Page 708 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 708

Linked Data Technique

              The first step is ontology design, including vocabulary selection and vocabulary design;
              The second step is RDF structuration, including the type of data, data preparation, data storage,
                data publication and the type of publication;
              The  third  step  is  relationship  establishment,  including  relationship  links,  links  identification,
                vocabulary links and the type of relationship;
              The last step is data fusion, including crawling pattern, on‐the‐fly dereferencing pattern, query
                federation pattern and fusion mode.
            Data Visualization

              Data mining;
              Data presentation.

            Social Networks
              Mobile Sharing;
              RSS push technique.

            Anonymization Technique
              Suppression;

              Pseudonymization (hash function);
              Generalization
                    –  Top/bottom coding
                    –  K‐anonymity
                    –  l‐diversity
                    –  T‐closeness
                    –  Non‐intrusive Load Monitoring (NILM)
                    –   Homomorphic encryption

                    –  Randomization (Pk‐anonymization)
                    –   Perturbation
                        –  micro‐aggregation
                        –  noise injection
                        –  data swapping
                        –   synthetic microdata.

            (3)     Open data management

            (a)     User management
              Provide user Management capabilities, user group management capabilities, and role‐based
                (RBAC) permission management capabilities;
              User management capabilities include query, new‐built, account management, and so on;

              User group management capabilities include query, new‐built, permission modification, and
                so on;

              Permission lists include function module uses‐permission, data access permission, and so on.






            698                                                      ITU‐T's Technical Reports and Specifications
   703   704   705   706   707   708   709   710   711   712   713