dr. m. hemalatha, m.sc.,m.phil.,ph.d..,€¦ · 23. p. revathi, m. hemalatha, 2014. cotton leaf...
Post on 28-May-2020
22 Views
Preview:
TRANSCRIPT
Dr.M.Hemalatha Page 1 of 32
Dr. M. HEMALATHA, M.Sc.,M.Phil.,Ph.D..,
Residential Address
D3, A Block Eden Garden Apartment Puliyakulam Road Sungam, Coimbatore – 641045, INDIA
Email : hema.bioinf@gmail.com
csresearchhema@gmail.com
Mobile : +919843099676
Website: www.drhemalatha.com
Degree University Class Year of Passing
B.Sc (CS) Annamalai University First 2001
M.Sc (IT) Annamalai University First 2004
M.Phil(CS) Bharathidasan Univeristy First 2006
Ph.D (CS) Mother Terasa Women’s University Highly
Commended
2009
Teaching Experience (13 Years) (Industrial experience (3 years) Total – 16 years
2004-2009-Lecturer in Computer Science, Department of Computer Science, Karpagam
Arts and Science College, Coimbatore, Tamilnadu, India.
2010-2013-, Assistant Professor and Head Department of Software System, Karpagam
University, Coimbatore, Tamilnadu, India.
2013-July 2015-July Professor, Research Co ordinator, Department of Computer
Science, Karpagam University, Coimbatore, Tamilnadu, India.
2015 August – May 2016 , Dean Science, Dr.SNS Rajalakshmi College of Arts and
Science, Coimbatore.
2016 June – May 2017 Director, R&D Division, Hansoft Technologies , Coimbatore
Handling the Papers for BSc(CS), BCA, BSC(IT), MSc(CS), MSC(SS), MCA
Distributed Operating System
Cyber Security
Computer Networks
Data mining
Database Management System
Educational Qualifications
Papers Handled
Dr.M.Hemalatha Page 2 of 32
Mat Lab Programming
Visual Basic Programming
C Programming
Object Oriented Programming with C++
Computer Fundamentals and Basic Programming
Research Experience (10 Years)
Research Papers Presented / Published : Total number of papers: 326
National Conferences : 45
International Conferences : 54
International Journals : 227
Area of Specialization : Data Mining, Cloud Computing, Image
processing, Networks, Bioinformatics
Research Findings Presented in Abroad
Dubai: From 16.10,2014-20.10.2014 to present research findings at International Conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, Dubai (UAE),
Malaysia: From April 14- 21.03.2013, to exhibit product Autism E-learning Tool in an International Engineering Expo – University of Malaysia, Perlis
Singapore – From 26-02-2011 to 02-03-2011, to present research findings at International Conference organized by the IEEE, Singapore Section.
Hong Kong – From 16-03-2010 to 19-03-2010, to present research findings at International Conference on Data mining organized by the IEEE and IEANG Hong Kong.
Research Projects Minor
Project No : AS-06,
Ref: No : TNSCST/STU.PRJ/RJ/2005-06
Funding Agency : Tamilnadu State Council Science and Technology
Title of the Project : Database Connectivity for Cultivation Practices of Crops.
Citation Indices
Cited by
All Since 2013
Citations 1375 1201
h-index 20 16
i10-index 40 35
Dr.M.Hemalatha Page 3 of 32
Research Guidance
Number of M.Phil Awarded : 20
Number of M.Phil Guiding : -
Number of Ph.D. Awarded : 24
Number of Ph.D. Submitted: 5
Number of Ph.D. Guiding : 2
Administrative Responsibilities
Research Cordinator
MHRD Sponsered Spoken Tutorial – Coordinator
Organised conferences and seminars
Studemts Software Development center coordinator
Ragging Committee member,
Exam Cell Co ordinator
Member Doctoral Committee (Research)
Anna University – Chennai, Chennai, Tamil Nadu, India
Karpagam University–Coimbatore, Tamil Nadu, India
Karunya University –Coimbatore, Tamil Nadu, India
Bharathidasan University –Trichy , Tamil Nadu, India
Bharathiar university –Coimbatore, Tamil Nadu, India
Mother Terasa Women’s University , Kodaikanal,Tamil Nadu,India
Member in Professional Bodies
Member, Institute of Electrical and Electronics Engineering (IEEE), USA.
Member, Association of Computing Machinery (ACM), USA.
Member, International Association of Engineers (IAENG), JAPAN.
Life Member, Computer Society of India, INDIA.
Member, Indian Science Congress Association, INDIA.
Computer Science Teachers Association (9161066)(CSTA)
International Association of Computer Science and Information Technology, Singapore – Member No : 80333198
International Association of Engineers - Computer Science/Data Mining, Canada/Spain Member No : 101516
International Association of Engineers - Computer Science/Data Mining, Canada/Spain Member No : 101516
Editorial Board Member in Journals
Scientific Journals International (ISSN: 1556-6757, USA)
Trends in Bioinformatics
Journal of Information Scientific Research
Dr.M.Hemalatha Page 4 of 32
International Journal of Technology Knowledge and Society (ISSN: 1816-3548, Taiwan)
Reviewer in Journals
Knowledge Based System (Elsevier)
International Journal of Computer System Science and Engineering
World Scientific Engineering Academy and Society (WSEAS) conferences and
Journals, China
International Conference on Digital Information Web Technologies, London,UK
International Journal of Information Security
Journal of Convergence and Information Technology
Journal of Computer Science
International Journal of Digital Content Technology and its Applications
Egyptian Informatics Journal
Invited Talks (Research)
National conference on Recent Trends in Computer Science” held on 13.02.2015 at Annai Violet arts and Science college, Chennai
National conference on” Advanced Research Techniques in Information Technology” held on 07.11.2014, at G.Venkataswamy Naidu College, Kovilpatti
UGC Sponsored National Conference on Web Science and technology, held on 10 & 11.10.2012 at PSG College of Arts and Science, Coimbatore.
UGC Sponsored Work shop on Transcending Conventional Boundaries of Research, held on 21&22.03.2014 at PSG College of Arts and Science, Coimbatore.
Honors/Awards
Travel grant Received from DST to attend International Conference at Singapore (Grant No SR/ITS/03473/2010-2011)
Best Researcher Award 2012 – Karpagam University
Silver Medal for An E-Learning Tool for Children with Autism Disorder Exhibit at International Engineering
Refresher Courses / Workshops / Seminars/ Conferences Organized
International level workshop conducted on Networks, Intelligence and Computing Technologies on 18 December, 2011, Karpagam University, Coimbatore, Tamil Nadu, INDIA.
Inter National Conference Networks, Intelligence and Computing Technologies conducted on 16 & 17th December, 2011, Karpagam University, Coimbatore, Tamil Nadu, INDIA.
Books\Book Chapters Published
Hemalatha.M and A.Anny Leema., 2015. Book Chapter Data management issues in RFID applications, RFID Technology Integration for Business Performance Improvement ISBN-10: 3848406187, ISBN- ISBN13: 9781466663084
Dr.M.Hemalatha Page 5 of 32
M. Hemalatha, 2011. Proceedings of the International Conference on Networks, Intelligence and Computing Technologies, 15-16 December 2011. ISBN: 978-81-8424-741-1, Volume – I.
M. Hemalatha, 2011. Proceedings of the International Conference on Networks, Intelligence and Computing Technologies, 15-16 December 2011. ISBN: 978-81-8424-742-8, Volume – II.
Shanmugavel, D.P., M. Hemalatha and Karthikeyan.S, 2006. Microarray in Bioinformatics, Trends in Bioinformatics, (Eds.). Pointer publishers, Jaipur, India; 212-250.
Shanmugavel,D.P, M. Hemalatha and Karthikeyan.S, 2006. Mathematic Modeling in Molecular Modeling, Trends in Bioinformatics. (Eds.). Pointer publishers, Jaipur, India; 212-250.
Hemalatha, M., 2012. Hybrid Models for High Dimensional Clustering and Pattern Discovery. LAP LAMBERT Academic Publishing, ISBN-10: 3848406187, ISBN-13: 978-3848406180
Other Information
Member of Board of Studies of various autonomous colleges.
Chairman and Member of board of examiners of different Autonomous colleges and Universities.
Organizing committee member of various International and National conferences.
Papers Published in International Journals
1. B.Selvanandhini and M.Hemalatha 2017 A Mathematical Model for Quality Video Packet
Streaming with Minimum Jitter Rate Global Journal of Pure and Applied Mathematics 13 (8),
4381-4395
2. M.Hemalatha and Nithya.P 2016 , A Thorough Survey on Lossy Image Compression
Techniques International Journal of Applied Engineering Research . 11( 5): pp 3326-3329
Scopus Indexed IF: 0.671)
3. M.Hemalatha and Anitha 2016 , Certificate Revocation List Distribution Based on Road Map
Distance Protocol (RMDP) in Vanet International Journal of Applied Engineering Research. 10(
3): pp 3126-3132 Scopus Indexed IF: 0.671)
4. M.Hemalatha and Thilainayaki ,2016. Mining PPIs using recent methods and and Applied
Research. 12 ( 3): pp 567-571 Scopus Indexed IF: 0.731)
5. M.Hemalatha and Sylvia 2016, Diagnosis of heart disease from ECG using colonial neural
network with derivative threshold based genetic algorithms, International Journal of Applied
Engineering Research. 11( 7) pp 5297-5303 Scopus Indexed IF: 0.671)
6. M.Hemalatha and Anitha 2016 , Certificate revocation list distribution based on DMSTP
(directional minimum spanning tree protocol) using tripled in Vanet Australian journal of Basic
7. Renuga Devi.R and M. Hemalatha, 2014. A novel approach for secure hidden community
mining in social networks using data mining techniques, International journal of computer
application, 87(7): 12-19(IF: 0.831)
Dr.M.Hemalatha Page 6 of 32
8. features International Journal of Applied Engineering Research. 10(19) pp 40054 – 40058 /
Scopus Indexed IF: 0.671)
9. V.Vinodhini and M. Hemalatha 2015 Improved Density based K clustering (E- DBK)algorithm
for effectual investigation of crime data International Journal of Applied Engineering Research
10(7):16655 – 16664
10. Kavitha and M. Hemalatha 2015 Enhanced Support Vector Machine (SVM) algorithm.
International Journal of Applied Engineering Research 10(7):16865 – 16872
11. Senthamilarasu and M. Hemalatha 2015 Ensemble Classifier for Concept Drift Data Stream
Spinger Informatics and communication Technologies for societal 1(1):127-137
12. Renuga Devi.R and M. Hemalatha, 2014. Mining of network communities by spectral
characterisation using KD-Tree, Research journal of applied, engineering and technology, 7(7):
1108-1115 (IF: 0.31)(Indexed in Scopus)
13. Anupama Prasanth and M. Hemalatha 2014 A Comparison on Intelligent Web
InformationRetrieval Systems. Intl. J. Computer Science and Network 3(6):425-429 (IF 0.274)
14. Ajith Singh.N and M.Hemalatha, 2014. BASIP a virtual machine placement technique to reduce
energy consumption in cloud data centre, Journal of Theoretical and Applied Information
Technology, 59(2):426-435 (IF: 0.71)(Indexed in Scopus)
15. Ajith Singh.N and M.Hemalatha, 2014. Reservation Resource Technique for Virtual Machine
Placement in Cloud Data Centre, Research Journal of Applied Sciences, Engineering and
Technology, 7(14): 2954-2960 (IF: 0.31)(Indexed in Scopus)
16. Gowsalya. R, S. Veni and M. Hemalatha, 2014. Analysis of machine Learning Techniques by
Using Blogger Data, International Journal of Engineering Research and Applications,
4(4):461:467.
17. G.V.Nadiammai and M.Hemalatha, 2014. Effective Approach towards Intrusion Detection
System Using Data mining techniques, Egyptian Informatics Journal, 15(1):37-50(Indexed in
Scopus)
18. N.Sasirekha and M.Hemalatha, 2014. A Hybrid Indexed Table and Quasigroup Encryption
Approach for Code Security Against Various Software Threads, Journal of Theoretical and
Applied Information Technology, 60(2):437-445 (IF: 0.71)(Indexed in Scopus)
19. N. Naga Saranya, M. Hemalatha, 2014. An Innovative idea to discover the trend on multi-
dimensional Spatio-Temporal Datasets, International Journal of Research in Engineering and
Technology, 3(3): 243-249.
20. P.Revathi and M.Hemalatha, 2014. Classification of Cotton Diseases using Cross Information
Gain-Minimal Resourse Allocation Network Classifier with Particle swarm Optimization, Journal
of Theoretical and Applied Information Technology, 60(1):184-188(IF: 0.71)(Indexed in Scopus)
Dr.M.Hemalatha Page 7 of 32
21. P.Revathi and M.Hemalatha, 2014.Cotton Disease Identification using Proposed CIG-DFNN
Classifier, Asian Journal of Scientific Research, 7(2):225-231.
22. P. Nandhakumar, M. Hemalatha, 2014. Effective Semantic Web Information Retrieval Using
Fuzzy Based Ontology, International Journal of Innovative Technology and Exploring
Engineering,3(11):33-36.
23. P. Revathi, M. Hemalatha, 2014. Cotton Leaf Spot Diseases Detection Utilizing Feature
Selection with Skew Divergence Method, International Journal of Scientific Engineering and
Technology, 3(1)22-30.
24. R.Gopinath and M.Hemalatha,2014.Negative Association Rules for Web Usage Mining using
Negative Selection Algorithm, World Applied Science Journal,31(12):2015-2023.
25. R.Gobinath and M. Hemalatha, 2014. An Heighten PSO-K-harmonic Mean Based Pattern
Recognition in User Navigation, Research Journal of Applied Sciences, Engineering and
Technology,7(7):1283-1287.IF: 0.31)(Indexed in Scopus)
26. R. Gobinath, M. Hemalatha, 2014. Visualizing the Navigational Patterns from Web Log Files
using Web Mining Applications, International Journal of Scientific & Engineering
Research,5(5):538-544.
27. S.Krishnaveni and M.Hemalatha, 2014.Evaluation of DFTDS Algorithm for distributed data
warehouse, Egyptian Informatics Journal,15(1):51-58. (Indexed in Scopus)
28. K. Sathesh Kumar and M. Hemalatha, 2014. An Efficient Integrated Approach for Information
Retrieval Using Fuzzy Artificial Bee Colony Optimization Based On Cloud Computing, Middle-
East Journal of Scientific Research, 21 (2): 376-384.201( Indexed in Scopus)
29. G. Anitha and M. Hemalatha,2014. Intrusion prevention and Message Authentication Protocol
(IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks,
International Journal of Engineering and Technology, 6(2):663-672. (Indexed in Scopus)
30. Senthamilarasu .S and M.Hemalatha,2014. Classification of Pattern Using Intuitionistic Fuzzy
Temporal Association Rule Mining for Data Stream, International Journal of Control Theory and
Applications, 7(1):11-18. (Indexed in Scopus)
31. S.Hemalatha and M.Hemlatha, 2014.Certain Investigation on Missing Value Imputation
Techniques, International Journal of Computer Technology and Applications, 5(2):323-329. (IF:
2.015)
32. Padmapriya.G and M.Hemalatha, 2014. A Recent Survey on Unstructured Data to Structured
Data in Distributed Data Mining, International Journal of Computer Technology and
Applications, 5(2):338-344.(IF:2.015)
33. Vinodhini.V and M.Hemalatha, 2014.An Intend Method for Tracking and Detecting Crime using
Clustering Techniques, International Journal of Engineering and Management
Research.4(5):27-30.
Dr.M.Hemalatha Page 8 of 32
34. Sasirekha.N and Hemalatha, 2014.Quantum Cryptography using Quantum Key Distribution and
its Applications, International Journal of Engineering and Advanced Technology, 3(4):289-294.
(IF:3.2)
35. Nandakumar.P and M.Hemalatha, 2014. An Exhaustive survey on Various Semantic web
Procedures and Techniques, International Journal of Control Theory and Applications, 7(1):1-9.
(Indexed in Scopus)
36. A.Edwin Robert and M.Hemalatha, 2014. Epidemic Dynamics of Malicious code Detection
Architecture in Critical Environment, Indian Journal of Science and Technology, 7(6):770-775.
(Indexed in Scopus)
37. A.Edwin Robert and M.Hemalatha, 2014.Identification of Heterogeneous Malicious Nodes in the
Crucial Dynamic Environment for protecting local and remote systems, International Journal of
Advanced Computational Engineering and Networking, 2(2):35-38.
38. A.Edwin Robert and M.Hemalatha, 2014.Epidemic Dynamic of Malicious code detection
Architecture in Critical Environment, Indian Journal of Science and Technology,7(6):770-775.
39. K.Sathesh Kumar and M.Hemalatha, 2014. An Optimized interface of Pattern Recognition
Using Fuzzy Ant Based Clustering Algorithm. International Review on Computers and Software.
40. K.Sathesh Kumar and M.Hemalatha, 2014.An Hybird Optimization algorithm for Fuzzy
Association Rule Mining, IEEE Proceedings of Computer Communication and
Informatics,1(1):1-6. IEEE Xplore (Indexed in Scopus)
41. Padmapriya.G and M.Hemalatha , 2014. Extraction of Unstructured Data records and
discovering new Attributes from the web documents, International Journal of Computer trends
and Technology(IJCTT),(IF:0.569)
42. Padmapriya.G and M.Hemalatha , 2014.Distributed protocol for privacy preserving by applying
proposed k-anonymizing approach on distributed datasets, Karpagam Journal of Computer
Science.
43. Padmapriya.G and M.Hemalatha, 2014.A Novel Privacy Preservation using Double Hash based
K-Anonymity Techniques, International Journal of Applied Engineering Research. (Indexed in
Scopus).
44. Padmapriya.G and M.Hemalatha, 2014.Distributed Privacy preserving and Handling Privacy
information Leakage by using K-anonymity Algorithm, International Journal for Research in
Applied Science and Engineering Technology(IJRASET) (IF:1.214)
45. S.Hemaltha and M.Hemalatha, 2014.An Estimation of Missing Values by Modified Mixed
Kernels, IIE INT’L Conference Proceedings of Computer Science and Information
Systems,1(1):10-15 (Indexed in Scopus)
Dr.M.Hemalatha Page 9 of 32
46. S.Hemaltha and M.Hemalatha, 2014.Predicition of Missing Values in Datasets using
Association Rule Mining, International Journal of Applied Engineering Research.9(23):19789-
19800 (Indexed in Scopus)
47. S.Hemaltha and M.Hemalatha, 2014.Computational Techniques to Recover Missing Data from
Gene Expression Data, International Journal for Research in Applied Science and Engineering
Technology, 2(12):132-139(IF:1.214)
48. Lakshmi Devasena.C and M.Hemalatha, 2014. Automatic Classification of Audio Data using
Gradient Descent Neural Network based Algrithm, Journal of Theoretical and Applied
Information Technology, 70(2):375-389. (IF:1.71) (Indexed in Scopus)
49. Nandha Kumar.P and M.Hemalatha, 2014.Domain Oriented Ontology Based Semantic Web
Search Methodology using Sparql Query, Internation Journal Computer and
Technology.12(9):3875-3885.
50. Sindhu.V, S.A.Sathya prabha, S.Veni and M.Hemalatha, 2014.Thoracic Surgery Analysis using
Data Mining Techniques, International Journal of Computer Technology and
Applications.5(2),578-586.
51. Krishnaveni, S. and M. Hemalatha, 2013.Query Management in Data Warehouse using Virtual
Machine fault tolerant resource Scheduling Algorithm. Int. J. Theoretical and Applied
Information Technology, 47(3):1251-1257. [IF:1.71](Indexed in Scopus)
52. Renuga devi.R and M. Hemalatha, 2013.A Perspective Analysis of hidden Community Mining
Methods in Large Scale Social Networks, International Journal of Computer Application.75(3):7-
12.(IF:0.835)
53. Ajith Singh.N and M.Hemalatha, 2013.An Analysis of Load Balancing in a cloud Computing
Environment,European Journal of Scientific Research.101(4):590-598(IF:0.736) (Indexed in
Scopus)
54. Ajith Singh.N and M.Hemalatha, 2013. A Honey Bee Foraging Algorithm Scheduling Approach
for Virtual Machine Resources in Cloud Computing Environment, IEEE Proceedings of
Research and Development Prospects on Engineering and Technology.5(1):52-57.(IEEE
Xplore)
55. Ajith Singh.N and M.Hemalatha, 2013. Virtual Machine Placement by Using Honey Bee Forager
Algorithm in Cloud Computing, Karpagam Journal of Computer Science. 7(4):210-216.
56. Ajith Singh.N and M.Hemalatha, 2013. Cluster Based Bee Algorithm for Virtual Machine
Placement in Cloud Data Centre, Journal of Theoretical and Applied Information
Technology,57(3):1-10 (IF:1.71) (Indexed in Scopus)
57. Ajith Singh.N and M.Hemalatha, 2013. Reduce Energy Consumption through Virtual Machine
Placement in Cloud Data Centre, Springer Lecturer notes in Artificial Intelligence,1[1]:466-474.
(Indexed in Scopus)
Dr.M.Hemalatha Page 10 of 32
58. Ajith Singh.N and M.Hemalatha, 2013. Energy Efficient Virtual Machine Placement Technique
using Banker Algorithm in Cloud Data Centre, IEEE Proceedings of Advanced Computing &
Communication Systems,1(1)1-6(Indexed in Scopus)
59. Nadiammai.G.V. and M.Hemalatha,2013. Performance Analysis of Tree based Classification
algorithm for Intrusion Detection System, Springer Lecturer notes in Artificial
Intelligence,1(1):82-89(Indexed in Scopus)
60. Nadiammai.G.V. and M.Hemalatha,2013. Handling Intrusion Detection System using Snort
Based Statistical Algorithm and Semi-supervised Approach, Research Journal of Applied
Sciences, Engineering and Technology,6(16):2914-2922(IF:0.036) (Indexed in Scopus)
61. Nadiammai.G.V. and M.Hemalatha,2013. An Enhanced Rule Approach for Network Intrusion
Detection using Efficient Data Adapted Decision Tree Algorithm, International Journal of
Theoretical and Applied Information Technology,47(2):426-433(IF:1.71) (Indexed in Scopus)
62. Krishnaveni.S and M.Hemalatha, 2013. A Dependency-based Query Scheduling in Distributed
Data Warehouse Environment, Springer Lecturer notes in Artificial Intelligence.1(1):499-505
(Indexed in Scopus)
63. Renuga devi.R and M.Hemalataha, 2013. A Novel Algorithm for Automatically Detecting
Number of Clusters for Mining Communities in Heterogeneous Social Networks. Engineering,
International Journal of Innovative Technology and Exploring. 3(6):43-47.
64. Renuga devi.R and M.Hemalataha, 2013. Sybil Identification in Social Networks Using SICT
and SICTF Algorithms with ImprovedKD-Tree, Journal of Theoretical and Applied Information
Technology,56(3):443-451(IF:1.71) (Indexed in Scopus)
65. Renuga devi.R and M.Hemalataha, 2013. An Improved KD-Tree Algorithm Based Community
Mining in Social Networks, European Journal of Scientific Research,110(1):58-69(IF:0.736)
(Indexed in Scopus)
66. Renuga devi.R and M.Hemalataha, 2013. A Perspective Analysis of hidden Community Mining
Methods in Large Scale Social Networks, International Journal of Computer
Applications.75(3)(IF:0.835)
67. Renuga devi.R and M.Hemalataha, 2013. A Study on different Hidden Community detection
methods in the social area networks, Proceedings of Recent Trends in Information
Technology,1(1):43-46.
68. Renuga devi.R and M.Hemalataha, 2013. Sybil identification Algorithm using connectivity
threshold for Secured Community Mining in Social network, IEEE Proceedings of
Computational Intelligence and Computing Research,1(1):158-161, (Indexed in Scopus)
69. Renuga devi.R and M.Hemalataha, 2013. Mining Hidden Communities in Social Networks
Using KD-Tree and Improved KD-Tree, IEEE Proceedings of Computing, Communications and
Networking Technologies, 4(1):1-7.
Dr.M.Hemalatha Page 11 of 32
70. Renuga devi.R and M.Hemalataha, 2013. Automatic K-Community Mining in Heterogeneous
Network Using Convergence Aware Dirichlet Process Mixture Model, International Journal of
Engineering Research and Technology,2(11):1976-1984,(IF:1072)
71. Revathi.P and M.Hemalatha, 2013. Identification of Cotton Diseases Based on Cross
Information Gain_Deep Forward Neural Network Classifier with PSO Feature Selection,
International Journal of Engineering and Technology,5(6):4637-4642. (Indexed in Scopus)
72. Revathi.P and M.Hemalatha, 2013. An Improve Cotton Leaf Spot Disease Detection using
Proposed Classifiers, International Journal of Engineering Research and
Technology,2(12):2144-2147.(IF:1.72).
73. Revathi.P and M.Hemalatha, 2013. Cotton Leaf Spot Diseases Detection Utilizing Feature
Selection with Skew Divergence Method, International Journal of scientific Engineering and
Technology,3(1):22-30.
74. Sentamilarasu.S and M.Hemalatha, 2013. A Genetic algorithm based Intuitionistic fuzzification
technique for Attribute selection, Indian Journal of Science and Technology,6(4):4336-4346.
(Indexed in Scopus)
75. Sentamilarasu.S and M.Hemalatha, 2013. Ensemble of Intuitionistic Fuzzy Classifier, IEEE
Proceedings of Computational Intelligence and Computing Research,4(6):450-458. (Indexed in
Scopus)
76. Sentamilarasu.S and M.Hemalatha, 2013. Dynamically Adaptive Count Bloom Filter for
Handling Duplicates in Data Stream, International Journal of Engineering and
Technology,4(6):450-458. (Indexed in Scopus)
77. Sathesh kumar.K and M.Hemalatha, 2013. Optimal Feature Subset Reduction Using SVM
Classifier, IEEE Proceedings of Research and Development Prospects on Engineering and
Technology,4(2):109-114. (Indexed in Scopus)
78. Gobinath.R and M.Hemalatha, 2013. Optimized Feature Extraction for Identifying user Behavior
in Web Mining, European Journal of Scientific Research, 105(3): 319-32,(IF:0.736) (Indexed in
Scopus)
79. Gobinath.R and M.Hemalatha, 2013. An optimized K-Harmonic Mean based Clustering user
navigation Patterns, IEEE Proceedings of Computational Intelligence and Computing
Research,1(1). (Indexed in Scopus)
80. Gobinath.R and M.Hemalatha, 2013. Preprocessing for Web personalization using Web Usage
Mining, IEEE Proceedings of Research and Development Prospects on Engineering and
Technology,5(1):52-57. (Indexed in Scopus)
81. sasirekha.N and M.Hemalatha, 2013. Novel Secure Code Encryption Techniques Using Crypto
Based Indexed Table for Highly Secured Software, International Review on Computers and
Software, 8(8): 1980-1990.(IF:6.24) (Indexed in Scopus)
Dr.M.Hemalatha Page 12 of 32
82. sasirekha.N and M.Hemalatha,2013.Quasigroup Encryption Based Cryptographic Scheme for
Software Protection, International Journal of Advances in Engineering and Emerging
Technology, 3(1): 346-357.(IF: 0.078)
83. sasirekha.N and M.Hemalatha, 2013. A Novel Secured Code apporoach Using Latin Square
Crypto System against Reverse Engineering, Journal of Computer Science
(Karpagam),7(5):260-270.
84. Anny Leema and M.Hemalatha, 2013. A novel Integrated Approach for Handling Anomalies in
RFID Data, International Journal of UbiComp,4(2):135-145,(IF:0.031) (Indexed in Scopus)
85. Anny Leema and M.Hemalatha, 2013. Proposed Prediction and cleaning algorithms based on
hybrid approach to deal with anomalies of RFID data in Healthcare, Elsevier Egyptian
Informatics Journal,14(2):135-145.(IF:0.031) (Indexed in Scopus)
86. Anny Leema and M.Hemalatha, 2013. Hybrid Approach for duplication detection and
elimination. Springer, Lecture Notes in Electrical Engineering,131(1):737-750.(IF:0.114)
(Indexed in Scopus)
87. Edwin Robert.A and M.Hemalatha, 2013. Dynamic Virtual Monitoring System for Detecting
Malicious Nodes in an Intruder Domain, International Journal of Recent Scientific
Research,4(12):2062-2066.
88. Juliana Gnanaselvi and M.Hemalatha, 2013. An Efficient Swarm Intelligence Optimization
Based Passive Continuous Authentication System, International Journal of Advances in
Engineering and Emerging Technology,2(1):220-234.(IF:0.078).
89. Gobinath.R and M.Hemalatha, 2013. An optimized K-Harmonic Mean based Clustering user
navigation Patterns, IEEE Proceedings of Computational Intelligence and Computing
Research,1(1). (Indexed in Scopus)
90. Gobinath.R and M.Hemalatha, 2013. Preprocessing for Web personalization using Web Usage
Mining, IEEE Proceedings of Research and Development Prospects on Engineering and
Technology,5(1):52-57. (Indexed in Scopus)
91. Revathi.R and M.Hemalatha, 2013. Object Tracking and Detection in Videos using Block
Matching with Intuitionistic Fuzzy Logic (BMIFL) Algorithm, Research Journal of Applied
Sciences, Engineering and Technology, 6(19): 3568-3576,(IF:0.030) (Indexed in Scopus)
92. Revathi.R and M.Hemalatha, 2013. A Novel Approach for Object Tracking and Detection using
IFL Algorithm, International Journal of Computer Science and Information Security,11(4):102-
109.
93. Sumathi.T and M. Hemalatha, 2013. A Novel approach of Automatic image annotation for
satellite images, Karpagam Journal of Computer Science.07(04):203-209.
94. Sumathi .S and M. Hemalatha, 2013.Performance Analysis of Routing Protocols in Mobile
Adhoc Network, Karpagam Journal Of Computer Science, 7(2):95-103.
Dr.M.Hemalatha Page 13 of 32
95. Sumathi, T. and M. Hemalatha, 2013. High Performance EMID Framework for Automatic Image
Annotation and Retrieval. International Journal of Imaging & Robotics.11(2):24-36. (Indexed in
Scopus)
96. Sumathi.T and M. Hemalatha, 2013. Enabling Public Audit ability and Data Dynamics for
Storage Security in Cloud Computing, Karpagam Journal Of Computer Science,07(02):67-75.
97. Sumathi, T. and M. Hemalatha, 2013. An Enhanced Approach for Solving Class Imbalance
Problem in Automatic Image Annotation. I.J. Image, Graphics and Signal Processing, 5(2):
9-16.(IF:0.11) (Indexed in Scopus)
98. Edwin Robert. A and M. Hemalatha, 2013 Behavioral and Performance Analysis Model for
Malware Detection Techniques. Int.J. Computer Engineering and Technology (IJCET). 4(1):
141-151.[IF:3.958]
99. Edwin Robert. A and M. Hemalatha, 2013 Effiicient Malware detection and tracer for an
operating systems .Int.J. Research Journal of Science, Engineering and Technology.
6[11]:2052-2060.[IF:0.036] (Indexed in Scopus)
100. Vasanthi, V. and M. Hemalatha, 2013. Simulation of Obstruction Avoidance Generously mobility
(OAGM) Model using Graph Theory Technique. Int. J.Research Journal of Applied Science,
Engineering and Technology,5[7]:2799-2808. (Indexed in Scopus)
101. Anny Leema and M.Hemalatha, 2012. Proposed Prediction and cleaning algorithms based on
hybrid approach to deal with anomalies of RFID data in Healthcare. Elsevier Egyptian
Informatics Journal. (Accepted) (Indexed in Scopus)
102. Renuga Devi and M.Hemalatha 2012 A Survey on Online Spam detection Methods in Social
Networking sites, J. of Computer Science. 6(6):333-341
103. Naga Saranya, N. and M.Hemalatha, 2012. IESO Algorithm for Rule Generation and GPLDE
algorithm for Trend Discovery in Spatio-temporal Data.. European J. of Scientific Research.
92(4):548-564 (Indexed in Scopus)
104. S.Senthamilarasu and M.Hemalatha, 2012.Dynamically adaptive count bloom filter for handling
duplicates in Data Stream, Int. J. Engineering and Technology, 4(6): 450-458. (Indexed in
Scopus)
105. S.Senthamilarasu and M.Hemalatha, 2012. Load Shedding Techniques based on windows in
Data Stream Systems. Proceeding IEEE Emerging Trends in Science, Engineering and
Technology, pp68-73
106. Anny Leema, A. and M. Hemalatha, 2012. CBADE - Hybrid Approach for Duplication detection
and Elimination. Computer Networks & Communications (NetCom), Lecture Notes in Electrical
Engineering (LNEE)., 131. Springer. (Indexed in Scopus)
Dr.M.Hemalatha Page 14 of 32
107. Lakshmi Devasena, C. and M. Hemalatha, 2012. Object Detection in Video using Lorenz
Information Measure and Discrete Wavelet Transform. ACM. Advances in Computing,
Communications and Informatics, 1(1): 200-207. (Indexed in Scopus)
108. Sumathi, T. and M. Hemalatha, 2012. A Novel JSVM Approach for Automatic Image Annotation
and Retrieval. Int. J. Computer Applications, 52(10): 10-14. (IF 0.817)
109. Revathi, R. and M. Hemalatha, 2012. An Emerging Trend of Feature Extraction Method in
Video Processing. Computer Science and Information Technology, 5(1): 69-80.
110. Revathi, R. and M. Hemalatha, 2012. Empirical Analysis of Denoising Techniques in Video
Processing. J. Computer Science, 6(4): 225-236.
111. Revathi, R and M. Hemalatha, 2012. Certain Approach of Object Tracking using Optical Flow
Techniques. Int. J. Computer Applications, 53(8): 50-57.(IF 0.835)
112. Sumathi, T. and M. Hemalatha, 2012. Towards Improving Automatic Image Annotation using
Improvised Fractal SMOTE Approach. ACM. Advances in Computing, Communications and
Informatics, 1(1): 704-710.( (Indexed in Scopus))
113. Revathi, R. and M. Hemalatha, 2012. A New Approach for Noise Removal and Video Object
Segmentation using Color Based Fuzzy C-Means Technique. Springer Proc. Advances in
Computing and Information Technology (ASIC), 178(1): 463-472. (Springer) (Indexed in
Scopus)
114. Revathi, R and M.Hemalatha, 2012. Efficient Method for Noise Removal Techniques and Video
Object Segmentation using Color Based Fuzzy C-Means. ACM. Advances in Computing,
Communications and Informatics, 1(1): 1175-1181. (Indexed in Scopus)
115. Revathi, R and M.Hemalatha, 2012. Efficient Method for Feature Extraction on Video
Processing. ACM. Computational Science, Engineering and Information Technology 1(1): 533-
537. (ACM,Scopus)
116. Revathi, R and M.Hemalatha, 2012.Detecting Object in Video frames using optical flow
Technique. Proceeding IEEE Emerging Trends in Science, Engineering and Technology 1(1):
117. Revathi, P and M.Hemalatha, 2012.Classifications of Cotton Leaf Spot Disease using image
processing Edge Detection Technique. Proceeding IEEE Emerging Trends in Science,
Engineering and Technology 1(1):
118. Revathi, P and M.Hemalatha, 2012.Advanced Computing Enrichment Evaluation of cotton Leaf
Spot Disease Detection using Image Pattern. Proceeding IEEE Emerging Trends in Science,
Engineering and Technology 1(1):
119. Revathi, P and M.Hemalatha, 2012. SMS based HPCCD algorithm for the identification of Leaf
Spot Disease. Proceeding Springer Lecture Notes in Electrical Engineerig 221(1):
120. Ajith Singh, N and M. Hemalatha, 2012. An Approach on Semi-Distributed Load Balancing
Algorithm for Cloud Computing System, Int. J. Computer Applications, 56(12): 1-4. (IF 0.8(IF
0.835))
Dr.M.Hemalatha Page 15 of 32
121. Gobinath.R and M.Hemalatha, 2012. Improved Preprocessing Techniques for Analyzing
Patterns in Web Personalization Process, Int. J. Computer Applications,58(3):13-20.
122. Krishnaveni, S and M. Hemalatha, 2012. Query Processing in Distributed Data Warehouse
using Scheduling Algorithms, Special issue Int. J. Computer Applications, 1:07-10 (IF 0.817)
123. Vasanthi.V and Hemalatha.M, 2012. Simulation and Evaluation of Different Mobility Models in
Ad-hoc Sensor Network over DSR Protocol using Bonnmotion tool.Springer
Proc. Int. Conf. Recent Trends in Computer Networks and Distributed Systems Security CCIS
(335); pp 157-167.
124. Vasanthi, V. and M. Hemalatha, 2012. A Proportional Analysis of Dissimilar Mobility Models in
Ad-Hoc Sensor Network over DSR Protocol. Int. J. Computer Applications, 42(15): 26-32. (IF
0.835)
125. Vasanthi, V. and M. Hemalatha, 2012.Mobility scenario of dissimilar mobility models using DSR
protocol in Adhoc Sensor Network- A survey. (Special Issue)Int. J. Computer Applications, 4(1):
1-14 (IF 0.817)
126. Ajith Singh, N. and M. Hemalatha, 2012. Comparative Analysis of Low-Latency on different
Bandwidth and Geographical Locations While using Cloud Based Applications. Int. J. Advances
in Engineering and Technology, 2(1): 393-400.
127. Krishnaveni, S and M. Hemalatha, 2012. Query Scheduling in Distributed Data Warehouse
using DTDS and VMFTRS Algorithms, European J. Scientific Research, 89(4): 612-625.
(Scopus indexed)
128. Krishnaveni, S and M. Hemalatha, 2012. Query Processing in Distributed Data Warehouse
using Proposed Dynamic Task Dependency Scheduling Algorithm, Int. J. Computer
Applications, 55(8): 16-22. (IF 0.835)
129. Nandhakumar, P, M. Hemalatha and Kashyap Dhruve, 2012. Adorning Web Search based on
Ontology Semantics Spaces Provisioned through Web Services, Int. J. Computer Applications,
55(7): 53-60. (IF 0.835)
130. Senthamilarasu, S and M. Hemalatha, 2012. Load Shedding using Window Aggregation
Queries on Data Streams, Int. J. Computer Applications, 54 (9): 42-49. (IF 0.835)
131. Satheshkumar, K and M. Hemalatha, 2012. An Enhanced Approach for Treating Missing Value
using Boosted K-NN, Int. J. Computer Applications, 54(9): 35-41. (IF 0.835)
132. S.Senthamilarasu and M.Hemalatha, 2012. Load Shedding For Window Aggregation Queries
over Sensor Streams Management, J. Computer Science, 6(5): 252-261.
133. Nadiammai, G.V and M. Hemalatha, 2012. Rule Based Classification Approach towards
Detection of Network Intrusions, J. Computer Science, 6(5): 283-290.
Dr.M.Hemalatha Page 16 of 32
134. Nadiammai, G.V and M. Hemalatha, 2012. An Enhanced rule approach for Network Intrusion
Detection using Efficient Data Adapted Decision Tree Algorithm J. Theoratical and Applied
Information Technology, 47(2): 426-433.[IF:1.71] (Scopus Indexed)
135. Nadiammai, G.V and M. Hemalatha, 2012. Anomaly based Hybrid Intrusion detection System
for Identifying Network Traffic. Intl. J. Computer Science and Information Security, 10(10): 30-
35.
136. Naga Saranya, N. and M. Hemalatha, 2012. Estimation of Evolutionary Optimization Algorithm
for Association Rule using Spatial Data Mining. Int. J. Computer Applications, 51(3): 1-5. (IF
0.835)
137. Nadiammai, G.V. and M. Hemalatha, 2012. An Evaluation of Clustering Technique over
Intrusion Detection System. ACM. Advances in Computing, Communications and Informatics,
1(1): 1054-1059. (Scopus)
138. Nadiammai, G.V. and M. Hemalatha, 2012.Perspective Analysis of Machine Learning Algorithm
for Detecting Network Intrusions. Proceeding IEEE computing Communication and Networking
Technologies , 1(1): 1-7. (Scopus)
139. Anny Leema, A. and M. Hemalatha, 2012. Anomaly Detection and Elimination Algorithm for
RFID Data, Int. J. Computer Applications, 49(3): 15-19. (IF 0.835)
140. Sasirekha, N. and M. Hemalatha, 2012. An Improved Secure Code Encryption Approach Based
on Indexed Table. ACM. Advances in Computing, Communications and Informatics, 1(1): 1136-
1142. (Scopus)
141. Sasirekha, N. and M. Hemalatha, 2012. A survey on Software Protection Techniques Against
Various Attacks. Global Journal of Computer Science and Technology, 12(1): 53-58.
142. Sasirekha, N. and M. Hemalatha, 2012. An Enhanced Code Encryption Approach with HNT
Transformations for Software Security. International Journal of Computer Applications, 53(10):
17-23. (IF 0.817)
143. Sasirekha, N. and M. Hemalatha, 2012. An Efficient Secure Code Approach Based on Indexed
Table Quasi Group Encryption with Hadamard and Number Theoretic Transformation for
Software Protection. CCSEIT-12, ACM, 1: 444-451.
144. Sasirekha, N. and M. Hemalatha, 2012. A Thorough Investigation on Software Protection
Techniques against Various Attacks. Bonfring International Journal of Software Engineering and
Soft Computing, 2(3): 10-15.
145. Krishnaveni, S. and M. Hemalatha, 2012. Performance Analysis of Particle Swarm Optimization
Algorithms for Jobs Scheduling in Data Warehouse. Int. J. Advanced Research in Computer
Science, 3(2): 237-241.
Dr.M.Hemalatha Page 17 of 32
146. Revathi, P. and M. Hemalatha, 2012. Computing Performance Evaluation of Cotton Leaves
Spot Diseases Recognition using Image Segmentation. Int. J. Advanced Research in Computer
Science, 3(3): 401-404.
147. Revathi, P. and M. Hemalatha, 2012. Homogenous segmentation based Edge Detection
Techniques for Proficient Identification of the Cotton Leaf Spot Diseases. Int. J. Computer
Applications, 47(2): 18-21(IF 0.835)
148. Naga Saranya, N. and M. Hemalatha, 2012. Integration of machine learning algorithm using
spatial semi supervised classification in FWI data. IEEE Proc. Advance in Engineering, Science
and Management, 1(1): 699-702.(IEEE Xplore)
149. Lakshmi Devasena, C. and M. Hemalatha, 2012. Automatic Text Categorization and
Summarization using Rule Reduction. IEEE Proc. Advance in Engineering, Science and
Management (ICAESM-2012), 1(1): 594-598. (IEEE Xplore)
150. Gobinath.R and M.Hemalatha, 2012. Improved Preprocessing Techniques for Analyzing
Patterns in Web Personalization Process. Int. J. Computer Applications, 58(3): 13-20. (IF 0.817)
151. Ajith Singh.N, Vasanthi.V and M. Hemalatha, 2012, A Brief Survey onArchitecture, Challenges
& Security Benefit in Cloud Computing” Int. J. Information and Communication Technology
Research, 2(2): 102-111.
152. Ajith Singh.N and M. Hemalatha, 2012, Cloud Computing for Academic Environment”
International Journal of Information and Communication Technology Research, 2(2) 97-101.
153. Sumadhi, T. and M. Hemalatha, 2012. A Novel approach for Automatic image annotation
using Enhanced Multi-Instance Differentiation Framework. Procedia Engineering, 38(1): 2694-
2701. (Scopus Indexed)
154. Sumathi, T. and M. Hemalatha, 2012. An Innovative Hybrid Hierarchical Modelfor Automatic
Image Annotation. Springer LNCS, Communication in Computer & Information Science, 2(270):
718-726. (Impact Factor: 1.2)
155. Sumathi, T. and M. Hemalatha, 2012. A Combined Hierarchical Model for Automatic Image
Annotation and Retrieval. IEEE Proc. Advance Computing, 1(1): 135-139. (Impact Factor: 1.2).
156. Krishnaveni, S and M. Hemalatha, 2012. Analysis of Scheduling algorithms in Data Warehouse
for query processing, IEEE Proc. Int. Conf. Emerging trends in science , engineering and
technology, 1(1): 109-114.
157. S.Priya, T.Sumathi, R.Revathi, M. Hemalatha,2012. “Image Based face recognition algorithm-A
Survey. In Proc. Of Int. Conf. on mathematical modeling and applied soft computing.2(1):872-
879.
158. Sumathi, T. and M. Hemalatha, 2011. An Innovative Hybrid Hierarchical Model for Automatic
Image Annotation. Springer LNCS, Communication in Computer and Information Science,
2(270): 718-726
Dr.M.Hemalatha Page 18 of 32
159. Sasirekha.N and M.Hemalatha, 2011. A study on software Security using code of obfuscation
techniques and its evaluation metrics, Proc. Recent Trends and Applications of computing
Technologies, 97-102.
160. Anny Leema, A. and M. Hemalatha, 2011. An Effective and Adaptive Data Cleaning Technique
for Colossal RFID Dataset in Healthcare. WSEAS Transactions on Information Science and
Applications, 6(8): 243-252. (Impact Factor: 0.546)
161. Anny Leema, A. and M. Hemalatha, 2011. Automatic Image Annotation and Retrieval using
Multi-instance Multi-label Learning. Bonfring Int. J. Advances in Image Processing, 1(1): 1-5.
162. Lakshmi Devasena, C. and M. Hemalatha, 2011. Video Mining using LIM Based Clustering and
Self Organising Maps. Procedia Engineering, 2(1): 940-948. (Scopus Indexed)
163. Lakshmi Devasena, C., T. Sumathi and M. Hemalatha, 2011. Effectiveness Evolutional of Rule
Based Classifiers for the Classification of Iris Dataset. Bonfring Int. J. Man Machine Interface,
1(1): 5-9.
164. Lakshmi Devasena, C. and M. Hemalatha, 2011. Object Detection in Video using Clustering
and Classification Techniques. Proc. Recent Advancements in Computing Technology, 1(1):
326-330.
165. Naga Saranya, N., G. Padmapriya, S. Hemalatha and M. Hemalatha, 2011. An Evaluation of K-
means based ANN using Forest Fire Data in Spatial Data Mining. Int. J. Theoretical and Applied
Information Technology, 34(1): 29-33. (Impact Factor: 1.71 Scopus Indexed)
166. Naga Saranya, N. and M. Hemalatha, 2011. Integrating Spatial Data Mining Technique to
Identify Potential Landsat Data using K-Means and BPNN Algorithm. Int. J. Computer
Applications, 30(9): 16-21. (Impact Factor: 0.835)
167. Revathi, P. and M. Hemalatha, 2011. Categorize the Quality of Cotton Seed Based on the
Different Germination of the Cotton using Machine Knowledge Approach. Int. J. Advanced
Science and Technology, 36(1); 9-14. (Impact Factor: 1.5)
168. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. A Comprehensive Analysis and
study in Intrusion Detection System using Data Mining Techniques. Int. J. Computer
Applications, 35(8): 51-56. (Impact Factor: 0.835)
169. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. Evaluating the Yield of Hybrid
Napier Grass with Data Mining Techniques. Int. J. Computer Applications, 35(5): 1-7. (Impact
Factor: 0.835)
170. Revathi, R., P. Revathi, T. Sumathi and M. Hemalatha, 2011. Overview of Image Processing
Techniques - A Survey. Global J. Computer Applications and Technology, 1(4): 512-520.
171. Megala, S, P. SoundarRajan and M. Hemalatha, 2011. An Experimental Study of Pattern
Mining Technique to Improve the Business Strategy. Int. J. Computer Applications, 34(3): 1-5.
(Impact Factor: 0.835)
Dr.M.Hemalatha Page 19 of 32
172. Naga Saranya, N., S. Megala, P. Revathi, G.V. Nadiammai, S. Krishnaveni and M. Hemalatha,
2011. An Efficient PANN algorithm for Effective Spatial Data Mining. Springer LNCS,
Communication in Computer and Information Science, 250(1): 533-537. (Scopus Indexed)
173. Vasanthi, V., N. Ajith Singh and M. Hemalatha, 2011. Evaluation of Protocols and Algorithms to
Improve the Performance of Tcp/Ip over Wireless/Wired networks. Springer LNCS,
Communication in Computer and Information Science, 250(1): 521-525. (Scopus Indexed)
174. Vasanthi, V., N. Ajith Singh and M. Hemalatha, 2011. A Detailed Study of Mobility Model in
Sensor Network. Int. J. Theoretical and Applied Information Technology, 33(1): 7-14. (Impact
Factor: 1.71 Scopus Indexed)
175. Lakshmi Devasena, C. and M. Hemalatha, 2011. Hybrid Image Classification Technique to
Detect Abnormal Parts in MRI Images. Springer LNCS, Communication in Computer and
Information Science, 250(1): 200-208. (Scopus Indexed)
176. Revathi, P., R. Revathi and M. Hemalatha, 2011.Knowledge Discovery in Diagnose of Crop
Diseases using Machine Learning Techniques. Int. J. Engineering Science and Technology,
3(9): 7187-7190. (Impact Factor 3.157)
177. Sumathi, T. and M. Hemalatha, 2011. A Novel Approach for Automatic Image Annotation and
Retrieval. Karpagam J. Computer Science, 5(5): 313-318.
178. Ajith Singh, N., V. Vasanthi, B. Bharathi and M. Hemalatha, 2011. 4G - Fourth Generation
Wireless Systems Requirements and Technical Challenges. Journal of Theoretical and Applied
Information Technology, 31(1): 29-35. (Impact Factor: 1.71 Scopus Indexed)
179. Revathi, P., R. Revathi and M. Hemalatha, 2011. Comparative Study of Knowledge in Crop
Disease Using Machine Learning Techniques. Int. J. Computer Science and Information
Technologies, 2(5): 2180-2182. (Impact Factor:0.29)
180. Lakshmi Devasena, C. and M. Hemalatha, 2011. Noise Removal in Magnetic Resonance
Images using Hybrid KSL Filtering Technique. Int. J. Computer Application, 27(8): 1-4. (Impact
Factor: 0.835)
181. Sumathi, T. and M. Hemalatha, 2011. An Innovative Image Fusion Algorithm Based on Wavelet
Transform and Improved Discrete Fast Curvelet Transform. Cent. Euro. J. Computer Science,
1(3): 329-340. (Indexed Scopus)
182. Edwin Robert, A., G. Manivasagam, N. Sasirekha and M. Hemalatha, 2011. Reverse
Engineering for Malicious Code Behavior Analysis using Virtual Security Patching. Int. J. of
Computer Applications, 26(4): 41-45. (Impact Factor: 0.835)
183. Sasirekha, N., A. Edwin Robert and M. Hemalatha, 2011. Program Slicing Techniques and its
Applications. Int. J. Software Engineering and Applications, 2(3): 50-64. (Impact Factor: 0.835)
184. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Hybrid Image Mining Technique using LIM
based Data mining Algorithm. Int. J. Computer Application, 25(2): 1-5. (Impact Factor: 0.835)
Dr.M.Hemalatha Page 20 of 32
185. Lakshmi Devasena, C., R. Radha Krishnan and M. Hemalatha, 2011. An Enhanced Algorithm
for Mining Color Images – A Novel Approach. CiiT. Int. J. Data mining and Knowledge
Engineering, 3(9): 550-554. (Impact Factor: 0.645)
186. Sumathi, T., A. Edwin Robert, B. Bharathi and M. Hemalatha, 2011. Image Fusion Algorithm
based on Wavelet Transform and IDFC Transform. Int. J. GJACT, 1(2): 184-190. (Impact
Factor: 0.242)
187. Sumathi, T. and M. Hemalatha, 2011. A Combined Hierarchical Model for Automatic Image
Annotation and Retrieval. IEEE Proc. Advance Computing, 1(1): 324-329. (Impact Factor: 1.2).
188. Sumathi, T., C. Lakshmi Devasena, R. Revathi, S. Priya and M. Hemalatha, 2011. Automatic
Image Annotation and Retrieval using Multi-instance Muli-label Learning. Bonfring Int. J.
Advances in Image Processing, 1(1): 1-5.
189. Sumathi, T., P. Nagarajan and M. Hemalatha, 2011. An Empirical Study on Image/Video
Retrieval Techniques Grand Challenges and Trends. Int. J. Computer Information System, 2(6):
20-26. (Impact Factor: 0.242)
190. Lakshmi Devasena, C., R. Revathi and M. Hemalatha, 2011. Video Surveillance System – A
Survey. Int. J. Computer Science Issues, 8(4): 635-642. (Impact Factor: 0.242)
191. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Novel Method to Improve Video
Compression for Video Surveillance Applications using SPIHT Algorithm. Int. J. Advanced
Research in Computer Science, 2(4): 119-125. (Impact Factor: 0.242)
192. Lakshmi Devasena, C., T. Sumathi and M. Hemalatha, 2011. An Experiential Survey on Image
Mining Tools, Techniques and Applications. Int. J. Computer Science and Engineering, 3(3):
1155-1167.
193. Krishnaveni, S. and M. Hemalatha, 2011. A Perspective Analysis of Traffic Accident using Data
Mining Techniques. Int. J. Computer Applications, 23(7): 40-48. (Impact Factor: 0.835)
194. Hemalatha, M., P. Revathi, S. Megala and N. Naga Saranya, 2011. Advanced Data Mining
Techniques for Classifications of Agricultural Facts. IEEE Proc. Int. Conf. Machine Learning and
Computing, 1(1): 213-217. (IEEE Xplore)
195. Hemalatha, M., B. Kavitha, Shanmugapriya and S. Karthikeyan, 2011. An Emerging Method of
Intuitionistic Fuzzy set for Breast Cancer Diagnosis. IEEE Proc. of Machine Learning and
Computing, 2(1): 203-210.
196. Hemalatha, M. and S. Megala, 2011. Mining Techniques in Health Care: A Survey of
Immunization. J. Theoretical and Applied Information Technology, 25(2): 64-70. (Impact Factor:
1.71 Scopus Index)
197. Megala, S. and M. Hemalatha, 2011. A Novel Data Mining Approach to determine the Vanished
Agricultural Land in Tamil Nadu. Int. J. Computer Application, 23(3): 213-217. (Impact Factor:
0.835)
Dr.M.Hemalatha Page 21 of 32
198. Naga Saranya, N. and M. Hemalatha, 2011. Potential Research into Spatial Cancer Database
by using Data Clustering Technique. Int. J. Computer Science and Information Security, 9(5):
168-173. (Impact Factor: 0.243)
199. Hemalatha, M. and N. Naga Saranya, 2011. A Recent Survey on Knowledge Discovery in
Spatial Data Mining. Int. J. Computer Science Issues, 8(3): 473-479. (Impact Factor: 0.832)
200. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Comparative study of Hybrid LIM based
Image Matching Techniques for mining Image Databases. Int. J. Knowledge Management and
e-Learning, 3(1): 61-65.
201. Anny Leema, A. and M. Hemalatha, 2011. Optimizing Operational Efficiency and Enhancing
Data Reliability using Effective and Adaptive Cleaning Approach for RFID in Healthcare, Int. J.
Computer Applications, 3(7): 26-29. (Impact Factor: 0.835)
202. Revathi, P. and Hemalatha,M, 2011. Efficient Classification Mining Approach for Agriculture. Int.
J. Research and Reviews in Information Sciences, 1(2): 42-45. (Impact Factor: 0.242)
203. Sumathi, T., C. Lakshmi Devasena and M. Hemalatha, 2011. An Overview of Automated Image
Annotation Approaches. Int. J. Research and Reviews in Information Science, 1(1): 1-6.
(Impact Factor: 0.242)
204. Vasanthi, V. and M. Hemalatha, 2011. Empirical Study on Security Attacks in Wireless Sensor
Network. Int. J. Advanced Research in Computer Science, 2(1): 23-28.
205. Sumathi, T. and M. Hemalatha, 2011. Semantic Web Image Search through Manual
Annotation. Int. J. Computer Application, 17(8): 39-42. (Impact Factor: 0.835)
206. Hemalatha, M. and A. Anny Leema, 2011. Applying RFID Technology to Construct an Elegant
Hospital Environment. Int. J. Computer Science Issue, 8(3): 444-448. (Impact Factor: 0.242)
207. Vasanthi, V., P. Nagarajan, B. Bharathi and M. Hemalatha, 2010. A Perspective Analysis of
Routing Protocols in Wireless Sensor Network. Int. J. Computer Science and Engineering 2(8):
2511-2518.
208. Anny Leema, A. and M. Hemalatha, 2010. A proposed system to solve the drawbacks of
Association Rule Mining in E-learning. J. Computer Applications, 3(2): 13-19.
209. Sumathi, T. and M. Hemalatha, 2010. An Empirical study on Performance Evolution in
automatic Image Annotation and Retrieval. Int. J. Advanced Research in Computer Science,
1(4): 13-17.
210. Hemalatha, M., N. Sasirekha, S. Easwari and N. Naga Saranya, 2010. An Empirical Model for
Clustering Classification of Instrumental Music using Machine Learning Technique. IEEE Proc.
Computational Intelligence and Computing Research, 1-7. (IEEE Xplore)
211. Hemalatha, M. and A. Anny Leema, 2010. Software Architecture for Semantic Web Mining In
the Parallel Distributed Environment. IEEE Proc. Computational Intelligence and Computing
Research, 72-78.
Dr.M.Hemalatha Page 22 of 32
212. Anny Leema, A., P. Sudhakar, R.S.D. Vahidabanu and M. Hemalatha, 2010. RFID Data
Management and its Applications in Hospital Environment. Int. J. Advances in Science and
Technology, 1(5): 53-108.
213. Anand Kumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative Analysis
of IPv4 and IPv6 to evaluate Performance. Int. J. Computer and Network Security, 2(7): 27-31.
214. Anand kumar, M., M. Hemalatha, P. Nagaraj and S. Karthikeyan, 2010. A New Way towards
Security in TCP/IP Protocol Suite. Latest Trends on Computers, 1(1): 46-50. (Indexed in
Scopus)
215. Anandkumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. A Large Capacity
Steganography using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video.
Int. J. Computer and Network Security, 2(7): 67-70.
216. Hemalatha, M., R. Jeyadev and V.K. Gopalakrishnan, 2009. Predicting HIV drug resistance
using neural networks. IJCIB, 1(2): 69-74.
217. Hemalatha, M. And K. Vivekanandan, 2009. FART Based Neural Network for Probabilistic Motif
Discovery in Unaligned Biological Sequences. IEEE Proc. Datamining and its applications, 2(1):
714-801.
218. Hemalatha, M. and D. Sathya Srinivas, 2009. Hybrid Neural Network Model for Web Document
Clustering. IEEE Proc. Applications of Digital Information and Web Technologies (ICADIWT
'09), 2(1): 531-538.
219. Hemalatha, M., S. Karthikeyan and E. Ramaraj, 2009. A Design of Security Protocol using
Hybrid Encryption Technique AES-Rijndael and RSA. Int. J. Computer, Internet and
Management, 17(1): 78-86. (Indexed in Scopus)
220. Hemalatha, M. and K. Vivekanandan, 2008. A Simple Statistical Model for Probabilistic Motif
Discovery in Multiple Aligned Sequences. Euro. J. Scientific Research, 19(3): 608-613.
(Indexed in Scopus) (IF 0.735)
221. Hemalatha, M. and K. Vivekanandan, 2008. A Distributed and Parallel Clustering Algorithm for
Massive Biological Data. J. Convergence and Information Technology, 3(4): 84-88. (Indexed in
Scopus)
222. Hemalatha, M. and K. Vivekanandan, 2008. A Semaphore Based Multiprocessing K-Mean
Algorithm for Massive Biological Data. Asian J. Scientific Research, 1(4): 444-450. (Indexed in
Scopus)
223. Hemalatha, M. and K. Vivekanandan, 2008. Genetic Algorithm Based Probabilistic Motif
Discovery in Multiple Unaligned Biological Sequences. Int. J. Computer Science, 4(8): 625-630.
(Indexed in Scopus)(IF 1.35)
224. Hemalatha, M. and K. Vivekanandan, 2007. Phylogenetic Tree Construction using Simple SVD
based Distance Metrics. Int. J. Computer Science and System Analysis, 1(2): 103-110.
Dr.M.Hemalatha Page 23 of 32
225. Hemalatha, M. and K. Vivekanandan, 2007. A Scalable and High Performance Sorting
Algorithm to Analyze Massive Biological Data. Int. J. System Analysis and Design, 1(1): 37-45.
226. Hemalatha, M., 2007. Medical informatics. Tamil Computer, 16 24: 1-7.
227. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An Analysis of Key Management in
Transport Layer Security Standard. Punjab College of Technical Education J. Computer
Sciences, 2(2): 5-9.
228. Hemalatha, M., S. Karthikeyan and V.V. Gomathi, 2006. Data Mining Knowledge Discovery
Database. Tamil Computer, 1218: 4-8.
229. Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An Efficient Algorithm for Predicting
Survival of Medical Data EPSA. Int. J. Technology, Knowledge and Society, 2(1): 37-48.
(Indexed in Scopus)
230. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A New Approach of Hybrid Encryption
Technique in Database Security. Int. J. Technology, Knowledge and Society, 2(4): 55-60.
231. Hemalatha, M. and E. Ramaraj, 2006. An Improvement of Eun-Jun-Kyung-Kee’s Remote User
Authentication Scheme in Smart Card using Hybrid Encryption. J. Computer Science, 1(4): 293-300.
(Indexed in Scopus)
232. Hemalatha, M., 2005. Database Search and Retrieval System for Bacteria. Bioinformatics
INDIA, 3(1): 37-42.
233. Hemalatha, M., 2005. A Data Mining Tool to Increase Human Life Days from Affecting Cardiac
Arrest. Bioinformatics INDIA, 3(4): 96-111.
234. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An Improvement of Security in the
Insecurity of 802.11 using Hybrid Encryption AES-Rijndael and RSA. Indian J. Information
Science and Technology, 1(1): 18-26.
International Conferences
1. S.Senthamilarasu and M.Hemalatha, 2012, Load shedding techniques based on windows in
data stream systems,IEEE. International Conference Emerging Trends in Science, Engineering
and Technology (INCOSET), 13&14 Dec.
2. S.krishnaveni and M.Hemalatha, 2012, Analysis of Scheduling Algorithms in Data Warehouse
for Query Processing, . International Conference Emerging Trends in Science, Engineering and
Technology (INCOSET), 13&14 Dec
3. R.Revathi and M.Hemalatha, 2012, Detecting objects in video frames using optical flow
techniques,. International Conference Emerging Trends in Science, Engineering and
Technology (INCOSET), 13&14 Dec .
4. P.Revathi and M.Hemalatha, 2012, Classification of Cotton Leaf Spot Diseases Using Image
Processing Edge Detection Techniques, International Conference Emerging Trends in Science,
Engineering and Technology (INCOSET), 13&14 Dec.
Dr.M.Hemalatha Page 24 of 32
5. S.krishnaveni and M.Hemalatha,2012, Query Processing in Distributed Data Warehouse using
Scheduling Algorithms, . 2nd Int. Conf. Issues and Challenges in Networking, Intelligence and
Computing Technologies (ICNICT 2012), 7&8 Sep.
6. V.Vasanthi and M.Hemalatha,2012, Mobility Scenario of Dissimilar Mobility Model using the
DSR protocol in Ad-hoc Sensor network-A Survey, 2nd Int. Conf. Issues and Challenges in
Networking, Intelligence and Computing Technologies (ICNICT 2012), 7&8 Sep..
7. V.Vasanthi and M.Hemalatha,2012, Simulation and Evaluation of different mobility model using
DSR protocol Ad-hoc Sensor Network Using Bonnmotion Tool Security in computer networks
and distributed systems (SNDS), 11 th oct .
8. S.Senthamilarasu and M.Hemalatha,2012, Handling duplicate Records using Density Bloom
Filter in Data stream, International conference on Advanced Technologies for Research &
Product Development (ICATRPD),Sept.3&4 2012.
9. K.Satheshkumar and M.Hemalatha,2012, Feature Selection Based onRanking Approach
Correlation Filter for Information Retrieval , International conference on Advanced Technologies
for Research & Product Development (ICATRPD),Sept.3&4.
10. R.Renugadevi and M.Hemalatha,2012, Analysis of Hidden Community Fraud Detection
Methods in Social Area Networks, , International conference on Advanced Technologies for
Research & Product Development (ICATRPD),Sept.3&4..
11. R.Revathi and M.Hemalatha,2012, An Emerging Trend of Feature Extraction Method in Video
Processing, 2nd Intl Conf on Computer Science, Engineering and Application (CCSEA 2012),
May 26& 27.
12. R.Revathi and M.Hemalatha,2012 Efficient Method For Noise Removal Techniques And Video
Object Segmentation Using Color Based Fuzzy C-Means. International Conference on
Advances in Computing, Communications and Informatics (ICACCI-2012), Aug 3- 5.
13. G.V.Nadiammai and M.Hemalatha,2012 An Evaluation of Clustering Technique over Intrusion
Detection,International Conference on Advances in Computing, Communications and
Informatics (ICACCI-2012), Aug 3- 5.
14. G.V.Nadiammai and M.Hemalatha,2012 , Perspective Analysis of Machine Learning Algorithm
for Detecting Network Intrusion, Third International Conference on Computing Communication
and Networking Technologies (ICCCNT), 26- 28 July.
15. P.Revathi and M.Hemalatha,2012 , Advance Computing Enrichment Evaluation of Cotton
Leaves Spot Diseases Detection Using Image Pattern, Third International Conference on
Computing Communication and Networking Technologies (ICCCNT), 26- 28 July..
16. R.Revathi and M.Hemalatha,2012, Efficient Method for Feature Extraction on Video
Preprocessing. 2nd International Conference on Computational Science, Engineering and
Information Technology (CCSEIT-2012), October 26-28.
17. S.Priya, R.Revathi ,T.Sumathi and M.Hemalatha,2012, Efficient Method for Feature Extraction
on Video Preprocessing. 3rd Intl Conf on Intelligent Information Systems and Management
(IISM) 12 - 14 July.
Dr.M.Hemalatha Page 25 of 32
18. S.Priya, R.Revathi ,T.Sumathi and M.Hemalatha,2012, Image Based Face Recognition
Algorithms - A Survey. Int. Conf on Mathematical Modeling and Applied Soft Computing
(MMASC-2012). 11-13 July.
19. P.Revathi and M.Hemalatha,2012 , SMS Based HPCCDD Algorithm For the Identification of
Leaf Spot Diseases, International conference Signal and Image Processing (ICSIP) Dec 14-15.
20. M. Hemalatha, Kavitha.B, Shanmugapriya and Karthikeyan.S, 2011. An Emerging Method of
Intuitionistic Fuzzy set for Breast Cancer Diagnosis. IEEE Proc. Int. Conf. Machine Learning
and Computing, Singapore. Feb. 26-28.
21. M. Hemalatha, Sasirekha.N and Edwin Robert.A, 2011. Novel Obfuscation Algorithms for
software Security. Int. Conf. Networks Intelligence and Computing Technologies (ICNICT 2011),
Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.
22. M. Hemalatha, Edwin Robert.A and Sasirekha.N, 2011.Advanced Reverse Engineering Process
for Performing and Tuning Malicious Code Behavior. Int. Conf. Networks Intelligence and
Computing Technologies (ICNICT 2011), Dept. Computer Science, Karpagam University,
Coimbatore, Dec. 15-16.
23. M. Hemalatha, and Naga Saranya.N, 2011. Discovery of Optimized Spatial Association Rule
Mining in Spatial Datasets. Int. Conf. Networks Intelligence and Computing Technologies
(ICNICT 2011), Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.
24. M. Hemalatha, and Nadiammai. G.V, 2011. Overview of (Network Intrusion Detection using
Data Mining Techniques. Int. Conf. Networks Intelligence and Computing Technologies (ICNICT
2011), Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.
25. M. Hemalatha, and Krishnaveni.S, 2011. Analysis of Success Factors in Data Warehouse. Int.
Conf. Networks Intelligence and Computing Technologies (ICNICT 2011), Dept. Computer
Science, Karpagam University, Coimbatore, Dec. 15-16.
26. M. Hemalatha, and Vasnthi.V, 2011. Impact of Different Mobility Models using Dsr Protocol for
Wireless sensor Networks. Int. Conf. Networks Intelligence and Computing Technologies
(ICNICT 2011), Dept. of Computer Science, Karpagam University, Coimbatore, Dec. 15-16.
27. M. Hemalatha, and Ajith Singh.N, 2011. Cloud Computing: Better Accountability with E-
Governance. Int. Conf. Networks Intelligence and Computing Technologies (ICNICT 2011),
Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.
28. M. Hemalatha, and Nandakumar.P, 2011. Web of Belief based Quality Ranking for Efficient
Semantic Web Data Access. Int. Conf. Networks Intelligence and Computing Technologies
(ICNICT 2011), Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.
29. M. Hemalatha, Lakshmi Devasena.C, Sumathi.T, Gomathi.V.V and MalarKodi.R, 2011.
Predicting Effectiveness of Rule Based Classifiers for a Classification Problem. Int. Conf.
Networks Intelligence and Computing Technologies (ICNICT 2011), Dept. Computer Science,
Karpagam University, Coimbatore, Dec. 15-16.
30. M. Hemalatha, Sumathi.T, Lakshmi Devasena.C, Revathi.R and Priya.S, 2011. Automatic
Image Annotation and Retrieval using Multi-Instance Multi-Label Learning-A Review. Int. Conf.
Dr.M.Hemalatha Page 26 of 32
Networks Intelligence and Computing Technologies (ICNICT 2011), Dept. Computer Science,
Karpagam University, Coimbatore, Dec. 15-16.
31. M. Hemalatha and Anny Leema.A, 2010. Software Architecture for Semantic Web Mining in the
Parallel Distributed Environment. ICCIC 2010. Tamilnadu College of Engineering, Coimbatore.
Dec. 29.
32. M. Hemalatha, Sasirekha.N, Easwari.S, Naga Saranya.N, 2010. An Empirical Model for
Clustering and Classification of Instrumental Music using Machine Learning Technique. IEEE
Int. Conf. Computational Intelligence and Computing Research, Tamilnadu College of
Engineering, Coimbatore. Dec.28-29.
33. M. Hemalatha and Sumathi.T, 2010. WTMS – A Novel Web Text Mining System. Computer
Applications for Managerial Excellence, NCCAME 2010. pp: 165-173.
34. M. Hemalatha and Lakshmi Devasena.C, 2010. Image/ Video Retrieval Technique: Grand
Challenges and Trends. NCOADMINS - 2010, 1(1); 97-106.
35. Anandkumar.S, Appadurai,K, Nagarajan.P and M. Hemalatha, 2010. An efficient approach
towards Security in TCP/IP Protocol suite. 1st Int. Conf. Intelligent Information Systems and
Management, RVS Engineering College of Engineering, Coimbatore.
36. M. Hemalatha and Sathya Srinivas.D, 2009. Hybrid Network model for efficient Web Document
Clustering. IEEE 2nd Int. Conf. Applications of Digital Information and Web Technologies,
London, Aug. 4-6.
37. M. Hemalatha and Karthikeyan.S, 2009. Neural Network model for Web Document Clustering.
Proceedings of 8th Int. Conf. World Scientific Engineering Academy and Society, Hangzhou,
China. May 20-22.
38. M. Hemalatha, Vivekanandan.K, 2009. An efficient Neural Network based Hybrid Model for
Web Document Clustering. Int. Conf. Computer Science and Engineering, World Academy of
Science, Engineering and Technology, Rome, Italy, Apr. 28-30.
39. M. Hemalatha and Vivekanandan.K, 2009. FART based Neural Network for Probabilistic Motif
Discovery in Unaligned Biological Sequences. Int. Conf. Data mining and its Application, Int.
Association of Engineers and Computer Scientists and IEEE, Hongkong, Mar.18-19.
40. M. Hemalatha and Vivekanandan.K, 2008. A Generic Architecture for parallel clustering of high
dimensional data. Int. Conf. Data and Knowledge Management, Department of Computer
Science and Engineering , Bishop Herber College. Feb. 9.
41. M. Hemalatha and Vivekanandan.K, 2008. An efficient SVD based Model for Phylogentic
construction. Int. Conf. computer science and engineering, World Academy of Science,
Engineering and Technology, Egypt. Feb. 9.
Dr.M.Hemalatha Page 27 of 32
42. M.Hemalatha and Vivekanandan.K, 2006. High performance Sorting Algorithm to analyze Micro
array data. Int. Conf. Bioinforamtics, Department of Biotechnology, Govt of India, Jawaharlal
Nehru University, Dec. 18-20.
43. M. Hemalatha and Vivekanandan.K, 2006. An efficient Algorithm for Text Mining. Int. Conf.
Bioinforamtics, Department of Biotechnology, Govt of India, Jawaharlal Nehru University. Dec.
18-20.
44. M. Hemalatha, Karthikeyan.S, and Ramaraj.E, 2005. A new approach of Hybrid Encryption
Technique in Database Security. 2nd Int. Conf. Technology Knowledge and Society, Hyderabad.
Dec. 12-15.
45. M. Hemalatha, Gomathi.V.V and Karthikeyan.S, 2005. An Efficient Algorithm for Predicting
Survival of Medical Data (Epsa). 2nd Int. Conf. Technology Knowledge and Society, Hyderabad.
Dec. 12-15.
46. M. Hemalatha, Karthikeyan.S, and Ramaraj.E, 2005. A new approach of secure protocol using
hybrid encryption technique. Int. Conf. Business Economics and Finance (ICBEFT2005),
Adaikalamatha College, Thanjavur. Sep.29-30.
47. M. Hemalatha, Karthikeyan.S, and Ramaraj.E, 2005. An Analysis path Recovery Schemes in
Intra and Internet using optical fiber network communication using GMPLS. Int. Conf. Business
Economics and Finance (ICBEFT2005), Adaikalamatha College, Thanjavur. Sep. 29-30.
48. M. Hemalatha and V.V.Gomathi, 2005. An Efficient Algorithm for Web Mining. 16th Int. Conf.
IRMA 2005, Information Resource Management Association, San Digo, California and USA.
49. M. Hemalatha, Karthikeyan.S and Gopalakrishnan.V.K, 2004. Methods to Solve the Pitfalls of
Shannon’s Information Theory in DNA Sequence Analysis. Int. Conf. Number Theory and
Fourier Techniques (ICNFT), Srinivasa Ramanujan Center, Sastra University, Kumbakonam.
Dec. 19.
50. National level conference on MOTIF’03 Organized by department of Bioinformatics, Bharathiar
University, Coimbatore.
National Conferences
1. Ajith Singh. N and M. Hemalatha, 2012. High Performance Computing Network for Cloud
Environment using Simulators. National Conference on High Performance Computing (HPC
‘12), Kongu Engineering College, Perunthurai. Mar. 14-15.
2. Senthamilarasu. S and M. Hemalatha, 2012. Proficient Data Stream Algorithms using Wireless
Sensor Network. National Conference on Advances in Computing, Control, Communication,
Automation and Structural Engineering (ACCCAS’12), Al-Ameen Engineering College, Erode,
Mar. 10.
3. Sathesh Kumar. K and M. Hemalatha, 2012. A Decentralised Multi-Agent Ontology-Based
System for Information Retrivel with Data Mining in Cloud Computing Environment. National
Dr.M.Hemalatha Page 28 of 32
Conference on Advances in Computing, Control, Communication, Automation and Structural
Engineering (ACCCAS’12), Al-Ameen Engineering College, Erode, Mar. 10.
4. Gopinath. R and M. Hemalatha, 2012. A Visual Data Mining Approach Discovering Structure in
Geographical Metadata. National Conference on Advances in Computing, Control,
Communication, Automation and Structural Engineering (ACCCAS’12), Al-Ameen Engineering
College, Erode, Mar. 10.
5. Senthamilarasu. S and M. Hemalatha, 2012. An Efficient Data Stream Algorithms using
Wireless Sensor Network. National Conference on Electro Communique Eludo ’12,
Ranganathar Engineering College, Coimbatore. Mar. 7.
6. Krishnaveni. S and M. Hemalatha, 2012. Performance Analysis of Particle Swarm Optimization
Algorithms in Jobs Scheduling for Data Warehouse. National Conference on Simulations in
Computing Nexus (NCSCN 12), Coimbatore Institute of Engineering and Technology,
Coimbatore. Mar. 2.
7. Vasanthi. V and M. Hemalatha, 2012. A Review on Path Planning Algorithms for Ad-Hoc
Wireless Sensor Network. National Conference on Simulations in Computing Nexus (NCSCN
12), Coimbatore Institute of Engineering and Technology, Coimbatore. Mar. 2.
8. Sasirekha. N and M. Hemalatha, 2011. Using Program Slicing to Identify Faults in software.
National Seminar on Emerging Trends and Applications of Information Technology (NSETAIT-
2011), Vidyasagar College of Arts and Science, Udumalpet. Feb. 12.
9. N.Sasirekha and M.Hemalatha, 2011. Green Computing – New Horizon of Energy Efficiency
and E-Waste Minimization. National Conference on Advanced Computing Technologies
(NCACT’11), Vidyasagar College of Arts and Science, Udumalpet. Feb. 25.
10. N.Sasirekha and M.Hemalatha, 2011. A Survey on Program Slicing Techniques. National
Conference on Advanced Computing Technologies (NCACT’11), Vidyasagar College of Arts
and Science, Udumalpet, Feb. 25.
11. M. Hemalatha, Sasirekha.N and Naga Saranya.N, 2010. An Empirical Study on Agile Principles
of Extreme Programming. 2nd National Conference on Advanced Computing (NCAC’10),
D.J.Academy for Managerial Excellence, Coimbatore. Sep. 24-25.
12. M. Hemalatha and Anny Leema.A, 2010. A Proposed Method to Solve the Drawbacks of
Association Rule in E-Learning. Emerging Issues in Computer Applications, K.S.R College of
Engineering, Tiruchengode. Feb. 20.
13. M. Hemalatha and Anny Leema.A, 2010. Proposed System on E-Learning Behavior Mine
System. NETCIT 2010, Sona College of Technology, Salem. Mar.26.
14. M. Hemalatha and Anny Leema.A, 2010. Measuring the Reliability of Students Behavior in E-
Learning. NCICE 2010, CMS College of Engineering, Coimbatore. March.
15. M. Hemalatha and Anny Leema.A, 2010. Enhanced Web-based Learning Environment.
NCCCINM 2010, Karpagam Engineering, Coimbatore. Mar. 25.
16. M. Hemalatha, S.Akila, C.V.Vincy Mary and V.K.Gopalakrishnan, 2009. A New Approach For
Prokarytoic Target Identification (Bacteria). UGC and DBT Sponsored National Conference on
Biocomputing, Department of Zoology, Annamalai University, Chidambaram. Feb. 23-24.
Dr.M.Hemalatha Page 29 of 32
17. M. Hemalatha, S.Akila, A.Kavitha and V.K.Gopalakrishnan, 2009. An Efficient Algorithm For
Constructing Phylogenetic Tree. UGC and DBT Sponsored National Conference on
Biocomputing, Department of Zoology, Annamalai University, Chidambaram. Feb. 23-24.
18. M. Hemalatha, N.Kavitha and S.Karthikeyan, 2009. An Analysis of Path Recovery Schemes in
Optical Network Communication using Generalized Multi Protocol Label Switching (GMPLS).
Computer Society of India sponsored National Conference on Advanced computing and IT
applications, KGISL Arts and Science College, Coimbatore, March.
19. M. Hemalatha, N.Kavitha and S.Karthikeyan, 2009. An effective approach for load balancing
analysis in Distributed environment. National Conference on soft computing, image processing,
Network and Data Management, Karpagam College of Engineering, Coimbatore. Mar. 25-26.
20. M. Hemalatha and R.Rathish, 2007. Rice Transcription Micro array Analysis and Comparative
Genomic Analysis of Rice and Arabbidiopsis. National Conference on Emerging Trends in
Biotechnology, Vivekanandha College of Engineering for women, Erode.
21. M. Hemalatha and R. Rathish, 2007. Approaches on Assigning Functionality to a predicted
Gene Using Sequence Analysis Tools. National Conference on Trends and Applications of
Bioinformatics, Bharath University, Chennai.
22. M. Hemalatha and Sathish, 2007. In Slico approaches to gene prediction on the Human X
chromosome Xq22, National Conference on Trends and Applications of Bioinformatics, Bharath
University, Chennai.
23. M. Hemalatha, Devika and Ann Mary Das, 2007. Bacterial Target Identification. National
Conference on Trends and Applications of Bioinformatics, Bharath University, Chennai.
24. M. Hemalatha, 2007. Computational Proteomic Analysis on Erythrocyte Membrane Protein 1”,
Which Binds Human Immunoglobulin. National Conference on Trends and Applications of
Bioinformatics, Bharath University, Chennai.
25. M. Hemalatha, 2007. Comparative Analysis of Compression Techniques for Fast Retrieval of
Association Rule Mining. Conference on Data mining and its Application, Gobi Arts and Science
College, Gobichettipalayam.
26. M. Hemalatha, 2005. Iterative Dichotomizer3 Algorithm on Functional Genomics. UGC
Sponsored National Conference on Distributed Networks, Gobi Arts and Science College,
Gobichettipalayam.
27. M. Hemalatha, 2005. Applying Data mining Techniques to Micro Array Data. UGC Sponsored
National Conference on Distributed Networks, Gobi Arts and Science College,
Gobichettipalayam.
28. M.Hemalatha, 2005. The New Approach of Secure Protocol using Smart card with Hybrid
Encryption Technique. UGC sponsored State level conference on Wireless communication Sep
2005, Kongu Nadu Arts and Science College, Coimbatore.
29. M.Hemalatha, 2005. An algorithamatic Approach. E-Cluster Affinity Search Techniques. UGC
Sponsored National Conference on Distributed Networks, Gobi Arts and Science College,
Gobichettipalayam.
Dr.M.Hemalatha Page 30 of 32
30. M.Hemalatha, 2005. A Suitable Sorting and Pattern Classification Algorithm for Analyzing Micro
Array Data. UGC sponsored National Conference on Data mining and its Applications,
Annamalai University, Chidambaram.
31. M.Hemalatha, 2005. A Tool for Analyze Medical Data Using Data Mining Techniques. UGC
sponsored National Conference on Data mining and its Applications, Annamalai University,
Chidambaram.
32. M.Hemalatha, V.V.Gomathi, and S.Karthikeyan, 2005. IT in Modern Health Care Systems. UGC
Sponsored National Conference on Information Technology Industry-Challenges and
Opportunities, Erode Arts College, Erode.
33. M.Hemalatha, V.V.Gomathi, and S.Karthikeyan, 2005. A conceptual Framework for the role of
IT in Managing diversity in Global Business. UGC Sponsored National Conference on
Information Technology Industry-Challenges and Opportunities, Erode Arts College, Erode.
34. M.Hemalatha, V.V. Gomathi, and S. Karthikeyan, 2005. Role of IT in Biology. UGC Sponsored
National Conference on Information Technology Industry-Challenges and Opportunities, Erode
Arts College, Erode.
35. M.Hemalatha, 2004. Pattern Recognition Techniques in Microarray data analysis. UGC
sponsored National Conference on Distributed Database and Computing, Department of
Computer Science, Gobi Arts and Science College, Gobichettipalayam.
36. M.Hemalatha, V.V.Gomathi and S.Karthikeyan, 2004. Spatial Data mining Techniques for
medical image classification. UGC sponsored National Conference on Networking and
Multiagent Systems, Department of Computer Science, Gobi Arts and Science College,
Gobichettipalayam.
37. M.Hemalatha, 2004. Association Rule mining in Biological data. UGC sponsored National
Conference on Networking and Multiagent Systems, Department of Computer Science, Gobi
Arts and Science College, Gobichettipalayam.
38. M.Hemalatha, V.V.Gomathi and S.Karthikeyan, 2004. Analysis of Melanoma skin cancer
diagnosis by spatial data mining methods. UGC sponsored National Conference on Networking
and Multiagent Systems, Department of Computer Science, Gobi Arts and Science College,
Gobichettipalayam.
39. M.Hemalatha and Shalini Sridhar, 2004. Evolution and Phylogenetic. National Level conference
on MOTIF’04, Department of Bioinformatics, Bharathiar University, Coimbatore. (3rd Prize).
40. M.Hemalatha, 2004. Protein Modeling by HMM. National level conference MOTIF’04,
Department of Bioinformatics, Bharathiar University, Coimbatore.
41. M.Hemalatha, 2004. Protein Sequence Analysis by HMM. National level conference Biological
Congress, Muthayammal College of Arts and Science, Rasipuram.
42. M.Hemalatha, V.V.Gomathi and S.Karthikeyan, 2004. Data mining Techniques in Micro Array
Data Analysis. National Conference on Emerging Technologies and Applications, Navarasam
Arts and Science College for Women, Erode.
Dr.M.Hemalatha Page 31 of 32
43 M.Hemalatha, 2003. A New integrated Video Sensor Technology for Traffic Management
Application. National Level Seminar organized by Department of Electronics, Karpagam Arts
and Science College, Coimbatore.
44 M.Hemalatha and M.Kanchana, 2003. Stochastic Modeling By HMM. UGC sponsored National
conference, Department of Mathematics, Gandhigram University, Dindigual.
45 M.Hemalatha and M.Kanchana, 2003. Mathematical modeling in Protein Modeling. UGC
sponsored National conference on Mathematical Modeling, Department of Mathematics,
Gandhigram University, Dindigual.
1. One day Workshop on “Matlab – Research Tool ”, Organized by Department of Computer
Application , GRD College of Arts and Science , September, 2009
2. One day Workshop on “A Step Towards research- an introductory course in Latex”, Organized by
Department of Computer Application, DJ Academy of Managerial Excellence, 31st January, 2009
3. Training course on “IBM Certified Database AssociateDB2 Universal Database V8.1 Family “. 27,
November, 2007.
4. Training course on “Gene to Drug “ (Wet Lab to Dry Lab) Vital Malya Research Foundation
(Bangalore). 18 March, 2006
5. National Seminar on “Cisco Networking Technology” Organised by Department of Computer
Science and Engineering at Dr. Mahalingam Engineering College, Pollachi . August 2006.
6. National Level seminar on “Recent Advances In Computer Aided Drug Discovery” at Karpagam
Arts and Science College, Coimbatore-21. 17th July, 2006.
7.Course on “Mathematical Modeling on Computer Simulation” organized by CSIR Center for
Mathematical Modeling, March 14-16, 2005
8. National level conference on MOTIF’05 organised by department of Bioinformatics, Bharathiar
University, Coimbatore. October 2005
9. National Level seminar on “National Symposium on Chromosomes in Human Genome’’ at
Karpagam Arts and Science College, Coimbatore-21. 3rd and 4th December 2004”
10. Training on GCG Wisconsin Package at Karpagam Arts and Science College, Coimbatore-21
May 19-21, 2004.
11. Molecular Modeling Workshop Organised by Department of bioinformatics, Anna University,
Chennai. 9-12 December, 2004
12. Conference on Software Testing organized by Hindustan Engineering College, Chennai and Tata
Indicom. Nov 16,2004
13. International Workshop on Bioinformatics at Karpagam Arts and Science College, Coimbatore-21.
December 12-14, 2003
14. “Recent Trends in Networking Technology” at Karpagam Arts and Science College, Coimbatore-
21. December 12-14, 2003.
15. Seminar on “Genomics and Bioinformatics”, at Karpagam Arts and Science College, Coimbatore-
21, 19- 20th Sep 2003.
Workshops/Seminars Participated
Dr.M.Hemalatha Page 32 of 32
16. National level conference on MOTIF’03 Organized by department of Bioinformatics, Bharathiar
University, Coimbatore.
Dubai, Malaysia, Singapore, Israel, Hong Kong
References
1. Dr.K.Vivekanandan
Professor
School of Management and Entrepreneur Development
Bharathiar University
Coimbatore
Tamilnadu,India
Phone number : 9843249890
E-mail : vivekbsmed@gmail.com
2. Dr.M.Punithavalli
Associate Professor
Department of Computer Science
Bharathiar University
Coimbatore
Ph No: 9843281552
m.punitha_srcww@yahoo.co.in
3. Prof. M. V. Ramana Murthy,
Chairman Computer science,
UGC Project Pannel Member
Head Dept. Of Mathematics,
Osmania University,
Hyderabad,
India
The information that is given above is true to my best of knowledge.
[M.Hemalatha]
Countries Visited
Declaration
top related