Online First

					View Online First

Articles in Online First are peer reviewed, accepted articles that are not yet assigned to volumes/issues, but have a DOI and are fully citable. Please note that the article in Online First version will be removed and the final version will appear in the associated published online volumes/issues of the publication if the final version is assigned to volumes/issues.

Published: 2022-01-01

Review

  • Prospects of Computational Intelligence in Society: Human-Centric Solutions, Challenges, and Research Areas

    Kishor Kumar Reddy Chinthala, Monika Singh Thakur, Mohammed Shuaib, Shadab Alam
    DOI: https://doi.org/10.47852/bonviewJCCE42023330
  • A Bibliometric Analysis of Linguistic Variables Based on Intuitionistic Fuzzy Set

    Nuraini Rahim, Binyamin Yusoff, Lazim Abdullah, José Maria Merigó
    DOI: https://doi.org/10.47852/bonviewJCCE52024574
  • A Systematic Analysis and Review on Intrusion Detection Systems Using Machine Learning and Deep Learning Algorithms

    Sneha Leela Jacob, Parveen Sultana Habibullah
    DOI: https://doi.org/10.47852/bonviewJCCE42023249

Research Articles

  • GRU-ASPP U-Net: Enhanced Multiple Sclerosis Lesion Segmentation Through Temporal-Spatial Feature Integration in Longitudinal MRI

    Ramya Palaniappan, Siva Rathinavelayutham
    DOI: https://doi.org/10.47852/bonviewJCCE52024394
  • Optimized XGBoost Model with Whale Optimization Algorithm for Detecting Anomalies in Manufacturing

    Surjeet Dalal, Uma Rani, Umesh Kumar Lilhore, Neeraj Dahiya, Reenu Batra, Nasratullah Nuristani, Dac-Nhuong Le
    DOI: https://doi.org/10.47852/bonviewJCCE42023545
  • SiT-YOLOv9: An Efficient Algorithm for Learning Behavior Detection in the Home Environment

    Zhendan Sun, Vladimir Y. Mariano
    DOI: https://doi.org/10.47852/bonviewJCCE42023949
  • An Advanced Cyber Security Model Using Federated Machine Learning Approach for Intrusion Detection in Networks

    Mahantesh Laddi, Shridhar Allagi, Rashmi Rachh, Kuldeep Sambrekar, Shrikant Athanikar
    DOI: https://doi.org/10.47852/bonviewJCCE42023751
  • VAE-CNN: Deep Learning on Small Sample Dataset Improves Hydrogen Yield Prediction in Co-gasification

    Thavavel Vaiyapuri, Walaa H. Elashmawi, Shridevi S, William Asiedu
    DOI: https://doi.org/10.47852/bonviewJCCE42024395
  • Whale Optimization Algorithm for Feature Selection Enhances Classification in Malware Datasets

    Mariam Al Ghamri, Dyala Ibrahim, Rami Sihwail, Mohammad Shehab
    DOI: https://doi.org/10.47852/bonviewJCCE42024233
  • Strengthening Security in Clouds Through Cloud Computing Authentication Using Facial Image Forensics

    Pranali Dahiwal, Vijay Khare
    DOI: https://doi.org/10.47852/bonviewJCCE52024248
  • Optimized Deep Learning Techniques to Identify Rumors and Fake News in Online Social Networks

    Abu Sarwar Zamani, Aisha Hassan Abdalla Hashim, Sara Saadeldeen Ibrahim Mohamed, Md. Nasre Alam
    DOI: https://doi.org/10.47852/bonviewJCCE52023348
  • Evaluating the Effectiveness of Stealth Protocols and Proxying in Hiding VPN Usage

    Mohammad Shehab, Lial Raja Alzabin
    DOI: https://doi.org/10.47852/bonviewJCCE42023642
  • Enhance URL Defacement Attack Detection Using Particle Swarm Optimization and Machine Learning

    Omar Almomani, Adeeb Alsaaidah, Ahmad Adel Abu-Shareha, Abdullah Alzaqebah, Mohammed Amin Almaiah, Qusai Shambour
    DOI: https://doi.org/10.47852/bonviewJCCE52024668
  • Enhancing Rainwater Harvesting Sustainability in the Al-Basrah Basin, Iraq: A Two-Phased Approach Combining GIS-AHP for Site Suitability and Fog Computing for Dynamic Management

    Alauldeen Taher Najm, Wei-Koon Lee, Abdulhussain Abdulkarim Abbas, Suzana Ramli
    DOI: https://doi.org/10.47852/bonviewJCCE52024444
  • Natural Language Processing (NLP) System for Cyberbullying Identification in Thai Language

    Bello Musa Yakubu, Worapong Bumrungsri, Pattarasinee Bhattarakosol
    DOI: https://doi.org/10.47852/bonviewJCCE52024355
  • Optimization of New Project Validation Protocols in the Automotive Industry: A Simulated Environment for Efficiency and Effectiveness

    William Aparecido Celestino Lopes, Adilson Cunha Rusteiko, Cleiton Rodrigues Mendes, Nicolas Vinicius Cruz Honório, Marcelo Tsuguio Okano
    DOI: https://doi.org/10.47852/bonviewJCCE52024627
  • CTVR-EHO TDA-IPH Topological Optimized Convolutional Visual Recurrent Network for Brain Tumor Segmentation and Classification

    Dhananjay Joshi, Bhupesh Kumar Singh, Kapil Kumar Nagwanshi, Nitin Surajkishor Choubey
    DOI: https://doi.org/10.47852/bonviewJCCE52023722
  • A New Hybrid Approach for Improving Intrusion Detection System Based on Scatter Search Algorithm and Support Vector Machine

    Feras E. AbuAladas, Mohammad Shehab, Rasha Israwah, Ghaith Jaradat, Yousef Qawqzeh
    DOI: https://doi.org/10.47852/bonviewJCCE52024492
  • Deep Learning Approaches for Detecting Cyberbullying on Social Media

    Ghaith Jaradat, Mohammad Shehab, Dyala Ibrahim, Saif Najdawi, Rami Sihwail
    DOI: https://doi.org/10.47852/bonviewJCCE52024162
  • HSHEP: An Optimization-Based Code Smell Refactoring Sequencing Technique

    Ritika Maini, Navdeep Kaur, Amandeep Kaur
    DOI: https://doi.org/10.47852/bonviewJCCE42023180
  • Analysis of Digital Green Innovation Based on Schweizer–Sklar Prioritized Aggregation Operators for Interval-Valued Picture Fuzzy Supply Chain Management

    Zeeshan Ali, Usama Rehman
    DOI: https://doi.org/10.47852/bonviewJCCE42022468
  • Minimizing Urban Flooding by Optimal Design of Drainage System Using Sequential Least Squares Quadratic Programming and Spatial Datasets

    James O. Ekeh, Manoj K. Jha
    DOI: https://doi.org/10.47852/bonviewJCCE42022507
  • Generative Adversarial-Based Ubiquitous Data Integration Model for Human Re-Identification

    Mohammad Shabaz, Mukesh Soni
    DOI: https://doi.org/10.47852/bonviewJCCE42022872
  • Coot Bird Optimization-Based ESkip-ResNet Classification for Deepfake Detection

    V. Gokula Krishnan, R. Vadivel, K. Sankar, K. Sathyamoorthy, B. Prathusha Laxmi
    DOI: https://doi.org/10.47852/bonviewJCCE42022955
  • Comparison Among Deep Learning Approaches and Biomarkers in Early Detection of Parkinson's Disease

    Gunjan Goswami, Bhanu Prasad
    DOI: https://doi.org/10.47852/bonviewJCCE42023040
  • BSA-SGRU-A Novel Deep Learning Framework for Alleviate the Multiple Attacks in IoT-Cloud Environment

    P. Jagdish Kumar, Neduncheliyan Subbu
    DOI: https://doi.org/10.47852/bonviewJCCE42023061
  • Selection of Optimal YouTube View Count Prediction Model Using Data Envelopment Analysis Approach

    Garima Babbar, Adarsh Anand, Mohini Agarwal
    DOI: https://doi.org/10.47852/bonviewJCCE42023120
  • Energy Aware Competition-Based Unequal Clustering Protocol for Wireless Sensor Networks

    Rohit Gupta, Vinith Chauhan
    DOI: https://doi.org/10.47852/bonviewJCCE42023140
  • Search Engine Results Optimization for Supply Chain SMEs Through Digital Content Management and Fuzzy Cognitive Models

    Damianos P. Sakas, Nikolaos T. Giannakopoulos, Alexandros G. Panagiotou, Nikos Kanellos, Christos Christopoulos
    DOI: https://doi.org/10.47852/bonviewJCCE32021763
  • Dempster Combination Rule-Aided Multi-Sensor Decision-Level-Based Data Fusion in Industrial Internet of Things (IIoT) over Zero-Trust Security

    Anamika Singh, Rajesh Kumar Dhanaraj, Anupam Kumar Sharma
    DOI: https://doi.org/10.47852/bonviewJCCE42023198
  • A New Solution Technique for Fuzzy Transportation Problem Using Novel Ranking Functions on Heptagonal Fuzzy Numbers: A Case Study of Regional Shipment

    Balasundaram Baranidharan, Ghanshaym Singha Mahapatra
    DOI: https://doi.org/10.47852/bonviewJCCE42023253
  • AlertTrap: A Study on Object Detection in Remote Insect Trap Monitoring System Using on the Edge Deep Learning Platform

    An Dinh Le, Duy Anh Pham , Dong Thanh, Hien Bich Vo
    DOI: https://doi.org/10.47852/bonviewJCCE42023264
  • Diversity and Serendipity Preference-Aware Recommender System

    Kexin Yin, Junqi Zhao
    DOI: https://doi.org/10.47852/bonviewJCCE42023272
  • Topological Analysis of Image Reconstruction Based on Polar Complex Exponential Transform

    Manoj Kumar Singh, Deepika Saini, Sanoj Kumar
    DOI: https://doi.org/10.47852/bonviewJCCE42023298
  • Digital Transformation and Corporate ESG Performance – Evidence from China

    Wenxin Zhang, Xiangyu Li
    DOI: https://doi.org/10.47852/bonviewJCCE42023387
  • Deep Learning-Based Approach for Monitoring and Controlling Fake Reviews

    Nilesh Sable, Parikshit Mahalle, Kalyani Kadam , Bipin Sule, Rahul Joshi, Mahendra Deore
    DOI: https://doi.org/10.47852/bonviewJCCE42023602