Professor , Sri Ramakrishna College of Arts and Science,Coimbatore
Verified email at srcas.ac.in - Homepage
Cited by
Cited by
Effective approach toward Intrusion Detection System using data mining techniques
GV Nadiammai, M Hemalatha
Egyptian Informatics Journal 15 (1), 37-50, 2014
Classification of cotton leaf spot diseases using image processing edge detection techniques
P Revathi, M Hemalatha
2012 International Conference on Emerging Trends in Science, Engineering andá…, 2012
Article: A Perspective Analysis of Traffic Accident using Data Mining Techniques}
S Krishnaveni, M Hemalatha
International Journal 23, 40-48, 0
Cloud computing for academic environment
A Singh, M Hemalatha
A study of techniques for facial detection and expression classification
G Hemalatha, CP Sumathi
International Journal of Computer Science and Engineering Survey 5 (2), 27, 2014
RFID GPS and GSM based logistics vehicle load balancing and tracking mechanism
KR Prasanna, M Hemalatha
Procedia Engineering 30, 726-729, 2012
Effectiveness evaluation of rule based classifiers for the classification of iris data set
CL Devasena, T Sumathi, VV Gomathi, M Hemalatha
Bonfring International Journal of Man Machine Interface 1 (Special Issueá…, 2011
Advance computing enrichment evaluation of cotton leaf spot disease detection using image edge detection
P Revathi, M Hemalatha
2012 Third International Conference on Computing, Communication andá…, 2012
Cotton leaf spot diseases detection utilizing feature selection with skew divergence method
P Revathi, M Hemalatha
International Journal of scientific engineering and technology 3 (1), 22-30, 2014
Video Surveillance Systems–A Survey
CL Devasena, R RevathÝ, M Hemalatha
International Journal of Computer Science 8, 0
Automatic Text categorization and summarization using rule reduction
CL Devasena, M Hemalatha
Advances in Engineering, Science and Management (ICAESM), 2012 Internationalá…, 2012
A detailed study of mobility models in wireless sensor networks
V Vasanthi, M Romenkumar, N Ajithsingh, M Hemalatha
Journal of Theoretical and Applied Information Technology 33 (1), 7-14, 2011
A Design of Security Protocol using Hybrid Encryption Technique (AES-Rijndael and RSA)
E Ramaraj, S Karthikeyan, M Hemalatha
International Journal of The Computer, the Internet and Management 17 (1), 78-86, 2009
An Approach on Semi-Distributed Load Balancing Algorithm for Cloud Computing System
M Hemalatha
International Journal of Computer Applications 56 (12), 5-10, 2012
Cluster based bee algorithm for virtual machine placement in cloud data centre
A Singh, M Hemalatha
J. Theor. Appl. Inf. Technol 57 (3), 1-10, 2013
Program slicing techniques and its applications
N Sasirekha, AE Robert, DM Hemalatha
arXiv preprint arXiv:1108.1352, 2011
Identification of cotton diseases based on cross information gain deep forward neural network classifier with PSO feature selection
P Revathi, M Hemalatha
International Journal of Engineering and Technology 5 (6), 4637-4642, 2014
An experiential survey on image mining tools, techniques and applications
CL Devasena, T Sumathi, M Hemalatha
International Journal on Computer Science and Engineering (IJCSE), 2011
An overview of automated image annotation approaches
T Sumathi, CL Devasena, M Hemalatha
International Journal of Research and Reviews in Information Sciences 1 (1), 1-5, 2011
Homogenous Segmentation based Edge Detection Techniques for Proficient Identification of the Cotton Leaf Spot Diseases
P Revathi, M Hemalatha
International Journal of Computer Applications 47 (2), 18-21, 2012
The system can't perform the operation now. Try again later.
Articles 1–20