SlideShare a Scribd company logo
1 of 7
Download to read offline
ISSN: 2278 – 1323
                                    International Journal of Advanced Research in Computer Engineering & Technology
                                                                                        Volume 1, Issue 4, June 2012




        Computer Assisted Testing and Evaluation
        System: Distance Evaluation Using Mobile
                    Agent Technology
                                1
                                    Prakash V. Rajguru, 2Dr. Sushant B. Deshmukh.

  1
      Department of Computer Science & IT, Adarsh Arts, Commerce & Science College, Hingoli. (Maharashtra), India.
                                 Email: prakash_rajgure@yahoo.com, Cell. 09822186940
       2
         Post Graduate Department of Physics, R.G.Bagdia arts, S.B.Lakhotiya Commerce. & R.Bezonji Science College,
                       Jalna (Maharashtra), India. Email: sushant.d69@gmail.com, Cell. 09422238695

     Abstract: The growth of Internet has led to new avenues   daily lives visit a place, use a service, and then move on.
for distance education. A crucial factor for the success of    Basically, a mobile agent executes on a machine that
distance education is effective mechanisms for distance        hopefully provides the resource or service that it needs to
evaluation (DE). Existing Internet evaluation mechanisms,
                                                               perform its job. If the machine does not contain the
such as web based testing, rely principally on the client-
server model. Such mechanisms usually do not scale well        needed resource/service, or if the mobile agent requires a
and also do not fully support features like: evaluation of     different resource/service on another machine, the state
subjective questions, delivery of dynamic content, and off-    information of the mobile agent is some how saved,
line examinations. These features are extremely desirable      transfer of the mobile agent to the machine containing the
for distance evaluation and there is a need for alternate      necessary resource/service is initiated, and the mobile
ways of designing such applications.
                                                               agent resumes execution at the new machine. Advantages
We study the existing mobile agent frameworks to
understand state of the art. We then use the mobile agent      of using mobile agents include low network bandwidth
approach for designing, implementing and deploying a           since they only move when they need to move, continued
system for distance evaluation of students. We consider the    execution even when disconnected from the network,
entire examination process: (i) Paper setting, where the       ability to clone itself to perform parallel execution, easy
examiners spread over the internet collaborate to produce a    implementation and deployment, and reliability. Mobile
question paper, (ii) Examination conduction, where the
                                                               agents have been developed as an extension to and
question papers are distributed and the answer papers are
collected, and (iii) Answer-paper evaluation, result           replacement of the client-server model. In the client
compilation and publishing.                                    server model, a server is a machine that provides some
We have designed and implemented, Computer Assisted            service (or set of services) and a client (most often
Testing and Evaluation System in Distance Evaluation using     another machine) makes requests for those services.
Mobile Agent Technology. Mobile Agent in Distance              Communication between a client and a server is usually
Evaluation aims to map closely to real world examination
                                                               through message passing. So, when a client needs a
scenarios and addresses the full scope of the examination
process, viz., paper setting, distribution and testing,        particular service, it usually sends a request message to a
evaluation and result compilation. In this research we         server that contains the needed service. A limitation of
describe how to implement the Distance Evaluation using        the client-server model is that the client is limited to the
Mobile Agent Technology.                                       operations provided at the server. So, if a client needs a
                                                               service that a particular server does not provide, the client
    Keywords: Internet, Client-Server Technology, Mobile
                                                               must find a server that can satisfy the request by sending
Agent Technology, Distance Evaluation, and Agent Transfer
Protocol.                                                      out messages to all servers. This clearly is an inefficient
                                                               use of network bandwidth. Also, this severely limits
                                                               network scalability since managing and updating these
                   I. INTRODUCTION                             servers would prove prohibitive.
    As the Internet constantly expands, the amount of
available on-line information expands as well. The issues               II. CLIENT-SERVER TECHNOLOGY
of how to efficiently find gather, and retrieve this             1. “A Client-Server network is a distributed network
information has led to the research and development of
systems and tools that attempt to provide a solution to this
problem. These systems and tools are based on the use of
mobile agents. Mobile agents are processes (i.e.,
executing programs) that can migrate from one machine
of a system to another machine (usually in the same
system) in order to satisfy requests made by their clients.
They implement a computational metaphor that is
analogous to how most people conduct businesses in their



                                                                                                                       395
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                     Volume 1, Issue 4, June 2012


     which consists of one higher performance system,                down, which can potentially block hundreds of
     the server, and several mostly lower performance                clients from working with their data or their
     systems, the clients. The server is the central                 applications.
     registering unit as well as the only provider of               As the number of simultaneous client requests to a
     content and service. A client only requests content or          given server increases, the server can become
     the execution of services, without sharing any of its           overloaded.
     own resources.”
  2. “Client-Server architecture is network architecture            III. NEW TRENDS IN INTERNET APPLICATIONS
     in which each computer or process on the network is            There are many trends in Internet technology and
     either a client or a server. Servers are powerful          activity that encourage the use of mobile agents on the
     computers or processes dedicated to managing disk          Internet. These trends are outlined and are briefly
     drives (file servers), printers (print servers), or        described below:
     network traffic (network servers). Clients are PCs or        i. Bandwidth: Internet access is broadening to the
     workstations on which users run applications. Clients            point where people will have a reasonable-speed
     rely on servers for resources, such as files, devices,           access to the Internet. The Internet backbone has an
     and even processing power.”                                      enormous amount of bandwidth available.
  The most commonly used paradigm in constructing                ii. Mobile devices: Internet users are mobile and
distributed systems is the Client- Server model. In this              therefore they need their Internet access to come with
scheme clients request services or content from a server.             them by using portable computing devices.
The client and server require a known set of conventions              Everything from laptops or palmtops to car
before the can communicate. This set of conventions                   telephones to pagers can access the Internet.
contains a protocol, which must be implemented at both         iii. Mobile users: Internet users have shown that they
ends of a connection.                                                 like to have access to everything from anywhere
ADVANTAGES AND DISADVANTAGES                                          through the popularity of things like web-mail. Web
    The following advantages and disadvantages of the                 terminals are becoming more and more popular.
Client-Server architecture.                                     iv. Intranets: Internal or private and smaller versions of
                                                                      the Internet are being used for information sharing
 ADVANTAGES                                                          within companies and corporations. Intranets are
   Data management is much easier because the files                  usually managed by a single organization and can
    are in one location. This allows fast backups and                 make use of new technologies quickly since security
    efficient error management. There are multiple levels             within the intranet is of less concern.
    of permissions, which can prevent users from doing           v. Information overload: The massive amount of
    damage to files.                                                  information available on the Internet today is
   All the data are processed on the server, and only the            immeasurable. Users are easily overwhelmed by the
    results are returned to the client. This reduces the              sheer quantity of data that is at their disposal.
    amount of network traffic between the server and the              Filtering technology, while still quite limited, can
    client machine, improving network performance.                    help reduce the stream of information to a given user
   Thin client architectures allow a quick replacement               to a tolerable level.
    of defect clients, because all data and applications are    vi. Customization: Site customization for individual
    on the server.                                                    users is possible through the Internet and can be
   Divides Application Processing across multiple                    provided on either the client or server side.
    machines:                                                  vii. Proxies: Third party proxies can provide site wide
   Scales Horizontally – Multiple servers, each server               customization for one or more Internet services.
    having capabilities and processing power, can be                  They can be used to reduce information overload and
    added to distribute processing load.                              customize service access.
   Scales Vertically - Can be moved to more powerful
    machines, such as minicomputer or a mainframe to                      IV. DISTANCE EVALUATION SYSTEM
    take advantage of the larger system‟s performance                    Most of the present day Internet based evaluation
   Reduces Data Replication - Data stored on the                    is web-based and employs the client-server
    servers instead of each client, reducing the amount of           paradigm. It uses HTML-forms for user interface,
    data replication for the application.                            with either common gateway interface (CGI)-scripts
 DISADVANTAGES                                                      or java-servlets for back end processing. The
                                                                     students download the questionnaire as a web page
   Client-Server-Systems are very expensive and need a              and the answers are submitted back to the server.
    lot of maintenance.                                              This is essentially the pull-model of distributing the
   The server constitutes a single point of failure. If             information. The second Internet based model uses
    failures on the server occur, it is possible that the            java-applets as the front-end for question paper. This
    system suffers heavy delay or completely breaks                  too follows a similar mechanism as the previous case




                                                                                                                       396
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                  International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 4, June 2012


    except that using Java gives more flexibility to the          The Brustoloni Agent [Brustoloni 1991, Franklin
    examiner in choosing the type of content. With the            1995, p. 265] "Autonomous agents are systems
    need for providing multimedia content, multimedia             capable of autonomous, purposeful action in the real
    support languages (e.g. flash scripting language) are         world."
    too being used to provide front-ends.
                                                                     Mobile Agent = State + Action + Mobility
        Extending     existing    distance    evaluations
         schemes:                                                   The Agent term was already introduced into the
        We will now highlight the extensions that are             computer science in the late 1970s within the
    desirable in the distance evaluation systems:                 artificial intelligence (AI) research (see Nwanda).
                                                                  Agent stands for autonomous intelligent behavior
 i. Push Model: In some cases there is a need to send
                                                                  including the ability for communication, which is
    the question paper to the examinee at a time as
                                                                  subsumed in a general introduction of the Agent term
    decided by the examiner. Such a scenario also arises
                                                                  in the AI research by Wooldridge and Jennings.
    in a case where a number of students are to be
                                                                  Accordingly, an Agent is thought of as a software
    evaluated simultaneously for the same set of
    questions. Most of the paper-based testing methods
    prevalent today follow this model.
ii. Variety of delivered contents: The use of electronic
    media for information dissemination has made it
    possible to present the questions using dynamic
    content in form of audio, video-clips, or multimedia.
    It will be desirable to support such rich content in the
    question-paper.
iii. Subjective questions: The students may be required
     to provide answers that are objective, written text or
     involve some graphical schematics. All of these
     cannot be automatically evaluated and would require
     manual corrections. The present day on-line systems
     don‟t have a provision for these.                             entity or component in the modern software
iv. Off-line examinations: The paradigm followed in                engineering owning the following properties,
    these schemes is client-server and the students have           described in a general overview by Bradshaw and
    to remain on-line for the duration of test. For remote         Nwanda:
    interactions, this can be achieved either by opening a      • Autonomy, an Agent can act following self-
    socket connection which remains alive during the               constructed plans
    entire duration of examination, or by opening a             • Ability for communication, an Agent can interact with
    socket connection for every request by the client.             other Agents
                                                                • Reactivity, an Agent can react on environment
v. Adaptive Questions: It will be desirable to build               changes
   adaptive tests wherein questions of various level of         • Pro-activity, regarding to the previous feature, an
   difficulty are offered to the candidates in dynamic             Agent can react on specific events by performing
   order. This order is determined by the student‟s                special standard or optional processes depending on
   response to the previous set of questions.                      the event
                                                                • Adaptation, an Agent can be configured to match
          V. MOBILE AGENT TECHNOLOGY                               special user experiences or to solve problems in a
                                                                   specific way
 What is an agent?
                                                                • Intelligence, an Agent own on the one side decision-
        Workers involved in agent research have offered            making abilities and on the other side learning
    a variety of definitions, each hoping to explicate his         algorithms for learning about its user‟s behavior.
    or her use of the word "agent."
    The                      IBM                      Agent     Harrison. Et al. & Braun highlights some desirable
    [http://activist.gpl.ibm.com:81/WhitePaper/ptc2.htm]        characteristics of mobile agents:
    "Intelligent agents are software entities that carry out    • Mobile Agents work in large and heterogeneous
    some set of operations on behalf of a user or another         networks, where no assumptions about reliability and
    program with some degree of independence or                   security of the involved platforms can be made.
    autonomy, and in so doing, employ some knowledge            • The migration is controlled by the programmer, which
    or representation of the users goals or desires."             means that the program itself and not the operating
                                                                  system decide when and where to go.




                                                                                                                  397
                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                     Volume 1, Issue 4, June 2012


  • The execution of the program is not location-             4) Reduction in network traffic: MA's code is very often
    transparent, but the program moves to a specific              smaller than data that it processes, so the transfer of
    server for using services, which are only provided at         mobile agents to the sources of data creates less
    this platform.                                                traffic than transferring the data.
  • Mobility: Mobility describes the ability of a Mobile      5) Asynchronous autonomous interaction:             Mobile
    Agent to move through a heterogeneous electronic              agents can be delegated to perform certain tasks even
    network and deciding autonomously when and where              if the delegating entity does not remain active. This
    to go. A Mobile Agent migrates for example from a             makes it an attractive for mobile application and
    platform A to another platform B to access services           disconnected operations.
    of applications or to retrieve data from a database,      6) Interaction with real-time systems: Installing a
    which are only offered at the target platform of its          mobile agent close to a real-time system may prevent
    migration. However, the graphic should emphasize              delays caused by network congestion.
    another feature of the Mobile Agent Approach.             7) Efficiency savings: CPU consumption is limited,
    These Agents can only live in a special software              because a mobile agent execute only on one node at a
    environment; the environment offers two important             time. Other nodes do not run an agent until needed.
    communication capabilities. External applications are     8) Space savings: Resource consumption is limited,
    able to interact with Mobile Agents via the local             because a mobile agent resides only on one node at a
    Mobile Agent environment and vice versa.                      time. In contrast, static multiple servers require
  • Persistence: Once a mobile a agent is launched, it            duplication of functionality at every location. Mobile
    should not be reliant on the system that launched it          agents carry the functionality with them, so it does
    and should not be affected if that node fails. The            not have to be duplicated.
    concepts of an agent moving between network nodes         9) Support for heterogeneous environments: Mobile
    give it the ability to „survive‟ and to reach as many         agents are separated from the hosts by the mobility
    resources as possible. This is useful for mobile              framework. If the framework is in place, agents can
    computer users due to the fact that they can log on,          target any system. The costs of running a Java
    launch an agent, log off and check later on its               Virtual Machine (JVM) on a device are decreasing
    progress                                                  10) Online extensibility of services: Mobile agents can
  • Peer-to-peer communication: A failure of the client-          be used to extend capabilities of applications, for
    server paradigm is the inability of server to                 example, providing services. This allows for building
    communicate with other severs. Mobile agents are              systems that are extremely flexible
    considered to peer entities and as such can adopt         11) Convenient development paradigm: Creating
    whichever stance is most appropriate to their current         distributed systems based on mobile agents is
    needs. Fore example, when a mobile agent is                   relatively easy. The difficult part is the mobility
    interrogating a resource it takes the role of a client,       framework, but when it is in place, then creating
    when another mobile agent wishes to query it, then it         applications is facilitated.
    becomes a server. This follows for great flexibility in   12) Easy software upgrades: A mobile agent can be
    dealing with network entities and distributed                 exchanged virtually at will. In contrast, swapping
    resources.                                                    functionality of servers is complicated.
 Benefits of Mobile Agent Technology                                   VI. EXAMPLE OF MOBILE AGENT
   Mobile agent technology promises to provide some
                                                                 JADE: JADE is free software and is distributed by
   very distinct advantages compared to the other
                                                                  TILab, open source software under the terms of the
   approaches. Some of them are:
                                                                  LGPL (Lesser General Public License Version 2).
1) Overcoming Network Latency Because MAs execute
                                                                  JADE has good GUI, accessible use, good
   locally, they can respond their environments faster.
                                                                  documentation and high acceptance.
   This is key requirement in some critical real-time
   systems.                                                      ARA: Ara is a platform for the portable and secures
2) Encapsulation of Protocols Upgrading protocols in a            execution of Mobile Agents in heterogeneous
   distributed system is a cumbersome task. MAs are               networks. Mobile Agents in this sense are programs
   able to move to remote hosts and establish „channels‟          with the ability to change their host machine during
   based on the new or proprietary protocols.                     execution while preserving their internal state. This
3) Disconnected Operations MAs can operate                        enables them to handle interactions locally which
   asynchronously and autonomously from the process               otherwise had to be performed remotely.
   that created them, after being dispatched. Mobile
                                                                 CONCORDIA: Concordia is a full-featured
   devices, which need continuous access of fixed
                                                                  framework developed at Mitsubishi Electric
   network, often suffer from fragile and low bandwidth
                                                                  Information    Technology   Center    America‟s
   connects. In such cases they can embed their task in
                                                                  (MEITCA) Horizon Systems Laboratory. It provides
   MAs, dispatch them, and then reconnect later to
                                                                  for the development and management of network-
   collect these agents.



                                                                                                                    398
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                     Volume 1, Issue 4, June 2012


    efficient Mobile Agent applications for accessing               advance). In addition, its task based and
    information anytime, anywhere, and on both wire-                asynchronous model could be difficult to use, due to
    based and wireless device supporting Java.                      its differences with the classical procedural
                                                                    programming. The use of a single thread per agent
   MOLE: Mole is the first Mobile Agent System that                could be inefficient and a limitation for the
    has been developed in the Java language. The first              programmer. Tryllian provides a large set of
    version has been finished in 1995, and since then               configuration options, which could be overwhelming.
    Mole has been constantly improved. Mole provides a              Finally, it does not offer facilities for synchronous
    stable environment for the development and usage of             communication or conventional method invocation.
    Mobile Agents in the area of distributed applications.
                                                                           VII. PROPOSED FRAMEWORK
   VOYAGER: Voyager is 100% java Agent-enhanced
    Object Request Broker (ORB) created by Object                 We use the mobile agent approach for designing,
    Space Company. Goals of this product to provide            implementing and deploying a system for distance
    programmer to create state of the art distributed          evaluation of students. We consider the entire
    programs quickly and easily while providing a lot of       examination process: (i) Paper setting, where the
    flexibility and extensibility for the products that are    examiners spread over the internet collaborate to
    being created with the voyager system.                     produce a question paper, (ii) Examination conduction,
                                                               where the question papers are distributed and the
   JACK: JACK Intelligent AgentTM is an Agent                 answer papers are collected and (iii) Answer-paper
    oriented development environment fully integrated          evaluation, result compilation and publishing.
    with the Java programming language. JACK
    provides Agent-oriented extensions to the Java             a)       Examination Setting
    programming language.                                      The examination setting process takes place in a
   GRASSHOPPER: Grasshopper was developed by                  collaborative manner where the examiners sitting at
    IKV++ in 1999 (last version: 2.2.4, January 2003),         different remote locations prepare their questions.
    and then became part of the commercial Mobile, and         Mobile Agents are then dispatched to these examiners.
    today its development has probably been abandoned.         These MAs fetch the question papers from all of the
    It is an easy-to-use platform for mobile agents,           examiners. The central controlling authority decides on
    compliant with the standards MASIF and FIPA                the final question paper based on the inputs from
    (http://www.fipa.org/). A Grasshopper system can be        different examiners.
    composed of different regions. It provides agent
                                                               a)       Distribution and Testing
    developers with interesting features, including a
    graphical user interface to manage agents, agencies,       Once a question paper is prepared, it is dispatched to
    and regions. By defining regions, the developer can        the different examination centers with the help of
    benefit from dynamic proxies. The main                     Courier Mobile Agents. Having finished their
    disadvantage of Grasshopper is that it is not available    distribution work, the Courier Agents get either
    anymore and new versions will not appear in the            terminated or they return to their place of origin. The
    future. The region server could become a bottleneck,       distribution servers at these centers have a list of
    as it must update every proxy right before using it. A     candidates enrolled for that center. The examination
    disconcerting feature of Grasshopper (stated in the        paper at each center is cloned to the number of students
    manual) is that a call to an agent that is moving can      in each center. The examination papers can time-out
    end up executing on the copy of the agent at origin        themselves after a fixed interval of time. Once a
    (which will be removed once the agent arrives at its       student finishes answering a question or the
    destination). Finally, as in Aglets, the same              examination paper times out, the answers are given
    predefined method is always executed after an              back to the distribution center, which launches a
    agent‟s trip.                                              Answer Mobile Agent for each student answer paper.
   TRYLLIAN:        Tryllian    (http://www.tryllian.org),    These Mobile Agents then make their way to the
    developed by the homonym company in 2001 (last             Evaluation Center
    version: 3.2.0, released as open source in November
    2005), is based on a sensing-reasoning action              b)       Evaluation and Result Compilation
    mechanism. It allows programmers to define a                  Once an Answer Agent reaches the evaluation center,
    reactive (based on incoming messages) and proactive        it is supplied with an itinerary of the examiners. The
    (based on heartbeats) behavior of agents. Tryllian         Answer Agents can also move to an Objective
    proposes a task based programming model and                Question Evaluator if it possesses answers to multiple-
    communication among agents is achieved through             choice questions, to automatically evaluate their
    message passing and in accordance with the FIPA            answers. The Answer Agents move from one examiner
    standard. It also provides a persistency service. The      to other, until all of the questions are evaluated. They
    main disadvantage of Tryllian is that it does not offer    then move to the Publishing Center where they supply
    location transparency (the current location of the
    target agent of a message must be known in



                                                                                                                    399
                                          All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                  International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 4, June 2012


    their results and where the final comprehensive results    Test b - Client-Server Interactions
    are published.
                                                                  Remote Question                           Student Paper
    VIII. MOBILE AGENTS FOR MPLEMENTING THE                       Paper Server                 Mobile Agent Interface Client
          TECHNIQUE IN DISTANCE EVALUATION                                                     Interaction
o     Agent Transfer Protocol
           ATP is a simple application-level protocol
      designed to transmit an agent in an agent system-                           Client-Server Interaction
      independent manner. An ATP request consists of a
      request line, header fields, and content. The request
      line specifies the method of the request, while the                    Set-up for Measuring Response Time
      header fields contain the parameters of the request.    Observations
      ATP defines the following four standard request               We see that in case of client-server, the response
      methods:                                                 times will remain more or less constant whereas in the
o     Dispatch: The dispatch method requests a destination     case of MA, the initial response takes much longer while
      agent system to reconstruct an agent from the content    the remaining requests take negligible time as compared
      of a request and to start executing the agent. If the    to client-server responses. The initial longer response in
      request is successful, the sender must terminate the     case of MA is because of the additional time taken for
      agent and release any resources consumed by it.          agent creation, dispatch and transfer. Response-time
                                                               determines the user-experience and hence is critical for
                                                               our application. In future with the content getting richer
                                                               (graphics and multimedia support), this difference will
                                                               become even more pronounced. Traditional client-server
                                                               distributed programs avoid this problem by techniques
                                                               like pre-fetching, caching etc. Mobile agents inherently
                                                               provide these capabilities in our application.
                                                               The „Start‟, causes a mobile agent to be launched from a
                                                               remote machine, which brings in the new question paper/
                                                               section for the student in the first case. In second case the
                                                               same first page of question paper/ section is fetched as
                                                               data from the remote-server. The students, browsing
                                                               through the given set of questions, generate further
o     Retract: The retract method requests a destination       queries. In case of MA, these questions would be been
      agent system to send a specified agent back to the       pre-fetched by the mobile agent and hence the responses
      sender. The receiver is responsible for reconstructing   will be local. In the second case every request will cause
      and resuming the agent. If the agent is successfully     a remote request to be placed in typical client-server
      transferred, the receiver must terminate the agent and   mode.
      release any resources consumed by it.
o     Fetch: The fetch method is similar to the GET                                 X. CONCLUSION
      method in HTTP; it requests a receiver to retrieve
                                                                   We studied the client server technology and Mobile
      and send any identified information (normally class
                                                               Agent Technology. We also investigate the existing
      files).
                                                               distance evaluation scheme. We survey and analysis the
o     Response: We define response time as the time taken
                                                               various Mobile Agent paradigm. We check the
      between a student making a request, such as, request
                                                               performance of mobile agent over client server
      for next question or request for next section in the
                                                               technology and used more powerful mobile agent
      question paper, and getting the appropriate response.
                                                               paradigm for implementing our research project
                                                               Computer Assisted Testing System in Distance
           IX. PERFORMANCE EVALUATION
                                                               Evaluation i.e. Mobile Agent in Distance Evaluation.
    The performance criterion most relevant for our                A typical distance evaluation scenario is characterized
application is the response time for the students. We          by large geographical distances, disconnected operations,
define response time as the time taken between a student       dynamically interchangeable client-server roles and large
making a request, such as, request for next question or        number of interacting nodes. By using Mobile Agents as
request for next section in the question paper, and getting    the principal design paradigm in Mobile Agent in
the appropriate response.                                      Distance Evaluation, we will be overcome many of the
We have performed experiments to make the following            limitations of existing systems. Mobile Agent in Distance
two set of measurements:                                       Evaluation to the full gamut of distance evaluation viz.
Response Time for:                                             paper-setting, distribution and testing, and evaluation by
Test a - Mobile Agent Interactions                             means of various types of MAs. We will research how



                                                                                                                       400
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 4, June 2012


MAs can be used effectively for structuring such large-                                     AUTHORS PROFILE
scale distributed applications. The gains would be in                      RAJGURU PRAKASH VITHOBA received the
terms of: scalability, flexibility, dynamic extendibility                                     M.C.M.from        Dr.       Babasaheb
and independence from the network variations. We also                                         Ambedkar Marathwada University,
investigate to improving the overall performance of                                           Aurangabad, M.Phil. Degree in
system, reliability of system and System security.                                            Computer Science from Algappa
                                                                                              University Karikudi & B.Ed from
                        XI. REFERENCE                                                         SRTMU Nanded in 2005, 2008 &
                                                                                              2011 respectively. From 2005 he is
[1]  Mane Dnyaneshwar Rangnath, June, 2010, “Mobile Agent
     Security – Aglet Platform”, Thesis Submitted in partial fulfillment
                                                                           working as Asst. Professor of Computer Science in
     of the requirements for the degree of M.Tech.                         Adarsh Education Society‟s, Hingoli. He is doing Ph.D.
[2] Giovanni Caire, 30 June 2009, “Jade Tutorial Jade Programming          He attended many National and International
     for Beginners”, TILAB, formerly CSELT                                 Conferences, Workshops and Seminars. He is having five
[3] “JACK Intelligent Agents” ,Agent Practical 2009                        International & three National Publication in Standard
[4] Jingqiao Zhang, September 1, 2009, “JADE: Adaptive Differential
     Evolution with Optional External Archive”
                                                                           International Journals. His areas of interest are Mobile
[5] Mihai Caramihai, and Irina Severin, 2009, “eLearning Tools             Agent, Computing Educational Evaluation, Human
     Evaluation based on Quality Concept Distance Computing. A Case        Computer Interaction, Green Computing, and ICT.
     Study”, World Academy of Science, Engineering and Technology
[6] A. Kannammal, N.Ch.S.N. Iyengar, December 2007, “A Model               Dr. DESHMUKH SUSHANT BAPURAO received the
     for Mobile Agent Security in E-Business Applications”, Volume                            M.Sc Physics with Specialization in
     2, Number 2                                                                              Advanced Electronics from Pune
[7] Amanpreet Kaur, Sukhdeep Kaur, March 23, 2007, “Role of
     Mobile Agents in Mobile Computing”, Proceedings of National
                                                                                              University Pune in 1992 and Ph.D
     Conference on Challenges & Opportunities in Information                                  (Microwaves) from Dr. Babasaheb
     Technology (COIT-2007).                                                                  Ambedkar Marathwada University,
[8] Ametller, S. Robles, J. A. Ortega-Ruiz, “Self-Protected Mobile                            Aurangabad in June 1996. He has
     Agents”                                                                                  working as Associate Professor from
[9] Ahlem BenHassinea, Tu Bao Hob, (2007) ,“An agent-based                                    last 11 year and has Nine-year
     approach to solve dynamic meeting scheduling problems with
     preferences”, Engineering Applications of Artificial Intelligence     Research experience. He is having Eleven National &
     20 858, 857–873                                                       International Research Publication. He is also Life
[10] Ole Martin Mevassvik, Mr. Karsten Bråthen and Mr. Richard Moe         Member of Indian Physics Association, Physical Society
     Gustavsen, March 2006, “JADE – An Experiment in Distributed           of India. He has work on Two Research Project Funded
     Simulation Based Joint Tactical Training”                             by UGC. He is Recognized Research Guide of S.R.T.M
[11] Acklin and Interpolis, November 2005, “Software Agents in
     International Traffic Insurance”, A Business Case Study
                                                                           University, Nanded & J.J.T University Rajasthan. His
[12] Dag Johansen, 2004, “Mobile Agents: Right Concept, Wrong              Research areas of interest are Dielectric Spectroscopy,
     Approach”, Proceedings of the 2004 IEEE International                 Finite Element Method, Quantum Chemistry, Mobile
     Conference on Mobile Data Management                                  Agent, Computing Educational Evaluation, and ICT.
[13] Krzysztof Chmiela, Dominik Tomiaka, at all, “Testing the
     Efficiency of JADE Agent Platform”
[14] KK Wong, CK Heng, PC Leong & MT Yap, 2003, “A Mobile
     Agent Based Registration System”, International Conference
     WWW/Internet
[15] Kunal Shah, August 2003, „„Performance Analysis Of Mobile
     Agents In Wireless Internet Applications Using Simulation ‟‟
[16] Lilley, M., & Barker, T. (2003). An evaluation of a computer
     adaptive test in a UK University Context. In Danson
[17] Burstein, J., Leacock, C., & Swartz, R. (2001). Automated
     evaluation of essay and short answers.
[18] Chou, Mobile Agent Work across Heterogeneous Systems. Web:
     http://www.mowahs.com, 2001
[19] Kalle Burbeck, Daniel Garpe, Simin Nadjm-Tehrani, “Scale-up
     and Performance Studies of Three Agent Platforms”
[20] Linden, W. J. van der, & Glas, C. A. W, 2000, “Computerized
     Adaptive Testing: Theory and Practice”, Norwell, [21] Zoran
     Putnik, Zoran Budimac, Sept 6-7, 2000, “Mobile Agent - A New
     and Advanced Concept?” Proceeding of the TARA 2000
     Conference Novi Sad, Yugoslavia,
[21] Puliafito, O. Tomarchio, and L. Vita. MAP: Design and
     Implementation of a Mobile Agents Platform. Journal of System
     Architecture, 46(2):145-162, 2000
[22] Constructing a computer-assisted testing and evaluation system on
     the World Wide Web- the CATES experience. IEEE Transactions
     on Education, 3 (43), 266-272. (Ed.), Proceedings of the Seventh
     Computer Assisted Assessment Conference, Loughborough, UK.
[23] Green, S. et al. Software Agents: A review, T
[24] David Kotz and Robert S. Gray. “Mobile Agents and the Future of
     the Internet”, ACM Operating Systems Review
[25] Bradshaw, Jeffrey M. (Editor). Software Agents. Mit Press. ISBN:
     0262522349
[26]Agent Systems, Mobile Agents, and Applications by David Kotz




                                                                                                                              401
                                                    All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soniijcite
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Qo s requirements networking application
Qo s requirements networking applicationQo s requirements networking application
Qo s requirements networking applicationdaauit1
 

What's hot (12)

4 (mobile computing)
4 (mobile computing)4 (mobile computing)
4 (mobile computing)
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
G0314043
G0314043G0314043
G0314043
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
D0362035
D0362035D0362035
D0362035
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soni
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Qo s requirements networking application
Qo s requirements networking applicationQo s requirements networking application
Qo s requirements networking application
 

Viewers also liked (8)

252 256
252 256252 256
252 256
 
139 141
139 141139 141
139 141
 
600 608
600 608600 608
600 608
 
61 66
61 6661 66
61 66
 
196 202
196 202196 202
196 202
 
begrippen hc6
begrippen hc6begrippen hc6
begrippen hc6
 
256 261
256 261256 261
256 261
 
210 214
210 214210 214
210 214
 

Similar to Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxsusanschei
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...IOSR Journals
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
 

Similar to Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology (20)

The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed Service
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Computer Assisted Testing and Evaluation System: Distance Evaluation Using Mobile Agent Technology 1 Prakash V. Rajguru, 2Dr. Sushant B. Deshmukh. 1 Department of Computer Science & IT, Adarsh Arts, Commerce & Science College, Hingoli. (Maharashtra), India. Email: prakash_rajgure@yahoo.com, Cell. 09822186940 2 Post Graduate Department of Physics, R.G.Bagdia arts, S.B.Lakhotiya Commerce. & R.Bezonji Science College, Jalna (Maharashtra), India. Email: sushant.d69@gmail.com, Cell. 09422238695 Abstract: The growth of Internet has led to new avenues daily lives visit a place, use a service, and then move on. for distance education. A crucial factor for the success of Basically, a mobile agent executes on a machine that distance education is effective mechanisms for distance hopefully provides the resource or service that it needs to evaluation (DE). Existing Internet evaluation mechanisms, perform its job. If the machine does not contain the such as web based testing, rely principally on the client- server model. Such mechanisms usually do not scale well needed resource/service, or if the mobile agent requires a and also do not fully support features like: evaluation of different resource/service on another machine, the state subjective questions, delivery of dynamic content, and off- information of the mobile agent is some how saved, line examinations. These features are extremely desirable transfer of the mobile agent to the machine containing the for distance evaluation and there is a need for alternate necessary resource/service is initiated, and the mobile ways of designing such applications. agent resumes execution at the new machine. Advantages We study the existing mobile agent frameworks to understand state of the art. We then use the mobile agent of using mobile agents include low network bandwidth approach for designing, implementing and deploying a since they only move when they need to move, continued system for distance evaluation of students. We consider the execution even when disconnected from the network, entire examination process: (i) Paper setting, where the ability to clone itself to perform parallel execution, easy examiners spread over the internet collaborate to produce a implementation and deployment, and reliability. Mobile question paper, (ii) Examination conduction, where the agents have been developed as an extension to and question papers are distributed and the answer papers are collected, and (iii) Answer-paper evaluation, result replacement of the client-server model. In the client compilation and publishing. server model, a server is a machine that provides some We have designed and implemented, Computer Assisted service (or set of services) and a client (most often Testing and Evaluation System in Distance Evaluation using another machine) makes requests for those services. Mobile Agent Technology. Mobile Agent in Distance Communication between a client and a server is usually Evaluation aims to map closely to real world examination through message passing. So, when a client needs a scenarios and addresses the full scope of the examination process, viz., paper setting, distribution and testing, particular service, it usually sends a request message to a evaluation and result compilation. In this research we server that contains the needed service. A limitation of describe how to implement the Distance Evaluation using the client-server model is that the client is limited to the Mobile Agent Technology. operations provided at the server. So, if a client needs a service that a particular server does not provide, the client Keywords: Internet, Client-Server Technology, Mobile must find a server that can satisfy the request by sending Agent Technology, Distance Evaluation, and Agent Transfer Protocol. out messages to all servers. This clearly is an inefficient use of network bandwidth. Also, this severely limits network scalability since managing and updating these I. INTRODUCTION servers would prove prohibitive. As the Internet constantly expands, the amount of available on-line information expands as well. The issues II. CLIENT-SERVER TECHNOLOGY of how to efficiently find gather, and retrieve this 1. “A Client-Server network is a distributed network information has led to the research and development of systems and tools that attempt to provide a solution to this problem. These systems and tools are based on the use of mobile agents. Mobile agents are processes (i.e., executing programs) that can migrate from one machine of a system to another machine (usually in the same system) in order to satisfy requests made by their clients. They implement a computational metaphor that is analogous to how most people conduct businesses in their 395 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 which consists of one higher performance system, down, which can potentially block hundreds of the server, and several mostly lower performance clients from working with their data or their systems, the clients. The server is the central applications. registering unit as well as the only provider of  As the number of simultaneous client requests to a content and service. A client only requests content or given server increases, the server can become the execution of services, without sharing any of its overloaded. own resources.” 2. “Client-Server architecture is network architecture III. NEW TRENDS IN INTERNET APPLICATIONS in which each computer or process on the network is There are many trends in Internet technology and either a client or a server. Servers are powerful activity that encourage the use of mobile agents on the computers or processes dedicated to managing disk Internet. These trends are outlined and are briefly drives (file servers), printers (print servers), or described below: network traffic (network servers). Clients are PCs or i. Bandwidth: Internet access is broadening to the workstations on which users run applications. Clients point where people will have a reasonable-speed rely on servers for resources, such as files, devices, access to the Internet. The Internet backbone has an and even processing power.” enormous amount of bandwidth available. The most commonly used paradigm in constructing ii. Mobile devices: Internet users are mobile and distributed systems is the Client- Server model. In this therefore they need their Internet access to come with scheme clients request services or content from a server. them by using portable computing devices. The client and server require a known set of conventions Everything from laptops or palmtops to car before the can communicate. This set of conventions telephones to pagers can access the Internet. contains a protocol, which must be implemented at both iii. Mobile users: Internet users have shown that they ends of a connection. like to have access to everything from anywhere ADVANTAGES AND DISADVANTAGES through the popularity of things like web-mail. Web The following advantages and disadvantages of the terminals are becoming more and more popular. Client-Server architecture. iv. Intranets: Internal or private and smaller versions of the Internet are being used for information sharing  ADVANTAGES within companies and corporations. Intranets are  Data management is much easier because the files usually managed by a single organization and can are in one location. This allows fast backups and make use of new technologies quickly since security efficient error management. There are multiple levels within the intranet is of less concern. of permissions, which can prevent users from doing v. Information overload: The massive amount of damage to files. information available on the Internet today is  All the data are processed on the server, and only the immeasurable. Users are easily overwhelmed by the results are returned to the client. This reduces the sheer quantity of data that is at their disposal. amount of network traffic between the server and the Filtering technology, while still quite limited, can client machine, improving network performance. help reduce the stream of information to a given user  Thin client architectures allow a quick replacement to a tolerable level. of defect clients, because all data and applications are vi. Customization: Site customization for individual on the server. users is possible through the Internet and can be  Divides Application Processing across multiple provided on either the client or server side. machines: vii. Proxies: Third party proxies can provide site wide  Scales Horizontally – Multiple servers, each server customization for one or more Internet services. having capabilities and processing power, can be They can be used to reduce information overload and added to distribute processing load. customize service access.  Scales Vertically - Can be moved to more powerful machines, such as minicomputer or a mainframe to IV. DISTANCE EVALUATION SYSTEM take advantage of the larger system‟s performance Most of the present day Internet based evaluation  Reduces Data Replication - Data stored on the is web-based and employs the client-server servers instead of each client, reducing the amount of paradigm. It uses HTML-forms for user interface, data replication for the application. with either common gateway interface (CGI)-scripts  DISADVANTAGES or java-servlets for back end processing. The students download the questionnaire as a web page  Client-Server-Systems are very expensive and need a and the answers are submitted back to the server. lot of maintenance. This is essentially the pull-model of distributing the  The server constitutes a single point of failure. If information. The second Internet based model uses failures on the server occur, it is possible that the java-applets as the front-end for question paper. This system suffers heavy delay or completely breaks too follows a similar mechanism as the previous case 396 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 except that using Java gives more flexibility to the The Brustoloni Agent [Brustoloni 1991, Franklin examiner in choosing the type of content. With the 1995, p. 265] "Autonomous agents are systems need for providing multimedia content, multimedia capable of autonomous, purposeful action in the real support languages (e.g. flash scripting language) are world." too being used to provide front-ends. Mobile Agent = State + Action + Mobility  Extending existing distance evaluations schemes: The Agent term was already introduced into the We will now highlight the extensions that are computer science in the late 1970s within the desirable in the distance evaluation systems: artificial intelligence (AI) research (see Nwanda). Agent stands for autonomous intelligent behavior i. Push Model: In some cases there is a need to send including the ability for communication, which is the question paper to the examinee at a time as subsumed in a general introduction of the Agent term decided by the examiner. Such a scenario also arises in the AI research by Wooldridge and Jennings. in a case where a number of students are to be Accordingly, an Agent is thought of as a software evaluated simultaneously for the same set of questions. Most of the paper-based testing methods prevalent today follow this model. ii. Variety of delivered contents: The use of electronic media for information dissemination has made it possible to present the questions using dynamic content in form of audio, video-clips, or multimedia. It will be desirable to support such rich content in the question-paper. iii. Subjective questions: The students may be required to provide answers that are objective, written text or involve some graphical schematics. All of these cannot be automatically evaluated and would require manual corrections. The present day on-line systems don‟t have a provision for these. entity or component in the modern software iv. Off-line examinations: The paradigm followed in engineering owning the following properties, these schemes is client-server and the students have described in a general overview by Bradshaw and to remain on-line for the duration of test. For remote Nwanda: interactions, this can be achieved either by opening a • Autonomy, an Agent can act following self- socket connection which remains alive during the constructed plans entire duration of examination, or by opening a • Ability for communication, an Agent can interact with socket connection for every request by the client. other Agents • Reactivity, an Agent can react on environment v. Adaptive Questions: It will be desirable to build changes adaptive tests wherein questions of various level of • Pro-activity, regarding to the previous feature, an difficulty are offered to the candidates in dynamic Agent can react on specific events by performing order. This order is determined by the student‟s special standard or optional processes depending on response to the previous set of questions. the event • Adaptation, an Agent can be configured to match V. MOBILE AGENT TECHNOLOGY special user experiences or to solve problems in a specific way  What is an agent? • Intelligence, an Agent own on the one side decision- Workers involved in agent research have offered making abilities and on the other side learning a variety of definitions, each hoping to explicate his algorithms for learning about its user‟s behavior. or her use of the word "agent." The IBM Agent Harrison. Et al. & Braun highlights some desirable [http://activist.gpl.ibm.com:81/WhitePaper/ptc2.htm] characteristics of mobile agents: "Intelligent agents are software entities that carry out • Mobile Agents work in large and heterogeneous some set of operations on behalf of a user or another networks, where no assumptions about reliability and program with some degree of independence or security of the involved platforms can be made. autonomy, and in so doing, employ some knowledge • The migration is controlled by the programmer, which or representation of the users goals or desires." means that the program itself and not the operating system decide when and where to go. 397 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 • The execution of the program is not location- 4) Reduction in network traffic: MA's code is very often transparent, but the program moves to a specific smaller than data that it processes, so the transfer of server for using services, which are only provided at mobile agents to the sources of data creates less this platform. traffic than transferring the data. • Mobility: Mobility describes the ability of a Mobile 5) Asynchronous autonomous interaction: Mobile Agent to move through a heterogeneous electronic agents can be delegated to perform certain tasks even network and deciding autonomously when and where if the delegating entity does not remain active. This to go. A Mobile Agent migrates for example from a makes it an attractive for mobile application and platform A to another platform B to access services disconnected operations. of applications or to retrieve data from a database, 6) Interaction with real-time systems: Installing a which are only offered at the target platform of its mobile agent close to a real-time system may prevent migration. However, the graphic should emphasize delays caused by network congestion. another feature of the Mobile Agent Approach. 7) Efficiency savings: CPU consumption is limited, These Agents can only live in a special software because a mobile agent execute only on one node at a environment; the environment offers two important time. Other nodes do not run an agent until needed. communication capabilities. External applications are 8) Space savings: Resource consumption is limited, able to interact with Mobile Agents via the local because a mobile agent resides only on one node at a Mobile Agent environment and vice versa. time. In contrast, static multiple servers require • Persistence: Once a mobile a agent is launched, it duplication of functionality at every location. Mobile should not be reliant on the system that launched it agents carry the functionality with them, so it does and should not be affected if that node fails. The not have to be duplicated. concepts of an agent moving between network nodes 9) Support for heterogeneous environments: Mobile give it the ability to „survive‟ and to reach as many agents are separated from the hosts by the mobility resources as possible. This is useful for mobile framework. If the framework is in place, agents can computer users due to the fact that they can log on, target any system. The costs of running a Java launch an agent, log off and check later on its Virtual Machine (JVM) on a device are decreasing progress 10) Online extensibility of services: Mobile agents can • Peer-to-peer communication: A failure of the client- be used to extend capabilities of applications, for server paradigm is the inability of server to example, providing services. This allows for building communicate with other severs. Mobile agents are systems that are extremely flexible considered to peer entities and as such can adopt 11) Convenient development paradigm: Creating whichever stance is most appropriate to their current distributed systems based on mobile agents is needs. Fore example, when a mobile agent is relatively easy. The difficult part is the mobility interrogating a resource it takes the role of a client, framework, but when it is in place, then creating when another mobile agent wishes to query it, then it applications is facilitated. becomes a server. This follows for great flexibility in 12) Easy software upgrades: A mobile agent can be dealing with network entities and distributed exchanged virtually at will. In contrast, swapping resources. functionality of servers is complicated.  Benefits of Mobile Agent Technology VI. EXAMPLE OF MOBILE AGENT Mobile agent technology promises to provide some  JADE: JADE is free software and is distributed by very distinct advantages compared to the other TILab, open source software under the terms of the approaches. Some of them are: LGPL (Lesser General Public License Version 2). 1) Overcoming Network Latency Because MAs execute JADE has good GUI, accessible use, good locally, they can respond their environments faster. documentation and high acceptance. This is key requirement in some critical real-time systems.  ARA: Ara is a platform for the portable and secures 2) Encapsulation of Protocols Upgrading protocols in a execution of Mobile Agents in heterogeneous distributed system is a cumbersome task. MAs are networks. Mobile Agents in this sense are programs able to move to remote hosts and establish „channels‟ with the ability to change their host machine during based on the new or proprietary protocols. execution while preserving their internal state. This 3) Disconnected Operations MAs can operate enables them to handle interactions locally which asynchronously and autonomously from the process otherwise had to be performed remotely. that created them, after being dispatched. Mobile  CONCORDIA: Concordia is a full-featured devices, which need continuous access of fixed framework developed at Mitsubishi Electric network, often suffer from fragile and low bandwidth Information Technology Center America‟s connects. In such cases they can embed their task in (MEITCA) Horizon Systems Laboratory. It provides MAs, dispatch them, and then reconnect later to for the development and management of network- collect these agents. 398 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 efficient Mobile Agent applications for accessing advance). In addition, its task based and information anytime, anywhere, and on both wire- asynchronous model could be difficult to use, due to based and wireless device supporting Java. its differences with the classical procedural programming. The use of a single thread per agent  MOLE: Mole is the first Mobile Agent System that could be inefficient and a limitation for the has been developed in the Java language. The first programmer. Tryllian provides a large set of version has been finished in 1995, and since then configuration options, which could be overwhelming. Mole has been constantly improved. Mole provides a Finally, it does not offer facilities for synchronous stable environment for the development and usage of communication or conventional method invocation. Mobile Agents in the area of distributed applications. VII. PROPOSED FRAMEWORK  VOYAGER: Voyager is 100% java Agent-enhanced Object Request Broker (ORB) created by Object We use the mobile agent approach for designing, Space Company. Goals of this product to provide implementing and deploying a system for distance programmer to create state of the art distributed evaluation of students. We consider the entire programs quickly and easily while providing a lot of examination process: (i) Paper setting, where the flexibility and extensibility for the products that are examiners spread over the internet collaborate to being created with the voyager system. produce a question paper, (ii) Examination conduction, where the question papers are distributed and the  JACK: JACK Intelligent AgentTM is an Agent answer papers are collected and (iii) Answer-paper oriented development environment fully integrated evaluation, result compilation and publishing. with the Java programming language. JACK provides Agent-oriented extensions to the Java a) Examination Setting programming language. The examination setting process takes place in a  GRASSHOPPER: Grasshopper was developed by collaborative manner where the examiners sitting at IKV++ in 1999 (last version: 2.2.4, January 2003), different remote locations prepare their questions. and then became part of the commercial Mobile, and Mobile Agents are then dispatched to these examiners. today its development has probably been abandoned. These MAs fetch the question papers from all of the It is an easy-to-use platform for mobile agents, examiners. The central controlling authority decides on compliant with the standards MASIF and FIPA the final question paper based on the inputs from (http://www.fipa.org/). A Grasshopper system can be different examiners. composed of different regions. It provides agent a) Distribution and Testing developers with interesting features, including a graphical user interface to manage agents, agencies, Once a question paper is prepared, it is dispatched to and regions. By defining regions, the developer can the different examination centers with the help of benefit from dynamic proxies. The main Courier Mobile Agents. Having finished their disadvantage of Grasshopper is that it is not available distribution work, the Courier Agents get either anymore and new versions will not appear in the terminated or they return to their place of origin. The future. The region server could become a bottleneck, distribution servers at these centers have a list of as it must update every proxy right before using it. A candidates enrolled for that center. The examination disconcerting feature of Grasshopper (stated in the paper at each center is cloned to the number of students manual) is that a call to an agent that is moving can in each center. The examination papers can time-out end up executing on the copy of the agent at origin themselves after a fixed interval of time. Once a (which will be removed once the agent arrives at its student finishes answering a question or the destination). Finally, as in Aglets, the same examination paper times out, the answers are given predefined method is always executed after an back to the distribution center, which launches a agent‟s trip. Answer Mobile Agent for each student answer paper.  TRYLLIAN: Tryllian (http://www.tryllian.org), These Mobile Agents then make their way to the developed by the homonym company in 2001 (last Evaluation Center version: 3.2.0, released as open source in November 2005), is based on a sensing-reasoning action b) Evaluation and Result Compilation mechanism. It allows programmers to define a Once an Answer Agent reaches the evaluation center, reactive (based on incoming messages) and proactive it is supplied with an itinerary of the examiners. The (based on heartbeats) behavior of agents. Tryllian Answer Agents can also move to an Objective proposes a task based programming model and Question Evaluator if it possesses answers to multiple- communication among agents is achieved through choice questions, to automatically evaluate their message passing and in accordance with the FIPA answers. The Answer Agents move from one examiner standard. It also provides a persistency service. The to other, until all of the questions are evaluated. They main disadvantage of Tryllian is that it does not offer then move to the Publishing Center where they supply location transparency (the current location of the target agent of a message must be known in 399 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 their results and where the final comprehensive results Test b - Client-Server Interactions are published. Remote Question Student Paper VIII. MOBILE AGENTS FOR MPLEMENTING THE Paper Server Mobile Agent Interface Client TECHNIQUE IN DISTANCE EVALUATION Interaction o Agent Transfer Protocol ATP is a simple application-level protocol designed to transmit an agent in an agent system- Client-Server Interaction independent manner. An ATP request consists of a request line, header fields, and content. The request line specifies the method of the request, while the Set-up for Measuring Response Time header fields contain the parameters of the request.  Observations ATP defines the following four standard request We see that in case of client-server, the response methods: times will remain more or less constant whereas in the o Dispatch: The dispatch method requests a destination case of MA, the initial response takes much longer while agent system to reconstruct an agent from the content the remaining requests take negligible time as compared of a request and to start executing the agent. If the to client-server responses. The initial longer response in request is successful, the sender must terminate the case of MA is because of the additional time taken for agent and release any resources consumed by it. agent creation, dispatch and transfer. Response-time determines the user-experience and hence is critical for our application. In future with the content getting richer (graphics and multimedia support), this difference will become even more pronounced. Traditional client-server distributed programs avoid this problem by techniques like pre-fetching, caching etc. Mobile agents inherently provide these capabilities in our application. The „Start‟, causes a mobile agent to be launched from a remote machine, which brings in the new question paper/ section for the student in the first case. In second case the same first page of question paper/ section is fetched as data from the remote-server. The students, browsing through the given set of questions, generate further o Retract: The retract method requests a destination queries. In case of MA, these questions would be been agent system to send a specified agent back to the pre-fetched by the mobile agent and hence the responses sender. The receiver is responsible for reconstructing will be local. In the second case every request will cause and resuming the agent. If the agent is successfully a remote request to be placed in typical client-server transferred, the receiver must terminate the agent and mode. release any resources consumed by it. o Fetch: The fetch method is similar to the GET X. CONCLUSION method in HTTP; it requests a receiver to retrieve We studied the client server technology and Mobile and send any identified information (normally class Agent Technology. We also investigate the existing files). distance evaluation scheme. We survey and analysis the o Response: We define response time as the time taken various Mobile Agent paradigm. We check the between a student making a request, such as, request performance of mobile agent over client server for next question or request for next section in the technology and used more powerful mobile agent question paper, and getting the appropriate response. paradigm for implementing our research project Computer Assisted Testing System in Distance IX. PERFORMANCE EVALUATION Evaluation i.e. Mobile Agent in Distance Evaluation. The performance criterion most relevant for our A typical distance evaluation scenario is characterized application is the response time for the students. We by large geographical distances, disconnected operations, define response time as the time taken between a student dynamically interchangeable client-server roles and large making a request, such as, request for next question or number of interacting nodes. By using Mobile Agents as request for next section in the question paper, and getting the principal design paradigm in Mobile Agent in the appropriate response. Distance Evaluation, we will be overcome many of the We have performed experiments to make the following limitations of existing systems. Mobile Agent in Distance two set of measurements: Evaluation to the full gamut of distance evaluation viz. Response Time for: paper-setting, distribution and testing, and evaluation by Test a - Mobile Agent Interactions means of various types of MAs. We will research how 400 All Rights Reserved © 2012 IJARCET
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 MAs can be used effectively for structuring such large- AUTHORS PROFILE scale distributed applications. The gains would be in RAJGURU PRAKASH VITHOBA received the terms of: scalability, flexibility, dynamic extendibility M.C.M.from Dr. Babasaheb and independence from the network variations. We also Ambedkar Marathwada University, investigate to improving the overall performance of Aurangabad, M.Phil. Degree in system, reliability of system and System security. Computer Science from Algappa University Karikudi & B.Ed from XI. REFERENCE SRTMU Nanded in 2005, 2008 & 2011 respectively. From 2005 he is [1] Mane Dnyaneshwar Rangnath, June, 2010, “Mobile Agent Security – Aglet Platform”, Thesis Submitted in partial fulfillment working as Asst. Professor of Computer Science in of the requirements for the degree of M.Tech. Adarsh Education Society‟s, Hingoli. He is doing Ph.D. [2] Giovanni Caire, 30 June 2009, “Jade Tutorial Jade Programming He attended many National and International for Beginners”, TILAB, formerly CSELT Conferences, Workshops and Seminars. He is having five [3] “JACK Intelligent Agents” ,Agent Practical 2009 International & three National Publication in Standard [4] Jingqiao Zhang, September 1, 2009, “JADE: Adaptive Differential Evolution with Optional External Archive” International Journals. His areas of interest are Mobile [5] Mihai Caramihai, and Irina Severin, 2009, “eLearning Tools Agent, Computing Educational Evaluation, Human Evaluation based on Quality Concept Distance Computing. A Case Computer Interaction, Green Computing, and ICT. Study”, World Academy of Science, Engineering and Technology [6] A. Kannammal, N.Ch.S.N. Iyengar, December 2007, “A Model Dr. DESHMUKH SUSHANT BAPURAO received the for Mobile Agent Security in E-Business Applications”, Volume M.Sc Physics with Specialization in 2, Number 2 Advanced Electronics from Pune [7] Amanpreet Kaur, Sukhdeep Kaur, March 23, 2007, “Role of Mobile Agents in Mobile Computing”, Proceedings of National University Pune in 1992 and Ph.D Conference on Challenges & Opportunities in Information (Microwaves) from Dr. Babasaheb Technology (COIT-2007). Ambedkar Marathwada University, [8] Ametller, S. Robles, J. A. Ortega-Ruiz, “Self-Protected Mobile Aurangabad in June 1996. He has Agents” working as Associate Professor from [9] Ahlem BenHassinea, Tu Bao Hob, (2007) ,“An agent-based last 11 year and has Nine-year approach to solve dynamic meeting scheduling problems with preferences”, Engineering Applications of Artificial Intelligence Research experience. He is having Eleven National & 20 858, 857–873 International Research Publication. He is also Life [10] Ole Martin Mevassvik, Mr. Karsten Bråthen and Mr. Richard Moe Member of Indian Physics Association, Physical Society Gustavsen, March 2006, “JADE – An Experiment in Distributed of India. He has work on Two Research Project Funded Simulation Based Joint Tactical Training” by UGC. He is Recognized Research Guide of S.R.T.M [11] Acklin and Interpolis, November 2005, “Software Agents in International Traffic Insurance”, A Business Case Study University, Nanded & J.J.T University Rajasthan. His [12] Dag Johansen, 2004, “Mobile Agents: Right Concept, Wrong Research areas of interest are Dielectric Spectroscopy, Approach”, Proceedings of the 2004 IEEE International Finite Element Method, Quantum Chemistry, Mobile Conference on Mobile Data Management Agent, Computing Educational Evaluation, and ICT. [13] Krzysztof Chmiela, Dominik Tomiaka, at all, “Testing the Efficiency of JADE Agent Platform” [14] KK Wong, CK Heng, PC Leong & MT Yap, 2003, “A Mobile Agent Based Registration System”, International Conference WWW/Internet [15] Kunal Shah, August 2003, „„Performance Analysis Of Mobile Agents In Wireless Internet Applications Using Simulation ‟‟ [16] Lilley, M., & Barker, T. (2003). An evaluation of a computer adaptive test in a UK University Context. In Danson [17] Burstein, J., Leacock, C., & Swartz, R. (2001). Automated evaluation of essay and short answers. [18] Chou, Mobile Agent Work across Heterogeneous Systems. Web: http://www.mowahs.com, 2001 [19] Kalle Burbeck, Daniel Garpe, Simin Nadjm-Tehrani, “Scale-up and Performance Studies of Three Agent Platforms” [20] Linden, W. J. van der, & Glas, C. A. W, 2000, “Computerized Adaptive Testing: Theory and Practice”, Norwell, [21] Zoran Putnik, Zoran Budimac, Sept 6-7, 2000, “Mobile Agent - A New and Advanced Concept?” Proceeding of the TARA 2000 Conference Novi Sad, Yugoslavia, [21] Puliafito, O. Tomarchio, and L. Vita. MAP: Design and Implementation of a Mobile Agents Platform. Journal of System Architecture, 46(2):145-162, 2000 [22] Constructing a computer-assisted testing and evaluation system on the World Wide Web- the CATES experience. IEEE Transactions on Education, 3 (43), 266-272. (Ed.), Proceedings of the Seventh Computer Assisted Assessment Conference, Loughborough, UK. [23] Green, S. et al. Software Agents: A review, T [24] David Kotz and Robert S. Gray. “Mobile Agents and the Future of the Internet”, ACM Operating Systems Review [25] Bradshaw, Jeffrey M. (Editor). Software Agents. Mit Press. ISBN: 0262522349 [26]Agent Systems, Mobile Agents, and Applications by David Kotz 401 All Rights Reserved © 2012 IJARCET