The document proposes a provenance model for quantified self data based on the W3C PROV standard. It describes motivations like understanding how QS data is produced, processed and accessed. The PROV standard concepts of entities, activities and agents are used to model common QS workflows like input, export, request, aggregate and visualize. Examples demonstrate exporting data from an app and visualizing with a script. The model could be used to standardize provenance for developers and allow traceability, reproducibility and analytics of QS data.
Valtiokonttori
Yhteentoimivuus.fi ja julkisen hallinnon kokonaisarkkitehtuuri
Neuvotteleva virkamies Jari Kallela, valtiovarainministeriö
Valtio Expo 20.5.2014
Valtiokonttori
Yhteentoimivuus.fi ja julkisen hallinnon kokonaisarkkitehtuuri
Neuvotteleva virkamies Jari Kallela, valtiovarainministeriö
Valtio Expo 20.5.2014
Provenance as a building block for an open science infrastructureAndreas Schreiber
International Symposium on Grids & Clouds 2018 (ISGC 2018)
Taipei, Taiwan
March 23, 2018
http://indico4.twgrid.org/indico/event/4/session/17/contribution/46
This slide was used in ISO/IEC JTC1 SC36 Plenary Meeting in June 22, 2015.
Title of this slide is 'Proof of Concept for Learning Analytics Interoperability and subtitle is 'Reference Model based on open source SW'.
SCA2013 Presentation: A Web-Based Content Analysis ToolXin Chen
This is a presentation at SCA2013, Karlsruhe, Germany. This shows the design (architecture, database, sketch, wireframe, prototype) of a simple web-based tool that supports asynchronous collaboration among researchers when conducting content analysis on qualitative social media data.
When Data Visualizations and Data Imports Just Don’t WorkJim Kaplan CIA CFE
When Data Visualizations and Data Imports Just Don’t Work – Importing data is a dirty job as can painting user final pictures with that data. This webinar will explore the dirty little secrets that ensure data is imported completely and accurately, as well as, painting scenarios when a visualization may not be the best approach to meeting an audit objective. Specific learning objectives include:
o Walk through case studies of “dirty” data and how to improve then using improved data requests and cleansing tools.
o Watch case study examples of top tests to validate data tables to ensure data quality.
o Discover a host of baseline tests and other baseline statistics to validate, understand and possibly extract key trends for review.
o Understand visualization and dashboard types along with their associated analytical strengths from an audit perspective.
o Identify situations where statistics may be more effective audit extractors than relying on the human eye to spot notable events.
Provenance as a building block for an open science infrastructureAndreas Schreiber
International Symposium on Grids & Clouds 2018 (ISGC 2018)
Taipei, Taiwan
March 23, 2018
http://indico4.twgrid.org/indico/event/4/session/17/contribution/46
This slide was used in ISO/IEC JTC1 SC36 Plenary Meeting in June 22, 2015.
Title of this slide is 'Proof of Concept for Learning Analytics Interoperability and subtitle is 'Reference Model based on open source SW'.
SCA2013 Presentation: A Web-Based Content Analysis ToolXin Chen
This is a presentation at SCA2013, Karlsruhe, Germany. This shows the design (architecture, database, sketch, wireframe, prototype) of a simple web-based tool that supports asynchronous collaboration among researchers when conducting content analysis on qualitative social media data.
When Data Visualizations and Data Imports Just Don’t WorkJim Kaplan CIA CFE
When Data Visualizations and Data Imports Just Don’t Work – Importing data is a dirty job as can painting user final pictures with that data. This webinar will explore the dirty little secrets that ensure data is imported completely and accurately, as well as, painting scenarios when a visualization may not be the best approach to meeting an audit objective. Specific learning objectives include:
o Walk through case studies of “dirty” data and how to improve then using improved data requests and cleansing tools.
o Watch case study examples of top tests to validate data tables to ensure data quality.
o Discover a host of baseline tests and other baseline statistics to validate, understand and possibly extract key trends for review.
o Understand visualization and dashboard types along with their associated analytical strengths from an audit perspective.
o Identify situations where statistics may be more effective audit extractors than relying on the human eye to spot notable events.
How to make your data count webinar, 26 Nov 2018ARDC
Slides from the 26 Nov Make your data count webinar. The research community has long grappled with the problem of assessing and tracking the results of scholarship. Research data is no exception. The Make Data Count (MDC) project (https://makedatacount.org/), funded by the Sloan Foundation, has delivered a data usage metric standard (Code of Practice) and a workflow for the retrieval and display of standardised usage and citation metrics in your repository interface.
Listen to this webinar to learn more about the Make Data Count project and the 5 steps you can take to make the data in your repository count. Hear from MDC project team members who have already implemented MDC in the dash (https://dash.ucop.edu) and DataOne (https://search.dataone.org/data) repositories. Learn from their experience, see the results.
Our international speaker line-up includes Daniella Lowenberg (California Digital Library) and Patricia Cruse (DataCite).
Recording available: https://youtu.be/Lkysz0Mc7fo
The presentation was given at the SOCM'16 workshop at the WWW16 conference. It corresponds to the research study titled "Observlets: Empowering Analytical Observations on Web Observatory".
API Sandbox: Empowering Developer Experience (DX)Faisal Banaeamah
It explores different architecture design patterns and options to provide #apisandbox within developer portal and empower developer experience. It also shows its relationship with API-First.
apidays LIVE Jakarta - API Sandbox: empowering Developer Experience (DX) by F...apidays
apidays LIVE Jakarta 2021 - Accelerating Digitisation
February 24, 2021
API Sandbox: empowering Developer Experience (DX)
Faisal Banaeamah, Chief Architect at Solutions by STC
Blackboard Learn Deployment: A Detailed Update of Managed Hosting and SaaS De...Blackboard APAC
Blackboard has deployed cloud solutions for well over a decade and is very excited to launch our new SaaS offering at the Teaching and Learning conference. The session will explore Blackboard’s continued commitment to managed hosting, partnership with IBM/AWS and next generation SaaS offerings that offer institutions unique control over their innovation journey.
Provenance-based Security Audits and its Application to COVID-19 Contact Trac...Andreas Schreiber
https://iitdbgroup.github.io/ProvenanceWeek2021/virtual.html
Software repositories contain information about source code, software development processes, and team interactions. We combine the provenance of development processes with code security analysis results to provide fast feedback on the software’s design and security issues. Results from queries of the provenance graph drives the security analysis, which are conducted on certain events—such as commits or pull requests by external contributors. We evaluate our method on Open Source projects that are developed under time pressure and use Germany’s COVID-19 contact tracing app ‘Corona-Warn-App’ as a case study.
https://link.springer.com/chapter/10.1007/978-3-030-80960-7_6
Tracking after Stroke: Doctors, Dogs and All The RestAndreas Schreiber
After having a stroke, I started tracking my vitals signs and weight. I'll share how my data helped me to understand my personal habits and helped my doctors to improve my treatments.
(Show & Tell Talk, 2015 Quantified Europe Conference, Amsterdam)
Space Debris are defunct objects in space, including old space vehicles or fragments from collisions. Space debris can cause great damage to functional space ships and satellites. Thus detection of space debris and prediction of their orbital paths are essential. The talk shows a Python based infrastructure for storing space debris data from sensors and high-throughput processing of that data.
PyData Seattle (26. Juli 2015)
http://seattle.pydata.org/schedule/presentation/35/
Wissenschaft im Rathaus, Köln (02.03.2015)
"Gesundheitsmanagement aus der Ferne ist heute nicht mehr ungewöhnlich. Inzwischen kommunizieren Ärzte mit Patienten, mit Ärzten und mit Betreuungseinrichtungen – ohne dass sie sich von Angesicht zu Angesicht gegenüberstehen. Befunde und Bilddaten werden drahtlos übermittelt. Wir sprechen von Telemedizin. Mehr und mehr machen die Möglichkeiten des Überwachens bestimmter eigener Körperfunktionen (Self-Tracking) von sich reden.
Andreas Schreiber zeigt, welche „Self-Tracking-Systeme“ bereits genutzt werden und an welchen neuen Entwicklungen derzeit gearbeitet wird."
(http://www.koelner-wissenschaftsrunde.de/wissenschaft-erleben/aktuell-koelner-themenjahr-wissenschaft-erleben/2015-gesellschaft-im-wandel/wir-vortrag-4/)
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
A brief information about the SCOP protein database used in bioinformatics.
The Structural Classification of Proteins (SCOP) database is a comprehensive and authoritative resource for the structural and evolutionary relationships of proteins. It provides a detailed and curated classification of protein structures, grouping them into families, superfamilies, and folds based on their structural and sequence similarities.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
1. A Provenance Model for Quantified Self Data
Andreas Schreiber
Department for Intelligent and Distributed Systems
German Aerospace Center (DLR), Cologne/Berlin
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 1
2. Quantified Self (n = 1) Medical Trials (n > 1)
Motivation
Use Cases
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 2
4. Motivation
Understand, how data has been produced, processed, stored, accessed, ...
It started at the Breakout Session on Mapping Data Access (2014 QS Europe Conference, Amsterdam)
https://forum.quantifiedself.com/t/breakout-mapping-data-access/995
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 4
5. Motivation
(Provenance) Questions
Entity-focused
• What data about the user were created during the activity X?
• What data about the user were automatically generated?
• What data about the user were derived from manual input?
Activity-focused
• Which activities support visualization of the users data?
• In which activities can the user input data?
• What processes are communicating data?
Agent-focused
• What parties were involved in generating data X?
• What parties got access on data X?
• Can other parties see user’s data X?
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 5
Data
Apps and Services
Access and Privacy
6. Provenance
Definition
Provenance is information about entities, activities, and people involved
in producing a piece of data or thing, which can be used to form
assessments about its quality, reliability or trustworthiness.
PROV W3C Working Group
https://www.w3.org/TR/prov-overview
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 6
7. PROV
W3C Specification for Provenance
W3C Provenance Working Group: https://www.w3.org/2011/prov
PROV
• The goal of PROV is to enable the wide publication and interchange of provenance on the Web and
other information systems
• PROV enables one to represent and interchange provenance information using widely available formats
such as RDF and XML
PROV Family of Documents
• PROV-O: PROV Ontology
• PROV-DM: PROV Data Model
• PROV-N: PROV Notation
• PROV-CONSTRAINTS: PROV Constraints
• PROV-AQ: Accessing and Querying
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 7
8. Overview of PROV
Key Concepts
Entities
• Physical, digital, conceptual, or other kinds of
things
• For example, documents, web sites, graphics,
or data sets
Activities
• Activities generate new entities or
make use of existing entities
• Activities could be actions or processes
Agents
• Agents takes a role in an activity and
have the responsibility for the activity
• For example, persons, pieces of software, or
organizations
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 8
Activity
Entity
Agent
wasGeneratedBy
used
wasDerivedFrom
wasAttributedTo
wasAssociatedWith
9. PROV Example
Baking a Cake
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 9
100 g
butter
bake
2
eggs
100 g
sugar
100 g
flour
cake
used
used
used
used
wasGeneratedBy
wasDerivedFrom
10. UserData
Export
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
UserData
Input
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class wasGeneratedBy
wasDerivedFrom
wasAssociatedWith
name: string
type: class
wasAttributedTo
timestamp: float
PROV Model for Quantified Self
Overview
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 10
UserData
Request
Agent
UserData
timestamp: float
name: string
type: class
name: string
type: class
wasGeneratedBy
wasDerivedFrom
wasAssociatedWith
name: string
type: class
used
timestamp: float
API
Configuration
name: string
type: class
hadPlan
Software
Agent
name: string
type: class
wasAttributedTo
UserData
Aggregate
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
Agent
name: string
type: class
wasAttributedTo
UserData
Visualize
Agent
Graphic
timestamp: float
used
name: string
type: class
name: string
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
Five sub models (templates) for basic activities
• Input
• Export
• Request
• Aggregate
• Visualize
The activities generate or change data that is
associated or attributed to Agents
• Users
• Software
11. PROV Model for Quantified Self
Input
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 11
UserData
Input
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class wasGeneratedBy
wasDerivedFrom
wasAssociatedWith
name: string
type: class
wasAttributedTo
timestamp: float
Getting (raw) data from the user
• Manual input
• Via sensors
Usually every QS workflow needs such a
functionality to record data from the user
12. PROV Model for Quantified Self
Export
Exports data to other formats
• Transfer to other systems
• Readable by people
UserData
Export
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 12
13. PROV Model for Quantified Self
Request
Getting or storing data
• Web Services
• Cloud Storage
Access via APIs
• Vendor APIs (Fitbit, Withings,
Microsoft etc.)
UserData
Request
Agent
UserData
timestamp: float
name: string
type: class
name: string
type: class
wasGeneratedBy
wasDerivedFrom
wasAssociatedWith
name: string
type: class
used
timestamp: float
API
Configuration
name: string
type: class
hadPlan
Software
Agent
name: string
type: class
wasAttributedTo
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 13
14. PROV Model for Quantified Self
Aggregate
Combine or analyze data
• Aggregate different data sets
• Statistical analysis
• Extract knowledge UserData
Aggregate
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
Agent
name: string
type: class
wasAttributedTo
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 14
15. PROV Model for Quantified Self
Visualize
Visualize data
• Time series plots
• Representation of statistical information
• Historical information
UserData
Visualize
Agent
Graphic
timestamp: float
used
name: string
type: class
name: string
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 15
16. Example
Weight Tracking
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 16
17. Example
Weight Tracking
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 17
18. Weight Tracking Example
Exporting a CSV File from an Android App
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 18
UserData
Export
Agent
UserData
timestamp: float
used
name: string
type: class
name: string
type: class
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
https://play.google.com/store/apps/details?id=de.medando.weightcompanion
19. Weight Tracking Example
Visualizing Data with a Python Script
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 19
UserData
Visualize
Agent
Graphic
timestamp: float
used
name: string
type: class
name: string
wasGeneratedBy
timestamp: float
wasDerivedFrom
wasAssociatedWith
name: string
type: class
20. > HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 20
Weight Tracking Example
Merged Provenance
Date,Time,Weight,Waist,Hip,Device,Comment
"Jun 13, 2012",14:00,83.7,,,Withings,
"Jun 13, 2012",14:08,79.7,,,Withings,
"Jun 15, 2012",21:59,82.7,,,Withings,
"Jun 15, 2012",22:04,82.7,,,Withings,
"Jun 24, 2012",18:32,86.1,,,Withings,
"Jun 26, 2012",07:42,80.8,,,Withings,
"Jun 27, 2012",07:40,81.1,,,Withings,
"Jun 29, 2012",07:34,79.4,,,Withings,
"Jun 30, 2012",22:12,81.7,,,Withings,
"Jul 1, 2012",11:21,80.6,,,Withings,
"Jul 7, 2012",17:04,80.7,,,Withings,
"Jul 10, 2012",07:46,81.8,,,Withings,
"Jul 11, 2012",07:32,78.6,,,Withings,
"Jul 12, 2012",07:26,79.4,,,Withings,
21. Summary Current and Future Work
Conclusions
• We collected QS workflows at QS Meetups and QS
Conferences
• We used the standardized data model PROV for
modeling the provenance of QS and medical
workflows
• We evaluated the feasibility with selected QS
workflows
Intentionally not mentioned in this talk
• Storing provenance
• Querying provenance
Provenance Templates and Standardization
• PROV templates for developer of tools and services
• Guidelines and APIs for developers
• Writing a specification
Provenance Analytics and Visualization
• Traceability of data
• Reproducibility of studies
• Visualization
> HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 21
22. > HCI International 2016 > A. Schreiber • A Provenance Model for Quantified Self Data > 21.07.2016DLR.de • Chart 22
Thank You!
Questions?
Andreas.Schreiber@dlr.de
www.DLR.de/sc | @onyame