Fawaz Alsaadi Fahad Alsolmai.  Role Based Multi-Agent System for providing effective and secure Bank transaction services  To provide seamless access.

Slides:



Advertisements
Similar presentations
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
Advertisements

Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Database System Concepts and Architecture
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Use Case & Use Case Diagram
Overview UML Extensions for Agents UML UML Agent UML (AUML) Agent UML (AUML) Agent Interaction Protocols Agent Interaction Protocols Richer Role Specification.
OASIS Reference Model for Service Oriented Architecture 1.0
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
1 By Fawaz Alsaadi & Fahad Alsolami CS691 - Summer 2011.
Introduction To System Analysis and Design
Multiagent Systems and Societies of Agents
Application architectures
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Building Knowledge-Driven DSS and Mining Data
Course Instructor: Aisha Azeem
SaaS Software Container By Brian Moore Paul Kopacz.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Application architectures
Filename\location Agent Mediated Electronic Commerce Dr. Chris Preist HP Labs.
CONNECT as an Interoperability Platform - Demo. Agenda Demonstrate CONNECT “As an Evolving Interoperability Platform” –Incremental addition of features.
Processing of structured documents Spring 2003, Part 6 Helena Ahonen-Myka.
UNIT-V The MVC architecture and Struts Framework.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
BUET- Octavian Deliberators : Hasan Habibul Latif Sheikh Al Amin.
Business Analysis and Essential Competencies
POAD Distributed System Case Study: A Medical Informatics System Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Introduction To System Analysis and Design
Faculty of Computer & Information Software Engineering Third year
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
MOBILITY BILL DEFRAYMENT
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Database Design – Lecture 18 Client/Server, Data Warehouse and E-Commerce Database Design.
1 Capturing Requirements As Use Cases To be discussed –Artifacts created in the requirements workflow –Workers participating in the requirements workflow.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
1 Chapter 1 Introduction to Databases Transparencies.
Software Requirements: A More Rigorous Look 1. Features and Use Cases at a High Level of Abstraction  Helps to better understand the main characteristics.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
Agent Overview. Topics Agent and its characteristics Architectures Agent Management.
Lecture 14 22/10/15. The Object-Oriented Analysis and Design  Process of progressively developing representation of a system component (or object) through.
CSE300 EAIusing EJB & XML CSE Enterprise Application Integration Using EJB and XML by Prithwis Sett Mumtaz Lohawala Nayana Paranjape.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Software Requirements Specification Document (SRS)
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Expense Tracking System Developed by: Ardhita Maharindra Muskan Regmi Nir Gurung Sudeep Karki Tikaprem Gurung Date: December 05 th, 2008.
Vending Machine Through Mobile (A BLUE TOOTH BASED APPLICATION)
Chapter 2 Database System Concepts and Architecture
The Client/Server Database Environment
Chapter 1: Introduction
Object-Oriented Static Modeling of the Banking System - I
EMV® 3-D Secure - High Level Overview
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Data, Databases, and DBMSs
Chapter 5 Architectural Design.
Presentation transcript:

Fawaz Alsaadi Fahad Alsolmai

 Role Based Multi-Agent System for providing effective and secure Bank transaction services  To provide seamless access to information present in the database  Negotiation agent to access and trust negotiations, Database agent  Interface Agent to accept and display request service results. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC2

 Main Features of the system  Ease of use,  Effective communication between customers and service providers,  Isolation from resource specific details, changes in the system and internal complexity 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC3

 Agents developed using Java Agent  Development Framework (JADE)  Java APIs  System provides features such as  The Login Validation or User Authentication  Service Registration,  Role Agent Identification, and  User Interface for an effective interaction between customer and the system.  The role agent retrieves the information from database and sends it to the customer through an interface agent. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC4

 Aurora Vizcanaino et al [1] proposed a multi- agent model which is suitable for developing a generalized knowledge management system  C.VGoldman et.al  Suggested a decentralized collaborative multi-agent communication model and mechanism design based on Markov Decision Process (MDP)  Assumed that agents are full-synchronized when they start operating  No specific optimal algorithm is presented  No experimental results showing their algorithm can work on large team 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC5

 Fabio Belliemine presented a framework for team coordination under incomplete information based on the incomplete information game theory that agents can learn and share their estimates with each other.  Uses a probability method to coordinate agent team without explicit communication by observing teammates’ action and coordinating their activities via individual and group plan inference 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC6

 System accepts the customer request by interface agent.  The facilitator is used to register the service of role agents.  The role agent has the ability to forward the request to negotiator for the validation of request and account details. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC7

 The database agent possesses the capacity to retrieve the customer information.  The interface agent is used to display the customer details. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC8

 User Interface  Graphical User Interface  Mobile Agent Creation module  Server with appropriate resource is identified to process the customer request.  Facilitator coordinates the mobile agent to process customer request.  Facilitator registers the agent to access a particular service using its Agent ID.  After completion of the customer service the facilitator deregisters the service. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC9

 Loan Mobile Agent  System lists the available bank loan schemes to the customer  Checks the customer’s history  If the customer has sufficient balance, the loan is sanctioned  New loan is not entitled unless the customer pays the previous dues.  The customer balance amount gets updated when permitted to avail the loan. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC10

 Credit Card Agent  Provides access rights to the customer  Sends the customer information to interface agent.  Interface agent coordinates the Credit Card Agent to register its service with the facilitator.  Role of the agent is to process the customer request.  The role based agent checks the customer’s earlier due regarding cash or purchase.  If customer do not have due then the customer is permitted to use the credit card within the permitted limit.  If the customer has dues, credit card payment is barred 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC11

 Insurance agent  Provides information to all customers about the insurance offers (i.e. access to polices, brochures and price list).  Describes the characteristics of different types of insurance and their attributes. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC12

Payment of Insurance bill 1 Electronic bill generation 2. Payment order 3. Electronic notification for sufficient money 4. Electronic notification to Insurance agent 5. Verification of money transfer 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC13

 Decision Agent  Makes the decision from the role based multiagents with the coordination of a data warehouse.  Multi-Agent Communication  To achieve the individual objectives or dynamically coordinate the actions, software agents need to interact with one another.  Communication is at the basis of agents interactions 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC14

 Foundation for Intelligent Physical Agent (FIPA)  Specifies standard components that can be used  Determination of valid sequences of messages called INteraction Protocols (INP) regulating specific interactions to be known by all the interacting entities 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC15

 Foundation for Intelligent Physical Agent (FIPA)  Agent Communication Language (ACL) ▪ Enables the attitudes regarding the content of exchange to be expressed. ▪ e.g. whether the content of the communication is, an assertion, a request or some form of query ▪ Two most deployed ACL: FIPA-ACL and Knowledge Query Manipulation Language (KQML). 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC16

 Foundation for Intelligent Physical Agent (FIPA)  FIPA-SL, Knowledge Interchange Format (KIF) content Languages (CLs) used for describing the content of the message  At the ontology level, a vocabulary and a set of agreed definitions is used to describe a specific domain in terms of objects, actions and functions 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC17

 Interaction Protocols for Agents Conversations  Typical patterns of message exchange  Represent the highest abstraction component in the Agent Communication Stack  Standard fipa-request protocol is used when the Interface agent contacts the Role Based Agent for requesting the information of customer account  Identifies the specifickind of ACL messages which the agents are expected to exchangeas shown in Figure.  The standard FIPA- request interaction protocol 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC18

 System was implemented with JADE 3.3, Java and Oracle 10g.  Java uses its database driver called JDBC (Java Database Connectivity) to connect the database.  The interface between Oracle and Java is provided by JDBC-ODBC protocol.  Bank application was implemented with Multi-Agent Role Based Access Control in distributed environment.  Processing time consumed was very less with respect to the number of transactions as compared to client server systems.  User can launch the agent in two ways:  GUI agent Wizard,  Via command line. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC19

 Account Information Agent  Role based multi-agent GUI is created using JADE and Swing.  The Account information agent gets the username through the interface agent.  Role of agent is registered with facilitator.  Now the user details are negotiated based on the behavior of the agent.  Based on the agreement the account number and customer account balance from the account table and branch name from the branch table are joined before displaying the information.  Results show that processing time is much less than for client server system. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC20

 Account Information Agent  Authentication is checked  Lists the available bank loan schemes to the customers.  The user can select the options.  Before sanctioning the loan to the customer, this checks the customer dues.  The customer information is negotiated and if the customer has sufficient balance, the loan is sanctioned.  New loan is not entitled unless the previous dues are paid.  The customer balance is updated when permitted to avail the loan.  Results show that processing time is much less than for client server system. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC21

 Credit Card Agent  Credit card agent sends the customer information to interface agent.  Interface agent coordinates to register its service with the facilitator.  Role based agent checks the customer history.  If customer does not have any due the usage of credit card is permitted to a limit.  Results show that processing time is much less than that for client server system. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC22

 Insurance Agent  GUI displays the available Insurance details with coverage options.  Various scenarios are implemented with the purpose of evaluating the feasibility and the effectiveness of automated agent-based transactions.  Results show that processing time is much less than for client server system. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC23

 Insurance Agent  Intra-Bank payment order ▪ The insurance amount is deducted from the buyer’s account and credited to the seller’s account. ▪ If the buyer doesn’t have sufficient balance, it can be informed. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC24

 Insurance Agent  Inter-Bank payment order ▪ Role based agent specifies an insurance policy with Insurance service provider agent X for $3000. ▪ Y’s Role Based Agent orders the bank to transfer $3000 from its bank account to the Insurance provider agent – X‘s account. ▪ In such a condition, the insurance provider account is managed by adifferent bank agent. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC25

 Insurance Agent  Credit Card Based Payment Scenario ▪ Role based agent stipulates an insurance policy with insurance provider agent for $3000. ▪ Role based agent pays the specified amount of money via customer’s credit card account. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC26

 Rules Generator Agent  In the Rules Generating Agent module, the completed processes are stored in the transaction database.  The frequent Role based mobile agent sets are identified by using support and confidence.  After obtaining the Role based agent sets it can be associated with other Role based Agents for making the knowledge.  The best Rules are generated based on the given input transaction dataset values, 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC27

 System architecture for Distributed Role Based Multi-Agent System was proposed.  This system is implemented with Banking Domain application  Accepts the user request,  Identifies the role and  Agent Facilitator creates the role base mobile agent, transmission of secured agent data and adopts the customer needs to provide the desired results. 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC28

 The Boolean Association rules are implemented to generate knowledge from frequent Role Based Multi-Agent System.  It can be enhanced to implement Quantitative Association Rule to associate role based multi-agents to get more dependency of Distributed role based Agent 7/27/2011Fawaz Alssadi/Fahad Alsolmai/SDMRBAC29