<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Stanford University,
Palo Alto, California, USA, March</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Automated Construction of Knowledge-Bases for Safety Critical Applications: Challenges and Opportunities</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Amit Bhatia</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessandro Pinto</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Raytheon Technologies Research Center</institution>
          ,
          <addr-line>2855 Telegraph Ave, Ste 410, Berkeley, CA</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>2</volume>
      <fpage>2</fpage>
      <lpage>24</lpage>
      <abstract>
        <p>Creation of machine-usable, high-quality knowledge-bases is a critical prerequisite for many important applications that rely on availability of high-level of autonomous decision-making and reasoning capabilities. Manual construction of knowledge-bases for complex applications is a time-consuming and expensive process. In such application domains, however, a vast amount of knowledge is available in human-readable format, and it could be leveraged to build knowledge-bases automatically. Natural Language Processing (NLP)-based techniques provide an attractive option for this process. The field of NLP has made rapid strides in last several years and resulted in increased usage across a variety of consumer-facing applications. However, their usage for knowledge-base construction in the aviation industry remains rather limited to date. We present our assessment of using various NLP-based tools for the creation of aviation-focused, high-quality, machineprocessable, and human-legible knowledge bases (KBs) for various applications. We identify several gaps, both at the application and fundamental levels, and also identify potential directions for future research that could help overcome the challenges.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Knowledge Acquisition</kwd>
        <kwd>Knowledge Representation</kwd>
        <kwd>Knowledge Fusion</kwd>
        <kwd>Autonomy</kwd>
        <kwd>Aviation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Fueled by the fast-paced advances in the field of Artificial Intelligence (AI), in particular Machine
Learning (ML), autonomous and intelligent systems are becoming pervasive in a broad range of
applications, from tailored advertisements and suggestions, shaping the on-line user experience, to
complex cyber-physical systems such as autonomous cars. These systems interact with the environment
and the humans, understand the current situation and plan actions to achieve goals as commanded
by other agents or predefined at design time. While no industrial sector seems to be able to resist the
allure of delivering “intelligent” products and services, and realizing the potential economic benefits
that AI may bring to their businesses, aerospace and defense have been slow adopters, playing the
role of observers, still hovering around research, prototyping and small-scale demonstrations. We
believe that the main reasons are operational complexity and stringent safety requirements. Here,
we specifically refer to operational autonomy, namely the ability of an embedded system to replace
humans in the execution of a mission that involves several cyber-physical platforms and a mix of
physical and non-physical actions. For example, replacing pilots to bring passengers from one airport
to another is a complex mission that involves executing pre-flight operations, pushing of the gate,
reaching the runway, taking of, climbing, cruising, descending, landing, and taxiing to the
destination gate. Currently, pilots deal with hundreds of tasks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], including communicating with Air Trafic
Control, monitoring the state of the aircraft, and actually flying the vehicle. Most importantly, pilots
are critical in dealing with contingencies that require experience, deep understanding of the aircraft
and air trafic management, root-cause analysis, and prediction of the outcome of alternative plans.
Diferently from an autonomous car, an aircraft has a higher level of complexity (comprising
hundreds of thousands of components), no easily achievable safe state (when in the air) such as slowing
down and stopping, and a higher cost of catastrophic events (hundreds of human lives).
      </p>
      <p>Pilots operating commercial flights benefit from automation functions implemented in sub-systems
such as autopilots, instrument landing, and low-level controls for electrical systems, air-management
systems, and vehicle health assessment. However, not only these systems may fail or disengage at any
time, but during of-nominal situations, their signals need to be integrated to understand the
rootcause of a contingency and take appropriate actions. An intelligent system capable of replacing a pilot
needs to have the same level of proficiency in both nominal and of-nominal situations. Considering
that pilots have trained or flown for thousands of hours, and have studied the inner workings of
the machine they are operating, such intelligent system must be equipped with a vast amount of
background knowledge that reaches as far as physics. Furthermore, some common-sense knowledge
should be taken into account to deal with other situations that are not directly related to flying such
as keeping the hundreds of passengers happy and relaxed, or dealing with medical emergencies.</p>
      <p>
        Knowledge base construction (KBC) is the process of populating a database with information from
data such as text, tables, images, or video [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. One approach to construct a knowledge base relies
on knowledge engineers and subject-matter experts (e.g., the CYC project [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], WordNet project [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
PaleoBioDB [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]). However, for domains with high complexity, this approach is labor-intensive and
error prone [
        <xref ref-type="bibr" rid="ref2 ref7">2, 7</xref>
        ]. As an example, the creation of the PaleoBioDB knowledge base took nine
personyears and a group of 380 scientists [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The quality of the result is evaluated by humans through
extensive testing and revisions, but completeness is limited to the amount of input data that humans
are able to consider given the available development time and cost.
      </p>
      <p>
        Automated knowledge base construction (AKBC) is another approach where tools are employed
to process a potentially much larger set of input sources, at a remarkably higher throughput rate
compared to trained domain experts, and generate more comprehensive knowledge bases. As an
example, PaleoDeepDive, a DeepDive-based approach for construction of entities and relations from
PDF documents was able to process roughly 10x the number of documents, with per-document recall
roughly 2.5x that of human annotators [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>The aviation domain poses a unique set of challenges to automated knowledge base construction
due to its stringent safety requirements. The constructed knowledge base cannot only contain
correlation data among facts, but for critical decisions, the deduction process from inputs to conclusions
must lead to actions that are safe. It is therefore important to revisit the architecture of an
automated knowledge base construction pipeline to exploit its ability to be comprehensive while assuring
correctness.</p>
      <sec id="sec-1-1">
        <title>1.1. Automated knowledge base construction</title>
        <p>
          AKBC starts from sources that have been created by humans for human consumption including text
and tables, and generates knowledge bases that can be used by machines in a variety of applications.
The techniques that are typically used in this process include Natural Language Processing (NLP) [
          <xref ref-type="bibr" rid="ref10 ref9">9,
10</xref>
          ], Natural Language Understanding (NLU) and Machine Reading Comprehension (MRC) [
          <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
          ],
whose performance has made remarkable leaps over the past decade as result of advances in big
data, natural language processing, and machine learning technologies [
          <xref ref-type="bibr" rid="ref2 ref7">7, 2</xref>
          ]. KnolwedgeVault [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ],
DeepDive [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], MinIE [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], NELL [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], Alexandria [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], Fonduer [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] is a non-exhaustive list of
welldeveloped AKBC tools, some of which are publicly available. These tools, together with others, have
been used to build large, high-quality knowledge bases (KBs) such as Freebase [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], YAGO [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], IBM
Watson [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], PharmGKB [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], and Google Knowledge Graph [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. Complete applications have been
developed in domains such as chatbots [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], fake news detection [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ], healthcare [
          <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
          ], semantic
biomedical resource discovery [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], data-driven materials discovery [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ], finance [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ], and law [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
        </p>
        <p>
          However, many use-cases for the constructed knowledge-bases require a deeper understanding of
the world and the rules under which the system and processes that are the subject of the knowledge
model operate. For many complex applications, the knowledge acquisition and reasoning processes
need to understand and manipulate rich models of the world evoked by textual sources such as causal
relations or adherence to given procedures and standards [
          <xref ref-type="bibr" rid="ref30 ref31 ref32 ref33">30, 31, 32, 33</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Unique challenges in automated knowledge-base construction for aviation</title>
        <p>Automated knowledge-base construction for aviation applications presents a set of unique challenges
that are not necessarily present in consumer-facing applications. Consider the example of building an
intelligent cyber-agent capable of safely and successfully operating an aircraft during a typical flight
from the departure to the arrival gate. Such cyber-pilot (CP) (Figure 1(right)) must be knowledgeable
about the vehicle that it is operating, the mission to be performed, the load that the vehicle is carrying
(cargo and/or passengers, together with their properties such as value and health conditions), and
aviation rules and regulations. The sources of aviation knowledge are vast and varied including flight
manuals, maintenance manuals, accident reports, system models encoded as simulators, certification
requirements documents, textbooks on flight dynamics, structural mechanics, aerodynamics, etc. (see
Figure 1(left) for some examples).</p>
        <p>To deploy a CP on commercial passenger vehicles, two other requirements must be fulfilled. First,
it must be shown that safety will meet or exceed current standards, with a CP delivering a lower
rate of mishaps than human-piloted aircraft in a variety of scenarios. Such stringent certification
requirements are not considered in consumer-facing applications since errors don’t typically lead to
catastrophic failures, and the decision loop is never closed without human supervision
(human-inthe-loop). Certification is a process used to expose risks, and to evaluate whether they are acceptable.
Current standards rely on analysis tools, but also heavily on human revisions and inspection. Thus,
the second requirement for a CP is transparency or explainability in decision-making. Explainability
as a feature is crucial at run-time where a CP may be required to communicate with Air Trafic Control
(ATC), technicians, engineers, or other vehicles, and it is not only required to inspect and revise the
model that the CP has learned, but also as a mean to identify, isolate, and manage contingencies,
which is key in redundant architectures where alternative actions may guarantee safety. The ability to
generate explanations goes beyond having a human-understandable model, but requires a
knowledgebase that enables abductive reasoning.</p>
        <p>
          To add to the complexity of knowledge acquisition and reasoning, significant amount of
knowledge is actually background knowledge that may have been gradually assimilated over a long period
of time (e.g., basic laws of mechanics, thermodynamics, laws about cause-efects). Consider for
example operational and procedural documents such as [
          <xref ref-type="bibr" rid="ref34 ref35 ref36">34, 35, 36</xref>
          ]. These documents describe how to
operate an aircraft, but they assume that the reader possesses a rather large amount of background
information. Moreover, these documents do not explain why certain steps should be taken while
executing a procedure or a checklist since it is assumed that the causal relation between an action and its
efect or precondition are known. Enabling such level of reasoning also seems to require the ability to
Procedural knowledge
        </p>
        <p>Automatic Knowledge-Base Construction
System technical
knowledge
(e.g., fuel systems)
General background
knowledge</p>
        <p>This documentdoesnotcontainanyexportcontrolledtechnicaldata.</p>
        <p>RTX Proprietary. This material contains proprietaryinformation ofRaytheon Technologies Corporation. Anycopying, distribution, or dissemination of the contents of this material isstrictlyprohibitedand maybe unlawful
withouttheexpresswrittenpermissionofRTX.Ifyouhaveobtainedthismaterialinerror,pleasenotifyRTXResearchCenter Counselat(860)610-7000 immediately.
target knowledge representation languages that are able to capture a typical ontology of classes and
logical facts expressed in a formal language such as First Order Logic, and also operators that change
the state of the system which could be expressed as actions with preconditions and efects. Extracting
such structures is challenging and requires integrating, extending, and developing new AKBC tools.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Discussion of underlying technical gaps and potential solution approaches</title>
      <p>In this section, we present some challenges faced by current NLP-based tools in the automatic
construction of aviation-focused, machine-understandable, high-quality knowledge-bases. We also
discuss some potential approaches for overcoming the challenges.</p>
      <sec id="sec-2-1">
        <title>2.1. Aviation-contextualization</title>
        <p>
          Most of the existing state-of-the-art NLP tools (e.g., Torch-T5 text summarization model [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ], or BERT
[38]) are trained over a given input corpus and benchmarked for specific tasks such as Name-Entity
Recognition (NER), or Text Classification. However, it has been shown that accuracy within a given
domain can be improved by expanding the input corpus to include sources from that domain (see
for example BioBERT [39], SciBERT [40], or ClinicalBERT [41]). Thus, there is a need to create an
extensive corpus of aviation text sources that can be used to train language models using a
spectrum of techniques from supervised to unsupervised learning. AKBC tools such as DeepDive [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ],
Alexandria [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], Fonduer [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] use diferent innovative techniques for reducing the need for labeled
data. DeepDive [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] leverages techniques based on distant supervision whereas Fonduer [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] leverages
weak-supervision-based approaches through the concepts of matchers and throttlers in the proposed
framework. Alexandria [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] supports automated extraction of features. These extracted inputs also
need to be customized to be used in the aviation domain.
        </p>
        <p>
          A domain specific corpus, or other filters and customization inputs to extraction tools alone would
perhaps not be suficient. Many relations used in aviation documents have a precise meaning that
is captured by domain specific models, reasoning and simulation engines. Learning these models
from a potentially large set of text sources or even data sets seems unnecessary, ineficient, and
suboptimal. Consider the following example taken from the emergency descent non-nominal checklist
of Boeing 737 [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ] - If structural integrity is in doubt, limit speed as much as possible and avoid high
maneuvering loads. This safety check refers to the relation between structural integrity, airspeed and
the aerodynamic and gravitational loads on an airplane. First, any ambiguity should be removed (see
Section 2.3): in this sentence, “speed” refers to “airspeed”, and “maneuvering loads” refers to the
“gravitational and aerodynamic forces experienced by the fuselage and wings”. Secondly, contextualization
in this example means relating structural integrity to maximum loads, loads to maximum speed, and
ifnally annotating these relations with their interpretation given precisely by aviation-specific
quantitative models, such as physics-based models. The ability to integrate the extracted knowledge (in any
form such as logic sentences, knowledge graphs, or databases) with precise domain specific models
is clearly important towards delivering a high quality knowledge-base.
        </p>
        <p>Recommendations. The creation of a dedicated corpus for aviation is needed: it should contain
sources with a mix of procedural and descriptive knowledge, and a variety of formats (see Section
2.2 for some considerations on how structure carries information). New techniques are also needed
to leverage domain specific models and reasoning engines that precisely capture large knowledge
fragments. After disambiguating and grounding facts into aviation-specific contexts, predicates and
relations need to be mapped to available models. This is not a one-to-one mapping because the same
model (or even a combination of models) could be used as interpretation of many predicates. Domain
specific tools typically require a set of inputs and parameters that will need to be synthesized from
qualitative statements, or computed by other models. The quantitative results from these models will
then need to be lifted back into the knowledge base. Finally, the execution of the various reasoning
engines and models will also need to be orchestrated (see Section 2.4).</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Information in Structure, and Structure of Information</title>
        <p>
          Human-readable documents are typically written following a set of conventions, relying extensively
on formatting and highlighting. In many cases, such conventions are also typically explained at the
beginning of a document. Humans rely critically on this type of structure for eficiency and to avoid
ambiguities. Removing this structure from the document would certainly reduce its legibility. More
importantly (and relevant to the knowledge extraction process), the semantics of relations between
entities depends on the structure. For example, the relation between a component and a numeric quantity
in [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] is a limitation if found in a chapter starting with the letter “L”, and a desired setting if found
in a chapter starting with “NP” (Normal Procedures).
        </p>
        <p>
          Another example of structure can be found in the procedures for stall recovery in [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ], which are
organized in a two-column format: one for the pilot flying the aircraft, and the other for the co-pilot
who has a co-monitoring role. In this case, structure can be leveraged in the extraction process as the
left column defines a sequence of actions, while the right column specifies the important quantities
that need to be monitored. Ignoring the structure would miss the opportunity to use dedicated
extraction tools, or knowledge representation languages for the two columns that may instead result in
a more accurate and eficient knowledge base.
        </p>
        <p>
          Among existing tools for AKBC, Fonduer [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] is a machine-learning-based approach that constructs
relations from richly formatted multi-modal human-readable data sources. This approach goes in the
right direction: it uses a model for the structure of a document that allows to keep track of where
an entity or a relation is mentioned, and it allows users to provide input schema and filters which
could be used to accommodate diferent document structures as decided by the authors of reports or
manuals. The model could be expanded to include conventions typically found in aviation manuals
such as capitalization, lists, and indentation that are used to describe how to operate a machine.
        </p>
        <p>
          Once a document is processed from the formatting standpoint, the information needs to be
organized such that one can reason over the encoded knowledge. We refer to this as Structure of
Information. One view of such structure is parts of speech (POS) which provides a grammatical understanding
of paragraphs, sentences and words [42]. Another view is the logical and ontological structure
contained in the text [43, 44, 45, 46]. POS tagging is relatively well-developed, and mature tools exist
today for such task. However, extracting logical structures from raw sources such as text is less
mature [43, 44, 45, 46]. Having a logical representation enables reasoning by deduction and abduction
which are both important in situational assessment, decision-making, and root-cause analysis.
Moreover, POS tagging alone cannot be used to resolve semantic ambiguity, where the same word may
have two completely diferent roles and meaning in a sentence. A logical representation would
instead enable disambiguation by reasoning and elimination of hypotheses. We also believe that the
types of structures to be extracted are not only logical connectives such as And-Or patterns, but also
include causal and temporal dependencies among events, hidden states, action models, and
performance curves. As an example, the non-normal checklists, flight patterns and maneuvers described
in [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ] are designed to be read and acted upon sequentially (and often in time-constrained,
emergency situations). The ordering of actions (e.g., changing various settings) have a drastic impact on
the eventual outcome. There have been some attempts at extracting procedural information from
text [47, 48, 49, 50] but these tools are not mature enough and the quality of the resulting
knowledgebase for aviation applications needs to be investigated.
        </p>
        <p>Recommendations. As a first step, we recommend performance evaluation of Fonduer and similar
frameworks in identifying the structure present in aviation corpora discussed in Section 2.1. As a next
step, we suggest extension of existing AKBC approaches to move beyond document-level structure
and towards aviation-level hierarchical organization of concepts - for example, Aircraft → Boeing
→ 737-800. In efect, we are essentially proposing a path forward for extending AKBC approaches to
go from Information in Structure towards Structure of Information. Creation of a large-scale aviation
ontology would help in defining and organizing the structure of information and ontology learning
techniques from text could help here [51]. We also recommend further research to extend current
tools with capabilities to extract events, causal and temporal relationships, and action models to be
used in decision-making, plan verification, and impact analysis.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Ambiguity in natural language and the issue of background vs. explicitly stated knowledge</title>
        <p>Humans are incredibly good at attaching context to text and overcoming ambiguities in text through
a deep understanding of rules of the world. However, it is highly non-trivial to replicate and automate
this process [52]. The challenge in resolving ambiguity points to the underlying issue of background
(unstated) vs. foreground (explicitly stated) knowledge. We as human readers make use of an
incredible amount of background knowledge when understanding and attaching context to the meaning of
words, sentences and paragraphs.</p>
        <p>Common problems related to the ambiguous use of words in natural languages are less prevalent in
the aviation domain as manuals and reports are written in such a way to make sure that the messages
cannot be misinterpreted by humans. Clearly, a first step has to be taken towards removing some
common potential ambiguity that may arise. For example, when processing a set of sentences such as
Every airplane has two wings; Boeing 747 has four engines; Every wing is a part; Every engine is a part,
it is important to identify “four” as the same as the number 4. Also, “Boeing 747” should be identified
as an airplane (perhaps by processing other documents that mention such a fact). Semantically, it is
also important to establish whether the closed or open world assumption [53, 54] is used since a fact
such as Boeing 747 has 6 parts may or may not be inconsistent with the description above.</p>
        <p>
          A more serious issue, however, is the semantic ambiguity of words and relations that, when
interpreted by a reader with enough background knowledge, have instead an unambiguous meaning.
Consider for example a fragment of the Emergency Descent non-normal checklist for the Boeing
747 [
          <xref ref-type="bibr" rid="ref36">36</xref>
          ]: Without delay, descend to the lowest safe altitude, or 10,000 feet, whichever is higher. Clearly,
delay in this case may refer to the time to start the descent procedure, or to reach the prescribed
altitude (see Section 2.1 for another example). Context and background knowledge should be leveraged to
resolve ambiguity. From this standpoint, contextualization is necessary but not suficient. Reasoning
and knowledge extraction should be interleaved to incrementally reduce semantic uncertainty.
        </p>
        <p>Currently, no mature techniques exist to guide the separation between foreground and background
knowledge [55]. Accompanying this challenge is the issue of innate knowledge (e.g., intuition about
basic laws of physics) [56, 57], and it is not clear how to incorporate such knowledge within the AKBC
process.</p>
        <p>Recommendations: We recommend investigating the possibility of combining ideas from
Controlled Natural Languages (CNLs) with existing AKBC frameworks. CNLs [52, 58, 59] help to partially
overcome ambiguity present in textual sources written for human consumption. CNLs are subset of
natural languages (e.g., English) and have well-defined formal semantics. However, the use of CNLs
requires expert understanding of the CNL itself and hence encoding is still non-trivial, and challenges
remain [58]. Hybrid CNLs that combine ideas from formal logic with CNL, e.g., Knowledge Authoring
Logic Machine (KALM) [60, 61] hold more promise.</p>
        <p>On the issue of discovering missing background knowledge, or to reduce semantic uncertainty, we
recommend investigating approaches for combining abductive, deductive and inductive reasoning
techniques with iterative learning [62, 63, 55].</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Heterogeneity of input domains and tight coupling between encoding and reasoning</title>
        <p>Knowledge-base creation is an iterative process. The ability to encode knowledge eficiently depends
not only on the framework being used to encode knowledge facts, but also on availability of solvers
that can test the encoded knowledge fragments for errors. It is rarely the case that a first attempt
results in a correct and useful knowledge-base. Our experience indicates that the processes of encoding
knowledge fragments and reasoning over them are in fact tightly interlinked.</p>
        <p>
          There are a multitude of encoding and reasoning approaches, each designed or natural for
processing a specific type of knowledge. We can distinguish two orthogonal ways of specializing
encoding and reasoning: algorithmic domains and application domains. A variety of languages exist to
model knowledge within algorithmic domains. For example, the Plan Domain Definition Language
(PDDL) [64] focuses on encoding decision-making problems, while temporal logics [65] are more
suitable for modeling and reasoning about the temporal relations among events. Similarly, knowledge
graphs [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] are particularly eficient for approximate inference using embeddings while Markov Logic
Networks [66] are better suited when dealing with knowledge fragments that contain probabilistic
logic facts. These representation languages are domain independent and are eficient representations
for specific algorithms such as planning, model-checking, or deductive reasoning.
        </p>
        <p>Domain independent reasoning, however can become ineficient. In many cases, both the encoding
and the reasoning algorithms can be specialized to particular domains where only certain queries are
of interest. For example, the language, concepts and machinery used to model and solve
computational fluid mechanics problems are diferent from the ones used in structural mechanics, which are
in turn diferent from the ones used in dynamics and control.</p>
        <p>
          No principled technique exist currently for a systematic orchestration of knowledge elicitation,
encoding, fusion and testing of such multitude of algorithmic and applications domains [67]. We
note here that frameworks such as DeepDive [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and Fonduer [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] focus on the multi-modal aspect
of knowledge contained in the input sources, but they have not been stress-tested in the case of
heterogeneous knowledge domains.
        </p>
        <p>Recommendations: There have been some recent advances in the area of knowledge graphs and
semantic web that try to achieve knowledge fusion by leveraging ideas used for data fusion [68].
Datafusion inspired knowledge-fusion techniques [68], together with specialized domain solvers (e.g., [69]
for combinatorial reasoning) could provide a useful starting point towards solving the knowledge
fusion problem in general for aviation and autonomy applications. More advanced techniques could
be borrowed from the theorem proving community that has been very active in defining general ways
of combining theories and solvers as in the case of Satisfiability Modulo Theories [70]. In addition,
development of interface languages, translators, and reasoners to orchestrate diferent solvers and
cross the boundaries of diferent domains would also be needed.</p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Proficiency testing</title>
        <p>
          As we mentioned in Section 2.1, a crucial gap in existing AKBC frameworks is the limited ability to
define large-scale automated tests that can be used during the AKBC process. Existing benchmarks,
for example those that are used in assessing performance of various NLP tools fall well short of testing
real-world understanding [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ]. Efective and scalable proficiency testing techniques are required in
AKBC process for multiple reasons: (1) to catch non-obvious errors during the initial construction of
knowledge-bases, (2) to resolve conflicts during the run-time update process when new information
about the external world needs to be incorporated in the knowledge-base, and (3) to enable
humanlegibility and certification which would rely on demonstrating and explaining the understanding of
aviation knowledge through performance on designed tests [71, 72, 73, 74].
        </p>
        <p>
          Recommendations: We recommend borrowing ideas from formal methods and software testing
communities [75] for expanding the current suite of tests used in various NLP and AKBC
frameworks [
          <xref ref-type="bibr" rid="ref31">76, 77, 31</xref>
          ]. It is expected that the most efective proficiency testing approaches would be
those that combine manually designed tests with those that have been instantiated from templates
(through concretization to specific contexts).
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>The introduction of autonomy in the management of complex systems and their operations requires
developing knowledge-bases that can be used for reasoning and decision-making. Manual
construction of these knowledge-bases is ineficient, requiring multi-year eforts and hundreds of contributors.
Thus, Automatic Knowledge Base Construction (AKBC) techniques are very much sought in related
applications domains. Recent advances in Machine Learning have enabled the development of tools
for Natural Language Processing, Natural Language Understanding, and Machine Reading
Comprehension that show promise in ingesting raw sources such as text and tables to create knowledge-bases.
The aviation industry could benefit from these new technologies, but the resulting knowledge-bases
must satisfy stringent assurance requirements that support certification processes. We believe that
an AKBC system for these kinds of applications requires the integration and enhancement of several
techniques and that it is yet to be developed. The aviation context needs to be captured by a corpus
of relevant documents and additional inputs such as extraction rules. Additional context should be
injected as interpretation of relations provided by analytic and simulation models. The structure of
aviation documents should be exploited in the extraction process to provide the right semantics to
parts of speech in diferent paragraphs. The extracted information should be encoded in languages
that enable formal reasoning to further reduce ambiguity and noise. The encoded knowledge should
be fused with background knowledge and a variety of domain-specific reasoning engines should be
harmonized to lead to a high-quality knowledge-base. Finally, the constructed knowledge-base should
undergo rigorous proficiency testing to provide assurance and refine its content.</p>
      <p>While several gaps exist, we believe that the current set of technologies are promising and that
a concrete research roadmap could be developed to construct high-assurance knowledge bases for
safety critical applications.
arXiv:1910.10683 (2019).
[38] J. Devlin, M.-W. Chang, K. Lee, K. Toutanova, BERT: Pre-training of deep bidirectional
transformers for language understanding, arXiv preprint arXiv:1810.04805 (2018).
[39] J. Lee, W. Yoon, S. Kim, D. Kim, S. Kim, C. H. So, J. Kang, BioBERT: a pre-trained biomedical
language representation model for biomedical text mining, Bioinformatics 36 (2020) 1234–1240.
[40] I. Beltagy, K. Lo, A. Cohan, SciBERT: A pretrained language model for scientific text, arXiv
preprint arXiv:1903.10676 (2019).
[41] E. Alsentzer, J. R. Murphy, W. Boag, W.-H. Weng, D. Jin, T. Naumann, M. McDermott, Publicly
available clinical BERT embeddings, arXiv preprint arXiv:1904.03323 (2019).
[42] C. Manning, H. Schutze, Foundations of statistical natural language processing, MIT press, 1999.
[43] J. Berant, A. Chou, R. Frostig, P. Liang, Semantic parsing on freebase from question-answer pairs,
in: Proceedings of the 2013 conference on empirical methods in natural language processing,
2013, pp. 1533–1544.
[44] P. Yin, G. Neubig, TRANX: A transition-based neural abstract syntax parser for semantic parsing
and code generation, arXiv preprint arXiv:1810.02720 (2018).
[45] V. Basile, E. Cabrio, C. Schon, KNEWS: Using logical and lexical semantics to extract knowledge
from natural language, in: Proceedings of the European conference on artificial intelligence
(ECAI) 2016 conference, 2016.
[46] H. Singh, M. Aggrawal, B. Krishnamurthy, Exploring neural models for parsing natural language
into first-order logic, arXiv preprint arXiv:2002.06544 (2020).
[47] F. Maria, C. A. Aguirre, B. M. Anshutz, W. H. Hsu, MATESC: Metadata-analytic text extractor
and section classifier for scientific publications., in: KDIR, 2018, pp. 259–265.
[48] H. Yang, C. A. Aguirre, F. Maria, D. Christensen, L. Bobadilla, E. Davich, J. Roth, L. Luo, Y. Theis,
A. Lam, et al., Pipelines for procedural information extraction from scientific literature: Towards
recipes using machine learning and data science, in: 2019 International Conference on Document
Analysis and Recognition Workshops (ICDARW), volume 2, IEEE, 2019, pp. 41–46.
[49] M. Chang, L. V. Guillain, H. Jung, V. M. Hare, J. Kim, M. Agrawala, Recipescape: An interactive
tool for analyzing cooking instructions at scale, in: Proceedings of the 2018 CHI Conference on
Human Factors in Computing Systems, 2018, pp. 1–12.
[50] C. X. Chu, G. Weikum, N. Tandon, J. Vreeken, Mining How-to Task Knowledge From Online</p>
      <p>Communities, Ph.D. thesis, Universität des Saarlandes Saarbrücken, 2016.
[51] R. Lourdusamy, S. Abraham, A survey on methods of ontology learning from text, in:
International Conference on Information, Communication and Computing Technology, Springer, 2019,
pp. 113–123.
[52] R. Schwitter, Controlled natural languages for knowledge representation, in: Coling 2010:</p>
      <p>Posters, 2010, pp. 1113–1121.
[53] R. Reiter, On closed world data bases, in: Readings in artificial intelligence, Elsevier, 1981, pp.</p>
      <p>119–140.
[54] G. Bossu, P. Siegel, Saturation, nonmonotonic reasoning and the closed-world assumption,
Artificial Intelligence 25 (1985) 13–63.
[55] G. Marcus, Deep learning: A critical appraisal, arXiv preprint arXiv:1801.00631 (2018).
[56] B. M. Lake, T. D. Ullman, J. B. Tenenbaum, S. J. Gershman, Building machines that learn and
think like people, Behavioral and brain sciences 40 (2017).
[57] G. Marcus, Innateness, alphazero, and artificial intelligence, arXiv preprint arXiv:1801.05667
(2018).
[58] T. Kuhn, A survey and classification of controlled natural languages, Computational linguistics
40 (2014) 121–170.
[59] T. Gao, Controlled natural languages for knowledge representation and reasoning, in:
Technical Communications of the 32nd International Conference on Logic Programming (ICLP 2016),
Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2016.
[60] T. Gao, P. Fodor, M. Kifer, High accuracy question answering via hybrid controlled natural
language, in: 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI), IEEE,
2018, pp. 17–24.
[61] T. Gao, P. Fodor, M. Kifer, Knowledge authoring for rule-based reasoning, in: OTM Confederated
International Conferences" On the Move to Meaningful Internet Systems", Springer, 2018, pp.
461–480.
[62] A. Weichselbraun, P. Kuntschik, A. M. Braşoveanu, Mining and leveraging background
knowledge for improving named entity linking, in: Proceedings of the 8th International Conference
on Web Intelligence, Mining and Semantics, 2018, pp. 1–11.
[63] J. B. Tenenbaum, C. Kemp, T. L. Grifiths, N. D. Goodman, How to grow a mind: Statistics,
structure, and abstraction, science 331 (2011) 1279–1285.
[64] P. Haslum, N. Lipovetzky, D. Magazzeni, C. Muise, An introduction to the planning domain
definition language, Synthesis Lectures on Artificial Intelligence and Machine Learning 13 (2019)
1–187.
[65] E. A. Emerson, Temporal and modal logic, in: Formal Models and Semantics, Elsevier, 1990, pp.</p>
      <p>995–1072.
[66] M. Richardson, P. Domingos, Markov logic networks, Machine learning 62 (2006) 107–136.
[67] X. L. Dong, D. Srivastava, Knowledge curation and knowledge fusion: challenges, models and
applications, in: Proceedings of the 2015 ACM SIGMOD International Conference on
Management of Data, 2015, pp. 2063–2066.
[68] X. L. Dong, E. Gabrilovich, G. Heitz, W. Horn, K. Murphy, S. Sun, W. Zhang, From data fusion
to knowledge fusion, arXiv preprint arXiv:1503.00302 (2015).
[69] L. De Moura, N. Bjørner, Z3: An eficient SMT solver, in: International conference on Tools and</p>
      <p>Algorithms for the Construction and Analysis of Systems, Springer, 2008, pp. 337–340.
[70] C. Barrett, C. Tinelli, Satisfiability modulo theories, in: Handbook of Model Checking, Springer,
2018, pp. 305–343.
[71] E. E. Alves, D. Bhatt, B. Hall, K. Driscoll, A. Murugesan, J. Rushby, Considerations in assuring
safety of increasingly autonomous systems (2018).
[72] M. Cummings, Adaptation of human licensing examinations to the certification of autonomous
systems, in: Safe, autonomous and intelligent vehicles, Springer, 2019, pp. 145–162.
[73] R. A. Clothier, B. I. Williams, T. Perez, et al., Autonomy from a safety certification perspective, in:
AIAC18: 18th Australian International Aerospace Congress (2019): HUMS-11th Defence Science
and Technology (DST) International Conference on Health and Usage Monitoring (HUMS 2019):
ISSFD-27th International Symposium on Space Flight Dynamics (ISSFD), Engineers Australia,
Royal Aeronautical Society., 2019, p. 278.
[74] L. Chiticariu, Y. Li, F. Reiss, Transparent machine learning for information extraction:
state-ofthe-art and the future, EMNLP (tutorial) (2015).
[75] M. Kassab, J. F. DeFranco, P. A. Laplante, Software testing: The state of the practice, IEEE</p>
      <p>Software 34 (2017) 46–52.
[76] G. Marcus, The next decade in AI: Four steps towards robust artificial intelligence, arXiv preprint
arXiv:2002.06177 (2020).
[77] V. Kocijan, T. Lukasiewicz, E. Davis, G. Marcus, L. Morgenstern, A Review of Winograd Schema
Challenge Datasets and Approaches, arXiv preprint arXiv:2004.13831 (2020).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Schutte</surname>
          </string-name>
          ,
          <article-title>Task analysis of two crew operations in the flight deck: Investigating the feasibility of using single pilot</article-title>
          ,
          <source>in: 19th International Symposium on Aviation Psychology</source>
          ,
          <year>2017</year>
          , p.
          <fpage>566</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Weikum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Theobald</surname>
          </string-name>
          ,
          <article-title>From information to knowledge: harvesting entities and relationships from web sources</article-title>
          ,
          <source>in: Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hsiao</surname>
          </string-name>
          , X. Cheng, B. Hancock,
          <string-name>
            <given-names>T.</given-names>
            <surname>Rekatsinas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Levis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ré</surname>
          </string-name>
          ,
          <article-title>Fonduer: Knowledge base construction from richly formatted data</article-title>
          ,
          <source>in: Proceedings of the 2018 International Conference on Management of Data</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1301</fpage>
          -
          <lpage>1316</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Lenat</surname>
          </string-name>
          ,
          <article-title>Cyc: A large-scale investment in knowledge infrastructure</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>38</volume>
          (
          <year>1995</year>
          )
          <fpage>33</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <surname>WordNet:</surname>
          </string-name>
          <article-title>An electronic lexical database</article-title>
          , MIT press,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Behrensmeyer</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Turner</surname>
          </string-name>
          ,
          <article-title>Taxonomic occurrences of suidae recorded in the paleobiology database</article-title>
          ,
          <year>2013</year>
          . URL: http://fossilworks.org.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Din</surname>
          </string-name>
          ,
          <article-title>Towards a flexible system architecture for automated knowledge base construction frameworks</article-title>
          ,
          <source>in: 2019 IEEE International Conference on Big Data (Big Data)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>3066</fpage>
          -
          <lpage>3071</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ré</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cafarella</surname>
          </string-name>
          ,
          <string-name>
            <surname>C. De Sa</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ratner</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Shin</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Wu</surname>
          </string-name>
          , Deepdive:
          <article-title>Declarative knowledge base construction</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>60</volume>
          (
          <year>2017</year>
          )
          <fpage>93</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Khurana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Koli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Khatter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Natural language processing: State of the art, current trends and challenges</article-title>
          ,
          <source>arXiv preprint arXiv:1708.05148</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Deep learning for natural language processing: advantages and challenges</article-title>
          , National Science Review (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>P. M. Nadkarni</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Ohno-Machado</surname>
            ,
            <given-names>W. W.</given-names>
          </string-name>
          <string-name>
            <surname>Chapman</surname>
          </string-name>
          ,
          <article-title>Natural language processing: an introduction</article-title>
          ,
          <source>Journal of the American Medical Informatics Association</source>
          <volume>18</volume>
          (
          <year>2011</year>
          )
          <fpage>544</fpage>
          -
          <lpage>551</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>KDNuggets, NLP vs</article-title>
          .
          <article-title>NLU: from understanding a language to its processing</article-title>
          ,
          <year>2019</year>
          . URL: https: //www.kdnuggets.com/
          <year>2019</year>
          /07/nlp-vs
          <article-title>-nlu-understanding-language-processing</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>X.</given-names>
            <surname>Dong</surname>
          </string-name>
          , E. Gabrilovich, G. Heitz,
          <string-name>
            <given-names>W.</given-names>
            <surname>Horn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Murphy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Strohmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. Zhang,</surname>
          </string-name>
          <article-title>Knowledge vault: A web-scale approach to probabilistic knowledge fusion</article-title>
          ,
          <source>in: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>601</fpage>
          -
          <lpage>610</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>K.</given-names>
            <surname>Gashteovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gemulla</surname>
          </string-name>
          , L. d. Corro,
          <article-title>MinIE: minimizing facts in open information extraction</article-title>
          ,
          <source>Association for Computational Linguistics</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>T.</given-names>
            <surname>Mitchell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Hruschka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Talukdar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Betteridge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Carlson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dalvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gardner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kisiel</surname>
          </string-name>
          , et al.,
          <article-title>Never-ending learning</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>61</volume>
          (
          <year>2018</year>
          )
          <fpage>103</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Winn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Guiver</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Webster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zaykov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kukla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fabian</surname>
          </string-name>
          , Alexandria:
          <article-title>Unsupervised highprecision knowledge base construction using a probabilistic program</article-title>
          ,
          <source>in: Automated Knowledge Base Construction (AKBC)</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bollacker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Evans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Paritosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sturge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Taylor</surname>
          </string-name>
          , Freebase:
          <article-title>a collaboratively created graph database for structuring human knowledge</article-title>
          ,
          <source>in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>1247</fpage>
          -
          <lpage>1250</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Amarilli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Galárraga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Preda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Suchanek</surname>
          </string-name>
          ,
          <article-title>Recent topics of research around the YAGO knowledge base</article-title>
          ,
          <source>in: Asia-Pacific Web Conference</source>
          , Springer,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ferrucci</surname>
          </string-name>
          , E. Brown, J.
          <string-name>
            <surname>Chu-Carroll</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Fan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Gondek</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          <string-name>
            <surname>Kalyanpur</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Lally</surname>
            ,
            <given-names>J. W.</given-names>
          </string-name>
          <string-name>
            <surname>Murdock</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Nyberg</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Prager</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Building</surname>
            <given-names>Watson</given-names>
          </string-name>
          :
          <article-title>An overview of the DeepQA project</article-title>
          ,
          <source>AI</source>
          magazine
          <volume>31</volume>
          (
          <year>2010</year>
          )
          <fpage>59</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hewett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. E.</given-names>
            <surname>Oliver</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. L.</given-names>
            <surname>Rubin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. L.</given-names>
            <surname>Easton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Stuart</surname>
          </string-name>
          , R. B.
          <string-name>
            <surname>Altman</surname>
          </string-name>
          , T. E. Klein,
          <article-title>PharmGKB: The pharmacogenetics knowledge base</article-title>
          ,
          <source>Nucleic acids research</source>
          <volume>30</volume>
          (
          <year>2002</year>
          )
          <fpage>163</fpage>
          -
          <lpage>165</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Google</surname>
          </string-name>
          , Google knowledge graph,
          <year>2012</year>
          . URL: http://googleblog.blogspot.co.uk/
          <year>2012</year>
          /05/ introducing
          <article-title>-knowledge-graph-things-not</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mnasri</surname>
          </string-name>
          ,
          <article-title>Recent advances in conversational nlp: Towards the standardization of chatbot building</article-title>
          , arXiv preprint arXiv:
          <year>1903</year>
          .
          <volume>09025</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>R.</given-names>
            <surname>Oshikawa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>A survey on natural language processing for fake news detection</article-title>
          , arXiv preprint arXiv:
          <year>1811</year>
          .
          <volume>00770</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>O. G.</given-names>
            <surname>Iroju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. O.</given-names>
            <surname>Olaleke</surname>
          </string-name>
          ,
          <article-title>A systematic review of natural language processing in healthcare</article-title>
          ,
          <source>International Journal of Information Technology and Computer Science</source>
          <volume>8</volume>
          (
          <year>2015</year>
          )
          <fpage>44</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Esteva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Robicquet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ramsundar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kuleshov</surname>
          </string-name>
          , M. DePristo,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cui</surname>
          </string-name>
          , G. Corrado,
          <string-name>
            <given-names>S.</given-names>
            <surname>Thrun</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Dean</surname>
          </string-name>
          ,
          <article-title>A guide to deep learning in healthcare</article-title>
          ,
          <source>Nature medicine 25</source>
          (
          <year>2019</year>
          )
          <fpage>24</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>P.</given-names>
            <surname>Sfakianaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Koumakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sfakianakis</surname>
          </string-name>
          , G. Iatraki, G. Zacharioudakis,
          <string-name>
            <given-names>N.</given-names>
            <surname>Graf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tsiknakis</surname>
          </string-name>
          ,
          <article-title>Semantic biomedical resource discovery: a natural language processing framework, BMC medical informatics and decision making 15 (</article-title>
          <year>2015</year>
          )
          <fpage>77</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>J. M. Cole</surname>
          </string-name>
          ,
          <article-title>A design-to-device pipeline for data-driven materials discovery</article-title>
          ,
          <source>Accounts of Chemical Research</source>
          <volume>53</volume>
          (
          <year>2020</year>
          )
          <fpage>599</fpage>
          -
          <lpage>610</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>I. E</surname>
          </string-name>
          . Fisher,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Garnsey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Hughes</surname>
          </string-name>
          ,
          <article-title>Natural language processing in accounting, auditing and finance: A synthesis of the literature with a roadmap for future research</article-title>
          ,
          <source>Intelligent Systems in Accounting, Finance and Management</source>
          <volume>23</volume>
          (
          <year>2016</year>
          )
          <fpage>157</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>L.</given-names>
            <surname>Robaldo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wyner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Grabmair</surname>
          </string-name>
          ,
          <article-title>Introduction for artificial intelligence and law: special issue “natural language processing for legal texts</article-title>
          ”,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>G.</given-names>
            <surname>Marcus</surname>
          </string-name>
          , E. Davis,
          <string-name>
            <surname>Rebooting</surname>
            <given-names>AI</given-names>
          </string-name>
          :
          <article-title>Building artificial intelligence we can trust</article-title>
          ,
          <source>Vintage</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dunietz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Burnham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bharadwaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chu-Carroll</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Rambow</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ferrucci</surname>
          </string-name>
          ,
          <article-title>To test machine comprehension, start by defining comprehension</article-title>
          , arXiv preprint arXiv:
          <year>2005</year>
          .
          <volume>01525</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Dyer</surname>
          </string-name>
          , In-Depth
          <string-name>
            <surname>Understanding</surname>
          </string-name>
          .
          <article-title>A Computer Model of Integrated Processing for Narrative Comprehension</article-title>
          .,
          <source>Technical Report, Yale Univ New Haven CT Dept Of Computer Science</source>
          ,
          <year>1982</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>H.</given-names>
            <surname>Jung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Allen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Blaylock</surname>
          </string-name>
          , W. de Beaumont, L. Galescu,
          <string-name>
            <given-names>M.</given-names>
            <surname>Swift</surname>
          </string-name>
          ,
          <article-title>Building timelines from narrative clinical records: initial results based-on deep natural language understanding</article-title>
          ,
          <source>in: Proceedings of BioNLP 2011 workshop</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>146</fpage>
          -
          <lpage>154</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>Federal</given-names>
            <surname>Aviation</surname>
          </string-name>
          <article-title>Administration (FAA), Aviation handbooks</article-title>
          &amp; manuals,
          <year>2020</year>
          . URL: https:// www.faa.gov/regulations_policies/handbooks_manuals/aviation/.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bulfer</surname>
          </string-name>
          , Boeing 737 quick reference handbook,
          <year>2020</year>
          . URL: http://www.cockpitcompanion.com/ cat-quick.cfm.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <source>[36] The Boeing Company, Boeing 737 operations manual</source>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>C.</given-names>
            <surname>Rafel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shazeer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Roberts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Narang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>Exploring the limits of transfer learning with a unified text-to-text transformer</article-title>
          , arXiv preprint
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>