Intelligent online personal assistant with image text localization

ABSTRACT

Systems, methods, and computer program products for identifying a candidate product in an electronic marketplace based on a visual comparison between candidate product image visual text content and input query image visual text content. Unlike conventional optical character recognition (OCR) based systems, embodiments automatically localize and isolate portions of a candidate product image and an input query image that each contain visual text content, and calculate a visual similarity measure between the respective portions. A trained neural network may be re-trained to more effectively find visual text content by using the localized and isolated visual text content portions as additional ground truths. The visual similarity measure serves as a visual search result score for the candidate product. Any number of images of any number of candidate products may be compared to an input query image to enable text-in-image based product searching without resorting to conventional OCR techniques.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is related by subject matter to these commonly-assigned pending applications:

-   -   Attorney docket number 2043.K75US1, “Intelligent Online Personal         Assistant With Offline Visual Search Database”, filed on Oct.         16, 2016 and pending as U.S. Ser. No. 15/294,767, and     -   Attorney docket number 2043.K76US1, “Intelligent Online Personal         Assistant With Multi-Turn Dialog Based On Visual Search”, filed         on Oct. 16, 2016 and pending as U.S. Ser. No. 15/294,765         each of which is hereby incorporated by reference in its         entirety. The following articles are also each incorporated by         reference in its entirety:     -   Jonathan Long, Evan Shelhamer, Trevor Darrell, “Fully         Convolutional Networks for Semantic Segmentation”, CVPR, June         2015.     -   Shuai Zheng et al., “Conditional Random Fields as Recurrent         Neural Networks”, IEEE International Conference on Computer         Vision (ICCV), 2015.

BACKGROUND

Traditional searching is text-based rather than image-based or voice-based. Searching is overly time-consuming when too many irrelevant results must be presented, browsed, and rejected by a user. The technical limitations of conventional search tools make it difficult for a user to communicate search intent, for example by sharing photos of interesting products, to help start a search that may be refined by further user input, such as in a multi-turn dialog. As online searches balloon to billions of possible selectable products, comparison searching has become more important than ever, but current text-based solutions were not designed for this scale. Irrelevant results are often shown and do not bring out the best results. Traditional forms of comparison searching (search+refinement+browse) are no longer useful.

BRIEF SUMMARY

In one example, an intelligent personal assistant system includes scalable artificial intelligence (AI) that permeates the fabric of existing messaging platforms to provide an intelligent online personal assistant (or “bot”). The system may leverage existing inventories and curated databases to provide intelligent, personalized answers in predictive turns of communication between a human user and an intelligent online personal assistant. One example of an intelligent personal assistant system includes a knowledge graph. Machine learning components may continuously identify and learn from user intents so that user identity and understanding is enhanced over time. The user experience thus provided is inspiring, intuitive, unique, and may be focused on the usage and behavioral patterns of certain age groups, such as millennials, for example.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed in the present document. In order more easily to identify the discussion of any particular element or act, the most significant digit or digits in a reference number refer to the figure number in which that element is first introduced.

FIG. 1 shows a networked system, according to some example embodiments.

FIG. 2 shows a general architecture of an intelligent personal assistant system, according to some example embodiments.

FIG. 3 shows components of a speech recognition component, according to some example embodiments.

FIG. 4 shows a representative software architecture software architecture, which may be used in conjunction with various hardware architectures described herein.

FIG. 5 shows components of a machine, according to some example embodiments, able to read instructions from a machine-readable medium (e.g., a computer-readable storage medium) and perform any one or more of the methodologies discussed herein.

FIG. 6 shows an example environment into which an intelligent online personal assistant can be deployed, according to some example embodiments.

FIG. 7 shows an overview of the intelligent personal assistant system processing natural language user inputs to generate an item recommendation in an electronic marketplace, according to some example embodiments.

FIG. 8 shows a visual search service, according to some example embodiments.

FIG. 9 shows a visual text search, according to some example embodiments.

FIG. 10 shows visual text content localization and isolation, according to some example embodiments.

FIG. 11 shows data augmentation via random scaling, according to some example embodiments.

FIG. 12 shows data augmentation via mirror imaging, according to some example embodiments.

FIG. 13 shows data augmentation via random cropping, according to some example embodiments.

FIG. 14 shows data augmentation via synthetic image generation, according to some example embodiments.

FIG. 15 shows a translation of visual text content into a different human language, according to some example embodiments.

FIG. 16 shows a flowchart of a methodology for identifying a candidate product in an electronic marketplace based on a visual comparison, according to some example embodiments.

DETAILED DESCRIPTION

“CARRIER SIGNAL,” in this context refers to any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such instructions. Instructions may be transmitted or received over the network using a transmission medium via a network interface device and using any one of a number of well-known transfer protocols.

“CLIENT DEVICE” in this context refers to any machine that interfaces to a communications network to obtain resources from one or more server systems or other client devices. A client device may be, but is not limited to, a mobile phone, desktop computer, laptop, portable digital assistants (PDAs), smart phones, tablets, ultra books, netbooks, laptops, multi-processor systems, microprocessor-based or programmable consumer electronics, game consoles, set-top boxes, or any other communication device that a user may use to access a network.

“COMMUNICATIONS NETWORK” in this context refers to one or more portions of a network that may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), the Internet, a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a plain old telephone service (POTS) network, a cellular telephone network, a wireless network, a Wi-Fi® network, another type of network, or a combination of two or more such networks. For example, a network or a portion of a network may include a wireless or cellular network and the coupling may be a Code Division Multiple Access (CDMA) connection, a Global System for Mobile communications (GSM) connection, or other type of cellular or wireless coupling. In this example, the coupling may implement any of a variety of types of data transfer technology, such as Single Carrier Radio Transmission Technology (1xRTT), Evolution-Data Optimized (EVDO) technology, General Packet Radio Service (GPRS) technology, Enhanced Data rates for GSM Evolution (EDGE) technology, third Generation Partnership Project (3GPP) including 3G, fourth generation wireless (4G) networks, Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) standard, others defined by various standard setting organizations, other long range protocols, or other data transfer technology.

“COMPONENT” in this context refers to a device, physical entity or logic having boundaries defined by function or subroutine calls, branch points, application program interfaces (APIs), or other technologies that provide for the partitioning or modularization of particular processing or control functions. Components may be combined via their interfaces with other components to carry out a machine process. A component may be a packaged functional hardware unit designed for use with other components and a part of a program that usually performs a particular function of related functions. Components may constitute either software components (e.g., code embodied on a machine-readable medium) or hardware components. A “hardware component” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner. In various example embodiments, one or more computer systems (e.g., a standalone computer system, a client computer system, or a server computer system) or one or more hardware components of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware component that operates to perform certain operations as described herein. A hardware component may also be implemented mechanically, electronically, or any suitable combination thereof. For example, a hardware component may include dedicated circuitry or logic that is permanently configured to perform certain operations, A hardware component may be a special-purpose processor, such as a Field-Programmable Gate Array (FPGA) or an Application Specific Integrated Circuit (ASIC). A hardware component may also include programmable logic or circuitry that is temporarily configured by software to perform certain operations. For example, a hardware component may include software executed by a general-purpose processor or other programmable processor. Once configured by such software, hardware components become specific machines (or specific components of a machine) uniquely tailored to perform the configured functions and are no longer general-purpose processors. It will be appreciated that the decision to implement a hardware component mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations. Accordingly, the phrase “hardware component” (or “hardware-implemented component”) should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which hardware components are temporarily configured (e.g., programmed), each of the hardware components need not be configured or instantiated at any one instance in time. For example, where a hardware component comprises a general-purpose processor configured by software to become a special-purpose processor, the general-purpose processor may be configured as respectively different special-purpose processors (e.g., comprising different hardware components) at different times. Software accordingly configures a particular processor or processors, for example, to constitute a particular hardware component at one instance of time and to constitute a different hardware component at a different instance of time. Hardware components can provide information to, and receive information from, other hardware components. Accordingly, the described hardware components may be regarded as being communicatively coupled. Where multiple hardware components exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) between or among two or more of the hardware components. In embodiments in which multiple hardware components are configured or instantiated at different times, communications between such hardware components may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware components have access. For example, one hardware component may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware component may then, at a later time, access the memory device to retrieve and process the stored output. Hardware components may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information). The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented components that operate to perform one or more operations or functions described herein. As used herein, “processor-implemented component” refers to a hardware component implemented using one or more processors. Similarly, the methods described herein may be at least partially processor-implemented, with a particular processor or processors being an example of hardware. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented components. Moreover, the one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., an Application Program Interface (API)). The performance of certain of the operations may be distributed among the processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processors or processor-implemented components may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other example embodiments, the processors or processor-implemented components may be distributed across a number of geographic locations.

“MACHINE-READABLE MEDIUM” in this context refers to a component, device or other tangible media able to store instructions and data temporarily or permanently and may include, but is not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, optical media, magnetic media, cache memory, other types of storage (e.g., Erasable Programmable Read-Only Memory (EEPROM)) and/or any suitable combination thereof. The term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions, The term “machine-readable medium” will also be taken to include any medium, or combination of multiple media, that is capable of storing instructions (e.g., code) for execution by a machine, such that the instructions, when executed by one or more processors of the machine, cause the machine to perform any one or more of the methodologies described herein. Accordingly, a “machine-readable medium” refers to a single storage apparatus or device, as well as “cloud-based” storage systems or storage networks that include multiple storage apparatus or devices. The term “machine-readable medium” excludes signals per se.

“PROCESSOR” in this context refers to any circuit or virtual circuit (a physical circuit emulated by logic executing on an actual processor) that manipulates data values according to control signals (e.g., “commands”, “op codes”, “machine code”, etc.) and which produces corresponding output signals that are applied to operate a machine. A processor may, for example, be a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC) or any combination thereof. A processor may further be a multi-core processor having two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously.

A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever. The following notice applies to the software and data as described below and in the drawings that form a part of this document: Copyright 2016, eBay Inc, All Rights Reserved.

The description that follows includes systems, methods, techniques, instruction sequences, and computing machine program products that embody illustrative embodiments of the disclosure. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide an understanding of various embodiments of the inventive subject matter. It will be evident, however, to those skilled in the art, that embodiments of the inventive subject matter may be practiced without these specific details. In general, well-known instruction instances, protocols, structures, and techniques are not necessarily shown in detail.

With reference to FIG. 1, an example embodiment of a high-level SaaS network architecture 100 is shown. A networked system 116 provides server-side functionality via a network 110 (e.g., the Internet or wide area network (WAN)) to a client device 108. A web client 102 and a programmatic client, in the example form of an application 104 are hosted and execute on the client device 108. The networked system 116 includes and application server 122, which in turn hosts an intelligent personal assistant system 106 that provides a number of functions and services to the application 104 that accesses the networked system 116. The application 104 also provides a number of interfaces described herein, which present output of the tracking and analysis operations to a user of the client device 108.

The client device 108 enables a user to access and interact with the networked system 116. For instance, the user provides input (e.g., touch screen input or alphanumeric input) to the client device 108, and the input is communicated to the networked system 116 via the network 110. In this instance, the networked system 116, in response to receiving the input from the user, communicates information back to the client device 108 via the network 110 to be presented to the user.

An Application Program Interface (API) server 118 and a web server 120 are coupled to, and provide programmatic and web interfaces respectively, to the application server 122. The application server 122 hosts an intelligent personal assistant system 106, which includes components or applications. The application server 122 is, in turn, shown to be coupled to a database server 124 that facilitates access to information storage repositories (e.g., a database/cloud 126). In an example embodiment, the database/cloud 126 includes storage devices that store information accessed and generated by the intelligent personal assistant system 106.

Additionally, a third party application 114, executing on a third party server 112, is shown as having programmatic access to the networked system 116 via the programmatic interface provided by the Application Program Interface (API) server 118. For example, the third party application 114, using information retrieved from the networked system 116, may support one or more features or functions on a website hosted by the third party.

Turning now specifically to the applications hosted by the client device 108, the web client 102 may access the various systems (e.g., intelligent personal assistant system 106) via the web interface supported by the web server 120. Similarly, the application 104 (e.g., an “app”) accesses the various services and functions provided by the intelligent personal assistant system 106 via the programmatic interface provided by the Application Program Interface (API) server 118. The application 104 may, for example, an “app” executing on a client device 108, such as an iOS or Android OS application to enable user to access and input data on the networked system 116 in an off-line manner, and to perform batch-mode communications between the programmatic client application 104 and the networked system networked system 116.

Further, while the SaaS network architecture 100 shown in FIG. 1 employs a client-server architecture, the present inventive subject matter is of course not limited to such an architecture, and could equally well find application in a distributed, or peer-to-peer, architecture system, for example. The intelligent personal assistant system 106 could also be implemented as a standalone software program, which does not necessarily have networking capabilities.

FIG. 2 is a block diagram showing the general architecture of an intelligent personal assistant system 106, according to some example embodiments. Specifically, the intelligent personal assistant system 106 is shown to include a front end component 202 (FE) by which the intelligent personal assistant system 106 communicates (e.g., over the network 110) with other systems within the SaaS network architecture 100. The front end component 202 can communicate with the fabric of existing messaging systems. As used herein, the term messaging fabric refers to a collection of APIs and services that can power third party platforms such as Facebook messenger, Microsoft Cortana and other “bots”. In one example, a messaging fabric can support an online commerce ecosystem that allows users to interact with commercial intent. Output of the front end component 202 can be rendered in a display of a client device, such as the client device 108 in FIG. 1 as part of an interface with an intelligent personal assistant, or “bot”.

The front end component 202 of the intelligent personal assistant system 106 is coupled to a back end component 204 for the front end (BFF) that operates to link the front end component 202 with an artificial intelligence framework 128. The artificial intelligence framework 128 may include several components as discussed below. The data exchanged between various components and the function of each component may vary to some extent, depending on the particular implementation.

In one example of an intelligent personal assistant system 106, an AI orchestrator 206 orchestrates communication between components inside and outside the artificial intelligence framework 128. Input modalities for the AI orchestrator 206 may be derived from a computer vision component 208, a speech recognition component 210, and a text normalization component which may form part of the speech recognition component 210, for example. The computer vision component 208 may identify objects and attributes from visual input (e.g., a photo). The speech recognition component 210 may convert audio signals (e.g., spoken utterances) into text. A text normalization component may operate to make input normalization, such as language normalization by rendering emoticons into text, for example. Other normalization is possible such as orthographic normalization, foreign language normalization, conversational text normalization, and so forth.

The artificial intelligence framework 128 further includes a natural language understanding or NLU component 214 that operates to extract user intent and various intent parameters. The NLU component 214 is described in further detail beginning with FIG. 8.

The artificial intelligence framework 128 further includes a dialog manager 216 that operates to understand a “completeness of specificity” (for example of an input, such as a search query or utterance) and decide on a next action type and a related parameter (e.g., “search” or “request further information from user”). For convenience, all user inputs in this description may be referred to as “utterances”, whether in text, voice, or image-related formats.

In one example, the dialog manager 216 operates in association with a context manager 218 and a Natural Language Generation (NLG) component 212. The context manager 218 manages the context and communication of a user with respect to the intelligent online personal assistant (or “bot”) and the assistant's associated artificial intelligence. The context manager 218 retains a short term history of user interactions. A longer term history of user preferences may be retained in an identity service 222, described below. Data entries in one or both of these histories may include the relevant intent and all parameters and all related results of a given input, bot interaction, or turn of communication, for example. The NLG component 212 operates to compose a natural language utterance out of an AI message to present to a user interacting with the intelligent bot.

A search component 220 is also included within the artificial intelligence framework 128. The search component 220 may have front and back end units. The back end unit may operate to manage item or product inventory and provide functions of searching against the inventory, optimizing towards a specific tuple of user intent and intent parameters. The search component 220 is designed to serve several billion queries per day globally against very large high quality inventories. The search component 220 can accommodate text, or Artificial Intelligence (AI) encoded voice and image inputs, and identify relevant inventory items to users based on explicit and derived query intents.

An identity service 222 component operates to manage user profiles, for example explicit information in the form of user attributes, e.g., “name”, “age”, “gender”, “geolocation”, but also implicit information in forms such as “information distillates” such as “user interest”, or “similar persona”, and so forth. The artificial intelligence framework 128 may comprise part of or operate in association with, the identity service 222. The identity service 222 includes a set of policies, APIs, and services that elegantly centralizes all user information, helping the artificial intelligence framework 128 to have “intelligent” insights into user intent. The identity service 222 can protect online retailers and users from fraud or malicious use of private information.

The identity service 222 of the present disclosure provides many advantages. The identity service 222 is a single central repository containing user identity and profile data. It may continuously enrich the user profile with new insights and updates. It uses account linking and identity federation to map relationships of a user with a company, household, other accounts (e.g., core account), as well as a user's social graph of people and relationships. The identity service 222 evolves a rich notification system that communicates all and only the information the user wants at the times and media they choose.

In one example, the identity service 222 concentrates on unifying as much user information as possible in a central clearinghouse for search, AI, merchandising, and machine learning models to maximize each component's capability to deliver insights to each user, A single central repository contains user identity and profile data in a meticulously detailed schema. In an onboarding phase, the identity service 222 primes a user profile and understanding by mandatory authentication in a bot application. Any public information available from the source of authentication (e.g., social media) may be loaded. In sideboarding phases, the identity service 222 may augment the profile with information about the user that is gathered from public sources, user behaviors, interactions, and the explicit set of purposes the user tells the AI (e.g., shopping missions, inspirations, preferences). As the user interacts with the artificial intelligence framework 128, the identity service 222 gathers and infers more about the user and stores the explicit data, derived information, and updates probabilities and estimations of other statistical inferences. Over time, in profile enrichment phases, the identity service 222 also mines behavioral data such as clicks, impressions, and browse activities for derived information such as tastes, preferences, and shopping verticals. In identity federation and account linking phases, when communicated or inferred, the identity service 222 updates the user's household, employer, groups, affiliations, social graph, and other accounts, including shared accounts.

The functionalities of the artificial intelligence framework 128 can be grouped into multiple parts, for example decisioning and context parts. In one example, the decisioning part includes operations by the AI orchestrator 206, the NLU component 214, the dialog manager 216, the NLG component 212, the computer vision component 208 and speech recognition component 210. The context part of the AI functionality relates to the parameters (implicit and explicit) around a user and the communicated intent (for example, towards a given inventory, or otherwise). In order to measure and improve AI quality over time, the artificial intelligence framework 128 may be trained using sample queries (e.g., a dev set) and tested on a different set of queries (e.g., an eval set), where both sets may be developed by human curation. Also, the artificial intelligence framework 128 may be trained on transaction and interaction flows defined by experienced curation specialists, or human tastemaker override rules 224. The flows and the logic encoded within the various components of the artificial intelligence framework 128 define what follow-up utterance or presentation (e.g., question, result set) is made by the intelligent assistant based on an identified user intent.

Reference is made further above to example input modalities of the intelligent online personal assistant or bot in an intelligent personal assistant system 106. The intelligent personal assistant system 106 seeks to understand a user's intent (e.g., targeted search, compare, shop/browse, and so forth) and any mandatory parameters (e.g., product, product category, item, and so forth) and/or optional parameters (e.g., explicit information such as attributes of item/product, occasion, and so forth) as well as implicit information (e.g., geolocation, personal preferences, age, and gender, and so forth) and respond to the user with a well thought out or “intelligent” response. Explicit input modalities may include text, speech, and visual input and can be enriched with implicit knowledge of user (e.g., geolocation, previous browse history, and so forth). Output modalities can include text (such as speech, or natural language sentences, or product-relevant information, and images on the screen of a smart device, e.g., client device 108. Input modalities thus refer to the different ways users can communicate with the bot. Input modalities can also include keyboard or mouse navigation, touch-sensitive gestures, and so forth.

In relation to a modality for the computer vision component 208, a photograph can often represent what a user is looking for better than text. The user may not know what an item is called, or it may be hard or even impossible to use text for fine detailed information that only an expert may know, for example a complicated pattern in apparel or a certain style in furniture. Moreover, it is inconvenient to type complex text queries on mobile phones, and long text queries typically have poor recall. Thus, key functionalities of the computer vision component 208 may include object localization, object recognition, optical character recognition (OCR) and matching against inventory based on visual cues from an image or video. A bot enabled with computer vision is advantageous when running on a mobile device which has a built-in camera. Powerful deep neural networks can be used to enable computer vision applications.

In one example, the dialog manager 216 has as sub-components the context manager 218 and the NLG component 212. As mentioned above, the dialog manager 216 operates to understand the “completeness of specificity” and deciding on a next action type and parameter (e.g., “search” or “request further information from user”). The context manager 218 operates to manage the context and communication of a given user towards the bot and its AI. The context manager 218 comprises two parts: a long term history and a short term memory. Each context manager entry may describe the relevant intent and all parameters and all related results. The context is towards the inventory, as well as towards other, future sources of knowledge. The NLG component 212 operates to compose a natural language utterance out of an AI message to present to a user interacting with the intelligent bot.

Fluent, natural, informative, and even entertaining dialog between man and machine is a difficult technical problem that has been studied for much of the past century, yet is still considered unsolved. However, recent developments in AI have produced useful dialog systems such as Siri™ and Alexa™.

In an ecommerce example of an intelligent bot, an initial very helpful element in seeking to solve this problem is to leverage enormous sets of e-commerce data. Some of this data may be retained in proprietary databases or in the cloud e.g., database/cloud 126. Statistics about this data may be communicated to dialog manager 216 from the search component 220 as context. The artificial intelligence framework 128 may act directly upon utterances from the user, which may be run through speech recognition component 210, then the NLU component 214, and then passed to context manager 218 as semi-parsed data. The NLG component 212 may thus help the dialog manager 216 generate human-like questions and responses in text or speech to the user. The context manager 218 maintains the coherency of multi-turn and long term discourse between the user and the artificial intelligence framework 128.

Discrimination may be recommended to poll a vast e-commerce dataset for only relevant, useful information. In one example, the artificial intelligence framework 128 uses results from the search component 220 and intelligence within the search component 220 to provide this information. This information may be combined with the history of interaction from the context manager 218. The artificial intelligence framework 128 then may decide on the next turn of dialog, e.g., whether it should be a question, or a “grounding statement” to validate, for example, an existing understanding or user intent, or an item recommendation (or, for example, any combination of all three). These decisions may be made by a combination of the dataset, the chat history of the user, and a model of the user's understanding. The NLG component 212 may generate language for a textual or spoken reply to the user based on these decisions.

Technical solutions provided by the present inventive subject matter allow users to communicate with an intelligent online personal assistant in a natural conversation. The assistant is efficient as over time it increasingly understands specific user preferences and is knowledgeable about a wide range of products. Though a variety of convenient input modalities, a user can share photos, or use voice or text, and the assisted user experience may be akin to talking to a trusted, knowledgeable human shopping assistant in a high-end store, for example.

Conventionally, the approach and data used by online shopping systems aim at a faceless demographic group of buyers with blunt, simplified assumptions to maximize short-term revenue. Conventional sites and apps do not understand how, why, and when users want to be notified. Notifications may be annoying, inappropriate, and impersonal, oblivious to each user's preferences. One person is not the same as a single account. People share accounts and devices. Passwords make platforms neither safe nor easy to use. Problems of weak online identity and the ignoring of environmental signals (such as device, location, notification after anomalous behavior) make it easy to conduct fraud in the marketplace.

With reference to FIG. 3, the illustrated components of the speech recognition component 210 are now described. A feature extraction component operates to convert raw audio waveform to some-dimensional vector of numbers that represents the sound. This component uses deep learning to project the raw signal into a high-dimensional semantic space. An acoustic model component operates to host a statistical model of speech units, such as phonemes and allophones. These can include Gaussian Mixture Models (GMM) although the use of Deep Neural Networks is possible. A language model component uses statistical models of grammar to define how words are put together in a sentence. Such models can include n-gram-based models or Deep Neural Networks built on top of word embeddings. A speech-to-text (STT) decoder component may convert a speech utterance into a sequence of words typically leveraging features derived from a raw signal using the feature extraction component, the acoustic model component, and the language model component in a Hidden Markov Model (HMM) framework to derive word sequences from feature sequences. In one example, a speech-to-text service in the cloud (e.g., database/cloud 126) has these components deployed in a cloud framework with an API that allows audio samples to be posted for speech utterances and to retrieve the corresponding word sequence. Control parameters are available to customize or influence the speech-to-text process.

In one example of an artificial intelligence framework 128, two additional parts for the speech recognition component 210 are provided, a speaker adaptation component and a Language Model (LM) adaptation component. The speaker adaptation component allows clients of an STT system (e.g., speech recognition component 210) to customize the feature extraction component and/or the acoustic model component for each speaker/user. This can be important because most speech-to-text systems are trained on data from a representative set of speakers from a target region and typically the accuracy of the system depends heavily on how well the target speaker matches the speakers in the training pool. The speaker adaptation component allows the speech recognition component 210 (and consequently the artificial intelligence framework 128) to be robust to speaker variations by continuously learning the idiosyncrasies of a user's intonation, pronunciation, accent, and other speech factors, and apply these to the speech-dependent components, e.g., the feature extraction component, and the acoustic model component. While this approach may require a small voice profile to be created and persisted for each speaker, the potential benefits of accuracy generally far outweigh the storage drawbacks.

The LM adaptation component operates to customize the language model component and the speech-to-text vocabulary with new words and representative sentences from a target domain, for example, inventory categories or user personas. This capability allows the artificial intelligence framework 128 to be scalable as new categories and personas are supported.

FIG. 3 also shows a flow sequence 302 for text normalization in an artificial intelligence framework 128. A text normalization component performing the flow sequence 302 is included in the speech recognition component 210 in one example. Key functionalities in the flow sequence 302 include orthographic normalization (to handle punctuation, numbers, case, and so forth), conversational text normalization (to handle informal chat-type text with acronyms, abbreviations, incomplete fragments, slang, and so forth), and machine translation (to convert a normalized sequence of foreign-language words into a sequence of words in an operating language, including but not limited to English for example).

The artificial intelligence framework 128 facilitates modern communications. Millennials for example often want to communicate via photos, voice, and text. The technical ability of the artificial intelligence framework 128 to use multiple modalities allows the communication of intent instead of just text. The artificial intelligence framework 128 provides technical solutions and is efficient. It is faster to interact with a smart personal assistant using voice commands or photos than text in many instances.

FIG. 4 is a block diagram illustrating an example software architecture 406, which may be used in conjunction with various hardware architectures described herein. FIG. 4 is a non-limiting example of a software architecture and it will be appreciated that many other architectures may be implemented to facilitate the functionality described herein. The software architecture 406 may execute on hardware such as machine 500 of FIG. 5 that includes, among other things, processors 504, memory 514, and input/output (I/O) components 518. A representative hardware layer 452 is illustrated and can represent, for example, the machine 500 of FIG. 5. The representative hardware layer 452 includes a processing unit 454 having associated executable instructions 404. Executable instructions 404 represent the executable instructions of the software architecture 406, including implementation of the methods, components and so forth described herein. The hardware layer 452 also includes memory and/or storage modules memory/storage 456, which also have executable instructions 404. The hardware layer 452 may also comprise other hardware 458.

In the example architecture of FIG. 4, the software architecture 406 may be conceptualized as a stack of layers where each layer provides particular functionality. For example, the software architecture 406 may include layers such as an operating system 402, libraries 420, applications 416 and a presentation layer 414. Operationally, the applications 416 and/or other components within the layers may invoke application programming interface (API) calls 408 through the software stack and receive a response as in response to the API calls 408. The layers illustrated are representative in nature and not all software architectures have all layers. For example, some mobile or special purpose operating systems may not provide a frameworks/middleware 418, while others may provide such a layer. Other software architectures may include additional or different layers.

The operating system 402 may manage hardware resources and provide common services. The operating system 402 may include, for example, a kernel 422, services 424 and drivers 426. The kernel 422 may act as an abstraction layer between the hardware and the other software layers. For example, the kernel 422 may be responsible for memory management, processor management (e.g., scheduling), component management, networking, security settings, and so on. The services 424 may provide other common services for the other software layers. The drivers 426 are responsible for controlling or interfacing with the underlying hardware. For instance, the drivers 426 may include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, power management drivers, and so forth depending on the hardware configuration.

The libraries 420 provide a common infrastructure that is used by the applications 416 and/or other components and/or layers. The libraries 420 may provide functionality that allows other software components to perform tasks in an easier fashion than to interface directly with the underlying operating system 402 functionality (e.g., kernel 422, services 424, and/or drivers 426). The libraries 420 may include system libraries 444 (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematical functions, and the like. In addition, the libraries 420 may include API libraries 446 such as media libraries (e.g., libraries to support presentation and manipulation of various known media formats such as MPREG4, H.264, MP3, AAC, AMR, JPG, and PNG), graphics libraries (e.g., an OpenGL framework that may be used to render 2D and 3D graphic content on a display), database libraries (e.g., SQLite that may provide various relational database functions), web libraries (e.g., WebKit that may provide web browsing functionality), and the like. The libraries 420 may also include a wide variety of other libraries 448 to provide many other APIs to the applications 416 and other software components/modules.

The frameworks frameworks/middleware 418 (also sometimes referred to as middleware) may provide a higher-level common infrastructure that may be used by applications 416 and/or other software components/modules. For example, the frameworks/middleware 418 may provide various graphic user interface (GUI) functions, high-level resource management, high-level location services, and so forth. The frameworks/middleware 418 may provide a broad spectrum of other APIs that may be utilized by the applications 416 and/or other software components/modules, some of which may be specific to a particular operating system or platform.

The applications 416 include built-in applications 438 and/or third-party applications 440. Examples of representative built-in applications 438 may include, but are not limited to, a contacts application, a browser application, a book reader application, a location application, a media application, a messaging application, and/or a game application. Third-party applications 440 may include any an application developed using the ANDROID™ or IOS™ software development kit (SDK) by an entity other than the vendor of the particular platform, and may be mobile software running on a mobile operating system such as IOS™, ANDROID™, WINDOWS® Phone, or other mobile operating systems. The third-party applications 440 may invoke the API calls 408 provided by the mobile operating system (such as operating system 402) to facilitate functionality described herein.

The applications 416 may use built in operating system functions (e.g., kernel 422, services 424 and/or drivers 426), libraries 420, and frameworks/middleware 418 to create user interfaces to interact with users of the system. Alternatively, or additionally, in some systems interactions with a user may occur through a presentation layer, such as presentation layer 414. In these systems, the application/component “logic” can be separated from the aspects of the application/component that interact with a user.

Some software architectures use virtual machines. In the example of FIG. 4, this is illustrated by a virtual machine 410. The virtual machine 410 creates a software environment where applications/components can execute as if they were executing on a hardware machine (such as the machine 500 of FIG. 5, for example). The virtual machine 410 is hosted by a host operating system (operating system (OS) 436 in FIG. 4) and typically, although not always, has a virtual machine monitor 460, which manages the operation of the virtual machine as well as the interface with the host operating system (e.g., operating system 402). A software architecture executes within the virtual machine 410 such as an operating system operating system (OS) 436, libraries 434, frameworks 432, applications 430 and/or presentation layer 428. These layers of software architecture executing within the virtual machine 410 can be the same as corresponding layers previously described or may be different.

FIG. 5 is a block diagram illustrating components of a machine 500, according to some example embodiments, which is able to read instructions from a machine-readable medium (e.g., a machine-readable storage medium) and perform any one or more of the methodologies discussed herein. Specifically, FIG. 5 shows a diagrammatic representation of the machine 500 in the example form of a computer system, within which instructions 510 (e.g., software, a program, an application, an applet, an app, or other executable code) for causing the machine 500 to perform any one or more of the methodologies discussed herein may be executed. As such, the instructions may be used to implement modules or components described herein. The instructions transform the general, non-programmed machine into a particular machine programmed to carry out the described and illustrated functions in the manner described. In alternative embodiments, the machine 500 operates as a standalone device or may be coupled (e.g., networked) to other machines. In a networked deployment, the machine 500 may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine 500 may comprise, but is not limited to, a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, a netbook, a set-top box (STB), a personal digital assistant (PDA), an entertainment media system, a cellular telephone, a smart phone, a mobile device, a wearable device (e.g., a smart watch), a smart home device (e.g., a smart appliance), other smart devices, a web appliance, a network router, a network switch, a network bridge, or any machine capable of executing the instructions 510, sequentially or otherwise, that specify actions to be taken by machine 500. Further, while only a single machine 500 is illustrated, the term “machine” will also be taken to include a collection of machines that individually or jointly execute the instructions 510 to perform any one or more of the methodologies discussed herein.

The machine 500 may include processors 504, memory memory/storage 506, and I/O components 518, which may be configured to communicate with each other such as via a bus 502. The memory/storage 506 may include a memory 514, such as a main memory, or other memory storage, and a storage unit 516, both accessible to the processors 504 such as via the bus 502. The storage unit 516 and memory 514 store the instructions 510 embodying any one or more of the methodologies or functions described herein. The instructions 510 may also reside, completely or partially, within the memory 514, within the storage unit 516, within at least one of the processors 504 (e.g., within the processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 500. Accordingly, the memory 514, the storage unit 516, and the memory of processors 504 are examples of machine-readable media.

The I/O components 518 may include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. The specific I/O components 518 that are included in a particular machine will depend on the type of machine. For example, portable machines such as mobile phones will likely include a touch input device or other such input mechanisms, while a headless server machine will likely not include such a touch input device. It will be appreciated that the I/O components 518 may include many other components that are not shown in FIG. 5. The I/O components 518 are grouped according to functionality merely for simplifying the following discussion and the grouping is in no way limiting. In various example embodiments, the I/O components 518 may include output components 526 and input components 528. The output components 526 may include visual components (e.g., a display such as a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)), acoustic components (e.g., speakers), haptic components (e.g., a vibratory motor, resistance mechanisms), other signal generators, and so forth. The input components 528 may include alphanumeric input components (e.g., a keyboard, a touch screen configured to receive alphanumeric input, a photo-optical keyboard, or other alphanumeric input components), point based input components (e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, or other pointing instrument), tactile input components (e.g., a physical button, a touch screen that provides location and/or force of touches or touch gestures, or other tactile input components), audio input components (e.g., a microphone), and the like.

In further example embodiments, the I/O components 518 may include biometric components 530, motion components 534, environmental environment components 536, or position components 538 among a wide array of other components. For example, the biometric components 530 may include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram based identification), and the like. The motion components 534 may include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope), and so forth. The environment components 536 may include, for example, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermometer that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., gas detection sensors to detection concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment. The position components 538 may include location sensor components (e.g., a Global Position System (GPS) receiver component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.

Communication may be implemented using a wide variety of technologies. The I/O components 518 may include communication components 540 operable to couple the machine 500 to a network 532 or devices 520 via coupling 522 and coupling 524 respectively. For example, the communication components 540 may include a network interface component or other suitable device to interface with the network 532. In further examples, communication components 540 may include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. The devices 520 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a Universal Serial Bus (USB)).

Moreover, the communication components 540 may detect identifiers or include components operable to detect identifiers. For example, the communication components processors communication components 540 may include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and other optical codes), or acoustic detection components (e.g., microphones to identify tagged audio signals). In addition, a variety of information may be derived via the communication components 540, such as, location via Internet Protocol (IP) geo-location, location via Wi-Fi® signal triangulation, location via detecting a NFC beacon signal that may indicate a particular location, and so forth.

With reference now to FIG. 6, an example environment 600 into which an intelligent online personal assistant provided by the intelligent personal assistant system 106 can be deployed is shown. At the center of the environment 600, the intelligent bot 602 with AI appears. The bot leverages the computer vision component 208, the speech recognition component 210, the NLU component 214, the dialog manager 216, the NLG component 212, the search component 220, and identity service 222 to engage users in efficient, interesting, and effective dialog to decode their intent and deliver personalized results.

An associated application 604 can showcase the bot 602's full power and intelligence with compelling mobile design capabilities and elements. The fabric 606 integrates with Facebook Messenger™, Skype™, and Cortana™ (for example) to enable users to transact where they are already spending time. A smart notifications 610 platform delivers the right information at the right time via any number of channels (e.g., SMS, push notification, email, messaging) to users to encourage them to engage with the bot 602 and associated marketplaces. Communities 608 features enable users to connect, engage, and interact with their friends, tastemakers, and brands using the same messaging systems in which they already spend most of their time. Other features include group buying and gift buying. A rewards 612 platform incentivizes users to engage more deeply with the bot 602. Rewards can include deep discounts on products, access to unique inventory, and recognition in the app through scores, levels, etc. At marketing 614, a combination of traditional, social and other marketing is performed to win the attention of some populations (e.g., millennials) in more personal ways. Conventional techniques can include merchandising, email, search engine optimization (SEO), and search engine marketing (SEM) as well as experimental techniques such as social ads, viral coupons, and more to target new and existing users.

FIG. 7 shows an overview of the intelligent personal assistant system 106 processing natural language user inputs to generate an item recommendation in an electronic marketplace. Although the intelligent personal assistant system 106 is not limited to this use scenario, it may be of particular utility in this situation. As previously described, any combination of text, image, and voice data may be received by the artificial intelligence framework 128. Image data may be processed by the computer vision component 208 to provide image attribute data. Voice data may be processed by the speech recognition component 210 into text.

All of these inputs and others may be provided to the NUJ component 214 for analysis. The NLU component 214 may operate to parse user inputs and help determine the user intent and intent-related parameters. For example, the NLU component 214 may discern the dominant object of user interest, and a variety of attributes and attribute values related to that dominant object. The NLU component 214 may also determine other parameters such as the user input type (e.g., a question or a statement) and targeted item recipients. The NLU component 214 may provide extracted data to the dialog manager 216, as well as the AI orchestrator 206 previously shown.

The NLU component 214 may generally transform formal and informal natural language user inputs into a more formal, machine-readable, structured representation of a user's query. That formalized query may be enhanced further by the dialog manager 216. In one scenario, the NLU component 214 processes a sequence of user inputs including an original query and further data provided by a user in response to machine-generated prompts from the dialog manager 216 in a multi-turn interactive dialog. This user-machine interaction may improve the efficiency and accuracy of one or more automated searches for the most relevant items available for purchase in an electronic marketplace. The searches may be performed by the search component 220.

Extracting user intent is very helpful for the AI bot in determining what further action is needed. In one ecommerce-related example, at the very highest level, user intent could be shopping, chit-chat, jokes, weather, etc. If the user intent is shopping, it could relate to the pursuit of a specific shopping mission, gifting an item for a target recipient other than the user, or just to browse an inventory of items available for purchase. Once the high level intent is identified, the artificial intelligence framework 128 is tasked with determining what the user is looking for; that is, is the need broad (e.g., shoes, dresses) or more specific (e.g., two pairs of new black Nike™ size 10 sneakers) or somewhere in between (e.g., black sneakers)?

In a novel and distinct improvement over the prior art in this field, the artificial intelligence framework 128 may map the user request to certain primary dimensions, such as categories, attributes, and attribute values, that best characterize the available items desired. This gives the bot the ability to engage with the user to further refine the search constraints if necessary. For example, if a user asks the bot for information relating to dresses, the top attributes that need specification might be color, material, and style. Further, over time, machine learning may add deeper semantics and wider “world knowledge” to the system, to better understand the user intent. For example the input “I am looking for a dress for a wedding in June in Italy” means the dress should be appropriate for particular weather conditions at a given time and place, and should be appropriate for a formal occasion. Another example might include a user asking the bot for “gifts for my nephew”, The artificial intelligence framework 128 when trained will understand that gifting is a special type of intent, that the target recipient is male based on the meaning of “nephew”, and that attributes such as age, occasion, and hobbies/likes of the target recipient should be clarified.

FIG. 8 shows a visual search service 800, according to some example embodiments. The present inventors have recognized, among other things, that a product search based on an image query may help users find products of interest in an electronic marketplace more quickly and easily than via a traditional text-based product search. The visual search service 800 may, in one embodiment, comprise software instructions called for execution on at least one hardware-based processor by the AI orchestrator 206 which coordinates information within the artificial intelligence framework 128 as previously described. In one embodiment, the visual search service 800 may be part of the computer vision component 208, but in general the visual search service 800 may coordinate information between any number of components.

The visual search service 800 may receive an image query 802 originating from a user which may comprise one or more images the user believes will be helpful in finding a particular product. For simplicity, but not by limitation, this description refers to image query 802 as comprising a single input query image. The input query image may comprise a photograph, a video frame, a sketch, or a diagram, for example. The input query image is typically a digital image file such as may be produced by a portable camera or smartphone, or such as may be copied from a web site or an electronic message.

The visual search service 800 may comprise or interact with a number of functional component blocks, which may each comprise a hardware processor implemented software program for example. A deep neural network block 804 may process the input query image to identify and locate (e.g., localize) particular content it has been trained to recognize, such as visual text content for example. Visual text content may comprise those pixels of an image that represent text in at least one human language. In this description, “text” may include alphabetic characters (as used in English, for example) as well as logagraphic characters (as used in Chinese, for example). More broadly, text may comprise any visual content that may be semantically associated with written human linguistic expression.

In one embodiment, the deep neural network 804 may comprise a fully convolutional neural network (FCN) as described in the previously cited article by Long et al. In another embodiment, the deep neural network 804 may comprise a hybrid neural network (termed a CRF-RNN) including a fully convolutional neural network and a recurrent network (RNN) that includes conditional random fields (CRF) as described in the previously cited article by Zheng et al. Any neural network capable of localizing visual text content may be considered to be within the scope of this description.

The deep neural network 804 may further operate to isolate the text it has localized. That is, those pixels of an image that have a sufficient modeled relation to the ground truths used to train the neural network may be effectively passed through a binary mask, while other pixels may not be passed through the binary mask. The result is that localized text may be effectively delineated from the rest of the image, so the rest of the image will not be included in further processing. The localized text may form bounded regions within the overall image. Images processed by the deep neural network 804 may comprise an input query image from the image query 802 as well as any number of images associated with any number of candidate products in an electronic marketplace, for example. No human user intervention is required to identify, locate, and isolate the visual text content.

In one embodiment, the localized and isolated visual text content may be used to re-train a neural network, such as the deep neural network block 804 or another neural network, to improve the process of localizing text. That is, the re-trained neural network may more effectively find visual text content because it uses the localized and isolated visual text content portions as additional ground truths. The exclusion of image regions that are not deemed to be visual text content may effectively lead to better training examples for a neural network.

The localized and isolated visual text content may be passed to a number of different functional component blocks, which may each comprise a hardware processor implemented software program as previously noted. A leaf category prediction block 806 may help determine to which particular potentially defined category or subcategory in an electronic marketplace a given image is related (e.g., “men's dress shoes”, “dome camping tent”) based on the visual text content provided. Use of predicted categories may sharply reduce the possible search space in an electronic marketplace that may have a very large overall number of product listings available. This search space reduction may increase both the speed of a search and the relevance of the search results found.

An image signature block 808 may produce a binary hash or “image signature” that concisely describes an image or image portion, such as the localized and isolated visual text content. Any form of image signature may be considered to be within the scope of this description. In general, an image signature may numerically describe a number of image features and their relative dominance of overall image or image portion content. Each image signature may comprise a vector of binary numbers for example, also referred to as a binary hash.

An aspect prediction block 810 may help determine to which descriptive aspects in an electronic marketplace a given image is related (e.g., “color”, “brand”, “sleeve style”) based on the visual text content provided. Aspects may be common across a number of categories, though this is not always the case. The aspect prediction block 810 may operate on categories from the leaf category prediction block 806 as well as the localized and isolated visual text content provided by the deep neural network 804. The predicted descriptive aspects may be passed on for further consideration and use in a product search in an electronic marketplace.

A visual search block 812 may calculate a visual similarity measure between input images, such as an image of a candidate product and the input query image. More precisely, in one embodiment, the visual search block 812 may calculate the visual similarity measure between the localized and isolated visual text content portions of those images. The visual similarity measure may be based on the image signature or hash value that semantically represents a localized and isolated visual text portion, for example.

The similarity between two images or two image portions may be estimated by calculating a distance value between two image signatures produced for example by the image signature generation block 808. The distance may comprise a Hamming distance, by way of example but not limitation. A Hamming distance generally describes the number of bits that are different in two binary vectors. Similar images or image portions being compared may therefore have a smaller Hamming distance between them, and thus a higher visual similarity measure. The visual similarity measure is therefore useful as a search result score, e.g., for the candidate product at hand.

The visual search block 812 may receive metadata and image signatures or hashes from an external index 814. In one embodiment, the external index 814 is computed offline for some or all of the products or items available in an electronic marketplace and stored in a database. For a marketplace with a large number of products available, substantially real time computation of image signatures may not be computationally feasible.

The deep neural network 804 may thus be trained offline with images of a plurality of products in the electronic marketplace. The availability of a potentially huge set of product images, together with textual data provided for their categorization, may provide a uniquely valuable neural network training opportunity. Thus, the deep neural network 804 and more generally the visual search service 800 may not only be used to help a shopper find a relevant product in the electronic marketplace, but may be used for other external visual search tasks assigned by external tools.

In one embodiment, each product image previously provided by sellers in an electronic marketplace may be processed by the visual search block 812 to generate an image signature that may be stored in the index 814. The processing may be performed offline to build a catalog of image signatures without interfering with ongoing “live” operations of the electronic marketplace. Similarly, the training of the deep neural network 804 may be performed offline with images of a plurality of products in the electronic marketplace.

In another embodiment, the retraining of deep neural network 804 or another neural network may be performed in substantially real time with no user-discernible delay, with an image of a new product provided to the electronic marketplace. That is, every time a seller provides an image of a new product, its visual text content may be localized and isolated, and image signatures for the image and/or the visual text content may be provided for retraining purposes. The electronic marketplace may therefore evolve over time and become increasingly efficient at text-in-image searching as it becomes increasingly well trained.

Any approach for calculating the visual similarity measure may provide the search result score described. Visual search result scores for any number of candidate products may for example be generated via visual comparisons with an input query image as described above, and provided to a reranking block 816. The visual search result scores may determine the reranked order in which potentially previously ranked candidate products may be presented to a user in response to the image query 802. The end result of the visual search methodology described may comprise an output item list 818 that may correspond to available products in the electronic marketplace, for example.

The visual search result scores may also be combined with other search result scores determined via different algorithms, such as those that may consider the predicted aspect values provided by the aspect prediction block 810. In general, the results of a visual search may be factored into an overall composite search scheme in any number of different formulations. In one example, a weighting coefficient may weight the visual search result score by a user-adjustable weighting factor, and the remaining weight may be applied to scores from a predicted aspect prediction.

FIG. 9 shows a visual text based search, according to some example embodiments. In this exemplary use scenario, a user's smartphone captures a photograph 902 of an athlete wearing a jersey with the athlete's name and number. (The photograph 902 may also be a video frame and may be provided in a message or copied from a web site.) The user may wish to search for products in an electronic marketplace that are similar to the jersey in the photograph 902. The intelligent personal assistant system 106 may therefore call the visual search service 800 to process the photograph 902 as an input query image 802. Other user inputs, such as voice or text data, may be considered as previously described, or the visual text based search may be performed without additional input.

The results of the visual text content based search in an electronic marketplace may be displayed on the user's smartphone in response to the user's image query 802. In this example, jersey product 904 is the item most visually similar to the jersey in the photograph 902, as determined by at least a comparison of the visual text content portion of the photograph 902 and the visual text content portion of the photograph provided in the product listing. Further details of the operational details of the visual search service 800 that perform this text-in-image based search are now described.

FIG. 10 shows visual text content localization and isolation, according to some example embodiments. The portion of the photograph 902 that contains visual text content (e.g., “RONALDO” and “7”, shown here inside a highlighting rectangle for clarity) may be particularly useful in searching for matching products. The input query image may be masked by the deep neural network 804 to exclude regions that are not sufficiently related to the visual text content. An example of the mask is binary mask 1002, which allows only the portion of the photograph 902 (near the center of the photograph 902 in this case) that contains the visual text content to be passed through. The rest of the photograph 902 is excluded from further consideration because it evidently does not contain visual text content.

A similar process may be carried out on images associated with candidate products available in an electronic marketplace, to localize and isolate their visual text content portions. That is, although the example above describes a buyer's search for products of interest based on the visual text content, this example is not limiting. Sellers who list products for sale on an electronic marketplace may also localize and isolate visual text content in the item images they provide for their item listings. A seller may therefore photograph the jersey product 904 previously shown and perform a similar visual search to select portions of the image that contain visual text content when the seller is putting the product on the market. A visual search may therefore comprise a visual comparison between candidate product image visual text content and input query image visual text content. This approach enables text-in-image based product searching without resorting to conventional OCR techniques.

The specific ordered combination described herein may improve the overall operation of a computer system used to help a user find products of interest in an electronic marketplace. The input images (e.g., candidate product images and query images) are effectively transformed into a ranked list of products that may most satisfy a user's shopping interests. The overall speed of searching is improved to reduce the time that a user has to spend while still searching a given (typically large) number of candidate products, compared with purely text-based search approaches of the past. The number of search iterations may also be reduced via the specialized approach described, so that overall efficiency of user interaction with an electronic marketplace is measurably increased.

In one embodiment, the visual text content may be used to fill a form, such as the item listing description, a shipping label, and a receipt. The visual text content may also be processed into a text search query, to for example help the seller determine how similar items were categorized by other sellers or to determine descriptive aspects related to those items. Selection of product categories and aspects is very helpful in ensuring products may be found properly, whether through a visual search as described herein or even if only via conventional text-based searches.

As previously noted, the neural networks used to initially localize and isolate a portion of an image that contains visual text content, or other neural networks, may be improved by re-training them with the visual text content image portions. In other words, since the deep neural network 804 is so capable of finding visual text content and excluding potentially distracting non-visual text content, this capability may be applied recursively. Some exemplary embodiments therefore re-train the deep neural network 804 or another neural network by providing the localized and isolated visual text content portions of an image as additional learning examples.

These re-training embodiments may manufacture additional training images by performing a variety of augmentation operations on the localized and isolated portions. For example, because product images are often produced by different people with different cameras in different lighting conditions, the colors of identical products may not always match from one product image to another. The deep neural network 804 or another neural network may therefore be made more robust in identifying and locating visual text content by learning from a plurality of identical or similar product images that have each been subjected to color jittering. For example, in one format, color may be represented by hue, saturation, and value (HSV) parameters. Modified versions of images or image portions may be created by slightly varying one or more of these parameters, and then provided to the relevant neural network for use in re-training.

FIG. 11 shows data augmentation via random scaling, according to some example embodiments. In this case, a product image 1102 may be scaled by an arbitrary value to produce one or more new images 1104, 1106, and 1108 that may be used for re-training a neural network. The visual text content regions (shown here in highlighted rectangles for clarity) may also be identified for the neural network. (Note, TWININGS® is a registered trademark of R. Twining and Company Limited).

FIG. 12 shows data augmentation via mirror imaging, according to some example embodiments. In this case, a product image 1102 may be rotated and/or reflectively flipped to produce one or more new images 1202, 1204, 1206, and 1208 that may be used for re-training a neural network. The visual text content regions (shown here in highlighted rectangles for clarity) may also be identified for the neural network.

FIG. 13 shows data augmentation via random cropping, according to some example embodiments. In this case, a product image 1102 may be randomly cropped to produce one or more new images 1302, 1304, and 1306 that may be used for re-training a neural network. The visual text content regions (shown here in highlighted rectangles for clarity) may also be identified for the neural network. Object rotation and other affine transformations, as well as focus and contrast modifications may also be applied to the visual text content regions to produce additional modified images for re-training purposes.

FIG. 14 shows data augmentation via synthetic image generation, according to some example embodiments. In this case, localized and isolated visual text content portions 1402 may be superimposed onto an arbitrary image 1404 that may be re-used for re-training a neural network. The visual text content regions may also be identified for the neural network.

FIG. 15 shows a translation of visual text content into a different human language, according to some example embodiments. A translator tool may process a localized and isolated (e.g., via binary mask 1504) image portion 1502 to generate an image of translated visual text content for another human language. The image of the translated visual text content may replace the original visual text content to produce a modified image 1506, which may then be displayed.

The translation-related embodiments may enable a buyer to shop for products that have visual text content that is not in the buyer's native language. This approach may be particularly useful with augmented reality devices, to enable in-situ image-based translation in substantially real time for shoppers. For example, a shopper may observe a product with foreign text in a brick-and-mortar store and search for the product in an electronic marketplace with essentially no noticeable delay.

In another embodiment, the visual search methodology described may help verify a handwritten signature or a photo identification (ID) such as a passport or driver's license. In one non-limiting example, a user of an electronic marketplace may submit an image of the user's handwritten signature when registering with the marketplace or when buying a particular product. The visual search service 800 may compare that reference image with an image of a handwritten signature on a postal return receipt provided by a person who received an item ordered via the electronic marketplace. The visual similarity between the two images may help assure a seller that the intended recipient and the actual recipient are one and the same. If there is a lack of visual similarity, the seller or the buyer or both may be alerted by the electronic marketplace that there may be a mismatch between the intended recipient and the actual recipient that may require further follow-up action. That action may comprise a confirmatory conversation or a fraud investigation, for example.

Similarly, a buyer may provide an image of a photo ID to an electronic marketplace for use as a reference image upon registration. A seller and/or delivery person may compare the reference image or an image signature generated from it with a photo ID presented by a product recipient. In one embodiment, payment and/or product delivery may be selectively authorized based on the visual comparison between reference and presented images. The visual search methodology described may also be useful in other scenarios than an electronic marketplace, including but not limited to management of secure access to content or locations by a corporate or government organization.

FIG. 16 shows a flowchart of a methodology 1600 for identifying a candidate product in an electronic marketplace based on a visual comparison, according to some example embodiments. This methodology may be implemented via the structural elements previously described, as well as via instructions executed by a processor in a computing machine. At 1602, the methodology may localize and isolate a portion of a candidate product image with visual text content. At 1604, the methodology may retrain a neural network using the candidate product image portion. The retrained neural network may comprise a neural network that performed the localization and isolation of the previous operation, or another neural network. At 1606, the methodology may localize and isolate a portion of an input query image with visual text content. A retrained neural network may execute this operation to improve the results obtained.

At 1608, the methodology may calculate a visual similarity measure between the candidate product image portion and the input query image portion. At 1610, the methodology may output the visual similarity measure for use as a search result score for the candidate product. At 1612, the methodology may create or modify a list of recommended candidate products based on their respective visual similarity measures.

Although the subject matter has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the disclosed subject matter. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. The accompanying drawings that form a part hereof, show by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced. The embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by any appended claims, along with the full range of equivalents to which such claims are entitled.

Such embodiments of the inventive subject matter may be referred to herein, individually and/or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Thus, although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description. 

1-20. (canceled)
 21. A method comprising: receiving an input query image; analyzing the input query image using a machine learning model to identify input query image visual content; determining a visual similarity measure between a candidate product image visual content and the input query image visual content based on image signatures associated with the candidate product image and the input query image; ranking a candidate product in a product list based on the visual similarity measure; and causing presentation of the product list on a graphical user interface of a client device.
 22. The method of claim 21, wherein the visual similarity measure is calculated based upon visual text content portions of the candidate product image and the input query image.
 23. The method of claim 21, wherein the visual similarity measure is determined based upon a distance value between the image signatures associated with the candidate product image and the input query image.
 24. The method of claim 23, wherein the image signatures associated with the candidate product image and the input query image represent localized and isolated visual text portions of the candidate product image and the input query image.
 25. The method of claim 21, wherein the input query image comprises one of: a photograph; a video frame; a sketch; or a diagram.
 26. The method of claim 21, wherein analyzing the input query image comprises identifying visual text content in the input query image.
 27. The method of claim 21, wherein the candidate product image is associated with an electronic marketplace.
 28. The method of claim 27, further comprising analyzing the candidate product image using the machine learning model to identify visual text content in the candidate product image.
 29. The method of claim 28, further comprising retraining the machine learning model using the identified visual text content.
 30. A non-transitory computer-readable storage medium having embedded therein a set of instructions which, when executed by one or more processors of a computer, causes the computer to execute operations comprising: receiving an input query image; analyzing the input query image using a machine learning model to identify input query image visual content; determining a visual similarity measure between a candidate product image visual content and the input query image visual content based on image signatures associated with the candidate product image and the input query image; ranking a candidate product in a product list based on the visual similarity measure; and causing presentation of the product list on a graphical user interface of a client device.
 31. The non-transitory computer-readable storage medium of claim 30, wherein the visual similarity measure is calculated based upon visual text content portions of the candidate product image and the input query image.
 32. The non-transitory computer-readable storage medium of claim 30, wherein the visual similarity measure is determined based upon a distance value between the image signatures associated with the candidate product image and the input query image.
 33. The non-transitory computer-readable storage medium of claim 32, wherein the image signatures associated with the candidate product image and the input query image represent localized and isolated visual text portions of the candidate product image and the input query image.
 34. The non-transitory computer-readable storage medium of claim 30, further comprising analyzing the candidate product image using the machine learning model to identify visual text content in the candidate product image.
 35. The non-transitory computer-readable storage medium of claim 34, further comprising retraining the machine learning model using the identified visual text content.
 36. A system comprising: at least one processor; and memory encoding computer-executable instructions that, when executed by the at least one processor, perform a method comprising: receiving an input query image; analyzing the input query image using a machine learning model to identify input query image visual content; determining a visual similarity measure between a candidate product image visual content and the input query image visual content based on image signatures associated with the candidate product image and the input query image; ranking a candidate product in a product list based on the visual similarity measure; and causing presentation of the product list on a graphical user interface of a client device.
 37. The system of claim 36, wherein the visual similarity measure is calculated based upon visual text content portions of the candidate product image and the input query image.
 38. The system of claim 36, wherein the visual similarity measure is determined based upon a distance value between the image signatures associated with the candidate product image and the input query image.
 39. The system of claim 38, wherein the image signatures associated with the candidate product image and the input query image represent localized and isolated visual text portions of the candidate product image and the input query image.
 40. The system of claim 36, wherein the input query image comprises one of: a photograph; a video frame; a sketch; or a diagram. 