SlideShare a Scribd company logo
COMPSIM LLC Technical Introduction
Company Information ,[object Object],[object Object],[object Object],[email_address]
Compsim’s Technology ,[object Object],[object Object]
KEEL Technology ,[object Object],[object Object],[object Object]
KEEL Technology ,[object Object],[object Object],[object Object]
KEEL Technology ,[object Object],[object Object],[object Object]
What really is KEEL?
What is KEEL? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEEL acts as an “expert system” in the AI space – rules are explicit and traceable
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEEL includes a “dynamic graphical language” that describes functional relationships, not just data flow
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEEL provides a way to describe dynamic, non-linear, inter-related, multi-dimensional problem sets
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEEL deals with the variation of functions with respect to changes in the independent variables
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Small memory footprint, high performance KEEL “Engines” are suitable for many real time control applications
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEEL “designs” define the structure for building analog circuits when very high speed applications are required
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],KEEL “Engines” interpret information items by “valuing” their importance and by “balancing” supporting and objecting arguments
What is KEEL? ,[object Object]
Left-Brain / Right Brain Model ,[object Object],[object Object],KEEL Technology focuses on “right-brain” capabilities.
KEEL Technology ,[object Object],[object Object],[object Object]
KEEL Technology ,[object Object],KEEL Technology focuses on providing this capability to computer-based devices
Driving a car ( a real-time example) ,[object Object],[object Object],[object Object],[object Object]
Diagnosing a problem (a static example) ,[object Object],[object Object],[object Object]
Interpretation of Information ,[object Object],[object Object],[object Object],[object Object]
Image processing model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The KEEL Graphical Language ,[object Object]
The KEEL Graphical Language ,[object Object],[object Object],[object Object],[object Object],[object Object]
The KEEL Graphical Language ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Action 1 Action 2 Importance of Action 1 Importance of Action 2 Action 2 more important than Action 1
The KEEL Graphical Language ,[object Object],[object Object],[object Object],[object Object],[object Object],Arguments Two Independent Decisions Supporting Argument (Green) Objecting Argument (Red)
This is KEEL Source Code Positions and Arguments are added to the screen with menu selection or hot keys.
The code is “dynamic”. As soon as items are dropped on the screen, they are active. This shows the user changing one of the supporting arguments (inputs). The impact of that change is shown across the entire system immediately. In this case only Action 1 is impacted.
Here another input is stimulated and the system reacts.
Now the user is interacting with the Action 2 by stimulating on of the inputs.
The impact of stimulating this input is displayed immediately
Wires define specific functional relationships between information items. First we will show how Action 1 will control the importance of Action 2. Wiring is done with simple drag and drop actions. Here we begin dragging the “modified value” of Action 1 - Start Drag
When we drop the mouse on the “connection point” for importance of Action 2, The system automatically rebalances.  Note that Action 2 height (importance) was reduced to the “modified value” of Action 1. The modified value of Action 1 is 73.033288 The importance of Action 2 is 73.033288 Drop
Now we are going to manipulate one of the inputs to Action 1 and observe the impact on the importance of Action 2.
After raising the scroll bar for the second supporting argument (input), the accumulation of all the inputs to Action 1 results in a modified value of 92.83, which is used to control the importance of Action 2 to 92.83.
The first wire was used to control the importance of Action 2. Now we want to have Action 1 (modified value), “ contribute to ” how Action 2 is processed. To do this we will drag the modified value of Action 1 … Start Drag
…And drop the mouse on one of the arguments, in this case the first supporting argument to Action 2. A new connection is made and the entire system rebalances again. Drop
As always, any input can be manipulated manually and the user can “see” how the system responds. Here we will stimulate one of the blocking inputs.
The results of increasing the blocking input to Action 2 are immediately visible.
The icon to the left of the position bar is a “Threshold”.  It can be placed anywhere within the range of the position importance bar. A threshold can be used to trigger events, when the modified value rises above the threshold. Here we are going to drag it up. Start Drag
If a wire was tied from this point to another argument, that argument would be set to 100 if the modified value of Action 2 rose above the threshold. Drop
The KEEL Dynamic Graphical Language ,[object Object],[object Object],[object Object]
Thinking in Curves ,[object Object],[object Object]
Education Process  (to decide whether KEEL is right for you) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
KEEL Technology - Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
KEEL Technology – How it works ,[object Object],[object Object],[object Object],[object Object]
No Architecture Dependence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Engineering Issues ,[object Object],[object Object],[object Object],[object Object]
KEEL Engines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developer Support Tools ,[object Object],[object Object]
Developer Tools ,[object Object],[object Object],[object Object],[object Object]
KEEL Engine ,[object Object],[object Object],[object Object],[object Object],[object Object]
Development Process ,[object Object],[object Object],[object Object]
Development Process Tables Code Concept Design And Test KEEL Logic Solution  Container & Glue Logic Design Solution Container and Glue Logic Integrated  KEEL  Solution Wire Glue Logic to KEEL Tables Test
Why KEEL is Unique ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Competitive Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Competitive Technologies -  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Neural Nets
Competitive Technologies - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fuzzy Logic
Competitive Technologies - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bayesian Belief Nets
Competitive Technologies - ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Conventional AI
Competitive Technologies -  ,[object Object],[object Object],[object Object],[object Object],Differential Equations
Competitive Technologies - ,[object Object],[object Object],[object Object],Hard Coded Logic
May not be suitable for dynamic, non-linear problem sets.  In many areas, reliable “probabilities” may not be available. Maybe Probably Not Determined by Application No Difficult No Human Designer and Statistics Probabilities of Probabilities Bayesian Belief Networks Requires a License to use Fragile / Brittle - Hard to maintain; Does not handle “Surprise” Difficult to Explain Reasoning; Pattern Training Required; Decisions not “Explainable”; Does not handle “Surprise” conditions Weaknesses Yes Maybe Maybe No Interactive Development Yes Probably Not Yes Yes Suitable for Control Determined by Application Worst Determined by Application Determined by Application Performance Best No No No Small Memory Footprint Fully Explainable Somewhat Difficult No Explainable Decisions No No No Major Problem Pattern Training Required Human Designer   Human Designer  Human Designer Patterns Source of Understanding Dynamic Adjustment to Importance of Data (Genetic) Trial and Error Geometric Fuzzification / Defuzzification Pattern Matching General Concept KEEL AI - Forward / Reverse Chaining Fuzzy Logic Neural Nets Technology Comparison
COMPSIM LLC Technical Presentation Supplemental Information
Why Machines Don’t Speak English ,[object Object],[object Object]
Machines and Automation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Machines and Automation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human Reasoning ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example of  reasoning  in action: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example Using Conventional Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example using Artificial Neural Nets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example using Fuzzy Logic ,[object Object],[object Object],[object Object],[object Object]
Machines Don’t Speak English ,[object Object],[object Object],[object Object],[object Object],[object Object]
Machines Don’t Speak English ,[object Object],[object Object]
What If Machines Could Reason? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
KEEL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Wants Machines To Reason? ,[object Object],[object Object],[object Object]
Why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why? ,[object Object],[object Object],[object Object]
KEEL Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Patent Portfolio ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Patent Portfolio (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Technology in ECE Powerpoint
Technology in ECE PowerpointTechnology in ECE Powerpoint
Technology in ECE Powerpointmariskasumm
 
Transhumans: Technology Powered Superhumans
Transhumans: Technology Powered SuperhumansTranshumans: Technology Powered Superhumans
Transhumans: Technology Powered Superhumans
Institute of Customer Experience
 
4 G mobile technology
4 G mobile technology4 G mobile technology
4 G mobile technology
Aman Jain
 
The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!
Paul Brown
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
ismailraesha
 
The Future of Everything
The Future of EverythingThe Future of Everything
The Future of Everything
Charbel Zeaiter
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Luminary Labs
 

Viewers also liked (8)

Technology in ECE Powerpoint
Technology in ECE PowerpointTechnology in ECE Powerpoint
Technology in ECE Powerpoint
 
Transhumans: Technology Powered Superhumans
Transhumans: Technology Powered SuperhumansTranshumans: Technology Powered Superhumans
Transhumans: Technology Powered Superhumans
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
4 G mobile technology
4 G mobile technology4 G mobile technology
4 G mobile technology
 
The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!The Future of Wearables... EXPLAINED!
The Future of Wearables... EXPLAINED!
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 
The Future of Everything
The Future of EverythingThe Future of Everything
The Future of Everything
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to Introduction to KEEL Technology

How to implement artificial intelligence solutions
How to implement artificial intelligence solutionsHow to implement artificial intelligence solutions
How to implement artificial intelligence solutions
Carlos Toxtli
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
SisayNegash4
 
Software fundamentals
Software fundamentalsSoftware fundamentals
Software fundamentals
Susan Winters
 
Explore ml day 2
Explore ml day 2Explore ml day 2
Explore ml day 2
preetikumara
 
Algorithm
AlgorithmAlgorithm
Algorithm
nivlayalat
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
Sangeetha Rajesh
 
Is There a Return on Investment from Model-Based Systems Engineering?
Is There a Return on Investment from Model-Based Systems Engineering?Is There a Return on Investment from Model-Based Systems Engineering?
Is There a Return on Investment from Model-Based Systems Engineering?
Elizabeth Steiner
 
Software Development and Quality
Software Development and QualitySoftware Development and Quality
Software Development and Quality
Herwig Habenbacher
 
Object Oriented Database
Object Oriented DatabaseObject Oriented Database
Object Oriented Database
Megan Espinoza
 
Feature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax auditFeature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax audit
Michael BENESTY
 
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
evonnehoggarth79783
 
The Benefits of Cogility
The Benefits of CogilityThe Benefits of Cogility
The Benefits of Cogility
Cogility
 
A tour of the top 10 algorithms for machine learning newbies
A tour of the top 10 algorithms for machine learning newbiesA tour of the top 10 algorithms for machine learning newbies
A tour of the top 10 algorithms for machine learning newbies
Vimal Gupta
 
recent.pptx
recent.pptxrecent.pptx
recent.pptx
addisuaddaaa
 
Cognitive Architectures - Amr Kamel - 2015
Cognitive Architectures - Amr Kamel - 2015Cognitive Architectures - Amr Kamel - 2015
Cognitive Architectures - Amr Kamel - 2015Amr Kamel Deklel
 
A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)Bob Garrett
 
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM France Lab
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
stazi3110
 

Similar to Introduction to KEEL Technology (20)

How to implement artificial intelligence solutions
How to implement artificial intelligence solutionsHow to implement artificial intelligence solutions
How to implement artificial intelligence solutions
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
Software fundamentals
Software fundamentalsSoftware fundamentals
Software fundamentals
 
Explore ml day 2
Explore ml day 2Explore ml day 2
Explore ml day 2
 
My Research Poster
My Research Poster My Research Poster
My Research Poster
 
Algorithm
AlgorithmAlgorithm
Algorithm
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
 
Is There a Return on Investment from Model-Based Systems Engineering?
Is There a Return on Investment from Model-Based Systems Engineering?Is There a Return on Investment from Model-Based Systems Engineering?
Is There a Return on Investment from Model-Based Systems Engineering?
 
Software Development and Quality
Software Development and QualitySoftware Development and Quality
Software Development and Quality
 
Object Oriented Database
Object Oriented DatabaseObject Oriented Database
Object Oriented Database
 
Feature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax auditFeature Importance Analysis with XGBoost in Tax audit
Feature Importance Analysis with XGBoost in Tax audit
 
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx54    C o m m u n i C at i o n s  o F  t h e  a C m       j u.docx
54 C o m m u n i C at i o n s o F t h e a C m j u.docx
 
Visual Logic Project - 1
Visual Logic Project - 1Visual Logic Project - 1
Visual Logic Project - 1
 
The Benefits of Cogility
The Benefits of CogilityThe Benefits of Cogility
The Benefits of Cogility
 
A tour of the top 10 algorithms for machine learning newbies
A tour of the top 10 algorithms for machine learning newbiesA tour of the top 10 algorithms for machine learning newbies
A tour of the top 10 algorithms for machine learning newbies
 
recent.pptx
recent.pptxrecent.pptx
recent.pptx
 
Cognitive Architectures - Amr Kamel - 2015
Cognitive Architectures - Amr Kamel - 2015Cognitive Architectures - Amr Kamel - 2015
Cognitive Architectures - Amr Kamel - 2015
 
A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)A Comparison of Traditional Simulation and MSAL (6-3-2015)
A Comparison of Traditional Simulation and MSAL (6-3-2015)
 
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
IBM Paris Bluemix Meetup #12 - Ecole 42 - 9 décembre 2015
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Introduction to KEEL Technology

  • 1. COMPSIM LLC Technical Introduction
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. This is KEEL Source Code Positions and Arguments are added to the screen with menu selection or hot keys.
  • 29. The code is “dynamic”. As soon as items are dropped on the screen, they are active. This shows the user changing one of the supporting arguments (inputs). The impact of that change is shown across the entire system immediately. In this case only Action 1 is impacted.
  • 30. Here another input is stimulated and the system reacts.
  • 31. Now the user is interacting with the Action 2 by stimulating on of the inputs.
  • 32. The impact of stimulating this input is displayed immediately
  • 33. Wires define specific functional relationships between information items. First we will show how Action 1 will control the importance of Action 2. Wiring is done with simple drag and drop actions. Here we begin dragging the “modified value” of Action 1 - Start Drag
  • 34. When we drop the mouse on the “connection point” for importance of Action 2, The system automatically rebalances. Note that Action 2 height (importance) was reduced to the “modified value” of Action 1. The modified value of Action 1 is 73.033288 The importance of Action 2 is 73.033288 Drop
  • 35. Now we are going to manipulate one of the inputs to Action 1 and observe the impact on the importance of Action 2.
  • 36. After raising the scroll bar for the second supporting argument (input), the accumulation of all the inputs to Action 1 results in a modified value of 92.83, which is used to control the importance of Action 2 to 92.83.
  • 37. The first wire was used to control the importance of Action 2. Now we want to have Action 1 (modified value), “ contribute to ” how Action 2 is processed. To do this we will drag the modified value of Action 1 … Start Drag
  • 38. …And drop the mouse on one of the arguments, in this case the first supporting argument to Action 2. A new connection is made and the entire system rebalances again. Drop
  • 39. As always, any input can be manipulated manually and the user can “see” how the system responds. Here we will stimulate one of the blocking inputs.
  • 40. The results of increasing the blocking input to Action 2 are immediately visible.
  • 41. The icon to the left of the position bar is a “Threshold”. It can be placed anywhere within the range of the position importance bar. A threshold can be used to trigger events, when the modified value rises above the threshold. Here we are going to drag it up. Start Drag
  • 42. If a wire was tied from this point to another argument, that argument would be set to 100 if the modified value of Action 2 rose above the threshold. Drop
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. Development Process Tables Code Concept Design And Test KEEL Logic Solution Container & Glue Logic Design Solution Container and Glue Logic Integrated KEEL Solution Wire Glue Logic to KEEL Tables Test
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. May not be suitable for dynamic, non-linear problem sets. In many areas, reliable “probabilities” may not be available. Maybe Probably Not Determined by Application No Difficult No Human Designer and Statistics Probabilities of Probabilities Bayesian Belief Networks Requires a License to use Fragile / Brittle - Hard to maintain; Does not handle “Surprise” Difficult to Explain Reasoning; Pattern Training Required; Decisions not “Explainable”; Does not handle “Surprise” conditions Weaknesses Yes Maybe Maybe No Interactive Development Yes Probably Not Yes Yes Suitable for Control Determined by Application Worst Determined by Application Determined by Application Performance Best No No No Small Memory Footprint Fully Explainable Somewhat Difficult No Explainable Decisions No No No Major Problem Pattern Training Required Human Designer   Human Designer  Human Designer Patterns Source of Understanding Dynamic Adjustment to Importance of Data (Genetic) Trial and Error Geometric Fuzzification / Defuzzification Pattern Matching General Concept KEEL AI - Forward / Reverse Chaining Fuzzy Logic Neural Nets Technology Comparison
  • 65. COMPSIM LLC Technical Presentation Supplemental Information
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.