<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232014000600004</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Recommendation-Aware Smartphone Sensing System]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Mu-Yen]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Ming-Ni]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Chia-Chen]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Young-Long]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Hsien-En]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,National Taichung University of Science and Technology Department of Information Management ]]></institution>
<addr-line><![CDATA[Taichung ]]></addr-line>
<country>Taiwán</country>
</aff>
<aff id="A02">
<institution><![CDATA[,National Chung-Hsing University Department of Management Information Systems ]]></institution>
<addr-line><![CDATA[Taichung ]]></addr-line>
<country>Taiwán</country>
</aff>
<aff id="A03">
<institution><![CDATA[,National Taichung University of Science and Technology Department of Computer Science and Information Engineering ]]></institution>
<addr-line><![CDATA[Taichung ]]></addr-line>
<country>Taiwán</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2014</year>
</pub-date>
<volume>12</volume>
<numero>6</numero>
<fpage>1040</fpage>
<lpage>1050</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232014000600004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232014000600004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232014000600004&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[The context-aware concept is to reduce the gap between users and information systems so that the information systems actively get to understand users' context and demand and in return provide users with better experience. This study integrates the concept of context-aware with association algorithms to establish the context-aware recommendation systems (CARS). The CARS contains three modules and provides the product recommendations for users with their smartphone. First, the simple RSSI Indoor localization module (SRILM) locates the user position and detects the context information surrounding around users. Second, the Apriori recommendation module (ARM) provides effective recommended product information for users through association rules mining. The appropriate product information can be received effectiveness and greatly enhanced the recommendation service.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Context-aware]]></kwd>
<kwd lng="en"><![CDATA[smartphone sensing]]></kwd>
<kwd lng="en"><![CDATA[recommendation service]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Recommendation&#45;Aware Smartphone Sensing System</b></font></p>  	    <p>&nbsp;</p>  	    <p align="center"><font face="verdana" size="2"><b>Mu&#45;Yen Chen<sup>1</sup>, Ming&#45;Ni Wu<sup>1</sup>, Chia&#45;Chen Chen*<sup>2</sup>, Young&#45;Long Chen<sup>3</sup> and Hsien&#45;En Lin<sup>1</sup></b></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>1</i></sup><i>&nbsp;Department of Information Management, National Taichung University of Science and Technology, Taichung, Taiwan.</i></font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>2</i></sup><i>&nbsp;Department of Management Information Systems, National Chung Hsing University, Taichung, Taiwan</i>. *<a href="mailto:emily@nchu.edu.tw">emily@nchu.edu.tw</a></font></p>  	    <p align="justify"><font face="verdana" size="2"><sup><i>3</i></sup><i>&nbsp;Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan.</i></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">The context&#45;aware concept is to reduce the gap between users and information systems so that the information systems actively get to understand users' context and demand and in return provide users with better experience. This study integrates the concept of context&#45;aware with association algorithms to establish the context&#45;aware recommendation systems (CARS). The CARS contains three modules and provides the product recommendations for users with their smartphone. First, the simple RSSI Indoor localization module (SRILM) locates the user position and detects the context information surrounding around users. Second, the Apriori recommendation module (ARM) provides effective recommended product information for users through association rules mining. The appropriate product information can be received effectiveness and greatly enhanced the recommendation service.</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Context&#45;aware, smartphone sensing, recommendation service.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v12n6/v12n6a4.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b><i>Aknowledgments</i></b></font></p>  	    <p align="justify"><font face="verdana" size="2">The authors thank the support of National Scientific Council (NSC) of the Republic of China (ROC) to this work under Grant No. NSC&#45;101&#45;2622&#45;E&#45;025&#45;002&#45;CC3, NSC&#45;102&#45;2622&#45;E&#45;005&#45;014&#45;CC3, and NSC&#45;102&#45;2410&#45;H&#45;005&#45;064. The authors also gratefully acknowledge the Editor and anonymous reviewers for their valuable comments and constructive suggestions.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; R. Agrawal and R. Srikan, "Fast algorithms for mining association rules," Proceedings of the 20th international conference on very large data bases, San Francisco, CA, USA,1994, pp. 478&#45;499.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852202&pid=S1665-6423201400060000400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; T. Kowatsch and W. Maass, "In&#45;store consumer behavior: How mobile recommendation agents influence usage intentions, product purchases, and store preferences," Computers in Human Behavior, vol.26, No.4, pp. 697&#45;704, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852204&pid=S1665-6423201400060000400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Y. L. Chen and Z.R. Chen, "A PID Positioning Controller with a Curve Fitting Model Based on RFID Technology," Journal of Applied Research and Technology, vol. 11, no. 2, pp. 301&#45;310, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852206&pid=S1665-6423201400060000400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; J. Hightower et al., "SpotON: An indoor 3D location sensing technology based on RF signal strength," UW CSE Technical Report, vol. 02, no. 02, pp. 1&#45;16, 2000.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852208&pid=S1665-6423201400060000400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; W. W. T. Ngai et al., "RFID research: An academic literature review (1995&#45;2005) and future research directions,"International Journal of Production Economics, vol. 112, no.2, pp. 510&#45;520, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852210&pid=S1665-6423201400060000400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; P. Prasithsangaree et al., "On Indoor Position Location with Wireless LANs," The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication, no. 2, pp. 720&#45;724, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852212&pid=S1665-6423201400060000400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; L. M. Ni et al., "LANDMARC: indoor location sensing using active RFID," Wireless networks, vol.10, no.6, pp. 701&#45;710, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852214&pid=S1665-6423201400060000400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; V. Alarcon Aquino et al., "Design and Implementation of a Security Layer for RFID Systems," Journal of Applied Research and Technology, vol. 6, no.2, pp. 69&#45;83, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852216&pid=S1665-6423201400060000400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; M. S. Amin et al., "Digital Modulator and Demodulator IC for RFID Tag Employing DSSS and Barker Code," Journal of Applied Research and Technology, vol. 10, no. 6, pp. 819&#45;825, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852218&pid=S1665-6423201400060000400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; F. H. Grupe and M. M. Owrang, "Data base mining discovering new knowledge and competitive advantage", Information Systems Management, vol. 12, no.1, pp. 26&#45;31, 1995.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852220&pid=S1665-6423201400060000400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; U. Fayyad et al., "From data mining to knowledge discovery in databases," AI magazine, vol.17, no.3, pp. 37&#45;54, 1996.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852222&pid=S1665-6423201400060000400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; P. Hadjinian et al., "Discovering data mining: from concept to implementation," vol. 1. Upper Saddle River, NJ: Prentice Hall., 1998.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852224&pid=S1665-6423201400060000400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; J. Han et al., "Data mining: concepts and techniques," Morgan kaufmann, 2001.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852226&pid=S1665-6423201400060000400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; M.Y. Chen et al., "Using RSSI simple localization method to implement the context&#45;aware and social recommendation system," 2013 international applied science and precision engineering conference, 2013, Sun Moon Lake, Taiwan.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4852228&pid=S1665-6423201400060000400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Srikan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Fast algorithms for mining association rules]]></article-title>
<source><![CDATA[e 20th international conference on very large data bases]]></source>
<year>1994</year>
<page-range>478-499</page-range><publisher-loc><![CDATA[San Francisco^eCA CA]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kowatsch]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Maass]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[In-store consumer behavior: How mobile recommendation agents influence usage intentions, product purchases, and store preferences]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2010</year>
<volume>26</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>697-704</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A PID Positioning Controller with a Curve Fitting Model Based on RFID Technology]]></article-title>
<source><![CDATA[Journal of Applied Research and Technology]]></source>
<year>2013</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>301-310</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hightower]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[SpotON: An indoor 3D location sensing technology based on RF signal strength]]></article-title>
<source><![CDATA[UW CSE Technical Report]]></source>
<year>2000</year>
<volume>02</volume>
<numero>02</numero>
<issue>02</issue>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ngai]]></surname>
<given-names><![CDATA[W. W. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[RFID research: An academic literature review (1995-2005) and future research directions]]></article-title>
<source><![CDATA[International Journal of Production Economics]]></source>
<year>2008</year>
<volume>112</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>510-520</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prasithsangaree]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On Indoor Position Location with Wireless LANs]]></article-title>
<source><![CDATA[The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication]]></source>
<year>2002</year>
<page-range>720-724</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ni]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[LANDMARC: indoor location sensing using active RFID]]></article-title>
<source><![CDATA[Wireless networks]]></source>
<year>2004</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>701-710</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alarcon Aquino]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Design and Implementation of a Security Layer for RFID Systems]]></article-title>
<source><![CDATA[Journal of Applied Research and Technology]]></source>
<year>2008</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>69­-83</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amin]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Digital Modulator and Demodulator IC for RFID Tag Employing DSSS and Barker Code]]></article-title>
<source><![CDATA[Journal of Applied Research and Technology]]></source>
<year>2012</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>819-825</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grupe]]></surname>
<given-names><![CDATA[F. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Owrang]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Data base mining discovering new knowledge and competitive advantage]]></article-title>
<source><![CDATA[Information Systems Management]]></source>
<year>1995</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>26-­31</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fayyad]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[From data mining to knowledge discovery in databases]]></article-title>
<source><![CDATA[AI magazine]]></source>
<year>1996</year>
<volume>17</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>37-54</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hadjinian]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Discovering data mining: from concept to implementation]]></source>
<year>1998</year>
<volume>1</volume>
<publisher-loc><![CDATA[Upper Saddle River^eNJ NJ]]></publisher-loc>
<publisher-name><![CDATA[Prentice Hall.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Data mining: concepts and techniques]]></source>
<year>2001</year>
<publisher-name><![CDATA[Morgan kaufmann]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Using RSSI simple localization method to implement the context-aware and social recommendation system]]></article-title>
<source><![CDATA[2013 international applied science and precision engineering conference]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Sun Moon Lake ]]></publisher-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
