Skip to main content
Dr. Hari Om Sharan

    Dr. Hari Om Sharan

    Introduction: In December 2019, a rapid spread of highly infectious, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS-CoV-2), was reported in Wuhan, China. The gold standard for diagnosis of SARS-CoV-2 infection is nucleic acid... more
    Introduction: In December 2019, a rapid spread of highly infectious, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS-CoV-2), was reported in Wuhan, China. The gold standard for diagnosis of SARS-CoV-2 infection is nucleic acid amplification technology by detecting its viral Ribonucleic Acid (RNA) from respiratory swabs (oropharyngeal and nasopharyngeal) by Reverse Transcription-Polymerase Chain Reaction (RT-PCR) whose specificity is approximately 95%. Magnetic bead RNA extraction was benchmarked against the commercial QIAcube extraction platform. Aim: To compare the efficacy of nucleic acid extraction by manual method and automated magnetic bead-based method to detect SARS-CoV-2. Materials and Methods: The present observational comparative study was conducted in the Department of Microbiology, Autonomous State Medical College, Firozabad, Uttar Pradesh, India. Duration of the study was from February to March 2022. A total of 470 oropharyngeal and nasopharyngeal samples were inc...
    : Activity recognition deals with the automation of recognizing various activities by identifying the subject and its interactions with the environment. Human activity recognition deals with identifying different activities like sitting,... more
    : Activity recognition deals with the automation of recognizing various activities by identifying the subject and its interactions with the environment. Human activity recognition deals with identifying different activities like sitting, walking, laying moving, running, jogging, various hand movements, posture and behavior prediction and recognition. Activity recognition deals with the automation of recognizing various activities by identifying the subject and its interactions with the environment. The wide variety of environments are incorporated with Human Activity Recognition. It assists with the vast variety of problems related to people, living, lifestyle, security, monitoring, which may or may not be related to computer science.
    This paper mainly focuses on the recent advances in the mathematical models that provide the ability to predict the contaminant concentration levels of river water. The study represents an attempt for the researchers to study the problem... more
    This paper mainly focuses on the recent advances in the mathematical models that provide the ability to predict the contaminant concentration levels of river water. The study represents an attempt for the researchers to study the problem of pollution, and we think that these mathematical analyses would provide better planning for water quality control. The model consists of a pair of coupled reaction Advection-diffusion equations for the pollutant and dissolved oxygen concentrations. Numerical solutions are obtained and some important inferences are drawn through simulation study. The Advection-Diffusion equation is characterized by the reaction term whenever it depends on concentration of the contaminants and in this case the original single Advection-diffusion equation will evolve to be a system of equations. It is no ticked that the higher are diffusion and reaeration coefficients, the faster is the river purity.
    Digital image is one of the best media to store data. It provides large capacity for hiding secret information which results into stego-image imperceptible to human vision. Digital images are widely communicated over the internet. The... more
    Digital image is one of the best media to store data. It provides large capacity for hiding secret information which results into stego-image imperceptible to human vision. Digital images are widely communicated over the internet. The security of digital images is an essential and challenging task on shared communication channel. Various techniques are used to secure the digital image, such as encryption, steganography and watermarking. Steganography is the process of art and science in such a way that no one apart from sender and intended recipient even realizes that the communication is going on. It is also used to authenticate the digital images. This paper presents a security technique using encryption, steganography and watermarking. It comprises of three key components: (1) the original image has been encrypted using large secret key by rotating pixel bits to right through XOR operation, (2) for steganography, encrypted image has been altered by least significant bits (LSBs) o...
    In today‟s e-life we generally need to manage data which assumes a huge job in our lives. One of the significant wellsprings of data is clearly the monster web. At the point when we move our heads around, we can see things that are acting... more
    In today‟s e-life we generally need to manage data which assumes a huge job in our lives. One of the significant wellsprings of data is clearly the monster web. At the point when we move our heads around, we can see things that are acting savvy, and are therefore making the human lives progressively shrewd and e-driven. These things demonstration savvy just as they are associated with the web, and are thus called as the „Internet of Things (IoT)‟. In Internet of Things (IoT), gadgets assemble and share data straightforwardly with one another and the cloud, making it conceivable to gather, record and investigate new information streams quicker and all the more precisely. IoT offers an incredible guarantee in the field of e-medicinal services, where its standards are as of now being applied to build the nature of care, improve access to mind and in particular diminish the expense of care. Implanted advancements are being utilized in applications like e-wellbeing frameworks that convey...
    No one has time to read everything, yet we often have to make critical decisions based on what we are able to understand. With summaries, we can make effective decisions in less time. Thus the technology of automatic text summarization is... more
    No one has time to read everything, yet we often have to make critical decisions based on what we are able to understand. With summaries, we can make effective decisions in less time. Thus the technology of automatic text summarization is becoming essential to deal with the problem of information overload. Text summarization is the process of extracting the most important information from a single document or from a set of documents to produce a short and information rich summary for a particular user or task. Multi-document summarization is an automatic procedure for extraction of information from multiple texts about the same topic. Most of the MDS systems have been based on an extraction method, which identifies key textual segments (e.g., sentences or paragraphs) in source documents and selects them for the summary. Multi-document summarization aims to distill the most important information from a set of documents to generate a compressed summary. In this paper we are introducin...
    Extracting salient information to include in a summary has been researched extensively in the field of automatic text summarization. However, coherent arrangement of the extracted information has not received much attention. Specially, in... more
    Extracting salient information to include in a summary has been researched extensively in the field of automatic text summarization. However, coherent arrangement of the extracted information has not received much attention. Specially, in the case of extractive multi-document text summarization, sentences that convey important information are selected from a set of documents. There is no guarantee that this set of extracted sentences will form a coherent summary by itself. The order of presentation of information extracted is an important factor and affects the coherence of a summary. This paper focuses on the various techniques for generating a coherent summary from a given set of documents by ordering the extracted sentences. In our previous paper "Approaches to Summarize Multi Documents Using Information Extraction" we discussed the approaches for information extraction, in this paper we are introducing various approaches for sentence ordering of extracted information i...
    No one has time to read everything, yet we often have to make critical decisions based on what we are able to understand. With summaries, we can make effective decisions in less time. Thus the technology of automatic text summarization is... more
    No one has time to read everything, yet we often have to make critical decisions based on what we are able to understand. With summaries, we can make effective decisions in less time. Thus the technology of automatic text summarization is becoming essential to deal with the problem of information overload. Text summarization is the process of extracting the most important information from a single document or from a set of documents to produce a short and information rich summary for a particular user or task. Multi-document summarization is an automatic procedure for extraction of information from multiple texts about the same topic. Most of the MDS systems have been based on an extraction method, which identifies key textual segments (e.g., sentences or paragraphs) in source documents and selects them for the summary. Multi-document summarization aims to distill the most important information from a set of documents to generate a compressed summary. In this paper we are introducin...
    Research Interests:
    A modern wave of programming technology has been at the frontline of functional languages, experiencing growing success as well as impact. Hughes published an article entitled 'Why Functional Programming Matters', that has now... more
    A modern wave of programming technology has been at the frontline of functional languages, experiencing growing success as well as impact. Hughes published an article entitled 'Why Functional Programming Matters', that has now been one of the most recent references in the field.Safe programming defines the method used by software engineers to include multiple safety mechanism for their system.Secure programming can be broken down into two subgroups to analyse its correlation with software design: access control, secure programme initialization, input validation, cryptography, secure networking, secure random number generation, and anti-tampering. In this paper we provide a review of various functional programming in Haskell for encryption. The inkling of functional programming is to make programming more closely related to mathematics. We describe crucial features and trade-offs that has to be well-thought-out while selecting the right method for secure computation.
    : Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation and wireless communications capabilities. These nodes are limited with respect to energy supply restricted computational capacity and communication... more
    : Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation and wireless communications capabilities. These nodes are limited with respect to energy supply restricted computational capacity and communication bandwidth & are primarily designed for monitoring and reporting events. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions so many routing power management and data dissemination protocols have been specially designed for WSNs where energy awareness is an essential design issue. The focus however has been given to the routing protocols which might differ depending on the application and network architecture because each routing protocol has its merits and shortcomings, also sensor nodes are application dependent so a single routing protocol cannot be efficient for sensor networks across all applications. The lifetime will end when the working routing protocol can no longer support the whole wireless sensor network. To prolong the lifetime of the sensor nodes designing of efficient routing protocols is critical. In this paper, we present a survey of the state-of-the-art routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs followed by a comprehensive survey of different routing techniques. The paper concludes with possible future research areas. [Hari Om Sharan, C.S. Raghuvanshi, Ravi Prakash, Rajeev Kumar. Survey on routing techniques in wireless Sensor networks. N Y Sci J 2014;7(2):45-49]. (ISSN: 1554-0200). http://www.sciencepub.net/newyork. 5
    Research Interests: