SlideShare a Scribd company logo
1 of 29
Download to read offline
Thesis Defense Presentation
Contextual Analysis For Trust Evaluations
By ConTED
Presented By Md Tajul Islam ( Matrikel-Nr: 618595 )
Examiner Prof Dr.-Ing. Martin Gaedke
Advisor Valentin Siegert
Distributed and Self-organizing Systems Group
Salvi, C., Iannello, P., Cancer, A., McClay, M., Rago, S., Dunsmoor, J. E., & Antonietti, A. (2020, December 4). Going Viral: How Fear, Socio-Cognitive Polarization and Problem-Solving
Influence Fake News Detection and Proliferation During COVID-19 Pandemic. Frontiers. https://doi.org/10.3389/fcomm.2020.562588
Here’s Another Kind Of Review Fraud Happening On Amazon. (2018, May 29). BuzzFeed News. https://www.buzzfeednews.com/article/nicolenguyen/amazon-review-reuse-fraud
MISINFORMATION - Nevada Minority Health and Equity Coalition. (n.d.). Nevada Minority Health and Equity Coalition. https://nmhec.org/misinformation/
Trust Alert
Travel Agencies
Review websites
Hotel Websites
Let's Book A Hotel
List of Challenges
Data can be compromised
Data can be incomplete
Sources can be unreliable
Trust is subjective
Thanks to ConTED
Use Content Trust
Implement Content factors
Require Contextual analysis
Context &
Criticality!
Resource Data
Interection Partner
C
Behaviorial Analysis
ConTED Flow
Context &
Criticality
Trust
Environment
Trust
Evaluation
Content Analysis
Trust Aware
Decision
C
Context Analysis
Trust
Evaluation
Introduction
Problem Statement
Interested Factors
Problem Importance
Expected Solutions
Requirements
Decentralization
Contextual Analysis Time
Need of Human Action
Context Scale
Requirements Rating
Decentralization - Central Authorities or Infrastructure dependency
Context Analysis Time - Compared to beforehand calculation
Need For Human Action - Requirement of Human Action
Context Scale - How fast ConTED can use the context
Previous Work
Defination of Context
Context Catagory
Context Model
Comparison
Context
Where
Who
What
User Environment
Computing Environment
Physical Environment
Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M., & Steggles, P. (1999). Towards a Better Understanding of Context and Context-Awareness. Handheld and Ubiquitous Computing,
304–307. https://doi.org/10.1007/3-540-48157-5_29
Gwizdka, J., What's in the context?. Computer Human Interaction CHI2000.
Brown, P., Bovey, J., & Xian Chen. (1997). Context-aware applications: from the laboratory to the marketplace. IEEE Personal Communications, 4(5), 58–64.
https://doi.org/10.1109/98.626984
B. Schilit, N. Adams and R. Want, "Context-Aware Computing Applications," 1994 First Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA, 1994, pp. 85-90, doi:
10.1109/WMCSA.1994.16.
Location
Identity Time
Activity
Context Catagory
Primary Context
Secondary Context
Context Toolkit: Salber, D., Dey, A. K., & Abowd, G. D. (1999). The context toolkit. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems the CHI Is the Limit - CHI
’99. https://doi.org/10.1145/302979.303126
Classroom + Cyber Guide: Abowd, D., Dey, A. K., Orr, R., & Brotherton, J. (1998, September). Context-awareness in wearable and ubiquitous computing. Virtual Reality, 3(3), 200–211.
https://doi.org/10.1007/bf01408562
Teleport: Brown, M. G. (1996). Supporting User Mobility. Mobile Communications, 69–77. https://doi.org/10.1007/978-0-387-34980-0_8
Responsive office: Elrod, S., Hall, G., Costanza, R., Dixon, M., & Des Rivières, J. (1993, July). Responsive office environments. Communications of the ACM, 36(7), 84–85.
https://doi.org/10.1145/159544.159626
Context Model
User Environment
Computing Environment
Physical Environment
Context Vaiables
Using GPS,
Camera, and
Sensor data
To better
understand the
surroundings
Making real-
time context-
aware
decisions
based on user
environment
Extract More
Combine
Analyze
Decision
Weather
Objects
Location
Time
Activity
Mixing up for
new
information
User Environment
N. Ryan, J. Pascoe and D. Morse, “Enhanced Reality Fieldwork: The Context-Aware Archaeological Assistant,” Proceedings of the 25th Anniversary Computer Applications in Archaeology, 1997.”
Context Sources
Provide
customize
behaviour and
services.
Processing
Distribution
Middleware
Computing Environment
Processing the
raw data
Using the
contextual
information
Decision
User input
Sensors
Network data
Distributing
contextual
information
Ellebak, K. A survey of context-aware middleware. In Proceedings of the 25th Conference on IASTED International Multi-Conference: Software Engineering, Innsbruck, Austria, 13–15 February
2007; ACTA Press: Innsbruck, Austria, 2007
Physical Environment
To identify
patterns,
trends
Extraction Integration
Provide
customize
behaviour and
services.
Processing
GPS location
Time of day
Activity level
Zhou, X., Ren, Z., Sheng, Q. Z., & Vasilakos, A. V.,” Context-aware computing for smart and connected health”, IEEE Transactions on Industrial Informatics, 2018.
User Environment
Decentralization
User Environment
Contextual Analysis Human Action Context Scale
Computing Environment
Physical Environment
-
-
-
Comparision
-
-
-
Contexd ConTED
Context
A Hybrid Model
Works for decentraliazion
web
Use weighted context
information
Express context with a set of
context scale
3
4
1
2
Verification of the
communication or
resource url
SOURCE
Identification of the
sender or receiver
information
IDENTITY
Pulication or
modification
timestamp
TIME
Purpose or usage of
the communication
or resource
USE
Contexd
Contexd BPMN diagram
Contexd Component Diagram
Contexd Diagrams
Context Scale
Identity Source
Use Time
Distribuation of initial weight
Formula for weight calculation
Identity Source Use Time Weight
0.5 0.5 1 1 0.8
0 0.5 1 1 0.45
Contexd Weighting
40%
30%
20%
10%
= Weighted average of primary context information
Wi
= Initial weighted primary context information
Ci
= Value of the context information, [0,1]
Wp
User Environment
Identity
User Environment
Source
User Environment
Use
User Environment
Time
Context Scale Rating
Formula for Context Scale Rating
0.8 0.1 1 0.7778
0.45 0.1 1 0.3889
User Environment
User Environment
User Environment
General
Context
Intermediate
Context
Contexd Scale rating
0.55 - 1
0.25 - 0.54
0 - 0.24
CSr
= Context Scale Rating
Wp
= Calculated average weight
CWmin
= Nonzero minimum weight used by any context information
W = Sum of all initial context information weight
General
Intermediate
Critical
https://vsr.informatik.tu-chemnitz.de/projects/2020/atlas/
Demo
Feasibility Analysis
Contexd Analysis
Scalability Analysis
Contexd Runtime
The number of agents remains constant
Scenario size and number of exchange messages
change from 5 to 250
The number of exchanged messages remains
constant
Scenario size and number of exchange messages
change from 5 to 250
The number of agents, scenario size and number of
exchange messages change from 5 to 250
The number of agents, scenario size, and number of
exchange messages change from 5 to 250
Test Run A
Test Run B
Test Run C
Contexd fulfillments
Decentralization
User Environment
User Environment
Contextual Analysis Human Action Context Scale
Computing Environment
Physical Environment
-
-
-
Contexd
-
-
-
Agent (A) has no information related to identity, source,
use, and time. In case it has, the information is not
authetic or biased.
Agent (A) has little information related to identity,
source, use, and time. This information is mixed up with
valid and invalid details.
The number of agents, scenario size and number of
exchange messages change from 5 to 250
Scenario ACC1
Scenario ACC2
Agent (A) has enough information related to identity,
source, use, and time. All the information is either
incomplete or not valid.
Scenario ACC3
The number of agents, scenario size and number of
exchange messages change from 5 to 250
Agent (A) has enough information related to identity,
source, use, and time. All the information is complete
and valid.
Scenario ACC4
Contexd Accuracy
Future Work
Adaptability in extraction process
Improvement in scenarios
Calculation of weight
Increasement in scenario size
Thank you!

More Related Content

Similar to Contextual Analysis

Data science innovations
Data science innovations Data science innovations
Data science innovations suresh sood
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020IJNSA Journal
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...IJNSA Journal
 
New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...gerogepatton
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Natalia Díaz Rodríguez
 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Michael Roytman
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Luis Felipe Tabares Pérez
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
Architectural Design of a Clinical Decision Support System for Clinical Triag...
Architectural Design of a Clinical Decision Support System for Clinical Triag...Architectural Design of a Clinical Decision Support System for Clinical Triag...
Architectural Design of a Clinical Decision Support System for Clinical Triag...Luis Felipe Tabares Pérez
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualizationbdemchak
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Ivan Mauricio Cabezas Troyano
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdardiannepatricia
 
Crowdsourcing Approaches for Smart City Open Data Management
Crowdsourcing Approaches for Smart City Open Data ManagementCrowdsourcing Approaches for Smart City Open Data Management
Crowdsourcing Approaches for Smart City Open Data ManagementEdward Curry
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
 
algorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparencyalgorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparencyPaolo Missier
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices YanNiMok
 

Similar to Contextual Analysis (20)

Data science innovations
Data science innovations Data science innovations
Data science innovations
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
 
New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...
 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
Architectural Design of a Clinical Decision Support System for Clinical Triag...
Architectural Design of a Clinical Decision Support System for Clinical Triag...Architectural Design of a Clinical Decision Support System for Clinical Triag...
Architectural Design of a Clinical Decision Support System for Clinical Triag...
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...Architectural approaches for implementing Clinical Decision Support Systems i...
Architectural approaches for implementing Clinical Decision Support Systems i...
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdar
 
Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique Network Intrusion Detection using MRF Technique
Network Intrusion Detection using MRF Technique
 
Crowdsourcing Approaches for Smart City Open Data Management
Crowdsourcing Approaches for Smart City Open Data ManagementCrowdsourcing Approaches for Smart City Open Data Management
Crowdsourcing Approaches for Smart City Open Data Management
 
Cognitive systems16
Cognitive systems16Cognitive systems16
Cognitive systems16
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
algorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparencyalgorithmic-decisions, fairness, machine learning, provenance, transparency
algorithmic-decisions, fairness, machine learning, provenance, transparency
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

Contextual Analysis

  • 1. Thesis Defense Presentation Contextual Analysis For Trust Evaluations By ConTED Presented By Md Tajul Islam ( Matrikel-Nr: 618595 ) Examiner Prof Dr.-Ing. Martin Gaedke Advisor Valentin Siegert Distributed and Self-organizing Systems Group
  • 2. Salvi, C., Iannello, P., Cancer, A., McClay, M., Rago, S., Dunsmoor, J. E., & Antonietti, A. (2020, December 4). Going Viral: How Fear, Socio-Cognitive Polarization and Problem-Solving Influence Fake News Detection and Proliferation During COVID-19 Pandemic. Frontiers. https://doi.org/10.3389/fcomm.2020.562588 Here’s Another Kind Of Review Fraud Happening On Amazon. (2018, May 29). BuzzFeed News. https://www.buzzfeednews.com/article/nicolenguyen/amazon-review-reuse-fraud MISINFORMATION - Nevada Minority Health and Equity Coalition. (n.d.). Nevada Minority Health and Equity Coalition. https://nmhec.org/misinformation/ Trust Alert
  • 3. Travel Agencies Review websites Hotel Websites Let's Book A Hotel
  • 4. List of Challenges Data can be compromised Data can be incomplete Sources can be unreliable Trust is subjective
  • 5. Thanks to ConTED Use Content Trust Implement Content factors Require Contextual analysis Context & Criticality!
  • 6. Resource Data Interection Partner C Behaviorial Analysis ConTED Flow Context & Criticality Trust Environment Trust Evaluation Content Analysis Trust Aware Decision C Context Analysis Trust Evaluation
  • 9. Requirements Rating Decentralization - Central Authorities or Infrastructure dependency Context Analysis Time - Compared to beforehand calculation Need For Human Action - Requirement of Human Action Context Scale - How fast ConTED can use the context
  • 10. Previous Work Defination of Context Context Catagory Context Model Comparison
  • 11. Context Where Who What User Environment Computing Environment Physical Environment Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M., & Steggles, P. (1999). Towards a Better Understanding of Context and Context-Awareness. Handheld and Ubiquitous Computing, 304–307. https://doi.org/10.1007/3-540-48157-5_29 Gwizdka, J., What's in the context?. Computer Human Interaction CHI2000. Brown, P., Bovey, J., & Xian Chen. (1997). Context-aware applications: from the laboratory to the marketplace. IEEE Personal Communications, 4(5), 58–64. https://doi.org/10.1109/98.626984 B. Schilit, N. Adams and R. Want, "Context-Aware Computing Applications," 1994 First Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, USA, 1994, pp. 85-90, doi: 10.1109/WMCSA.1994.16.
  • 12. Location Identity Time Activity Context Catagory Primary Context Secondary Context Context Toolkit: Salber, D., Dey, A. K., & Abowd, G. D. (1999). The context toolkit. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems the CHI Is the Limit - CHI ’99. https://doi.org/10.1145/302979.303126 Classroom + Cyber Guide: Abowd, D., Dey, A. K., Orr, R., & Brotherton, J. (1998, September). Context-awareness in wearable and ubiquitous computing. Virtual Reality, 3(3), 200–211. https://doi.org/10.1007/bf01408562 Teleport: Brown, M. G. (1996). Supporting User Mobility. Mobile Communications, 69–77. https://doi.org/10.1007/978-0-387-34980-0_8 Responsive office: Elrod, S., Hall, G., Costanza, R., Dixon, M., & Des Rivières, J. (1993, July). Responsive office environments. Communications of the ACM, 36(7), 84–85. https://doi.org/10.1145/159544.159626
  • 13. Context Model User Environment Computing Environment Physical Environment
  • 14. Context Vaiables Using GPS, Camera, and Sensor data To better understand the surroundings Making real- time context- aware decisions based on user environment Extract More Combine Analyze Decision Weather Objects Location Time Activity Mixing up for new information User Environment N. Ryan, J. Pascoe and D. Morse, “Enhanced Reality Fieldwork: The Context-Aware Archaeological Assistant,” Proceedings of the 25th Anniversary Computer Applications in Archaeology, 1997.”
  • 15. Context Sources Provide customize behaviour and services. Processing Distribution Middleware Computing Environment Processing the raw data Using the contextual information Decision User input Sensors Network data Distributing contextual information Ellebak, K. A survey of context-aware middleware. In Proceedings of the 25th Conference on IASTED International Multi-Conference: Software Engineering, Innsbruck, Austria, 13–15 February 2007; ACTA Press: Innsbruck, Austria, 2007
  • 16. Physical Environment To identify patterns, trends Extraction Integration Provide customize behaviour and services. Processing GPS location Time of day Activity level Zhou, X., Ren, Z., Sheng, Q. Z., & Vasilakos, A. V.,” Context-aware computing for smart and connected health”, IEEE Transactions on Industrial Informatics, 2018.
  • 17. User Environment Decentralization User Environment Contextual Analysis Human Action Context Scale Computing Environment Physical Environment - - - Comparision - - -
  • 18. Contexd ConTED Context A Hybrid Model Works for decentraliazion web Use weighted context information Express context with a set of context scale
  • 19. 3 4 1 2 Verification of the communication or resource url SOURCE Identification of the sender or receiver information IDENTITY Pulication or modification timestamp TIME Purpose or usage of the communication or resource USE Contexd
  • 20. Contexd BPMN diagram Contexd Component Diagram Contexd Diagrams Context Scale Identity Source Use Time
  • 21. Distribuation of initial weight Formula for weight calculation Identity Source Use Time Weight 0.5 0.5 1 1 0.8 0 0.5 1 1 0.45 Contexd Weighting 40% 30% 20% 10% = Weighted average of primary context information Wi = Initial weighted primary context information Ci = Value of the context information, [0,1] Wp User Environment Identity User Environment Source User Environment Use User Environment Time
  • 22. Context Scale Rating Formula for Context Scale Rating 0.8 0.1 1 0.7778 0.45 0.1 1 0.3889 User Environment User Environment User Environment General Context Intermediate Context Contexd Scale rating 0.55 - 1 0.25 - 0.54 0 - 0.24 CSr = Context Scale Rating Wp = Calculated average weight CWmin = Nonzero minimum weight used by any context information W = Sum of all initial context information weight General Intermediate Critical
  • 25. Contexd Runtime The number of agents remains constant Scenario size and number of exchange messages change from 5 to 250 The number of exchanged messages remains constant Scenario size and number of exchange messages change from 5 to 250 The number of agents, scenario size and number of exchange messages change from 5 to 250 The number of agents, scenario size, and number of exchange messages change from 5 to 250 Test Run A Test Run B Test Run C
  • 26. Contexd fulfillments Decentralization User Environment User Environment Contextual Analysis Human Action Context Scale Computing Environment Physical Environment - - - Contexd - - -
  • 27. Agent (A) has no information related to identity, source, use, and time. In case it has, the information is not authetic or biased. Agent (A) has little information related to identity, source, use, and time. This information is mixed up with valid and invalid details. The number of agents, scenario size and number of exchange messages change from 5 to 250 Scenario ACC1 Scenario ACC2 Agent (A) has enough information related to identity, source, use, and time. All the information is either incomplete or not valid. Scenario ACC3 The number of agents, scenario size and number of exchange messages change from 5 to 250 Agent (A) has enough information related to identity, source, use, and time. All the information is complete and valid. Scenario ACC4 Contexd Accuracy
  • 28. Future Work Adaptability in extraction process Improvement in scenarios Calculation of weight Increasement in scenario size