Manraj Singh - Academia.edu (original) (raw)

Papers by Manraj Singh

Research paper thumbnail of Clinical correlation of lung ultrasound profiles in patients with COVID-19 infection

Background: Lung ultrasound is a popular point of care test that correlates well with computed to... more Background: Lung ultrasound is a popular point of care test that correlates well with computed tomography for lung pathologies. While previous studies have shown its ability to detect COVID-19 related lung pathology, we aimed to evaluate the utility of lung ultrasound in the triage and prognostication of COVID-19 patients by determining its ability to predict clinical severity and outcomes. Methods: This was a prospective, cross-sectional, observational, single centre study done at JPNATC and AIIMS, New Delhi, India. Consenting eligible patients aged 18 years or more were included if hospitalised with microbiologically confirmed COVID-19 and classified as mild, moderate (respiratory rate >24/min OR SpO2<94% on room air) and severe COVID-19 (respiratory rate >30/min OR SpO2<90% on room air) at the time of enrolment. The lungs were systematically assessed with ultrasound after division into 14 zones (4 anteriorly, 4 axillary and 6 posteriorly). Clinical and laboratory para...

Research paper thumbnail of Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography

International Journal of Computer Applications, 2016

Cyber security is a critical issue now a days in various different domains in different disciplin... more Cyber security is a critical issue now a days in various different domains in different disciplines. This paper presents a review analysis of cyber hacking attacks along with its experimental results and proposes a new methodology 3SEMCS named as three step encryption method for cyber security. By utilizing this new designed methodology, security at highest level will be easily provided especially on the time of request submission in the search engine as like google during client server communication. During its working a group of separate encryption algorithms are used. The benefit to utilize this three step encryption is to provide more tighten security by applying three separate encryption algorithms in each phase having different operations. And the additional benefit to utilize this methodology is to run over new designed private browser named as "RR" that is termed as Rim Rocks correspondingly this also help to check the authenticated sites or phishing sites by utilizing the strategy of passing URL address from phishing tank. This may help to block the phisher sites and user will relocate on previous

Research paper thumbnail of Review of Various SEO Techniques for Websites

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2012

Advancement of e-commerce which includes buying and selling of products or services over the Inte... more Advancement of e-commerce which includes buying and selling of products or services over the Internet has revolutionized the way a Business is done. Now consumers are becoming more comfortable buying and selling products over Internet rather than in a physical market(s). This new trend has started a cut throat competition among the websites of various business owners. There was a time when every businessman required a descent looking website and that’s it, nothing else was required. But now things have changed. Now a businessman not only requires a good looking user friendly website, but also needs to get Website(s) optimized for search engines also. This is a review paper on the various SEO Techniques that can be used by webmasters to improve website’s visibility in search results and improve traffic to the website.

Research paper thumbnail of Proposing a New Method for Automatic Environmental Temperature Detection (AETD) by using IOT

International Journal of Computer Applications, 2015

IOT provides network connectivity for everyday objects that allows sending and receiving of data ... more IOT provides network connectivity for everyday objects that allows sending and receiving of data from the environment by utilizing two separate types of interactions viz. machine-tomachine interactions and machine-to-human interactions. This paper designed a new methodology that helps to detect environmental temperature automatically by utilizing a device named "Sensordrone". This device can be easily activated by simply turn-on by switch. The motivation towards the usage of sensordrone is to reduce human effort that correspondingly save human energy and consumes less time. In this paper, authors are discusses about the working of any non-computing device by utilizing IOT concept. It tells how microwave Owen will be operated with IOT and also gives some additional information say the description about the detailed history of processed transactions that already allotted separate IOT addresses. The aim of utilizing IOT concept is to improve our standard of living. The main focus of this paper is to capture real world data efficiently via general interaction with common objects that are most commonly used in our daily life activities.

Research paper thumbnail of Comparative analysis of retracted pre-print and peer-reviewed articles on COVID-19

IntroductionDue to the accelerated pace and quantum of scientific publication during the COVID-19... more IntroductionDue to the accelerated pace and quantum of scientific publication during the COVID-19 pandemic, a large number of articles on COVID-19 have been retracted. Pre-prints though not peer-reviewed offer the advantage of rapid dissemination of new findings. In this study, we aim to systematically compare the article characteristics, time to retraction, social media attention, citations, and reasons for retraction between retracted pre-print and peer-reviewed articles on COVID-19.MethodsWe utilized the Retraction Watch database to identify retracted articles on COVID-19 published from 1st January 2020 to 10th March 2022. The articles were reviewed and metadata such as article characteristics (type, category), time to retraction, reasons for retraction, and Altmetric Attention Score (AAS) and citation count were collected.ResultsWe identified 40 retracted pre-prints and 143 retracted peer-reviewed articles. The median (IQR) retraction time for pre-print and peer-reviewed article...

Research paper thumbnail of Clinical correlation of lung ultrasound profiles in patients with COVID-19 infection

Background: Lung ultrasound is a popular point of care test that correlates well with computed to... more Background: Lung ultrasound is a popular point of care test that correlates well with computed tomography for lung pathologies. While previous studies have shown its ability to detect COVID-19 related lung pathology, we aimed to evaluate the utility of lung ultrasound in the triage and prognostication of COVID-19 patients by determining its ability to predict clinical severity and outcomes. Methods: This was a prospective, cross-sectional, observational, single centre study done at JPNATC and AIIMS, New Delhi, India. Consenting eligible patients aged 18 years or more were included if hospitalised with microbiologically confirmed COVID-19 and classified as mild, moderate (respiratory rate >24/min OR SpO2<94% on room air) and severe COVID-19 (respiratory rate >30/min OR SpO2<90% on room air) at the time of enrolment. The lungs were systematically assessed with ultrasound after division into 14 zones (4 anteriorly, 4 axillary and 6 posteriorly). Clinical and laboratory para...

Research paper thumbnail of Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography

International Journal of Computer Applications, 2016

Cyber security is a critical issue now a days in various different domains in different disciplin... more Cyber security is a critical issue now a days in various different domains in different disciplines. This paper presents a review analysis of cyber hacking attacks along with its experimental results and proposes a new methodology 3SEMCS named as three step encryption method for cyber security. By utilizing this new designed methodology, security at highest level will be easily provided especially on the time of request submission in the search engine as like google during client server communication. During its working a group of separate encryption algorithms are used. The benefit to utilize this three step encryption is to provide more tighten security by applying three separate encryption algorithms in each phase having different operations. And the additional benefit to utilize this methodology is to run over new designed private browser named as "RR" that is termed as Rim Rocks correspondingly this also help to check the authenticated sites or phishing sites by utilizing the strategy of passing URL address from phishing tank. This may help to block the phisher sites and user will relocate on previous

Research paper thumbnail of Review of Various SEO Techniques for Websites

INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2012

Advancement of e-commerce which includes buying and selling of products or services over the Inte... more Advancement of e-commerce which includes buying and selling of products or services over the Internet has revolutionized the way a Business is done. Now consumers are becoming more comfortable buying and selling products over Internet rather than in a physical market(s). This new trend has started a cut throat competition among the websites of various business owners. There was a time when every businessman required a descent looking website and that’s it, nothing else was required. But now things have changed. Now a businessman not only requires a good looking user friendly website, but also needs to get Website(s) optimized for search engines also. This is a review paper on the various SEO Techniques that can be used by webmasters to improve website’s visibility in search results and improve traffic to the website.

Research paper thumbnail of Proposing a New Method for Automatic Environmental Temperature Detection (AETD) by using IOT

International Journal of Computer Applications, 2015

IOT provides network connectivity for everyday objects that allows sending and receiving of data ... more IOT provides network connectivity for everyday objects that allows sending and receiving of data from the environment by utilizing two separate types of interactions viz. machine-tomachine interactions and machine-to-human interactions. This paper designed a new methodology that helps to detect environmental temperature automatically by utilizing a device named "Sensordrone". This device can be easily activated by simply turn-on by switch. The motivation towards the usage of sensordrone is to reduce human effort that correspondingly save human energy and consumes less time. In this paper, authors are discusses about the working of any non-computing device by utilizing IOT concept. It tells how microwave Owen will be operated with IOT and also gives some additional information say the description about the detailed history of processed transactions that already allotted separate IOT addresses. The aim of utilizing IOT concept is to improve our standard of living. The main focus of this paper is to capture real world data efficiently via general interaction with common objects that are most commonly used in our daily life activities.

Research paper thumbnail of Comparative analysis of retracted pre-print and peer-reviewed articles on COVID-19

IntroductionDue to the accelerated pace and quantum of scientific publication during the COVID-19... more IntroductionDue to the accelerated pace and quantum of scientific publication during the COVID-19 pandemic, a large number of articles on COVID-19 have been retracted. Pre-prints though not peer-reviewed offer the advantage of rapid dissemination of new findings. In this study, we aim to systematically compare the article characteristics, time to retraction, social media attention, citations, and reasons for retraction between retracted pre-print and peer-reviewed articles on COVID-19.MethodsWe utilized the Retraction Watch database to identify retracted articles on COVID-19 published from 1st January 2020 to 10th March 2022. The articles were reviewed and metadata such as article characteristics (type, category), time to retraction, reasons for retraction, and Altmetric Attention Score (AAS) and citation count were collected.ResultsWe identified 40 retracted pre-prints and 143 retracted peer-reviewed articles. The median (IQR) retraction time for pre-print and peer-reviewed article...