Vector graphics based document exchange formats, such as a portable document format (PDF), provide a set of rendering instructions that allow documents to be interpreted and displayed to users in a standardized fashion, without requiring a user's computer to have the original software application that the content was created in. MICROSOFT® created XML Paper Specification (XPS) as a vector graphics based document format to allow XML content to be rendered in a standardized and meaningful way. One problem with vector graphics based documents is that viewing applications may know very little about the real content of a particular document except for how to render it correctly. For example, the viewing application may have no idea that the content of the document includes one or more bulleted or numbered lists.
Lists can deliver information in ways that are easier to read and understand than plain text. The presence of lists in a vector graphics based document presents particular problems when converting the documents to more end-user-friendly formats used in destination programs. Viewing applications will have information describing how to draw the lists, but they do not necessarily have any information indicating that what they are drawing is a list, so they may be limited in their ability to read or copy the list in a way that is meaningful to the user. The issue of rendering lists meaningfully is complicated by the potential presence of nested lists, or lists within lists. Take for example, a main list, numbered 1, 2, 3. Suppose item 1 consists of items underneath it numbered a, b, and c. Within that list designated by lower case letters, “a” contains items 1) and 2)—in effect, a third list. As you can see from this example, this list actually consists of three lists from a programming standpoint.
Various technologies and techniques are disclosed that allow for detecting lists within vector graphics based, including XML based, documents and rendering them in meaningful ways. Bulleted lists as well as numbered lists can be identified based on a set of rules. One or more of the disclosed technologies and techniques do this by detecting and differentiating patterns. This includes searches for characters, symbols, numbers, letters, and/or images that may start a list. The technology determines whether that signals the start of a list. Patterns are searched for in subsequent lines to determine if a list exists. Furthermore, logic is used to search for and identify nested lists. By way of example and not limitation, the technology can identify a bulleted list with a numbered list nested in it, or vice versa. The system allows content to be output to destination applications in a modified format that is more suitable for output or use by a destination application. Alternatively or additionally, lists can be recognized and translated to a screen reader that understands the input and utilizes voice output technology to make proper audible sounds to represent the list.
This Summary was provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles as described herein are contemplated as would normally occur to one skilled in the art.
The system may be described in the general context as an application used to detect lists and list items based on the rendering instructions given in an XPS document or other vector graphics based document formats, but the system also serves other purposes in addition to these. One or more of the techniques described herein can be implemented as features within software programs such as MICROSOFT® Office Word, MICROSOFT® Office POWERPOINT®, Adobe Acrobat, XPS viewers, and/or from any other type of program or service that allows creation of or can utilize lists. As described in further detail herein, in one implementation of the system, lists are recognized and translated to the format used in destination documents. In another implementation, lists can be recognized and translated to a screen reader that understands the input and utilizes voice output technology to make proper audible sounds identifying the list, read the text in the list, and explain the order of the list to the person who is listening.
As shown in
Additionally, device 100 may also have additional features/functionality. For example, device 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated in
Computing device 100 includes one or more communication connections 114 that allow computing device 100 to communicate with one or more documents 115, such as XPS documents or other vector graphics based documents. Computing device 100 may also communicate with one or more computers and/or applications 113. Device 100 may also have input device(s) 112 such as keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 111 such as a display, speakers, printer, screen reader, etc. may also be included. These devices are well known in the art and need not be discussed at length here.
Turning now to
List recognition application 200 includes program logic 204, which is responsible for carrying out some or all of the techniques described herein. Program logic 204 includes logic for detecting a bulleted or numbered list 206 and for applying a recursive algorithm to detect a nested list within a list 208. Program logic 204 also includes the logic for outputting or displaying the content of the list(s) in a modified format more suitable for output or use 210, such as to a file, display device, screen reader, and/or a another application. Program logic 220 includes other logic for operating the application. In one implementation, program logic 204 is operable to be called programmatically from another program, such as using a single call to a procedure in program logic 204.
In one implementation, program logic 204 resides on computing device 100. However, it will be understood that program logic 204 can alternatively or additionally be embodied as computer-executable instructions on one or more computers and/or in different variations. As one non-limiting example, one or more parts of program logic 204 could alternatively or additionally be implemented as a web-based application that is called when needed.
Turning now to
The procedure begins on
Turning now to
The system detects the first character or image of a line that could be the start of a list (324). By way of example and not limitation, this character can be a hyphen (-), an asterisk (*), a greater-than sign (>), a plus sign (+), or another keyboard character or image that could signal the start of a bulleted list. The system determines if that is the start of a list by scanning the next line to see if it starts with the same character (decision point 326). If so, then additional considerations are taken to determine if both lines constitute items in a list. For example, if the left indent of the first character on the line being considered is the same as the first character on the first line (decision point 328), then the system also checks to see if the left indent is the same for the first word (decision point 332).
In one implementation, if all of these criteria are met, then the item is treated as a list item. In another implementation, some of these criteria and/or additional criteria are used to determine the item is a bulleted list item. The system continues checking for more items in the list (stage 334). If the end of the list is not found (decision point 336), then the process repeats beginning with looking for another consecutive item with an identical character or image (stage 326).
If the system evaluates the one or more various list criteria and determines the item is not part of the prior list, it then checks to see if the item is part of a nested list (decision point 330). If a possible nested list is detected (decision point 330), then the list criteria are also evaluated for the possible nested list. Once all possible lists have been identified and the end of the document is reached (decision point 331), the system executes logic for changing the content into the format of the destination document (stage 338), and displays the content appropriately (stage 340). The process ends at end point 342.
Turning now to
The system detects if that is the start of a list by scanning the next line to see if it starts with the same character (stage 378). If so, then additional considerations are taken to determine if both lines constitute items in a list. Such considerations include, but are not limited to, whether left indentation of the number or letter (stage 382), left indentation of the first word after the number or letter (stage 384), and left indentation of the next word (stage 386) are the same for both items. In one implementation if all of these criteria are met, then the item is treated as a numbered or lettered list item. In another implementation, some of these criteria are used to determine the item is a numbered or lettered list item. The system continues checking for more items in the list (stage 388). If the end of the list is not found (decision point 390), then the process repeats beginning with looking for another consecutive item with a consecutive letter or number (stage 378).
If the system evaluates the one or more list criteria and determines the item is not part of the prior list, it then checks to see if the item is part of a nested list (decision point 380). If a possible nested list is detected (decision point 380), then the stages are repeated to look for a nested list. Once all possible lists have been identified and the end of the document is reached (decision point 391) the system executes logic for changing the content into the format of the destination document (stage 392), and displays the content appropriately (stage 394). The process ends at end point 396.
As discussed previously, in one implementation, the system can also detect nested lists. By way of example and not limitation, the system can detect a bulleted list within a numbered or lettered list, as well as a numbered or lettered list within a numbered or lettered list.
The items in this nested list are examined as well (stage 426) to see if more than one level of nesting exists. If this is found (stage 428), then the system executes a recursive algorithm to check for items in a second level of nested list. This continues until all items are identified for all levels of lists. The items are grouped accordingly, and are compiled so that they can be displayed accurately onscreen or in print in the destination application (stage 430). The process ends at end point 432.
Turning now to
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. All equivalents, changes, and modifications that come within the spirit of the implementations as described herein and/or by the following claims are desired to be protected.
For example, a person of ordinary skill in the computer software art will recognize that the client and/or server arrangements, user interface screen content, and/or data layouts as described in the examples discussed herein could be organized differently on one or more computers to include fewer or additional options or features than as portrayed in the examples.
Number | Name | Date | Kind |
---|---|---|---|
5517578 | Altman et al. | May 1996 | A |
5613019 | Altman et al. | Mar 1997 | A |
6209124 | Vermeire et al. | Mar 2001 | B1 |
6430624 | Jamtgaard et al. | Aug 2002 | B1 |
6782380 | Thede | Aug 2002 | B1 |
6487566 | Sundaresan | Nov 2002 | B1 |
6587587 | Altman et al. | Jul 2003 | B2 |
7203903 | Thompson et al. | Apr 2007 | B1 |
7295708 | Chen et al. | Nov 2007 | B2 |
7394935 | Chen et al. | Jul 2008 | B2 |
20020090118 | Pass | Jul 2002 | A1 |
20020178007 | Slotznick et al. | Nov 2002 | A1 |
20020178135 | Tanaka | Nov 2002 | A1 |
20040093355 | Stinger | May 2004 | A1 |
20050022115 | Baumgartner | Jan 2005 | A1 |
20050108630 | Wasson | May 2005 | A1 |
20050132342 | Van Lunteren | Jun 2005 | A1 |
Number | Date | Country |
---|---|---|
1107169 | Jun 2007 | EP |
03098370 | Oct 2003 | WO |
WO 03098370 | Nov 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20070185837 A1 | Aug 2007 | US |