dr. m. hemalatha, m.sc.,m.phil.,ph.d..,€¦ · 23. p. revathi, m. hemalatha, 2014. cotton leaf...

32
Dr.M.Hemalatha Page 1 of 32 Dr. M. HEMALATHA, M.Sc.,M.Phil.,Ph.D.., Residential Address D3, A Block Eden Garden Apartment Puliyakulam Road Sungam, Coimbatore 641045, INDIA Email : [email protected] [email protected] Mobile : +919843099676 Website: www.drhemalatha.com Degree University Class Year of Passing B.Sc (CS) Annamalai University First 2001 M.Sc (IT) Annamalai University First 2004 M.Phil(CS) Bharathidasan Univeristy First 2006 Ph.D (CS) Mother Terasa Women’s University Highly Commended 2009 Teaching Experience (13 Years) (Industrial experience (3 years) Total 16 years 2004-2009-Lecturer in Computer Science, Department of Computer Science, Karpagam Arts and Science College, Coimbatore, Tamilnadu, India. 2010-2013-, Assistant Professor and Head Department of Software System, Karpagam University, Coimbatore, Tamilnadu, India. 2013-July 2015-July Professor, Research Co ordinator, Department of Computer Science, Karpagam University, Coimbatore, Tamilnadu, India. 2015 August May 2016 , Dean Science, Dr.SNS Rajalakshmi College of Arts and Science, Coimbatore. 2016 June May 2017 Director, R&D Division, Hansoft Technologies , Coimbatore Handling the Papers for BSc(CS), BCA, BSC(IT), MSc(CS), MSC(SS), MCA Distributed Operating System Cyber Security Computer Networks Data mining Database Management System Educational Qualifications Papers Handled

Upload: others

Post on 28-May-2020

22 views

Category:

Documents


0 download

TRANSCRIPT

Dr.M.Hemalatha Page 1 of 32

Dr. M. HEMALATHA, M.Sc.,M.Phil.,Ph.D..,

Residential Address

D3, A Block Eden Garden Apartment Puliyakulam Road Sungam, Coimbatore – 641045, INDIA

Email : [email protected]

[email protected]

Mobile : +919843099676

Website: www.drhemalatha.com

Degree University Class Year of Passing

B.Sc (CS) Annamalai University First 2001

M.Sc (IT) Annamalai University First 2004

M.Phil(CS) Bharathidasan Univeristy First 2006

Ph.D (CS) Mother Terasa Women’s University Highly

Commended

2009

Teaching Experience (13 Years) (Industrial experience (3 years) Total – 16 years

2004-2009-Lecturer in Computer Science, Department of Computer Science, Karpagam

Arts and Science College, Coimbatore, Tamilnadu, India.

2010-2013-, Assistant Professor and Head Department of Software System, Karpagam

University, Coimbatore, Tamilnadu, India.

2013-July 2015-July Professor, Research Co ordinator, Department of Computer

Science, Karpagam University, Coimbatore, Tamilnadu, India.

2015 August – May 2016 , Dean Science, Dr.SNS Rajalakshmi College of Arts and

Science, Coimbatore.

2016 June – May 2017 Director, R&D Division, Hansoft Technologies , Coimbatore

Handling the Papers for BSc(CS), BCA, BSC(IT), MSc(CS), MSC(SS), MCA

Distributed Operating System

Cyber Security

Computer Networks

Data mining

Database Management System

Educational Qualifications

Papers Handled

Dr.M.Hemalatha Page 2 of 32

Mat Lab Programming

Visual Basic Programming

C Programming

Object Oriented Programming with C++

Computer Fundamentals and Basic Programming

Research Experience (10 Years)

Research Papers Presented / Published : Total number of papers: 326

National Conferences : 45

International Conferences : 54

International Journals : 227

Area of Specialization : Data Mining, Cloud Computing, Image

processing, Networks, Bioinformatics

Research Findings Presented in Abroad

Dubai: From 16.10,2014-20.10.2014 to present research findings at International Conference on Computer Science and Information Systems (ICSIS’2014) Oct 17-18, Dubai (UAE),

Malaysia: From April 14- 21.03.2013, to exhibit product Autism E-learning Tool in an International Engineering Expo – University of Malaysia, Perlis

Singapore – From 26-02-2011 to 02-03-2011, to present research findings at International Conference organized by the IEEE, Singapore Section.

Hong Kong – From 16-03-2010 to 19-03-2010, to present research findings at International Conference on Data mining organized by the IEEE and IEANG Hong Kong.

Research Projects Minor

Project No : AS-06,

Ref: No : TNSCST/STU.PRJ/RJ/2005-06

Funding Agency : Tamilnadu State Council Science and Technology

Title of the Project : Database Connectivity for Cultivation Practices of Crops.

Citation Indices

Cited by

All Since 2013

Citations 1375 1201

h-index 20 16

i10-index 40 35

Dr.M.Hemalatha Page 3 of 32

Research Guidance

Number of M.Phil Awarded : 20

Number of M.Phil Guiding : -

Number of Ph.D. Awarded : 24

Number of Ph.D. Submitted: 5

Number of Ph.D. Guiding : 2

Administrative Responsibilities

Research Cordinator

MHRD Sponsered Spoken Tutorial – Coordinator

Organised conferences and seminars

Studemts Software Development center coordinator

Ragging Committee member,

Exam Cell Co ordinator

Member Doctoral Committee (Research)

Anna University – Chennai, Chennai, Tamil Nadu, India

Karpagam University–Coimbatore, Tamil Nadu, India

Karunya University –Coimbatore, Tamil Nadu, India

Bharathidasan University –Trichy , Tamil Nadu, India

Bharathiar university –Coimbatore, Tamil Nadu, India

Mother Terasa Women’s University , Kodaikanal,Tamil Nadu,India

Member in Professional Bodies

Member, Institute of Electrical and Electronics Engineering (IEEE), USA.

Member, Association of Computing Machinery (ACM), USA.

Member, International Association of Engineers (IAENG), JAPAN.

Life Member, Computer Society of India, INDIA.

Member, Indian Science Congress Association, INDIA.

Computer Science Teachers Association (9161066)(CSTA)

International Association of Computer Science and Information Technology, Singapore – Member No : 80333198

International Association of Engineers - Computer Science/Data Mining, Canada/Spain Member No : 101516

International Association of Engineers - Computer Science/Data Mining, Canada/Spain Member No : 101516

Editorial Board Member in Journals

Scientific Journals International (ISSN: 1556-6757, USA)

Trends in Bioinformatics

Journal of Information Scientific Research

Dr.M.Hemalatha Page 4 of 32

International Journal of Technology Knowledge and Society (ISSN: 1816-3548, Taiwan)

Reviewer in Journals

Knowledge Based System (Elsevier)

International Journal of Computer System Science and Engineering

World Scientific Engineering Academy and Society (WSEAS) conferences and

Journals, China

International Conference on Digital Information Web Technologies, London,UK

International Journal of Information Security

Journal of Convergence and Information Technology

Journal of Computer Science

International Journal of Digital Content Technology and its Applications

Egyptian Informatics Journal

Invited Talks (Research)

National conference on Recent Trends in Computer Science” held on 13.02.2015 at Annai Violet arts and Science college, Chennai

National conference on” Advanced Research Techniques in Information Technology” held on 07.11.2014, at G.Venkataswamy Naidu College, Kovilpatti

UGC Sponsored National Conference on Web Science and technology, held on 10 & 11.10.2012 at PSG College of Arts and Science, Coimbatore.

UGC Sponsored Work shop on Transcending Conventional Boundaries of Research, held on 21&22.03.2014 at PSG College of Arts and Science, Coimbatore.

Honors/Awards

Travel grant Received from DST to attend International Conference at Singapore (Grant No SR/ITS/03473/2010-2011)

Best Researcher Award 2012 – Karpagam University

Silver Medal for An E-Learning Tool for Children with Autism Disorder Exhibit at International Engineering

Refresher Courses / Workshops / Seminars/ Conferences Organized

International level workshop conducted on Networks, Intelligence and Computing Technologies on 18 December, 2011, Karpagam University, Coimbatore, Tamil Nadu, INDIA.

Inter National Conference Networks, Intelligence and Computing Technologies conducted on 16 & 17th December, 2011, Karpagam University, Coimbatore, Tamil Nadu, INDIA.

Books\Book Chapters Published

Hemalatha.M and A.Anny Leema., 2015. Book Chapter Data management issues in RFID applications, RFID Technology Integration for Business Performance Improvement ISBN-10: 3848406187, ISBN- ISBN13: 9781466663084

Dr.M.Hemalatha Page 5 of 32

M. Hemalatha, 2011. Proceedings of the International Conference on Networks, Intelligence and Computing Technologies, 15-16 December 2011. ISBN: 978-81-8424-741-1, Volume – I.

M. Hemalatha, 2011. Proceedings of the International Conference on Networks, Intelligence and Computing Technologies, 15-16 December 2011. ISBN: 978-81-8424-742-8, Volume – II.

Shanmugavel, D.P., M. Hemalatha and Karthikeyan.S, 2006. Microarray in Bioinformatics, Trends in Bioinformatics, (Eds.). Pointer publishers, Jaipur, India; 212-250.

Shanmugavel,D.P, M. Hemalatha and Karthikeyan.S, 2006. Mathematic Modeling in Molecular Modeling, Trends in Bioinformatics. (Eds.). Pointer publishers, Jaipur, India; 212-250.

Hemalatha, M., 2012. Hybrid Models for High Dimensional Clustering and Pattern Discovery. LAP LAMBERT Academic Publishing, ISBN-10: 3848406187, ISBN-13: 978-3848406180

Other Information

Member of Board of Studies of various autonomous colleges.

Chairman and Member of board of examiners of different Autonomous colleges and Universities.

Organizing committee member of various International and National conferences.

Papers Published in International Journals

1. B.Selvanandhini and M.Hemalatha 2017 A Mathematical Model for Quality Video Packet

Streaming with Minimum Jitter Rate Global Journal of Pure and Applied Mathematics 13 (8),

4381-4395

2. M.Hemalatha and Nithya.P 2016 , A Thorough Survey on Lossy Image Compression

Techniques International Journal of Applied Engineering Research . 11( 5): pp 3326-3329

Scopus Indexed IF: 0.671)

3. M.Hemalatha and Anitha 2016 , Certificate Revocation List Distribution Based on Road Map

Distance Protocol (RMDP) in Vanet International Journal of Applied Engineering Research. 10(

3): pp 3126-3132 Scopus Indexed IF: 0.671)

4. M.Hemalatha and Thilainayaki ,2016. Mining PPIs using recent methods and and Applied

Research. 12 ( 3): pp 567-571 Scopus Indexed IF: 0.731)

5. M.Hemalatha and Sylvia 2016, Diagnosis of heart disease from ECG using colonial neural

network with derivative threshold based genetic algorithms, International Journal of Applied

Engineering Research. 11( 7) pp 5297-5303 Scopus Indexed IF: 0.671)

6. M.Hemalatha and Anitha 2016 , Certificate revocation list distribution based on DMSTP

(directional minimum spanning tree protocol) using tripled in Vanet Australian journal of Basic

7. Renuga Devi.R and M. Hemalatha, 2014. A novel approach for secure hidden community

mining in social networks using data mining techniques, International journal of computer

application, 87(7): 12-19(IF: 0.831)

Dr.M.Hemalatha Page 6 of 32

8. features International Journal of Applied Engineering Research. 10(19) pp 40054 – 40058 /

Scopus Indexed IF: 0.671)

9. V.Vinodhini and M. Hemalatha 2015 Improved Density based K clustering (E- DBK)algorithm

for effectual investigation of crime data International Journal of Applied Engineering Research

10(7):16655 – 16664

10. Kavitha and M. Hemalatha 2015 Enhanced Support Vector Machine (SVM) algorithm.

International Journal of Applied Engineering Research 10(7):16865 – 16872

11. Senthamilarasu and M. Hemalatha 2015 Ensemble Classifier for Concept Drift Data Stream

Spinger Informatics and communication Technologies for societal 1(1):127-137

12. Renuga Devi.R and M. Hemalatha, 2014. Mining of network communities by spectral

characterisation using KD-Tree, Research journal of applied, engineering and technology, 7(7):

1108-1115 (IF: 0.31)(Indexed in Scopus)

13. Anupama Prasanth and M. Hemalatha 2014 A Comparison on Intelligent Web

InformationRetrieval Systems. Intl. J. Computer Science and Network 3(6):425-429 (IF 0.274)

14. Ajith Singh.N and M.Hemalatha, 2014. BASIP a virtual machine placement technique to reduce

energy consumption in cloud data centre, Journal of Theoretical and Applied Information

Technology, 59(2):426-435 (IF: 0.71)(Indexed in Scopus)

15. Ajith Singh.N and M.Hemalatha, 2014. Reservation Resource Technique for Virtual Machine

Placement in Cloud Data Centre, Research Journal of Applied Sciences, Engineering and

Technology, 7(14): 2954-2960 (IF: 0.31)(Indexed in Scopus)

16. Gowsalya. R, S. Veni and M. Hemalatha, 2014. Analysis of machine Learning Techniques by

Using Blogger Data, International Journal of Engineering Research and Applications,

4(4):461:467.

17. G.V.Nadiammai and M.Hemalatha, 2014. Effective Approach towards Intrusion Detection

System Using Data mining techniques, Egyptian Informatics Journal, 15(1):37-50(Indexed in

Scopus)

18. N.Sasirekha and M.Hemalatha, 2014. A Hybrid Indexed Table and Quasigroup Encryption

Approach for Code Security Against Various Software Threads, Journal of Theoretical and

Applied Information Technology, 60(2):437-445 (IF: 0.71)(Indexed in Scopus)

19. N. Naga Saranya, M. Hemalatha, 2014. An Innovative idea to discover the trend on multi-

dimensional Spatio-Temporal Datasets, International Journal of Research in Engineering and

Technology, 3(3): 243-249.

20. P.Revathi and M.Hemalatha, 2014. Classification of Cotton Diseases using Cross Information

Gain-Minimal Resourse Allocation Network Classifier with Particle swarm Optimization, Journal

of Theoretical and Applied Information Technology, 60(1):184-188(IF: 0.71)(Indexed in Scopus)

Dr.M.Hemalatha Page 7 of 32

21. P.Revathi and M.Hemalatha, 2014.Cotton Disease Identification using Proposed CIG-DFNN

Classifier, Asian Journal of Scientific Research, 7(2):225-231.

22. P. Nandhakumar, M. Hemalatha, 2014. Effective Semantic Web Information Retrieval Using

Fuzzy Based Ontology, International Journal of Innovative Technology and Exploring

Engineering,3(11):33-36.

23. P. Revathi, M. Hemalatha, 2014. Cotton Leaf Spot Diseases Detection Utilizing Feature

Selection with Skew Divergence Method, International Journal of Scientific Engineering and

Technology, 3(1)22-30.

24. R.Gopinath and M.Hemalatha,2014.Negative Association Rules for Web Usage Mining using

Negative Selection Algorithm, World Applied Science Journal,31(12):2015-2023.

25. R.Gobinath and M. Hemalatha, 2014. An Heighten PSO-K-harmonic Mean Based Pattern

Recognition in User Navigation, Research Journal of Applied Sciences, Engineering and

Technology,7(7):1283-1287.IF: 0.31)(Indexed in Scopus)

26. R. Gobinath, M. Hemalatha, 2014. Visualizing the Navigational Patterns from Web Log Files

using Web Mining Applications, International Journal of Scientific & Engineering

Research,5(5):538-544.

27. S.Krishnaveni and M.Hemalatha, 2014.Evaluation of DFTDS Algorithm for distributed data

warehouse, Egyptian Informatics Journal,15(1):51-58. (Indexed in Scopus)

28. K. Sathesh Kumar and M. Hemalatha, 2014. An Efficient Integrated Approach for Information

Retrieval Using Fuzzy Artificial Bee Colony Optimization Based On Cloud Computing, Middle-

East Journal of Scientific Research, 21 (2): 376-384.201( Indexed in Scopus)

29. G. Anitha and M. Hemalatha,2014. Intrusion prevention and Message Authentication Protocol

(IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks,

International Journal of Engineering and Technology, 6(2):663-672. (Indexed in Scopus)

30. Senthamilarasu .S and M.Hemalatha,2014. Classification of Pattern Using Intuitionistic Fuzzy

Temporal Association Rule Mining for Data Stream, International Journal of Control Theory and

Applications, 7(1):11-18. (Indexed in Scopus)

31. S.Hemalatha and M.Hemlatha, 2014.Certain Investigation on Missing Value Imputation

Techniques, International Journal of Computer Technology and Applications, 5(2):323-329. (IF:

2.015)

32. Padmapriya.G and M.Hemalatha, 2014. A Recent Survey on Unstructured Data to Structured

Data in Distributed Data Mining, International Journal of Computer Technology and

Applications, 5(2):338-344.(IF:2.015)

33. Vinodhini.V and M.Hemalatha, 2014.An Intend Method for Tracking and Detecting Crime using

Clustering Techniques, International Journal of Engineering and Management

Research.4(5):27-30.

Dr.M.Hemalatha Page 8 of 32

34. Sasirekha.N and Hemalatha, 2014.Quantum Cryptography using Quantum Key Distribution and

its Applications, International Journal of Engineering and Advanced Technology, 3(4):289-294.

(IF:3.2)

35. Nandakumar.P and M.Hemalatha, 2014. An Exhaustive survey on Various Semantic web

Procedures and Techniques, International Journal of Control Theory and Applications, 7(1):1-9.

(Indexed in Scopus)

36. A.Edwin Robert and M.Hemalatha, 2014. Epidemic Dynamics of Malicious code Detection

Architecture in Critical Environment, Indian Journal of Science and Technology, 7(6):770-775.

(Indexed in Scopus)

37. A.Edwin Robert and M.Hemalatha, 2014.Identification of Heterogeneous Malicious Nodes in the

Crucial Dynamic Environment for protecting local and remote systems, International Journal of

Advanced Computational Engineering and Networking, 2(2):35-38.

38. A.Edwin Robert and M.Hemalatha, 2014.Epidemic Dynamic of Malicious code detection

Architecture in Critical Environment, Indian Journal of Science and Technology,7(6):770-775.

39. K.Sathesh Kumar and M.Hemalatha, 2014. An Optimized interface of Pattern Recognition

Using Fuzzy Ant Based Clustering Algorithm. International Review on Computers and Software.

40. K.Sathesh Kumar and M.Hemalatha, 2014.An Hybird Optimization algorithm for Fuzzy

Association Rule Mining, IEEE Proceedings of Computer Communication and

Informatics,1(1):1-6. IEEE Xplore (Indexed in Scopus)

41. Padmapriya.G and M.Hemalatha , 2014. Extraction of Unstructured Data records and

discovering new Attributes from the web documents, International Journal of Computer trends

and Technology(IJCTT),(IF:0.569)

42. Padmapriya.G and M.Hemalatha , 2014.Distributed protocol for privacy preserving by applying

proposed k-anonymizing approach on distributed datasets, Karpagam Journal of Computer

Science.

43. Padmapriya.G and M.Hemalatha, 2014.A Novel Privacy Preservation using Double Hash based

K-Anonymity Techniques, International Journal of Applied Engineering Research. (Indexed in

Scopus).

44. Padmapriya.G and M.Hemalatha, 2014.Distributed Privacy preserving and Handling Privacy

information Leakage by using K-anonymity Algorithm, International Journal for Research in

Applied Science and Engineering Technology(IJRASET) (IF:1.214)

45. S.Hemaltha and M.Hemalatha, 2014.An Estimation of Missing Values by Modified Mixed

Kernels, IIE INT’L Conference Proceedings of Computer Science and Information

Systems,1(1):10-15 (Indexed in Scopus)

Dr.M.Hemalatha Page 9 of 32

46. S.Hemaltha and M.Hemalatha, 2014.Predicition of Missing Values in Datasets using

Association Rule Mining, International Journal of Applied Engineering Research.9(23):19789-

19800 (Indexed in Scopus)

47. S.Hemaltha and M.Hemalatha, 2014.Computational Techniques to Recover Missing Data from

Gene Expression Data, International Journal for Research in Applied Science and Engineering

Technology, 2(12):132-139(IF:1.214)

48. Lakshmi Devasena.C and M.Hemalatha, 2014. Automatic Classification of Audio Data using

Gradient Descent Neural Network based Algrithm, Journal of Theoretical and Applied

Information Technology, 70(2):375-389. (IF:1.71) (Indexed in Scopus)

49. Nandha Kumar.P and M.Hemalatha, 2014.Domain Oriented Ontology Based Semantic Web

Search Methodology using Sparql Query, Internation Journal Computer and

Technology.12(9):3875-3885.

50. Sindhu.V, S.A.Sathya prabha, S.Veni and M.Hemalatha, 2014.Thoracic Surgery Analysis using

Data Mining Techniques, International Journal of Computer Technology and

Applications.5(2),578-586.

51. Krishnaveni, S. and M. Hemalatha, 2013.Query Management in Data Warehouse using Virtual

Machine fault tolerant resource Scheduling Algorithm. Int. J. Theoretical and Applied

Information Technology, 47(3):1251-1257. [IF:1.71](Indexed in Scopus)

52. Renuga devi.R and M. Hemalatha, 2013.A Perspective Analysis of hidden Community Mining

Methods in Large Scale Social Networks, International Journal of Computer Application.75(3):7-

12.(IF:0.835)

53. Ajith Singh.N and M.Hemalatha, 2013.An Analysis of Load Balancing in a cloud Computing

Environment,European Journal of Scientific Research.101(4):590-598(IF:0.736) (Indexed in

Scopus)

54. Ajith Singh.N and M.Hemalatha, 2013. A Honey Bee Foraging Algorithm Scheduling Approach

for Virtual Machine Resources in Cloud Computing Environment, IEEE Proceedings of

Research and Development Prospects on Engineering and Technology.5(1):52-57.(IEEE

Xplore)

55. Ajith Singh.N and M.Hemalatha, 2013. Virtual Machine Placement by Using Honey Bee Forager

Algorithm in Cloud Computing, Karpagam Journal of Computer Science. 7(4):210-216.

56. Ajith Singh.N and M.Hemalatha, 2013. Cluster Based Bee Algorithm for Virtual Machine

Placement in Cloud Data Centre, Journal of Theoretical and Applied Information

Technology,57(3):1-10 (IF:1.71) (Indexed in Scopus)

57. Ajith Singh.N and M.Hemalatha, 2013. Reduce Energy Consumption through Virtual Machine

Placement in Cloud Data Centre, Springer Lecturer notes in Artificial Intelligence,1[1]:466-474.

(Indexed in Scopus)

Dr.M.Hemalatha Page 10 of 32

58. Ajith Singh.N and M.Hemalatha, 2013. Energy Efficient Virtual Machine Placement Technique

using Banker Algorithm in Cloud Data Centre, IEEE Proceedings of Advanced Computing &

Communication Systems,1(1)1-6(Indexed in Scopus)

59. Nadiammai.G.V. and M.Hemalatha,2013. Performance Analysis of Tree based Classification

algorithm for Intrusion Detection System, Springer Lecturer notes in Artificial

Intelligence,1(1):82-89(Indexed in Scopus)

60. Nadiammai.G.V. and M.Hemalatha,2013. Handling Intrusion Detection System using Snort

Based Statistical Algorithm and Semi-supervised Approach, Research Journal of Applied

Sciences, Engineering and Technology,6(16):2914-2922(IF:0.036) (Indexed in Scopus)

61. Nadiammai.G.V. and M.Hemalatha,2013. An Enhanced Rule Approach for Network Intrusion

Detection using Efficient Data Adapted Decision Tree Algorithm, International Journal of

Theoretical and Applied Information Technology,47(2):426-433(IF:1.71) (Indexed in Scopus)

62. Krishnaveni.S and M.Hemalatha, 2013. A Dependency-based Query Scheduling in Distributed

Data Warehouse Environment, Springer Lecturer notes in Artificial Intelligence.1(1):499-505

(Indexed in Scopus)

63. Renuga devi.R and M.Hemalataha, 2013. A Novel Algorithm for Automatically Detecting

Number of Clusters for Mining Communities in Heterogeneous Social Networks. Engineering,

International Journal of Innovative Technology and Exploring. 3(6):43-47.

64. Renuga devi.R and M.Hemalataha, 2013. Sybil Identification in Social Networks Using SICT

and SICTF Algorithms with ImprovedKD-Tree, Journal of Theoretical and Applied Information

Technology,56(3):443-451(IF:1.71) (Indexed in Scopus)

65. Renuga devi.R and M.Hemalataha, 2013. An Improved KD-Tree Algorithm Based Community

Mining in Social Networks, European Journal of Scientific Research,110(1):58-69(IF:0.736)

(Indexed in Scopus)

66. Renuga devi.R and M.Hemalataha, 2013. A Perspective Analysis of hidden Community Mining

Methods in Large Scale Social Networks, International Journal of Computer

Applications.75(3)(IF:0.835)

67. Renuga devi.R and M.Hemalataha, 2013. A Study on different Hidden Community detection

methods in the social area networks, Proceedings of Recent Trends in Information

Technology,1(1):43-46.

68. Renuga devi.R and M.Hemalataha, 2013. Sybil identification Algorithm using connectivity

threshold for Secured Community Mining in Social network, IEEE Proceedings of

Computational Intelligence and Computing Research,1(1):158-161, (Indexed in Scopus)

69. Renuga devi.R and M.Hemalataha, 2013. Mining Hidden Communities in Social Networks

Using KD-Tree and Improved KD-Tree, IEEE Proceedings of Computing, Communications and

Networking Technologies, 4(1):1-7.

Dr.M.Hemalatha Page 11 of 32

70. Renuga devi.R and M.Hemalataha, 2013. Automatic K-Community Mining in Heterogeneous

Network Using Convergence Aware Dirichlet Process Mixture Model, International Journal of

Engineering Research and Technology,2(11):1976-1984,(IF:1072)

71. Revathi.P and M.Hemalatha, 2013. Identification of Cotton Diseases Based on Cross

Information Gain_Deep Forward Neural Network Classifier with PSO Feature Selection,

International Journal of Engineering and Technology,5(6):4637-4642. (Indexed in Scopus)

72. Revathi.P and M.Hemalatha, 2013. An Improve Cotton Leaf Spot Disease Detection using

Proposed Classifiers, International Journal of Engineering Research and

Technology,2(12):2144-2147.(IF:1.72).

73. Revathi.P and M.Hemalatha, 2013. Cotton Leaf Spot Diseases Detection Utilizing Feature

Selection with Skew Divergence Method, International Journal of scientific Engineering and

Technology,3(1):22-30.

74. Sentamilarasu.S and M.Hemalatha, 2013. A Genetic algorithm based Intuitionistic fuzzification

technique for Attribute selection, Indian Journal of Science and Technology,6(4):4336-4346.

(Indexed in Scopus)

75. Sentamilarasu.S and M.Hemalatha, 2013. Ensemble of Intuitionistic Fuzzy Classifier, IEEE

Proceedings of Computational Intelligence and Computing Research,4(6):450-458. (Indexed in

Scopus)

76. Sentamilarasu.S and M.Hemalatha, 2013. Dynamically Adaptive Count Bloom Filter for

Handling Duplicates in Data Stream, International Journal of Engineering and

Technology,4(6):450-458. (Indexed in Scopus)

77. Sathesh kumar.K and M.Hemalatha, 2013. Optimal Feature Subset Reduction Using SVM

Classifier, IEEE Proceedings of Research and Development Prospects on Engineering and

Technology,4(2):109-114. (Indexed in Scopus)

78. Gobinath.R and M.Hemalatha, 2013. Optimized Feature Extraction for Identifying user Behavior

in Web Mining, European Journal of Scientific Research, 105(3): 319-32,(IF:0.736) (Indexed in

Scopus)

79. Gobinath.R and M.Hemalatha, 2013. An optimized K-Harmonic Mean based Clustering user

navigation Patterns, IEEE Proceedings of Computational Intelligence and Computing

Research,1(1). (Indexed in Scopus)

80. Gobinath.R and M.Hemalatha, 2013. Preprocessing for Web personalization using Web Usage

Mining, IEEE Proceedings of Research and Development Prospects on Engineering and

Technology,5(1):52-57. (Indexed in Scopus)

81. sasirekha.N and M.Hemalatha, 2013. Novel Secure Code Encryption Techniques Using Crypto

Based Indexed Table for Highly Secured Software, International Review on Computers and

Software, 8(8): 1980-1990.(IF:6.24) (Indexed in Scopus)

Dr.M.Hemalatha Page 12 of 32

82. sasirekha.N and M.Hemalatha,2013.Quasigroup Encryption Based Cryptographic Scheme for

Software Protection, International Journal of Advances in Engineering and Emerging

Technology, 3(1): 346-357.(IF: 0.078)

83. sasirekha.N and M.Hemalatha, 2013. A Novel Secured Code apporoach Using Latin Square

Crypto System against Reverse Engineering, Journal of Computer Science

(Karpagam),7(5):260-270.

84. Anny Leema and M.Hemalatha, 2013. A novel Integrated Approach for Handling Anomalies in

RFID Data, International Journal of UbiComp,4(2):135-145,(IF:0.031) (Indexed in Scopus)

85. Anny Leema and M.Hemalatha, 2013. Proposed Prediction and cleaning algorithms based on

hybrid approach to deal with anomalies of RFID data in Healthcare, Elsevier Egyptian

Informatics Journal,14(2):135-145.(IF:0.031) (Indexed in Scopus)

86. Anny Leema and M.Hemalatha, 2013. Hybrid Approach for duplication detection and

elimination. Springer, Lecture Notes in Electrical Engineering,131(1):737-750.(IF:0.114)

(Indexed in Scopus)

87. Edwin Robert.A and M.Hemalatha, 2013. Dynamic Virtual Monitoring System for Detecting

Malicious Nodes in an Intruder Domain, International Journal of Recent Scientific

Research,4(12):2062-2066.

88. Juliana Gnanaselvi and M.Hemalatha, 2013. An Efficient Swarm Intelligence Optimization

Based Passive Continuous Authentication System, International Journal of Advances in

Engineering and Emerging Technology,2(1):220-234.(IF:0.078).

89. Gobinath.R and M.Hemalatha, 2013. An optimized K-Harmonic Mean based Clustering user

navigation Patterns, IEEE Proceedings of Computational Intelligence and Computing

Research,1(1). (Indexed in Scopus)

90. Gobinath.R and M.Hemalatha, 2013. Preprocessing for Web personalization using Web Usage

Mining, IEEE Proceedings of Research and Development Prospects on Engineering and

Technology,5(1):52-57. (Indexed in Scopus)

91. Revathi.R and M.Hemalatha, 2013. Object Tracking and Detection in Videos using Block

Matching with Intuitionistic Fuzzy Logic (BMIFL) Algorithm, Research Journal of Applied

Sciences, Engineering and Technology, 6(19): 3568-3576,(IF:0.030) (Indexed in Scopus)

92. Revathi.R and M.Hemalatha, 2013. A Novel Approach for Object Tracking and Detection using

IFL Algorithm, International Journal of Computer Science and Information Security,11(4):102-

109.

93. Sumathi.T and M. Hemalatha, 2013. A Novel approach of Automatic image annotation for

satellite images, Karpagam Journal of Computer Science.07(04):203-209.

94. Sumathi .S and M. Hemalatha, 2013.Performance Analysis of Routing Protocols in Mobile

Adhoc Network, Karpagam Journal Of Computer Science, 7(2):95-103.

Dr.M.Hemalatha Page 13 of 32

95. Sumathi, T. and M. Hemalatha, 2013. High Performance EMID Framework for Automatic Image

Annotation and Retrieval. International Journal of Imaging & Robotics.11(2):24-36. (Indexed in

Scopus)

96. Sumathi.T and M. Hemalatha, 2013. Enabling Public Audit ability and Data Dynamics for

Storage Security in Cloud Computing, Karpagam Journal Of Computer Science,07(02):67-75.

97. Sumathi, T. and M. Hemalatha, 2013. An Enhanced Approach for Solving Class Imbalance

Problem in Automatic Image Annotation. I.J. Image, Graphics and Signal Processing, 5(2):

9-16.(IF:0.11) (Indexed in Scopus)

98. Edwin Robert. A and M. Hemalatha, 2013 Behavioral and Performance Analysis Model for

Malware Detection Techniques. Int.J. Computer Engineering and Technology (IJCET). 4(1):

141-151.[IF:3.958]

99. Edwin Robert. A and M. Hemalatha, 2013 Effiicient Malware detection and tracer for an

operating systems .Int.J. Research Journal of Science, Engineering and Technology.

6[11]:2052-2060.[IF:0.036] (Indexed in Scopus)

100. Vasanthi, V. and M. Hemalatha, 2013. Simulation of Obstruction Avoidance Generously mobility

(OAGM) Model using Graph Theory Technique. Int. J.Research Journal of Applied Science,

Engineering and Technology,5[7]:2799-2808. (Indexed in Scopus)

101. Anny Leema and M.Hemalatha, 2012. Proposed Prediction and cleaning algorithms based on

hybrid approach to deal with anomalies of RFID data in Healthcare. Elsevier Egyptian

Informatics Journal. (Accepted) (Indexed in Scopus)

102. Renuga Devi and M.Hemalatha 2012 A Survey on Online Spam detection Methods in Social

Networking sites, J. of Computer Science. 6(6):333-341

103. Naga Saranya, N. and M.Hemalatha, 2012. IESO Algorithm for Rule Generation and GPLDE

algorithm for Trend Discovery in Spatio-temporal Data.. European J. of Scientific Research.

92(4):548-564 (Indexed in Scopus)

104. S.Senthamilarasu and M.Hemalatha, 2012.Dynamically adaptive count bloom filter for handling

duplicates in Data Stream, Int. J. Engineering and Technology, 4(6): 450-458. (Indexed in

Scopus)

105. S.Senthamilarasu and M.Hemalatha, 2012. Load Shedding Techniques based on windows in

Data Stream Systems. Proceeding IEEE Emerging Trends in Science, Engineering and

Technology, pp68-73

106. Anny Leema, A. and M. Hemalatha, 2012. CBADE - Hybrid Approach for Duplication detection

and Elimination. Computer Networks & Communications (NetCom), Lecture Notes in Electrical

Engineering (LNEE)., 131. Springer. (Indexed in Scopus)

Dr.M.Hemalatha Page 14 of 32

107. Lakshmi Devasena, C. and M. Hemalatha, 2012. Object Detection in Video using Lorenz

Information Measure and Discrete Wavelet Transform. ACM. Advances in Computing,

Communications and Informatics, 1(1): 200-207. (Indexed in Scopus)

108. Sumathi, T. and M. Hemalatha, 2012. A Novel JSVM Approach for Automatic Image Annotation

and Retrieval. Int. J. Computer Applications, 52(10): 10-14. (IF 0.817)

109. Revathi, R. and M. Hemalatha, 2012. An Emerging Trend of Feature Extraction Method in

Video Processing. Computer Science and Information Technology, 5(1): 69-80.

110. Revathi, R. and M. Hemalatha, 2012. Empirical Analysis of Denoising Techniques in Video

Processing. J. Computer Science, 6(4): 225-236.

111. Revathi, R and M. Hemalatha, 2012. Certain Approach of Object Tracking using Optical Flow

Techniques. Int. J. Computer Applications, 53(8): 50-57.(IF 0.835)

112. Sumathi, T. and M. Hemalatha, 2012. Towards Improving Automatic Image Annotation using

Improvised Fractal SMOTE Approach. ACM. Advances in Computing, Communications and

Informatics, 1(1): 704-710.( (Indexed in Scopus))

113. Revathi, R. and M. Hemalatha, 2012. A New Approach for Noise Removal and Video Object

Segmentation using Color Based Fuzzy C-Means Technique. Springer Proc. Advances in

Computing and Information Technology (ASIC), 178(1): 463-472. (Springer) (Indexed in

Scopus)

114. Revathi, R and M.Hemalatha, 2012. Efficient Method for Noise Removal Techniques and Video

Object Segmentation using Color Based Fuzzy C-Means. ACM. Advances in Computing,

Communications and Informatics, 1(1): 1175-1181. (Indexed in Scopus)

115. Revathi, R and M.Hemalatha, 2012. Efficient Method for Feature Extraction on Video

Processing. ACM. Computational Science, Engineering and Information Technology 1(1): 533-

537. (ACM,Scopus)

116. Revathi, R and M.Hemalatha, 2012.Detecting Object in Video frames using optical flow

Technique. Proceeding IEEE Emerging Trends in Science, Engineering and Technology 1(1):

117. Revathi, P and M.Hemalatha, 2012.Classifications of Cotton Leaf Spot Disease using image

processing Edge Detection Technique. Proceeding IEEE Emerging Trends in Science,

Engineering and Technology 1(1):

118. Revathi, P and M.Hemalatha, 2012.Advanced Computing Enrichment Evaluation of cotton Leaf

Spot Disease Detection using Image Pattern. Proceeding IEEE Emerging Trends in Science,

Engineering and Technology 1(1):

119. Revathi, P and M.Hemalatha, 2012. SMS based HPCCD algorithm for the identification of Leaf

Spot Disease. Proceeding Springer Lecture Notes in Electrical Engineerig 221(1):

120. Ajith Singh, N and M. Hemalatha, 2012. An Approach on Semi-Distributed Load Balancing

Algorithm for Cloud Computing System, Int. J. Computer Applications, 56(12): 1-4. (IF 0.8(IF

0.835))

Dr.M.Hemalatha Page 15 of 32

121. Gobinath.R and M.Hemalatha, 2012. Improved Preprocessing Techniques for Analyzing

Patterns in Web Personalization Process, Int. J. Computer Applications,58(3):13-20.

122. Krishnaveni, S and M. Hemalatha, 2012. Query Processing in Distributed Data Warehouse

using Scheduling Algorithms, Special issue Int. J. Computer Applications, 1:07-10 (IF 0.817)

123. Vasanthi.V and Hemalatha.M, 2012. Simulation and Evaluation of Different Mobility Models in

Ad-hoc Sensor Network over DSR Protocol using Bonnmotion tool.Springer

Proc. Int. Conf. Recent Trends in Computer Networks and Distributed Systems Security CCIS

(335); pp 157-167.

124. Vasanthi, V. and M. Hemalatha, 2012. A Proportional Analysis of Dissimilar Mobility Models in

Ad-Hoc Sensor Network over DSR Protocol. Int. J. Computer Applications, 42(15): 26-32. (IF

0.835)

125. Vasanthi, V. and M. Hemalatha, 2012.Mobility scenario of dissimilar mobility models using DSR

protocol in Adhoc Sensor Network- A survey. (Special Issue)Int. J. Computer Applications, 4(1):

1-14 (IF 0.817)

126. Ajith Singh, N. and M. Hemalatha, 2012. Comparative Analysis of Low-Latency on different

Bandwidth and Geographical Locations While using Cloud Based Applications. Int. J. Advances

in Engineering and Technology, 2(1): 393-400.

127. Krishnaveni, S and M. Hemalatha, 2012. Query Scheduling in Distributed Data Warehouse

using DTDS and VMFTRS Algorithms, European J. Scientific Research, 89(4): 612-625.

(Scopus indexed)

128. Krishnaveni, S and M. Hemalatha, 2012. Query Processing in Distributed Data Warehouse

using Proposed Dynamic Task Dependency Scheduling Algorithm, Int. J. Computer

Applications, 55(8): 16-22. (IF 0.835)

129. Nandhakumar, P, M. Hemalatha and Kashyap Dhruve, 2012. Adorning Web Search based on

Ontology Semantics Spaces Provisioned through Web Services, Int. J. Computer Applications,

55(7): 53-60. (IF 0.835)

130. Senthamilarasu, S and M. Hemalatha, 2012. Load Shedding using Window Aggregation

Queries on Data Streams, Int. J. Computer Applications, 54 (9): 42-49. (IF 0.835)

131. Satheshkumar, K and M. Hemalatha, 2012. An Enhanced Approach for Treating Missing Value

using Boosted K-NN, Int. J. Computer Applications, 54(9): 35-41. (IF 0.835)

132. S.Senthamilarasu and M.Hemalatha, 2012. Load Shedding For Window Aggregation Queries

over Sensor Streams Management, J. Computer Science, 6(5): 252-261.

133. Nadiammai, G.V and M. Hemalatha, 2012. Rule Based Classification Approach towards

Detection of Network Intrusions, J. Computer Science, 6(5): 283-290.

Dr.M.Hemalatha Page 16 of 32

134. Nadiammai, G.V and M. Hemalatha, 2012. An Enhanced rule approach for Network Intrusion

Detection using Efficient Data Adapted Decision Tree Algorithm J. Theoratical and Applied

Information Technology, 47(2): 426-433.[IF:1.71] (Scopus Indexed)

135. Nadiammai, G.V and M. Hemalatha, 2012. Anomaly based Hybrid Intrusion detection System

for Identifying Network Traffic. Intl. J. Computer Science and Information Security, 10(10): 30-

35.

136. Naga Saranya, N. and M. Hemalatha, 2012. Estimation of Evolutionary Optimization Algorithm

for Association Rule using Spatial Data Mining. Int. J. Computer Applications, 51(3): 1-5. (IF

0.835)

137. Nadiammai, G.V. and M. Hemalatha, 2012. An Evaluation of Clustering Technique over

Intrusion Detection System. ACM. Advances in Computing, Communications and Informatics,

1(1): 1054-1059. (Scopus)

138. Nadiammai, G.V. and M. Hemalatha, 2012.Perspective Analysis of Machine Learning Algorithm

for Detecting Network Intrusions. Proceeding IEEE computing Communication and Networking

Technologies , 1(1): 1-7. (Scopus)

139. Anny Leema, A. and M. Hemalatha, 2012. Anomaly Detection and Elimination Algorithm for

RFID Data, Int. J. Computer Applications, 49(3): 15-19. (IF 0.835)

140. Sasirekha, N. and M. Hemalatha, 2012. An Improved Secure Code Encryption Approach Based

on Indexed Table. ACM. Advances in Computing, Communications and Informatics, 1(1): 1136-

1142. (Scopus)

141. Sasirekha, N. and M. Hemalatha, 2012. A survey on Software Protection Techniques Against

Various Attacks. Global Journal of Computer Science and Technology, 12(1): 53-58.

142. Sasirekha, N. and M. Hemalatha, 2012. An Enhanced Code Encryption Approach with HNT

Transformations for Software Security. International Journal of Computer Applications, 53(10):

17-23. (IF 0.817)

143. Sasirekha, N. and M. Hemalatha, 2012. An Efficient Secure Code Approach Based on Indexed

Table Quasi Group Encryption with Hadamard and Number Theoretic Transformation for

Software Protection. CCSEIT-12, ACM, 1: 444-451.

144. Sasirekha, N. and M. Hemalatha, 2012. A Thorough Investigation on Software Protection

Techniques against Various Attacks. Bonfring International Journal of Software Engineering and

Soft Computing, 2(3): 10-15.

145. Krishnaveni, S. and M. Hemalatha, 2012. Performance Analysis of Particle Swarm Optimization

Algorithms for Jobs Scheduling in Data Warehouse. Int. J. Advanced Research in Computer

Science, 3(2): 237-241.

Dr.M.Hemalatha Page 17 of 32

146. Revathi, P. and M. Hemalatha, 2012. Computing Performance Evaluation of Cotton Leaves

Spot Diseases Recognition using Image Segmentation. Int. J. Advanced Research in Computer

Science, 3(3): 401-404.

147. Revathi, P. and M. Hemalatha, 2012. Homogenous segmentation based Edge Detection

Techniques for Proficient Identification of the Cotton Leaf Spot Diseases. Int. J. Computer

Applications, 47(2): 18-21(IF 0.835)

148. Naga Saranya, N. and M. Hemalatha, 2012. Integration of machine learning algorithm using

spatial semi supervised classification in FWI data. IEEE Proc. Advance in Engineering, Science

and Management, 1(1): 699-702.(IEEE Xplore)

149. Lakshmi Devasena, C. and M. Hemalatha, 2012. Automatic Text Categorization and

Summarization using Rule Reduction. IEEE Proc. Advance in Engineering, Science and

Management (ICAESM-2012), 1(1): 594-598. (IEEE Xplore)

150. Gobinath.R and M.Hemalatha, 2012. Improved Preprocessing Techniques for Analyzing

Patterns in Web Personalization Process. Int. J. Computer Applications, 58(3): 13-20. (IF 0.817)

151. Ajith Singh.N, Vasanthi.V and M. Hemalatha, 2012, A Brief Survey onArchitecture, Challenges

& Security Benefit in Cloud Computing” Int. J. Information and Communication Technology

Research, 2(2): 102-111.

152. Ajith Singh.N and M. Hemalatha, 2012, Cloud Computing for Academic Environment”

International Journal of Information and Communication Technology Research, 2(2) 97-101.

153. Sumadhi, T. and M. Hemalatha, 2012. A Novel approach for Automatic image annotation

using Enhanced Multi-Instance Differentiation Framework. Procedia Engineering, 38(1): 2694-

2701. (Scopus Indexed)

154. Sumathi, T. and M. Hemalatha, 2012. An Innovative Hybrid Hierarchical Modelfor Automatic

Image Annotation. Springer LNCS, Communication in Computer & Information Science, 2(270):

718-726. (Impact Factor: 1.2)

155. Sumathi, T. and M. Hemalatha, 2012. A Combined Hierarchical Model for Automatic Image

Annotation and Retrieval. IEEE Proc. Advance Computing, 1(1): 135-139. (Impact Factor: 1.2).

156. Krishnaveni, S and M. Hemalatha, 2012. Analysis of Scheduling algorithms in Data Warehouse

for query processing, IEEE Proc. Int. Conf. Emerging trends in science , engineering and

technology, 1(1): 109-114.

157. S.Priya, T.Sumathi, R.Revathi, M. Hemalatha,2012. “Image Based face recognition algorithm-A

Survey. In Proc. Of Int. Conf. on mathematical modeling and applied soft computing.2(1):872-

879.

158. Sumathi, T. and M. Hemalatha, 2011. An Innovative Hybrid Hierarchical Model for Automatic

Image Annotation. Springer LNCS, Communication in Computer and Information Science,

2(270): 718-726

Dr.M.Hemalatha Page 18 of 32

159. Sasirekha.N and M.Hemalatha, 2011. A study on software Security using code of obfuscation

techniques and its evaluation metrics, Proc. Recent Trends and Applications of computing

Technologies, 97-102.

160. Anny Leema, A. and M. Hemalatha, 2011. An Effective and Adaptive Data Cleaning Technique

for Colossal RFID Dataset in Healthcare. WSEAS Transactions on Information Science and

Applications, 6(8): 243-252. (Impact Factor: 0.546)

161. Anny Leema, A. and M. Hemalatha, 2011. Automatic Image Annotation and Retrieval using

Multi-instance Multi-label Learning. Bonfring Int. J. Advances in Image Processing, 1(1): 1-5.

162. Lakshmi Devasena, C. and M. Hemalatha, 2011. Video Mining using LIM Based Clustering and

Self Organising Maps. Procedia Engineering, 2(1): 940-948. (Scopus Indexed)

163. Lakshmi Devasena, C., T. Sumathi and M. Hemalatha, 2011. Effectiveness Evolutional of Rule

Based Classifiers for the Classification of Iris Dataset. Bonfring Int. J. Man Machine Interface,

1(1): 5-9.

164. Lakshmi Devasena, C. and M. Hemalatha, 2011. Object Detection in Video using Clustering

and Classification Techniques. Proc. Recent Advancements in Computing Technology, 1(1):

326-330.

165. Naga Saranya, N., G. Padmapriya, S. Hemalatha and M. Hemalatha, 2011. An Evaluation of K-

means based ANN using Forest Fire Data in Spatial Data Mining. Int. J. Theoretical and Applied

Information Technology, 34(1): 29-33. (Impact Factor: 1.71 Scopus Indexed)

166. Naga Saranya, N. and M. Hemalatha, 2011. Integrating Spatial Data Mining Technique to

Identify Potential Landsat Data using K-Means and BPNN Algorithm. Int. J. Computer

Applications, 30(9): 16-21. (Impact Factor: 0.835)

167. Revathi, P. and M. Hemalatha, 2011. Categorize the Quality of Cotton Seed Based on the

Different Germination of the Cotton using Machine Knowledge Approach. Int. J. Advanced

Science and Technology, 36(1); 9-14. (Impact Factor: 1.5)

168. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. A Comprehensive Analysis and

study in Intrusion Detection System using Data Mining Techniques. Int. J. Computer

Applications, 35(8): 51-56. (Impact Factor: 0.835)

169. Nadiammai, G.V., S. Krishnaveni and M. Hemalatha, 2011. Evaluating the Yield of Hybrid

Napier Grass with Data Mining Techniques. Int. J. Computer Applications, 35(5): 1-7. (Impact

Factor: 0.835)

170. Revathi, R., P. Revathi, T. Sumathi and M. Hemalatha, 2011. Overview of Image Processing

Techniques - A Survey. Global J. Computer Applications and Technology, 1(4): 512-520.

171. Megala, S, P. SoundarRajan and M. Hemalatha, 2011. An Experimental Study of Pattern

Mining Technique to Improve the Business Strategy. Int. J. Computer Applications, 34(3): 1-5.

(Impact Factor: 0.835)

Dr.M.Hemalatha Page 19 of 32

172. Naga Saranya, N., S. Megala, P. Revathi, G.V. Nadiammai, S. Krishnaveni and M. Hemalatha,

2011. An Efficient PANN algorithm for Effective Spatial Data Mining. Springer LNCS,

Communication in Computer and Information Science, 250(1): 533-537. (Scopus Indexed)

173. Vasanthi, V., N. Ajith Singh and M. Hemalatha, 2011. Evaluation of Protocols and Algorithms to

Improve the Performance of Tcp/Ip over Wireless/Wired networks. Springer LNCS,

Communication in Computer and Information Science, 250(1): 521-525. (Scopus Indexed)

174. Vasanthi, V., N. Ajith Singh and M. Hemalatha, 2011. A Detailed Study of Mobility Model in

Sensor Network. Int. J. Theoretical and Applied Information Technology, 33(1): 7-14. (Impact

Factor: 1.71 Scopus Indexed)

175. Lakshmi Devasena, C. and M. Hemalatha, 2011. Hybrid Image Classification Technique to

Detect Abnormal Parts in MRI Images. Springer LNCS, Communication in Computer and

Information Science, 250(1): 200-208. (Scopus Indexed)

176. Revathi, P., R. Revathi and M. Hemalatha, 2011.Knowledge Discovery in Diagnose of Crop

Diseases using Machine Learning Techniques. Int. J. Engineering Science and Technology,

3(9): 7187-7190. (Impact Factor 3.157)

177. Sumathi, T. and M. Hemalatha, 2011. A Novel Approach for Automatic Image Annotation and

Retrieval. Karpagam J. Computer Science, 5(5): 313-318.

178. Ajith Singh, N., V. Vasanthi, B. Bharathi and M. Hemalatha, 2011. 4G - Fourth Generation

Wireless Systems Requirements and Technical Challenges. Journal of Theoretical and Applied

Information Technology, 31(1): 29-35. (Impact Factor: 1.71 Scopus Indexed)

179. Revathi, P., R. Revathi and M. Hemalatha, 2011. Comparative Study of Knowledge in Crop

Disease Using Machine Learning Techniques. Int. J. Computer Science and Information

Technologies, 2(5): 2180-2182. (Impact Factor:0.29)

180. Lakshmi Devasena, C. and M. Hemalatha, 2011. Noise Removal in Magnetic Resonance

Images using Hybrid KSL Filtering Technique. Int. J. Computer Application, 27(8): 1-4. (Impact

Factor: 0.835)

181. Sumathi, T. and M. Hemalatha, 2011. An Innovative Image Fusion Algorithm Based on Wavelet

Transform and Improved Discrete Fast Curvelet Transform. Cent. Euro. J. Computer Science,

1(3): 329-340. (Indexed Scopus)

182. Edwin Robert, A., G. Manivasagam, N. Sasirekha and M. Hemalatha, 2011. Reverse

Engineering for Malicious Code Behavior Analysis using Virtual Security Patching. Int. J. of

Computer Applications, 26(4): 41-45. (Impact Factor: 0.835)

183. Sasirekha, N., A. Edwin Robert and M. Hemalatha, 2011. Program Slicing Techniques and its

Applications. Int. J. Software Engineering and Applications, 2(3): 50-64. (Impact Factor: 0.835)

184. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Hybrid Image Mining Technique using LIM

based Data mining Algorithm. Int. J. Computer Application, 25(2): 1-5. (Impact Factor: 0.835)

Dr.M.Hemalatha Page 20 of 32

185. Lakshmi Devasena, C., R. Radha Krishnan and M. Hemalatha, 2011. An Enhanced Algorithm

for Mining Color Images – A Novel Approach. CiiT. Int. J. Data mining and Knowledge

Engineering, 3(9): 550-554. (Impact Factor: 0.645)

186. Sumathi, T., A. Edwin Robert, B. Bharathi and M. Hemalatha, 2011. Image Fusion Algorithm

based on Wavelet Transform and IDFC Transform. Int. J. GJACT, 1(2): 184-190. (Impact

Factor: 0.242)

187. Sumathi, T. and M. Hemalatha, 2011. A Combined Hierarchical Model for Automatic Image

Annotation and Retrieval. IEEE Proc. Advance Computing, 1(1): 324-329. (Impact Factor: 1.2).

188. Sumathi, T., C. Lakshmi Devasena, R. Revathi, S. Priya and M. Hemalatha, 2011. Automatic

Image Annotation and Retrieval using Multi-instance Muli-label Learning. Bonfring Int. J.

Advances in Image Processing, 1(1): 1-5.

189. Sumathi, T., P. Nagarajan and M. Hemalatha, 2011. An Empirical Study on Image/Video

Retrieval Techniques Grand Challenges and Trends. Int. J. Computer Information System, 2(6):

20-26. (Impact Factor: 0.242)

190. Lakshmi Devasena, C., R. Revathi and M. Hemalatha, 2011. Video Surveillance System – A

Survey. Int. J. Computer Science Issues, 8(4): 635-642. (Impact Factor: 0.242)

191. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Novel Method to Improve Video

Compression for Video Surveillance Applications using SPIHT Algorithm. Int. J. Advanced

Research in Computer Science, 2(4): 119-125. (Impact Factor: 0.242)

192. Lakshmi Devasena, C., T. Sumathi and M. Hemalatha, 2011. An Experiential Survey on Image

Mining Tools, Techniques and Applications. Int. J. Computer Science and Engineering, 3(3):

1155-1167.

193. Krishnaveni, S. and M. Hemalatha, 2011. A Perspective Analysis of Traffic Accident using Data

Mining Techniques. Int. J. Computer Applications, 23(7): 40-48. (Impact Factor: 0.835)

194. Hemalatha, M., P. Revathi, S. Megala and N. Naga Saranya, 2011. Advanced Data Mining

Techniques for Classifications of Agricultural Facts. IEEE Proc. Int. Conf. Machine Learning and

Computing, 1(1): 213-217. (IEEE Xplore)

195. Hemalatha, M., B. Kavitha, Shanmugapriya and S. Karthikeyan, 2011. An Emerging Method of

Intuitionistic Fuzzy set for Breast Cancer Diagnosis. IEEE Proc. of Machine Learning and

Computing, 2(1): 203-210.

196. Hemalatha, M. and S. Megala, 2011. Mining Techniques in Health Care: A Survey of

Immunization. J. Theoretical and Applied Information Technology, 25(2): 64-70. (Impact Factor:

1.71 Scopus Index)

197. Megala, S. and M. Hemalatha, 2011. A Novel Data Mining Approach to determine the Vanished

Agricultural Land in Tamil Nadu. Int. J. Computer Application, 23(3): 213-217. (Impact Factor:

0.835)

Dr.M.Hemalatha Page 21 of 32

198. Naga Saranya, N. and M. Hemalatha, 2011. Potential Research into Spatial Cancer Database

by using Data Clustering Technique. Int. J. Computer Science and Information Security, 9(5):

168-173. (Impact Factor: 0.243)

199. Hemalatha, M. and N. Naga Saranya, 2011. A Recent Survey on Knowledge Discovery in

Spatial Data Mining. Int. J. Computer Science Issues, 8(3): 473-479. (Impact Factor: 0.832)

200. Lakshmi Devasena, C. and M. Hemalatha, 2011. A Comparative study of Hybrid LIM based

Image Matching Techniques for mining Image Databases. Int. J. Knowledge Management and

e-Learning, 3(1): 61-65.

201. Anny Leema, A. and M. Hemalatha, 2011. Optimizing Operational Efficiency and Enhancing

Data Reliability using Effective and Adaptive Cleaning Approach for RFID in Healthcare, Int. J.

Computer Applications, 3(7): 26-29. (Impact Factor: 0.835)

202. Revathi, P. and Hemalatha,M, 2011. Efficient Classification Mining Approach for Agriculture. Int.

J. Research and Reviews in Information Sciences, 1(2): 42-45. (Impact Factor: 0.242)

203. Sumathi, T., C. Lakshmi Devasena and M. Hemalatha, 2011. An Overview of Automated Image

Annotation Approaches. Int. J. Research and Reviews in Information Science, 1(1): 1-6.

(Impact Factor: 0.242)

204. Vasanthi, V. and M. Hemalatha, 2011. Empirical Study on Security Attacks in Wireless Sensor

Network. Int. J. Advanced Research in Computer Science, 2(1): 23-28.

205. Sumathi, T. and M. Hemalatha, 2011. Semantic Web Image Search through Manual

Annotation. Int. J. Computer Application, 17(8): 39-42. (Impact Factor: 0.835)

206. Hemalatha, M. and A. Anny Leema, 2011. Applying RFID Technology to Construct an Elegant

Hospital Environment. Int. J. Computer Science Issue, 8(3): 444-448. (Impact Factor: 0.242)

207. Vasanthi, V., P. Nagarajan, B. Bharathi and M. Hemalatha, 2010. A Perspective Analysis of

Routing Protocols in Wireless Sensor Network. Int. J. Computer Science and Engineering 2(8):

2511-2518.

208. Anny Leema, A. and M. Hemalatha, 2010. A proposed system to solve the drawbacks of

Association Rule Mining in E-learning. J. Computer Applications, 3(2): 13-19.

209. Sumathi, T. and M. Hemalatha, 2010. An Empirical study on Performance Evolution in

automatic Image Annotation and Retrieval. Int. J. Advanced Research in Computer Science,

1(4): 13-17.

210. Hemalatha, M., N. Sasirekha, S. Easwari and N. Naga Saranya, 2010. An Empirical Model for

Clustering Classification of Instrumental Music using Machine Learning Technique. IEEE Proc.

Computational Intelligence and Computing Research, 1-7. (IEEE Xplore)

211. Hemalatha, M. and A. Anny Leema, 2010. Software Architecture for Semantic Web Mining In

the Parallel Distributed Environment. IEEE Proc. Computational Intelligence and Computing

Research, 72-78.

Dr.M.Hemalatha Page 22 of 32

212. Anny Leema, A., P. Sudhakar, R.S.D. Vahidabanu and M. Hemalatha, 2010. RFID Data

Management and its Applications in Hospital Environment. Int. J. Advances in Science and

Technology, 1(5): 53-108.

213. Anand Kumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. Comparative Analysis

of IPv4 and IPv6 to evaluate Performance. Int. J. Computer and Network Security, 2(7): 27-31.

214. Anand kumar, M., M. Hemalatha, P. Nagaraj and S. Karthikeyan, 2010. A New Way towards

Security in TCP/IP Protocol Suite. Latest Trends on Computers, 1(1): 46-50. (Indexed in

Scopus)

215. Anandkumar, M., K. Appathurai, P. Nagarajan and M. Hemalatha, 2010. A Large Capacity

Steganography using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video.

Int. J. Computer and Network Security, 2(7): 67-70.

216. Hemalatha, M., R. Jeyadev and V.K. Gopalakrishnan, 2009. Predicting HIV drug resistance

using neural networks. IJCIB, 1(2): 69-74.

217. Hemalatha, M. And K. Vivekanandan, 2009. FART Based Neural Network for Probabilistic Motif

Discovery in Unaligned Biological Sequences. IEEE Proc. Datamining and its applications, 2(1):

714-801.

218. Hemalatha, M. and D. Sathya Srinivas, 2009. Hybrid Neural Network Model for Web Document

Clustering. IEEE Proc. Applications of Digital Information and Web Technologies (ICADIWT

'09), 2(1): 531-538.

219. Hemalatha, M., S. Karthikeyan and E. Ramaraj, 2009. A Design of Security Protocol using

Hybrid Encryption Technique AES-Rijndael and RSA. Int. J. Computer, Internet and

Management, 17(1): 78-86. (Indexed in Scopus)

220. Hemalatha, M. and K. Vivekanandan, 2008. A Simple Statistical Model for Probabilistic Motif

Discovery in Multiple Aligned Sequences. Euro. J. Scientific Research, 19(3): 608-613.

(Indexed in Scopus) (IF 0.735)

221. Hemalatha, M. and K. Vivekanandan, 2008. A Distributed and Parallel Clustering Algorithm for

Massive Biological Data. J. Convergence and Information Technology, 3(4): 84-88. (Indexed in

Scopus)

222. Hemalatha, M. and K. Vivekanandan, 2008. A Semaphore Based Multiprocessing K-Mean

Algorithm for Massive Biological Data. Asian J. Scientific Research, 1(4): 444-450. (Indexed in

Scopus)

223. Hemalatha, M. and K. Vivekanandan, 2008. Genetic Algorithm Based Probabilistic Motif

Discovery in Multiple Unaligned Biological Sequences. Int. J. Computer Science, 4(8): 625-630.

(Indexed in Scopus)(IF 1.35)

224. Hemalatha, M. and K. Vivekanandan, 2007. Phylogenetic Tree Construction using Simple SVD

based Distance Metrics. Int. J. Computer Science and System Analysis, 1(2): 103-110.

Dr.M.Hemalatha Page 23 of 32

225. Hemalatha, M. and K. Vivekanandan, 2007. A Scalable and High Performance Sorting

Algorithm to Analyze Massive Biological Data. Int. J. System Analysis and Design, 1(1): 37-45.

226. Hemalatha, M., 2007. Medical informatics. Tamil Computer, 16 24: 1-7.

227. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. An Analysis of Key Management in

Transport Layer Security Standard. Punjab College of Technical Education J. Computer

Sciences, 2(2): 5-9.

228. Hemalatha, M., S. Karthikeyan and V.V. Gomathi, 2006. Data Mining Knowledge Discovery

Database. Tamil Computer, 1218: 4-8.

229. Hemalatha, M., V.V. Gomathi and S. Karthikeyan, 2006. An Efficient Algorithm for Predicting

Survival of Medical Data EPSA. Int. J. Technology, Knowledge and Society, 2(1): 37-48.

(Indexed in Scopus)

230. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2006. A New Approach of Hybrid Encryption

Technique in Database Security. Int. J. Technology, Knowledge and Society, 2(4): 55-60.

231. Hemalatha, M. and E. Ramaraj, 2006. An Improvement of Eun-Jun-Kyung-Kee’s Remote User

Authentication Scheme in Smart Card using Hybrid Encryption. J. Computer Science, 1(4): 293-300.

(Indexed in Scopus)

232. Hemalatha, M., 2005. Database Search and Retrieval System for Bacteria. Bioinformatics

INDIA, 3(1): 37-42.

233. Hemalatha, M., 2005. A Data Mining Tool to Increase Human Life Days from Affecting Cardiac

Arrest. Bioinformatics INDIA, 3(4): 96-111.

234. Karthikeyan, S., E. Ramaraj and M. Hemalatha, 2005. An Improvement of Security in the

Insecurity of 802.11 using Hybrid Encryption AES-Rijndael and RSA. Indian J. Information

Science and Technology, 1(1): 18-26.

International Conferences

1. S.Senthamilarasu and M.Hemalatha, 2012, Load shedding techniques based on windows in

data stream systems,IEEE. International Conference Emerging Trends in Science, Engineering

and Technology (INCOSET), 13&14 Dec.

2. S.krishnaveni and M.Hemalatha, 2012, Analysis of Scheduling Algorithms in Data Warehouse

for Query Processing, . International Conference Emerging Trends in Science, Engineering and

Technology (INCOSET), 13&14 Dec

3. R.Revathi and M.Hemalatha, 2012, Detecting objects in video frames using optical flow

techniques,. International Conference Emerging Trends in Science, Engineering and

Technology (INCOSET), 13&14 Dec .

4. P.Revathi and M.Hemalatha, 2012, Classification of Cotton Leaf Spot Diseases Using Image

Processing Edge Detection Techniques, International Conference Emerging Trends in Science,

Engineering and Technology (INCOSET), 13&14 Dec.

Dr.M.Hemalatha Page 24 of 32

5. S.krishnaveni and M.Hemalatha,2012, Query Processing in Distributed Data Warehouse using

Scheduling Algorithms, . 2nd Int. Conf. Issues and Challenges in Networking, Intelligence and

Computing Technologies (ICNICT 2012), 7&8 Sep.

6. V.Vasanthi and M.Hemalatha,2012, Mobility Scenario of Dissimilar Mobility Model using the

DSR protocol in Ad-hoc Sensor network-A Survey, 2nd Int. Conf. Issues and Challenges in

Networking, Intelligence and Computing Technologies (ICNICT 2012), 7&8 Sep..

7. V.Vasanthi and M.Hemalatha,2012, Simulation and Evaluation of different mobility model using

DSR protocol Ad-hoc Sensor Network Using Bonnmotion Tool Security in computer networks

and distributed systems (SNDS), 11 th oct .

8. S.Senthamilarasu and M.Hemalatha,2012, Handling duplicate Records using Density Bloom

Filter in Data stream, International conference on Advanced Technologies for Research &

Product Development (ICATRPD),Sept.3&4 2012.

9. K.Satheshkumar and M.Hemalatha,2012, Feature Selection Based onRanking Approach

Correlation Filter for Information Retrieval , International conference on Advanced Technologies

for Research & Product Development (ICATRPD),Sept.3&4.

10. R.Renugadevi and M.Hemalatha,2012, Analysis of Hidden Community Fraud Detection

Methods in Social Area Networks, , International conference on Advanced Technologies for

Research & Product Development (ICATRPD),Sept.3&4..

11. R.Revathi and M.Hemalatha,2012, An Emerging Trend of Feature Extraction Method in Video

Processing, 2nd Intl Conf on Computer Science, Engineering and Application (CCSEA 2012),

May 26& 27.

12. R.Revathi and M.Hemalatha,2012 Efficient Method For Noise Removal Techniques And Video

Object Segmentation Using Color Based Fuzzy C-Means. International Conference on

Advances in Computing, Communications and Informatics (ICACCI-2012), Aug 3- 5.

13. G.V.Nadiammai and M.Hemalatha,2012 An Evaluation of Clustering Technique over Intrusion

Detection,International Conference on Advances in Computing, Communications and

Informatics (ICACCI-2012), Aug 3- 5.

14. G.V.Nadiammai and M.Hemalatha,2012 , Perspective Analysis of Machine Learning Algorithm

for Detecting Network Intrusion, Third International Conference on Computing Communication

and Networking Technologies (ICCCNT), 26- 28 July.

15. P.Revathi and M.Hemalatha,2012 , Advance Computing Enrichment Evaluation of Cotton

Leaves Spot Diseases Detection Using Image Pattern, Third International Conference on

Computing Communication and Networking Technologies (ICCCNT), 26- 28 July..

16. R.Revathi and M.Hemalatha,2012, Efficient Method for Feature Extraction on Video

Preprocessing. 2nd International Conference on Computational Science, Engineering and

Information Technology (CCSEIT-2012), October 26-28.

17. S.Priya, R.Revathi ,T.Sumathi and M.Hemalatha,2012, Efficient Method for Feature Extraction

on Video Preprocessing. 3rd Intl Conf on Intelligent Information Systems and Management

(IISM) 12 - 14 July.

Dr.M.Hemalatha Page 25 of 32

18. S.Priya, R.Revathi ,T.Sumathi and M.Hemalatha,2012, Image Based Face Recognition

Algorithms - A Survey. Int. Conf on Mathematical Modeling and Applied Soft Computing

(MMASC-2012). 11-13 July.

19. P.Revathi and M.Hemalatha,2012 , SMS Based HPCCDD Algorithm For the Identification of

Leaf Spot Diseases, International conference Signal and Image Processing (ICSIP) Dec 14-15.

20. M. Hemalatha, Kavitha.B, Shanmugapriya and Karthikeyan.S, 2011. An Emerging Method of

Intuitionistic Fuzzy set for Breast Cancer Diagnosis. IEEE Proc. Int. Conf. Machine Learning

and Computing, Singapore. Feb. 26-28.

21. M. Hemalatha, Sasirekha.N and Edwin Robert.A, 2011. Novel Obfuscation Algorithms for

software Security. Int. Conf. Networks Intelligence and Computing Technologies (ICNICT 2011),

Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.

22. M. Hemalatha, Edwin Robert.A and Sasirekha.N, 2011.Advanced Reverse Engineering Process

for Performing and Tuning Malicious Code Behavior. Int. Conf. Networks Intelligence and

Computing Technologies (ICNICT 2011), Dept. Computer Science, Karpagam University,

Coimbatore, Dec. 15-16.

23. M. Hemalatha, and Naga Saranya.N, 2011. Discovery of Optimized Spatial Association Rule

Mining in Spatial Datasets. Int. Conf. Networks Intelligence and Computing Technologies

(ICNICT 2011), Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.

24. M. Hemalatha, and Nadiammai. G.V, 2011. Overview of (Network Intrusion Detection using

Data Mining Techniques. Int. Conf. Networks Intelligence and Computing Technologies (ICNICT

2011), Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.

25. M. Hemalatha, and Krishnaveni.S, 2011. Analysis of Success Factors in Data Warehouse. Int.

Conf. Networks Intelligence and Computing Technologies (ICNICT 2011), Dept. Computer

Science, Karpagam University, Coimbatore, Dec. 15-16.

26. M. Hemalatha, and Vasnthi.V, 2011. Impact of Different Mobility Models using Dsr Protocol for

Wireless sensor Networks. Int. Conf. Networks Intelligence and Computing Technologies

(ICNICT 2011), Dept. of Computer Science, Karpagam University, Coimbatore, Dec. 15-16.

27. M. Hemalatha, and Ajith Singh.N, 2011. Cloud Computing: Better Accountability with E-

Governance. Int. Conf. Networks Intelligence and Computing Technologies (ICNICT 2011),

Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.

28. M. Hemalatha, and Nandakumar.P, 2011. Web of Belief based Quality Ranking for Efficient

Semantic Web Data Access. Int. Conf. Networks Intelligence and Computing Technologies

(ICNICT 2011), Dept. Computer Science, Karpagam University, Coimbatore, Dec. 15-16.

29. M. Hemalatha, Lakshmi Devasena.C, Sumathi.T, Gomathi.V.V and MalarKodi.R, 2011.

Predicting Effectiveness of Rule Based Classifiers for a Classification Problem. Int. Conf.

Networks Intelligence and Computing Technologies (ICNICT 2011), Dept. Computer Science,

Karpagam University, Coimbatore, Dec. 15-16.

30. M. Hemalatha, Sumathi.T, Lakshmi Devasena.C, Revathi.R and Priya.S, 2011. Automatic

Image Annotation and Retrieval using Multi-Instance Multi-Label Learning-A Review. Int. Conf.

Dr.M.Hemalatha Page 26 of 32

Networks Intelligence and Computing Technologies (ICNICT 2011), Dept. Computer Science,

Karpagam University, Coimbatore, Dec. 15-16.

31. M. Hemalatha and Anny Leema.A, 2010. Software Architecture for Semantic Web Mining in the

Parallel Distributed Environment. ICCIC 2010. Tamilnadu College of Engineering, Coimbatore.

Dec. 29.

32. M. Hemalatha, Sasirekha.N, Easwari.S, Naga Saranya.N, 2010. An Empirical Model for

Clustering and Classification of Instrumental Music using Machine Learning Technique. IEEE

Int. Conf. Computational Intelligence and Computing Research, Tamilnadu College of

Engineering, Coimbatore. Dec.28-29.

33. M. Hemalatha and Sumathi.T, 2010. WTMS – A Novel Web Text Mining System. Computer

Applications for Managerial Excellence, NCCAME 2010. pp: 165-173.

34. M. Hemalatha and Lakshmi Devasena.C, 2010. Image/ Video Retrieval Technique: Grand

Challenges and Trends. NCOADMINS - 2010, 1(1); 97-106.

35. Anandkumar.S, Appadurai,K, Nagarajan.P and M. Hemalatha, 2010. An efficient approach

towards Security in TCP/IP Protocol suite. 1st Int. Conf. Intelligent Information Systems and

Management, RVS Engineering College of Engineering, Coimbatore.

36. M. Hemalatha and Sathya Srinivas.D, 2009. Hybrid Network model for efficient Web Document

Clustering. IEEE 2nd Int. Conf. Applications of Digital Information and Web Technologies,

London, Aug. 4-6.

37. M. Hemalatha and Karthikeyan.S, 2009. Neural Network model for Web Document Clustering.

Proceedings of 8th Int. Conf. World Scientific Engineering Academy and Society, Hangzhou,

China. May 20-22.

38. M. Hemalatha, Vivekanandan.K, 2009. An efficient Neural Network based Hybrid Model for

Web Document Clustering. Int. Conf. Computer Science and Engineering, World Academy of

Science, Engineering and Technology, Rome, Italy, Apr. 28-30.

39. M. Hemalatha and Vivekanandan.K, 2009. FART based Neural Network for Probabilistic Motif

Discovery in Unaligned Biological Sequences. Int. Conf. Data mining and its Application, Int.

Association of Engineers and Computer Scientists and IEEE, Hongkong, Mar.18-19.

40. M. Hemalatha and Vivekanandan.K, 2008. A Generic Architecture for parallel clustering of high

dimensional data. Int. Conf. Data and Knowledge Management, Department of Computer

Science and Engineering , Bishop Herber College. Feb. 9.

41. M. Hemalatha and Vivekanandan.K, 2008. An efficient SVD based Model for Phylogentic

construction. Int. Conf. computer science and engineering, World Academy of Science,

Engineering and Technology, Egypt. Feb. 9.

Dr.M.Hemalatha Page 27 of 32

42. M.Hemalatha and Vivekanandan.K, 2006. High performance Sorting Algorithm to analyze Micro

array data. Int. Conf. Bioinforamtics, Department of Biotechnology, Govt of India, Jawaharlal

Nehru University, Dec. 18-20.

43. M. Hemalatha and Vivekanandan.K, 2006. An efficient Algorithm for Text Mining. Int. Conf.

Bioinforamtics, Department of Biotechnology, Govt of India, Jawaharlal Nehru University. Dec.

18-20.

44. M. Hemalatha, Karthikeyan.S, and Ramaraj.E, 2005. A new approach of Hybrid Encryption

Technique in Database Security. 2nd Int. Conf. Technology Knowledge and Society, Hyderabad.

Dec. 12-15.

45. M. Hemalatha, Gomathi.V.V and Karthikeyan.S, 2005. An Efficient Algorithm for Predicting

Survival of Medical Data (Epsa). 2nd Int. Conf. Technology Knowledge and Society, Hyderabad.

Dec. 12-15.

46. M. Hemalatha, Karthikeyan.S, and Ramaraj.E, 2005. A new approach of secure protocol using

hybrid encryption technique. Int. Conf. Business Economics and Finance (ICBEFT2005),

Adaikalamatha College, Thanjavur. Sep.29-30.

47. M. Hemalatha, Karthikeyan.S, and Ramaraj.E, 2005. An Analysis path Recovery Schemes in

Intra and Internet using optical fiber network communication using GMPLS. Int. Conf. Business

Economics and Finance (ICBEFT2005), Adaikalamatha College, Thanjavur. Sep. 29-30.

48. M. Hemalatha and V.V.Gomathi, 2005. An Efficient Algorithm for Web Mining. 16th Int. Conf.

IRMA 2005, Information Resource Management Association, San Digo, California and USA.

49. M. Hemalatha, Karthikeyan.S and Gopalakrishnan.V.K, 2004. Methods to Solve the Pitfalls of

Shannon’s Information Theory in DNA Sequence Analysis. Int. Conf. Number Theory and

Fourier Techniques (ICNFT), Srinivasa Ramanujan Center, Sastra University, Kumbakonam.

Dec. 19.

50. National level conference on MOTIF’03 Organized by department of Bioinformatics, Bharathiar

University, Coimbatore.

National Conferences

1. Ajith Singh. N and M. Hemalatha, 2012. High Performance Computing Network for Cloud

Environment using Simulators. National Conference on High Performance Computing (HPC

‘12), Kongu Engineering College, Perunthurai. Mar. 14-15.

2. Senthamilarasu. S and M. Hemalatha, 2012. Proficient Data Stream Algorithms using Wireless

Sensor Network. National Conference on Advances in Computing, Control, Communication,

Automation and Structural Engineering (ACCCAS’12), Al-Ameen Engineering College, Erode,

Mar. 10.

3. Sathesh Kumar. K and M. Hemalatha, 2012. A Decentralised Multi-Agent Ontology-Based

System for Information Retrivel with Data Mining in Cloud Computing Environment. National

Dr.M.Hemalatha Page 28 of 32

Conference on Advances in Computing, Control, Communication, Automation and Structural

Engineering (ACCCAS’12), Al-Ameen Engineering College, Erode, Mar. 10.

4. Gopinath. R and M. Hemalatha, 2012. A Visual Data Mining Approach Discovering Structure in

Geographical Metadata. National Conference on Advances in Computing, Control,

Communication, Automation and Structural Engineering (ACCCAS’12), Al-Ameen Engineering

College, Erode, Mar. 10.

5. Senthamilarasu. S and M. Hemalatha, 2012. An Efficient Data Stream Algorithms using

Wireless Sensor Network. National Conference on Electro Communique Eludo ’12,

Ranganathar Engineering College, Coimbatore. Mar. 7.

6. Krishnaveni. S and M. Hemalatha, 2012. Performance Analysis of Particle Swarm Optimization

Algorithms in Jobs Scheduling for Data Warehouse. National Conference on Simulations in

Computing Nexus (NCSCN 12), Coimbatore Institute of Engineering and Technology,

Coimbatore. Mar. 2.

7. Vasanthi. V and M. Hemalatha, 2012. A Review on Path Planning Algorithms for Ad-Hoc

Wireless Sensor Network. National Conference on Simulations in Computing Nexus (NCSCN

12), Coimbatore Institute of Engineering and Technology, Coimbatore. Mar. 2.

8. Sasirekha. N and M. Hemalatha, 2011. Using Program Slicing to Identify Faults in software.

National Seminar on Emerging Trends and Applications of Information Technology (NSETAIT-

2011), Vidyasagar College of Arts and Science, Udumalpet. Feb. 12.

9. N.Sasirekha and M.Hemalatha, 2011. Green Computing – New Horizon of Energy Efficiency

and E-Waste Minimization. National Conference on Advanced Computing Technologies

(NCACT’11), Vidyasagar College of Arts and Science, Udumalpet. Feb. 25.

10. N.Sasirekha and M.Hemalatha, 2011. A Survey on Program Slicing Techniques. National

Conference on Advanced Computing Technologies (NCACT’11), Vidyasagar College of Arts

and Science, Udumalpet, Feb. 25.

11. M. Hemalatha, Sasirekha.N and Naga Saranya.N, 2010. An Empirical Study on Agile Principles

of Extreme Programming. 2nd National Conference on Advanced Computing (NCAC’10),

D.J.Academy for Managerial Excellence, Coimbatore. Sep. 24-25.

12. M. Hemalatha and Anny Leema.A, 2010. A Proposed Method to Solve the Drawbacks of

Association Rule in E-Learning. Emerging Issues in Computer Applications, K.S.R College of

Engineering, Tiruchengode. Feb. 20.

13. M. Hemalatha and Anny Leema.A, 2010. Proposed System on E-Learning Behavior Mine

System. NETCIT 2010, Sona College of Technology, Salem. Mar.26.

14. M. Hemalatha and Anny Leema.A, 2010. Measuring the Reliability of Students Behavior in E-

Learning. NCICE 2010, CMS College of Engineering, Coimbatore. March.

15. M. Hemalatha and Anny Leema.A, 2010. Enhanced Web-based Learning Environment.

NCCCINM 2010, Karpagam Engineering, Coimbatore. Mar. 25.

16. M. Hemalatha, S.Akila, C.V.Vincy Mary and V.K.Gopalakrishnan, 2009. A New Approach For

Prokarytoic Target Identification (Bacteria). UGC and DBT Sponsored National Conference on

Biocomputing, Department of Zoology, Annamalai University, Chidambaram. Feb. 23-24.

Dr.M.Hemalatha Page 29 of 32

17. M. Hemalatha, S.Akila, A.Kavitha and V.K.Gopalakrishnan, 2009. An Efficient Algorithm For

Constructing Phylogenetic Tree. UGC and DBT Sponsored National Conference on

Biocomputing, Department of Zoology, Annamalai University, Chidambaram. Feb. 23-24.

18. M. Hemalatha, N.Kavitha and S.Karthikeyan, 2009. An Analysis of Path Recovery Schemes in

Optical Network Communication using Generalized Multi Protocol Label Switching (GMPLS).

Computer Society of India sponsored National Conference on Advanced computing and IT

applications, KGISL Arts and Science College, Coimbatore, March.

19. M. Hemalatha, N.Kavitha and S.Karthikeyan, 2009. An effective approach for load balancing

analysis in Distributed environment. National Conference on soft computing, image processing,

Network and Data Management, Karpagam College of Engineering, Coimbatore. Mar. 25-26.

20. M. Hemalatha and R.Rathish, 2007. Rice Transcription Micro array Analysis and Comparative

Genomic Analysis of Rice and Arabbidiopsis. National Conference on Emerging Trends in

Biotechnology, Vivekanandha College of Engineering for women, Erode.

21. M. Hemalatha and R. Rathish, 2007. Approaches on Assigning Functionality to a predicted

Gene Using Sequence Analysis Tools. National Conference on Trends and Applications of

Bioinformatics, Bharath University, Chennai.

22. M. Hemalatha and Sathish, 2007. In Slico approaches to gene prediction on the Human X

chromosome Xq22, National Conference on Trends and Applications of Bioinformatics, Bharath

University, Chennai.

23. M. Hemalatha, Devika and Ann Mary Das, 2007. Bacterial Target Identification. National

Conference on Trends and Applications of Bioinformatics, Bharath University, Chennai.

24. M. Hemalatha, 2007. Computational Proteomic Analysis on Erythrocyte Membrane Protein 1”,

Which Binds Human Immunoglobulin. National Conference on Trends and Applications of

Bioinformatics, Bharath University, Chennai.

25. M. Hemalatha, 2007. Comparative Analysis of Compression Techniques for Fast Retrieval of

Association Rule Mining. Conference on Data mining and its Application, Gobi Arts and Science

College, Gobichettipalayam.

26. M. Hemalatha, 2005. Iterative Dichotomizer3 Algorithm on Functional Genomics. UGC

Sponsored National Conference on Distributed Networks, Gobi Arts and Science College,

Gobichettipalayam.

27. M. Hemalatha, 2005. Applying Data mining Techniques to Micro Array Data. UGC Sponsored

National Conference on Distributed Networks, Gobi Arts and Science College,

Gobichettipalayam.

28. M.Hemalatha, 2005. The New Approach of Secure Protocol using Smart card with Hybrid

Encryption Technique. UGC sponsored State level conference on Wireless communication Sep

2005, Kongu Nadu Arts and Science College, Coimbatore.

29. M.Hemalatha, 2005. An algorithamatic Approach. E-Cluster Affinity Search Techniques. UGC

Sponsored National Conference on Distributed Networks, Gobi Arts and Science College,

Gobichettipalayam.

Dr.M.Hemalatha Page 30 of 32

30. M.Hemalatha, 2005. A Suitable Sorting and Pattern Classification Algorithm for Analyzing Micro

Array Data. UGC sponsored National Conference on Data mining and its Applications,

Annamalai University, Chidambaram.

31. M.Hemalatha, 2005. A Tool for Analyze Medical Data Using Data Mining Techniques. UGC

sponsored National Conference on Data mining and its Applications, Annamalai University,

Chidambaram.

32. M.Hemalatha, V.V.Gomathi, and S.Karthikeyan, 2005. IT in Modern Health Care Systems. UGC

Sponsored National Conference on Information Technology Industry-Challenges and

Opportunities, Erode Arts College, Erode.

33. M.Hemalatha, V.V.Gomathi, and S.Karthikeyan, 2005. A conceptual Framework for the role of

IT in Managing diversity in Global Business. UGC Sponsored National Conference on

Information Technology Industry-Challenges and Opportunities, Erode Arts College, Erode.

34. M.Hemalatha, V.V. Gomathi, and S. Karthikeyan, 2005. Role of IT in Biology. UGC Sponsored

National Conference on Information Technology Industry-Challenges and Opportunities, Erode

Arts College, Erode.

35. M.Hemalatha, 2004. Pattern Recognition Techniques in Microarray data analysis. UGC

sponsored National Conference on Distributed Database and Computing, Department of

Computer Science, Gobi Arts and Science College, Gobichettipalayam.

36. M.Hemalatha, V.V.Gomathi and S.Karthikeyan, 2004. Spatial Data mining Techniques for

medical image classification. UGC sponsored National Conference on Networking and

Multiagent Systems, Department of Computer Science, Gobi Arts and Science College,

Gobichettipalayam.

37. M.Hemalatha, 2004. Association Rule mining in Biological data. UGC sponsored National

Conference on Networking and Multiagent Systems, Department of Computer Science, Gobi

Arts and Science College, Gobichettipalayam.

38. M.Hemalatha, V.V.Gomathi and S.Karthikeyan, 2004. Analysis of Melanoma skin cancer

diagnosis by spatial data mining methods. UGC sponsored National Conference on Networking

and Multiagent Systems, Department of Computer Science, Gobi Arts and Science College,

Gobichettipalayam.

39. M.Hemalatha and Shalini Sridhar, 2004. Evolution and Phylogenetic. National Level conference

on MOTIF’04, Department of Bioinformatics, Bharathiar University, Coimbatore. (3rd Prize).

40. M.Hemalatha, 2004. Protein Modeling by HMM. National level conference MOTIF’04,

Department of Bioinformatics, Bharathiar University, Coimbatore.

41. M.Hemalatha, 2004. Protein Sequence Analysis by HMM. National level conference Biological

Congress, Muthayammal College of Arts and Science, Rasipuram.

42. M.Hemalatha, V.V.Gomathi and S.Karthikeyan, 2004. Data mining Techniques in Micro Array

Data Analysis. National Conference on Emerging Technologies and Applications, Navarasam

Arts and Science College for Women, Erode.

Dr.M.Hemalatha Page 31 of 32

43 M.Hemalatha, 2003. A New integrated Video Sensor Technology for Traffic Management

Application. National Level Seminar organized by Department of Electronics, Karpagam Arts

and Science College, Coimbatore.

44 M.Hemalatha and M.Kanchana, 2003. Stochastic Modeling By HMM. UGC sponsored National

conference, Department of Mathematics, Gandhigram University, Dindigual.

45 M.Hemalatha and M.Kanchana, 2003. Mathematical modeling in Protein Modeling. UGC

sponsored National conference on Mathematical Modeling, Department of Mathematics,

Gandhigram University, Dindigual.

1. One day Workshop on “Matlab – Research Tool ”, Organized by Department of Computer

Application , GRD College of Arts and Science , September, 2009

2. One day Workshop on “A Step Towards research- an introductory course in Latex”, Organized by

Department of Computer Application, DJ Academy of Managerial Excellence, 31st January, 2009

3. Training course on “IBM Certified Database AssociateDB2 Universal Database V8.1 Family “. 27,

November, 2007.

4. Training course on “Gene to Drug “ (Wet Lab to Dry Lab) Vital Malya Research Foundation

(Bangalore). 18 March, 2006

5. National Seminar on “Cisco Networking Technology” Organised by Department of Computer

Science and Engineering at Dr. Mahalingam Engineering College, Pollachi . August 2006.

6. National Level seminar on “Recent Advances In Computer Aided Drug Discovery” at Karpagam

Arts and Science College, Coimbatore-21. 17th July, 2006.

7.Course on “Mathematical Modeling on Computer Simulation” organized by CSIR Center for

Mathematical Modeling, March 14-16, 2005

8. National level conference on MOTIF’05 organised by department of Bioinformatics, Bharathiar

University, Coimbatore. October 2005

9. National Level seminar on “National Symposium on Chromosomes in Human Genome’’ at

Karpagam Arts and Science College, Coimbatore-21. 3rd and 4th December 2004”

10. Training on GCG Wisconsin Package at Karpagam Arts and Science College, Coimbatore-21

May 19-21, 2004.

11. Molecular Modeling Workshop Organised by Department of bioinformatics, Anna University,

Chennai. 9-12 December, 2004

12. Conference on Software Testing organized by Hindustan Engineering College, Chennai and Tata

Indicom. Nov 16,2004

13. International Workshop on Bioinformatics at Karpagam Arts and Science College, Coimbatore-21.

December 12-14, 2003

14. “Recent Trends in Networking Technology” at Karpagam Arts and Science College, Coimbatore-

21. December 12-14, 2003.

15. Seminar on “Genomics and Bioinformatics”, at Karpagam Arts and Science College, Coimbatore-

21, 19- 20th Sep 2003.

Workshops/Seminars Participated

Dr.M.Hemalatha Page 32 of 32

16. National level conference on MOTIF’03 Organized by department of Bioinformatics, Bharathiar

University, Coimbatore.

Dubai, Malaysia, Singapore, Israel, Hong Kong

References

1. Dr.K.Vivekanandan

Professor

School of Management and Entrepreneur Development

Bharathiar University

Coimbatore

Tamilnadu,India

Phone number : 9843249890

E-mail : [email protected]

2. Dr.M.Punithavalli

Associate Professor

Department of Computer Science

Bharathiar University

Coimbatore

Ph No: 9843281552

[email protected]

3. Prof. M. V. Ramana Murthy,

Chairman Computer science,

UGC Project Pannel Member

Head Dept. Of Mathematics,

Osmania University,

Hyderabad,

India

The information that is given above is true to my best of knowledge.

[M.Hemalatha]

Countries Visited

Declaration