The Singapore University of Technology and Design is Singapore's fourth autonomous university, developed in collaboration with Massachusetts Institute of Technology. SUTD's mission is to advance knowledge and nurture technically grounded leaders and innovators to serve societal needs. At SUTD, design as a discipline cuts across the curriculum and provides a novel framework for the research and educational programmes.The University, also in collaboration with Zhejiang University is distinguished by its unique East and West academic programme which incorporates elements of technology, entrepreneurship, management and design thinking. MIT faculty has played a significant role in developing a blueprint for the curriculum, including its structure and the degrees to be offered. SUTD undergraduate students are granted either a Bachelor of Engineering or a Bachelor of Science degrees with a major in either Architecture and Sustainable Design , Engineering Product Development , Engineering Systems Design or Informations Systems and Technology Design . It also offers an MIT-SUTD Dual Masters' Degree Programme; a full-time programme leading to a degree from both MIT and SUTD. SUTD also offers Ph.D in each of its four areas of focus .Unlike traditional schools where students focus on very specialized disciplines, SUTD students are taught to think in a broader scope combining multiple domains. It teaches its students to be creative, not just in the technology and design part, but also to be creative in bringing ideas out of the academic environment into the real world, into the business arena, into the economy and make a difference to the world. SUTD is the only other institution in Singapore apart from Yale-NUS College to follow a holistic admissions process. Wikipedia.
Singapore University of Technology, Design and National University of Singapore | Date: 2014-11-21
The present invention relates to an apparatus for tracking a device comprising a magnet as the device is inserted through a subject. The apparatus is wearable by the subject and comprises a unit configured to conform to the subject. The apparatus further comprises magnetic sensors arranged with the unit. In use, the magnetic sensors detect magnetic fields of the magnet and the detected magnetic fields are processed to determine a position of the magnet. This allows tracking of the device as the device is inserted through the subject.
Agency: GTR | Branch: EPSRC | Program: | Phase: Fellowship | Award Amount: 1.24M | Year: 2015
Future information and communication networks will certainly consist of both classical and quantum devices, some of which are expected to be dishonest, with various degrees of functionality, ranging from simple routers to servers executing quantum algorithms. The realisation of such a complex network of classical and quantum communication must rely on a solid theoretical foundation that, nevertheless, is able to foresee and handle the intricacies of real-life implementations. The study of security, efficiency and verification of quantum communication and computation is inherently related to the fundamental notions of quantum mechanics, including entanglement and non-locality, as well as to central notions in classical complexity theory and cryptography. The central Research objective of our proposal is an end to end investigation of the verification and validation of quantum technologies, from full scale quantum computers and simulators to communication networks with devices of varying size and complexity down to realistic ``quantum gadgets. This goal represents a key challenge in the transition from theory to practice for quantum computing technologies. We will work closely with experimentalists and engineers to ensure that theoretical progress takes Development considerations into account, and will design prototypes for proof-of-principle demonstrations of our methods. The experimental aspects of our proposal are supported by the PIs associate directorial position at the Oxford led hub, joint projects with the York led hub as well as other ongoing collaborations with experimental labs in France and Austria. Meanwhile the required expertise in engineering design would be supported through a new collaboration of the PI as part of the Edinburgh Li-Fi research and development centre. The Deployment axis, complementing our core activity in research-development, will be built upon the unique Edinburgh entrepreneurial culture supported by Informatics Ventures as well as a dedicated senior business advisory board (which sponsored the PIs recent patent on quantum cloud). Advances to the problem of secure delegated computation would have an immediate significant consequence on how computational problems are solved in the real world. One can envision virtually unlimited computational power to end users on the go, using just a simple terminal to access the computing cloud which would turn any smartphone into a quantum-enhanced phone. This will generate new streams of growth for the UK cyber security sector as well as complementary business developments for the National quantum technology investment.
Hong Kong University of Science, Technology, Information Research Corporation, Singapore University of Technology, Design and University of Southern California | Date: 2014-07-11
Stream-switching techniques are applied in a content delivery system. A merge frame is generated as a function of bit-rates, distortion, and a piecewise constant operator. Parameters of the piecewise constant operator are selected to optimize the merge frame. Data streams are switched based on bandwidth requirements, switch requests, and throughput of a network. Images are reconstructed based on the merge frames and prediction frames. Reconstructed images are identically reconstructed for any prediction frame based on the merge frame.
Singapore University of Technology and Design | Date: 2014-12-24
The present invention relates to a method for reducing data bandwidth between a cloud server and a thin client. The method comprises: rendering a base layer image or video stream at the thin client, transmitting an enhancement layer image or video stream from the cloud server to the thin client, displaying a composite layer image or video stream on the thin client, the composite layer being based on the base layer and the enhancement layer.
Singapore University of Technology and Design | Date: 2013-06-19
A systematic distributed storage system (DSS) comprising: a plurality of storage nodes, wherein each storage node configures to store a plurality of sub blocks of a data file and a plurality of coded blocks, a set of repair pairs for each of the storage nodes, wherein the system is configured to use the respective repair pair of storage nodes to repair a lost or damaged sub block or coded block on a given storage node. Also a distributed storage system DSS comprising h non-empty nodes, and data stored non homogenously across the non-empty nodes according to the storing codes (n,k). Further a method for determining linear erasure codes with local repairability comprising: selecting two or more coding parameters including r and ; determining if an optimal [n, k, d] code having all-symbol (r, )-locality ((r, )_(a)) exists for the selected r, ; and if the optimal (r, )_(a )code exists performing a local repairable code using the optimal (r, )_(a )code.
Singapore University of Technology and Design | Date: 2015-02-24
According to various embodiments, a verification method may be provided. The verification method may include: determining a plurality of objects, each object having a property; displaying a representation of each object of the plurality of objects; receiving from a user an input indicating a sequence of the plurality of objects; determining a sequence of the properties of the plurality of objects; and comparing the Determine a plurality of objects, each object having a input with the sequence of the properties of the objects.
Singapore University of Technology and Design | Date: 2014-11-17
According to embodiments of the present invention, an optical device is provided. The optical device includes a channel waveguide, and a plurality of optical elements arranged along at least a portion of the channel waveguide to interact with light propagating in the channel waveguide, wherein a period of the plurality of optical elements changes nonlinearly along the portion of the channel waveguide. According to further embodiments of the present invention, a method for forming an optical device is also provided.
Singapore University of Technology, Design and Massachusetts Institute of Technology | Date: 2014-05-07
A method of real time magnetic localization comprising: providing an artificial neural network field model that is calibrated and optimized for a predetermined magnet; receiving signals from one or more magnetic sensors; and solving the location of the magnet using the model based on the signals.
Singapore University of Technology and Design | Date: 2014-03-17
A grid structure formed from a plurality of building blocks, the grid structure comprising: a plurality of flat panels, wherein two of the plurality of flat panels are paired in parallel to have one of the two parallel flat panels provide an inner surface to one building block from the plurality of building blocks and the other of the two parallel flat panels provide an inner surface to another building block from the plurality of building blocks, wherein within each of the plurality of building blocks, the inner surfaces of any two adjacent panels lie on planes intersecting along a straight line that passes through an inner corner of the building block.
Agency: GTR | Branch: EPSRC | Program: | Phase: Research Grant | Award Amount: 203.51K | Year: 2016
The objective of the proposed collaborative work is to advance the state of the art in the design of secure interconnected public infrastructures. The focus is on Security-by-Design. While security-by-design is not a new concept, the approach proposed here and its context, are and especially so in the context of interconnected public infrastructure. The increasing commoditisation of components for critical infrastructures has led to the widespread use of embedded computers in such systems. These computers are often interconnected using wireless communications or ethernet. This trend has been accelerated by the need for remote maintenance capability and regular upgrades of systems. An undesirable consequence has been that critical infrastructures have become interconnected and interdependent. The result of an attack on one infrastructure may well have cascading effects on others. Understanding such interdependencies and developing new design methodologies to avoid the possibility of cascading security failures is central to this proposal. The objective will be met through the following key steps: (a) modeling based on abstraction from system design for security analysis, (b) impact and response analysis across interconnected infrastructures using the model, and (c) upgrading of the initial design to improve system resilience to cyber attacks. A significant outcome of the above approach will be a software prototype that implements the steps mentioned above and the integration of such tools with state of the art existing design tools. The methodology and the tools developed will be assessed for their effectiveness and practical utility through experiments designed jointly by the research teams from Imperial and SUTD. The experiments will be conducted on state of the art testbeds available at SUTD for power and water. Generalized attack models, in contrast to specific models that exist today, will be used to create objectively designed cyber attacks to assess the resilience of interconnected systems when one or multiple systems are under attack.