skip to main content
research-article

Improved Heuristic Data Management and Protection Algorithm for Digital China Cultural Datasets

Authors Info & Claims
Published:16 March 2023Publication History
Skip Abstract Section

Abstract

In the present scenario sustainable management and protection of digital cultural datasets are considered as a significant area of research. In the recent past, the protection and management of cultural data are facing several new challenges and opportunities. Though several researchers explored their work on managing and protecting cultural data, efficiently and reliability of the present data management algorithm seems to be more complicated due to its incompetence in managing data in an optimized manner. This work presents an improved heuristic big data management algorithm for cultural datasets which is considered as a new discipline of digital cultural heritage specially established for strengthening strategic and interdisciplinary research. The scientific operation and management mechanism of digital protection of cultural heritage is experimentally validated and results show promising outcomes.

REFERENCES

  1. [1] Banfi F., Chow L., Ortiz M. Reina, Ouimet C., and Fai S.. Building information modeling for cultural heritage: The management of generative process for complex historical buildings. Digital Cultural Heritage 119130.Google ScholarGoogle Scholar
  2. [2] Della Torre S.. 2015. Shaping tools for built heritage conservation: from architectural design to program and management: learning from ‘distretticulturali’. In Proceedings of the Community Involvement in Heritage. 93102.Google ScholarGoogle Scholar
  3. [3] García Diego F.-J., Esteban B., and Merello P.. 2015. Design of a hybrid (wired/wireless) acquisition data system for monitoring of cultural heritage physical parameters in smart cities. Sensors 15, 4 (2015), 72467266.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Gribaudo M., Iacono M., and Levis A. H.. 2017. An IoT-based monitoring approach for cultural heritage sites: The matera case. Concurrency and Computation: Practice and Experience 29, 11 (2017), e4153.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Scopigno Roberto, Callieri Marco, Cignoni Paolo, Corsini Massimiliano, Dellepiane Matteo, Ponchio Federico, and Ranzuglia Guido. 2011. 3D models for cultural heritage: Beyond plain visualization. IEEE Computer 44, 7 (2011), 4855.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Sablier M. and Garrigues P.. 2014. Cultural heritage and its environment: An issue of interest for environmental science and pollution research. EnvironSciPollut Res 21, (2014), 5769. DOI: DOI: https://doi.org/10.1007/s11356-013-2458-3Google ScholarGoogle Scholar
  7. [7] Lee C. M., Kim Y. S., Nagajyothi P. C., Thammalangsy S., and Goung S. J. N.. 2011. Cultural heritage: A potential pollution source in museum. Environ SciPollut Res 18 (2011), 743755.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Mazzeo R., Roda A., and Prati S.. 2011. Analytical chemistry for cultural heritage: A key discipline in conservation research. Anal BioanalChem 399 (2011), 28852887.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Pramartha C. and Davis J. G.. 2016. Digital preservation of cultural heritage: Balinese kulkul artefact and practices. In Proceedings of the Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection. Ioannides M. et al. (Eds.), EuroMed 2016. Lecture Notes in Computer Science, Vol. 10058. Springer, Cham.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Hong-Zhe L.. 2007. Global ontology construction for heterogeneous digital museums. In Proceedings of the International Conference on Machine Learning and Cybernetics. 40154019.Google ScholarGoogle Scholar
  11. [11] Zlodi G. and Ivanjko T.. 2013. Crowdsourcing digital cultural heritage. izlazi u samoelektroničkomizdanju: NE (2013).Google ScholarGoogle Scholar
  12. [12] Hasibuan Z. A.. 2011. An overview of integrated approach to digital preservation: Case study of indonesian e-cultural heritage and natural history information retrieval system. In Proceedings of the International Conference on Advanced Computer Science and Information System. 3136.Google ScholarGoogle Scholar
  13. [13] Élise Meyer , GrussenmeyerPerrin PierreJ. P., Durand Anne, and Drap Pierre. 2007. A web information system for the management and the dissemination of cultural heritage data. Journal of Cultural Heritage 8, 4 (2007), 396411.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Su Xin, Sperlì Giancarlo, Moscato Vincenzo, Picariello Antonio, Esposito Christian, and Choi Chang. 2019. An edge intelligence empowered recommender system enabling cultural heritage applications. IEEE Transactions on Industrial Informatics 15, 7 (2019).Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Handayani Dewi, Untari Ningsih Dewi Handayani, Saefurrohman, and santoso Dwi Budi. 2014. Semarang's cultural eheritage implementation using WEB GIS in the cloud.Google ScholarGoogle Scholar
  16. [16] Ziparo V. A., Cottefoglie F., Calisi D., Giannone F., Grisetti G., Leibe B., Proesmans M., Salonia P., Van Gool L., Ventura C., and Stachniss C.. 2015. A new approach to digitalization and data management of cultural heritage sites. 2015 Digital Heritage (2015).Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Oliver Gillian and Knight Steve. 2015. Storage is a strategic issue: Digital preservation in the cloud. D-Lib Magazine 21, ¾ (2015).Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Iadanza E., Maietti F., Ziri A. E., Di Giulio R., Medici M., Ferrari 2 F., Bonsma P., and Turillazzi B.. 2019. Semantic web technologies meet bim for accessing and understanding cultural heritage. Intl. Workshop 3D-ARCH “3D Virtual Reconstruction and Visualization of Complex Architectures. 68.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Harvard University, Academia Sinica, and Peking University, China Biographical Database (2018). Retrieved from https://projects.iq.harvard.edu/cbdb.Google ScholarGoogle Scholar
  20. [20] https://projects.iq.harvard.edu/cbdb/data-sets.Google ScholarGoogle Scholar
  21. [21] Naoual El aboudi and LailaBenhlima. 2018. Big data management for healthcare systems: Architecture, requirements, and implementation. Advances in Bioinformatics 10 (2018). DOI: DOI: https://doi.org/10.1155/2018/4059018Google ScholarGoogle Scholar
  22. [22] Liu W., Li Q., Cai Y., Li Y., and Li X.. 2015. A prototype of healthcare big data processing system based on spark. In Proceedings of the 8th International Conference on BioMedical Engineering and Informatics. 516520.Google ScholarGoogle Scholar
  23. [23] Jin X. and Han J.. 2017. K-means clustering. In Proceedings of the Encyclopedia of Machine Learning and Data Mining. C. Sammut, G. I. Webb (eds.). Springer, Boston, MA.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Wang Xiaoyan and Bai Yanping. 2016. The global minmax k-means algorithm. SpringerPlus 5, 1 (2016), 115. DOI: DOI: https://doi.org/10.1186/s40064-016-3329-4Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Sheikhpour Razieh and Agha Sarram Mehdi. 2014. Diagnosis of diabetes using an intelligent approach based on bi-level dimensionality reduction and classification algorithms. Iranian Journal Of Diabetes And Obesity 6, 2 (2014).Google ScholarGoogle Scholar
  26. [26] Rashid Tarik A.. 2015. An intelligent approach for diabetes classification, prediction and description. In Proceedings of the Innovations in Bio-Inspired Computing and Applications. 323335.Google ScholarGoogle Scholar
  27. [27] Kuang Li, Zhu Yujia, Li Shuqi, Yan Xuejin, Yan Han, and Deng Shuiguang. 2018. A privacy protection model of data publication based on game theory. Security and Communication Networks. DOI: DOI: https://doi.org/10.1155/2018/3486529Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Sun Jiameng, Zhu Binrui, Qin Jing, Hu Jiankun, and Ma Jixin. 2018. Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks. DOI: DOI: https://doi.org/10.1155/2018/5275132Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Cai Jianxing, Ren Yanli, and Huang Chunshui. 2017. Verifiable outsourcing computation of modular exponentiations with single server. International Journal of Network Security 19, 3 (2017), 449457. DOI: DOI: 10.6633/IJNS.201703.19(3).14Google ScholarGoogle Scholar
  30. [30] Wang Changji and Luo Jianfa. 2013. An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Mathematical Problems in Engineering. DOI: DOI: https://doi.org/10.1155/2013/810969Google ScholarGoogle Scholar
  31. [31] Nguyen P. Q.. 2011. Breaking fully-homomorphic-encryption challenges. In Proceedings of the Cryptology and Network Security. D. Lin, G. Tsudik, X. Wang (Eds.), CANS 2011. Lecture Notes in Computer Science, Vol. 7092. Springer, Berlin.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Sharma Dhruti and Jinwala Devesh C.. 2017. Multiuser searchable encryption with token freshness verification. Security and Communication Networks. DOI: DOI: https://doi.org/10.1155/2017/6435138Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improved Heuristic Data Management and Protection Algorithm for Digital China Cultural Datasets

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Asian and Low-Resource Language Information Processing
      ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 21, Issue 5
      September 2022
      486 pages
      ISSN:2375-4699
      EISSN:2375-4702
      DOI:10.1145/3533669
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 March 2023
      • Online AM: 7 May 2020
      • Accepted: 9 April 2020
      • Revised: 21 March 2020
      • Received: 10 February 2020
      Published in tallip Volume 21, Issue 5

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)49
      • Downloads (Last 6 weeks)4

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!