Top Downloaded Articles Edge Detection Methods: A Review
Donia Fadil Chalob, Raghad Abed Suhan, Ahmed Kawther Hussein, Rusul Hussein Hasan ,
J Comp Sci Informatics. 2025; 2(4): 203-212
» Abstract » doi: 10.5455/JCSI.20250405075030
EXPLORING ETHICAL FRONTIERS: A SURVEY INTO THE PREVALENCE OF ARTIFICIAL INTELLIGENCE IN ACADEMIC WRITING.
Maurice Otieno Okina
J Comp Sci Informatics. 2024; 1(1): 68-84
» Abstract » doi: 10.5455/JCSI.20240515052807
Enhancing Rivest-Shamir-Adleman Cryptosystem Performance with a Modified Modular Exponentiation Algorithm
Debebe Kebede Mamo, Yelkal Mulualem ,
J Comp Sci Informatics. 2024; 1(3): 108-121
» Abstract » doi: 10.5455/JCSI.20241007061040
Data Protection Methods in Contemporary Applications: A Comparative Analysis
Yahia Mohammad Alemami, Ahed Mleih Al-sbou,
J Comp Sci Informatics. 2025; 2(3): 163-169
» Abstract » doi: 10.5455/JCSI.20250326032022
Multimodal Control for Powered Wheelchair
Indu s, aishwarya ponni p, akilandeshwari r, mrinalini k, vijayalakshmi p,
J Comp Sci Informatics. 2025; 2(1): 22-33
» Abstract » doi: 10.5455/JCSI.20241202015721