1. Thesis Defense Presentation
Contextual Analysis For Trust Evaluations
By ConTED
Presented By Md Tajul Islam ( Matrikel-Nr: 618595 )
Examiner Prof Dr.-Ing. Martin Gaedke
Advisor Valentin Siegert
Distributed and Self-organizing Systems Group
2. Salvi, C., Iannello, P., Cancer, A., McClay, M., Rago, S., Dunsmoor, J. E., & Antonietti, A. (2020, December 4). Going Viral: How Fear, Socio-Cognitive Polarization and Problem-Solving
Influence Fake News Detection and Proliferation During COVID-19 Pandemic. Frontiers. https://doi.org/10.3389/fcomm.2020.562588
Here’s Another Kind Of Review Fraud Happening On Amazon. (2018, May 29). BuzzFeed News. https://www.buzzfeednews.com/article/nicolenguyen/amazon-review-reuse-fraud
MISINFORMATION - Nevada Minority Health and Equity Coalition. (n.d.). Nevada Minority Health and Equity Coalition. https://nmhec.org/misinformation/
Trust Alert
9. Requirements Rating
Decentralization - Central Authorities or Infrastructure dependency
Context Analysis Time - Compared to beforehand calculation
Need For Human Action - Requirement of Human Action
Context Scale - How fast ConTED can use the context
11. Context
Where
Who
What
User Environment
Computing Environment
Physical Environment
Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M., & Steggles, P. (1999). Towards a Better Understanding of Context and Context-Awareness. Handheld and Ubiquitous Computing,
304–307. https://doi.org/10.1007/3-540-48157-5_29
Gwizdka, J., What's in the context?. Computer Human Interaction CHI2000.
Brown, P., Bovey, J., & Xian Chen. (1997). Context-aware applications: from the laboratory to the marketplace. IEEE Personal Communications, 4(5), 58–64.
https://doi.org/10.1109/98.626984
B. Schilit, N. Adams and R. Want, "Context-Aware Computing Applications," 1994 First Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA, 1994, pp. 85-90, doi:
10.1109/WMCSA.1994.16.
12. Location
Identity Time
Activity
Context Catagory
Primary Context
Secondary Context
Context Toolkit: Salber, D., Dey, A. K., & Abowd, G. D. (1999). The context toolkit. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems the CHI Is the Limit - CHI
’99. https://doi.org/10.1145/302979.303126
Classroom + Cyber Guide: Abowd, D., Dey, A. K., Orr, R., & Brotherton, J. (1998, September). Context-awareness in wearable and ubiquitous computing. Virtual Reality, 3(3), 200–211.
https://doi.org/10.1007/bf01408562
Teleport: Brown, M. G. (1996). Supporting User Mobility. Mobile Communications, 69–77. https://doi.org/10.1007/978-0-387-34980-0_8
Responsive office: Elrod, S., Hall, G., Costanza, R., Dixon, M., & Des Rivières, J. (1993, July). Responsive office environments. Communications of the ACM, 36(7), 84–85.
https://doi.org/10.1145/159544.159626
14. Context Vaiables
Using GPS,
Camera, and
Sensor data
To better
understand the
surroundings
Making real-
time context-
aware
decisions
based on user
environment
Extract More
Combine
Analyze
Decision
Weather
Objects
Location
Time
Activity
Mixing up for
new
information
User Environment
N. Ryan, J. Pascoe and D. Morse, “Enhanced Reality Fieldwork: The Context-Aware Archaeological Assistant,” Proceedings of the 25th Anniversary Computer Applications in Archaeology, 1997.”
15. Context Sources
Provide
customize
behaviour and
services.
Processing
Distribution
Middleware
Computing Environment
Processing the
raw data
Using the
contextual
information
Decision
User input
Sensors
Network data
Distributing
contextual
information
Ellebak, K. A survey of context-aware middleware. In Proceedings of the 25th Conference on IASTED International Multi-Conference: Software Engineering, Innsbruck, Austria, 13–15 February
2007; ACTA Press: Innsbruck, Austria, 2007
16. Physical Environment
To identify
patterns,
trends
Extraction Integration
Provide
customize
behaviour and
services.
Processing
GPS location
Time of day
Activity level
Zhou, X., Ren, Z., Sheng, Q. Z., & Vasilakos, A. V.,” Context-aware computing for smart and connected health”, IEEE Transactions on Industrial Informatics, 2018.
18. Contexd ConTED
Context
A Hybrid Model
Works for decentraliazion
web
Use weighted context
information
Express context with a set of
context scale
19. 3
4
1
2
Verification of the
communication or
resource url
SOURCE
Identification of the
sender or receiver
information
IDENTITY
Pulication or
modification
timestamp
TIME
Purpose or usage of
the communication
or resource
USE
Contexd
21. Distribuation of initial weight
Formula for weight calculation
Identity Source Use Time Weight
0.5 0.5 1 1 0.8
0 0.5 1 1 0.45
Contexd Weighting
40%
30%
20%
10%
= Weighted average of primary context information
Wi
= Initial weighted primary context information
Ci
= Value of the context information, [0,1]
Wp
User Environment
Identity
User Environment
Source
User Environment
Use
User Environment
Time
22. Context Scale Rating
Formula for Context Scale Rating
0.8 0.1 1 0.7778
0.45 0.1 1 0.3889
User Environment
User Environment
User Environment
General
Context
Intermediate
Context
Contexd Scale rating
0.55 - 1
0.25 - 0.54
0 - 0.24
CSr
= Context Scale Rating
Wp
= Calculated average weight
CWmin
= Nonzero minimum weight used by any context information
W = Sum of all initial context information weight
General
Intermediate
Critical
25. Contexd Runtime
The number of agents remains constant
Scenario size and number of exchange messages
change from 5 to 250
The number of exchanged messages remains
constant
Scenario size and number of exchange messages
change from 5 to 250
The number of agents, scenario size and number of
exchange messages change from 5 to 250
The number of agents, scenario size, and number of
exchange messages change from 5 to 250
Test Run A
Test Run B
Test Run C
27. Agent (A) has no information related to identity, source,
use, and time. In case it has, the information is not
authetic or biased.
Agent (A) has little information related to identity,
source, use, and time. This information is mixed up with
valid and invalid details.
The number of agents, scenario size and number of
exchange messages change from 5 to 250
Scenario ACC1
Scenario ACC2
Agent (A) has enough information related to identity,
source, use, and time. All the information is either
incomplete or not valid.
Scenario ACC3
The number of agents, scenario size and number of
exchange messages change from 5 to 250
Agent (A) has enough information related to identity,
source, use, and time. All the information is complete
and valid.
Scenario ACC4
Contexd Accuracy
28. Future Work
Adaptability in extraction process
Improvement in scenarios
Calculation of weight
Increasement in scenario size