Agent Based Distributed Tutoring System modeling using Extended Tropos approach
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Due to the availability of enormous amount of resources for the tutoring system, there is a need for the distribution of the resources when developing such tutoring system.There are several users inthe distributed system where there is aconcurrent access of the resources. In such scenario there should be a definite access control policies for the resources. Since the agents are suitable for the distributed system and these access control policies would restrict the agents in accessing the resources. In our work we have extended Tropos which is an agent oriented software development methodology.Our extension would classify the resources based on the types of resources by which it can be accessed by other agents. This extension would also consider the temporal constraints in accessingthe resources. The resources have been classified into four types and the temporal constraints have been classified into three types. Our approach provides a systematic way of development of the distributed systems than the formal UML modeling technique by capturing the security constraints and providing the access control policies in the modeling stage itself. In our work, the Agent based distributed Tutoring System(ABDTS) has been taken as a case study and we have modeled the system using the extended Tropos methodology and the results are evaluated. We also we provide a comparativeanalysis between the models developed using Tropos, Unified Modeling Language (UML) which could incur that the Troposcould be used where the agents goals and tasks are to be modeled explicitly
Authors and Affiliations
Sampathkumar TT
A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing
Cloud computing is a technique to deliver software, storage and processing. It increases system’s capability without changing the existing infrastructure, educating new people or taking license for the softwares....
Positional Prediction of Individuals Present In a Crime Scene
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tr...
Removal of Gaussian noise on the image edges using the Prewitt operator and threshold function technical
Image edge detection algorithm is applied on images to remove Gaussian noise that is present in the image during capturing or transmission using a method which combines Prewitt operator and threshold function te...
A survey on recommendation system
Abstract: In this paper, we give a brief introduction about recommendation systems, components of recommendation systems i.e. items, users and user-item matching algorithms, various approaches of recommendation systems i...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Based Technique
Online Social Networks (OSNs) are today one of the most popular interactive medium to share, communicate, and distribute a significant amount of human life information. In OSNs, information filtering can a...