Page 708 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 708
Linked Data Technique
The first step is ontology design, including vocabulary selection and vocabulary design;
The second step is RDF structuration, including the type of data, data preparation, data storage,
data publication and the type of publication;
The third step is relationship establishment, including relationship links, links identification,
vocabulary links and the type of relationship;
The last step is data fusion, including crawling pattern, on‐the‐fly dereferencing pattern, query
federation pattern and fusion mode.
Data Visualization
Data mining;
Data presentation.
Social Networks
Mobile Sharing;
RSS push technique.
Anonymization Technique
Suppression;
Pseudonymization (hash function);
Generalization
– Top/bottom coding
– K‐anonymity
– l‐diversity
– T‐closeness
– Non‐intrusive Load Monitoring (NILM)
– Homomorphic encryption
– Randomization (Pk‐anonymization)
– Perturbation
– micro‐aggregation
– noise injection
– data swapping
– synthetic microdata.
(3) Open data management
(a) User management
Provide user Management capabilities, user group management capabilities, and role‐based
(RBAC) permission management capabilities;
User management capabilities include query, new‐built, account management, and so on;
User group management capabilities include query, new‐built, permission modification, and
so on;
Permission lists include function module uses‐permission, data access permission, and so on.
698 ITU‐T's Technical Reports and Specifications