Implementation of Multi-Agent based Digital Rights Management System for Distance Education (DRMSDE) using JADE
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 3
Abstract
The main objective of Distance Education (DE) is to spread quality education regardless of time and space. This objective is easily achieved with the help of technology. With the development of World Wide Web and high-speed internet the quality of DE is improved because now Digital Content (DC) can be easily and in no time distributed to many learners of different locations in text, audio and video formats. But, the main obstacle in digital publishing is the protection of Intellectual Property Rights (IPR) of DC. Digital Rights Management (DRM) that manages rights over any digital creation is the only solution to this problem. In this paper, we have made an attempt to implement a Digital Rights Management System for Distance Education known as DRMSDE. We have identified that Multi-Agent System (MAS) based technology is very popular for such type of implementations. Keeping that in mind, we have chosen one of the most popular Multi-Agent based tools, namely JAVA Agent Development Framework (JADE), for our system. This paper presents an overview and the system architecture for the proposed implementation.
Authors and Affiliations
Ajit Kumar Singh, Akash Nag, Sunil Karforma, Sripati Mukhopadhyay
Context-Aware Mobile Application Task Offloading to the Cloud
One of the benefits of mobile cloud computing is the ability to offload mobile applications to the cloud for many reasons including performance enhancement and reduced resource consumption. This paper is concerned with o...
Building an Artificial Idiotopic Immune Model Based on Artificial Neural Network Ideology
In the literature, there were many research efforts that utilized the artificial immune networks to model their designed applications, but they were considerably complicated, and restricted to a few areas that such as co...
Complexity of Network Design for Private Communication and the P-vs-NP Question
We investigate infeasibility issues arising along network design for information-theoretically secure cryptography. In particular, we consider the problem of communication in perfect privacy and formally relate it to gra...
Key Issues in Vowel Based Splitting of Telugu Bigrams
Splitting of compound Telugu words into its components or root words is one of the important, tedious and yet inaccurate tasks of Natural Language Processing (NLP). Except in few special cases, at least one vowel i...
USING PENALIZED REGRESSION WITH PARALLEL COORDINATES FOR VISUALIZATION OF SIGNIFICANCE IN HIGH DIMENSIONAL DATA
In recent years, there has been an exponential increase in the amount of data being produced and disseminated by diverse applications, intensifying the need for the development of effective methods for the interactive vi...