You are previewing International Journal of Ambient Computing and Intelligence (IJACI) Volume 7, Issue 2.
O'Reilly logo
International Journal of Ambient Computing and Intelligence (IJACI) Volume 7, Issue 2

Book Description

In an ambient intelligence world, devices work in concert to support people in carrying out everyday life activities and tasks in a natural way using information and intelligence that is hidden in the network connecting these devices. Ambient intelligence emphasizes people and user experience and ensuring ultimately that the technology disappears into our surroundings until only the user interface remains visible to users. The International Journal of Ambient Computing and Intelligence (IJACI) will specifically focus on the convergence of ubiquitous computing, context, intelligent systems, networking and security. Ubiquitous computing will focus on mobility, location and the development of various ad hoc networking capabilities that exploit numerous low-cost computing devices. Intelligent systems research will focus on learning algorithms and pattern matchers, speech recognition, gesture classification and situation assessment. Context awareness will concentrate on the tracking and positioning of objects' and people's interactions with their environments. Finally, an appreciation of human-centric computer interfaces, intelligent agents, network security, indoor positioning and the social interactions of objects in environments is essential.

This issue contains the following articles:

  • User Authentication based on Dynamic Keystroke Recognition
  • Trust Management Model based on Fuzzy Approach for Ubiquitous Computing
  • A Novel Hybridization of Expectation-Maximization and K-Means Algorithms for Better Clustering Performance
  • A Study of Vision based Human Motion Recognition and Analysis
  • A Computational Model for Texture Analysis in Images with Fractional Differential Filter for Texture Detection
  • A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. User Authentication based on Dynamic Keystroke Recognition
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 3. METHODOLOGY FRAMEWORK
    4. 4. PROPOSED ALGORITHM
    5. 5. ENROLLMENT PHASE
    6. 6. AUTHENTICATION RESULT
    7. 7. EXPERIMENTAL RESULTS
    8. 8. SIMULATION RESULTS
    9. 9. SYNTHESIS RESULTS
    10. 10. IMPLEMENTATION RESULTS
    11. 11. POWER CONSUMPTION ANALYSIS
    12. 12. CONCLUSION AND FUTURE WORK
    13. ACKNOWLEDGMENT
    14. REFERENCES
  5. Trust Management Model based on Fuzzy Approach for Ubiquitous Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORKS
    4. PROPOSED TRUST MANAGEMENT MODEL
    5. RESULTS AND DISCUSSIONS
    6. CONCLUSION AND FUTURE WORK
    7. REFERENCES
  6. A Novel Hybridization of Expectation-Maximization and K-Means Algorithms for Better Clustering Performance
    1. ABSTRACT
    2. INTRODUCTION
    3. THE EXPECTATION MAXIMIZATION ALGORITHM
    4. EXPECTATION MAXIMIZATION USING THE RESULTS OF K-MEANS
    5. A NOVEL HYBRIDIZATION OF EM AND K-MEANS ALGORITHMS (NovHbEMKM)
    6. PERFORMANCE EVALUATION
    7. EXPERIMENT AND RESULTS
    8. CONCLUSION
    9. REFERENCES
  7. A Study of Vision based Human Motion Recognition and Analysis
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. REPORTED LITERATURE
    4. 3. HUMAN MOTION RECOGNITION
    5. 4. HUMAN MOTION DATASETS
    6. 5. DISCUSSION
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  8. A Computational Model for Texture Analysis in Images with Fractional Differential Filter for Texture Detection
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. METHODOLOGY
    4. 3. THE MODEL PROPOSED FOR TEXTURE ANALYSIS IN IMAGES
    5. 4. EFFICACY MEASUREMENT BY TEXTURE CLASSIFICATION
    6. 5. RESULTS AND DISCUSSION
    7. 6. CONCLUSION
    8. REFERENCES
  9. A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. SYSTEM ARCHITECTURE
    5. 4. MATHEMATICAL MODEL
    6. 5. EXPERIMENTS AND RESULTS
    7. 6. CONCLUSION
    8. REFERENCES
  10. Call For Articles