are already present, modified, or newly introduced into the system. Various Functions need to be transferred, divided, unified, or introduced. It is necessary to distribute/vary the Functions in a suitable way in space and in time, and further for better working of the system it is the key to utilize higher-level Functions for adapting/controlling etc.distribute, rearrange, transfer, divide, unify, introduce, vary
3aReassign the Function to a different Object.Reassign (or transfer) the present Function to a more suitable different Object, which is already present or newly introduced in the system.reassign, transfer
3bDivide the compound/multiple Functions and assign them to different Objects or different parts of an Object.Divide the compound/multiple Functions present in the system and reassign the divided Functions to different Objects (already present or newly introduced) or different parts of Objects.divide, reassign
3cUnify multiple Functions and assign the unified Function to an Object.Unify multiple Functions of multiple Objects and assign the unified Function to one Object.unify, assign
3dIntroduce a new Function and assign it to an Object.In order to achieve the target of the system or to solve the problem, introduce a new Function and assign it to an Object either present/modified or newly introduced.introduce, assign
3eDistribute/vary the Function in space or utilize the spatial distribution/motion/vibration Function.Distribute/arrange the Function(s) in some spatial order/structure and increase the degree of spatial freedom. Utilize/enhance the spatial Function(s) of distributing/moving/vibrating the Object(s) (or the Attribute(s) of Object(s)).distribute, arrange, enhance,
3fDistribute/vary the Function in time.Set the time (or timing) of operation of the Function(s) in an appropriate way. Set the timing of operation of a Function, in the sense of time period of operation (such as triggering event, operational conditions, etc.), temporal variation in the long time range, and temporal variation in the short time range (e.g., in pulses, in cycles, frequency, etc.), and also set the timing of multiple Functions in the sense of the sequential order, the relative timing of operations, etc.distribute, vary
3gRealize the detection/measurement Function.Perform the detection/measurement Function as simply and quickly as possible (especially, make the detection/measurement itself unnecessary, if possible) and by using Attributes sensitive and accurate for detection/measurement. [See (3h) also.]detection, measurement,
3hIntroduce/enhance the adapting/coordination/control Function.Introduce/enhance Function(s) for adapting/coordinating/controlling the system and make the system higher and more intelligent.introduce, enhance, intelligent
3iAchieve the Function with a different physical principle.In place of the present Function (especially the one achieved by gravitational or mechanical principles), achieve the similar Function in a more effective and controllable way on the basis of a different physical principle.in place of
4Solution Combination MethodCombine multiple solutions (or multiple elements of solutions) in various ways (such as functionally, spatially, temporally, structurally, at the principle level, etc.) so as to form a new solution which enhances the strong points, complements the drawbacks, and overcomes the contradictions. Also solve the problem by transferring to the super-system level.combine, enhance, transfer, complement
4aCombine solutions functionally.Combine multiple solutions by linking their Functions. Especially, combine multiple solutions by linking Functions which are related in causal relationships or by combining Functions which are complementary or contrary with one another.combine
4bCombine solutions spatially.Combine multiple solutions in respect to the spatial positions to apply; for instance, at different places (for avoiding the mutual interference), at distributed places, side by side, in front and back (in sequence), on top and bottom, at the same place alternatively, inside of the other, as an inner-structure of the other, etc.combine, apply
4cCombine solutions temporally.Combine multiple solutions in respect to time to apply; for instance, in sequence (one after another), beforehand of the other, simultaneously (in parallel), afterwards of the other, in the reverse order, alternatively, in pulses, periodically, from time to time, interrupting/switching corresponding to the situations, etc.combine, apply, interrupt, switch
4dCombine solutions structurally.Combine multiple solutions by forming a (hierarchical) functional structure in such a way that the solutions are performed alternatively under different conditions or performed at different levels.combine
4eCombine solutions at the principle level.Combine multiple solutions based on different principles and form a solution in various ways; for instance, as a temporary solution in the transient stage, in a hybrid system, in a compromise, to back-up the other, to perform on a background of the other, etc.combine
4fCombine solutions at the super-system level.Consider the higher-level purpose or principal function which should be performed by the system in the problem and solve the current problem by combining/coordinating the present system with the neighboring system(s) and forming/improving the higher-level system (i.e., the super-system).combine, coordinate, improve
5Solution Generalization MethodRepresent a solution in a more general way, form a solution template, and obtain concepts of solutions in the associative manner. Also generate a hierarchical system of solutions.hierarchical, generalize
5aGeneralize/specify the solution for associative thinking.Replace the technical/specific terms in a solution with plain/generic terms, form a plain solution template, and then obtain new specific conceptual solutions in an associative way. By making the word more familiar to ordinary people, who are not specialist, the system becomes easier for common people to learn well and quicker to get the satisfactory answers.replace, generalize
5bConstruct a hierarchical system of solutions.Classify a number of solutions obtained so far, make a hierarchical system of solutions with respect to the levels of generalization, consider the overall view of the solution space, and try a comprehensive search of solutions.hierarchical, classify

Appendix D

Table A4. Result of improved USIT keywords.
Table A4. Result of improved USIT keywords.
USIT KeywordsFrequencyUSIT Keywords (Improved)USIT KeywordsFrequencyUSIT Keywords (Improved)USIT KeywordsFrequencyUSIT Keywords (Improved)
connect9126connectsimpl823simplifyintegr456integrate
liquid2807liquidassembl754assembleplac439place
sep2599separategroup688groupchang409change
arrang1529arrangeact608activatecombin351combine
improv1301improveenviron570environmentsmal343smaller
fluid1300fluidmov568movableaddit335addition
meas1149measurementapply555applyintroduc322introduce
detect1125detectionlevel520levelstop281stop
mod1038modifyswitch476switchflex257flexible
joint1007jointdistribut474distributevary224vary
divid216divide

References

  1. Song, K.; Kim, K.S.; Lee, S. Discovering new technology opportunities based on patents: Text-mining and F-term analysis. Technovation 2017, 60–61, 1–14. [Google Scholar] [CrossRef]
  2. Kim, B.; Gazzola, G.; Lee, J.M.; Kim, D.; Kim, K.; Jeong, M.K. Inter-cluster connectivity analysis for technology opportunity discovery. Scientometrics 2014, 98, 1811–1825. [Google Scholar] [CrossRef]
  3. Olsson, O. Technological opportunity and growth. J. Econ. Growth 2005, 10, 35–57. [Google Scholar] [CrossRef]
  4. Lee, J.; Kim, C.; Shin, J. Technology opportunity discovery to R&D planning: Key technological performance analysis. Technol. Forecast. Soc. Chang. 2017, 119, 53–63. [Google Scholar] [CrossRef]
  5. Yoon, B.; Park, I.; Coh, B.-Y. Exploring technological opportunities by linking technology and products: Application of morphology analysis and text mining. Technol. Forecast. Soc. Chang. 2014, 86, 287–303. [Google Scholar] [CrossRef]
  6. Zhu, D.; Porter, A.L.; Porter, A.L. Automated extraction and visualization of information for technological intelligence and forecasting. Technol. Forecast. Soc. Chang. 2002, 69, 495–506. [Google Scholar] [CrossRef]
  7. Yoon, J.; Park, H.; Seo, W.; Lee, J.M.; Coh, B.-Y.; Kim, J. Technology opportunity discovery (TOD) from existing technologies and products: A function-based TOD framework. Technol. Forecast. Soc. Chang. 2015, 100, 153–167. [Google Scholar] [CrossRef]
  8. Park, I.; Yoon, B. Technological opportunity discovery for technological convergence based on the prediction of technology knowledge flow in a citation network. J. Informetr. 2018, 12, 1199–1222. [Google Scholar] [CrossRef]
  9. Morris, S.; DeYong, C.; Wu, Z.; Salman, S.; Yemenu, D. DIVA: A visualization system for exploring document databases for technology forecasting. Comput. Ind. Eng. 2002, 43, 841–862. [Google Scholar] [CrossRef]
  10. Boon, B.; Park, Y. A systematic approach for identifying technology opportunities: Keyword-based morphology analysis. Technol. Forecast. Soc. Chang. 2005, 72, 145–160. [Google Scholar] [CrossRef]
  11. Mann, D.L. Better technology forecasting using systematic innovation methods. Technol. Forecast. Soc. Chang. 2003, 70, 779–795. [Google Scholar] [CrossRef]
  12. Lee, S.; Yoon, B.; Park, Y. An approach to discovering new technology opportunities: Keyword-based patent map approach. Technovation 2009, 29, 481–497. [Google Scholar] [CrossRef]
  13. Jeong, Y.; Yoon, B. Development of patent roadmap based on technology roadmap by analyzing patterns of patent development. Technovation 2015, 39–40, 37–52. [Google Scholar] [CrossRef]
  14. Lee, C.; Kang, B.; Shin, J. Novelty-focused patent mapping for technology opportunity analysis. Technol. Forecast. Soc. Chang. 2015, 90, 355–365. [Google Scholar] [CrossRef]
  15. Geum, Y.; Park, Y. How to generate creative ideas for innovation: A hybrid approach of WordNet and morphological analysis. Technol. Forecast. Soc. Chang. 2016, 111, 176–187. [Google Scholar] [CrossRef]
  16. Noh, H.; Song, Y.K.; Lee, S. Identifying emerging core technologies for the future: Case study of patents published by leading telecommunication organizations. Telecomm. Policy 2016, 40, 956–970. [Google Scholar] [CrossRef]
  17. Lee, C.; Jeon, J.; Park, Y. Monitoring trends of technological changes based on the dynamic patent lattice: A modified formal concept analysis approach. Technol. Forecast. Soc. Chang. 2011, 78, 690–702. [Google Scholar] [CrossRef]
  18. Cho, J.; Lee, J. Development of a new technology product evaluation model for assessing commercialization opportunities using Delphi method and fuzzy AHP approach. Expert. Syst. Appl. 2013, 40, 5314–5330. [Google Scholar] [CrossRef]
  19. Lee, S.; Kim, W.; Kim, Y.M.; Lee, H.Y.; Oh, K.J. The prioritization and verification of IT emerging technologies using an analytic hierarchy process and cluster analysis. Technol. Forecast. Soc. Chang. 2014, 87, 292–304. [Google Scholar] [CrossRef]
  20. Lim, C.; Yun, D.; Park, I.; Yoon, B. A systematic approach for new technology development by using a biomimicry-based TRIZ contradiction matrix. Creat. Innov. Manag. 2018, 27, 414–430. [Google Scholar] [CrossRef]
  21. Kwon, H.; Park, Y.; Geum, Y. Toward data-driven idea generation: Application of Wikipedia to morphological analysis. Technol. Forecast. Soc. Chang. 2018, 132, 56–80. [Google Scholar] [CrossRef]
  22. Kim, K.; Park, K.; Lee, S. Investigating technology opportunities: The use of SAOx analysis. Scientometrics 2019, 118, 45–70. [Google Scholar] [CrossRef]
  23. Chang, H.T.; Chen, J.L. The conflict-problem-solving CAD software integrating TRIZ into eco-innovation. Adv. Eng. Softw. 2004, 35, 553–566. [Google Scholar] [CrossRef]
  24. Nakagawa, T. Education and training of creative problem solving thinking with TRIZ/USIT. Procedia Eng. 2011, 9, 582–595. [Google Scholar] [CrossRef] [Green Version]
  25. Yoon, B.; Phaal, R.; Probert, D. Morphology analysis for technology roadmapping: Application of text mining. R D Manag. 2008, 38, 51–68. [Google Scholar] [CrossRef]
  26. Wissema, G. Morphological analysis: its application to a company TF investigation. Futures 1942, 8, 146–153. [Google Scholar] [CrossRef]
  27. Silin, D.; Patzek, T. Pore space morphology analysis using maximal inscribed spheres. Phys. A Stat. Mech. Appl. 2006, 371, 336–360. [Google Scholar] [CrossRef]
  28. Belaziz, M.; Bouras, A.; Brun, J.M. Morphological analysis for product design. Comput. Aided. Des. 2000, 32, 377–388. [Google Scholar] [CrossRef]
  29. Geum, Y.; Jeon, H.; Lee, H. Developing new smart services using integrated morphological analysis: Integration of the market-pull and technology-push approach. Serv. Bus. 2016, 10, 531–555. [Google Scholar] [CrossRef]
  30. Yoon, B.; Park, Y. Development of new technology forecasting algorithm: Hybrid approach for morphology analysis and conjoint analysis of patent information. IEEE Trans. Eng. Manag. 2007, 54, 588–599. [Google Scholar] [CrossRef]
  31. Im, K.; Cho, H. A systematic approach for developing a new business model using morphological analysis and integrated fuzzy approach. Expert Syst. Appl. 2013, 40, 4463–4477. [Google Scholar] [CrossRef]
  32. Yoon, B.; Magee, C.L. Exploring technology opportunities by visualizing patent information based on generative topographic mapping and link prediction. Technol. Forecast. Soc. Chang. 2018, 132, 105–117. [Google Scholar] [CrossRef]
  33. Ritchey, T. Problem structuring using computer-aided morphological analysis. J. Oper. Res. Soc. 2006, 57, 792–801. [Google Scholar] [CrossRef]
  34. Sickafus, E.N. Unified Structured Inventive Thinking—How to Invent, 1st ed.; Ntelleck: Grosse Ile, MI, USA, 1997; pp. 43–82. ISBN 0-9659435-0-X. [Google Scholar]
  35. Nakagawa, T. A New Paradigm for Creative Problem Solving: Six-Box Scheme in USIT. In Proceedings of the ETRIA TRIZ Future 2006, Kortrijk, Belgium, 6–8 October 2006. [Google Scholar]
  36. Nakagawa, T.; Kosha, H.; Mihara, Y. Reorganizing TRIZ Solution Generation Methods into Simple Five in USIT. In Proceedings of the ETRIA World Conference, TRIZ Future 2002, Strasbourg, France, 6–8 November 2002; pp. 333–345. [Google Scholar]
  37. Jupp, M.L.; Campean, I.F.; Travcenko, J. Application of TRIZ to develop an in-service diagnostic system for a synchronous belt transmission for automotive application. Procedia CIRP 2013, 11, 114–119. [Google Scholar] [CrossRef] [Green Version]
  38. Schöfer, M.; Maranzana, N.; Aoussat, A.; Gazo, C.; Bersano, G. The value of TRIZ and its derivatives for interdisciplinary group problem solving. Procedia Eng. 2015, 131, 672–681. [Google Scholar] [CrossRef] [Green Version]
  39. Asche, G. “80% of technical information found only in patents”—Is there proof of this? World Pat. Inf. 2017, 48, 16–28. [Google Scholar] [CrossRef]
  40. Lee, C.; Lee, G. Technology opportunity analysis based on recombinant search: Patent landscape analysis for idea generation. Scientometrics 2019, 121, 603–632. [Google Scholar] [CrossRef]
  41. Aldieri, L.; Kotsemir, M.; Vinci, C.P. The role of environmental innovation through the technological proximity in the implementation of the sustainable development. Bus. Strateg. Environ. 2019, 28, 1–10. [Google Scholar] [CrossRef]
  42. Liu, Z.; Feng, J.; Wang, J. Effects of the sharing economy on sequential innovation products. Complexity 2019, 3, 1–18. [Google Scholar] [CrossRef]
  43. Liu, Z.; Feng, J.; Liu, B. Pricing and service level decisions under a sharing product and consumers’ variety-seeking behavior. Sustainability 2018, 11, 6951. [Google Scholar] [CrossRef] [Green Version]
  44. Frigyesi, V.; Laget, P.; Boden, M. Exploitation of patent information in R&D output analysis for policymaking. Scientometrics 2019, 121, 1717–1736. [Google Scholar]
  45. Kim, J.; Lee, C. Novelty-focused weak signal detection in futuristic data: Assessing the rarity and paradigm unrelatedness of signals. Technol. Forecast. Soc. Chang. 2017, 120, 59–76. [Google Scholar] [CrossRef]
  46. Mun, C.; Yoon, S.; Park, H. Structural decomposition of technological domain using patent co-classification and classification hierarchy. Scientometrics 2019, 121, 633–652. [Google Scholar] [CrossRef]
  47. Aaldering, L.J.; Song, C.H. Tracing the technological development trajectory in post-lithium-ion battery technologies: A patent-based approach. J. Clean. Prod. 2019, 241, 118343. [Google Scholar] [CrossRef]
  48. Breitzman, A.; Thomas, P. The Emerging Clusters Model: A tool for identifying emerging technologies across multiple patent systems. Res. Policy 2015, 44, 195–205. [Google Scholar] [CrossRef]
  49. Choi, J.; Hwang, Y.S. Patent keyword network analysis for improving technology development efficiency. Technol. Forecast. Soc. Chang. 2014, 83, 170–182. [Google Scholar] [CrossRef]
  50. Zhou, X.; Huang, L.; Zhang, Y.; Yu, M. A hybrid approach to detecting technological recombination based on text mining and patent network analysis. Scientometrics 2019, 121, 699–737. [Google Scholar] [CrossRef]
  51. Schellner, I. Japanese file index classification and F-terms. World Pat. Inf. 2002, 24, 197–201. [Google Scholar] [CrossRef]
  52. Zhang, D.; Xu, H.; Su, Z.; Xu, Y. Chinese comments sentiment classification based on word2vec and SVMperf. Expert Syst. Appl. 2015, 42, 1857–1863. [Google Scholar] [CrossRef]
  53. Mikolov, T.; Chen, K.; Corrado, G.; Dean, J. Efficient Estimation of Word Representations in Vector Space. 2013. Available online: http://arxiv.org/abs/1301.3781 (accessed on 7 September 2013).
  54. Hu, K.; Wu, H.; Qi, K.; Yu, J.; Yang, S.; Yu, T.; Zheng, J.; Liu, B. A domain keyword analysis approach extending term frequency-keyword active index with Google Word2Vec model. Scientometrics 2018, 114, 1031–1068. [Google Scholar] [CrossRef]
  55. Karen, S.J. A statistical interpretation of term specificity and its application in retrieval. J. Doc. 1972, 28, 11–21. [Google Scholar]
  56. Kim, D.; Seo, D.; Cho, S.; Kang, P. Multi-co-training for document classification using various document representations: TF–IDF, LDA, and Doc2Vec. Inf. Sci. 2019, 477, 15–29. [Google Scholar] [CrossRef]
  57. Robertson, S. Understanding inverse document frequency: On theoretical arguments for IDF. J. Doc. 2004, 60, 503–520. [Google Scholar] [CrossRef] [Green Version]
  58. Serial, T.H.E. 2 Algorithm. Knowl. Creat Diffus. Util. 1996, 8, 962–969. [Google Scholar]
  59. Ji, X.; Tong, W.; Ning, B.; Ji, X.; Tong, W.; Ning, B.; Mason, C.E.; Kreil, D.P.; Labaj, P.P.; Chen, G.; et al. QuaPra: Efficient transcript assembly and quantification using quadratic programming with Apriori algorithm. Sci. China Life Sci. 2019, 62, 937–946. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Research framework.
Figure 1. Research framework.
Sustainability 12 00136 g001
Figure 2. Co-occurrence network: semantic distances between keywords in CBM extraction technology.
Figure 2. Co-occurrence network: semantic distances between keywords in CBM extraction technology.
Sustainability 12 00136 g002
Table 1. Basic structure of the F-term.
Table 1. Basic structure of the F-term.
Theme code2D129 (Earth drilling)
View pointfigure
AA (Object to be drilled)01 (Underwater)02 (starting from ground)03 (Slopes or inclines)
04 (Rock)05 (Cobblestone or boulder stone layers)06 (Concretes)
AB (Use)01 (Oil or gas well drilling)02 (Water wells or hot springs)04 (Shafts)
05 (Tunnels)06 (Pipe burying)07 (Drainage holes)
Table 2. Basic morphology matrix of coalbed methane (CBM) extraction technology
Table 2. Basic morphology matrix of coalbed methane (CBM) extraction technology
DimensionSub-dimensionValue
MechanismEarth drilling method (2D129BB00)reverse circulation, spiral, bottom expansion, underground continuous, deep mixing, redrill, repeated, stope
Percussion generation mechanism (2D129DB00)fluid pressure, steam, engine detonation, ultrasonic, centrifugal, airflow, cavitation, microwave
Explosion (2D129AB13 Blasting holes 2D129AB14 Rock crushing)blast, booster, crushing, crack, detonate, detonator, pulse
SpaceLocation of the object to be drilled (2D129AA00)ground, coal reservoir, surrounding rock, underground, underwater, inclination, bedrock, borehole
Hole shape (2D129AC00)circular, square, stepped, micropores, multilateral, rectangular, spherical, triangular
Shapes of wear-resisting members (2D129GB01)spherical, disc, rod, plate, annular, columnar, cone, cubic
MaterialWear-resisting members materials (2D129GB06)metal, ceramic, steel
Insulating materials (2D065JJ02)rubber, resin, polyurethane, fibreglass, quartz
Table 3. International patent classes (IPC) and paralleled F-term of coalbed methane (CBM) extraction technology.
Table 3. International patent classes (IPC) and paralleled F-term of coalbed methane (CBM) extraction technology.
NO.IPCNo.RatioF-TermDescription
1E21B79655.78%2D129Earth drilling
2E21F16811.77%2D062Tunnel ventilation and safety equipment, and transportation
3B01D1057.36%4D011Degasification and air bubble elimination
4E21C684.77%2D065Drilling and exploitation, and mining machines and methods
5G01N533.71%2G052Sampling and sample adjustment
6C01B513.57%4G140Hydrogen, water and hybrids
7C10L513.57%4H013Liquid carbonaceous fuels
8B01J493.43%4G067Ionic exchange
9F04B443.08%3H003Compressor
10C02F422.94%4D030Water treatment in general
Total 1427
Table 4. Definition of innovation dimensions derived from CBM extraction technology.
Table 4. Definition of innovation dimensions derived from CBM extraction technology.
GroupInnovation DimensionDefinition
1Mechanism dimensionMechanisms and principles for realizing the functions of systems (machines, products, engineering, etc.). These mechanisms and principles are the knowledge and experience created by humans, which can be obtained via literature search, experience exchange, experimentation, and verification.
2Space dimensionSpecific representations and characteristics of the system (machine, product, engineering, etc.) in the space domain.
3Material dimensionAll attributes of the material belonging to the innovation system (machine, product, engineering, etc.).
Table 5. Reorganization of USIT Operators in CBM extraction technology.
Table 5. Reorganization of USIT Operators in CBM extraction technology.
No.Innovation ElementInnovation Algorithms
Group1connect, joint, assemble, group, integrate, combine, introduce, arrange, apply, place, additionCombination and integration
Group2liquid, fluid, movable, level, flexible, varyDynamic
Group3improve, modify, activate, switch, distribute, change, stopLocal optimization
Group4separate, simplify, smaller, divideDecomposition and removal
Group5detection, measurement, environmentFriendliness
Table 6. Definition of innovation algorithms derived from USIT in the technology of CBM.
Table 6. Definition of innovation algorithms derived from USIT in the technology of CBM.
GroupInnovation AlgorithmDefinition
1Combination and integrationCombine the same or different performance elements into one and take some methods to change the original scattered state of some independent elements to make them more interconnected and organically integrated.
2DynamicGive the innovation elements, the ability to change in time, space, environment, and other conditions.
3Local optimizationAdjust the parameters to reach the optimal solution state partially to improve the performance of the entire innovation system (machine, product, engineering, etc.).
4Decomposition and removalDecompose and transform the innovative system (machine, product, engineering, etc.) into small units by means of segmentation, separation, removal, extraction, etc. to add necessary functions, reduce unnecessary functions, remove harmful functions, etc.
5FriendlinessAdjust the relationship between the elements of the innovation system (machine, product, engineering, etc.) and the environment to reduce the occupied resources, minimize the harm caused to the environment, and achieve harmonious and friendly human-machine-environment relationships in view of human factors of engineering.
Table 7. Examples of value extension by coupling innovation algorithms with basic values.
Table 7. Examples of value extension by coupling innovation algorithms with basic values.
Value      +Innovation Algorithm →→→Extension Result
Reverse circulationLocal optimizationPositive circulation
SpiralLocal optimizationRotation
Bottom expansionDecomposition and removal
+ Local optimization
Shock
Rotation + ShockCombination and integrationImpact swing
Rotation
+ Reverse circulation
+Underground continuous
Decomposition and removal
+ Combination and integration
Reciprocating
Reciprocating
+ Deep mixing
Local optimization
+ Combination and integration
Centrifugal
Table 8. Extended morphology matrix by coupling innovation algorithms.
Table 8. Extended morphology matrix by coupling innovation algorithms.
DimensionSub-DimensionValue
MechanismEarth drilling method (2D129BB00)reverse circulation, spiral, bottom expansion, underground continuous, deep mixing, redrill, repeated, stope, positive cycle, rotation, shock, impact swing, reciprocating, centrifugal
Percussion generation mechanism (2D129DB00)fluid pressure, steam, engine detonation, ultrasonic, centrifugal, airflow, cavitation, microwave, electromagnetic
Explosion (2D129AB13 Blasting holes, 2D129AB14 Rock crushing)blast, booster, crack, detonator, pulse, tunnelling blasting, smooth blasting, presplit blasting, controlled explosion, deep hole blasting, chamber blasting, stress wave
Fracturefracturing, hydraulic, punch, gas steam, mechanical, bubble, foam, gel, acidification, hydrofracture, scum, hydrogel, repeated pulsation fracturing, aerogel
Scourgas, fluid, airflow, air, flooding, automatic temperature control, electric regulating flow, hydrate
Thermal drivingmicrowave, pyrolysis, electromagnetic, superheated, infrared, laser, foam, hyperthermal steam, carbon dioxide, nitrogen
Fusionmelt, sour, condensation, coke, decarbonization, infrared, laser, thawing, acidification, laser, freeze, stratified melting, solar energy, high and low temperature cycle
Microorganismbacteria, cyanobacterium, fungus, alcaligenes, bacillus, hydrogen producing bacteria, methanogen
SpaceLocation of the object to be drilled (2D129AA00)ground, coal reservoir, surrounding rock, underground, underwater, inclination, bedrock, borehole, subsea, overlying coal seam, underlie coal seam, liberated seam
Hole shape (2D129AC00)circular, square, stepped, micropores, multilateral, rectangular, spherical, triangular, oval
Shapes of wear-resisting members (2D129GB01)spherical, disc, rod, plate, annular, columnar, cone, cubic, columnar, linear, chisel, spherical
Digging directiondirectional, horizontal, level, vertical, perpendicular, oblique, downhole, lower
Drilling well shapecolumnar, tubular, radial, curve, cone, pinnate, plume, round, spiral, U pattern
MaterialWear-resisting members materials (2D129GB06)metal, ceramic, steel, thin-wall diamond, thick diamond
Insulating materials (2D065JJ02)rubber, resin, polyurethane, fibreglass, quartz, polyisocyanate, mineral paints, synthetic resins
Flooding mediumdioxide, nitrogen, liquid nitrogen, supercritical dioxide, liquid dioxide
Fracturing mediumdioxide, oxygen, chloride potassium, gel, gaseous dioxide, liquid dioxide, supercritical dioxide
Table 9. New conceptual ideas in the first layer.
Table 9. New conceptual ideas in the first layer.
New Conceptual IdeasDescription
DimensionSub-Dimension
Space dimensionLocation of the object to be drilledThe state of pressure, permeability and gas saturation depend on the area of coalbed. Choosing a different operation point of the drill or reaction may contribute to the output of CBM.
Space dimension,
Mechanism dimension
Location of the object to be drilled,
Fracture,
Scour
By applying different principles to the process of extraction, such as fracture, scour, etc., it is possible to control the process and vary the medium of the process according to the space and CBM content in a more harmless way.
Space dimension,
Mechanism dimension,
Material dimension
Location of the object to be drilled,
Fracture,
Flooding medium,
Fracturing medium
In view of the space between different coalbeds, a specific medium or reactant may be applied to the coalbed to optimize the effect of recycling CBM or flow conductivity of fractures.
Table 10. New technology ideas in the second layer.
Table 10. New technology ideas in the second layer.
New Technology Ideas Description
Space dimensionMechanism dimensionMaterial dimension
Sub-dimension
+Value
Location:
ground Digging direction:
horizon+ vertical
Fracture:
hydraulic
The horizontal well and vertical well are combined into a complex well group, and the horizontal well layout plan of the well group is optimized according to the geological conditions of the mine area. The large-area fracture network is formed by the horizontal well fracturing to increase the speed of coal mine drainage pressure reduction and increase the production of CBM.
Location:
coal reservoir
Percussion:
ultrasonic
One or more holes for the bedding layer or the through-hole vibration hole are arranged on the target coal seam, and the explosion-proof or intrinsically safe vibration equipment is placed into the bottom of the hole by the mounting rod. The vibration operation is performed through ultrasound, and the vibration-affected area is carried out according to a conventional method for CBM extraction.
Location:
coal reservoir
Microorganism:
hydrogen-producing bacteria + methanogens + Fracture:
hydraulic
Fracturing medium:
hydrogen-producing bacteria+ methanogens
The fracturing fluid used in the coal fracturing operation is a bio-fracturing fluid prepared by mixing hydrogen-producing bacteria with methanogens. Hydrogen-producing bacteria and methanogens can transform coal reservoirs without harming the coal seam and improve the capacity of CBM desorption.
Location:
coal reservoir + surrounding rock
Earth drilling method:
impact swing
+
Scour:
gas + fluid
Drilling into a coal reservoir from surrounding rock by the method of impact swing to increase the drilling rate and decrease the cost of extraction and then using the air fluid flushing to release the pressure from the acupoint. The high-pressure air shock wave is used as the power source, and the hole wall is subjected to the near-cylindrical rotary impact to cut the acupoints so that the coal around the borehole is gradually broken away from the hole wall to form a pressure-relief space. Then, gas drainage is implemented in the coal seam according to a conventional method.
Location:
surrounding rock
Earth drilling method:
deep mixing
+
Fracture:
repeated pulsation fracturing
Medium of fracture:
supercritical dioxide
Different from the previous practice of simply drilling coalbed methane in the surrounding rock, the scheme is to drill along a long seam by the method of deep mixing in the surrounding rock. Then, supercritical dioxide is injected to perform the process of fracturing by repeated pulsation fracturing in the surrounding rock to create more gaps to solve the issue that fracture stress could not be effectively transferred in the plastic structure.

Share and Cite

MDPI and ACS Style

Feng, L.; Niu, Y.; Liu, Z.; Wang, J.; Zhang, K. Discovering Technology Opportunity by Keyword-Based Patent Analysis: A Hybrid Approach of Morphology Analysis and USIT. Sustainability 2020, 12, 136. https://0-doi-org.brum.beds.ac.uk/10.3390/su12010136

AMA Style

Feng L, Niu Y, Liu Z, Wang J, Zhang K. Discovering Technology Opportunity by Keyword-Based Patent Analysis: A Hybrid Approach of Morphology Analysis and USIT. Sustainability. 2020; 12(1):136. https://0-doi-org.brum.beds.ac.uk/10.3390/su12010136

Chicago/Turabian Style

Feng, Lijie, Yuxiang Niu, Zhenfeng Liu, Jinfeng Wang, and Ke Zhang. 2020. "Discovering Technology Opportunity by Keyword-Based Patent Analysis: A Hybrid Approach of Morphology Analysis and USIT" Sustainability 12, no. 1: 136. https://0-doi-org.brum.beds.ac.uk/10.3390/su12010136

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop