Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 984375, 6 pages
Research Article

Classification Based on Pruning and Double Covered Rule Sets for the Internet of Things Applications

Department of Computer Science and Engineering, Minnan Normal University, Zhangzhou 363000, China

Received 14 October 2013; Accepted 25 November 2013; Published 5 January 2014

Academic Editors: W. Sun, G. Zhang, and J. Zhou

Copyright © 2014 Shasha Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Hu, Z. Zhang, F. Wang, and K. Zhao, “Optimization of the deployment of temperature nodes based on linear programing in the internet of things,” Tsinghua Science and Technology, pp. 250–258, 2013. View at Google Scholar
  2. M. A. Feki, F. Kawsar, M. Boussard, and L. Trappeniers, “The internet of things: the next technological revolution,” IEEE Computer, vol. 46, no. 2, pp. 24–25, 2013. View at Google Scholar
  3. W. Zhu, J. Yu, and T. Wang, “A Security and privacy model for mobile RFID systems in the internet of things,” in Proceedings of the IEEE 14th International Conference on Communication Technology (ICCT '12), pp. 726–732, November 2012.
  4. C. K. Tham and T. Luo, “Sensing-driven energy purchasing in smart grid cyber-physical system,” IEEE Transactions in Systems, Man and Cybernetics A, vol. 43, no. 4, pp. 773–784, 2013. View at Publisher · View at Google Scholar
  5. X. Xing, J. Wang, and M. Li, “Services and key technologies of the internet of things,” ZTE Communications, no. 2, pp. 26–29, 2010. View at Google Scholar
  6. Z. Qureshi, J. Bansal, and S. Bansal, “A survey on association rule mining in cloud computing,” International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 4, pp. 318–321, 2013. View at Google Scholar
  7. J. R. Quinlan and R. M. Cameron-Jones, “FOIL: a midtern report,” in Proceedings of the European Conference Machine Learning, pp. 3–20, Vienna, Austria.
  8. X. Yin and J. Han, “CPAR: classification based on predictive association rules,” in Data Mining, The SIAM (Society for Industrial and Applied Mathematics) International Conference, May 2003.
  9. X. Wang, Z. Zhou, and G. Pan, “CMER: classification based on multiple excellent rules,” Journal of Theoretical and Applied Information Technology, pp. 661–665, 2013. View at Google Scholar
  10. J. R. Quinlan, “Induction of decision trees,” Machine Learning, vol. 1, no. 1, pp. 81–106, 1986. View at Publisher · View at Google Scholar · View at Scopus
  11. J. R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Series in Machine Learning, Kaufmann Academic, 1993.
  12. Y.-L. Chen, W.-H. Hsu, and Y.-H. Lee, “TASC: two-attribute-set clustering through decision tree construction,” European Journal of Operational Research, vol. 174, no. 2, pp. 930–944, 2006. View at Publisher · View at Google Scholar · View at Scopus