{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T02:54:08Z","timestamp":1744858448120,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_44","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"455-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["IoT Stream Data Compression Using LDPC Coding"],"prefix":"10.1007","author":[{"given":"Rajni","family":"Jindal","sequence":"first","affiliation":[]},{"given":"Neetesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Patidar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1016\/j.asoc.2017.05.020","volume":"68","author":"Jaejin Jang","year":"2018","unstructured":"Jang, Jaejin, Jung, Im Y., Park, Jong Hyuk: An effective handling of secure data stream in IoT. Appl. Soft Comput. 68, 811\u2013820 (2018)","journal-title":"Appl. Soft Comput."},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Samira Amira Pouyanfar, Yimin Yang, Shu-Ching Chen, Mei-Ling Shyu, S. S. Iyengar, Multimedia Big Data Analytics: A Survey, ACM Computing Surveys, Vol. 51, No. 1, Article 10. Publication date: January 2018, pp. 1\u201334","DOI":"10.1145\/3150226"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Muhammad Usman, Mian Ahmad Jan, Xiangjian He, and Jinjun Chen. 2019. A Survey on Big Multimedia Data Processing and Management in Smart Cities. ACM Comput. Surv. 52, 3, Article 54 (June 2019), pp. 1\u201329","DOI":"10.1145\/3323334"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu, A framework for clustering evolving data streams, in Proc. 29th Int. Conf. Very Large Data Bases, Berlin, Germany, 2003, pp. 81\u201392","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"A. Pughat, V. Sharma, A review on stochastic approach for dynamic power management in wireless sensor networks, Hum. Cent. Comput.Inf.Sci. 5 (4) (2015)","DOI":"10.1186\/s13673-015-0021-6"},{"issue":"2","key":"44_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2019.2908293","volume":"6","author":"Valerio Freschi","year":"2019","unstructured":"Freschi, Valerio, Lattanzi, Emanuele: A Study on the Impact of Packet Length on Communication in Low Power Wireless Sensor Networks Under Interference. IEEE Internet of Things Journal 6(2), 1\u201311 (2019)","journal-title":"IEEE Internet of Things Journal"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Christensen, K., Reviriego, P., Nordman, B., Bennett, M., Mostowfi, M., Maestro, J.A.: IEEE 802.3az: the road to energy efficient ethernet. IEEE Commun. Mag. 1\u20137 (2010)","DOI":"10.1109\/MCOM.2010.5621967"},{"issue":"2","key":"44_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TWC.2018.2883443","volume":"18","author":"W Wang","year":"2019","unstructured":"Wang, W., He, S., Sun, L., Jiang, T., Zhang, Q.: Cross-technology communications for heterogeneous IoT devices through artificial doppler shifts. IEEE Trans. Wireless Commun. 18(2), 1\u201311 (2019)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"44_CR9","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.future.2019.02.005","volume":"96","author":"J Azar","year":"2019","unstructured":"Azar, J., Makhoul, A., Barhamgi, M., Couturier, R.: An energy efficient IoT data compression approach for edge machine learning. Future Gener. Comput. Syst. 96, 168\u2013175 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Schneider, S., Hirzel, M., Gedik, B.: Tutorial: stream processing optimizations. In: ACM DEBS, pp. 249\u201358 (2013)","DOI":"10.1145\/2488222.2488268"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Tsai, C.-W., Lai, C.-F., Chao, H.-C., Vasilakos, A.V.: Big data analytics: a survey. J. Big Data 2(1), 1\u201332 (2015)","DOI":"10.1186\/s40537-014-0007-7"},{"key":"44_CR12","unstructured":"Puthal, D., Ranjan, R., Chen, J.: DLSeF: a dynamic key-length-based efficient real time security verification model for big data stream. In: ACM Transactions on Embedded Computing Systems (TECS), vol. 6, no. 2, (2016)"},{"issue":"1","key":"44_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2017.2785659","volume":"5","author":"T Gomes","year":"2018","unstructured":"Gomes, T., Salgado, F., Pinto, S., Cabral, J., Tavares, A.: A 6LoWPAN accelerator for Internet of things endpoint devices. IEEE Internet Things J. 5(1), 1\u20137 (2018)","journal-title":"IEEE Internet Things J."},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Park, C.-S., Park, W.-S.: A Group-oriented DTLS handshake for secure IoT applications, IEEE Trans. Autonom. Sci. Eng. 15(4), (2018)","DOI":"10.1109\/TASE.2018.2855640"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Liu X., Xiong F., Wang Z., Liang, S.: Design of binary LDPC codes with parallel vector message passing. IEEE Trans. Commun. 66(4), (2018)","DOI":"10.1109\/TCOMM.2017.2783624"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Nomura, R., Han T.S.: Second-order Slepian-Wolf coding theorems for non-mixed and mixed sources. IEEE Trans. Inform. Theory 60(9), (2014)","DOI":"10.1109\/TIT.2014.2339231"},{"issue":"10","key":"44_CR17","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","volume":"52","author":"M Johnson","year":"2004","unstructured":"Johnson, M., Ishwar, P., Prabhakaran, V., Schonberg, D., Ramchandran, K.: on compressing encrypted data. EEE Trans. Signal Process 52(10), 2992\u20133006 (2004)","journal-title":"EEE Trans. Signal Process"},{"issue":"3","key":"44_CR18","first-page":"23","volume":"2","author":"P Kishore","year":"2012","unstructured":"Kishore, P., Nagendra, N., Reddy, K., Murthy, V.: Smoothing and optimal compression of encrypted gray scale images. Int. J. Eng. Res. Appl. (IJERA) 2(3), 23\u201328 (2012)","journal-title":"Int. J. Eng. Res. Appl. (IJERA)"},{"issue":"5","key":"44_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/WCL.2013.13.130292","volume":"2","author":"G Zeng","year":"2013","unstructured":"Zeng, G., Dong, X., Bornemann, J.: Reconfigurable feedback shift register based stream cipher for wireless sensor networks. IEEE Wireless Commun. Lett. 2(5), 1\u20134 (2013)","journal-title":"IEEE Wireless Commun. Lett."},{"key":"44_CR20","unstructured":"SHT75 Datasheet. \nhttp:\/\/legacy.caricoos.org"},{"key":"44_CR21","unstructured":"Semiconductor, N.: NRF5 SDK for IoT. \nhttps:\/\/www.nordicsemsemi.com\/eng\/products\/Bluetoth-low-energy\/nRF5-SDK-for-Iot"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Huerta, R., Mosqueiro, T., Fonollosa, J., Rulkov, N., Rodriguez-Lujan, I.: Online decorrelation of humidity and temperature in chemical sensors for continuous monitoring. Chemometr. Intell. Lab. Syst. (2016)","DOI":"10.1016\/j.chemolab.2016.07.004"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:10:08Z","timestamp":1599552608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}