Dr. M. Hemalatha
DirectorHansoft Technologies Pvt. Ltd., India
Highest Degree
Ph.D. in Computer Science from Anna University, India
Share this Profile
Area of Interest:
Selected Publications
- Selvanandhini, B. and M. Hemalatha, 2017. A mathematical model for quality video packet streaming with minimum jitter rate. Global J. Pure Applied Math., 13: 4381-4395.
Direct Link | - Hemalatha, M. and Sylvia, 2016. Diagnosis of heart disease from ECG using colonial neural network with derivative threshold based genetic algorithms. Int. J. Applied Eng. Res., 11: 5297-5303.
- Hemalatha, M. and S. Nithya, 2016. A thorough survey on lossy image compression techniques. Int. J. Applied Eng. Res., 11: 3326-3329.
Direct Link | - Hemalatha, M. and Anitha, 2016. Certificate revocation list distribution based on DMSTP (directional minimum spanning tree protocol) using tripled in Vanet. Aust. J. Basic, (In Press). .
- Vinodhini, V. and M. Hemalatha, 2015. Improved density based K clustering (E- DBK)algorithm for effectual investigation of crime data. Int. J. Applied Eng. Res., 10: 16655-16664.
- Senthamilarasu and M. Hemalatha, 2015. Ensemble classifier for concept drift data. Stream Spinger Infor. Commun. Technol. Soc., 1: 127-137.
- Kavitha and M. Hemalatha, 2015. Enhanced Support Vector Machine (SVM) algorithm. Int. J. Applied Eng. Res., 10: 16865-16872.
- Anitha, G. and M. Hemalatha, 2015. Certificate revocation list distribution based on Road Map Distance Protocol (RMDP) in Vanet. Int. Rev. Comput. Software, 10: 300-307.
Direct Link | - Vinodhini, V. and M. Hemalatha, 2014. An intend method for tracking and detecting crime using clustering techniques. Int. J. Eng. Manage. Res., 4: 27-30.
- Singh, N.A. and M. Hemalatha, 2014. Reservation resource technique for virtual machine placement in cloud data centre. Res. J. Applied Sci. Eng. Technol., 7: 2954-2960.
- Singh, A. and M. Hemalatha, 2014. BASIP a virtual machine placement technique to reduce energy consumption in cloud data centre. J. Theoret. Applied Inform. Technol., 59: 426-435.
- Sindhu, V., S.A.S. Prabha, S. Veni and M. Hemalatha, 2014. Thoracic surgery analysis using data mining techniques. Int. J. Comput. Technol. Applic., 5: 578-586.
- Senthamilarasu, S. and M. Hemalatha, 2014. Classification of pattern using intuitionistic fuzzy temporal association rule mining for data stream. Int. J. Control Theory Applic., 7: 11-18.
- Sasirekha, N. and M. Hemalatha, 2014. Quantum cryptography using quantum key distribution and its applications. Int. J. Eng. Adv. Technol., 3: 289-294.
- Sasirekha, N. and M. Hemalatha, 2014. A hybrid indexed table and quasigroup encryption approach for code security against various software threads. J. Theoret. Applied Inform. Technol., 60: 437-445.
Direct Link | - Saranya, N.N. and M. Hemalatha, 2014. An innovative idea to discover the trend on multi-dimensional spatio-temporal datasets. Int. J. Res. Eng. Technol., 3: 243-249.
- Robert, A.E. and M. Hemalatha, 2014. Identification of heterogeneous malicious nodes in the crucial dynamic environment for protecting local and remote systems. Int. J. Adv. Comput. Eng. Network., 2: 35-38.
- Robert, A.E. and M. Hemalatha, 2014. Epidemic dynamics of malicious code detection architecture in critical environment. Indian J. Sci. Technol., 7: 770-775.
- Robert, A.E. and M. Hemalatha, 2014. Epidemic dynamic of malicious code detection architecture in critical environment. Indian J. Sci. Technol., 7: 770-775.
- Revathi, P. and M. Hemalatha, 2014. Cotton leaf spot diseases detection utilizing feature selection with skew divergence method. Int. J. Scient. Eng. Technol., 3: 22-30.
- Revathi, P. and M. Hemalatha, 2014. Cotton disease identification using proposed CIG-DFNN classifier. Asian J. Scient. Res., 7: 225-231.
- Revathi, P. and M. Hemalatha, 2014. Classification of cotton diseases using cross information gain-minimal resourse allocation network classifier with particle swarm optimization. J. Theoret. Applied Inform. Technol., 60: 184-188.
- Prasanth, A. and M. Hemalatha, 2014. A comparison on intelligent web information retrieval systems. Int. J. Comput. Sci. Network, 3: 425-429.
Direct Link | - Padmapriya, G. and M. Hemalatha, 2014. Extraction of unstructured data records and discovering new attributes from the web documents. Int. J. Comput. Trends Technol., 17: 125-132.
Direct Link | - Padmapriya, G. and M. Hemalatha, 2014. Distributed protocol for privacy preserving by applying proposed k-anonymizing approach on distributed datasets. Karpagam J. Comput. Sci. (In Press). .
- Padmapriya, G. and M. Hemalatha, 2014. Distributed privacy preserving and handling privacy information leakage by using k-anonymity algorithm. Int. J. Res. Applied Sci. Eng. Technol. (In Press). .
- Padmapriya, G. and M. Hemalatha, 2014. A recent survey on unstructured data to structured data in distributed data mining. Int. J. Comput. Technol. Applic., 5: 338-344.
- Padmapriya, G. and M. Hemalatha, 2014. A novel privacy preservation using double hash based K-anonymity techniques. Int. J. Applied Eng. Res. (In Press). .
- Nandhakumar, P. and M. Hemalatha, 2014. Effective semantic web information retrieval using fuzzy based ontology. Int. J. Innovat. Technol. Exploring Eng., 3: 33-36.
- Nandakumar, P. and M. Hemalatha, 2014. An exhaustive survey on various semantic web procedures and techniques. Int. J. Control Theory Applic., 7: 1-9.
- Nadiammai, G.V. and M. Hemalatha, 2014. Effective approach towards intrusion detection system using data mining techniques. Egypt. Inform. J., 15: 37-50.
- Kumar, P.N. and M. Hemalatha, 2014. Domain oriented ontology based semantic web search methodology using sparql query. Int. J. Comput. Technol., 12: 3875-3885.
- Kumar, K.S. and M. Hemalatha, 2014. An optimized inference of pattern recognition using fuzzy ant based clustering algorithm. Int. Rev. Comput. Software, 9: 54-63.
- Kumar, K.S. and M. Hemalatha, 2014. An efficient integrated approach for information retrieval using fuzzy artificial bee colony optimization based on cloud computing. Middle-East J. Scient. Res., 21: 376-384.
Direct Link | - Krishnaveni, S. and M. Hemalatha, 2014. Evaluation of DFTDS algorithm for distributed data warehouse. Egypt. Infor. J., 15: 51-58.
CrossRef | - Hemaltha, S. and M. Hemalatha, 2014. Predicition of missing values in datasets using association rule mining. Int. J. Applied Eng. Res., 9: 19789-19800.
- Hemaltha, S. and M. Hemalatha, 2014. Computational techniques to recover missing data from gene expression data. Int. J. Res. Applied Sci. Eng. Technol., 2: 132-139.
- Hemalatha, S. and M. Hemlatha, 2014. Certain investigation on missing value imputation techniques. Int. J. Comput. Technol. Applic., 5: 323-329.
- Gowsalya, R., S. Veni and M. Hemalatha, 2014. Analysis of machine learning techniques by using blogger data. Int. J. Eng. Res. Applic., 4: 461-467.
- Gopinath, R. and M. Hemalatha, 2014. Negative association rules for web usage mining using negative selection algorithm. World Applied Sci. J., 31: 2015-2023.
- Gobinath, R. and M. Hemalatha, 2014. Visualizing the navigational patterns from web log files using web mining applications. J. Scient. Eng. Res., 5: 538-544.
Direct Link | - Gobinath, R. and M. Hemalatha, 2014. An heighten PSO-K-harmonic mean based pattern recognition in user navigation. Res. J. Applied Sci. Eng. Technol., 7: 1283-1287.
- Devi, R.R. and M. Hemalatha, 2014. Mining of network communities by spectral characterization using KD-tree. Res. J. Applied Sci. Eng. Technol., 7: 1294-1301.
Direct Link | - Devi, R.R. and M. Hemalatha, 2014. A novel approach for secure hidden community mining in social networks using data mining techniques. Int. J. Comput. Applic., 87: 12-19.
Direct Link | - Devasena, C.L. and M. Hemalatha, 2014. Automatic classification of audio data using gradient descent neural network based algorithm. J. Theor. Applied Infor. Technol., 70: 375-389.
- Anitha, G. and D.M. Hemalatha, 2014. Intrusion prevention and message authentication protocol (IMAP) using region based certificate revocation list method in vehicular ad hoc networks. Int. J. Eng. Technol., 6: 663-672.
Direct Link | - Vasanthi, V. and M. Hemalatha, 2013. Simulation of Obstruction Avoidance Generously mobility (OAGM) model using graph theory technique. Int. J. Res. J. Applied Sci. Eng. Technol., 5: 2799-2808.
- Sumathi, T. and M. Hemalatha, 2013. High performance EMID framework for automatic image annotation and retrieval. Int. J. Imag. Robot., 11: 24-36.
Direct Link | - Sumathi, T. and M. Hemalatha, 2013. Enabling public audit ability and data dynamics for storage security in cloud computing. Karpagam J. Comput. Sci., 7: 67-75.
- Sumathi, T. and M. Hemalatha, 2013. An enhanced approach for solving class imbalance problem in automatic image annotation. Int. J. Image Graphics Signal Proces., 5: 9-16.
Direct Link | - Sumathi, T. and M. Hemalatha, 2013. A novel approach of automatic image annotation for satellite images. Karpagam J. Comput. Sci., 7: 203-209.
- Sumathi, S. and M. Hemalatha, 2013. Performance analysis of routing protocols in mobile adhoc network. Karpagam J. Comput. Sci., 7: 95-103.
- Singh, N.A. and M. Hemalatha, 2013. Virtual machine placement by using honey bee forager algorithm in cloud computing. Karpagam J. Comput. Sci., 7: 210-216.
- Singh, N.A. and M. Hemalatha, 2013. Reduce Energy Consumption Through Virtual Machine Placement in Cloud Data Centre. In: Mining Intelligence and Knowledge Exploration, Prasath, R. and T. Kathirvalavakumar (Eds.)., Springer, Germany, pp: 466-474.
- Singh, N.A. and M. Hemalatha, 2013. Cluster based bee algorithm for virtual machine placement in cloud data centre. J. Theor. Applied Infor. Technol., 57: 1-10.
- Singh, N.A. and M. Hemalatha, 2013. An analysis of load balancing in a cloud computing environment. Eur. J. Scient. Res., 101: 590-598.
- Sentamilarasu, S. and M. Hemalatha, 2013. Dynamically adaptive count bloom filter for handling duplicates in data stream. Int. J. Eng. Technol., 4: 450-458.
- Sentamilarasu, S. and M. Hemalatha, 2013. A genetic algorithm based intuitionistic fuzzification technique for attribute selection. Indian J. Sci. Technol., 6: 4336-4346.
- Sasirekha, N. and M. Hemalatha, 2013. Quasigroup encryption based cryptographic scheme for software protection. Int. J. Adv. Eng. Emerg. Technol., 3: 346-357.
- Sasirekha, N. and M. Hemalatha, 2013. Novel secure code encryption techniques using crypto based indexed table for highly secured software. Int. Rev. Comput. Software, 8: 1980-1990.
- Sasirekha, N. and M. Hemalatha, 2013. A novel secured code apporoach using latin square crypto system against reverse engineering. J. Comput. Sci. (Karpagam), 7: 26-270.
- Robert, A.E. and M. Hemalatha, 2013. Effiicient Malware detection and tracer for an operating systems. Int. J. Res. J. Sci. Eng. Technol., 6: 2052-2060.
- Robert, A.E. and M. Hemalatha, 2013. Dynamic virtual monitoring system for detecting malicious nodes in an intruder domain. Int. J. Recent Scient. Res., 4: 2062-2066.
- Robert, A.E. and M. Hemalatha, 2013. Behavioral and performance analysis model for Malware detection techniques. Int. J. Comput. Eng. Technol., 4: 141-151.
- Revathi, R. and M. Hemalatha, 2013. Object Tracking and Detection in Videos using Block Matching with Intuitionistic Fuzzy Logic (BMIFL) algorithm. Res. J. Applied Sci. Eng. Technol., 6: 3568-3576.
- Revathi, R. and M. Hemalatha, 2013. A novel approach for object tracking and detection using IFL algorithm. Int. J. Comput. Sci. Infor. Security, 11: 102-109.
- Revathi, P. and M. Hemalatha, 2013. Identification of cotton diseases based on cross information gain_deep forward neural network classifier with PSO feature selection. Int. J. Eng. Technol., 5: 4637-4642.
Direct Link | - Revathi, P. and M. Hemalatha, 2013. An improve cotton leaf spot disease detection using proposed classifiers. Int. J. Eng. Res. Technol., 2: 2144-2147.
- Nadiammai, G.V. and M. Hemalatha, 2013. An enhanced rule approach for network intrusion detection using efficient data adapted decision tree algorithm. Int. J. Theor. Applied Infor. Technol., 47: 426-433.
Direct Link | - Nadiammai, G.V. and M. Hemalatha, 2013. Handling intrusion detection system using snort based statistical algorithm and semi-supervised approach. Res. J. Applied Sci. Eng. Technol., 6: 2914-2922.
Direct Link | - Leema, A.A. and M. Hemalatha, 2013. Proposed prediction algorithms based on hybrid approach to deal with anomalies of RFID data in healthcare. Egypt. Infor. J., 14: 135-145.
CrossRef | Direct Link | - Leema, A. and M. Hemalatha, 2013. A novel integrated approach for handling anomalies in RFID data. Int. J. UbiComp, 4: 135-145.
- Krishnaveni, S. and M. Hemalatha, 2013. Query management in data warehouse using virtual machine fault tolerant resource scheduling algorithm. Int. J. Theor. Applied Infor. Technol., 47: 1251-1257.
- Gobinath, R. and M. Hemalatha, 2013. Optimized feature extraction for identifying user behavior in web mining. Eur. J. Scient. Res., 105: 319-332.
- Gnanaselvi, J. and M. Hemalatha, 2013. An efficient swarm intelligence optimization based passive continuous authentication system. Int. J. Adv. Eng. Emerg. Technol., 2: 220-234.
- Devi, R.R. and M. Hemalatha, 2013. A perspective analysis of hidden community mining methods in large scale social networks. Int. J. Comput. Applic., 75: 7-12.
- Devi, R.R. and M. Hemalataha, 2013. Sybil identification in social networks using SICT and SICTF algorithms with improved KD-tree. J. Theor. Applied Infor. Technol., 56: 443-451.
- Devi, R.R. and M. Hemalataha, 2013. Automatic K-community mining in heterogeneous network using convergence aware dirichlet process mixture model. Int. J. Eng. Res. Technol., 2: 1976-1984.
- Devi, R.R. and M. Hemalataha, 2013. An improved KD-tree algorithm based community mining in social networks. Eur. J. Scient. Res., 110: 58-69.
- Devi, R.R. and M. Hemalataha, 2013. A study on different hidden community detection methods in the social area networks. Proc. Recent Trends Infor. Technol., 1: 43-46.
- Devi, R.R. and M. Hemalataha, 2013. A novel algorithm for automatically detecting number of clusters for mining communities in heterogeneous social networks. Eng. Int. J. Innov. Technol. Exp., 3: 43-47.
- Vasanthi, V. and M. Hemalatha, 2012. Mobility scenario of dissimilar mobility models using DSR protocol in adhoc sensor network: A survey. Int. J. Comput. Applic., 4: 1-14.
- Vasanthi, V. and M. Hemalatha, 2012. A proportional analysis of dissimilar mobility models in ad-hoc sensor network over DSR protocol. Int. J. Comput. Applic., 42: 26-32.
- Sumathi, T. and M. Hemalatha, 2012. A novel JSVM approach for automatic image annotation and retrieval. Int. J. Comput. Applic., 52: 10-14.
- Sumadhi, T. and M. Hemalatha, 2012. A novel approach for automatic image annotation using enhanced multi-instance differentiation framework. Proc. Eng., 38: 2694-2701.
- Singh, N.A., V. Vasanthi and M. Hemalatha, 2012. A brief survey onarchitecture, challenges and security benefit in cloud computing. Int. J. Infor. Commun. Technol. Res., 2: 102-111.
- Singh, N.A. and M. Hemalatha, 2012. Comparative analysis of low-latency on different bandwidth and geographical locations while using cloud based applications. Int. J. Adv. Eng. Technol., 2: 393-400.
Direct Link | - Singh, N.A. and M. Hemalatha, 2012. Cloud computing for academic environment. Int. J. Infor. Commun. Technol. Res., 2: 97-101.
- Singh, N.A. and M. Hemalatha, 2012. An approach on semi-distributed load balancing algorithm for cloud computing system. Int. J. Comput. Applic., 56: 5-10.
Direct Link | - Senthamilarasu, S. and M. Hemalatha, 2012. Load shedding using window aggregation queries on data streams. Int. J. Comput. Applic., 54: 42-49.
Direct Link | - Senthamilarasu, S. and M. Hemalatha, 2012. Load shedding for window aggregation queries over sensor streams management. J. Comput. Sci., 6: 252-261.
- Satheshkumar, K. and M. Hemalatha, 2012. An enhanced approach for treating missing value using boosted K-NN. Int. J. Comput. Applic., 54: 35-41.
Direct Link | - Sasirekha, N. and M. Hemalatha, 2012. An enhanced code encryption approach with HNT transformations for software security. Int. J. Comput. Applic., 53: 17-23.
Direct Link | - Sasirekha, N. and M. Hemalatha, 2012. A thorough investigation on software protection techniques against various attacks. Bonfr. Int. J. Software Eng. Soft Comput., 2: 10-15.
Direct Link | - Sasirekha, N. and M. Hemalatha, 2012. A survey on software protection techniques against various attacks. Global J. Comput. Sci. Technol., 12: 53-58.
- Saranya, N.N. and M. Hemalatha, 2012. IESO algorithm for rule generation and GPLDE algorithm for trend discovery in Spatio-temporal data. Eur. J. Scient. Res., 92: 548-564.
- Saranya, N.N. and M. Hemalatha, 2012. Estimation of evolutionary optimization algorithm for association rule using spatial data mining. Int. J. Comput. Applic., 51: 1-5.
Direct Link | - Revathi, R. and M. Hemalatha, 2012. Empirical analysis of denoising techniques in video processing. J. Comput. Sci., 6: 225-236.
Direct Link | - Revathi, R. and M. Hemalatha, 2012. Certain approach of object tracking using optical flow techniques. Int. J. Comput. Applic., 53: 50-57.
- Revathi, R. and M. Hemalatha, 2012. An emerging trend of feature extraction method in video processing. Comput. Sci. Infor. Technol., 5: 69-80.
Direct Link | - Revathi, P. and M. Hemalatha, 2012. Homogenous segmentation based edge detection techniques for proficient identification of the cotton leaf spot diseases. Int. J. Comput. Applic., 47: 18-21.
- Revathi, P. and M. Hemalatha, 2012. Computing performance evaluation of cotton leaves spot diseases recognition using image segmentation. Int. J. Adv. Res. Comput. Sci., 3: 401-404.
- Nandhakumar, P., M. Hemalatha and K. Dhruve, 2012. Adorning web search based on ontology semantics spaces provisioned through web services. Int. J. Comput. Applic., 55: 53-60.
Direct Link | - Nadiammai, G.V. and M. Hemalatha, 2012. Rule based classification approach towards detection of network intrusions. J. Comput. Sci., 6: 283-290.
Direct Link | - Nadiammai, G.V. and M. Hemalatha, 2012. Anomaly based hybrid intrusion detection system for identifying network traffic. Int. J. Comput. Sci. Infor. Security, 10: 30-35.
- Leema, A.A. and M. Hemalatha, 2012. Anomaly detection and elimination algorithm for RFID data. Int. J. Comput. Applic., 49: 15-19.
- Krishnaveni, S. and M. Hemalatha, 2012. Query scheduling in distributed data warehouse using DTDS and VMFTRS algorithms. Eur. J. Scient. Res., 89: 612-625.
- Krishnaveni, S. and M. Hemalatha, 2012. Query processing in distributed data warehouse using scheduling algorithms. Int. J. Comput. Applic., 1: 7-10.
Direct Link | - Krishnaveni, S. and M. Hemalatha, 2012. Query processing in distributed data warehouse using proposed dynamic task dependency scheduling algorithm. Int. J. Comput. Applic., 55: 17-22.
Direct Link | - Krishnaveni, S. and M. Hemalatha, 2012. Performance analysis of particle swarm optimization algorithms for jobs scheduling in data warehouse. Int. J. Adv. Res. Comput. Sci., 3: 237-241.
Direct Link | - Hemalatha, M., 2012. Hybrid Models for High Dimensional Clustering and Pattern Discovery. LAP LAMBERT Academic Publishing, Germany.
- Gobinath, R. and M. Hemalatha, 2012. Improved preprocessing techniques for analyzing patterns in web personalization process. Int. J. Comput. Applic., 58: 13-20.
- Devi, R. and M. Hemalatha, 2012. A survey on online spam detection methods in social networking sites. J. Comput. Sci., 6: 333-341.
- Devasena, C.L. and M. Hemalatha, 2012. Video mining using LIM based clustering and self organizing maps. Proc. Eng., 2: 913-921.
CrossRef | Direct Link | - Devasena, C.L. and M. Hemalatha, 2012. Object detection in video using lorenz information measure and discrete wavelet transform. ACM Adv. Comput. Commun. Infor., 1: 200-207.
Direct Link | - Vasanthi, V., N.A. Singh and M. Hemalatha, 2011. A detailed study of mobility model in sensor network. Int. J. Theor. Applied Infor. Technol., 33: 7-14.
- Vasanthi, V. and M. Hemalatha, 2011. Empirical study on security attacks in wireless sensor network. Int. J. Adv. Res. Comput. Sci., 2: 23-28.
Direct Link | - Sumathi, T., P. Nagarajan and M. Hemalatha, 2011. An empirical study on image/video retrieval techniques grand challenges and trends. Int. J. Comput. Infor. Syst., 2: 20-26.
- Sumathi, T., C.L. Devasena, R. Revathi, S. Priya and M. Hemalatha, 2011. Automatic image annotation and retrieval using multi-instance muli-label learning. Bonfr. Int. J. Adv. Image Proces., 1: 1-5.
Direct Link | - Sumathi, T., C.L. Devasena and M. Hemalatha, 2011. An overview of automated image annotation approaches. Int. J. Res. Rev. Infor. Sci., 1: 1-6.
- Sumathi, T., A.E. Robert, B. Bharathi and M. Hemalatha, 2011. Image fusion algorithm based on wavelet transform and IDFC transform. Int. J. GJACT, 1: 184-190.
- Sumathi, T. and M. Hemalatha, 2011. Semantic web image search through manual annotation. Int. J. Comput. Applic., 17: 39-42.
Direct Link | - Sumathi, T. and M. Hemalatha, 2011. An innovative image fusion algorithm based on wavelet transform and improved discrete fast curvelet transform. Cent. Eur. J. Comput. Sci., 1: 329-340.
Direct Link | - Sumathi, T. and M. Hemalatha, 2011. A novel approach for automatic image annotation and retrieval. Karpagam J. Comput. Sci., 5: 313-318.
- Singh, N.A., V. Vasanthi, B. Bharathi and M. Hemalatha, 2011. 4G-Fourth generation wireless systems requirements and technical challenges. J. Theor. Applied Infor. Technol., 31: 29-35.
- Sasirekha, N., A.E. Robert and M. Hemalatha, 2011. Program slicing techniques and its applications. Int. J. Software Eng. Applic., 2: 50-64.
- Saranya, N.N., G. Padmapriya, S. Hemalatha and M. Hemalatha, 2011. An evaluation of K-means based ANN using forest fire data in spatial data mining. Int. J. Theor. Applied Infor. Technol., 34: 29-33.
- Saranya, N.N. and M. Hemalatha, 2011. Potential research into spatial cancer database by using data clustering technique. Int. J. Comput. Sci. Infor. Security, 9: 168-173.
Direct Link | - Saranya, N.N. and M. Hemalatha, 2011. Integrating spatial data mining technique to identify potential landsat data using K-means and BPNN algorithm. Int. J. Comput. Applic., 30: 16-21.
Direct Link | - Robert, A.E., G. Manivasagam, N. Sasirekha and M. Hemalatha, 2011. Reverse engineering for malicious code behavior analysis using virtual security patching. Int. J. Comput. Applic., 26: 41-45.
- Revathi, R., P. Revathi, T. Sumathi and M. Hemalatha, 2011. Overview of image processing techniques: A survey. Global J. Comput. Applic. Technol., 1: 512-520.
- Revathi, P., R. Revathi and M. Hemalatha, 2011. Knowledge discovery in diagnose of crop diseases using machine learning techniques. Int. J. Eng. Sci. Technol., 3: 7187-7190.
- Revathi, P., R. Revathi and M. Hemalatha, 2011. Comparative study of knowledge in crop disease using machine learning techniques. Int. J. Comput. Sci. Infor. Technol., 2: 2180-2182.
Direct Link | - Revathi, P. and M. Hemalatha, 2011. Efficient classification mining approach for agriculture. Int. J. Res. Rev. Infor. Sci., 1: 42-45.
- Revathi, P. and M. Hemalatha, 2011. Categorize the quality of cotton seed based on the different germination of the cotton using machine knowledge approach. Int. J. Adv. Sci. Technol., 36: 9-14.
- Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. Evaluating the yield of hybrid napier grass with data mining techniques. Int. J. Comput. Applic., 35: 1-7.
Direct Link | - Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. A comprehensive analysis and study in intrusion detection system using data mining techniques. Int. J. Comput. Applic., 35: 51-56.
Direct Link | - Megala, S., P. SoundarRajan and M. Hemalatha, 2011. An experimental study of pattern mining technique to improve the business strategy. Int. J. Comput. Applic., 34: 1-5.
Direct Link | - Megala, S. and M. Hemalatha, 2011. A novel data mining approach to determine the vanished agricultural land in Tamil Nadu. Int. J. Comput. Applic., 23: 23-28.
Direct Link | - Leema, A.A. and M. Hemalatha, 2011. Optimizing operational efficiency and enhancing data reliability using effective and adaptive cleaning approach for RFID in healthcare. Int. J. Comput. Applic., 3: 26-29.
- Leema, A.A. and M. Hemalatha, 2011. Automatic image annotation and retrieval using multi-instance multi-label learning. Bonfr. Int. J. Adv. Image Proces., 1: 1-5.
- Leema, A.A. and M. Hemalatha, 2011. An effective and adaptive data cleaning technique for colossal RFID dataset in healthcare. WSEAS Trans. Infor. Sci. Applic., 6: 243-252.
Direct Link | - Krishnaveni, S. and M. Hemalatha, 2011. A perspective analysis of traffic accident using data mining techniques. Int. J. Comput. Applic., 23: 40-48.
Direct Link | - Hemalatha, M. and S. Megala, 2011. Mining techniques in health care: A survey of immunization. J. Theor. Applied Infor. Technol., 25: 63-70.
Direct Link | - Hemalatha, M. and N.N. Saranya, 2011. A recent survey on knowledge discovery in spatial data mining. Int. J. Comput. Sci. Iss., 8: 473-479.
Direct Link | - Hemalatha, M. and A.A. Leema, 2011. Applying RFID technology to construct an elegant hospital environment. Int. J. Comput. Sci. Iss., 8: 444-448.
Direct Link | - Devasena, C.L., T. Sumathi and M. Hemalatha, 2011. Effectiveness evolutional of rule based classifiers for the classification of Iris dataset. Bonfr. Int. J. Man Mach. Interf., 1: 5-9.
- Devasena, C.L., T. Sumathi and M. Hemalatha, 2011. An experiential survey on image mining tools, techniques and applications. Int. J. Comput. Sci. Eng., 3: 1155-1167.
- Devasena, C.L., R.R. Krishnan and M. Hemalatha, 2011. An enhanced algorithm for mining color images: A novel approach. CIIT. Int. J. Data Mining Knowledge Eng., 3: 550-554.
- Devasena, C.L., R. Revathi and M. Hemalatha, 2011. Video surveillance system: A survey. Int. J. Comput. Sci. Iss., 8: 635-642.
Direct Link | - Devasena, C.L. and M. Hemalatha, 2011. Noise removal in magnetic resonance images using hybrid KSL filtering technique. Int. J. Comput. Applic., 27: 1-4.
- Devasena, C.L. and M. Hemalatha, 2011. A novel method to improve video compression for video surveillance applications using SPIHT algorithm. Int. J. Adv. Res. Comput. Sci., 2: 119-125.
Direct Link | - Devasena, C.L. and M. Hemalatha, 2011. A hybrid image mining technique using LIM based data mining algorithm. Int. J. Comput. Applic., 25: 1-5.
Direct Link | - Devasena, C.L. and M. Hemalatha, 2011. A comparative study of hybrid LIM based image matching techniques for mining image databases. Int. J. Knowledge Manage. e-Learn., 3: 61-65.
- Vasanthi, V., P. Nagarajan, B. Bharathi and M. Hemalatha, 2010. A perspective analysis of routing protocols in wireless sensor network. Int. J. Comput. Sci. Eng., 2: 2511-2518.
Direct Link | - Sumathi, T. and M. Hemalatha, 2010. An empirical study on performance evolution in automatic image annotation and retrieval. Int. J. Adv. Res. Comput. Sci., 1: 13-17.
- Leema, A.A., P. Sudhakar, R.S.D. Vahidabanu and M. Hemalatha, 2010. RFID data management and its applications in hospital environment. Int. J. Adv. Sci. Technol., 1: 53-108.
- Leema, A.A. and M. Hemalatha, 2010. A proposed system to solve the drawbacks of association rule mining in E-learning. J. Comput. Applic., 3: 13-19.
- Kumar, M.A., M. Hemalatha, P. Nagaraj and S. Karthikeyan, 2010. A new way towards security in TCP/IP protocol suite. Latest Trends Comput., 1: 46-50.
- Kumar, M.A., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative analysis of IPv4 and IPv6 to evaluate performance. Int. J. Comput. Network Security, 2: 27-31.
- Anandkumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. A large capacity steganography using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 video. Int. J. Comput. Network Security, 2: 67-70.
- Hemalatha, M., S. Karthikeyan and E. Ramaraj, 2009. A design of security protocol using hybrid encryption technique AES-Rijndael and RSA. Int. J. Comput. Internet Manage., 17: 78-86.
- Hemalatha, M., R. Jeyadev and V.K. Gopalakrishnan, 2009. Predicting HIV drug resistance using neural networks. IJCIB., 1: 69-74.
- Hemalatha, M. and K. Vivekanandan, 2008. A simple statistical model for probabilistic motif discovery in multiple aligned sequences. Eur. J. Scient. Res., 19: 608-613.
- Hemalatha, M. and K. Vivekanandan, 2008. A semaphore based multiprocessing k-mean algorithm for massive biological data. Asian J. Sci. Res., 1: 444-450.
CrossRef | Direct Link | - Hemalatha, M. and K. Vivekanandan, 2008. A distributed and parallel clustering algorithm for massive biological data. J. Convergence Infor. Technol., 3: 84-88.
Direct Link | - Hemalatha M. and K. Vivekanandan, 2008. Genetic algorithm based probabilistic motif discovery in unaligned biological sequences. J. Comput. Sci., 4: 625-630.
CrossRef | Direct Link | - Hemalatha, M., 2007. Medical informatics. Tamil Comput., 16: 1-7.
- Hemalatha, M. and K. Vivekanandan, 2007. Phylogenetic tree construction using simple SVD based distance metrics. Int. J. Comput. Sci. Syst. Anal., 1: 103-110.
- Hemalatha, M. and K. Vivekanandan, 2007. A scalable and high performance sorting algorithm to analyze massive biological data. Int. J. Syst. Anal. Design, 1: 37-45.
- Shanmugavel, D.P., M. Hemalatha and S. Karthikeyan, 2006. Microarray in Bioinformatics, Trends in Bioinformatics. Pointer Publishers, Jaipur, India pp: 212-250.
- Shanmugavel, D.P, M. Hemalatha and S. Karthikeyan, 2006. Mathematic Modeling in Molecular Modeling, Trends in Bioinformatics. Pointer Publishers, Jaipur, India.
- Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An improvement of Eun-jun-kyung-kee`s remote user authentication scheme in smart card using hybrid encryption. J. Comput. Sci., 1: 293-300.
- Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An analysis of key management in transport layer security standard. Punjab College Tech. Edu. J. Comput. Sci., 2: 5-9.
- Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A new approach of hybrid encryption technique in database security. Int. J. Technol. Knowledge Soc., 2: 55-60.
- Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An efficient algorithm for predicting survival of medical data. Int. J. Technol. Knowledge Soc., 2: 37-48.
Direct Link | - Hemalatha, M., S. Karthikeyan and V.V. Gomathi, 2006. Data mining knowledge discovery database. Tamil Comput., 1218: 4-8.
- Karthikeyan, S., M. Hemalatha and E. Ramaraj, 2005. Database search and retrieval system for bacteria. Bioinformatics India J., 3: 37-42.
- Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An improvement of security in the insecurity of 802.11 using hybrid encryption AES-Rijndael and RSA. Indian J. Infor. Sci. Technol., 1: 18-26.
- Hemalatha, M., 2005. A data mining tool to increase human life days from affecting cardiac arrest. Bioinfor. India, 3: 96-111.