1 | -- | 2 | Manju Khari, Rubén González Crespo, Hemlata Sharma. Guest editorial of the special issue 'human-centric, decentralised, and hyper automated cyber-physical systems' |
3 | -- | 12 | Feifei Chen. Aided innovative design of bathroom products based on artificial intelligence technology |
13 | -- | 18 | Dongfang Song, Hong Ji, Guanfei Yin. Attitude stability control system of mobile robot mechanism based on nanosensor |
19 | -- | 25 | Guiting Wang, Jiaying Xu, Shengliang Lin. Influencing factors of using behaviour for computational advertising under the theoretical model of UTAUT |
26 | -- | 39 | S. C. Vijaya Kumar, K. Karunanithi 0001, S. P. Raja 0001, S. Ramesh, P. Chandrasekar, R. Obulupathy. Modelling of electric vehicle charging station and controlled by fuzzy logic controller with different modes of operation |
40 | -- | 53 | B. Padmavathi, B. Muthukumar. An efficient botnet detection approach based on feature learning and classification |
54 | -- | 63 | P. Ravi Prakash, Durairaj Anuradha, Javid Iqbal, Mohammad Gouse Galety, Ruby Singh, S. Neelakandan. A novel convolutional neural network with gated recurrent unit for automated speech emotion recognition and classification |
64 | -- | 71 | S. Saravanan, N. Poornima. Big Data analytics for privacy through ND-homomorphic encryption |
72 | -- | 81 | Raviteja Kocherla, M. Chandra Sekhar, Ramesh Vatambeti. Enhancing the energy efficiency for prolonging the network life time in multi-conditional multi-sensor based wireless sensor network |
82 | -- | 89 | Ravi Kumar Sanapala, Srineevasa Rao Duggirala. SRN-LEACH: an energy-efficient leach protocol with random number stabilisation for WSNs |
90 | -- | 98 | S. Gnana Sophia, K. K. Thanammal, S. S. Sujatha. Secure storage and accessing the data in cloud using optimized homomorphic encryption |
99 | -- | 111 | Wei Wang. The method of cultivating employability of computer majors in colleges and universities based on data mining |
112 | -- | 125 | Hongxi Zhang, Wei Wei, Qiong Liu. Prediction of the high-quality development level of inbound tourism based on adaptive neural network technology |
126 | -- | 133 | Kalluri Rama Krishna, C. V. Guru Rao. ETP-AKEP: enhanced three-party authenticated key exchange protocols for data integrity in cloud environments |
134 | -- | 142 | Zhiyi Huo, Weize Liu, Qian Wang. Multi objective optimization method for collision safety of networked vehicles based on improved particle optimization |