This presentation was held at the Japan Open Science Summit (DMP session) on 28 May 2019, Tokyo. The goal of the presentation is to show how machine-actionability can improve the quality of DMPs and enable a whole range of new use cases.
Parts of the work being presented were created during the National Institute of Informatics (NII) International Internship Program at Kitamoto Lab.
Software defined networks (SDNs) is one of the most emerging field and will cause
revolution in the Information Technology (IT) industry. The flexibility in the SDNs
make it most attractive technology to adopt in all type of networks. This flexibility in
the network made the SDNs more prone to the security issues so it is important to cater
these issues in start from the SDN design up-to the deployment and operations. This
Paper proposed a DNS based approach to prevent SDNs from botnet by applying one
million web database concept without reading packet payload. To do any activity, Bot
need to communicate with CnC and requires DNS to IP resolution. For any request
having destination port 53 (DNS) will be checked. The protocol will get all matching
traffic and will send it to 1Mdb. If URL Exists in 1Mdb then do not respond otherwise
send reply with remove flow and block flow to the controller. This approach will use
Machine learning algorithms to classify the traffic as BOT or normal traffic. Naive
Bayes Classifier is used to classify the data using python programming language. The
selection of dataset is very important task for machine learning based botnet detection
and prevention techniques. The poor selection of dataset possibly lead to biased results.
The real world and publically available dataset is a good choice for evaluation of botnet
detection techniques. To meet these criteria, publicly available CTU-43 botnet dataset
has been used. This dataset provide packet dumps (pcap files) of seven real botnets
(Neris, Rbot, Virut, Murlo, Menti, Sogou, and NSIS). We will use these files to generate
botnet traffic for evaluation and test our model. To generate normal traffic, we selected
ISOT dataset. This dataset provides a single pcap file having normal traffic and traffic
for weladec and zeus botnet.
Software defined networks (SDNs) is one of the most emerging field and will cause
revolution in the Information Technology (IT) industry. The flexibility in the SDNs
make it most attractive technology to adopt in all type of networks. This flexibility in
the network made the SDNs more prone to the security issues so it is important to cater
these issues in start from the SDN design up-to the deployment and operations. This
Paper proposed a DNS based approach to prevent SDNs from botnet by applying one
million web database concept without reading packet payload. To do any activity, Bot
need to communicate with CnC and requires DNS to IP resolution. For any request
having destination port 53 (DNS) will be checked. The protocol will get all matching
traffic and will send it to 1Mdb. If URL Exists in 1Mdb then do not respond otherwise
send reply with remove flow and block flow to the controller. This approach will use
Machine learning algorithms to classify the traffic as BOT or normal traffic. Naive
Bayes Classifier is used to classify the data using python programming language. The
selection of dataset is very important task for machine learning based botnet detection
and prevention techniques. The poor selection of dataset possibly lead to biased results.
The real world and publically available dataset is a good choice for evaluation of botnet
detection techniques. To meet these criteria, publicly available CTU-43 botnet dataset
has been used. This dataset provide packet dumps (pcap files) of seven real botnets
(Neris, Rbot, Virut, Murlo, Menti, Sogou, and NSIS). We will use these files to generate
botnet traffic for evaluation and test our model. To generate normal traffic, we selected
ISOT dataset. This dataset provides a single pcap file having normal traffic and traffic
for weladec and zeus botnet.
Big Data Social Network Analysis (BDSNA) is the focal computational and graphical
study of powerful techniques that can be used to identify clusters, patterns, hidden
structures, generate business intelligence, in social relationships within social networks
in terms of network theory. Social Network Analysis (SNA) has a diversified set of
applications and research areas such as Health care, Travel and Tourism, Defence and
Security, Internet of Things (IoT) etc. . . With the boom of the internet, Web 2.0
and handheld devices, there is an explosive growth in size, complexity and variety in
unstructured data, thus the analysis and information extraction is of great value and
adaptation of Big Data concept to SNA is vital.
This literature survey aims to investigate the usefulness of SNA in the “Big Data
(BD)” arena. This survey report reviews major research studies that have proposed
business strategies, BD approaches to generate predictive models by gratifying contemporary
challenges that have arises from SNA.
"Data management plans 2.0: Helping you manage your data" - webinar delivered for DataONE monthly series. Main topics include machine-actionable data management plans and the newly launched DMPTool v3.
https://www.dataone.org/webinars/data-management-plans-20-helping-you-manage-your-data
Progress OpenEdge database administration guide and referenceVinh Nguyen
Progress OpenEdge database administration guide and reference
Contact us anytime: Think Next - QAD Partner in Vietnam
- Website: http://www.thinknext.vn
- Email: contact [at] thinknext.vn
M.Sc Dissertation: Simple Digital LibrariesLighton Phiri
My M.Sc. dissertation... it took me a total of 2 years and 61 days to finish--I LOVE TO COUNT! There are a few publications [1] based on this work---there is even a book chapter on the way.
You will notice from the structure of the manuscript that I used Information Mapping [2] principles. The content on the other hand is structured chronologically---based on the sequence of activities I undertook during my research.
I typeset the entire manuscript using LaTeX [3] and I am VERY proud of myself for doing that :p You would have to see the TeX source files [4] to see all corresponding packages I used. Block diagrams were rendered using PSTricks [5] and plots using R ggplot2 [6] package.
[1] http://scholar.google.co.za/citations?user=UIb4aEsAAAAJ&hl=en
[2] http://en.wikipedia.org/wiki/Information_mapping
[3] http://en.wikipedia.org/wiki/LaTeX
[4] https://github.com/lightonphiri/open-msc-thesis
[5] http://en.wikipedia.org/wiki/PSTricks
[6] http://en.wikipedia.org/wiki/Ggplot2
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
More Related Content
Similar to Machine-actionable Data Management Plans
Big Data Social Network Analysis (BDSNA) is the focal computational and graphical
study of powerful techniques that can be used to identify clusters, patterns, hidden
structures, generate business intelligence, in social relationships within social networks
in terms of network theory. Social Network Analysis (SNA) has a diversified set of
applications and research areas such as Health care, Travel and Tourism, Defence and
Security, Internet of Things (IoT) etc. . . With the boom of the internet, Web 2.0
and handheld devices, there is an explosive growth in size, complexity and variety in
unstructured data, thus the analysis and information extraction is of great value and
adaptation of Big Data concept to SNA is vital.
This literature survey aims to investigate the usefulness of SNA in the “Big Data
(BD)” arena. This survey report reviews major research studies that have proposed
business strategies, BD approaches to generate predictive models by gratifying contemporary
challenges that have arises from SNA.
"Data management plans 2.0: Helping you manage your data" - webinar delivered for DataONE monthly series. Main topics include machine-actionable data management plans and the newly launched DMPTool v3.
https://www.dataone.org/webinars/data-management-plans-20-helping-you-manage-your-data
Progress OpenEdge database administration guide and referenceVinh Nguyen
Progress OpenEdge database administration guide and reference
Contact us anytime: Think Next - QAD Partner in Vietnam
- Website: http://www.thinknext.vn
- Email: contact [at] thinknext.vn
M.Sc Dissertation: Simple Digital LibrariesLighton Phiri
My M.Sc. dissertation... it took me a total of 2 years and 61 days to finish--I LOVE TO COUNT! There are a few publications [1] based on this work---there is even a book chapter on the way.
You will notice from the structure of the manuscript that I used Information Mapping [2] principles. The content on the other hand is structured chronologically---based on the sequence of activities I undertook during my research.
I typeset the entire manuscript using LaTeX [3] and I am VERY proud of myself for doing that :p You would have to see the TeX source files [4] to see all corresponding packages I used. Block diagrams were rendered using PSTricks [5] and plots using R ggplot2 [6] package.
[1] http://scholar.google.co.za/citations?user=UIb4aEsAAAAJ&hl=en
[2] http://en.wikipedia.org/wiki/Information_mapping
[3] http://en.wikipedia.org/wiki/LaTeX
[4] https://github.com/lightonphiri/open-msc-thesis
[5] http://en.wikipedia.org/wiki/PSTricks
[6] http://en.wikipedia.org/wiki/Ggplot2
Similar to Machine-actionable Data Management Plans (20)
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Nutraceutical market, scope and growth: Herbal drug technologyLokesh Patil
As consumer awareness of health and wellness rises, the nutraceutical market—which includes goods like functional meals, drinks, and dietary supplements that provide health advantages beyond basic nutrition—is growing significantly. As healthcare expenses rise, the population ages, and people want natural and preventative health solutions more and more, this industry is increasing quickly. Further driving market expansion are product formulation innovations and the use of cutting-edge technology for customized nutrition. With its worldwide reach, the nutraceutical industry is expected to keep growing and provide significant chances for research and investment in a number of categories, including vitamins, minerals, probiotics, and herbal supplements.
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
Multi-source connectivity as the driver of solar wind variability in the heli...Sérgio Sacani
The ambient solar wind that flls the heliosphere originates from multiple
sources in the solar corona and is highly structured. It is often described
as high-speed, relatively homogeneous, plasma streams from coronal
holes and slow-speed, highly variable, streams whose source regions are
under debate. A key goal of ESA/NASA’s Solar Orbiter mission is to identify
solar wind sources and understand what drives the complexity seen in the
heliosphere. By combining magnetic feld modelling and spectroscopic
techniques with high-resolution observations and measurements, we show
that the solar wind variability detected in situ by Solar Orbiter in March
2022 is driven by spatio-temporal changes in the magnetic connectivity to
multiple sources in the solar atmosphere. The magnetic feld footpoints
connected to the spacecraft moved from the boundaries of a coronal hole
to one active region (12961) and then across to another region (12957). This
is refected in the in situ measurements, which show the transition from fast
to highly Alfvénic then to slow solar wind that is disrupted by the arrival of
a coronal mass ejection. Our results describe solar wind variability at 0.5 au
but are applicable to near-Earth observatories.
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
The increased availability of biomedical data, particularly in the public domain, offers the opportunity to better understand human health and to develop effective therapeutics for a wide range of unmet medical needs. However, data scientists remain stymied by the fact that data remain hard to find and to productively reuse because data and their metadata i) are wholly inaccessible, ii) are in non-standard or incompatible representations, iii) do not conform to community standards, and iv) have unclear or highly restricted terms and conditions that preclude legitimate reuse. These limitations require a rethink on data can be made machine and AI-ready - the key motivation behind the FAIR Guiding Principles. Concurrently, while recent efforts have explored the use of deep learning to fuse disparate data into predictive models for a wide range of biomedical applications, these models often fail even when the correct answer is already known, and fail to explain individual predictions in terms that data scientists can appreciate. These limitations suggest that new methods to produce practical artificial intelligence are still needed.
In this talk, I will discuss our work in (1) building an integrative knowledge infrastructure to prepare FAIR and "AI-ready" data and services along with (2) neurosymbolic AI methods to improve the quality of predictions and to generate plausible explanations. Attention is given to standards, platforms, and methods to wrangle knowledge into simple, but effective semantic and latent representations, and to make these available into standards-compliant and discoverable interfaces that can be used in model building, validation, and explanation. Our work, and those of others in the field, creates a baseline for building trustworthy and easy to deploy AI models in biomedicine.
Bio
Dr. Michel Dumontier is the Distinguished Professor of Data Science at Maastricht University, founder and executive director of the Institute of Data Science, and co-founder of the FAIR (Findable, Accessible, Interoperable and Reusable) data principles. His research explores socio-technological approaches for responsible discovery science, which includes collaborative multi-modal knowledge graphs, privacy-preserving distributed data mining, and AI methods for drug discovery and personalized medicine. His work is supported through the Dutch National Research Agenda, the Netherlands Organisation for Scientific Research, Horizon Europe, the European Open Science Cloud, the US National Institutes of Health, and a Marie-Curie Innovative Training Network. He is the editor-in-chief for the journal Data Science and is internationally recognized for his contributions in bioinformatics, biomedical informatics, and semantic technologies including ontologies and linked data.
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Machine-actionable Data Management Plans
JOSS, Tokyo 28 May 2019
Tomasz Miksa | SBA Research & TU Wien Simon Oblasser | TU Wien
tmiksa@sba-research.org simon.oblasser@tuwien.ac.at
2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
US NSF Dear Colleague Letter from May 20, 2019
https://www.nsf.gov/pubs/2019/nsf19069/nsf19069.jsp
“… open science can be further advanced by two effective data
practices: use of persistent IDs for research data, and use of DMP
tools that create machine-readable DMPs.”
3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
What does machine-actionable DMP mean?
§ information in a DMP is structured in a way such that
machines can act upon it
- machine-readable data format, reuse of existing standards,
controlled vocabulary, PIDs, …
Source: Tomasz Miksa, Peter Neish, Paul Walk, & Andreas Rauber. (2018). Defining
requirements for machine-actionable Data Management Plans (Version preprint). Zenodo.
http://doi.org/10.5281/zenodo.1266211
4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4
§ services which support machine-actionable DMPs can
- provide information for a DMP
- consume information from a DMP
§ DMP becomes living document
§ allows to automate data management tasks
- based on the information contained in a DMP
- trigger actions in systems
§ facilitate DMP validation and verification
What does machine-actionable DMP mean?
5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
What is required?
§ well-defined RDM workflows
- who? what? when? how?
§ data management infrastructure that
supports machine-actionable DMPs
- systems and services implementing workflows
§ common data model for DMPs
- to exchange information
- allows the interoperability between systems
6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
Why machine-actionable DMPs?
§ conventional DMPs have shortcomings
- manually completed
- not updated
- vague
§ machine-actionable DMPs can
- automate data management tasks
- improve the information flow between systems
- improve the quality of information contained
- support researchers in data management
and sharing throughout a project
COLLECTING
PROCESSING
ANALYSING
PUBLISHING
SHARING
PRESERVING
RE-USING
RESEARCH
DATA
LIFE CYCLE
7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
White paper on machine-actionable DMPs
1. Interoperability with other research systems
2. Leveraging persistent identifiers (PIDs)
3. Institutional use cases
4. Repository use cases
5. Data discovery and reuse
6. Evaluation and monitoring
7. Disciplinary tailoring and
recommender systems
8. Publishing DMPs Simms S, Jones S, Mietchen D, Miksa T (2017) Machine-actionable data
management plans (maDMPs). Research Ideas and Outcomes 3: e13086.
https://doi.org/10.3897/rio.3.e13086
8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Use cases and stakeholder benefits
• easier and faster generation of DMP
• semi-automation
• better resource planning
• support researcher
• statistics about DM
• monitor ongoing DM
• minimize effort for ingest
• support researcher
• integration of research support
• view DMP and provide input
• get standard quality of DMP
• monitor compliance with policy
machine-actionable
9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9
Automated data management workflow
Source: Miksa T, Simms S, Mietchen D, Jones S (2019) Ten principles for
machine-actionable data management plans. PLoS Comput Biol 15(3):
e1006750. https://doi.org/10.1371/journal.pcbi.1006750
Source: Tomasz Miksa, Peter Neish, Paul Walk, & Andreas Rauber.
(2018). Defining requirements for machine-actionable Data Management
Plans (Version preprint). Zenodo. http://doi.org/10.5281/zenodo.1266211
19. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19
Who is working on machine-actionable DMPs?
§ RDA Active DMP IG
§ RDA DMP Common Standards WG
- Data model
§ RDA Exposing DMPs WG
§ FORCE11 FAIR DMP WG
§ ANDS DMP IG
§ …
Overview on DMP tools with potential for machine-
actionability: https://activedmps.org/
20. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20
RDA DMP Common Standard
§ machine-actionable model for DMP
§ allows the exchange of information between systems
§ independent of specific funder template
- but compatible
https://github.com/RDA-DMP-Common/RDA-DMP-Common-Standard
21. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21
Summary
§ machine-actionable DMPs can
- automate data management tasks
- improve the information flow between systems
- improve the quality of information contained
- support researchers in data management
and sharing throughout a project
§ not a single tool
§ system integration is needed
22. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
22
Thank you
How to stay in touch:
§ sign up to the RDA group
- https://www.rd-alliance.org/groups/dmp-common-standards-wg
§ visit GitHub repositories
- https://github.com/RDA-DMP-Common/RDA-DMP-Common-
Standard
- https://oblassers.github.io/dmap-mockups/
§ contact us
- simon.oblasser@tuwien.ac.at
- tmiksa@sba-research.org
23. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23
References and further readings
Simms, S., Jones, S., Mietchen, D., Miksa, T.: Machine-actionable data management plans (maDMPs). Research
Ideas and Outcomes 3, e13086 (2017), https://doi.org/10.3897/rio.3.e13086
Miksa, T., Neish, P., Walk, P., Rauber, A.: Defining requirements for machine-actionable Data Management Plans
(preprint) (Jun 2018), https://doi.org/10. 5281/zenodo.1266211
Miksa T, Simms S, Mietchen D, Jones S (2019) Ten principles for machine-actionable data management plans. PLoS
Comput Biol 15(3): e1006750. https://doi.org/10.1371/journal.pcbi.1006750
Tomasz Miksa, João Cardoso, & José Borbinha. (2018). Framing the scope of the common data model for machine-
actionable Data Management Plans. Zenodo. http://doi.org/10.5281/zenodo.2161855
Oblasser, S., Miksa, T.: BPMN processes for machine-actionable DMPs (2018),
https://doi.org/10.5281/zenodo.2607555
Miksa, T., Neish, P., Walk, P.: RDA DMP Common Standards WG (12th RDA plenary slides) (Nov 2018), slides
Miksa, T., Neish, P., Walk, P.: RDA DMP Common Standards WG (13th RDA plenary slides) (April 2019), slides
This presentation is licensed under the Creative Commons
Attribution 4.0 International License (CCBY 4.0).