Search results for "Identifier"
showing 10 items of 24 documents
On Constructing Persistent Identifiers with Persistent Resolution Targets
2016
Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintena…
In-depth evaluation of software tools for data-independent acquisition based label-free quantification.
2015
Label-free quantification (LFQ) based on data-independent acquisition workflows currently experiences increasing popularity. Several software tools have been recently published or are commercially available. The present study focuses on the evaluation of three different software packages (Progenesis, synapter, and ISOQuant) supporting ion mobility enhanced data-independent acquisition data. In order to benchmark the LFQ performance of the different tools, we generated two hybrid proteome samples of defined quantitative composition containing tryptically digested proteomes of three different species (mouse, yeast, Escherichia coli). This model dataset simulates complex biological samples con…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…
An optimal code for patient identifiers.
2004
How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.
Dataset of a globally relevant stock of soil nitrogen in the Yedoma permafrost domain
2022
This dataset merges nitrogen data from the Yedoma domain. It includes numerous fieldwork campaigns, which take place since 1998. In total 467 samples from the active layer (seasonally thawed layer), 175 samples from perennially frozen Holocene cover deposits, 479 samples from thermokarst deposits in drained thermokarst, 175 in-situ thawed, diagenetically (anaerobic microbial decomposition possible during unfrozen phase) altered Yedoma deposits (called Taberite), and 917 samples from frozen Yedoma deposits are included. Moreover it includes a NH4+ and NO3- quantification basing on of 658 samples, including 378 data points for NH4+ (active layer, 93; Holocene cover, 108; thermokarst sediment,…
L'administration conjointe du dossier patient: une responsabilité partagée entre le patient et le praticien
2011
National audience; The main problem faced by patients, health practitioners and the authorities, is namely the gathering and updating of administrative and medical data in order to accurately reconstitute a patient's medical history. Although solutions to accelerate and to ease this gathering are being implemented at the national level in several European countries, as unique health identifier in France, information still have to be validated before use. Through this article, we propose a mixed management of patients' data, split between the patient regarding administrative information and the Medical Practitioner (MP) regarding medical information. This method is based on two processes. Th…
Editorial issue 2
2018
It has been a very long trip since I wrote my last editorial. The first issue of the Journal received a strong welcome from all over the world in the beginning of 2016, but there was something missing that drove us to a winding road that ended in an even stronger situation: the support of the University of Valencia’s Publication Service (UVPS). The missing thing in the first issue was the DOI (Digital Object Identifier). All the online journals have a DOI to identify the papers and allow a permanent link to them. Each DOI is unique for each paper. We look for a DOI provider in our environment and found the UVPS to offer DOIs for free to their teachers. As I am one of them, I went to ask for…
Fingerprint Traits and RSA Algorithm Fusion Technique
2012
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…
Bill2d - a software package for classical two-dimensional Hamiltonian systems
2015
Abstract We present Bill2d , a modern and efficient C++ package for classical simulations of two-dimensional Hamiltonian systems. Bill2d can be used for various billiard and diffusion problems with one or more charged particles with interactions, different external potentials, an external magnetic field, periodic and open boundaries, etc. The software package can also calculate many key quantities in complex systems such as Poincare sections, survival probabilities, and diffusion coefficients. While aiming at a large class of applicable systems, the code also strives for ease-of-use, efficiency, and modularity for the implementation of additional features. The package comes along with a use…
Open-source software tools for measuring resources consumption and DASH metrics
2020
When designing and deploying multimedia systems, it is essential to accurately know about the necessary requirements and the Quality of Service (QoS) offered to the customers. This paper presents two open-source software tools that contribute to these key needs. The first tool is able to measure and register resources consumption metrics for any Windows program (i.e. process id), like the CPU, GPU and RAM usage. Unlike the Task Manager, which requires manual visual inspection for just a subset of these metrics, the developed tool runs on top of the Powershell to periodically measure these metrics, calculate statistics, and register them in log files. The second tool is able to measure QoS m…