Works by Kumar, S. N. Santhosh
Results: 30
Comparison of efficacy of 0.75% ropivacaine and 2% lidocaine with 1:200,000 adrenaline in pain control in extraction of mandibular posterior teeth: A double-blind study.
- Published in:
- 2018
- By:
- Publication type:
- journal article
Multi-tier block truncation coding model using genetic auto encoders for gray scale images.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 29, p. 42621, doi. 10.1007/s11042-022-13475-x
- By:
- Publication type:
- Article
Comparative Evaluation of Efficacy of Oral Diazepam and Buspirone in Reducing Anxiety and Discomfort in Mandibular Third Molar Surgery- In Vivo Study.
- Published in:
- Indian Journal of Public Health Research & Development, 2019, v. 10, n. 3, p. 66, doi. 10.5958/0976-5506.2019.00483.2
- By:
- Publication type:
- Article
Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network.
- Published in:
- Wireless Networks (10220038), 2025, v. 31, n. 1, p. 825, doi. 10.1007/s11276-024-03802-5
- By:
- Publication type:
- Article
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 5, p. 3269, doi. 10.1007/s11276-024-03709-1
- By:
- Publication type:
- Article
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 3, p. 1493, doi. 10.1007/s11276-023-03603-2
- By:
- Publication type:
- Article
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 335, doi. 10.1007/s11276-023-03473-8
- By:
- Publication type:
- Article
Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 209, doi. 10.1007/s11276-023-03470-x
- By:
- Publication type:
- Article
LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 1, p. 151, doi. 10.1007/s11276-023-03459-6
- By:
- Publication type:
- Article
Comparative Evaluation of Immediate Post- Operative Sequelae after Surgical Removal of Impacted Mandibular Third Molar with or without Tube Drain - Split-Mouth Study.
- Published in:
- Journal of Clinical & Diagnostic Research, 2016, v. 10, n. 12, p. 46, doi. 10.7860/JCDR/2016/20951.9054
- By:
- Publication type:
- Article
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-89208-5
- By:
- Publication type:
- Article
Smart Prediction and Monitoring of Waste Disposal System Using IoT and Cloud for IoT Based Smart Cities.
- Published in:
- Wireless Personal Communications, 2022, v. 122, n. 1, p. 243, doi. 10.1007/s11277-021-08897-z
- By:
- Publication type:
- Article
An Energy Efficient Clustered Gravitational and Fuzzy Based Routing Algorithm in WSNs.
- Published in:
- Wireless Personal Communications, 2021, v. 116, n. 1, p. 61, doi. 10.1007/s11277-020-07705-4
- By:
- Publication type:
- Article
Infiltrating lipoma of the chin: Report of a rare case.
- Published in:
- Journal of Dental Research & Review, 2014, v. 1, n. 2, p. 90, doi. 10.4103/2348-2915.133952
- By:
- Publication type:
- Article
Maxillofacial osteoradionecrosis.
- Published in:
- Journal of Dental Research & Review, 2014, v. 1, n. 1, p. 42, doi. 10.4103/2348-3172.126171
- By:
- Publication type:
- Article
Munchmeyer's disease--a rare case report and review of literature.
- Published in:
- Dentomaxillofacial Radiology, 2014, v. 43, n. 5, p. 1, doi. 10.1259/dmfr.20140022
- By:
- Publication type:
- Article
An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 2, p. 1, doi. 10.1007/s12083-024-01867-9
- By:
- Publication type:
- Article
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 3049, doi. 10.1007/s12083-024-01726-7
- By:
- Publication type:
- Article
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 5, p. 2609, doi. 10.1007/s12083-024-01708-9
- By:
- Publication type:
- Article
A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 3, p. 1442, doi. 10.1007/s12083-024-01636-8
- By:
- Publication type:
- Article
A comprehensive survey on communication techniques for the realization of intelligent transportation systems in IoT based smart cities.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 3, p. 1263, doi. 10.1007/s12083-024-01627-9
- By:
- Publication type:
- Article
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles.
- Published in:
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 1, p. 89, doi. 10.1007/s12083-023-01572-z
- By:
- Publication type:
- Article
Retraction Note: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 21, p. 16483, doi. 10.1007/s00500-020-04955-z
- By:
- Publication type:
- Article
Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 199, doi. 10.1007/s10207-023-00737-4
- By:
- Publication type:
- Article
Exploring the Potential Use of a Kocher Langenbach Retractor for Intraoral Reduction of Isolated Zygomatic Arch Fracture.
- Published in:
- 2021
- By:
- Publication type:
- Letter
Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 7, p. 4513, doi. 10.1007/s11276-021-02748-2
- By:
- Publication type:
- Article
Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 6, p. 3873, doi. 10.1007/s11276-021-02660-9
- By:
- Publication type:
- Article
Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 4, p. 1343, doi. 10.1007/s11276-017-1549-3
- By:
- Publication type:
- Article
A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things.
- Published in:
- Computational Intelligence & Neuroscience, 2023, v. 2023, p. 1, doi. 10.1155/2023/8981988
- By:
- Publication type:
- Article