Learn More
Mobile Ad-Hoc network (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts. The host is called as a node which dynamically establishes their own network. In MANET all the nodes operates in cooperative fashion. Due to their certain inherently vulnerable characteristics, there are many(More)
Web usage mining is a kind of web mining, which exploits data mining techniques to discover valuable information from the data of the web server log file. The information discovered is used for customizing a Web site to the needs of each specific user or set of users called as Web personalization. This paper discusses the use of statistical analysis(More)
A recent survey of hundreds of professionals found that their desktops remain powered on during 43% of total non-work hours, including evenings and weekends --- meaning that computers are operating yet unused for more than 55 hours a week in LAN. Worse, each respondent's computer was almost certainly equipped with power management settings -- energy-saving(More)
Computer power management for standalone computer is widespread globally but very few enterprises and educational institutes utilize computer power management in Local Area network. Networks pose special challenges for Computer power management. Depending on the systems (hardware and software), the network can partially or entirely defeat power management,(More)
Search engine returned web page contains result in response to user query. Such a result page can contain data irrelevant to query. In this paper, we try to explore the solution for extraction of dynamic content of web page based on visual features of a page. The visual information of Web pages used in this paper includes information related to Web page(More)
Mobile Ad-Hoc network (MANET) is a temporary infrastructure less network. This network is formed by combining some set of wireless mobile hosts [1] [5]. The host is called as a node which dynamically establishes their own network. Intrusion detection in MANETs, however, is challenging for a number of reasons. These networks change their topologies(More)