Search results for "Identifier"

showing 10 items of 24 documents

On Constructing Persistent Identifiers with Persistent Resolution Targets

2016

Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…

Networking and Internet Architecture (cs.NI)FOS: Computer and information scienceslcsh:T58.5-58.64lcsh:Information technologyComputer sciencebusiness.industryOverlay network020206 networking & telecommunications02 engineering and technologycomputer.file_formatMaintenance engineeringlcsh:QA75.5-76.95IdentifierMetadataComputer Science - Networking and Internet ArchitectureData accessEncoding (memory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinessDisseminationBitTorrentcomputerComputer network
researchProduct

In-depth evaluation of software tools for data-independent acquisition based label-free quantification.

2015

Label-free quantification (LFQ) based on data-independent acquisition workflows currently experiences increasing popularity. Several software tools have been recently published or are commercially available. The present study focuses on the evaluation of three different software packages (Progenesis, synapter, and ISOQuant) supporting ion mobility enhanced data-independent acquisition data. In order to benchmark the LFQ performance of the different tools, we generated two hybrid proteome samples of defined quantitative composition containing tryptically digested proteomes of three different species (mouse, yeast, Escherichia coli). This model dataset simulates complex biological samples con…

Normalization (statistics)ProteomicsProteomeComputer sciencebusiness.industrycomputer.software_genreBiochemistryMass SpectrometryPeptide FragmentsIdentifierLabel-free quantificationSoftwareIsoquantYeastsProteomeEscherichia coliHumansData-independent acquisitionData miningCluster analysisbusinessMolecular BiologycomputerSoftwareProteomics
researchProduct

Secure integration of multiprotocol instant messenger

2017

Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…

PasswordCode reviewPidginbusiness.industryComputer scienceComputer securitycomputer.software_genreEncryptionWorld Wide WebIdentifierServerPlug-inbusinesscomputerProtocol (object-oriented programming)2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
researchProduct

An optimal code for patient identifiers.

2004

How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.

Patient Identification SystemsComputer scienceTransposition (telecommunications)Health Informaticscomputer.software_genreComputer Science ApplicationsIdentifierCode (cryptography)Data miningConstant-weight codeAlphabetError detection and correctionAlgorithmcomputerSoftwareAlgorithmsConfidentialityMathematicsComputer methods and programs in biomedicine
researchProduct

Dataset of a globally relevant stock of soil nitrogen in the Yedoma permafrost domain

2022

This dataset merges nitrogen data from the Yedoma domain. It includes numerous fieldwork campaigns, which take place since 1998. In total 467 samples from the active layer (seasonally thawed layer), 175 samples from perennially frozen Holocene cover deposits, 479 samples from thermokarst deposits in drained thermokarst, 175 in-situ thawed, diagenetically (anaerobic microbial decomposition possible during unfrozen phase) altered Yedoma deposits (called Taberite), and 917 samples from frozen Yedoma deposits are included. Moreover it includes a NH4+ and NO3- quantification basing on of 658 samples, including 378 data points for NH4+ (active layer, 93; Holocene cover, 108; thermokarst sediment,…

Reference sourceNitrogenpermafrost thawLocationStratigraphyorganicDensityDEPTH sediment/rockPermafrost Research AWI_PermaArcticDensity bulk permafrostPermafrost Research (AWI_Perma)Sample numbernitrogen cycletop minCarbon Nitrogen ratiobulkELEVATIONLONGITUDEtotalorganic matterbottom maxDepthDepth top/minWater (ice) segregatedCarbonCarbon/Nitrogen ratiosediment rocksegregatedSample IDWater iceNitrogen totalclimate feedbackLATITUDEEarth System ResearchDepth bottom/maxPersistent IdentifierCarbon organic totalReference/sourcepermafrost
researchProduct

L'administration conjointe du dossier patient: une responsabilité partagée entre le patient et le praticien

2011

National audience; The main problem faced by patients, health practitioners and the authorities, is namely the gathering and updating of administrative and medical data in order to accurately reconstitute a patient's medical history. Although solutions to accelerate and to ease this gathering are being implemented at the national level in several European countries, as unique health identifier in France, information still have to be validated before use. Through this article, we propose a mixed management of patients' data, split between the patient regarding administrative information and the Medical Practitioner (MP) regarding medical information. This method is based on two processes. Th…

Secure Hash Algorithm020205 medical informaticsComputer scienceProcess (engineering)Medical record02 engineering and technologymedicine.diseaseIdentifier03 medical and health sciences0302 clinical medicineAccountability0202 electrical engineering electronic engineering information engineeringCryptographic hash functionmedicineMedical history030212 general & internal medicineMedical emergencyInefficiency
researchProduct

Editorial issue 2

2018

It has been a very long trip since I wrote my last editorial. The first issue of the Journal received a strong welcome from all over the world in the beginning of 2016, but there was something missing that drove us to a winding road that ended in an even stronger situation: the support of the University of Valencia’s Publication Service (UVPS). The missing thing in the first issue was the DOI (Digital Object Identifier). All the online journals have a DOI to identify the papers and allow a permanent link to them. Each DOI is unique for each paper. We look for a DOI provider in our environment and found the UVPS to offer DOIs for free to their teachers. As I am one of them, I went to ask for…

Service (business)Impact factorbusiness.industrymedia_common.quotation_subjectLibrary sciencePatienceUploadDomain namePolitical scienceDigital Object IdentifierbusinessPublicationmedia_commonWeb siteJournal of Ozone Therapy
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct

Bill2d - a software package for classical two-dimensional Hamiltonian systems

2015

Abstract We present Bill2d , a modern and efficient C++ package for classical simulations of two-dimensional Hamiltonian systems. Bill2d can be used for various billiard and diffusion problems with one or more charged particles with interactions, different external potentials, an external magnetic field, periodic and open boundaries, etc. The software package can also calculate many key quantities in complex systems such as Poincare sections, survival probabilities, and diffusion coefficients. While aiming at a large class of applicable systems, the code also strives for ease-of-use, efficiency, and modularity for the implementation of additional features. The package comes along with a use…

Source codeTheoretical computer scienceComputer sciencechaosmedia_common.quotation_subjectclassical mechanicsFOS: Physical sciencesGeneral Physics and Astronomy01 natural sciences010305 fluids & plasmasHamiltonian systemComputational sciencenumerical simulationsnonlinear dynamicsREADME0103 physical sciences010306 general physicsmedia_commonta114Application programming interfacebusiness.industrydiffusionByteComputational Physics (physics.comp-ph)Modular designmolecular dynamicsIdentifierHardware and ArchitecturetransportbilliardsbusinessPhysics - Computational PhysicsTest data
researchProduct

Open-source software tools for measuring resources consumption and DASH metrics

2020

When designing and deploying multimedia systems, it is essential to accurately know about the necessary requirements and the Quality of Service (QoS) offered to the customers. This paper presents two open-source software tools that contribute to these key needs. The first tool is able to measure and register resources consumption metrics for any Windows program (i.e. process id), like the CPU, GPU and RAM usage. Unlike the Task Manager, which requires manual visual inspection for just a subset of these metrics, the developed tool runs on top of the Powershell to periodically measure these metrics, calculate statistics, and register them in log files. The second tool is able to measure QoS m…

Traffic analysisComputer sciencebusiness.industryQuality of service0211 other engineering and technologiesByte02 engineering and technologycomputer.software_genreSoftwareDash0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingProcess identifierCentral processing unitTask managerbusinesscomputer021106 design practice & management
researchProduct