Abstract
This paper devises the issue of machine learning rule-based methodology for uncovering the behavior-based rules of respective smart-phone users for purpose of providing context wise individualized notification services. Nowadays, the number of notifications arrived at an inappropriate moment of time or carried unrelated material, which can cause disruption. Previously Rule-based Classifier and Association Rule Mining (ARM) Techniques have been used to solve those problems. However, the classifier approach processes accuracy and reliability problems because of small data instances. ARM creates a vast number of redundant rules, which are pointless for creating context-aware decisions. Redundant rules can make the approach non-efficient and also make the dataset unnecessarily large, making decision-based problems more complicated. For those problems solution in this article, we propose a new Behavioral Adversarial Traversal Tree approach for extracting user behavioral rules with respect to different contexts. A real-world dataset is collected to make this approach more relevant. The Proposed approach effectively identifies and removes the redundant rules with individual behavior-oriented time slots, which are used in the proposed approach to make it more exact and efficient. Our experiments and comparisons on each individual contextual dataset exhibit that the following rule discovery approach is more adequate and more exact for context-aware notification services.
Similar content being viewed by others
Data availability statement
The datasets generated and analyzed during the current study are not publicly available due to privacy Reasons and Ethical Concerns (Data includes personal information’s, notifications and contacts) but are available from the corresponding author on reasonable request.
References
Adamczyk PD, Bailey BP (2004) If not now, when? the effects of interruption at different moments within task execution. In: Proceedings of the SIGCHI conference on Human factors in computing systems, p 271–278
Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD international conference on Management of data, p 207–216
Agrawal R, Srikant R et al (1994) Fast algorithms for mining association rules. In: Proceedings 20th international conference very large data bases, vol 1215. VLDB, p 487–499. Citeseer
Bailey BP, Konstan JA, Carlis JV (2000) Measuring the effects of interruptions on task performance in the user interface. In: Smc 2000 conference proceedings. 2000 IEEE international conference on systems, man and cybernetics.’cybernetics evolving to systems, humans, organizations, and their complex interactions’(cat. no. 0), vol 2. IEEE, p 757–762
Bidgoli BM, Analoui M, Rezvani MH, Shahhoseini HS (2008) Performance evaluation of decision tree for intrusion detection using reduced feature spaces. Trends Intell Syst Comput Eng 6:273–284
Borst JP, Taatgen NA, Van Rijn H (2010) The problem state: a cognitive bottleneck in multitasking. J Exp Psychol: Learn mem cogn 36(2):363
Clark HH (1996) Using language. Cambridge University Press, Cambridge
Cutrell E, Czerwinski M, Horvitz E (2001) Notification, disruption, and memory: effects of messaging interruptions on memory and performance. Hum-Comput Interact: INTERACT 1:263
Czerwinski M, Cutrell E, Horvitz E (2000) Instant messaging and interruption: influence of task type on performance. In: OZCHI 2000 conference proceedings, vol 356, p 361–367. Citeseer
Das D, Ng W-K, Woon Y-K (2001) Rapid association rule mining. In: Proceedings of the tenth international conference on Information and knowledge management, p 474–481
Fischer JE, Yee N, Bellotti V, Good N, Benford S, Greenhalgh C (2010) Effects of content and time of delivery on receptivity to mobile interruptions. In: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, p 103–112
Fischer JE, Greenhalgh C, Benford S (2011) Investigating episodes of mobile phone activity as indicators of opportune moments to deliver notifications. In: Proceedings of the 13th international conference on human computer interaction with mobile devices and services, p 181–190
Forkan ARM, Khalil I, Tari Z, Foufou S, Bouras A (2015) A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living. Pattern Recogn 48(3):628–641
Freitas AA (2000) Understanding the crucial differences between classification and discovery of association rules: a position paper. AcM sIGKDD Explor Newsl 2(1):65–69
Han J, Pei J, Yin Y (2000) Mining frequent patterns without candidate generation. ACM Sigmod Record 29(2):1–12
Ho J, Intille SS (2005) Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proceedings of the SIGCHI conference on human factors in computing systems, p 909–918
Hong J, Suh E-H, Kim J, Kim SY (2009) Context-aware system for proactive personalized service based on context history. Expert Syst Appl 36(4):7448–7457
Houtsma M, Swami A (1995) Set-oriented mining for association rules in relational databases. In: Proceedings of the eleventh international conference on data engineering, IEEE, p 25–33
Ian HW, Eibe F (2005) Data mining: practical machine learning tools and techniques. Elsevier, Amsterdam
Iqbal ST, Horvitz E (2010) Notifications and awareness: a field study of alert usage and preferences. In: Proceedings of the 2010 ACM conference on Computer supported cooperative work, p 27–30
Lathia N, Rachuri K, Mascolo C, Roussos G (2013) Open source smartphone libraries for computational social science. In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, p 911–920
Lee W-P (2007) Deploying personalized mobile services in an agent-based environment. Expert Syst Appl 32(4):1194–1207
Liu B, Hsu W, Ma Y et al (1998) Integrating classification and association rule mining. KDD 98:80–86
Mehrotra A, Musolesi M, Hendley R, Pejovic V (2015) Designing content-driven intelligent notification mechanisms for mobile applications. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, p 813–824
Mehrotra A, Pejovic V, Vermeulen J, Hendley R, Musolesi M (2016) My phone and me: understanding people’s receptivity to mobile notifications. In: Proceedings of the 2016 CHI conference on human factors in computing systems, p 1021–1032
Monk CA, Boehm-Davis DA, Trafton JG (2002) The attentional costs of interrupting task performance at various stages. In: Proceedings of the human factors and ergonomics society annual meeting, vol 46, no 22, pp 1824–1828. https://doi.org/10.1177/154193120204602210
Oulasvirta A, Rattenbury T, Ma L, Raita E (2012) Habits make smartphone use more pervasive. Per Ubiquitous Comput 16(1):105–114
Pejovic P, Musolesi M (2014) Interruptme: designing intelligent prompting mechanisms for pervasive applications. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, p 897–908
Pielot M, Church K, De Oliveira R (2014) An in-situ study of mobile phone notifications. In: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, p 233–242
Roy SS, Madhu Viswanatham V (2016) Classifying spam emails using artificial intelligent techniques. Int J Eng Res Africa 22:152–161 (Trans Tech Publ)
Sahami Shirazi A, Henze N, Dingler T, Pielot M, Weber D, Schmidt A (2014) Large-scale assessment of mobile notifications. In: Proceedings of the SIGCHI conference on Human factors in computing systems, p 3055–3064
Samui P, Roy SS, Balas VE (2017) Handbook of neural computation. Academic Press, Cambridge
Sarker IH (2019) A machine learning based robust prediction model for real-life mobile phone data. Internet Things 5:180–193
Scheffer T (2001) Finding association rules that trade support optimally against confidence. In: European conference on principles of data mining and knowledge discovery. Springer, pp 424–435
Srinivasan V, Moghaddam S, Mukherji A, Rachuri KK, Xu C, Tapia EM (2014) Mobileminer: mining your frequent patterns on your phone. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, p 389–400
Stothart C, Mitchum A, Yehnert C (2015) The attentional cost of receiving a cell phone notification. J Exp Psychol: Hum Percept perform 41(4):893
Varol Altay E, Alatas B (2020) Performance analysis of multi-objective artificial intelligence optimization algorithms in numerical association rule mining. J Ambient Intell Hum Comput 11(8):3449–3469
Witten IH, Eibe F, Hall Mark A, Pal CJ (2005) Practical machine learning tools and techniques. Data Mining 2:4
Zhu H, Chen E, Xiong H, Kuifei Yu, Cao H, Tian J (2014) Mining mobile user preferences for personalized context-aware recommendation. ACM Trans Intell Syst Technol (TIST) 5(4):1–27
Zulkernain S, Madiraju P, Ahamed SI, Stamm K (2010) A mobile intelligent interruption management system. J Univ Comupt Sci 16:2060
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, M.F., Lu, L., Toseef, M. et al. NotifyMiner: rule based user behavioral machine learning approach for context wise personalized notification services. J Ambient Intell Human Comput 14, 13301–13317 (2023). https://doi.org/10.1007/s12652-022-03785-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-03785-1