This position paper is the outcome of a brainstorming workshop organised by the International Society for Digital Earth(ISDE)in Beijing in March 2011.It argues that the vision of Digital Earth(DE)put forward by Vice-P...This position paper is the outcome of a brainstorming workshop organised by the International Society for Digital Earth(ISDE)in Beijing in March 2011.It argues that the vision of Digital Earth(DE)put forward by Vice-President Al Gore 13 years ago needs to be re-evaluated in the light of the many developments in the fields of information technology,data infrastructures and earth observation that have taken place since.The paper identifies the main policy,scientific and societal drivers for the development of DE and illustrates the multi-faceted nature of a new vision of DE grounding it with a few examples of potential applications.Because no single organisation can on its own develop all the aspects of DE,it is essential to develop a series of collaborations at the global level to turn the vision outlined in this paper into reality.展开更多
The FAIR principles describe characteristics intended to support access to and reuse of digital artifacts in the scientific research ecosystem.Persistent,globally unique identifiers,resolvable on the Web,and associate...The FAIR principles describe characteristics intended to support access to and reuse of digital artifacts in the scientific research ecosystem.Persistent,globally unique identifiers,resolvable on the Web,and associated with a set of additional descriptive metadata,are foundational to FAIR data.Here we describe some basic principles and exemplars for their design,use and orchestration with other system elements to achieve FAIRness for digital research objects.展开更多
Electric vehicle is a kind of new energy vehicle which uses batteries as energy supply unit.A huge gap in charging infrastructures will be created by the expansion of electric vehicles.The effectiveness and rationalit...Electric vehicle is a kind of new energy vehicle which uses batteries as energy supply unit.A huge gap in charging infrastructures will be created by the expansion of electric vehicles.The effectiveness and rationality of charging facilities will directly affect the convenience and economy of the users,as well as the safe operation of the power grid.Three types of charging facilities:charging pile,charging station and battery swap station are introduced in this paper.According to the different methods of charging infrastructure planning,the research status of the method of determining charging demand points is expounded.And the spatial distribution of charging demand points extracted by the current site selection method has a certain deviation.Then the models and algorithms of charging infrastructure optimized layout are reviewed.Currently,many researches focus on three categories optimization objectives:benefit of power company side,investment cost of charging facility and user side cost,and the genetic algorithm and particle swarm optimization are the main solving algorithms.Finally,the relative methods and development trend of the charging infrastructures optimized layout are summarized,and some suggestions on the optimized layout of electric vehicle charging infrastructures are given forward.展开更多
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.展开更多
Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social inf...Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social infras-tructures in urban areas across various scales,with less attention to rural areas,where inequality can be more severe.Particularly,few have investigated the disparities of accessibility to social infrastructures between urban and rural areas.Here,using the Changsha-Zhuzhou-Xiangtan urban agglomeration,China,as an example,we investigated the inequality of accessibility in both urban and rural areas,and further compared the urban-rural difference.Accessibility was measured by travel time of residents to infrastructures.We selected four types of social infrastructures including supermarkets,bus stops,primary schools,and health care,which were funda-mentally important to both urban and rural residents.We found large disparities in accessibility between urban and rural areas,ranging from 20 min to 2 h.Rural residents had to spend one to two more hours to bus stops than urban residents,and 20 min more to the other three types of infrastructures.Furthermore,accessibility to multiple infrastructures showed greater urban-rural differences.Rural residents in more than half of the towns had no access to any infrastructure within 15 min,while more than 60%of the urban residents could access to all infrastructures within 15 min.Our results revealed quantitative accessibility gap between urban and rural areas and underscored the necessity of social infrastructures planning to address such disparities.展开更多
Research data currently face a huge increase of data objects with an increasing variety of types(data types,formats)and variety of workflows by which objects need to be managed across their lifecycle by data infrastru...Research data currently face a huge increase of data objects with an increasing variety of types(data types,formats)and variety of workflows by which objects need to be managed across their lifecycle by data infrastructures.Researchers desire to shorten the workflows from data generation to analysis and publication,and the full workflow needs to become transparent to multiple stakeholders,including research administrators and funders.This poses challenges for research infrastructures and user-oriented data services in terms of not only making data and workflows findable,accessible,interoperable and reusable,but also doing so in a way that leverages machine support for better efficiency.One primary need to be addressed is that of findability,and achieving better findability has benefits for other aspects of data and workflow management.In this article,we describe how machine capabilities can be extended to make workflows more findable,in particular by leveraging the Digital Object Architecture,common object operations and machine learning techniques.展开更多
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat...Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.展开更多
This paper focuses on research e-infrastructures in the open science era.We analyze some of the challenges and opportunities of cloud-based science and introduce an example of a national solution in the China Science ...This paper focuses on research e-infrastructures in the open science era.We analyze some of the challenges and opportunities of cloud-based science and introduce an example of a national solution in the China Science and Technology Cloud(CSTCloud).We selected three CSTCloud use cases in deploying open science modules,including scalable engineering in astronomical data management,integrated Earth-science resources for SDG-13 decision making,and the coupling of citizen science and artificial intelligence(AI)techniques in biodiversity.We conclude with a forecast on the future development of research e-infrastructures and introduce the idea of the Global Open Science Cloud(GOSC).We hope this analysis can provide some insights into the future development of research e-infrastructures in support of open science.展开更多
Urban underground infrastructures(UUIs)are a vital component of built capital for urban sustainability.However,many cities are now home to a multitude of disused or underutilized UUIs,not least aged purpose-built unde...Urban underground infrastructures(UUIs)are a vital component of built capital for urban sustainability.However,many cities are now home to a multitude of disused or underutilized UUIs,not least aged purpose-built underground facilities,causing a waste of valuable underground space resource assets.In the process of urban renewal,adaptive reuse can be an attractive solution to breathe new life into underutilized UUIs,while addressing some of the modern problems of the built environment by an economically feasible means.Nevertheless,there is a prevalent absence in the current literature of the overarching planning and decision-making approaches for an adaptive reuse development of underutilized UUIs.With the intention of addressing this shortfall,this paper first lays out development strategies,then sets the generic patterns for adaptive reuse of disused or underutilized UUIs.Taking the city of Qingdao,China as a case study,detailed planning and decision-making approaches with the aid of multi-source data and spatial analysis tools are presented.It is anticipated that the findings of this research will assist the adaptive reuse development of UUIs in providing theoretical guidance and empirical evidence,thereby enhancing the role of urban underground space use in contributing to urban revitalization and urban sustainability.展开更多
Global Navigation Satellite System (GNSS) technology is growing fast in our society and new applications are being introduced at an unprecedented pace. The GNSS products provide worldwide and real-time services using ...Global Navigation Satellite System (GNSS) technology is growing fast in our society and new applications are being introduced at an unprecedented pace. The GNSS products provide worldwide and real-time services using precise timing information, positioning and synchronization technologies. Within years, GNSS applications are becoming more accurate and their precision opens doors to a wide range of applications. Nevertheless, these applications are susceptible to disruption in the operation of GNSS receivers when malfunctions, failures or interference occur. This paper’s objective is to make an overall analysis of GNSS failure impact on society and therefore make a review of GNSS spectrum protection strategies. In the first three sections of this analysis, we survey GNSS applications, their importance and their criticality. While questioning the criticality of GNSS applications, we evaluate their impact on main critical infrastructures and particularly the risks of critical dependencies in case of failure or interference. In the last two sections, we investigate GNSS spectrum interference in relation to its effects on crucial infrastructures. We review the principal Radio Frequency Interference (RFI) sources leading to GNSS and satellite communications (SATCOM) spectrum issues. Alongside, we study various ways to mitigate RFI. This process is essential to further develop and standardize mitigation techniques and to ensure GNSS spectrum immunity against RFI.展开更多
文摘This position paper is the outcome of a brainstorming workshop organised by the International Society for Digital Earth(ISDE)in Beijing in March 2011.It argues that the vision of Digital Earth(DE)put forward by Vice-President Al Gore 13 years ago needs to be re-evaluated in the light of the many developments in the fields of information technology,data infrastructures and earth observation that have taken place since.The paper identifies the main policy,scientific and societal drivers for the development of DE and illustrates the multi-faceted nature of a new vision of DE grounding it with a few examples of potential applications.Because no single organisation can on its own develop all the aspects of DE,it is essential to develop a series of collaborations at the global level to turn the vision outlined in this paper into reality.
基金This work was supported in part by the European Union’s Horizon 2020 program under grant agreements 777523,FREYA“Connected Open Identifiers for Discovery,Access and Use of Research Resources”,654248,CORBEL+1 种基金“Coordinated Research Infrastructures Building Enduring Life-science services”,and 823830Bioexcel2,"BioExcel-2 Centre of Excellence for Computational Biomolecular Research".Many thanks to Paul Groth for his helpful comments on the manuscript.
文摘The FAIR principles describe characteristics intended to support access to and reuse of digital artifacts in the scientific research ecosystem.Persistent,globally unique identifiers,resolvable on the Web,and associated with a set of additional descriptive metadata,are foundational to FAIR data.Here we describe some basic principles and exemplars for their design,use and orchestration with other system elements to achieve FAIRness for digital research objects.
基金Project(21805217)supported by the National Natural Science Foundation of ChinaProject(2015BAG08B02)supported by the National Key Technologies Research and Development Program of ChinaProject(2019IVB014)supported by the Fundamental Research Funds for the Central Universities,China。
文摘Electric vehicle is a kind of new energy vehicle which uses batteries as energy supply unit.A huge gap in charging infrastructures will be created by the expansion of electric vehicles.The effectiveness and rationality of charging facilities will directly affect the convenience and economy of the users,as well as the safe operation of the power grid.Three types of charging facilities:charging pile,charging station and battery swap station are introduced in this paper.According to the different methods of charging infrastructure planning,the research status of the method of determining charging demand points is expounded.And the spatial distribution of charging demand points extracted by the current site selection method has a certain deviation.Then the models and algorithms of charging infrastructure optimized layout are reviewed.Currently,many researches focus on three categories optimization objectives:benefit of power company side,investment cost of charging facility and user side cost,and the genetic algorithm and particle swarm optimization are the main solving algorithms.Finally,the relative methods and development trend of the charging infrastructures optimized layout are summarized,and some suggestions on the optimized layout of electric vehicle charging infrastructures are given forward.
基金supported by Natural Science Foundation of China(Nos.61272204 and 61433006)the Fundamental Research Funds for the Central Universities,China(No.2013ZZGH006)
文摘Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
基金supported by funding from the National Natural Science Foundation of China(Grant No.U21A2010)the National Science Fund for Distinguished Young Scholars(Grant No.42225104)the National Key Research and Development Program(Grant No.2022YFF130110O).
文摘Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social infras-tructures in urban areas across various scales,with less attention to rural areas,where inequality can be more severe.Particularly,few have investigated the disparities of accessibility to social infrastructures between urban and rural areas.Here,using the Changsha-Zhuzhou-Xiangtan urban agglomeration,China,as an example,we investigated the inequality of accessibility in both urban and rural areas,and further compared the urban-rural difference.Accessibility was measured by travel time of residents to infrastructures.We selected four types of social infrastructures including supermarkets,bus stops,primary schools,and health care,which were funda-mentally important to both urban and rural residents.We found large disparities in accessibility between urban and rural areas,ranging from 20 min to 2 h.Rural residents had to spend one to two more hours to bus stops than urban residents,and 20 min more to the other three types of infrastructures.Furthermore,accessibility to multiple infrastructures showed greater urban-rural differences.Rural residents in more than half of the towns had no access to any infrastructure within 15 min,while more than 60%of the urban residents could access to all infrastructures within 15 min.Our results revealed quantitative accessibility gap between urban and rural areas and underscored the necessity of social infrastructures planning to address such disparities.
文摘Research data currently face a huge increase of data objects with an increasing variety of types(data types,formats)and variety of workflows by which objects need to be managed across their lifecycle by data infrastructures.Researchers desire to shorten the workflows from data generation to analysis and publication,and the full workflow needs to become transparent to multiple stakeholders,including research administrators and funders.This poses challenges for research infrastructures and user-oriented data services in terms of not only making data and workflows findable,accessible,interoperable and reusable,but also doing so in a way that leverages machine support for better efficiency.One primary need to be addressed is that of findability,and achieving better findability has benefits for other aspects of data and workflow management.In this article,we describe how machine capabilities can be extended to make workflows more findable,in particular by leveraging the Digital Object Architecture,common object operations and machine learning techniques.
文摘Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.
基金supported by funding from the National Key R&D Program of China(No.2021YFE0111500)the National Natural Science Foundation of China(No.72104229)+1 种基金the CAS Program for fostering international mega-science(No.241711KYSB20200023)the CAS President's International Fellowship Initiative(No.2021VTA0006).
文摘This paper focuses on research e-infrastructures in the open science era.We analyze some of the challenges and opportunities of cloud-based science and introduce an example of a national solution in the China Science and Technology Cloud(CSTCloud).We selected three CSTCloud use cases in deploying open science modules,including scalable engineering in astronomical data management,integrated Earth-science resources for SDG-13 decision making,and the coupling of citizen science and artificial intelligence(AI)techniques in biodiversity.We conclude with a forecast on the future development of research e-infrastructures and introduce the idea of the Global Open Science Cloud(GOSC).We hope this analysis can provide some insights into the future development of research e-infrastructures in support of open science.
基金supported by the National Natural Science Foundation of China(Grant No.42201284)the China Postdoctoral Science Foundation(Grant No.BX2021220).
文摘Urban underground infrastructures(UUIs)are a vital component of built capital for urban sustainability.However,many cities are now home to a multitude of disused or underutilized UUIs,not least aged purpose-built underground facilities,causing a waste of valuable underground space resource assets.In the process of urban renewal,adaptive reuse can be an attractive solution to breathe new life into underutilized UUIs,while addressing some of the modern problems of the built environment by an economically feasible means.Nevertheless,there is a prevalent absence in the current literature of the overarching planning and decision-making approaches for an adaptive reuse development of underutilized UUIs.With the intention of addressing this shortfall,this paper first lays out development strategies,then sets the generic patterns for adaptive reuse of disused or underutilized UUIs.Taking the city of Qingdao,China as a case study,detailed planning and decision-making approaches with the aid of multi-source data and spatial analysis tools are presented.It is anticipated that the findings of this research will assist the adaptive reuse development of UUIs in providing theoretical guidance and empirical evidence,thereby enhancing the role of urban underground space use in contributing to urban revitalization and urban sustainability.
文摘Global Navigation Satellite System (GNSS) technology is growing fast in our society and new applications are being introduced at an unprecedented pace. The GNSS products provide worldwide and real-time services using precise timing information, positioning and synchronization technologies. Within years, GNSS applications are becoming more accurate and their precision opens doors to a wide range of applications. Nevertheless, these applications are susceptible to disruption in the operation of GNSS receivers when malfunctions, failures or interference occur. This paper’s objective is to make an overall analysis of GNSS failure impact on society and therefore make a review of GNSS spectrum protection strategies. In the first three sections of this analysis, we survey GNSS applications, their importance and their criticality. While questioning the criticality of GNSS applications, we evaluate their impact on main critical infrastructures and particularly the risks of critical dependencies in case of failure or interference. In the last two sections, we investigate GNSS spectrum interference in relation to its effects on crucial infrastructures. We review the principal Radio Frequency Interference (RFI) sources leading to GNSS and satellite communications (SATCOM) spectrum issues. Alongside, we study various ways to mitigate RFI. This process is essential to further develop and standardize mitigation techniques and to ensure GNSS spectrum immunity against RFI.