Forthcoming events for the Faculty and all Departments are shown below. You may also wish to view Faculty only events or Departmental only events.

14th European Symposium on Language for Special Purposes

Monday 18 August 2003

09:00 to 14:00

The 14th European Symposium on Language for Special Purposes 18th-22nd August 2003 Communication, Culture, Knowledge University of Surrey.

4th International Conference of B and Z Users

Wednesday 13 April 2005

4th International Conference of B and Z Users, University of Surrey, Guildford, UK, 13-15 April 2005.  Organised by APCB and the Z User Group.

Workshop on Biologically Inspired Information Fusion

Tuesday 22 August 2006

In conjunction with the Department of Psychology and the University of Manchester, in August 2006 we hosted the International Workshop on Biologically Inspired Information Fusion. The workshop was sponsored by the University of Surrey's Institute of Advanced Studies and the EPSRC under grant number EP/E012795/1.

Models of Concurrency and Open Computing

Friday 24 November 2006

10:00 to 16:30

Models of Concurrency and Open Computing: A one day seminar to commemorate the retirement of Mike Shields.

An introductory Overview of Cryptography

Wednesday 24 January 2007

14:00 to 15:00

Professor Fred Piper, Royal Holloway, University of London

Gate-level modelling and verification of asynchronous circuits using CSP_M and FDR

Thursday 1 February 2007


Professor mark Josephs, London South Bank University

The Semantic Gap in Image Retrieval

Wednesday 7 February 2007

14:00 to 15:00

Professior Paul Lewis, University of Southampton

Vision Based Measurement in the Power Generation and Food Handling Industries

Wednesday 21 February 2007

14:00 to 15:00

Professor Yong Yan, Department of Electronics, University of Kent

Management of software-intensive development projects

Wednesday 7 March 2007

14:00 to 15:00

Dr Hugh Deighton, LogicaCMG

Opening up the Black Box:The Semiconductor Industry’s Protected IP Initiative

Wednesday 21 March 2007

14:00 to 15:00

Doug Amos, Synplicity Inc.

Careers for students with a doctorate in computing

Wednesday 28 March 2007

14:00 to 15:00

Dr Russ Clark, University of Surrey

The Evolution of DRM - From Prevention Towards Deterrence

Wednesday 2 May 2007

14:00 to 15:00

Dr Stefan Katzenbeisser, Philips Research Eindhoven

How to Build an Effective Team - Evolving Neural Network Ensembles

Wednesday 9 May 2007

14:00 to 15:00

Professor Xin Yao, University of Birmingham

Digital Image Forensics

Wednesday 1 August 2007

14:00 to 15:00

Professor Yun Q Shi, New Jersey Institute of Technology

Fragile and Semi-fragile Reversible Data Hiding

Tuesday 7 August 2007

14:00 to 15:00

Professor Yun Q Shi, New Jersey Institute of Technology

Steganography and Steganalysis

Wednesday 8 August 2007

14:00 to 15:00

Professor Yun Q Shi, New Jersey Institute of Technology

Digital Watermarking

Wednesday 24 October 2007

14:00 to 15:00

Associate Professor Chang-Tsun Li, University of Warwick

Multimodal Interaction for Mobile Devices

Wednesday 31 October 2007

14:00 to 15:00

Professor Stephen Brewster, University of Glasgow

Augmented Reality for User-centred Urban Navigation Using Mobile Technology

Wednesday 14 November 2007

14:00 to 15:00

Dr Vesna Brujic-Okretic, City University

Temporal Verification of Parameterized Systems

Wednesday 12 December 2007

14:00 to 15:00

Professor Michael Fisher, University of Liverpool

Network resilience in the presence of adversarial behaviour: new systems and models

Wednesday 23 January 2008

14:00 to 15:00

Professor Erol Gelenbe, Imperial College London

A Semiotic Perspective on Pragmatic Web

Wednesday 6 February 2008

14:00 to 15:00

Professor Kecheng Liu, University of Reading

Semantic Integrated Services with Wireless Sensors

Wednesday 20 February 2008

14:00 to 2008-02-20

Professor Chunming Rong, University of Stavanger & University of Oslo, Norway

Multiple Classifier Systems in Biometrics

Wednesday 5 March 2008

14:00 to 15:00

Professor Josef Kittler, University of Surrey

Composing Cryptography and Watermarking for Secure Embedding and Detection of Watermarks - A Marriage of Convenience

Wednesday 30 April 2008

14:00 to 15:00

Professor Ahmad-Reza Sadeghi, Horst Görtz Institute for IT Security at Ruhr-University Bochum, Germany

Sustainable Practice in Universities: Leading and Improving

Thursday 4 September 2008

See event details

Centre for Environmental Strategy (CES) and Estates & Facilities Department of the University of Surrey

Intrinsic Quantum Computation

Wednesday 8 October 2008

14:00 to 15:00

Dr Karoline Wiesner, School of Mathematics and Centre for Complexity Sciences, University of Bristol

Machine learning in astronomy: time delay estimation in gravitational lensing

Wednesday 15 October 2008

14:00 to 15:00

Dr Peter Tino, Computer Science Department, University of Birmingham

Balancing security and usability in a video CAPTCHA

Wednesday 19 November 2008

14:00 to 15:00

Dr Richard Zanibbi, Rochester Institute of Technology, NY, USA

Neuromorphic Systems: Past, Present and Future

Wednesday 3 December 2008

14:00 to 15:00

Professor Leslie Smith, University of Stirling

Secure Channels and Layering of Protocols

Monday 9 February 2009

14:00 to 15:00

Prof Gavin Lowe, Computing Laboratory, University of Oxford

Mobile and Metadata Systems for Self-Made Media

Wednesday 18 February 2009

14:00 to 15:00

Risto Sarvas, Visiting Research Fellow, Digital World Research Centre, University of Surrey and Research Scientist, Helsinki Institute for Information Technology HIIT, Finland

The Integration of Action and Language in Cognitive Robots

Tuesday 31 March 2009

14:00 to 15:00

Prof Angelo Cangelosi, Adaptive Behaviour and Cognition Research Group, School of Computing and Mathematics

Formal Verification of an Occam-to-FPGA Compiler and its Generated Logic Circuits

Tuesday 21 July 2009

11:00 to 12:00

As custom logic circuits (e.g. field-programmable gate arrays, or FPGAs) have become larger, the limitations of conventional design flows have become more apparent. For large designs, verification by simulation is now impractical.

Making a Pitch

Wednesday 22 July 2009

14:00 to 15:00
Bob Barnes and Karl Wood

Most technical people end up having to make pitches – explaining their work in order to secure the next round of funding - or to get technical work turned into real business. Sometimes you know you are going to have to pitch in a formal setting, but it can also be a spontaneous opportunity from a chance meeting.

Structure your Writing to Help Readers

Wednesday 19 August 2009

14:00 to 15:00
Dr G Harry McLaughlin

I shall briefly review the usefulness and shortcomings of readability formulas. I will then describe CLEAR, an online aid to plain writing which I am developing: it will colour-code submitted text to show the difficulty of every word and every sentence. But simplifying sentences and cutting out jargon is not enough. So the bulk of the talk will consist of advice on structuring documents to help readers find what they need and understand what they find.

International Workshop on Digital Watermarking

Monday 24 August 2009

Professor Ingemar Cox (University College London, UK) Professor Edward J. Delp (Purdue University, USA) Professor Emeritus Fred Piper (Royal Holloway, University of London, UK)

The 8th International Workshop on Digital Watermarking (IWDW09) is a premier forum for researchers and practitioners working on novel research, development, and applications of digital watermarking, steganography, steganalysis, and forensics techniques for multimedia data. Recent developments apply techniques from advanced coding theory and formal verification in order to improve our understanding of robust watermarking systems and related security protocols.

Computer Pioneers: Ada Lovelace and Alan Turing

Saturday 5 September 2009

11:00 to 17:00

Ada Lovelace first suggested how a machine could be programmed to perform different functions. Alan Turing laid the mathematical basis for modern computer theory with his 'Turing Machine'. This display tells their story showing their contributions to the development of modern computers.

Code Wars: Competitive Programming

Wednesday 9 September 2009

16:00 to 18:00
Dr James Heather

How good are you at Connect 4? Could you explain your strategy to someone else? Could you code it up as a computer program? The Arena is a web-based system for hosting strategy game tournaments, but where the matches are played by the computer programs people submit to the system. Join us and learn how to create and submit your own program, and take on the rest of the world at Connect 4!

Buy tickets

Web Application Development

Wednesday 9 September 2009

Dr Bogdan Vrusias

This 3 day course provides a comprehensive, practical introduction to the fundamental web related programming languages and development environments; the skills and techniques for building general-purpose state-of-the-art web systems including e-commerce sites, database-driven catalogues, online libraries, and an understanding of the Web 2.0 and Mashup concepts and requirements.

The Computer Ate My Vote

Thursday 10 September 2009

13:30 to 15:15
Dr James Heather and Mr David Bismark

How will you know if your vote is counted in the next election? With technological advances, and more and more elections being run on computers, trustworthiness and transparency are critical to public confidence. Join us to find out about the latest advances in electronic election systems, and how they can enable you, the voter, to check the integrity of an election.

Buy tickets

The Future Starts Here - From Splitting the Atom to Rollable TVs

Thursday 10 September 2009

10:00 to 13:00
Professor Ben Murdin, Neil Newbold, Sertan Kaymak, Emma Suckling, Samantha Shaw, Radu Sporea

An insightful look into the exciting, cutting-edge research happening right on your doorstep. Research students from the University of Surrey present a series of short talks showcasing current activities in fields ranging from nuclear physics to the latest developments in nanotechnology and communication devices. Discover how the science and technology of today will impact tomorrow's society.

A Formal Approach to the Analysis of Protocols Protecting IPR

Wednesday 16 September 2009

14:00 to 15:00
David Williams

The primary benefit of digital content, the ease with which it can be duplicated and disseminated, is also the primary concern when endeavouring to protect the rights of those creating the content. Copyright owners wish to deter illicit file sharing of copyrighted material, detect it when it occurs and even trace the original perpetrator.

Enterprise Web Application Development

Wednesday 23 September 2009

Dr Bogdan Vrusias

The computer industry - and specifically enterprises - requires distributed and interoperable information systems in order to function and remain competitive. Distributed systems evolve continuously due to the cheaper availability of hardware and high-speed communications. This evolution has drawn new lines in systems architecture design development and allows big corporations to build robust, modular, and reusable components.

British Computer Society Lecture: The Future of the BCS

Thursday 24 September 2009

19:45 to 21:00
Alan Pollard FBCS CITP, BCS President

Alan will talk about the vision for the future of the BCS, as it undergoes a major transformation. He will outline the challenges and opportunities that the BCS faces, and the strategies that the Society is adopting to increase the engagement and relevance of the BCS within industry and within the wider community in the 21st Century.

Robust and Semi-fragile Watermarking Techniques for Image Content Protection

Tuesday 29 September 2009

14:00 to 15:00
Zhao Xi

The concept of robust and semi-fragile watermarking is described for copyright protection and authentication of digital images. A number of different transforms and algorithms used for robust and semi-fragile image watermarking are reviewed in detail. Four novel robust and semi-fragile transform based image watermarking related schemes are introduced. These include wavelet-based contourlet transform (WBCT) for both robust and semi-fragile watermarking, slant transform (SLT) for semi-fragile watermarking as well as applying generalised Benford’s Law to estimate the JPEG QF, then adjust the appropriate threshold for improving semi-fragile watermarking technique.

Adaptable Models and Semantic Filtering for Object Recognition in Street Images

Thursday 1 October 2009

11:00 to 12:00
Qin Ge

The need for a generic and adaptable object detection and recognition method in static images is becoming a necessity today, given the rapid development of the internet and multimedia databases in general. Comparing with human vision, the computer vision is out-performed in terms of efficiency, accuracy and depth of understanding, as the computerised recognition is achieved at contextual level. In order to achieve recognition at semantic level, computer vision systems must not only be capable of recognising objects, regardless of the changes in appearance, location, and action, but also be able to interpret abstract non-observable concepts.

IET Surrey Local Network Event

Wednesday 7 October 2009

19:30 to 21:30
Prof Anthony TS Ho, Deputy Head of Department, Department of Computing. Professor Ho is Professor and Chair of Multimedia Security at University of Surrey. His research interests are in multimedia security, digital watermarking, steganalysis, image forensics, satellite remote sensing, image processing and UWB radar target detection and identification. He coordinates the research activities of the Watermarking and Multimedia Security Group (WMSG)  in the Department.

As the number of electronic files containing commercially sensitive or confidential information increases every day, the importance of identifying the originality of files is becoming a hot topic for enterprises as well as computing professionals. But how can this be done in a world where ever more sophisticated image manipulation tools are widely available?

End-to-End Verifiable Voting With Prêt a Voter

Monday 19 October 2009

10:30 to 11:30
Mr David Bismark

Democracy depends on elections --- the people elect those to lead them and to make decisions for them. Any election is the difficult marriage of secrecy and verifiability in that we want all the votes to be secret so that no voter feels intimidated but free to vote according to her own heart and we want the election to be verifiable so that we can all rest assured that the outcome of the election does reflect the will of the people. Elections depend on people, procedures, software and hardware --- people stand for office, vote and count the votes and if, in the heat of the moment, they get a chance many of them would cheat to get ahead. To make cheating hard we have put in place procedures that have to be followed: the ballot box is shown to be empty at the start of election day and then it is sealed; ballots are cast into it one by one; at the close of the election the box is signed; it is safely transported to a counting place and only after checking signatures and lists is it opened and finally the votes are counted under close watch from election observers.

British Computer Society Lecture: Web Standards - Tomorrow's Web Today

Thursday 22 October 2009

20:00 to 21:30
Henny Swan, Opera Software

Web evangelist Henny Swan will give an overview of trends in Web standards, with practical demonstrations showcasing new technologies and what they can do.

  • Opera Software: innovative products and commitment to open Web standards
  • Widgets and developing for the mobile Web
  • Emerging standards: HTML5, CSS3, SVG/canvas and video
  • Relevance for the Web, today and tomorrow

Linguistic Steganography using Automatically Acquired Paraphrases

Wednesday 25 November 2009

14:00 to 15:00
Stephen Clark

Linguistic Steganography aims to provide techniques for hiding information in natural language texts, through manipulating properties of the text, for example by replacing some words with their synonyms. Unlike image-based steganography, linguistic steganography is in its infancy with little existing work. 

Mark My Words: Binary Watermarking Robust to Printing and Scanning

Thursday 26 November 2009

10:00 to 11:00
Mr Chris Culnane

Binary Watermarking, robust to printing and scanning, is the process of imperceptibly hiding information in binary documents, typically text documents, so that the hidden information can still be recovered following the printing and scanning of a document. It presents a challenging problem, both in finding an imperceptible way to hide data within a sparse text document, and providing an embedding strategy that can handle the myriad of distortions introduced during printing and scanning. Our goal was to develop a scheme that had sufficient capacity to embed our proposed authenticating and localising watermark. Existing schemes did not provide sufficient capacity, requiring us to develop techniques to increase the embedding capacity whilst maintaining the robustness to printing and scanning.

Using High Assurance Components to Improve the Directed Use of Human Expertise

Wednesday 2 December 2009

16:30 to 17:30
Peter Davies, Technical Director, Thales e-Security

Information Assurance solutions are usually made up of a variety of techniques which together a level of assurance to the information being used. It is currently beyond the state of the art to automate the identification, understanding and response to developing treat vectors and the operation of Information Assurance solutions over the long term demands very heavy levels of human expertise with all of the associated costs. Part of the issue here is that whereas we as the information assurance community (developers and assessors) do have a rigorous framework for the assessment of quality in certain types of high assurance components these techniques do not exist for large parts of the infrastructure on which assured components are reliant.

A New Zealand Perspective On Life Cycle Management

Thursday 14 January 2010

Sarah McLaren, Associate Professor and Director, Life Cycle Management Centre, Massey University

Consumer and retailer demands in some of New Zealand’s key export markets are driving substantial changes in the value chains that begin in New Zealand.

VitalPAC - ward-based patient data

Thursday 28 January 2010

20:00 to 21:00

A British Computer Society Lecture given by Dr Paul Schmidt, Portsmouth Hospitals NHS Trust

State of the World 2010: Transforming Cultures from Consumerism to Sustainability

Tuesday 16 February 2010

Erik Assadourian, Worldwatch Institute

We are delighted to welcome Erik Assadourian, Project Director of this year’s State of the World 2010 report, published annually by the Worldwatch Institute based in Washington DC. 

Information Security Research for the Move from "Need to Know" to "Need to Share"

Friday 19 February 2010

10:00 to 12:00

Information Security Research for the Move from "Need to Know" to "Need to Share" is part of a series of presentations during the semester.   Dr Adrian Waller is a Technical Consultant for Information Security at Thales Research and Technology (UK).

Spatial Representation in Robotic Navigation by a Combination of Grid Cells and Place Cells

Tuesday 23 February 2010

11:00 to 12:00
Mr Meisam Emamjome

Animals are capable of navigating through an environment. This requires them to recognise, remember and relate positions. Spatial representation is one of the main tasks during navigation. The brain seems to have a world centric positioning system such that we remember positions of objects in relation to a reference frame. Such spatial representation is believed to have been constructed in the hippocampus and related brain areas. Place cells, head direction cells, grid cells and border cells seem to transform vestibular information to spatial information in the brain. However, when psychological studies reveal how these areas are connected together, the process of transforming vestibular information to the kind of representation seen in place cells is still in question.

Student Pot Pourri

Thursday 25 February 2010

19:45 to 21:00

Selected undergraduate students from the Department of Computing at the University of Surrey will present the background and design stages of their final year project work. The event will provide the opportunity for the students to obtain feedback from a diverse audience of professionals, and will also allow the audience to discover the challenges facing current generations of near-graduate level students.

This year, we will hear about the Microsoft XNA computer game framework, an RSS tool that runs on the Google Android operating system, and a novel audio application.

The Quality verses Quantity Debate in Delivery of Affordable Housing. What is most sustainable?

Thursday 25 February 2010

Julian Hart, Design and Standards Manager, Homes and Community Agency, London Region

The Homes and Communities Agency was launched in December 2008 and represents a merger of the Housing Corporation (which was the government’s agency for funding affordable housing) and English Partnerships (which was the government’s agency for developing public land).

Real World Application Security

Friday 26 February 2010

10:00 to 12:00

This presentation, on security issues, is given by Chris Seary, Charteris plc.  Chris will be sharing his background both as a developer and as an auditor of large scale applications. 

The talk will focus on common pitfalls in development, touching on all aspects of the lifecycle, from design through to testing and deployment. Different technologies used within the Microsoft technology stack will be analysed, demonstrating how tools have progressed. 

Although Microsoft technologies are used for the demonstrations, much of the advice is applicable to other platforms. The presentation will also cover security solutions directly under the control of developers, such as WS-Security and fine-grain applications of encryption.

Chris Seary is an independent security consultant, providing advice to both Banking and Government. He is MVP, CISSP, ISO 27001 Lead Auditor, PCI DSS trained and CLAS. He frequently gives presentations and writes articles on IT Security. His specialism is securing enterprise scale applications.

Mobile CSP||B

Friday 26 February 2010

09:30 to 10:30
Miss Beeta Vajar

This presentation introduces Mobile CSP||B, a formal framework based on CSP||B which enables us to specify and verify concurrent systems with mobile architecture as well as the previous static architecture. In Mobile CSP||B, a parallel combination of CSP processes act as the controller for the B machines and these B machines can be transferred between CSP processes during the system execution

BIMA Seminar

Tuesday 2 March 2010

10:00 to 11:00
Miss Nooraini YUSOFF

Interference between two competing stimuli has been extensively studied in many research areas including attention, information processing and cognitive control. For this study, both competition and cooperation of stimuli are explained by the developed Hopfield based Stroop model within the classical colour-word Stroop effect paradigm. Competition of stimuli occurs when the task is to name the colour for an incompatible colour-word and its colour (e.g. a word RED written in green), meanwhile the cooperation among stimuli can be observed when congruence (e.g. a word RED written in red) between both facilitates the response to the colour name. The Hopfield network is chosen for several reasons; we address the Stroop phenomenon as an association problem, the competition and cooperation of Stroop stimuli meets the pattern processing nature of the Hopfield network and the recall algorithm in Hopfield is biologically realistic. We have shown that, with a relatively simple but biologically plausible neural network of a single Hopfield network, our model is also able to predict the Stroop effect in comparison to the human performance.

Project Argus Professional

Friday 5 March 2010

10:00 to 12:00
Police Constable Graeme INGATE / Detective Constable Alan DUTTON

Project Argus Professional is a multi-media Counter Terrorism presentation that takes the audience through an attack on a crowded city location. It analyses issues in the built environment that made the attack possible. It then challenges the audience to think how the likelihood of/or impact from such an attack could be reduced by the intelligent use of design and materials. The challenge for the 21st century is to make our built environment more resilient to terrorist attack without impinging on our ability to enjoy such places without draconian security measures.

Exploring Virtual Worlds from IRC to Second Life

Wednesday 10 March 2010

15:00 to 16:00
Dr Toni Sant

Second Life is a 3D multi-user role-playing online environment. Unlike other virtual worlds, created as games with set rules and stock characters, most of what goes on in Second Life is created by its users. This makes it an ideal playground for all sort of creative people. At any given time, there are no fewer than 20,000 people active in Second Life. Over a period of 60 days as many as one and a half million registered users log in. 

Quality as a prerequisite for Security in Inter-operable Systems

Friday 12 March 2010

10:00 to 12:00
Mr Peter Davies

Considerable effort goes into specifying secure and security protocols and the equipment in which these are embodied. In most cases the specification concentrates on positive cases with very little concentration on failure modes.

This talk will concentrate on limitations that are imposed on our ability to make assertions about the security of a system where we are unable to understand the quality of the implementation. It will do so by examining the types of failure that have led to security system failures. Finally, the talk will examine some of the extant security protocols and show that these provide very little support for identifying and guaranteeing the quality of components networked together in a distributed system

The Principles of Evolutionary Programming

Tuesday 16 March 2010

10:00 to 11:30
Mr Robert Puddicombe

This talk demonstrates the basic principles of biological evolution from the point of view of copying and mixing genetic data and goes on to illustrate how these principles have been used in evolutionary programming. Several published examples are examined in detail. Evolutionary programming is of interest for improving algorithms where the population of all possible algorithms is too large to be completely examined.

Corporate Espionage: Secrets Stolen, Fortunes Lost

Friday 19 March 2010

10:00 to 12:00
Mr Paul King

Paul King, Senior Security Adviser to CISCO, will give an overview of how organisations are at risk from corporate espionage - how organisations might be attacked and how they might reduce the risk. The talk will use Cisco's own organisation as an example. Paul will also discuss some of the research he is doing in this space.

7th Annual Computing Department PhD Conference

Tuesday 23 March 2010

On Tuesday 23 March, the Department will hold its 7th Annual PhD Conference.
The conference celebrates the work of all of our PhD students through presentations and posters, recognising their valuable contribution to computer science research. Two keynote speakers ( Professor Rudolf Hanka - University of Cambridge and David Krause - Varian Medical Systems Inc) will present motivational talks during the event.

Identity Defines the Perimeters in the Clouds

Thursday 25 March 2010

Adrian Seccombe

A British Computer Society lecture:

Adrian's presentation will aim to answer these questions:
* What are some of the key cloud choice drivers?
* Can you identify primary transformational SHIFTS required to enable secure, but collaborative, clouds?
* Why does Identity and Access Management have to SHIFT?

Fixing fuel poverty - challenges and solutions

Thursday 25 March 2010

Dr Brenda Boardman, Environmental Change Institute, Oxford University Centre for the Environment

While fuel poverty is often seen as a social problem, the solution is to improve the energy efficiency of the home,
providing strong synergies with climate change policy.

Can we have too much Security in our Information Systems? How much is good enough?

Friday 26 March 2010

10:00 to 12:00
Mike St John Green

Security is rarely seen as a business enabler - more an irksome and expensive disabler. Mike St John Green will construct the argument to show that it is an enabler, albeit expensive. We need to know how much to spend on security. He will show how to determine, in a systematic manner, the security features that are proportionate, answering the question, how much is good enough? Although Mike will be talking about how government tackles this problem, this issue applies to every business that relies on IT systems. This is really about risk management when applied to the security of IT systems.

Empirical Framework for Building and Evaluating Bayesian Network Models for Defect Prediction

Tuesday 27 April 2010

11:15 to 12:15
Miss Ana Jakimovska

Software reliability is a crucial factor to consider when developing software systems or defining optimal release time. For many organisations ‘time to market’ is critical and avoiding unnecessary testing time whilst retaining reliable software is important. 

The Cyber Threats, Managing the Risk to an Enterprise

Friday 30 April 2010

10:00 to 12:00
Detica, Mr James Chappell, Senior Manager - CLAS and Mr Ian Golledge, Senior Consultant

From the recent Google Aurora attacks, to the 'dark market' organised crime networks, we are entering a new era of especially organised, motivated and sophisticated cyber-threats. It is therefore more critical than ever that businesses pro-actively manage the risks to their Information. 

The Delivery of Managed Security Services

Friday 7 May 2010

10:00 to 12:00
Tony Dyhouse, Operations Manager at QinetiQ

Tony Dyhouse will discuss some standards applicable to the fields of Information Assurance and Service Delivery, illustrating areas of commonality with regard to aim and approach. 

Nuclear Energy: Next Generation of Reactors

Tuesday 11 May 2010

14.00 to 15.00
Prof. Paul J. A. Howarth, Director of Science, Technology & Project Delivery, National Nuclear Laboratory, Sellafield.

The Future of Computer Forensics and What Industry Needs

Wednesday 12 May 2010

14:00 to 15:00
Dr Godfried Williams

Our invited speaker is Dr Godfried Williams from the company Intellas UK, experts in Business Intelligence Security and Intelligent Forensics using AI techniques.

Security Awareness - The Common Sense Attribute

Friday 14 May 2010

10:00 to 12:00
Mr Clinton Walker

A lecture delivered by Clinton Walker, Security Consultant at Logica.  

Recent media reports covering major breaches of security claimed that they might have been prevented if staff awareness of security, procedures, appropriate data handling and security controls had been more reliable. Human error has become the biggest security concern for IT directors, end users and all parties concerned with data that’s held about them.

"Enterprises must recognise that simply trusting employees will inevitably prove detrimental to their security, their risk postures and their business interests," wrote Perry Carpenter, a research director at Gartner. (10th Oct 2008).

An Overview of Image Processing Technology for Military Applications

Wednesday 19 May 2010

14:00 to 15:00
Dr Duncan Hickman

The presentation provides a brief review of current military needs together with an assessment of how image and data processing technology can be used to meet these capability gaps.

A range of examples are presented that show how image and data processing can be used within a variety of different applications ranging from airborne, maritime, and land-based platforms. These system examples are based on specific activities and programmes undertaken by Waterfall Solutions Ltd.

From T-cells to Robotic Sniffer Dogs

Wednesday 26 May 2010

14:00 to 15:00
Professor Jon Timmis

There are many areas of bio-inspired computing, where inspiration is taken from a biological system and 'magically' transplanted into some engineered system. 

In this talk, Jon Timmis will explore thoughts on a slightly more principled approach to bio-inspired system development, that hopefully does not include any magic, and discuss in the context of immune-inspired systems, some of the potential and pitfalls of using biological systems as inspiration. To help ground the talk, he will explore a case study from their recent work with DSTL in the development of an immune-inspired robotic sniffer dog detection system, inspired by a signalling mechanism in T-cells that are present in the immune system

Education, Education, Exploitation: it’s not just the economy, stupid!

Thursday 27 May 2010

20:00 to 21:30
Dr Bill Mitchell

Lecture by Dr. Bill Mitchell, Director of the BCS Academy

Computing education in schools is in a perilous state, university computing departments are under considerable strain and there is a pressing need for much better integration between the academic and business communities.

Dynamic Sustainabilities: Linking technology, environment and social justice

Thursday 27 May 2010

Prof Melissa Leach, Director ESRC STEPS, Centre Leader IDS Knowledge, Technology and Society (KNOTS) team

Climate change and global pandemics both highlight the complex, multi-scale, uncertain dynamics that pervade societal problems today - and also the circulation of highly contrasting narratives about these dynamics, why they matter and to
whom, and what to do about them.

If income is less than food plus mortgage then do plan B

Wednesday 2 June 2010

14:00 to 15:00
Mr Nigel Biggs

Computers and software have played a huge if relatively unexpected role in my engineering career, in my three businesses (and in most other people’s), in my early 1970’s rugby club and in my life. I first saw a computer 43 years ago, I first used one 41 years ago (and helped build them) and hardware still hates me! But software, engineering in the head, opened the doors for my future.
The question is, what is today opening the doors for your future?

Tracking Surgical Instruments for Dexterity Assessment with Particle Filters

Wednesday 9 June 2010

11:00 to 12:00
Phil Smith

Phil Smith will be discussing the tracking of surgical instruments for dexterity assessment with particle filters as his presentation for his MPhil-PhD transfer.

The style of medical training has emphasized more on standardized and objective assessment of clinical, academic and surgical knowledge. Traditionally in ophthalmology surgical skills are often assessed in the operating theatre environment with the supervising surgeon directly observing or providing feedback whilst watching a recording of the operation. This can be of great subjective variability and is not readily reproducible. Certain components of surgical skills can be determined by analyzing the movement of the instruments. 

Do we need artificial biotope in urban area? Landscape Design and children’s participation in a primary school for 7 years in Japan (CES)

Thursday 10 June 2010

Keitaro Ito, Kyushu Institute of Technology, Japan

There has been a rapid decrease in the amount of open or natural space in Japan in recent years, in particular in urban areas due to the development of housing. Preserving these areas as wildlife habitats and spaces where children can play is a very important issue nowadays. 

Digging Deep

Thursday 24 June 2010

Dr Peter Argust, Rio Tinto

Mineral extraction projects have frequently found themselves at the fault lines of competing interests. Expectations to safeguard habitat, water, climate, and human rights have not always been reconciled with expectations to enhance living standards and economic prosperity.

Block-based Image Steganalysis: Methodology and Performance Evaluation

Monday 5 July 2010

14:00 to 15:00
Professor C-C Jay Kuo

Traditional image steganalysis techniques are conducted with respect to the entire image. In this work, we aim to differentiate a stego image from its cover image based on steganalysis results of decomposed image blocks. As a natural image often consists of heterogeneous regions, its decomposition will lead to smaller image blocks, each of which is more homogeneous

Summer Meeting of NCAF in Department

Monday 12 July 2010

On 12th and 13th July the Department of Computing is hosting the Summer meeting of NCAF, the Natural Computation Applications Forum, a platform for exchange of ideas between academia and industry.  The special theme is: Making Sense of Data - Theory and Practice.

Did Turing Dream of Electric People?

Wednesday 14 July 2010

15:30 to 16:30
Dr Matthew Casey

Despite many advances in computational intelligence, it is clear that we have yet to achieve Turing’s dream of “intelligent machinery” – machines with human-level understanding. A broader reference point for intelligent behaviour which encompasses artificial agents is now being advocated (Cristianini 2010). 

In this seminar, I will prompt discussion by asking some key questions, which include “have we forgotten Turing’s dream?” and “should we abandon human intelligence as our reference point?” And of course, I will also provide my own opinion as to what I think the way forward might be.

Neurodynamical Approach to Biologically Inspired Information Processing Model

Wednesday 28 July 2010

12:00 to 13:00
Nooraini Yusoff

Biologically inspired computing studies the properties and mechanisms of information processing in nature and embeds this knowledge into artificial systems. Due to its adaptability to wider range of applications, neural network has been of interest in many research areas. Furthermore, the growing evidences from the neuroscience field have led to evolutions of artificial neural network (ANN). From the simple McCulloch-Pitts models, ANN has now in its third generation with spiking neuron network (SNN) models. SNN based model provides more meaningful interpretation of biological neural system. However, information encoding is a major challenge as the trade off for its realism.

An Attempt at Formalising the Species Concept

Wednesday 4 August 2010

15:30 to 16:30
Dr Andre Gruening

Computer Scientists have a tendency to look at the systems they model and research from the angle of computer simulations. However, to clarify the nature of objects we simulate and mode, it is often worth to lean back and think a bit deeper out the nature of objects we are dealing with in a formal and mathematical framework since this can bring inconsistencies to light and give directions for new simulations.

Intelligent Systems and Bio-Inspired Optimization

Thursday 12 August 2010

14:00 to 15:00
Dr Thomas Runkler, Affiliation: Siemens AG, Corporate Technology, Corporate Research and Technologies, Munich, Germany

Dr Runkler will give a short overview of the research activities on intelligent systems at Siemens Corporate Technology. In this talk, particular focus will be given to bio-inspired optimization methods and their applications, including ant colony optimization, wasp swarm optimization, fuzzy decision making and fuzzy weighted aggregation. These methods will be illustrated on several real-world industrial applications, including delivery logistics, cash management, car manufacturing, communication networks, maintenance scheduling, and electronics assembly.

What can optical illusions teach us about vision?

Wednesday 25 August 2010

15:30 to 16:30
Dr David Corney

The first in a series of NICE Research Group presentations.

We see the world around us in immense detail, in real time, and with no apparent effort. Yet we also seem to consistently misinterpret certain stimuli: optical illusions. 

In this presentation, Dr Corney will be demonstrating a variety of optical illusions and discussing their nature and cause. Dr Corney will present some recent work using artificial neural networks as a simple model of vision, including the perception of illusions, and he will also discuss the implications for other visual agents, including animals and robots

Tracking instruments in cataract surgery

Wednesday 1 September 2010

15:30 to 16:30
Mr Philip Smith

This is the next lecture in the series of NICE presentations.

Phacoemulsification is one of the core surgical skills in ophthalmic training and the most common procedure in ophthalmology. This work is a part of the project that aims to develop a tool to measure the surgical competence and technical skill through analysing the instrument movement in surgical videos. 

In this talk, Phil Smith will describe an approach that is able to track surgical instruments in cataract surgery using particle filters with a motion and colour based detector. Where experiments have shown it is possible to track an instrument even when prior information regarding its appearance is limited

National Space Workshop

Monday 6 September 2010

Professor Sir Martin Sweeting, Director of the Surrey Space Centre

Professor Sir Martin Sweeting, Director of the Surrey Space Centre, led a National Space Technology Road mapping workshop here at the University on 6 September.

A Neural Fraud Detection Framework Automatic Rule Discovery

Wednesday 15 September 2010

14:00 to 15:30
Mr Nick Ryman-Tubb

Fraud is a serious and long term threat to a peaceful and democratic society; the total cost of fraud to the UK alone was estimated by the Association of Chief Police Officers to be at least £14bn a year. One such fraud is payment card fraud - to detect this fraud, organisations use a range of methods, with the majority employing some form of automated rules-based Fraud Management System (FMS). These rules are normally produced by experts and it is often an expensive and time-consuming task, requiring a high degree of skill. This analytical approach fails to address the fraud problem where the data and relationships change over time. 

The View from the Department of Energy and Climate Change (DECC)

Wednesday 15 September 2010

Dr Tim Chatterton, Institute for Sustainability, Health and Environment (ISHE), University of the West of England, Bristol

Tim has been working in the field of sustainability for over a decade, primarily in air quality – but also in the strongly related fields of climate change, public health, transport, and the built environment. For much of this time, he has been based at the University of the West of England where he has worked very closely with Defra and the Devolved Administrations on the UK’s Local Air Quality Management process.

Sign Gesture and Activity Workshop

Thursday 16 September 2010

Dr Richard Bowden

Dr Richard Bowden ran a workshop in association with ECCV entitled Sign Gesture and Activity. This was co-organised by the EU projects Dicta-Sign and Sign-Speak.

Military Tactics in Agent-based Intrusion Detection for Wireless ad hoc Networks

Wednesday 22 September 2010

15:30 to 16:30
Mr Stefan Stafrace

Wireless Ad hoc Networks (WAHNs) offer a challenging environment for conventional Intrusion Detection Systems (IDSs). In particular WAHN have a dynamic topology, intermittent connectivity, resource constrained device nodes and possibly high node churn. Researchers over the past years have encouraged the use of agent-based IDS to overcome these challenges. In this work we propose the use of military tactics to optimise the operations of agent-based IDS for WAHN.

Reliability, Security and Privacy Issues Raised when Monitoring the Elderly

Thursday 23 September 2010

19:00 to 21:00

British Computer Society Debate

Adrian Seccombe (formerly Chief Information Security Officer, Eli Lilly), Ian Wells (Royal Surrey County Hospital), chaired by Roger Peel (Department of Computing, University of Surrey)

From Language to Vision: Dynamic Context Analysis in Large-Scale Systems

Friday 1 October 2010

15:30 to 16:30
Dr Lilian Tang

In this talk, Dr Lilian Tang will discuss the information variability in natural language and vision systems, the ambiguity caused by noisy data and their processing modules, and how context /reasoning can be modelled in order to perform application tasks in large-scale systems. This is to enable a system not just to deal with uncertainty and variability, but more to adapt to its unpredictable environment. She will review her progress so far in this form of contextual modelling and this will lead on to some open research challenges which now need to be addressed.

Bio-inspired mechanisms for arrays of custom processors

Tuesday 5 October 2010

14:00 to 15:00
Dr Gianluca Tempesti, University of York

Until recently, the ever-increasing demand of computing power has been met on one hand by increasing the operating frequency of processors and on the other by designing architectures capable of exploiting parallelism at the instruction level through hardware mechanisms such as super-scalar execution. However, both these approaches seem to be reaching (or possibly have already reached) their practical limits, mainly due to issues related to design complexity and cost-effectiveness.

Making climate change policy: the view from inside

Monday 11 October 2010

13:00 to 14:00
Michael Jacobs, Visiting Senior Fellow, Grantham Research Institute on Climate Change and the Environment, LSE, and former Special Adviser to Gordon Brown

How do governments actually make policy in a complex area such as climate change? Why do they take the decisions they do? And why do they not take other decisions they are lobbied to do?

Dealing with Dynamics, Future Uncertainty and Distributed Decision Making in Industrial and Urban Ecosystems

Wednesday 13 October 2010

Jim Petrie, University of Sydney and University of Cape Town

This talk describes ways to enhance the operational potential of Industrial and Urban Ecosystems to support sustainable development.

Professors Stephen Hawking and Jim Al-Khalili at the Royal Albert Hall

Wednesday 20 October 2010

Professor Stephen Hawking

IoP lecture: Neutrino - Is the Sun Still Shining?

Wednesday 20 October 2010

Frank Close, Rutherford Appleton Laboratory

This is the story of Ray Davis who was the first man to look into the heart of  a star. He did so by capturing neutrino, ghostly particles that are produced in the centre of the Sun and stream out across space. As you read this, billions of them are hurtling through your eyeballs at almost the speed of light, unseen.

Computing at School Hub Launch Event

Wednesday 20 October 2010

16:30 to 18:30
Simon Humphreys, the British Computer Society's Co-ordinator of Computing at School, Bill Mitchell, Director of the BCS Academy of Computing, and Roger Peel, BCS Guildford branch Chair, as well as teachers sharing experiences. 

On 20th October, the Department of Computing will be hosting the launch event of the newest Computing at School Hub. The event is primarily aimed at teachers in and around the Guildford area, and is intended towards forming connections with and amongst local Computing and ICT teachers, as well as elaborating an agenda for future Hub events. 

A Formal Analysis of Buyer-Seller Watermarking Protocols

Monday 25 October 2010

13:30 to 14:30
Mr David Williams

Copyright owners are faced with the task of limiting illicit file sharing of multimedia content. With this aim, Buyer-Seller Watermarking protocols are proposed to act as a suitable deterrent to file sharing by providing the copyright owner with adequate evidence of illegal distribution if and only if such illicit behaviour has occurred. A recent survey of BSW protocols concluded that only heuristic approaches to the security analysis of such protocols had been adopted in the literature and that formal analysis of the security of such schemes is a research direction worth pursuing.

International Workshop on Models of Driver Intentionality for Intelligent Vehicle Technology

Tuesday 26 October 2010

Dr David Windridge

Dr David Windridge organised the international workshop ‘Models of Driver Intentionality for Intelligent Vehicle Technology’ which was hosted at CVSSP on Oct 26th.

Computing at School - what a BCS Branch can do

Thursday 28 October 2010

20:00 to 21:30
Dr. Kathryn Harkup (Schools Liaison Officer, University of Surrey) & Dr. Roger Peel (Department of Computing, University of Surrey)

Our meeting this month features the recent formation of a "Computing At School" Hub based around the BCS Guildford Branch and the Department of Computing at the University of Surrey.

There is an increasing realisation that the study of computing topics in schools is not laying the foundations for a lifelong appreciation of the subject, but instead just training students in skills related to particular current technologies. The BCS, Microsoft Research and several other industrial and educational organisations have created "Computing At School" (CAS; see as a vehicle to incubate improvements in the school-age study of computing, and to support teachers with high-quality resources to enable this change.

The BCS Guildford Branch is the first BCS Branch [to our knowledge!] to launch a local Computing At School Hub. This will be based in Guildford, but attracted teachers from south London and West Sussex as well as from Surrey and Hampshire to its Launch event last week. So far, there are about 10 Hubs country-wide, but we hope to promote our model to other Branches.

This month's meeting will introduce the Surrey CAS Hub to the BCS Guildford Branch, and outline the role that our industrial and commercial members can play to help it to achieve its goals. In particular, we will be exploring particular technologies that could be used to provide motivating learning experiences for mass teaching of the foundations of computing - such as the mobile phone.

Evolving Legged Robots Using Biologically Inspired Optimization Strategies

Friday 29 October 2010

15:30 to 16:30
Ms Beatrice Smith, Surrey Space Centre

When designing a legged robot a small change in one variable can have a significant effect on a number of the robot’s characteristics, meaning that making tradeoffs can be difficult. The algorithm presented here uses biologically inspired optimization techniques to identify the effects of changing various robot design variables and determine if there are any general rules which can be applied to the design of a legged robot. Designs produced by this simulation are compared to existing robot designs and biological systems, showing that the algorithm produces results which require less power and lower torque motors than similar existing designs, and which share a number of characteristics with biological systems

Jim Al-Khalili at Manchester Science Festival

Sunday 31 October 2010

15.00 to 16.00
Professor Jim Al-Khalili

Pathfinders: The Golden age of Arabic Science

Zipf’s Law for Image Forensics

Monday 1 November 2010

13:30 to 14:30
Mr Zhao Xi

Zipf’s law, one of the empirical laws, was originally used to analyse the probability of occurrence of an event in mathematical fashion. For instance, it can be used to describe the relationships between the popularity rank of words and their frequency of use in a natural language. Similarly, it can be shown that there is a mathematical pattern between the size of the population in a country and the size of its cities.

MBDA and Open Innovation

Tuesday 2 November 2010

14:00 to 15:00
Mr Mohan Ahad

The speaker at this seminar will be Mr Mohan Ahad, Assistant to Chief Technologist at MBDA, and Managing Director at Microlaunch Systems Ltd.  MBDA is Europe's largest supplier of Guided Weapons.  With reductions in defence budgets it has to look for innovative ways of developing technology for its military customers by leveraging capability from the civil sector.  

The talk will give an overview of the company, the funding mechanism available for low level technology and its ambitions for participating EU Framework Programmes. 

All are welcome so please make a note in your diary to attend.

Computational Intelligence to design self-organising manufacturing systems

Tuesday 9 November 2010

14:00 to 15:00
Professor Juergen Branke

Designing complex, self-organising systems is challenging. It requires to find local, decentralised rules for the agents which result in a good global performance of the overall system. In this talk, two approaches are presented at the example of a self-organising manufacturing system where local dispatching rules are used for decentralised scheduling.

The first approach supports a human designer by revealing the weaknesses of an examined manufacturing system. This is achieved by automatically searching for easy-to-analyse problem instances where the applied dispatching rule performs poorly.
The other approach is to generate the dispatching rules automatically by simulation-based Genetic Programming.

Supervised Learning Algorithms for Multilayer Spiking Neural Networks

Thursday 11 November 2010

15:00 to 16:00
Ioana Sporea

The current report explores the available supervised learning algorithms for multilayered spiking neural networks. Gradient descent based algorithms are one of the most used learning methods for rate neurons. The back-propagation version for spiking neurons firing a single spike, SpikeProp, promises the same learning abilities as for artificial neural networks. Systematic investigations on this learning method show that SpikeProp requires more computations than back-propagation and a reference start time is critical for convergence. These issues require significant improvements to the gradient descent learning method for spiking neural networks in order for an efficient algorithm to be developed. Further developments include a learning algorithm for input and output neurons with multiple spikes, and a general learning rule for recurrent networks.

Implementation: A Practical Route to take Neural Computing Research into Business and Industry Applications

Friday 12 November 2010

15:30 to 16:30
Mr Nick Ryman-Tubb

Translational Research is one of the latest Government's key words; nowadays, if you want to get a grant then your scientific research needs to be translated into practical applications that have impact.  Working within a commercial environment is not straightforward but it is a two-way street, often the practical application helps to further drive the research. The application of neural computing to help industry address some pressing business needs has the potential to improve its performance in a number of keys areas. Over 15-years of delivering innovation into business, a series of projects and approaches are discussed.  Some have been successes, some have been failures, but what is the common theme?

Lecture: Superman and I

Wednesday 17 November 2010

17.00 to 18.00
Dr Silvia Pani

This lecture is part of our popular series of sixth form lectures on science and engineering but is open to everyone.  See our flyer for the full lecture programme.

Passive Image Forensic Techniques for Source Identification

Thursday 18 November 2010

11:00 to 12:00
Mr Phil Bateman

Recently, much interest has developed in identifying reliable techniques that are capable of accurately ‘uncovering the truths’ regarding the pre and post- processing of a digital image, without the requirement of actively injecting a digital watermark or signature into the image data.  Whilst watermarking schemes have been shown to be useful for protecting the integrity of the image, there always exists the underlying risk that the watermark data might be forcibly or accidentally removed.  When this happens, the image is effectively stripped of its identity, and its integrity is extremely difficult to prove. Forensic techniques aspire to achieve similar objectives but do not rely on the strength of embedded data. Instead, the ambition is to identify the facts of an image, based solely on the data provided.

Multi-bit watermarking robust to Stirmark

Monday 22 November 2010

13:30 to 14:30
Dr Steve Wesemeyer

Substantial interest in digital watermarking over the last 15 years resulted in a considerable number of different watermarking systems that have been proposed.  However, despite this extensive literature on watermarking, not much progress has been made in tackling one of the most devastating attacks on these systems:
the original Stirmark attack introduced by Peticolas et al.

The attack has been described as the software equivalent of a high resolution print-scan attack which is part of a much larger class of random bending attacks (RBAs).

Optimised Agent-Based Intrusion Detection for Wireless Ad Hoc Networks

Tuesday 23 November 2010

10:00 to 11:00
Mr Stefan Stafrace

Wireless Ad hoc Networks (WAHN) offer a challenging environment for conventional intrusion detection systems (IDS). In particular WAHN have a dynamic topology, intermittent connectivity, resource constrained device nodes and possibly high node churn. Researchers over the past years have encouraged the use of agent-based IDS to overcome these challenges. 

IoP lecture: Radiation and Reason

Wednesday 24 November 2010

Prof. Wade Allison

The impact of science on a climate of fear.

Towards a Unified Framework for Intelligent Systems & Robotics

Thursday 25 November 2010

14:00 to 15:00
Dr Honghai Liu

This talk introduces a theoretical framework based on approximate reasoning, it first extends Euclidean transformations into quantity space via the proposed fuzzy qualitative algebra, next, system behavior is represented by a set of automatically generated sampling data, then, data analysis methods are selected to extract features of the dataset according to individual application context, finally system behavior and corresponding data features are integrated at the system level. The framework is presented in terms of robotics, it has been adapted into applications with encouraging results such as hand gesture recognition, human motion analysis. A unified approach to human/prosthetic hand gesture recognition and results in vision/capture based human motion analysis will be reported in the talk. The framework is intended to provide a foundation towards a unified representation by “gluing” hybrid representations.

The Young Rewired State

Thursday 25 November 2010

20:00 to 21:00
Emma Mulqueeny
A BCS Guildford Branch Meeting in which Emma Mulqueeny and several young co-presenters will discuss activities in the Young Rewired State, and how to exploit the collection and processing of open public data in collaborative "hack days".

The role of uncertainties in the design of international water treaties: an historical perspective

Thursday 25 November 2010

Itay Fishhendler, The Hebrew University and a Visiting Fellow at Royal Holloway

Water is one natural resource whose management is especially susceptible to uncertainties, many of which are being exasperated by climate change. Some of these uncertainties originate from knowledge deficits in physical conditions while others relate to behavioral and social variability related to water supply and use.

The Identity Dilemmas, can Watermarking Help?

Monday 29 November 2010

13:30 to 14:30
Mr Adrian Seccombe

A discussion aimed at exploring how Watermarking might be able to help with the Identity Dilemmas.  All are welcome to attend so please enter this event in your diary.

Understanding Technological Paradigm Formation: Modelling Industries as Parallel Adaptive Search Mechanisms

Wednesday 1 December 2010

10:00 to 11:00
Mr Matthew Karlsen

The combination of a dominant (de-facto standard) design and associated search heuristics constitute a `technological paradigm'. Such technological paradigms may emerge as industries evolve, altering the nature of innovative search from exploration to incremental improvement along a `technological trajectory'. Disagreements exist as to the conditions of design standardisation and the relationship between standardisation and related shifts in innovation emphasis.

Lionhead Studios and Fable III

Wednesday 1 December 2010

17:00 to 18:00
Mr Jonathan Shaw, Lionhead Studios

Jonathan Shaw from Lionhead Studios will be giving a talk in the normal CompSoc slot on Wednesday 1st December 2010 at 5:00pm in LTM (note the different venue for this week only).

Jonathan will be bringing along the Fable III SDK for a demo.  All are welcome.

Accessibility Assessment and Simulation

Thursday 2 December 2010

11:00 to 12:00
Mr Nikolaos Kaklanis

The core concept of the proposed PhD research is to empower the accessibility of ICT and non-ICT technologies by introducing an innovative user modelling technique for the elderly and disabled. This new user modelling methodology will be able to describe in detail all the possible disabilities, the affected by the disabilities tasks as well as the physical, cognitive and behavioural/psychological characteristics of any user. An extension of UsiXML[1] language will be developed, in order to express the Virtual User Models in a machine-readable format. Research will be conducted in order to determine how the values of various disability parameters vary over individuals and if these values follow any common probability distribution (e.g.: Gaussian, Poisson, etc.). 

Advanced Signal Processing Algorithms for Brain Signal Analysis

Friday 3 December 2010

15:30 to 16:30
Dr Saeid Sanei

Most of the techniques and algorithms used for other applications such as communication, acoustics, and different biomedical engineering modalities can be extended to brain signal analysis. Spatial or temporal resolution limitation and the effect of noise and artifacts in the brain signals can be mitigated by processing of multichannel and/or multi-modal (such as joint EEG-fMRI) data using appropriate algorithms. Here, we may look at very recent techniques developed for analysis (noise and artifact removal, dynamics, source detection, localization, and tracking, prediction, etc.) of brain signals, and discuss various directions for future research.

Security of Near Field Communication Transactions with Mobile Phones

Monday 6 December 2010

10:30 to 11:30
Mr Thomas Diakos

Google CEO, Eric Schmidt, announced on the 15th of November 2010 the plan for their next generation of Android based mobile phones to become electronic wallets by making use of Near Field Technology (NFC). NFC is contactless technology based on high frequency RF tags already found in contactless cards like the Oyster. Little research has been carried out on how secure the services offered by NFC are, one of the reasons being its reliance on proximity (~10cm). Attacks that have been carried out used expensive antennas and other equipment. They have also been targeted at contactless cards and not mobile phones where other side channels exist like Bluetooth and Wi-Fi, making crosstalk and information leakage a security concern.

Using MDE to Generate Formal Models

Thursday 9 December 2010

14:30 to 15:30
Mr James Sharp

Formal analysis is based on ensuring that a model preserves particular system properties. Defining the model and specifying the properties requires specialist expertise, the formal model and properties are typically written by hand, based on some informal definition. These definitions range from English written requirements, Unified Modelling Language (UML) models to Domain Specific Language (DSL) descriptions. Our work focuses on the investigation of whether the formal models can be automatically generated from their corresponding informal definition.

Intelligent Information Retrieval in the Deep Web: an adaptable semantic model for retrieving, indexing and visualising Web Knowledge

Thursday 9 December 2010

11:00 to 12:00
Mr Georgios Michalakidis

Humans communicate through different signals. Due to an ability to perceive things, our species can perform this communication accurately and efficiently even when noise is introduced or the signal is presented in different formats. Computer technologies aid in cognitive processing and can, to some degree, support intellectual performance and enrich individuals’ minds. We operate (and design systems that operate) using analogies, such as reasoning, comparisons, and synonymity. In the end: is analogy a shared abstraction? Does it derive from mathematics? Is it high-level perception in shared structure theory?

Globalization and Scarcity

Thursday 9 December 2010

Alex Evans, New York University

Alex Evans is based at New York University's Center on International Cooperation, where he runs a program on what issues of resource scarcity - especially food, land, water and energy - mean for globalisation and international development, and what kinds of international collective action are needed to manage them.

A Dynamically Adaptive Semantic-Driven Model for Efficiently Managing and Retrieving Resources in Large Scale P2P Networks

Friday 10 December 2010

15:30 to 16:30
Miss Athena Eftychiou

To build a scalable, robust and accurate P2P network, the network must be able to manage efficiently large amounts of information. Thus, a critical challenge in P2P networks is to collectively transform resources to a repository of semantic knowledge to  accurately and efficiently discover resources. 

Wood bark: from waste to wealth

Wednesday 15 December 2010

Prof. Heikki Hokkanen, University of Helsinki, Finland

FORESTSPECS provides research based biological and technical understanding and solutions needed for upgrading wood related residues and humic substances to value-added chemicals and materials. 

The Brazilian Climate Conundrum - Hero or Villain?

Thursday 16 December 2010

Tim Cowman

The globally accepted association between Brazil and the Environment is often a negative one, with Amazon deforestation an overriding theme.

Digital Forensics for JPEG2000 and Motion JPEG2000

Friday 17 December 2010

14:00 to 15:00
Mr Ghulam Qadir

With the advancement of imaging devices and image manipulation soft-ware, production, development and manipulation of digital images can now be done by almost everyone.  For this reason, the task of tracking and protecting digital data (images, videos etc.) has become very difficult.  To provide adequate policing over the use of digital content, both Active and Passive security techniques are followed.  Digital watermarking is an active approach that involves pre-processing an image in order to protect it.  

Is Arguing in the Real World too Costly? An exploration into the practicality of implementing argumentative reasoning software components

Monday 20 December 2010

11:00 to 12:00
Mr Daniel Bryant

In everyday life human decision-making is often based on arguments and counter-arguments. Decisions made in this way have a basis that can be easily referred to for explanation purposes as not only is a best choice suggested, but also the reasons of this recommendation can be provided in a format that is easy to grasp.

Formal Verification of Systems Modelled in fUML

Thursday 13 January 2011

09:30 to 10:30
Mr Islam Abdel Halim

Much research work has been done on formalizing UML diagrams, but less has focused on using this formalization to analyze the dynamic behaviours between formalized components. In this work we propose using a subset of fUML (Foundational Subset for Executable UML) as a semi-formal language, and formalizing it to the process algebraic specification language CSP, to make use of FDR2 as a model checker.

Innovation for a Smarter Planet

Thursday 20 January 2011

Dr Andy Stanford-Clark Chief Technology Officer, Smarter Energy, IBM Global Business Services

Andy Stanford-Clark, IBM Distinguished Engineer and Master Inventor, will introduce technology which is helping to make the planet smarter: instrumenting objects in the real world with sensors, linking them together over a network, and then applying intelligent applications to reason about what's happening, and how to react accordingly. 

Associative Network Models of Hippocampal Declarative Memory Function

Friday 21 January 2011

15:30 to 16:30
Dr Daniel Bush

The hippocampus is widely believed to mediate mammalian declarative memory function, and it has been demonstrated that single pyramidal neurons in this cortical region can encode for the presence of multiple spatial and non-spatial stimuli. Furthermore, the rate and phase of firing - with respect to theta oscillations in the local field potential – can be dissociated, and may thus encode for separate variables. This has led to the suggestion that hippocampal processing may operate using a dual (rate and temporal) coding mechanism.

Generative Web Information Systems

Monday 24 January 2011

10:30 to 11:30
Mr Alexandros Marinos

This PhD project aims to realize a new type of information system, more dynamic and less opaque to its owners, specified with structured natural language models and queried through hypermedia. To accomplish this, we focus on Semantics of Business Vocabulary and Rules (SBVR) as a modelling language, Representational State Transfer (REST) as an interface paradigm and Relational Databases as the persistence mechanism. All three of these technologies have declarative underpinnings, focusing on the ‘what’ rather than the ‘how’, which is why their combination is feasible and effective. By creating appropriate mappings to align these technologies, we create a core platform for Generative Information Systems.

Science, politics and expert advice: the curious case of CO2 emissions reduction targets in the UK

Thursday 27 January 2011

Susan Owens, Professor of Environment and Policy, University of Cambridge

The paper examines a decision by the UK Government in 2003 to adopt a demanding, long-term CO2 emissions reduction target, following the advice of one of its longest-standing environmental advisory bodies, the Royal Commission on Environmental Pollution (established in 1970, the RCEP is one of the bodies that the Coalition Government has decided to abolish). 

Advanced Signal Processing Algorithms for Brain Signal Analysis

Friday 28 January 2011

15:30 to 16:30
Dr Saeid Sanei

Most of the techniques and algorithms used for other applications such as communication, acoustics, and different biomedical engineering modalities can be extended to brain signal analysis. Spatial or temporal resolution limitation and the effect of noise and artifacts in the brain signals can be mitigated by processing of multichannel and/or multi-modal (such as joint EEG-fMRI) data using appropriate algorithms. 

Here, we may look at very recent techniques developed for analysis (noise and artifact removal, dynamics, source detection, localization, and tracking, prediction, etc.) of brain signals, and discuss various directions for future research.

Department's First Olympic Event

Monday 31 January 2011

12:30 to 17:00

The Department is holding a sports event on Monday 31st January to which all Year 3 students, PGT and PGR are invited to take part.  Sports like 5-a-side football, badminton, squash and fun games will be set up in the newly built Surrey Sports Park.  

The "First Computing Olympics" is a new event and it is hoped that competing teams will be formed and a large number of entrants will contribute to its success.  The Bench will provide refreshments after the hard work of competing

Energy Consumption and Information Processing in Neurons

Tuesday 1 February 2011

14:00 to 15:00
Dr Jeremy Niven, Royal Society University Research Fellow, Department of Zoology, The Cambridge Neuroscience Community, University of Cambridge

The nervous system is under selective pressure to generate adaptive behavior but at the same time is subject to costs related to the amount of energy neural signalling consumes. Characterizing this cost-benefit trade-off is essential for understanding the function and evolution of nervous systems, including our own. 

Self-Organization of Neural Systems - An Evolutionary and Developmental Perspective

Friday 4 February 2011

15:30 to 16:30
Professor Yaochu Jin
Understanding the principles behind the self-organization of biological nervous systems is the key to understanding cognition. This talk presents our recent research efforts on understanding neural self-organization from the evolutionary and developmental point of view. A computational model is built up for co-evolving the development of the neural system and body plan of an animate based on primitive organisms such as hydra and flatworm. The neural and morphological development is simulated with a multi-cellular system governed by a gene regulatory network. Our results suggest that energy efficiency might be the most important constraint in neural self-organization. In addition, a close coupling between the evolution of neural systems and body plan is also revealed.
At the end of the talk, preliminary work on modelling of neural plasticity, which can be seen as a form of activity-dependent neural development, will be presented very briefly. A gene regulatory network model is interleaved with a BCM spiking neural network as well as a reservoir computing framework for more powerful spatiotemporal pattern recognition.

Maths Society "What mathematics did for me", by Dr MC Faulkes

Tuesday 8 February 2011

18:00 to 19:00
Dr Dill Faulkes

Short Bio: Dr Faulkes is the founder of the Dill Faulkes Educational Trust, which supports educational programmes that seek to inspire young people. Dr Faulkes did his first degree and his PhD in mathematics, and went on to do post-doc research in general relativity. He then left academia and went into software. He worked for the company Logica, later SPL which was bought by Systems Designers. Dr Faulkes invested money in a variety of software companies and following the flotation of Triad and the private sale of, he was able to establish his educational trust.

New Methods for EEG and ERP-based Analysis of Mental Fatigue

Thursday 10 February 2011

15:30 to 16:30
Miss Delaram Jarchi

FATIGUE is a common phenomenon that exists in our everyday life which is the state of reduced performance and can have mental or physical component. 

The state of reduced performance of the operators that relates to the fatigue has been caused many disasters which many of them are not well known to the public.

LightTAG Exhibition Opening

Friday 11 February 2011

Touring exhibition of light drawings and animations opening at the BFI Southbank on 11th February 2011.  The exhibition will close on 18th February and will then tour around the South East.

SEPnet Summer Bursaries

Tuesday 15 February 2011

Claire Potter, SEPnet Director of Employer Liaison

SEPnet Summer Bursaries for Level 1 and Level 2 Students

IoP talk: What have lasers done for you?

Wednesday 16 February 2011

19.00 to 20.00
Prof Stephen Sweeney

Surrey Research Insight

Wednesday 16 February 2011

Guest speaker: Professor Stevan Harnad, Professor of Cognitive Science, University of Southampton.

Symplectic database and Surrey Scholarship Online

Department of Computing UCAS Day

Wednesday 16 February 2011

11:00 to 16:00
Staff and students

The Department will be holding another UCAS day to meet, interview and welcome invited prospective students.  Staff will be setting up presentations and be present to speak to and answer queries from students.  Please contact our UG Admissions office for further information.

CES Seminar: The drivers behind the shift from a linear to a circular economy

Wednesday 16 February 2011

Walter Stahel, Visiting Professor CES
Walter Stahel Powerpoint (3674.74KB - Requires Adobe Reader)

Prêt a Voter with Acknowledgement Codes

Thursday 17 February 2011

14:00 to 15:00
Professor Peter Ryan

A scheme is presented in which a Pretty Good Democracy style acknowledgement code mechanism is incorporated into Prêt a Voter. Voters get immediate confirmation at the time of casting of the correct registration of their receipt on the Web Bulletin Board. As with PGD, the registration and revealing of the acknowledgement code is performed by a threshold set of Trustees. Verification of the registration of the vote is now part of the vote casting and therefore more convenient for the voters. This verification mechanism supplements the usual verification on the Web Bulletin Board mechanism, that is still available to voters. 

Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it?

Friday 18 February 2011

10:00 to 12:00
Dr Adrian Waller

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

The speaker is Dr Adrian Waller, Technical Consultant at Thales.

A blind steganalysis scheme for H.264/AVC video based on collusion sensitivity and two-stage noise classification

Monday 21 February 2011

13:30 to 14:30
Prof Gaobo Yang, Visiting Researcher

For the H.264/AVC video stream with covert data by collusion-irresistent steganography, a blind video steganalysis scheme is proposed based on the collusion sensitivity and noise classification. It exploits temporal frames weighted averaging (TFWA) for collusion to improve the capabilities of host approximation and watermark removal, instead of the traditional temporal frames averaging (TFA). To overcome the interferences by motion and illuminance variation, a content change factor (CCF) is defined to adaptively classify the noise existing in prediction error frames (PEF). For passive steganalysis, final decision is made by the center of mass (COM) feature of histogram characteristic function (HCF). Experimental results demonstrate that the proposed approach can cope with temporal-domain, transform-domain and even spread spectrum based steganographic algorithms. For a stego-video with embedding strength of 10%, it can achieve a probability of correct detection (PCD) about 99.82%.

Compressed Sensing and its Applications

Thursday 24 February 2011

16:00 to 17:00
Mr Vahid Abolghasemi

Compressed Sensing (CS) framework which is linked with the sparse recovery problem has been recently introduced and applied to solve numerous problems.  Measurement matrix has a key role in the CS to sample the signal/images. It has been recently shown that optimization of this matrix can increase the quality of reconstruction.  In this talk we first introduce the CS theory.  Then, the advantages of the measurement matrix optimization and our proposed strategies for this purpose are discussed.  

Finally, we review some applications and extensions of CS such as functional Magnetic Resonance Imaging (fMRI) and Watermarking.

The Delivery of Managed Security Services

Friday 25 February 2011

10:00 to 12:00
Mr Tony Dyhouse, Principal Cyber Security Consultant, QinetiQ

The second in the Technologies and Applications seminar series, presented by Tony Dyhouse.

Tony Dyhouse will discuss some standards applicable to the fields of Information Assurance and Service Delivery; illustrating areas of commonality with regard to aim and approach. Different mechanisms for the protection of CIA will be discussed from a point of view of risk transference and third party provision of services, including a look at potential conflict of interest and how that can be addressed. Finally, a view on advancing technology and Cloud services.

Non-negative Matrix Factorization and its Application to fMRI

Thursday 3 March 2011

16:00 to 17:00
Mrs Saideh Ferdowsi

Non-negative matrix factorization (NMF) has been widely used for analyzing multivariate data. NMF is a method which creates a low rank approximation for positive data matrix and because of non-negativity constraint it has found interesting applications in image processing where he data is inherently positive.  Functional Magnetic Resonance Imaging (fMRI) is an imaging technique which provides useful anatomical and functional information of brain.  Analyzing data provided by the fMRI helps to investigate brain function.  

In this talk, we first give a brief introduction about different algorithms for fMRI analysis. Then, the application of Non-negative matrix factorization to fMRI data and our proposed algorithm for this purpose will be discussed and its superiority to other data decomposition techniques such as BSS will be emphasised for such data.

Quality as a prerequisite for Security in Interoperable Systems

Friday 4 March 2011

10:00 to 12:00
Mr Peter Davies, Technical Director, Thales

Considerable effort goes into specifying secure and security protocols and the equipment in which these are embodied. In most cases the specification concentrates on positive cases with very little concentration on failure modes.

This talk will concentrate on limitations that are imposed on our ability to make assertions about the security of a system where we are unable to understand the quality of the implementation. It will do so by examining the types of failure that have led to security system failures. 

Finally, the talk will examine some of the extant security protocols and show that these provide very little support for identifying and guaranteeing the quality of components networked together in a distributed system

SPIRIT Midterm Review and User Meeting

Sunday 6 March 2011

13:00 to 17:00

The Surrey Ion Beam Centre is hosting the SPIRIT midterm review and user meeting at Farnham Castle from 9th-11th March 2011.

Break our Stego System - The BOSS Challenge

Monday 7 March 2011

Dr Johann Briffa
Break Our Steganographic System (BOSS) is a challenge organized by two former students of Prof Fridrich, and held between Jun 2010 and Jan 2011. The top three contestants were invited to submit a paper to IH 2011 to discuss their techniques. The challenge is the first organized open challenge to compare steganalysis methods against a well-designed steganographic system (HUGO – Highly Undetectable steGO), and clearly demonstrates the state of the art in blind or targeted steganalysis. In this presentation we go over the contest organization and material available, and why it’s of interest to anyone working in steganography and steganalysis.

Supervised Learning Algorithm for Spiking Neural Networks

Thursday 10 March 2011

15:00 to 16:00
Mrs Iona Sporea

Neural networks based on temporal encoding with single spikes are biologically more realistic models as experimental evidence suggests that biological neural systems use the exact time of action potentials to encode information.  Moreover, it has been demonstrated that networks of spiking neurons are computationally more powerful than sigmoidal neurons.  In order to reach the computational power of spiking neurons, efficient learning algorithms must be used.  This presentation explores the available supervised learning methods in artificial and spiking neural networks

Security and Commerce: Why Business Care and What's Happening in Practice

Friday 11 March 2011

10:00 to 12:00
Mr Alan Woodward, Director, Charteris

A brief introduction into why IT security has become increasingly important to businesses over recent years: what has driven the increasing use of IT in transactional business and why this has caused a focus on security.  We will also discuss the type of threats that business is aware of and what it is they believe they are responding to.  This we will use as the backdrop to describing some of the worst “real” incidents and how these might differ from the threat that business was preparing to meet.  We will then go on to talk about how software vendors view IT security and how this is driving their efforts to secure their products.  This will focus primarily on the approach that Microsoft have taken over recent years.

Synapse Complexity: Origins and Organization

Thursday 17 March 2011

14:00 to 15:00
Professor Seth Grant, The Wellcome Trust Sanger Institute, University of Cambridge

Professor Seth Grant from the Genes to Cognition Programme, Wellcome Trust Sanger Institute, Hinxton, Cambridge, will visit the University of Surrey to give a presentation to the Department of Computing and all are welcome to attend.  

For over a century it has been known that the synapse – the junction between nerve cells – is of fundamental importance in organizing brain circuits and behavior.  

Corporate Espionage: Secrets Stolen, Fortunes Lost

Friday 18 March 2011

10:00 to 12:00
Mr Paul King, Senior Security Advisor, CISCO.

This presentation is given by Mr Paul King, Senior Security Advisor at CISCO.  Paul will give an overview of how organisations are at risk from corporate espionage - how organisations might be attacked and how they might reduce the risk. The talk will use Cisco's own organisation as an example. Paul will also discuss some of the research he is doing in this space.

NFC Technology: What is it? Protocols used? Future researches

Monday 21 March 2011

13:30 to 14:30
Mr Ali Alshehri

Near field communication (NFC) is a standard-based wireless communication technology that allows data to be exchanged between devices that are a few centimeters apart. In this presentation three major elements will be discussed: the concept of NFC, the different protocols used (their pros and cons) and the potential areas of research.

Error Concealment Techniques for Multi-View Sequences

Thursday 24 March 2011

14:00 to 15:00
Dr Ing Carl James Debono, University of Malta

The H.264/MVC standard offers good compression ratios for multi-view sequences by exploiting spatial, temporal and interview image dependencies.  The performance of this coding scheme is optimal in error-free channels, however in the event of transmission errors it leads to the propagation of the distorted macro-blocks, degrading the quality of experience of the user.  In this presentation we will review the state-of-the-art error concealment solutions and look into low complexity concealment methods that can be used with multi-view video coding.  Error resilience techniques that help error concealment will also be discussed.

Dealing with the Transition from Existing to Future systems

Thursday 24 March 2011

20:00 to 21:00
Jon Payne, InterSystems

A British Computer Society event.  This event is open to Members and Non-Members. Students are particularly welcome.

Please see the Branch website for further details.

Assuring the security of our Information Systems: How much is good enough?

Friday 25 March 2011

10:00 to 12:00
Mr Mike St John Green, Office of Cyber Security, Cabinet Office
Security is rarely seen as a business enabler - more an irksome and expensive disabler. I will construct the argument to show that it is an enabler. But it is still expensive. I will then explore the question about how one determines, in a systematic manner, security features that are proportionate. Hence the question, how much is good enough?  And how do you justify necessity and sufficiency to someone else, such as the person paying for it?  Yes, I will be talking about how government tackles this problem but I don't think this issue is peculiar to government. This is really about risk management when applied to the security of IT systems

Universally Verifiable Electronic Voting Schemes With Re-encryption Mixnets

Monday 28 March 2011

15:00 to 16:00
Mr Efstathios Stathakidis

Democracy entirely depends on the elections, which must be robust and fair without cheating and electoral frauds. Voters must be sure that their vote has remained unaltered and has been correctly tallied. The election system should prevent any possible coercion and should be robust even if the official authorities are not trusted. There is a recent example where frauds and systems’ misbehaviour were reported by voters (Florida, 2000). When security properties like integrity, privacy, anonymity, confidentiality and verifiability are not supported or they have limited functionalities, attacks can be made enabling a third party to learn the voters vote. All these lead to a fundamental question: how can the voter trust the voting procedure and the announced results?

Department's 8th PhD Student Conference

Wednesday 30 March 2011

09:30 to 16:30
The Department has pleasure in announcing the date and venue for the 8th Annual PhD Student Conference which will be taking place this year on Wednesday 30 March 2011 at Treetops/Cedar Room, Wates House
See website: for further information

Bridging the Computational Sensory Gap

Thursday 31 March 2011

15:30 to 16:30
Dr Matthew Casey

A long standing aim for computer science has been to build ‘intelligent machines’. Building computer models of the human brain has the potential to achieve this aim, either through developing an artificial brain, or by understanding how the brain computes to replicate intelligence. However, despite significant advances, we have yet to realise this potential.  There appears to be a clear gap between modelling the brain for neuroscience and applying what we have learnt about brain-like computation to real-world, practical problems. On the one hand, models based on high-level cognition have been developed which can process real-world inputs. These cognitive architectures may show us broadly how the brain achieves certain function, but are too simplistic for practical purposes. On the other hand, large-scale brain simulations have been developed which model brain dynamics, but are not designed to replicate intelligence.  In this seminar we will explore these issues and debate some of the possible long-term answers which involve bridging the gap between cognitive architectures and large-scale simulations, particularly for sensory processing.

The Cyber Threats, Managing the Risk to an Enterprise

Friday 1 April 2011

10:00 to 12:00
Mr James Chappell, Senior Manager - CLAS, and Mr Ian Golledge, Senior Consultant, both from Detica

From the recent Google Aurora attacks, to the 'dark market' organised crime networks, we are entering a new era of especially organised, motivated and sophisticated cyber-threats.  It is therefore more critical than ever that businesses pro-actively manage the risks to their information.

Microsoft Workshop

Monday 4 April 2011


CVSSP hosted a workshop on the 4th April exploring potential collaborations with Microsoft and their business partners, along with input from Brunel University.

The Law of Tendency to Executability and its Implications

Wednesday 6 April 2011

14:00 to 15:00
Professor Mark Harman, University College London

The Law of Tendency to Executability states that all useful descriptions of processes have a tendency towards executability.  Attempts to rise above the perceived low abstraction level of executable code can produce increased expressive power, but the notations they engender have a tendency to become executable.  This has many consequences for software; its creation, evolution and deployment. It also has wider implications.  The automation that drives this tendency also raises fundamental questions about how human decision making can remain inside the execution loop.

A Unified Computational Model of the Genetic Regulatory Networks Underlying Synaptic, Intrinsic and Homeostatic Plasticity

Thursday 7 April 2011

15:30 to 16:30
Dr Daniel Bush, NICE Research Group

It is well established that the phenomena of synaptic, intrinsic and homeostatic plasticity are mediated – at least in part – by a multitude of activity-dependent gene transcription and translation processes.  Various isolated aspects of the complex genetic regulatory network (GRN) underlying these interconnected plasticity mechanisms have been examined previously in detailed computational models.  However, no study has yet taken an integrated, systems biology approach to examining the emergent dynamics of these interacting elements over longer timescales.  Here, we present theoretical descriptions and kinetic models of the principle mechanisms responsible for synaptic and neuronal plasticity within a single simulated Hodgkin-Huxley neuron.  We describe how intracellular Calcium dynamics and neural activity mediate synaptic tagging and capture (STC), bistable CaMKII auto-phosphorylation, nuclear CREB activation via multiple converging secondary messenger pathways, and the activity-dependent accumulation of immediate early genes (IEGs) controlling homeostatic plasticity.  We then demonstrate that this unified model allows a wide range of experimental plasticity data to be replicated.  Furthermore, we describe how this model can be used to examine the cell-wide and synapse-specific effects of various activity regimes and putative pharmacological manipulations on neural processing over short and long timescales.  These include an examination of the interaction between intrinsic and synaptic plasticity, each dictated by the level of activated CREB; and the differences in functionality generated by STC under regimes of reduced protein synthesis.  Finally, we discuss how these processes might contribute to maintaining an appropriate regime for transient dynamics in putative cell assemblies within contemporary neural network models of cognitive processing.

Security Issues for Developers using Microsoft Technologies

Friday 8 April 2011

10:00 to 12:00
Mr Chris Seary, CLAS consultant

Chris Seary, Consultant at Charteris, will be giving two talks. The first will cover real world application security from an auditor's perspective. It goes through many of the common security issues arising from lack of secure development practice. This will give demonstrations of injection attacks on a web site.

The second talk will cover the newer WS-Security toolset for SOAP web services. It will show examples of code, configuration and the communications used.

A new robust watermarking system based on the DCT domain

Monday 11 April 2011

13:30 to 14:30
Dr Zhu

The algorithm takes full advantage of local correlation of the host image pixels and the masking characteristics of the human visual system, it chooses DCT blocks by comparing the value of the DCT low frequency coefficients and the amount of the nonzero DCT coefficients of each block. After the embedding process is completed, transforming the DCT coefficients from the frequency domain to the spatial domain produces some rounding errors, because the conversion of real numbers to integers will cause some information loss. The paper uses genetic algorithm to deal with the rounding errors. The experimental results show that, the algorithm can not only make sure the quality of the embedded image and the invisibility of the watermark, but also robust to common image operates, and JPEG compress


Tuesday 12 April 2011

09:30 to 12:30

The topics available come from our 11 week first year undergraduate course. Participants would be able to work at their own pace through practical examples with support from University staff.

Cultural-Based Particle Swarm Optimization for Multiobjective Optimization

Thursday 14 April 2011

16:00 to 17:00
Professor Gary Yen, Oklahoma State University

Our next speaker in this series of seminars will be Professor Gary Yen from the Oklahoma State University.  All are welcome to attend.  

Evolutionary computation is the study of biologically motivated computational paradigms which exert novel ideas and inspiration from natural evolution and adaptation.  The applications of population-based heuristics in solving constrained and dynamic optimization problems have been receiving a growing interest from computational intelligence community.  Most practical optimization problems are with the existence of constraints and uncertainties in which the fitness function changes through time and is subject to multiple constraints.

Introduction to Identity and Access Management

Wednesday 20 April 2011

14:30 to 15:30
Mr Travis Spencer, Senior Technical Architect, Ping Identity, Sweden
Who are you and what are you allowed to do? These basic questions can be answered by a one year old, but are not as easily solved by complex computer systems. IT solutions used in banking, government, insurance, healthcare and other industries must satisfactorily answer these questions before being able to perform their actual function. Cloud computing and distributed system design makes this an even harder nut to crack. Due to globalization, increased competition, and outsources, however, solutions aren't optional for successful businesses.

MILES Sustainability Ideas Exchange event

Wednesday 4 May 2011

09:30 to 17:00

The first MILES Ideas Exchange event will be held on 4th and 5th May and the theme for the event will be 'Sustainability'.

The Ideas Exchange will be an intensive two-day ideas generation event bringing together a diverse group of researchers and academics from the University of Surrey. During the event the group will identify research challenges relevant to the theme of 'Sustainability' and develop innovative project ideas to address these challenges. There is up to £30k available to support the research projects resulting from the Sustainability Ideas Exchange.

Annual LDSG Meeting

Friday 6 May 2011

11:00 to 17:00

On Friday May 6th, there will be a London Dynamical Systems Group meeting at the University of Surrey.

A Pareto-based Approach to Multi-Objective Machine Learning

Thursday 12 May 2011

15:30 to 16:30
Professor Yaochu Jin

Machine learning is inherently a multi-objective task. Traditionally, however, either only one of the objectives is adopted as the cost function or multiple objectives are aggregated to a scalar cost function. This can be mainly attributed to the fact that most conventional learning algorithms can only deal with a scalar cost function. Over the last decade, efforts on solving machine learning problems using the Pareto-based multi-objective optimization methodology have gained increasing impetus, thanks to the great success in multi-objective optimization using evolutionary algorithms and other population-based stochastic search methods.

A Cauchy Distribution based Video Watermark Detection for H.264/AVC in DCT Domain

Monday 16 May 2011

13:30 to 14:30
Mr Gaobo Yang

Compared with Generalized Gaussian distribution (GGD), Cauchy distribution is superior to describe the statistical distribution of the Intra-coded DCT coefficients in H.264/AVC. For the bipolar additive watermark in H.264/AVC video stream, a Cauchy distribution based detection algorithm is proposed by ternary hypothesis testing. Experimental results show that the proposed approach can achieve more than 80% on average for the accuracy of watermark detection.

Information Photonics

Wednesday 18 May 2011

09:00 to 17:00
Information Photonics 18-22 May, Ottawa, Canada

Building on Existing Security Infrastructures

Wednesday 18 May 2011

15:00 to 16:00
Professor Chris Mitchell, Royal Holloway

Professor Chris Mitchell, from Royal Holloway, will be our next speaker.  

Almost any large scale network security system requires the establishment of a security infrastructure of some kind.  For example, if network authentication or authenticated key establishment is to be implemented, then the communicating parties need access to a shared secret key or certificates for each other's public keys.  Setting up a new security infrastructure for a significant number of clients is by no means a trivial task.  It is therefore tempting to try to exploit an existing security infrastructure to avoid the need for the potentially costly roll-out of a new infrastructure.
The GAA architecture has been designed to enable the pre-existing mobile telephony security infrastructure to be exploited for the provision of generic security services.  We propose the adoption of the architecture used by GAA to enable a wide range of other pre-existing infrastructures to be similarly exploited.  We briefly look at two examples, namely what we refer to as TC-GAA and EMV-GAA.

CLEO Europe 2011

Sunday 22 May 2011

CLEO Europe, 22-26 May 2011, Munich, Germany

A Software Engineering Cock-up

Wednesday 25 May 2011

15:00 to 16:00
Dr Ian Nussey, OBE FREng

This cautionary tale is about an apparently trivial software project which didn't go too well. After posing some questions, it explains what happened, mentions some useful survival tools and techniques that would certainly have made things go better and ends with a couple of stories with enduring relevance. Relevant are 'luck' and quality – corner stones of personal success which are hard to define and even harder to achieve.

Professor Jim Al-Khalili meets Professor Brian Cox

Wednesday 25 May 2011

Jim Al-Khalili

An evening in conversation with Professor Brian Cox OBE, chaired by Professor Jim Al-Khalili, Professor of Public Engagement at the University of Surrey and BBC television presenter.

Buy tickets

Difficulties in Learning and Teaching to Program Object Oriented Programming Concepts in the Computer Science Higher Education Community

Wednesday 25 May 2011

12:00 to 13:00
Mrs Arwa Al-Linjawi

Programming is a major subject in Computer Science (CS) departments.  However, students often face difficulties on the basic programming courses due to several factors that cause these difficulties.  Maybe the most important reason is the lack of problem solving abilities that many students show.  Due to their lack of general problem solving abilities, students don’t know how to create algorithms, resulting in them not knowing how to program.

Exploration of Working Memory

Thursday 26 May 2011

15:30 to 16:30
Mr Panagiotis Ioannou

Working memory refers to a limited capacity part of the human memory system that is responsible for the temporary storage and processing of information while cognitive tasks are performed.  We will explore how memories can be represented by extensively overlapping groups of neurons that exhibit stereotypical time-locked spatiotemporal time-spiking patterns, called polychronous patterns and make further assumptions regarding the polychronous group span of different brain regions in association to working memory.

Cyberwarfare - Threats and Responses

Thursday 26 May 2011

20:00 to 21:00
David Alexander Chief Security Officer, Regency IT Consulting

Cyberwarfare is a subject that has received a great deal publicity since the attacks on Estonia and Georgia and the Stuxnet malware in particular. Nation states are now devoting much more attention to the damage that can be inflicted upon them without a shot being fired and the probability that it will happen to them.

CES Seminar: Efficiency, sufficiency, growth: which way to a low carbon society?

Thursday 26 May 2011

Julia Steinberger, Lecturer in Ecological Economics, University of Leeds

Transitioning a Clinical Unit to Data Warehousing

Friday 27 May 2011

10:30 to 11:30
Mrs Arwa Jamjoom

This research proposes a method for developing a data warehouse in a clinical environment while particularly focusing on the requirements specification phase. It is conducted primarily to target organizations whose requirements are not clearly defined and are not yet aware of the benefits of implementing a data warehouse. By integrating key ideas such as the agile manifesto, maintaining data quality, and incremental and prototyping approaches, it provides a platform for collaboration and participation between users and designers, as well as identifying relevant processes and their additional value. It is also important to note that this work was performed in the context of a Clinical Unit with limited experience of IT, and limited budget. An important research objective was to demonstrate how to obtain significant “buy-in” to a data warehouse solution at low-cost, and minimal risk to the clinical unit.

Formal Verification of Trustworthy Voting Systems

Tuesday 31 May 2011

11:00 to 12:00
Mr Murat Moran

Fair elections are essential processes in ideal representative democracies since ancient Greece.  Thus, as being an indispensable part of fair elections, a various number of trustworthy voting systems has been designed and improved over decades.  However, due to insufficient amount of proofs, the lack of trustworthiness of such systems still precipitates quite a number of system attacks violating citizens' privacy, modifying election results, which have as a consequence controversial elections and unfair democracies.

Ensembles of Classification Methods for Data Mining Applications

Thursday 2 June 2011

15:30 to 16:30
Dr M Govindarajan, Annamalai University, Annamalai Nagar, Tamil Nadu, India

Data Mining is the use of algorithms to extract the information and patterns derived by the knowledge discovery in databases process.  Classification is a major data mining task.

Classification maps data into predefined groups or classes. It is often referred to as supervised learning because the classes are determined before examining the data. In this research work, new hybrid classification methods are proposed using classifiers in a heterogeneous environment with using voting and stacking mechanisms and their performances are analyzed in terms of error rate and accuracy.

A Classifier ensemble was designed using a k-Nearest Neighbour (k-NN), Radial Basis Function (RBF), Multilayer Perceptron (MLP), and Support Vector Machine (SVM). The feasibility and the benefits of the proposed approaches are demonstrated by means of data sets like intrusion detection in computer networks, direct marketing, signature verification. Experimental results demonstrate that the proposed hybrid methods provide significant improvement of prediction accuracy compared to individual classifiers.

The Case for and Against Biomimetic Brain Machine Interface

Wednesday 8 June 2011

14:00 to 15:00
Dr Kianoush Nazarpour, Newcastle University

Dr Kianoush Nazarpour from the Motor Control Group at the Institute of Neuroscience, Newcastle University will be our speaker on this occasion.  All are welcome to attend.

Biomimetic brain-machine interfaces (BMI) have evolved from experimental paradigms exploring the neural coding of natural arm and hand movements to mathematically advanced real-time neural firing rates decoders.  However, despite recent decoding algorithms with increasing levels of performance and sophistication, BMI control remains slow and clumsy in comparison to natural movements.  Therefore, considerable improvements are required if these devices are to have real-life clinical applications.

Emergent Constraints in Technological Change: The Formation of Exemplar Technologies and their Effect on the Direction of Future Search

Thursday 9 June 2011

14:00 to 15:00
Mr Matthew Karlsen

This work suggests that population-level selection of artefact designs produced by firms facing an ill-structured design problem favours the formation of a dominant design with a set of 'high pleiotropy' elements, affecting many product functions. Selective expansion of a technological artefact's active 'design space' may embed a negative heuristic within the design, effectively 'locking-in' earlier design choices. In the absence of sufficient variety-generating mechanisms, competition will result in a dominant design within an industry. This research describes how selection at the population level may interact with the local search routines of firms to produce a dominant design embodying 'frozen' dimensions. Such a design may be seen to form part of a technological paradigm. The investigation nests Koen Frenken's existing model of technological paradigms within an evolutionary population-based model. Entropy statistics indicate several exploratory stages that emerge endogenously via interaction of selection at the firm and population levels

The Cube Sail satellite recovery system

Tuesday 14 June 2011

Dr. Vaios Lappas, University of Surrey

RAeS Lecture, Farnborough Branch

Tools for CSP - Overview and Perspectives

Wednesday 15 June 2011

14:00 to 15:00
Dr Markus Roggenbach, Swansea University

 Our speaker will be Dr Markus Roggenbach, from the Department of Computer Science, Swansea University.

Taking the "Children & Candy Puzzle" (see below) as a master example, we discuss what the various tools for the process algebra CSP offer for modelling and verifying systems.  Here, we focus especially on interactive theorem proving for CSP, as exemplified in Steve Schneider's work or in our tool CSP-Prover.  Besides the power to analyze infinite state systems, the theorem proving approach offers the possibility for deeper reflections on CSP.  Here we discuss how it allows one to verify the algebraic laws of the language, and, furthermore, how it allows to prove meta results such as the completeness of axiomatic semantics.

Children & Candy Puzzle: "There are k children sitting in a circle.  In the beginning, each child holds an even number of candies.  The following step is repeated indefinitely:  Every child passes half of her candies to the child on her left; any child who is left with an odd number of candies is given another candy from the teacher.  Claim: Eventually, all children will hold the same number of candies."  

Landscape Analysis of Bayesian Network Structure Learning Algorithms

Wednesday 22 June 2011

13:30 to 14:30
Professor John McCall, Robert Gordon University

Bayesian Networks (BN) are an increasingly important tool for mining complex relations in large data sets.  A major focus of current research is in efficient and effective ways of learning those essential interactions between variables, known as structure, that allow efficient factorisation of the joint probability distribution of the data.  This in turn provides a platform for prediction, inference and simulation.

GCSE Physics Taster Session

Monday 27 June 2011

You are invited to bring a group of year 9 students to this half day event at University of Surrey

Watermarking Seminar

Monday 27 June 2011

13:30 to 14:30
Mr Ainnudin Abdul Wahab

In this research, we propose a camera identification technique based on the conditional probability features (CP features). Specifically we focus on its performance for detection of images sources which has been taken using cameras from different models. By using 4 cameras, we demonstrate that the CP features are able to perfectly match the test images with its source in 8 over 10 independent tests conducted. Additionally, the CP features are also able to perfectly match the cropped and compressed test images with its source in 9 over 10 independent tests. These findings provide a good indication that CP features are beneficial in image forensics.

'Physics at University' Tasters

Tuesday 28 June 2011

Schools and sixth form colleges can bring groups of A level students into the university for a day to see what university is like.

The Modelling and Analysis of Buyer-Seller Watermarking Protocols

Wednesday 29 June 2011

10:30 to 11:30
Mr David Williams

The primary benefit of digital content, the ease with which it can be duplicated and disseminated, is also the primary concern when endeavouring to protect the rights of those creating the content. Copyright owners wish to deter illicit file sharing of copyrighted material, detect it when it occurs and even trace the original perpetrator. Embedding a unique identifying watermark into licensed multimedia content enables those selling digital content to trace illicit acts of file sharing to a single transaction with a single a buyer. However, evidence of such illicit activity must be gathered if and only if the buyer truly shared the content for a seller to prove such behaviour to an arbitrator. For this purpose, Buyer-Seller Watermarking (BSW) protocols have been developed to be used in conjunction with digital watermarking schemes.

Variable-Length Codes for Joint Source-Channel Coding

Thursday 30 June 2011

14:00 to 15:00
Dr Victor Buttigieg

Since the introduction of Huffman codes back in 1952, variable-length codes have been used in several data compression standards, including the latest video coding standards such as H.264, usually as part of their entropy coding sub-systems.  Although not as good as other data compression schemes, such as for example Arithmetic Coding, they still prove popular in practical implementations due to their simplicity.  However, from early on it was realized that variable-length codes suffer from error-propagation under noisy conditions. Several techniques have been proposed to mitigate this behaviour, including the use of synchronisation codewords, self-synchronising codes and reversible variable-length codes.

Sixth Form Physics Challenge

Monday 4 July 2011

You are invited to enter a team of 6 into our Sixth Form Physics Challenge.

When Computational Intelligence Meets Computational Biology

Wednesday 6 July 2011

14:00 to 15:00
Dr Shan He, University of Birmingham

In this talk, Dr Shan He will briefly introduce his multi-disciplinary research in the areas of computational intelligence and computational biology. 

Firstly he will introduce his ongoing research in applying Computational Intelligence, e.g., evolutionary computation to metabolomics.  Then Dr He will present a novel ensemble-based feature selection algorithm for discovering putative biomarkers from high-dimensional omics data. Finally, he will present his work in simulating the evolution of animal self-organising behaviour using evolutionary agent-based modelling.

Developmental Evaluation in Genetic Programming

Monday 11 July 2011

11:30 to 12:30
Professor Bob McKay, Seoul National University, Seoul, Korea

We investigate interactions between evolution, development and lifelong layered learning in a combination we call Evolutionary Developmental Evaluation (EDE).  It is based on a specific implementation,  Developmental Tree-Adjoining Grammar Guided GP (DTAG3P).

Enhancement of Multiple Fibre Orientation Reconstruction in Diffusion Tensor Imaging by Single Channel ICA

Monday 11 July 2011

14:00 to 15:00
Dr Min Jing, University of Ulster

To date, diffusion tensor imaging (DTI) is the only non-invasive tool available to reveal the neural architecture of human brain white matter.  Advances in DTI techniques have shown great potential in the study of brain white matter related diseases such as depression, traumatic brain injury and Alzheimer's disease (AD).  In DTI, a reliable reconstruction of neural fibre structure relies on the accurate estimation of fibre orientation distribution function (fODF) from each individual voxel in diffusion weighted images (DWI).

Robust and Semi-fragile Watermarking Techniques for Image Content Protection

Tuesday 12 July 2011

11:00 to 12:00
Mr Zhao Xi

With the tremendous growth and usage of digital images nowadays, the integrity and authenticity of digital content is becoming increasingly important and of major concern to many government and commercial sectors. In the past decade or so, digital watermarking has attracted much attention and offers some real solutions in protecting the copyright and authenticating the digital images. Four novel robust and semi-fragile transform based image watermarking related schemes are introduced. These include wavelet-based contourlet transform (WBCT) for both robust and semi-fragile watermarking, slant transform (SLT) for semi-fragile watermarking as well as applying the generalised Benford’s Law to estimate JPEG compression, then adjust the appropriate threshold for improving the semi-fragile watermarking technique.

International Workshop on Bismuth-Containing Semiconductors

Monday 18 July 2011

09:00 to 17:00

There is substantial interest in developing new classes of semiconductor and thermoelectric materials exploiting the properties of Bismuth. Such materials are increasingly important for the development of optoelectronic, thermoelectric and electronic devices. These include materials for laser diodes (used for optical communications, DVD systems etc.), light emitting diodes solar cells, transistors and spintronic devices. Following on the success of the first international workshop on Bismuth-containing materials held in Michigan in 2010, this meeting will bring together groups undertaking research in the emerging area of Bismuth-containing materials and devices for a focussed three-day workshop. This is an interdisciplinary meeting bringing together physicists, chemists, materials scientists and engineers together to address this important emerging area. Topics will focus on theoretical activities, epitaxial growth, characterisation (optical, electrical and structural) and device performance of interest to both academic and industrial researchers.

Video Watermarking and Forensics

Monday 18 July 2011

13:30 to 14:30
Mr Syamsul Yahaya

Video Watermarking and Forensics is the next talk in the Watermarking series of events.

Scalability Aspects of Remote Voting Systems

Tuesday 19 July 2011

14:00 to 15:00
Mr Harshana Liyanage

Advances in electronic voting have made it possible to run more robust and transparent elections than previously possible with traditional paper based voting. The higher security guarantees given through electronic voting intends to raise standards of democracy in modern society and reduce the possibility of election malpractices. Despite having these obvious benefits, the rate at which electronic voting systems are adopted across the world, especially for legally binding elections, has been very slow. Only a few countries have successfully conducted elections at national level such as Estonia and Switzerland. The voter population in these countries are comparatively lower and the voting systems are in most instances integrated to existing security infrastructures.  However, in recent elections there has been speculation as to the adequacy of security used for these elections.

Estimation of Single Trial ERPs and EEG Phase Synchronization with Application to Mental Fatigue

Thursday 21 July 2011

10:30 to 11:30
Miss Delaram Jarchi

Monitoring mental fatigue is a crucial and important step for prevention of fatal accidents.  This may be achieved by understanding and analysis of brain electrical potentials.  Electroencephalography (EEG) is the record of electrical activity of the brain and gives the possibility of studying brain functionality with a high temporal resolution.  EEG has been used as an important tool by researchers for detection of fatigue state.  However, their proposed methods have been limited to classical statistical solutions and the results given by different researchers are somehow conflicting.  Therefore, there is a need for modification of the existing methods for reliable analysis of mental fatigue and detection of fatigue state. 

Participatory Sensing: Qualitative Changes in Information and Social Networks

Thursday 21 July 2011

11:30 to 12:30
Mr Aaron Mason

Recent technological advances have caused an infrastructural paradigm shift and the rapid growth of communities that are connected by virtual means.  The value of the Web is growing constantly, with ever more users joining and contributing to the network.  Fortunately, unlike conventional social networks, the connections in a virtual setting are clearly visible for analysis

Orthogonal Least Squares Regression: An Efficient Approach for Parsimonious Modelling from Large Data

Wednesday 27 July 2011

14:00 to 15:00
Professor Sheng Chen, University of Southampton

The orthogonal least squares (OLS) algorithm, developed in the late 1980s for nonlinear system modelling, remains highly popular for nonlinear data modelling practicians, for the reason that the algorithm is simple and efficient, and is capable of producing parsimonious nonlinear models with good generalisation performance.  Since its derivation, many enhanced variants of the OLS forward regression have been developed by incorporating the recent developments from machine learning.  Notably, regularisation techniques, optimal experimental design methods and leave-one-out cross validation have been combined with the OLS algorithm.  The resultant class of OLS algorithms offers the state-of-the-arts for parsimonious modelling from large data.  

Perception at the Green Man Festival

Friday 19 August 2011

Einstein's Garden at the Green Man Festival this year will be supported by the Department of Computing.  As part of the "Science at Play" exhibit, Matthew Casey will be lending his expertise to a series of activities themed around perception.

CLEO Pacific Rim 2011

Monday 29 August 2011

CLEO Pacific Rim, 29 August - 1 September 2011, Sydney, Australia

Physical Aspects of Polymer Science IoP Conference

Monday 12 September 2011

The Institute of Physics Polymer Physics Group 25th biennial Polymer conference is hosted by the University of Surrey this year. The local organiser is the Department's Joe Keddie.

Group IV Photonics Conference

Wednesday 14 September 2011

09:00 to 17:00
Roel Baets, Ghent University "Building a Sustainable Future for Silicon Photonics" Shrenik Deliwala, Analog Devices Inc., USA "Integrated Optical Receivers"

8th IEEE Group IV Photonics Conference - 14 - 16 September 2011, London

ECOC 2011

Sunday 18 September 2011

ECOC, 18-22 September 2011, Geneva, Switzerland

The Cyber Threat: Into the Danger Zone!

Wednesday 21 September 2011

14:00 to 15:00
Dr Alastair MacWillson, Accenture Technology

Our next Department Seminar speaker will be Dr Alastair MacWillson, Global Managing Director at Accenture Technology Consulting, London.  

With the number of ‘cyber attacks’ on the rise, targeting government and industry across the globe, it is clear that most organisations are now facing a whole new category of threat.  At the same time, inherent weaknesses in enterprise IT and ineffective approaches to information security are putting organisations at risk as never before.   There is a growing realisation that confronting these advanced threats calls for a whole new doctrine of defence.  Keeping pace with the digital arms race requires constantly re-evaluating your position against the threats and adapting your information security strategies.   Intelligence gathering has become an essential core competency for every security team.   

WSMS lecture - Environmental risks of Nanomaterials

Tuesday 4 October 2011

Dr Alison Crossly, Oxford University

Environmental risks of Nanomaterials

Development and Analysis of Advanced Image Steganalysis Techniques

Wednesday 5 October 2011

12:00 to 13:00
Mr Ainuddin Wahid Abdul Wahab

Steganography is the art of providing a secret communication channel for the transmission of covert information. At the same time, it is possible that it can be used by cybercriminals to conceal their works. This potential illegal use of steganography is the basis for the objectives in this thesis. This thesis initially reviews the possible flaws in current implementations of steganalysis. By using images from different camera types, this thesis confirms the expectation that the steganalysis performance is significantly affected by the differences in image sources. In this thesis we prove that image compression in a steganalysis process has an impact on the steganalysis performance, as claimed in the literature. A review of currently available steganalysis techniques, along with a proposal to overcome the said problems is also presented in this thesis. 

Jim Meets Dara O'Briain

Wednesday 5 October 2011


An evening in conversation with comedian and commentator Dara O’Briain, chaired by Professor Jim Al-Khalili, Professor of Public Engagement at the University of Surrey and BBC television presenter.

Buy tickets

An Artificial Neuromodulatory System for Improved Control of a Walking Robot

Thursday 6 October 2011

15:30 to 16:30
Ms Beatrice Smith, PhD student in Department of Electronic Engineering

The autumn series of Nature Inspired Computing and Engineering Research Group seminars begins with our first seminar on Thursday 6th October. 

This talk will present a controller tuning algorithm inspired by the ‘Bayesian brain’ hypothesis; that is the brain models its environment in terms of probabilities, and uses approaches similar to those used in Bayesian statistics to make decisions. The tuning algorithm combines this theory with current understanding of neuromodulatory system, specifically the idea that neuromodulation is a mechanism for adjusting the hyperparameters of learning algorithms. It has been applied to three different components of a walking robot controller; the leg coordination component, which guides the robot towards a target while avoiding obstacles, the trajectory planning component which calculates the paths of each individual leg, and the tracking controller, which ensures the desired path is followed. The final controller demonstrates adaptability and robustness, as well as being reliable and improving efficiency by reducing power and torque requirements..

CES Seminar: 'Moving Mountains?' The potential role of religions and faith communities in sustainable development.

Thursday 6 October 2011

13.00 hrs to 14.00 hrs
Ian Christie, Research Fellow, CES

Ian Christie, will present the following seminar: 'Moving Mountains?' The potential role of religions and faith communities in sustainable development.

MSF Seminar 1

Friday 7 October 2011

15:30 to 16:30
Dr Shujun Li, Senior Lecturer in the Department of Computing

This seminar given by Dr Shujun Li will kick off a series of seminars run by the MSF group.

A general method for recovering missing DCT coefficients in DCT-transformed images is presented in this work. We model the DCT coefficients recovery problem as an optimization problem and recover all missing DCT coefficients via linear programming. The visual quality of the recovered image gradually decreases as the number of missing DCT coefficients increases. For some images, the quality is surprisingly good even when more than 10 most significant DCT coefficients are missing. When only the DC coefficient is missing, the proposed algorithm outperforms existing methods according to experimental results conducted on 200 test images. The proposed recovery method can be used for cryptanalysis of DCT based selective encryption schemes and other applications. We also discuss possible extension of the optimization model to some other problems in multimedia coding, and security and forensics.

IEEE Photonics Society Annual Meeting 2011

Sunday 9 October 2011

IEEE Photonics Society Annual Meeting, 9-12 October 2011, Arlington, Virginia, USA

Singular Spectrum Analysis and its Application in Physiological Signal Separation

Thursday 13 October 2011

15:30 to 16:30
Dr Saeid Sanei, Reader in the Department

Most of the subspace based signal separation methods are applicable when sufficient number of signal mixtures are available which require multichannel recordings. Separation of signal sources from single channel recordings on the other hand is often of very poor quality, if not impossible, since so-called subspaces of the signal components are unknown. 

Singular spectrum analysis (SSA) deals with decomposition of the data into more meaningful subspaces where the desired signal components are characterised. Periodic signals, spikes, and those for which some a priori knowledge is available can be well defined in the eigenspace of the SSA. Some applications of this approach will be explained and a new SSA-based adaptive filter for recovery of periodic physiological signals from their single channel mixtures will be presented.

MSF Seminar 2b

Friday 14 October 2011

15:30 to 16:30
Mr Philip Bateman

This paper introduces a novel area of research to the Image Forensic field; identifying High Dynamic Range (HDR) digital images. We create and make available a test set of images that are a combination of HDR and standard images of similar scenes. We also propose a scheme to isolate fingerprints of the HDR-induced haloing artefact at “strong” edge positions, and present experimental results in extracting suitable features for a successful SVM-driven classification of edges from HDR and standard images. A majority vote of this output is then utilised to complete a highly accurate classification system.

MSF Seminar 2a

Friday 14 October 2011

15:30 to 16:30
Ms Hui Wang

In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localize the tampered areas, while tolerating some non-malicious manipulations. Moreover, some researchers proposed self-restoration schemes to recover the tampered area in semi-fragile watermarking schemes. In this paper, we propose a novel fast self-restoration scheme resisting to JPEG compression for semi-fragile watermarking. In the watermark embedding process, we embed ten watermarks (six for authentication and four for self-restoration) into each 88 block of the original image. We then utilise four (44) sub-blocks' mean pixel values (extracted watermarks) to restore its corresponding (88) block's first four DCT coefficients for image content recovering. We compare our results with Li et al. and Chamlawi et al. DCT related schemes. The PSNR results indicate that the imperceptibility of our watermarked image is high at 37.61 dB and approximately 4 dB greater than the other two schemes. Moreover, the restored image is at 24.71 dB, approximately 2 dB higher than other two methods on average. Our restored image also achieves 24.39 dB, 22.98 dB 21.18 dB and 19.98 dB after JPEG compression QF=95, 85, 75 and 65, respectively, which are approximately 2.5 dB higher than other two self-restoration methods.

NICE Seminar 3

Thursday 20 October 2011

15:30 to 16:30
Mr Spencer Thomas

Next in the series of the autumn seminars.  All are welcome to attend.  Details to follow.

MSF Seminar 3

Monday 24 October 2011

16:00 to 17:00
Mr Syamsul Yahaya

Digital video are widely used in today’s society due to the availability of a wide range of affordable digital video cameras with different specifications and functions. The manipulation of digital video is made simple with easily available processing tools, making it harder to trust them. This is where the role of digital forensics becomes important; to ensure the integrity of the evidence is restored. Digital forensics helps by providing some essential information about a video, such as to tracing the source of a digital video to the device that captured it. In this research, we propose a video camera identification technique based on the conditional probability features (CP Features). Specifically we focus on its performance for identification of video sources using cameras of different models. Using three cameras of different model, we demonstrate that the CP Features are able to correctly match the test video frames with their source. These findings provide a good indication that CP Features are suitable for digital video forensics.

NICE Seminar 4

Thursday 27 October 2011

16:30 to 17:30
Dr David Corney

The next in the series of NICE seminars.  Details to follow.

BCS Seminar

Thursday 27 October 2011

19:00 to 21:30

A British Computer Society event.  This event is open to Members and Non-Members. Students are particularly welcome.

Please see the Branch website for further details.

Knowledge Transfer – a non academic perspective

Thursday 27 October 2011

13.00 hrs to 14.00 hrs
David-Huw Owen, Visiting Researcher CES
Knowledge transfer (KT) is a term most commonly associated with academic-to-business interactions involving the transfer of academic IP, expertise, learning and/or skills. However, non-academic knowledge transfer activity, and in particular the underlying communication and engagement techniques, approaches and methods involved, are necessary functions throughout many of today’s consultancy activities – particularly when it comes to environmental or science related projects and programmes.

Joint CES/RESOLVE/SLRG Seminar: RESOLVE Research and Implications for Policy and Practice

Monday 31 October 2011

13.00 hrs to 14.30 hrs
Ian Christie, CES/RESOLVE/SLRG, University of Surrey; Dr Nick Eyre, ECI, University of Oxford; Simon Roberts OBE, Centre for Sustainable Energy

For further information please visit:

WSMS November lecture - tbc

Tuesday 1 November 2011



WSMS December lecture - tbc

Tuesday 1 November 2011



New methods in boundary scattering theory: from Yangians to quantum affine algebras

Tuesday 1 November 2011

14:00 to 15:00
Vidas Regelskis (York)

Abstract: In this talk I shall present the "reflection Hopf algebra" formalism. This formalism may be used in boundary scattering theory and is a natural extension of the usual Hopf algebra for the analysis of the reflection processes. I shall give several examples where this formalism proved to be very useful. They include the (generalized) twisted Yangians in AdS/CFT correspondence and the coideal quantum affine algebra of the Deformed Hubbard Chain. The talk will be based on arXiv: 1010.3761, 1101.6062 and 1110.4596.

NICE Seminar 5

Thursday 3 November 2011

16:30 to 17:30
Dr Daniel Bush

Dr Daniel Bush is our next seminar speaker in this series of NICE seminars.  All are welcome to attend.

Rethinking Resilience: Reflections from the Christchurch Earthquake and Aftershocks

Thursday 3 November 2011

13.00 hrs to 14.00 hrs
Bronwyn Hayward, CES Visiting Fellow

On 4 September 2010, Christchurch, New Zealand was struck by a magnitude 7.1 earthquake causing extensive structural damage but not loss of live. On 22 February the city was hit by a shallow, violent aftershock, at magnitude 6.3, the quake killed over 180 people and ‘munted’ or destroyed thousands of homes. Since then over 8000 aftershocks of varying intensity have hit the city. In the six month period to July 2011, the community coped on average, with a magnitude 5 earthquake every 10 days. Working from a tent for 12 weeks on campus and living with ongoing suspension of local democracy in a cordoned central city, prompts this professional and personal reflection on the concept of resilience.

MSF Seminar 4 (A paper reading seminar)

Friday 4 November 2011

15:30 to 16:30
Mrs Areej Alfraih

Virtually all optical imaging systems introduce a variety of aberrations into an image. Chromatic aberration, for example, results from the failure of an optical system to perfectly focus light of different wavelengths. Lateral chromatic aberration manifests itself, to a first-order approximation, as an expansion/contraction of color channels with respect to one another. When tampering with an image, this aberration is often disturbed and fails to be consistent across the image. We describe a computational technique for automatically estimating lateral chromatic aberration and show its efficacy in detecting digital tampering.

Konstadinos Sfetsos - TBA

Tuesday 8 November 2011

16:00 to 17:00
Konstadinos Sfetsos (Patras)

Abstract: TBA

NICE Seminar 6

Thursday 10 November 2011

16:30 to 17:30
Dr André Grüning

Dr André Grüning will be our NICE seminar presenter this week.  Details to follow. We look forward to a good turnout for this interesting talk.

MSF Seminar 5

Friday 11 November 2011

15:30 to 16:30
Mr Ghulam Qadir

In this paper we have presented SULFA (Surrey University Library for Forensics Analysis) for benchmarking video forensics. This novel video library has been built for the purpose of video forensics specifically related to Camera identification and integrity verification. It contains original as well as forged video files, which will be freely available through university of surrey website. There are about 150 videos, collected from three camera sources, which are Canon sx220 (codec H.264), Nikon S3000 (codec MJPEG) and Fujifilm S2800HD (codec MJPEG). Each video is approximately 10 sec long with resolution of 240x320 and 30 frames per second. All videos have been shot after careful considering both temporal and spatial video characteristics. In order to present life like scenarios various complex and simple scene have been shot with and without using camera support (tripod).

Antennas and Propagation Short Course

Monday 14 November 2011

This short course course is designed to provide an overview of the fundamental principles associated with microwave and RF antennas and propagation. The course will present the underlying theory in an accessible manner, together with techniques for application of the theory to satellite and mobile communications scenarios as well as broadcasting and indoor wireless applications.

NICE Seminar 7

Thursday 17 November 2011

15:30 to 16:30
Dr Xiaoyan Sun

MSF Seminar 6

Friday 18 November 2011

15:30 to 16:30
Mr Ali Alshehri

Near field communication (NFC) is a standard-based wireless communication technology that allows data to be exchanged between devices (computers, TV, mobile, ...) that are a few centimeters apart. There will be a significant number of interesting applications (payment, ticketing, e-keys, mobile coupons, ...). One of these applications is mobile coupons (mCoupons), where users can get coupons from NFC mCoupon issuer (smart poster on the street or a NFC tagged newspaper) just by touching their (NFC-capable) mobiles. However, it would cause huge losses for companies if these coupons issued in uncontrolled way. Therefore, a secure protocol is needed to meet mCoupons requirements. Moreover, it must be formally verified, as all secure protocol must be, before building the system in the reality.

There is a proposed mCoupon protocol in the literature. Ali has formally analysed the protocol by using CasperFDR2. This is result in an attack founded. However, whether this attack is feasible in the really is another challenge especially with the different communication nature of NFC.

IP Networking Protocols and Technologies Short Course

Monday 21 November 2011

There has been a great advance in IP networking protocols and technologies in the recent years. This course introduces and explains in some depth the principles, protocols, technologies, services and standards used for Internet networking.

Paul Dirac and the Religion of Mathematical Beauty

Wednesday 23 November 2011

Graham Farmelo

This is one of the local branch of the Institute of Physics's general interest talks. All are welcome. 

CompSoc: Google's Andrew Walker Talk

Wednesday 23 November 2011

17:00 to 19:00
Andrew Walker

Sustainable Materials - with both eyes open

Thursday 24 November 2011

13.00 hrs to 14.00 hrs
Julian Allwood, University of Cambridge

20% of the world's CO2 emissions from energy and processes arise in the production of just five materials: steel, cement, plastic, paper and aluminium. Demand for these materials is likely to double in the next 40 years, but the industries that make them are already very efficient, so if we look ahead with one eye open - pursuing energy and process efficiencies only - we can't make a significant reduction in their impact.  However if, in addition, we look ahead with both eyes open - looking for opportunities to pursue material efficiency, to deliver the same services with less new material - we can make a much greater reduction in our impacts.  This talk, based on the £1.5m EPSRC funded WellMet2050 project, will explore the realities of future material efficiency, particularly for steel and aluminium goods.


NICE Seminar 8

Thursday 24 November 2011

15:30 to 16:30
Dr Tomoharu Nakashima Associate Professor at Osaka Prefecture University, Japan

Semantics for Noninterference Security

Thursday 1 December 2011

10:00 to 11:00
Dr. Annabelle McIver

NICE-MSF Joint Seminar

Thursday 1 December 2011

15:30 to 16:30
Mr Wissam Albukhanajer

MSF Seminar 8

Monday 5 December 2011

16:00 to 17:00
Prof Jianmin Jiang

The Neural Marketplace

Wednesday 7 December 2011

14:00 to 15:00
Prof Kenneth Harris

Process Systems Engineering and Environment

Thursday 8 December 2011

13.00 hrs to 14.00 hrs
Ali Hosseini, Lecturer, Chemical and Process Engineering, University of Surrey

There is a large body of literature regarding the choice and optimization of different processes for converting feedstock to bioethanol and bio-commodities; moreover, there has been some reasonable technological development in bioconversion methods over the past decade. 

MSF Seminar 9

Monday 12 December 2011

16:00 to 17:00
Mr Thomas P. Diakos

MSF Seminar 10

Monday 23 January 2012

16:00 to 17:00
Mr Philip Betaman

In this discussion, we build upon our novel research in High Dynamic Range (HDR) imaging for Image Forensics by comparing the 'halo' artifact with a similar artifact caused by JPEG compression, known as the 'ringing' artifact (Gibb's Phenomenon).  We briefly discuss the relationship between these two artifacts, how they appear in the Fourier transform space, and how reliable our scheme is at distinguishing between the two.  We also analyse and evaluate each step of our algorithm in order to optimise it for producing more accurate results.  Finally, a new framework for detecting the halo artifact is presented in reference to existing schemes that detect the ringing artifact, and our initial results will be discussed.

Cyber Security Threat Landscape and Microsoft Strategy

Wednesday 25 January 2012

15:30 to 16:30
Stuart Aston, Chief Security Advisor, Microsoft UK Ltd

Sustainable Lifestyles Research Group - Overview and Work in Progress

Thursday 26 January 2012

13.00 hrs to 14.00 hrs
Ian Christie, SLRG Fellow, CES

The DEFRA-funded research programme SLRG (2010-2013), directed by Prof. Tim Jackson of CES, has just completed its first full year, and initial results are coming in from fieldwork. In this seminar Ian Christie, a Fellow of CES and coordinator of the SLRG, presents an overview of the programme and discusses emerging findings and the policy and research context for the work

WSMS January lecture by Dr Ian Stone

Tuesday 31 January 2012

Dr Ian Stone, Brunel University(Metallurgy)

Material Efficiency in a Multi-Material World

Wednesday 1 February 2012

13.00 hrs to 14.00 hrs
Reid Lifset, Yale University

This seminar will examine how efficiency can be addressed in the context of materials choice and when considering that materials are almost always used together.  The overlap and tension between materials and product efficiency will be discussed as will the question of how we would recognise a materials efficiency economy if one existed.  Examples from packaging and the auto industry will be used to illustrate these topics.

MSF Seminar 11

Monday 6 February 2012

16:00 to 17:00
Miss Hui Wang

This is the last MSF group seminar we scheduled for the last semester, which was originally planned on 30th Jan but postponed to 6th Feb. After this seminar we will have a the new series of our group seminars for the new semester. This time Miss Hui Wang will report her study on a recent paper related to her research on semi-fragile watermarking for self-restoration.

Email forensics

Wednesday 8 February 2012

14:00 to 15:00
Prof Les Hatton, Kingston University, London

Practical Optimisation of Novel Continuously Variable Transmission Design

Thursday 9 February 2012

15:30 to 16:30
Dr Colin Bell

Advanced optimisation techniques have been empirically successful in hundreds of applications; however their complexity often means they are not utilised by individuals from other disciplines whom do not necessarily have the correct background or time to fully understand their potential. Whilst these techniques perform exceptionally well on test problems designed to catch out simpler optimisation approaches, in practical situations they are not always necessary. This presentation presents a remarkably simple optimisation technique that has been successfully used to improve the specific efficiency and general characteristics of a novel transmission system. Results are compared to a canonical genetic algorithm and discussed in relation to practical considerations.

Microwave Circuits and System Design Course

Monday 13 February 2012

The Course provides an introduction to the essential principles of microwave engineering. 

Department's MPhys Symposium

Tuesday 14 February 2012


Annual symposium where MPhys students give talks about their Research Years.

Seeing Through the Big Bang into Another World

Thursday 16 February 2012

Professor Sir Roger Penrose

Inaugural lecture delivered by Professor Sir Roger Penrose, world-leading mathematical physicist and long-term collaborator with Stephen Hawking.

The Accumulation Theory of Ageing

Thursday 16 February 2012

15:30 to 16:30
Dr Andre Grunning

Lifespan distributions of populations of quite diverse species such as humans and yeast seem to surprisingly well follow the same empirical Gompertz-Makeham law, which basically predicts an exponential increase of mortality rate with age. This empirical law can for example be grounded in reliability theory when individuals age through the random failure of a number of redundant essential functional units.

However, ageing and subsequent death can also be caused by the accumulation of "ageing factors", for example noxious metabolic end products or genetic anomalies, such as self-replicating extra-chromosomal DNA in yeast.

We first show how Gompertz-Makeham behaviour arises when ageing factor accumulation follows a deterministic self-reinforcing process. We go then on to demonstrate that such a deterministic process is a good approximation of the underlying stochastic accumulation of ageing factors where the stochastic model can also account for old-age levelling off of mortality rate.

Identity Issues and Management

Friday 17 February 2012

10:00 to 12:00
Mr David Birch, Director of Consult Hyperion

6th Form Lecture Series - Public-Key Cryptography

Wednesday 22 February 2012

17:00 to 18:00
Professor Steve Schneider

Cryptography has been around for thousands of years but the new Public-Key Cryptography is the foundation of secure internet communication and you use it every time you access a secure website. This talk will give a brief history and explain how public-key cryptography is so extraordinary and how it works using surprisingly simple mathematics (prime numbers, multiplication and powers), how you can construct your own public-key system, and how it is used in the real world across a wide range of applications.

Double our research income: Sharing my personal experience for EU Funding

Thursday 23 February 2012

15:30 to 16:30
Prof Jianmin Jiang

While NICE group seminars are supposed to share specific research activities, Prof Jianmin Jiang believe that it might be more useful to talk about funding to encourage share of experiences and secret weapons among colleagues in the department. There is an old Chinese saying that “I throw stones out in the hope to attract pieces of gold in”, which can be used to describe Prof Jianmin Jiang's motivation of this talk.

In this presentation, Prof Jianmin Jiang will talk about: (i) a brief introduction of European FP7 open funding schemes under call-9 (deadline 17th of April); (ii) How to bid for funding in FP7, his personal view; (iii) his personal plans and research activities.

The Delivery of Managed Security Services

Friday 24 February 2012

10:00 to 12:00
Mr Tony Dyhouse, Cyber Security Programme Director, QinetiQ

Tony Dyhouse will discuss some standards applicable to the fields of Information Assurance and Service Delivery; illustrating areas of commonality with regard to aim and approach.  Different mechanisms for the protection of CIA will be discussed from a point of view of risk transference and third party provision of services, including a look at potential conflict of interest and how that can be addressed.  Finally, a view on advancing technology and Cloud services.

The Light Fantastic - an evening with Prof Alf Adams

Monday 27 February 2012

19.00 (free drink* available from 18:00)
Alf Adams

Alf Adams "Grandfather of Modern Lasers" will present a lecture entitled 'Semiconductor Lasers Take The Strain' - at the Royal Society in London

WSMS Young Person Lecture Competition

Tuesday 28 February 2012

The IoM3 runs an annual lecture competition aimed at giving young people (defined such that competitors must be 28 or under on 1 June 2012) an opportunity to give a lecture of 15 minutes length on a topic related to materials, minerals, mining, packaging, clay technology or wood science.

Automatic Detection of Apneas and Other Medical Conditions Through Analysis of Breathing Patterns During Sleep

Thursday 1 March 2012

15:30 to 16:30
Mr Vassileios Balntas

Snoring may not only be unpleasant, but may also indicate some serious medical problems. Quite a few medical conditions are related to certain breathing sounds during sleep. Thus pattern analysis on such information becomes necessary. We present a system that is capable of recording overnight breathing sounds along with sensor data, and performs almost real time analysis using signal processing techniques. The analysis results can be used as a first indication concerning some serious medical conditions such as apnea, hypopnea and others. The system may also potentially be used for general sleep quality analysis and measurement. The first results from 400 patients show a high level of accuracy.

Also let me add that since this is a sleep related talk, and I wont be too technical, it is suitable for the people from the sleep clinic I know exists in the University.

Quality as a prerequisite for security in interoperable systems

Friday 2 March 2012

10:00 to 12:00
Peter Davies, Thales e-Security Technical Director

Considerable effort goes into specifying secure and security protocols and the equipment in which these are embodied. In most cases the specification concentrates on positive cases with very little concentration on failure modes.

This talk will concentrate on limitations that are imposed on our ability to make assertions about the security of a system where we are unable to understand the quality of the implementation. It will do so by examining the types of failure that have led to security system failures.

Finally, the talk will examine some of the extant security protocols and show that these provide very little support for identifying and guaranteeing the quality of components networked together in a distributed system.

Professional Information and Network Security – A Risky Business

Wednesday 7 March 2012

11:30 to 12:30
Dr Robert L Nowill, Director for Cyber, Consulting and Information Assurance at BT Security

Dr Nowill will present a view of Cyber and Cyber Security from the Telecommunications perspective, as well as covering the sort of work that professionals address in information and network security and related opportunities. This will be drawn from a wide range of experiences and examples with links to the National Cyber Security Strategy and how industry contributes, as well as how individuals may contribute at a personal level.

Reservoir Computing and Spike Timing Dependent Plasticity

Thursday 8 March 2012

15:30 to 16:30
Dr Scott Notley

Reservoir computing and the liquid state machine model have received much attention in the literature in recent years. We investigate using a reservoir composed of a network of spiking neurons, with synaptic delays, whose synapses are allowed to evolve using a tri-phasic spike timing-dependent plasticity (STDP) rule. The results of using a tri-phasic STDP rule on the network properties are compared to those found using the more common exponential form of the rule. It is found that each rule causes the synaptic weights to evolve in significantly different fashions giving rise to different network dynamics.


Thursday 8 March 2012

13.00 hrs to 14.00 hrs
Glyn Davies WWF-UK

The use of wild animal species as a source of meat is widespread in sub-Saharan Africa, with “bushmeat” being used directly for food and sold.  

Cyber: The Industry – Government Partnership

Friday 9 March 2012

10:00 to 12:00
Dr Andrew Rogoyski, Security Lead, Roke Manor Research

In recent years it has become clear that Government carries explicit or implicit responsibility for maintaining a nation’s security. Doctrine, policy and Government spend is well established in areas such as defence. However, in the emerging areas of cyber security, now identified by the UK Government as a Tier 1 threat, the relationship is different. In this case, security is provided primarily by industry experts, following the rapidly changing capabilities of the wider IT and communications industry. As such, Government(s) have little control over these global industries and must seek more sophisticated leveraged models to ensure the nation’s security is protected. Andrew will discuss some of the issues and developments associated with this subject, drawing upon his recent work for the Cabinet Office and parts of industry.

IoP talk: Mapping Galaxies

Wednesday 14 March 2012

19.00 to 20.00
Dr Rita Tojeiro

Over the last few decades astronomers have made enormous leaps in charting the Universe around us. Now, with accurate positions for millions of galaxies, we are finally able to trace the Cosmic Web in which we live. But these cosmic maps do far more than simply catalogue the contents of our Universe ­ they can help us to understand its origin and evolution as well as its ultimate fate. Cosmologist Dr Rita Tojeiro takes us on a voyage to the furthest reaches of space and explains how astronomers are unlocking some of the fundamental secrets of the Universe.

Data Mining of Portable EEG Signals for Sports Performance Analysis

Thursday 15 March 2012

15:30 to 16:30
Dr Matthew Casey

The mental ability of an athlete is as crucial as their physical performance. Achievement in high performance sport requires an appropriate ‘state of mind’, which is trained alongside the physical activity. However, quantification of mental state is needed to identify, train and improve it through coaching. With the advent of a new generation of portable, compact EEGs we can measure the neurocognitive activity of an athlete’s brain. We present evidence suggesting that the ‘state of mind’ of an athlete can be measured and compared. Measurements are taken from youth, near elite and elite (GB team) archers investigating:

  • quantification of archer EEG signals
  • correlation of EEG data across shots
  • correlation of EEG data across archers

Results demonstrate that there are measureable changes in EEG patterns during a shot with evidence suggesting that the patterns vary as a function of skill level, but not necessarily as a function of score.

This work was sponsored by the Surrey EPSRC KTA award and was done in collaboration with

  • Matthew Casey & Alan Yau, Department of Computing, University of Surrey
  • Keith M Barfoot, Alpha-Active Ltd
  • Andrew Callaway, Centre for Event & Sport Research, Bournemouth University

Department of Physics PhD Fair (Physics)

Wednesday 21 March 2012

The Fair is for anyone thinking of doing a PhD in 2012. There will be a talk by a current PhD student, plus info on choosing a project, funding, etc. All welcome.

9th Annual Computing PhD Conference

Wednesday 21 March 2012

10:00 to 17:00

On Wednesday 21st March 2012, the Department will hold its 9th Annual PhD Conference. The conference celebrates the work of all of our PhD students through presentations and posters, recognising their valuable contribution to computer science research. The purpose of the conference is to give students an opportunity to experience a conference environment as well as providing a showcase of the current research being performed in the department.

Professor Sir Christopher Snowden, the Vice Chancellor of the University of Surrey, will give an opening address at the conference, and two keynote speakers will present motivational talks (one in the morning and the other in the afternoon): Dr Alastair MacWillson, the Global Managing Director of Accenture Technology Consulting's global security practice, and Professor Dave Robertson, Head of Informatics, University of Edinburgh.

Opportunities and Barriers for the Development of Renewable Energy Projects in Greece. The Case of Solar Energy

Thursday 22 March 2012

13.00 hrs to 14.00 hrs
Eva Maleviti, Senior Researcher Visiontask, Greece

This project aims at demonstrating the process development of solar energy projects in Greece. 

Hierarchical Multi-Label Classification

Thursday 22 March 2012

15:30 to 16:30
Mr Ricardo CERRI, Visiting PhD Student form the University of San Paulo, Brazil

Hierarchical Multi-Label Classification is a complex classification problem where an instance can be assigned to more than one class simultaneously, and these classes are hierarchically organized with superclasses and subclasses, i.e., an instance can be classified as belonging to more than one path in a hierarchical structure. We investigate the use of a neural network method and a genetic algorithm in this classification task, and compared their performances with other methods in the literature.

Security in cyberspace: what is "good enough"?

Friday 23 March 2012

10:00 to 12:00
Mike St John Green, Deputy Director, Office of Cyber Security, Cabinet Office

Cyberspace is the new buzz word but what is cyberspace?  And what do we mean to "make it secure"? What is the role of the developer? Security is rarely seen as a business enabler - more an irksome and expensive disabler. How can we make security a valued capability? How does a developer determine what security features are proportionate, how much is good enough? And how do you demonstrate necessity and sufficiency to someone else, such as the person paying for it? This is really about risk management when applied to the security of IT systems but in this new connected world of cyberspace where the stakes are so much higher.

WSMS March Talk

Tuesday 27 March 2012

Ho-Yin Ng, Amanda Levete Architects/Materials

The Kalundborg Symbosis: What, who, when, how and why?

Wednesday 28 March 2012

13.00 hrs to 14.00 hrs
Jorgen Christensen

A presentation will be given on the Industrial Symbiosis at Kalundborg, Denmark, - the classic example of an industrial ecological network.  The history of the spontaneous evolution of the symbiosis is presented, from the very start up to the present situation.

Research Seminar by Dr Taku Komura

Wednesday 28 March 2012

12:00 to 12:00
Dr Taku Kamura

Dr Komura will be talking about Controlling objects with many degrees of freedom.

Surgical Skill Assessment through Instrument Motion Analysis (SENTIMENT)

Thursday 29 March 2012

15:30 to 16:30
Mr Phil Smith

The formal assessment of surgical skills has grown in importance over recent years, with increasing evidence that unstructured systems of assessment have poor reproducibility, large inter-observer variation and lack of quantifiable measures. A paradigm shift has therefore begun, with the emergence of more objective and quantitative tools devised to complement current practice. In this work we aim to, through computer vision algorithms, determine if instruments can be tracked with sufficient accuracy during surgery so that the quantitative data obtained can be directly related to surgical performance, across a range of cataract types, surgeons, and equipment.

This will therefore potentially contribute to: feedback on dexterity performance during surgery; formative assessment of surgical performance; surgical training and through a combination of all of the above, improved patient safety. We present a robust algorithm based upon SURF point detection and optical flow that is capable of measuring instruments movement throughout the course of many operation procedures. In addition, the current experiments have shown that such measurements are able to separate different levels of surgeons based on their operation videos and estimate their surgical skills.

London Dynamical Systems Group meeting (LDSG)

Friday 30 March 2012

13:30 to 17:00

On Friday March 30, the first London Dynamical Systems Group meeting (LDSG) of this year will taken place at the University of Surrey.

Fluids Seminar

Friday 30 March 2012

11am to 12noon
Dr Kevin Gouder, Department of Aeronautics, Imperial College, London

Turbulent Friction Drag Reduction Using Electroactive Polymer (EAP) and Electromagnetically-driven Surfaces

Aspects of Conformal and Superconformal Field Theories

Friday 13 April 2012


This conference is intended to discuss and review recent developments in conformal and superconformal field theories and to commemorate the work of Francis Dolan in this area. It will take place on Friday, 13th April 2012 in DAMTP, University of Cambridge.

Developing and deploying low-carbon energy technologies: prospects, progress and policies

Thursday 26 April 2012

13.00 hrs to 14.00 hrs
Peter Taylor, Chair in Sustainable Energy Systems, University of Leeds Associate of the Centre for Climate Change Economics and Policy

There is an urgent need to decarbonise global energy systems to tackle the twin challenges of mitigating climate change and improving energy security.

IoP Talk: Planetary Systems around Gas Giants and Ice Giants

Wednesday 2 May 2012

Dr Chris Arridge

The worlds of the giant planets Jupiter, Saturn, Uranus and Neptune are full of superlatives. Apart from the Sun they are the largest and most massive objects in our solar system and their influence is felt over enormous distances. The stunning rings around Saturn, and the large number of moons around most of the giant planets lead some people to think of them as miniature solar systems in their own right. Although often grouped together as “Gas Giants”, many planetary scientists make a further distinction and describe Jupiter and Saturn as Gas Giants, and Uranus and Neptune as Ice Giants, reflecting the importance of volatiles (such as water, methane, and ammonia) in the interiors and atmospheres of Uranus and Neptune. The interiors of the giant planets are also important natural laboratories for studying materials under high pressure and for studying the generation of global magnetic fields. The magnetic field of Jupiter is reasonably well understood, but the almost axisymmetrical field of Saturn, and the highly asymmetrical fields of Neptune and Uranus are much less well understood. Global planetary magnetic fields provide the cores for giant planetary magnetospheres with very different mass and energy sources compared to the Earth’s magnetosphere. 

This talk will describe recent results from missions to the giant planets of our solar system and ground/space-based observatories at 1 AU, looking at their interiors, magnetic fields, magnetospheres, and natural satellites. It will conclude with a discussion about current and future missions, focusing on missions to the poorly studied and understood Ice Giant, Uranus.

Innovations in data storage: MB to TB

Wednesday 2 May 2012

11:00 to 12:00
Mr Steve P Legg, IBM UK

Steve will give a view on data storage from the inside of some of the key innovations that facilitated the growth of storage density and arguably underpinned the Information Age.

Model-Based Innovation in Process Development - an Industrial Case Study

Wednesday 2 May 2012

14:00 to 17:00
Prof Costas Pantelides

Seminar, to be given by: Professor Costas Pantelides

Costas holds BSc(Eng.) and PhD degrees from Imperial College London, and an MS degree from the Massachusetts Institute of Technology. Costas is the Managing Director of Process Systems Enterprise Ltd, (PSE). Founded in 1997, PSE is now one of the world’s leading providers of advanced process modelling software and services. Costas is also a Professor of Chemical Engineering at Imperial College London.

Reservoir Computing

Thursday 3 May 2012

15:30 to 16:30
Mr Joe Chrol-Cannon

Reservoir Computing is a paradigm that has emerged during the last decade as viable model of how generic neural circuits can be applied to a range of classification and regression machine learning tasks.  Shown to deal elegantly with a range of real-world spatio-temporal signals such as speech and human motion, Reservoir Computing has demonstrated an advantage over more orthodox neural network techniques.

In this talk, we reveal our work on extending a Reservoir Computing model that can learn long-term, non-stationary data -- 50 years of weather data in our case.  To allow the neural circuit to adapt to seasonal and climatic changes over the time period, we apply a range of regulated Hebbian based plasticity rules to the neural synapses, as observed in real, biological neural networks from neuroscience.

Multi-Level Security (MLS) – What is it, why do we need it, and how can we get it

Thursday 3 May 2012

13:30 to 15:30
Dr Adrian Waller, Consultant, Thales

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Leverhulme Lectures

Thursday 3 May 2012

There will be a series of Leverhulme Lectures by Jon Aaronson (Tel Aviv). None of the talks will assume attendance at the previous (or future) talks. The first will be held on Thursday afternoon (time to be announced) and the second on Friday morning at 11am. The third talk is part of the one day ergodic theory meeting and will be held at 1.15pm on Friday. All three talks will be in room 39AA04. There is no funding (beyond expenses associated to the one day ergodic theory meeting to participating institutions) but we are happy to help with finding accommodation. 

Security issues for developers using Microsoft technologies

Friday 4 May 2012

10:00 to 12:00
Chris Seary, Consultant, Charteris

His first presentation will demonstrate application security threats, showing actual code exploits and how they can be prevented. This is based on Chris' experience as a security consultant, and also his time working as a developer. The presentation will involve actual demonstrations of various types of web site attack, with full code examples. Chris will then proceed to give an overview of the secure application lifecycle within a large organisation, and some of the issues faced. How do banks keep ahead of both external attackers and internal threats, such as rogue traders?

The second presentation will look at application specific methods for securing communications. This will delve into subjects such as WS-Security and WS-Federation. This is true application-level security, incorporating XML encryption methods. Many third party applications now offer a WS-Security authentication suite, allowing complex web service security facilities, such as federated identity.

Digital & Electronics Forensics Defined

Tuesday 8 May 2012

14:00 to 15:00
Mark Stokes, Head of Metropolitan Police Digital and Electronics Forensic Service

The talk will look at what is Digital Forensics as compared to what is termed "computer forensics" and will focus on mobile devices and solid state "Flash" memory, the tools and the techniques used to recover extant and deleted data. Mark will look at a case example; the East Midlands Printer Bomb. Mark will conclude with a look at how current trends in technology could question conventional wisdom in the recovery of data from digital devices.

Diploid Evolution in Varying Environments

Thursday 10 May 2012

15:30 to 16:30
Mr Robert Puddicombe

This research explores the impact of regional changes in conditions on the development of distinct groups in a population of diploid organisms.

In practice it involves computer modelling the growth of separate colonies of plants in different environments and developing appropriate measures of the changes in the population.

Security Aware - Cloud Computing Security & Best Practices

Friday 11 May 2012

10:00 to 12:00
Clinton Walker, Logica

Are you ‘if-ing’ about floating to the clouds? Are you hesitant about losing control and becoming weightless, having to deal with the hassle of changing tapes, refreshing equipment, costly overheads?  It’s not as bad as you think…you just need to plan and look ahead and don’t let anything cloud your vision. Just focus on what really matters to your business (longevity, cost, overheads, and the risk).  Be aware and understand the pros and cons of migrating to the cloud. Knowledge is power!

Areas to cover include:

  • What is cloud computing?
  • The drivers
  • Barriers to adoption
  • Approaches to cloud adoption
  • The risks and issues
  • Top concerns as quoted by CSA – 7 threats to cloud security
  • Compliance and security best practices

Banking Security: Attacks and Defences

Wednesday 16 May 2012

14:00 to 15:00
Dr Steven Murdoch, Cambridge University

Designers of banking security systems are faced with a difficult challenge of developing technology within a tightly constrained budget, yet which must be capable of defeating attacks by determined, well-equipped criminals. This talk will summarise banking security technologies for protecting Chip and PIN/EMV card payments, online shopping, and online banking. The effectiveness of the security measures will be discussed, along with vulnerabilities discovered in them both by academics and by criminals. These vulnerabilities include cryptographic flaws, failures of tamper resistance, and poor implementation decisions, and have led not only to significant financial losses, but in some cases unfair allocation of liability. Proposed improvements will also be described, not only to the technical failures but also to the legal and regulatory regimes which are the underlying reason for some of these problems not being properly addressed.

Slides for downloading (PDF, 8.63 MB)

Optimisation and Prediction of Computational Fluid Dynamic Mesh using Evolutionary Algorithms and Neural Network Surrogate Models

Thursday 17 May 2012

15:30 to 16:30
Mr Chris Smith

This research aims to use Evolutionary Algorithms (EA) to optimise Computational Fluid Dynamic (CFD) mesh for a turbulent jet. The Star-CD CFD package is used to construct, solve and post process the mesh and the Covariance Matrix Adaption Evolutionary Strategy (CMA-ES) algorithm is used to optimise the mesh. A Recurrent Neural Network (RNN) is also trained to predict converged CFD results, from un-converged data, aiming to reduce computation time when CFD simulations are needed for optimisation of either the CFD mesh or design of turbulent jets.

Results from a mesh optimisation loop were not positive, so attention was focused on training the RNN to predict converged CFD results and preliminary findings from this work have been encouraging.

In this talk we present the motivation, method, results and conclusions of all the work undertaken to date, as well as our future plans and ways in which the research can be further explored.

Learning and Teaching Lunchtime Seminar

Thursday 17 May 2012

1pm to 2pm
Kevin Wells, Andy Adcroft

FEPS Learning and Teaching seminars showcase some of the excellent teaching activity in the Faculty, as well as in expertise from outside to provide examples of best practice.

The Real Effects of Password Policies

Wednesday 23 May 2012

14:00 to 15:00
Dr Karen Renaud, University of Glasgow

Users are often considered the weakest link in the security chain because of their poor security behaviour. One area with a vast amount of evidence related to poor behaviour is that of password management.

We have a pretty good idea of the extent to which this behaviour impacts on the individual user’s personal security. Unfortunately, we don’t know what the impact of this kind of behaviour by a number of organisational employees is, on a larger scale, nor do we know how best to intervene so as to improve the general security of an organisation as a whole. Current wisdom mandates the use of policies to curb insecure behaviours but it is clear that this approach has limited effectiveness. Unfortunately, no one really understands how the individual directives contained in the policies impact on the security of the eco-system. Sometimes directives have unexpected side-effects which are not easily anticipated.

It would be very difficult to answer this question in a real-life environment. I will describe a simulation engine which models an organisation with employee agents using a number of systems over an extended period. The simulation is tailorable, allowing tweaking of particular system-wide settings in order to implement policy dictats so as to determine their potential impact on the security of the organisation’s systems.

This tool supports security specialists developing policies within their organisations by quantifying the longitudinal impacts of particular rules.

Infinite Ergodic Theory Workshop

Monday 28 May 2012

The format for the workshop will consist of 4 or 5 talks per day leaving plenty of time for mathematical discussions. The meeting will begin Monday afternoon and end at lunchtime on Friday.

WSMS May Talk

Tuesday 29 May 2012


- What is the greatest Material of all time?
- After what material should the current age be named?
- What will be the next defining material?
- What are the challenges that face Materials Science as a discipline?
- What contributions can/will materials science make in the next 20-50 years?

Time-space trade-offs in cryptographic enforcement mechanisms for interval-based access control policies

Wednesday 30 May 2012

14:00 to 15:00
Prof Jason Crampton, Information Security Group at Royal Holloway, University of London

The enforcement of authorization policies using cryptography has received considerable attention in recent years. Enforcement mechanisms vary in the amount of storage and the number of key derivation steps that are required in the worst case. These parameters correspond, respectively, to the number of edges and the diameter of the graph that is used to represent the authorization policy. In this talk we will consider a particular class of access control policies and the associated graphs. We then present a number of techniques for constructing a new graph that has a smaller diameter than the original graph but enforces the same authorization policy.

The talk is not really about access control or cryptography.  Rather, the problem of trade-offs in cryptographic access control gives rise to interesting constructions for reducing the diameter of directed acyclic graphs without adding too many edges.  It should be accessible to a general computer science audience.

Unsupervised Ensemble Learning and Its Application to Temporal Data Clustering

Wednesday 30 May 2012

15:30 to 16:30
Dr Yun Yang, University of Surrey

Temporal data clustering can provide underpinning techniques for the discovery of intrinsic structures and can condense or summarize information contained in temporal data, demands made in various fields ranging from time series analysis to understanding sequential data. In the context of the treatment of data dependency in temporal data, existing temporal data clustering algorithms can be classified in three categories: model-based, temporal-proximity and feature-based clustering. However, unlike static data, temporal data have many distinct characteristics, including high dimensionality, complex time dependency, and large volume, all of which make the clustering of temporal data more challenging than conventional static data clustering. A large of number of recent studies have shown that unsupervised ensemble approaches improve clustering quality by combining multiple clustering solutions into a single consolidated clustering ensemble that has the best performance among given clustering solutions. Hence my research concentrates on ensemble learning techniques and its application for temporal data clustering tasks.

The Secret Life of Stuff

Thursday 31 May 2012

13.00 hrs to 14.00 hrs
Julie Hill, Green Alliance

This talk will examine how much we know about the huge and varied consequences of our consumption of 'stuff', and discuss how successful we are being at addressing it, whether at the level of the individual, the locality, the nation or as a species.

Data Mapping and Transformation – Applications in Healthcare Computing

Wednesday 6 June 2012

14:00 to 15:00
Robert P Worden

The costs of delivering healthcare are made much higher by the poor level of integration between healthcare IT systems. Attempts to define information standards for the exchange of healthcare data, by international organisations such as Health Level 7 (HL7), have been at best partially successful. I describe an approach to integration based on semantic data mapping – mapping diverse data formats onto a common UML model of information, and automatically generating data transforms – which has the potential to reduce the cost and complexity of integrating healthcare IT systems. Progress in applying this approach in the UK is described.

Joint Source Coding and Encryption using Chaos and Fractals

Tuesday 12 June 2012

11:00 to 12:00
Dr. Kwok-Wo Wong, City University of Hong Kong

Source coding and encryption are the major operations required in the transmission of large amount of confidential information via a public network. Traditionally, these operations are performed independently. For example, the source sequence is first compressed using arithmetic coding; then the compressed sequence is encrypted using Advanced Encryption Standard (AES). In this seminar, two applications of nonlinear systems for joint source coding and encryption will be presented. For the lossless reconstruction of general binary sequences, a simple piecewise linear chaotic map is employed for simultaneous arithmetic coding and encryption. For lossy image compression, the integration of selective encryption in fractal image coding will be described.

Modeling dynamical and multi-modal computer vision data via non-linear probabilistic dimensionality reduction

Thursday 14 June 2012

11:00 to 12:00
Mr Andreas Damianou, University of Sheffield

The interactive metaclustering and visualization approach for Clustering and Visualization of Genomic Data

Tuesday 19 June 2012

14:00 to 15:00
Prof Roberto Tagliaferri, Università degli studi di Salerno, Italy

When dealing with real data, clustering becomes a very complex problem, usually admitting many reasonable solutions. Moreover, even if completely different, such solutions can appear almost equivalent from the point of view of classical quality measures such as the distortion value. This implies that blind optimisation techniques alone are prone to discard qualitatively interesting solutions.

In this seminar, an alternative approach to clustering, including the generation of a number of good solutions through global optimisation, the analysis of such solutions through meta clustering and the final construction of a small set of solutions through consensus clustering is presented.

Process Control Technology talk

Friday 22 June 2012

11:00 to 12:00
Professor Manabu Kano, Kyoto University, Japan

Within the Chemical Engineering seminar series, you are welcome to attend the following talk on process control technology, entitled: Development and Industrial Applications of Maintenance-Free High-Performance Virtual Sensing Technology

NOAA Director Presentation - Tom Karl

Wednesday 27 June 2012

10:00 to 11:00
Tom Karl, NOAA Director

Looking at Earth’s Climate

Tom Karl, L.H.D., shares his passion for observing and understanding our planet’s climate. Explore widely-shared questions about past, present and future states of the Earth’s climate. How do we look at Earth's climate? What do we know, and how do we know it? What are the limitations of our knowledge? Hear how the U.S. Global Change Research Program and the U.S. National Oceanic and Atmospheric Administration (NOAA) are addressing these vital questions, and how the answers impact our lives and livelihoods.  

Vision-based quality management of industrial processes in papermaking

Wednesday 27 June 2012

14:00 to 15:00
Prof. Heikki Kälviäinen, Lappeenranta University of Technology (LUT), Finland

Prof Jim Al-Khalili Speaker at Festival of Research

Tuesday 3 July 2012

16:30 to 17:15

“Is life quantum mechanical?”

Analysis and Understanding of the media content

Thursday 5 July 2012

15:00 to 16:00
Danilo Pau and Mirko Guarnera, STMicroelectronics, Italy

A system for setting water quality criteria and standards for China’s lakes

Monday 9 July 2012

13:00 to 14:30

Dr Jing Su is currently a visiting researcher based in the Centre for Environmental and Health Engineering.  She works as an Environmental science lecturer at the Chinese Research Academy for Environmental Sciences and is mainly involved in water resource management. 

An Industry Perspective

Thursday 12 July 2012

13.00 hrs to 14.00 hrs
Peter Caddock, KBR and Aspire Defence

An insightful, engaging and interactive session on delivering sustainability in practice.

Modelling For Component Health Monitoring Based on Changes in Natural Frequencies

Monday 16 July 2012

10:00 to 11:00
S. K. Maiti G.K. Devarajulu Chair Professor of Mechanical Engineering IIT Bombay Mumbai 400076

Professor S.K. Maiti of IIT Bombay will be visiting the University of Surrey to deliver a talk on structural health monitoring

Physics First Degree Ceremony

Tuesday 17 July 2012


Social media mining and multimedia analysis research and applications

Tuesday 31 July 2012

10:00 to 11:00
Dr Yiannis Kompatsiaris, Informatics and Telematics Institute, CERTH, Thessaloniki, Greece

Robust motion segmentation for on-line application

Wednesday 1 August 2012

11:00 to 12:00
Dr Vítězslav Beran, Department of Computer Graphics and Multimedia, Brno University of Technology, Czech Republic

An Analysis of the Ant Swarm Behaviour for Quarum Sensing: A New Direction for Bio-inspired Computing in Optimization

Tuesday 21 August 2012

14:00 to 15:00
Prof Hide Sasaki, Ritsumeikan University, Kyoto, Japan

Ant traffic flow increases with growing density. This characteristic phenomenon is different from any other systems of traffic flow. In this talk, I would describe a computational model for density-independent traffic flow in ant colonies that transport to new nests. Ants have two types of swarm behaviour: emigration and foraging. A precedence model in computational ecology focused on foraging trails. However, ants move on a much larger scale during emigration. They gauge nest density by frequent close approaches among them and time the transport of colony. This density assessment behaviour known as quorum sensing has not been discussed in the context of traffic flow theory. Based on the behaviour, we model ant traffic flow that is organized without the influence of changes in population density of colonies. The proposed model predicts that density-independent ant traffic flow only depends on the frequency of mutual close approaches. I would show how to verify this estimation of our model in comparison with robust empirical data that ant experts obtained from field researches. I would indicate how to organize a study of computational ecology, and in which direction you may expect technical contributions using the proposed model.

Supervised Learning –> From Biology to Computational Models

Friday 24 August 2012

14:00 to 15:00
Dr Filip Ponulak, Senior Scientist, Brain Corporation, San Diego, CA, USA

Ability to learn from instructions or demonstrations is one of the fundamental properties of the brain that is necessary to acquire new knowledge or to develop novel skills and behavioural patterns. Although the concept of instruction-based learning has been studied for several decades now, the biological basis of this process remains unrevealed.

Some questions that need to be addressed are: where and how to search for the instruction-based learning in the brain? What is the neural representation of instructive signals? How do the biological neurons learn to generate desired outputs given these instructions?

In the talk I will discuss a biologically plausible model of supervised learning that addresses the above questions. I will demonstrate properties of the model in the context of such tasks as prediction, classification or internal representations. I will argue that supervised learning can contribute to reliable and precise spike-based information processing in the nervous system even in the presence of noise of different origin.

Evolvable Systems Engineering – Overview HRI-EU

Wednesday 29 August 2012

14:00 to 15:00
Prof Dr Bernhard Sendhoff, President and Managing Director of the Honda Research Institute Europe GmbH

After an overview of the activities of the Honda Research Institute Europe, Prof Dr Bernhard Sendhoff will outline evolutionary optimization under the constraint of robustness. Different application domains will demonstrate the practical aspects of robust optimization. Systems engineering aims at integrating many different criteria into the optimal design of systems. He will argue that for biological as well as technical systems the high degree of spatial and temporal variability is an integral aspect of system design. Looking beyond robustness, Prof Dr Bernhard Sendhoff will introduce the biological concept of evolvability in the technical context of systems engineering. Prof Dr Bernhard Sendhoff will interpret evolvability as the capability of a technical system to respond to changes in the system's environment rapidly, efficiently and successfully.  

Finally, Prof Dr Bernhard Sendhoff will present a simplified application targeting the improvement of the evolvability of a technical system.

Morphable Models: unsolved problems and future directions

Wednesday 29 August 2012

14:00 to 15:00
Dr John Bustard, University of Southampton

Civil Engineering Research Seminar: Advances in self-compacting concrete

Wednesday 5 September 2012

13:00 to 14:00
Prof. Syed Ali Rizwan

Internet Voting in Australia

Thursday 13 September 2012

15:30 to 16:30
Roland Wen, School of Computer Science and Engineering, The University of New South Wales, Sydney, Australia

Internet voting is in the process of being adopted in Australia. The state of New South Wales recently used Internet voting on a large scale in the 2011 NSW State General Election. However there was a wide range of serious failures with the NSW iVote system in areas including transparency, scrutiny, engineering, risk assessment and oversight. In particular iVote did not provide verifiability, and moreover it experienced a number of critical incidents during the election. In this talk I will discuss these problems and the steps needed to avoid them in future. I will also give a brief overview of the plans in Victoria for Internet voting.

Compact energy-efficient magnetoresistive sensors for angle-, length and electrical current measurement in space applications

Friday 21 September 2012

11:30 to 13:30
Dr. Rolf Slatter, CEO, Sensitec GmbH, Lahnau, Germany

Identifying Surprising Events in Video, and Foreground/Background Segregation in Still Images

Friday 21 September 2012

15:00 to 16:00
Prof Daphna Weinshall, School of Computer Science and Engineering, Hebrew University of Jerusalem

Water Footprinting: Can We Agree On What We Are Measuring?

Tuesday 25 September 2012

12.30 hrs to 13.30 hrs
Dr Sarah McLaren Director, New Zealand Life Cycle Management Centre, Massey University, Palmerston North

Following on from carbon footprinting, water footprinting is currently the next “big issue” in environmental footprint of products and in consumers’ choices. However, currently there are a number of published methodologies to calculate a water footprint but no one internationally agreed method.  Methods can be broadly divided into those based on measuring the volume of water used and those assessing the impacts associated with that water use.  Furthermore, they vary in what is considered relevant for assessment. Is rainwater relevant for inclusion? Is evaporated water really lost from the system? Does it matter if water is withdrawn, used and then released back into different water shed? What does “water use” actually mean?

WSMS October Talk, Sustainable Materials: with both eyes open

Tuesday 2 October 2012

Presented by Julian Allwood, Cambridge University

- What is the greatest Material of all time?
- After what material should the current age be named?
- What will be the next defining material?
- What are the challenges that face Materials Science as a discipline?
- What contributions can/will materials science make in the next 20-50 years?

Adaptive Breast Radiation Therapy using Modelling of Tissue Mechanics

Wednesday 3 October 2012

14:00 to 15:00
Prabhjot Juneja, Institute of Cancer Research

PhD Within Three Years: How to Make a Mission Impossible Possible

Thursday 4 October 2012

15:30 to 16:30
Prof Yaochu Jin

In this seminar, I'll talk about some do's and don'ts in PhD study, in particular when our students are required to complete their PhD thesis in no more than 3.5 years after undergraduate study, which is almost a mission impossible. This talk is based on "Useful Things to Know About PhD Thesis Research" by H.T. Kung and "10 easy ways to fail a PhD" by Matt Might, and of course my own experience and understanding of doing a PhD. Hopefully these discussions can help our PhD students to achieve a mission impossible.

From Captcha to Captchæcker: Can we automate security and usability analysis of CAPCTHAs?

Monday 8 October 2012

16:00 to 17:00
Dr Shujun Li

CAPTCHAs are everywhere these days. Security and usability evaluation of CAPTCHA schemes is still an art rather than a science in the sense that it has to be done on an ad hoc basis and many steps have to be done manually. In this talk, the following questions will be focused: can we automate the security and usability evaluation process and if so to what extent? A new concept called Captchæcker (= Captcha + Checker) is proposed to automate the usability evaluation part based on machine learning, and to semi-automate the security evaluation part based on a dataflow programming framework called Reconfigurable Multimedia Coding (RMC, formerly known as Reconfigurable Video Coding = RVC). Some preliminary research results will be described and future work is explained.

The State of the Art of Multiple-Winners-Take-All Networks: Formulations, Models, and Applications

Tuesday 9 October 2012

14:00 to 15:00
Professor Jun Wang, Director of the Computational Intelligence Laboratory, Department of Mechanical and Automation Engineering, Chinese University of Hong Kong

Winner-take-all is a general rule commonly used in many applications such as machine learning and data mining. K-winners-take-all is a generalization of winner-take-all with multiple winners. Over the last twenty years, many K-winners-take-all neural networks and circuits have been developed with varied complexity and performance. In this talk, I will start with several mathematical problem formulations of the K-winners-take-all solutions via neurodynamic optimization, then present several K winners-take-all networks with reducing model complexity based on our neurodynamic optimization models. Finally, we will introduce the best one with the simplest model complexity and maximum computational efficiency. Analytical and Monte Carlo simulation results will be shown to demonstrate the computing characteristics and performance. The applications to parallel sorting, rank-order filtering, and information retrieval will be also discussed.

Deformable Objects

Wednesday 10 October 2012

14:00 to 15:00
Dr. Xianghua Xie, University of Swansea

Hyperspectral Imaging and its Applications

Wednesday 10 October 2012

14:00 to 15:00
Professor Stephen Marshall, Director of CeSIP, Deputy Head of EEE Department, Had of Image Processing Group, University of Strathclyde

What do bruised fruit, the United States of America’s Declaration of Independence and crime scenes have in common? Our understanding of them has all been enhanced by the use of hyperspectral imaging.

Hyperspectral imaging cameras can determine if objects being viewed are hot or cold, wet or dry, their fat and sugar content and the presence of certain chemical elements. Therefore, it has a diverse range of applications in areas such as pharmaceuticals, food technology and homeland security. Whereas conventional colour cameras capture light in just three spectral windows, hyperspectral cameras have the ability to capture an entire section of the electromagnetic spectrum at every pixel. There are a number of different techniques for hyperspectral image capture including pushbroom and optically tuned filters. New capture techniques are also being developed.

In the past hyperspectral cameras were bulky and expensive and so were mostly used by the military for remote sensing and surveillance applications. Today’s hyperspectral cameras are almost as small as a standard video camera. These latest developments in camera technology are moving hyperspectral imaging from the aircraft and the military surveillance station to the laboratory and the production line.

The astonishing range of industries where these laboratories and factories are based emphasises the relevance and importance of the growth of hyperspectral imaging technology.

In agriculture hyperspectral imaging can be used to determine if soft fruit, such as apples, are bruised below the surface and likely to have a short shelf life. Similarly, HSI technology can be used in Biomedical Engineering to reveal the extent of burns and bruises below the skin of the human body.

Hyperspectral imaging is playing an increasingly important role in forensic technologies. The detection of fingerprints at crime scenes and the analysis of inks to detect forged documents can all be carried out using the technology. Hyperspectral imaging has even helped to bring new insights to old documents. The Library of Congress’ Preservation Research and Testing Division has carried out work on discarded drafts of the American Declaration of Independence to uncover crossed out words. This research has helped to give modern historians a deeper understanding into Thomas Jefferson’s thought process.

As hyperspectral imaging generates an entire section of the electromagnetic spectrum in real time for every pixel of an image, the sheer volume of data it produces can be enormous. Therefore, it requires large data storage and throughput; efficient data reduction algorithms; and intelligent and selective image capture to develop a complete system.

In general, the end user in a laboratory or factory only need a standalone turnkey system to solve a particular problem, such as whether a pharmaceutical product is counterfeit or the extent of bruising in the fruit. Such systems require new and state of the art image processing algorithms to reach correct decisions in real time.

The keynote will give an overview of Hyperspectral Imaging technology and its applications to information-processing tasks.

Challenges in Interpreting Electronic Health Records and a Case Study in Calibrating eGFR

Thursday 11 October 2012

15:30 to 16:30
Dr Norman Poh

Electronic health records contain a wealth of information that has not been fully exploited. In the UK, clinical practices have been computerised since the 1990's whereas hospital episode data have been available since about 2005. The clinical informatics has gone significant advancement. It is possible to retrieve millions of patient records over time and across vendors and clinical practices.

In the first part of the talk, I will first present some challenges when processing and modelling health records. In the second part, I will present a case study based on the Quality Improvement Chronic Kidney Disease data set which contains nearly a million patient records. This case study shows how machine learning or pattern recognition techniques can be used to solve a data calibration problem, which otherwise, would have prevented the data from being used for epidemiology studies and worst, could lead to unnecessary referral of patients to specialists.

I will conclude the talk with a personal but possibly biased view of where research should be focused. There is plenty of room for contributions and opportunities for collaboration.

Biannual Civil Engineering Lecture, Celebrating Alumni Success with guest speaker: Honorary Dr Mike Glover OBE

Thursday 11 October 2012

18:15 to 19:30
Honorary Dr Mike Glover OBE

Civil Engineering is hosting the second lecture in the series celebrating the success of its graduates which provides a valuable opportunity for alumni networking.

Using Social-Network Metadata for Image Classification

Tuesday 16 October 2012

14:00 to 15:00
Dr Julian McAuley, University of Stanford

Network Analysis Characterising Structure, Complexity and Learning

Wednesday 17 October 2012

14:00 to 15:00
Professor Edwin Hancock, Department of Computer Science, University of York

This talk will focus on how graph-structures can be compactly characterised using measurements motivated by diffusion processes and random walks. It will commence by explaining the relationship between the heat equation on a graph, the spectrum of the Laplacian matrix (the degree matrix minus the weighted adjacency matrix) and the steady-state random walk. The talk will then focus in some depth on how the heat kernel, i.e. the solution of the heat equation, can be used to characterize graph structure in a compact way. One of the important steps here is to show that the zeta function is the moment generating functions of the heat kernel trace, and that the zeta function is determined by the distribution of paths and the number os spanning trees in a graph. We will then explore a number of applications of these ideas in image analysis and computer vision.

The Theory of Darwinian Neurodynamics

Thursday 18 October 2012

15:30 to 16:30
Dr Chrisantha Fernando, School of Electronic Engineering & Computer Science, Queen Mary, University of London

There are informational replicators in the brain. Response characteristics, e.g. orientation selectivity in visual cortex, are known to be copied from neuron to neuron. Through STDP small neuronal circuits can undertake causal inference on other circuits to reconstruct the topology of those circuits based on their spontaneous activity. Patterns of synaptic connectivity are replicating units of evolution in the brain. The space of predictions is unlimited; brains do sparse search in this model space. We've shown that Darwinian dynamics is efficient for sparse search compared to algorithms that lack information transfer between adaptive units. Darwinian dynamics in the brain implements approximate Bayesian inference.

It's not Rocket Science

Friday 19 October 2012

Ben Miller, Comedian

Professor Jim Al-Khalili introduces Ben Miller at the Guildford Book Festival.

A Celebration of the Code Breaker - Alan Turing

Saturday 20 October 2012

Apollo Theatre Company
Apollo Theatre Company - a group of local professional actors - using source material about Alan Turing will offer Dramatised Readings from the works of Andrew Hodges, Hugo Sebag-Montefiore, Sinclair McKay and Richard Aldrich - as a celebration of Alan Turing's 100th birthday anniversary. You are invited to join us to celebrate this occasion and honour a scientist to whom we owe so much. Turing spent much of his childhood in Guildford – acknowledged with Alan Turing Road, a statue and a building named after him housing the Department of Computing on the University of Surrey campus.

Jim Al-Khalili at Guildford Book Festival

Wednesday 24 October 2012


Prof Jim Al-Khalili presents his latest book Paradox at the Guildford Book Festival.

IOP South Central Branch Talk

Wednesday 24 October 2012

Prof Jon Butterworth, University College London

Discovery at the Large Hadron Collider

Children Citizenship and Environment: Nurturing a democratic imagination in a changing world

Thursday 25 October 2012

13.00 hrs to 14.00 hrs
Dr Bronwyn Hayward, Senior Lecturer in Politics, University of Canterbury NZ and Visiting Researcher Sustainable Life Styles Research Group /CES, University of Surrey.

Children growing up today are confronted by four difficult and intersecting challenges: dangerous environmental change, weakening democracies, growing social inequality, and a global economy marked by unprecedented youth unemployment and unsustainable resource extraction. Yet on streets everywhere, there is also a strong, youthful energy for change.

Heterogeneous Classifier Ensembles for EEG-Based Motor Imaginary Detection

Thursday 25 October 2012

15:30 to 16:30
Mr Shenkai Gu

EEG signal classification is a challenging task in that the nature of the EEG data may vary from subject to subject, and change over time for the same subject. To improve classification performance, we propose to construct heterogeneous classifier ensembles, where not only the base classifiers are of different types, but they have different input features as well. The classification performance of the proposed method has been examined on Berlin BCI competition III data sets IVa. Our comparative results clearly show that heterogeneous ensembles outperform single models as well as ensembles having the same input features.

Is DC-less JPEG compression possible?

Monday 29 October 2012

16:00 to 17:00
Mr Ching-Hung (Kadoo) Yuen, City University of Hong Kong, China

In this talk, Kadoo will be talking about his research done at Surrey Computing. It is about the application of discrete optimization to JPEG image compression. The main idea is to use global discrete optimization to achieve more advanced intra prediction of DC coefficients. The goal is to improve compression efficiency by significantly reducing the number of DC coefficients that need to be encoded. Therefore, this technique is called DC-less JPEG image compression.

The 5th Wave of Computing – do we have the skills to deliver?

Wednesday 31 October 2012

14:00 to 15:00
Mr David CLARKE, MBE, FBCS, CITP, MACM Chief Executive, BCS, The Chartered Institute for IT

The latest wave of technology development is being matched by equally significant changes in the way businesses, and organisations of all kinds, are doing business.  Could these changes make the UK a third world economy?

  • This combination of change is totally unprecedented
  • Application of technology is everything
  • But who has the combination of skills and knowledge to take full advantage of these changes?

One thing is for certain, those who have the skills and see the opportunities will be the winners.

Innovative Water and Energy Processes – Modelling Opportunities

Thursday 1 November 2012

15:30 to 16:30
Professor Adel Sharif, Civil, Chemical & Environmental Engineering, FEPS

Water is not just the essential ingredient for life, but also a fundamental factor in the economy and security of any country. Coupled with increased population and climate change effect, the availability of food, water, and energy are the biggest challenges that the world faces. Over the next two decades water demand will exceed water supply by about 40% according to many scientific studies and reports. Food and energy shortages have also been described by the UK Government's Chief Scientific Advisor, Prof. Sir John Beddington, to create the "perfect storm" by 2030.

The provision of drinkable supplies through desalination could offer a sustainable solution to the drinking water problem but also presents a technical challenge too.

Seawater and brackish water are desalinated by thermal distillation and membrane methods such as reverse osmosis (RO) and electrodialysis. All these methods involve high operating and investment costs. RO is the most widely used desalination techniques, while thermal methods are mainly used in the Gulf countries. However, the high operating cost of RO is due to essential pre-treatment, scaling, bio-fouling and the high-energy consumption.

Novel desalination and renewable power generation membrane processes have been invented and developed at the Centre for Osmosis Research and Applications at the University of Surrey in collaboration with Modern Water plc. The modelling opportunities in membrane processes involve flow and mass transfer of Forward and Reverse Osmosis Processes as well as hydrodynamic and colloidal Interactions. The CORA team is also working on thermally driven membrane processes such as membrane distillation as well as direct contact heart transfer exchanger for both desalination and power generation.

The talk will present the principles of the desalination and power generation processes, results and the areas which needs modelling and optimisation.

Towards 9 Billion - A positive vision for sustainability based upon innovation and abundance

Thursday 1 November 2012

13.00 hrs to 14.00 hrs
Joss Tantram, Director Terrafiniti

Joss Tantram is director of TERRAFINITI, a sustainable business and systems consultancy based in Guildford.  Terrafiniti’s major current programme of research and business consulting is called TOWARDS 9 BILLION. The core idea is that we should be trying to shape policies and market frameworks that would enable us to welcome the idea of a world of 9 billion people, not fear it, and to conserve and enhance natural capital and ecosystem services.

Stereopsis and 3D content conversion (from cinema-to-3DTV)

Monday 5 November 2012

16:00 to 17:00
Dr Lasith Yasaskethu

The ability to provide more exciting, informative and entertaining end-user visual experience has created an enormous interest among the viewers towards 3D content. Whereas traditional 2D video is sufficient for describing details of captured scenes, 3D video can provide more realistic representation of the same scene with the additional value of depth. The success of today’s 3D video services requires that the end users meet a satisfactory level of perceptual quality. 3D cinema and 3DTV have grown in popularity in recent years. Filmmakers have a significant opportunity in front of them given the recent success of 3D films. In this talk we investigate whether this opportunity could be extended from cinema to home in a meaningful way.

“3D” perceived from viewing stereoscopic content depends on the viewing geometry. This implies that the stereoscopic-3D content should be captured for a specific viewing geometry in order to provide a satisfactory 3D experience. However, although it would be possible, it is clearly not viable, to produce and transmit multiple streams of the same content for different screen sizes. To solve the above problem, we analyze the performance of several disparity-based transformation techniques, which could be used for cinema-to-3DTV content conversion.

Positron Imaging at Birmingham

Wednesday 7 November 2012

14:00 to 15:00
Dr Thomas Leadbeater, University of Birmingham

A Model for Learning the Optimal Control of Saccadic Gaze Shifts

Thursday 8 November 2012

15:30 to 16:30
Dr Sohrab Saeb Taheri

Human beings and many other species redirect their gaze towards targets of interest through rapid gaze shifts known as saccades, which are made approximately three to four times every second. While small saccades only rely on eye movements, larger ones result from coordinated movement of both eyes and head at the same time. Experimental studies have revealed that during saccades, the motor system manifests certain characteristics such as a stereotyped relationship between the relative contribution of eye and head to total gaze shift. Various optimality principles and several neural architectures have been suggested by researchers to explain these characteristics, but they do not involve incremental learning as a mechanism of optimization. Here, we suggest an open-loop neural controller with an adaptation mechanism which minimizes a proposed cost function. Simulations show that the characteristics of gaze shifts generated by this model match the experimental data in many aspects, in both head-restrained and head-free conditions. Therefore, our model can be regarded as a first step towards bringing together an optimality principle, a neural architecture, and an incremental learning mechanism into a unified control theory of saccadic gaze shifts.

Finite element analysis for wheel-soil interaction in multi-wheel systems

Thursday 8 November 2012

13:00 to 14:00
Juntao Qin

Stegobot: a covert social network botnet

Tuesday 13 November 2012

14:00 to 15:00
Dr Shishir Nagaraja, University of Birmingham

Stegobot is a proof of concept new-generation botnet where bots communicate over unobservable communication channels. It is designed to spread via social-malware attacks and steal information from its victims. Unlike conventional botnets, Stegobot traffic does not introduce new communication endpoints between bots. Command and control information as well as stolen sensitive information are relayed using steganographic techniques piggybacking over the image sharing behavior of users in a social network. Hence stolen information travels along the edges of the victims' social network. The current implementation is based on a simple routing algorithm called restricted flooding. The tuning of the steganographic channels is a key security parameter. It works surprisingly well in real world experimental deployments; even when tuned very conservatively (against detection) it is capable of channeling sensitive payloads of close to 100MB to the botmaster. See press coverage in the New Scientist, MSNBC, and a few others.

WSMS November Talk, Sustainable Materials: Effects of water absorption ageing on the properties of jute and flax fibre-biocomposites for marine application

Tuesday 13 November 2012

Presented by Hom Dhakal

Presented by Hom Dhakal, Advanced Polymer and Composites (APC) Research Group, University of Portsmouth

Emergence and Dynamics of Sensorimotor Circuits for Language, Memory and Action in a Model of Frontal and Temporal areas of the Human Brain

Wednesday 14 November 2012

14:00 to 15:00
Dr Max GARAGNANI, MRC Cognition and Brain Sciences Unit, University of Cambridge

I will present a neurocomputational model that we developed to simulate and explain, at cortical level, word learning and language processes as they are believed to occur in motor and sensory primary, secondary and higher association areas of the (inferior) frontal and (superior) temporal lobes of the human brain. Mechanisms and connectivity of the model aim to reflect, as much as possible, functional and structural features of the corresponding cortices, including well-documented (Hebbian) associative learning mechanisms of synaptic plasticity. The model was able to explain and reconcile seemingly incongruous results on neurophysiological patterns of brain responses to well-learned, familiar sensory input (words) and new, unfamiliar linguistic material (pseudowords), and made novel predictions about the complex interactions between language and attention processes in the human brain. To test the validity of these predictions we carried out a new MEG study in which we presented subjects with familiar words and matched unfamiliar pseudowords during attention demanding tasks and under distraction. The experimental results indicated strong modulatory effects of attention on the brain responses to pseudowords, but not on those to words, fully confirming the model's predictions.

In the second part I will illustrate how the same six-area network architecture, implementing the same functional features, can be used to model and explain also cortical mechanisms underlying working memory processes, in the language as well as in the visual domain. In particular, I will present new simulation results that provide a mechanistic answer to the question of why "memory cells" (neurons exhibiting persistent activity in working memory tasks that require stimulus information to be kept in mind in view of future action) are found more frequently in prefrontal cortex and higher sensory areas than in primary cortices, i.e. far away from the  sensorimotor activations that bring about their formation (a phenomenon that we refer to as "disembodiment" of memory). The results point to the intrinsic connectivity of the sensorimotor cortical structures within which the correlation learning mechanisms operate as to the main factor determining the observed topography of memory cells.

Benchmarking for semi-fragile DCT based watermarking for Image Authentication and Restoration

Monday 19 November 2012

16:00 to 17:00
Miss Hui Wang

High quality of recovered image need much more information input as watermark. However, if we want guarantee a certain level of invisibility of watermark and its robustness to some normal image processing, the capacity of watermark is limited. It’s hard to balance each other to get a good performance. This paper reports a systematic approach for benchmarking semi-fragile watermarking algorithms for authentication and restoration. The benchmarking approach is based on a generic dataflow framework of all semi-fragile authentication-restoration watermarking systems and it defines a set of performance metrics that reflect different aspects of the overall performance. Both non-malicious manipulations and attacks are modelled by a channel simulator between the sender and the receiver. The benchmarking process can be done at two levels: system level and component level. The system level benchmarking is the one normally conducted in the literature where a number of algorithms are compared without considering their internal structures. The component level benchmarking is done by reconfiguring only one component of an existing algorithm in order to observe the influence of the component to the final performance of the whole system. Following the benchmarking approach, a software system was developed to benchmark three selected semi-fragile authentication-restoration watermarking algorithms working in DCT domain and variants of the three algorithms. The benchmarking results lead to some insights about how to further improve performance of existing algorithms.

IOP South Central Branch November Talk

Wednesday 21 November 2012

Alok Jha, Guardian Science Correspondent

Is the end of the world really nigh?

IoP Talk: Is the End of the World Really Nigh?

Wednesday 21 November 2012

Alok Jha

Measuring, Modeling And Verification of Light-Matter Interaction Phenomena

Wednesday 21 November 2012

11:00 to 12:00
Dr Kai Berger, University of Oxford

CRC Energy Efficiency Scheme - is bad policy better than no policy

Thursday 22 November 2012

13.00 hrs to 14.00 hrs
John Davis, Sustainability and Environmental Manager, University of Surrey

The CRC requires large organisations to measure their annual carbon dioxide emissions and charges them £12 for every tonne they produce. The original intention was that it should be revenue neutral. A league table of achievements would be created with those at the bottom being financially penalised whilst those at the top would be rewarded. The intention was that this would create financial and reputational incentives for carbon saving.

Multiscale oblect detection in FPGA

Thursday 22 November 2012

11:00 to 12:00
Prof Pavel Zemcik, Graph@FIT, Faculty of Information Technology, BUT Brno, CZ

SEPnet Students' Expo

Wednesday 28 November 2012

10:00 to 16:30

Topology Optimization of Trusses by Vectorized Structure Approach

Thursday 29 November 2012

15:30 to 16:30
Mr Ayang Xiao

A new method called vectorized structure approach is proposed for truss topology optimization, which effectively increases or reduces the structure elements by iteratively adding or removing nodes and bars. The approach was developed on structural vectorization using nodes’ coordinates. The mapping relationship between structural vectors and realistic structures is established by the geometry composition analysis rules. Therefore, the approach can generate the optimal solution contains the given set of required nodes. Two kinds of topology optimization methods are considered. The first method sorts vector elements in every mapping process and the second method just consider sorting elements itself to be part of optimizing process. The numerical experiments have shown that both methods are effective.

Surrey Computing to host the next CryptoForma meeting

Thursday 29 November 2012

10:30 to 17:00
To be announced

Surrey Computing will be hosting a one-day meeting on November 29th on Cryptography and Security. The meeting is one in a series run within the the EPSRC CryptoForma network which aims to build an expanding network in computer science and mathematics to support the development of formal notations, methods and techniques for modelling and analysing modern cryptographic protocols. This work increases security and confidence in such protocols and their applications (e.g. in e-commerce and voting), to the benefit of protocol designers, businesses, governments, and application users.

Civil Engineering Research Seminar - November part 2

Thursday 29 November 2012

14:00 to 15:00
Prof. Mukesh Khare

Rule Based Estimation of JPEG2000 Compression Rates by Using Double Compression Calibration

Monday 3 December 2012

16:00 to 17:00
Mr Ghulam Qadir

Processing history recovery is a branch of digital forensic that deals with non-malicious processing such as image compression. Different types of compression leaves different artefacts which make it harder to have a universal audit trail process. This paper investigates the processing history of a JPEG2000 compressed images. We present a novel rule based compression strength estimation technique for JPEG2000 images. The technique uses a no-reference (NR) perceptual blur metric and double compressions calibration to produce a heuristic rule based algorithm, which classifies an image into three compression categories. These categories are derived subjectively and represent high, medium and low compression for a compression range of 0.1 to 0.9 bits per pixel (bpp). The technique works based on the assumption that blur artefact contained in a JPEG2000 compressed image can be linked to blur artefact contained in the calibrated double compressed image. Based on this observation, three ratios can be calculated by comparing the levels of blur of the target image and its calibrated editions, which can then be used to form three rules each corresponding to a category of JPEG2000 compression strength. For our experiments we have used 100 images to identify rules and 100 for blind testing of our scheme. Comprehensive testing showed that the compression rate of JPEG2000 images can be estimated into high, medium and low compression category with 90% accuracy.

WSMS December Talk, Food is for Life - not just for Christmas

Tuesday 4 December 2012

Presented by Kathy Groves, Leatherhead Food Research

As scientists you will be familiar with using science in your area of expertise but as Christmas comes up and thoughts turn to festive food and what to have for the dinner, have you thought about how science is used to prepare the food you see in the supermarket?
This talk will focus on looking at food under the microscope and how using science, especially microscopy, helps the food industry develop new products or improve ones already out there. Examples of light and electron microscopy of foods will be combined with some examples to taste!

The Virtual Video Camera: Free viewpoint video for VFX production

Tuesday 4 December 2012

14:00 to 15:00
Christian Lipski, Computer Graphics Lab, TU Braunschweig, Germany

PG Open Day Fair

Wednesday 5 December 2012

Faculty of Engineering & Physical Sciences PG Open Day Fair

SEPnet RDI Seminar

Wednesday 5 December 2012

16:15 to 17:45
Dr Silvia Pani, University of Surrey and Dr James Nikkel, Royal Holloway University of London

Modelling Brain Cortical Connectivity Using Diffusion Adaptation

Thursday 6 December 2012

15:30 to 16:30
Mr Kostas Eftaxias

The concept of brain connectivity is introduced to explore and understand the organized structure of cortical regions, during the execution of a specific task. Popular methods for measuring brain connectivity include synchronization, coherency and correlation among EEG sites and exploiting the statistical properties of the EEG signals to define the direction of the information flow between the cortical regions. Our approach on the problem of brain connectivity uses the theory of time-space adaptive filters. We use a network of adaptive filters that is self-organised in space and evolves through time in order to model a certain pattern of propagation of EEG signals. Exploiting the properties of these filters can lead us to a robust and flexible method, which can be used in a variety of applications.

Jets and the Higgs Boson - latest news from the LHC

Thursday 6 December 2012

Professor John Butterworth, UCL

Departmental Seminar:  Jets and the Higgs Boson - latest news from the LHC

Safeguarding identity using biometrics: Is it time-tested?

Monday 10 December 2012

14:00 to 15:00
Dr Norman Poh

There is an ever increasing need of identity authentication in our daily life, from making purchase online and unlocking personal devices to accessing secure premises. Although physical lock, PIN and gesture (which is common for mobile devices) offer convenient solutions, only biometrics based authentication can provide the ultimate means of validating the identity credential. The use of biometric authentication entails many questions, especially when it is used over a long period of time and in different locations: Will the system performance degrade over time? How will its performance be affected by different acquisition environments, such as the office environment, public locations, and outdoor?

Tensor-based representations and Boosted Kernel Learning for Content-Based Image Categorisation

Tuesday 11 December 2012

14:00 to 15:00
Prof Philippe Gosselin, ENSEA, Paris, France

ATI showcase event at NPL on 12 December 2012

Wednesday 12 December 2012

This event, titled "Hybrid organic-inorganic nanomaterials for functional devices: processing and metrology" will showcase the work of the University of Surrey ATI and partner groups. It will also provide opportunities for networking towards the development of new consortia for collaborative R&D or commercial projects, and the engagement of academia and industry with the nanomaterials, devices, processes and metrology focus areas. 

There will be optional tours to discuss the capabilities and activities of two key NPL facilities relevant to this community - the Nanoanalysis group (hosted by Alex Shard) and the Polymer thin film group (hosted by Fernando Castro).

Encoding Spatio-Temporal Spiking Patterns Through Reward Modulated Spike-Timing-Dependent Plasticity

Thursday 13 December 2012

15:30 to 16:30
Mr Brian Gardner

Generating temporally precise sequences of spikes in response to spatio-temporal patterns of synaptic input is a fundamental process of neural activity: an important example would include coincidence detecting neurons in the primary auditory cortex, that fire in response to synchronous, temporally precise incoming spike trains. This is a non-trivial task however, since typically a neuron receives on the order of 10000 synaptic connections: only a small subset of this input can be considered to convey some meaningful task relevant signal, whilst the rest can be considered noise.

By approximating this random background activity as Gaussian white noise, we investigate how networks of noisy neurons can learn to reliably encode spatio-temporal input spiking patterns as temporally precise output sequences of spikes, specifically through reward modulated spike-timing-dependent plasticity.

Cable-net Supported Glass Facade Systems

Thursday 13 December 2012

13:00 to 14:00
Mustafasanie M Yussof

ATI 10th Anniversary Open Day

Tuesday 18 December 2012

10.00 to 18.00

The ATI will be celebrating its 10th anniversary this year with an Open Day on Tuesday 18 December 2012. The theme of the day will be “10 years of Innovation & Excellence”.

Banking Sustainability and Policy Implications

Thursday 10 January 2013

13.00 hrs to 14.00 hrs
Professor Richard Werner. Chair in International Banking, Director, Centre for Banking, Finance and Sustainable Development; Director of International Development, University of Southampton

Most economic models do not include banks. Many experts have widely diverging views on how banks affect the economy.

Common Mistakes When Building Authentication into Apps

Wednesday 16 January 2013

14:00 to 15:00
Dr Edgar Weippl, Research Director, SBA Research, Vienna University of Technology, Vienna, Austria

Mobile applications only become really useful if combined with cloud-based services. We have observed that the increasingly short time to market may cause serious design flaws in the security architecture. In this talk I will highlight some flaws discovered in the past.

For example, we looked at nine popular mobile messaging and VoIP applications and evaluated their security models with a focus on authentication mechanisms. We find that a majority of the examined applications use the user's phone number as a unique token to identify accounts; they contain vulnerabilities allowing attackers to hijack accounts, spoof sender-IDs or enumerate subscribers. Other examples pertain to (already fixed) problems in cloud-based storage services such as Dropbox.

Civil Engineering Research Seminar - January part 2

Thursday 17 January 2013

13:00 to 14:00
Achame D Shana

Medical Radiation Imaging Research

Wednesday 23 January 2013

14:00 to 15:00
Prof Philip Evans, CVSSP, University of Surrey

SLRG Seminar: What Role Could Mindfulness Play in Reducing Psychologically Motivated Consumption?

Wednesday 23 January 2013

13.00 hrs to 14.00 hrs
Alison Armstrong PhD, RESOLVE/SLRG, University of Surrey

We must consume to live.  However, the consumption of goods and resources in developed countries is so considerable that it is associated with low psychological wellbeing, and is a contributor to several social and ecological problems.  The psychological motivators that sustain such consumption may relate to attempts to resolve affect or identity difficulties, whereby consumer activities and goods offer emotional or symbolic functions.  These tendencies are especially visible in the compulsive buyer.

UK food retailers – sustainable supply chains and BHAGs (Big Hairy Audacious Goals)

Thursday 24 January 2013

13.00 hrs to 14.00 hrs
Alison Austin, Environment and Business

UK food retailers have become arguably one of the most important drivers for change in beginning to create more sustainable supply chains.   This is now no longer just a reputational issue but is based on concerns for food security and is clearly a competitive issue.  Rethinking waste as resources and the need to  make step changes on operational energy use has encouraged retailers to move from corporate targets that are doable to those which can only be classified as BHAGs and are beyond current knowledge on how to achieve them.

MAKING THE ELEPHANT DANCE: The Drive for Innovation in Largescale Software-Intensive Systems

Thursday 24 January 2013

14:00 to 15:00
Prof Alan Brown, Professor of Innovation and Entrepreneurship, Surrey Business School, University of Surrey

Innovation in software and product delivery is essential to every company’s success. However, larger companies have particular challenges driving innovation into their products and practices due to their culture, size, and context. In this presentation we look at innovation challenges in largescale software development and delivery organizations. We particularly focus on agile software development methods being used in such organizations and their role in innovation. While there have been many successes in creating innovative software solutions, too often there have been disappointments delivering that software as part of a governed product delivery approach. This presentation looks at the challenges to agile product delivery, and examines the role and characteristics of an agile organization in delivering innovative solutions.

WSMS January Talk, Lithium: A life story

Tuesday 29 January 2013

Presented by Duncan Kushnir, Chalmers University, Sweden

Report from Africa

Wednesday 30 January 2013

13.00 hrs to 14.00 hrs
Dr Yacob Mulugetta, Senior Lecturer, Centre for Environmental Strategy

Yacob spent the past two years at the United Nations Economic Commission for Africa (UNECA), focusing on the links between energy, climate and development.  He helped set up the African Climate Policy Centre (ACPC), which is now up and running and considered an important knowledge centre in the African development landscape

Automated Image Analysis: the Clinical Reality and the Information Technology Challenge

Thursday 31 January 2013

14:00 to 15:00
Dr Tunde Peto, Head of the Reading Centre at the NIHR Biomedical Research Centre for Ophthalmology, Moorfields Eye Hospital NHS Foundation Trust and UCL Institute of Ophthalmology

Imaging in ophthalmology has changed faster than our understanding of what these images might mean. The magnitude of the images taken in clinical and research setting and subsequently received for analysis was initially limited by the speed of the slides being developed or by the quality of the polaroids. The last 20 years have seen an unprecedented rise both in the number and the quality of digital images in ophthalmology.

The Ophthalmic Image Analysis Centres (commonly referred to as Reading Centres) now mainly deal with digital images. In broad terms, these come from three sources: screening/clinical settings, epidemiological studies and clinical trials. The requirements for these three are governed by different principles and the time and money involved are vastly different as well. Screening/clinical setting requires fast but reliable approaches some with immediate decision making, others can be slightly delayed, but usually only by days. Epidemiological studies examine thousands of patients and require reliable and reasonably cheap solutions, especially as many patients exhibit no pathology. Clinical trials demand rigorous and time-honoured grading approach with exhaustive quality control approaches.

Both clinicians and researchers have been looking for (semi)automated approaches in order to be able to provide faster and more reliable care to patients with the elimination of at least part of the human factor.

During this seminar we will discuss the clinical and research requirements of image analysis in ophthalmology.

IOP Insight into Teaching

Friday 1 February 2013

12:30 to 14:30

Love Physics?  Pass on the passion.  Teach!

Analysis Day

Friday 1 February 2013

11:00 am to 5:00 pm
Various speakers

Analysis Day Programme:

11:00 J .Bevan: "Twist maps"
11:30 D. Lloyd: "Bifurcation of Ferrosolitons"
12:00 I. Morris: "Operator Perron-Frobenius theorems and the running time of GCD algorithms"

12:30-14:00 Lunch

14:00 J. Deane; "Parametrically-forced systems with time-increasing friction"
14:30 S. Zelik: "Global averaging in dissipative dynamics: three examples"
15:00 T. Bridges: "KdV planforms"

15:30 Tea break

16:00 B. Cheng: "Analysis of some nonlinear PDEs from multi-scale geophysical applications"

17:00 Wine reception

Local and Global Dynamics of Neuronal Activity in the Neocortex: Implications for the Function of Sleep

Wednesday 6 February 2013

14:15 to 15:15
Dr Vladyslav Vyazovskiy, Lecturer in Sleep and Chronobiology, FHMS, University of Surrey

In the last decades a vast empirical and theoretical knowledge about sleep mechanisms has been accumulated. Surprisingly, the function of sleep still remains elusive. Moreover, the question of “why do we sleep?” is now being gradually replaced with a more fundamental one: “what is sleep?” The basic problem with defining sleep is that on one hand it is a state, inasmuch as it is different from other states, such as wakefulness, and on the other hand it is a process, since it is not static, but evolves in time and space in a highly complex manner. There are multiple temporal scales relevant for sleep process – starting from a fast millisecond scale of individual neuron spiking, that changes depending on whether the animal is awake or asleep, and up to a scale of hours or even days, at which the overall amount and architecture of sleep is regulated. With respect to spatial scales sleep also shows astounding complexity – indeed, it is associated with characteristic changes at levels as remote from each other as an individual neuron and the whole brain. Understanding the mechanisms underlying spatio-temporal dynamics of sleep will help us to understand not only what sleep is, but also why it is necessary.

Complex-Valued Adaptive Signal Processing

Thursday 7 February 2013

15:00 to 16:00
Dr Clive Cheong Took, Department of Computing, University of Surrey

Numerous adaptive signal processing applications are enabled by a complex-valued signal framework. For the most part, these methods are driven by physical models that assume traditional complex-valued computations for input-output behaviour and statistical assumptions that lead to proper (second-order circular) signal models. Recently, it has become recognised by numerous signal processing practitioners that a broader framework involving widely-linear input-output systems and improper or non-circular statistical models offers additional capabilities beyond the traditional complex-valued methods. Development of adaptive signal processing solutions in this broader framework can be challenging to get right, and the understanding of their advantages and limitations are non-obvious at first glance. This talk will present  the latest advances in augmented complex statistics and will introduce a suite of adaptive signal processing and  under the umbrella of widely linear modelling.

SLRG Seminar: Consuming Less and Having the Same: Consumer responses to scarcity

Friday 8 February 2013

13.00 hrs to 14.00 hrs
Dr Iain Black, Reader, Head of Marketing Group, School of Management and Languages, Heriot Watt University

A central message from the sustainable development community is that we in developed nations must
reduce our consumption. We tell consumers, organisations and governments of all levels that we must
reduce our ghg outputs, reduce our air travel, reduce our use of cars, reduce the number of televisions
and other consumer goods we buy. We should eat less, use less water and consume less overall,
indeed, we must have fewer people on this planet.

IoP Talk: The Atomic Theory of Matter: From Democritus to the Quantum Computer

Wednesday 13 February 2013

Dr Chris Hooley

Maths PhD Open Day 2013

Wednesday 13 February 2013

14:00 to 16:00
Academic Staff

Our PhD Open Day is open to anyone who is interested in becoming a PhD student at Surrey. If you would like to come, then ... 

Distributed Generation by Energy from Waste Technology: A Life Cycle Perspective

Thursday 14 February 2013

13.00hrs to 14.00 hrs
Sara Evangelisti, Chemical Engineering Department, University College London

Anaerobic Digestion (AD) is a promising technology for biogas and organic fertilizer production from the Organic Fraction of Municipal Solid Waste (OFMSW). The UK Department for Environment, Food and Rural Affairs (DEFRA) has estimated that AD technology has the potential of generating between 3 and 5 TWh by 2020 for energy production.

Civil Engineering Research Seminar

Thursday 14 February 2013

13:00 to 14:00
Iffat Naz

Species and Their Names – Fundamental Concepts

Thursday 14 February 2013

15:30 to 16:30
Dr Jonathan Y Clark, Department of Computing, University of Surrey

Computer scientists collaborating with biologists often need to consider fundamental concepts. These include 'What is meant by a species?' and 'How and why do we give them names?' and 'How are these names used in practice?' Names change for various reasons, but how do we keep track of these changes and manage 'version control'? These are fundamental concepts to biologists, and all engineers and computer scientists who deal with data derived from biological entities or forms, and use names to refer to them should be aware of these concepts, in order to be truly multi-disciplinary, and to help avoid misunderstandings and embarrassment when dealing with biologists!

Online Identity, Security and Applications

Friday 15 February 2013

10:00 to 12:00
David Birch, Director, Consult Hyperion

The issue of identity, identity management and identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated "Orwellian" architectures. Is Big Brother the only alternative to anarchy?

In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a national identity management scheme for the 21st century look like? Can we assemble a set of requirements understandable to politicians, professionals and the public? We've certainly had some difficulty to date. One reason might be that we lack a compelling, narrative vision. As a result, we panic into building legacy systems that will subvert the rational goals of worthwhile scheme or set up "security theatres".

If you understand the technology, I will argue, it can deliver far more than the politicians, professionals and public imagine: In particular, it can deliver the apparently paradoxical result of more security and more privacy by exploiting chip cards, mobile phones, the internet biometrics and cryptography. The UK Cabinet Office "Identity Assurance Architecture" (IDA) and the US Department of Commerce "National Strategy for Trusted Identities in Cyberspace" (NSTIC) are a place to start, but I will set out a high-level vision of what the future identity infrastructure should look like: Dr. Who's psychic paper. Not only is this a simple, clear vision that is familiar to the expert and layperson alike, but it's a very useful artistic representation of the capabilities of the technology. I will further suggest that a utility implementation of identity infrastructure can deliver the on this vision in a practical way, and that all of the technology needed to create the identity scheme for the future already exists.

Self-Enforcing Electronic Voting

Friday 15 February 2013

14:00 to 15:00
Dr Feng Hao, Lecturer in Security, School of Computing Science, Newcastle University

This talk presents a new e-voting design called “self-enforcing electronic voting”.  A self-enforcing e-voting protocol provides End-to-End (E2E) verifiability, but in contrast to all other E2E verifiable voting schemes, it does not require any involvement of tallying authorities.  In other words, the election is self-tallying.  We show how to realize “self-enforcing e-voting” through a pre-computation strategy and novel encryption methods.  Furthermore, we show that, by removing tallying authorities, the resultant e-voting system becomes much simpler, more manageable, has better efficiency, provides better usability, and incurs lower hardware cost – all of these are achieved without degrading security. Finally, if time permits, I will present a live demo of a self-enforcing e-voting prototype which we have developed at Newcastle University and used in the actual classroom voting.  Our project has recently received an ERC starting grant for further investigation, and we welcome any form of collaboration from interested audience.

Enhancing Video-Based Camera Identification Using Analysis of Variance

Friday 15 February 2013

15:30 to 16:30
Mr Syamsul Yahaya

In this work, we consider statistical information in video data as the features to identify sources of videos captured by a given number of camera models. By enhancing our previous work that uses conditional probabilities (CP) as a feature basis, we propose to reduce the number of CP features but can achieve the same level of performance with a much smaller number of features. In particular, we analysed all (72) CP features used in our previous work via an analysis of variances of multiple video frames across videos obtained from same camera and video frames from videos across different cameras. The analyses of variances help to identify a reduced set of "good" CP features which form the core of the original 72 features. Experimental results prove that, by applying simple majority voting the reduced features can achieve relatively same level of performance as compared to the original 72 features.

The Performance Economy - a way towards economic and societal stability?

Wednesday 20 February 2013

13.00 hrs to 14.00 hrs
Walter R. Stahel, Vice Secretary General & Head of Risk Management Research, The Geneva Association

A number of changes have made the shift from a global linear industrial economy to a regional circular economy (C.E.) increasingly interesting for economic actors in industrialised countries:

Classification of Distorted Patterns by Feed-Forward Spiking Neural Networks

Thursday 21 February 2013

15:30 to 16:30
Dr André Grüning, Department of Computing, University of Surrey

A feed forward spiking neural network is tested with spike train patterns with additional and missing spikes. The network is trained with noisy and distorted patterns with an extension of the ReSuMe learning rule to networks with hidden layers. The results show that the multilayer ReSuMe (Sporea and Gruening 2013) can reliably learn to discriminate highly distorted patterns spanning over 500 ms.

Security: Where is IBM placing its bets?

Friday 22 February 2013

10:00 to 12:00
Prof Steve Legg, IBM University Relations Manager & Royal Academy of Engineering Visiting Professor

3D Representation Models Construction through a Volume Geometric Decomposition Method

Tuesday 26 February 2013

14:00 to 15:00
Rodrigo de Bem, Centro de Ciências Computacionais, Universidade Federal do Rio Grande, Brazil

A Space-time Approach to Quantum Mechanics and the Problems it Causes on TV

Wednesday 27 February 2013

19:00 to 20:00
Professor Brian Cox, University of Manchester

A Comparative Study of Multi-objective Evolutionary Trace Transform Methods for Robust Feature Extraction

Thursday 28 February 2013

15:30 to 16:30
Mr Wissam Albukhanajer

Recently, Evolutionary Trace Transform (ETT) has been developed to extract efficient features (called triple features) for invariant image identification using multi-objective evolutionary algorithms. This presentation compares  two methods of Evolutionary Trace Transform (method I and II) evolved through similar objectives by minimizing the within class variance (Sw) and maximizing the between-class variance (Sb) of image features. However, each solution on the Pareto front of method I represents one triple features (i.e. 1D) to be combined with another solution to construct 2D feature space, whereas each solution on the Pareto front of method II represents a complete pair of triple features (i.e. 2D). Experimental results show that both methods are able to produce stable and consistent features. Moreover, method II has denser solutions distributed in the convex region of the Pareto front than in method I. Nevertheless, method II takes longer time to evolve than method I. Although the Trace transforms are evolved offline on one set of low resolution (64x64) images, they can be applied to extract features from various standard 256x256 images.

Efficient Delay Tolerant Routing Protocols for Group Mobility

Friday 1 March 2013

15:30 to 16:30
Dr Peter HJ Chong, Associate Professor, Nanyang Technological University (NTU), Singapore

Since network disconnection will happen more frequently in mobile ad hoc network with group mobility model, the routing strategy proposed in delay-tolerant network could be applied for it. However, most of the current delay-tolerant routing protocols are designed based on the entity mobility model, not on the group mobility model. Motivated by this, we have proposed THREE routing schemes on the basis of one proposed delay-tolerant routing protocol called epidemic routing (ER) to make it perform more effectively for group mobility model.

The first one is called group-epidemic routing (G-ER). Through making use of the uniqueness of the group mobility models, one significant improvement measure has been proposed in which a group of nodes will be behaved as a single node. We treat each group as one individual unit during routing execution to substantially reduce the routing overhead and the resource requirement. To make better use of the rare contact opportunities in DTN, we propose the group based packet exchange, in which the contact of any two nodes from two groups will trigger the packet exchange between the two groups. The second one is named as the leader based group routing (LBGR) by making full use of group structure in group mobility. We consider the resource allocation in each group and propose the leader-dominating routing in LBGR to reduce the impact of the group dynamics on network performance. The third one is called purpose-movement assisted routing (PMAR) aiming for a more realistic mobility model, group mobility, which has been paid attention in many realistic scenarios. Different from the traditional store-carry-forward DTN routing strategy, in which nodes wait for the connectivity passively, PMAR employs nodes to actively create new connection by altering the node movement, and thus the packet could be delivered in an expedited manner. More importantly, the proposed PMAR could be taken as a component to be integrated into different DTN routings for group mobility to make them more aggressive in delivering packets. In this paper, we integrate PMAR into a previously proposed routing, group-epidemic routing (G-ER). PMAR could be triggered whenever some packets need to be delivered to the destinations in a faster way, but without any connection to their destinations. By extensive simulation we show that all three schemes outperform two traditional routing protocols, epidemic routing and DSR, in various network conditions.

Quality as a prerequisite for security in interoperable systems

Friday 1 March 2013

10:00 to 12:00
Mr Peter Davies, Technical Director, Thales

Considerable effort goes into specifying secure and security protocols and the equipment in which these are embodied. In most cases the specification concentrates on positive cases with very little concentration on failure modes.

This talk will concentrate on limitations that are imposed on our ability to make assertions about the security of a system where we are unable to understand the quality of the implementation. It will do so by examining the types of failure that have led to security system failures.

Finally, the talk will examine some of the extant security protocols and show that these provide very little support for identifying and guaranteeing the quality of components networked together in a distributed system.

Super Hi-Vision at the London 2012 Olympics

Wednesday 6 March 2013

14:00 to 15:00
Dr Rajitha Weerakkody, BBC Research and Development

Private-aware Surveillance System Design

Wednesday 6 March 2013

14:00 to 15:00
Professor Mohan Kankanhalli, Associate Provost of National University of Singapore

Video surveillance is an effective means of monitoring activities over a large area with cameras. However, this additional security comes at the cost of privacy loss of citizens not involved in any illegal activities. It is important to model privacy as the cost and security as the utility of the surveillance systems and study the trade-off between these quantities. The traditional privacy protection methods only consider facial cues of identity leakage and privacy loss.

Because an adversary can use prior knowledge to infer the identities even in the absence of facial information, we propose a novel privacy-aware surveillance framework in which we identify the implicit channels that cause identity leakage, quantify privacy loss through non-facial information, and propose a solution to block these channels for minimal privacy loss with low utility loss. The privacy loss is modelled as the adversary's ability to correlate any sensitive information to the identity of an individual. Anonymity based approach is used to consolidate the identity leakage through explicit channels of bodily cues such as facial information; and other implicit channels that exist due to "what", "when" and "where" information. The proposed privacy model is applied to important applications of surveillance video data publication and CCTV monitoring. Through experiments it is found that current privacy protection methods involve a high risk of privacy loss while the proposed framework provides more robust privacy loss measures and a better trade-off of utility versus privacy.

Exploring Polychronization as a Theory of Working Memory

Thursday 7 March 2013

16:00 to 17:00
Mr Panagiotis Ioannou, Department of Computing, University of Surrey

Memory is the essential function without which life as we know it is unthinkable. Without memory we could not acquire knowledge, recall events from the past that may bring us joy or sadness, laughter or tears. Working memory, the theoretical system/mechanism underlying the maintenance of task-relevant information during the performance of a cognitive task, is perhaps the most significant achievement in human evolution. The exact mechanisms involved behind this information acquisition, processing and retrieval still remains an unresolved puzzle. Thus, memory functionality is quite an active area of research. Most importantly, solving this puzzle may eventually lead us to a more thorough diagnosis and treatment of mental and memory disorders such as the Alzheimer’s disease, amnesia, Huntington’s disease, agnosia and Parkinson’s disease, among others.

In our work we apply computational techniques to try to better understand working memory. One such model that has shown promise uses the information-processing theory of polychronization to model sustainable patterns of activity in spiking network. In our current work we examine what effect spiking network parameters have on this model in relation to memory functionality. In our simulations, we selectively cue emerged polychronous groups and produce sustainable neuronal reactivation for a period of time thus resembling the sustained neural activity as observed in vivo during working memory tasks.

The Cyber Threat Landscape and Hunting the Adversary

Friday 8 March 2013

10:00 to 12:00
Dr Adrian Nish, Senior Consultant and Cyber Threat Intelligence Lead, Detica

The corporate IT network is a battle-ground for a range of modern threats. Cybercriminals looking to make financial gain, attention-seekers trying to create headlines, professional hackers aiming to steal sensitive documents, and even moles acting as legitimate employees all create significant risks for those tasked with defending the network. To make matters worse, the traditional technology and methods of these defenders has failed to keep pace with the ingenuity of the attackers and the industrialisation of their methods. This seminar will give an overview of the threat landscape and draw on real case studies from investigations done by Detica’s Cyber Security services. Examples of social engineering tricks, exploits, custom malware, and threat correlation will be presented along with descriptions of some of the cutting-edge techniques being used to detect them.

Forgery Localization Based on Image Chroma Feature Extraction

Friday 8 March 2013

14:00 to 15:00
Mrs Areej Alfraih

Many passive image tamper detection techniques have been proposed in the expanding field of image forensics. Some of these techniques use a classifier for the final decision. However, when a classifier is used, there is a lack of forgery localization. The aim of this paper is to add localization to a previously published algorithm. The algorithm uses grey-level co-occurrence matrix (GLCM) for extracting texture information from the chromatic component of an image (Cb or Cr component). Experimental results show that we can localize forged regions in an image with accuracy reaching 93%.

Lecture: Human Powered Flight

Tuesday 12 March 2013

Br Bill Brooks (Chairman, RAeS Human-powered flight group)

This lecture will trace the history and development of human-powered flight over the past 40 to 50 years and explain the technical advances that have made it possible.  

10th Annual Computing Department PhD Conference

Wednesday 13 March 2013

9:00 to 17:00
Sir Alan Rudge CBE FREng FRS, Chairman of the ERA Foundation, Leatherhead, Surrey

The 10th Annual Computing Department PhD Conference will be taking place on Wednesday 13 March 2013 at the Treetops and Cedar Rooms, Wates House.

The inFORm Consortium - A Public/Private Partnership to Deliver REDD+

Thursday 14 March 2013

13.00 hrs to 14.00 hrs
Jim Lynch, CES Emeritus Professor, Distinguished Professor of Life Sciences

Professor Lynch will introduce the inFORm Consortium, whose members represent a wide range of expertise in policy development, technologies, training, market development, forestry services, social and environmental issues, financial aspects of forestry management, and effective management and leadership.

Fitness Estimation Strategy for Particle Swarm Optimization

Thursday 14 March 2013

15:30 to 16:30
Dr Chaoli Sun, Visiting Academic, School of Computer Science and Technology, Taiyuan University of Science and Technology, China

Particle swarm optimization (PSO) is a global metaheuristic that has been proved to be very powerful for optimizing a wide range of problems. However, PSO requires a large number of fitness evaluations to find acceptable solutions. If one single evaluation of the objective function is computationally expensive, the computational cost for the whole optimization run will become prohibitive. FESPSO, a new fitness estimation strategy, is proposed for particle swarm optimization to reduce the number of fitness evaluations, thereby reducing the computational cost. Different from most existing approaches which either construct an approximate model using data or utilize the idea of fitness inheritance, FESPSO estimates the fitness of a particle based on its positional relationship with other particles. More precisely, once the fitness of a particle is known, either estimated or evaluated using the original objective function, the fitness of its closest neighbouring particle will be estimated by the proposed estimation formula. If the fitness of its closest neighbouring particle has not been evaluated using the original objective function, the minimum of all estimated fitness values on this position will be adopted. In case of more than one particle is located at the same position, the fitness of only one of them needs to be evaluated or estimated. The performance of the proposed algorithm is examined on eight benchmark problems, and the experimental results show that the proposed algorithm is easy to implement, effective and highly competitive.

Civil Engineering Research Seminar - March 2013

Thursday 14 March 2013

13:00 to 14:00
Abdullah N. Al-Dabbous

Multi-Level Security (MLS) – What is it, why do we need it, and how can we get

Friday 15 March 2013

10:00 to 12:00
Dr Adrian Waller, Technical Consultant, Thales

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Promoting Lower-Carbon Lifestyles: The role of personal values, climate change communications and carbon allowances in processes of change

Tuesday 19 March 2013

13.00 hrs to 14.00 hrs
Dr Rachel Howell, Postdoctoral Research Fellow, Aberystwyth University

Greenhouse gas emissions associated with individuals’ lifestyles are a significant proportion of the UK total. This seminar will offer an overview of several linked projects that aim to further understanding of how to promote behavioural changes that will reduce those emissions.

Urban-scale LiDAR Scan and Engineering Analysis

Wednesday 20 March 2013

14:00 to 15:00
Dr Hamish Carr, University of Leeds

What is happening in cyber security and why?

Friday 22 March 2013

10:00 to 12:00
Mike St John Green, Recently retired from government

The Internet of Things, Smart Meters, the IP connection of Process Control Systems, Big Data, consumerisation and mobility are all part of the rapidly changing landscape of cyberspace, a place we all rely on for an ever increasing proportion of our social and economic activity. But news stories reveal that the environment is far from safe and secure. What are the forces at play? I will consider how the shape of cyberspace is changing and the issues this poses for industry, governments and users as we work to make cyberspace sufficiently safe and secure.

50th Teaching Year Celebration

Monday 25 March 2013

14:00 to 16:00
Prof Hoshyar Nooshin

Emeritus Professor Hoshyar Nooshin is celebrating his 50th year of teaching and research at the University of Surrey.


Talk: Stochastic homogenization of elastic material properties by the variability response method

Monday 25 March 2013

11:30 to 12:30
Prof. Sanjay Arwade from the University of Massachusetts

The Department of Civil and Environmental Engineering is hosting a talk titled " Stochastic homogenization of elastic material properties by the variability response method" by Prof. Sanjay Arwade from the University of Massachusetts, Amherst USA and all staff and students are welcome to attend.

Approximation Model Guided Selection for Evolutionary Multiobjective Optimization

Monday 25 March 2013

14:00 to 15:00
Dr Aimin Zhou, Associate Professor with the Department of Computer Science and Technology, East China Normal University, Shanghai, China

Selection plays a key role in a multiobjective evolutionary algorithm (MOEA). The dominance based selection operators or indicator based ones are widely used in most current MOEAs. This paper studies another kind of selection, in which a model is firstly built to approximate the Pareto front and then guides the selection of promising solutions into the next generation. Based on this idea, we propose two approximation model guided selection (AMS) operators in this paper: one uses a zero-order model to approximate the Pareto front, and the other uses a first-order model. The experimental results show that the new AMS operators performs well on some test instances.

The Development of 'Chevron' Nozzles for Aeroengines

Tuesday 26 March 2013

14:00 to 15:00
Mr Craig Mead, Director at Aero Acoustics Ltd

Chevron nozzles are noise reduction devices for aeroengines, as perhaps most noticeably used on the Boeing 787. The development of these devices will be presented with the aim of illustrating the path of development of a new low-noise technology for an aeroengine and to show the on-going value of experimental R&D in an increasingly computational field.

Graph-based Particle Filter for Human Tracking with Stylistic Variations

Wednesday 27 March 2013

14:30 to 15:30
Dr Dimitrios Makris, Kingston University

An Asian Perspective on Eco-Industrial Development

Wednesday 27 March 2013

13.00 hrs to 14.00 hrs
Professor Dr. (Anthony) Shun Fung CHIU International Expert RECP-SCP, United Nations UNEP-UNIDO EEI Chair of Ind Eng and Senior Research Scientist Center for Engineering & Sustainable Development Research (CESDR) De La Salle University, Manila, Philippines

Professor Chiu works in the fields of Sustainable Consumption and Production (SCP), Operations Strategy, and Eco-Industrial Development (EID).  He has conducted EID workshops for 30+ governments with UNEP, UNIDO, UN ESCAP, InWEnt, Asian Productivity Organization, DANIDA, and other international organizations.  In 2002, he led the writing of the Asia Industry Paper as input to the World Summit for Sustainable Development (WSSD) in Johannesburg.

Civil Engineering Research Seminar - April 2013

Thursday 11 April 2013

13:00 to 14:00
Oluremi Olamigoke

The Whole-Life Carbon Footprint of Office Buildings: How to measure and relate to economic output

Thursday 18 April 2013

13.00 hrs to 14.00 hrs
Angus McIntosh, Oxford Brooke's University, Consultant to Real Estate Forecasting

Research for the British Council for Offices examines how to calculate the carbon footprint of offices when constructed, in-use and the transport used by occupiers. The calculations are then related to the economic output of different types of building with implication for the taxation of carbon.

Jim Al-Khalili Speaker at IET Conference

Thursday 18 April 2013

Prof Jim Al-Khalili, Surrey University

SLRG Seminar: 20 years of Promoting Sustainable Living - What I am glad we did and what I wish we hadn't

Wednesday 24 April 2013

13.00 hrs to 14.00 hrs
Trewin Restorick, CEO of Global Action Plan

Trewin Restorick is the CEO of Global Action Plan a charity that he established 20 years ago.  Since its creation Global Action Plan has run practical environmental behaviour change programmes engaging over 730,000 people in the UK.

Scalable user-interactive multi-view video compression

Wednesday 24 April 2013

14:30 to 15:30
Dr Vladan Velisavljevic, University of Bedfordshire

Evolutionary Topology Optimization of Complex Structure

Thursday 25 April 2013

15:30 to 16:30
Mr Ayang Xiao, visiting PhD student from the Harbin Institute of Technology (HIT), China

A new method called vectorized structure approach (VSA) is proposed for complex structure topology optimization, which allows effective changes to the complex structure by iteratively adding or removing structure elements. This approach extends topology optimization to shape optimization, which is based on geometric construction rules. The VSA can optimize structures containing truss and continuum structure. The Covariance Matrix Adaptation Evolution Strategy (CMA-ES) is employed for VSA-based structure optimization. Numerical results show that the VSA-based CMA-ES is successful in finding optimal structures and some of the found solutions are better than the best known topologies reported thus far in the literature.

What is quantum in quantum biology?

Friday 26 April 2013

Sandu Popescu,Professor of Physics, University of Bristol,Distinguished Visiting Research Chair, Perimeter Institute for Theoretical Physics

Security issues for developers using Microsoft technologies

Friday 3 May 2013

10:00 to 12:00
Chris Seary, Independent Security Consultant

His first presentation will demonstrate application security threats, showing actual code exploits and how they can be prevented. This is based on Chris' experience as a security consultant, and also his time working as a developer. The presentation will involve actual demonstrations of various types of web site attack, with full code examples. Chris will then proceed to give an overview of the secure application life cycle within a large organisation, and some of the issues faced. How do banks keep ahead of both external attackers and internal threats, such as rogue traders?

The second presentation will look at application specific methods for securing communications. This will delve into subjects such as WS-Security and WS-Federation. This is true application-level security, incorporating XML encryption methods. Many third party applications now offer a WS-Security authentication suite, allowing complex web service security facilities, such as federated identity.

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks

Friday 3 May 2013

14:00 to 15:00
Dr Shujun Li

In a paper published at NDSS 2012 which won one of the two Distinguished Paper Awards, Qiang Yan, Jin Han, Yingjiu Li and Robert H. Deng analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions.

In this talk, Dr Shujun Li will describe his recent work presented at NDSS 2013 with collaborators from Australia on revisiting the security issue around the statistical attack proposed by Yan et al. To be more exact, they attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Their treatment is more quantitative which enables them to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Their results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Extensions of High Efficiency Video Coding for 3D Video

Wednesday 8 May 2013

14:00 to 15:00
Prof Marek Domański, Poznań University of Technology, Poland

Thoughts on Learning with Computational Methods

Thursday 9 May 2013

15:30 to 16:30
Mr Joseph Chrol Cannon

Rather than repeat or remix my recent presentation of the department conference, Joseph will take this opportunity to discuss some general ideas on learning with computational models. Topics covered include sparse representations, competitive learning, perceptual hashing, wisdom of crowds, coincidence detection and association. These will be linked in to neural networks and the neurological model of cortical columns.

String-Maths UK 2013

Friday 10 May 2013

9:00 to 17:00

The main aim of this conference to is to bring together mathematicians and theoretical physicists working on ideas related to string theory and quantum field theory. There has been a long and fruitful history in the interplay between mathematics and physics. Many ideas in physics have led to new and exciting developments in mathematics. Conversely, mathematics has led to new and powerful techniques that have rendered many problems in string theory soluble.

We hope to bring together researchers working at the intersection between these two fields to summarise current developments and explore future research directions. The meeting will be largely informal with plenty of time for discussions.

The website of the conference can be found here. Registration closes on the 5th of May 2013.

The Delivery of Managed Security Services

Friday 10 May 2013

10:00 to 12:00
Tony Dyhouse, Cyber Security Programme Director, ICT KTN

Tony Dyhouse will discuss some standards applicable to the fields of Information Assurance and Service Delivery; illustrating areas of commonality with regard to aim and approach. Different mechanisms for the protection of CIA will be discussed from a point of view of risk transference and third party provision of services, including a look at potential conflict of interest and how that can be addressed. Finally, a view on advancing technology and Cloud services.

Phil Walker speaker at the “Art of Fear” at the Southbank Centre

Saturday 11 May 2013

10:00 to 18:00
Phil Walker, University of Surrey

Magnetars: the most extreme neutron stars

Monday 13 May 2013

Silvia Zane, Mullard Space Science Laboratory

SLRG Seminar: Consumption in retirement: implications for environmental sustainability

Wednesday 15 May 2013

13.00 hrs to 14.00 hrs
Sue Venn, Research Fellow and Kate Burningham, Senior Lecturer CES, University of Surrey

We are repeatedly reminded of the challenges of a global ageing population, with forecasts of failing pension plans, cultural instability and heavy burdens on health and social care.  We are also reminded that climate change is one of the most challenging issues we face today with calls for everyone to adopt more ‘sustainable lifestyles’.  

Civil Engineering Research Seminar - May 2013

Thursday 16 May 2013

13:00 to 14:00
Dr Stergios Mitoulis

New Spatially Constrained Source Separation Using Tensor Decomposition

Thursday 16 May 2013

15:30 to 16:30
Ms Samaneh Kouchaki

In this paper common spatial patterns filter has been combined with conventional PARAFAC2 tensor decomposition in the design of a new spatially constrained source separation system. This approach is particularly useful in separation of weak intermittent signal components such as interictal discharges originated from deep brain sources. The results of applying the method to synthetic data show that it outperforms conventional blind source separation methods which are often unable to separate such sources.

CivSoc Annual Ball 2013

Friday 17 May 2013


Tickets cost £35 and include the follwoing:

3 course dinner / Bar and DJ / Live Entertainment / Great raffle prizes!

Now or Later: Load Shifting and Demand Side Response

Thursday 23 May 2013

13.00 hrs to 14.00 hrs
Jacopo Torriti, University of Reading, CES Visiting Researcher

Recent research and policy studies on the low-carbon future highlight the importance of a more flexible demand of electricity. The integration of new technologies, like heat pumps and electric vehicles, is expected to bring about increases in peak electricity demand which may not be met by intermittent supply.

Bridging the Gap Between Structural and Statistical Pattern Recognition

Thursday 23 May 2013

11:00 to 12:00
Prrof Horst Bunke, University of Bern, Switzerland

Digital Painting Analysis

Wednesday 29 May 2013

14:00 to 15:00
Prof Dr Ann Dooms, Department of electronics and Informatics (ETRO), Vrije Universiteit Brussel, Belgium

Thanks to advances in the field of digital image acquisition and processing as well as the wide range of high-resolution modalities currently available,  museums widely started digitizing their collections, mainly for preservation, documentation and dissemination purposes. However, one can go further than archival: digital acquisition enables digital analysis of paintings.

Until recently, little attempt was made to exploit these enormous amounts of data by sophisticated computational analyses. Through dimensionality reducing techniques, we try to uncover and analyse the features, patterns or structures of interest that are “hidden” in these vast volumes of high-resolution and/or multi-spectral data. We are developing a theoretical framework for dimension reduction through the construction of adaptive multi-resolution dictionaries for sparse representations. Through this technique, structures of interest, such as for example craquelures or zones of restoration, can be identified and separated from the content if required. This proves to be a useful, non-invasive tool, for many applications such as artwork conservation, study of the impact of transport on artworks, art-historical studies, authentication, dating, restoration, style analysis of painters, canvas and pigment (composition) analysis, material and structure characterization, archiving and documentation, and enrichment of museological projects.

These results literally provide a whole different view on the piece of art of which the far-reaching possible applications are hardly exploited yet. In this talk, I will provide an overview of our research in digital painting analysis where we investigate the painting’s support as well as the pictorial layer through its digital counterpart.

Talk: The World of Airborne Nanoparticles Around Us!

Thursday 30 May 2013

17:00 to 18:00
Dr Prashant Kumar

Creativity Before Consciousness

Thursday 30 May 2013

14:00 to 15:00
Geraint A Wiggins, Professor of Computational Creativity at Queen Mary, University of London

Creativity is often considered to be a special attribute of certain distinguished individuals. In this talk, I aim to debunk the Romantic notion that creativity is somehow a special, inspired gift, by proposing a cognitive mechanism by which it can happen, and arguing that this mechanism is, in fact, common to all humans. Furthermore, I propose that the creativity mechanism is fundamental to all human reasoning, and give an evolutionary argument for its existence, in terms of the value of efficient and predictive information processing.

From Science Fiction to Reality - Smart Card and RFID Evolution

Wednesday 5 June 2013

14:00 to 15:00
Dr Lee-Ming Cheng, Associate Professor, City University of Hong Kong

The popularization of the smart card has made smart card becoming personal data integration for centralized management of media. Smart Card/RFID is now ready to move into a new class of high volume ubiquitous uses and has replaced magnetic card and barcode in more secured applications. The advancement in Inter¬net technology and the underlying information infrastructure, the use of Smart Card/RFID tags and readers will provide a significant reform in information management. The rapid availability of information, say the location and status of goods worldwide, to all stack-holders like manufacturers, distributors, and retailers simultaneously - that makes RFID an enabling technology. The talk will give a general introduction of magnetic cards, smart cards and RFID including its structure from fiction to reality, their structure, function, security, applications and future developments.

3D Holoscopic Video Technologies: Innovating Immersive Media Experiences

Wednesday 5 June 2013

14:00 to 15:00
Dr Amar Aggoun, Brunel University

Digital Image Watermarking in Curvelet Domain

Friday 7 June 2013

14:00 to 15:00
Dr Lee-Ming Cheng, Associate Professor, City University of Hong Kong

The rapid development of Internet introduces a set of challenging problems regarding security. Digital watermarking is a technique of embedding a hidden signal into digital contents to identify the legitimate owner, track unauthorized use or detect intentional tampering of the original data. Embedding watermarks in different frequency domains can provide better robustness and visual detectability. The low SNR cannot prevent detection using statistical methods. For this reason, searching for better transform domain is still undergoing. The Curvelet Transform developed by Candµes and Donoho in early 2000 can provide better sparsity and can allow  the object recovery from very noisy environment triggered the research into the suitability of using it in digital watermarking. For simplicity, Curvelet watermarks are always embedded into all frequency bands.  However, its multi-scale properties allow individual band or mixed bands to be used for watermarking which enhance security and possible. As a result, this work provides a detailed study of the watermarking using individual band or mixed-bands based on the Curvelet Transform. The experimental results demonstrate that the proposed algorithm can provide excellent robustness against most image processing operations including jpeg compression, histogram equalization, median filtering, Laplacian sharpening and Gaussian low-pass filtering. In order to provide better perceptibility of the watermarked image, we have added a Human Visual System model to improve the proposed algorithm. Comparisons of other watermarking methods based on the Curvelet Transform have also been studied.

Advances in Evolutionary Multi-Objective Optimization

Tuesday 11 June 2013

14:00 to 15:30
Dr Kay Chen TAN, Associate Professor, Department of Electrical and Computer Engineering, National University of Singapore

Multi-objective evolutionary algorithms are a class of stochastic optimization techniques that simulate biological evolution to solve problems with multiple (and often conflicting) objectives. Advances made in the field of evolutionary multi-objective optimization (EMO) are the results of more than two decades of research, studying various topics that are unique to MO problems, such as fitness assignment, diversity preservation, balance between exploration and exploitation, elitism and archiving. The lecture will first provide an overview of evolutionary computation and its application to multi-objective optimization. It will then discuss challenges faced in EMO research and present various EMO features and algorithms for good optimization performance. The lecture will also discuss the applications of EMO techniques for solving engineering problems, such as control system design and scheduling, which often involve different competing specifications in a large and constrained search space.

Corrosion of reinforcement in concrete in marine environments

Wednesday 12 June 2013

10:00 to 11:00
Professor Robert Melchers

What the satellites can't see; rural livelihoods and climate change

Thursday 13 June 2013

13.00 hrs to 14.00 hrs
Dr John Seaman, Director of Research, Evidence for Development

Global climate change is expected to have severe effects on the populations of developing countries because many of these depend heavily on agriculture for income, have large impoverished rural populations which depend on agriculture for subsistence, and are financially and technically least equipped to adapt to changing conditions. Planning to reduce the impact of global climate change on households requires information on household vulnerability (e.g. 'the magnitude of the risk of future poverty').

Civil and Environmental Engineering Research Seminar - June 2013

Thursday 13 June 2013

13:00 to 14:00
Souhad Boughanem

Bayesian classifier and decision theory

Friday 14 June 2013

14:00 to 15:00
Dr Norman Poh

This is the first one of a series of three talks on machine learning given by Dr Norman Poh. The main purpose is to provide PhD students in MSF Group with a better understanding of various machine learning techniques. The first talk is about Bayesian classifier. Slides of this talk can be downloaded at here.

Recent developments in the analysis and design of bridges in earthquake areas

Monday 17 June 2013

16:30 to 17:30
Professor Andreas Kappos, from City University London

Dynamic Facial Processing and Motion Capture: from Basic Research to Applications in Visual Effects

Wednesday 19 June 2013

14:00 to 15:00
Dr Darren Cosker, University of Bath

For Family, Health and Home: The manifold forms of climate change denial in British Civil Society, and what they tell about how we might swiftly change behaviour

Wednesday 19 June 2013

13.00 hrs to 14.00 hrs
Dr Jonathan Rowson, Director, RSA Social Brain Centre

A forthcoming report from RSA's Social Brain Centre will reveal the full spectrum of climate change denial in the UK, based on questions designed for a nationally representative survey conducted by Yougov.

The Secrets of Cell Division: free seminar by Sir Tim Hunt

Friday 21 June 2013

14:00 to 15:30
Sir Tim Hunt, Nobel Prize winner

The cell is the fundamental unit of life. And cell division is what keeps cells alive (if cells stop dividing, they always eventually die – a bit like computer disks). Despite the enormous importance of cell division, our understanding of how it all works is quite a recent development that really begins with the discovery of the structure of DNA – its replication and segregation underlies the cell cycle. But controlling DNA synthesis and mitosis is a complicated business. The process of mitosis involves a comprehensive reorganization of the cell. This reorganization is triggered and orchestrated by an enzyme, the protein kinase, MPF. Turning MPF on and off is the secret of cell division. I will try to explain how we came to know what we know, and what we would still like to know. If there’s time I would also talk a little bit about recent researches in my own laboratory, and why I’m excited about them.

“Embracing Uncertainty in Maintenance and Renewal of Transport Infrastructure”

Monday 24 June 2013

18:00 to 20:00
Professor Marios Chryssanthopoulos

Workshop on Mathematical Modelling of the DNA Damage Response

Wednesday 26 June 2013

For more information click here.

Climate Change, Growth and the Politics of Transformation

Thursday 27 June 2013

13.00hrs to 14.00hrs
John Ashton

A rapid transition to a carbon neutral energy system across the major economies - and thus a successful response to climate change - cannot be accomplished within the current growth model. A high degree of intervention will be required but there are no historic analogues for its nature, scale or intensity. In other words we have a broken compass and no map. What is to be done?

Class Imbalance Learning

Tuesday 2 July 2013

14:00 to 15:30
Dr Vasile Palade, Department of Computer Science, University of Oxford

Class imbalance of data is commonly found in many machine learning applications. When learning from imbalanced data, the performance measure used for model selection plays a vital role. The existing and popular performance measures used in class imbalance learning, such as the Gm and Fm, can still result in sub-optimal classification models. I will first present a new performance measure, called the Adjusted Geometric-mean (AGm), which overcomes the problems of the existing performance measures when learning from imbalanced data.  Support Vector Machines (SVMs) is a popular and effective machine learning technique, but which can still produce sub-optimal models when it comes to imbalanced datasets.  I will then present FSVM-CIL (Fuzzy SVM for Class Imbalance Learning), an effective method to train FSVMs with imbalanced data in the presence of outliers and noise in the data. At the end of the talk, some efficient resampling methods for training SVMs with imbalance data will also be discussed.

Design and Construction Challenges - Forth Replacment Crossing

Wednesday 3 July 2013

15:30 to 16:30
Robert Meyer

A talk by Robert Meyer of Arup

Higher-order statistics pursuit: its application to blind signal extraction and sound quality assessment

Friday 5 July 2013

14:00 to 15:00
Dr Hiroshi Saruwatari, Nara Institute of Science and Technology, Japan

Two Day Symposium on Biological Dynamics

Monday 8 July 2013

For more information click here

Eco-industrial parks and circular economy: the practice in China and theoretical exploration

Monday 8 July 2013

14.00 hrs to 15.00 hrs
Lei Shi, Associate Professor,Division of Environmental Management and Policy, Tsinghua University, China

Faced with the great pressures in environmental protection and resource supply, China has developed a significant industrial programme in promoting eco-industrial parks. The notion of circular economy has also received significant attention at all levels. This lecture will present a brief review of the progress in these areas and discuss problems and future directions. Theoretical explorations focusing on network analysis to support the understanding and sustainable development of such systems will also be presented.

Civil Engineering Research Seminar - July 2013

Thursday 11 July 2013

13:00 to 14:00
Miss Florence Lee Chi Hiong

An Introduction to Regression and Its Variants

Thursday 11 July 2013

14:00 to 15:00
Dr Norman Poh

This is the second one of a series of three talks on machine learning given by Dr Norman Poh. The main purpose is to provide PhD students in MSF Group with a better understanding of various machine learning techniques. The second talk is about regression and regularization.

A Piece of Cake

Monday 15 July 2013

Dr Stefan Zigan, University of Greenwich

The talk “A piece of cake” provided a recipe indicating the ingredients to unravel a complex multiphase phenomenon found in large industrial silos called  Air Current Segregation (ACS). 

Trustworthiness before Trust

Thursday 18 July 2013

16:00 to 17:00
Baroness Onora O'Neill, Chair of the Equality and Human Rights Commission
Where trust matters to us, we aim to place it in the trustworthy, and to deny it to the untrustworthy: we don't aspire simply to trust more, but to place (and refuse!) trust more intelligently. So we need to be able to assess who is trustworthy for which purposes. This can be particularly hard if we are called onto trust others whom we do not know, others who have expertise that we lack, or others who use technologies and systems that we find complex or opaque. Electoral systems and technologies may have all of these features, so judging their trustworthiness can be difficult for voters and others, and more difficult with reliance on less familiar technologies. If electoral systems that use new technologies are to be trusted, both voters and others must be offered assessable evidence of their trustworthiness, including evidence that the technologies are reliable and that those who deploy them are competent and honest.

Energy Storage Materials and Supercapacitors

Thursday 25 July 2013

10:00 to 16:00

This one-day workshop will focus on recent developments in the FP7 AUTOSUPERCAP project on energy storage materials for supercapacitors in automotive applications and will also include an overview of related work at the University of Surrey on nanomaterials and within the EPSRC SUPERGEN Consortium. There will also be a presentation on the European Energy Research Alliance (EERA).

You can register for the event and purchase tickets using the Surrey Store.

Anion Exchange Membranes for Energy Generation Technologies - Workshop

Thursday 25 July 2013

The last decade has seen a significant increase in research activity looking at anion-exchange membrane in electrochemical energy technologies. Since 2003, the electrochemical energy materials team in the Department of Chemistry, University of Surrey has been world leading in the study of such membranes in solid alkaline fuel cells. To mark the 10th year of these efforts in Surrey, the University of Surrey is hosting a 2 day workshop to establish a consensus of the state-of-the-art regarding the use of anion-exchange membranes in various electrochemical devices such as fuel cells, redox flow batteries, electrolysers and reverse electrodialysis cells. Select and renowned researchers from around the world [industrial and academic] have been invited to participate as have leading researchers in the UK. The workshop will also look at suitable next steps along with establishing new international collaborations in the field.

Complex Networks: When Complexity Meets Networks

Monday 29 July 2013

14:00 to 15:00
Prof Guanrong Chen, City University of Hong Kong, China

The current study of complex networks is pervading all kinds of sciences today, ranging from physical to biological and social sciences. Its impact on modern engineering and technology is prominent and will be far-reaching. Typical complex networks include the Internet, the World Wide Web, wireless communication networks, metabolic networks, biological neural networks, social relationship networks, and so on. Recently, research on fundamental properties and dynamical features of such complex networks has become overwhelming. One significant impact of this new network science on complexity study is its structural representation of the traditional description of complexity.

This talk will firstly provide a brief overview of three basic models of complex networks: the random-graph model, small-world model and scale-free model, and then discuss a few representative examples: the Internet, the WWW, scientific collaboration networks, and biological networks, which altogether will verify the network modeling theory and show some interesting real-world applications.

Shape acquisition and analysis on moving object

Wednesday 7 August 2013

14:00 to 15:00
Prof Hiroshi Kawasaki, Kagoshima University, Japan

Civil Engineering Research Seminar - August 2013

Thursday 8 August 2013

13:00 to 14:00
Karl Micallef

Assessment of Environmental Risks associated with Mercury in Mauritius: a small island developing state

Thursday 8 August 2013

13.00 hrs to 14.00 hrs
Vimi Dookhun, Department of Chemical Engineering, University of Mauritius

Small Island states can experience environmental problems arising from their position at the end of the supply chain which means that they can be “sinks” for persistent pollutants which are not present naturally.  

Unsupervised ensemble learning and its application to temporal data clustering

Friday 9 August 2013

14:00 to 15:00
Dr Yun Yang, Department of Computing, University of Surrey

Unsupervised classification or clustering is an important data analysis technique demanded in various fields including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Recently a large of number of studies has attempted to improve clustering by combing multiple clustering solutions into a single consolidated clustering ensemble that has the better performance among given clustering solutions. However, the different clustering ensemble techniques have their own behaviors on data of various characteristics. In this talk, I would like to introduce three of proposed unsupervised ensemble learning approaches for temporal data clustering. (i) The first approach is based on the ensemble of HMM k-models clustering, associated with agglomerative clustering refinement, for solving problems of finding the intrinsic number of clusters, model initialization. (ii) Secondly, a sampling-based clustering ensemble approach is proposed to construct multiple partitions on the subset of whole input instances selected by a smart weighting scheme, which combines the strength of both boosting and bagging approaches whilst attempting to simultaneously avoid their drawbacks. (iii) Finally, A weighted ensemble learning approach is proposed to capture the properties of temporal data and the synergy created by reconciling diverse partitions due to combining different representations. The proposed weighted function has out-standing ability in automatic model selection and appropriate grouping for complex temporal data.

Gaia Challenge

Monday 19 August 2013

With the launch of the Gaia satellite this year, the goal of this workshop is to test and improve methods for modelling the mass distribution in galaxies.

Visual Computing at Intel

Thursday 29 August 2013

11:00 to 12:00
Dr Oliver Grau, Intel Visual Computing Institute, Saarbrücken (Germany)

AES 52nd Conference

Monday 2 September 2013

Professor Stephen Elliott (ISVR, University of Southampton, UK), Professor Armin Kohlrausch (Philips Group Innovation and Eindhoven University of Technology, Netherlands) and Dr Frank Melchior (BBC Research & Development, Salford, UK)

Mining and the environment: Corporate perspectives and culture in Papua New Guinea

Wednesday 4 September 2013

13.00 hrs to 14.00 hrs
Professor Glenn Banks, Associate Professor, School of People, Environment and Planning, Massey University, NZ

The Papua New Guinea extractives industry is the cornerstone of the formal economy, accounting for up to 80% of formal exports and a third of GDP and government revenues annually. Currently based around 3 large-scale mines, the sector is set for further expansion with new mines coming on stream over the next decade.

Talk: Safety Management and Systems in the Cross Rail Project

Thursday 5 September 2013

12:00 to 13:00
Steve Hails, Health & Safety Director at Crossrail

Dense non-rigid motion capture from monocular video

Thursday 5 September 2013

14:00 to 15:00
Mr Ravi Garg, Queen Mary University of London

Physics Researcher Forum

Wednesday 18 September 2013

12:00 to 13:00

DataFurnace Mini-School

Tuesday 24 September 2013

09:00 to 16:00

DataFurnace mini-school: making full use of Total-IBA
24-26 September 2013 University of Surrey Ion Beam Centre,  Guildford,  UK

Talk: Laboratory Validation of Discrete Element Methods (DEM) and some applications

Wednesday 25 September 2013

14:00 to 15:00
Dr Liang Cui, Lecturer in Geotechnics, Dept. of Civil and Environmental Engineering, University of Surrey

Civil Engineering Research Seminar - September 2013

Thursday 26 September 2013

13:00 to 14:00
Dr. Juan Sagaseta

Civil and Environmental Lecture October 2013

Tuesday 1 October 2013

12:00 to 13:00
Andy Coatsworth

The Great East Japan Earthquake and implications for UK Nuclear Industry

Seminar by the Coordinator of the African Climate Policy Centre (ACPC)

Tuesday 1 October 2013

13.00 hrs to 14.00 hrs
Dr Youba Sokona, Visiting Professor CES, University of Surrey and Coordinator of the African Climate Policy Centre (ACPC) based in the United Nations Economic Commission for Africa

Dr Sokona will talk about his work; where he sees the knowledge gaps in sustainability (and development) and climate space.

Biophysical measurements for biomedical applications

Wednesday 2 October 2013

Dr Max Ryadnov, NPL


Wednesday 2 October 2013

17.30 to 20:00
Professor Subhamoy Bhattacharya

Hotting Up

Monday 7 October 2013

13.00 hrs to 14.00 hrs
Professor Chris Rapley CBE, M.A., Ph.D., D.Sc., Professor of climate change, University College London

Prof Chris Rapley will provide an update on the state of the evidence for human-induced climate change and will then address the issue of climate dismissal: Why is it happening and what can be done to turn around an increasingly unhelpful situation?

WSMS October Talk, Signature Materials – calling time on metal theft

Tuesday 8 October 2013

19:00 to 20:00
Presented by David W Arthur

Physics at the Atomic Weapons Establishement

Wednesday 9 October 2013

Peter Thompson, AWE

Inspiring Physics

Wednesday 16 October 2013

12:15 to 16:00

CopperDroid: On Reconstructing Android Malware Behaviors

Wednesday 16 October 2013

14:00 to 15:00
Dr Lorenzo "Gigi Sullivan" Cavallaro, Information Security Group (ISG), Royal Holloway, University of London

With more than 1 billion of activations reported on Sep 2013, Android mobile devices have become ubiquitous with trends showing that such a pace is unlikely slowing down. Android devices are extremely appealing: powerful, with a functional and easy-to-use user interface to access sensitive user and enterprise data, they can easily replace traditional computing devices, especially when information is consumed rather than produced. Application marketplaces, such as Google Play, drive the entire economy of mobile applications. For instance, with more than 1 million installed apps and a share of 35%, Google Play has generated revenues exceeding 9 billion USD. Such a wealthy and quite unique ecosystem with high turnovers and access to sensitive data has unfortunately also attracted the interests of cybercriminals, with malware now hitting Android devices at an alarmingly rising pace. Privacy breaches (e.g., access to address book and GPS coordinates), monetization through premium SMS and calls, and colluding malware to bypass 2-factor authentication schemes have become real threats.

In this talk Dr Cavallaro will present CopperDroid, an approach built on top of QEMU to automatically perform out-of-the-box dynamic behavioral analysis of Android malware. To this end, CopperDroid presents a unified analysis to characterize low-level OS-specific and high-level Android-specific behaviors. Based on the observation that such behaviors are however achieved through the invocation of system calls, CopperDroid's VM-based dynamic system call-centric analysis is able to describe the behavior of Android malware regardless of whether it is initiated from Java, JNI or native code execution.

Dr Cavallaro and his colleagues carried out extensive experiments to assess the effectiveness of their analyses on three different Android malware data set: one of more than 1,200 samples belonging to 49 Android malware families (Android Malware Genome Project), one containing about 400 samples over 13 families (Contagio project) and a last one, previously unanalyzed, made of more than 1,300 samples, provided by McAfee. Their experiments also show that a proper simple yet effective stimulation strategy (e.g., sending SMS, placing calls) successfully discloses additional behaviors on a non-negligible portion of the analysed malware samples.

Environmental risks in the presence of uncertainty

Thursday 17 October 2013

13.00 hrs to 14.00 hrs
Dr Sophie Rocks, Lecturer in Nanotoxicology in the Environmental Science and Technology Department at Cranfield University

The environmental risk portfolio within England and Wales is diverse in character and nature, ranging from “natural” events such as flooding and coastal erosion through to ”artificial” events including pesticide use and accidental release of chemicals.  

Inexact graph matching for interactive image segmentation: single and multiple images

Friday 18 October 2013

14:00 to 15:00
Prof Roberto M. Cesar Jr, University of São Paulo - USP (Brazil)

Corporate Responsibility Coalitions: The Past, Present, and Future of Alliances for Sustainable Capitalism

Wednesday 23 October 2013

13.00 hrs to 14.00 hrs
Prof David Grayson CBE, Director: The Doughty Centre for Corporate Responsibility, Cranfield School of Management, UK

The significance of business-led corporate responsibility coalitions is indisputable. The WBCSD has 200 member companies with combined annual revenues of US$7 trillion; the UN Global Compact has almost 8,000 corporate members, over two-thirds of them from developing countries. It is estimated that there are more than 110 national and international generalist business-led CR coalitions.

Nature's Engines: Powering Life

Wednesday 23 October 2013

19:00 to 20:00
Prof Julia Yeomans, University of Oxford

Evolving Spiking Neural Networks: Methods, Systems and Applications for Spatio- and Spectro-Temporal Pattern Recognition

Thursday 24 October 2013

14:00 to 15:00
Professor Nikola Kasabov, Director, Knowledge Engineering and Discovery Research Institute (KEDRI) Auckland University of Technology,

Spatio- and spectro-temporal data (SSTD) are the most common data in many domain areas, including: signal processing; bioinformatics; neuroinformatics; ecology; environment; medicine; economics, etc., and still there are no efficient methods to model such data and to discover complex spatio-temporal patterns from it. The talk introduces new methods for modeling and pattern recognition of SSTD based on evolving spiking neural networks (eSNN). eSNN develop their structure and functionality from streams of data in an on-line learning mode [1]. They consist of: input encoding module; 3D SNN reservoir structure; eSNN classifier. They can include also gene regulatory networks as [2]. Different eSNN models are presented, such as:  probabilistic neuronal model [3], the dynamic evolving SNN (deSNN) [4], SPAN [5], reservoir SNN NeuCube [6]; quantum inspired SNN [7] and others.

Applications across domain areas are demonstrated, including: moving object recognition [4]; integrated audio-visual pattern recognition [7]; EEG data modeling [8]; design of artificial cognitive and emotional systems [10]. Challenging open problems and future directions are presented [11,12].

Software systems for building SNN are demonstrated introduced the KEDRI Python EvoSpike simulator and the KEDRI MATLAB NeuCube simulator.

Civil Engineering Research Seminar - October 2013

Tuesday 29 October 2013

13:00 to 14:00
Seyed M K Sadr

A Scalable Online Solution to Multiagent Sequential Decision Making

Thursday 31 October 2013

14:00 to 15:00
Dr Yifeng Zeng, Teesside University

Interactions between agents generally arise when multiple autonomous agents operate in a common and uncertain environment. An agent might make a change to some feature of the environment that in turn impacts other agents who may possibly act in similar ways. The agent needs to optimize its policy given what it believes on both environmental states and other agents' behaviors. In this talk, I will present a new probabilistic graphical model (I-DIDs: Interactive Dynamic Influence Diagrams) for solving such a type of multiagent sequential decision problems. The new model is distinct from traditional solutions of Nash equilibrium that have drawbacks of both non-uniqueness and incompleteness. While our solution is granted the merits of online solutions, it is at the cost of maintaining and solving in principle an infinite number of other agents' models. I will sketch several inference algorithms, including exact and approximate ones, for efficiently solving the model. More importantly, I will show how the model may be applied and demonstrate its usefulness on the applications like strategy learning in computer games/UAV and the emergence of human-like behavior of mobile robots.

The Annual Roland Clift Lecture on Industrial Ecology

Wednesday 6 November 2013

19:00 to 20:15
Emeritus Professor Roland Clift, CBE, MA, PhD, FREng, FIChemE, FRSA, HonFCIWEM
Roland Clift Lectures


Named after CES' founding Director, Roland Clift, this new lecture series on Industrial Ecology is being launched following the Centre's 20th Anniversary in 2012 and will focus on topics concerning the future of human society and how quality of life will be affected by technical, environmental and social developments, where the analysis is based on empirical evidence.

Graph based intrusion detection for large complex networks

Wednesday 6 November 2013

13:30 to 14:30
Muttukrishnan Rajarajan, Professor of Security Engineering, City University, London

For a security analyst, determining whether a network asset has been compromised by or vulnerable to an attack is an important task. The process of accomplishing this task however is often tedious and involves studying the activities of network hosts and manually piecing together evidence collected from a range of security devices. Although many correlation frameworks exist, many rely on pre-domain knowledge. This presentation will introduce a new framework for observing and capturing host behaviour by analysing IDS logs to detect progressive attacks in complex networks.

“Oh I can’t be bothered today as I am on holiday”: sustainable tourism, sustainable lifestyles and the reflexive subject.

Thursday 7 November 2013

13.00 hrs to 14.00 hrs
Dr Paul Hanna, Senior Lecturer in Psychology, School of Applied Sciences, University of Brighton

In recent years a number of academics have argued that concepts such as space and time remain largely under-theorised within 'sustainable lifestyles’ perspectives. This paper aims to critically engage with such a position via research into an explicitly pro-sustainable behavior, ‘sustainable tourism’.

WSMS November Talk 2013

Tuesday 12 November 2013

6:45pm for 7:00pm
Dr Stafford Lloyd

Community-based initiatives on energy saving and behaviour change

Tuesday 12 November 2013

13.00 hrs to 14.00 hrs
Dr Nick Bardsley, Lecturer in Climate Change Economics, University of Reading and Dr Milena Büchs, Senior Lecturer in Sociology and Social Policy, University of Southampton

We report on quantitative and qualitative research into community based initiatives for energy saving. The quantitative component consists of a matched case and control study of thermal improvements to buildings coupled with behavioural intervention, conducted over three years.

Strategy to introduce education on how to live life in balance with the natural world’ to develop a sustainable future

Thursday 14 November 2013

13.00 hrs to 14.00 hrs
Shamini Holloway, Shamrock Harmony Ltd, Wellbeing, Arts, Nature and Diversity (W.A.N.D.) community Centres

Using design and alternative extracurricular education, to create community social spaces which introduce and exhibit eco lifestyle products and principles; such as Permaculture, Transition Towns and Forest School education- to urban and residential communities.

Particle Swarm Optimization: A Physics Perspective

Thursday 14 November 2013

15:30 to 16:30
Dr Jun Sun, Jiangnan University, China

This talk presents two variants of particle swarm optimization algorithms inspired by physics, the quantum-behaved particle swarm optimization (QPSO) and random drift particle swarm optimization (RDPSO). The QPSO algorithm is motivated by concepts in quantum mechanics and the trajectory analysis of the particle in the standard PSO, and it has been widely used in various application problems. Some recent theoretical results for the particle behavior in the QPSO algorithm are presented in this talk. The RDPSO algorithm is inspired by the free electron model in metal conductors placed in an external electric field. The free electron model considers that electrons have both a thermal and a drift motion in a conductor that is placed in an external electric field. The velocity equation of the particle is designed by simulating the thermal motion as well as the drift motion of the electrons, both of which lead the electrons to a location with minimum potential energy in the external electric field. Theoretical results on the particle behavior and the search nature of the algorithm, as well as results of empirical studies on the algorithm, are also presented.

Opening of the new Engineering Design Centre

Monday 18 November 2013


On Monday 18th November, the Mechanical Engineering Sciences Department announces the opening of the new Engineering Design Centre. 

The opening will showcase the recent £500,000 investment in facilties and equipment by the University.  The Centre will be used for teaching and support for undergraduate design, advanced projects and provides an exciting new space for the Formula Student racing team.  The Centre will be opened by IMechE CEO Stephen Tetlow MBE FIMechE CEng.

The afternoon, which will start at 3pm in room 24 BA 02 (Surrey Space Centre), includes an opening talk from the Department of Mechanical Engineering Sciences, followed by the official opening at the Design Centre and an open exhibition with the opportunity to talk to staff and students.

Opportunity to meet employers of physics graduates!

Tuesday 19 November 2013


 Employer forum, Tuesday 19 Nov 2013 at 6.30pm (LTA)

Of skeletons, guns and gunpowder: the power of X-ray vision

Wednesday 20 November 2013

19:00 to 20:00
Dr Silvia Pani, University of Surrey

SEPnet Students' Expo

Wednesday 20 November 2013

10:00 to 16:00

Each year SEPnet funds physics undergraduates from the SEPnet consortium of physics departments in the South East to undertake work placements in science and technology.  The Students’ Expo provides an opportunity for students to showcase their work through presentations and posters to over 100 employers, academic tutors and peers.

UK Space - Past, Present and Future

Wednesday 20 November 2013

Abigail Hutty, Structures Engineer (Astrium Ltd)

This lecture is presented by the IMechE Thameswey Region Farnborough and Guildford Area, jointly with the RAeS Weybridge Branch.

Civil Engineering Research Seminar - November 2013

Thursday 21 November 2013

13:00 to 14:00
Hesam Mehrabi Mahani

Role of Life Cycle Approaches in Sustainable Consumption and Production. An overview of on-going efforts to mainstreaming Life Cycle Approaches in the United Nations Environment Programme

Thursday 28 November 2013

13.00 hrs to 14.00 hrs
Dr Llorenç Milà i Canals, Programme Officer, UNEP, Paris

The Agenda 21 (Rio de Janeiro, 1992) suggests that “the major cause of the continued deterioration of the global environment are the unsustainable patterns of consumption and production…”. Sustainable consumption and production (SCP) is defined as “the use of services and related products, which respond to basic needs and bring a better quality of life while minimising the use of natural resources and toxic materials as well as the emissions of waste and pollutants over the life cycle of the service or product so as not to jeopardise the needs of future generations” (Norwegian Ministry of Environment, Oslo Symposium, 1994).

An efficient approach to non-dominated sorting for evolutionary multi-objective optimization

Thursday 5 December 2013

15:30 to 16:30
Dr Xingyi Zhang, Anhui University, China

Non-dominated sorting is a widely adopted technique for selecting next population in multi-objective evolutionary algorithms. This technique, however, can be computationally expensive, especially when the number of individuals in the population becomes large. In this talk, I will review one of our recent works in non-dominated sorting, called efficient non-dominated sort (ENS). This method adopts a framework completely different from existing non-dominated sorting approaches: a solution to be assigned to a front needs to be compared only with those that have already been assigned to a front, thereby avoiding many unnecessary dominance comparisons. Finally, I will give a new observation for non-dominated sorting in many objective optimization.

VPC: Visual Password Checker

Friday 6 December 2013

15:00 to 16:00
Nouf Aljaffan, PhD Student, University of Surrey

Users’ choices of passwords have posed a well-known usability/security dilemma.  Users tend to select more memorable passwords that are easier to crack while stronger passwords are normally harder to recall. Proactive password checkers have been suggested as a solution to motivate users toward better password choices via direct feedback of the password strength estimate. However, they pose problems in providing often inadequate and too basic feedback and in the inconsistency among different security strength estimators. Therefore, users often do not comprehend the reasons behind password weaknesses and how to improve them. This paper proposes a new type of password checkers named Visual Password Checker (VPC), with special attention to better educate users about different password threats which in turn help them to define stronger passwords. The VPC provides users with immediate, detailed and tailored 2-D visual guidance that analyses the password under evaluation against multiple threats such as naive, “smarter” and personalised dictionary attacks and brute force attack. It visualises detected multiple threats simultaneously and offers detailed information about each of them. It also helps users to compare different password strength estimators more easily. The system is designed to have a reconfigurable interface for adding more dictionaries and adjusting its look. It is a pure client-side solution that can be easily incorporated into any website and can run from resource-constrained devices like smartphones. A prototype system has been developed and a number of user studies are being planned to verify its effectiveness in real world.

WorleyParsons: Presentation for FEPS students

Monday 9 December 2013


You can register for this event on the Surrey Careers service website. If you register for this event and then find you cannot attend, please let the Careers Service know. Many thanks.

WSMS December Talk 2013

Tuesday 10 December 2013

Dr Anna Scott, University of Southampton

3 Minute Wonder Competition at IOP

Tuesday 10 December 2013

18:00 to 21:00

"3 Minute Wonder" is a competition that challenges researchers in physics-related fields (in industry or academia) to explain their work to the public in – you’ve guessed it – just three minutes.

Speech based cognitive workload monitoring

Wednesday 11 December 2013

14:30 to 15:30
Dr Jón Guðnason, Reykjavik University (Iceland)

Selecting Ensemble Members for Time Series Prediction

Thursday 12 December 2013

15:30 to 16:30
Chris Smith, PhD Student, Department of Computing, University of Surrey

Ensembles have been shown to provide better generalization performance than single models. However, the creation, selection and combination of individual predictors is critical to the success of an ensemble, as each individual model needs to be both accurate and diverse. In this talk I will present a multi-objective evolutionary algorithm that trains and optimizes the structure of recurrent neural networks for time-series prediction. I will then present two methods of selecting individual prediction models from the Pareto-set of solutions. The first method selects individuals near to the knee point of the Pareto-set and the second based on the diversity of the individual predictors. Results for two time-series data sets show that these two methods are better than selecting individuals based on the training error, but not always better than selecting all individuals.

Do Biometric Images Follow Benford's Law?

Monday 16 December 2013

11:00 to 12:00
Aamo Iorliam, PhD Student, University of Surrey

Tampering of biometric samples is becoming an important security concern. Tampering can take place at the sensor level (spoofing), and through the backend, e.g., replacing the template with another sample. One example of backend attack is manipulating the original biometric image i.e. contaminating the template. We study one particular aspect of tampering: image manipulation. In the forensics literature, Benford’s law has been reported to be very effective in detecting tampering of natural images. In this paper, our motivation is to examine whether biometric images will follow the Benford’s law and whether or not they can be used to detect potential malicious tampering of biometric images. We find that, the biometric samples do indeed follow the Benford’s law; and the method can detect tampering effectively, with Equal Error Rate (ERR) of 0.55% for single compressed face images, 2.7% for single compressed fingerprint images, 4.3% for double compressed face images and 3.7% for double compressed fingerprint images.

Why Green Consumerism Sucks

Tuesday 17 December 2013

13.00 hrs to 14.00 hrs
Dr Tom Crompton, Change Strategist, WWF-UK

Mainstream environmentalism is dangerously obsessed with getting people to 'save the planet' while doing other things - shopping, looking cool, or just mindlessly getting on with life. Here's why it won't work, and why enthusiasts for green consumerism press on regardless.

Civil Engineering Research Seminar - December 2013

Tuesday 17 December 2013

13:00 to 14:00
Ron Logan

Indy Development Q&A

Tuesday 17 December 2013

17:30 to 18:30
Charles Griffins, a local indie and a BAFTA's 2011 "Brits to watch" developer

After the success of the first one, CompSoc is hosting another presentation and Q&A with gaming industry veterans! This time we have Charles Griffins a local indie and a BAFTA's "Brits to watch" developer!

Charles is going to speak about his experiences as a designer and scripter in EA, Lionhead and most recently as an indie. He also plans sharing what he knows about the actual hands-on work that goes into making a large-scale game as himself is a Computing graduate. A Q&A session will follow.

Expressive Talking Heads

Wednesday 18 December 2013

14:00 to 15:00
Dr Bjorn Stenger, Toshiba Research Europe (Cambridge)

Explicit Diversity Classifier Ensembles

Thursday 19 December 2013

15:30 to 16:30
Shenkai Gu, PhD Student, Department of Computing, University of Surrey

Previous researches concluded that both accurate and diverse base learners is the key to a successful ensemble. Multi-objective evolution algorithms are widely used for exploring those base learners. Past researches try to find ensemble members in the training populations, while the diversity is measured among the base learners over the entire population during training but only a part of the base learners will be selected for ensembles. However, the selection will implicitly alter the diversity value. In this talk, I will present a new training model that trains an ensemble group at a time with explicit diversity measurement over all base learners being used in the ensemble. The result shows group ensemble training finds various good combination that overcome the performance of single models.

Investing Sustainably - can it really make a difference?

Thursday 9 January 2014

13.00 hrs to 14.00 hrs
Dr Peter Michaelis, A former doctoral student in CES and now Head of Sustainable and Responsible Investment (SRI) at Alliance Trust - looks back on his fourteen years experience in SRI

As individuals our influence on the economy is generally thought to be limited to our spending habits. What is overlooked is the influence we have as investors: it is our pensions and life cover plans which own large percentages of the companies which dominate our economies. We have just as much choice in where we invest as in where we shop. So should those of us wanting to create a more sustainable economy, care more about where we invest?

Eavesdropping near field contactless payments: A quantitative analysis

Tuesday 14 January 2014

15:00 to 16:00
Thomas Diakos, PhD Student, University of Surrey

We present a quantitative assessment in terms of frame error rates for the success of an eavesdropping attack on a contactless transaction using easily concealable antennas and low cost electronics. An inductive loop, similar in size to those found in mobile devices equipped with NFC capabilities, was used to emulate an ISO 14443 transmission. For eavesdropping we used an identical loop antenna as well as a modified shopping trolley. Synchronisation and frame recovery were implemented in software. As a principal result of our experiments we present the FER achieved over a range of eavesdropping distances, up to 1m, at different magnetic field strengths within the range specified by the ISO 14443 standard.

Spatio-temporal video segmentation with shape growth or shrinkage constraint

Wednesday 15 January 2014

15:30 to 16:30
Dr Yuliya Tarabalka, INRIA Sophia-Antipolis Méditerranée, Sophia Antipolis (France)

Civil Engineering Research Seminar - January 2014

Thursday 16 January 2014

13:00 to 14:00
Pam Billy Fom

A Novel Image Restoration Scheme Based on Structured Side Information in Digital Watermarking Systems

Monday 20 January 2014

11:00 to 12:00
Hui Wang, PhD Student, University of Surrey

In this talk the speaker will present a new image restoration method based on a linear optimization model which restores part of the image from structured side information (SSI). The SSI can be transmitted to the receiver or embedded into the image itself by digital watermarking technique. In this talk the main focus is a special type of SSI for digital watermarking where the SSI is composed of mean values of 4x4 image blocks which can be used to restore manipulated blocks. Different from existing image restoration methods for similar types of SSI, the proposed method minimizes image discontinuity according to a relaxed definition of smoothness based on a 3x3 averaging filter of four adjacent pixel value differences, and the objective function of the optimization model has a second regularization term corresponding to a 2nd-order smoothness criterion. Experiments showed that when the proposed image restoration method is applied to the target self-restoration watermarking scheme, the average visual quality of 100 recovered images is improved by around 2dB measured in Peak Signal-to-Noise Ratio (PSNR) and around 0.04 in Structural Similarity Index (SSIM).

Perceptually Optimized Sound Zones Research Talk

Tuesday 21 January 2014


Perceptually Optimised Sound Zones - IOA Southern Branch joint evening meeting

Tuesday 21 January 2014

18:30 (AGM), 19:00 start

Often, two people in a single room want to listen to different items of audio. It may be that one person wants to watch television whilst the other wants to listen to the radio, or even that one wants to play a computer game whilst the other reads in silence. The obvious solution to this would be for all individuals to wear headphones, however this dramatically increases isolation (not just in acoustic terms), is impractical when multiple people want to listen to one or other of the audio streams, and could be uncomfortable over an extended period.

Crime, Corruption and Development: the Case of the Caribbean

Thursday 23 January 2014

13.00 hrs to 14.00 hrs
Professor Tony Clayton CES Visiting Professor, Professor of Caribbean Sustainable Development, University of the West Indies

This seminar will examine the impacts of crime and corruption on the development of small island developing states (SIDS), with particular regard to the Caribbean nations. The SIDS nations are regarded as highly vulnerable to natural disasters, climate change and external shocks. However, crime, corruption and poor governance have actually inflicted far more harm.

Improving Conditional Probability Based Camera Source Identification

Monday 27 January 2014

11:00 to 12:00
Syamsul Yahaya, PhD Student, University of Surrey

Conditional probabilities (CP) in frequency domain have been proposed as a feature space in multimedia forensics for identifying sources of digital images and videos produced by digital cameras. While this approach has been proved very effective for both image and video source identification, the CP features used in previous work are selected in a rather arbitrary way and it remains a question if all of them indeed contribute to the final classification result. In this paper, we revisit the selection process of CP features and propose to identify good features using some statistical analysis. In previous work, 72 CP features were used for video source identification and this allowed us to reduce the number of selected features to 15 “good” ones but keep the classification performance at the same level. To be more exact, when frame-based CP features are used with simple majority voting to classify digital videos produced by eight cameras of different models, the reduced set of 15 CP features gave an overall recognition rate of 96.2%, which is nearly the same as the rate when all the 72 features are used (96.3%). In addition to the feature reduction approach, we also investigate using means and standard deviations of CP features across frames as new (video-based) features. Experimental results show that this approach can drastically reduce the computational costs by a factor close to 100 but achieve similar classification accuracy (96.8%) compared with the case when the 15 good frame-based CP features are used with simple majority voting.

Shape Knowledge in Segmentation and Tracking

Wednesday 29 January 2014

14:00 to 15:00
Dr Victor Adrian Prisacariu, University of Oxford

Energy symbiosis and decentral energy supply as a part of German renewable energy transformation

Thursday 30 January 2014

13.00 hrs to 14.00 hrs
Prof. Dr.-Ing. Susanne Hartard, Professor Industrial Ecology, University of Applied Sciences Trier Environmental Campus Birkenfeld

Germany is following the sustainable path towards a future 100% renewable energy supply and will close the last atomic power plant in 2022. The challenge is high investments, the expansion of the electricity grid and especially a complete transformation from a former pure central energy supply towards decentral concepts with a lot of plants included. New investment and organization structures are needed and local and new networking concepts become more important.

WSMS February Talk

Tuesday 4 February 2014

Presented by Dr Peter Northover, Senior Research Fellow, Head of Materials Science-based Archaeology Group, Oxford Materials

Civil Engineering Research Seminar - February 2014

Thursday 6 February 2014

13:00 to 14:00
Mr Jianfei Peng

Cloning Localization Based on Feature Extraction and K-means Clustering

Monday 10 February 2014

11:00 to 12:00
Areej Alfraih, PhD Student, University of Surrey

The field of image forensics is expanding rapidly. Many passive image tamper detection techniques have been presented. Some of these techniques use feature extraction methods for tamper detection and localization. This work is based on extracting Maximally Stable Extremal Regions (MSER) features for cloning detection, followed by k-means clustering for cloning localization. Then for comparison purposes, we implement the same approach using Speeded Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT). Experimental results show that we can detect and localize cloning in tampered images with an accuracy reaching 97% using MSER features. The usability and efficacy of our approach is verified by comparing with recent state-of-the-art approaches.

Developing your career in the Satellites Industry: A lecture on NanoSats/CubeSats and a tour of the Surrey Space Centre

Wednesday 12 February 2014

18:30 to 21:00
Professor Craig Underwood, Deputy Director of the Surrey Space Centre

The University of Surrey and its spin-out, SSTL, are world leaders in the design, construction and operation of micro-satellites. Recent technological advances have made it possible to construct even smaller satellites, at an order of magnitude less cost. These “nano-satellites” open up many new possibilities for space exploration. 

Making A Better World

Thursday 13 February 2014

14.15 hrs to 15.30 hrs
Jonathon Porritt, Founder Director Forum for the Future

Once again CES is delighted to welcome the distinguished writer and campaigner Jonathon Porritt to address students and staff as part of the Sustainable Development: Applications course.

Tomorrow's Mathematicians Today 2014

Saturday 15 February 2014

09:00 to 17:00
Professor Luis Fernando Alday
Tomorrow's Mathematicians Today 2014

The Institute of Mathematics and its Applications (IMA) and the University of Surrey are proud to present Tomorrow's Mathematicians Today, an undergraduate mathematics conference supported by the IMA.

Special thanks go to Noel-Ann Bradshaw (University of Greenwich, initiator of the conference series) for her assistance and help with the organisation, and to Adam Sebestyen who designed the initial TMT logo.

Registration for this event is now closed.

The programme for the day is now available (PDF, 0.9 MB), and the abstracts for the talks are also available (PDF, 146 KB)

Threshold Blind Signatures

Monday 17 February 2014

11:00 to 12:00
Veronika Kuchta, PhD Student, University of Surrey

This paper formalizes the concept of threshold blind signatures (TBS) that bridges together properties of the two well-known signature flavors, blind signatures and threshold signatures. Using TBS users can obtain the signature through interaction with t-out-of-n in a blind way, i.e. without disclosing the corresponding message to any of those signers.

In addition, the paper shows how to construct a secure TBS scheme in the standard model. The resulting scheme can be seen as an extension of Okamoto's blind signature scheme (TCC 2006) with secret sharing techniques. The most significant applications of the scheme can be found in e-voting, where the threshold property offers stronger security guarantees.

Socio-economic assessment of biomass supply chains. What needs to be assessed?

Thursday 20 February 2014

13.00 hrs to 14.00 hrs
Dr Rocio A Diaz-Chavez, Research Fellow, Centre for Environmental Policy, Imperial College London

The potential on the use of biomass resources for the production of power, transport fuels and chemicals has become an important target in many countries looking for added economic value to the biomass. To achieve this, it will be necessary a change in the technology used for producing, handling and processing the raw biomass materials.

Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it

Friday 21 February 2014

10:00 to 12:00
Dr Adrian Waller, Consultant, Thales Research and Technology, Thales UK

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Secure Mobile Logins

Monday 24 February 2014

11:00 to 12:00
Franziskus Kiefer, PhD Student, University of Surrey

Password based authentication remains the most common authentication method on the internet and in particular on mobile devices. Yet, no satisfying, secure methods are deployed on mobile devices. We discuss challenges for secure password-based login mechanisms in mobile browsers and propose a solution secure against impersonation attacks, i.e. phishing attacks. We design and implement a drop-in replacement for the password over HTML authentication mechanism in mobile browsers that builds upon cryptographically sound primitives. Our result includes a ready to use Android application and an easy to set-up and use authentication server for integration into existing application servers.

The Internet of Things and building a digital ecosystem

Monday 24 February 2014

18:00 to 19:00
Dave Locke, Senior Inventor, Pervasive and Advanced Messaging Technologies, IBM

The Internet of Things is IBM’s cloud services solution and it is consider one of the best and most widely-used out there, connecting millions of devices everyday! This interactive talk is organised by the CompSoc (Computer Society) run by students of the Department of Computing.

Dense 3D Reconstruction from High Frame-Rate Video using a Static Grid Pattern

Thursday 27 February 2014

11:00 to 12:00
Dr Ryusuke Sagawa, National Institute of Advanced Industrial Science and Technology (AIST), Japan

The Energy of Nations - Risk Blindness and the Road to Renaissance

Thursday 27 February 2014

13:00 to 14:00
Dr Jeremy Leggett, Chair Solarcentury and SolarAid

Brain scientists tell us we have a very worrying collective tendency for blindness to the kind of risks that can crash economies, and imperil civilisations. The shocking recent history of the financial industries suggests they are right.

Evolutionary Learning of Counter-propagation Neuro-Controllers for Multi-objective Robot Navigation

Thursday 27 February 2014

15:30 to 16:30
Amiram Moshiov, Tel-Aviv University, Israel

This study explores evolutionary training of Counter-Propagation Neuro-Controllers (CPNCs) for applications in Evolutionary Robotics. It concerns navigating a robot in an environment that differs from the trained one. The evolutionary training of CPNCs is compared with that of the traditional Feed-Forward Neuro-Controllers (FFNCs). In contrast to FFNCs, CPNCs are neuro-controllers that do not process sensory information directly into actions. Rather, there are two mappings involved. First, the sensed input is mapped into a class that represents prototypical information about the environment. This is achieved in the first layer of Kohonen neurons. Next, each class, which is represented by a weight vector, is mapped into actions, via a Grossberg layer. The evolutionary training of the CPNCs is done using a two phase approach. The first phase primarily involves the unsupervised learning of the classes, and the second phase mostly deals with the adjustment of the control mapping.

To diversify trained solutions, and to obtain controllers for various scenarios, a multi-objective evolutionary approach is used. The evolved CPNCs exhibit multi-objective characteristics. These are reflected by the different degrees of path safety and attraction to targets, in both the trained and tested environments. For the studied case, the CPNCs are found to be statistically superior to the FFNCs with respect to the obtained performances, the learning rates and the generalization capabilities. Following the comparison, we provide initial results concerning an overall analysis of the correlation between the evolved number of Kohonen clusters, in the combined non-dominated set of controllers, and the evolved overall multi-objective performance.

Security: Where is IBM placing its bets?

Friday 28 February 2014

10:00 to 12:00
Prof Steve Legg, IBM University Relations Manager and Royal Academy of Engineering Visiting Professor

As a large and diverse hardware / software / services organisation IBM needs to decide where and how to deploy its resources to compete in a wide range of markets. The investment of over $6B annually in its Development and its Research activities is guided by a formal process to pick technology areas that will make a difference in the future for IBM and its clients.

In this lecture Steve will describe how IBM makes its investment priority choices, how they have evolved over the last decade and where it is placing its bets in IT and  in Security for the next few years.

Cryptanalysis of a Class of Chaos-Based Image Encryption Schemes

Tuesday 4 March 2014

15:30 to 16:30
Dr Chengqing Li, Associate Professor, Xiangtan University, China

The subtle similarities between cryptography and chaos theory make the design of chaos-based encryption schemes become a hot research subject in the past two decades. As a result, a large number of encryption schemes based on chaos theory have been proposed to date. Among them, many schemes share the same structure, namely combination of multiple rounds of two basic parts: position permutation and value substitution, which is also a typical structure of the traditional text encryption schemes. In this talk, first, preliminary knowledge of cryptanalysis is introduced. Then, a class of chaos-based image encryption schemes, which share the same structure, is reviewed. Further, recent research progress on breaking the aforementioned two separate basic parts, when the round number is equal to one, is presented. Finally, the recent research results on breaking the two basic parts separately, when the round number is more than one, are reported with detailed discussions.

Secure Futures

Friday 7 March 2014

Today, cyber security is headline news and touches every corner of society.

The University of Surrey is collaborating with e-skills UK to help local school children to discover this exciting field at a Secure Futures event, held at Surrey's Department of Computing.

Quality as a prerequisite for security in interoperable systems

Friday 7 March 2014

10:00 to 12:00
Mr Peter Davies, Technical Director, Thales UK

We are all facing enormous challenges, now and into the future, in the way that assurance of ICT products and systems is provided and there is a pressing need to review the thinking about assurance. I will argue that we only truly understand the 'security' of an interoperable system when we understand the 'quality' level to which that system has been implemented. I will further argue that a laxity in our linguistic definitions means that we increasingly do not understand what is meant when we are discussing the security.

11th Annual Computing Department PhD Conference

Monday 10 March 2014

9:00 to 17:00
To be announced

The 11th Annual Computing Department PhD Conference will be taking place on Monday 10 March 2014 in Lecture Theatre 1DK02 in the morning and in Lecture Theatre L in the afternoon, University of Surrey, Guildford.

Physics Researcher Forum

Wednesday 12 March 2014

13:00 to 14:00

Open to Physics PhD and Postdoctoral researchers

The Boeing Dreamliner

Wednesday 12 March 2014

João Miguel Santos FRAeS, Vice President of Africa Boeing International

"The 787 Dreamliner - where we have been, how did we get here and where are we going?"

Joint with the RAeS Farnborough Branch

Civil Engineering Research Seminar - March 2014

Thursday 13 March 2014

13:00 to 14:00
Francisco Comin

The Future of Security

Friday 14 March 2014

10:00 to 12:00
Dr Alastair MacWilson, Former Global Managing Director, Accenture Technology Consulting

This seminar is going to describe where the future of the security is and where it is not.  It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research, It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators. It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Gait Analysis Using Wearable Sensors

Friday 14 March 2014

13:00 to 14:00
Dr Delaram Jarchi, Research Associate, Department of Computing, Imperial College London

Gait analysis or systematic evaluation of bipedal locomotion provides important information about the human biomechanics, pathology and behaviour. One important application of gait analysis is to create a mobility assessment tool for patients following orthopaedic surgery. With recent advances in wearable sensing technologies, the practical use of the wireless inertial sensors for gait analysis has been widely increased. However, the use of a reliable gait analysis system for everyday clinical utilisation and home-based monitoring under realistic real-life situations remains limited. For patient studies, integration of all sensing capabilities into a single wireless sensor node has specific advantages. In this talk we look into the recent advances in gait analysis based on a single sensor and discuss the performance, reliability and practical use of a developed gait analysis platform for creating future monitoring systems.

Causal Mode Decomposition for Motion Correction and Segmentation in Renal DCE-MRI Medical Imaging

Monday 17 March 2014

11:00 to 12:00
Santosh Tirunagari, PhD Student, Department of Computing, University of Surrey

Dynamic contrast enhanced magnetic resonance renography (DCE-MRI), in common with other medical imaging techniques, is influenced by respiratory motion. As a result the data quantification may be inaccurate. This paper presents a novel method for motion correction as well as segmentation using Causal Mode Decomposition (CMD). In the present study, for the first time, we introduce CMD to the field of medical imaging by analysing the renal DCE-MRI imaging data. Analysing these images is essential in understanding the fundamental characteristics of renal perfusion and filteration. This novel method is applied to ten healthy volunteers' renal DCE-MRI data. CMD reconstruction results in the motion correction and CMD projections result in segmentation of the renal DCE-MRI data. Both qualitative and quantitative evaluation was performed against the original images using region of interest analysis.

Engaging Hairdressers in Pro-environmental Behaviours

Tuesday 18 March 2014

13.00 hrs to 14.00 hrs
Dr Denise Baden, School of Management, University of Southampton

A year-long project funded by the ESRC which asked hairdressers to consider how they could best diffuse greener practices to their clients,either by modelling of greener practices, or by explicitly passing on advice and information.

Advanced Materials for a Modern Age Symposium

Wednesday 19 March 2014

13:30 to 17:15

As part of the “Surrey Sevens for 2014” programme we will be holding a half day symposium on Advanced Materials on Wednesday 19 March 2014 in the Ivy Arts Centre on campus.

Identity is the New Money

Friday 21 March 2014

10:00 to 12:00
David Birch, Director, Consult Hyperion

David Birch from Consult Hyperion will give a talk based on his forthcoming book “Identity is the New Money” explaining Bitcoins and the stone currency of island of Yap, the reason why social networks will replace cash and the case for a National Entitlement Scheme. In 2013, Wired magazine named him one of their global top 15 favourite sources of finance and business information and he was ranked Europe’s most influential commentator on emerging payments by Total Payments magazine so you’d be mad to miss out.

This seminar is going to describe where the future of the security is and where it is not.   It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research,  It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators.  It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Family Bootstrapping: a Genetic Transfer Learning Approach for Onsetting the Evolution for a Set of Related Robotic Tasks

Thursday 27 March 2014

15:30 to 16:30
Amiram Moshaiov, Tel-Aviv University, Israel

Studies on the bootstrap problem in evolutionary robotics help lifting the barrier from the way to evolve robots for complex tasks. It remains an open question, though, how to reduce the need for designer knowledge when devising a bootstrapping approach for any particular complex task. Recent developments in the field of transfer learning may help reducing this need and support the evolution of solutions to complex tasks, through task relatedness. Relying on the commonalities of similar tasks, we introduce a new concept of Family Bootstrapping (FB). FB refers to the creation of biased ancestors that are expected to onset the evolution of "a family" of solutions not just for one task, but for a set of related robot tasks. A general FB paradigm is outlined and the unique potential of the proposed concept is discussed. To highlight the validity of the FB concept, a simple demonstration case, concerning the evolution of neuro-controllers for a set of robot navigation tasks, is provided. The FB concept resulted from an earlier work on bootstrapping the co-evolution of soccer-like players, which is also briefly reported.  The presentation is concluded with some suggestions for future research.

Can shale gas be part of the UK's low-carbon transition?

Thursday 27 March 2014

13.00 hrs to 14.00 hrs
Dr Maria Sharmina, Tyndall Centre for Climate Change Research

With conventional natural gas reserves declining globally, shale gas has emerged as a potentially significant new fossil fuel source. This new availability and apparent abundance of shale gas in the US (and potentially elsewhere) has led some to argue that shale gas could, in principle, be used to substitute more carbon intensive fuels such as coal in electricity generation.

Building Integrated Cyber Defences

Friday 28 March 2014

10:00 to 12:00
Peter Kemp, Technical Lead for Cyber Intelligence, QinetiQ

Computer Network Defence is a fascinating and ever changing subject. Having worked with some of the best, and worst, organised network defences in the UK, I propose to show you how to consider your Cyber Defences as a whole, not focussing on a single aspect, and how to plan to build a capability from scratch in a methodical way, encompassing hardware, software, and the people who will operate it, and how the system becomes stronger than the sum of its parts.

Multimodal Ageing (or habituation)

Monday 31 March 2014

11:00 to 12:00
Dr Norman Poh, Lecturer, Department of Computing, University of Surrey

As we grow old, our biometric traits will also change. Indeed, there is increasing evidence of ageing across a number of biometric modalities. However, whether or not a multimodal biometric system suffers from the ageing is an issue that has not been investigated. We conjecture that if the underlying biometric modalities may change over time, the resultant multimodal biometric system should also change. In order to detect minute score changes over time, we use a subject-dependent regression-based framework to detect ageing. Based on the Mobile Biometry (MOBIO) database with talking face and speech modalities, our findings suggest that the change of biometric performance over time can be positive or negative, that is, for some subjects, the system performance actually improves with use, hence suggesting potential habituation. Yet, for most other users, the system performance degrade over time.

Civil Engineering Research Seminar - April 2014

Tuesday 1 April 2014

13:00 to 14:00
Ms Hooi Ying Lee

IoP Public Talk: “Designing and evaluating informative climate forecast systems”.

Wednesday 2 April 2014

19:00 to 20:00
Dr Emma Suckling, University of Reading

Business Development: How to Connect and Work with Business

Wednesday 2 April 2014

Celia Gaffney, Business Development Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Business Development: How to Connect and Work with Business on Wednesday 2nd April in room 40 AA 03, with lunch available from 12:45 for a 13:00 start.

Modelling Climate Change and Development - Starting with our development goals

Wednesday 2 April 2014

13.00 hrs to 14.00 hrs
Jeremy Webb, African Minerals Development Centre, UN Economic Commission for Africa (UNECA)

It is widely recognised that climate change is a development issue, not just in terms of the impacts of climate change but also the development implications associated with climate change negotiations.  

Touch and pay... or far and pay?!

Thursday 3 April 2014

14:00 to 15:00
Dr Ioana Boureanu Carlson, researcher in cyber security

Smartcard-based protocols represent an increasingly large share of the wireless authentication solutions market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to this development. However, such attacks could be mitigated through the use of distance-bounding protocols. In this talk, we will discuss the core challenges for distance-bounding, of which some have recently been overcome, whereas others still stand prominently.

We will focus mostly on the security of these wireless protocols, from attacks and new, secure designs. We will finish with a vision for the future of these protocols, the possible and advisable paths towards, e.g., securing contactless payments.

The Cyber Threat Landscape and Hunting the Adversary

Friday 4 April 2014

10:00 to 12:00
Dr Adrian Nish, Senior Consultant and Cyber Threat Intelligence Lead, Detica

The corporate IT network is a battle-ground for a range of modern threats. Cybercriminals looking to make financial gain, attention-seekers trying to create headlines, professional hackers aiming to steal sensitive documents, and even moles acting as legitimate employees all create significant risks for those tasked with defending the network. To make matters worse, the traditional technology and methods of these defenders has failed to keep pace with the ingenuity of the attackers and the industrialisation of their methods. This seminar will give an overview of the threat landscape and draw on real case studies from investigations done by Detica’s Cyber Security services. Examples of social engineering tricks, exploits, custom malware, and threat correlation will be presented along with descriptions of some of the cutting-edge techniques being used to detect them.

The Privatisation of Biodiversity? - New Approaches to Nature Conservation Law

Wednesday 9 April 2014

13.00 hrs to 14.00 hrs
Dr Walters Nsoh, School of Law, University of Dundee

The UK failed to meet its target of halting biodiversity loss by the end of 2010. A new biodiversity plan launched in 2011, “Biodiversity 2020”, further extends the target of halting overall biodiversity loss to 2020. Although some progress is being made, the current policy and regulatory approaches have not prevented, far less reversed, the loss of biodiversity across the country.

Brain Computer Interfaces for Neurofeedback and Medical Applications

Thursday 24 April 2014

14:00 to 15:00
Dr Loukianos Spyrou, Donders Research Institute, Radboud University Nijmegen, Netherlands

Brain Computer Interface (BCI) technology has advanced over the last decade to the point that it can be applied with success in a variety of fields. Two novel and mobile BCI designs and their technical details (signal processing and machine learning) from the Donders Institute research group in Netherland ( will be presented. One is based on event-related neurofeedback to aid language and sound learning. The second one is an intra-operative awareness monitor which aims to serve as an indication of increased awareness during a surgical procedure.

Getting your hands dirty - how to engage industrial partners and bid to the TSB

Wednesday 30 April 2014

Peter Lancaster, Impact Acceleration Account KE Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Getting your hands dirty - how to engage industrial partners and bid to the TSB on Wednesday 30th April in room 40 AA 03, with lunch available from 12:45 for a 13:00 start.  

Science Showoff

Wednesday 30 April 2014


The night before the British Science Association Science Communications Conference begins at the University of Surrey, we bring you Science Showoff. Join us for a fun packed evening of science humour and general silliness.

Buy tickets

Application of Surface Analysis to Turbine Blades, Tissue Scaffolds and Plastic LEDs

Wednesday 30 April 2014

Dr David McPhail, Imperial College

Further information to follow.

Security issues for developers using Microsoft technologies

Friday 9 May 2014

10:00 to 12:00
Chris Seary, Independent Security Consultant

His first presentation will demonstrate application security threats, showing actual code exploits and how they can be prevented. This is based on Chris' experience as a security consultant, and also his time working as a developer. The presentation will involve actual demonstrations of various types of web site attack, with full code examples. Chris will then proceed to give an overview of the secure application life cycle within a large organisation, and some of the issues faced. How do banks keep ahead of both external attackers and internal threats, such as rogue traders?

The second presentation will look at application specific methods for securing communications. This will delve into subjects such as WS-Security and WS-Federation. This is true application-level security, incorporating XML encryption methods. Many third party applications now offer a WS-Security authentication suite, allowing complex web service security facilities, such as federated identity.

Cyber security - what is happening and why?

Friday 16 May 2014

10:00 to 12:00
Mike St John Green, Recently retired from government

The Internet of Things, Smart Meters, the IP connection of Process Control Systems, Big Data, consumerisation and mobility are all part of the rapidly changing landscape of cyberspace, a place we all rely on for an ever increasing proportion of our social and economic activity. But news stories reveal that the environment is far from safe and secure. What are the forces at play? I will consider how the shape of cyberspace is changing and the issues this poses for industry, governments and users as we work to make cyberspace sufficiently safe and secure.

Re-assessing resource risks and criticality

Wednesday 21 May 2014

13.00 hrs to 14.00 hrs
Prof Raimund Bleischwitz, BHP Billiton Chair in Sustainable Global Resources University College London (UCL) UCL Institute for Sustainable Resources

While strategic studies on natural resources usually focus on the criticality of certain single materials, this lecture starts from the inter-linkages between and among resources (called “the resource nexus”). It discusses the impact any food and water stress may have on extraction activities in fragile states and regions.

What is string theory?

Wednesday 21 May 2014

15:15 to 17:30

String theory is well-known as a theory unifying gravity with the remaining fundamental forces of physics. What is perhaps less well-known is that string theory is far more useful than that.

On Wednesday 21st May, come and hear the latest research in string theory as pioneered by the newly established Field, Strings and Geometry group at Surrey.

Bayesian Early Mode Decision Technique for View Synthesis Prediction-enhanced Multiview Video Coding

Wednesday 28 May 2014

14:00 to 15:00
Professor Raouf Hamzaoui, Head of Research, Faculty of Technology, De Montfort University, UK

View synthesis prediction (VSP) is a coding mode that predicts video blocks from synthesised frames. It is particularly useful in a multi-camera setup with large inter-camera distances. Adding a VSP-based SKIP mode to a standard Multiview Video Coding (MVC) framework improves the rate-distortion performance but increases the time complexity of the encoder. The talk will present an early mode decision technique for VSP SKIP-enhanced MVC. The method uses the correlation between the rate-distortion costs of the VSP SKIP mode in neighbouring views and Bayesian decision theory to reduce the number of candidate coding modes for a given macroblock. Simulation results show that the technique can save up to 36.20% of the encoding time without any significant loss in rate-distortion performance.

Blind Source Separation in Neural Signal Processing

Wednesday 28 May 2014

Professor Christopher James, University of Warwick

Further information to follow.

Multidisciplinary Studies Linking Altered Loading to Biology, Inflammation and Pain

Wednesday 4 June 2014

Dr Cathy Holt, University of Cardiff

Further information to follow.

Magnetron Sputtering: A Versatile Technique for High Quality Engineering Coatings

Wednesday 11 June 2014

Professor Peter Kelly, Manchester Metropolitan University

Further information to follow.

Ian Castro

Wednesday 18 June 2014

Professor Ian Castro, University of Southampton

Further information to follow.

Stuart Irvine

Wednesday 25 June 2014

Professor Stuart Irvine, Prifysgol Glyndŵr University

Further information to follow.

Page Owner: th0011
Page Created: Wednesday 15 July 2009 10:49:41 by lb0014
Last Modified: Friday 7 June 2013 09:51:46 by pg0016
Expiry Date: Friday 15 October 2010 10:48:33
Assembly date: Wed Apr 16 20:04:28 BST 2014
Content ID: 9749
Revision: 23
Community: 1056