sams-logic-gate-0.1.1 is not a library.
Visit the last successful build:
sams-logic-gate-0.2.0
SAMS Logic-Gate
The Brain - A real-time middleware processor for SAMS Atoms
Overview
SAMS Logic-Gate acts as an intelligent middleware processor between Ghost-Node and Cyber-Monitor, implementing real-time data transformation and rule-based processing of SAMS Atoms.
Architecture
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ GHOST-NODE │───▶│ LOGIC-GATE │───▶│ DASHBOARD │
└─────────────┘ └─────────────┘ └─────────────┘
Features
SAMS Semantic Logic Controller v0.1.0
Professional Middleware with Hybrid Open-Source/Proprietary Architecture
Overview
SAMS Semantic Logic Controller (SLC) is a professional-grade middleware processor that implements advanced semantic reasoning, stateful logic, and intelligent intervention capabilities for SAMS (Semantic Atom Monitoring System) data streams. It features a hybrid architecture combining open-source transport with proprietary intelligence.
Features
🧠 Core Functionality
- Semantic Processing: Advanced 32-byte atom analysis
- Stateful Logic: System health tracking and trend analysis
- Intelligent Intervention: Automatic high-energy sequence detection
- Input Validation: Anti-replay protection and integrity checks
- Hybrid Architecture: Open-source UI with proprietary reasoning
⚡ Performance Characteristics
- Processing Latency: < 1μs average logic execution
- High Throughput: 10,000+ atoms/second capability
- Memory Efficiency: < 50MB runtime footprint
- Network Performance: Sub-100μs end-to-end latency
🛡️ Security & Intelligence
- Pattern Recognition: Advanced semantic analysis algorithms
- Intervention Logic: Intelligent system protection
- Anti-Replay: Duplicate packet prevention
- State Machine: Multi-level health monitoring
Architecture Overview
Hybrid Model
┌─────────────────────────────────────────────────────────┐
│ OPEN-SOURCE LAYER │
├─────────────────────────────────────────────────────────┤
│ UDP Transport │ Terminal UI │ Integration API │ Documentation │
│ (Port 5555) │ (Cyan Theme) │ (Generic Trait) │ (MIT License) │
└─────────────────────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────────────┐
│ PROPRIETARY LAYER │
├─────────────────────────────────────────────────────────┤
│ Semantic Engine │ Pattern Recog │ Intervention │ Decision Mat │
│ (Advanced AI) │ (Heuristics) │ (Protection) │ (Trade Secret) │
└─────────────────────────────────────────────────────────┘
Quick Start
Prerequisites
- Rust 1.70+ with tokio runtime
- Terminal with UTF-8 support
- Network access for UDP communication
Installation & Running
# Clone the repository
# Open-source mode (default)
# Closed-source mode (commercial)
Development Modes
# Community development
# Commercial deployment
# Feature verification
Data Processing
Semantic Analysis
// Input atom structure
// Processing result
System Health States
- 🟢 Optimal: Normal operation, all systems healthy
- 🟡 Warning: Elevated activity or minor issues detected
- 🔴 Critical: Multiple concerning patterns present
- 🟣 Intervention: Automatic protection activated
Intelligence Features
- High Load Detection: Energy cost > 100μJ analysis
- Security Analysis: PQC trust failure detection
- Pattern Recognition: Anomaly and trend detection
- Intervention Logic: 3+ high-energy sequence protection
Configuration
Open-Source Development
[]
= "open-source" # Use mock logic
= true # Development features
= "test_atoms.json" # Test data source
= true # Enable metrics
Commercial Deployment
[]
= "closed-source" # Use proprietary logic
= "license.key" # Commercial license
= "proprietary_blobs/" # Binary libraries
= true # Performance features
Processing Parameters
[]
= 100.0 # High load threshold
= 3 # Trigger condition
= 5 # Protection interval
= 1000 # Anti-replay window
= 10 # System health atoms
Performance Monitoring
Real-Time Metrics
- Logic Execution: Sub-microsecond processing time
- System Health: Current operational state
- Intervention Count: Automatic protections applied
- Processing Rate: Atoms/second throughput
- Memory Usage: Runtime resource consumption
Intelligence Analytics
- Pattern Detection: Anomaly recognition results
- Trend Analysis: Long-term system behavior
- Efficiency Metrics: Processing optimization insights
- Security Events: PQC trust and integrity issues
Integration
SAMS Ecosystem
Ghost-Node → SLC → Cyber-Monitor
(5555) (5555→5556) (5556)
↓
Black-Box (Audit)
(5556)
API Interface
// Generic logic controller trait
// Factory function for both implementations
;
Data Flow
- Input: UDP packet reception from Ghost-Node
- Validation: Anti-replay and integrity checks
- Processing: Semantic analysis and state updates
- Intervention: Intelligent protection when needed
- Output: Forward processed atoms to Cyber-Monitor
Development
Open-Source Contributions
- UI Layer: Terminal interface improvements
- Network Layer: Transport optimization
- Integration: API enhancements
- Documentation: Guides and examples
- Testing: Validation and performance tests
Proprietary Components
- Core Algorithms: Advanced semantic reasoning
- Pattern Recognition: Proprietary heuristics
- Decision Matrices: Intervention logic
- Performance Optimizations: Speed-critical code
Build System
# Development build (open-source)
# Production build (closed-source)
# Cross-compilation
# Release optimization
IP Protection
Code Structure
src/
├── common_types.rs # Shared types and traits
├── logic_controller.rs # Factory abstraction
├── main.rs # Open-source orchestration
├── mock_logic.rs # Open-source implementation
├── slc_core.rs # PROPRIETARY - Protected IP
└── LICENSE_PROPRIETARY.md # Commercial license terms
Repository Protection
- Git Ignore:
proprietary_blobs/excluded - Build Guards: Feature-based conditional compilation
- License Headers: Comprehensive IP notices
- Distribution: Separate open-source and commercial versions
Licensing
Open-Source Components (MIT License)
- Transport protocol and networking
- Terminal UI framework
- Mock implementation for development
- Integration documentation
- Build system and configuration
Proprietary Components (Commercial License)
- Core semantic reasoning engine
- Advanced pattern recognition
- Intervention decision matrices
- Performance optimizations
- Binary distribution rights
Compliance
- Export Control: Some algorithms may be restricted
- Access Control: Proprietary component authentication
- Audit Trail: All proprietary modifications logged
- License Compliance: Redistribution requires agreement
Troubleshooting
Development Issues
- Feature Conflicts: Ensure only one feature enabled at build time
- Import Errors: Check conditional compilation in main.rs
- Type Mismatches: Verify common_types.rs consistency
- Linking Issues: Check proprietary library availability
Performance Issues
- High Latency: Monitor logic execution times
- Memory Leaks: Check for increasing memory usage
- Network Bottlenecks: Verify UDP buffer sizes
- Intervention Failures: Check system health logic
- Verify Cyber-Monitor listens on 5556
- Ensure Ghost-Node sends to 5555
License
This project is part of the SAMS ecosystem and follows the same licensing terms.