Most Accessed Articles A Blockchain-Based Approach to VAT Invoice Authentication and Tokenization
Joseph Ndagatsa Mamman, Muhammad Bashir Abdullahi, Oluwaseun Adeniyi Ojerinde
J Comp Sci Informatics. 2025; 2(2): 81-90
» Abstract » doi: 10.5455/JCSI.20250208111958
KanScrum: A Kanban + Scrum Hybrid Methodology
Adnan Shaout, Brendan Parker, Jacob Westerbeek, Sundara Subramanian Swaminathan,
J Comp Sci Informatics. 2025; 2(2): 131-147
» Abstract » doi: 10.5455/JCSI.20250322020941
Web-Based Scheduling System using Genetic Algorithm with Facial Recognition
Anjonel G. Carawana, Jose Costillas Agoylo Jr. , Clark Ryan P. Delos Reyes, Kenith M. Manligas, Dexter Lee OraƱo,
J Comp Sci Informatics. 2025; 2(3): 182-190
» Abstract » doi: 10.5455/JCSI.20250310020131
Innovations In Identity and Access Control for Cross-cloud Computing: a Comparative Analysis
Sadiq Bunu Abubakar, Nwojo Agwu Nnanna, Ibrahim Anka Salihu,
J Comp Sci Informatics. 2025; 2(2): 118-130
» Abstract » doi: 10.5455/JCSI.20250218092652
Data Protection Methods in Contemporary Applications: A Comparative Analysis
Yahia Mohammad Alemami, Ahed Mleih Al-sbou,
J Comp Sci Informatics. 2025; 2(3): 163-169
» Abstract » doi: 10.5455/JCSI.20250326032022