{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:05:23Z","timestamp":1725822323983},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319198569"},{"type":"electronic","value":"9783319198576"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19857-6_2","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T01:11:14Z","timestamp":1432602674000},"page":"11-20","source":"Crossref","is-referenced-by-count":3,"title":["A Cloud-Based Vegetable Production and Distribution System"],"prefix":"10.1007","author":[{"given":"Alireza","family":"Ahrary","sequence":"first","affiliation":[]},{"given":"D. A. R.","family":"Ludena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"2_CR2","unstructured":"Floerkemeier, C., Bhattacharyya, R., Sarma, S.: Beyond RFID. In: Proceedings of TIWDC 2009, Pula, Italy, September 2009"},{"key":"2_CR3","unstructured":"Sung, J., Sanchez Lopez, T., Kim, D.: The EPC sensor network for RFID and WSN integration infrastructure. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp .618\u2013621, March 19\u201323, 2007"},{"key":"2_CR4","unstructured":"Commission of the European Communities, Early Challenges Regarding the \u201cInternet of Things\u201d (2008)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. In: IETF RFC 4919, Aug 2007","DOI":"10.17487\/rfc4919"},{"key":"2_CR6","unstructured":"Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3\u201311 (1999)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Lude\u00f1a, D.A.R., Ahrary, A.: Big data approach in an ICT agriculture project. In: Proceedings for the 5th IEEE International Conference on Awareness Science and Technology (iCAST 2013), pp. 261\u2013264. Aizu-Wakamatsu, Japan (2013)","DOI":"10.1109\/ICAwST.2013.6765444"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Lude\u00f1a, D.A.R., Ahrary, A.: A big data approach for a new ICT agriculture application development. In: Proceedings for the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), pp. 140\u2013143. Beijing, China (2013)","DOI":"10.1109\/CyberC.2013.30"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Ahrary, A., Lude\u00f1a, D.A.R.: Big Data approach to a novel nutrition-based vegetable production and distribution system. In: Proceedings of the The International Conference on Computational Intelligence and Cybernetics\u2014CyberneticsCom 2013, pp. 131\u2013135. Yogyakarta, Indonesia (2013)","DOI":"10.1109\/CyberneticsCom.2013.6865796"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Acharya, R., Asha, K: Data integrity and intrusion detection in wireless sensor networks. In: Proceedings of IEEE ICON 2008, New Delhi, India, Dec 2008","DOI":"10.1109\/ICON.2008.4772642"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Research Trends: Special Issue on Big Data, Elsevier, Issue 30, Sept 2012","DOI":"10.1016\/S0734-9750(11)00208-4"}],"container-title":["Smart Innovation, Systems and Technologies","Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19857-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T22:19:10Z","timestamp":1559168350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19857-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319198569","9783319198576"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19857-6_2","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2015]]}}}