Singapore International Science Challenge (Design & Build Challenge)
Design & Build Challenge
The sub-theme for the two days of the Design & Build Challenge is Dream Machine and Machinenterprise.
The Design & Build Challenge is kept secret till SISC itself, i.e. details of this challenge will only be made known to the participants during SISC 2017 itself.
Instructions & Rules
The 2017 Design & Build Challenge will be integrated with the Machine Learning Challenge: learning resources that are relevant to this challenge that will require pre-SISC preparation will be made available on the SISC website while all necessary or relevant materials and engineering resources will be made available during the challenge itself;
Participants will be taken through the process of design thinking, rapid
prototyping and marketing to better enable their engagement with the challenge;
All teams, which are mixed to facilitate lensing of various issues, will be mentored by experts to better refine their products and solutions.
Participants are given 24 hours to design and build their solution to a scenario that is presented during SISC 2017.
The following link would be useful for you in the preparation for the challenge:
Introduction to Arduino
Arduino is a useful platform for creative programming projects. Look up the following link for a comprehensive introduction to Arduino, its components and tutorials on how to use it.
Experts from academic and research institutes will be invited to share their expertise in fields pertinent to this challenge and mentor participants in the design and engineering of their products.
Mr Jon Wong, Outreach Instructor, ISTD
With over 20 years in the programming field, Jon has run the gamut from fitting software into small devices to assembling large systems with best-of-breed small software. From the early days, Jon has used data mining for reverse-engineering in various scenarios — from the discovery of unforeseen features in network protocols to the thorough documentation of new and emerging open-source technologies. As data mining naturally led to machine learning, Jon is currently hoping to employ machine learning to real-time scenarios (fitting heavy computation into small time constraints).
Machine Learning is the current state-of-the-art in automation — the automation of learning. Similar to how humans learn from large volume of experiences, machine learning learns from huge volumes of data but in a fraction of the time humanly possible. We no longer explicitly instruct computers to simulate models that we painstakingly hypothesize, often with unforeseen errors. Instead, the approach employs algorithms that mimic biological neural networks, resulting in the artificial neural network (ANN). Let the real-world data teach us, and teach our computers too. This workshop introduces participants to the fundamental framework and concepts in training ANNs. Some techniques in optimizing machine learning will also be demonstrated, techniques that are surprisingly effective in optimizing human learning as well. Ultimately, in teaching our computers to learn better, we also discover how we ourselves can learn better.
Mr Robin Soo, Outreach Instructor, ISTD
Sphero is more than an app-controlled wireless robotic ball; it allows you to play, learn and explore.
At the end of this workshop, participants will:
(1) Understand the fundamentals of computational thinking to solve problems
(2) Understand fundamental programming concepts.
(3) Apply coding skills and knowledge to control Sphero to perform certain actions and solve problem statements.
Raspberry Pi Security System
Ms Zainab Binti Che Omar, Outreach Instructor, ISTD
There are many types of good security systems and cameras available for home or office security. Furthermore, in the world of Internet-of-Things(IoT) when we have new technologies to revolutionize our life. However, they are much more expensive.
In this workshop, the participants will build a low cost simple Raspberry Pi based intruder Alert System. Raspberry Pi is used to control the whole system which will detect the presence of Intruder and quickly alert the user by sending an alert email. The email will contain the image of the intruder captured by Pi camera. This system can be installed at home or office and it can be monitored from anywhere in the world using email via internet.
To be confirmed
Special thank to: