Minimising maintenance

November 2017 Security Services & Risk Management

The idea to use a form of autonomous decision-making engine was birthed when Gerhard Furter, the creator of Naxian Systems’ ANNIE (Artificial Neural Network Inside Everything), was busy with a project for a government department in the justice sphere. It was realised that a lot of the decisions that the operators had to make were very habitual, but also based on more information than a ‘normal’ human could realistically process. These decisions could, however, be repeated by a machine if the machine could be made to understand the ‘why’ of the decision.

Furter developed suitable algorithms and ANNIE almost immediately took over 40% to 50% of the operators’ work. “She rapidly grew as clients posed a challenge based on some strange requirements, whereafter I would engineer a way for ANNIE to solve the problem, and a new set of algorithms would be spliced into ANNIE’s persona,” says Furter.

ANNIE’s purpose is very simple: to learn about and understand the environment in which she is implemented and use this knowledge to identify when something may go wrong. In ANNIE terms, a situation in which the environment is working as it should, is referred to as state 0 (zero), or zero risk.

To understand the environment, ANNIE acquires information using whatever systems she can integrate into, and attempts to identify ‘normal’ through the use of typical behaviours exhibited by the various groups or populations of assets and people. She then benchmarks and trends anything she can measure, and identifies patterns that describe habits, processes and associations between assets, people and events.

The resulting model is a real-world depiction of what her environment looks like. She uses this model to study all changes, deviations and exceptions with the intention of not only identifying problems as they evolve, but also to anticipate (predict) when something will happen that is not advantageous to the client’s operations. ANNIE will use whatever methods the client allows to try to solve the issue, or to prevent it from actually occurring, using a simple warning SMS or launching a full-blown intervention using digital or electronic devices.

To date, ANNIE’s application has facilitated a number of positive results for organisations that include:

• Increased transparency. By applying ANNIE to historic data, organisations can for the first time make sense of big data because she indicates trends, behaviours, patterns and associations that are traditionally not exposed by business intelligence resources and tools.

• Decreased risk. By applying ANNIE to real-time data in any operational environment she is able to detect anomalies that humans can never detect. This is because she looks at everything, all of the time, and then compares this to everything she has trended as ‘typical’ from past knowledge inside an environment. For anything detected outside of typical, she will raise a ‘watch dog’, which is an early indication to organisations that something suspicious may be in progress.

• Increased profits. Because of the fact that ANNIE is aware of all environments that she is connected to, at all times, she will always find the most optimal way of deploying resources. In for example the case of maintenance of systems and devices, ANNIE will ensure that the most proficient resource is sent to a faulty site, by way of the optimal route based on traffic and weather conditions, with the right tools and/or stock in hand to resolve any technical issues on site.

“Where most other AI’s will implement features that are more suited to the boardroom or data science laboratory, ANNIE will roll up her sleeves and do the dirty work of not just analysing the data, but also causing physical changes in the environment entrusted to her,” says Furter.

The AI development team at Naxian is engaging with Microsoft as a cloud partner to ensure that ANNIE is made available as a service through cloud platforms such as Microsoft Azure. “However, as we connect billions of things to the Internet, it is unreasonable and impractical to expect that all data and signals are sent to centralised or distributed cloud environments in order to apply the AI.

“Rather, we believe that AI should sit on the edge devices themselves. Instead of the weather station, traffic analytics service, video surveillance camera, access control device, etc. having to send data to a central point in order to collaborate and produce a result through the application of AI, these devices should have the AI embedded or attached at the edge and talk to each other. Our immediate core future focus is to ensure that we ‘port’ our intelligence onto edge devices such as Raspberry Pies and other microcomputer platforms,” says Furter.

For more information contact Naxian, +27 (0)87 820 0620, bernard@naxian.co.za, www.naxian.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

Read more...
More than just a criminal record check
iFacts Security Services & Risk Management
When it comes to human-related risks, organisations and their most senior leaders focus on a narrow set of workforce risks, the potential risks that human workers pose to the business.

Read more...
Tech developments lead hologram growth in 2024
News & Events Security Services & Risk Management
Micro-lenses, micro-mirrors and plasmonics are among the rapidly-emerging optical devices that have evolved on the back of holographic and diffractive technologies, and are seen as part of the natural evolution of optical science by R&D teams.

Read more...
Are you leaving money on the table?
Editor's Choice Security Services & Risk Management
How many customers have you helped since starting your business? Where does most of your new business come from? If the answer is not from your database’s existing customers, you might have a problem.

Read more...
The business value of ChatGPT
Security Services & Risk Management Risk Management & Resilience
Transparency, policy and integrity. It is critical for organisations to have a line of sight into processes and procedures that clearly define employee use cases when it comes to ChatGPT, says Lizaan Lewis, Head of the Legal Department at Altron Systems Integration.

Read more...
BMS for smaller businesses
Security Services & Risk Management Products & Solutions Risk Management & Resilience
Small businesses can also benefit from tailored energy management solutions just like large corporations. Effective energy management is essential for more sustainable and efficient operations.

Read more...
Kidnapping for ransom
News & Events Security Services & Risk Management Risk Management & Resilience
There has been an 8,6% increase in reported kidnapping cases in South Africa compared to last year, with 3 854 cases reported between April and June this year, leaving ordinary South Africans increasingly vulnerable.

Read more...
The difference between a SOP and a SOP
Residential Estate (Industry) Integrated Solutions Security Services & Risk Management Risk Management & Resilience
SOPs are a touchy issue that need careful attention and automation to ensure they deliver the desired security results. Beyond design and automation, implementation is the ultimate road to success.

Read more...