M. Hemalatha

Orcid: 0000-0001-5345-2375

According to our database1, M. Hemalatha authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Performance Evaluation of Natural Language Processing Algorithms for Sentiment Analysis.
SN Comput. Sci., August, 2024

A Novel high-voltage DMG Fe-doped AlGaN/AlN/GaN HEMTs with sheet charge density model.
Microelectron. J., 2024

2022
A hybrid random forest deep learning classifier empowered edge cloud architecture for COVID-19 and pneumonia detection.
Expert Syst. Appl., December, 2022

Optimal AdaBoost kernel support vector machine for monitoring arrhythmia patients utilizing Internet of Things-cloud environment.
Concurr. Comput. Pract. Exp., 2022

2021
Searching time operation reduced IPV6 matching through dynamic DNA routing table for less memory and fast IP processing.
Soft Comput., 2021

2018
Generation of Image Caption Using CNN-LSTM Based Approach.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Link Quality Estimation for Adaptive Data Streaming in WSN.
Wirel. Pers. Commun., 2017

2014
K-means clustering for profiling the rural women entrepreneurs in India.
Int. J. Bus. Inf. Syst., 2014

2013
Space Diversity Knotted with WiMAX- A Way for Undistorted and Anti-Corruptive Channel.
Wirel. Pers. Commun., 2013

Simulation of Obstruction Avoidance Generously Mobility (OAGM) Model using Graph-theory Technique
CoRR, 2013

Efficient computer aided diagnosis of abnormal parts detection in magnetic resonance images using hybrid abnormality detection algorithm.
Central Eur. J. Comput. Sci., 2013

Study on the suitability of LDPC combined with diversity technique in broadband wireless systems.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

Reduce Energy Consumption through Virtual Machine Placement in Cloud Data Centre.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2013

Performance Analysis of Tree Based Classification Algorithms for Intrusion Detection System.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2013

Dependency-Based Query Scheduling in Distributed Data Warehouse Environment.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2013

2012
Market basket analysis - a data mining application in Indian retailing.
Int. J. Bus. Inf. Syst., 2012

High performance computing network for cloud environment using simulators
CoRR, 2012

Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Towards improving automatic image annotation using improvised fractal SMOTE approach.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An improved secure code encryption approach based on indexed table.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An evaluation of clustering technique over intrusion detection system.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Efficient method for noise removal techniques and video object segmentation using color based fuzzy c means.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Object detection in video using Lorenz information measure and discrete wavelet transform.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection.
Proceedings of the Second International Conference on Computational Science, 2012

Efficient method for feature extraction on video preocessing.
Proceedings of the Second International Conference on Computational Science, 2012

A new deferred cleansing technique for effective warehousing of RFID.
Proceedings of the Second International Conference on Computational Science, 2012

A New Approach for Noise Removal and Video Object Segmentation Using Color Based Fuzzy C-Means Technique.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Program slicing techniques and its applications
CoRR, 2011

An innovative image fusion algorithm based on wavelet transform and discrete fast curvelet transform.
Central Eur. J. Comput. Sci., 2011

2008
A Distributed and Parallel Clustering Algorithm for Massive Biological Data.
J. Convergence Inf. Technol., 2008


  Loading...