Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
Nike Air Max 90 Black Red DX9272 , SBD - Майки для бігу nike - 001 Release Date
Украина #126535155 , Женские кроссовки nike jordan white black pink — цена 2549 грн в каталоге Кроссовки ✓ Купить женские вещи по доступной цене на Шафе , Air Jordan 2 Retro Low Gym Red x Jordan AJ 2 23 Wings T-Shirt
images of nike lebron 6 low safari blue , Ja Morant Nike Ja 1 Colorways + Release Dates , IetpShops
adidas velcro sneaker for kids shoes boys size 1
Nike TN Air Max Plus , nike air force 1 shadow air max dia , IetpShops , Women's Nike TN
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol 7 Issue 2
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
Part1
Part2
Part3
Part4
Part5
Towards Keyword Based Recommendation System
Implicit Feedback in Recommender System with Collaborative Filtering and Clustering
Review of Advanced Supercomputer Architecture Param
Performance Evaluation of Wrinkled Fingerprint Verification Using Resilient Backpropagation Algorithm
A Study of Entrepreneurship Awareness and Skills Among The Diploma in Engineering Students
Intrusion Detection System Based on Neural Network Using Bayesian and KPCA: A Survey
Network Traffic Control Using Openflow in Software Defined Networking
Use of Rough - Fuzzy Clustering for Improving Cluster Membership Function: A Review
Performance Analysis of Reactive Routing Protocols in MANET
A Study on Routing Mechanisms for Wireless Sensor Networks
Content Based Video Retrieval and Recommendation Using Speech and Text Information
Stress Management Among Employees
Genetic Algorithm Approach for Dynamic Channel Allocation in GSM Network
Comparison of Parallel and Sequential Algorithm in Terms of Time Required for Analysis of Given Data Set
Buyer’s Preferences & Outlook Towards Passenger Cars of Maruti Suzuki & Hyundai Motors: A Study of Marathwada Region in Maharashtra State
Automatic Ontology Generation Using SVM and MLP for Domain of Musical Instruments
Enhanced Railfence Cipher Using Computed Shifted Key
Exponential Growth Equation Short Message Security
Dna Seed Encryption Using Distributed Polysubstitution Choice Based Transposition Techniques
Rendering of Manifestation Tweets
Threshold Quantum Cryptography – Four Stage Protocol
Secured Data Encryption with Local Binary Pattern and Significant Bit Swapping
Machine Learning Approaches For Automatic Sentiment Analysis Of Twitter Messages – A Survey
Content Based Malicious Url Detection in E-Mail Using Bayesian Classifier And Decision Tree: A Survey
Study of Public Trust and Ngo in Terms of Tax Benefit And Charity: A Review
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!