Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions | Mobile Networks and Applications Skip to main content
Log in

Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Artificial intelligence (AI) techniques have grown rapidly in recent years in the context of computing with smart mobile phones that typically allows the devices to function in an intelligent manner. Popular AI techniques include machine learning and deep learning methods, natural language processing, as well as knowledge representation and expert systems, can be used to make the target mobile applications intelligent and more effective. In this paper, we present a comprehensive view on “mobile data science and intelligent apps” in terms of concepts and AI-based modeling that can be used to design and develop intelligent mobile applications for the betterment of human life in their diverse day-to-day situation. This study also includes the concepts and insights of various AI-powered intelligent apps in several application domains, ranging from personalized recommendation to healthcare services, including COVID-19 pandemic management in recent days. Finally, we highlight several research issues and future directions relevant to our analysis in the area of mobile data science and intelligent apps. Overall, this paper aims to serve as a reference point and guidelines for the mobile application developers as well as the researchers in this domain, particularly from the technical point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Peng M, Zeng G, Sun Z, Huang J, Wang H, Tian G (2018) Personalized app recommendation based on app permissions. World Wide Web 21(1):89–104

    Google Scholar 

  2. El Khaddar MA, Boulmalf M (2017) Smartphone: the ultimate iot and ioe device. Smartphones from an applied research perspective, page 137

  3. Zheng P, Ni LM (2006) Spotlight: the rise of the smart phone. IEEE Distributed Systems Online 7(3):3–3

    Google Scholar 

  4. Sarker IH (2019) Context-aware rule learning from smartphone data: survey, challenges and future directions. Journal of Big Data 6(1):1–25

    MathSciNet  Google Scholar 

  5. Google trends. In https://trends.google.com/trends/, 2019

  6. Pejovic V, Musolesi M (2014) Interruptme: designing intelligent prompting mechanisms for pervasive applications. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Seattle, WA, USA, 13–17 September, pp.∼897–908. ACM, New York, USA

  7. Finin T, Joshi A, Kagal L, Ratsimore O, Korolev V, Chen H (2001) Information agents for mobile and embedded devices. Cooperative Information Agents V, pages 264–286

  8. Damiao Ribeiro de Almeida, Cláudio de Souza Baptista, Elvis Rodrigues da Silva, Cláudio EC Campelo, Hugo Feitosa de Figueirêdo, and Yuri Almeida Lacerda (2006) A context-aware system based on service-oriented architecture. In Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on, volume 1, pages 6–pp. IEEE

  9. Han J, Pei J, Kamber M (2011) Data mining: concepts and techniques. Elsevier, Amsterdam

    MATH  Google Scholar 

  10. Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data 7(1):1–29

    Google Scholar 

  11. Ślusarczyk B (2018) Industry 4.0: Are we ready? Polish Journal of Management Studies, 17

  12. Dey AK (2001) Understanding and using context. Pers Ubiquit Comput 5(1):4–7

    Google Scholar 

  13. Sarker IH, Kayes ASM, Watters P (2019) Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. Journal of Big Data 6(1):1–28

    Google Scholar 

  14. Witten IH, Frank E, Trigg LE, Hall MA, Holmes G, Cunningham SJ (1999) Weka: Practical machine learning tools and techniques with java implementations

  15. Sateli B, Cook G, Witte R (2013) Smarter mobile apps through integrated natural language processing services. In International Conference on Mobile Web and Information Systems, pages 187–202. Springer

  16. Cao L (2017) Data science: a comprehensive overview. ACM Computing Surveys (CSUR) 50(3):43

    Google Scholar 

  17. Dourish P (2004) What we talk about when we talk about context. Pers Ubiquit Comput 8(1):19–30

    Google Scholar 

  18. Schilit BN, Theimer MM (1994) Disseminating active map information to mobile hosts. IEEE Netw 8(5):22–32

    Google Scholar 

  19. Brown PJ, Bovey JD, Chen X (1997) Context-aware applications: from the laboratory to the marketplace. IEEE Pers Commun 4(5):58–64

    Google Scholar 

  20. Brown PJ (1995) The stick-e document: a framework for creating context-aware applications. Electronic Publishing-Chichester 8:259–272

    Google Scholar 

  21. Ryan N, Pascoe J, Morse D (1999) Enhanced reality fieldwork: the context aware archaeological assistant. Bar International Series 750:269–274

    Google Scholar 

  22. Franklin D, Flaschbart J (1998) All gadget and no representation makes jack a dull environment. In Proceedings of the AAAI 1998 Spring Symposium on Intelligent Environments, pages 155–160

  23. Hull R, Neaves P, Bedford-Roberts J (1997) Towards situated computing. In Wearable Computers, 1997. Digest of Papers., First International Symposium on, pages 146–153. IEEE

  24. Ward A, Jones A, Hopper A (1997) A new location technique for the active office. IEEE Pers Commun 4(5):42–47

    Google Scholar 

  25. Rodden T, Cheverst K, Davies K, Dix A (1998) Exploiting context in hci design for mobile systems. In Workshop on human computer interaction with mobile devices, pages 21–22. Glasgow

  26. Schilit B, Adams N, Want R (1994) Context-aware computing applications. In Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pages 85–90. IEEE

  27. Shi Y (2006) Context awareness, the spirit of pervasive computing. In Pervasive Computing and Applications, 2006 1st International Symposium on, pages 6–6. IEEE

  28. Christos Anagnostopoulos, Athanasios Tsounis, and Stathes Hadjiefthymiades (2005) Context management in pervasive computing environments. In Pervasive Services, 2005. ICPS’05. Proceedings. International Conference on, pages 421–424. IEEE

  29. Sarker IH, Kayes ASM (2020) Abc-ruleminer: User behavioral rule-based machine learning method for context-aware intelligent services. Journal of Network and Computer Applications, page 102762

  30. Phithakkitnukoon S, Dantu R, Claxton R, Eagle N (2011) Behavior-based adaptive call predictor. ACM Transactions on Autonomous and Adaptive Systems 6(3):21:1–21:28

    Google Scholar 

  31. Eagle N, Pentland AS (2006) Reality mining: sensing complex social systems. Personal and ubiquitous computing 10(4):255–268

    Google Scholar 

  32. Almeida TA, Hidalgo JMG, Yamakami A (2011) Contributions to the study of sms spam filtering: new collection and results. In Proceedings of the 11th ACM symposium on Document engineering, pages 259–262. ACM

  33. Fischer JE, Yee N, Bellotti V, Good N, Benford S, Greenhalgh C (2010) Effects of content and time of delivery on receptivity to mobile interruptions. In Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, pages 103–112. ACM

  34. Zhu H, Chen E, Xiong H, Yu K, Cao H, Tian J (2014) Mining mobile user preferences for personalized context-aware recommendation. ACM Transactions on Intelligent Systems and Technology (TIST) 5(4):58

    Google Scholar 

  35. Srinivasan V, Moghaddam S, Mukherji A (2014) Mobileminer: Mining your frequent patterns on your phone. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Seattle, WA, USA, 13–17 September, pp.∼389–400. ACM, New York, USA

  36. Kim J, Mielikäinen T (2014) Conditional log-linear models for mobile application usage prediction. In Machine Learning and Knowledge Discovery in Databases, pages 672–687. Springer

  37. Liao Z-X, Pan Y-C, Peng W-C, Lei P-R (2013) On mining mobile apps usage behavior for predicting apps usage in smartphones. In Proceedings of the 22nd International Conference on Information & Knowledge Management, pages 609–618. ACM

  38. Zhu H, Chen E, Xiong H, Cao H, Tian J (2014) Mobile app classification with enriched contextual information. IEEE Trans Mob Comput 13(7):1550–1563

    Google Scholar 

  39. Mehrotra A, Hendley R, Musolesi M (2016) Prefminer: mining user’s preferences for intelligent mobile notification management. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany, 12–16 September, pp.1223–1234. ACM, New York, USA.

  40. Halvey M, Keane MT, Smyth B (2005) Time based segmentation of log data for user navigation prediction in personalization. In Proceedings of the International Conference on Web Intelligence, Compiegne, France, 19–22 September, pp.636–640. IEEE Computer Society, Washington, DC, USA.

  41. Halvey M, Keane MT, Smyth B (2006) Time based patterns in mobile-internet surfing. In Proceedings of the SIGCHI Conference on Human Factors in computing systems, Montreal, Quebec, Canada, 22–27 April, pp.∼31–34. ACM, New York, USA

  42. Bordino I, Donato D (2012) Extracting interesting association rules from toolbar data. In International Conference on Information and Knowledge Management. ACM

  43. Paireekreng W, Rapeepisarn K, Wong KW (2009) Time-based personalised mobile game downloading. In Transactions on Edutainment II, pp.59–69

  44. Rawassizadeh R, Tomitsch M, Wac K, Tjoa AM (2013) Ubiqlog: a generic mobile phone-based life-log framework. Personal and ubiquitous computing 17(4):621–637

    Google Scholar 

  45. Danninger M, Kluge T, Stiefelhagen R (2006) Myconnector: analysis of context cues to predict human availability for communication. In Proceedings of the 8th International Conference on Multimodal Interfaces, pages 12–19. ACM

  46. Khalil A, Connelly K (2005) Improving cell phone awareness by using calendar information. In Human-Computer Interaction, pages 588–600. Springer

  47. Dekel A, Nacht D, Kirkpatrick S (2009) Minimizing mobile phone disruption via smart profile management. In Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, page 43. ACM

  48. Zulkernain S, Madiraju P, Ahamed SI, Stamm K (2010) A mobile intelligent interruption management system. J. UCS 16(15):2060–2080

    Google Scholar 

  49. Pielot M (2014) Large-scale evaluation of call-availability prediction. In Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, pages 933–937. ACM

  50. Knittel J, Shirazi AS, Henze N, Schmidt A (2013) Utilizing contextual information for mobile communication. In Extended Abstracts on Human Factors in Computing Systems, pages 1371–1376. ACM

  51. Smith J, Dulay N (2014) Ringlearn: Long-term mitigation of disruptive smartphone interruptions. In International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pages 27–35. IEEE

  52. Stern H, Pammer V, Lindstaedt SN (2011) A preliminary study on interruptibility detection based on location and calendar information. Proceedings of Context-Systems Design, Evaluation and Optimisation(CoSDEO)

  53. Vilwock W, Madiraju P, Ahamed SI (2013) A system implementation of interruption management for mobile devices. In Proceedings of the 16th International Conference on Computational Science and Engineering, pages 181–187. IEEE

  54. Bohmer M, Lander C, Gehring S, Brumby DP, Kruger A (2014) Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3045–3054. ACM

  55. Grandhi SA, Jones Q (2015) Knock knock whos there? putting the user in control of managing interruptions. International Journal of Human-Computer Studies 79:35–50

    Google Scholar 

  56. Shirazi AS, Henze N, Dingler T, Pielot M, Weber D, Schmidt A (2014) Large-scale assessment of mobile notifications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3055–3064. ACM

  57. Iqbal ST, Horvitz E (2010) Notifications and awareness: a field study of alert usage and preferences. In Proceedings of the 2010 ACM conference on Computer supported cooperative work, pages 27–30. ACM

  58. Kanjo E, Kuss DJ, Ang CS (2017) Notimind: Utilizing responses to smart phone notifications as affective sensors. IEEE Access 5:22023–22035

    Google Scholar 

  59. Turner LD, Allen SM, Whitaker RM (2015) Push or delay? decomposing smartphone notification response behaviour. In Human Behavior Understanding, pages 69–83. Springer

  60. Park M-H, Hong J-H, Cho S-B (2007) Location-based recommendation system using bayesian user’s preference model in mobile devices. In International Conference on Ubiquitous Intelligence and Computing, pages 1130–1139. Springer

  61. Zheng VW, Cao B, Zheng Y, Xie X, Yang Q (2010) Collaborative filtering meets mobile recommendation: A user-centered approach. In AAAI, volume 10, pages 236–241

  62. Kim K-j, Ahn H, Jeong S (2010) Context-aware recommender systems using data mining techniques. In Proceedings of world academy of science, engineering and technology, volume 64, pages 357–362

  63. Liu Q, Ge Y, Li Z, Chen E, Xiong H (2011) Personalized travel package recommendation. In Data Mining (ICDM), 2011 IEEE 11th International Conference on, pages 407–416. IEEE

  64. Shin D, Lee J-w, Yeon J (2009) Context-aware recommendation by aggregating user context. In IEEE Conference on Commerce and Enterprise Computing, Vienna, Austria, Austria, 20–23 July, pp.∼423–430. IEEE Computer Society, Washington, DC, USA

  65. Liu B, Kong D, Cen L, Gong NZ, Jin H, Xiong H (2015) Personalized mobile app recommendation: Reconciling app functionality and user privacy preference. In Proceedings of the 8th ACM International Conference on Web Search and Data Mining, pages 315–324. ACM

  66. Seo S-s, Kwon A, Kang J-M, Strassner J (2011) Pyp: design and implementation of a context-aware configuration manager for smartphones. In International Workshop on Smart Mobile Applications

  67. Bozanta A, Kutlu B (2018) Developing a contextually personalized hybrid recommender system. Mob Inf Syst 2018:1–13

    Google Scholar 

  68. Lee W-P (2007) Deploying personalized mobile services in an agent-based environment. Expert Syst Appl 32(4):1194–1207

    Google Scholar 

  69. Turner LD, Allen SM, Whitaker RM (2015) Interruptibility prediction for ubiquitous systems: conventions and new directions from a growing field. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing, pages 801–812. ACM

  70. Fogarty J, Hudson SE, Atkeson CG, Avrahami D, Forlizzi J, Kiesler S, Lee JC, Yang J (2005) Predicting human interruptibility with sensors. ACM Transactions on Computer-Human Interaction (TOCHI) 12(1):119–146

    Google Scholar 

  71. Bedogni L, Di Felice M, Bononi L (2016) Context-aware android applications through transportation mode detection techniques. Wirel Commun Mob Comput 16(16):2523–2541

    Google Scholar 

  72. Tan GW-H, Ooi K-B, Leong L-Y, Lin B (2014) Predicting the drivers of behavioral intention to use mobile learning: A hybrid sem-neural networks approach. Computers in Human Behavior 36:198–213

    Google Scholar 

  73. Sathiya Keerthi S, Shevade SK, Bhattacharyya C, Murthy KRK (2001) Improvements to platt’s smo algorithm for svm classifier design. Neural computation 13(3):637–649

    MATH  Google Scholar 

  74. Breiman L (2001) Random forests. Mach Learn 45(1):5–32

    MATH  Google Scholar 

  75. Sarker IH, Colman A, Kabir MA, Han J (2018) Individualized time-series segmentation for mining mobile phone user behavior. The Computer Journal, Oxford University, UK 61(3):349–368

    Google Scholar 

  76. Sarker IH, Colman A, Han J (2019) Recencyminer: mining recency-based personalized behavior from contextual smartphone data. Journal of Big Data 6(1):1–21

    Google Scholar 

  77. Sarker IH, Abushark YB, Khan AI (2020) Contextpca: Predicting context-aware smartphone apps usage based on machine learning techniques. Symmetry 12(4):499

    Google Scholar 

  78. Sarker IH, Alqahtani H, Alsolami F, Khan AI, Abushark YB, Siddiqui MK (2020) Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling. Journal of Big Data 7(1):1–23

    Google Scholar 

  79. Pielot M, De Oliveira R, Kwak H, Oliver N (2014) Didn’t you see my message?: predicting attentiveness to mobile instant messages. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 3319–3328. ACM

  80. Bayat A, Pomplun M, Tran DA (2014) A study on human activity recognition using accelerometer data from smartphones. Procedia Computer Science 34:450–457

    Google Scholar 

  81. Ayu MA, Ismail SA, Matin AFA, Mantoro T (2012) A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition. Procedia Engineering 41:224–229

    Google Scholar 

  82. Fetter M, Seifert J, Gross T (2011) Predicting selective availability for instant messaging. In IFIP Conference on Human-Computer Interaction, pages 503–520. Springer

  83. Fisher R, Simmons R (2011) Smartphone interruptibility using density-weighted uncertainty sampling with reinforcement learning. In 2011 10th International Conference on Machine Learning and Applications and Workshops, volume 1, pages 436–441. IEEE

  84. Swati K, Patankar AJ (2014) Effective personalized mobile search using knn. In 2014 International Conference on Data Science & Engineering (ICDSE), pages 157–160. IEEE

  85. Middleton SE, Shadbolt NR, De Roure DC (2004) Ontological user profiling in recommender systems. ACM Transactions on Information Systems (TOIS) 22(1):54–88

    Google Scholar 

  86. Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S, Kyriakakos M, Kalousis A (2009) Predicting the location of mobile users: a machine learning approach. In Proceedings of the 2009 international conference on Pervasive services, pages 65–72. ACM

  87. Riboni D, Bettini C (2011) Cosar: hybrid reasoning for context-aware activity recognition. Pers Ubiquit Comput 15(3):271–289

    Google Scholar 

  88. Zhong E, Tan B, Mo K, Yang Q (2013) User demographics prediction based on mobile data. Pervasive and mobile computing 9(6):823–837

    Google Scholar 

  89. Wang Y, Feng D, Li D, Chen X, Zhao Y, Niu X (2016) A mobile recommendation system based on logistic regression and gradient boosting decision trees. In 2016 International Joint Conference on Neural Networks (IJCNN), pages 1896–1902. IEEE

  90. Ernsting C, Dombrowski SU, Oedekoven M, Julie LO, Kanzler M, Kuhlmey A, Gellert P et al (2017) Using smartphones and health apps to change and manage health behaviors: a population-based survey. Journal of medical Internet research 19(4):e101

    Google Scholar 

  91. Sarker IH (2019) A machine learning based robust prediction model for real-life mobile phone data. Internet of Things 5:180–193

    Google Scholar 

  92. Hong J, Suh E-H, Kim J, Kim SY (2009) Context-aware system for proactive personalized service based on context history. Expert Syst Appl 36(4):7448–7457

    Google Scholar 

  93. Sarker IH, Colman A, Han J, Khan AI, Abushark YB, Salah K (2019) Behavdt: A behavioral decision tree learning to build user-centric context-aware predictive model. Mobile Networks and Applications, pages 1–11

  94. Alawnah S, Sagahyroon A (2017) Modeling of smartphones’ power using neural networks. EURASIP Journal on Embedded Systems 2017(1):22

    Google Scholar 

  95. Leong L-Y, Hew T-S, Tan GW-H, Ooi K-B (2013) Predicting the determinants of the nfc-enabled mobile credit card acceptance: a neural networks approach. Expert Syst Appl 40(14):5604–5620

    Google Scholar 

  96. Chong AY-L (2013) Predicting m-commerce adoption determinants: a neural network approach. Expert Syst Appl 40(2):523–530

    Google Scholar 

  97. Rajashekar D, Nur Zincir-Heywood A, Heywood MI (2016) Smart phone user behaviour characterization based on autoencoders and self organizing maps. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pages 319–326. IEEE

  98. Kandasamy K, Kumar CS (2015) Modified pso based optimal time interval identification for predicting mobile user behaviour in location based services. Indian Journal of Science and Technology 8(S7):185–193

    Google Scholar 

  99. Hartono RN, Pears R, Kasabov N, Worner SP (2014) Extracting temporal knowledge from time series: A case study in ecological data. In Proceedings of the International Joint Conference on Neural Networks, Beijing, China, 6–11 July, pp.4237–4243. IEEE Computer Society, Washington, DC, USA

  100. Keogh E, Chu S, Hart D, Pazzani M (2004) Segmenting time series: a survey and novel approach. Data mining in time series databases 57:1–22

    Google Scholar 

  101. Shokoohi-Yekta M, Chen Y, Campana B, Hu B, Zakaria J, Keogh E (2015) Discovery of meaningful rules in time series. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, NSW, Australia, 10–13 August, pp.1085–1094. ACM, New York, USA

  102. Zhang G, Liu X, Yang Y (2015) Time-series pattern based effective noise generation for privacy protection on cloud. IEEE Trans Comput 64(5):1456–1469

    MathSciNet  Google Scholar 

  103. Cao H, Bao T, Yang Q, Chen E, Tian J (2010) An effective approach for mining mobile user habits. In Proceedings of the International Conference on Information and knowledge management, Toronto, ON, Canada, 26–30 October, pp.1677–1680. ACM, New York, USA

  104. Iqbal H Sarker (2018) Mobile data science: Towards understanding data-driven intelligent mobile applications. EAI Endorsed Transactions on Scalable Information Systems, 5(19)

  105. La Polla M, Martinelli F, Sgandurra D (2012) A survey on security for mobile devices. IEEE communications surveys & tutorials 15(1):446–471

    Google Scholar 

  106. Otrok H, Mizouni R, Bentahar J et al. (2014) Mobile phishing attack for android platform pages 18–23

  107. Dunham K (2008) Mobile malware attacks and defense

  108. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Google Scholar 

  109. John GH, Langley P (1995) Estimating continuous distributions in bayesian classifiers. In Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, pages 338–345. Morgan Kaufmann Publishers Inc.

  110. Quinlan JR (1993) C4.5: Programs for machine learning. Machine Learning

  111. Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) Intrudtree: A machine learning based cyber security intrusion detection model. Symmetry 12(5):754

    Google Scholar 

  112. Aha DW, Kibler D, Albert MK (1991) Instance-based learning algorithms. Machine learning 6(1):37–66

    Google Scholar 

  113. Freund Y, Schapire RE et al. (1996) Experiments with a new boosting algorithm. In Icml, volume 96, pages 148–156. Citeseer

  114. Le Cessie S, Van Houwelingen JC (1992) Ridge estimators in logistic regression. Journal of the Royal Statistical Society: Series C (Applied Statistics) 41(1):191–201

    MATH  Google Scholar 

  115. MacQueen J (1967) Some methods for classification and analysis of multivariate observations. In Fifth Berkeley symposium on mathematical statistics and probability, volume 1

  116. Rokach L (2010) A survey of clustering algorithms. In Data Mining and Knowledge Discovery Handbook, pages 269–298. Springer

  117. Sneath PHA (1957) The application of computers to taxonomy. Journal of General Microbiology, 17(1)

  118. Sorensen T (1948) Method of establishing groups of equal amplitude in plant sociology based on similarity of species. Biol. Skr., 5

  119. Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In ACM SIGMOD Record, volume 22, pages 207–216. ACM

  120. Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In Proceedings of the International Joint Conference on Very Large Data Bases, Santiago Chile, pp.487–499., volume 1215

  121. Han J, Pei J, Yin Y (2000) Mining frequent patterns without candidate generation. In ACM Sigmod Record, volume 29, pages 1–12. ACM

  122. Das A, Ng W-K, Woon Y-K (2001) Rapid association rule mining. In Proceedings of the tenth international conference on Information and knowledge management, pages 474–481. ACM

  123. Zaki MJ (2000) Scalable algorithms for association mining. IEEE transactions on knowledge and data engineering 12(3):372–390

    Google Scholar 

  124. Sun S, Luo C, Chen J (2017) A review of natural language processing techniques for opinion mining systems. Information fusion 36:10–25

    Google Scholar 

  125. Maedche A, Staab S (2001) Ontology learning for the semantic web. IEEE Intell Syst 16(2):72–79

    Google Scholar 

  126. Grosan C, Abraham A (2011) Rule-based expert systems. Int Underw Syst Des, pages 149–185

  127. Lu J, Wu D, Mao M, Wang W, Zhang G (2015) Recommender system application developments: a survey. Decision Support Systems 74:12–32

    Google Scholar 

  128. Bobadilla J, Ortega F, Hernando A, Gutiérrez A (2013) Recommender systems survey. Knowl-Based Syst 46:109–132

    Google Scholar 

  129. Marine-Roig E, Martin-Fuentes E, Daries-Ramon N (2017) User-generated social media events in tourism. Sustainability 9(12):2250

    Google Scholar 

  130. Belanche D, Flavián M, Pérez-Rueda A (2020) Mobile apps use and wom in the food delivery sector: The role of planned behavior, perceived security and customer lifestyle compatibility. Sustainability 12(10):4275

    Google Scholar 

  131. World health organization: Who. http://www.who.int/

  132. Yi B-J, Lee D-G, Rim H-C (2015) The effects of feature optimization on high-dimensional essay data. Math Probl Eng 2015:1–12

    Google Scholar 

  133. Bobek S, Nalepa GJ, Ślażyński M (2019) Heartdroid†rule engine for mobile and context-aware expert systems. Expert Systems 36(1):e12328

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iqbal H. Sarker.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarker, I.H., Hoque, M.M., Uddin, M.K. et al. Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions. Mobile Netw Appl 26, 285–303 (2021). https://doi.org/10.1007/s11036-020-01650-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-020-01650-z

Keywords