Professor , Sri Ramakrishna College of Arts and Science,Coimbatore
Verified email at srcas.ac.in - Homepage
TitleCited byYear
Effective approach toward Intrusion Detection System using data mining techniques
GV Nadiammai, M Hemalatha
Egyptian Informatics Journal 15 (1), 37-50, 2014
Classification of cotton leaf spot diseases using image processing edge detection techniques
P Revathi, M Hemalatha
2012 International Conference on Emerging Trends in Science, Engineering and …, 2012
A study of techniques for facial detection and expression classification
G Hemalatha, CP Sumathi
International Journal of Computer Science and Engineering Survey 5 (2), 27, 2014
Article: A Perspective Analysis of Traffic Accident using Data Mining Techniques}
S Krishnaveni, M Hemalatha
International Journal 23, 40-48, 0
Cloud computing for academic environment
A Singh, M Hemalatha
Video Surveillance Systems–A Survey
CL Devasena, R Revathí, M Hemalatha
International Journal of Computer Science 8, 0
RFID GPS and GSM based logistics vehicle load balancing and tracking mechanism
KR Prasanna, M Hemalatha
Procedia Engineering 30, 726-729, 2012
Effectiveness evaluation of rule based classifiers for the classification of iris data set
CL Devasena, T Sumathi, VV Gomathi, M Hemalatha
Bonfring International Journal of Man Machine Interface 1 (Special Issue …, 2011
A Comprehensive Survey on Human Skin Detection.
MR Mahmoodi, SM Sayedi
International Journal of Image, Graphics & Signal Processing 8 (5), 2016
Cotton leaf spot diseases detection utilizing feature selection with skew divergence method
P Revathi, M Hemalatha
International Journal of scientific engineering and technology 3 (1), 22-30, 2014
Program slicing techniques and its applications
N Sasirekha, AE Robert, DM Hemalatha
arXiv preprint arXiv:1108.1352, 2011
Advance computing enrichment evaluation of cotton leaf spot disease detection using Image Edge detection
P Revathi, M Hemalatha
2012 Third International Conference on Computing, Communication and …, 2012
Automatic Text categorization and summarization using rule reduction
CL Devasena, M Hemalatha
Advances in Engineering, Science and Management (ICAESM), 2012 International …, 2012
A detailed study of mobility models in wireless sensor networks
V Vasanthi, M Romenkumar, N Ajithsingh, M Hemalatha
Journal of Theoretical and Applied Information Technology 33 (1), 7-14, 2011
Secret link through simulink: A stego on OFDM channel
P Praveenkumar, GS Hemalatha, B Reddy, K Thenmozhi, JBB Rayappan, ...
Inform. Technol. J 13, 1999-2004, 2014
The enzymes
RC Bray
Part XII, 303-387, 1975
An overview of automated image annotation approaches
T Sumathi, CL Devasena, M Hemalatha
International Journal of Research and Reviews in Information Sciences 1 (1), 1-5, 2011
A Design of Security Protocol using Hybrid Encryption Technique (AES-Rijndael and RSA)
E Ramaraj, S Karthikeyan, M Hemalatha
International Journal of The Computer, the Internet and Management 17 (1), 78-86, 2009
An Approach on Semi-Distributed Load Balancing Algorithm for Cloud Computing System
M Hemalatha
International Journal of Computer Applications 56 (12), 5-10, 2012
An experiential survey on image mining tools, techniques and applications
CL Devasena, T Sumathi, M Hemalatha
International Journal on Computer Science and Engineering (IJCSE), 2011
The system can't perform the operation now. Try again later.
Articles 1–20