Shubham Mishra - Academia.edu (original) (raw)
Papers by Shubham Mishra
SPE Drilling & Completion, 2022
Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has... more Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has long been recognized as a business deterrent. The industry applies enhanced oil recovery (EOR) techniques, along with hydraulic fractures in tight/unconventional plays, to improve the recovery. To maximize matrix sweep, the fractures are aligned in a face-to-face assembly. Such an arrangement can be achieved using a vertical or longitudinal hydraulic fracture on horizontal wells, but these, generally, do not provide as effective reservoir contact (hydraulic fracture surface area) as horizontal wells with multistage transverse hydraulic fractures. The multistage transverse hydraulic fracture, however, comes at the costs of conformance issues with early water breakthrough from short-circuiting and inability to achieve fracture face-to-fracture face alignment of the injection and production fractures. The vast majority of wells drilled in unconventional plays are in the transverse configur...
Nanoelectronics, Circuits and Communication Systems, 2020
Day 3 Thu, September 23, 2021, 2021
Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has... more Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has long been recognized as a business deterrent. The industry applies enhanced oil recovery (EOR) techniques, along with hydraulic fractures in tight/unconventional plays, to improve the recovery. To maximize matrix sweep, the fractures are aligned in a face-to-face assembly. Such an arrangement can be achieved using vertical or longitudinal hydraulic fracture on horizontal wells, but these, generally, do not provide as effective reservoir contact (hydraulic fracture surface area) as horizontal wells with multistage transverse hydraulic fractures. The multistage transverse hydraulic fracture, however, comes at the costs of conformance issues with early water breakthrough from short-circuiting and inability to achieve fracture face-to-fracture face alignment of the injection and production fractures. The vast majority of wells drilled in unconventional plays are in the transverse configurat...
2020 International Conference for Emerging Technology (INCET), 2020
A High throughput architecture for IoT applications and security is the necessity of today. To se... more A High throughput architecture for IoT applications and security is the necessity of today. To secure real time applications, there is a need of fast encryption process. LEA is lightweight block cipher uses any one size of key out of three key size of 128-bit, 192-bit and 256-bit based on different level of security. LEA block size is of 128-bit. The work of this paper mainly focused on LEA-128 bit key size and have got the better results as compared to other papers available in literature. Method used to get high performance results in this work, consist of pipelined architecture which provides better throughput. Proposed work mainly focused on real time application and hence throughput is chosen as main cretaria. Proposed architecture is showing 36% more frequency and 49% more throughput. In this paper reduced clock cycle method have been used to get better performance for image encryption.
Advances of Computational Fluid Dynamics in Nuclear Reactor Design and Safety Assessment, 2019
This chapter presents a discussion on the application of CFD methodology in addressing containmen... more This chapter presents a discussion on the application of CFD methodology in addressing containment-related safety issues. These issues need to be addressed in terms of relevant thermal hydraulic, mass, momentum, and heat transfer phenomena. The complexities involved are in terms of the geometry at component, system and integral levels, and the size and time scale for the computational domain. These constraints/features pose a unique challenge to the application of CFD in containment-related safety calculations. The following phenomena relevant to containment analysis using CFD have been systematically addressed. (i) Model development, validation, and application of CFD in simulating hydrogen distribution behaviour in the multicompartment geometry of typical containments for PHWRs under postaccident, dry and condensing steam atmospheres, and performance evaluation of hydrogen management strategies using passive dilution or fans. (ii) CFD-based framework and estimation of stratificati...
In this paper our aim is to prove certain common fixed theorems for four self maps satisfying (CL... more In this paper our aim is to prove certain common fixed theorems for four self maps satisfying (CLRST) property in complete b-metric spaces. Some common fixed point theorems are generalized and unified from our results.
The paper presents the design of PID controller for longitudinal dynamics of small UAV. It also p... more The paper presents the design of PID controller for longitudinal dynamics of small UAV. It also provides the state matrices by using physical parameters: aerodynamic coefficients and stability derivatives. PID controller provides the stability to UAV and transient specifications. The focus of this paper is on modelling and control design for a UAV system. The novel approach suggested in this paper is to use PID controller. PID controller is only used to provide the required transient response (Stevens and Lewis in Aircraft control and simulation. Wiley, Hoboken, [1]).
Long Short-Term Memory (LSTM) is a specific recurrent neural network (RNN) architecture that was ... more Long Short-Term Memory (LSTM) is a specific recurrent neural network (RNN) architecture that was designed to model temporal sequences and their long-range dependencies more accurately than conventional RNNs. In this paper, we explore LSTM RNN architectures and made some changes for its better performance. LSTM RNNs are more effective than DNNs. Here, we have changed the gates calculation and also have removed some unnecessary features of standard LSTM architecture. This architecture makes more effective use of model parameters than the others considered, converges quickly, and outperforms a deep feed forward neural network having an order of magnitude more parameters.
The brain tumor is caused when there is uncontrolled growth of cells in the brain. There are two ... more The brain tumor is caused when there is uncontrolled growth of cells in the brain. There are two types of tumor, Malignant and Benign. With malignant being the cancerous type and spreads to other regions. Segmentation of brain tumor for further medical analysis is very important. With the recent advancements in the field of medical image analysis and computer vision, the process of segmentation is implemented using computer-aided systems. In this paper, a gradient-based Fast Marching method is used for segmenting the brain tumor. The segmented and extracted images were compared with the ground truth image and dice similarity was calculated for the evaluation of the segmentation algorithm. The images were preprocessed for the removal of noise and contrast-enhanced for better interpretation of the image. PSNR, MSE, SSIM were the parameters calculated for the analysis of image quality.
Background –The calcaneus is the most frequently injured tarsal bone. Many calcaneal fractures ar... more Background –The calcaneus is the most frequently injured tarsal bone. Many calcaneal fractures are work-related, as they result from a fall from height, especially in males in young age. These fractures frequently result in long-term disability with potentially severe economic impact on the patient. Operative treatment of displaced intra articular calcaneal fractures has been a controversial due to tissue condition, wound infection & outcome. In this study our objective is to investigate the outcome of intra articular fracture of calcaneum treated surgically by plating. Materials & methodsProspective study was carried out on 22 patients with calcaneal fracture. The patients were assessed with plain radiography and CT scan. The fractures were classified according Sanders classification system. For functional and radiological outcome Modified Merle d’AaubigneAnnexure1 and Modified Zwipp Radiological scoring systemAnnexure2 was used respectively. ResultsThe age of the patients ranged f...
This paper concentrates on music voice separation from mixture of audio specifically from Indian ... more This paper concentrates on music voice separation from mixture of audio specifically from Indian folk music. It had been seen that recent music/voice separation techniques specifically works efficiently for a particular type of music such as “REpeating Pattern Extraction Technique” is well suited for “pop music” because the music piece consist of stable repeating accompaniment. There are some latest algorithm such as Blind source separation, repeat pattern extraction and more. So this paper investigates the effectiveness of established music voice separation technique on different type of music, the case of Indian folk music was considered as a specific example and it was found that Human-Assisted Time-Frequency Masking method is more efficient for Indian folk music.
AbstractDouble pipe heat exchanger is simplest form of heat exchanger containing two coaxial pipe... more AbstractDouble pipe heat exchanger is simplest form of heat exchanger containing two coaxial pipes, one inside another. Hot fluid flows inside the pipe and cold flui d flows in the gap between the two pipes, the surface of the inner pipe is the heat transfer surface which is responsible for the heat transfer between the fluids. This analysis based on the computational fluid dynamics where air to air heat exchanger utilized in cross linear concentrated solar power system CL-CSP. The fol lowing research is under process at RGPV BHOPAL. The study is based on the analysis of temperature distribution of heat transfer fluid (air), comparison of effectiveness of heat exchanger with and without insulation, and flow behavior of HTF in both hot and cold side of pipes. CFD simulations have been performed on the Ansys 16.0. K-ε turbulence models have been assessed and model has shown to provide more accurate results for temperature prediction.
In this paper a high speed squaring circuit for binary numbers is proposed. The methodology used ... more In this paper a high speed squaring circuit for binary numbers is proposed. The methodology used is inspired from ancient Egyptian method of multiplication. Implementation of this method to binary squaring can increase speed and would improve the device utilization .It was found that the architecture targeted for Xilinx Virtex-4 FPGA( xc4vlx80- 12) used 52 , 4-input LUTS with a combinational delay of 14.972 ns for 32 bit squaring.
This paper reviews the Automated highway system for Moradabad City. It is a intelligent system th... more This paper reviews the Automated highway system for Moradabad City. It is a intelligent system that uses computers, sensors, artificial intelligence and communication technologies to provide safe travel to the driver. It provide safety against collision and reduce travel time and congestion between the vehciles. Due to the advancement of technologies the vehciles need to be partially or fully automated . Besides this a certain degree of infrasructure is also made automatic so that vehciles are coordinated with the infrastructure and move smoothly and safely along the road without involving any collision. We have taken the study of Moradabad (pilikothi chauwraha). Four differents routes are going in different directions carrying different traffic densities. we are analysing the traffic at different time intervals of four different roads and study about the traffic managements and problems and calculated the traffic volume in different routes
This project involves discovering a new way altogether for the identification of books and findin... more This project involves discovering a new way altogether for the identification of books and finding a lost book in a library. Today, what we use to keep the track of books is the old and outdated barcode technology, which generally involves providing each book with a unique barcode and then scanning all books one by one just to find that particular book. The new method suggested from the groundwork of our research is the usage of RFID technology for this tiresome and time taking job. The new method involves usage of electronic tags to store identification data and a wireless transmitter or reader to capture it. The results seen during the testing has been good and several organizations are mandating to use RFID to track asset.
The aim of this thesis is to de�ne the Elliptic Curves and some of intresting properties of a spe... more The aim of this thesis is to de�ne the Elliptic Curves and some of intresting properties of a special class of terms,namely,rational point of elliptic curve ,The properties of the rational pooint of curve is airthmetic ,and rational point on elliptic curve forms a �nitely generated group structure group it will be done by using the chord-tangent group law of composition.After completing the the abelian group structure,so we look some elementary properties like for a given elliptic curve we �nd the torsion subgroup of that elliptic curves.and �nally done the elliptic curve and their isomorphism. Further, we study different families of elliptic curves which depend on different parameters. Moreover, we look at the reduction modulo p of an elliptic curve and infer the meaning of good and bad reduction of an elliptic curve. Lastly, the statement and proof of Mordell-Weil theorem is given. The topics of the thesis are based on the book Elliptic Curves by Dale Husemoller. I have not added ...
The objective of this paper is to watch pollution on roads and track a vehicle that causes pollut... more The objective of this paper is to watch pollution on roads and track a vehicle that causes pollution, to unravelthis downside, several countries and regions have already bestowed a series of emissions standards, meantime some ways has been developed, as well as update motor engine or up the standard of the gasoline. However, these actions have not caused hanging impact, as we tend to expect. During this system, Radio Frequency Identification (RFID) technology as an inexpensive and mature wireless communication methodology is adopted to gather and transmit emissions data of vehicles and Internet of Things (IoT) concept is proposed. Moreover, The RFID devices have to be put in on the traffic lights so reliable reading of emissions signals from a vehicle may be interrogated once the vehicles stop ahead of the red light .By applying the system; it is possible to smoothly realize green traffic network.
SPE Drilling & Completion, 2022
Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has... more Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has long been recognized as a business deterrent. The industry applies enhanced oil recovery (EOR) techniques, along with hydraulic fractures in tight/unconventional plays, to improve the recovery. To maximize matrix sweep, the fractures are aligned in a face-to-face assembly. Such an arrangement can be achieved using a vertical or longitudinal hydraulic fracture on horizontal wells, but these, generally, do not provide as effective reservoir contact (hydraulic fracture surface area) as horizontal wells with multistage transverse hydraulic fractures. The multistage transverse hydraulic fracture, however, comes at the costs of conformance issues with early water breakthrough from short-circuiting and inability to achieve fracture face-to-fracture face alignment of the injection and production fractures. The vast majority of wells drilled in unconventional plays are in the transverse configur...
Nanoelectronics, Circuits and Communication Systems, 2020
Day 3 Thu, September 23, 2021, 2021
Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has... more Low recovery, 2 to 15%, in unconventional plays (including tight reservoirs and source rocks) has long been recognized as a business deterrent. The industry applies enhanced oil recovery (EOR) techniques, along with hydraulic fractures in tight/unconventional plays, to improve the recovery. To maximize matrix sweep, the fractures are aligned in a face-to-face assembly. Such an arrangement can be achieved using vertical or longitudinal hydraulic fracture on horizontal wells, but these, generally, do not provide as effective reservoir contact (hydraulic fracture surface area) as horizontal wells with multistage transverse hydraulic fractures. The multistage transverse hydraulic fracture, however, comes at the costs of conformance issues with early water breakthrough from short-circuiting and inability to achieve fracture face-to-fracture face alignment of the injection and production fractures. The vast majority of wells drilled in unconventional plays are in the transverse configurat...
2020 International Conference for Emerging Technology (INCET), 2020
A High throughput architecture for IoT applications and security is the necessity of today. To se... more A High throughput architecture for IoT applications and security is the necessity of today. To secure real time applications, there is a need of fast encryption process. LEA is lightweight block cipher uses any one size of key out of three key size of 128-bit, 192-bit and 256-bit based on different level of security. LEA block size is of 128-bit. The work of this paper mainly focused on LEA-128 bit key size and have got the better results as compared to other papers available in literature. Method used to get high performance results in this work, consist of pipelined architecture which provides better throughput. Proposed work mainly focused on real time application and hence throughput is chosen as main cretaria. Proposed architecture is showing 36% more frequency and 49% more throughput. In this paper reduced clock cycle method have been used to get better performance for image encryption.
Advances of Computational Fluid Dynamics in Nuclear Reactor Design and Safety Assessment, 2019
This chapter presents a discussion on the application of CFD methodology in addressing containmen... more This chapter presents a discussion on the application of CFD methodology in addressing containment-related safety issues. These issues need to be addressed in terms of relevant thermal hydraulic, mass, momentum, and heat transfer phenomena. The complexities involved are in terms of the geometry at component, system and integral levels, and the size and time scale for the computational domain. These constraints/features pose a unique challenge to the application of CFD in containment-related safety calculations. The following phenomena relevant to containment analysis using CFD have been systematically addressed. (i) Model development, validation, and application of CFD in simulating hydrogen distribution behaviour in the multicompartment geometry of typical containments for PHWRs under postaccident, dry and condensing steam atmospheres, and performance evaluation of hydrogen management strategies using passive dilution or fans. (ii) CFD-based framework and estimation of stratificati...
In this paper our aim is to prove certain common fixed theorems for four self maps satisfying (CL... more In this paper our aim is to prove certain common fixed theorems for four self maps satisfying (CLRST) property in complete b-metric spaces. Some common fixed point theorems are generalized and unified from our results.
The paper presents the design of PID controller for longitudinal dynamics of small UAV. It also p... more The paper presents the design of PID controller for longitudinal dynamics of small UAV. It also provides the state matrices by using physical parameters: aerodynamic coefficients and stability derivatives. PID controller provides the stability to UAV and transient specifications. The focus of this paper is on modelling and control design for a UAV system. The novel approach suggested in this paper is to use PID controller. PID controller is only used to provide the required transient response (Stevens and Lewis in Aircraft control and simulation. Wiley, Hoboken, [1]).
Long Short-Term Memory (LSTM) is a specific recurrent neural network (RNN) architecture that was ... more Long Short-Term Memory (LSTM) is a specific recurrent neural network (RNN) architecture that was designed to model temporal sequences and their long-range dependencies more accurately than conventional RNNs. In this paper, we explore LSTM RNN architectures and made some changes for its better performance. LSTM RNNs are more effective than DNNs. Here, we have changed the gates calculation and also have removed some unnecessary features of standard LSTM architecture. This architecture makes more effective use of model parameters than the others considered, converges quickly, and outperforms a deep feed forward neural network having an order of magnitude more parameters.
The brain tumor is caused when there is uncontrolled growth of cells in the brain. There are two ... more The brain tumor is caused when there is uncontrolled growth of cells in the brain. There are two types of tumor, Malignant and Benign. With malignant being the cancerous type and spreads to other regions. Segmentation of brain tumor for further medical analysis is very important. With the recent advancements in the field of medical image analysis and computer vision, the process of segmentation is implemented using computer-aided systems. In this paper, a gradient-based Fast Marching method is used for segmenting the brain tumor. The segmented and extracted images were compared with the ground truth image and dice similarity was calculated for the evaluation of the segmentation algorithm. The images were preprocessed for the removal of noise and contrast-enhanced for better interpretation of the image. PSNR, MSE, SSIM were the parameters calculated for the analysis of image quality.
Background –The calcaneus is the most frequently injured tarsal bone. Many calcaneal fractures ar... more Background –The calcaneus is the most frequently injured tarsal bone. Many calcaneal fractures are work-related, as they result from a fall from height, especially in males in young age. These fractures frequently result in long-term disability with potentially severe economic impact on the patient. Operative treatment of displaced intra articular calcaneal fractures has been a controversial due to tissue condition, wound infection & outcome. In this study our objective is to investigate the outcome of intra articular fracture of calcaneum treated surgically by plating. Materials & methodsProspective study was carried out on 22 patients with calcaneal fracture. The patients were assessed with plain radiography and CT scan. The fractures were classified according Sanders classification system. For functional and radiological outcome Modified Merle d’AaubigneAnnexure1 and Modified Zwipp Radiological scoring systemAnnexure2 was used respectively. ResultsThe age of the patients ranged f...
This paper concentrates on music voice separation from mixture of audio specifically from Indian ... more This paper concentrates on music voice separation from mixture of audio specifically from Indian folk music. It had been seen that recent music/voice separation techniques specifically works efficiently for a particular type of music such as “REpeating Pattern Extraction Technique” is well suited for “pop music” because the music piece consist of stable repeating accompaniment. There are some latest algorithm such as Blind source separation, repeat pattern extraction and more. So this paper investigates the effectiveness of established music voice separation technique on different type of music, the case of Indian folk music was considered as a specific example and it was found that Human-Assisted Time-Frequency Masking method is more efficient for Indian folk music.
AbstractDouble pipe heat exchanger is simplest form of heat exchanger containing two coaxial pipe... more AbstractDouble pipe heat exchanger is simplest form of heat exchanger containing two coaxial pipes, one inside another. Hot fluid flows inside the pipe and cold flui d flows in the gap between the two pipes, the surface of the inner pipe is the heat transfer surface which is responsible for the heat transfer between the fluids. This analysis based on the computational fluid dynamics where air to air heat exchanger utilized in cross linear concentrated solar power system CL-CSP. The fol lowing research is under process at RGPV BHOPAL. The study is based on the analysis of temperature distribution of heat transfer fluid (air), comparison of effectiveness of heat exchanger with and without insulation, and flow behavior of HTF in both hot and cold side of pipes. CFD simulations have been performed on the Ansys 16.0. K-ε turbulence models have been assessed and model has shown to provide more accurate results for temperature prediction.
In this paper a high speed squaring circuit for binary numbers is proposed. The methodology used ... more In this paper a high speed squaring circuit for binary numbers is proposed. The methodology used is inspired from ancient Egyptian method of multiplication. Implementation of this method to binary squaring can increase speed and would improve the device utilization .It was found that the architecture targeted for Xilinx Virtex-4 FPGA( xc4vlx80- 12) used 52 , 4-input LUTS with a combinational delay of 14.972 ns for 32 bit squaring.
This paper reviews the Automated highway system for Moradabad City. It is a intelligent system th... more This paper reviews the Automated highway system for Moradabad City. It is a intelligent system that uses computers, sensors, artificial intelligence and communication technologies to provide safe travel to the driver. It provide safety against collision and reduce travel time and congestion between the vehciles. Due to the advancement of technologies the vehciles need to be partially or fully automated . Besides this a certain degree of infrasructure is also made automatic so that vehciles are coordinated with the infrastructure and move smoothly and safely along the road without involving any collision. We have taken the study of Moradabad (pilikothi chauwraha). Four differents routes are going in different directions carrying different traffic densities. we are analysing the traffic at different time intervals of four different roads and study about the traffic managements and problems and calculated the traffic volume in different routes
This project involves discovering a new way altogether for the identification of books and findin... more This project involves discovering a new way altogether for the identification of books and finding a lost book in a library. Today, what we use to keep the track of books is the old and outdated barcode technology, which generally involves providing each book with a unique barcode and then scanning all books one by one just to find that particular book. The new method suggested from the groundwork of our research is the usage of RFID technology for this tiresome and time taking job. The new method involves usage of electronic tags to store identification data and a wireless transmitter or reader to capture it. The results seen during the testing has been good and several organizations are mandating to use RFID to track asset.
The aim of this thesis is to de�ne the Elliptic Curves and some of intresting properties of a spe... more The aim of this thesis is to de�ne the Elliptic Curves and some of intresting properties of a special class of terms,namely,rational point of elliptic curve ,The properties of the rational pooint of curve is airthmetic ,and rational point on elliptic curve forms a �nitely generated group structure group it will be done by using the chord-tangent group law of composition.After completing the the abelian group structure,so we look some elementary properties like for a given elliptic curve we �nd the torsion subgroup of that elliptic curves.and �nally done the elliptic curve and their isomorphism. Further, we study different families of elliptic curves which depend on different parameters. Moreover, we look at the reduction modulo p of an elliptic curve and infer the meaning of good and bad reduction of an elliptic curve. Lastly, the statement and proof of Mordell-Weil theorem is given. The topics of the thesis are based on the book Elliptic Curves by Dale Husemoller. I have not added ...
The objective of this paper is to watch pollution on roads and track a vehicle that causes pollut... more The objective of this paper is to watch pollution on roads and track a vehicle that causes pollution, to unravelthis downside, several countries and regions have already bestowed a series of emissions standards, meantime some ways has been developed, as well as update motor engine or up the standard of the gasoline. However, these actions have not caused hanging impact, as we tend to expect. During this system, Radio Frequency Identification (RFID) technology as an inexpensive and mature wireless communication methodology is adopted to gather and transmit emissions data of vehicles and Internet of Things (IoT) concept is proposed. Moreover, The RFID devices have to be put in on the traffic lights so reliable reading of emissions signals from a vehicle may be interrogated once the vehicles stop ahead of the red light .By applying the system; it is possible to smoothly realize green traffic network.