9
8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 1/9 Enforcing Learning Activities policies in Runtime Monitoring System for E-learning Environments Turki Alghamdi, Hussein Zedan, Ali Alzahrani Software Technology Research Laboratory, De Montfort University  Leicester, UK LE1 9BH talgamdi,zedan,[email protected]  Abstract—Most educational institutes are involved with both the e-learning and classroom-based learning methods. Nowadays, quality and flexibility properties become essential in learning. The classroom-based learning lack in flexibility but offers a good quality in learning process. On the other hand, developing the e-learning system to meet the efficiency in both quality and flexibility is the attention for researchers. To overcome the deficiency in the quality property in e-learning system, we provide in this paper a runtime monitoring system which based on learning activities policy to attains both quality and manageability properties with respect of flexibility property. Obviously, keeping track of learning activities performed by student can prevent problems that affect the student progress. In addition, learning activity policy can control the learning behaviour of the student.  Keywords —Learning Activity, Policy, Runtime Monitoring, Student Tracking, VLE I. I NTRODUCTION The recent growth of e-learning environments has made them widespread in higher educational institutes and universi- ties all over the world. Currently, virtual learning environments (VLE) have become widely adopted as a form of e-learning system. VLE offers a large number of benefits, the most important of which is flexibility of access: any time and from any location with internet access [1]. Tracking or observing a student is a fundamental component to any e-learning system. The tracking component is not simply a fixed method that can be adhered to any e-learning system; the tracking component must reflect the specific requirements of the respective learning activities in the e-learning system. In traditional learning envi- ronments, teachers have a comprehensive view of the progress of their students, and they provide immediate feedback and personalized help. However, e-learning environments are more anonymous and utilize tracking tools that only show the number of activities performed by learners. Thus, teachers of e-learning courses have difficulty translating the enormous statistical reports into student behaviour, so they may not be able to provide individualized assistance to the same degree that traditional classroom teachers can [2]. Within the scope of this paper, we present the way that teachers observe and support their students in the traditional learning (classroom-based) environment, and we compare their methods with the tracking tools in the e-learning environ- ment and then we draw our motivation. Then, we present the architecture of our runtime monitoring system with the description of its components and the technology we want to use. Moreover, we describe the key word ”  policy ” in our system and show the types of policies that can be adapted to our approach. In section (V), we discuss a case study about requirements in e-learning course and then we show the formalisation of these requirements into numbers of policies. In addition, we write an algorithm to show the monitoring process specifically for our case study of quiz activity and the enforcement of its policies. Finally, we conclude this paper with future work to our approach. II. E-LEARNING VS. CLASSROOM-BASED LEARNING Educational research suggests [3]–[5] that in the e-learning context, the students should be assisted and evaluated by an instructor who, amongst other things, must monitor the stu- dents’ learning progress continuously, understand their needs, and provide feedback. To clearly explain the instructor’s requirements in terms of teaching, we provide thorough detail of how the students are observed in the traditional learning (classroom-based) environment, and then compare those ob- servations to the current VLEs to determine which metaphors can be adapted to the e-learning form. 1) Monitoring classroom-based learning (Reactivity): In traditional classes, the teacher has more presence [6], therefore the teacher has more control over the behaviour of the students. All of the student activities are always within the teacher’s view, including attendance, how students adapt to the lessons, what difficulties the student face, student progress, etc. A teacher in a conventional classroom setting is able to notice the body language of the students. Therefore, the teacher can immediately respond to nonverbal cues, such as a reduction in student interest or an unenthusiastic performance (e.g. a student spends more time than normal performing a task, a stu- dent does nothing, or a student does not collaborate with his or her peers when working in a group. Additionally, teachers in a traditional classroom setting are conscious of class unity, such as how well the students understand the lessons, how many students did the coursework, how many resources the students utilized, who succeeded (IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 8, August 2011 45 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

  • Upload
    ijcsis

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 1/9

Enforcing Learning Activities policies in Runtime

Monitoring System for E-learning Environments

Turki Alghamdi, Hussein Zedan, Ali Alzahrani

Software Technology Research Laboratory, De Montfort University  Leicester, UK LE1 9BH 

talgamdi,zedan,[email protected]

 Abstract—Most educational institutes are involved with boththe e-learning and classroom-based learning methods. Nowadays,quality and flexibility properties become essential in learning.The classroom-based learning lack in flexibility but offers agood quality in learning process. On the other hand, developingthe e-learning system to meet the efficiency in both qualityand flexibility is the attention for researchers. To overcome

the deficiency in the quality property in e-learning system,we provide in this paper a runtime monitoring system whichbased on learning activities policy to attains both quality andmanageability properties with respect of flexibility property.Obviously, keeping track of learning activities performed bystudent can prevent problems that affect the student progress.In addition, learning activity policy can control the learningbehaviour of the student.

 Keywords—Learning Activity, Policy, Runtime Monitoring,Student Tracking, VLE

I. INTRODUCTION

The recent growth of e-learning environments has made

them widespread in higher educational institutes and universi-ties all over the world. Currently, virtual learning environments

(VLE) have become widely adopted as a form of e-learning

system. VLE offers a large number of benefits, the most

important of which is flexibility of access: any time and from

any location with internet access [1]. Tracking or observing a

student is a fundamental component to any e-learning system.

The tracking component is not simply a fixed method that can

be adhered to any e-learning system; the tracking component

must reflect the specific requirements of the respective learning

activities in the e-learning system. In traditional learning envi-

ronments, teachers have a comprehensive view of the progress

of their students, and they provide immediate feedback and

personalized help. However, e-learning environments are more

anonymous and utilize tracking tools that only show the

number of activities performed by learners. Thus, teachers

of e-learning courses have difficulty translating the enormous

statistical reports into student behaviour, so they may not be

able to provide individualized assistance to the same degree

that traditional classroom teachers can [2].

Within the scope of this paper, we present the way that

teachers observe and support their students in the traditional

learning (classroom-based) environment, and we compare their

methods with the tracking tools in the e-learning environ-

ment and then we draw our motivation. Then, we present

the architecture of our runtime monitoring system with the

description of its components and the technology we want

to use. Moreover, we describe the key word ” policy ” in our

system and show the types of policies that can be adapted

to our approach. In section (V), we discuss a case study

about requirements in e-learning course and then we show the

formalisation of these requirements into numbers of policies.

In addition, we write an algorithm to show the monitoring

process specifically for our case study of quiz activity and the

enforcement of its policies. Finally, we conclude this paper

with future work to our approach.

II. E-LEARNING VS. CLASSROOM-BASED LEARNING

Educational research suggests [3]–[5] that in the e-learning

context, the students should be assisted and evaluated by an

instructor who, amongst other things, must monitor the stu-

dents’ learning progress continuously, understand their needs,

and provide feedback. To clearly explain the instructor’srequirements in terms of teaching, we provide thorough detail

of how the students are observed in the traditional learning

(classroom-based) environment, and then compare those ob-

servations to the current VLEs to determine which metaphors

can be adapted to the e-learning form.

1) Monitoring classroom-based learning (Reactivity): In

traditional classes, the teacher has more presence [6],

therefore the teacher has more control over the behaviour

of the students. All of the student activities are always

within the teacher’s view, including attendance, how

students adapt to the lessons, what difficulties the student

face, student progress, etc. A teacher in a conventional

classroom setting is able to notice the body language

of the students. Therefore, the teacher can immediately

respond to nonverbal cues, such as a reduction in student

interest or an unenthusiastic performance (e.g. a student

spends more time than normal performing a task, a stu-

dent does nothing, or a student does not collaborate with

his or her peers when working in a group. Additionally,

teachers in a traditional classroom setting are conscious

of class unity, such as how well the students understand

the lessons, how many students did the coursework, how

many resources the students utilized, who succeeded

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

45 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 2: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 2/9

at completing a certain task, and so on. Teachers in a

traditional setting are normally required to ensure that

their students meet all requirements of the course they

are taking by being proactive in student development

in a timely manner. Because traditional teachers instruct

their students as a group, their learning sessions are more

interactive: students can help each other, the teacher can

conduct organized discussion groups, and the teacherand the students can come to a mutual understanding or

a group consensus over certain activities.

2) Monitoring the e-learning environment (anytime, any-

where): The major aim of e-learning environments is

to allow students access to the course at the times and

locations which are convenient for them, which, in turn,

encourages them to pass the course. Students participat-

ing in e-learning have the freedom to study and par-

ticipate in all activities. The drawback of this flexibility

and freedom is that instructors cannot personally interact

with the students as a group, so the performance and

behaviour of the learners is not as easily controlled, and

the absence of class unity may discourage an individual

student’s sense of accountability to the course policies.

However, most VLEs have a built-in functionality to

track, analyze and report e-learners’ activities [7]. Most

commercial VLEs (e.g. Blackboard and WebCT) and

free open source VLEs (e.g. MOODLE) have similar

tracking tools, which provide reports that include the

number of activities performed by learners and the types

of actions they have taken. The following list presents

some features of the student tracking tool in MOODLE

as reported in [8]:

• It provides reports that show the number of students

who access the course, the number of times the

course is accessed, the date of each access, and

the IP address of each student who accessed course

contents, discussion forums, course assessments,

and assignments.

• It provides a report that shows the number of 

attempts by each student on an assignment and the

time spent on each attempt. Instructors can keep

private notes about each student in a secure area.

• Student tracking also provides a summary report of 

each student’s performance on all assignments.

• The instructor can set a flag on particular course

components to track the frequency that learnersaccess those components.

• It allows the instructor to monitor learners who are

currently logged in to the course.

The features above show statistical data from large

logs of students’ activities, but the problem that this

comprehensive data that is presented to the instructors is

the burden of interpretation. Instructors must spend an

enormous amount of time studying the statistics in order

to translate them into behaviour patterns before they can

provide appropriate feedback to the learners.

III. MOTIVATION

In comparing the two methods of learning above, we can

find that in classroom-based learning methods the quality

and manageability properties of the course requirements are

met. The teacher in traditional classroom can ensure that

students accomplish all learning activities during the session

and also the teacher can manage to achieve applying all course

requirements to students and prevent any barriers that affectlearning process and achievement of student. In contrast, we

can figure out that in e-learning method the quality property is

less [9] .The instructor has less sense in understanding student

behaviour on doing learning activity. Thus, he or she can

not ensure student progress due to more flexibility and less

restrictions on doing these activities [10]. However, we can be

motivated according to all above that an effective tracking and

monitoring technique is needed immediately. The motivation

that is raised here leads us to have such technique that

attains more quality and manageability properties with respect

to flexibility property (as depicted in Fig 1) which already

exist in e-learning systems. Our motivation is summarized asfollowing:

• To have a runtime tracking and monitoring system that

keeps track of all learning activities performed by student

can prevent problems that affects the student progress at

proper time.

• Enforcing dynamic policy will let our system evaluate

all events that are associated with the learning activities

which are performed by the student, accordingly and

thus, a suitable assistance will be provided to the student

continuously.

• Monitoring student based on a policy at runtime will lead

the teacher to have more sense in understanding students’

behaviour since the learning activity policies( see Section

VI.E)can control the learning behaviour of the student and

our system can provide the teacher with feedback about

students state at particular learning activity.

Fig. 1. Motivation and Challenge.

IV. THE ARCHITECTURE

Our approach is to track and observe students’ learning

activities during runtime of e-learning environments. Our mon-

itoring mechanism keeps track of students’ learning activities

as well as the requirements that are represented by the learning

activity policies (see section IV.D) that are predefined by the

educational institution. We focus on how to detect the events

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

46 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 3: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 3/9

that are associated with the learning activities in order to

ensure these events match the set of predefined policies. These

policies are expressed with respect to a set of learning activities

which must take place within the scope of a complex set

of rules (e.g. start time, duration, deadline, etc). Specifically,

the learning activity policies consist of a number of learning

activities with certain rules, (e.g. the predetermined duration

of certain quizzes and assignments). We consider some keypoints upon which some activity rules are dependent. For

example, some activities (e.g. assignment submission) may be

restricted to all students until they have achieved all necessary

prerequisites. Therefore, the key aspects of our approach are:

(a) how to detect e-learning activities, (b) how to formalise

and enforce the predefined activities policies on detected e-

learning activities and, (c) how to take supportive action

against students while they are logged into the e-learning

environment.

As shown in (Fig. 2), we divided our architecture into three

layers : Tracking layer, Runtime Validation layer and Action

layer.

Fig. 2. System Architecture.

 A. Tracking layer 

This layer aims to monitor and observe learning activities

that are performed by students. It has one component called

Observer that detects continuously and concurrently the data

about the learning activities (such as quiz, assignment, at-

tempts to access the course and so on) that are performed

by the student in the e-learning environment. The tracking

data collected by the observer component is stored in the

event repository. The event repository consists of tables that

contain the information about learning activities. Moreover,

they hold information about the students and the course which

the observed learning activities are associated with.Thus, tracking layer in our architecture is designed to ensure

that each event which is associated with a learning activity

is detected by the observer component once it occurred and

is stored in the event repository. The main functionality of 

the observer component in this layer is to detect and collect

any possible data about learning activities. The task of this

component is to keep track of the changes in the detected

states of the learning activities frequently over the time, and

send a sequence of states to the event repository.

 B. Runtime Validation layer 

In this layer, our system will determine whether or not

the learning behaviour satisfies given policies by validating

these policies at the runtime. This process is a fundamental

part in our approach which is the ability to capture the

leaning behaviour of the student. As a policy reflects a set of 

requirements about learning activities, satisfaction is achieved

by checking whether or not the learning behaviours (i.e.

sequence of events) satisfy these requirements. In addition,

we use a runtime validation technique based on AnaTempura

validation toolkit [11](see Fig 3) to accomplish the above

process. It is a tool for runtime validation of safety and timing

properties (more details about this tool are in section IV.E).

We have two components in this layer as depicted in Figure

2.These components are described below.

Fig. 3. AnaTempura Architecture [11].

1) Event Recogniser : Is used to collect an event from the

state information stored in the event repository by the Observer

in the previous layer. An event (i.e. a snapshot of states

that reflect the learning behaviour of a particular student)

is recognised according to the e-learning activity policy’s

attributes. The recognised events are then sent to the Checker

components.

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

47 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 4: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 4/9

2) Checker : The Learning Activities Policies and the events

in the current learning activity state of the student are required

inputs for the Checker. Checker determines whether or not the

current learning behaviour of student satisfies the e-learning

activities policy. The behaviour is captured from a sequence

of events sent by the Event Recogniser. The Checker should

deal with history-based events that, in some cases, are based

on other previous events. Finally, the Checker sends feedback (e.g. Violation of the policy on particular events) to the Action

component in the instance that a student is in state which

violates learning activity policy.

C. Action layer 

In this layer, there is one component which is interfaced

with the e-learning system. This component is called Action

component. Action component acts on student behaviour that

violates the policy determined by the Checker. Also, the

Action component will evaluate the obtained feedback from

the Checker and then specifies what type of action should be

taken against the student (e.g. warning messages or email tothe teacher describing the current state of a student) to prevent

potential problems that can affect student’s progress.

 D. Learning Activities Policies

As mentioned earlier in this paper, a policy is a set of rules

which reflect particular requirements. In learning activities

context, it is a set of rules that ensure learning behaviours

and monitors students’ progress. The policies are specified in

term of learning activity type (e.g. Quiz, Assignment, etc...)

and specific requirements which student must meet during a

period of time. In most policy languages, rules are expressed

using authorisation, obligation rules.1) Rule Structure: Let S , O and A be the set of all subjects,

objects and actions in the system. Subjects denote students

or teachers and objects denote learning activity and actions

denote actions those subjects are performed on objects. For

the concrete syntax and semantics we refer the reader to

[12]. Some examples of these specifications are shown in

the case study section below. However, policy rules cannot

directly refer to the state of the system, but instead refer to

the occurrences of events in the system history. For the policy

language used, these events are done(s; o; a) representing the

successful execution of action a on object o by subject s,

autho(s,o,a) representing an access control decision. For the

purposes of this paper we are mainly interested to control the

learning activities that are performed by student rather than

in the actual semantics of the rule which are used in security

access control in policy-based management systems.

Authorisation The authorisation rule can express either

positive or negative access control. Positive rule means al-

lowances authorisation and negative rules means denials au-

thorisation. Both positive and negative rule may indicate

under which condition an access request should be granted or

denied. Thus, the authorisation rules are defined to express the

environmental policies if and only if the condition is system-

based and behavioural where a condition based on historical

behavioural of student.

Example There are three cases as following :

• Suppose that subject is a student ID SI D1234 and the

activity (object) is the quiz q2 and the action that should

be preformed is start :

true → autho(SI D1234; q2; start)

• Suppose that subject s is the student ID SI D1234 ,

the object o is the activity of quiz q1 and the action

a that should be preformed is start where the date is

30thofMay:

date(30/05)0 → autho(SI D1234; q2; start)

• Suppose that subject s is the student ID SI D1234 , the

object o is the activity of quiz q2 and the action a that

should be preformed is start where he/she has to have

quiz q1 already has done and submitted :

3done(SI D1234; q1; submit) → autho(SI D1234; q2; start)

Obligation Rules  Obligation rules state an action that

performs where a specific action has been taken by a subject.

Generally, a student in the e-learning system or other subject

can perform the obligated action. In our contribution, the

obligation rules are defined to express the behavioural policies.

Example: Suppose that subject s is student SI D1234 and

the object o is the activity of quiz number 2 q2 and the action

a that should be preformed is start thus, the teacher T ID10must be notified for this action that taken by the sutdent.

2autho(SI D1234; q2; start) → Oblig(sys,TID10;notify)

 E. Technology: Runtime Validation Toolkit ( AnaTempura) 

Interval Temporal Logic (ITL) is a flexible notation for both

propositional and first-order reasoning about periods of time

found in descriptions of hardware and software systems. Un-

like most temporal logics, ITL can handle both sequential and

parallel composition, and offers powerful and extensible spec-

ification and proof techniques for reasoning about properties

involving safety (i.e. nothing bad will happen), liveliness and

timeliness [11]. Timing constraints are not only expressible,

but most imperative programming constructs can be viewed

as formulas in a slightly modified version of ITL. Alternative

formalisms that can be used are TLA (Lamport, 1994) or

Event Calculus [13]. In addition, ITL has an executable subset,

Tempura, which means that an interpreter for our learning

activities policies is readily available, if expressible in this

subset. Previous work [14] has successfully used Tempura

for the runtime verification of functional (safety) and real-

time properties. Since learning policies are, in essence, safety

properties, we can express them in Tempura.

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

48 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 5: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 5/9

AnaTempura is a tool for runtime validation of timing and

safety properties (Fig 3). The runtime validation technique

uses assertion to check whether a system satisfies the safety

properties expressed in ITL [14]. The assertion in our

approach can be represented by Event Recognizer component

in our system architecture which sends a sequence of events

(learning activity states), such as values of variables, while

the software is running. Since an ITL property correspondsto a set of state sequences (intervals), runtime validation is

checking whether the sequence of events sent by our Event

Recogniser are a member of the set of rules corresponding to

the safety and timeliness properties represented by learning

activity policy that we want to check. The Tempura interpreter

is used to do this membership check [14]. So, we can use

AnaTempura as our runtime checker of e-learning activities

policy against events.

V. CAS E STUDY

We present a small simplified scenario that illustrates the

use of our dynamic tracking policy for learning activities.

Scenario: The faculty of technology, department of 

computer science in De Montfort University provides a

distance learning course of MSc in software engineering

for distant students through e-learning environment. This

course has four modules in semester one with duration of 12

weeks .One of these modules is formal methods which has

number of learning activities (such as quizzes , assignments,

learning materials, discussion forums ,etc ...). The distant

students must participate in all learning activities and perform

them to meet the course requirements and achieve the

modules successfully. In addition, these activities examine theperformance and understanding of students and assist them

to acquire all expected outcomes from the module. We focus

in this scenario on quizzes and assignments activities as there

are six quizzes and three assignments that are required over

the semester one. However, due to the flexibility of access to

the modules, participation in and accomplishment of these

activities are monitored and controlled by a policy with a

number of requirements as following:

1) Quizzes have to be done all in sequence during the

session of the module.

2) Student cannot start quiz or assignment until the previ-

ous one has finished.

3) The assignment is due after two quizzes have been done

and cannot be submitted before and so on.

4) Student can not submit assignments after the deadline.

5) Each quiz has a limited period of 10 days for comple-

tion.

6) Each quiz has total marks of 25 and the performance of 

student in doing the quiz can be indicated as following:

• Mark form 0 to 10 denotes bad performance.

• Mark from 11 to 20 denotes normal performance.

• Mark from 21 to 25 denotes very good performance.

7) Each quiz has duration of 30 minutes for student to do

and the progress of student on doing the quiz can be

indicated as following:

• Time in minuts form 0 to 10 denotes fast progress.

• Time in minuts from 11 to 20 denotes normal

progress.• Time in minuts from 21 to 30 denotes slow progress.

In the following we will formalise the requirements above

as rules and then we will show how these rules as policies

reflect these requirements. However, our learning activity

policies we will construct in the following will be a mixed

policies based on the types of rules we mentioned in (section

IV.E).We will also use the structure we stated above in

constructing these policies.

The requirements 1 and 2 above can be formalised as

follows firstly for the quiz activity:

Policy1 =

fin (T imeUnit < 12)∧Student (S,M odule)∧Quiz(Qn, Module)∧

n −1

i =03done (S, Qi, Submit)

−→

Autho+(S, Qn, Submit)

Where student S  and Quiz Qi are members of the module

.However, if  TimeUnit in the last state of the interval is less

than 12 which denotes the number of weeks in the session,

and sometime over the states the previous quiz is already done,

then in the next state , the student is allowed to submit the

quiz Qi.

Policy2 =

fin (T imeUnit < 12)∧Student (S, Module)∧

Assignment(An, Module)∧n −1

i =03done (S, Ai, Submit)

−→

Autho+(S, An, Submit)

The policy above is similar to the previous one but now for

the assignment activity.

Policy3 =(currentDate ≤ deadline)∧

done (S, Qi∗2, Submit)∧done (S, Qi∗2+1, Submit)∧

−→ Autho+(S, Ai, start)The above policy represents the requirements 3 in our

scenario where the student S  is authorized to start the

assignment Ai when the previous two quizzes Qi∗2 and

Qi∗2+1 have been done firstly. For example, if student wants

to start the second assignment A1 , then the third quiz Q2

and fourth quiz Q3 (as quizzes in our scenario are six quizzes

Q0, Q1, Q2, Q3, Q4andQ5 ) must be done before.

The requirement 4 can be represented in the following

policy:

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

49 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 6: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 6/9

P olicy4 =(currentDate > deadline)

−→

Autho−(S, Ai, Submit)

Where the student is not authorized to submit the assign-

ment after the deadline.

Requirements 6 and 7 indicate the progress and performance

of the student on doing the quizzes, teacher should be notified

if the performance is bad and the progress is fast or slow. This

can be represented by formalising the following policy:

P olicy5 =

done (S, Qn, Submit)∧( performance = Bad)∧( progress = Slow)∨( progress = Fast)

−→ (Oblig(Sys,Tid,Notify))

This policy above will ensure the behaviour of the student

on doing the quiz from the time he or she spent and the

total mark obtained. Our monitoring system will recognizethe performance based on the total mark obtained, and the

progress according to the time spent on doing the quiz, then an

obligation policy will be enforced to notify the teacher when

student’s progress (for instance) is fast but the performance is

bad, so the teacher can know the student state in proper time

to provide appropriate assistance.

After formalising our policies for the quizzes and assign-

ments based on requirements in our case study, in the follow-

ing we draw an algorithm to show the monitoring process and

how these polices above will be enforced.

 A. Monitoring process and policy enforcement algorithm

The algorithm shows the monitoring process and the

enforcement of the learning activity policies in the runtime

validation layer for above scenario of quiz activity. It is based

on the state transition diagram as depicted in (Figure 4).The

main task of the algorithm is to monitor the events occurred

in the quiz activity from opening it and selecting a specific

quiz until closing the activity, and to enforce an applicable

policy accordingly based on the current state of the quiz

activity.

The algorithm (1) below shows how the monitoring process

for the quiz activity moves from state to state. We first define

global variables that are used in the whole process. Then, wedefine the mine state of this process which is Active. The

Variable QSatate denotes the current state of the quiz activity

in our monitoring process. The Active state has sub-states

(Active = {SelectingQ, DoingQ, DoneQ, N otDoneQ, }{Aborted, Cheated}) and its initial state is Inactive.

Moreover, the monitoring process and enforcement of the

policies are done through functions that are represented below

in algorithm (1) where they all take the current selected quiz

(Quiz[n]) as input parameter.

Fig. 4. STD for Quiz policy enforcement.

Algorithm 1 Check Quiz Activity

Require: Quiz[n],QuizTM,StartT,SubmitT,NoOfQuizzes, QuizDur,QState, T Left, SpentT,SelectedQ, Mark, QProgress, QPerform

Ensure: n ∈ NoOfQuizzes1: Active is main State!, Inactive is Initial state!2: for QState = Active do

3: (SelectingQ, DoingQ, DoneQ, N otDoneQ,AbortedQ, CheatedQ) are substates!4: NotDoneQ is Initial Substate!5: for QState = SelectingQ do

6: (GettingP ermit, Allowed, Denied)areSubstates!

7: GettingPermit is Initial Substate!8: end for

9: end for

10: repeat

11: SelectedQ = CurrentQuiz()12: if  n = SelectedQ then

13: QState = Active14: CheckPermission(Quiz[n]) // Moving to Select-

ingQ state!

15: CheckDoingQ(Quiz[n]) // Moving to DoingQ state

or CheatedQ state!

16: CheckSubmission(Quiz[n]) // Moving to DoneQ !

17: CheckProgress(Quiz[n])18: CheckPefromance(Quiz[n]19: QState = Inactive // Final State in this process!

20: end if 

21: until QState = Inactive

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

50 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 7: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 7/9

The algorithm (2) is sub-algorithm of the main one

(algorithm 1) which shows the process of the function

CheckPermission(). The task of this function is to check 

whether or not the student is allowed to access the current

quiz. Its inputs are the applicable policy from the policies

repository and the events that corresponds to policy attributes

.Therefore, The enforcement of the policy in this function will

result whether the student is allowed to access the current quizand do the quiz, or denied to access and thus the monitoring

process here will end by assigning the quiz’s state to Aborted.

In addition, the sequence diagram in (Figure 5) can represent

the process in this function in details according to system

components in the system architecture as depicted above in

(Figure 2 ).

Algorithm 2 CheckPermission(Quiz[n])

Require: Quiz Policy for permissionEnsure: Events corresponds to the Policy attributes

1: if  QState[Quiz[n]] = CheatedQ∧ DoneQ ∧AbortedQ

then2: QState[Quiz[n]] ← SelectingQ3: Qpermission[Quiz[n]] ← GettingPermit // Moving

to GrttingPermit state!

4: GetQuizPolicy(Quiz[n]) // Find applicable Policy

from the repository!

5: return PolicyX 6: GetQEvents(Quiz[n])7: return SequanceofEvents!8: TLeft = CurrentTime() − QuizDur9: CheckPolicyV.S.Events

10: if  Policy is Satisfied then

11: Qpermission[Quiz[n]] ← Allowed12: QState[Quiz[n]] ← DoingQ // Moving to DoingQ

state!

13: StartT  = CurrentTime();14: else

15: QPermission[Quiz[n]] ← Denied16: QState[Quiz[n]] ← Aborted17: end if 

18: end if 

The sub-algorithm (Algorithm 3) represents the process of 

the function CheckSubmission(). Its task is to check the

submission state of the current quiz. The enforcement of an

applicable policy for this case will result whether or not the

current quiz is done otherwise it becomes cheated quiz. For

instance, the policy restricts the student to do the quiz once

and if he or she has started to do the quiz and quit from the

quiz, then student will be dealt as cheater and thus he or she

cannot do this quiz again.

However, as mentioned before this algorithm is suggested

to show the monitoring process and the enforcement of quiz

activity policies only for this case study. This algorithm can

Algorithm 3 CheckSubmission(Quiz[n])

Require: Quiz Policy for SubmisstionStateEnsure: Events corresponds to the Policy attributes

1: if  QState[Quiz[n]] = DoingQ then

2: GetQuizPolicy(Quiz[n]) // Find applicable Policy

from the repository!

3: return PolicyY 

4: GetQEvents(Quiz[n])5: return SequanceofEvents!6: SubmitT  = GetSubmitT ime7: CheckPolicyV.S.Events8: if  Policy is Satisfied then

9: QState[Quiz[n]] ← Done // Moving to Done state!

10: else

11: QState[Quiz[n]] ← Cheated12: end if 

13: else

14: QState[Quiz[n] ← Idle15: end if 

work in the runtime validation layer in our system architecture.

V I. CONCLUSION AND FUTURE WOR K

In this paper we have presented the runtime monitoring

system based on learning activities policies for e-learning

environments. A comparison between two learning methods

(e-Learning and Traditional learning) has been discussed. We

have shown the system architecture and we described its

components in details including the purpose of learning activ-

ities policies. Moreover, a case study was described to showthe formalisation of a number of requirements for learning

activities. Moreover, the tracking process and the enforcements

of policies in the case study have been shown in algorithm of 

quiz activity.

However, we are currently developing a generic algorithm

of tracking process and policies enforcement for all possible

learning activities in the e-learning environments. In addtion,

we will develop a prototypical system to evaluate our algo-

rithm on one of e-learning environments such as MOODLE.

REFERENCES

[1] A. Al-Ajlan and H. Zedan, “Why moodle,” Future Trends of Distributed Computing Systems, IEEE International Workshop, vol. 0, pp. 58–64,2008.

[2] F. Buendı́a, J. C. Cano, and J. V. Benlloch, “An instructional approach todrive computer science courses through virtual learning environments,”in ITiCSE ’09: Proceedings of the 14th annual ACM SIGCSE conference

on Innovation and technology in computer science education. NewYork, NY, USA: ACM, 2009, pp. 6–10.

[3] S. W. Jude Lubega, Lily Sun, “An effective tracking model for person-alised e-learnin.” Paris, France: 3rd European Conference on e-Learning(ECEL), 2004.

[4] A. Juan, T. Daradoumis, J. Faulin, and F. Xhafa, “Developing an infor-mation system for monitoring student’s activity in online collaborativelearning,” in Complex, Intelligent and Software Intensive Systems, 2008.CISIS 2008. International Conference on, march 2008, pp. 270 –275.

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

51 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 8: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 8/9

Fig. 5. Quiz Tracking process.

[5] B. Zeng, J. Nie, and J. Wei, “Design for active monitor system indistance learning environments,” in Education Technology and Computer 

Science, 2009. ETCS ’09. First International Workshop on, vol. 2, march

2009, pp. 809 –813.[6] L. France, J.-M. Heraud, J.-C. Marty, T. Carron, and J. Heili, “Mon-

itoring virtual classroom: Visualization techniques to observe studentactivities in an e-learning system,” in Advanced Learning Technologies,2006. Sixth International Conference on, july 2006, pp. 716 –720.

[7] R. Mazza and V. Dimitrova, “Coursevis: A graphical student monitoringtool for supporting instructors in web-based distance courses,” vol. 65,no. 2, 2007, pp. 125 – 139.

[8] S.-C. Pan, “Teachers’ perceptions in the development of onlinek-12 courses,” in Proceedings of Society for Information Technology &Teacher Education International Conference 2009, I. Gibson, R. Weber,K. McFerrin, R. Carlsen, and D. A. Willis, Eds. Charleston, SC,USA: AACE, March 2009, pp. 3096–3099. [Online]. Available:http://www.editlib.org/p/31120

[9] J. T. Lubega and S. Williams, “A study of factors contributing to thelate submission of course work,” European Journal of Open Distance

and E-leaming (EURODEL), 2006.[10] A. M. B. S. Hardy, J., “E-learner tracking: tools for discovering learner

behavior,” vol. Vol. 9, no. No.4, 2004, pp. pp.437–69.

[11] A. Cau and B. Moszkowski. (2011) Interval temporal logic.ITL Homepage. Retrieved in May 09, 2011. [Online]. Available:://www.cse.dmu.ac.uk/STRL/ITL/index.html

[12] H. Janicke, “The development of secure multi-agent systems,” Ph.D.dissertation, De Montfort University, 2007.

[13] R. Kowalski and M. Sergot, “A logic-based calculus of events,” NewGen. Comput., vol. 4, pp. 67–95, January 1986. [Online]. Available:http://portal.acm.org/citation.cfm?id=10030.10034

[14] S. Zhou, H. Zedan, and A. Cau, “Run-time analysis of time-criticalsystems,” vol. 51, no. 5. New York, NY, USA: Elsevier North-Holland,Inc., 2005, pp. 331–345.

AUTHORS ’ PROFILES

Turki Alghamdi is a PhD student in the Soft-ware Technology Research Laboratory (STRL) atDe Montfort University, Leicester UK. He receivedthe bachelor’s degree (BSc in Computer Science) in2005 from University of Taif, Taif, Saudi Arabia.He received the master’s degree (MSc in SoftwareEngineering) in 2008 from University of Bradford ,Bradford UK.

Professor Hussein Zedan is the Technical Directorof the Software Technology Research Laboratory(STRL) at De Montfort University, UK. His researchinterests include formal methods, verification, se-mantics, critical systems, re-engineering, computersecurity, CBD, and IS development.

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

52 http://sites.google.com/site/ijcsis/

ISSN 1947-5500

Page 9: Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

8/4/2019 Enforcing Learning Activities Policies in Runtime Monitoring System for E-learning Environments

http://slidepdf.com/reader/full/enforcing-learning-activities-policies-in-runtime-monitoring-system-for-e-learning 9/9

Ali Alzahrani is a PhD student in the SoftwareTechnology Research Laboratory (STRL) at DeMontfort University, Leicester UK. He received thebachelor’s degree (BSc in Computer Science) in2002 from King Abdulaziz University, Jeddah, SaudiArabia. He received the master’s degree (MSc inInformation Technology) in 2008 from QueenslandUniversity of Technology (QUT), Brisbane , Aus-tralia.

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 9, No. 8, August 2011

53 http://sites.google.com/site/ijcsis/

ISSN 1947-5500