Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CLASSIFICATION OF CHARACTER STRINGS USING MACHINE-LEARNING
Document Type and Number:
WIPO Patent Application WO/2019/055849
Kind Code:
A1
Abstract:
Systems and methods for categorizing patterns of characters in a document by utilizing machine based learning techniques include generating character classification training data, building a character classification model based on the character classification training data; obtaining an image that includes a pattern of characters, the characters including one or more contours, applying the character classification model to the image to classify the contours, and applying the labels to clusters of the contours.

Inventors:
DUKE PAUL (US)
CHENG SHUXING (US)
Application Number:
PCT/US2018/051176
Publication Date:
March 21, 2019
Filing Date:
September 14, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CHEVRON USA INC (US)
International Classes:
G06V30/10
Foreign References:
US9483701B12016-11-01
EP3104302A12016-12-14
US20140241634A12014-08-28
US20170169290A12017-06-15
US5251268A1993-10-05
Other References:
BRAD NEUBERG: "Creating a Modern OCR Pipeline Using Computer Vision and Deep Learning", DROPBOX TECH BLOG, 12 April 2017 (2017-04-12), XP055583776, Retrieved from the Internet [retrieved on 20181115]
LUOTING FU ET AL.: "COMPUTER AIDED DESIGN", vol. 43, ELSEVIER PUBLISHERS, article "From Engineering Diagrams to Engineering Models: Visual Recognition and Applications", pages: 278 - 292
See also references of EP 3682372A4
Attorney, Agent or Firm:
ESPLIN, D. Benjamin et al. (US)
Download PDF:
Claims:
What is claimed is:

1 . A machine learning model implemented method for categorizing patterns of characters in a P&ID image, the method comprising:

generating, with a training data generation logical circuit, a set of synthetic character training images;

training, with a symbol generation logical circuit, a character classification model based on the set of synthetic character training images, training data;

obtaining, from a P&I D searchable database, the P&ID image comprising a pattern of characters, the characters comprising one or more contours;

applying the character classification model to the contours in the P&ID image; clustering contours into hierarchical groups based on the location information of the contours;

constructing tag labels corresponding to the clusters of contours; and storing, in a data store, the tag labels.

2. The method of claim 1 , wherein generating training data comprises: creating prototype characters of interest;

storing the prototype characters of interest in the data store as templates for programmatically creating varied training images;

and

creating multiple, random, varied training data using the prototype characters.

3. The method of claim 1 , wherein the character classification model comprises a machine learning algorithm.

4. The method of claim 3, wherein the machine learning algorithm comprises a convolutional neural network, a support vector machine, a gradient boosted decision tree, or a logistic regression model.

5. The method of claim 2, wherein generating the training data further comprises modifying a size, translation, rotation, or other possible variances of the prototype characters of interest.

6. The method of claim 2, wherein generating the training data further comprises applying a noise pattern to one or more images.

7. The method of claim 6, wherein applying the noise pattern comprises: selecting a non-character background;

generating a random noise pattern to create a noise background; and

placing a varied sequence of prototype characters on the noise background.

8. The method of claim 2, wherein generating the training data further comprises randomly selecting prototype characters to include in the sequence in a combinatory manner to support N-gram type of training data

9. The method of claim 1 , wherein building a character classification model comprises applying a deep learning process to the training data.

10. The method of claim 1 , wherein applying the character classification model to the image to identify characters comprises segmenting the image and applying heuristics to the image to suppress non-character contours and identify character contours by classifying contours with the character classification model.

1 1 . A system for categorizing patterns of characters, the system comprising:

a data store and a character classification logical circuit, the character classification logical circuit comprising a processor and a non-transitory computer readable medium with computer executable instructions embedded thereon, the computer executable instructions configured to cause the processor to:

generate character classification training data; build a character classification model based on the character classification training data;

obtain an image from the data store, multiple contours;

apply the character classification model to the image to determine if the contours are characters by scoring the contours based on the character classification model;

cluster contours into hierarchical groups based on the location of the contours; and

extract labels from the clusters of the classified contours.

12. The system of claim 1 1 , wherein the computer executable instructions are configured to cause the processor to:

create prototype characters of interest;

store a set of prototype characters of interest in the data store as training image templates; and

creating multiple, random, varied training data using the prototype characters.

13. The system of claim 12, wherein the computer executable instructions are configured to cause the processor to modify a size, translation, or rotation of the prototype characters for different sequences.

14. The system of claim 13, wherein the computer executable instructions are configured to cause the processor to apply a noise pattern to one or more training images.

15. The system of claim 14, wherein the computer executable instructions are configured to cause the processor to:

select a non-character background from the data store; generate a random noise pattern to create a noise background;

and

place a sequence of prototype characters on the noise background.

16. The system of claim 13, wherein the computer executable instructions are configured to cause the processor to randomly select prototype characters to include in the sequence.

17. The system of claim 13, wherein the computer executable instructions are configured to cause the processor to modify the size, translation, or rotation of the sequence relative to noise background in the training image.

18. The system of claim 13, wherein the computer executable instructions are configured to cause the processor to apply a deep learning process to the training data.

19. A computer implemented method for recognizing objects, the method comprising:

generating object classification training data;

building an object classification model based on the object classification training data;

obtaining an image comprising objects of interest;

applying the object classification model to the image; and

clustering the objects into groups based on a location of the objects.

20. The computer implemented method of claim 19, wherein the objects are alphanumeric characters.

21 . A computer implemented method for recognizing objects, the method comprising:

generating object identification training data;

building an object identification model based on the object identification training data;

obtaining an image comprising objects of interest;

applying the object identification model to the image to classify objects and localize object locations.

22. The computer implemented method of claim 21 , wherein the objects comprise logically separated groups of text within the image.

Description:
CLASSIFICATION OF CHARACTER STRINGS USING

MACHINE-LEARNING

CROSS-REFERENCE TO RELATED APPLICATIONS

(01) The present application is related to and claims the benefit of U.S. Provisional Application No. 62/558,383 filed on September 14, 2017, and U.S. Provisional Application No. 62/653, 193 filed on April 5, 2018, the contents of both of which are hereby incorporated herein by reference in their entirety.

FIELD

(02) The present disclosure relates generally to pattern recognition and more particularly to recognition and categorization of character-based document tags using machine learning techniques.

BACKGROUND

(03) Piping and instrumentation diagrams ("P&ID") are engineering drawings that illustrate engineering process flows together with instruments used to implement those process flows. P&IDs may include tags or labels used to capture diverse types of design information,, such as installation information, material, sequence information, hazard information, or other information, related to the P&ID diagram. In many cases, it is useful to extract, identify, and categorize the tags and labels associated with a P&ID so that the P&ID and its provided information may be accessible and searched within a database system.

(04) Current methods of P&ID tagging rely on manual efforts to identify P&ID tags and generate a tag index list. For example, a human operator may visually inspect P&IDs to extract information components, including symbols, tags, and the organization thereof and catalog these components in a database. In some examples, Optical Character Recognition (OCR) technology may also be used to assist in this process. However, these solutions are ultimately inefficient and inaccurate. These solutions are neither cost effective nor robust.

SUMMARY

(05) Machine learning models may be applied to P&ID diagrams to extract graphical components, such as symbols and process loops representing the transport of chemical components or physical components, or control processes, in order to overcome the shortcomings of existing OCR-based and manual

categorization solutions. Some embodiments of the disclosure implements a multi- tiered framework to identify symbol representing the equipment, schematic lines (e.g., connector lines) representing the connections between the equipment, and tags encoding the contextual information and/or a variety of design specifications. The model may be a machine learning algorithm such as a convolutional neural network, decision tree, or other machine learning algorithm as known in the art. The training data may be synthetic or collected from actual previously tagged P&ID diagrams.

(06) One aspect of the present disclosure relates to a system configured for identifying - symbols in standardized system diagrams. The system may include one or more logical circuits configured by machine-readable instructions. The

processor(s) may be configured to obtain a symbol -recognition training data set including multiple training images. The processor(s) may be configured to generate a symbol recognition model based on the symbol recognition training data set. The processor(s) may be configured to obtain an image including a pattern of symbols. The symbols may include complicated geometry that are used to represent mechanical or electrical component. The processor(s) may be configured to apply the symbol recognition model to the geometry to recognize the symbol. The processor(s) may be configured to store the identified symbols in a relational database.

(07) Another aspect of the present disclosure relates to a method for identifying patterns of symbols in standardized system diagrams. The method may include obtaining a symbol classification training data set including multiple training images. The method may include generating a symbol classification model based on the symbol classification training data set. The method may include obtaining an image including a pattern of symbols. The symbols may include one or more contours. The method may include clustering symbols into hierarchical groups based on the location information of the contours. The method may include applying the symbol classification model to the contours to identify the symbols and hierarchical groups. The method may include storing the identified symbols in a relational database together with corresponding hierarchical groups.

(08) Embodiments of the present disclosure provide systems and methods for classifying patterns of shapes or objects, such as alphanumeric characters, in an image by utilizing machine learning based techniques. In some embodiments, the method may include generating character classification training data and building a character classification model based on the character classification training data. The method may include finding all the contours in an image, clustering the contours, applying the character classification model to the image to classify the contours as target characters or non-characters, and extracting clustered groups of characters as tags or labels of interest. (09) Embodiments disclosed herein may include a system for classifying patterns of shapes as characters and grouping characters into tags. For example, the system may include a data store and a character classification logical circuit. The character classification logical circuit may include a processor and a non-transitory computer readable medium with computer executable instructions embedded thereon, and the computer executable instructions may be configured to cause the processor to generate character classification training data, build a character classification model based on the character classification training data, and apply the character classification model to the image to classify target characters. In some

embodiments, the system may identify tags by localizing the image contours relative to the whole image, labelling the contours as characters or non-characters based on the character classification model, and clustering characters into hierarchical groups based on the location information of the characters. The system may extract tags or labels from the groups of characters based on the patterns of characters within the groups.

(10) In some embodiments of the disclosed technology, a tag extraction process may include identifying one or more text areas within the image, the text areas comprising groupings of characters. The text areas may be identified using a text area identification model. In some embodiments, the text area identification model may include a machine learning algorithm. The tag extraction process may include scanning the identified text areas with a trained character classification model to classify individual characters, and then extract and/or store the identified characters.

(11) These and other objects, features, and characteristics of the system and/or method disclosed herein, as well as the methods of operation and functions of the related elements of structure and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the invention. As used in the specification and in the claims, the singular form of "a", "an", and "the" include plural referents unless the context clearly dictates otherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

(12) The technology disclosed herein, in accordance with one or more various embodiments, is described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict typical or example embodiments of the disclosed technology. These drawings are provided to facilitate the reader's understanding of the disclosed technology and shall not be considered limiting of the breadth, scope, or applicability thereof. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.

(13) FIG. 1 illustrates an example computer implemented method of recognizing and categorizing character-based document tags using a machine learning model, consistent with embodiments disclosed herein.

(14) FIG. 2A illustrates an example process for synthetic training data generation for a character classification model, consistent with embodiments disclosed herein.

(15) FIG. 2B illustrates example characters and fonts of interest as used by embodiments disclosed herein. (16) FIG. 2C illustrates example prototype characters as used by embodiments disclosed herein.

(17) FIG. 2D illustrates example training images created from prototypes, consistent with embodiments disclosed herein.

(18) FIG. 3A illustrates an example process for tag extraction, consistent with embodiments disclosed herein.

(19) FIG. 3B illustrates an example of a partial P&ID input image, as used in embodiments disclosed herein.

(20) FIG. 3C illustrates the example input image of FIG. 3B, as processed to identify whitespace segmented contours according to embodiments disclosed herein.

(21) FIG. 3D illustrates the example input image of FIG. 3B, as processed to classify contours according to embodiments disclosed herein.

(22) FIG. 3E illustrates examples of sub-image patches extracted and classified as characters of interest at each whitespace-segmented contour, as used by

embodiments disclosed herein.

(23) FIG. 3F illustrates the example input image of FIG. 3B, as processed according to embodiments disclosed herein.

(24) FIG. 3G illustrates the example input image of FIG. 3B, as processed to group classified characters according to embodiments disclosed herein.

(25) FIG. 3H illustrates the tags extracted from the example input image of FIG. 3B according to embodiments disclosed herein.

(26) FIG. 4A illustrates an example method for generating training data for text area identification, consistent with embodiments disclosed herein. (27) FIG. 4B illustrates an example of programmatically created training images according to embodiments disclosed herein.

(28) FIG. 5 illustrates an example method for tag extraction using a text area identification model, consistent with embodiments disclosed herein.

(29) FIG. 6 illustrates a system configured for recognizing tags, symbols and process loops in standardized system diagrams, in accordance with one or more implementations.

(30) FIG. 7 illustrates a method for identifying patterns of symbols in standardized system diagrams, in accordance with one or more implementations.

(31) FIG. 8 is an example P&ID diagram depicting symbols, tags, and process loops.

(32) FIG. 9A is a flow chart illustrating a method for categorizing learned patterns of characters within documents, consistent with embodiments disclosed herein.

(33) FIG. 9B is a flow chart illustrating a method for a flow chart illustrating a method classifying patterns in an image, consistent with embodiments disclosed herein.

(34) FIG. 9C illustrates examples bi-gram patterns, consistent with embodiments disclosed herein.

(35) FIG. 9D is a flowchart illustrating a workflow for localizing a character area, classifying character patterns, and grouping the characters into tag groups based on the location information for the identified character areas, consistent with

embodiments disclosed herein. (36) FIG. 9E describes a more detailed design of the above flowchart, and includes the modules performing synthetic data generator for character classification model, consistent with embodiments disclosed herein.

(37) FIG. 10 is a diagram illustrating a system for categorizing learned patterns of characters, consistent with embodiments disclosed herein.

(38) FIG. 1 1 illustrates an example computing system that may be used in implementing various features of embodiments of the disclosed technology.

(39) The figures are not intended to be exhaustive or to limit the invention to the precise form disclosed. It should be understood that the invention can be practiced with modification and alteration, and that the disclosed technology be limited only by the claims and the equivalents thereof.

DETAILED DESCRIPTION

(40) Embodiments of the present disclosure provide systems and methods for categorizing symbol and character patterns utilizing machine learning based techniques. By doing so, data and information of interest may be sourced from the documents, associated with the documents, identified and categorized, for example, in a database. It should be noted that these documents may include P&IDs, diagrams, blueprints, or any other sources containing information that can be identified as symbols, characters or strings of characters. Identified symbols or tags may be indexed and stored in a database, such that the documents and

corresponding information may be easily stored and searched within the database.

(41) In some examples, symbols in an image may be grouped together, and identified using machine learning-based methodologies. By way of example, machine learning offers a powerful approach to localize certain areas and recognize the contained contextual information provided as images. Machine learning-based techniques may include deep learning processes, such as convolutional neural networks. A convolution neural network is a class of deep, feed-forward artificial neural network that analyzes a training data set to learn observable feature patterns within the data, and then may apply those learned patterns to future data sets, and can adaptively update these learning patterns based on the new data set if an updated model is determined to be necessary.

(42) Some embodiments disclosed herein may incorporate the use of

convolutional neural network algorithm for both image recognition and image classification in different sub-tasks of the whole workflow. For instance, in some examples, a convolutional neural network, or other machine learning model, may be used to analyze P&ID diagrams and recognize symbol images contained therein. The convolutional neural network, or other machine learning model, may also be implemented to identify text areas or characters contained in the P&ID diagram. The design of related neural architecture and training processes may be different based on the context of different tasks, as would be understood in the art.

(43) FIG. 1 illustrates a machine learning based method for processing an image, recognizing character tags within the image, and extracting and associating character tags found therein with the original image. Associating such character tags with the original image enable a large set of images to be indexed and searched by the tags contained in each image. As illustrated, the method may include generating a training data set 1 100, generating a learning model 1 150 that learns to recognize characters of interest from the training data set 1 100, and implementing a tag extraction process 1 170 that identifies tags of interest from images for indexing purposes. In some examples, the training data set may be synthetic, in that it is generated through an automated process as disclosed herein. Tag extraction process 1 170 may include a first tag extraction pipeline process 1 175 and/or a second tag extraction pipeline process 1 180.

(44) The process of extracting tags from a P&ID image may include generating a training data set 1 100. The character training datasheet 1 1 10 may include an extensive list of character prototypes 1 105 for use in the character classification model 1 155. The text area training datasheet 1 125 may include an extensive list of character prototypes 1 105 for the text area identification model 1 160.

(45) Acquiring sufficient labeled data for either of the two above mentioned models through manual means may be time consuming, inconsistent, and costly to assemble. For example, using existing P&ID diagrams as a training set requires manual processing to label tags and objects within the diagram, which requires manual labor and time, is constrained by the availability of existing P&ID data, and may be prone to human error and mis-categorization. In contrast, embodiments disclosed herein provide methods for generating synthetic P&ID training data. The synthetic training data set allows for more flexibility in creation of a wide and complete variety of P&ID data, and may be pre-labeled by the system that creates the synthetic data.

(46) Still referring to FIG. 1 , the method may include generating a learning model 1 150. For example, the learning model may be configured using a machine learning algorithm to learn from training data set 1 100 to recognize characters of interest. In some examples, the learning model may include a character classification model 1 155. Character classification model 1 155 may be a machine learning model, e.g., a convolutional neural network, a support vector machine, a gradient boosted decision tree, a logistic regression, or other machine learning models. Character classification model 1 155 may be trained using character training dataset 1 1 10. In some examples, character classification model 1 155 may be trained to recognize characters in an image, e.g., a P&ID. In some examples, the character classification model 1 155 may be trained to classify one or more image patches as 1 -of-n objects and/or characters of interest.

(47) In some embodiments, the learning model includes a text area identification model 1 160. Text area identification model 1 160 may include a machine learning model, e.g., a convolutional neural network-based image segmentation or similar type of model trained to recognize text areas in a given image. For example, the text area identification model may be trained using synthetic text area training images

1 130 and/or manually annotated P&ID training images 1 135. Text area identification model 1 160 may be trained to localize and identify multiple objects in one or more images.

(48) Still referring to FIG. 1 , the method may include a tag extraction process 1 170, which may include one or more tag extraction pipeline processes. For example, one tag extraction pipeline process 1 175 may include processing an image to identify and locate whitespace separated contours. The tag extraction pipeline process 1 175 may also include classifying the contours with a character

classification model, e.g., trained character classification model 1 155. In some examples, first tag extraction pipeline process 1 175 may include grouping contours and/or characters into tags.

(49) In some examples, tag extraction process 1 170 may include a complementary or alternative tag extraction pipeline process 1 180. The tag extraction pipeline process 1 180 may include applying a text area identification model, e.g., trained text area identification model 1 160 to localize text groups within in an image, and in some examples, within a text area within the image. In some examples, tag extraction pipeline process 1 180 may include scanning the localized text areas to identify individual characters contained therein. Tag extraction pipeline processes 1 175 and 1 180 may operate individually or be combined in order to increase accuracy in tag extraction.

(50) FIGS. 2A-2D illustrate an example of synthetic training data generation process, e.g., for training character classification model 1 155. FIG. 2A illustrates a flowchart of a process used to generate synthetic training data.

(51) Referring to FIG. 2A, a method for generating synthetic training data may include creating a prototype source image at 1210 that includes characters and fonts selected to be recognized by the character classification model 1 155. Method for generating synthetic training data may include extracting prototype characters from one or more sources image at 1220. For example, extracting prototype characters from a source image 1220 may also include labeling and storing the prototype characters. In some examples, the method for generating synthetic training data may include using the prototype characters to programmatically create an unlimited amount of training data by varying the size and position, combining them into n- grams, blurring, and/or adding noise for training the character classification model 1 155.

(52) FIG. 2B illustrates an example of an image 1215 that includes characters of interest because a valid P&ID tag may contain any of these characters. They are rendered in fonts similar to those commonly found in a P&ID image. In contrast, FIG. 2B also includes an example of an image 1216 that includes characters which are not allowed in an valid tag thus are examples of characters that should be classified as "discard". The fonts and characters of the first image 1215 may be classified as characters of interest by the character classification model, whereas the characters of the second image 1216 may be classified as "discard". Images similar to examples 1215 and 1216 can be used to construct a set of prototype character images which can then be used to generate training images for training the character classification model.

(53) FIG. 2C provides examples of prototype images 1 105 that may be extracted from a prototype source image. FIG. 2D provides examples of training images 1 1 15 which can be programmatically generated from prototype images. Programmatically generating synthetic character classification training data using methods disclosed herein enables creating a training dataset of unlimited size and variance for training character classification model 1 155 to classify contours in an image as characters of interest. In order to further improve model accuracy, the character classification training data may include variances in size, position, blurring, and rotation of prototype characters, combinations prototype characters, and variance in noise levels..

(54) In some embodiments, iteratively improving the character recognition model may include augmenting training data with any misclassified contour sub-images, retraining the character recognition model, and validating the character recognition model's accuracy, e.g., using manual verification or programmatically using a validation data set.

(55) FIGS. 3A-3H illustrate an example of the steps which may be implemented in the first tag extraction pipeline process 1 175 depicted in FIG. 1 . Referring to FIG. 3A, first tag extraction pipeline process may include inputting a P&ID image at step 1310. In some examples, the P&ID image may be input as an electronic file or using a digital camera, a scanner, a data store, or other electronic input means. (56) Method 1 175 may include identifying whitespace segmented contours at step 1320. In some examples, method 1 175 may include classifying the contours within the image by applying a trained classification model at step 1330. In some examples, method 1 175 may include clustering contours into groups at step 1340. For example, identified characters may be hierarchically clustered based on their location within the image and proximity to each other. Text groups may be created from the resulting clusters of characters.

(57) In some embodiments, method 1 175 may include refining character groups at step 1 150, e.g., by using various heuristics used to refine the text groups. Method

1 175 may include extracting and/or storing tags at step 1360.

(58) FIG. 3B illustrates an example input P&ID sub-image 1315 that may be processed using first tag extraction pipeline process 1 175.

(59) FIG. 3C illustrates an example input P&ID sub-image 1325 that has undergone a process to identify whitespace segmented contours 1320.

(60) FIG. 3D illustrates an example input P&ID sub-image 1335 that has undergone a process to classify contours 1330.

(61) FIG. 3E illustrates examples of sub-images extracted from the example input P&ID image for whitespace segmented contours which have been classified as a character of interest by the character classification model 1 155.

(62) FIG. 3F illustrates an example input P&ID image 1345 that has undergone hierarchical clustering 1340 of the identified characters based on their location within the image.

(63) FIG. 3G illustrates an example input P&ID image that has undergone refining of character groups 1350 using various heuristics used to refine the text groups created in the previous step. In some examples, the method may include additional heuristics for identifying non-segmented contours and determining whether a string is a tag using text classification.

(64) FIG. 3H illustrates an example list of tags 1365 created in step six 1360 that may be extracted and/or stored.

(65) FIGS. 4A and 4B illustrate an example method for generating synthetic training data for text identification model 1 160. FIG. 4A illustrates a flowchart of an example process used to generate synthetic training data. The method may include creating a prototype source image at step 1410 and extracting prototype characters at step 1420. In some examples, prototype characters may be identified and extracted. The method may include programmatically creating multiple training images (e.g., an unlimited number of training images) by positioning random and patterned text areas built from random groups of character prototypes on a background image which may also contain randomly generated lines, symbols, other objects/noise common on a P&ID. FIG. 4B illustrates an example of a training image 1435 with text areas which may be identified by applying text area identification model 1 160.

(66) FIG. 5 illustrates second tag extraction pipeline process 1 180. As illustrated in FIG. 5, method 1 180 may include receiving as input an image, e.g., a P&ID.

Method 1 180 may include identifying text areas in the image, e.g., by applying trained text area identification model 1 160. In some examples, method 1 180 may include identifying characters within the text areas at step 1530 and extracting and/or storing tags at step 1540. Embodiments of second tag extraction pipeline process 1 180 may be applied the example input images and characters illustrated in FIGS. 3B-3H. (67) FIG. 6 illustrates a system 100 configured for identifying design contexts, including symbols, tags and process loops in standardized system diagrams, in accordance with one or more implementations. In some implementations, system 100 may include one or more servers 102. Server(s) 102 may be configured to communicate with one or more client computing platforms 104 according to a client/server architecture and/or other architectures. Client computing platform(s) 104 may be configured to communicate with other client computing platforms via server(s) 102 and/or according to a peer-to-peer architecture and/or other architectures. Users may access system 100 via client computing platform(s) 104.

(68) Server (s) 102 may include one or more processors 166 and one or more non-transitory memories with machine readable instructions 106 embedded thereon. In some embodiments, a processor 166 and non-transitory memory with machine readable instructions 106 embedded thereon may form a logical circuit. In some examples, server(s) 102 may include one or more logical circuits. The logical circuits may include computer program modules. In some examples, server(s) 102 may include one or more of a synthetic training data generation logical circuit 108, a symbol recognition logical circuit 1 10, an image obtaining logical circuit 1 12, a, a symbol storing logical circuit 1 18, a prototype symbol generation logical circuit 120, an array generation logical circuit 124, a probability determination logical circuit 126, a symbol location evaluation logical circuit 130, a training data obtaining logical circuit 132, a tag identification logical circuit 134, a character classification model generation logical circuit 138, a character contour identifying logical circuit 140, a character clustering logical circuit 142, a character classification model application logical circuit 144, an image segmentation logical circuit 148, a process loop identifying logical circuit 150, a connector line identifying logical circuit 154, a connector storing logical circuit 156, a loop verification logical circuit 158, a relation corresponding logical circuit 160, and/or other logical circuits and/or instruction modules.

(69) Training data generation logical circuit 108 may be configured to obtain a symbol recognition training data set including multiple training images. Training data may include multiple images (e.g., image patches cropped from standardized system diagrams, such as P&ID diagrams). In some embodiments, the training data may be synthetically generated to include a set of studied symbols along with different scales. In some embodiments, the training data may be collected from existing or previously cataloged images or digitalized images. The training data may be manually reviewed to identify symbols, tags, and/or process loops and entered into a training database for use by a machine learning model to compare with the model's identifications relating to the same symbol in the training images.

(70) Symbol recognition logical circuit 1 10 may be configured to generate a symbol recognition model based on the symbol recognition training data set. The symbol classification model may include a machine learning algorithm, e.g., a convolutional neural network, faster R-CNN, decision tree, or other machine learning algorithm as known in the art.

(71) Image obtaining module 1 12 may be configured to obtain an image including a pattern of symbols. For example, the symbols may correspond to equipment represented in the P&ID diagrams. The symbols may be standard or customized engineering symbols. For example, the symbols may represent tanks, valves, pipes, sensors, instruments, or other types of equipment and/or system components as known in the art. (72) The symbols are generally shown as geometric shapes representing functional components in the P&IDs or other engineering documents. Each symbol may include one or more contours.

(73) Symbol location evaluation logical circuit 130 may be configured to apply the symbol recognition model to the image patches including more than one geometric shapes to identify the related symbols.

(74) Symbol storing logical circuit 1 18 may be configured to store the identified symbols in a relational database together with corresponding process loops consisting multiple symbols. The identified symbols may have been identified by the machine learning algorithm or via manual identification through a graphical user interface. The symbol may include an arbitrary sign (written, printed, or otherwise displayed) that has acquired a conventional significance, according to some implementations, e.g., as an industry standard or legend associated with engineering process diagrams. The relational database may be an electronic database. The relational database may include a database in which relations between information items are explicitly specified as accessible attributes, according to some

implementations.

(75) Prototype symbol generation logical circuit 120 may be configured to create prototype symbols of interest. Prototype symbols of interest may include shapes or designs that emulate standard or customized engineering symbols as used in P&ID diagrams. By way of non-limiting example, obtaining the symbol classification training data may further include modifying a size, translation, rotation, or other possible variances of the prototype symbols of interest. The possible variance may include a variance that is capable of happening or existing, according to some implementations. The variance may be a deviation. The variance may include an event that departs from expectations, according to some implementations.

(76) Prototype symbol storing module 122 may be configured to store the prototype symbols of interest in a data store as templates for programmatically creating varied training images. The data store may be a database or physical storage device, such as magnetic or solid state storage. The data store may be a local, network, and/or cloud-based data storage device. A given template may be a model. The template may include a model or standard for making comparisons, according to some implementations.

(77) Array generation logical circuit 124 may be configured to generate a first array of symbol location regions within the image. The array may be an arrangement. The array may include an orderly arrangement, according to some implementations. Examples of the array may include one or more of bank, column, matrix, panoply, row, spectrum, table, and/or other arrays.

(78) Array generation logical circuit 124 may be configured to generate a second array including symbol location regions for which the probability that a symbol location region of the first array includes a symbol of interest exceeds a selected threshold value. The selected threshold value may include a probability or probabilities selected by a user through a graphical user interface. In some examples, the threshold value may be tuned or adjusted by a user to affect the accuracy of the machine learning algorithm. For example, the threshold value may be adjusted by a user during a verification step to confirm that symbols identified by the model within the P&ID diagrams are accurate. The verification may be performed using a graphical user interface. The probability may be a measure. The probability may include a measure of how likely it is that some event will occur; a number expressing the ratio of favorable cases to the whole number of cases possible, according to some implementations. Examples of the probability may include one or more of conditional probability, cross section, exceedance, fair chance, fat chance, joint probability, risk, risk, and/or other probabilities.

(79) Probability determination logical circuit 126 may be configured to determine, with the symbol recognition model, a probability that a symbol location region of the first array includes a symbol of interest.

(80) Probability determination logical circuit 126 may be configured to determine a probability that a symbol location region of the first array includes a symbol of interest by evaluating if related symbols of interest are present in any adjacent symbol location region. For example, adjacent symbols may include symbols located next to or nearby a symbol of interest being evaluated. Related symbols may be connected either logically or causally or by shared characteristics, according to some implementations. Probability determination logical circuit 126, together with symbol location evaluation logical circuit 130, may be configured to recognize patterns in the images (e.g., symbols of interest, patterns of contours, etc.).

(81) In some examples, symbol location evaluation logical circuit 130 may be configured to evaluate the symbol location regions in a sequential order. The sequential order may include an order that is in regular succession without gaps, according to some implementations.

(82) Training data obtaining logical circuit 132 may be configured to obtain the training data by applying a fixed or a stochastic noise pattern to one or more images.

(83) Tag identification logical circuit 134 may be configured to identify standardized system diagram tags based on the characters clustering result and storing the identified standardized system diagram tags in the relational database together with the corresponding locations. Standardized system diagram tags may include P&ID tags.

(84) Character classification model generation logical circuit 136 may be configured to obtain a character classification training data and generate a character classification model based on the character classification training data. Character contour identifying logical circuit 140 may be configured to identify character contours within the images. Character clustering logical circuit 142 may be configured to cluster the characters into character hierarchical groups based on the location information of the character contours. Character classification model application logical circuit 144 may be configured to apply the character classification model to the character contours to identify the characters.

(85) The relational database may be searchable from a graphical user interface. The graphical user interface may be an interface. The graphical user interface may include a user interface based on graphics instead of text; uses a mouse as well as a keyboard as an input device, according to some implementations.

(86) Image segmentation logical circuit 148 may be configured to segment the image and applying heuristics to the image to suppress non-character contours and identify character contours. A given heuristic may be a rule. The heuristic may include a commonsense rule intended to increase the probability of solving some problem, according to some implementations. Examples of the heuristic may include one or more of lateral thinking and/or other heuristics.

(87) Process loop identifying logical circuit 150 may be configured to identify process loops in the images corresponding to related groups of symbols. The configured algorithms can be transferable to identify polygons, amorphous shapes, open shapes, or other graphical structures as known in the art. In some examples, symbol recognition logical circuit 1 10 may be configured to identify a first symbol of interest within the image corresponding to a component of interest known to belong to a process loop. Symbol recognition logical circuit 1 10 may also be configured to identify a second symbol of interest coupled to the first connector line.

(88) Connector line identifying logical circuit 154 may be configured to identify a first connector line extending from the first symbol of interest. Connector line identifying logical circuit 154 may be used by or in coordination with process loop identifying logical circuit 150 to identify process loops and/or other geometric shapes in the image,

(89) Connector line identifying module 154 may be configured to identify a second connector line extending from the second symbol of interest.

(90) Connector line identifying circuit 154 may be configured to identify additional connector lines extending from corresponding symbols of interest until a terminating connector line is identified to couple back into the first symbol of interest, such that the identified connector lines and corresponding symbols of interest form a closed loop.

(91) Connector line identifying logical circuit 154 may be configured to identify connector lines using an edge detection process, using a topological structure analysis algorithm over the graph, or using other pattern recognition algorithms as known in the art.

(92) Connector storing logical circuit 156 may be configured to store the identified connectors and corresponding symbols of interest together in the relational database as an identified process loop. By way of non-limiting example, the identified process loop may encode a chemical process, a physical process, or a control process.

(93) The physical process may include processes implemented by a system described in P&ID diagrams. For example, physical processes may include hydrocarbon extraction, storage, refining, or other similar processes as known in the art. A physical process may include a sustained phenomenon or one marked by gradual changes through a series of states, according to some implementations. Loop verification logical circuit 158 may be configured to verify, with a graphical user interface, the identified loops. Relation corresponding logical circuit 160 may be configured to correspond tags are stored together in relation to corresponding standardized system diagrams within the relational database.

(94) In some implementations, the images may include standardized system diagrams. In some implementations, the symbol classification training data may include a set standardized system diagrams including corresponding sets of symbols and hierarchical groups and manually identifying the symbols and hierarchical groups using a graphical user interface.

(95) In some implementations, server(s) 102, client computing platform(s) 104, and/or external resources 162 may be operatively linked via one or more electronic communication links. For example, such electronic communication links may be established, at least in part, via a network such as the Internet and/or other networks. It will be appreciated that this is not intended to be limiting, and that the scope of this disclosure includes implementations in which server(s) 102, client computing platform(s) 104, and/or external resources 162 may be operatively linked via some other communication media. (96) A given client computing platform 104 may include one or more processors configured to execute computer program modules. The computer program modules may be configured to enable an expert or user associated with the given client computing platform 104 to interface with system 100 and/or external resources 162, and/or provide other functionality attributed herein to client computing platform(s) 104. By way of non-limiting example, the given client computing platform 104 may include one or more of a desktop computer, a laptop computer, a handheld computer, a tablet computing platform, a NetBook, a Smartphone, a gaming console, and/or other computing platforms.

(97) External resources 162 may include sources of information outside of system 100, external entities participating with system 100, and/or other resources. In some implementations, some or all of the functionality attributed herein to external resources 162 may be provided by resources included in system 100.

(98) Server(s) 102 may include electronic storage 164, one or more processors 166, and/or other components. Server(s) 102 may include communication lines, or ports to enable the exchange of information with a network and/or other computing platforms. Illustration of server(s) 102 in FIG. 1 is not intended to be limiting.

Server(s) 102 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to server(s) 102. For example, server(s) 102 may be implemented by a cloud of computing platforms operating together as server(s) 102.

(99) Electronic storage 164 may comprise non-transitory storage media that electronically stores information. The electronic storage media of electronic storage 164 may include one or both of system storage that is provided integrally (i.e., substantially non-removable) with server(s) 102 and/or removable storage that is removably connectable to server(s) 102 via, for example, a port (e.g., a USB port, a firewire port, etc.) or a drive (e.g., a disk drive, etc.). Electronic storage 164 may include one or more of optically readable storage media (e.g., optical disks, etc.), magnetically readable storage media (e.g., magnetic tape, magnetic hard drive, floppy drive, etc.), electrical charge-based storage media (e.g., EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.), and/or other electronically readable storage media. Electronic storage 164 may include one or more virtual storage resources (e.g., cloud storage, a virtual private network, and/or other virtual storage resources). Electronic storage 164 may store software algorithms, information determined by processor(s) 166, information received from server(s) 102, information received from client computing platform(s) 104, and/or other information that enables server(s) 102 to function as described herein.

(100) Processor(s) 166 may be configured to provide information processing capabilities in server(s) 102. As such, processor(s) 166 may include one or more of a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information. Although processor(s) 166 is shown in FIG. 1 as a single entity, this is for illustrative purposes only. In some implementations, processor(s) 166 may include a plurality of processing units. These processing units may be physically located within the same device, or processor(s) 166 may represent processing functionality of a plurality of devices operating in coordination. Processor(s) 166 may be configured to execute machine-readable instructions as indicated by logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, 160, and/or other modules. Processor(s) 166 may be configured to execute modules corresponding to logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, 160, and/or other modules by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor(s) 166. As used herein, the term "module" may refer to any component, logical circuit or set of components or logical circuits that perform the functionality attributed to the module. This may include one or more physical processors during execution of processor readable instructions, the processor readable instructions, circuitry, hardware, storage media, or any other components.

(101) It should be appreciated that although logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and 160 are illustrated in FIG. 1 as being implemented within a single processing unit, in implementations in which processor(s) 166 includes multiple processing units, one or more of logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and/or 160 may be implemented remotely from the other modules. The description of the functionality provided by the different logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and/or 160 described below is for illustrative purposes, and is not intended to be limiting, as any of logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and/or 160 may provide more or less functionality than is described. For example, one or more of logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and/or 160 may be eliminated, and some or all of its functionality may be provided by other ones of logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and/or 160. As another example, processor(s) 166 may be configured to execute one or more additional modules that may perform some or all of the functionality attributed below to one of logical circuits 108, 1 10, 1 12, 1 18, 120, 124, 126, 130, 132, 134, 138, 140, 142, 144, 148, 150, 154, 156, 158, and/or 160.

(102) FIG. 7 illustrates a method 200 for recognizing symbols in standardized system diagrams, in accordance with one or more implementations. The operations of method 200 presented below are intended to be illustrative. In some

implementations, method 200 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order in which the operations of method 200 are illustrated in FIG. 7 and described below is not intended to be limiting.

(103) In some implementations, method 200 may be implemented in one or more processing devices (e.g., a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, one or more logical circuits, and/or other mechanisms for

electronically processing information). The one or more processing devices may include one or more devices executing some or all of the operations of method 200 in response to instructions stored electronically on an electronic storage medium. The one or more processing devices may include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 200.

(104) An operation 202 may include obtaining a symbol recognition training data set including multiple training images. For example, obtaining may include generating the symbol recognition training data set, receiving the symbol recognition training data set, or any combination thereof. Operation 202 may be performed by one or more hardware processors configured by machine-readable instructions including a logical circuit that is the same as or similar to training data generation logical circuit 108, in accordance with one or more implementations.

(105) An operation 204 may include generating a symbol recognition model based on the symbol recognition training data set. Operation 204 may output the recognized symbols along with their location information relative to the whole image, which can be represented as graph coordinate based on column and row

information. Operation 204 may be performed by one or more hardware processors configured by machine-readable instructions including a module that is the same as or similar to symbol recognition logical circuit 1 10, in accordance with one or more implementations.

(106) In some examples, an operation 206 may include obtaining an image including a pattern of symbols. The symbols may include one or more contours. Operation 206 may be performed by one or more hardware processors configured by machine-readable instructions including a logical circuit that is the same as or similar to image obtaining logical circuit 1 12, in accordance with one or more implementations.

(107) An operation 208 may include clustering symbols into process loops or other graphical groups based on the process, physical, logical, or other relationship captured by the connection identification heuristics, e.g., as generated or obtained by the process loop identifying logical circuit 150 or connector line identifying logical circuit 154.

(108) In some embodiments, an operation 210 may include applying the symbol recognition model to the contours to identify the symbols, process loops, and/or groups. Operation 210 may be performed by one or more hardware processors configured by machine-readable instructions including a logical circuit that is the same as or similar to symbol recognition logical circuit 1 10, in accordance with one or more implementations.

(109) An operation 212 may include storing the identified symbols in a relational database together with corresponding process groups, or more generic graphical structures which consists of multiple symbols following some given relationships, e.g., electrical or physical, etc. Operation 212 may be performed by one or more hardware processors configured by machine-readable instructions including a logical circuit that is the same as or similar to symbol storing logical circuit 1 18, in accordance with one or more implementations.

(110) Although the present technology has been described in detail for the purpose of illustration based on what is currently considered to be the most practical and preferred implementations, it is to be understood that such detail is solely for that purpose and that the technology is not limited to the disclosed implementations, but, on the contrary, is intended to cover modifications and equivalent arrangements that are within the spirit and scope of the appended claims. For example, it is to be understood that the present technology contemplates that, to the extent possible, one or more features of any implementation can be combined with one or more features of any other implementation.

(111) FIG. 9A is a flow chart illustrating a machine learning based method 10 for identifying character tags within document images. As depicted in Fig. 4A, method 10 may include using prototype examples of the characters and fonts of interest to programmatically generate synthetic character classification training data to enable a model to learn to classify contours in an image as characters of interest and group those characters into tags.

(112) In some examples, a character classification model may be generated by training a convolutional neural network on character classification training data obtained from a data store or created by a programmable synthetic training data generation method. By way of example, the character classification training data may include variances of prototype characters, combination of variances of prototype characters that convey information about the characters and tags includes in a document. Thus, the character classification training data may then be used to build a model to recognize the characters of interest found in target document images.

(113) In some examples, the method may include applying the character classification model to whitespace segmented contours in the document at step 16.

(114) The method may include constructing tags based on the character groups derived from a hierarchical clustering algorithm.

(115) FIG. 9B is a flow chart illustrating a method 20 for generating character classification training data to build a character classification model, consistent with embodiments disclosed herein. The character classification training data images may be created from prototype character images with different random variances in terms of shape, scale, rotation, noise level, etc. The method may also randomly combine multiple prototype characters together in order to create a bi-gram or partial bi-gram training image. In some embodiments, many documents of interest may be collected, and the characters of interest contained within those documents may be manually identified and input into a database collection. In some embodiments, the characters of interest may be prototype characters of interest generated manually or automatically by a computer processor or obtained from a data storage device.

(116) By way of example, method 20 for building character classification training data may include creating a set prototype characters of varying fonts in a data store at step 22. At step 24, one or more prototype characters may be positioned on a noisy background image and saved character training image. These training images may include character and/or non-character data and may be saved in TIFF, JPEG, PNG, or other image file formats.

(117) In some examples, characters that are not of interest may be saved on a data store as training images to be classified as discards or shapes-not-of-interest. For example, lower case characters and certain symbols (e.g., "&", "#", "@", etc.) may be included as training examples to be classified as discard-characters.

(118) In some embodiments, training images may include complete or partial combinations of prototype characters. By way of example, prototype characters of interest may include characters such as "A", "B", "C", "D", Έ", "F", "G", Ή", Ί", "J", "K", "L", "M", "N", "0", "P", "Q", "R", "S", "T", "U", "V", "W, "X", Ύ", "Z", "0", "1 ", "2", "3", "4", "5", "6", "7", "8", "9", 7," "(," ")/·."/·""-". it should be noted that any number of prototype characters or character types across many fonts may be used or implemented as building blocks for generating the character classification training data. The classes of characters included within the character classification training data may be modified or changed by deleting, modifying, or adding to the characters within the character classification training data store. Prototype characters may be generated by creating a set of character images with specified fonts or by cropping character images from actual P&ID images. (119) In some embodiments, two or more adjacent characters, referred to as bi- grams for two characters, tri-grams for three characters, or n-grams for n-characters, may be used as character classification training data. FIG. 9C illustrates several examples of bi-gram patterns. Using complete or partial n-grams as training images within the character classification training data may improve pattern recognition accuracy due to the fact that, within a P&ID or similar document, characters are often followed by other characters. Exemplary methods may include identifying the first character of a bi-gram by incorporating bi-grams corresponding to character touching cases to enhance the classification performance of the model. In particular, accuracy improvement may be observed in recognizing specific characters with minimal distinguishing characteristics such as dash, period, Ί", etc. Training examples where such a minimally-descript character is followed by a 2nd character aides a character classification model in learning to classify such minimally-descript character. The same pattern recognition method may be applied to multiple characters (i.e., three characters for a tri-gram, and n characters for an n-gram).

(120) Character classification training data may include a sequence of prototype characters that either includes or does not include n-grams. By way of example, the sequence of prototype characters may be exemplary labels and tags (e.g., XYZ-123) of interest sourced within the documents to be classified in a database.

(121) Referring to Fig. 9B, the character classification training data may be used to create a character classification model as described above. By way of example, the character classification model may be trained for multiple iterations or batches. In some examples, the number of iterations may be obtained from a user interface. In some examples, the number of iterations may be based on meeting a threshold condition, for example, by gauging the accuracy of the character classification model when applied to a separate model testing dataset (i.e., not training data). The character classification model can be updated by adding misclassified character images to the training data set folder and retraining the character classification model. This process may be used to improve the accuracy of the character classification model over time given P&ID images that may contain characters that are different in font or style from the original character classification training data.

(122) FIG. 10 illustrates an example P&ID diagram. As illustrated, the P&ID diagram includes many engineering symbols representing equipment associated together using connector lines. The connector lines may depict connectivity, e.g., through hydraulic piping, electrical connectivity, or other relationships between the equipment represented by the symbols. The P&ID diagram also includes tags identifying symbols and connectors. The dashed boxes in the P&I D diagram are shown for demonstrative purposes to indicate process loops or other relationships between various equipment (e.g., groups of equipment represented by series of connectors and symbols and connectors that represent a closed or open loop process).

(123) FIG. 9D illustrates a method 40 for recognizing the shapes of characters within a document of interest (e.g., a P&ID document) using a character classification model, grouping recognized characters together, and constructing P&ID tags from the groups of recognized characters. Thus, the contents of a document of interest may be identified, associated with document, and may be indexed for searching purposes.

(124) Method 40 may include identifying all whitespace-segmented contours within the document of interest. Heuristic techniques may be designed to suppress non- character contours and to resize contours that are of different scales. The contours may be identified by detecting and segmenting all connected non-whitespace pixels which are surrounded by whitespace within the image. In some examples, a boundary box may be calculated to localize the characters by taking the maximum and minimum "x" and "y" values for each contour.

(125) Step 44 depicts using a character classification model to classify the identified contours as either characters of interest or contours which are not characters of interest. In some embodiments, the classified character contours can be grouped together based on location and used to construct tags as depicted in steps 46-47. The identified contours are grouped based on the location information of each. Other methods may be used to group related contours. After the contour groups corresponding to tag text areas are generated, a variety of heuristics are designed to add any unrecognized characters, remove the non-characters, refine the group by further separating characters or merging characters based on the character size and spacing in each localized area within the document..

(126) FIG. 9E is a flow chart illustrating an overall machine learning based method for identifying and classifying characters in an image and extracting tags from the image. As illustrated, this method includes generating synthetic training data via character prototypes, training a character recognition model using the synthetic training data, processing an image to extract text and/or tags. The method may also include iteratively improving the character recognition model, for example, by incorporating any misclassified characters into the training data set and updating the machine learning model.

(127) In some examples, generating synthetic training data via prototypes includes creating computer generated prototype characters (e.g., using digitally stored fonts). In some embodiments, the method may include augmenting prototypes with manually selected examples and/or generating training data by algorithmically varying parameters such as scale, translation, and/or rotation. The method may include adding noise. In some embodiments, prototypes may be combined.

(128) In some embodiments, a classification model is generated by training the character recognition model using training data.

(129) In some embodiments, processing the image to extract text and/or tags may include identifying contours using white space segmentation, classifying contour sub- images with a trained classification model, and assembling or grouping classified contours. Hierarchical clustering may be used to group characters based on their proximity to each other. Various heuristics may be applied to refine text groups. In some examples, the method may include additional heuristics for identifying non- segmented contours and determining whether a string is a tag using text

classification. Processing the image to extract text and/or tags may include extracting strings and/or tags for searchability such that tags are associated with a corresponding image (e.g., a P&ID document).

(130) In some embodiments, iteratively improving the character recognition model may include augmenting training data with any misclassified contour sub-images, retraining the character recognition model, and validating the character recognition model's accuracy, e.g., using manual verification or automation using a validation data set.

(131) FIG. 10 is a diagram illustrating a system for categorizing learned patterns of characters. For example, a system for learning patterns of characters 1000 may include one or more servers 1002, one or more client computing platforms 1004, and a searchable database 1020. The searchable database 1020 may store character classification training data, character training models, and/or documents of interest that have been reviewed and categorized based on the identification of learned patterns of characters.

(132) Server 1002 may include one or more processors 1024 and one or more non- transitory memories with computer program instructions 1005 embedded thereon. The computer program instructions may include a machine learning component 1008 and a labeling component 1010. Server 1002 may include a data store 1022. Data store 1022 may include a database.

(133) The machine learning component 1008 may include computer program instructions to cause processor 1024 to implement a method for categorizing learned patterns of characters. More specifically, machine learning component 1008 may cause processor 1024 to apply a deep learning process or convolution neural network to train data input in the data store 1022. The trained data may be sourced and implemented, for example. Client computing platform(s) 1004 may include desktop computers, laptop computers, tablet computers, handheld computers, smart phones, or other computing platforms capable of operating a client interface.

(134) The score/labeling component 1010 may include computer program instructions to cause processor 1024 to implement a method for identifying the patterns of characters and associating the patterns with a score and corresponding label, the character clustering algorithms for constituting the tags, as described herein with respect to FIG. 9D. The documents, indexed with the listed of identified tags may then be input in the P&ID searchable database 1020.

(135) As will be appreciated, the method as described herein may be performed using a computing system having machine executable instructions stored on a tangible medium. The instructions are executable to perform each portion of the method, either autonomously, or with the assistance of input from an operator.

(136) Those skilled in the art will appreciate that the disclosed embodiments described herein are by way of example only, and that numerous variations will exist. The invention is limited only by the claims, which encompass the embodiments described herein as well as variants apparent to those skilled in the art. In addition, it should be appreciated that structural features or method steps shown or described in any one embodiment herein can be used in other embodiments as well.

(137) As used herein, the terms logical circuit and component might describe a given unit of functionality that can be performed in accordance with one or more embodiments of the technology disclosed herein. As used herein, either a logical circuit or a component might be implemented utilizing any form of hardware, software, or a combination thereof. For example, one or more processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines or other mechanisms might be implemented to make up a component. In implementation, the various components described herein might be implemented as discrete components or the functions and features described can be shared in part or in total among one or more components. In other words, as would be apparent to one of ordinary skill in the art after reading this description, the various features and functionality described herein may be implemented in any given application and can be implemented in one or more separate or shared components in various combinations and permutations. Even though various features or elements of functionality may be individually described or claimed as separate components, one of ordinary skill in the art will understand that these features and functionality can be shared among one or more common software and hardware elements, and such description shall not require or imply that separate hardware or software components are used to implement such features or functionality.

(138) Where components, logical circuits, or components of the technology are implemented in whole or in part using software, in one embodiment, these software elements can be implemented to operate with a computing or logical circuit capable of carrying out the functionality described with respect thereto. One such example logical circuit is shown in FIG. 1 1 . Various embodiments are described in terms of this example logical circuit 1 1000. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the technology using other logical circuits or architectures.

(139) Referring now to FIG. 1 1 , computing system 1 1000 may represent, for example, computing or processing capabilities found within desktop, laptop and notebook computers; hand-held computing devices (PDAs, smart phones, cell phones, palmtops, etc.); mainframes, supercomputers, workstations or servers; or any other type of special-purpose or general-purpose computing devices as may be desirable or appropriate for a given application or environment. Logical circuit 1 1000 might represent computing capabilities embedded within or otherwise available to a given device. For example, a logical circuit might be found in other electronic devices such as, for example, digital cameras, navigation systems, cellular telephones, portable computing devices, modems, routers, WAPs, terminals and other electronic devices that might include some form of processing capability.

(140) Computing system 1 1000 might include, for example, one or more

processors, controllers, control components, or other processing devices, such as a processor 1 1004. Processor 1 1004 might be implemented using a general-purpose or special-purpose processing component such as, for example, a microprocessor, controller, or other control logic. In the illustrated example, processor 1 1004 is connected to a bus 1 1002, although any communication medium can be used to facilitate interaction with other components of logical circuit 1 1000 or to communicate externally.

(141) Computing system 1 1000 might include one or more memory components, simply referred to herein as main memory 1 1008. For example, preferably random access memory (RAM) or other dynamic memory, might be used for storing information and instructions to be executed by processor 1 1004. Main memory

1 1008 might be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 1 1004. Logical circuit 1 1000 might likewise include a read only memory ("ROM") or other static storage device coupled to bus 1 1002 for storing static information and instructions for processor 1 1004.

(142) The computing system 1 1000 might include one or more various forms of information storage mechanism 1 1010, which might include, for example, a media drive 1 1012 and a storage unit interface 1 1020. The media drive 1 1012 might include a drive or other mechanism to support fixed or removable storage media 1 1014. For example, a hard disk drive, a floppy disk drive, a magnetic tape drive, an optical disk drive, a CD or DVD drive (R or RW), or other removable or fixed media drive might be provided. Accordingly, storage media 1 1014 might include, for example, a hard disk, a floppy disk, magnetic tape, cartridge, optical disk, a CD or DVD, or other fixed or removable medium that is read by, written to or accessed by media drive 1 1012. As these examples illustrate, the storage media 1 1014 can include a computer usable storage medium having stored therein computer software or data. (143) In alternative embodiments, information storage mechanism 1 1010 might include other similar instrumentalities for allowing computer programs or other instructions or data to be loaded into logical circuit 1 1000. Such instrumentalities might include, for example, a fixed or removable storage unit 1 1022 and an interface 1 1020. Examples of such storage units 1 1022 and interfaces 1 1020 can include a program cartridge and cartridge interface, a removable memory (for example, a flash memory or other removable memory component) and memory slot, a PCMCIA slot and card, and other fixed or removable storage units 1 1022 and interfaces 1 1020 that allow software and data to be transferred from the storage unit 1 1022 to logical circuit 1 1000.

(144) Logical circuit 1 1000 might include a communications interface 1 1024.

Communications interface 1 1024 might be used to allow software and data to be transferred between logical circuit 1 1000 and external devices. Examples of communications interface 1 1024 might include a modem or softmodem, a network interface (such as an Ethernet, network interface card, WiMedia, IEEE 802.XX or other interface), a communications port (such as for example, a USB port, IR port, RS232 port Bluetooth® interface, or other port), or other communications interface. Software and data transferred via communications interface 1 1024 might typically be carried on signals, which can be electronic, electromagnetic (which includes optical) or other signals capable of being exchanged by a given communications interface

1 1024. These signals might be provided to communications interface 1 1024 via a channel 1 1028. This channel 1 1028 might carry signals and might be implemented using a wired or wireless communication medium. Some examples of a channel might include a phone line, a cellular link, an RF link, an optical link, a network interface, a local or wide area network, and other wired or wireless communications channels.

(145) In this document, the terms "computer program medium" and "computer usable medium" are used to generally refer to media such as, for example, memory 1 1008, storage unit 1 1020, media 1 1014, and channel 1 1028. These and other various forms of computer program media or computer usable media may be involved in carrying one or more sequences of one or more instructions to a processing device for execution. Such instructions embodied on the medium, are generally referred to as "computer program code" or a "computer program product" (which may be grouped in the form of computer programs or other groupings). When executed, such instructions might enable the logical circuit 1 1000 to perform features or functions of the disclosed technology as discussed herein.

(146) Although FIG. 1 1 depicts a computer network, it is understood that the disclosure is not limited to operation with a computer network, but rather, the disclosure may be practiced in any suitable electronic device. Accordingly, the computer network depicted in FIG. 1 1 is for illustrative purposes only and thus is not meant to limit the disclosure in any respect.

(147) While various embodiments of the disclosed technology have been described above, it should be understood that they have been presented by way of example only, and not of limitation. Likewise, the various diagrams may depict an example architectural or other configuration for the disclosed technology, which is done to aid in understanding the features and functionality that can be included in the disclosed technology. The disclosed technology is not restricted to the illustrated example architectures or configurations, but the desired features can be implemented using a variety of alternative architectures and configurations. Indeed, it will be apparent to one of skill in the art how alternative functional, logical or physical partitioning and configurations can be implemented to implement the desired features of the technology disclosed herein. Also, a multitude of different constituent component names other than those depicted herein can be applied to the various partitions.

(148) Additionally, regarding flow diagrams, operational descriptions and method claims, the order in which the steps are presented herein shall not mandate that various embodiments be implemented to perform the recited functionality in the same order unless the context dictates otherwise.

(149) Although the disclosed technology is described above in terms of various exemplary embodiments and implementations, it should be understood that the various features, aspects and functionality described in one or more of the individual embodiments are not limited in their applicability to the particular embodiment with which they are described, but instead can be applied, alone or in various

combinations, to one or more of the other embodiments of the disclosed technology, whether or not such embodiments are described and whether or not such features are presented as being a part of a described embodiment. Thus, the breadth and scope of the technology disclosed herein should not be limited by any of the above- described exemplary embodiments.

(150) Terms and phrases used in this document, and variations thereof, unless otherwise expressly stated, should be construed as open ended as opposed to limiting. As examples of the foregoing: the term "including" should be read as meaning "including, without limitation" or the like; the term "example" is used to provide exemplary instances of the item in discussion, not an exhaustive or limiting list thereof; the terms "a" or "an" should be read as meaning "at least one," "one or more" or the like; and adjectives such as "conventional," "traditional," "normal," "standard," "known" and terms of similar meaning should not be construed as limiting the item described to a given time period or to an item available as of a given time, but instead should be read to encompass conventional, traditional, normal, or standard technologies that may be available or known now or at any time in the future. Likewise, where this document refers to technologies that would be apparent or known to one of ordinary skill in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future.

(151) The presence of broadening words and phrases such as "one or more," "at least," "but not limited to" or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent. The use of the term "component" does not imply that the components or functionality described or claimed as part of the component are all configured in a common package. Indeed, any or all of the various

components of a component, whether control logic or other components, can be combined in a single package or separately maintained and can be distributed in multiple groupings or packages or across multiple locations.

(152) Additionally, the various embodiments set forth herein are described in terms of exemplary block diagrams, flow charts and other illustrations. As will become apparent to one of ordinary skill in the art after reading this document, the illustrated embodiments and their various alternatives can be implemented without confinement to the illustrated examples. For example, block diagrams and their accompanying description should not be construed as mandating a particular architecture or configuration.