[24]                               home                            [26]

ORB Visualization




3/30/2004 7:27 AM


America’s Rural Safe Net

and converting blogs into a Global Glass bead Game


This bead will give a view into the technical details that allow for both the concept of a Safe Net and the concept of a community bead game. 


First a high level overview regarding the specific proposal that a new grass roots movement might be facilitated by web harvesting selected blogs and converting the conceptual content into a dynamic concept map having a visual interface using Orbs. 


Several of the BCNGroup Founding scientists worked on the edge of the DARPA program managed by Poindexture.  We know all of the deep technology that is deployed in intelligence, and we know what has not been deployed.  The problems of deployment are essentially because the intelligence community is stove piped and the funding decisions at DARPA and NIST have continued a non-sense notion that a computer can perform reasoning that is of the nature and type that humans experience while thinking.


The following is rewritten from Section 3.2 from Form based communication and computational reasoning, originally written March 4, 1999. 




The identification of useful patterns requires two essential ingredients. First, the real world must have a generator that produces an actual pattern that is repeated. This pattern can then be seen, sometimes, using measurements on co-occurrence of tokens in bit streams. The second ingredient is specific knowledge of when the pattern begins and when it ends.


In simple cases, this is not an issue. For example the co-occurrence of terms in the distribution of word frequencies, or the co-occurrence of the range in which numerical data falls, is often within a context that easily establishes the beginning and end of the event. However, most naturally patterns are complex, incomplete and / or not properly measured.


During complex transmission, the KOS (Knowledge Operating System) Communication Manager provides a Fourier like spread of a signal into a specific decomposition involving the use of a substructural "vector’ basis. The vector basis, a mathematical notion derived formally from Fourier analysis, describes the nature of light by identifying energy wavelengths in the electromagnetic spectrum. The decomposition is also analogous to a bit stream to wave transformation seen in quantum mechanics. In data stream decomposition of signal, the repeated patterns in the signal is the signals "spectrum". This signal spectrum can describe the content of the stream. 


(This indented paragraph written 3/30/2004 8:46 AM) The foundation of KOS computations is given in a notation towards the end of the first fundamental paper on SLIP theorems (written Nov. 2001).  )


The spread is followed by signal processing in a "spectral domain" and then by the inverse transformation of the signal into a new bit stream. This re-localization is called, "a collapse of the wave" and is where any "interpretation" of information must occur. "Knowledge" is regarded as only existing during this collapse. The Communication Manager follows this analogy in managing the complex transmission. The theory is grounded in neuropsychology and in the widely available experimental evidence regarding the processing of the flow of energy from the eye into brain regions.  See Hameroff and Penrose’s work on self orchestrated quantum event collapse and Prueitt’s work on the emergence of mental events. 



Figure 3.1: Simple and Complex transmission of data streams


In simple transmission, no processing of the data stream is allowed. The data transmission is said to be Newtonian and simple. In complex transmission, a "sign system" is created that allows the "cross level" decomposition of the meaning of specific information in specific contexts and having specific pragmatics. The sign system also provides structured annotation of context, and thus may shape the interpretation during the re-localization of information. If memory is available, in the form of a class of representations of substructural patterns, then the stratified communication theory proposed by Prueitt is realized.


Traversal of an information gap, generically called epistemic gaps in the literature, require either a forward transformation or an inverse transformation of the signal. It is assumed here that interpretation must involve the traversal of an epistemic gap. Once a data stream is decomposed into semantic invariance, various computational argumentations can occur in a spectral domain built from theme and / or concept spaces. The semantic invariance may be statistically defined, as in the Dynamic Reasoning Engines (DREs) available form the company Autonomy Inc. The computational argumentation may be defined using quasi-axiomatic theory, Mill’s logic, and a class of procedures called "voting procedures".


The computational argumentation, in the substrate, changes the position of tokens in the theme or concept space. Recomposition uses voting procedures to perform the inverse transform and to produce a new data packet with well-established similarity and dissimilarity to the original data.


Ultimately, the natural objective of a knowledge extraction methodology is to produce a set of topics, perhaps organized into taxonomies. This set of topics is to be as complete as possible while respecting the content within areas that correspond to viewpoint. To respect the viewpoint, established by context, each area is to be treated separately. Thus, the measurement of consistency and completeness is made within areas and not across context.




Since the development of some prototype many to many communications systems in 1999, we have had the experience of working with some new technologies that provide for a conceptual indexing using what Dr. Michael Lissack called catalytic indexicals.


This new technology is offered as Open Source Information at the bead game:


InOrb Technologies





We founded, in 1997, a Not for Profit Foundation

Please consider a membership or contribution