Journal: IJACI

Volume 7, Issue 2

1 -- 32Khaled Mohammed Fouad, Basma Mohammed Hassan, Mahmoud Fathy Hassan. User Authentication based on Dynamic Keystroke Recognition
33 -- 46Nalini A. Mhetre, Arvind V. Deshpande, Parikshit Narendra Mahalle. Trust Management Model based on Fuzzy Approach for Ubiquitous Computing
47 -- 74Duggirala Raja Kishor, N. B. Venkateswarlu. A Novel Hybridization of Expectation-Maximization and K-Means Algorithms for Better Clustering Performance
75 -- 92Geetanjali Vinayak Kale, Varsha Hemant Patil. A Study of Vision based Human Motion Recognition and Analysis
93 -- 113S. Hemalatha, S. Margret Anouncia. A Computational Model for Texture Analysis in Images with Fractional Differential Filter for Texture Detection
114 -- 137Arti Arun Mohanpurkar, Madhuri Satish Joshi. A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance

Volume 7, Issue 1

1 -- 26Francesca Odella. Technology Studies and the Sociological Debate on Monitoring of Social Interactions
27 -- 44Hans W. Guesgen, Stephen Marsland. Using Contextual Information for Recognising Human Behaviour
45 -- 68Li-minn Ang, Kah Phooi Seng, Tee Zhi Heng. Information Communication Assistive Technologies for Visually Impaired People
69 -- 93Petr Sosnin. Precedent-Oriented Approach to Conceptually Experimental Activity in Designing the Software Intensive Systems
94 -- 120Vladimír Bures, Petr Tucník, Peter Mikulecký, Karel Mls, Petr Blecha. Application of Ambient Intelligence in Educational Institutions: Visions and Architectures