Abstract:
A virtual sensor generation apparatus of a sensor network sets a communication connection to a sensor node at a periphery of a smart device, generates a logical sensor corresponding to a physical sensor that is connected to the sensor node, generates a virtual sensor with the logical sensor, and provides an application service to a user using the virtual sensor.
Abstract:
A virtual sensor generation apparatus of a sensor network sets a communication connection to a sensor node at a periphery of a smart device, generates a logical sensor corresponding to a physical sensor that is connected to the sensor node, generates a virtual sensor with the logical sensor, and provides an application service to a user using the virtual sensor.
Abstract:
Provided are a data processing apparatus and method for merging and processing deterministic knowledge and non-deterministic knowledge. The data processing apparatus and method may efficiently process various real-time and large-scale data to convert the data into knowledge by merging and processing non-deterministic knowledge and also deterministic knowledge perceived by an expert. Thus, it is possible to adaptively operate in accordance with a dynamically changing application service environment by converting a conversion rule for converting collected data generated from an application service system into semantic data, a context awareness rule for perceiving context information from given information, and a user query for searching for knowledge information into knowledge and gradually augmenting the knowledge information in accordance with an application service environment.
Abstract:
Methods and systems for analyzing data. The data analysis method includes generating a case data set corresponding to the data analysis request; collecting and storing raw data corresponding to the case data set; generating a knowledge package based on the raw data; generating a knowledge package library based on the knowledge package; and providing the user with the knowledge package library. Also, the case data set includes first selection parameters, and the knowledge package library includes second selection parameters different from the first selection parameters. According to the embodiments of the present disclosure, a deep understanding of business and ecosystem which is previously obtained from big data analysis and insights about data group selection, modeling, and analysis method can be provided, such that a big data analysis can be performed with enhanced efficiency.
Abstract:
Provided are a self-learning system and method for automatically performing machine learning (ML). The self-learning system includes a memory configured to store an ML knowledge database (DB) in which ML knowledge is stored and a program for automatically performing ML based on request information of a user, and a processor configured to execute the program stored in the memory. Here, when executing the program, the processor creates or recommends at least one workflow corresponding to the request information of the user based on the ML knowledge stored in the ML knowledge DB and generates an execution code for performing the created or recommended workflow.
Abstract:
Provided is a data meta-scaling method. The data meta-scaling method optimizes an abbreviation criterion for abbreviating data through continuous knowledge augmentation in various dimensions which enable expression of data in a process of performing machine learning.
Abstract:
Provided is an apparatus and method for detecting a traffic flooding attack and conducting an in-depth analysis using data mining that may rapidly detect a distributed denial of service (DDoS) attack, for example, a traffic flooding attack, developed more variously and firmly from a denial of service (DoS) attack, perform an attack type classification, and conduct a semantic analysis with respect to the attack. The apparatus and method may support a system operation and provide a more stable service, by rapidly detecting a traffic flooding attack, classifying a type of the attack, and conducting a semantic analysis based on a prediction and analysis scheme of data mining.