Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.展开更多
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t...Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.展开更多
The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The ...The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.展开更多
Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to buil...Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.展开更多
The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technolog...The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technology is a method to validate the identification of an object and trace it.The identifier is a bridge to connect information islands in the industry,as well as the data basis for building a technology application ecosystem based on identifier resolution.We propose three practical applications and application scenarios of the industrial Internet identifier in this paper.Future applications of identifier resolution in the industrial Internet field are also presented.展开更多
We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators ar...We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators are widely used in telemanipulation systems where they are subject to model and environmental uncertainties.Using conventional control algorithms on such systems can cause not only poor control performance,but also expensive computational costs and catastrophic instabilities.Therefore,system uncertainties need to be estimated through designing a computationally efficient adaptive control law.We focus on robot manipulators as an example of a highly nonlinear system.As a case study,a 2-DOF manipulator subject to four parametric uncertainties is investigated.First,the dynamic equations of the manipulator are derived,and the corresponding regressor matrix is constructed for the unknown parameters.For a general nonlinear system,a theorem is presented to guarantee the asymptotic stability of the system and the convergence of parameters'estimations.Finally,simulation results are discussed for a two-link manipulator,and the performance of the proposed scheme is thoroughly evaluated.展开更多
This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controlle...This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controller (SMC) is used to ensure the global reaching condition of the sliding mode for the nonlinear system; an identifier is designed to identify the uncertain parameter of the nonlinear system. A numerical example is studied to show the feasibility of the SM controller and the asymptotical convergence of the identifier.展开更多
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ...The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.展开更多
This paper addresses the design of an exponential function-based learning law for artificial neural networks(ANNs)with continuous dynamics.The ANN structure is used to obtain a non-parametric model of systems with unc...This paper addresses the design of an exponential function-based learning law for artificial neural networks(ANNs)with continuous dynamics.The ANN structure is used to obtain a non-parametric model of systems with uncertainties,which are described by a set of nonlinear ordinary differential equations.Two novel adaptive algorithms with predefined exponential convergence rate adjust the weights of the ANN.The first algorithm includes an adaptive gain depending on the identification error which accelerated the convergence of the weights and promotes a faster convergence between the states of the uncertain system and the trajectories of the neural identifier.The second approach uses a time-dependent sigmoidal gain that forces the convergence of the identification error to an invariant set characterized by an ellipsoid.The generalized volume of this ellipsoid depends on the upper bounds of uncertainties,perturbations and modeling errors.The application of the invariant ellipsoid method yields to obtain an algorithm to reduce the volume of the convergence region for the identification error.Both adaptive algorithms are derived from the application of a non-standard exponential dependent function and an associated controlled Lyapunov function.Numerical examples demonstrate the improvements enforced by the algorithms introduced in this study by comparing the convergence settings concerning classical schemes with non-exponential continuous learning methods.The proposed identifiers overcome the results of the classical identifier achieving a faster convergence to an invariant set of smaller dimensions.展开更多
Cytoscape is one of the most popular platforms for biomolecular networks research. However Cytoscape cannot display biomolecular names according to their accession identifiers in different databases. A plugin named Ai...Cytoscape is one of the most popular platforms for biomolecular networks research. However Cytoscape cannot display biomolecular names according to their accession identifiers in different databases. A plugin named Ai2NU is designed and implemented in this paper. It can make biomolecular names displayed automatically in biomolecular networks graphs in Cytoscape by constructing a local dictionary. It is convenient for researchers to recognize biomolecules and enhance the research efficiency.展开更多
In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into ...In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into the design. In the case where there is the modelling error, a new identification algorithm is proposed. It is proved that the fuzzy identifier is globally stable and the identification error converges to zero exponentially fast.展开更多
Inland waters support the growth of several sectors including mining, agriculture, and health. This makes it crucial to have sustainable quantity and quality through conservation practices. Achieving sustainability re...Inland waters support the growth of several sectors including mining, agriculture, and health. This makes it crucial to have sustainable quantity and quality through conservation practices. Achieving sustainability requires information on the spatial distribution of water bodies. This requirement is particularly critical in low-income nations where dependence on natural resources is a key driver to economic growth. Unfortunately, these nations lack the resources to promote costly waterbody characterization. This study pre-sents a cost-effective approach in assigning Unique Identifiers (UIDs) that define locations and characteristics of rivers and streams. Our objective is to develop a scheme that can be used to identify and characterize rivers and streams in a nation. We utilized an open-source Digital Elevation Model (DEM) of NASA’s ASTER satellite and the hydrology tool in ArcGIS 10.7.1. The DEM was imported to ArcGIS followed by delineation of hydrologic regions, subregions, and stream orders. Each stream segment was given a UID based on its region and Strahler’s stream order system. We present a case study analysis for two regions within Sierra Leone using water quality data of selected rivers and streams. These will lay the foundation for a nationwide coding exercise and provide a useful reference for water resource practitioners.展开更多
The applications of unique identifiers such as name, home address and social security number to link different datasets have been commonly used and well-published. Also, the theoretical concepts of probabilistic algor...The applications of unique identifiers such as name, home address and social security number to link different datasets have been commonly used and well-published. Also, the theoretical concepts of probabilistic algorithm in record linkage have been well-defined in the literature. However, few studies have reported the applications of its probabilistic algorithm using non-unique identifiers. In this paper, we investigate several variables (weight, height, waist, age, sex, smoking and alcohol habit) as non-unique identifiers using Japanese cohort dataset with three-year baseline of 1989-1991 to observe how effectively these identifiers can be used and what influence those may have on record linkage. Moreover, we modify the conditions of these identifiers and estimate the sensitivity, specificity and accuracy for comparison. We further investigate this by using extended ten-year baseline of 1989-1999 as well. As a result, we conclude that the combination of age, sex, weight and height predicts better estimation with regards to the sensitivity, specificity and accuracy than other combinations in both men and women in case of using three-year baseline, whereas the combination of age, sex and height predicts better in both men and women in case of using ten-year baseline.展开更多
Identifier resolution system in the automotive industrial Internet is necessary for building a fully interconnected infrastructure with people,machines,factories,products and clients.The resolution system can not only...Identifier resolution system in the automotive industrial Internet is necessary for building a fully interconnected infrastructure with people,machines,factories,products and clients.The resolution system can not only ensure the comprehensive interconnection and efficiency of research and development,procurement,production,sales,and after-sales service in automotive industry,but also promote the integration of automotive industrial data,which facilitates the integrated development of traditional automotive manufacturing and the industrial Internet.This paper focuses on processes and methods of building identifier resolution system for the automotive industry and summarizes the construction and development of secondary node in the automotive industrial Internet in order to explore a suitable road to a rich and completed application ecosystem.展开更多
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ...The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.展开更多
Single sign-on (SSO) is an identity management technique that provides the ability to use multiple Web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot...Single sign-on (SSO) is an identity management technique that provides the ability to use multiple Web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access these Web services, regardless of whether they are operating normally. Therefore, it is important to enable continuous use alongside SSO. In this paper, we present an identity continuance method for SSO. First, we explain four such continuance methods and identify their limitations and problems. Second, we propose a new solution based on an identifier migration approach that meets the requirement for identity continuance. Finally, we discuss these methods from the viewpoint of continuity, security, efficiency, and feasibility.展开更多
The FAIR principles describe characteristics intended to support access to and reuse of digital artifacts in the scientific research ecosystem.Persistent,globally unique identifiers,resolvable on the Web,and associate...The FAIR principles describe characteristics intended to support access to and reuse of digital artifacts in the scientific research ecosystem.Persistent,globally unique identifiers,resolvable on the Web,and associated with a set of additional descriptive metadata,are foundational to FAIR data.Here we describe some basic principles and exemplars for their design,use and orchestration with other system elements to achieve FAIRness for digital research objects.展开更多
Data-intensive science is reality in large scientific organizations such as the Max Planck Society,but due to the inefficiency of our data practices when it comes to integrating data from different sources,many projec...Data-intensive science is reality in large scientific organizations such as the Max Planck Society,but due to the inefficiency of our data practices when it comes to integrating data from different sources,many projects cannot be carried out and many researchers are excluded.Since about 80%of the time in data-intensive projects is wasted according to surveys we need to conclude that we are not fit for the challenges that will come with the billions of smart devices producing continuous streams of data-our methods do not scale.Therefore experts worldwide are looking for strategies and methods that have a potential for the future.The first steps have been made since there is now a wide agreement from the Research Data Alliance to the FAIR principles that data should be associated with persistent identifiers(PID)and metadata(MD).In fact after 20 years of experience we can claim that there are trustworthy PID systems already in broad use.It is argued,however,that assigning PIDs is just the first step.If we agree to assign PIDs and also use the PID to store important relationships such as pointing to locations where the bit sequences or different metadata can be accessed,we are close to defining Digital Objects(DOs)which could indeed indicate a solution to solve some of the basic problems in data management and processing.In addition to standardizing the way we assign PIDs,metadata and other state information we could also define a Digital Object Access Protocol as a universal exchange protocol for DOs stored in repositories using different data models and data organizations.We could also associate a type with each DO and a set of operations allowed working on its content which would facilitate the way to automatic processing which has been identified as the major step for scalability in data science and data industry.A globally connected group of experts is now working on establishing testbeds for a DO-based data infrastructure.展开更多
文摘Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.
文摘Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.
基金supported in part by PCL Future Regional Network Facilities for Large-scale Experiments and Applications under Grant NO.PCL2018KP001by Guangdong R&D Key Program under Grant No.GD2016B030305005+3 种基金by National Natural Science Foundation of China(NSFC)under Grant No.61671001by National Key R&D Program of China under Grant No.2017YFB0803204by Shenzhen Research Programs under Grant Nos.JSGG20170824095858416,JCYJ20190808155607340,and JCYJ20170306092030521This work is also supported by the Shenzhen Municipal Development and Reform Commission(Disciplinary Development Program for Data Sci⁃ence and Intelligent Computing).
文摘The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.
文摘Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.
文摘The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technology is a method to validate the identification of an object and trace it.The identifier is a bridge to connect information islands in the industry,as well as the data basis for building a technology application ecosystem based on identifier resolution.We propose three practical applications and application scenarios of the industrial Internet identifier in this paper.Future applications of identifier resolution in the industrial Internet field are also presented.
基金supported by the National Science Foundation under Award#1823951-1823983。
文摘We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators are widely used in telemanipulation systems where they are subject to model and environmental uncertainties.Using conventional control algorithms on such systems can cause not only poor control performance,but also expensive computational costs and catastrophic instabilities.Therefore,system uncertainties need to be estimated through designing a computationally efficient adaptive control law.We focus on robot manipulators as an example of a highly nonlinear system.As a case study,a 2-DOF manipulator subject to four parametric uncertainties is investigated.First,the dynamic equations of the manipulator are derived,and the corresponding regressor matrix is constructed for the unknown parameters.For a general nonlinear system,a theorem is presented to guarantee the asymptotic stability of the system and the convergence of parameters'estimations.Finally,simulation results are discussed for a two-link manipulator,and the performance of the proposed scheme is thoroughly evaluated.
文摘This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controller (SMC) is used to ensure the global reaching condition of the sliding mode for the nonlinear system; an identifier is designed to identify the uncertain parameter of the nonlinear system. A numerical example is studied to show the feasibility of the SM controller and the asymptotical convergence of the identifier.
基金This work is supported by the Institute for Information&communications Technology Promotion(IITP)grant funded by the Korean government Ministry of Science and ICT(MSIT)(No.B0184-15-1001,Federated Interoperable Semantic IoT Testbeds and Applications).
文摘The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.
基金supported by the National Polytechnic Institute(SIP-20221151,SIP-20220916)。
文摘This paper addresses the design of an exponential function-based learning law for artificial neural networks(ANNs)with continuous dynamics.The ANN structure is used to obtain a non-parametric model of systems with uncertainties,which are described by a set of nonlinear ordinary differential equations.Two novel adaptive algorithms with predefined exponential convergence rate adjust the weights of the ANN.The first algorithm includes an adaptive gain depending on the identification error which accelerated the convergence of the weights and promotes a faster convergence between the states of the uncertain system and the trajectories of the neural identifier.The second approach uses a time-dependent sigmoidal gain that forces the convergence of the identification error to an invariant set characterized by an ellipsoid.The generalized volume of this ellipsoid depends on the upper bounds of uncertainties,perturbations and modeling errors.The application of the invariant ellipsoid method yields to obtain an algorithm to reduce the volume of the convergence region for the identification error.Both adaptive algorithms are derived from the application of a non-standard exponential dependent function and an associated controlled Lyapunov function.Numerical examples demonstrate the improvements enforced by the algorithms introduced in this study by comparing the convergence settings concerning classical schemes with non-exponential continuous learning methods.The proposed identifiers overcome the results of the classical identifier achieving a faster convergence to an invariant set of smaller dimensions.
基金Project supported by the Shanghai Leading Academic Discipline Project(Grnat No.J50103)the Ph D Programs Foundation of Ministry of Education of China(Grant No.20080280007)+1 种基金the Innovation Program of Municipal Education Commission of Shanghai Municipality(Grant No.11Y203)the Innovation Foundation of Shanghai University
文摘Cytoscape is one of the most popular platforms for biomolecular networks research. However Cytoscape cannot display biomolecular names according to their accession identifiers in different databases. A plugin named Ai2NU is designed and implemented in this paper. It can make biomolecular names displayed automatically in biomolecular networks graphs in Cytoscape by constructing a local dictionary. It is convenient for researchers to recognize biomolecules and enhance the research efficiency.
文摘In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into the design. In the case where there is the modelling error, a new identification algorithm is proposed. It is proved that the fuzzy identifier is globally stable and the identification error converges to zero exponentially fast.
文摘Inland waters support the growth of several sectors including mining, agriculture, and health. This makes it crucial to have sustainable quantity and quality through conservation practices. Achieving sustainability requires information on the spatial distribution of water bodies. This requirement is particularly critical in low-income nations where dependence on natural resources is a key driver to economic growth. Unfortunately, these nations lack the resources to promote costly waterbody characterization. This study pre-sents a cost-effective approach in assigning Unique Identifiers (UIDs) that define locations and characteristics of rivers and streams. Our objective is to develop a scheme that can be used to identify and characterize rivers and streams in a nation. We utilized an open-source Digital Elevation Model (DEM) of NASA’s ASTER satellite and the hydrology tool in ArcGIS 10.7.1. The DEM was imported to ArcGIS followed by delineation of hydrologic regions, subregions, and stream orders. Each stream segment was given a UID based on its region and Strahler’s stream order system. We present a case study analysis for two regions within Sierra Leone using water quality data of selected rivers and streams. These will lay the foundation for a nationwide coding exercise and provide a useful reference for water resource practitioners.
文摘The applications of unique identifiers such as name, home address and social security number to link different datasets have been commonly used and well-published. Also, the theoretical concepts of probabilistic algorithm in record linkage have been well-defined in the literature. However, few studies have reported the applications of its probabilistic algorithm using non-unique identifiers. In this paper, we investigate several variables (weight, height, waist, age, sex, smoking and alcohol habit) as non-unique identifiers using Japanese cohort dataset with three-year baseline of 1989-1991 to observe how effectively these identifiers can be used and what influence those may have on record linkage. Moreover, we modify the conditions of these identifiers and estimate the sensitivity, specificity and accuracy for comparison. We further investigate this by using extended ten-year baseline of 1989-1999 as well. As a result, we conclude that the combination of age, sex, weight and height predicts better estimation with regards to the sensitivity, specificity and accuracy than other combinations in both men and women in case of using three-year baseline, whereas the combination of age, sex and height predicts better in both men and women in case of using ten-year baseline.
文摘Identifier resolution system in the automotive industrial Internet is necessary for building a fully interconnected infrastructure with people,machines,factories,products and clients.The resolution system can not only ensure the comprehensive interconnection and efficiency of research and development,procurement,production,sales,and after-sales service in automotive industry,but also promote the integration of automotive industrial data,which facilitates the integrated development of traditional automotive manufacturing and the industrial Internet.This paper focuses on processes and methods of building identifier resolution system for the automotive industry and summarizes the construction and development of secondary node in the automotive industrial Internet in order to explore a suitable road to a rich and completed application ecosystem.
文摘The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.
文摘Single sign-on (SSO) is an identity management technique that provides the ability to use multiple Web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access these Web services, regardless of whether they are operating normally. Therefore, it is important to enable continuous use alongside SSO. In this paper, we present an identity continuance method for SSO. First, we explain four such continuance methods and identify their limitations and problems. Second, we propose a new solution based on an identifier migration approach that meets the requirement for identity continuance. Finally, we discuss these methods from the viewpoint of continuity, security, efficiency, and feasibility.
基金This work was supported in part by the European Union’s Horizon 2020 program under grant agreements 777523,FREYA“Connected Open Identifiers for Discovery,Access and Use of Research Resources”,654248,CORBEL+1 种基金“Coordinated Research Infrastructures Building Enduring Life-science services”,and 823830Bioexcel2,"BioExcel-2 Centre of Excellence for Computational Biomolecular Research".Many thanks to Paul Groth for his helpful comments on the manuscript.
文摘The FAIR principles describe characteristics intended to support access to and reuse of digital artifacts in the scientific research ecosystem.Persistent,globally unique identifiers,resolvable on the Web,and associated with a set of additional descriptive metadata,are foundational to FAIR data.Here we describe some basic principles and exemplars for their design,use and orchestration with other system elements to achieve FAIRness for digital research objects.
文摘Data-intensive science is reality in large scientific organizations such as the Max Planck Society,but due to the inefficiency of our data practices when it comes to integrating data from different sources,many projects cannot be carried out and many researchers are excluded.Since about 80%of the time in data-intensive projects is wasted according to surveys we need to conclude that we are not fit for the challenges that will come with the billions of smart devices producing continuous streams of data-our methods do not scale.Therefore experts worldwide are looking for strategies and methods that have a potential for the future.The first steps have been made since there is now a wide agreement from the Research Data Alliance to the FAIR principles that data should be associated with persistent identifiers(PID)and metadata(MD).In fact after 20 years of experience we can claim that there are trustworthy PID systems already in broad use.It is argued,however,that assigning PIDs is just the first step.If we agree to assign PIDs and also use the PID to store important relationships such as pointing to locations where the bit sequences or different metadata can be accessed,we are close to defining Digital Objects(DOs)which could indeed indicate a solution to solve some of the basic problems in data management and processing.In addition to standardizing the way we assign PIDs,metadata and other state information we could also define a Digital Object Access Protocol as a universal exchange protocol for DOs stored in repositories using different data models and data organizations.We could also associate a type with each DO and a set of operations allowed working on its content which would facilitate the way to automatic processing which has been identified as the major step for scalability in data science and data industry.A globally connected group of experts is now working on establishing testbeds for a DO-based data infrastructure.