{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T03:24:14Z","timestamp":1774581854563,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319321660","type":"print"},{"value":"9783319321684","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32168-4_4","type":"book-chapter","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T11:46:09Z","timestamp":1464867969000},"page":"109-134","source":"Crossref","is-referenced-by-count":2,"title":["Big Data Approach in an ICT Agriculture Application"],"prefix":"10.1007","author":[{"given":"R. Dennis A.","family":"Ludena","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Ahrary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,3]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Lude\u00f1a, R.D.A., Ahrary, A.: Big Data approach in an ICT agriculture project. In: Proceedings for the 5th IEEE International Conference on Awareness Science and Technology (iCAST 2013), Aizu-Wakamatsu, Japan, pp. 261\u2013265 (2013)","DOI":"10.1109\/ICAwST.2013.6765444"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Lude\u00f1a, R.D.A., Ahrary, A.: A Big Data approach for a new ICT agriculture application development. In: Proceedings for the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Beijing, China, pp. 140\u2013143 (2013)","DOI":"10.1109\/CyberC.2013.30"},{"key":"4_CR3","unstructured":"Meeder, B., Tam, J., Kelley, P.G., Cranor, L.F.: RT @IWantPrivacy: widespread violation of privacy settings in the twitter social network. In: Proceedings of Web 2.0 Security and Privacy (W2SP 2011), Oakland, CA, USA (2011)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Manovich, L.: Trending: the promises and the challenges of big social data. In: Gold, M.K. (ed.) Debates in the Digital Humanities. The University of Minnesota Press, Minneapolis (2011)","DOI":"10.5749\/minnesota\/9780816677948.003.0047"},{"key":"4_CR5","unstructured":"Zimmer, M.: More on the \u201cAnonymity\u201d of the Facebook dataset\u2014It\u2019s Harvard College. MichaelZimmer.org Blog (2011)"},{"key":"4_CR6","unstructured":"Beyer, M.A., Laney, D.: The Importance of \u201cBig Data\u201d: A Definition. Gartner, Stamford (2012)"},{"issue":"8","key":"4_CR7","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1536616.1536632","volume":"52","author":"A Jacobs","year":"2009","unstructured":"Jacobs, A.: The pathologies of Big Data. Commun. ACM 52(8), 36\u201344 (2009)","journal-title":"Commun. ACM"},{"key":"4_CR8","unstructured":"Bollierm, D.: The Promise and Peril of Big Data. The Aspen Institute, Communications and Society Program, Washington (2010)"},{"key":"4_CR9","unstructured":"Latour, B.: Tarde\u2019s idea of quantification. In: Candea, M. (ed.) The Social After Gabriel Trade: Debates and Assessments, pp. 145\u2013162. Routledge, London (2011)"},{"key":"4_CR10","unstructured":"Agrawal, D., Bernstein, P., et al.: Challenges and Opportunities with Big Data. Community white paper, Purdue University, West Lafayette, Indiana (2011)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Gitelman, L.: Raw Data Is An Oxymoron. Massachusetts Institute of Technology Press, Cambridge (2013)","DOI":"10.7551\/mitpress\/9302.001.0001"},{"key":"4_CR12","unstructured":"Research Trends: Special Issue on Big Data, Elsevier, Issue 30 (2012)"},{"key":"4_CR13","unstructured":"deRoos, D., Eaton, C., Lapis, G.: Paul Zikopoulos, Tom Deutsch, \u201cUnderstanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. McGraw-Hill, New York (2012)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Lude\u00f1a, R.D.A., Ahrary, A.: Big data application to the vegetable production and distribution system. In: Proceedings for the 2014 IEEE 10th International Colloquium on Signal Processing & Its Applications (CSPA 2014), pp. 20\u201324, Kuala Lumpur, Malaysia (2014)","DOI":"10.1109\/CSPA.2014.6805713"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Ahrary, A., Lude\u00f1a, R.D.A.: Big Data approach to a novel nutrition-based vegetable production and distribution system. In: Proceedings of The International Conference on Computational Intelligence and Cybernetics (CyberneticsCom 2013), pp. 131\u2013135, Yogyakarta, Indonesia (2013)","DOI":"10.1109\/CyberneticsCom.2013.6865796"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Savola, R.M., Abie, H.: Metrics-driven security objective decomposition for an e-health application with adaptive security management. In: Proceedings of the International Workshop on Adaptive Security (ASPI 2013), Article No. 6, New York, NY, USA (2013)","DOI":"10.1145\/2523501.2523507"},{"issue":"2","key":"4_CR17","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3390\/a6020197","volume":"6","author":"S Cirani","year":"2013","unstructured":"Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP-based internet of things: an algorithmic overview. Algorithms 6(2), 197\u2013226 (2013)","journal-title":"Algorithms"},{"issue":"1","key":"4_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4236\/ait.2012.21001","volume":"2","author":"H Ning","year":"2012","unstructured":"Ning, H., Liu, H.: Cyber-physical-social based security architecture for future internet of things. Adv. Internet Things 2(1), 1\u20137 (2012)","journal-title":"Adv. Internet Things"},{"key":"4_CR19","doi-asserted-by":"crossref","first-page":"241","DOI":"10.13052\/jicts2245-800X.12a8","volume":"1","author":"A Sivabalan","year":"2013","unstructured":"Sivabalan, A., Rajan, M.A., Balamuralidhar, P.: Towards a light weight internet of things platform architecture. J. ICT Stand. 1, 241\u2013252 (2013)","journal-title":"J. ICT Stand."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1):23\u201330 (2010) (Elsevier)","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Acharya, R., Asha, K.: Data integrity and intrusion detection in wireless sensor networks. In: Proceedings of IEEE ICON 2008, New Delhi, India (2008)","DOI":"10.1109\/ICON.2008.4772642"},{"issue":"2","key":"4_CR22","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"4_CR23","unstructured":"Floerkemeier, C., Bhattacharyya, R., Sarma, S.: Beyond RFID. In: Proceedings of TIWDC 2009, Pula, Italy (2009)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Sung, J., Sanchez Lopez, T., Kim, D.: The EPC sensor network for RFID and WSN integration infrastructure. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 618\u2013621 (2007)","DOI":"10.1109\/PERCOMW.2007.113"},{"key":"4_CR25","unstructured":"Commission of the European Communities, Early Challenges Regarding the \u201cInternet of Things\u201d (2008)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. In: IETF RFC 4919 (2007)","DOI":"10.17487\/rfc4919"},{"issue":"3","key":"4_CR27","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/329124.329126","volume":"3","author":"M Weiser","year":"1999","unstructured":"Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3\u201311 (1999)","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"4_CR28","unstructured":"Monthly Statistics of Agriculture: Forestry and Fisheries, Japanese Ministry of Agriculture Forestry and Fisheries (2014)"}],"container-title":["Intelligent Systems Reference Library","New Approaches in Intelligent Control"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32168-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T20:24:59Z","timestamp":1748982299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32168-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319321660","9783319321684"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32168-4_4","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"value":"1868-4394","type":"print"},{"value":"1868-4408","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}