Forthcoming events for the Faculty and all Departments are shown below. You may also wish to view Faculty only events or Departmental only events.

Learning and Teaching Lunchtime Seminar

Thursday 17 May 2012

1pm to 2pm
Kevin Wells, Andy Adcroft

FEPS Learning and Teaching seminars showcase some of the excellent teaching activity in the Faculty, as well as in expertise from outside to provide examples of best practice.

Lecture: Human Powered Flight

Tuesday 12 March 2013

Br Bill Brooks (Chairman, RAeS Human-powered flight group)

This lecture will trace the history and development of human-powered flight over the past 40 to 50 years and explain the technical advances that have made it possible.  

The Development of 'Chevron' Nozzles for Aeroengines

Tuesday 26 March 2013

14:00 to 15:00
Mr Craig Mead, Director at Aero Acoustics Ltd

Chevron nozzles are noise reduction devices for aeroengines, as perhaps most noticeably used on the Boeing 787. The development of these devices will be presented with the aim of illustrating the path of development of a new low-noise technology for an aeroengine and to show the on-going value of experimental R&D in an increasingly computational field.

Energy Storage Materials and Supercapacitors

Thursday 25 July 2013

10:00 to 16:00

This one-day workshop will focus on recent developments in the FP7 AUTOSUPERCAP project on energy storage materials for supercapacitors in automotive applications and will also include an overview of related work at the University of Surrey on nanomaterials and within the EPSRC SUPERGEN Consortium. There will also be a presentation on the European Energy Research Alliance (EERA).

You can register for the event and purchase tickets using the Surrey Store.

Opening of the new Engineering Design Centre

Monday 18 November 2013


On Monday 18th November, the Mechanical Engineering Sciences Department announces the opening of the new Engineering Design Centre. 

The opening will showcase the recent £500,000 investment in facilties and equipment by the University.  The Centre will be used for teaching and support for undergraduate design, advanced projects and provides an exciting new space for the Formula Student racing team.  The Centre will be opened by IMechE CEO Stephen Tetlow MBE FIMechE CEng.

The afternoon, which will start at 3pm in room 24 BA 02 (Surrey Space Centre), includes an opening talk from the Department of Mechanical Engineering Sciences, followed by the official opening at the Design Centre and an open exhibition with the opportunity to talk to staff and students.

UK Space - Past, Present and Future

Wednesday 20 November 2013

Abigail Hutty, Structures Engineer (Astrium Ltd)

This lecture is presented by the IMechE Thameswey Region Farnborough and Guildford Area, jointly with the RAeS Weybridge Branch.

Investing Sustainably - can it really make a difference?

Thursday 9 January 2014

13.00 hrs to 14.00 hrs
Dr Peter Michaelis, A former doctoral student in CES and now Head of Sustainable and Responsible Investment (SRI) at Alliance Trust - looks back on his fourteen years experience in SRI

As individuals our influence on the economy is generally thought to be limited to our spending habits. What is overlooked is the influence we have as investors: it is our pensions and life cover plans which own large percentages of the companies which dominate our economies. We have just as much choice in where we invest as in where we shop. So should those of us wanting to create a more sustainable economy, care more about where we invest?

Eavesdropping near field contactless payments: A quantitative analysis

Tuesday 14 January 2014

15:00 to 16:00
Thomas Diakos, PhD Student, University of Surrey

We present a quantitative assessment in terms of frame error rates for the success of an eavesdropping attack on a contactless transaction using easily concealable antennas and low cost electronics. An inductive loop, similar in size to those found in mobile devices equipped with NFC capabilities, was used to emulate an ISO 14443 transmission. For eavesdropping we used an identical loop antenna as well as a modified shopping trolley. Synchronisation and frame recovery were implemented in software. As a principal result of our experiments we present the FER achieved over a range of eavesdropping distances, up to 1m, at different magnetic field strengths within the range specified by the ISO 14443 standard.

Spatio-temporal video segmentation with shape growth or shrinkage constraint

Wednesday 15 January 2014

15:30 to 16:30
Dr Yuliya Tarabalka, INRIA Sophia-Antipolis Méditerranée, Sophia Antipolis (France)

Civil Engineering Research Seminar - January 2014

Thursday 16 January 2014

13:00 to 14:00
Pam Billy Fom

A Novel Image Restoration Scheme Based on Structured Side Information in Digital Watermarking Systems

Monday 20 January 2014

11:00 to 12:00
Hui Wang, PhD Student, University of Surrey

In this talk the speaker will present a new image restoration method based on a linear optimization model which restores part of the image from structured side information (SSI). The SSI can be transmitted to the receiver or embedded into the image itself by digital watermarking technique. In this talk the main focus is a special type of SSI for digital watermarking where the SSI is composed of mean values of 4x4 image blocks which can be used to restore manipulated blocks. Different from existing image restoration methods for similar types of SSI, the proposed method minimizes image discontinuity according to a relaxed definition of smoothness based on a 3x3 averaging filter of four adjacent pixel value differences, and the objective function of the optimization model has a second regularization term corresponding to a 2nd-order smoothness criterion. Experiments showed that when the proposed image restoration method is applied to the target self-restoration watermarking scheme, the average visual quality of 100 recovered images is improved by around 2dB measured in Peak Signal-to-Noise Ratio (PSNR) and around 0.04 in Structural Similarity Index (SSIM).

Perceptually Optimized Sound Zones Research Talk

Tuesday 21 January 2014


Perceptually Optimised Sound Zones - IOA Southern Branch joint evening meeting

Tuesday 21 January 2014

18:30 (AGM), 19:00 start

Often, two people in a single room want to listen to different items of audio. It may be that one person wants to watch television whilst the other wants to listen to the radio, or even that one wants to play a computer game whilst the other reads in silence. The obvious solution to this would be for all individuals to wear headphones, however this dramatically increases isolation (not just in acoustic terms), is impractical when multiple people want to listen to one or other of the audio streams, and could be uncomfortable over an extended period.

Crime, Corruption and Development: the Case of the Caribbean

Thursday 23 January 2014

13.00 hrs to 14.00 hrs
Professor Tony Clayton CES Visiting Professor, Professor of Caribbean Sustainable Development, University of the West Indies

This seminar will examine the impacts of crime and corruption on the development of small island developing states (SIDS), with particular regard to the Caribbean nations. The SIDS nations are regarded as highly vulnerable to natural disasters, climate change and external shocks. However, crime, corruption and poor governance have actually inflicted far more harm.

Improving Conditional Probability Based Camera Source Identification

Monday 27 January 2014

11:00 to 12:00
Syamsul Yahaya, PhD Student, University of Surrey

Conditional probabilities (CP) in frequency domain have been proposed as a feature space in multimedia forensics for identifying sources of digital images and videos produced by digital cameras. While this approach has been proved very effective for both image and video source identification, the CP features used in previous work are selected in a rather arbitrary way and it remains a question if all of them indeed contribute to the final classification result. In this paper, we revisit the selection process of CP features and propose to identify good features using some statistical analysis. In previous work, 72 CP features were used for video source identification and this allowed us to reduce the number of selected features to 15 “good” ones but keep the classification performance at the same level. To be more exact, when frame-based CP features are used with simple majority voting to classify digital videos produced by eight cameras of different models, the reduced set of 15 CP features gave an overall recognition rate of 96.2%, which is nearly the same as the rate when all the 72 features are used (96.3%). In addition to the feature reduction approach, we also investigate using means and standard deviations of CP features across frames as new (video-based) features. Experimental results show that this approach can drastically reduce the computational costs by a factor close to 100 but achieve similar classification accuracy (96.8%) compared with the case when the 15 good frame-based CP features are used with simple majority voting.

Shape Knowledge in Segmentation and Tracking

Wednesday 29 January 2014

14:00 to 15:00
Dr Victor Adrian Prisacariu, University of Oxford

Energy symbiosis and decentral energy supply as a part of German renewable energy transformation

Thursday 30 January 2014

13.00 hrs to 14.00 hrs
Prof. Dr.-Ing. Susanne Hartard, Professor Industrial Ecology, University of Applied Sciences Trier Environmental Campus Birkenfeld

Germany is following the sustainable path towards a future 100% renewable energy supply and will close the last atomic power plant in 2022. The challenge is high investments, the expansion of the electricity grid and especially a complete transformation from a former pure central energy supply towards decentral concepts with a lot of plants included. New investment and organization structures are needed and local and new networking concepts become more important.

WSMS February Talk

Tuesday 4 February 2014

Presented by Dr Peter Northover, Senior Research Fellow, Head of Materials Science-based Archaeology Group, Oxford Materials

Civil Engineering Research Seminar - February 2014

Thursday 6 February 2014

13:00 to 14:00
Mr Jianfei Peng

Cloning Localization Based on Feature Extraction and K-means Clustering

Monday 10 February 2014

11:00 to 12:00
Areej Alfraih, PhD Student, University of Surrey

The field of image forensics is expanding rapidly. Many passive image tamper detection techniques have been presented. Some of these techniques use feature extraction methods for tamper detection and localization. This work is based on extracting Maximally Stable Extremal Regions (MSER) features for cloning detection, followed by k-means clustering for cloning localization. Then for comparison purposes, we implement the same approach using Speeded Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT). Experimental results show that we can detect and localize cloning in tampered images with an accuracy reaching 97% using MSER features. The usability and efficacy of our approach is verified by comparing with recent state-of-the-art approaches.

Developing your career in the Satellites Industry: A lecture on NanoSats/CubeSats and a tour of the Surrey Space Centre

Wednesday 12 February 2014

18:30 to 21:00
Professor Craig Underwood, Deputy Director of the Surrey Space Centre

The University of Surrey and its spin-out, SSTL, are world leaders in the design, construction and operation of micro-satellites. Recent technological advances have made it possible to construct even smaller satellites, at an order of magnitude less cost. These “nano-satellites” open up many new possibilities for space exploration. 

Making A Better World

Thursday 13 February 2014

14.15 hrs to 15.30 hrs
Jonathon Porritt, Founder Director Forum for the Future

Once again CES is delighted to welcome the distinguished writer and campaigner Jonathon Porritt to address students and staff as part of the Sustainable Development: Applications course.

Tomorrow's Mathematicians Today 2014

Saturday 15 February 2014

09:00 to 17:00
Professor Luis Fernando Alday
Tomorrow's Mathematicians Today 2014

The Institute of Mathematics and its Applications (IMA) and the University of Surrey are proud to present Tomorrow's Mathematicians Today, an undergraduate mathematics conference supported by the IMA.

Special thanks go to Noel-Ann Bradshaw (University of Greenwich, initiator of the conference series) for her assistance and help with the organisation, and to Adam Sebestyen who designed the initial TMT logo.

Registration for this event is now closed.

The programme for the day is now available (PDF, 0.9 MB), and the abstracts for the talks are also available (PDF, 146 KB)

Threshold Blind Signatures

Monday 17 February 2014

11:00 to 12:00
Veronika Kuchta, PhD Student, University of Surrey

This paper formalizes the concept of threshold blind signatures (TBS) that bridges together properties of the two well-known signature flavors, blind signatures and threshold signatures. Using TBS users can obtain the signature through interaction with t-out-of-n in a blind way, i.e. without disclosing the corresponding message to any of those signers.

In addition, the paper shows how to construct a secure TBS scheme in the standard model. The resulting scheme can be seen as an extension of Okamoto's blind signature scheme (TCC 2006) with secret sharing techniques. The most significant applications of the scheme can be found in e-voting, where the threshold property offers stronger security guarantees.

Socio-economic assessment of biomass supply chains. What needs to be assessed?

Thursday 20 February 2014

13.00 hrs to 14.00 hrs
Dr Rocio A Diaz-Chavez, Research Fellow, Centre for Environmental Policy, Imperial College London

The potential on the use of biomass resources for the production of power, transport fuels and chemicals has become an important target in many countries looking for added economic value to the biomass. To achieve this, it will be necessary a change in the technology used for producing, handling and processing the raw biomass materials.

Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it

Friday 21 February 2014

10:00 to 12:00
Dr Adrian Waller, Consultant, Thales Research and Technology, Thales UK

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Secure Mobile Logins

Monday 24 February 2014

11:00 to 12:00
Franziskus Kiefer, PhD Student, University of Surrey

Password based authentication remains the most common authentication method on the internet and in particular on mobile devices. Yet, no satisfying, secure methods are deployed on mobile devices. We discuss challenges for secure password-based login mechanisms in mobile browsers and propose a solution secure against impersonation attacks, i.e. phishing attacks. We design and implement a drop-in replacement for the password over HTML authentication mechanism in mobile browsers that builds upon cryptographically sound primitives. Our result includes a ready to use Android application and an easy to set-up and use authentication server for integration into existing application servers.

The Internet of Things and building a digital ecosystem

Monday 24 February 2014

18:00 to 19:00
Dave Locke, Senior Inventor, Pervasive and Advanced Messaging Technologies, IBM

The Internet of Things is IBM’s cloud services solution and it is consider one of the best and most widely-used out there, connecting millions of devices everyday! This interactive talk is organised by the CompSoc (Computer Society) run by students of the Department of Computing.

Dense 3D Reconstruction from High Frame-Rate Video using a Static Grid Pattern

Thursday 27 February 2014

11:00 to 12:00
Dr Ryusuke Sagawa, National Institute of Advanced Industrial Science and Technology (AIST), Japan

The Energy of Nations - Risk Blindness and the Road to Renaissance

Thursday 27 February 2014

13:00 to 14:00
Dr Jeremy Leggett, Chair Solarcentury and SolarAid

Brain scientists tell us we have a very worrying collective tendency for blindness to the kind of risks that can crash economies, and imperil civilisations. The shocking recent history of the financial industries suggests they are right.

Evolutionary Learning of Counter-propagation Neuro-Controllers for Multi-objective Robot Navigation

Thursday 27 February 2014

15:30 to 16:30
Amiram Moshiov, Tel-Aviv University, Israel

This study explores evolutionary training of Counter-Propagation Neuro-Controllers (CPNCs) for applications in Evolutionary Robotics. It concerns navigating a robot in an environment that differs from the trained one. The evolutionary training of CPNCs is compared with that of the traditional Feed-Forward Neuro-Controllers (FFNCs). In contrast to FFNCs, CPNCs are neuro-controllers that do not process sensory information directly into actions. Rather, there are two mappings involved. First, the sensed input is mapped into a class that represents prototypical information about the environment. This is achieved in the first layer of Kohonen neurons. Next, each class, which is represented by a weight vector, is mapped into actions, via a Grossberg layer. The evolutionary training of the CPNCs is done using a two phase approach. The first phase primarily involves the unsupervised learning of the classes, and the second phase mostly deals with the adjustment of the control mapping.

To diversify trained solutions, and to obtain controllers for various scenarios, a multi-objective evolutionary approach is used. The evolved CPNCs exhibit multi-objective characteristics. These are reflected by the different degrees of path safety and attraction to targets, in both the trained and tested environments. For the studied case, the CPNCs are found to be statistically superior to the FFNCs with respect to the obtained performances, the learning rates and the generalization capabilities. Following the comparison, we provide initial results concerning an overall analysis of the correlation between the evolved number of Kohonen clusters, in the combined non-dominated set of controllers, and the evolved overall multi-objective performance.

Cryptanalysis of a Class of Chaos-Based Image Encryption Schemes

Tuesday 4 March 2014

15:30 to 16:30
Dr Chengqing Li, Associate Professor, Xiangtan University, China

The subtle similarities between cryptography and chaos theory make the design of chaos-based encryption schemes become a hot research subject in the past two decades. As a result, a large number of encryption schemes based on chaos theory have been proposed to date. Among them, many schemes share the same structure, namely combination of multiple rounds of two basic parts: position permutation and value substitution, which is also a typical structure of the traditional text encryption schemes. In this talk, first, preliminary knowledge of cryptanalysis is introduced. Then, a class of chaos-based image encryption schemes, which share the same structure, is reviewed. Further, recent research progress on breaking the aforementioned two separate basic parts, when the round number is equal to one, is presented. Finally, the recent research results on breaking the two basic parts separately, when the round number is more than one, are reported with detailed discussions.

Secure Futures

Friday 7 March 2014

Today, cyber security is headline news and touches every corner of society.

The University of Surrey is collaborating with e-skills UK to help local school children to discover this exciting field at a Secure Futures event, held at Surrey's Department of Computing.

Quality as a prerequisite for security in interoperable systems

Friday 7 March 2014

10:00 to 12:00
Mr Peter Davies, Technical Director, Thales UK

We are all facing enormous challenges, now and into the future, in the way that assurance of ICT products and systems is provided and there is a pressing need to review the thinking about assurance. I will argue that we only truly understand the 'security' of an interoperable system when we understand the 'quality' level to which that system has been implemented. I will further argue that a laxity in our linguistic definitions means that we increasingly do not understand what is meant when we are discussing the security.

11th Annual Computing Department PhD Conference

Monday 10 March 2014

9:00 to 17:00
To be announced

The 11th Annual Computing Department PhD Conference will be taking place on Monday 10 March 2014 in Lecture Theatre 1DK02 in the morning and in Lecture Theatre L in the afternoon, University of Surrey, Guildford.

The Boeing Dreamliner

Wednesday 12 March 2014

João Miguel Santos FRAeS, Vice President of Africa Boeing International

"The 787 Dreamliner - where we have been, how did we get here and where are we going?"

Joint with the RAeS Farnborough Branch

Civil Engineering Research Seminar - March 2014

Thursday 13 March 2014

13:00 to 14:00
Francisco Comin

The Future of Security

Friday 14 March 2014

10:00 to 12:00
Dr Alastair MacWilson, Former Global Managing Director, Accenture Technology Consulting

This seminar is going to describe where the future of the security is and where it is not.  It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research, It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators. It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Gait Analysis Using Wearable Sensors

Friday 14 March 2014

13:00 to 14:00
Dr Delaram Jarchi, Research Associate, Department of Computing, Imperial College London

Gait analysis or systematic evaluation of bipedal locomotion provides important information about the human biomechanics, pathology and behaviour. One important application of gait analysis is to create a mobility assessment tool for patients following orthopaedic surgery. With recent advances in wearable sensing technologies, the practical use of the wireless inertial sensors for gait analysis has been widely increased. However, the use of a reliable gait analysis system for everyday clinical utilisation and home-based monitoring under realistic real-life situations remains limited. For patient studies, integration of all sensing capabilities into a single wireless sensor node has specific advantages. In this talk we look into the recent advances in gait analysis based on a single sensor and discuss the performance, reliability and practical use of a developed gait analysis platform for creating future monitoring systems.

Causal Mode Decomposition for Motion Correction and Segmentation in Renal DCE-MRI Medical Imaging

Monday 17 March 2014

11:00 to 12:00
Santosh Tirunagari, PhD Student, Department of Computing, University of Surrey

Dynamic contrast enhanced magnetic resonance renography (DCE-MRI), in common with other medical imaging techniques, is influenced by respiratory motion. As a result the data quantification may be inaccurate. This paper presents a novel method for motion correction as well as segmentation using Causal Mode Decomposition (CMD). In the present study, for the first time, we introduce CMD to the field of medical imaging by analysing the renal DCE-MRI imaging data. Analysing these images is essential in understanding the fundamental characteristics of renal perfusion and filteration. This novel method is applied to ten healthy volunteers' renal DCE-MRI data. CMD reconstruction results in the motion correction and CMD projections result in segmentation of the renal DCE-MRI data. Both qualitative and quantitative evaluation was performed against the original images using region of interest analysis.

Advanced Materials for a Modern Age Symposium

Wednesday 19 March 2014

13:30 to 17:15

As part of the “Surrey Sevens for 2014” programme we will be holding a half day symposium on Advanced Materials on Wednesday 19 March 2014 in the Ivy Arts Centre on campus.

Identity is the New Money

Friday 21 March 2014

10:00 to 12:00
David Birch, Director, Consult Hyperion

David Birch from Consult Hyperion will give a talk based on his forthcoming book “Identity is the New Money” explaining Bitcoins and the stone currency of island of Yap, the reason why social networks will replace cash and the case for a National Entitlement Scheme. In 2013, Wired magazine named him one of their global top 15 favourite sources of finance and business information and he was ranked Europe’s most influential commentator on emerging payments by Total Payments magazine so you’d be mad to miss out.

This seminar is going to describe where the future of the security is and where it is not.   It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research,  It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators.  It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Family Bootstrapping: a Genetic Transfer Learning Approach for Onsetting the Evolution for a Set of Related Robotic Tasks

Thursday 27 March 2014

15:30 to 16:30
Amiram Moshaiov, Tel-Aviv University, Israel

Studies on the bootstrap problem in evolutionary robotics help lifting the barrier from the way to evolve robots for complex tasks. It remains an open question, though, how to reduce the need for designer knowledge when devising a bootstrapping approach for any particular complex task. Recent developments in the field of transfer learning may help reducing this need and support the evolution of solutions to complex tasks, through task relatedness. Relying on the commonalities of similar tasks, we introduce a new concept of Family Bootstrapping (FB). FB refers to the creation of biased ancestors that are expected to onset the evolution of "a family" of solutions not just for one task, but for a set of related robot tasks. A general FB paradigm is outlined and the unique potential of the proposed concept is discussed. To highlight the validity of the FB concept, a simple demonstration case, concerning the evolution of neuro-controllers for a set of robot navigation tasks, is provided. The FB concept resulted from an earlier work on bootstrapping the co-evolution of soccer-like players, which is also briefly reported.  The presentation is concluded with some suggestions for future research.

Can shale gas be part of the UK's low-carbon transition?

Thursday 27 March 2014

13.00 hrs to 14.00 hrs
Dr Maria Sharmina, Tyndall Centre for Climate Change Research

With conventional natural gas reserves declining globally, shale gas has emerged as a potentially significant new fossil fuel source. This new availability and apparent abundance of shale gas in the US (and potentially elsewhere) has led some to argue that shale gas could, in principle, be used to substitute more carbon intensive fuels such as coal in electricity generation.

Computer Vision on Mobile Platforms

Thursday 27 March 2014

11:00 to 12:00
Tony King-Smith, Imagination Technologies

Building Integrated Cyber Defences

Friday 28 March 2014

10:00 to 12:00
Peter Kemp, Technical Lead for Cyber Intelligence, QinetiQ

Computer Network Defence is a fascinating and ever changing subject. Having worked with some of the best, and worst, organised network defences in the UK, I propose to show you how to consider your Cyber Defences as a whole, not focussing on a single aspect, and how to plan to build a capability from scratch in a methodical way, encompassing hardware, software, and the people who will operate it, and how the system becomes stronger than the sum of its parts.

Multimodal Ageing (or habituation)

Monday 31 March 2014

11:00 to 12:00
Dr Norman Poh, Lecturer, Department of Computing, University of Surrey

As we grow old, our biometric traits will also change. Indeed, there is increasing evidence of ageing across a number of biometric modalities. However, whether or not a multimodal biometric system suffers from the ageing is an issue that has not been investigated. We conjecture that if the underlying biometric modalities may change over time, the resultant multimodal biometric system should also change. In order to detect minute score changes over time, we use a subject-dependent regression-based framework to detect ageing. Based on the Mobile Biometry (MOBIO) database with talking face and speech modalities, our findings suggest that the change of biometric performance over time can be positive or negative, that is, for some subjects, the system performance actually improves with use, hence suggesting potential habituation. Yet, for most other users, the system performance degrade over time.

Civil Engineering Research Seminar - April 2014

Tuesday 1 April 2014

13:00 to 14:00
Ms Hooi Ying Lee

Business Development: How to Connect and Work with Business

Wednesday 2 April 2014

Celia Gaffney, Business Development Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Business Development: How to Connect and Work with Business on Wednesday 2nd April in room 40 AA 03, with lunch available from 12:45 for a 13:00 start.

Modelling Climate Change and Development - Starting with our development goals

Wednesday 2 April 2014

13.00 hrs to 14.00 hrs
Jeremy Webb, African Minerals Development Centre, UN Economic Commission for Africa (UNECA)

It is widely recognised that climate change is a development issue, not just in terms of the impacts of climate change but also the development implications associated with climate change negotiations.  

Touch and pay... or far and pay?!

Thursday 3 April 2014

14:00 to 15:00
Dr Ioana Boureanu Carlson, researcher in cyber security

Smartcard-based protocols represent an increasingly large share of the wireless authentication solutions market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to this development. However, such attacks could be mitigated through the use of distance-bounding protocols. In this talk, we will discuss the core challenges for distance-bounding, of which some have recently been overcome, whereas others still stand prominently.

We will focus mostly on the security of these wireless protocols, from attacks and new, secure designs. We will finish with a vision for the future of these protocols, the possible and advisable paths towards, e.g., securing contactless payments.

The Cyber Threat Landscape and Hunting the Adversary

Friday 4 April 2014

10:00 to 12:00
Dr Adrian Nish, Senior Consultant and Cyber Threat Intelligence Lead, Detica

The corporate IT network is a battle-ground for a range of modern threats. Cybercriminals looking to make financial gain, attention-seekers trying to create headlines, professional hackers aiming to steal sensitive documents, and even moles acting as legitimate employees all create significant risks for those tasked with defending the network. To make matters worse, the traditional technology and methods of these defenders has failed to keep pace with the ingenuity of the attackers and the industrialisation of their methods. This seminar will give an overview of the threat landscape and draw on real case studies from investigations done by Detica’s Cyber Security services. Examples of social engineering tricks, exploits, custom malware, and threat correlation will be presented along with descriptions of some of the cutting-edge techniques being used to detect them.

The Privatisation of Biodiversity? - New Approaches to Nature Conservation Law

Wednesday 9 April 2014

13.00 hrs to 14.00 hrs
Dr Walters Nsoh, School of Law, University of Dundee

The UK failed to meet its target of halting biodiversity loss by the end of 2010. A new biodiversity plan launched in 2011, “Biodiversity 2020”, further extends the target of halting overall biodiversity loss to 2020. Although some progress is being made, the current policy and regulatory approaches have not prevented, far less reversed, the loss of biodiversity across the country.

Brain Computer Interfaces for Neurofeedback and Medical Applications

Thursday 24 April 2014

14:00 to 15:00
Dr Loukianos Spyrou, Donders Research Institute, Radboud University Nijmegen, Netherlands

Brain Computer Interface (BCI) technology has advanced over the last decade to the point that it can be applied with success in a variety of fields. Two novel and mobile BCI designs and their technical details (signal processing and machine learning) from the Donders Institute research group in Netherland ( will be presented. One is based on event-related neurofeedback to aid language and sound learning. The second one is an intra-operative awareness monitor which aims to serve as an indication of increased awareness during a surgical procedure.

Getting your hands dirty - how to engage industrial partners and bid to the TSB

Wednesday 30 April 2014

Peter Lancaster, Impact Acceleration Account KE Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Getting your hands dirty - how to engage industrial partners and bid to the TSB on Wednesday 30th April in room 33 AB 03, with lunch available from 12:45 for a 13:00 start.  

Science Showoff

Wednesday 30 April 2014


The night before the British Science Association Science Communications Conference begins at the University of Surrey, we bring you Science Showoff. Join us for a fun packed evening of science humour and general silliness.

Buy tickets

Application of Surface Analysis to Turbine Blades, Tissue Scaffolds and Plastic LEDs

Wednesday 30 April 2014

Dr David McPhail, Imperial College

Further information to follow.

STRaND1 - Raising the bar in COTS electronics

Wednesday 7 May 2014

Dr Chris Bridges

Professor Josef Kittler invites you to come and celebrate the Department of Electronic Engineering's excellence in research at a lecture to be given by the winner of the Industrial Advisory Board Departmental Prize for Excellence in Research 2013, Dr Bridges.

The Chairman of the Department's Industrial Advisory Board, Professor Chris Firth, Thales Research, will present the prize to Dr Bridges at this event. Drinks and nibbles will follow in the upper lecture theatre concourse (this can be accessed via the rear doors of the lecture theatre).

Going Data-Driven - How AI is leading the way to a new scientific paradigm (and why this is not necessarily a good thing)

Wednesday 7 May 2014

14:00 to 15:00
Professor Nello Christianini, Professor of Artificial Intelligence, University of Bristol, UK

The talk will cover the paradigm shift that has been brought about by the availability of large amounts of data, both its historical roots in AI and its effects on other fields of science and society.

Message Dissemination in Vehicular Ad Hoc Networks

Monday 12 May 2014

11:00 to 12:00
Mr Leandros Maglaras, Research Fellow, Department of Computing, University of Surrey

A vehicular network is a challenging environment since it combines a fixed infrastructure (roadside units, e.g., proxies), and ad hoc communications among vehicles. Vehicular networks have the diverse range of applications that varies from safety applications to comfort applications. As the dissemination requirements (reliability, delay, coverage, etc.) may be different from one application to another, the dissemination mechanism could be implemented at the application layer where the interaction with the routing layer is limited. This talk addresses several aspects of vehicular communications related to data dissemination.

A Bitcoin Walkthrough

Tuesday 13 May 2014

12:00 to 13:00
Dan Jayasinghe, Smart Card Center, Information Security Group, Royal Holloway, University of London

What is Bitcoin? How did it all start? What is Bitcoin mining? Is Bitcoin really anonymous? Has fair-exchange just got even more difficult?  While answering these questions, we will take a quick overview of the Bitcoin digital cash system and look into cryptography used in its clever design with attractive reward schemes. The walkthrough also touches up on setting-up, start making & receiving payments and Bitcoin mining. We conclude with some recent developments in Bitcoin and give insight into further research carried out.

WSMS May Talk

Tuesday 13 May 2014

6.45pm to 8:00pm

Walking to Wellbeing and Sustainability? Walking and promotion of outdoor activities for health and sustainable living

Tuesday 13 May 2014

13.00 hrs to 14.00 hrs
Jim Walker, Chief Executive of the Outdoor Trust

There is wide agreement that more walking and public engagement in outdoor activities can make a contribution to personal well-being, health and collective sustainability. But how do we go about promoting the benefits of walking and 'the great outdoors' in a culture where it is ever easier to be sedentary and disconnected from the natural environment? Our seminar speaker Jim Walker of the Outdoor Trust charity draws on a wealth of experience as a ranger, trail designer and urban well-being consultant in discussing these challenges for sustainable lifestyle change. Jim will look at methods for engaging citizens in outdoor activities and how these can contribute to wider behavioural change.

Action Detection in Video Sequences

Thursday 15 May 2014

14:00 to 15:00
Professor Pavel Zemčík, Faculty of Information Technology (FIT), Brno University of Technology, Brno, Czech Republic

Cyber security - what is happening and why?

Friday 16 May 2014

10:00 to 12:00
Mike St John Green, Recently retired from government

The Internet of Things, Smart Meters, the IP connection of Process Control Systems, Big Data, consumerisation and mobility are all part of the rapidly changing landscape of cyberspace, a place we all rely on for an ever increasing proportion of our social and economic activity. But news stories reveal that the environment is far from safe and secure. What are the forces at play? I will consider how the shape of cyberspace is changing and the issues this poses for industry, governments and users as we work to make cyberspace sufficiently safe and secure.

NASA's Exploration Program: A Path to Mars

Friday 16 May 2014

11:00 to 12:00

NASA’s Chief Scientist and Deputy Chief Technologist will provide an overview of NASA’s plans to develop a human exploration pathway to Mars, including plans for a human mission to an asteroid, with a specific focus on how science and technology will impact, and be impacted by, these ambitious plans. They will also discuss opportunities for international cooperation.

Re-assessing resource risks and criticality

Wednesday 21 May 2014

13.00 hrs to 14.00 hrs
Prof Raimund Bleischwitz, BHP Billiton Chair in Sustainable Global Resources University College London (UCL) UCL Institute for Sustainable Resources

While strategic studies on natural resources usually focus on the criticality of certain single materials, this lecture starts from the inter-linkages between and among resources (called “the resource nexus”). It discusses the impact any food and water stress may have on extraction activities in fragile states and regions.

The department of Physics proudly presents its 5-a-side football tournament

Wednesday 21 May 2014


The tournament starts at 1pm on Wednesday 21st May on the AGP1 pitch at Surrey Sports Park.

If you are interested in participating please email PhySoc: with your name, team name, and affiliation (eg:  Level 1,2,3, MSc, Phd, staff, research group, alumni).  

Entry is free and on a first-come-first-served basis since teams numbers are limited. Each team must have at least one female member on the pitch at all times.

The winning team will be awarded the highly prestigious Al-Khalili Challenge Plate!

Polynomial Matrix Factorisation Techniques for Multi-Channel Signal Processing

Tuesday 27 May 2014

12:00 to 13:00
Prof J G McWhirter, School of Engineering, Cardiff University

The term polynomial matrix (PM) is used to describe a matrix whose elements take the form of polynomials. This provides a very useful and compact representation for multi-channel digital filtering and other important operations in digital signal processing. For example, since polynomials in the delay operator z-1 are normally used to specify linear time-invariant processes, an m x n polynomial matrix may be used to represent a fast fading wireless communication channel from n transmitters to m receivers.

For almost ten years now, I have been carrying out research with numerous colleagues into a range of polynomial matrix (PM) factorisation techniques. These include PM eigenvalue decomposition (PEVD), singular value decomposition (PSVD) and QR decomposition (PQRD). By analogy with the role played by the EVD, SVD and QRD of conventional matrices in DSP, these polynomial factorisation techniques have potential advantage for a wide range of multi-channel signal processing problems such as broadband adaptive beamforming, blind signal separation, data compaction and spectral factorisation.

In this talk, I will attempt to give a brief review of this research, omitting details of the various PM factorisation algorithms but concentrating on some of the potential applications. In this context I will present the results of some computer simulation studies designed to demonstrate the performance of the PM algorithms in comparison with alternative techniques, where available.

Bayesian Early Mode Decision Technique for View Synthesis Prediction-enhanced Multiview Video Coding

Wednesday 28 May 2014

14:00 to 15:00
Professor Raouf Hamzaoui, Head of Research, Faculty of Technology, De Montfort University, UK

View synthesis prediction (VSP) is a coding mode that predicts video blocks from synthesised frames. It is particularly useful in a multi-camera setup with large inter-camera distances. Adding a VSP-based SKIP mode to a standard Multiview Video Coding (MVC) framework improves the rate-distortion performance but increases the time complexity of the encoder. The talk will present an early mode decision technique for VSP SKIP-enhanced MVC. The method uses the correlation between the rate-distortion costs of the VSP SKIP mode in neighbouring views and Bayesian decision theory to reduce the number of candidate coding modes for a given macroblock. Simulation results show that the technique can save up to 36.20% of the encoding time without any significant loss in rate-distortion performance.

Blind Source Separation in Neural Signal Processing

Wednesday 28 May 2014

Professor Christopher James, University of Warwick

Further information to follow.

What is string theory?

Wednesday 28 May 2014

15:15 to 17:30

String theory is well-known as a theory unifying gravity with the remaining fundamental forces of physics. What is perhaps less well-known is that string theory is far more useful than that.

On Wednesday 28 May, come and hear the latest research in string theory as pioneered by the newly established Field, Strings and Geometry group within the Department of Mathematics at Surrey.

Imaging challenges for Single Cell Irradiation at the Surrey Ion Beam Centre

Wednesday 28 May 2014

14:00 to 15:00
Dr Michael Merchant and Dr Jonathan (Charlie) Jeynes, Ion Beam Centre, University of Surrey

Challenges of modeling human experience and ground truth for machine vision applications

Thursday 29 May 2014

14:00 to 15:00
Professor Heikki Kalviainen, Machine Vision and Pattern Recognition Laboratory (MVPR), Lappeenranta University of Technology (LUT), Finland

Usability in Biometrics

Thursday 29 May 2014

11:00 to 12:00
Mr Ramon Blanco-Gonzalo, Visiting PhD Student at University of Surrey from Carlos III University of Madrid (Universidad Carlos III de Madrid), Spain

The increasing demand for security systems in mobile environments has encouraged the development of several authentication approaches to access mobile devices. Up to now, biometric recognition offers the unique advantage and convenience of not requiring a password or carrying a token. Since it has only been fairly recent that biometrics is used in mobile devices, there are few works that address usability and accessibility concerns that meet the user’s requirements. The University Group for Identification Technologies (GUTI) is currently focused on security and specially in mobile biometrics. In this talk, we will review the main GUTI's research lines paying special attention to usability and accessibility in biometrics.

Wigner flow reveals quantum phase space features we thought could not be there

Thursday 29 May 2014

Dr Ole Steuernagel, University of Hertfordshire

The behaviour of classical mechanical systems is characterised by their phase portraits, the collections of their trajectories.

Anti-forensic Resistant Likelihood Ratio Computation

Monday 2 June 2014

11:00 to 12:00
Nik Nurul Ain Binti Nik Suki, PhD Student, Department of Computing, University of Surrey

One of the major utilities of biometrics in the context of crime scene investigation is to identify people. However, in the most sophisticated cases, criminals may introduce the biometric samples of innocent individuals in order to evade their own identities as well as to incriminate the innocent individuals. To date, even a minute suspect of an anti-forensic threat can potentially jeopardize any forensic investigation to the point a potentially vital piece of evidence suddenly becomes powerless in the court of law. In order to remedy this situation, we propose an anti-forensic resistant likelihood ratio computation. This approach renders the strength of evidence to a level that is proportional to the trustworthiness of the trace, such that a highly credible evidence will bear its full strength of evidence whilst a highly suspicious trace can have its strength of evidence reduced to naught. Using simulation as well as a spoof fingerprint and face database, we show that the existing likelihood ratio computation is extremely vulnerable to an antiforensic threat whereas our proposed computation is robust to it, thereby striking the balance between the utility and threat of a trace.

Multidisciplinary Studies Linking Altered Loading to Biology, Inflammation and Pain

Wednesday 4 June 2014

Dr Cathy Holt, University of Cardiff

Further information to follow.

Intellectual Property and Non-Disclosure Agreements

Wednesday 4 June 2014

Rob Yates, Trevor Hartman, Daniele Giannone (RES)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Intellectual Property and Non-Disclosure Agreements on Wednesday 4th June in 40AA03, with lunch available from 12:45 and the seminar running from 13:00 to 14:00.

Measuring the Complexity of Visual and Auditory Patterns

Wednesday 4 June 2014

14:30 to 15:30
Professor Godfried Toussaint, New York University Abu Dhabi (United Arab Emirates)

Introduction to Approximate Polytope Ensembles for Machine Learning

Thursday 5 June 2014

14:00 to 15:00
Dr Oriol Pujol, Vision and Computational Learning Research Group, University of Barcelona (Spain)

Automating the Design of Data Mining Algorithms with an Evolutionary Algorithm

Tuesday 10 June 2014

14:00 to 15:00
Prof Alex A Freitas, University of Kent

Decision-tree induction algorithms are one of the most popular types of classification algorithms in the field of data mining and knowledge discovery. Research on this type of algorithms produced many new algorithms in the last 30 years or so. However, all the decision-tree induction algorithms created over that period have in common the fact that they have been manually designed, typically by incrementally modifying a few basic decision-tree induction algorithms. Having these basic algorithms and their components in mind, we propose an evolutionary algorithm to automate the process of designing decision-tree induction algorithms. The basic motivation is to automatically create complete decision-tree induction algorithms in a data-driven way, trying to avoid the human biases and preconceptions incorporated in manually-designed algorithms. The proposed evolutionary algorithm is evaluated on a number of datasets, and the results show that the machine-designed decision-tree induction algorithms are very competitive with well-known human-designed decision-tree algorithms.

Magnetron Sputtering: A Versatile Technique for High Quality Engineering Coatings

Wednesday 11 June 2014

Professor Peter Kelly, Manchester Metropolitan University

Further information to follow.

Neural Network Ensembles For Image Identification Using Pareto-optimal Features

Thursday 12 June 2014

15:30 to 16:30
Mr Wissam Albukhanajer, PhD Student, Department of Computing, University of Surrey

In this presentation, an ensemble classifier is constructed for invariant image identification, where the inputs to the ensemble members are a set of Pareto-optimal image features extracted by an evolutionary multi-objective Trace transform algorithm. The Pareto-optimal feature set, called Triple features, gains various degrees of trade-off between sensitivity and invariance. Multilayer perceptron neural networks are adopted as ensemble members due to their simplicity and capability for pattern classification. The diversity of the ensemble is mainly achieved by the Pareto-optimal features extracted by the multi-objective evolutionary Trace transform. Empirical results show that the general performance of proposed ensemble classifiers is more robust to geometric deformations and noise in images compared to single neural network classifiers using one image feature.

A panoramic VISTA of the stellar halo of NGC 253

Thursday 12 June 2014

Prof. Laura Greggio

I will introduce the general topic on the properties of stellar halos around late type galaxies, and on what they tell us with respect to the galaxy formation models.

Herschel and ALMA find supernovae as dust factories

Friday 13 June 2014

Mikako Matsuura, University College London

The formation of dust by core-collapse supernovae (CCSNe) is one of the key processes in the chemical and physical evolution of supernova ejecta, with implications for the origin of dust in the interstellar media of galaxies.

Ian Castro

Wednesday 18 June 2014

Professor Ian Castro, University of Southampton

Further information to follow.

Acquisition and Modeling of Facial and Material Appearance

Wednesday 18 June 2014

14:00 to 15:00
Dr Abhijeet Ghosh, Department of Computing, Imperial College London

Quasi Steady State Petri Nets

Wednesday 18 June 2014

14:00 to 15:00
Prof Andrzej M. Kierzek, Professor of Systems Biology, FHMS, University of Surrey

I will present Quasi Steady State Petri Net (QSSPN), an algorithm for simulation of dynamic Place/Transition systems controlling flow networks at steady state. The QSSPN is a hybrid algorithm integrating qualitative, stochastic and continuous Petri Nets (PN) with Linear Programming (LP) optimisation of flow networks at steady state. We introduce “constraint” PN nodes, which map node state to flow capacity bounds and “objective” PN nodes that execute LP evaluation of objective functions. The algorithm is motivated by applications in computer simulation of molecular interaction networks of the living cell, where slow, dynamic, gene regulatory and signaling processes re-direct steady state flux in metabolic networks. The QSSPN algorithm will be illustrated by the first dynamic simulation of molecular interaction network describing gene regulation, signaling and whole-cell metabolism in human cell. I will present formal verification of biological responses, by Monte Carlo simulation and generation of reachability graph.

Multi-Objective Evolutionary Recurrent Neural Network Ensemble for Convergence Based Prediction of Computational Fluid Dynamic Simulations

Thursday 19 June 2014

15:30 to 16:30
Chris Smith, PhD Student, Department of Computing, University of Surrey

Using a surrogate model to evaluate the expensive fitness of candidate solutions in an evolutionary algorithm can significantly reduce the overall computational cost of optimization tasks.

In this talk I will present a hybrid multi-objective evolutionary algorithm that trains and optimizes the structure of a recurrent neural network ensemble that is used as a surrogate for the long-term prediction of computational fluid dynamic (CFD) simulations.

The surrogate model is used to predict the outcome of fully converged CFD simulations, based on intermediate convergence data. The aim is to stop each CFD simulation early, before full convergence and project what the outcome would be. This type of surrogate could reduce the computational cost of each individual CFD calculation and hence represent an overall computational saving during an optimization procedure.

Initial work concentrated on the prediction of transonic flow conditions and five selection methods for constructing the ensemble of predictors were tested on six data sets. The accuracy of the ensembles is compared to the converged CFD data, as well as to the delta change between two flow conditions. The method presented can produce accurate and stable results using a third of the intermediate data needed for convergence.

Following this initial work a second study has been performed on a data set for high-lift aerodynamic flow conditions, where the flow features are typically highly complex. Analysis of 2D high-lift RANS CFD computations will be presented, as well as the prediction performance for a parametric study of flap_lap, flap_gap and angle of incidence.

Recent Robotic Systems Developed in China's State Key Laboratory of Robotics

Monday 23 June 2014

14:00 to 15:00
Dr. Jinguo Liu, Professor, Assistant Director, State Key Laboratory of Robotics (SKLR), Shenyang Institute of Automation (SIA), Chinese Academy of Sciences (CAS), China

This presentation aims to provide an overview of the main research and development issues in the State Key Laboratory of Robotics (China). SKLR has over forty years of experience in robotics R&D since the Father of Robotics in China Mr. Xinsong Jiang (1931-1997), an Academician of the China Academy of Engineering, first initiated relevant advocacy in 1972. SKLR’s recent advancement in robotics has made impact in a wide range of application areas, most notably for exploration in extreme environments such as the space and deep sea, such as: the first Chinese lunar rover Yutu (‘Jade rabbit’) landed successfully on the Moon in December 2013; three different types of robots were deployed to assist the search and rescues following the Ya’an earthquake in 2013; In deep sea exploration, Chinese submersible vehicle Jiaolong reached a record depth of 7062 meters in 2012. SKLR also applied robotic technologies during various expeditions to the Poles including to Antarctica in 2007 and 2012, and to Arctic in 2008 and 2010. Nevertheless, SKLR’s researchers have also identified major technical challenges for achieving robust, reliable, and autonomous operations in future deep sea or space using robots. To meet China government’s mid-long term goals of robotics technology, SKLR would benefit greatly from more basic researches as well as international collaboration to enhance its capability in both technology and hardware development.

Provenance of 3D printed objects

Monday 23 June 2014

11:00 to 12:00
Nawfal Al Hashimy, PhD Student, Department of Electronic and Computer Science, University of Southampton

The introduction of affordable 3D printers made a significant impact on personal fabrication artistic designs that may or may not be covered by Intellectual Property Rights (IPR). Therefore copyright holders or creators of 3D objects have a legitimate concern about sharing 3D objects. my work presents a model for signing printable 3D objects to address the IPR issue. 3D files contain object geometry plus a number of attributes however it lacks security attributes when it comes to provenance procedures as it uses inherited security protocols for digital documents, digital media that are not intended for 3D objects.

Stuart Irvine

Wednesday 25 June 2014

Professor Stuart Irvine, Prifysgol Glyndŵr University

Further information to follow.

Pre- and Post-Award Research Finance

Wednesday 25 June 2014

Michele Dodd, Sarah Gillies, Phil Lidiard (Research Finance), Phil Walker (Physics), Adrian Hilton (CVSSP)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Pre- and Post-Award Research Finance on Wednesday 25th June in 40AA03, with lunch available from 12:45 and the seminar running from 13:00 to 14:00.

Physics Open Days June 2014

Friday 27 June 2014


The Department of Physics welcomes prospective undergraduate students and their families during the University wide Open Days on 27th and 28th June 2014.

CV Workshop & Surgery for PGRs

Tuesday 1 July 2014

11:00 to 13:00

All PGR students are invited to a CV workshop, followed by a ‘surgery’ with bookable 1:1 slots where you can have a personal CV review with an employer. The session is being run by Sally Williams from NPL and Keira Lawrence from BAE Systems Applied Intelligence, (formerly Detica).

UKSAF Summer Meeting

Wednesday 2 July 2014

09:00 to 16:30

Material, Fuel, and Power Train Selection for Low Carbon Vehicles

Wednesday 16 July 2014

13.00 hrs to 14.00 hrs
Roland Geyer, Associate Professor – Industrial Ecology, Green Supply Chain Management

Worldwide, efforts are increasing to reduce greenhouse gas (GHG) emissions from transportation in general and road vehicles in particular. The two technological avenues for road vehicles that arguably receive the most attention at the moment are alternative structural materials and alternative fuel-powertrain combinations.

Civil Engineering Research Seminar - July 2014

Thursday 17 July 2014

13:00 to 14:00
Miss Anju Goel

Acoustic source tracking in a room environment

Monday 21 July 2014

14:00 to 15:00
Dr Xionghu Zhong, Nanyang Technological University (Singapore)

2014 BYOB CubeSat Workshop

Friday 25 July 2014

Following on from the success of our 2013 event, Surrey Space Centre (SSC) and AMSAT-UK invite CubeSat developers to bring their equipment to a ‘Bring Your Own Board’ (BYOB) workshop. The aims are to demonstrate your latest CubeSat developments, to foster new partnerships and links within the UK and EU community, and encouraging more interaction with AMSAT-UK and the Colloquium (more info at:

New Trends in Quantum Integrability

Monday 18 August 2014

The Department of Mathematics is hosting the International Conference on New Trends in Quantum Integrability, co-organised by Sara Pasquetti, Vidas Regelskis and Alessandro Torrielli, to be held from 18-22 August 2014.  This conference aims to bring together researchers working on quantum groups, classical and quantum integrable systems, and applications of integrability in string and gauge theories.

Evolutionary Computation and Complex Networks

Tuesday 26 August 2014

11:00 to 12:00
Professor Jing Liu, Xidian University, Xi'an, China

Both evolutionary computation and complex networks have received considerable attention in recent years. Instead of introducing each field individually, this talk focuses on the research combining these two fields. In general, this talk includes two parts: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods; (2) how evolutionary computation methods are used to solve the problems in complex networks.

Civil Engineering Research Seminar - August 2014

Thursday 28 August 2014

13:00 to 14:00
Miss Leticia Llano Trueba

Möbius Transformations

Tuesday 2 September 2014

15:30 to 16:30
Yağmur Kaya, MSc Student, Balıkesir University, Turkey

In geometry and complex analysis, a Möbius transformation of the complex plane is a rational function with complex variable z and complex coefficients. These transformations preserve angles, map every straight line to a line or circle, and map every circle to a line or circle. They form a group called the Möbius group which is the projective linear group PGL(2,C). Möbius transformations are named after August Ferdinand Möbius, and are also known as linear fractional transformations, bilinear transformations, or fractional linear transformations. In this talk, we will discuss how such mathematical entity is very much embedded into the fabric of complex-valued Neural Networks.

Score-informed source separation

Wednesday 3 September 2014

15:00 to 16:00
Dr Sebastian Ewert, Queen Mary University of London

Evolutionary algorithm with direction search strategy for dynamic multi-objective optimization

Thursday 4 September 2014

15:30 to 16:30
Dr Yan Wu, Associate Professor, Xidian University, China

Many real-world multiobjective problems are dynamic, requiring an optimization algorithm which is able to continuously track moving pareto front over time. In this paper, we proposed direction search strategy(DSS) which includes two mechanisms to improve the performance of multiobjective optimization evolutionary algorithms in dynamic environment. The first mechanism reinitializes the population using coarse prediction and local search based on the moving direction of centroid of pareto solutions between two consecutive environments after a change. The second mechanism guides the search by introducing the "better" individuals to accelerate the convergence speed. The two mechanisms provide a good balance between exploration and convergence for dynamic multiobjective optimization evolutionary algorithms. We systematically compare DSS with two prediction strategies on a variety of test instances with predictable and sudden irregular change. The statistical results show that DSS is promising for dealing with dynamic environments.

Secure Data Integration Systems

Monday 8 September 2014

12:00 to 13:00
Fatmah Akeel, PhD Student, University of Southampton

With the web witnessing an immense shift towards publishing data, integrating data from diverse sources that have heterogeneous security and privacy levels and varying in trust become even more challenging. In a Data Integration System (DIS) that integrates confidential data in critical domains to contain a problem and make faster and reliable decisions, there is a need to integrate multiple data sources while maintaining the security levels and privacy requirements of each data source before and during the integration. However, such systems face a threat of data leakage that compromises data confidentiality and privacy. The literature found lacks the comprehensive perspective of considering security, privacy and trust together; therefore, we propose SecureDIS, a novel framework that aims to prevent data leakage in a DIS considering these aspects. It is comprised of six components that represent a conceptualized DIS architectural components which are: data and data sources, security policy, integration approach, integration location, data consumers and finally system security management. Each component contains a set of guidelines to be used by system analysts who build and design a DIS that handles critical confidential data.

Currently the framework and the guidelines are confirmed by 14 experts in the areas of data integration, security and software engineering. However, we are currently investigating approaches on applying the framework to validate its applicability in real use cases.

Human-robot interaction

Friday 12 September 2014

14:00 to 15:00
Dr Vita Beran, Brno University of Technology, Brno (Czech Republic)

How to Overcome the Forgetting Factor when applying Synaptic Plasticity and Unsupervised Learning in General

Thursday 18 September 2014

15:30 to 16:30
Joseph Chrol-Cannon, PhD Student, Department of Computing, University of Surrey

We aim to build networks that learn spatio-temporal patterns in time series data such as speech, weather and human motion recognition tasks. Synaptic plasticity is the main mechanism employed to reach this goal and it is inspired by how the brain works to achieve its great feats of learning.

However, a problem of catastrophic forgetting arises when the neural networks parameters are all updated according to synaptic plasticity mechanisms. After a short period of convergence, consecutive samples fed to the network will drive synaptic weight changes in directly opposing directions. This leads to an effective overwriting of memory as new samples are presented and means that the network learns an average of its input data, rather than specific features, and differences, of individual instances.

This short talk illustrates the problem through analysis of weight matrix adaptation and discusses the wider implications of the phenomenon in feed-forward networks, deep neural networks and the mechanisms of local learning that can provide a solution.

Inventing the Future: An Evening with Greg Foot

Tuesday 23 September 2014

18:00 to 19:30
Greg Foot

You are invited to the University for an evening to celebrate scientific creativity which has now become a reality. TV scientist Greg Foot will be interviewing four of the University’s scientists and engineers who have recently had their research projects become a reality.

Innovation in Action

Tuesday 23 September 2014

13:30 to 17:30

Exploitation of research - the successes and opportunities 

The University of Surrey, supported by their EPSRC funded Impact Acceleration Account, would like to welcome the technology, engineering and science community to see how research and innovation at the University can be, and has been, exploited for maximum benefit.

A brief introduction to College of Automation, Harbin Engineering University, China (first talk) / Ship Navigation: Fiber Optical Gyroscope, Inertial Navigation and Integrated Navigation Systems (second talk)

Wednesday 24 September 2014

14:30 to 16:00
Prof. Lin Zhao and Prof. Yuxin Zhao, Harbin Engineering University, China (first talk) / Prof. Yonggang Zhang, Harbin Engineering University, China (second talk)

Civil Engineering Research Seminar - September 2014

Thursday 25 September 2014

13:00 to 14:00
Mr Ojajuni Oluwatosin

Local Descriptors for Computer Vision Applications

Friday 26 September 2014

11:00 to 12:00
Dr. B H Shekar, Mangalore University (India)

Baxter Research Robot - A safe, affordable platform for academic and corporate labs

Monday 29 September 2014

11:00 to 12:00
Becky Yelling, Horatio Coles-Abell and Alan Braithewaite, Active Robots Limited

The most accurate measurement of temperature ever made

Wednesday 1 October 2014

Dr Michael de Podesta

Dr Michael de Podesta, Principal Research Scientist, National Physical Laboratory

WSMS October Talk

Tuesday 7 October 2014

Dr Suze Kundu (Imperial College)

SEPNet Careers Outside Academia for PhDs and Post Docs

Tuesday 14 October 2014

1:45 pm to 3:00 pm
Dr Kim Nilsson (Pivigo)

Talk on Data Science

Inspirational Physics

Wednesday 15 October 2014

12:45 to 16:00

This event is aimed at Year 12 students who have just started A-level Physics.


Wednesday 15 October 2014

13:00 to 14:00
Dee Summers, Senior Project Officer – Research, RES

You are invited to attend a session of the FEPS ‘e3i’ programme on the Researchfish research outcomes reporting system.

Why did I choose aviation and why Boeing?

Thursday 16 October 2014

18:00 to 19:45
Miguel Santos, Vice President - Africa, Boeing International and Director, International Sales - Africa, Boeing Commercial Airplanes


I was born into aviation, but it became a passion of mine in a variety of ways. My aviation background, the Univ of Washington combined with commitment, persevearence and hard work... gave me the two career opportunities of the past 36 years. I enjoy working for Boeing and I love what our products can do for our customers and their customers. I hope you will embrace our industry. It needs your talent and creativeness to continue to lead in technological advancements.    

Civil Engineering Research Seminar - October 2014

Tuesday 21 October 2014

13:00 to 14:00
Mr Ali Behnejad

SEPNet Careers Talk

Tuesday 21 October 2014

1:00 pm to 2:00 pm

First steps to an amazing career!

Celebrating Alumni Success 2014

Wednesday 22 October 2014

18:30 to 19:30
Steve Harridge, BSc Civil Engineering Surrey graduate, 1973

Former Executive Director & Partner at Tony Gee and Partners LLP, Steve Harridge, will give an insight into
some of the major international construction projects he has led on during his extensive career. 

Improving Spectral Efficiency of Half-Duplex Decode-and-Forward Relay

Friday 24 October 2014

15:00 to 16:00
Chuyi Qian, Research Fellow, Department of Computing, University of Surrey

A fundamental research problem of cooperative half-duplex relaying network is to find its capacity as well as a practical approach in order to achieve the capacity. For a degraded channel with multiple parallel relays, it has been known that the achievable rate and a capacity upper bound can be derived using the max-flow min-cut theorem. However, the capacity of the relay channel for general case remains unknown. In this talk, I will describe some of the technological challenges that cooperative relaying is facing, and introduce some of the possible solutions. The relaying strategies pushing the performance towards the capacity will be discussed. In particular, we look at link adaptation and spectrum sharing techniques, and discuss the potential performance improvement.

The 21st Joint Annual Conference of CSCST-SCI

Saturday 25 October 2014

08:00 to 18:00

To register, please visit

Cloud Storage in the Bitcoin Era

Monday 27 October 2014

10:30 to 11:30
Dr Giuseppe Ateniese, Sapienza – University of Rome, Italy

Cloud computing is revolutionizing the entire field of information technology but it also prompts new security and privacy challenges. Several cryptographic techniques have been devised that allow users to verify that cloud providers are storing their entire databases intact, even portions that are rarely accessed. Such proof-of-storage schemes (PDP/POR) have witnessed remarkable improvements over the years but leave unsettled several risk management issues. Arguably, the most important open question of all is: What happens if a proof-of-storage scheme fails, indicating that a client¡¦s outsourced database has been damaged?

Clearly, the cloud is liable for this damage, and the client should be compensated for her loss. But the client no longer stores her database locally and may not be able to assess the damage incurred. In addition, she will be forced to follow cumbersome legal procedures, specified in a service level agreement (SLA), in order to be compensated for her loss.

In this talk, we will cover a new framework that is part of joint works with Michael Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas and Roberto Tamassia. In this framework, users are compensated for data loss even when the cloud provider does not cooperate and without involving any trusted authorities. As a first attempt, we show that it is possible to automatically compensate users with Bitcoins if the cloud provider misbehaves. The compensation will be inescapable and proportional to the level of data loss or manipulation incurred.

The Annual Roland Clift Lecture Series on Industrial Ecology

Wednesday 29 October 2014

19:00 to 20:30
Professor David Fisk, Imperial College London

Data Forensic Techniques Using Benford's Law and Zipf's Law for Keystroke Dynamics

Friday 7 November 2014

15:00 to 16:00
Aamo Iorliam, PhD Student, Department of Computing, University of Surrey

The selection and application of biometrics traits for authentication and identification have recently attracted a significant amount of research interest. In this paper we investigate the use of keystroke data to distinguish between humans using keystroke biometric systems and non-humans for auditing application. Recently, Benford’s Law and Zipf’s Law, which are both discrete Power law probability distributions, have been effectively used to detect fraud and discriminate between genuine data and fake/tampered data.

As such, our motivation is to apply the Benford’s Law and Zipf’s Law on keystroke data and to determine whether they follow these laws and discriminate between humans using keystroke biometric systems from non-humans. From the results, we observe that, the latency values of the keystroke data from humans actually follow the Benford’s law and Zipf’s law, but not the duration values. This implies that, latency values from humans would follow the two laws, whereas the latency values from non-humans would deviate from the Benford’s law and Zipf’s law.

Even though, the duration values from humans deviates from the Benford’s law, they do follow a pattern that we can develop an accurate model for the duration values. We perform experiments using the benchmark data set developed by Killourhy and Maxion and obtain divergences of 0.0008, 0.029 and 0.05 for the keyup-keydown (Latency), keydown-keydown, and duration of the keystroke data, respectively. Moreover, P-value’s of 0.7770, 0.6230 and 0.0160 are obtained for the keyup-keydown (Latency), keydown-keydown, and duration of the keystroke data, respectively.
We observe that the latency (which is the time elapsed between release of the first key and pressing down of the next key) is one of the most important features used by administrators for auditing purposes to detect anomalies during their employees logging into their company system.

WSMS November Talk

Tuesday 11 November 2014

Professor Richard Murphy

Mastering Online Applications

Tuesday 11 November 2014

John Lillington, Chief Technologist (Nuclear) from AMEC

Online competency-based applications are used by employers of all sizes, not just large corporates. 

SEPNet Student Expo

Wednesday 12 November 2014

10:00 am to 04:00 pm

We would be delighted if you would attend our forthcoming SEPnet Students’ Expo. 

The International Day of Medical Physics: Advances in Cancer Therapy

Wednesday 12 November 2014

16:30 to 19:30


The University of Surrey, in collaboration with the National Physical Laboratory, is organising an inaugural event to mark the International Day of Medical Physics (IDMP, The IDMP recognises the birthday of Marie Curie with world-wide events in medical physics. This is part of a new initiative by the International Organization for Medical Physics to raise awareness of the role of medical physicists.

The increased usage of cutting edge technologies in the UK’s healthcare has proven to be a successful strategy in increasing the public’s quality of life. It is therefore extremely important to ensure that both the public and the clinical staff are aware of these new rapidly-developing treatment technologies. Medical physics is one of the fast growing fields of impact-driven science where new technologies are making a real difference to the lives of our citizens.

The event at Surrey will be one of its first kinds in the UK to gather public, medical physicist, researchers and students from around the UK to mark the International Day of Medical Physics. It will provide a platform for high profile speakers on the topic of cancer therapy, drawn from Clinical, Academia and Industry. The event has support from the Royal Surrey County Hospital and Institute of Physics and Engineering in Medicine who are the leading organisations in the field of Cancer Therapy, plus major industrial companies at the forefront of medical physics technology. Find out more about the companies participating in the exhibition (some to be confirmed) (PDF, 320KB).

Our evening program will feature key note speakers, leading into a panel discussion focused around UK’s healthcare and utilization of technologies and the impact of associated medical research. The event will also include an award presentation to Prof Nicholas Spyrou (Surrey’s Emeritus Professor of Medical Physics) for his lifelong commitment to the fields of Medical Physics and Nuclear Physics.

Find out more about the keynote speakers and panelists at the event (PDF, 335 KB).

The Confirmation Process: A Supervisor and Examiner’s Update

Wednesday 12 November 2014

13:00 to 14:00
Dawn Duke (Researcher Development)

You are invited to attend a session of the FEPS ‘e3i’ programme on the PhD Confirmation Process, designed for academics involved in supervising and examining PhD students.

Workshop: Introduction to Bid Writing

Thursday 13 November 2014

12:45 to 16:30
Karen Kirkby (FEPS), Alison Ray (RES), Carol Spencely (Researcher Development)

You are invited to attend a workshop in the FEPS ‘e3i’ programme which will provide an introduction to writing successful research bids, with the emphasis on EPSRC applications.

Civil Engineering Research Seminar - November 2014

Thursday 13 November 2014

13:00 to 14:00
Mr Hadi Gorouhi

Marshall of Cambridge, Past, Present and Future

Tuesday 18 November 2014

19:30 to 21:30
Terry Holloway, Marshall Group Support Executive

ECMA-407 – The World's First 3D Audio Standard

Tuesday 18 November 2014

15:30 to 16:30
Dr Junaid Jameel Ahmad, Scientific Research Engineer, SCI-STI-MM Laboratory, School of Electrical Engineering, École polytechnique fédérale de Lausanne (EPFL), Switzerland

The ECMA International have recently standardized "ECMA-407" as the first 3D audio standard worldwide titled "Scalable Sparse Spatial Sound System (S5) – Base S5 Coding". The ECMA-407 standard layouts a general framework for 3D audio spatial coding, which is based on the key components of signal-analysis assisted spatial downmix, inverse-coding (VoidCode®) assisted spatial upmix from the downmix, base audio codec, and very little side information. ECMA-407 is compliant with both waveform preserving base audio codecs as well as non-waveform preserving audio codecs such as USAC and HE-AAC v2.

An ECMA-407 complaint technology solution is also currently being submitted and evaluated in the core-experiment process for MPEG’s "Phase 2" technologies (aiming to provide low-bitrate 3D coding technologies). This technology solution supports a wide of 3D loudspeaker configurations (ranging from 5.1 upto NHK 22.2) and provides excellent psychoacoustic quality at various bitrates (as low as 48kbps). This technology solution can be equally applied for 3D spatial coding of any audio content involving channels, channels and objects and Higher Order Ambisonics (HOA).

Swarming models with attractive-repulsive effects

Thursday 20 November 2014

13:30 to 14:30
Prof J.A. Carillo, Department of Mathematics, Imperial College London

The speaker will discuss some models for the collective behavior of animals and self-organization. He will concentrate in showing some structural stability of patterns. He will also discuss some hydrodynamic models and their simulation patterns.

User aspects of stereoscopic 3D video interaction

Friday 21 November 2014

15:00 to 16:00
Dr Haiyue (Andy) Yuan, Research Fellow, Department of Computing, University of Surrey

The recent development of stereoscopic three dimensional (3D) display technologies has resulted in a proliferation of 3D video production and broadcasting, attracting a lot of research into capture, compression and delivery of stereoscopic content. However, little research has been dedicated to design practices of meaningful user interaction with stereoscopic 3D video content. Having this in mind, this thesis presents a series of studies in Human Computer Interaction (HCI) that analyse user aspects of stereoscopic 3D video interaction, propose technical solutions and give design guidelines for intuitive interaction with the stereoscopic 3D video content. Three main user studies have been conducted to look into this research topic. The user requirement analysis in terms of interactive functionalities and interaction modality requirements showed strong demand for object selection task in 3D video interaction, that resulted in a follow-up study of user preferences in 3D selection using virtual-pointer and ray-casting metaphors.

In addition, the immersive experience of stereoscopic 3D displays to the audience is caused by artificially stimulating binocular stereopsis in the human visual system. The binocular disparity between the left and right view is the key factor in creating the convincing impression of depth, distinguishing the stereoscopic 3D video from other types of video paradigms. Taking into consideration the imperfections of current disparity estimation algorithm, this thesis finally presents a study into the impact of disparity error on users’ perception of depth and its implications to interaction tasks in 3D stereoscopic systems.

A further investigation of pointing modalities in the context of stereoscopic 3D television (TV) was conducted, adopting the ISO 9241-9 standard for multi-directional tapping task and the Fitts’ law model. This experimental study compared and evaluated three pointing modalities: standard mouse-based interaction, virtual laser pointer implemented using Wiimote, and hand movement modality using Kinect. The results suggest that the virtual laser pointer modality is more advantageous than other modalities in terms of user performance and user comfort.

Life Cycle Thinking: assessing the footprints of products, companies and lifestyles

Monday 24 November 2014

Please note that this workshop is aimed at PhD students.

Although most people are aware that their actions have direct environmental, social and economic impacts, they are generally less are aware of the impacts that they cause indirectly. For example, driving a car or a lorry causes environmental impacts through carbon dioxide emissions from burning fuel, social impacts through jobs in the petrol station and economic profit for the petrol company.  However, there are also impacts all the way along the value chain, including, for example, the emissions due to oil extraction, the conditions of the workers who carry out the extraction, and the profits of the manufacturers who make the oil extraction equipment.

Non-Rigid Alignment of 3D Motion Sequences

Wednesday 26 November 2014

11:00 to 12:00
Dr Stefanie Wuhrer, Saarland University and MPI Informatik (Germany)

Wearable Algorithms != Electronics & Algorithms. Lessons from Wearable EEG

Thursday 27 November 2014

15:30 to 16:30
Dr Alex Casson (Lecturer), Sensing, Imaging and Signal Processing Group, School of Electrical and Electronic Engineering, University of Manchester

Wearable sensors are quickly emerging as next generation devices for the ubiquitous monitoring of the human body. The potential benefits of including low power, local signal processing are well accepted: the system battery life can be increased by compressing data so there is less to transmit or store; closed-loop, recording-stimulation, devices can be created without the latency associated with requiring a wireless link; and the device functionality can be increased by allowing alarms to be generated automatically, and similar. The challenge, of course, is in realising reliable, robust, and trustworthy algorithms which can operate within the very limited power budgets available. “Wearable algorithms” is the name given to the signal processing approaches, combined with dedicated hardware implementations, which are attempting to do meet this challenge.

In this talk I will overview developments in algorithms and circuits for very low power wearable sensor nodes. Using wearable EEG monitoring as an example I will explore circuits for real-time time-frequency transformations, and use this to highlight that wearable algorithms are not a simple combination of an algorithm and a low power circuit. As one illustration: traditional circuit design would always endeavour to minimise the effective noise present in a system, often by trading-off with increased power consumption. However noise-enhanced algorithms are a branch of signal processing theory where algorithm performance is not only robust in the presence of noise, but up to a certain point it actually gets better as more noise is introduced. By combining the two, the fact that a sensor node has an algorithm embedded in it opens up substantial new design avenues and opportunities for power optimisation: having noisey-er input amplifiers in the example given here. I will look at this and other potential techniques.

Civil Engineering Research Seminar - 28th November 2014

Friday 28 November 2014

13:00 to 14:00
Dr Theodore Karavasilis

Site Visit to CCFE (Culham Centre for Fusion Energy)

Wednesday 3 December 2014

CCFE ( is the UK's national laboratory for fusion research and is owned and operated by the UKAEA.

The Sound of Bubbles (from the IET)

Wednesday 3 December 2014

Gianluca Memoli, National Physical Laboratory

Did you know bubbles are everywhere? And that they all make different sounds!

Research Data Management

Wednesday 3 December 2014

13:00 to 14:00
Adam Kirby (FEPS IT Manager), Fiona Greig (Library, Head of e-Strategy and Resources)

Many research funders now require researchers to manage data in an organised way and to share it appropriately, with future funding dependent on institutional compliance with open data policies.  From May 2015, this will also become an expectation for EPSRC-funded research.

Is the Milky Way Special

Thursday 4 December 2014

Professor Chris Linott (University of Oxford)

Guildford Astronomical Society presents

Semi-fragile Watermarking for Image Content Authentication and Self-restoration

Tuesday 9 December 2014

15:00 to 16:00
Miss Hui Wang, PhD Student, Department of Computing, University of Surrey

With the popularity and affordability of advanced digital image editing software, users can manipulate images relatively easily and professionally. As a result, the task of guaranteeing the authenticity of digital images, particularly as evidence in the court of law, is becoming more important. In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and to localize the tampered areas, while simultaneously tolerating some non-malicious manipulations. Moreover, some researchers have proposed self-restoration schemes such that the content of tampered areas can be recovered after the authentication process. In this thesis, we introduce three semi-fragile watermarking schemes for image content authentication and self-restoration based on a fast self-restoration, a perceptual image hashing, and an image restoration method using SSI. Moreover, we propose a general-purpose digital watermarking benchmarking framework with high reconfigurability which is also configured to evaluate the performance of our proposed semi-fragile watermarking systems.

3MT (Three Minute Thesis)

Tuesday 9 December 2014


Fancy hearing an 80,000 word thesis explained in less than 180 seconds? 

Research students from across the globe are doing just that in preparation for the Three Minute Thesis Competition (3MT®).

WSMS December Talk

Tuesday 9 December 2014

18:00 to 20:00

Improving the performance against real-life factors of EMG controlled upper-limb prostheses for transradial amputees

Wednesday 10 December 2014

15:00 to 16:00
Dr Javier Escudero, University of Edinburgh

There are many disabled people who have lost limbs. In the UK alone, more than 300 people suffer from different levels of upper limb amputation every single year. Most of these people are yet to be provided with prosthetic devices able to meet the challenges they face in their daily life. Advanced commercial devices are limited in their control strategies. The recognition of patterns in surface electromyogram (sEMG) signals is a promising alternative to achieve a more dexterous control of hand prostheses. We will describe a recent method for the classification of finger movements based on the analysis of sEMG signals and explore how to minimise the number of sEMG channels needed to achieve a high-performance classification. Then, we will evaluate how variations in the force level of the muscle contractions affect the classification performance. Finally, we propose a novel set of features that aim at reducing the impact of force level variations on the prosthesis. These features are computed directly in the time domain and are related to descriptors of the spectral moments of the sEMG.

This talk presents the results of previous and recent research in the latter area.

Civil Engineering Research Seminar - December 2014

Thursday 11 December 2014

13:00 to 14:00
Mr Hristo Dikanski


Thursday 8 January 2015

13:00 to 14:00
Dr Steve Waygood - Chief Responsible Investment Officer, Aviva Investors
Steve will outline how the capital markets currently work, why they undermine sustainable development, why it is in our financial interests that this changes, and how the markets could be changed so that they capitalise a green economy. For further information please click here.

Detection of Video-based Spoof Attacks Using Visual Dynamics

Tuesday 13 January 2015

15:00 to 16:00
Mr Santosh Tirunagari, PhD Student, Department of Computing, University of Surrey

Rendering a face recognition system robust is vital in order to safeguard it against spoof attacks carried out by using printed pictures of a victim (also known as print attack) or a replayed video of the person (replay attack). A key property in distinguishing a live, genuine video from print or reply attacks is by exploiting the information dynamics of the video content, such as blinking eyes and talking mouth. We advance the state of the art in facial anti-spoofing by introducing a system architecture that is composed of Dynamic Mode Decomposition (DMD), Local Binary Patterns (LBP), and Support Vector Machines (SVM) with a histogram intersection kernel. Fundamental to the success of our proposal is the use of DMD in representing the temporal information as an image of the same dimension as that of each and every image contained in a video. In comparison, conventional methods treat the video as a set or sequence of images. The pipeline of DMD-LBP-SVM proves to be efficient, convenient to use, and effective. The efficiency is achieved by introducing a faster data-driven means of matrix factorisation for DMD. In fact only the spatial configuration for LBP needs to be tuned. Finally, the effectiveness of the methodology was demonstrated using two publicly available databases, achieving the best results so far on the unseen tests, following the published experimental protocols.

Civil Engineering Research Seminar - January 2015

Thursday 15 January 2015

13:00 to 14:00
Mr Mehdi Rouholamin

Statistical-relational- and key-graphs for detection, segmentation and recognition

Monday 19 January 2015

14:00 to 15:00
Professor Roberto M. Cesar Jr., University of São Paulo (Brazil)

WSMS January Talk

Tuesday 20 January 2015

18:45 to 20:00

Mobile Privacy Leakage Detection and Prevention for Android Devices

Friday 23 January 2015

15:00 to 16:00
Mr Saeed Ibrahim Saeed Alqahtani, PhD Student, Department of Computing, University of Surrey

Android has been the most popular operating system (OS) for mobile devices such as smartphones and tablets, and starts entering other areas such as smart home (Android TV) and automobiles (Android Auto). A large number of mobile apps have been developed for Android and more are being introduced to the official Android App market (Google Play) and other third-party markets. Due to the openness of Android OS, it is actually also possible to download a mobile app directly from a developer's website. While most mobile apps are useful, it has been found that many mobile apps leak sensitive information to third parties without the user's consent. That occurs in some cases due to a careless programming error and in some other cases embedded maliciously. As a consequence, nowadays commercial companies and attackers can collect private information about a large number of users for many different purposes. To better protect users or at least inform users about such privacy leakage, a lot of efforts have been made by the research community to provide better methods and tools.

In this talk I will present my PhD study around mobile privacy leakage detection and prevention, highlighting some possible improvements that I am currently working on. I will also present my work in progress regarding a benchmarking environment for testing privacy protection tools on Android platform.

Computing Employability Day

Tuesday 3 February 2015

10:00 to 15:00

In the last NSS, students asked for more help with "boosting communication skills", "presenting yourself with self-confidence" and "trackling unfamiliar problems". To this end, the Department would like to invite all students to the Department's Computing Career Day!

Department of Physics PhD Fair

Thursday 5 February 2015


Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it?

Friday 20 February 2015

10:00 to 12:00
Prof Adrian Waller, Thales UK Research and Technology

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Winton Capital: Applying science to finance

Tuesday 24 February 2015


All welcome.

Output Diversity as a Test Selection Criterion

Wednesday 25 February 2015

12:00 to 13:00
Dr Nadia Alshahwan, Research Associate, University College London (UCL)

The uniqueness (or otherwise) of test outputs ought to have a bearing on test effectiveness, yet it has not previously been studied. We investigate the whitebox coverage and fault detection achieved by Output Uniqueness, a newly proposed blackbox test criterion, using 6 web applications. We find that output uniqueness exhibits average correlation coefficients of 0.85, 0.83 and 0.97 with statement, branch and path coverage respectively. More interestingly, output uniqueness finds 92% of the real faults found by branch coverage (and a further 47% that remained undetected by such whitebox techniques). These results suggest that output uniqueness may provide a useful surrogate when whitebox techniques are inapplicable and an effective complement where they are.

Cyber crime: What is happening and why?

Friday 27 February 2015

10:00 to 12:00
Mike StJohn-Green, Independent Consultant in Cyber Security

Why is cyber security so difficult? Why can’t the IT team just make our systems secure? Why doesn’t the government protect us from cyber crime? What is the role of international standards like ISO-27001? Mike StJohn-Green will demystify a topic that is too often shrouded in secrecy, obscured by abbreviations and characterised by ‘Fear, Uncertainty and Doubt’. For example, what is the real significance of stories like Shellshock and Heartbleed? What are the trends we should be anticipating over the next few years? Hear Mike tackle these questions, put your own questions, and find out what you should be doing about this topical and increasingly important issue.

Ways of erecting steel bridges

Monday 2 March 2015

13:00 to 14:00
Steve Harridge

Short lunchtime seminar presented Steve Harridge.

Object detection with the Ensemble of Exemplar-SVMs: contextual guidance and optimal calibration

Wednesday 4 March 2015

11:00 to 12:00
Dr Vittorio Ferrari, University of Edinburgh

The Influence of Astronomy on Life in Ancient Times

Thursday 5 March 2015

Emeritus Professor David W. Hughes

Guildford Astronomical Society presents...

Quality as a Prerequisite for Security in Interoperable Systems

Friday 6 March 2015

10:00 to 12:00
Peter Davies, Thales e-Security Ltd

We are all facing enormous challenges, now and into the future, in the way that assurance of ICT products and systems is provided and there is a pressing need to review the thinking about assurance. I will argue that we only truly understand the ‘security’ of an interoperable system when we understand the ‘quality’ level to which that system has been implemented.  I will further argue that a laxity in our linguistic definitions means that we increasingly do not understand what is meant when we are discussing the security.

Civil Engineering Research Seminar - March 2015

Monday 9 March 2015

13:00 to 14:00
Professor Chris Frey

Managing short-term and long-term risks

Monday 9 March 2015

12:00 to 12:50
R. Kerry Rowe P.Eng Professor and Canada Research Chair in Geotechnical and Geoenvironmental Engineering Dept. of Civil Engineering, Queen’s University at Kingston, ON, Canada

Privacy-Conscious Information Sharing in Online Social Media Sites

Wednesday 11 March 2015

11:00 to 12:00
Dr Anna Squiccianrini, Assistant Professor, Pennsylvania State University, US

In this seminar, I will present my recent work in Access Control and Privacy issues for Social Network sites.

I will discuss security implications related to disclosure of inappropriate data across Social Networks, and use as a case study the problem of digital images distribution and misuse. Two specific issues will be discussed: first, how to assess co-ownership, if multiple users appear to be stakeholders of the same image. Second, we will look into the problem of image control within and across social network sites. I will discuss our approach to these issues, which draw from game theory and algorithmic results. I will provide an overview of the deployed prototype and provide some interesting insights obtained from performance and user studies. Our studies provided us with interesting findings, in terms of users’ perception of privacy and protection from security threats. I will conclude with highlighting interesting issues that represent open problems and with insights on  new lines of research for this work.

Automatic Mitosis Detection Using Breast Cancer Histopathology Slide Image: Challenges and Solutions

Wednesday 11 March 2015

11:00 to 12:00
Mr Ashkan Tashk, Shiraz University of Technology, Iran

Pivigo: managing your online presence and CV reviews

Thursday 12 March 2015


Postgraduates only.

Flexible Neural Tree as an Effective Tool for the Function Approximation and Feature Selection

Thursday 12 March 2015

15:30 to 16:30
Varun Kumar Ojha, PhD Student, VSB-Technical University of Ostrava, The Czech Republic

IPROCOM is a multidisciplinary and inter-sectoral consortium funded by European Commission under the FP7-PEOPLE-2012-ITN Programme. Our objective is to apply computational intelligence tools for managing the data generated in the consortium, which deals with the powder technology and pharmaceuticals. Mainly, the function approximation and feature selection will play role in managing the data obtained. We have developed a Flexible Neural Tree software that will address both the said tasks. Flexible Neural Tree (FNT) resembles a multi-layer feed-forward neural network model that is evolved using an evolutionary procedure. The key features that FNT provides are the adaptation of an optimal network structure and the adaptive selection of the input feature for a given problem/dataset. The effectiveness in the performance of the Flexible neural tree in many applications motivate us to carry-out our research for the improvement of the existing model.

The Business of Security-Protecting the Crown Jewels

Friday 13 March 2015

10:00 to 12:00
Steven O’Sullivan and Professor Steve Legg, IBM

In this lecture Steven will discuss the "business of security" and how organisations view security, security drivers e.g. compliance, cloud , and will delve into the most common issues (and barriers) that lead to organisations being vulnerable to security incidents and attacks.

This will be rounded off with how IBM positions security for its clients (protecting the crown jewels) , scope of solutions, how we work with clients, and where it is placing its bets in security for the next few years.

Open Days: Diamon Light Source

Saturday 14 March 2015

Email to register your interest.

Ways of building concrete bridges - erection gantries, travellers, launching

Monday 16 March 2015

13:00 to 14:00
Mr Steve Harridge (Tony Gee and Partners)

This is a fantastic opportunity to understand better "constructability" in design. This will be a helpful first guide to the topic and ideal opportunity for both staff and students (all levels).

Toptica Photonics

Tuesday 17 March 2015


All welcome.

The Fall and Rise of Manufacturing

Tuesday 17 March 2015

19.30 to 21.30
Philip Spiers, Head of Advanced Structural Test Centre, AMRC

Hosted by the Royal Aeronautical Society and the Institute of Mechanical Engineers, Farnborough and Guildford area. 


Since its earliest days the University of Sheffield has been a world leader in metallurgy and engineering research, working closely with local industry to develop new manufacturing techniques and technologies. The AMRC was established in 2001 as a collaboration between the University and Boeing Aerospace, with the aim of applying its traditional expertise to new materials, focusing particularly on machining research. The center grew rapidly and moved into a purpose-built facility in 2008, with the opening of the Rolls-Royce Factory of the Future. It works in close collaboration with industrial partners to meet new technology needs, piloting innovative processes to bridge the gap between scientific research and mainstream production.

This lecture will look briefly at the history of the AMRC, before discussing the research currently being pursued there. Major projects include machine dynamics, composite materials production and product design and validation, including the exploitation of 3D printing. Among the examples described will be a small Unmanned Air Vehicle, produced using 3D printing, which has been built and flown by the AMRC. The importance of such work to manufacturing, the technological challenges involved and the impact it has already had on industry will be highlighted.

Astro Evening: Eclipse

Wednesday 18 March 2015

18.30 to 19.45

After the success of our first ‘Astro Evening’ here at the University of Surrey, we invite you to join us for our next event.

The Astrophysics Group will be holding an outdoor lecture at the telescope location followed by a live presentation of the night sky with our new learning and outreach telescope. Members of our Astrophysics group will be also be on hand during the evening to answer your questions.

As a solar eclipse will take place in the UK a few days later, we theme this month’s event on the ‘Eclipse’.

Infrastructure Sustainability and Low Carbon Design

Wednesday 18 March 2015

14:00 to 15:30
Keith Clarke CBE

Infrastructure is always too early, too late, too much and too little.  Nobody wants to pay for it even though it remains essential to not only the economic but social integrity of society.  This has always been true since the Industrial Revolution but it now becomes doubly important given the absolute necessity to transition to a low carbon society and the way we now define and evolve our infrastructure to undergo the greatest revolution since we learned how to dig canals.

CES Seminar - Success in Chinese Urban Food Waste Recycling

Thursday 19 March 2015

12:00 to 13:00
Professor Marie Harder - China National Thousand Talents Professor, Fudan University, Shanghai and Professor of Sustainable Waste Management, University of Brighton

Marie will show how the viewpoints of different stakeholders, as to why behaviour change occurred, can be simply analysed with respect to a common framework to pin down which determinants were key to some very successful, durable, urban food waste sorting/recycling schemes in dense urban areas of Shanghai.  The framework consists of twelve domains pooled from many theories (cf Michie) and operationalised for this context.  Because of its ease of use by practitioners and transferability, it will be developed into a handbook for general use.

Watch the Eclipse at Surrey

Friday 20 March 2015

0900 to 1030

March 20th 2015 will be the last total eclipse visible in Europe until 2026! Although here in Surrey we will only see a partial eclipse, it is still a great opportunity to learn about eclipses, take part in some experiments and observe the Sun using our solar telescopes. 

There will also be the chance to take part in a collaborative climate measuring activity in partnership with the University of Reading.

Please note this event is only open to schools. 

Identity is the New Money

Friday 20 March 2015

10:00 to 12:00
Dave Birch, Global Ambassador, Consult Hyperion

David Birch from Consult Hyperion will give a talk based on his forthcoming book “Identity is the New Money” explaining Bitcoins and the stone currency of island of Yap, the reason why social networks will replace cash and the case for a National Entitlement Scheme. In 2013, Wired magazine named him one of their global top 15 favourite sources of finance and business information and he was ranked Europe’s most influential commentator on emerging payments by Total Payments magazine so you’d be mad to miss out.

This seminar is going to describe where the future of the security is and where it is not.   It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research,  It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators.  It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.  

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

Tuesday 24 March 2015

11:30 to 12:30
Dr Emmanuela Orsini, Research Associate, University of Bristol

Gentry's bootstrapping technique is still the only known method of obtaining fully homomorphic encryption. We describe a method to bootstrap a packed BGV ciphertext which does not depend (as much) on any special properties of the plaintext and ciphertext moduli. This enables our method to be applied in a larger number of situations. Also unlike previous methods our depth grows only as $O(\log p + \log \log q)$ as opposed to the $\log q$ of previous methods. Our basic bootstrapping technique makes use of a representation of the group $\Z_q^+$ over the finite field $\F_p$ (either based on polynomials or elliptic curves), followed by polynomial interpolation of the reduction mod $p$ map over the coefficients of the algebraic group. This technique is then extended to the full BGV packed ciphertext space, using a method whose depth depends only logarithmically on the number of packed elements.

(This is joint work with Joop van de Pol and Nigel Smart.)

Careers in the space industry

Wednesday 25 March 2015


All welcome.

Spectrogram factorization methods for music and audio signal analysis

Wednesday 25 March 2015

15:00 to 16:00
Dr Emmanouil Benetos, Department of Computer Science, City University London

Simple temporary works

Wednesday 25 March 2015

13:00 to 14:00
Steve Harridge

Short lunchtime seminar presented Steve Harridge.

Phase-contrast x-ray imaging for life and materials science

Thursday 26 March 2015

2:00 pm
Dr Irene Zanette, Diamond Light Source

Conventional absorption-contrast x-ray imaging is a well-established tool in medical diagnosis, security screening, and industrial testing among others. However, features with tiny density differences, such as different types of biological soft tissues, or very small details such as cracks, are often not revealed with absorption contrast.

Front Line Digital Forensics in the Police

Thursday 26 March 2015

10:00 to 12:00
Colin Smith, Digital Forensics Team, Surrey Police

This 2-hour long talk is part of the COMM046 module on Multimedia Security and Digital Forensics (which is part of the Department's MSc in Information Security programme). The speaker will describe how front line digital forensics is conducted at Surrey Police's Digital Forensics Team. ACPO best practice guides and four principles will be covered as the background. The digital forensics software tool EnCase Forensics will be used to demonstrate the whole digital forensics process including hard drive imaging, loading an image into EnCase, navigating through the loaded data, searching/eliminating data using keywords, filters and hash values, and data carving. Link files, history records, backups of mobile devices, user information, and information about USB devices will also be covered. The talk will be completed with a discussion on reporting and presentation at a court of law.

Building Integrated Cyber Defences

Friday 27 March 2015

10:00 to 12:00
Bryan Lillie, Chief Technical Officer, Cyber Security for QinetiQ

Computer Network Defence is a fascinating and ever changing subject. Having worked with some of the best, and worst, organised network defences in the UK, I propose to show you how to consider your Cyber Defences as a whole, not focussing on a single aspect, and how to plan to build a capability from scratch in a methodical way, encompassing hardware, software, and the people who will operate it, and how the system becomes stronger than the sum of its parts.

The Sky at Night

Friday 27 March 2015

6:30 pm to Late (subject to cloud cover)

Guildford Astronomical Society presents The Sky at Night

New approaches to the min-cost flow problem

Wednesday 1 April 2015

14:00 to 15:00
Dr Andreas Karrenbauer, Senior Researcher, Max Planck Institute for Informatics in Saarbuecken, Germany

Min-cost flows belong to one of the most important combinatorial optimization problems and have applications in image processing, among many other areas. In the past years, interior point methods for network flow problems have become popular and led to a series of improvements in terms of worst-case running time guarantees. These methods are rather involved numerical algorithms using combinatorial pre-conditioners for solving systems of linear equations. We present a simpler variant of a potential reduction interior point method for the min-cost flow problem that sheds more light on combinatorial aspects of the whole approach. We first construct an equivalent auxiliary network and initial interior primal and dual points, i.e., flows, node potentials, and reduced costs.

By augmenting flows along cycles or adjusting the reduced costs along the arcs over cuts, we transform the initial primal and dual interior points to ones with a duality gap less than 1. These updates are computed by solving an electrical flow problem with a resistor and a voltage source on each edge. Finally, we present a crossover procedure that computes optimal integral node potentials in O(m+n log n) time. This is joint work with Ruben Becker.

A Hierarchical Approach for Regular Centroidal Voronoi Tessellations

Tuesday 14 April 2015

11:00 to 12:00
Dr Franck Hétroy-Wheeler, Grenoble Institute of Technology/Laboratoire Jean Kuntzmann/INRIA (France)

Connecting Industry and Researchers in Physics

Thursday 16 April 2015

5pm to 8pm

A SEPnet Networking Evening

Doing Science

Friday 17 April 2015

Professor Sir Paul Nurse

Guildford Astronomical Society presents...

4th International Tyre Colloquium: Tyre Models for Vehicle Dynamics Analysis

Monday 20 April 2015

The International Tyre Colloquium has a successful history in discussing the latest progress in the understanding and simulation of tyre-road-vehicle interactions.

Research Data Management in Practice

Monday 27 April 2015

13:00 to 14:00
Adam Kirby (FEPS IT Manager), Fiona Greig (Library, Head of e-Strategy and Resources)

Political Realities and Role of Government in Infrastructure

Wednesday 29 April 2015

14:00 to 15:30

Abstract: Across the world there has been a trend to the privatisation of infrastructure over the last 30 years. However public expectation of quantity, quality and price has remained strong with Government as the target for their demands. At the same time the ability of Government to ignore those who oppose infrastructure development has become more difficult as they have become louder and more sophisticated in their opposition.  It has therefore been impossible for Governments to extract themselves from responsibility either directly or indirectly. The result is a complex mixture of policy, regulation, private capital, Government subsidy and guarantees, private and public operators. Sir John Armitt will address these challenges from his background and experience as a supplier, client, asset owner and advisor to Government.

This talk is held as part of our new MSc Programme in Infrastructure Engineering and Management which is aimed at providing graduate engineers in-depth knowledge about specialised aspects about the planning, operation and management of infrastructure systems.

Changing the Paradigm for Amputees

Tuesday 5 May 2015

18.00 to 19.30
Professor Gordon Blunn, Professor or Bioengineering - Director of the Institute of Orthopaedics, University College London, President of the British Othopaedic Society, Royal National Orthopaedic Hospital.


Work at the Institute of Orthopaedics and The Royal National Orthopaedic Hospital has led to the development of Transcutaneous Amputation Prostheses. These implants securely attach the external prosthesis to the skeleton. The key to this invention is a soft tissue skin seal, which prevents bacterial infection. The development of these implants has involved computer modelling, nanotechnology and implant design. The control, however, of these prostheses is limited and we are currently investigating novel electrodes to avoid some of the problems currently experienced.

Workshop: Introduction to Bid Writing

Thursday 7 May 2015

09:45 to 13:00
Alison Ray (RES), Carol Spencely and Alison Yeung (Researcher Development), Steve Schneider (FEPS ADR, Introduction) and other FEPS academic staff

You are invited to attend a workshop in the FEPS ‘e3i’ programme which will provide an introduction to writing successful research bids, with the emphasis on EPSRC applications.

Supporting On-Time Completion

Wednesday 20 May 2015

12:00 to 13:00
Dawn Duke (Researcher Development)

You are invited to attend a session of the FEPS ‘e3i’ programme on Supporting On-Time completion, designed for academics involved in supervising PhD students.

ISIE Biennial Conference at the University of Surrey

Tuesday 7 July 2015

The Society’s next conference will be held at the University of Surrey - a campus University at the town of Guildford in the county of Surrey in the South East of England, about 50km (35 minutes by rail) from central London. Transport to Guildford is easy, via Heathrow or Gatwick airport, by Eurostar train to London or, for a more leisurely journey, by ferry from St. Malo or Cherbourg to Portsmouth with a direct train from the ferry terminal to Guildford (one hour).

Physics by the Lake

Sunday 2 August 2015

EPSRC UK Graduate Summer School in Condensed Matter Theory

BAMC 2017 to be hosted at Surrey

Monday 10 April 2017

The 2017 British Applied Mathematics Colloquium will be hosted by the Department of Mathematics at Surrey. It will be held around Easter time in 2017. The chair of the organising committee is Peter Hydon, the secretary is David Lloyd, and the treasurer is Anne Skeldon. A key aim of the programme is to encourage applied mathematicians to cross disciplinary boundaries

Page Owner: th0011
Page Created: Wednesday 15 July 2009 10:49:41 by lb0014
Last Modified: Friday 27 June 2014 16:42:53 by pg0016
Expiry Date: Friday 15 October 2010 10:48:33
Assembly date: Wed Apr 01 20:07:25 BST 2015
Content ID: 9749
Revision: 23
Community: 1056