Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
Air Jordan 11 Retro Cool Grey 2021 Cool Grey , IetpShops , Michael Jordan In The "White Cement" Air Jordan Retro IV (4)
Панама adidas bucket - Ransom by adidas Bluff Lo 'Fairway' - IetpShops
nike sb dunk sizing and fit guide
IetpShops , 'Teal Nebula' Hues Take This Nike Air Force 1 Out Of This World , jordan nike high jump pants shoes girls boys women
air jordan 6 carmine 2021 release date
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol-6-Issue-1
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
Technology
Management
Articles
Case Study
Symbiotic Association Between Cyber Security and Website Testing
Hybrid Approach of Face Recognition
An Improved and Scalable Digital Image Encryption Method Based on One-Dimensional Random Scrambling
Key Compromise Resilient Privacy Provisioning in Vertically Partitioned Data
Security Against Keyloggers Using Pattern Based Locking Systems
Two Factor Based Authentication Using Keystroke Biometrics
Social Networking and Media: Current Applications and Considerations
Cloud Computing- A Breakthrough In The Obsolete Methods of Computing
A Comprehensive Approach of Wireless Data Glove Using Gesture Recognition Technique towards Development of a Supporting System for Aged And Disabled People
Experimental Analysis of Stabilizing B.C. Soil with Murrum and Rice Husk Ash
Analytical Study of Attacks on Manets Based On Layered Architecture
Impact of E-Learning And Knowledge Management In Indian Rural Education
Performance Analysis of SCTP Based Remote Monitoring Systems against Service Failures
Cloud Computing: ‘Analyses of Risk Involved in Cloud Environment’
Ann Based Fault Detection & Classification of A 400 Kv Electrical Transmission Line
Design & Analysis of Documentation Taxonomy Approach with Algorithmic Fusion towards Ambiguity Free Results for English Idiolect
Computing Network Reliability where Nodes are Imperfectly Reliable and Links are Perfectly Reliable
Predicting the Consumption Behavior of Smart Phones Using Social Media
An Experimental Approach to Study the Terminal Fall Velocity of Particles in Different Types of Fluids
Qualitative Analysis of Different Routing Protocols in Mobile Ad Hoc Network
An Online Fuzzy Expert System using Rule Advancement Strategy for Specific Domain
Green Database
Re-Ranking Web Search Result for Semantic Searching
Implementation of Automatic Wrapper Adaptation System Using Dom Tree for Web Mining
DDA Based Approach For Object Tracking & Detection In Large Motion Videos
Security Compliance Challenges On Clouds
Modern Media: A Tool For ELT In Intercultural Communication
Mircostrip Antenna Design Analysis Using Neural-Network
Efficient Auto Code Generation from UML Diagrams Using Semantic Platform and DSL Semantic Annotations
Data Mining: Tools and Techniques
Unraveling The Challenges Faced By Indian E-Governance
Intelligent and Synchronized Signal System for Urban Areas
Various Methods Of Wireless Power Transmission Technologies for Solar Power Satellites
Efficient Method for Detection & Mitigation of Inconsistencies from all UML Diagrams Based on Description Logic Rules During the OWL Generation
Availability Analysis of Various Systems of Brewary Plant-A Review
Power Quality Analysis Using Various Techniques: A Review
A Review on Different Iii-V Multijunction Solar Cells
Neural Steganography: An Aes-256 Bit PRP & Pseudo Random Hash Based Neural Cryptographic Technique for Image Steganography
Demand Forecasting Of Spare Parts Store By Moving Average Method and Verification By Exponential Method
Data Mining: A Mode To Reform Today’s Higher Learning Institutions Through Performance Indicators
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!