Ishaan Singh - Academia.edu (original) (raw)

Papers by Ishaan Singh

Research paper thumbnail of Mobile Apps Prioritizing Privacy, Efficiency and Equity: A Decentralized Approach to COVID-19 Vaccination Coordination

In this early draft, we describe a decentralized, app-based approach to COVID-19 vaccine distribu... more In this early draft, we describe a decentralized, app-based approach to COVID-19 vaccine distribution that facilitates zero knowledge verification, dynamic vaccine scheduling, continuous symptoms reporting, access to aggregate analytics based on population trends and more. To ensure equity, our solution is developed to work with limited internet access as well. In addition, we describe the six critical functions that we believe last mile vaccination management platforms must perform, examine existing vaccine management systems, and present a model for privacy-focused, individual-centric solutions.

Research paper thumbnail of Best Practices for Using Coiled Tubing to Assist Plug-And-Perf Multistage Fracturing Operations in HP/HT Wells

Day 2 Tue, May 05, 2020, 2020

The plug-and-perf (PnP) method is widely used globally for multistage fracturing operations. With... more The plug-and-perf (PnP) method is widely used globally for multistage fracturing operations. With only a few jobs performed worldwide, coiled tubing (CT) assisted PnP operations in high-pressure/high-temperature (HP/HT) wells are largely uncharted and most challenging. The "A" field in India has HP/HT formations, with bottomhole temperature (BHT) of 310°F and reservoir pressure of 9,000 psi. Whereas the PnP method is widely used globally, there are few examples in wells with completion restrictions or whose downhole conditions dramatically increase depth inaccuracies and equipment damage. This study describes how to address challenges such as depth correlation (which affects plug-setting depth accuracy), low injectivity, completion restrictions, and heavy brines (which damage CT). To gain further understanding of operations, simulations are sensitized to identify solutions for pumping rates, HP/HT conditions, well kill fluid, milling, and cleanouts where obstructions hinde...

Research paper thumbnail of Reusable Garbled Deterministic Finite Automata from Learning With Errors

We provide a single-key functional encryption scheme for Deterministic Finite Automata (DFA). The... more We provide a single-key functional encryption scheme for Deterministic Finite Automata (DFA). The secret key of our scheme is associated with a DFA M, and a ciphertext is associated with an input x of arbitrary length. The decryptor learns M(x) and nothing else. The ciphertext and key sizes achieved by our scheme are optimal – the size of the public parameters is independent of the size of the machine or data being encrypted, the secret key size depends only on the machine size and the ciphertext size depends only on the input size. Our scheme achieves full functional encryption in the “private index model”, namely the entire input x is hidden (as against x being public and a single bit b being hidden). Our single key FE scheme can be compiled with symmetric key encryption to yield reusable garbled DFAs for arbitrary size inputs, that achieves machine and input privacy along with reusability under a strong simulation based definition of security. We generalize this to a functional e...

Research paper thumbnail of Coiled Tubing Dewaxing Operations: Case Studies in Reduced Production Wells of Northeast India

Executing interventions in wells encrusted with wax is challenging because experience with global... more Executing interventions in wells encrusted with wax is challenging because experience with global coiled tubing (CT) dewaxing operations is limited, and equipment failure and stuck pipe risks are high. With few jobs performed worldwide, CT dewaxing (hot oil circulation with CT) operations are largely unexplored. The deviated wells in a field in northeast India pose several challenges including completely seized wellbore due to paraffin/asphaltene deposition, previous failed well cleanout attempts, very slow and low bottomhole assembly (BHA) penetration, pumping corrosive and flammable low wax crude (LWC) through CT, high chances of CT getting stuck, and pumping heated 69°C LWC through the CT. This case study delivers insights about design, safety, and operational considerations for 1.5-in. CT dewaxing and nitrogen lift operations in a subhydrostatic well in the field. The objective of this CT dewaxing and nitrogen kickoff operation was to clear the well of paraffin/asphaltene/wax to...

Research paper thumbnail of Executing Unconventional Coiled Tubing Sand Plugs for Multistage Fracturing Operations in HP/HT Wells

Offshore Technology Conference, 2020

Coiled tubing (CT) sand plug operations associated with multistage fracturing operations in high-... more Coiled tubing (CT) sand plug operations associated with multistage fracturing operations in high-pressure/high-temperature (HP/HT) wells are very challenging, in part because of the small number of such jobs that have been performed worldwide. The wells in "A" field in India have HP/HT formations, with a bottomhole temperature (BHT) of 310°F and a reservoir pressure of 9,000 psi. Although millable bridge plugs are preferred industry-wide, this case illustrates how sand plugs become a suitable alternate solution for multistage stimulation to address space limitations, equipment and completion restrictions, and small tubing sizes, even in challenging downhole conditions. This study provides solutions to operational challenges of low injectivity and completion restrictions, which preclude bullheading and use of conventional bridge plugs. Simulations were sensitized to identify the best solutions for sand settling time, HP/HT conditions, pumping rates, CT speeds, and cleanouts where calcite or scale deposits on sand hinder bottomhole assembly (BHA) penetration. Best practices are given for sand plug operations in challenging HP/HT environments; those best practices can be applied as a reference to design, prepare, and safely perform CT sand plug jobs in such conditions around the world. To address operational challenges in the cases presented here, the first three stages were bullheaded and the last two (a total 325-m sand plug) were placed using CT. Wireline was run to verify CT sand plug tag at ×200-m measured depth (MD). After the successful refracturing job, the 340-m sand plug was cleaned out, followed by acid spotting and squeeze using CT to rejuvenate the lowest zone. Strict application of the recommendations prevented the occurrence of operational contingencies, such as stuck CT, sand bridging, and settling of sand in surface equipment.

Research paper thumbnail of Best Practices on Live Well Coiled Tubing Interventions in High Temperature Geothermal Field

SPE/ICoTA Well Intervention Conference and Exhibition, 2020

This paper shares the best practices for performing coiled tubing (CT) operations in high-tempera... more This paper shares the best practices for performing coiled tubing (CT) operations in high-temperature geothermal wells with major challenges such as live well challenges, scaling of pumping fluid, high surface temperatures causing damage to wellhead stack, and CT tag issues. Some geothermal wells have very high bottomhole temperature (BHT) of 550 to 600 °F and surface temperature of 350 to 400 °F, which possess many service quality and health, safety, and the environment risks. With limited CT geothermal interventions as compared to conventional operations, performing live well CT interventions can be highly risky. Because commonly available pressure control equipment (PCE) seal material is rated to 250°F, the biggest risk is damage to the surface CT equipment, which may result in a well control situation. Generally, the lead time is high, and it is expensive to use temperature seal material rated more than 250°F. A generalized design methodology was developed to check the CT job fe...

Research paper thumbnail of Heart Disease Prediction

International Journal of Engineering & Technology, 2018

Machine learning algorithm are used to produce new pattern from compound data set. To cluster the... more Machine learning algorithm are used to produce new pattern from compound data set. To cluster the patient heart condition to check whether his /her heart normal or stressed or highly stressed k-means clustering algorithm is applied on the patient dataset. From the results of clustering ,it is hard to elucidate and to obtain the required conclusion from these clusters. Hence another algorithm, the decision tree, is used for the exposition of the clusters of . In this work, integration of decision tree with the help of k-means algorithm is aimed. Another learning technique such as SVM and Logistics regression is used. Heart disease prediction results from SVM and Logistics regression were compared.

Research paper thumbnail of 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics The De-Identification Camera

Abstract—Visual surveillance is increasingly prevalent today but the privacy issues of individual... more Abstract—Visual surveillance is increasingly prevalent today but the privacy issues of individuals involved in surveillance videos have not been dealt with adequately so far. In most cases, if not all, the chief purpose of placing a camera can be served without knowing the identity of the individuals involved unless the activity is of some predetermined kind. One needs to transform these videos to protect identity of individuals involved possibly at the source camera itself. In this paper we present the De-Identification Camera, which is a scalable, low cost and real-time solution to the privacy protection issues. Our main contribution lies in proposing a privacy protection architecture which transforms the video at the camera level itself, We also present and implement a de-identification pipeline which is suitable for real-time implementation. We implemented the system on a Texas Instrument OMAP4 based embedded platform and was able to de-identify videos in real time, transforming...

Research paper thumbnail of Mobile Apps Prioritizing Privacy, Efficiency and Equity: A Decentralized Approach to COVID-19 Vaccination Coordination

In this early draft, we describe a decentralized, app-based approach to COVID-19 vaccine distribu... more In this early draft, we describe a decentralized, app-based approach to COVID-19 vaccine distribution that facilitates zero knowledge verification, dynamic vaccine scheduling, continuous symptoms reporting, access to aggregate analytics based on population trends and more. To ensure equity, our solution is developed to work with limited internet access as well. In addition, we describe the six critical functions that we believe last mile vaccination management platforms must perform, examine existing vaccine management systems, and present a model for privacy-focused, individual-centric solutions.

Research paper thumbnail of Best Practices for Using Coiled Tubing to Assist Plug-And-Perf Multistage Fracturing Operations in HP/HT Wells

Day 2 Tue, May 05, 2020, 2020

The plug-and-perf (PnP) method is widely used globally for multistage fracturing operations. With... more The plug-and-perf (PnP) method is widely used globally for multistage fracturing operations. With only a few jobs performed worldwide, coiled tubing (CT) assisted PnP operations in high-pressure/high-temperature (HP/HT) wells are largely uncharted and most challenging. The "A" field in India has HP/HT formations, with bottomhole temperature (BHT) of 310°F and reservoir pressure of 9,000 psi. Whereas the PnP method is widely used globally, there are few examples in wells with completion restrictions or whose downhole conditions dramatically increase depth inaccuracies and equipment damage. This study describes how to address challenges such as depth correlation (which affects plug-setting depth accuracy), low injectivity, completion restrictions, and heavy brines (which damage CT). To gain further understanding of operations, simulations are sensitized to identify solutions for pumping rates, HP/HT conditions, well kill fluid, milling, and cleanouts where obstructions hinde...

Research paper thumbnail of Reusable Garbled Deterministic Finite Automata from Learning With Errors

We provide a single-key functional encryption scheme for Deterministic Finite Automata (DFA). The... more We provide a single-key functional encryption scheme for Deterministic Finite Automata (DFA). The secret key of our scheme is associated with a DFA M, and a ciphertext is associated with an input x of arbitrary length. The decryptor learns M(x) and nothing else. The ciphertext and key sizes achieved by our scheme are optimal – the size of the public parameters is independent of the size of the machine or data being encrypted, the secret key size depends only on the machine size and the ciphertext size depends only on the input size. Our scheme achieves full functional encryption in the “private index model”, namely the entire input x is hidden (as against x being public and a single bit b being hidden). Our single key FE scheme can be compiled with symmetric key encryption to yield reusable garbled DFAs for arbitrary size inputs, that achieves machine and input privacy along with reusability under a strong simulation based definition of security. We generalize this to a functional e...

Research paper thumbnail of Coiled Tubing Dewaxing Operations: Case Studies in Reduced Production Wells of Northeast India

Executing interventions in wells encrusted with wax is challenging because experience with global... more Executing interventions in wells encrusted with wax is challenging because experience with global coiled tubing (CT) dewaxing operations is limited, and equipment failure and stuck pipe risks are high. With few jobs performed worldwide, CT dewaxing (hot oil circulation with CT) operations are largely unexplored. The deviated wells in a field in northeast India pose several challenges including completely seized wellbore due to paraffin/asphaltene deposition, previous failed well cleanout attempts, very slow and low bottomhole assembly (BHA) penetration, pumping corrosive and flammable low wax crude (LWC) through CT, high chances of CT getting stuck, and pumping heated 69°C LWC through the CT. This case study delivers insights about design, safety, and operational considerations for 1.5-in. CT dewaxing and nitrogen lift operations in a subhydrostatic well in the field. The objective of this CT dewaxing and nitrogen kickoff operation was to clear the well of paraffin/asphaltene/wax to...

Research paper thumbnail of Executing Unconventional Coiled Tubing Sand Plugs for Multistage Fracturing Operations in HP/HT Wells

Offshore Technology Conference, 2020

Coiled tubing (CT) sand plug operations associated with multistage fracturing operations in high-... more Coiled tubing (CT) sand plug operations associated with multistage fracturing operations in high-pressure/high-temperature (HP/HT) wells are very challenging, in part because of the small number of such jobs that have been performed worldwide. The wells in "A" field in India have HP/HT formations, with a bottomhole temperature (BHT) of 310°F and a reservoir pressure of 9,000 psi. Although millable bridge plugs are preferred industry-wide, this case illustrates how sand plugs become a suitable alternate solution for multistage stimulation to address space limitations, equipment and completion restrictions, and small tubing sizes, even in challenging downhole conditions. This study provides solutions to operational challenges of low injectivity and completion restrictions, which preclude bullheading and use of conventional bridge plugs. Simulations were sensitized to identify the best solutions for sand settling time, HP/HT conditions, pumping rates, CT speeds, and cleanouts where calcite or scale deposits on sand hinder bottomhole assembly (BHA) penetration. Best practices are given for sand plug operations in challenging HP/HT environments; those best practices can be applied as a reference to design, prepare, and safely perform CT sand plug jobs in such conditions around the world. To address operational challenges in the cases presented here, the first three stages were bullheaded and the last two (a total 325-m sand plug) were placed using CT. Wireline was run to verify CT sand plug tag at ×200-m measured depth (MD). After the successful refracturing job, the 340-m sand plug was cleaned out, followed by acid spotting and squeeze using CT to rejuvenate the lowest zone. Strict application of the recommendations prevented the occurrence of operational contingencies, such as stuck CT, sand bridging, and settling of sand in surface equipment.

Research paper thumbnail of Best Practices on Live Well Coiled Tubing Interventions in High Temperature Geothermal Field

SPE/ICoTA Well Intervention Conference and Exhibition, 2020

This paper shares the best practices for performing coiled tubing (CT) operations in high-tempera... more This paper shares the best practices for performing coiled tubing (CT) operations in high-temperature geothermal wells with major challenges such as live well challenges, scaling of pumping fluid, high surface temperatures causing damage to wellhead stack, and CT tag issues. Some geothermal wells have very high bottomhole temperature (BHT) of 550 to 600 °F and surface temperature of 350 to 400 °F, which possess many service quality and health, safety, and the environment risks. With limited CT geothermal interventions as compared to conventional operations, performing live well CT interventions can be highly risky. Because commonly available pressure control equipment (PCE) seal material is rated to 250°F, the biggest risk is damage to the surface CT equipment, which may result in a well control situation. Generally, the lead time is high, and it is expensive to use temperature seal material rated more than 250°F. A generalized design methodology was developed to check the CT job fe...

Research paper thumbnail of Heart Disease Prediction

International Journal of Engineering & Technology, 2018

Machine learning algorithm are used to produce new pattern from compound data set. To cluster the... more Machine learning algorithm are used to produce new pattern from compound data set. To cluster the patient heart condition to check whether his /her heart normal or stressed or highly stressed k-means clustering algorithm is applied on the patient dataset. From the results of clustering ,it is hard to elucidate and to obtain the required conclusion from these clusters. Hence another algorithm, the decision tree, is used for the exposition of the clusters of . In this work, integration of decision tree with the help of k-means algorithm is aimed. Another learning technique such as SVM and Logistics regression is used. Heart disease prediction results from SVM and Logistics regression were compared.

Research paper thumbnail of 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics The De-Identification Camera

Abstract—Visual surveillance is increasingly prevalent today but the privacy issues of individual... more Abstract—Visual surveillance is increasingly prevalent today but the privacy issues of individuals involved in surveillance videos have not been dealt with adequately so far. In most cases, if not all, the chief purpose of placing a camera can be served without knowing the identity of the individuals involved unless the activity is of some predetermined kind. One needs to transform these videos to protect identity of individuals involved possibly at the source camera itself. In this paper we present the De-Identification Camera, which is a scalable, low cost and real-time solution to the privacy protection issues. Our main contribution lies in proposing a privacy protection architecture which transforms the video at the camera level itself, We also present and implement a de-identification pipeline which is suitable for real-time implementation. We implemented the system on a Texas Instrument OMAP4 based embedded platform and was able to de-identify videos in real time, transforming...