Authority-Governed Assured Autonomy Research Platform. Formally verified governance FSM, Dempster-Shafer trust fusion, 98 tests, 7 validated experiments, deterministic simulation. 42-file Python package + browser simulation dashboard.

hmaaai-governanceauthority-computationautonomous-systemspatent-filed
4,500+ lines 250KB+ HTML / JS / CSS
main 42+ files · Mar 7, 2026
Open Live
hmaa-simulation.html HMAA v2.4 authority computation engine Mar 7, 2026
LICENSE All Rights Reserved · Proprietary Mar 7, 2026
hmaa-simulation.html 4,500+ lines · 250KB+
  1<!DOCTYPE html>
  2<html lang="en">
  3<head>
  4<title>HMAA Simulation Dashboard</title>
  5
  6/* HMAA: Human-Machine Authority Architecture
  7 * U.S. Provisional Application No. 63/999,105
  8 * Filed: March 7, 2026
  9 * Inventor: Burak Oktenli (Sole)
 10 * Disclosure DOI: 10.5281/zenodo.18861653
 11 */
 12
 13// Full source: 4,500+ lines
README.md

HMAA: Human-Machine Authority Architecture

HMAA is an Authority-Governed Assured Autonomy Research Platform implementing a formally verified governance architecture for autonomous rovers. Core pipeline: six physics-based sensor models produce Dempster-Shafer belief masses, Shafer discounting weights evidence by cross-sensor validation, fused trust drives a formally verified authority FSM with hysteresis, dwell enforcement, and oscillation lockout. Phase 1 baseline: 89/100 engineering score.

Patent Status

U.S. Provisional Application No. 63/999,105
Filed: March 7, 2026 · Receipt: 74759595
Status: Submitted, Awaiting Review
Disclosure DOI: 10.5281/zenodo.18861653

Key Features

  • 42-file Python package with pip-installable architecture
  • 98 automated tests (D-S engine, FSM, sensors, harness, conformance, twin, validation)
  • 7 validated experiments: camera occlusion, LiDAR spoofing, RF jamming, IMU drift, compound attack, cross-sensor, recovery
  • TLA+ formal specification verified by TLC model checker (48,751 states, 8 properties)
  • Dempster-Shafer trust fusion with Shafer discounting and cross-sensor validation
  • Authority FSM with hysteresis, dwell enforcement, oscillation lockout
  • CARA recovery mode manager with command restrictions
  • Predictive digital twin with risk zone detection
  • Deterministic simulation: same seed produces identical SHA-256 trace hash
  • Monte Carlo statistical validation (N-trial)
  • Immutable trace artifacts with schema versioning and full-artifact hashing
  • Browser-based simulation dashboard (HTML)
  • GitHub Actions CI pipeline

Technical Specifications

  • Language: HTML, JavaScript, CSS (single-file architecture)
  • Dependencies: None (zero external libraries)
  • Runtime: Browser-based, client-side only
  • Lines of code: 3,228

Author

Burak Oktenli
Georgetown University, M.P.S. Applied Intelligence
ORCID: 0009-0001-8573-1667
Contact: info@burakoktenli.com

License

Copyright © 2026 Burak Oktenli · Georgetown University M.P.S. Applied Intelligence · ORCID 0009-0001-8573-1667 · Washington, DC · CC BY 4.0