Hostname: page-component-586b7cd67f-2plfb Total loading time: 0 Render date: 2024-11-24T06:30:42.315Z Has data issue: false hasContentIssue false

Personalization and rule strategies in data-intensive intelligent context-aware systems

Published online by Cambridge University Press:  25 March 2015

Philip T. Moore
Affiliation:
Ubiquitous Awareness and Intelligent Solutions Lab (UAIS), School of Information Science and Engineering, Lanzhou University, Lanzhou, P. R. China; Shandong Normal University, Jinan City, P. R. China e-mail: [email protected]
Hai V. Pham
Affiliation:
Information Systems Department, School of Information Technology and Communication, Hanoi University of Science and Technolgy, Hanoi, Vietnam; Soft Intelligence Lab, Graduate School of Science and Engineering, Ritsumeikan University, Shiga, Japan e-mail: [email protected]

Abstract

The concept of personalization in its many forms has gained traction driven by the demands of computer-mediated interactions generally implemented in large-scale distributed systems and ad hoc wireless networks. Personalization requires the identification and selection of entities based on a defined profile (a context); an entity has been defined as a person, place, or physical or computational object. Context employs contextual information that combines to describe an entities current state. Historically, the range of contextual information utilized (in context-aware systems) has been limited to identity, location, and proximate data; there has, however, been advances in the range of data and information addressed. As such, context can be highly dynamic with inherent complexity. In addition, context-aware systems must accommodate constraint satisfaction and preference compliance.

This article addresses personalization and context with consideration of the domains and systems to which context has been applied and the nature of the contextual data. The developments in computing and service provision are addressed with consideration of the relationship between the evolving computing landscape and context. There is a discussion around rule strategies and conditional relationships in decision support. Logic systems are addressed with an overview of the open world assumption versus the closed world assumption and the relationship with the Semantic Web. The event-driven rule-based approach, which forms the basis upon which intelligent context processing can be realized, is presented with an evaluation and proof-of-concept. The issues and challenges identified in the research are considered with potential solutions and research directions; alternative approaches to context processing are discussed. The article closes with conclusions and open research questions.

Type
Articles
Copyright
© Cambridge University Press, 2015 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Alter, S. 2008. Defining information systems as work systems: implications for the IS field. European Journal of Information Systems 17(5), 448469.CrossRefGoogle Scholar
Ashford, R., Moore, P., Hu, B., Jackson, M. & Wan, J. 2010. Translational research and context in health monitoring systems. In Proceedings of the Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), February 15–18, 81–86.Google Scholar
Berkan, R. C. & Trubatch, S. L. 1997. Fuzzy Systems Design Principles: Building Fuzzy IF-THEN Rule Bases, IEEE Press.Google Scholar
Berndtsson, M. & Lings, B. 1995. Logical Events and ECA Rules. Technical report, HS-IDA-TR-95-004, University of Skovde. http://citeseerx.ist.psu.edu/legacymapper?did=77063.Google Scholar
Boneh, D., Gentry, C., Lynn, B. & Shacham, H. 2003a. Aggregate and verifiably encrypted signatures from bilinear maps. In Advances in Cryptology-EUROCRYPT 2003, LNCS 2656 (47), 416–432.Google Scholar
Boneh, D., Mironov, I. & Shoup, V. 2003b. A secure signature scheme from bilinear maps. In Topics in Cryptology-CT-RSA 2003, LNCS 2612 (230), 98–110.Google Scholar
Checkland, P. & Holwell, F. 1997. Information, Systems and Information Systems: Making Sense of the Field, John Wiley and Sons.Google Scholar
Coppola, P. & Della, M. A. 2004. The concept of relevance in mobile and ubiquitous access. In Mobile and Ubiquitous Info 2003, LNCS 2954, 1–10.Google Scholar
Dey, A. K. & Abowd, G. D. 1999. Towards a Better Understanding of Context and Context-Awareness. GVU Technical report, GIT-GVU-99-22, Georgia College of Computing, Georgia Institute of Technology.Google Scholar
Gonzales, A. J. & Dankel, D. D. 1993. The Engineering of Knowledge-Based Systems Theory and Practice, Prentice-Hall.Google Scholar
Hayes-Roth, F. 1985. Rule-based systems. Communications of the ACM 28(9), 921932.CrossRefGoogle Scholar
Hildreth, C. R. 1998. On-line library catalogues as IR systems: what can we learn from research? In Future Trends in Information Science and Technology, P.A. Yates Mercer (ed.), Taylor Graham, 925.Google Scholar
Hong, J. Y., Suh, E. H. & Kim, J. K. 2009. Context-aware systems: a literature review and classification. Expert Systems with Applications 36(4), 85098522.Google Scholar
Horrocks, I., Patel-Schneider, P. F., Boley, H., Tabet, S., Grosof, B. & Dean, M. 2004. SWRL: a Semantic Web rule language combining OWL and RuleML. http://www.w3.org/Submission/SWRL/.Google Scholar
Horrocks, I. P., Patel-Schneider, P. F. & van-Harmelen, F. 2003. From SHIQ and RDF to OWL: the making of the Ontology Web Language. Journal of Web Semantics 1(1), 726.Google Scholar
Jena 2012. Jena – a Semantic Web Framework for Java. http://jena.sourceforge.net/index.html.Google Scholar
Jess 2010. Jess: the rule engine for the JavaTM Platform. http://www.jessrules.com/.Google Scholar
Kermarrec, A M., Massoulie, L. & Ganesh, A. J. 2003. Probabilistic reliable dissemination in large-scale systems. IEEE Transactions on Parallel and Distributed Systems 14(2), 248258.Google Scholar
Klir, G. & Yuan, B. 1995. Fuzzy Sets and Fuzzy Logic: Theory and Applications, Prentice-Hall.Google Scholar
Lan, Z., Zheng, Z. & Yawei, L. Y. 2010. Toward automated anomaly identification in large-scale systems. IEEE Transactions on Parallel and Distributed Systems 21(2), 174187.CrossRefGoogle Scholar
Lera, I., Juiz, C. & Puigjaner, R. 2010. OWL-M extension for semantic representations of ontology alignments. In Proceedings of the Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), February 15–18, 956–961.Google Scholar
Lopez, J., Bellas, F., Alberto Pan, A. & Montoto, P. 2011. Trends in practical applications of agents and multiagent systems. Advances in Intelligent and Soft Computing 90, 137144.Google Scholar
Mitchell, T. M. 1997. Machine Learning, McGraw-Hill.Google Scholar
Moore, P. 2009. The complexity of context in mobile information systems. In 1st International Workshop on Heterogeneous Environments and Technologies for Grid and P2P Systems (HETGP’2009), August 19–21, 91–96.Google Scholar
Moore, P. & Hu, B. 2007. A context framework with ontology for personalized and cooperative mobile learning. In Computer Supported Cooperative Work in Design III. LNCS 4402, W. Shen, J. Luo, Z. Lin & J.-P. A. Barthes (eds), Springer-Verlag, 727738.Google Scholar
Moore, P., Hu, B. & Jackson, M. 2010a. Fuzzy ECA rules for pervasive decision-centric personalized mobile learning. In Computational Intelligence for Technology Enhanced Learning. Studies in Computational Intelligence 273, F. Xhafa, S. Caballe, A. Abraham, T. Dardoumis & A. Juan (eds), Springer-Verlag, 2558.Google Scholar
Moore, P., Hu, B. & Jackson, M. 2011. Rule strategies for intelligent context-aware systems: the application of conditional relationships in decision-support. In Proceedings of the Fifth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2011). Korean Bible University, June 30–July 2, 9–16.Google Scholar
Moore, P., Hu, B. & Wan, J. 2010b. ‘Intelligent context’ for personalized mobile learning. In Architectures for Distributed and Complex M-Learning Systems: Applying Intelligent Technologies, S. Caballe, F. Xhafa, T. Daradoumis & A. A. Juan (eds), IGI Global, 232272.Google Scholar
Moore, P., Hu, B. & Wan, J. 2010c. Smart-context: a context ontology for pervasive mobile computing. The Computer Journal 53(2), 191207. http://comjnl.oxfordjournals.org/cgi/reprint/53/2/191.pdf.Google Scholar
Moore, P., Hu, B., Zhu, X., Campbell, W. & Ratcliffe, M. 2007. A survey of context modeling for pervasive cooperative learning. In Proceedings of the International Symposium on Information Technologies and Applications in Education (ISITAE ’07). IEEE, November 23–25, K5-1–K5-6.Google Scholar
Moore, P., Jackson, M. & Hu, B. 2010d. Constraint satisfaction in intelligent context-aware systems. In Proceedings of the Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2010), February 15–18, 75–80.Google Scholar
Moore, P. & Pham, H. V. 2012. Intelligent context with decision support under uncertainty. In Proceedings of the 6th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2012), July 4–6, 977–982.Google Scholar
Nurmi, D., Wolsk, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L. & Zagorodnov, D. 2009. The eucalyptus open-source cloud-computing system. In Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, May18–21, 124–131.Google Scholar
Parsia, B., Sirin, E., Grau, B. C., Ruckhaus, E. & Hewlett, D. 2004. Cautiously Approaching SWRL. Technical report, University of Maryland, December. http://www.cs.uwaterloo.ca/gweddell/cs848/SWRL Parsi et al.pdf.Google Scholar
Pham, H. V., Thang, C., Nakaoka, I., Cooper, E. & Kamei, K. 2011. A proposal of hybrid kansei-som model for stock market investment. International Journal of Innovative Computing, Information and Control 7(5(B)), 28632880.Google Scholar
Protege 2012. Welcome to Protege. http://protege.stanford.edu/.Google Scholar
Rimal, B. P., C., Eunmi & Lumb, I. 2009. A taxonomy and survey of cloud computing systems. In Proceedings of the Fifth International Joint Conference on INC, IMS and IDC (NCM’09). Kookmin University, August 25–27, 44–51.Google Scholar
Saha, D. & Mukherjee, A. 2003. Pervasive computing: a paradigm for the 21st century. IEEE Computer 36(3), 2531.Google Scholar
Salem, B., Nakatsu, R. & Rauterberg, M. 2009. Kansei experience: aesthetic, emotions and inner balance. International Journal of Cognitive Informatics and Natural Intelligence 3, 5464.Google Scholar
Shackle, G. L. S. 1961. Decision, Order and Time in Human Affairs, Cambridge University Press.Google Scholar
Sheth, A. & Ramakrishnan, C. 2003. Semantic (Web) technology in action: ontology driven information systems for search, integration and analysis. IEEE Data Engineering Bulletin. Special Issue on Making the Semantic Web.Google Scholar
Sheth, A., Ramakrishnan, C. & Thomas, C. 2005. Semantics for the Semantic Web: the implicit, the formal and the powerful. International Journal on Semantic Web & Information Systems 1(1), 118.CrossRefGoogle Scholar
SPARQL 2007. SPARQL query language for RDF. http://www.w3.org/TR/rdf-sparql-query/.Google Scholar
SPARQL Update 2012. SPARQL 1.1 Update. http://www.w3.org/TR/sparql11-update/.Google Scholar
Thomas, A. M., Shah, H., Moore, P., Rayson, P., Wilcox, A. J., Osman, K., Evans, C., Chapman, C., Athwal, C., While, D., Pham, H. V. & Mount, S. 2012. E-education 3.0 challenges and opportunities for the future of iCampuses. In Proceedings of the 6th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2012), July 4–6, 953–958.Google Scholar
W3C 2012. W3C Semantic Web activity. http://www.w3.org/2001/sw/.Google Scholar