Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
Air Jordan 1 Old Love New Love, 100+ New Arrivals, Gmar Store – Amazing Gift Shoes, Handbags
Air Jordan Release Dates 2023 , Drip Bar Detroit , AIR Spizike JORDAN
nike air jordan 1 outlet
nike factory outlet online shopping
womens air jordan 6 barely rose dh9696 100 release date
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol 7 Issue 2
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
Part1
Part2
Part3
Part4
Part5
Towards Keyword Based Recommendation System
Implicit Feedback in Recommender System with Collaborative Filtering and Clustering
Review of Advanced Supercomputer Architecture Param
Performance Evaluation of Wrinkled Fingerprint Verification Using Resilient Backpropagation Algorithm
A Study of Entrepreneurship Awareness and Skills Among The Diploma in Engineering Students
Intrusion Detection System Based on Neural Network Using Bayesian and KPCA: A Survey
Network Traffic Control Using Openflow in Software Defined Networking
Use of Rough - Fuzzy Clustering for Improving Cluster Membership Function: A Review
Performance Analysis of Reactive Routing Protocols in MANET
A Study on Routing Mechanisms for Wireless Sensor Networks
Content Based Video Retrieval and Recommendation Using Speech and Text Information
Stress Management Among Employees
Genetic Algorithm Approach for Dynamic Channel Allocation in GSM Network
Comparison of Parallel and Sequential Algorithm in Terms of Time Required for Analysis of Given Data Set
Buyer’s Preferences & Outlook Towards Passenger Cars of Maruti Suzuki & Hyundai Motors: A Study of Marathwada Region in Maharashtra State
Automatic Ontology Generation Using SVM and MLP for Domain of Musical Instruments
Enhanced Railfence Cipher Using Computed Shifted Key
Exponential Growth Equation Short Message Security
Dna Seed Encryption Using Distributed Polysubstitution Choice Based Transposition Techniques
Rendering of Manifestation Tweets
Threshold Quantum Cryptography – Four Stage Protocol
Secured Data Encryption with Local Binary Pattern and Significant Bit Swapping
Machine Learning Approaches For Automatic Sentiment Analysis Of Twitter Messages – A Survey
Content Based Malicious Url Detection in E-Mail Using Bayesian Classifier And Decision Tree: A Survey
Study of Public Trust and Ngo in Terms of Tax Benefit And Charity: A Review
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!