{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:28:53Z","timestamp":1725715733668},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"DOI":"10.1145\/3386164.3387295","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:30:15Z","timestamp":1591493415000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A General Architecture for a Real-Time Monitoring System Based on the Internet of Things"],"prefix":"10.1145","author":[{"given":"Nilakantha","family":"Paudel","sequence":"first","affiliation":[{"name":"Gran Sasso Science Institute, Viale Francesco Crispi, L'Aquila AQ, Italy"}]},{"given":"Ram C.","family":"Neupane","sequence":"additional","affiliation":[{"name":"Texas A&M University-Texarkana, Texarkana, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2015.12.003"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.281"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7793281"},{"key":"e_1_3_2_1_4_1","first-page":"275","volume-title":"2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH)","author":"Moosavi S. R.","year":"2014","unstructured":"Anurag, S. R. Moosavi , A. M. Rahmani , T. Westerlund , G. Yang , P. Liljeberg , and H. Tenhunen . Pervasive health monitoring based on internet of things: Two case studies . In 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH) , pages 275 -- 278 , Nov 2014 . Anurag, S. R. Moosavi, A. M. Rahmani, T. Westerlund, G. Yang, P. Liljeberg, and H. Tenhunen. Pervasive health monitoring based on internet of things: Two case studies. In 2014 4th International Conference on Wireless Mobile Communication and Healthcare - Transforming Healthcare Through Innovations in Mobile and Wireless Technologies (MOBIHEALTH), pages 275--278, Nov 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220670209598786"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2346625"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2302750"},{"volume-title":"Eclipse paho. https:\/\/www.eclipse.org\/paho\/","author":"Foundation Eclipse","key":"e_1_3_2_1_8_1","unstructured":"Eclipse Foundation . Eclipse paho. https:\/\/www.eclipse.org\/paho\/ . MQTT Client Library . Eclipse Foundation. Eclipse paho. https:\/\/www.eclipse.org\/paho\/. MQTT Client Library."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2354835"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0954405411405575"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306383"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306397"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306771"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510742"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3398-2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.13.2013.0040"},{"key":"e_1_3_2_1_17_1","unstructured":"IBM Developer. Scan your app to find and fix OWASP Top 10--2017 vulnerabilities. https:\/\/developer.ibm.com\/tutorials\/se-owasp-top10\/. Secure web mobile and cloud applications. IBM Developer. Scan your app to find and fix OWASP Top 10--2017 vulnerabilities. https:\/\/developer.ibm.com\/tutorials\/se-owasp-top10\/. Secure web mobile and cloud applications."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(86)90004-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2413397"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/634278"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.39"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655207"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845044"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2337519"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"4706","DOI":"10.1109\/WCNC.2013.6555337","volume-title":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","author":"Sun L.","year":"2013","unstructured":"L. Sun , H. Tian , and L. Xu . A joint energy-saving mechanism for M2M communications in LTE-based system . In 2013 IEEE Wireless Communications and Networking Conference (WCNC) , pages 4706 -- 4711 , April 2013 . L. Sun, H. Tian, and L. Xu. A joint energy-saving mechanism for M2M communications in LTE-based system. In 2013 IEEE Wireless Communications and Networking Conference (WCNC), pages 4706--4711, April 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525600"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2393491"},{"key":"e_1_3_2_1_29_1","unstructured":"mqtt-v3.1.1-plus errata01. MQTT version 3.1.1. http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/os\/mqtt-v3.1.1-os.html October 2014. OASIS Standard. mqtt-v3.1.1-plus errata01. MQTT version 3.1.1. http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v3.1.1\/os\/mqtt-v3.1.1-os.html October 2014. OASIS Standard."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2502401"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2015.7154732"},{"key":"e_1_3_2_1_32_1","volume-title":"Internet of things platform for smart farming: Experiences and lessons learnt. Sensors, 16(11)","author":"Jayaraman P. P.","year":"2016","unstructured":"P. P. Jayaraman , A. Yavari , D. Georgakopoulos , A. Morshed , and A. Zaslavsky . Internet of things platform for smart farming: Experiences and lessons learnt. Sensors, 16(11) , 2016 . P. P. Jayaraman, A. Yavari, D. Georgakopoulos, A. Morshed, and A. Zaslavsky. Internet of things platform for smart farming: Experiences and lessons learnt. Sensors, 16(11), 2016."},{"volume-title":"https:\/\/m2mqtt.wordpress.com\/download\/","author":"Patierno Paolo","key":"e_1_3_2_1_33_1","unstructured":"Paolo Patierno . M2mqtt. https:\/\/m2mqtt.wordpress.com\/download\/ . MQTT Client Library for Dot Net Platform . Paolo Patierno. M2mqtt. https:\/\/m2mqtt.wordpress.com\/download\/. MQTT Client Library for Dot Net Platform."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9272-4"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2302638"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46145-0_17"},{"key":"e_1_3_2_1_37_1","volume-title":"Fisher discriminant analysis with kernels","author":"Mika S.","year":"1999","unstructured":"S. Mika , G. R\u00e4tsch , J. Weston , B. Sch\u00f6lkopf , and K.-R. M\u00fcller . Fisher discriminant analysis with kernels , 1999 . S. Mika, G. R\u00e4tsch, J. Weston, B. Sch\u00f6lkopf, and K.-R. M\u00fcller. Fisher discriminant analysis with kernels, 1999."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2016.2618724"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.10.004"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.6.6.439-459"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2015.7133626"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2716344"},{"key":"e_1_3_2_1_43_1","first-page":"1","volume-title":"Challenges and Issues in Designing Architectures and Protocols for Wireless Mesh Networks","author":"Gungor V.","year":"2008","unstructured":"V. Gungor , E. Natalizio , P. Pace , and S. Avallone . Challenges and Issues in Designing Architectures and Protocols for Wireless Mesh Networks , pages 1 -- 27 . Springer US , Boston, MA , 2008 . V. Gungor, E. Natalizio, P. Pace, and S. Avallone. Challenges and Issues in Designing Architectures and Protocols for Wireless Mesh Networks, pages 1--27. Springer US, Boston, MA, 2008."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2299233"},{"key":"e_1_3_2_1_45_1","volume-title":"Hanser","author":"Kriesel W. R.","year":"1995","unstructured":"W. R. Kriesel , O. W. Madelung , and K. Bender . ASI: The Actuator-sensor-interface for Automation . Hanser , 1995 . W. R. Kriesel, O. W. Madelung, and K. Bender. ASI: The Actuator-sensor-interface for Automation. Hanser, 1995."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045027"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2304706"},{"key":"e_1_3_2_1_48_1","volume-title":"the Scalable Extensions of HEVC, and Its Applications","author":"Ye Y.","year":"2016","unstructured":"Y. Ye , Y. He , Y.-K. Wang , and H.. SHVC , the Scalable Extensions of HEVC, and Its Applications , volume 01 . ZTE COMMUNICATIONS , 2016 . Y. Ye, Y. He, Y.-K. Wang, and H.. SHVC, the Scalable Extensions of HEVC, and Its Applications, volume 01. ZTE COMMUNICATIONS, 2016."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300338"}],"event":{"name":"ISCSIC 2019: 2019 3rd International Symposium on Computer Science and Intelligent Control","acronym":"ISCSIC 2019","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386164.3387295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T23:40:58Z","timestamp":1673739658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386164.3387295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"references-count":49,"alternative-id":["10.1145\/3386164.3387295","10.1145\/3386164"],"URL":"https:\/\/doi.org\/10.1145\/3386164.3387295","relation":{},"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}