1.ITU. Recommendation ITU-T Y.2060 (06/2012), http://handle.itu.int/11.1002/1000/11559, 2012.
2.Atzori L, Iera A, Morabito G. The Internet of Things: A survey. Computer Networks. 2010; 54(15):2787-2805.
3.Ma H. Internet of Things: Objectives and Scientific Challenges. J Computer Science Technol. 2011; 26(6):919-924.
4.Evans D, The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco. April 2011. Retrieved 11 June 2016.
5.Chen F, Deng P, Wan J, Zhang D, Vasilakos A, Rong X. Data Mining for the Internet of Things: Literature Review and Challenges. International Journal of Distributed Sensor Networks. 2015; 2015:1-14.
6.Ngai E, Xiu L, Chau D. Application of data mining techniques in customer relationship management: A literature review and classification. Expert Systems with Applications. 2009; 36(2):2592-2602.
7.S. Cuomo, P. D. Michele, A. Galletti and F. Piccialli, ”A Cultural Heritage Case Study of Visitor Experiences Shared on a Social Network,” 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, 2015, pp. 539-544.
8.Angelo Chianese, FiammettaMarulli, Francesco Piccialli, Paolo Benedusi, Jai E. Jung, An associative engines based approach supporting collaborative analytics in the Internet of cultural things, Future Generation Computer Systems, 2016.
9.Wu X, Kumar V, Ross Quinlan J, Gosh J, Yang Q, Motoda H et al. Top 10 algorithms in data mining. Knowledge and Information Systems. 2007;14(1):1-37.
10.BURGES C. A Tutorial on Support Vector Machines for Pattern Recognition.Bell Laboratories and Lucent Technologies. 1998.
11.BurbidgeRBuxton B. An Introduction to Support Vector Machines for Data Mining. UCL: Computer Science Dept. 2001.
12.Li W, Yi P, Wu Y, Pan L, Li J. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.Journal of Electrical and Computer Engineering. 2014; 2014:1-8.
13.Li D, Zhang B, Li C. A Feature Scaling based k-Nearest Neighbor Algorithm for Indoor Positioning Systems. IEEE Internet of Things Journal. 2015;:1-1.
14.BourobouSYoo Y. User Activity Recognition in Smart Homes Using Pattern Clustering Applied to Temporal ANN Algorithm. Sensors. 2015; 15(5):11953-11971.
15.Pang S, Ozawa S, Kasabov N. Incremental Linear Discriminant Analysis for Classification of Data Streams. IEEE Trans Syst, Man, Cybern B. 2005; 35(5):905-914.
16.Li T, Zhu S, Ogihara M. Using discriminant analysis for multi-class classification: an experimental investigation. Knowledge and Information Systems. 2006; 10(4):453-472.
17.Quinlan J. C4.5: Program for machine learning. Morgan Kaufmann; 1993.
18.KuhnMJohnson K. Applied predictive modeling. New York: Springer; 2013.
19.Hssina B, Merbouha A, Ezzikouri H, Erritali M. A comparative study of decision tree ID3 and C4.5.International Journal of Advanced Computer Science and Applications, Special Issue on Advances in Vehicular Ad Hoc Networking and Applications. 2014.
20.Chunyue S, Zhihuan S, Ping L, Wenyuan S. The Study of Naive Bays Algorithm Online in Data Mining.Proceedings of the 5th World Congress on Intelligent Control and Automation.2004; 6:15-19.
|