Is neuro-symbolic AI meeting its promises in natural language processing? A structured review

K Hamilton, A Nayak, B Božić, L Longo - Semantic Web, 2024 - content.iospress.com
Abstract Advocates for Neuro-Symbolic Artificial Intelligence (NeSy) assert that combining
deep learning with symbolic reasoning will lead to stronger AI than either paradigm on its …

Identifying coal mine safety production risk factors by employing text mining and Bayesian network techniques

S Li, M You, D Li, J Liu - Process safety and environmental protection, 2022 - Elsevier
Coal industry is a typical high-risk industry with frequent accidents. In an effort to ensure
workers' safety and health, and reduce the probability of productivity decrease, it is essential …

Personalized new media marketing recommendation system based on TF-IDF algorithm optimizing LSTM-TC model

Z Zhu - Service Oriented Computing and Applications, 2024 - Springer
Personalized recommendation systems can provide users with more targeted and attractive
marketing content based on their interests and behavioral characteristics, so it is necessary …

[HTML][HTML] Smart PV Monitoring and Maintenance: A Vision Transformer Approach within Urban 4.0

M Bounabi, R Azmi, J Chenal, EB Diop… - Technologies, 2024 - mdpi.com
The advancement to Urban 4.0 requires urban digitization and predictive maintenance of
infrastructure to improve efficiency, durability, and quality of life. This study aims to integrate …

Research on the identification of generic technology of eco-friendly materials based on text mining

Y Ma, L Kong, C Lin, X Yang - Environmental Science and Pollution …, 2022 - Springer
The overconsumption of natural resources and the production of waste are causing severe
degradation of our environment. Generic technologies (GTs) of eco-friendly materials could …

Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks.

B Tang, J Wang, H Qiu, J Yu, Z Yu… - Computers, Materials & …, 2023 - search.ebscohost.com
The continuous improvement of the cyber threat intelligence sharing mechanism provides
new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, ie …

Chinese and English text classification techniques incorporating CHI feature selection for ELT cloud classroom

Y Wei - Open Computer Science, 2024 - degruyter.com
Although online cloud classroom teaching has been popular, the current English teaching
cloud classroom has the defects of low information utilization and low information acquisition …

Crowd-Assisted Flood Disaster Management

S Koswatte, K McDougall, X Liu - Application of Remote Sensing and GIS …, 2023 - Springer
Natural disasters, including floods, cause significant damage to people's lives and
properties and, in recent years, the frequency, complexity, and severity of these events …

[PDF][PDF] Is Neuro-Symbolic AI Meeting its Promise in Natural Language Processing? A Structured

K Hamilton, A Nayak, B Božic, L Longo - arxiv preprint arxiv …, 2022 - academia.edu
Advocates for Neuro-Symbolic Artificial Intelligence (NeSy) assert that combining deep
learning with symbolic reasoning will lead to stronger AI than either paradigm on its own. As …

[PDF][PDF] DEVELOPMENT OF A MACHINE LEARNING MODEL FOR MULTIPLE MEMBERSHIP PUBLICATION DOCUMENTS

AP PURFINI, SBR HERSIANIE… - Journal of Engineering …, 2024 - jestec.taylors.edu.my
This research aims to develop a learning model in the text mining process by modifying
TFIDF. The methodology employed in this study consists of a literature review, data …