Abstract
Artificial intelligence (AI) techniques have grown rapidly in recent years in the context of computing with smart mobile phones that typically allows the devices to function in an intelligent manner. Popular AI techniques include machine learning and deep learning methods, natural language processing, as well as knowledge representation and expert systems, can be used to make the target mobile applications intelligent and more effective. In this paper, we present a comprehensive view on “mobile data science and intelligent apps” in terms of concepts and AI-based modeling that can be used to design and develop intelligent mobile applications for the betterment of human life in their diverse day-to-day situation. This study also includes the concepts and insights of various AI-powered intelligent apps in several application domains, ranging from personalized recommendation to healthcare services, including COVID-19 pandemic management in recent days. Finally, we highlight several research issues and future directions relevant to our analysis in the area of mobile data science and intelligent apps. Overall, this paper aims to serve as a reference point and guidelines for the mobile application developers as well as the researchers in this domain, particularly from the technical point of view.


Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Peng M, Zeng G, Sun Z, Huang J, Wang H, Tian G (2018) Personalized app recommendation based on app permissions. World Wide Web 21(1):89–104
El Khaddar MA, Boulmalf M (2017) Smartphone: the ultimate iot and ioe device. Smartphones from an applied research perspective, page 137
Zheng P, Ni LM (2006) Spotlight: the rise of the smart phone. IEEE Distributed Systems Online 7(3):3–3
Sarker IH (2019) Context-aware rule learning from smartphone data: survey, challenges and future directions. Journal of Big Data 6(1):1–25
Google trends. In https://trends.google.com/trends/, 2019
Pejovic V, Musolesi M (2014) Interruptme: designing intelligent prompting mechanisms for pervasive applications. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Seattle, WA, USA, 13–17 September, pp.∼897–908. ACM, New York, USA
Finin T, Joshi A, Kagal L, Ratsimore O, Korolev V, Chen H (2001) Information agents for mobile and embedded devices. Cooperative Information Agents V, pages 264–286
Damiao Ribeiro de Almeida, Cláudio de Souza Baptista, Elvis Rodrigues da Silva, Cláudio EC Campelo, Hugo Feitosa de Figueirêdo, and Yuri Almeida Lacerda (2006) A context-aware system based on service-oriented architecture. In Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on, volume 1, pages 6–pp. IEEE
Han J, Pei J, Kamber M (2011) Data mining: concepts and techniques. Elsevier, Amsterdam
Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data 7(1):1–29
Ślusarczyk B (2018) Industry 4.0: Are we ready? Polish Journal of Management Studies, 17
Dey AK (2001) Understanding and using context. Pers Ubiquit Comput 5(1):4–7
Sarker IH, Kayes ASM, Watters P (2019) Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. Journal of Big Data 6(1):1–28
Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: Practical machine learning tools and techniques with java implementations
Sateli B, Cook G, Witte R (2013) Smarter mobile apps through integrated natural language processing services. In International Conference on Mobile Web and Information Systems, pages 187–202. Springer
Cao L (2017) Data science: a comprehensive overview. ACM Computing Surveys (CSUR) 50(3):43
Dourish P (2004) What we talk about when we talk about context. Pers Ubiquit Comput 8(1):19–30
Schilit BN, Theimer MM (1994) Disseminating active map information to mobile hosts. IEEE Netw 8(5):22–32
Brown PJ, Bovey JD, Chen X (1997) Context-aware applications: from the laboratory to the marketplace. IEEE Pers Commun 4(5):58–64
Brown PJ (1995) The stick-e document: a framework for creating context-aware applications. Electronic Publishing-Chichester 8:259–272
Ryan N, Pascoe J, Morse D (1999) Enhanced reality fieldwork: the context aware archaeological assistant. Bar International Series 750:269–274
Franklin D, Flaschbart J (1998) All gadget and no representation makes jack a dull environment. In Proceedings of the AAAI 1998 Spring Symposium on Intelligent Environments, pages 155–160
Hull R, Neaves P, Bedford-Roberts J (1997) Towards situated computing. In Wearable Computers, 1997. Digest of Papers., First International Symposium on, pages 146–153. IEEE
Ward A, Jones A, Hopper A (1997) A new location technique for the active office. IEEE Pers Commun 4(5):42–47
Rodden T, Cheverst K, Davies K, Dix A (1998) Exploiting context in hci design for mobile systems. In Workshop on human computer interaction with mobile devices, pages 21–22. Glasgow
Schilit B, Adams N, Want R (1994) Context-aware computing applications. In Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pages 85–90. IEEE
Shi Y (2006) Context awareness, the spirit of pervasive computing. In Pervasive Computing and Applications, 2006 1st International Symposium on, pages 6–6. IEEE
Christos Anagnostopoulos, Athanasios Tsounis, and Stathes Hadjiefthymiades (2005) Context management in pervasive computing environments. In Pervasive Services, 2005. ICPS’05. Proceedings. International Conference on, pages 421–424. IEEE
Sarker IH, Kayes ASM (2020) Abc-ruleminer: User behavioral rule-based machine learning method for context-aware intelligent services. Journal of Network and Computer Applications, page 102762
Phithakkitnukoon S, Dantu R, Claxton R, Eagle N (2011) Behavior-based adaptive call predictor. ACM Transactions on Autonomous and Adaptive Systems 6(3):21:1–21:28
Eagle N, Pentland AS (2006) Reality mining: sensing complex social systems. Personal and ubiquitous computing 10(4):255–268
Almeida TA, Hidalgo JMG, Yamakami A (2011) Contributions to the study of sms spam filtering: new collection and results. In Proceedings of the 11th ACM symposium on Document engineering, pages 259–262. ACM
Fischer JE, Yee N, Bellotti V, Good N, Benford S, Greenhalgh C (2010) Effects of content and time of delivery on receptivity to mobile interruptions. In Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, pages 103–112. ACM
Zhu H, Chen E, Xiong H, Yu K, Cao H, Tian J (2014) Mining mobile user preferences for personalized context-aware recommendation. ACM Transactions on Intelligent Systems and Technology (TIST) 5(4):58
Srinivasan V, Moghaddam S, Mukherji A (2014) Mobileminer: Mining your frequent patterns on your phone. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Seattle, WA, USA, 13–17 September, pp.∼389–400. ACM, New York, USA
Kim J, Mielikäinen T (2014) Conditional log-linear models for mobile application usage prediction. In Machine Learning and Knowledge Discovery in Databases, pages 672–687. Springer
Liao Z-X, Pan Y-C, Peng W-C, Lei P-R (2013) On mining mobile apps usage behavior for predicting apps usage in smartphones. In Proceedings of the 22nd International Conference on Information & Knowledge Management, pages 609–618. ACM
Zhu H, Chen E, Xiong H, Cao H, Tian J (2014) Mobile app classification with enriched contextual information. IEEE Trans Mob Comput 13(7):1550–1563
Mehrotra A, Hendley R, Musolesi M (2016) Prefminer: mining user’s preferences for intelligent mobile notification management. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany, 12–16 September, pp.∼1223–1234. ACM, New York, USA.
Halvey M, Keane MT, Smyth B (2005) Time based segmentation of log data for user navigation prediction in personalization. In Proceedings of the International Conference on Web Intelligence, Compiegne, France, 19–22 September, pp.∼636–640. IEEE Computer Society, Washington, DC, USA.
Halvey M, Keane MT, Smyth B (2006) Time based patterns in mobile-internet surfing. In Proceedings of the SIGCHI Conference on Human Factors in computing systems, Montreal, Quebec, Canada, 22–27 April, pp.∼31–34. ACM, New York, USA
Bordino I, Donato D (2012) Extracting interesting association rules from toolbar data. In International Conference on Information and Knowledge Management. ACM
Paireekreng W, Rapeepisarn K, Wong KW (2009) Time-based personalised mobile game downloading. In Transactions on Edutainment II, pp.∼59–69
Rawassizadeh R, Tomitsch M, Wac K, Tjoa AM (2013) Ubiqlog: a generic mobile phone-based life-log framework. Personal and ubiquitous computing 17(4):621–637
Danninger M, Kluge T, Stiefelhagen R (2006) Myconnector: analysis of context cues to predict human availability for communication. In Proceedings of the 8th International Conference on Multimodal Interfaces, pages 12–19. ACM
Khalil A, Connelly K (2005) Improving cell phone awareness by using calendar information. In Human-Computer Interaction, pages 588–600. Springer
Dekel A, Nacht D, Kirkpatrick S (2009) Minimizing mobile phone disruption via smart profile management. In Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, page 43. ACM
Zulkernain S, Madiraju P, Ahamed SI, Stamm K (2010) A mobile intelligent interruption management system. J. UCS 16(15):2060–2080
Pielot M (2014) Large-scale evaluation of call-availability prediction. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, pages 933–937. ACM
Knittel J, Shirazi AS, Henze N, Schmidt A (2013) Utilizing contextual information for mobile communication. In Extended Abstracts on Human Factors in Computing Systems, pages 1371–1376. ACM
Smith J, Dulay N (2014) Ringlearn: Long-term mitigation of disruptive smartphone interruptions. In International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pages 27–35. IEEE
Stern H, Pammer V, Lindstaedt SN (2011) A preliminary study on interruptibility detection based on location and calendar information. Proceedings of Context-Systems Design, Evaluation and Optimisation(CoSDEO)
Vilwock W, Madiraju P, Ahamed SI (2013) A system implementation of interruption management for mobile devices. In Proceedings of the 16th International Conference on Computational Science and Engineering, pages 181–187. IEEE
Bohmer M, Lander C, Gehring S, Brumby DP, Kruger A (2014) Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3045–3054. ACM
Grandhi SA, Jones Q (2015) Knock knock whos there? putting the user in control of managing interruptions. International Journal of Human-Computer Studies 79:35–50
Shirazi AS, Henze N, Dingler T, Pielot M, Weber D, Schmidt A (2014) Large-scale assessment of mobile notifications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3055–3064. ACM
Iqbal ST, Horvitz E (2010) Notifications and awareness: a field study of alert usage and preferences. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, pages 27–30. ACM
Kanjo E, Kuss DJ, Ang CS (2017) Notimind: Utilizing responses to smart phone notifications as affective sensors. IEEE Access 5:22023–22035
Turner LD, Allen SM, Whitaker RM (2015) Push or delay? decomposing smartphone notification response behaviour. In Human Behavior Understanding, pages 69–83. Springer
Park M-H, Hong J-H, Cho S-B (2007) Location-based recommendation system using bayesian user’s preference model in mobile devices. In International Conference on Ubiquitous Intelligence and Computing, pages 1130–1139. Springer
Zheng VW, Cao B, Zheng Y, Xie X, Yang Q (2010) Collaborative filtering meets mobile recommendation: A user-centered approach. In AAAI, volume 10, pages 236–241
Kim K-j, Ahn H, Jeong S (2010) Context-aware recommender systems using data mining techniques. In Proceedings of world academy of science, engineering and technology, volume 64, pages 357–362
Liu Q, Ge Y, Li Z, Chen E, Xiong H (2011) Personalized travel package recommendation. In Data Mining (ICDM), 2011 IEEE 11th International Conference on, pages 407–416. IEEE
Shin D, Lee J-w, Yeon J (2009) Context-aware recommendation by aggregating user context. In IEEE Conference on Commerce and Enterprise Computing, Vienna, Austria, Austria, 20–23 July, pp.∼423–430. IEEE Computer Society, Washington, DC, USA
Liu B, Kong D, Cen L, Gong NZ, Jin H, Xiong H (2015) Personalized mobile app recommendation: Reconciling app functionality and user privacy preference. In Proceedings of the 8th ACM International Conference on Web Search and Data Mining, pages 315–324. ACM
Seo S-s, Kwon A, Kang J-M, Strassner J (2011) Pyp: design and implementation of a context-aware configuration manager for smartphones. In International Workshop on Smart Mobile Applications
Bozanta A, Kutlu B (2018) Developing a contextually personalized hybrid recommender system. Mob Inf Syst 2018:1–13
Lee W-P (2007) Deploying personalized mobile services in an agent-based environment. Expert Syst Appl 32(4):1194–1207
Turner LD, Allen SM, Whitaker RM (2015) Interruptibility prediction for ubiquitous systems: conventions and new directions from a growing field. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing, pages 801–812. ACM
Fogarty J, Hudson SE, Atkeson CG, Avrahami D, Forlizzi J, Kiesler S, Lee JC, Yang J (2005) Predicting human interruptibility with sensors. ACM Transactions on Computer-Human Interaction (TOCHI) 12(1):119–146
Bedogni L, Di Felice M, Bononi L (2016) Context-aware android applications through transportation mode detection techniques. Wirel Commun Mob Comput 16(16):2523–2541
Tan GW-H, Ooi K-B, Leong L-Y, Lin B (2014) Predicting the drivers of behavioral intention to use mobile learning: A hybrid sem-neural networks approach. Computers in Human Behavior 36:198–213
Sathiya Keerthi S, Shevade SK, Bhattacharyya C, Murthy KRK (2001) Improvements to platt’s smo algorithm for svm classifier design. Neural computation 13(3):637–649
Breiman L (2001) Random forests. Mach Learn 45(1):5–32
Sarker IH, Colman A, Kabir MA, Han J (2018) Individualized time-series segmentation for mining mobile phone user behavior. The Computer Journal, Oxford University, UK 61(3):349–368
Sarker IH, Colman A, Han J (2019) Recencyminer: mining recency-based personalized behavior from contextual smartphone data. Journal of Big Data 6(1):1–21
Sarker IH, Abushark YB, Khan AI (2020) Contextpca: Predicting context-aware smartphone apps usage based on machine learning techniques. Symmetry 12(4):499
Sarker IH, Alqahtani H, Alsolami F, Khan AI, Abushark YB, Siddiqui MK (2020) Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling. Journal of Big Data 7(1):1–23
Pielot M, De Oliveira R, Kwak H, Oliver N (2014) Didn’t you see my message?: predicting attentiveness to mobile instant messages. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3319–3328. ACM
Bayat A, Pomplun M, Tran DA (2014) A study on human activity recognition using accelerometer data from smartphones. Procedia Computer Science 34:450–457
Ayu MA, Ismail SA, Matin AFA, Mantoro T (2012) A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition. Procedia Engineering 41:224–229
Fetter M, Seifert J, Gross T (2011) Predicting selective availability for instant messaging. In IFIP Conference on Human-Computer Interaction, pages 503–520. Springer
Fisher R, Simmons R (2011) Smartphone interruptibility using density-weighted uncertainty sampling with reinforcement learning. In 2011 10th International Conference on Machine Learning and Applications and Workshops, volume 1, pages 436–441. IEEE
Swati K, Patankar AJ (2014) Effective personalized mobile search using knn. In 2014 International Conference on Data Science & Engineering (ICDSE), pages 157–160. IEEE
Middleton SE, Shadbolt NR, De Roure DC (2004) Ontological user profiling in recommender systems. ACM Transactions on Information Systems (TOIS) 22(1):54–88
Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S, Kyriakakos M, Kalousis A (2009) Predicting the location of mobile users: a machine learning approach. In Proceedings of the 2009 international conference on Pervasive services, pages 65–72. ACM
Riboni D, Bettini C (2011) Cosar: hybrid reasoning for context-aware activity recognition. Pers Ubiquit Comput 15(3):271–289
Zhong E, Tan B, Mo K, Yang Q (2013) User demographics prediction based on mobile data. Pervasive and mobile computing 9(6):823–837
Wang Y, Feng D, Li D, Chen X, Zhao Y, Niu X (2016) A mobile recommendation system based on logistic regression and gradient boosting decision trees. In 2016 International Joint Conference on Neural Networks (IJCNN), pages 1896–1902. IEEE
Ernsting C, Dombrowski SU, Oedekoven M, Julie LO, Kanzler M, Kuhlmey A, Gellert P et al (2017) Using smartphones and health apps to change and manage health behaviors: a population-based survey. Journal of medical Internet research 19(4):e101
Sarker IH (2019) A machine learning based robust prediction model for real-life mobile phone data. Internet of Things 5:180–193
Hong J, Suh E-H, Kim J, Kim SY (2009) Context-aware system for proactive personalized service based on context history. Expert Syst Appl 36(4):7448–7457
Sarker IH, Colman A, Han J, Khan AI, Abushark YB, Salah K (2019) Behavdt: A behavioral decision tree learning to build user-centric context-aware predictive model. Mobile Networks and Applications, pages 1–11
Alawnah S, Sagahyroon A (2017) Modeling of smartphones’ power using neural networks. EURASIP Journal on Embedded Systems 2017(1):22
Leong L-Y, Hew T-S, Tan GW-H, Ooi K-B (2013) Predicting the determinants of the nfc-enabled mobile credit card acceptance: a neural networks approach. Expert Syst Appl 40(14):5604–5620
Chong AY-L (2013) Predicting m-commerce adoption determinants: a neural network approach. Expert Syst Appl 40(2):523–530
Rajashekar D, Nur Zincir-Heywood A, Heywood MI (2016) Smart phone user behaviour characterization based on autoencoders and self organizing maps. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pages 319–326. IEEE
Kandasamy K, Kumar CS (2015) Modified pso based optimal time interval identification for predicting mobile user behaviour in location based services. Indian Journal of Science and Technology 8(S7):185–193
Hartono RN, Pears R, Kasabov N, Worner SP (2014) Extracting temporal knowledge from time series: A case study in ecological data. In Proceedings of the International Joint Conference on Neural Networks, Beijing, China, 6–11 July, pp.∼4237–4243. IEEE Computer Society, Washington, DC, USA
Keogh E, Chu S, Hart D, Pazzani M (2004) Segmenting time series: a survey and novel approach. Data mining in time series databases 57:1–22
Shokoohi-Yekta M, Chen Y, Campana B, Hu B, Zakaria J, Keogh E (2015) Discovery of meaningful rules in time series. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, 10–13 August, pp.∼1085–1094. ACM, New York, USA
Zhang G, Liu X, Yang Y (2015) Time-series pattern based effective noise generation for privacy protection on cloud. IEEE Trans Comput 64(5):1456–1469
Cao H, Bao T, Yang Q, Chen E, Tian J (2010) An effective approach for mining mobile user habits. In Proceedings of the International Conference on Information and knowledge management, Toronto, ON, Canada, 26–30 October, pp.∼1677–1680. ACM, New York, USA
Iqbal H Sarker (2018) Mobile data science: Towards understanding data-driven intelligent mobile applications. EAI Endorsed Transactions on Scalable Information Systems, 5(19)
La Polla M, Martinelli F, Sgandurra D (2012) A survey on security for mobile devices. IEEE communications surveys & tutorials 15(1):446–471
Otrok H, Mizouni R, Bentahar J et al. (2014) Mobile phishing attack for android platform pages 18–23
Dunham K (2008) Mobile malware attacks and defense
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142
John GH, Langley P (1995) Estimating continuous distributions in bayesian classifiers. In Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, pages 338–345. Morgan Kaufmann Publishers Inc.
Quinlan JR (1993) C4.5: Programs for machine learning. Machine Learning
Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) Intrudtree: A machine learning based cyber security intrusion detection model. Symmetry 12(5):754
Aha DW, Kibler D, Albert MK (1991) Instance-based learning algorithms. Machine learning 6(1):37–66
Freund Y, Schapire RE et al. (1996) Experiments with a new boosting algorithm. In Icml, volume 96, pages 148–156. Citeseer
Le Cessie S, Van Houwelingen JC (1992) Ridge estimators in logistic regression. Journal of the Royal Statistical Society: Series C (Applied Statistics) 41(1):191–201
MacQueen J (1967) Some methods for classification and analysis of multivariate observations. In Fifth Berkeley symposium on mathematical statistics and probability, volume 1
Rokach L (2010) A survey of clustering algorithms. In Data Mining and Knowledge Discovery Handbook, pages 269–298. Springer
Sneath PHA (1957) The application of computers to taxonomy. Journal of General Microbiology, 17(1)
Sorensen T (1948) Method of establishing groups of equal amplitude in plant sociology based on similarity of species. Biol. Skr., 5
Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In ACM SIGMOD Record, volume 22, pages 207–216. ACM
Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In Proceedings of the International Joint Conference on Very Large Data Bases, Santiago Chile, pp.∼487–499., volume 1215
Han J, Pei J, Yin Y (2000) Mining frequent patterns without candidate generation. In ACM Sigmod Record, volume 29, pages 1–12. ACM
Das A, Ng W-K, Woon Y-K (2001) Rapid association rule mining. In Proceedings of the tenth international conference on Information and knowledge management, pages 474–481. ACM
Zaki MJ (2000) Scalable algorithms for association mining. IEEE transactions on knowledge and data engineering 12(3):372–390
Sun S, Luo C, Chen J (2017) A review of natural language processing techniques for opinion mining systems. Information fusion 36:10–25
Maedche A, Staab S (2001) Ontology learning for the semantic web. IEEE Intell Syst 16(2):72–79
Grosan C, Abraham A (2011) Rule-based expert systems. Int Underw Syst Des, pages 149–185
Lu J, Wu D, Mao M, Wang W, Zhang G (2015) Recommender system application developments: a survey. Decision Support Systems 74:12–32
Bobadilla J, Ortega F, Hernando A, Gutiérrez A (2013) Recommender systems survey. Knowl-Based Syst 46:109–132
Marine-Roig E, Martin-Fuentes E, Daries-Ramon N (2017) User-generated social media events in tourism. Sustainability 9(12):2250
Belanche D, Flavián M, Pérez-Rueda A (2020) Mobile apps use and wom in the food delivery sector: The role of planned behavior, perceived security and customer lifestyle compatibility. Sustainability 12(10):4275
World health organization: Who. http://www.who.int/
Yi B-J, Lee D-G, Rim H-C (2015) The effects of feature optimization on high-dimensional essay data. Math Probl Eng 2015:1–12
Bobek S, Nalepa GJ, Ślażyński M (2019) Heartdroid†rule engine for mobile and context-aware expert systems. Expert Systems 36(1):e12328
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sarker, I.H., Hoque, M.M., Uddin, M.K. et al. Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions. Mobile Netw Appl 26, 285–303 (2021). https://doi.org/10.1007/s11036-020-01650-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-020-01650-z