The Singapore University of Technology and Design is Singapore's fourth autonomous university, developed in collaboration with Massachusetts Institute of Technology. SUTD's mission is to advance knowledge and nurture technically grounded leaders and innovators to serve societal needs. At SUTD, design as a discipline cuts across the curriculum and provides a novel framework for the research and educational programmes.The University, also in collaboration with Zhejiang University is distinguished by its unique East and West academic programme which incorporates elements of technology, entrepreneurship, management and design thinking. MIT faculty has played a significant role in developing a blueprint for the curriculum, including its structure and the degrees to be offered. SUTD undergraduate students are granted either a Bachelor of Engineering or a Bachelor of Science degrees with a major in either Architecture and Sustainable Design , Engineering Product Development , Engineering Systems Design or Informations Systems and Technology Design . It also offers an MIT-SUTD Dual Masters' Degree Programme; a full-time programme leading to a degree from both MIT and SUTD. SUTD also offers Ph.D in each of its four areas of focus .Unlike traditional schools where students focus on very specialized disciplines, SUTD students are taught to think in a broader scope combining multiple domains. It teaches its students to be creative, not just in the technology and design part, but also to be creative in bringing ideas out of the academic environment into the real world, into the business arena, into the economy and make a difference to the world. SUTD is the only other institution in Singapore apart from Yale-NUS College to follow a holistic admissions process. Wikipedia.
Singapore University of Technology and Design | Date: 2017-07-05
This invention relates to a novel mobile imaging system. In particular, it relates to a smartphone imaging system that may be suitable for the early detection of melanoma. In an embodiment, there is provided a method for analysing an image of a lesion on the skin of a subject, the method comprising: (a) identifying the lesion in the image by differentiating the lesion from the skin; (b) segmenting the image; and (c) selecting a feature of the image and comparing the selected feature10 to a library of pre-determined parameters of the feature, wherein the feature of the lesion belongs to any one selected from the group: colour, border, asymmetry and texture of the image.
Singapore University of Technology and Design | Date: 2015-05-25
There is provided a method of power monitoring comprising: determining the price for electricity for a user; determining the power consumption of an electrical appliance within the users premises; and providing an output signal for the appliance to indicate to the user if the current operational mode of the appliance is desirable or undesirable to the user based on at least one of: the electricity price and the power consumption. An apparatus for power monitoring and a base station used in the method is also disclosed.
Singapore University of Technology and Design | Date: 2017-10-04
Method and system for executing a one-time program comprising at least one instruction operating on at least one input value (a, b) and returning at least one output value (O), wherein each instruction of the one-time program is encoded onto a state of an elementary quantum system, comprising: encoding the at least one input value (a, b) onto a quantum gate according to a predefined input-encoding scheme; applying the quantum gate to the at least one elementary quantum system; making a measurement of a resulting state of the at least one elementary quantum system after the quantum gate; and determining the at least one output value from a result of the measurement.
Singapore University of Technology, Design and National University of Singapore | Date: 2014-11-21
The present invention relates to an apparatus for tracking a device comprising a magnet as the device is inserted through a subject. The apparatus is wearable by the subject and comprises a unit configured to conform to the subject. The apparatus further comprises magnetic sensors arranged with the unit. In use, the magnetic sensors detect magnetic fields of the magnet and the detected magnetic fields are processed to determine a position of the magnet. This allows tracking of the device as the device is inserted through the subject.
Agency: GTR | Branch: EPSRC | Program: | Phase: Fellowship | Award Amount: 1.24M | Year: 2015
Future information and communication networks will certainly consist of both classical and quantum devices, some of which are expected to be dishonest, with various degrees of functionality, ranging from simple routers to servers executing quantum algorithms. The realisation of such a complex network of classical and quantum communication must rely on a solid theoretical foundation that, nevertheless, is able to foresee and handle the intricacies of real-life implementations. The study of security, efficiency and verification of quantum communication and computation is inherently related to the fundamental notions of quantum mechanics, including entanglement and non-locality, as well as to central notions in classical complexity theory and cryptography. The central Research objective of our proposal is an end to end investigation of the verification and validation of quantum technologies, from full scale quantum computers and simulators to communication networks with devices of varying size and complexity down to realistic ``quantum gadgets. This goal represents a key challenge in the transition from theory to practice for quantum computing technologies. We will work closely with experimentalists and engineers to ensure that theoretical progress takes Development considerations into account, and will design prototypes for proof-of-principle demonstrations of our methods. The experimental aspects of our proposal are supported by the PIs associate directorial position at the Oxford led hub, joint projects with the York led hub as well as other ongoing collaborations with experimental labs in France and Austria. Meanwhile the required expertise in engineering design would be supported through a new collaboration of the PI as part of the Edinburgh Li-Fi research and development centre. The Deployment axis, complementing our core activity in research-development, will be built upon the unique Edinburgh entrepreneurial culture supported by Informatics Ventures as well as a dedicated senior business advisory board (which sponsored the PIs recent patent on quantum cloud). Advances to the problem of secure delegated computation would have an immediate significant consequence on how computational problems are solved in the real world. One can envision virtually unlimited computational power to end users on the go, using just a simple terminal to access the computing cloud which would turn any smartphone into a quantum-enhanced phone. This will generate new streams of growth for the UK cyber security sector as well as complementary business developments for the National quantum technology investment.
Hong Kong University of Science, Technology, Information Research Corporation, Singapore University of Technology, Design and University of Southern California | Date: 2014-07-11
Stream-switching techniques are applied in a content delivery system. A merge frame is generated as a function of bit-rates, distortion, and a piecewise constant operator. Parameters of the piecewise constant operator are selected to optimize the merge frame. Data streams are switched based on bandwidth requirements, switch requests, and throughput of a network. Images are reconstructed based on the merge frames and prediction frames. Reconstructed images are identically reconstructed for any prediction frame based on the merge frame.
Singapore University of Technology and Design | Date: 2015-02-24
According to various embodiments, a verification method may be provided. The verification method may include: determining a plurality of objects, each object having a property; displaying a representation of each object of the plurality of objects; receiving from a user an input indicating a sequence of the plurality of objects; determining a sequence of the properties of the plurality of objects; and comparing the Determine a plurality of objects, each object having a input with the sequence of the properties of the objects.
Singapore University of Technology and Design | Date: 2014-11-17
According to embodiments of the present invention, an optical device is provided. The optical device includes a channel waveguide, and a plurality of optical elements arranged along at least a portion of the channel waveguide to interact with light propagating in the channel waveguide, wherein a period of the plurality of optical elements changes nonlinearly along the portion of the channel waveguide. According to further embodiments of the present invention, a method for forming an optical device is also provided.
Singapore University of Technology, Design and Massachusetts Institute of Technology | Date: 2014-05-07
A method of real time magnetic localization comprising: providing an artificial neural network field model that is calibrated and optimized for a predetermined magnet; receiving signals from one or more magnetic sensors; and solving the location of the magnet using the model based on the signals.
Agency: GTR | Branch: EPSRC | Program: | Phase: Research Grant | Award Amount: 203.51K | Year: 2016
The objective of the proposed collaborative work is to advance the state of the art in the design of secure interconnected public infrastructures. The focus is on Security-by-Design. While security-by-design is not a new concept, the approach proposed here and its context, are and especially so in the context of interconnected public infrastructure. The increasing commoditisation of components for critical infrastructures has led to the widespread use of embedded computers in such systems. These computers are often interconnected using wireless communications or ethernet. This trend has been accelerated by the need for remote maintenance capability and regular upgrades of systems. An undesirable consequence has been that critical infrastructures have become interconnected and interdependent. The result of an attack on one infrastructure may well have cascading effects on others. Understanding such interdependencies and developing new design methodologies to avoid the possibility of cascading security failures is central to this proposal. The objective will be met through the following key steps: (a) modeling based on abstraction from system design for security analysis, (b) impact and response analysis across interconnected infrastructures using the model, and (c) upgrading of the initial design to improve system resilience to cyber attacks. A significant outcome of the above approach will be a software prototype that implements the steps mentioned above and the integration of such tools with state of the art existing design tools. The methodology and the tools developed will be assessed for their effectiveness and practical utility through experiments designed jointly by the research teams from Imperial and SUTD. The experiments will be conducted on state of the art testbeds available at SUTD for power and water. Generalized attack models, in contrast to specific models that exist today, will be used to create objectively designed cyber attacks to assess the resilience of interconnected systems when one or multiple systems are under attack.