Dr. M.   Hemalatha
My Social Links

Dr. M. Hemalatha

Director
Hansoft Technologies Pvt. Ltd., India


Highest Degree
Ph.D. in Computer Science from Anna University, India

Share this Profile



Advertisement
Event

Area of Interest:

Computer Sciences
100%
Data Base Management
62%
Network Security
90%
Soft Computing
75%
Communication
55%

Research Publications in Numbers

Books
0
Chapters
0
Articles
0
Abstracts
0

Selected Publications

  1. Selvanandhini, B. and M. Hemalatha, 2017. A mathematical model for quality video packet streaming with minimum jitter rate. Global J. Pure Applied Math., 13: 4381-4395.
    Direct Link  |  
  2. Hemalatha, M. and Sylvia, 2016. Diagnosis of heart disease from ECG using colonial neural network with derivative threshold based genetic algorithms. Int. J. Applied Eng. Res., 11: 5297-5303.
  3. Hemalatha, M. and S. Nithya, 2016. A thorough survey on lossy image compression techniques. Int. J. Applied Eng. Res., 11: 3326-3329.
    Direct Link  |  
  4. Hemalatha, M. and Anitha, 2016. Certificate revocation list distribution based on DMSTP (directional minimum spanning tree protocol) using tripled in Vanet. Aust. J. Basic, (In Press). .
  5. Vinodhini, V. and M. Hemalatha, 2015. Improved density based K clustering (E- DBK)algorithm for effectual investigation of crime data. Int. J. Applied Eng. Res., 10: 16655-16664.
  6. Senthamilarasu and M. Hemalatha, 2015. Ensemble classifier for concept drift data. Stream Spinger Infor. Commun. Technol. Soc., 1: 127-137.
  7. Kavitha and M. Hemalatha, 2015. Enhanced Support Vector Machine (SVM) algorithm. Int. J. Applied Eng. Res., 10: 16865-16872.
  8. Anitha, G. and M. Hemalatha, 2015. Certificate revocation list distribution based on Road Map Distance Protocol (RMDP) in Vanet. Int. Rev. Comput. Software, 10: 300-307.
    Direct Link  |  
  9. Vinodhini, V. and M. Hemalatha, 2014. An intend method for tracking and detecting crime using clustering techniques. Int. J. Eng. Manage. Res., 4: 27-30.
  10. Singh, N.A. and M. Hemalatha, 2014. Reservation resource technique for virtual machine placement in cloud data centre. Res. J. Applied Sci. Eng. Technol., 7: 2954-2960.
  11. Singh, A. and M. Hemalatha, 2014. BASIP a virtual machine placement technique to reduce energy consumption in cloud data centre. J. Theoret. Applied Inform. Technol., 59: 426-435.
  12. Sindhu, V., S.A.S. Prabha, S. Veni and M. Hemalatha, 2014. Thoracic surgery analysis using data mining techniques. Int. J. Comput. Technol. Applic., 5: 578-586.
  13. Senthamilarasu, S. and M. Hemalatha, 2014. Classification of pattern using intuitionistic fuzzy temporal association rule mining for data stream. Int. J. Control Theory Applic., 7: 11-18.
  14. Sasirekha, N. and M. Hemalatha, 2014. Quantum cryptography using quantum key distribution and its applications. Int. J. Eng. Adv. Technol., 3: 289-294.
  15. Sasirekha, N. and M. Hemalatha, 2014. A hybrid indexed table and quasigroup encryption approach for code security against various software threads. J. Theoret. Applied Inform. Technol., 60: 437-445.
    Direct Link  |  
  16. Saranya, N.N. and M. Hemalatha, 2014. An innovative idea to discover the trend on multi-dimensional spatio-temporal datasets. Int. J. Res. Eng. Technol., 3: 243-249.
  17. Robert, A.E. and M. Hemalatha, 2014. Identification of heterogeneous malicious nodes in the crucial dynamic environment for protecting local and remote systems. Int. J. Adv. Comput. Eng. Network., 2: 35-38.
  18. Robert, A.E. and M. Hemalatha, 2014. Epidemic dynamics of malicious code detection architecture in critical environment. Indian J. Sci. Technol., 7: 770-775.
  19. Robert, A.E. and M. Hemalatha, 2014. Epidemic dynamic of malicious code detection architecture in critical environment. Indian J. Sci. Technol., 7: 770-775.
  20. Revathi, P. and M. Hemalatha, 2014. Cotton leaf spot diseases detection utilizing feature selection with skew divergence method. Int. J. Scient. Eng. Technol., 3: 22-30.
  21. Revathi, P. and M. Hemalatha, 2014. Cotton disease identification using proposed CIG-DFNN classifier. Asian J. Scient. Res., 7: 225-231.
  22. Revathi, P. and M. Hemalatha, 2014. Classification of cotton diseases using cross information gain-minimal resourse allocation network classifier with particle swarm optimization. J. Theoret. Applied Inform. Technol., 60: 184-188.
  23. Prasanth, A. and M. Hemalatha, 2014. A comparison on intelligent web information retrieval systems. Int. J. Comput. Sci. Network, 3: 425-429.
    Direct Link  |  
  24. Padmapriya, G. and M. Hemalatha, 2014. Extraction of unstructured data records and discovering new attributes from the web documents. Int. J. Comput. Trends Technol., 17: 125-132.
    Direct Link  |  
  25. Padmapriya, G. and M. Hemalatha, 2014. Distributed protocol for privacy preserving by applying proposed k-anonymizing approach on distributed datasets. Karpagam J. Comput. Sci. (In Press). .
  26. Padmapriya, G. and M. Hemalatha, 2014. Distributed privacy preserving and handling privacy information leakage by using k-anonymity algorithm. Int. J. Res. Applied Sci. Eng. Technol. (In Press). .
  27. Padmapriya, G. and M. Hemalatha, 2014. A recent survey on unstructured data to structured data in distributed data mining. Int. J. Comput. Technol. Applic., 5: 338-344.
  28. Padmapriya, G. and M. Hemalatha, 2014. A novel privacy preservation using double hash based K-anonymity techniques. Int. J. Applied Eng. Res. (In Press). .
  29. Nandhakumar, P. and M. Hemalatha, 2014. Effective semantic web information retrieval using fuzzy based ontology. Int. J. Innovat. Technol. Exploring Eng., 3: 33-36.
  30. Nandakumar, P. and M. Hemalatha, 2014. An exhaustive survey on various semantic web procedures and techniques. Int. J. Control Theory Applic., 7: 1-9.
  31. Nadiammai, G.V. and M. Hemalatha, 2014. Effective approach towards intrusion detection system using data mining techniques. Egypt. Inform. J., 15: 37-50.
  32. Kumar, P.N. and M. Hemalatha, 2014. Domain oriented ontology based semantic web search methodology using sparql query. Int. J. Comput. Technol., 12: 3875-3885.
  33. Kumar, K.S. and M. Hemalatha, 2014. An optimized inference of pattern recognition using fuzzy ant based clustering algorithm. Int. Rev. Comput. Software, 9: 54-63.
  34. Kumar, K.S. and M. Hemalatha, 2014. An efficient integrated approach for information retrieval using fuzzy artificial bee colony optimization based on cloud computing. Middle-East J. Scient. Res., 21: 376-384.
    Direct Link  |  
  35. Krishnaveni, S. and M. Hemalatha, 2014. Evaluation of DFTDS algorithm for distributed data warehouse. Egypt. Infor. J., 15: 51-58.
    CrossRef  |  
  36. Hemaltha, S. and M. Hemalatha, 2014. Predicition of missing values in datasets using association rule mining. Int. J. Applied Eng. Res., 9: 19789-19800.
  37. Hemaltha, S. and M. Hemalatha, 2014. Computational techniques to recover missing data from gene expression data. Int. J. Res. Applied Sci. Eng. Technol., 2: 132-139.
  38. Hemalatha, S. and M. Hemlatha, 2014. Certain investigation on missing value imputation techniques. Int. J. Comput. Technol. Applic., 5: 323-329.
  39. Gowsalya, R., S. Veni and M. Hemalatha, 2014. Analysis of machine learning techniques by using blogger data. Int. J. Eng. Res. Applic., 4: 461-467.
  40. Gopinath, R. and M. Hemalatha, 2014. Negative association rules for web usage mining using negative selection algorithm. World Applied Sci. J., 31: 2015-2023.
  41. Gobinath, R. and M. Hemalatha, 2014. Visualizing the navigational patterns from web log files using web mining applications. J. Scient. Eng. Res., 5: 538-544.
    Direct Link  |  
  42. Gobinath, R. and M. Hemalatha, 2014. An heighten PSO-K-harmonic mean based pattern recognition in user navigation. Res. J. Applied Sci. Eng. Technol., 7: 1283-1287.
  43. Devi, R.R. and M. Hemalatha, 2014. Mining of network communities by spectral characterization using KD-tree. Res. J. Applied Sci. Eng. Technol., 7: 1294-1301.
    Direct Link  |  
  44. Devi, R.R. and M. Hemalatha, 2014. A novel approach for secure hidden community mining in social networks using data mining techniques. Int. J. Comput. Applic., 87: 12-19.
    Direct Link  |  
  45. Devasena, C.L. and M. Hemalatha, 2014. Automatic classification of audio data using gradient descent neural network based algorithm. J. Theor. Applied Infor. Technol., 70: 375-389.
  46. Anitha, G. and D.M. Hemalatha, 2014. Intrusion prevention and message authentication protocol (IMAP) using region based certificate revocation list method in vehicular ad hoc networks. Int. J. Eng. Technol., 6: 663-672.
    Direct Link  |  
  47. Vasanthi, V. and M. Hemalatha, 2013. Simulation of Obstruction Avoidance Generously mobility (OAGM) model using graph theory technique. Int. J. Res. J. Applied Sci. Eng. Technol., 5: 2799-2808.
  48. Sumathi, T. and M. Hemalatha, 2013. High performance EMID framework for automatic image annotation and retrieval. Int. J. Imag. Robot., 11: 24-36.
    Direct Link  |  
  49. Sumathi, T. and M. Hemalatha, 2013. Enabling public audit ability and data dynamics for storage security in cloud computing. Karpagam J. Comput. Sci., 7: 67-75.
  50. Sumathi, T. and M. Hemalatha, 2013. An enhanced approach for solving class imbalance problem in automatic image annotation. Int. J. Image Graphics Signal Proces., 5: 9-16.
    Direct Link  |  
  51. Sumathi, T. and M. Hemalatha, 2013. A novel approach of automatic image annotation for satellite images. Karpagam J. Comput. Sci., 7: 203-209.
  52. Sumathi, S. and M. Hemalatha, 2013. Performance analysis of routing protocols in mobile adhoc network. Karpagam J. Comput. Sci., 7: 95-103.
  53. Singh, N.A. and M. Hemalatha, 2013. Virtual machine placement by using honey bee forager algorithm in cloud computing. Karpagam J. Comput. Sci., 7: 210-216.
  54. Singh, N.A. and M. Hemalatha, 2013. Reduce Energy Consumption Through Virtual Machine Placement in Cloud Data Centre. In: Mining Intelligence and Knowledge Exploration, Prasath, R. and T. Kathirvalavakumar (Eds.)., Springer, Germany, pp: 466-474.
  55. Singh, N.A. and M. Hemalatha, 2013. Cluster based bee algorithm for virtual machine placement in cloud data centre. J. Theor. Applied Infor. Technol., 57: 1-10.
  56. Singh, N.A. and M. Hemalatha, 2013. An analysis of load balancing in a cloud computing environment. Eur. J. Scient. Res., 101: 590-598.
  57. Sentamilarasu, S. and M. Hemalatha, 2013. Dynamically adaptive count bloom filter for handling duplicates in data stream. Int. J. Eng. Technol., 4: 450-458.
  58. Sentamilarasu, S. and M. Hemalatha, 2013. A genetic algorithm based intuitionistic fuzzification technique for attribute selection. Indian J. Sci. Technol., 6: 4336-4346.
  59. Sasirekha, N. and M. Hemalatha, 2013. Quasigroup encryption based cryptographic scheme for software protection. Int. J. Adv. Eng. Emerg. Technol., 3: 346-357.
  60. Sasirekha, N. and M. Hemalatha, 2013. Novel secure code encryption techniques using crypto based indexed table for highly secured software. Int. Rev. Comput. Software, 8: 1980-1990.
  61. Sasirekha, N. and M. Hemalatha, 2013. A novel secured code apporoach using latin square crypto system against reverse engineering. J. Comput. Sci. (Karpagam), 7: 26-270.
  62. Robert, A.E. and M. Hemalatha, 2013. Effiicient Malware detection and tracer for an operating systems. Int. J. Res. J. Sci. Eng. Technol., 6: 2052-2060.
  63. Robert, A.E. and M. Hemalatha, 2013. Dynamic virtual monitoring system for detecting malicious nodes in an intruder domain. Int. J. Recent Scient. Res., 4: 2062-2066.
  64. Robert, A.E. and M. Hemalatha, 2013. Behavioral and performance analysis model for Malware detection techniques. Int. J. Comput. Eng. Technol., 4: 141-151.
  65. Revathi, R. and M. Hemalatha, 2013. Object Tracking and Detection in Videos using Block Matching with Intuitionistic Fuzzy Logic (BMIFL) algorithm. Res. J. Applied Sci. Eng. Technol., 6: 3568-3576.
  66. Revathi, R. and M. Hemalatha, 2013. A novel approach for object tracking and detection using IFL algorithm. Int. J. Comput. Sci. Infor. Security, 11: 102-109.
  67. Revathi, P. and M. Hemalatha, 2013. Identification of cotton diseases based on cross information gain_deep forward neural network classifier with PSO feature selection. Int. J. Eng. Technol., 5: 4637-4642.
    Direct Link  |  
  68. Revathi, P. and M. Hemalatha, 2013. An improve cotton leaf spot disease detection using proposed classifiers. Int. J. Eng. Res. Technol., 2: 2144-2147.
  69. Nadiammai, G.V. and M. Hemalatha, 2013. An enhanced rule approach for network intrusion detection using efficient data adapted decision tree algorithm. Int. J. Theor. Applied Infor. Technol., 47: 426-433.
    Direct Link  |  
  70. Nadiammai, G.V. and M. Hemalatha, 2013. Handling intrusion detection system using snort based statistical algorithm and semi-supervised approach. Res. J. Applied Sci. Eng. Technol., 6: 2914-2922.
    Direct Link  |  
  71. Leema, A.A. and M. Hemalatha, 2013. Proposed prediction algorithms based on hybrid approach to deal with anomalies of RFID data in healthcare. Egypt. Infor. J., 14: 135-145.
    CrossRef  |  Direct Link  |  
  72. Leema, A. and M. Hemalatha, 2013. A novel integrated approach for handling anomalies in RFID data. Int. J. UbiComp, 4: 135-145.
  73. Krishnaveni, S. and M. Hemalatha, 2013. Query management in data warehouse using virtual machine fault tolerant resource scheduling algorithm. Int. J. Theor. Applied Infor. Technol., 47: 1251-1257.
  74. Gobinath, R. and M. Hemalatha, 2013. Optimized feature extraction for identifying user behavior in web mining. Eur. J. Scient. Res., 105: 319-332.
  75. Gnanaselvi, J. and M. Hemalatha, 2013. An efficient swarm intelligence optimization based passive continuous authentication system. Int. J. Adv. Eng. Emerg. Technol., 2: 220-234.
  76. Devi, R.R. and M. Hemalatha, 2013. A perspective analysis of hidden community mining methods in large scale social networks. Int. J. Comput. Applic., 75: 7-12.
  77. Devi, R.R. and M. Hemalataha, 2013. Sybil identification in social networks using SICT and SICTF algorithms with improved KD-tree. J. Theor. Applied Infor. Technol., 56: 443-451.
  78. Devi, R.R. and M. Hemalataha, 2013. Automatic K-community mining in heterogeneous network using convergence aware dirichlet process mixture model. Int. J. Eng. Res. Technol., 2: 1976-1984.
  79. Devi, R.R. and M. Hemalataha, 2013. An improved KD-tree algorithm based community mining in social networks. Eur. J. Scient. Res., 110: 58-69.
  80. Devi, R.R. and M. Hemalataha, 2013. A study on different hidden community detection methods in the social area networks. Proc. Recent Trends Infor. Technol., 1: 43-46.
  81. Devi, R.R. and M. Hemalataha, 2013. A novel algorithm for automatically detecting number of clusters for mining communities in heterogeneous social networks. Eng. Int. J. Innov. Technol. Exp., 3: 43-47.
  82. Vasanthi, V. and M. Hemalatha, 2012. Mobility scenario of dissimilar mobility models using DSR protocol in adhoc sensor network: A survey. Int. J. Comput. Applic., 4: 1-14.
  83. Vasanthi, V. and M. Hemalatha, 2012. A proportional analysis of dissimilar mobility models in ad-hoc sensor network over DSR protocol. Int. J. Comput. Applic., 42: 26-32.
  84. Sumathi, T. and M. Hemalatha, 2012. A novel JSVM approach for automatic image annotation and retrieval. Int. J. Comput. Applic., 52: 10-14.
  85. Sumadhi, T. and M. Hemalatha, 2012. A novel approach for automatic image annotation using enhanced multi-instance differentiation framework. Proc. Eng., 38: 2694-2701.
  86. Singh, N.A., V. Vasanthi and M. Hemalatha, 2012. A brief survey onarchitecture, challenges and security benefit in cloud computing. Int. J. Infor. Commun. Technol. Res., 2: 102-111.
  87. Singh, N.A. and M. Hemalatha, 2012. Comparative analysis of low-latency on different bandwidth and geographical locations while using cloud based applications. Int. J. Adv. Eng. Technol., 2: 393-400.
    Direct Link  |  
  88. Singh, N.A. and M. Hemalatha, 2012. Cloud computing for academic environment. Int. J. Infor. Commun. Technol. Res., 2: 97-101.
  89. Singh, N.A. and M. Hemalatha, 2012. An approach on semi-distributed load balancing algorithm for cloud computing system. Int. J. Comput. Applic., 56: 5-10.
    Direct Link  |  
  90. Senthamilarasu, S. and M. Hemalatha, 2012. Load shedding using window aggregation queries on data streams. Int. J. Comput. Applic., 54: 42-49.
    Direct Link  |  
  91. Senthamilarasu, S. and M. Hemalatha, 2012. Load shedding for window aggregation queries over sensor streams management. J. Comput. Sci., 6: 252-261.
  92. Satheshkumar, K. and M. Hemalatha, 2012. An enhanced approach for treating missing value using boosted K-NN. Int. J. Comput. Applic., 54: 35-41.
    Direct Link  |  
  93. Sasirekha, N. and M. Hemalatha, 2012. An enhanced code encryption approach with HNT transformations for software security. Int. J. Comput. Applic., 53: 17-23.
    Direct Link  |  
  94. Sasirekha, N. and M. Hemalatha, 2012. A thorough investigation on software protection techniques against various attacks. Bonfr. Int. J. Software Eng. Soft Comput., 2: 10-15.
    Direct Link  |  
  95. Sasirekha, N. and M. Hemalatha, 2012. A survey on software protection techniques against various attacks. Global J. Comput. Sci. Technol., 12: 53-58.
  96. Saranya, N.N. and M. Hemalatha, 2012. IESO algorithm for rule generation and GPLDE algorithm for trend discovery in Spatio-temporal data. Eur. J. Scient. Res., 92: 548-564.
  97. Saranya, N.N. and M. Hemalatha, 2012. Estimation of evolutionary optimization algorithm for association rule using spatial data mining. Int. J. Comput. Applic., 51: 1-5.
    Direct Link  |  
  98. Revathi, R. and M. Hemalatha, 2012. Empirical analysis of denoising techniques in video processing. J. Comput. Sci., 6: 225-236.
    Direct Link  |  
  99. Revathi, R. and M. Hemalatha, 2012. Certain approach of object tracking using optical flow techniques. Int. J. Comput. Applic., 53: 50-57.
  100. Revathi, R. and M. Hemalatha, 2012. An emerging trend of feature extraction method in video processing. Comput. Sci. Infor. Technol., 5: 69-80.
    Direct Link  |  
  101. Revathi, P. and M. Hemalatha, 2012. Homogenous segmentation based edge detection techniques for proficient identification of the cotton leaf spot diseases. Int. J. Comput. Applic., 47: 18-21.
  102. Revathi, P. and M. Hemalatha, 2012. Computing performance evaluation of cotton leaves spot diseases recognition using image segmentation. Int. J. Adv. Res. Comput. Sci., 3: 401-404.
  103. Nandhakumar, P., M. Hemalatha and K. Dhruve, 2012. Adorning web search based on ontology semantics spaces provisioned through web services. Int. J. Comput. Applic., 55: 53-60.
    Direct Link  |  
  104. Nadiammai, G.V. and M. Hemalatha, 2012. Rule based classification approach towards detection of network intrusions. J. Comput. Sci., 6: 283-290.
    Direct Link  |  
  105. Nadiammai, G.V. and M. Hemalatha, 2012. Anomaly based hybrid intrusion detection system for identifying network traffic. Int. J. Comput. Sci. Infor. Security, 10: 30-35.
  106. Leema, A.A. and M. Hemalatha, 2012. Anomaly detection and elimination algorithm for RFID data. Int. J. Comput. Applic., 49: 15-19.
  107. Krishnaveni, S. and M. Hemalatha, 2012. Query scheduling in distributed data warehouse using DTDS and VMFTRS algorithms. Eur. J. Scient. Res., 89: 612-625.
  108. Krishnaveni, S. and M. Hemalatha, 2012. Query processing in distributed data warehouse using scheduling algorithms. Int. J. Comput. Applic., 1: 7-10.
    Direct Link  |  
  109. Krishnaveni, S. and M. Hemalatha, 2012. Query processing in distributed data warehouse using proposed dynamic task dependency scheduling algorithm. Int. J. Comput. Applic., 55: 17-22.
    Direct Link  |  
  110. Krishnaveni, S. and M. Hemalatha, 2012. Performance analysis of particle swarm optimization algorithms for jobs scheduling in data warehouse. Int. J. Adv. Res. Comput. Sci., 3: 237-241.
    Direct Link  |  
  111. Hemalatha, M., 2012. Hybrid Models for High Dimensional Clustering and Pattern Discovery. LAP LAMBERT Academic Publishing, Germany.
  112. Gobinath, R. and M. Hemalatha, 2012. Improved preprocessing techniques for analyzing patterns in web personalization process. Int. J. Comput. Applic., 58: 13-20.
  113. Devi, R. and M. Hemalatha, 2012. A survey on online spam detection methods in social networking sites. J. Comput. Sci., 6: 333-341.
  114. Devasena, C.L. and M. Hemalatha, 2012. Video mining using LIM based clustering and self organizing maps. Proc. Eng., 2: 913-921.
    CrossRef  |  Direct Link  |  
  115. Devasena, C.L. and M. Hemalatha, 2012. Object detection in video using lorenz information measure and discrete wavelet transform. ACM Adv. Comput. Commun. Infor., 1: 200-207.
    Direct Link  |  
  116. Vasanthi, V., N.A. Singh and M. Hemalatha, 2011. A detailed study of mobility model in sensor network. Int. J. Theor. Applied Infor. Technol., 33: 7-14.
  117. Vasanthi, V. and M. Hemalatha, 2011. Empirical study on security attacks in wireless sensor network. Int. J. Adv. Res. Comput. Sci., 2: 23-28.
    Direct Link  |  
  118. Sumathi, T., P. Nagarajan and M. Hemalatha, 2011. An empirical study on image/video retrieval techniques grand challenges and trends. Int. J. Comput. Infor. Syst., 2: 20-26.
  119. Sumathi, T., C.L. Devasena, R. Revathi, S. Priya and M. Hemalatha, 2011. Automatic image annotation and retrieval using multi-instance muli-label learning. Bonfr. Int. J. Adv. Image Proces., 1: 1-5.
    Direct Link  |  
  120. Sumathi, T., C.L. Devasena and M. Hemalatha, 2011. An overview of automated image annotation approaches. Int. J. Res. Rev. Infor. Sci., 1: 1-6.
  121. Sumathi, T., A.E. Robert, B. Bharathi and M. Hemalatha, 2011. Image fusion algorithm based on wavelet transform and IDFC transform. Int. J. GJACT, 1: 184-190.
  122. Sumathi, T. and M. Hemalatha, 2011. Semantic web image search through manual annotation. Int. J. Comput. Applic., 17: 39-42.
    Direct Link  |  
  123. Sumathi, T. and M. Hemalatha, 2011. An innovative image fusion algorithm based on wavelet transform and improved discrete fast curvelet transform. Cent. Eur. J. Comput. Sci., 1: 329-340.
    Direct Link  |  
  124. Sumathi, T. and M. Hemalatha, 2011. A novel approach for automatic image annotation and retrieval. Karpagam J. Comput. Sci., 5: 313-318.
  125. Singh, N.A., V. Vasanthi, B. Bharathi and M. Hemalatha, 2011. 4G-Fourth generation wireless systems requirements and technical challenges. J. Theor. Applied Infor. Technol., 31: 29-35.
  126. Sasirekha, N., A.E. Robert and M. Hemalatha, 2011. Program slicing techniques and its applications. Int. J. Software Eng. Applic., 2: 50-64.
  127. Saranya, N.N., G. Padmapriya, S. Hemalatha and M. Hemalatha, 2011. An evaluation of K-means based ANN using forest fire data in spatial data mining. Int. J. Theor. Applied Infor. Technol., 34: 29-33.
  128. Saranya, N.N. and M. Hemalatha, 2011. Potential research into spatial cancer database by using data clustering technique. Int. J. Comput. Sci. Infor. Security, 9: 168-173.
    Direct Link  |  
  129. Saranya, N.N. and M. Hemalatha, 2011. Integrating spatial data mining technique to identify potential landsat data using K-means and BPNN algorithm. Int. J. Comput. Applic., 30: 16-21.
    Direct Link  |  
  130. Robert, A.E., G. Manivasagam, N. Sasirekha and M. Hemalatha, 2011. Reverse engineering for malicious code behavior analysis using virtual security patching. Int. J. Comput. Applic., 26: 41-45.
  131. Revathi, R., P. Revathi, T. Sumathi and M. Hemalatha, 2011. Overview of image processing techniques: A survey. Global J. Comput. Applic. Technol., 1: 512-520.
  132. Revathi, P., R. Revathi and M. Hemalatha, 2011. Knowledge discovery in diagnose of crop diseases using machine learning techniques. Int. J. Eng. Sci. Technol., 3: 7187-7190.
  133. Revathi, P., R. Revathi and M. Hemalatha, 2011. Comparative study of knowledge in crop disease using machine learning techniques. Int. J. Comput. Sci. Infor. Technol., 2: 2180-2182.
    Direct Link  |  
  134. Revathi, P. and M. Hemalatha, 2011. Efficient classification mining approach for agriculture. Int. J. Res. Rev. Infor. Sci., 1: 42-45.
  135. Revathi, P. and M. Hemalatha, 2011. Categorize the quality of cotton seed based on the different germination of the cotton using machine knowledge approach. Int. J. Adv. Sci. Technol., 36: 9-14.
  136. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. Evaluating the yield of hybrid napier grass with data mining techniques. Int. J. Comput. Applic., 35: 1-7.
    Direct Link  |  
  137. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. A comprehensive analysis and study in intrusion detection system using data mining techniques. Int. J. Comput. Applic., 35: 51-56.
    Direct Link  |  
  138. Megala, S., P. SoundarRajan and M. Hemalatha, 2011. An experimental study of pattern mining technique to improve the business strategy. Int. J. Comput. Applic., 34: 1-5.
    Direct Link  |  
  139. Megala, S. and M. Hemalatha, 2011. A novel data mining approach to determine the vanished agricultural land in Tamil Nadu. Int. J. Comput. Applic., 23: 23-28.
    Direct Link  |  
  140. Leema, A.A. and M. Hemalatha, 2011. Optimizing operational efficiency and enhancing data reliability using effective and adaptive cleaning approach for RFID in healthcare. Int. J. Comput. Applic., 3: 26-29.
  141. Leema, A.A. and M. Hemalatha, 2011. Automatic image annotation and retrieval using multi-instance multi-label learning. Bonfr. Int. J. Adv. Image Proces., 1: 1-5.
  142. Leema, A.A. and M. Hemalatha, 2011. An effective and adaptive data cleaning technique for colossal RFID dataset in healthcare. WSEAS Trans. Infor. Sci. Applic., 6: 243-252.
    Direct Link  |  
  143. Krishnaveni, S. and M. Hemalatha, 2011. A perspective analysis of traffic accident using data mining techniques. Int. J. Comput. Applic., 23: 40-48.
    Direct Link  |  
  144. Hemalatha, M. and S. Megala, 2011. Mining techniques in health care: A survey of immunization. J. Theor. Applied Infor. Technol., 25: 63-70.
    Direct Link  |  
  145. Hemalatha, M. and N.N. Saranya, 2011. A recent survey on knowledge discovery in spatial data mining. Int. J. Comput. Sci. Iss., 8: 473-479.
    Direct Link  |  
  146. Hemalatha, M. and A.A. Leema, 2011. Applying RFID technology to construct an elegant hospital environment. Int. J. Comput. Sci. Iss., 8: 444-448.
    Direct Link  |  
  147. Devasena, C.L., T. Sumathi and M. Hemalatha, 2011. Effectiveness evolutional of rule based classifiers for the classification of Iris dataset. Bonfr. Int. J. Man Mach. Interf., 1: 5-9.
  148. Devasena, C.L., T. Sumathi and M. Hemalatha, 2011. An experiential survey on image mining tools, techniques and applications. Int. J. Comput. Sci. Eng., 3: 1155-1167.
  149. Devasena, C.L., R.R. Krishnan and M. Hemalatha, 2011. An enhanced algorithm for mining color images: A novel approach. CIIT. Int. J. Data Mining Knowledge Eng., 3: 550-554.
  150. Devasena, C.L., R. Revathi and M. Hemalatha, 2011. Video surveillance system: A survey. Int. J. Comput. Sci. Iss., 8: 635-642.
    Direct Link  |  
  151. Devasena, C.L. and M. Hemalatha, 2011. Noise removal in magnetic resonance images using hybrid KSL filtering technique. Int. J. Comput. Applic., 27: 1-4.
  152. Devasena, C.L. and M. Hemalatha, 2011. A novel method to improve video compression for video surveillance applications using SPIHT algorithm. Int. J. Adv. Res. Comput. Sci., 2: 119-125.
    Direct Link  |  
  153. Devasena, C.L. and M. Hemalatha, 2011. A hybrid image mining technique using LIM based data mining algorithm. Int. J. Comput. Applic., 25: 1-5.
    Direct Link  |  
  154. Devasena, C.L. and M. Hemalatha, 2011. A comparative study of hybrid LIM based image matching techniques for mining image databases. Int. J. Knowledge Manage. e-Learn., 3: 61-65.
  155. Vasanthi, V., P. Nagarajan, B. Bharathi and M. Hemalatha, 2010. A perspective analysis of routing protocols in wireless sensor network. Int. J. Comput. Sci. Eng., 2: 2511-2518.
    Direct Link  |  
  156. Sumathi, T. and M. Hemalatha, 2010. An empirical study on performance evolution in automatic image annotation and retrieval. Int. J. Adv. Res. Comput. Sci., 1: 13-17.
  157. Leema, A.A., P. Sudhakar, R.S.D. Vahidabanu and M. Hemalatha, 2010. RFID data management and its applications in hospital environment. Int. J. Adv. Sci. Technol., 1: 53-108.
  158. Leema, A.A. and M. Hemalatha, 2010. A proposed system to solve the drawbacks of association rule mining in E-learning. J. Comput. Applic., 3: 13-19.
  159. Kumar, M.A., M. Hemalatha, P. Nagaraj and S. Karthikeyan, 2010. A new way towards security in TCP/IP protocol suite. Latest Trends Comput., 1: 46-50.
  160. Kumar, M.A., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative analysis of IPv4 and IPv6 to evaluate performance. Int. J. Comput. Network Security, 2: 27-31.
  161. Anandkumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. A large capacity steganography using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 video. Int. J. Comput. Network Security, 2: 67-70.
  162. Hemalatha, M., S. Karthikeyan and E. Ramaraj, 2009. A design of security protocol using hybrid encryption technique AES-Rijndael and RSA. Int. J. Comput. Internet Manage., 17: 78-86.
  163. Hemalatha, M., R. Jeyadev and V.K. Gopalakrishnan, 2009. Predicting HIV drug resistance using neural networks. IJCIB., 1: 69-74.
  164. Hemalatha, M. and K. Vivekanandan, 2008. A simple statistical model for probabilistic motif discovery in multiple aligned sequences. Eur. J. Scient. Res., 19: 608-613.
  165. Hemalatha, M. and K. Vivekanandan, 2008. A semaphore based multiprocessing k-mean algorithm for massive biological data. Asian J. Sci. Res., 1: 444-450.
    CrossRef  |  Direct Link  |  
  166. Hemalatha, M. and K. Vivekanandan, 2008. A distributed and parallel clustering algorithm for massive biological data. J. Convergence Infor. Technol., 3: 84-88.
    Direct Link  |  
  167. Hemalatha M. and K. Vivekanandan, 2008. Genetic algorithm based probabilistic motif discovery in unaligned biological sequences. J. Comput. Sci., 4: 625-630.
    CrossRef  |  Direct Link  |  
  168. Hemalatha, M., 2007. Medical informatics. Tamil Comput., 16: 1-7.
  169. Hemalatha, M. and K. Vivekanandan, 2007. Phylogenetic tree construction using simple SVD based distance metrics. Int. J. Comput. Sci. Syst. Anal., 1: 103-110.
  170. Hemalatha, M. and K. Vivekanandan, 2007. A scalable and high performance sorting algorithm to analyze massive biological data. Int. J. Syst. Anal. Design, 1: 37-45.
  171. Shanmugavel, D.P., M. Hemalatha and S. Karthikeyan, 2006. Microarray in Bioinformatics, Trends in Bioinformatics. Pointer Publishers, Jaipur, India pp: 212-250.
  172. Shanmugavel, D.P, M. Hemalatha and S. Karthikeyan, 2006. Mathematic Modeling in Molecular Modeling, Trends in Bioinformatics. Pointer Publishers, Jaipur, India.
  173. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An improvement of Eun-jun-kyung-kee`s remote user authentication scheme in smart card using hybrid encryption. J. Comput. Sci., 1: 293-300.
  174. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An analysis of key management in transport layer security standard. Punjab College Tech. Edu. J. Comput. Sci., 2: 5-9.
  175. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A new approach of hybrid encryption technique in database security. Int. J. Technol. Knowledge Soc., 2: 55-60.
  176. Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An efficient algorithm for predicting survival of medical data. Int. J. Technol. Knowledge Soc., 2: 37-48.
    Direct Link  |  
  177. Hemalatha, M., S. Karthikeyan and V.V. Gomathi, 2006. Data mining knowledge discovery database. Tamil Comput., 1218: 4-8.
  178. Karthikeyan, S., M. Hemalatha and E. Ramaraj, 2005. Database search and retrieval system for bacteria. Bioinformatics India J., 3: 37-42.
  179. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An improvement of security in the insecurity of 802.11 using hybrid encryption AES-Rijndael and RSA. Indian J. Infor. Sci. Technol., 1: 18-26.
  180. Hemalatha, M., 2005. A data mining tool to increase human life days from affecting cardiac arrest. Bioinfor. India, 3: 96-111.