Big Data Approach in an ICT Agriculture Application

  • R. Dennis A. Ludena
  • Alireza AhraryEmail author
Part of the Intelligent Systems Reference Library book series (ISRL, volume 107)


The advent of Big Data analytics is changing some of the current knowledge paradigms in science as well in industry. Even though, the term and some of the core methodologies are not new and have been around for many years, the continuous price reduction of hardware and related services (e.g. cloud computing) are making more affordable the application of such methodologies to almost any research area in academic institutions or company research centers. It is the aim of this chapter to address these concerns because big data methodologies will be extensively used in the new ICT Agriculture project, in order to know how to handle them, and how they could impact normal operations among the project members, or the information flow between the system parts. The new paradigm of Big Data and its multiple benefits have being used in the novel nutrition-based vegetable production and distribution system in order to generate a healthy food recommendation to the end user and to provide different analytics to improve the system efficiency. Also, different version of the user interface (PC and Smartphone) was designed keeping in mind features like: easy navigation, usability, etc.


Sensor Network Augmented Reality Young Farmer Japanese Farmer Supply Chain Management Improvement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Ludeña, R.D.A., Ahrary, A.: Big Data approach in an ICT agriculture project. In: Proceedings for the 5th IEEE International Conference on Awareness Science and Technology (iCAST 2013), Aizu-Wakamatsu, Japan, pp. 261–265 (2013)Google Scholar
  2. 2.
    Ludeña, R.D.A., Ahrary, A.: A Big Data approach for a new ICT agriculture application development. In: Proceedings for the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Beijing, China, pp. 140–143 (2013)Google Scholar
  3. 3.
    Meeder, B., Tam, J., Kelley, P.G., Cranor, L.F.: RT @IWantPrivacy: widespread violation of privacy settings in the twitter social network. In: Proceedings of Web 2.0 Security and Privacy (W2SP 2011), Oakland, CA, USA (2011)Google Scholar
  4. 4.
    Manovich, L.: Trending: the promises and the challenges of big social data. In: Gold, M.K. (ed.) Debates in the Digital Humanities. The University of Minnesota Press, Minneapolis (2011)Google Scholar
  5. 5.
    Zimmer, M.: More on the “Anonymity” of the Facebook dataset—It’s Harvard College. Blog (2011)Google Scholar
  6. 6.
    Beyer, M.A., Laney, D.: The Importance of “Big Data”: A Definition. Gartner, Stamford (2012)Google Scholar
  7. 7.
    Jacobs, A.: The pathologies of Big Data. Commun. ACM 52(8), 36–44 (2009)CrossRefGoogle Scholar
  8. 8.
    Bollierm, D.: The Promise and Peril of Big Data. The Aspen Institute, Communications and Society Program, Washington (2010)Google Scholar
  9. 9.
    Latour, B.: Tarde’s idea of quantification. In: Candea, M. (ed.) The Social After Gabriel Trade: Debates and Assessments, pp. 145–162. Routledge, London (2011)Google Scholar
  10. 10.
    Agrawal, D., Bernstein, P., et al.: Challenges and Opportunities with Big Data. Community white paper, Purdue University, West Lafayette, Indiana (2011)Google Scholar
  11. 11.
    Gitelman, L.: Raw Data Is An Oxymoron. Massachusetts Institute of Technology Press, Cambridge (2013)Google Scholar
  12. 12.
    Research Trends: Special Issue on Big Data, Elsevier, Issue 30 (2012)Google Scholar
  13. 13.
    deRoos, D., Eaton, C., Lapis, G.: Paul Zikopoulos, Tom Deutsch, “Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. McGraw-Hill, New York (2012)Google Scholar
  14. 14.
    Ludeña, R.D.A., Ahrary, A.: Big data application to the vegetable production and distribution system. In: Proceedings for the 2014 IEEE 10th International Colloquium on Signal Processing & Its Applications (CSPA 2014), pp. 20–24, Kuala Lumpur, Malaysia (2014)Google Scholar
  15. 15.
    Ahrary, A., Ludeña, R.D.A.: Big Data approach to a novel nutrition-based vegetable production and distribution system. In: Proceedings of The International Conference on Computational Intelligence and Cybernetics (CyberneticsCom 2013), pp. 131–135, Yogyakarta, Indonesia (2013)Google Scholar
  16. 16.
    Savola, R.M., Abie, H.: Metrics-driven security objective decomposition for an e-health application with adaptive security management. In: Proceedings of the International Workshop on Adaptive Security (ASPI 2013), Article No. 6, New York, NY, USA (2013)Google Scholar
  17. 17.
    Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP-based internet of things: an algorithmic overview. Algorithms 6(2), 197–226 (2013)CrossRefGoogle Scholar
  18. 18.
    Ning, H., Liu, H.: Cyber-physical-social based security architecture for future internet of things. Adv. Internet Things 2(1), 1–7 (2012)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Sivabalan, A., Rajan, M.A., Balamuralidhar, P.: Towards a light weight internet of things platform architecture. J. ICT Stand. 1, 241–252 (2013)CrossRefGoogle Scholar
  20. 20.
    Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1):23–30 (2010) (Elsevier)Google Scholar
  21. 21.
    Acharya, R., Asha, K.: Data integrity and intrusion detection in wireless sensor networks. In: Proceedings of IEEE ICON 2008, New Delhi, India (2008)Google Scholar
  22. 22.
    Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  23. 23.
    Floerkemeier, C., Bhattacharyya, R., Sarma, S.: Beyond RFID. In: Proceedings of TIWDC 2009, Pula, Italy (2009)Google Scholar
  24. 24.
    Sung, J., Sanchez Lopez, T., Kim, D.: The EPC sensor network for RFID and WSN integration infrastructure. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 618–621 (2007)Google Scholar
  25. 25.
    Commission of the European Communities, Early Challenges Regarding the “Internet of Things” (2008)Google Scholar
  26. 26.
    Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. In: IETF RFC 4919 (2007)Google Scholar
  27. 27.
    Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3–11 (1999)CrossRefGoogle Scholar
  28. 28.
    Monthly Statistics of Agriculture: Forestry and Fisheries, Japanese Ministry of Agriculture Forestry and Fisheries (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Computer and Information SciencesSojo UniversityKumamotoJapan
  2. 2.Faculty of Computer and Information SciencesSojo UniversityKumamotoJapan

Personalised recommendations