Abstract
In the present scenario sustainable management and protection of digital cultural datasets are considered as a significant area of research. In the recent past, the protection and management of cultural data are facing several new challenges and opportunities. Though several researchers explored their work on managing and protecting cultural data, efficiently and reliability of the present data management algorithm seems to be more complicated due to its incompetence in managing data in an optimized manner. This work presents an improved heuristic big data management algorithm for cultural datasets which is considered as a new discipline of digital cultural heritage specially established for strengthening strategic and interdisciplinary research. The scientific operation and management mechanism of digital protection of cultural heritage is experimentally validated and results show promising outcomes.
- [1] . Building information modeling for cultural heritage: The management of generative process for complex historical buildings. Digital Cultural Heritage 119–130.Google Scholar
- [2] . 2015. Shaping tools for built heritage conservation: from architectural design to program and management: learning from ‘distretticulturali’. In Proceedings of the Community Involvement in Heritage. 93–102.Google Scholar
- [3] . 2015. Design of a hybrid (wired/wireless) acquisition data system for monitoring of cultural heritage physical parameters in smart cities. Sensors 15, 4 (2015), 7246–7266.Google Scholar
Cross Ref
- [4] . 2017. An IoT-based monitoring approach for cultural heritage sites: The matera case. Concurrency and Computation: Practice and Experience 29, 11 (2017), e4153.Google Scholar
Cross Ref
- [5] . 2011. 3D models for cultural heritage: Beyond plain visualization. IEEE Computer 44, 7 (2011), 48–55.Google Scholar
Digital Library
- [6] . 2014. Cultural heritage and its environment: An issue of interest for environmental science and pollution research. EnvironSciPollut Res 21, (2014), 5769.
DOI: DOI: https://doi.org/10.1007/s11356-013-2458-3Google Scholar - [7] . 2011. Cultural heritage: A potential pollution source in museum. Environ SciPollut Res 18 (2011), 743–755.Google Scholar
Cross Ref
- [8] . 2011. Analytical chemistry for cultural heritage: A key discipline in conservation research. Anal BioanalChem 399 (2011), 2885–2887.Google Scholar
Cross Ref
- [9] . 2016. Digital preservation of cultural heritage: Balinese kulkul artefact and practices. In Proceedings of the Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection. Ioannides M. et al. (Eds.), EuroMed 2016. Lecture Notes in Computer Science, Vol. 10058. Springer, Cham.Google Scholar
Digital Library
- [10] . 2007. Global ontology construction for heterogeneous digital museums. In Proceedings of the International Conference on Machine Learning and Cybernetics. 4015–4019.Google Scholar
- [11] . 2013. Crowdsourcing digital cultural heritage. izlazi u samoelektroničkomizdanju: NE (2013).Google Scholar
- [12] . 2011. An overview of integrated approach to digital preservation: Case study of indonesian e-cultural heritage and natural history information retrieval system. In Proceedings of the International Conference on Advanced Computer Science and Information System. 31–36.Google Scholar
- [13] . 2007. A web information system for the management and the dissemination of cultural heritage data. Journal of Cultural Heritage 8, 4 (2007), 396–411.Google Scholar
Cross Ref
- [14] . 2019. An edge intelligence empowered recommender system enabling cultural heritage applications. IEEE Transactions on Industrial Informatics 15, 7 (2019).Google Scholar
Cross Ref
- [15] . 2014. Semarang's cultural eheritage implementation using WEB GIS in the cloud.Google Scholar
- [16] . 2015. A new approach to digitalization and data management of cultural heritage sites. 2015 Digital Heritage (2015).Google Scholar
Cross Ref
- [17] . 2015. Storage is a strategic issue: Digital preservation in the cloud. D-Lib Magazine 21, ¾ (2015).Google Scholar
Cross Ref
- [18] . 2019. Semantic web technologies meet bim for accessing and understanding cultural heritage. Intl. Workshop 3D-ARCH “3D Virtual Reconstruction and Visualization of Complex Architectures. 6–8.Google Scholar
Cross Ref
- [19] Harvard University, Academia Sinica, and Peking University, China Biographical Database (2018). Retrieved from https://projects.iq.harvard.edu/cbdb.Google Scholar
- [20] https://projects.iq.harvard.edu/cbdb/data-sets.Google Scholar
- [21] Naoual El aboudi and LailaBenhlima. 2018. Big data management for healthcare systems: Architecture, requirements, and implementation. Advances in Bioinformatics 10 (2018).
DOI: DOI: https://doi.org/10.1155/2018/4059018Google Scholar - [22] . 2015. A prototype of healthcare big data processing system based on spark. In Proceedings of the 8th International Conference on BioMedical Engineering and Informatics. 516–520.Google Scholar
- [23] . 2017. K-means clustering. In Proceedings of the Encyclopedia of Machine Learning and Data Mining. C. Sammut, G. I. Webb (eds.). Springer, Boston, MA.Google Scholar
Cross Ref
- [24] . 2016. The global minmax k-means algorithm. SpringerPlus 5, 1 (2016), 1–15.
DOI: DOI: https://doi.org/10.1186/s40064-016-3329-4Google ScholarCross Ref
- [25] . 2014. Diagnosis of diabetes using an intelligent approach based on bi-level dimensionality reduction and classification algorithms. Iranian Journal Of Diabetes And Obesity 6, 2 (2014).Google Scholar
- [26] . 2015. An intelligent approach for diabetes classification, prediction and description. In Proceedings of the Innovations in Bio-Inspired Computing and Applications. 323–335.Google Scholar
- [27] . 2018. A privacy protection model of data publication based on game theory. Security and Communication Networks.
DOI: DOI: https://doi.org/10.1155/2018/3486529Google ScholarDigital Library
- [28] . 2018. Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks.
DOI: DOI: https://doi.org/10.1155/2018/5275132Google ScholarDigital Library
- [29] . 2017. Verifiable outsourcing computation of modular exponentiations with single server. International Journal of Network Security 19, 3 (2017), 449–457.
DOI: DOI: 10.6633/IJNS.201703.19(3).14Google Scholar - [30] . 2013. An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering.
DOI: DOI: https://doi.org/10.1155/2013/810969Google Scholar - [31] . 2011. Breaking fully-homomorphic-encryption challenges. In Proceedings of the Cryptology and Network Security. D. Lin, G. Tsudik, X. Wang (Eds.), CANS 2011. Lecture Notes in Computer Science, Vol. 7092. Springer, Berlin.Google Scholar
Digital Library
- [32] . 2017. Multiuser searchable encryption with token freshness verification. Security and Communication Networks.
DOI: DOI: https://doi.org/10.1155/2017/6435138Google ScholarDigital Library
Index Terms
Improved Heuristic Data Management and Protection Algorithm for Digital China Cultural Datasets
Recommendations
Digital Protection and Development of Intangible Cultural Heritage Relying on High-Performance Computing
The protection of intangible cultural heritage has gradually attracted people's attention. In today's digital information age, the use of digital technology in the protection of intangible cultural heritage has become the focus of research in the field of ...
Research on Digital Protection of the Intangible Cultural Heritage in Three Gorges Area
ISCID '12: Proceedings of the 2012 Fifth International Symposium on Computational Intelligence and Design - Volume 01The construction of the Three Gorges Project has changed the original intangible cultural system. It affects the ecological heritage and development of the intangible cultural heritage. Digital Protection of intangible cultural heritage of the Three ...
Application of Digital Technology in Intangible Cultural Heritage Protection
Intangible cultural heritage itself is fragile, so it needs human protection. The existence of everything is a dynamic process, and its emergence, growth, continuation, and demise are objective existences, including “intangible cultural heritage.” With ...






Comments