Skip to main content
Log in

NotifyMiner: rule based user behavioral machine learning approach for context wise personalized notification services

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This paper devises the issue of machine learning rule-based methodology for uncovering the behavior-based rules of respective smart-phone users for purpose of providing context wise individualized notification services. Nowadays, the number of notifications arrived at an inappropriate moment of time or carried unrelated material, which can cause disruption. Previously Rule-based Classifier and Association Rule Mining (ARM) Techniques have been used to solve those problems. However, the classifier approach processes accuracy and reliability problems because of small data instances. ARM creates a vast number of redundant rules, which are pointless for creating context-aware decisions. Redundant rules can make the approach non-efficient and also make the dataset unnecessarily large, making decision-based problems more complicated. For those problems solution in this article, we propose a new Behavioral Adversarial Traversal Tree approach for extracting user behavioral rules with respect to different contexts. A real-world dataset is collected to make this approach more relevant. The Proposed approach effectively identifies and removes the redundant rules with individual behavior-oriented time slots, which are used in the proposed approach to make it more exact and efficient. Our experiments and comparisons on each individual contextual dataset exhibit that the following rule discovery approach is more adequate and more exact for context-aware notification services.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability statement

The datasets generated and analyzed during the current study are not publicly available due to privacy Reasons and Ethical Concerns (Data includes personal information’s, notifications and contacts) but are available from the corresponding author on reasonable request.

Notes

  1. https://developer.android.com/guide/topics/location/transitions.

  2. https://developer.android.com/reference/android/service/notification/NotificationListenerService.

References

  • Adamczyk PD, Bailey BP (2004) If not now, when? the effects of interruption at different moments within task execution. In: Proceedings of the SIGCHI conference on Human factors in computing systems, p 271–278

  • Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD international conference on Management of data, p 207–216

  • Agrawal R, Srikant R et al (1994) Fast algorithms for mining association rules. In: Proceedings 20th international conference very large data bases, vol 1215. VLDB, p 487–499. Citeseer

  • Bailey BP, Konstan JA, Carlis JV (2000) Measuring the effects of interruptions on task performance in the user interface. In: Smc 2000 conference proceedings. 2000 IEEE international conference on systems, man and cybernetics.’cybernetics evolving to systems, humans, organizations, and their complex interactions’(cat. no. 0), vol 2. IEEE, p 757–762

  • Bidgoli BM, Analoui M, Rezvani MH, Shahhoseini HS (2008) Performance evaluation of decision tree for intrusion detection using reduced feature spaces. Trends Intell Syst Comput Eng 6:273–284

    Article  Google Scholar 

  • Borst JP, Taatgen NA, Van Rijn H (2010) The problem state: a cognitive bottleneck in multitasking. J Exp Psychol: Learn mem cogn 36(2):363

    Google Scholar 

  • Clark HH (1996) Using language. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Cutrell E, Czerwinski M, Horvitz E (2001) Notification, disruption, and memory: effects of messaging interruptions on memory and performance. Hum-Comput Interact: INTERACT 1:263

    Google Scholar 

  • Czerwinski M, Cutrell E, Horvitz E (2000) Instant messaging and interruption: influence of task type on performance. In: OZCHI 2000 conference proceedings, vol 356, p 361–367. Citeseer

  • Das D, Ng W-K, Woon Y-K (2001) Rapid association rule mining. In: Proceedings of the tenth international conference on Information and knowledge management, p 474–481

  • Fischer JE, Yee N, Bellotti V, Good N, Benford S, Greenhalgh C (2010) Effects of content and time of delivery on receptivity to mobile interruptions. In: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, p 103–112

  • Fischer JE, Greenhalgh C, Benford S (2011) Investigating episodes of mobile phone activity as indicators of opportune moments to deliver notifications. In: Proceedings of the 13th international conference on human computer interaction with mobile devices and services, p 181–190

  • Forkan ARM, Khalil I, Tari Z, Foufou S, Bouras A (2015) A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living. Pattern Recogn 48(3):628–641

    Article  Google Scholar 

  • Freitas AA (2000) Understanding the crucial differences between classification and discovery of association rules: a position paper. AcM sIGKDD Explor Newsl 2(1):65–69

    Article  Google Scholar 

  • Han J, Pei J, Yin Y (2000) Mining frequent patterns without candidate generation. ACM Sigmod Record 29(2):1–12

    Article  Google Scholar 

  • Ho J, Intille SS (2005) Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proceedings of the SIGCHI conference on human factors in computing systems, p 909–918

  • Hong J, Suh E-H, Kim J, Kim SY (2009) Context-aware system for proactive personalized service based on context history. Expert Syst Appl 36(4):7448–7457

    Article  Google Scholar 

  • Houtsma M, Swami A (1995) Set-oriented mining for association rules in relational databases. In: Proceedings of the eleventh international conference on data engineering, IEEE, p 25–33

  • Ian HW, Eibe F (2005) Data mining: practical machine learning tools and techniques. Elsevier, Amsterdam

    MATH  Google Scholar 

  • Iqbal ST, Horvitz E (2010) Notifications and awareness: a field study of alert usage and preferences. In: Proceedings of the 2010 ACM conference on Computer supported cooperative work, p 27–30

  • Lathia N, Rachuri K, Mascolo C, Roussos G (2013) Open source smartphone libraries for computational social science. In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, p 911–920

  • Lee W-P (2007) Deploying personalized mobile services in an agent-based environment. Expert Syst Appl 32(4):1194–1207

    Article  Google Scholar 

  • Liu B, Hsu W, Ma Y et al (1998) Integrating classification and association rule mining. KDD 98:80–86

    Google Scholar 

  • Mehrotra A, Musolesi M, Hendley R, Pejovic V (2015) Designing content-driven intelligent notification mechanisms for mobile applications. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, p 813–824

  • Mehrotra A, Pejovic V, Vermeulen J, Hendley R, Musolesi M (2016) My phone and me: understanding people’s receptivity to mobile notifications. In: Proceedings of the 2016 CHI conference on human factors in computing systems, p 1021–1032

  • Monk CA, Boehm-Davis DA, Trafton JG (2002) The attentional costs of interrupting task performance at various stages. In: Proceedings of the human factors and ergonomics society annual meeting, vol 46, no 22, pp 1824–1828. https://doi.org/10.1177/154193120204602210

  • Oulasvirta A, Rattenbury T, Ma L, Raita E (2012) Habits make smartphone use more pervasive. Per Ubiquitous Comput 16(1):105–114

    Article  Google Scholar 

  • Pejovic P, Musolesi M (2014) Interruptme: designing intelligent prompting mechanisms for pervasive applications. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, p 897–908

  • Pielot M, Church K, De Oliveira R (2014) An in-situ study of mobile phone notifications. In: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, p 233–242

  • Roy SS, Madhu Viswanatham V (2016) Classifying spam emails using artificial intelligent techniques. Int J Eng Res Africa 22:152–161 (Trans Tech Publ)

    Article  Google Scholar 

  • Sahami Shirazi A, Henze N, Dingler T, Pielot M, Weber D, Schmidt A (2014) Large-scale assessment of mobile notifications. In: Proceedings of the SIGCHI conference on Human factors in computing systems, p 3055–3064

  • Samui P, Roy SS, Balas VE (2017) Handbook of neural computation. Academic Press, Cambridge

    Google Scholar 

  • Sarker IH (2019) A machine learning based robust prediction model for real-life mobile phone data. Internet Things 5:180–193

    Article  Google Scholar 

  • Scheffer T (2001) Finding association rules that trade support optimally against confidence. In: European conference on principles of data mining and knowledge discovery. Springer, pp 424–435

  • Srinivasan V, Moghaddam S, Mukherji A, Rachuri KK, Xu C, Tapia EM (2014) Mobileminer: mining your frequent patterns on your phone. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, p 389–400

  • Stothart C, Mitchum A, Yehnert C (2015) The attentional cost of receiving a cell phone notification. J Exp Psychol: Hum Percept perform 41(4):893

    Google Scholar 

  • Varol Altay E, Alatas B (2020) Performance analysis of multi-objective artificial intelligence optimization algorithms in numerical association rule mining. J Ambient Intell Hum Comput 11(8):3449–3469

    Article  Google Scholar 

  • Witten IH, Eibe F, Hall Mark A, Pal CJ (2005) Practical machine learning tools and techniques. Data Mining 2:4

    Google Scholar 

  • Zhu H, Chen E, Xiong H, Kuifei Yu, Cao H, Tian J (2014) Mining mobile user preferences for personalized context-aware recommendation. ACM Trans Intell Syst Technol (TIST) 5(4):1–27

    Google Scholar 

  • Zulkernain S, Madiraju P, Ahamed SI, Stamm K (2010) A mobile intelligent interruption management system. J Univ Comupt Sci 16:2060

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Lu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M.F., Lu, L., Toseef, M. et al. NotifyMiner: rule based user behavioral machine learning approach for context wise personalized notification services. J Ambient Intell Human Comput 14, 13301–13317 (2023). https://doi.org/10.1007/s12652-022-03785-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03785-1

Keywords

Navigation