Research Publications  


International Journals



1. Renuga Devi.R and M. Hemalatha, 2014. A novel approach for secure hidden community mining in social networks using data mining techniques, International journal of computer application, 87(7): 12-19(IF: 0.831)

2. V.Vinodhini and M. Hemalatha 2015 Improved Density based K clustering (E- DBK)algorithm for effectual investigation of crime data International Journal of Applied Engineering Research 10(7):16655 – 16664

3. Kavitha and M. Hemalatha 2015 Enhanced Support Vector Machine (SVM) algorithm. International Journal of Applied Engineering Research 10(7):16865 – 16872

4. Senthamilarasu and M. Hemalatha 2015 Ensemble Classifier for Concept Drift Data Stream Spinger Informatics and communication Technologies for societal 1(1):127-137

5. Renuga Devi.R and M. Hemalatha, 2014. Mining of network communities by spectral characterisation using KD-Tree, Research journal of applied, engineering and technology, 7(7): 1108-1115 (IF: 0.31)(Indexed in Scopus)

6. Anupama Prasanth and M. Hemalatha 2014 A Comparison on Intelligent Web InformationRetrieval Systems. Intl. J. Computer Science and Network 3(6):425-429 (IF 0.274)

7. Ajith Singh.N and M.Hemalatha, 2014. BASIP a virtual machine placement technique to reduce energy consumption in cloud data centre, Journal of Theoretical and Applied Information Technology, 59(2):426-435 (IF: 0.71)(Indexed in Scopus)

8. Ajith Singh.N and M.Hemalatha, 2014. Reservation Resource Technique for Virtual Machine Placement in Cloud Data Centre, Research Journal of Applied Sciences, Engineering and Technology, 7(14): 2954-2960 (IF: 0.31)(Indexed in Scopus)

9. Gowsalya. R, S. Veni and M. Hemalatha, 2014. Analysis of machine Learning Techniques by Using Blogger Data, International Journal of Engineering Research and Applications, 4(4):461:467.

10. G.V.Nadiammai and M.Hemalatha, 2014. Effective Approach towards Intrusion Detection System Using Data mining techniques, Egyptian Informatics Journal, 15(1):37-50(Indexed in Scopus)

11. N.Sasirekha and M.Hemalatha, 2014. A Hybrid Indexed Table and Quasigroup Encryption Approach for Code Security Against Various Software Threads, Journal of Theoretical and Applied Information Technology, 60(2):437-445 (IF: 0.71)(Indexed in Scopus)

12. N. Naga Saranya, M. Hemalatha, 2014. An Innovative idea to discover the trend on multi-dimensional Spatio-Temporal Datasets, International Journal of Research in Engineering and Technology, 3(3): 243-249.

13. P.Revathi and M.Hemalatha, 2014. Classification of Cotton Diseases using Cross Information Gain-Minimal Resourse Allocation Network Classifier with Particle swarm Optimization, Journal of Theoretical and Applied Information Technology, 60(1):184-188(IF: 0.71)(Indexed in Scopus)

14. P.Revathi and M.Hemalatha, 2014.Cotton Disease Identification using Proposed CIG-DFNN Classifier, Asian Journal of Scientific Research, 7(2):225-231.

15. P. Nandhakumar, M. Hemalatha, 2014. Effective Semantic Web Information Retrieval Using Fuzzy Based Ontology, International Journal of Innovative Technology and Exploring Engineering,3(11):33-36.

16. P. Revathi, M. Hemalatha, 2014. Cotton Leaf Spot Diseases Detection Utilizing Feature Selection with Skew Divergence Method, International Journal of Scientific Engineering and Technology, 3(1)22-30.

17. R.Gopinath and M.Hemalatha,2014.Negative Association Rules for Web Usage Mining using Negative Selection Algorithm, World Applied Science Journal,31(12):2015-2023.

18. R.Gobinath and M. Hemalatha, 2014. An Heighten PSO-K-harmonic Mean Based Pattern Recognition in User Navigation,Research Journal of Applied Sciences, Engineering and Technology,7(7):1283-1287.IF: 0.31)(Indexed in Scopus)

19. R. Gobinath, M. Hemalatha, 2014. Visualizing the Navigational Patterns from Web Log Files using Web Mining Applications, International Journal of Scientific & Engineering Research,5(5):538-544.

20. S.Krishnaveni and M.Hemalatha, 2014.Evaluation of DFTDS Algorithm for distributed data warehouse, Egyptian Informatics Journal,15(1):51-58. (Indexed in Scopus)

21. K. Sathesh Kumar and M. Hemalatha, 2014. An Efficient Integrated Approach for Information Retrieval Using Fuzzy Artificial Bee Colony Optimization Based On Cloud Computing, Middle-East Journal of Scientific Research, 21 (2): 376-384.201( Indexed in Scopus)

22. G. Anitha and M. Hemalatha,2014. Intrusion prevention and Message Authentication Protocol (IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks, International Journal of Engineering and Technology, 6(2):663-672. (Indexed in Scopus)

23. Senthamilarasu .S and M.Hemalatha,2014. Classification of Pattern Using Intuitionistic Fuzzy Temporal Association Rule Mining for Data Stream, International Journal of Control Theory and Applications, 7(1):11-18. (Indexed in Scopus)

24. S.Hemalatha and M.Hemlatha, 2014.Certain Investigation on Missing Value Imputation Techniques, International Journal of Computer Technology and Applications, 5(2):323-329. (IF: 2.015)

25. Padmapriya.G and M.Hemalatha, 2014. A Recent Survey on Unstructured Data to Structured Data in Distributed Data Mining, International Journal of Computer Technology and Applications, 5(2):338-344.(IF:2.015)

26. Vinodhini.V and M.Hemalatha, 2014.An Intend Method for Tracking and Detecting Crime using Clustering Techniques, International Journal of Engineering and Management Research.4(5):27-30.

27. Sasirekha.N and Hemalatha, 2014.Quantum Cryptography using Quantum Key Distribution and its Applications, International Journal of Engineering and Advanced Technology, 3(4):289-294. (IF:3.2)

28. Nandhakumar.P and M.Hemalatha, 2014. An Exhaustive survey on Various Semantic web Procedures and Techniques, International Journal of Control Theory and Applications, 7(1):1-9. (Indexed in Scopus)

29. A.Edwin Robert and M.Hemalatha, 2014. Epidemic Dynamics of Malicious code Detection Architecture in Critical Environment, Indian Journal of Science and Technology, 7(6):770-775. (Indexed in Scopus)

30. A.Edwin Robert and M.Hemalatha, 2014.Identification of Heterogeneous Malicious Nodes in the Crucial Dynamic Environment for protecting local and remote systems, International Journal of Advanced Computational Engineering and Networking, 2(2).

31. A.Edwin Robert and M.Hemalatha, 2014.Epidemic Dynamic of Malicious code detection Architecture in Critical Environment, Indian Journal of Science and Technology.7(6).

32. K.Sathesh Kumar and M.Hemalatha, 2014. An Optimized interface of Pattern Recognition Using Fuzzy Ant Based Clustering Algorithm. International Review on Computers and Software.

33. K.Sathesh Kumar and M.Hemalatha, 2014.An Hybird Optimization algorithm for Fuzzy Association Rule Mining, IEEE Proceedings of Computer Communication and Informatics,1(1):1-6. IEEE Xplore (Indexed in Scopus)

34. Padmapriya.G and M.Hemalatha , 2014. Extraction of Unstructured Data records and discovering new Attributes from the web documents, International Journal of Computer trends and Technology(IJCTT),(IF:0.569)

35. Padmapriya.G and M.Hemalatha , 2014.Distributed protocol for privacy preserving by applying proposed k-anonymizing approach on distributed datasets, Karpagam Journal of Computer Science.

36. Padmapriya.G and M.Hemalatha, 2014.A Novel Privacy Preservation using Double Hash based K-Anonymity Techniques, International Journal of Applied Engineering Research. (Indexed in Scopus).

37. Padmapriya.G and M.Hemalatha, 2014.Distributed Privacy preserving and Handling Privacy information Leakage by using K-anonymity Algorithm, International Journal for Research in Applied Science and Engineering Technology(IJRASET) (IF:1.214)

38. S.Hemaltha and M.Hemalatha, 2014.An Estimation of Missing Values by Modified Mixed Kernels, IIE INT’L Conference Proceedings of Computer Science and Information Systems,1(1):10-15 (Indexed in Scopus)

39. S.Hemaltha and M.Hemalatha, 2014.Predicition of Missing Values in Datasets using Association Rule Mining, International Journal of Applied Engineering Research.9(23):19789-19800 (Indexed in Scopus)

40. S.Hemaltha and M.Hemalatha, 2014.Computational Techniques to Recover Missing Data from Gene Expression Data, International Journal for Research in Applied Science and Engineering Technology, 2(12):132-139(IF:1.214)

41. Lakshmi Devasena.C and M.Hemalatha, 2014. Automatic Classification of Audio Data using Gradient Descent Neural Network based Algrithm, Journal of Theoretical and Applied Information Technology, 70(2):375-389. (IF:1.71) (Indexed in Scopus)

42. Nandha Kumar.P and M.Hemalatha, 2014.Domain Oriented Ontology Based Semantic Web Search Methodology using Sparql Query, Internation Journal Computer and Technology.12(9):3875-3885.

43. Sindhu.V, S.A.Sathya prabha, S.Veni and M.Hemalatha, 2014.Thoracic Surgery Analysis using Data Mining Techniques, International Journal of Computer Technology and Applications.5(2),578-586.

44. Krishnaveni, S. and M. Hemalatha, 2013.Query Management in Data Warehouse using Virtual Machine fault tolerant resource Scheduling Algorithm. Int. J. Theoretical and Applied Information Technology, 47(3):1251-1257. [IF:1.71](Indexed in Scopus)

45. Renuga devi.R and M. Hemalatha, 2013.A Perspective Analysis of hidden Community Mining Methods in Large Scale Social Networks, International Journal of Computer Application.75(3):7-12.(IF:0.835)

46. Ajith Singh.N and M.Hemalatha, 2013.An Analysis of Load Balancing in a cloud Computing Environment,European Journal of Scientific Research.101(4):590-598(IF:0.736) (Indexed in Scopus)

47. Ajith Singh.N and M.Hemalatha, 2013. A Honey Bee Foraging Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Computing Environment, IEEE Proceedings of Research and Development Prospects on Engineering and Technology.5(1):52-57.(IEEE Xplore)

48. Ajith Singh.N and M.Hemalatha, 2013. Virtual Machine Placement by Using Honey Bee Forager Algorithm in Cloud Computing, Karpagam Journal of Computer Science. 7(4):210-216.

49. Ajith Singh.N and M.Hemalatha, 2013. Cluster Based Bee Algorithm for Virtual Machine Placement in Cloud Data Centre, Journal of Theoretical and Applied Information Technology,57(3):1-10 (IF:1.71) (Indexed in Scopus)

50. Ajith Singh.N and M.Hemalatha, 2013. Reduce Energy Consumption through Virtual Machine Placement in Cloud Data Centre, Springer Lecturer notes in Artificial Intelligence,1[1]:466-474. (Indexed in Scopus)

51. Ajith Singh.N and M.Hemalatha, 2013. Energy Efficient Virtual Machine Placement Technique using Banker Algorithm in Cloud Data Centre, IEEE Proceedings of Advanced Computing & Communication Systems,1(1)1-6(Indexed in Scopus)

52. Nadiammai.G.V. and M.Hemalatha,2013. Performance Analysis of Tree based Classification algorithm for Intrusion Detection System, Springer Lecturer notes in Artificial Intelligence,1(1):82-89(Indexed in Scopus)

53. Nadiammai.G.V. and M.Hemalatha,2013. Handling Intrusion Detection System using Snort Based Statistical Algorithm and Semi-supervised Approach, Research Journal of Applied Sciences, Engineering and Technology,6(16):2914-2922(IF:0.036) (Indexed in Scopus)

54. Nadiammai.G.V. and M.Hemalatha,2013. An Enhanced Rule Approach for Network Intrusion Detection using Efficient Data Adapted Decision Tree Algorithm, International Journal of Theoretical and Applied Information Technology,47(2):426-433(IF:1.71) (Indexed in Scopus)

55. Krishnaveni.S and M.Hemalatha, 2013. A Dependency-based Query Scheduling in Distributed Data Warehouse Environment, Springer Lecturer notes in Artificial Intelligence.1(1):499-505 (Indexed in Scopus)

56. Renuga devi.R and M.Hemalataha, 2013. A Novel Algorithm for Automatically Detecting Number of Clusters for Mining Communities in Heterogeneous Social Networks. Engineering, International Journal of Innovative Technology and Exploring. 3(6):43-47.

57. Renuga devi.R and M.Hemalataha, 2013. Sybil Identification in Social Networks Using SICT and SICTF Algorithms with ImprovedKD-Tree, Journal of Theoretical and Applied Information Technology,56(3):443-451(IF:1.71) (Indexed in Scopus)

58. Renuga devi.R and M.Hemalataha, 2013. An Improved KD-Tree Algorithm Based Community Mining in Social Networks, European Journal of Scientific Research,110(1):58-69(IF:0.736) (Indexed in Scopus)

59. Renuga devi.R and M.Hemalataha, 2013. A Perspective Analysis of hidden Community Mining Methods in Large Scale Social Networks, International Journal of Computer Applications.75(3)(IF:0.835)

60. Renuga devi.R and M.Hemalataha, 2013. A Study on different Hidden Community detection methods in the social area networks, Proceedings of Recent Trends in Information Technology,1(1):43-46.

61. Renuga devi.R and M.Hemalataha, 2013. Sybil identification Algorithm using connectivity threshold for Secured Community Mining in Social network, IEEE Proceedings of Computational Intelligence and Computing Research,1(1):158-161, (Indexed in Scopus)

62. Renuga devi.R and M.Hemalataha, 2013. Mining Hidden Communities in Social Networks Using KD-Tree and Improved KD-Tree, IEEE Proceedings of Computing, Communications and Networking Technologies, 4(1):1-7.

63. Renuga devi.R and M.Hemalataha, 2013. Automatic K-Community Mining in Heterogeneous Network Using Convergence Aware Dirichlet Process Mixture Model, International Journal of Engineering Research and Technology,2(11):1976-1984,(IF:1072)

64. Revathi.P and M.Hemalatha, 2013. Identification of Cotton Diseases Based on Cross Information Gain_Deep Forward Neural Network Classifier with PSO Feature Selection, International Journal of Engineering and Technology,5(6):4637-4642. (Indexed in Scopus)

65. Revathi.P and M.Hemalatha, 2013. An Improve Cotton Leaf Spot Disease Detection using Proposed Classifiers, International Journal of Engineering Research and Technology,2(12):2144-2147.(IF:1.72).

66. Revathi.P and M.Hemalatha, 2013. Cotton Leaf Spot Diseases Detection Utilizing Feature Selection with Skew Divergence Method, International Journal of scientific Engineering and Technology,3(1):22-30.

67. Sentamilarasu.S and M.Hemalatha, 2013. A Genetic algorithm based Intuitionistic fuzzification technique for Attribute selection, Indian Journal of Science and Technology,6(4):4336-4346. (Indexed in Scopus)

68. Sentamilarasu.S and M.Hemalatha, 2013. Ensemble of Intuitionistic Fuzzy Classifier, IEEE Proceedings of Computational Intelligence and Computing Research,4(6):450-458. (Indexed in Scopus)

69. Sentamilarasu.S and M.Hemalatha, 2013. Dynamically Adaptive Count Bloom Filter for Handling Duplicates in Data Stream, International Journal of Engineering and Technology,4(6):450-458. (Indexed in Scopus)

70. Sathesh kumar.K and M.Hemalatha, 2013. Optimal Feature Subset Reduction Using SVM Classifier, IEEE Proceedings of Research and Development Prospects on Engineering and Technology,4(2):109-114. (Indexed in Scopus)

71. Gobinath.R and M.Hemalatha, 2013. Optimized Feature Extraction for Identifying user Behavior in Web Mining, European Journal of Scientific Research, 105(3): 319-32,(IF:0.736) (Indexed in Scopus)

72. Gobinath.R and M.Hemalatha, 2013. An optimized K-Harmonic Mean based Clustering user navigation Patterns, IEEE Proceedings of Computational Intelligence and Computing Research,1(1). (Indexed in Scopus)

73. Gobinath.R and M.Hemalatha, 2013. Preprocessing for Web personalization using Web Usage Mining, IEEE Proceedings of Research and Development Prospects on Engineering and Technology,5(1):52-57. (Indexed in Scopus)

74. sasirekha.N and M.Hemalatha, 2013. Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software, International Review on Computers and Software, 8(8): 1980-1990.(IF:6.24) (Indexed in Scopus)

75. sasirekha.N and M.Hemalatha,2013.Quasigroup Encryption Based Cryptographic Scheme for Software Protection, International Journal of Advances in Engineering and Emerging Technology, 3(1): 346-357.(IF: 0.078)

76. sasirekha.N and M.Hemalatha, 2013. A Novel Secured Code apporoach Using Latin Square Crypto System against Reverse Engineering, Journal of Computer Science (Karpagam),7(5):260-270.

77. Anny Leema and M.Hemalatha, 2013. A novel Integrated Approach for Handling Anomalies in RFID Data, International Journal of UbiComp,4(2):135-145,(IF:0.031) (Indexed in Scopus)

78. Anny Leema and M.Hemalatha, 2013. Proposed Prediction and cleaning algorithms based on hybrid approach to deal with anomalies of RFID data in Healthcare, Elsevier Egyptian Informatics Journal,14(2):135-145.(IF:0.031) (Indexed in Scopus)

79. Anny Leema and M.Hemalatha, 2013. Hybrid Approach for duplication detection and elimination. Springer, Lecture Notes in Electrical Engineering,131(1):737-750.(IF:0.114) (Indexed in Scopus)

80. Edwin Robert.A and M.Hemalatha, 2013. Dynamic Virtual Monitoring System for Detecting Malicious Nodes in an Intruder Domain, International Journal of Recent Scientific Research,4(12):2062-2066.

81. Juliana Gnanaselvi and M.Hemalatha, 2013. An Efficient Swarm Intelligence Optimization Based Passive Continuous Authentication System, International Journal of Advances in Engineering and Emerging Technology,2(1):220-234.(IF:0.078).

82. Gobinath.R and M.Hemalatha, 2013. An optimized K-Harmonic Mean based Clustering user navigation Patterns, IEEE Proceedings of Computational Intelligence and Computing Research,1(1). (Indexed in Scopus)

83. Gobinath.R and M.Hemalatha, 2013. Preprocessing for Web personalization using Web Usage Mining, IEEE Proceedings of Research and Development Prospects on Engineering and Technology,5(1):52-57. (Indexed in Scopus)

84. Revathi.R and M.Hemalatha, 2013. Object Tracking and Detection in Videos using Block Matching with Intuitionistic Fuzzy Logic (BMIFL) Algorithm, Research Journal of Applied Sciences, Engineering and Technology, 6(19): 3568-3576,(IF:0.030) (Indexed in Scopus)

85. Revathi.R and M.Hemalatha, 2013. A Novel Approach for Object Tracking and Detection using IFL Algorithm, International Journal of Computer Science and Information Security,11(4):102-109.

86. Sumathi.T and M. Hemalatha, 2013. A Novel approach of Automatic image annotation for satellite images, Karpagam Journal of Computer Science.07(04):203-209.

87. Sumathi .S and M. Hemalatha, 2013.Performance Analysis of Routing Protocols in Mobile Adhoc Network, Karpagam Journal Of Computer Science, 7(2):95-103.

88. Sumathi, T. and M. Hemalatha, 2013. High Performance EMID Framework for Automatic Image Annotation and Retrieval. International Journal of Imaging & Robotics.11(2):24-36. (Indexed in Scopus)

89. Sumathi.T and M. Hemalatha, 2013. Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing, Karpagam Journal Of Computer Science,07(02):67-75.

90. Sumathi, T. and M. Hemalatha, 2013. An Enhanced Approach for Solving Class Imbalance Problem in Automatic Image Annotation. I.J. Image, Graphics and Signal Processing, 5(2): 9-16.(IF:0.11) (Indexed in Scopus)

91. Edwin Robert. A and M. Hemalatha, 2013 Behavioral and Performance Analysis Model for Malware Detection Techniques. Int.J. Computer Engineering and Technology (IJCET). 4(1): 141-151.[IF:3.958]

92. Edwin Robert. A and M. Hemalatha, 2013 Effiicient Malware detection and tracer for an operating systems .Int.J. Research Journal of Science, Engineering and Technology. 6[11]:2052-2060.[IF:0.036] (Indexed in Scopus)

93. Vasanthi, V. and M. Hemalatha, 2013. Simulation of Obstruction Avoidance Generously mobility (OAGM) Model using Graph Theory Technique. Int. J.Research Journal of Applied Science, Engineering and Technology,5[7]:2799-2808. (Indexed in Scopus)

94. Anny Leema and M.Hemalatha, 2012. Proposed Prediction and cleaning algorithms based on hybrid approach to deal with anomalies of RFID data in Healthcare. Elsevier Egyptian Informatics Journal. (Accepted) (Indexed in Scopus)

95. Renuga Devi and M.Hemalatha 2012 A Survey on Online Spam detection Methods in Social Networking sites, J. of Computer Science. 6(6):333-341

96. Naga Saranya, N. and M.Hemalatha, 2012. IESO Algorithm for Rule Generation and GPLDE algorithm for Trend Discovery in Spatio-temporal Data.. European J. of Scientific Research. 92(4):548-564 (Indexed in Scopus)

97. S.Senthamilarasu and M.Hemalatha, 2012.Dynamically adaptive count bloom filter for handling duplicates in Data Stream, Int. J. Engineering and Technology, 4(6): 450-458. (Indexed in Scopus)

98. S.Senthamilarasu and M.Hemalatha, 2012. Load Shedding Techniques based on windows in Data Stream Systems. Proceeding IEEE Emerging Trends in Science, Engineering and Technology, pp68-73

99. Anny Leema, A. and M. Hemalatha, 2012. CBADE - Hybrid Approach for Duplication detection and Elimination. Computer Networks & Communications (NetCom), Lecture Notes in Electrical Engineering (LNEE)., 131. Springer. (Indexed in Scopus)

100. Lakshmi Devasena, C. and M. Hemalatha, 2012. Object Detection in Video using Lorenz Information Measure and Discrete Wavelet Transform. ACM. Advances in Computing, Communications and Informatics, 1(1): 200-207. (Indexed in Scopus)

101. Sumathi, T. and M. Hemalatha, 2012. A Novel JSVM Approach for Automatic Image Annotation and Retrieval. Int. J. Computer Applications, 52(10): 10-14. (IF 0.817)

102. Revathi, R. and M. Hemalatha, 2012. An Emerging Trend of Feature Extraction Method in Video Processing. Computer Science and Information Technology, 5(1): 69-80.

103. Revathi, R. and M. Hemalatha, 2012. Empirical Analysis of Denoising Techniques in Video Processing. J. Computer Science, 6(4): 225-236.

104. Revathi, R and M. Hemalatha, 2012. Certain Approach of Object Tracking using Optical Flow Techniques. Int. J. Computer Applications, 53(8): 50-57.(IF 0.835)

105. Sumathi, T. and M. Hemalatha, 2012. Towards Improving Automatic Image Annotation using Improvised Fractal SMOTE Approach. ACM. Advances in Computing, Communications and Informatics, 1(1): 704-710.( (Indexed in Scopus))

106. Revathi, R. and M. Hemalatha, 2012. A New Approach for Noise Removal and Video Object Segmentation using Color Based Fuzzy C-Means Technique. Springer Proc. Advances in Computing and Information Technology (ASIC), 178(1): 463-472. (Springer) (Indexed in Scopus)

107. Revathi, R and M.Hemalatha, 2012. Efficient Method for Noise Removal Techniques and Video Object Segmentation using Color Based Fuzzy C-Means. ACM. Advances in Computing, Communications and Informatics, 1(1): 1175-1181. (Indexed in Scopus)

108. Revathi, R and M.Hemalatha, 2012. Efficient Method for Feature Extraction on Video Processing. ACM. Computational Science, Engineering and Information Technology 1(1): 533-537. (ACM,Scopus)

109. Revathi, R and M.Hemalatha, 2012.Detecting Object in Video frames using optical flow Technique. Proceeding IEEE Emerging Trends in Science, Engineering and Technology 1(1):

110. Revathi, P and M.Hemalatha, 2012.Classifications of Cotton Leaf Spot Disease using image processing Edge Detection Technique. Proceeding IEEE Emerging Trends in Science, Engineering and Technology 1(1):

111. Revathi, P and M.Hemalatha, 2012.Advanced Computing Enrichment Evaluation of cotton Leaf Spot Disease Detection using Image Pattern. Proceeding IEEE Emerging Trends in Science, Engineering and Technology 1(1):

112. Revathi, P and M.Hemalatha, 2012. SMS based HPCCD algorithm for the identification of Leaf Spot Disease. Proceeding Springer Lecture Notes in Electrical Engineerig 221(1):

113. Ajith Singh, N and M. Hemalatha, 2012. An Approach on Semi-Distributed Load Balancing Algorithm for Cloud Computing System, Int. J. Computer Applications, 56(12): 1-4. (IF 0.8(IF 0.835))

114. Gobinath.R and M.Hemalatha, 2012. Improved Preprocessing Techniques for Analyzing Patterns in Web Personalization Process, Int. J. Computer Applications,58(3):13-20.

115. Krishnaveni, S and M. Hemalatha, 2012. Query Processing in Distributed Data Warehouse using Scheduling Algorithms, Special issue Int. J. Computer Applications, 1:07-10 (IF 0.817)

116. Vasanthi.V and Hemalatha.M, 2012. Simulation and Evaluation of Different Mobility Models in Ad-hoc Sensor Network over DSR Protocol using Bonnmotion tool.Springer Proc. Int. Conf. Recent Trends in Computer Networks and Distributed Systems Security CCIS (335); pp 157-167.

117. Vasanthi, V. and M. Hemalatha, 2012. A Proportional Analysis of Dissimilar Mobility Models in Ad-Hoc Sensor Network over DSR Protocol. Int. J. Computer Applications, 42(15): 26-32. (IF 0.835)

118. Vasanthi, V. and M. Hemalatha, 2012.Mobility scenario of dissimilar mobility models using DSR protocol in Adhoc Sensor Network- A survey. (Special Issue)Int. J. Computer Applications, 4(1): 1-14 (IF 0.817)

119. Ajith Singh, N. and M. Hemalatha, 2012. Comparative Analysis of Low-Latency on different Bandwidth and Geographical Locations While using Cloud Based Applications. Int. J. Advances in Engineering and Technology, 2(1): 393-400.

120. Krishnaveni, S and M. Hemalatha, 2012. Query Scheduling in Distributed Data Warehouse using DTDS and VMFTRS Algorithms, European J. Scientific Research, 89(4): 612-625. (Scopus indexed)

121. Krishnaveni, S and M. Hemalatha, 2012. Query Processing in Distributed Data Warehouse using Proposed Dynamic Task Dependency Scheduling Algorithm, Int. J. Computer Applications, 55(8): 16-22. (IF 0.835)

122. Nandhakumar, P, M. Hemalatha and Kashyap Dhruve, 2012. Adorning Web Search based on Ontology Semantics Spaces Provisioned through Web Services, Int. J. Computer Applications, 55(7): 53-60. (IF 0.835)

123. Senthamilarasu, S and M. Hemalatha, 2012. Load Shedding using Window Aggregation Queries on Data Streams, Int. J. Computer Applications, 54 (9): 42-49. (IF 0.835)

124. Satheshkumar, K and M. Hemalatha, 2012. An Enhanced Approach for Treating Missing Value using Boosted K-NN, Int. J. Computer Applications, 54(9): 35-41. (IF 0.835)

125. S.Senthamilarasu and M.Hemalatha, 2012. Load Shedding For Window Aggregation Queries over Sensor Streams Management, J. Computer Science, 6(5): 252-261.

126. Nadiammai, G.V and M. Hemalatha, 2012. Rule Based Classification Approach towards Detection of Network Intrusions, J. Computer Science, 6(5): 283-290.

127. Nadiammai, G.V and M. Hemalatha, 2012. An Enhanced rule approach for Network Intrusion Detection using Efficient Data Adapted Decision Tree Algorithm J. Theoratical and Applied Information Technology, 47(2): 426-433.[IF:1.71] (Scopus Indexed)

128. Nadiammai, G.V and M. Hemalatha, 2012. Anomaly based Hybrid Intrusion detection System for Identifying Network Traffic. Intl. J. Computer Science and Information Security, 10(10): 30-35.

129. Naga Saranya, N. and M. Hemalatha, 2012. Estimation of Evolutionary Optimization Algorithm for Association Rule using Spatial Data Mining. Int. J. Computer Applications, 51(3): 1-5. (IF 0.835) 130. Nadiammai, G.V. and M. Hemalatha, 2012. An Evaluation of Clustering Technique over Intrusion Detection System. ACM. Advances in Computing, Communications and Informatics, 1(1): 1054-1059. (Scopus)

131. Nadiammai, G.V. and M. Hemalatha, 2012.Perspective Analysis of Machine Learning Algorithm for Detecting Network Intrusions. Proceeding IEEE computing Communication and Networking Technologies , 1(1): 1-7. (Scopus)

132. Anny Leema, A. and M. Hemalatha, 2012. Anomaly Detection and Elimination Algorithm for RFID Data, Int. J. Computer Applications, 49(3): 15-19. (IF 0.835)

133. Sasirekha, N. and M. Hemalatha, 2012. An Improved Secure Code Encryption Approach Based on Indexed Table. ACM. Advances in Computing, Communications and Informatics, 1(1): 1136-1142. (Scopus)

134. Sasirekha, N. and M. Hemalatha, 2012. A survey on Software Protection Techniques Against Various Attacks. Global Journal of Computer Science and Technology, 12(1): 53-58.

135. Sasirekha, N. and M. Hemalatha, 2012. An Enhanced Code Encryption Approach with HNT Transformations for Software Security. International Journal of Computer Applications, 53(10): 17-23. (IF 0.817)

136. Sasirekha, N. and M. Hemalatha, 2012. An Efficient Secure Code Approach Based on Indexed Table Quasi Group Encryption with Hadamard and Number Theoretic Transformation for Software Protection. CCSEIT-12, ACM, 1: 444-451.

137. Sasirekha, N. and M. Hemalatha, 2012. A Thorough Investigation on Software Protection Techniques against Various Attacks. Bonfring International Journal of Software Engineering and Soft Computing, 2(3): 10-15.

138. Krishnaveni, S. and M. Hemalatha, 2012. Performance Analysis of Particle Swarm Optimization Algorithms for Jobs Scheduling in Data Warehouse. Int. J. Advanced Research in Computer Science, 3(2): 237-241.

139. Revathi, P. and M. Hemalatha, 2012. Computing Performance Evaluation of Cotton Leaves Spot Diseases Recognition using Image Segmentation. Int. J. Advanced Research in Computer Science, 3(3): 401-404.

140. Revathi, P. and M. Hemalatha, 2012. Homogenous segmentation based Edge Detection Techniques for Proficient Identification of the Cotton Leaf Spot Diseases. Int. J. Computer Applications, 47(2): 18-21(IF 0.835)

141. Naga Saranya, N. and M. Hemalatha, 2012. Integration of machine learning algorithm using spatial semi supervised classification in FWI data. IEEE Proc. Advance in Engineering, Science and Management, 1(1): 699-702.(IEEE Xplore)

142. Lakshmi Devasena, C. and M. Hemalatha, 2012. Automatic Text Categorization and Summarization using Rule Reduction. IEEE Proc. Advance in Engineering, Science and Management (ICAESM-2012), 1(1): 594-598. (IEEE Xplore)

143. Gobinath.R and M.Hemalatha, 2012. Improved Preprocessing Techniques for Analyzing Patterns in Web Personalization Process. Int. J. Computer Applications, 58(3): 13-20. (IF 0.817)

144. Ajith Singh.N, Vasanthi.V and M. Hemalatha, 2012, A Brief Survey onArchitecture, Challenges & Security Benefit in Cloud Computing” Int. J. Information and Communication Technology Research, 2(2): 102-111.

145. Ajith Singh.N and M. Hemalatha, 2012, Cloud Computing for Academic Environment” International Journal of Information and Communication Technology Research, 2(2) 97-101.

146. Sumadhi, T. and M. Hemalatha, 2012. A Novel approach for Automatic image annotation using Enhanced Multi-Instance Differentiation Framework. Procedia Engineering, 38(1): 2694-2701. (Scopus Indexed)

147. Sumathi, T. and M. Hemalatha, 2012. An Innovative Hybrid Hierarchical Modelfor Automatic Image Annotation. Springer LNCS, Communication in Computer & Information Science, 2(270): 718-726. (Impact Factor: 1.2)

148. Sumathi, T. and M. Hemalatha, 2012. A Combined Hierarchical Model for Automatic Image Annotation and Retrieval. IEEE Proc. Advance Computing, 1(1): 135-139. (Impact Factor: 1.2).

149. Krishnaveni, S and M. Hemalatha, 2012. Analysis of Scheduling algorithms in Data Warehouse for query processing, IEEE Proc. Int. Conf. Emerging trends in science , engineering and technology, 1(1): 109-114.

150. S.Priya, T.Sumathi, R.Revathi, M. Hemalatha,2012. “Image Based face recognition algorithm-A Survey. In Proc. Of Int. Conf. on mathematical modeling and applied soft computing.2(1):872-879.

151. Sumathi, T. and M. Hemalatha, 2011. An Innovative Hybrid Hierarchical Model for Automatic Image Annotation. Springer LNCS, Communication in Computer and Information Science, 2(270): 718-726

152. Sasirekha.N and M.Hemalatha, 2011. A study on software Security using code of obfuscation techniques and its evaluation metrics, Proc. Recent Trends and Applications of computing Technologies, 97-102.

153. Anny Leema, A. and M. Hemalatha, 2011. An Effective and Adaptive Data Cleaning Technique for Colossal RFID Dataset in Healthcare. WSEAS Transactions on Information Science and Applications, 6(8): 243-252. (Impact Factor: 0.546)

154. Anny Leema, A. and M. Hemalatha, 2011. Automatic Image Annotation and Retrieval using Multi-instance Multi-label Learning. Bonfring Int. J. Advances in Image Processing, 1(1): 1-5.

155. Lakshmi Devasena, C. and M. Hemalatha, 2011. Video Mining using LIM Based Clustering and Self Organising Maps. Procedia Engineering, 2(1): 940-948. (Scopus Indexed)

156. Lakshmi Devasena, C., T. Sumathi and M. Hemalatha, 2011. Effectiveness Evolutional of Rule Based Classifiers for the Classification of Iris Dataset. Bonfring Int. J. Man Machine Interface, 1(1): 5-9.

157. Lakshmi Devasena, C. and M. Hemalatha, 2011. Object Detection in Video using Clustering and Classification Techniques. Proc. Recent Advancements in Computing Technology, 1(1): 326-330.

158. Naga Saranya, N., G. Padmapriya, S. Hemalatha and M. Hemalatha, 2011. An Evaluation of K-means based ANN using Forest Fire Data in Spatial Data Mining. Int. J. Theoretical and Applied Information Technology, 34(1): 29-33. (Impact Factor: 1.71 Scopus Indexed)

159. Naga Saranya, N. and M. Hemalatha, 2011. Integrating Spatial Data Mining Technique to Identify Potential Landsat Data using K-Means and BPNN Algorithm. Int. J. Computer Applications, 30(9): 16-21. (Impact Factor: 0.835)

160. Revathi, P. and M. Hemalatha, 2011. Categorize the Quality of Cotton Seed Based on the Different Germination of the Cotton using Machine Knowledge Approach. Int. J. Advanced Science and Technology, 36(1); 9-14. (Impact Factor: 1.5)

161. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques. Int. J. Computer Applications, 35(8): 51-56. (Impact Factor: 0.835)

162. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. Evaluating the Yield of Hybrid Napier Grass with Data Mining Techniques. Int. J. Computer Applications, 35(5): 1-7. (Impact Factor: 0.835)

163. Revathi, R., P. Revathi, T. Sumathi and M. Hemalatha, 2011. Overview of Image Processing Techniques - A Survey. Global J. Computer Applications and Technology, 1(4): 512-520.

164. Megala, S, P. SoundarRajan and M. Hemalatha, 2011. An Experimental Study of Pattern Mining Technique to Improve the Business Strategy. Int. J. Computer Applications, 34(3): 1-5. (Impact Factor: 0.835)

165. Naga Saranya, N., S. Megala, P. Revathi, G.V. Nadiammai, S. Krishnaveni and M. Hemalatha, 2011. An Efficient PANN algorithm for Effective Spatial Data Mining. Springer LNCS, Communication in Computer and Information Science, 250(1): 533-537. (Scopus Indexed)

166. Vasanthi, V., N. Ajith Singh and M. Hemalatha, 2011. Evaluation of Protocols and Algorithms to Improve the Performance of Tcp/Ip over Wireless/Wired networks. Springer LNCS, Communication in Computer and Information Science, 250(1): 521-525. (Scopus Indexed)

167. Vasanthi, V., N. Ajith Singh and M. Hemalatha, 2011. A Detailed Study of Mobility Model in Sensor Network. Int. J. Theoretical and Applied Information Technology, 33(1): 7-14. (Impact Factor: 1.71 Scopus Indexed)

168. Lakshmi Devasena, C. and M. Hemalatha, 2011. Hybrid Image Classification Technique to Detect Abnormal Parts in MRI Images. Springer LNCS, Communication in Computer and Information Science, 250(1): 200-208. (Scopus Indexed)

169. Revathi, P., R. Revathi and M. Hemalatha, 2011.Knowledge Discovery in Diagnose of Crop Diseases using Machine Learning Techniques. Int. J. Engineering Science and Technology, 3(9): 7187-7190. (Impact Factor 3.157)

170. Sumathi, T. and M. Hemalatha, 2011. A Novel Approach for Automatic Image Annotation and Retrieval. Karpagam J. Computer Science, 5(5): 313-318.

171. Ajith Singh, N., V. Vasanthi, B. Bharathi and M. Hemalatha, 2011. 4G - Fourth Generation Wireless Systems Requirements and Technical Challenges. Journal of Theoretical and Applied Information Technology, 31(1): 29-35. (Impact Factor: 1.71 Scopus Indexed)

172. Revathi, P., R. Revathi and M. Hemalatha, 2011. Comparative Study of Knowledge in Crop Disease Using Machine Learning Techniques. Int. J. Computer Science and Information Technologies, 2(5): 2180-2182. (Impact Factor:0.29)

173. Lakshmi Devasena, C. and M. Hemalatha, 2011. Noise Removal in Magnetic Resonance Images using Hybrid KSL Filtering Technique. Int. J. Computer Application, 27(8): 1-4. (Impact Factor: 0.835)

174. Sumathi, T. and M. Hemalatha, 2011. An Innovative Image Fusion Algorithm Based on Wavelet Transform and Improved Discrete Fast Curvelet Transform. Cent. Euro. J. Computer Science, 1(3): 329-340. (Indexed Scopus)

175. Edwin Robert, A., G. Manivasagam, N. Sasirekha and M. Hemalatha, 2011. Reverse Engineering for Malicious Code Behavior Analysis using Virtual Security Patching. Int. J. of Computer Applications, 26(4): 41-45. (Impact Factor: 0.835)

176. Sasirekha, N., A. Edwin Robert and M. Hemalatha, 2011. Program Slicing Techniques and its Applications. Int. J. Software Engineering and Applications, 2(3): 50-64. (Impact Factor: 0.835)

177. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Hybrid Image Mining Technique using LIM based Data mining Algorithm. Int. J. Computer Application, 25(2): 1-5. (Impact Factor: 0.835)

178. Lakshmi Devasena, C., R. Radha Krishnan and M. Hemalatha, 2011. An Enhanced Algorithm for Mining Color Images – A Novel Approach. CiiT. Int. J. Data mining and Knowledge Engineering, 3(9): 550-554. (Impact Factor: 0.645)

179. Sumathi, T., A. Edwin Robert, B. Bharathi and M. Hemalatha, 2011. Image Fusion Algorithm based on Wavelet Transform and IDFC Transform. Int. J. GJACT, 1(2): 184-190. (Impact Factor: 0.242)

180. Sumathi, T. and M. Hemalatha, 2011. A Combined Hierarchical Model for Automatic Image Annotation and Retrieval. IEEE Proc. Advance Computing, 1(1): 324-329. (Impact Factor: 1.2).

181. Sumathi, T., C. Lakshmi Devasena, R. Revathi, S. Priya and M. Hemalatha, 2011. Automatic Image Annotation and Retrieval using Multi-instance Muli-label Learning. Bonfring Int. J. Advances in Image Processing, 1(1): 1-5.

182. Sumathi, T., P. Nagarajan and M. Hemalatha, 2011. An Empirical Study on Image/Video Retrieval Techniques Grand Challenges and Trends. Int. J. Computer Information System, 2(6): 20-26. (Impact Factor: 0.242)

183. Lakshmi Devasena, C., R. Revathi and M. Hemalatha, 2011. Video Surveillance System – A Survey. Int. J. Computer Science Issues, 8(4): 635-642. (Impact Factor: 0.242)

184. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Novel Method to Improve Video Compression for Video Surveillance Applications using SPIHT Algorithm. Int. J. Advanced Research in Computer Science, 2(4): 119-125. (Impact Factor: 0.242)

185. Lakshmi Devasena, C., T. Sumathi and M. Hemalatha, 2011. An Experiential Survey on Image Mining Tools, Techniques and Applications. Int. J. Computer Science and Engineering, 3(3): 1155-1167.

186. Krishnaveni, S. and M. Hemalatha, 2011. A Perspective Analysis of Traffic Accident using Data Mining Techniques. Int. J. Computer Applications, 23(7): 40-48. (Impact Factor: 0.835)

187. Hemalatha, M., P. Revathi, S. Megala and N. Naga Saranya, 2011. Advanced Data Mining Techniques for Classifications of Agricultural Facts. IEEE Proc. Int. Conf. Machine Learning and Computing, 1(1): 213-217. (IEEE Xplore)

188. Hemalatha, M., B. Kavitha, Shanmugapriya and S. Karthikeyan, 2011. An Emerging Method of Intuitionistic Fuzzy set for Breast Cancer Diagnosis. IEEE Proc. of Machine Learning and Computing, 2(1): 203-210.

189. Hemalatha, M. and S. Megala, 2011. Mining Techniques in Health Care: A Survey of Immunization. J. Theoretical and Applied Information Technology, 25(2): 64-70. (Impact Factor: 1.71 Scopus Index)

190. Megala, S. and M. Hemalatha, 2011. A Novel Data Mining Approach to determine the Vanished Agricultural Land in Tamil Nadu. Int. J. Computer Application, 23(3): 213-217. (Impact Factor: 0.835)

191. Naga Saranya, N. and M. Hemalatha, 2011. Potential Research into Spatial Cancer Database by using Data Clustering Technique. Int. J. Computer Science and Information Security, 9(5): 168-173. (Impact Factor: 0.243)

192. Hemalatha, M. and N. Naga Saranya, 2011. A Recent Survey on Knowledge Discovery in Spatial Data Mining. Int. J. Computer Science Issues, 8(3): 473-479. (Impact Factor: 0.832)

193. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Comparative study of Hybrid LIM based Image Matching Techniques for mining Image Databases. Int. J. Knowledge Management and e-Learning, 3(1): 61-65.

194. Anny Leema, A. and M. Hemalatha, 2011. Optimizing Operational Efficiency and Enhancing Data Reliability using Effective and Adaptive Cleaning Approach for RFID in Healthcare, Int. J. Computer Applications, 3(7): 26-29. (Impact Factor: 0.835)

195. Revathi, P. and Hemalatha,M, 2011. Efficient Classification Mining Approach for Agriculture. Int. J. Research and Reviews in Information Sciences, 1(2): 42-45. (Impact Factor: 0.242)

196. Sumathi, T., C. Lakshmi Devasena and M. Hemalatha, 2011. An Overview of Automated Image Annotation Approaches. Int. J. Research and Reviews in Information Science, 1(1): 1-6. (Impact Factor: 0.242)

197. Vasanthi, V. and M. Hemalatha, 2011. Empirical Study on Security Attacks in Wireless Sensor Network. Int. J. Advanced Research in Computer Science, 2(1): 23-28.

198. Sumathi, T. and M. Hemalatha, 2011. Semantic Web Image Search through Manual Annotation. Int. J. Computer Application, 17(8): 39-42. (Impact Factor: 0.835)

199. Hemalatha, M. and A. Anny Leema, 2011. Applying RFID Technology to Construct an Elegant Hospital Environment. Int. J. Computer Science Issue, 8(3): 444-448. (Impact Factor: 0.242)

200. Vasanthi, V., P. Nagarajan, B. Bharathi and M. Hemalatha, 2010. A Perspective Analysis of Routing Protocols in Wireless Sensor Network. Int. J. Computer Science and Engineering 2(8): 2511-2518.

201. Anny Leema, A. and M. Hemalatha, 2010. A proposed system to solve the drawbacks of Association Rule Mining in E-learning. J. Computer Applications, 3(2): 13-19.

202. Sumathi, T. and M. Hemalatha, 2010. An Empirical study on Performance Evolution in automatic Image Annotation and Retrieval. Int. J. Advanced Research in Computer Science, 1(4): 13-17.

203. Hemalatha, M., N. Sasirekha, S. Easwari and N. Naga Saranya, 2010. An Empirical Model for Clustering Classification of Instrumental Music using Machine Learning Technique. IEEE Proc. Computational Intelligence and Computing Research, 1-7. (IEEE Xplore)

204. Hemalatha, M. and A. Anny Leema, 2010. Software Architecture for Semantic Web Mining In the Parallel Distributed Environment. IEEE Proc. Computational Intelligence and Computing Research, 72-78.

205. Anny Leema, A., P. Sudhakar, R.S.D. Vahidabanu and M. Hemalatha, 2010. RFID Data Management and its Applications in Hospital Environment. Int. J. Advances in Science and Technology, 1(5): 53-108.

206. Anand Kumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative Analysis of IPv4 and IPv6 to evaluate Performance. Int. J. Computer and Network Security, 2(7): 27-31.

207. Anand kumar, M., M. Hemalatha, P. Nagaraj and S. Karthikeyan, 2010. A New Way towards Security in TCP/IP Protocol Suite. Latest Trends on Computers, 1(1): 46-50. (Indexed in Scopus)

208. Anandkumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. A Large Capacity Steganography using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video. Int. J. Computer and Network Security, 2(7): 67-70.

209. Hemalatha, M., R. Jeyadev and V.K. Gopalakrishnan, 2009. Predicting HIV drug resistance using neural networks. IJCIB, 1(2): 69-74.

210. Hemalatha, M. And K. Vivekanandan, 2009. FART Based Neural Network for Probabilistic Motif Discovery in Unaligned Biological Sequences. IEEE Proc. Datamining and its applications, 2(1): 714-801.

211. Hemalatha, M. and D. Sathya Srinivas, 2009. Hybrid Neural Network Model for Web Document Clustering. IEEE Proc. Applications of Digital Information and Web Technologies (ICADIWT '09), 2(1): 531-538.

212. Hemalatha, M., S. Karthikeyan and E. Ramaraj, 2009. A Design of Security Protocol using Hybrid Encryption Technique AES-Rijndael and RSA. Int. J. Computer, Internet and Management, 17(1): 78-86. (Indexed in Scopus)

213. Hemalatha, M. and K. Vivekanandan, 2008. A Simple Statistical Model for Probabilistic Motif Discovery in Multiple Aligned Sequences. Euro. J. Scientific Research, 19(3): 608-613. (Indexed in Scopus) (IF 0.735)

214. Hemalatha, M. and K. Vivekanandan, 2008. A Distributed and Parallel Clustering Algorithm for Massive Biological Data. J. Convergence and Information Technology, 3(4): 84-88. (Indexed in Scopus)

215. Hemalatha, M. and K. Vivekanandan, 2008. A Semaphore Based Multiprocessing K-Mean Algorithm for Massive Biological Data. Asian J. Scientific Research, 1(4): 444-450. (Indexed in Scopus)

216. Hemalatha, M. and K. Vivekanandan, 2008. Genetic Algorithm Based Probabilistic Motif Discovery in Multiple Unaligned Biological Sequences. Int. J. Computer Science, 4(8): 625-630. (Indexed in Scopus)(IF 1.35)

217. Hemalatha, M. and K. Vivekanandan, 2007. Phylogenetic Tree Construction using Simple SVD based Distance Metrics. Int. J. Computer Science and System Analysis, 1(2): 103-110.

218. Hemalatha, M. and K. Vivekanandan, 2007. A Scalable and High Performance Sorting Algorithm to Analyze Massive Biological Data. Int. J. System Analysis and Design, 1(1): 37-45.

219. Hemalatha, M., 2007. Medical informatics. Tamil Computer, 16 24: 1-7.

220. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An Analysis of Key Management in Transport Layer Security Standard. Punjab College of Technical Education J. Computer Sciences, 2(2): 5-9.

221. Hemalatha, M., S. Karthikeyan and V.V. Gomathi, 2006. Data Mining Knowledge Discovery Database. Tamil Computer, 1218: 4-8.

222. Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An Efficient Algorithm for Predicting Survival of Medical Data EPSA. Int. J. Technology, Knowledge and Society, 2(1): 37-48. (Indexed in Scopus)

223. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A New Approach of Hybrid Encryption Technique in Database Security. Int. J. Technology, Knowledge and Society, 2(4): 55-60.

224. Hemalatha, M. and E. Ramaraj, 2006. An Improvement of Eun-Jun-Kyung-Kee’s Remote User Authentication Scheme in Smart Card using Hybrid Encryption. J. Computer Science, 1(4): 293-300. (Indexed in Scopus)

225. Hemalatha, M., 2005. Database Search and Retrieval System for Bacteria. Bioinformatics INDIA, 3(1): 37-42.

226. Hemalatha, M., 2005. A Data Mining Tool to Increase Human Life Days from Affecting Cardiac Arrest. Bioinformatics INDIA, 3(4): 96-111.

227. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An Improvement of Security in the Insecurity of 802.11 using Hybrid Encryption AES-Rijndael and RSA. Indian J. Information Science and Technology, 1(1): 18-26.

Research Publications
© 2015 Dr.Hemalatha.com Developed by MakingGoal
disawar satta king