Registry Repository of Representation Information

Slides:



Advertisements
Similar presentations
1 STFC testbed. Testbed Aims Demonstrate complete solutions at different cost levels Produce an Analysis Methodology Produce Modelling Technique Produce.
Advertisements

Chapter 2 – Software Processes
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3.1.
1 MANUFACTURING AND PRODUCTION OF BIOLOGICAL PRODUCTS (ERT 455) HAZARD ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEM Munira Mohamed Nazari School.
Basic guidelines for the creation of a DW Create corporate sponsors and plan thoroughly Determine a scalable architectural framework for the DW Identify.
Chapter 6 Methodology Conceptual Databases Design Transparencies © Pearson Education Limited 1995, 2005.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
Lecture Fourteen Methodology - Conceptual Database Design
Co-funded by the European Union under FP7-ICT Alliance Permanent Access to the Records of Science in Europe Network Co-ordinated by aparsen.eu #APARSEN.
Methodology Conceptual Database Design
Design, Implementation and Maintenance
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Rational Unified Process (Part 1) CS3300 Fall 2015.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
An Introduction to Software Architecture
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
Methodology - Conceptual Database Design Transparencies
Methodology Conceptual Databases Design
1 Authenticity Capture Prototype Matt Dunckley, STFC.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
A survey based analysis on training opportunities Dr. Jūratė Kuprienė Framing the digital curation curriculum International Conference Florence, Italy.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
Methodology - Conceptual Database Design
Chapter 2 – Software Processes Lecture 1 Chapter 2 Software Processes1.
Conceptual Databases Design Step 1 © Pearson Education Limited 1995, 2005.
1 Architectural Blueprints—The “4+1” View Model of Software Architecture (
5. 2Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the activities of the requirements discipline  Describe the difference.
Faculty Economics & Business EBS 2033 Systems Development Lecture 1 The Systems Development Environment Lecturer: Puan Asleena Helmi.
Information ITIL Technology Infrastructure Library ITIL.
Chapter 1 The Systems Development Environment
Methodology Conceptual Databases Design
Workplace Projects.
Managing the Information Systems Project
Chapter 1 The Systems Development Environment
An Approach to Software Preservation
Global Science and Technology, Inc., Greenbelt, MD, USA
Methodology Conceptual Database Design
IB Assessments CRITERION!!!.
Chapter 1 The Systems Development Environment
Active Data Management in Space 20m DG
Chapter 1 The Systems Development Environment
Chapter 3 Managing the Information Systems Project
Chapter 1 The Systems Development Environment
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Object-Oriented Analysis
Chapter 2 Database Environment.
Chapter 1 Database Systems
Thursday’s Lecture Chemistry Building Musspratt Lecture Theatre,
Scientific Inquiry Unit 0.3.
Chapter 3 Managing the Information Systems Project
Analysis models and design models
An Introduction to Software Architecture
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
A person who conduct a study, identifies activities and objectives and determines a procedure to achieve the objectives.
Open Archival Information System
Methodology Conceptual Databases Design
Chapter 1 Database Systems
Modern Systems Analysis and Design Third Edition
Engineering Processes
Chapter 5 Architectural Design.
What is IT audit? An examination of how IT systems where implemented to ensure that they meet the organization’s business needs without compromising.
Chapter 1 The Systems Development Environment
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Chapter 3 Managing the Information Systems Project
Introduction to reference metadata and quality reporting
Chapter 3 Managing the Information Systems Project
Modern Systems Analysis and Design Third Edition
Presentation transcript:

Registry Repository of Representation Information Preservation Network Models: Creating Stable Networks of Information to Ensure the Long Term use of Scientific Data Registry Repository of Representation Information Preservation Analysis Toolkits SPEQS Preservation Network Models Packaging

Preservation Analysis Workflow

Preservation Network Models Preservation network modelling has many similarities to classic conceptual modelling approaches such as Entity-Relationship or Class diagrams, as it is based upon the idea of making statements about resources. The preservation network model consist of two components the digital objects and the relationships between them.

Objects Information is a description of the key information contained by the digital object. This information should have been identified during preservation analysis as being the information required to satisfy the preservation objective for the designated user community. Location information is the information required by the end user to physically locate and retrieve the object. AIP’s may be logical in construction with key digital object being distributed and managed within different information systems. This tends to be the case when data is in active use with resources evolving in dynamic environment. Physical State describes the form of the digital object. It should contain sufficient information relating to the version, variant, instance and dependencies. Risks most digital solutions will have inherent risks and a finite lifespan. Risks such interpretability of information, technical dependencies or loss designated community skill. Risks should be recorded against the appropriate object so they can be monitored and the implication of them being realised assessed. Termination of network occurs when a user requires no additional information or assistance to achieve, the defined preservation objective given the accepted risks will not be imminently realised.

Relationships Relationship captures how two objects are related to one another in order to fulfil the specified preservation objective whilst being utilized by a member of the designated user community. Function, in order to satisfy the preservation objective a digital object will perform a specific function for example the delivery of textual information or the extraction and graphical visualisation of specific parameters Tolerance, not every function is critical for the fulfilment of the preservation objective with some digital objects included as they enhance the quality of the solution or ease of use. The loss of this function is denoted in the model as a tolerance. Quality assurance and testing, The ability of an object to perform the specified function may have been subjected to quality assurance and testing which may be recorded against the relationship. Alternate and Composite relationships can be thought of as logical “And” (denoted in diagrams by circle) or “Or” (denoted in diagrams by diamond) relationships. Where either all relationships must function in order to fulfil the required objective or in the case of the later only one relationship needs to function in order to fulfil the specified objective.

Preservation Network Models

What are the benefits of this approach? Maximizing Return on Investment Measurable and Testable Solutions Stability and Review Informing preservation activities in the wider institutional environment

Ionosonde simple scenario A future designated community should be able to the following fourteen standard Ionospheric parameters from the data for a given station and time. They should also be able to understand what these parameters represent. Fmin, foE’ h_E,foes h_Es, type of Es, fbEs, foF1, M(3000)F1, h_F, h_F2, foF2, fx , M(3000)F2

Brian Matthews, Arif Shaon- e-science software archive project Matt Dunckley validated by manually checking extracted parameters with project Ionosonde Complex W3C Standard A user from a future designated community should be able reproduce an Ionogram from the raw mmm data files and have access to the Ionospheric Monitoring groups website, the URSII handbooks of interpretation documentation. Being able to preserve the Ionogram record is significant as it a much richer source of information more accurately able to covey the state of the atmosphere when correctly interpreted Decoding mmm file validated by Chris Davis Tested and validated by Steve Rankin Published by GAEL scrutinised by community ISO Standard

MST Complex A user from a future designated user community should be able to extract the following information from the data for a given altitude and time Horizontal wind speed and direction Wind sheer Signal Velocity Signal Power Aspect Correlated Spectral Width In addition future users should have access to User group notes, MST conference proceedings and peer reviewed literature published by previous data users.

Questions ?