Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 267-271.doi: 10.11896/jsjkx.210700123

• Big Data & Data Science • Previous Articles     Next Articles

Recommendation of Android Application Services via User Scenarios

WANG Yi, LI Zheng-hao, CHEN Xing   

  1. College of Mathematics and Computer Science,Fuzhou University,Fuzhou 350108,China
    Fujian Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University),Fuzhou 350108,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:WANG Yi,born in 1996,postgraduate.His main research interests include Android application service generation and Android application service adaptation.
    CHEN Xing,born in 1985,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include system software,software self-adaptation and cloud computing.
  • Supported by:
    National Key R & D Program of China(2018YFB1004800) and Natural Science Foundation of Fujian Province for Distinguished Young Scholars(2020J06014).

Abstract: With the development of mobile hardware and 5G communication technologies,smart applications are booming,which has penetrated into all the aspects of our life and work.A large number of Android applications not only meet the needs of people's daily life,but also make people need to spend more time to find the applications they want to start.In order to let users quickly find the application they want to start and perform the target function,this paper proposes a method of Android application service recommendation based on user scenarios.Specifically,this paper first analyzes the user scenarios,and extracts the text information in the user scenarios through the Accessibility API.Then,the label corresponding to the text information is calculated based on the method of knowledge base.Finally,through similarity calculation,the services related to user scenarios in the service library are searched,and the most relevant similar services and complementary services are recommended to users.This paper evaluates 300 Android application services of 10 popular apps in Android App store Wandoujia,and verifies the feasibility and effectiveness of the method.

Key words: Android application, Service recommendation, Similarity calculation, User scenario analysis

CLC Number: 

  • TP311
[1] Mobile internet use passes desktop[EB/OL].https://tech-crunch.com/2016/11/01/mobile-internet-use-passes-desktop-for-the-first-time-study-finds.
[2] WANG H,LIU Z,GUO Y,et al.An explorative study of themobile app ecosystem from app developers' perspective[C]//Proceedings of the 26th International Conference on World Wide Web.2017:163-172.
[3] CAO H,LIN M.Mining smartphone data for app usage prediction and recommendations:A survey[J].Pervasive and Mobile Computing,2017,37:1-22.
[4] Tencent Open Platform[EB/OL].https://open.tencent.com/.
[5] Baidu AI Open Platform[EB/OL].https://ai.baidu.com/.
[6] Google Play Developer API[EB/OL].https://developers.goo-gle.cn/androidpublisher/.
[7] Mobile deep linking[EB/OL].https://en.wikipedia.org/wiki/Mobile_deep_linking/.
[8] Activity[EB/OL].https://developer.android.google.cn/guide/components/activities/introactivities?hl=zh_cn.
[9] Google App Indexing[EB/OL].https://developers.google.com/app-indexing/.
[10] Bing App Linking[EB/OL].https://msdn.microsoft.com/en-us/library/dn614167.
[11] Facebook App Links[EB/OL].https://developers.facebook.com/docs/applinks.
[12] MA Y,HU Z,LIU Y,et al.Aladdin:Automating release ofdeep-link APIs on Android[C]//Proceedings of the 2018 World Wide Web Conference.2018:1469-1478.
[13] AZIM T,RIVA O,NATH S.uLink:Enabling user-defined deep linking to app content[C]//Proceedings of the 14th Annual International Conference on Mobile Systems,Applications,and Services.2016:305-318.
[14] Android Accessibility API[EB/OL].http://www.androiddoc.com/guide/topics/ui/accessibility/index.html/.
[15] Wandoujia[EB/OL].https://www.wandoujia.com/.
[16] SHIN C,HONG J H,DEY A K.Understanding and prediction of mobile application usage for smart phones[C]//Proceedings of the 2012 ACM Conference on Ubiquitous Computing.2012:173-182.
[17] XU Y,LIN M,LU H,et al.Preference,context and communities:a multi-faceted approach to predicting smartphone app usage patterns[C]//Proceedings of the 2013 International Symposium on Wearable Computers.2013:69-76.
[18] LEE J,LEE K,JEONG E,et al.Context-aware applicationscheduling in mobile systems:What will users do and not do next?[C]//Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.2016:1235-1246.
[19] LIAO Z X,LEI P R,SHEN T J,et al.Mining temporal profiles of mobile applications for usage prediction[C]//2012 IEEE 12th International Conference on Data Mining Workshops.IEEE,2012:890-893.
[20] RAHNAMOUN R,RAWASSIZADEH R,MASKOOKI A.Learning mobile app usage routine through learning automata[J].arXiv:1608.03507,2016.
[21] PICHILIANI M C,HIRATA C M.Evaluation of the Android accessibility API recognition rate towards a better user expe-rience[C]//International Conference on Universal Access in Human-Computer Interaction.Cham:Springer,2015:340-349.
[22] FERNANDES E,RIVA O,NATH S.Appstract:On-the-fly app content semantics with better privacy[C]//Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking.2016:361-374.
[23] Standford NER[EB/OL].https://nlp.stanford.edu/software/CRF-NER.html.
[24] SHI C Y,XU C J,YANG X J.TFIDF algorithm research project[J].Computer Applications,2009,29(B6):167-170.
[25] RUAN D,PAN H,GAO K.Similar words analysis based on POS-CBOW language model[J].Journal of Hebei University of Science & Technology,2015,36(5):532-538.
[26] HUNG P T,YAMANISHI K.Word2vec skip-gram dimensio-nality selection via sequential normalized maximum likelihood[J].Entropy,2021,23(8):997.
[27] Tencent AI Lab[EB/OL].https://ai.tencent.com/ailab/zh/paper/?page=1/.
[28] YAN P M,TANG W Q.Chinese text classification based on improved BERT[J].Industrial Control Computers,2020,33(7):108-110.
[29] ZHOU X,WU K,CAI H,et al.LogPruner:detect,analyze and prune logging calls in Android apps[J].Science China Information Sciences,2018,61(5):050107:1-050107:3.
[1] WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220.
[2] CHEN Ying-ren, GUO Ying-nan, GUO Xiang, NI Yi-tao, CHEN Xing. Web Page Wrapper Adaptation Based on Feature Similarity Calculation [J]. Computer Science, 2021, 48(11A): 218-224.
[3] ZHONG Ya,GUO Yuan-bo,LIU Chun-hui,LI Tao. User Attributes Profiling Method and Application in Insider Threat Detection [J]. Computer Science, 2020, 47(3): 292-297.
[4] SHAO Xin-xin. Service Recommendation Algorithm Based on Canopy and Shared Nearest Neighbor [J]. Computer Science, 2020, 47(11A): 479-481.
[5] XU Fei-xiang,YE Xia,LI Lin-lin,CAO Jun-bo,WANG Xin. Comprehensive Calculation of Semantic Similarity of Ontology Concept Based on SA-BP Algorithm [J]. Computer Science, 2020, 47(1): 199-204.
[6] WU Yi-fan, CUI Yan-peng, HU Jian-wei. Alert Processing Method Based on Hierarchical Clustering [J]. Computer Science, 2019, 46(4): 203-209.
[7] ZHANG Zong-mei, GUI Sheng-lin, REN Fei. Android Malware Detection Based on N-gram [J]. Computer Science, 2019, 46(2): 145-151.
[8] LU Xian-hua, WANG Hong-jun. Design of Distributed News Clustering System Based on Big Data Computing Framework [J]. Computer Science, 2019, 46(11A): 220-223.
[9] YE Yi-lin, WU Li-fa and YAN Hui-ying. Two-layer Semantics-based Security Detection Approach for Android Native Libraries [J]. Computer Science, 2017, 44(6): 161-167.
[10] SHAO Shu-di, YU Hui-qun and FAN Gui-sheng. Detecting Malware by Combining API and Permission Features [J]. Computer Science, 2017, 44(4): 135-139.
[11] SHEN Li-wei, NING Ke-cheng and ZHAO Wen-yun. Usage Habit-oriented Self-adaptive Method for Android Applications [J]. Computer Science, 2017, 44(4): 104-108.
[12] LV Zhao-jin, SHEN Li-wei and ZHAO Wen-yun. Scenario-oriented Location Method of Android Applications [J]. Computer Science, 2017, 44(2): 216-221.
[13] YAN Ji-wei, LI Ming-su, LU Qiong, YAN Jun and GAO Hong-yu. Analysis and Comparison of Privacy Leak Static Detection Tools for Android Applications [J]. Computer Science, 2017, 44(10): 127-133.
[14] ZHANG Xi-yuan, ZHANG Gang, SHEN Li-wei, PENG Xin and ZHAO Wen-yun. Similarity Analysis of Multi-dimension Features of Android Applications [J]. Computer Science, 2016, 43(3): 199-205.
[15] WANG Shao-wei, LIU Jian-xun, CAO Bu-qing, TANG Ming-dong and WANG Xian. Recommended Method of Mashup Services Based on Information Entropy Multi-attribute Decision-making [J]. Computer Science, 2015, 42(2): 263-266.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!