2022
DOI: 10.1109/access.2022.3206805
|View full text |Cite
|
Sign up to set email alerts
|

Domain and Challenges of Big Data and Archaeological Photogrammetry With Blockchain

Abstract: With gigantic growth of data volume that is moved across the web links today, there has been a gigantic measure of perplexing information produced. Extremely huge sets of data including universities, organizations framework, institution gas, petroleum sector, healthcare, that have so enormous thus complex information with more differed structure. The major challenge is how to handle this significant volume of data, also in archaeological photogrammetry which alluded to as Big Data. Although big data has to be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…A TABC with threeanchor nodes andonetarget node is constructed while keepingin mind the target node T. T can travel in a way that either keeps it a long way from the triangle's vertices or brings it fairlyclose to them. The 'T'target node is present at the exterior of the triangle, and if this is the case, theninside the triangle if the opposite is true [14]. The network floods the new nodes that it does not identify as stale nodes.…”
Section: Dv-hop-based Methodologymentioning
confidence: 99%
“…A TABC with threeanchor nodes andonetarget node is constructed while keepingin mind the target node T. T can travel in a way that either keeps it a long way from the triangle's vertices or brings it fairlyclose to them. The 'T'target node is present at the exterior of the triangle, and if this is the case, theninside the triangle if the opposite is true [14]. The network floods the new nodes that it does not identify as stale nodes.…”
Section: Dv-hop-based Methodologymentioning
confidence: 99%
“…Conventional encryption methods like AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman) have been widely implemented for big data environments [21,22,23]. While they offer a basic level of security, these static methods are increasingly falling victim to computational attacks and lack the ability to secure data during processing operations [24,25,26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Establishing data retention and purge strategies: when data is no longer needed, it should be securely deleted or purged to protect the privacy of the data [7][8][9].…”
mentioning
confidence: 99%