Events

Forthcoming events for the Faculty and all Departments are shown below. You may also wish to view Faculty only events or Departmental only events.

Learning and Teaching Lunchtime Seminar

Thursday 17 May 2012

1pm to 2pm
Kevin Wells, Andy Adcroft

FEPS Learning and Teaching seminars showcase some of the excellent teaching activity in the Faculty, as well as in expertise from outside to provide examples of best practice.

Lecture: Human Powered Flight

Tuesday 12 March 2013

19:30
Br Bill Brooks (Chairman, RAeS Human-powered flight group)

This lecture will trace the history and development of human-powered flight over the past 40 to 50 years and explain the technical advances that have made it possible.  

The Development of 'Chevron' Nozzles for Aeroengines

Tuesday 26 March 2013

14:00 to 15:00
Mr Craig Mead, Director at Aero Acoustics Ltd

Chevron nozzles are noise reduction devices for aeroengines, as perhaps most noticeably used on the Boeing 787. The development of these devices will be presented with the aim of illustrating the path of development of a new low-noise technology for an aeroengine and to show the on-going value of experimental R&D in an increasingly computational field.

Energy Storage Materials and Supercapacitors

Thursday 25 July 2013

10:00 to 16:00

This one-day workshop will focus on recent developments in the FP7 AUTOSUPERCAP project on energy storage materials for supercapacitors in automotive applications and will also include an overview of related work at the University of Surrey on nanomaterials and within the EPSRC SUPERGEN Consortium. There will also be a presentation on the European Energy Research Alliance (EERA).

You can register for the event and purchase tickets using the Surrey Store.

Opening of the new Engineering Design Centre

Monday 18 November 2013

15:00

On Monday 18th November, the Mechanical Engineering Sciences Department announces the opening of the new Engineering Design Centre. 

The opening will showcase the recent £500,000 investment in facilties and equipment by the University.  The Centre will be used for teaching and support for undergraduate design, advanced projects and provides an exciting new space for the Formula Student racing team.  The Centre will be opened by IMechE CEO Stephen Tetlow MBE FIMechE CEng.

The afternoon, which will start at 3pm in room 24 BA 02 (Surrey Space Centre), includes an opening talk from the Department of Mechanical Engineering Sciences, followed by the official opening at the Design Centre and an open exhibition with the opportunity to talk to staff and students.

UK Space - Past, Present and Future

Wednesday 20 November 2013

19:30
Abigail Hutty, Structures Engineer (Astrium Ltd)

This lecture is presented by the IMechE Thameswey Region Farnborough and Guildford Area, jointly with the RAeS Weybridge Branch.

Investing Sustainably - can it really make a difference?

Thursday 9 January 2014

13.00 hrs to 14.00 hrs
Dr Peter Michaelis, A former doctoral student in CES and now Head of Sustainable and Responsible Investment (SRI) at Alliance Trust - looks back on his fourteen years experience in SRI

As individuals our influence on the economy is generally thought to be limited to our spending habits. What is overlooked is the influence we have as investors: it is our pensions and life cover plans which own large percentages of the companies which dominate our economies. We have just as much choice in where we invest as in where we shop. So should those of us wanting to create a more sustainable economy, care more about where we invest?

Eavesdropping near field contactless payments: A quantitative analysis

Tuesday 14 January 2014

15:00 to 16:00
Thomas Diakos, PhD Student, University of Surrey

We present a quantitative assessment in terms of frame error rates for the success of an eavesdropping attack on a contactless transaction using easily concealable antennas and low cost electronics. An inductive loop, similar in size to those found in mobile devices equipped with NFC capabilities, was used to emulate an ISO 14443 transmission. For eavesdropping we used an identical loop antenna as well as a modified shopping trolley. Synchronisation and frame recovery were implemented in software. As a principal result of our experiments we present the FER achieved over a range of eavesdropping distances, up to 1m, at different magnetic field strengths within the range specified by the ISO 14443 standard.

Spatio-temporal video segmentation with shape growth or shrinkage constraint

Wednesday 15 January 2014

15:30 to 16:30
Dr Yuliya Tarabalka, INRIA Sophia-Antipolis Méditerranée, Sophia Antipolis (France)

Civil Engineering Research Seminar - January 2014

Thursday 16 January 2014

13:00 to 14:00
Pam Billy Fom

A Novel Image Restoration Scheme Based on Structured Side Information in Digital Watermarking Systems

Monday 20 January 2014

11:00 to 12:00
Hui Wang, PhD Student, University of Surrey

In this talk the speaker will present a new image restoration method based on a linear optimization model which restores part of the image from structured side information (SSI). The SSI can be transmitted to the receiver or embedded into the image itself by digital watermarking technique. In this talk the main focus is a special type of SSI for digital watermarking where the SSI is composed of mean values of 4x4 image blocks which can be used to restore manipulated blocks. Different from existing image restoration methods for similar types of SSI, the proposed method minimizes image discontinuity according to a relaxed definition of smoothness based on a 3x3 averaging filter of four adjacent pixel value differences, and the objective function of the optimization model has a second regularization term corresponding to a 2nd-order smoothness criterion. Experiments showed that when the proposed image restoration method is applied to the target self-restoration watermarking scheme, the average visual quality of 100 recovered images is improved by around 2dB measured in Peak Signal-to-Noise Ratio (PSNR) and around 0.04 in Structural Similarity Index (SSIM).

Perceptually Optimized Sound Zones Research Talk

Tuesday 21 January 2014

18:30

Perceptually Optimised Sound Zones - IOA Southern Branch joint evening meeting

Tuesday 21 January 2014

18:30 (AGM), 19:00 start

Often, two people in a single room want to listen to different items of audio. It may be that one person wants to watch television whilst the other wants to listen to the radio, or even that one wants to play a computer game whilst the other reads in silence. The obvious solution to this would be for all individuals to wear headphones, however this dramatically increases isolation (not just in acoustic terms), is impractical when multiple people want to listen to one or other of the audio streams, and could be uncomfortable over an extended period.

Crime, Corruption and Development: the Case of the Caribbean

Thursday 23 January 2014

13.00 hrs to 14.00 hrs
Professor Tony Clayton CES Visiting Professor, Professor of Caribbean Sustainable Development, University of the West Indies

This seminar will examine the impacts of crime and corruption on the development of small island developing states (SIDS), with particular regard to the Caribbean nations. The SIDS nations are regarded as highly vulnerable to natural disasters, climate change and external shocks. However, crime, corruption and poor governance have actually inflicted far more harm.

Improving Conditional Probability Based Camera Source Identification

Monday 27 January 2014

11:00 to 12:00
Syamsul Yahaya, PhD Student, University of Surrey

Conditional probabilities (CP) in frequency domain have been proposed as a feature space in multimedia forensics for identifying sources of digital images and videos produced by digital cameras. While this approach has been proved very effective for both image and video source identification, the CP features used in previous work are selected in a rather arbitrary way and it remains a question if all of them indeed contribute to the final classification result. In this paper, we revisit the selection process of CP features and propose to identify good features using some statistical analysis. In previous work, 72 CP features were used for video source identification and this allowed us to reduce the number of selected features to 15 “good” ones but keep the classification performance at the same level. To be more exact, when frame-based CP features are used with simple majority voting to classify digital videos produced by eight cameras of different models, the reduced set of 15 CP features gave an overall recognition rate of 96.2%, which is nearly the same as the rate when all the 72 features are used (96.3%). In addition to the feature reduction approach, we also investigate using means and standard deviations of CP features across frames as new (video-based) features. Experimental results show that this approach can drastically reduce the computational costs by a factor close to 100 but achieve similar classification accuracy (96.8%) compared with the case when the 15 good frame-based CP features are used with simple majority voting.

Shape Knowledge in Segmentation and Tracking

Wednesday 29 January 2014

14:00 to 15:00
Dr Victor Adrian Prisacariu, University of Oxford

Energy symbiosis and decentral energy supply as a part of German renewable energy transformation

Thursday 30 January 2014

13.00 hrs to 14.00 hrs
Prof. Dr.-Ing. Susanne Hartard, Professor Industrial Ecology, University of Applied Sciences Trier Environmental Campus Birkenfeld

Germany is following the sustainable path towards a future 100% renewable energy supply and will close the last atomic power plant in 2022. The challenge is high investments, the expansion of the electricity grid and especially a complete transformation from a former pure central energy supply towards decentral concepts with a lot of plants included. New investment and organization structures are needed and local and new networking concepts become more important.

WSMS February Talk

Tuesday 4 February 2014

6.45pm
Presented by Dr Peter Northover, Senior Research Fellow, Head of Materials Science-based Archaeology Group, Oxford Materials

Civil Engineering Research Seminar - February 2014

Thursday 6 February 2014

13:00 to 14:00
Mr Jianfei Peng

Cloning Localization Based on Feature Extraction and K-means Clustering

Monday 10 February 2014

11:00 to 12:00
Areej Alfraih, PhD Student, University of Surrey

The field of image forensics is expanding rapidly. Many passive image tamper detection techniques have been presented. Some of these techniques use feature extraction methods for tamper detection and localization. This work is based on extracting Maximally Stable Extremal Regions (MSER) features for cloning detection, followed by k-means clustering for cloning localization. Then for comparison purposes, we implement the same approach using Speeded Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT). Experimental results show that we can detect and localize cloning in tampered images with an accuracy reaching 97% using MSER features. The usability and efficacy of our approach is verified by comparing with recent state-of-the-art approaches.

Developing your career in the Satellites Industry: A lecture on NanoSats/CubeSats and a tour of the Surrey Space Centre

Wednesday 12 February 2014

18:30 to 21:00
Professor Craig Underwood, Deputy Director of the Surrey Space Centre

The University of Surrey and its spin-out, SSTL, are world leaders in the design, construction and operation of micro-satellites. Recent technological advances have made it possible to construct even smaller satellites, at an order of magnitude less cost. These “nano-satellites” open up many new possibilities for space exploration. 

Making A Better World

Thursday 13 February 2014

14.15 hrs to 15.30 hrs
Jonathon Porritt, Founder Director Forum for the Future

Once again CES is delighted to welcome the distinguished writer and campaigner Jonathon Porritt to address students and staff as part of the Sustainable Development: Applications course.

Tomorrow's Mathematicians Today 2014

Saturday 15 February 2014

09:00 to 17:00
Professor Luis Fernando Alday
Tomorrow's Mathematicians Today 2014

The Institute of Mathematics and its Applications (IMA) and the University of Surrey are proud to present Tomorrow's Mathematicians Today, an undergraduate mathematics conference supported by the IMA.

Special thanks go to Noel-Ann Bradshaw (University of Greenwich, initiator of the conference series) for her assistance and help with the organisation, and to Adam Sebestyen who designed the initial TMT logo.

Registration for this event is now closed.

The programme for the day is now available (PDF, 0.9 MB), and the abstracts for the talks are also available (PDF, 146 KB)



Threshold Blind Signatures

Monday 17 February 2014

11:00 to 12:00
Veronika Kuchta, PhD Student, University of Surrey

This paper formalizes the concept of threshold blind signatures (TBS) that bridges together properties of the two well-known signature flavors, blind signatures and threshold signatures. Using TBS users can obtain the signature through interaction with t-out-of-n in a blind way, i.e. without disclosing the corresponding message to any of those signers.

In addition, the paper shows how to construct a secure TBS scheme in the standard model. The resulting scheme can be seen as an extension of Okamoto's blind signature scheme (TCC 2006) with secret sharing techniques. The most significant applications of the scheme can be found in e-voting, where the threshold property offers stronger security guarantees.

Socio-economic assessment of biomass supply chains. What needs to be assessed?

Thursday 20 February 2014

13.00 hrs to 14.00 hrs
Dr Rocio A Diaz-Chavez, Research Fellow, Centre for Environmental Policy, Imperial College London

The potential on the use of biomass resources for the production of power, transport fuels and chemicals has become an important target in many countries looking for added economic value to the biomass. To achieve this, it will be necessary a change in the technology used for producing, handling and processing the raw biomass materials.

Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it

Friday 21 February 2014

10:00 to 12:00
Dr Adrian Waller, Consultant, Thales Research and Technology, Thales UK

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Secure Mobile Logins

Monday 24 February 2014

11:00 to 12:00
Franziskus Kiefer, PhD Student, University of Surrey

Password based authentication remains the most common authentication method on the internet and in particular on mobile devices. Yet, no satisfying, secure methods are deployed on mobile devices. We discuss challenges for secure password-based login mechanisms in mobile browsers and propose a solution secure against impersonation attacks, i.e. phishing attacks. We design and implement a drop-in replacement for the password over HTML authentication mechanism in mobile browsers that builds upon cryptographically sound primitives. Our result includes a ready to use Android application and an easy to set-up and use authentication server for integration into existing application servers.

The Internet of Things and building a digital ecosystem

Monday 24 February 2014

18:00 to 19:00
Dave Locke, Senior Inventor, Pervasive and Advanced Messaging Technologies, IBM

The Internet of Things is IBM’s cloud services solution and it is consider one of the best and most widely-used out there, connecting millions of devices everyday! This interactive talk is organised by the CompSoc (Computer Society) run by students of the Department of Computing.

Dense 3D Reconstruction from High Frame-Rate Video using a Static Grid Pattern

Thursday 27 February 2014

11:00 to 12:00
Dr Ryusuke Sagawa, National Institute of Advanced Industrial Science and Technology (AIST), Japan

The Energy of Nations - Risk Blindness and the Road to Renaissance

Thursday 27 February 2014

13:00 to 14:00
Dr Jeremy Leggett, Chair Solarcentury and SolarAid

Brain scientists tell us we have a very worrying collective tendency for blindness to the kind of risks that can crash economies, and imperil civilisations. The shocking recent history of the financial industries suggests they are right.

Evolutionary Learning of Counter-propagation Neuro-Controllers for Multi-objective Robot Navigation

Thursday 27 February 2014

15:30 to 16:30
Amiram Moshiov, Tel-Aviv University, Israel

This study explores evolutionary training of Counter-Propagation Neuro-Controllers (CPNCs) for applications in Evolutionary Robotics. It concerns navigating a robot in an environment that differs from the trained one. The evolutionary training of CPNCs is compared with that of the traditional Feed-Forward Neuro-Controllers (FFNCs). In contrast to FFNCs, CPNCs are neuro-controllers that do not process sensory information directly into actions. Rather, there are two mappings involved. First, the sensed input is mapped into a class that represents prototypical information about the environment. This is achieved in the first layer of Kohonen neurons. Next, each class, which is represented by a weight vector, is mapped into actions, via a Grossberg layer. The evolutionary training of the CPNCs is done using a two phase approach. The first phase primarily involves the unsupervised learning of the classes, and the second phase mostly deals with the adjustment of the control mapping.

To diversify trained solutions, and to obtain controllers for various scenarios, a multi-objective evolutionary approach is used. The evolved CPNCs exhibit multi-objective characteristics. These are reflected by the different degrees of path safety and attraction to targets, in both the trained and tested environments. For the studied case, the CPNCs are found to be statistically superior to the FFNCs with respect to the obtained performances, the learning rates and the generalization capabilities. Following the comparison, we provide initial results concerning an overall analysis of the correlation between the evolved number of Kohonen clusters, in the combined non-dominated set of controllers, and the evolved overall multi-objective performance.

Cryptanalysis of a Class of Chaos-Based Image Encryption Schemes

Tuesday 4 March 2014

15:30 to 16:30
Dr Chengqing Li, Associate Professor, Xiangtan University, China

The subtle similarities between cryptography and chaos theory make the design of chaos-based encryption schemes become a hot research subject in the past two decades. As a result, a large number of encryption schemes based on chaos theory have been proposed to date. Among them, many schemes share the same structure, namely combination of multiple rounds of two basic parts: position permutation and value substitution, which is also a typical structure of the traditional text encryption schemes. In this talk, first, preliminary knowledge of cryptanalysis is introduced. Then, a class of chaos-based image encryption schemes, which share the same structure, is reviewed. Further, recent research progress on breaking the aforementioned two separate basic parts, when the round number is equal to one, is presented. Finally, the recent research results on breaking the two basic parts separately, when the round number is more than one, are reported with detailed discussions.

Secure Futures

Friday 7 March 2014

Today, cyber security is headline news and touches every corner of society.

The University of Surrey is collaborating with e-skills UK to help local school children to discover this exciting field at a Secure Futures event, held at Surrey's Department of Computing.

Quality as a prerequisite for security in interoperable systems

Friday 7 March 2014

10:00 to 12:00
Mr Peter Davies, Technical Director, Thales UK

We are all facing enormous challenges, now and into the future, in the way that assurance of ICT products and systems is provided and there is a pressing need to review the thinking about assurance. I will argue that we only truly understand the 'security' of an interoperable system when we understand the 'quality' level to which that system has been implemented. I will further argue that a laxity in our linguistic definitions means that we increasingly do not understand what is meant when we are discussing the security.

11th Annual Computing Department PhD Conference

Monday 10 March 2014

9:00 to 17:00
To be announced

The 11th Annual Computing Department PhD Conference will be taking place on Monday 10 March 2014 in Lecture Theatre 1DK02 in the morning and in Lecture Theatre L in the afternoon, University of Surrey, Guildford.

The Boeing Dreamliner

Wednesday 12 March 2014

19:00
João Miguel Santos FRAeS, Vice President of Africa Boeing International

"The 787 Dreamliner - where we have been, how did we get here and where are we going?"

Joint with the RAeS Farnborough Branch

Civil Engineering Research Seminar - March 2014

Thursday 13 March 2014

13:00 to 14:00
Francisco Comin

The Future of Security

Friday 14 March 2014

10:00 to 12:00
Dr Alastair MacWilson, Former Global Managing Director, Accenture Technology Consulting

This seminar is going to describe where the future of the security is and where it is not.  It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research, It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators. It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Gait Analysis Using Wearable Sensors

Friday 14 March 2014

13:00 to 14:00
Dr Delaram Jarchi, Research Associate, Department of Computing, Imperial College London

Gait analysis or systematic evaluation of bipedal locomotion provides important information about the human biomechanics, pathology and behaviour. One important application of gait analysis is to create a mobility assessment tool for patients following orthopaedic surgery. With recent advances in wearable sensing technologies, the practical use of the wireless inertial sensors for gait analysis has been widely increased. However, the use of a reliable gait analysis system for everyday clinical utilisation and home-based monitoring under realistic real-life situations remains limited. For patient studies, integration of all sensing capabilities into a single wireless sensor node has specific advantages. In this talk we look into the recent advances in gait analysis based on a single sensor and discuss the performance, reliability and practical use of a developed gait analysis platform for creating future monitoring systems.

Causal Mode Decomposition for Motion Correction and Segmentation in Renal DCE-MRI Medical Imaging

Monday 17 March 2014

11:00 to 12:00
Santosh Tirunagari, PhD Student, Department of Computing, University of Surrey

Dynamic contrast enhanced magnetic resonance renography (DCE-MRI), in common with other medical imaging techniques, is influenced by respiratory motion. As a result the data quantification may be inaccurate. This paper presents a novel method for motion correction as well as segmentation using Causal Mode Decomposition (CMD). In the present study, for the first time, we introduce CMD to the field of medical imaging by analysing the renal DCE-MRI imaging data. Analysing these images is essential in understanding the fundamental characteristics of renal perfusion and filteration. This novel method is applied to ten healthy volunteers' renal DCE-MRI data. CMD reconstruction results in the motion correction and CMD projections result in segmentation of the renal DCE-MRI data. Both qualitative and quantitative evaluation was performed against the original images using region of interest analysis.

Advanced Materials for a Modern Age Symposium

Wednesday 19 March 2014

13:30 to 17:15

As part of the “Surrey Sevens for 2014” programme we will be holding a half day symposium on Advanced Materials on Wednesday 19 March 2014 in the Ivy Arts Centre on campus.

Identity is the New Money

Friday 21 March 2014

10:00 to 12:00
David Birch, Director, Consult Hyperion

David Birch from Consult Hyperion will give a talk based on his forthcoming book “Identity is the New Money” explaining Bitcoins and the stone currency of island of Yap, the reason why social networks will replace cash and the case for a National Entitlement Scheme. In 2013, Wired magazine named him one of their global top 15 favourite sources of finance and business information and he was ranked Europe’s most influential commentator on emerging payments by Total Payments magazine so you’d be mad to miss out.

This seminar is going to describe where the future of the security is and where it is not.   It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research,  It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators.  It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Family Bootstrapping: a Genetic Transfer Learning Approach for Onsetting the Evolution for a Set of Related Robotic Tasks

Thursday 27 March 2014

15:30 to 16:30
Amiram Moshaiov, Tel-Aviv University, Israel

Studies on the bootstrap problem in evolutionary robotics help lifting the barrier from the way to evolve robots for complex tasks. It remains an open question, though, how to reduce the need for designer knowledge when devising a bootstrapping approach for any particular complex task. Recent developments in the field of transfer learning may help reducing this need and support the evolution of solutions to complex tasks, through task relatedness. Relying on the commonalities of similar tasks, we introduce a new concept of Family Bootstrapping (FB). FB refers to the creation of biased ancestors that are expected to onset the evolution of "a family" of solutions not just for one task, but for a set of related robot tasks. A general FB paradigm is outlined and the unique potential of the proposed concept is discussed. To highlight the validity of the FB concept, a simple demonstration case, concerning the evolution of neuro-controllers for a set of robot navigation tasks, is provided. The FB concept resulted from an earlier work on bootstrapping the co-evolution of soccer-like players, which is also briefly reported.  The presentation is concluded with some suggestions for future research.

Can shale gas be part of the UK's low-carbon transition?

Thursday 27 March 2014

13.00 hrs to 14.00 hrs
Dr Maria Sharmina, Tyndall Centre for Climate Change Research

With conventional natural gas reserves declining globally, shale gas has emerged as a potentially significant new fossil fuel source. This new availability and apparent abundance of shale gas in the US (and potentially elsewhere) has led some to argue that shale gas could, in principle, be used to substitute more carbon intensive fuels such as coal in electricity generation.

Computer Vision on Mobile Platforms

Thursday 27 March 2014

11:00 to 12:00
Tony King-Smith, Imagination Technologies

Building Integrated Cyber Defences

Friday 28 March 2014

10:00 to 12:00
Peter Kemp, Technical Lead for Cyber Intelligence, QinetiQ

Computer Network Defence is a fascinating and ever changing subject. Having worked with some of the best, and worst, organised network defences in the UK, I propose to show you how to consider your Cyber Defences as a whole, not focussing on a single aspect, and how to plan to build a capability from scratch in a methodical way, encompassing hardware, software, and the people who will operate it, and how the system becomes stronger than the sum of its parts.

Multimodal Ageing (or habituation)

Monday 31 March 2014

11:00 to 12:00
Dr Norman Poh, Lecturer, Department of Computing, University of Surrey

As we grow old, our biometric traits will also change. Indeed, there is increasing evidence of ageing across a number of biometric modalities. However, whether or not a multimodal biometric system suffers from the ageing is an issue that has not been investigated. We conjecture that if the underlying biometric modalities may change over time, the resultant multimodal biometric system should also change. In order to detect minute score changes over time, we use a subject-dependent regression-based framework to detect ageing. Based on the Mobile Biometry (MOBIO) database with talking face and speech modalities, our findings suggest that the change of biometric performance over time can be positive or negative, that is, for some subjects, the system performance actually improves with use, hence suggesting potential habituation. Yet, for most other users, the system performance degrade over time.

Civil Engineering Research Seminar - April 2014

Tuesday 1 April 2014

13:00 to 14:00
Ms Hooi Ying Lee

Business Development: How to Connect and Work with Business

Wednesday 2 April 2014

12:45
Celia Gaffney, Business Development Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Business Development: How to Connect and Work with Business on Wednesday 2nd April in room 40 AA 03, with lunch available from 12:45 for a 13:00 start.

Modelling Climate Change and Development - Starting with our development goals

Wednesday 2 April 2014

13.00 hrs to 14.00 hrs
Jeremy Webb, African Minerals Development Centre, UN Economic Commission for Africa (UNECA)

It is widely recognised that climate change is a development issue, not just in terms of the impacts of climate change but also the development implications associated with climate change negotiations.  

Touch and pay... or far and pay?!

Thursday 3 April 2014

14:00 to 15:00
Dr Ioana Boureanu Carlson, researcher in cyber security

Smartcard-based protocols represent an increasingly large share of the wireless authentication solutions market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to this development. However, such attacks could be mitigated through the use of distance-bounding protocols. In this talk, we will discuss the core challenges for distance-bounding, of which some have recently been overcome, whereas others still stand prominently.

We will focus mostly on the security of these wireless protocols, from attacks and new, secure designs. We will finish with a vision for the future of these protocols, the possible and advisable paths towards, e.g., securing contactless payments.

The Cyber Threat Landscape and Hunting the Adversary

Friday 4 April 2014

10:00 to 12:00
Dr Adrian Nish, Senior Consultant and Cyber Threat Intelligence Lead, Detica

The corporate IT network is a battle-ground for a range of modern threats. Cybercriminals looking to make financial gain, attention-seekers trying to create headlines, professional hackers aiming to steal sensitive documents, and even moles acting as legitimate employees all create significant risks for those tasked with defending the network. To make matters worse, the traditional technology and methods of these defenders has failed to keep pace with the ingenuity of the attackers and the industrialisation of their methods. This seminar will give an overview of the threat landscape and draw on real case studies from investigations done by Detica’s Cyber Security services. Examples of social engineering tricks, exploits, custom malware, and threat correlation will be presented along with descriptions of some of the cutting-edge techniques being used to detect them.

The Privatisation of Biodiversity? - New Approaches to Nature Conservation Law

Wednesday 9 April 2014

13.00 hrs to 14.00 hrs
Dr Walters Nsoh, School of Law, University of Dundee

The UK failed to meet its target of halting biodiversity loss by the end of 2010. A new biodiversity plan launched in 2011, “Biodiversity 2020”, further extends the target of halting overall biodiversity loss to 2020. Although some progress is being made, the current policy and regulatory approaches have not prevented, far less reversed, the loss of biodiversity across the country.

Brain Computer Interfaces for Neurofeedback and Medical Applications

Thursday 24 April 2014

14:00 to 15:00
Dr Loukianos Spyrou, Donders Research Institute, Radboud University Nijmegen, Netherlands

Brain Computer Interface (BCI) technology has advanced over the last decade to the point that it can be applied with success in a variety of fields. Two novel and mobile BCI designs and their technical details (signal processing and machine learning) from the Donders Institute research group in Netherland (www.donders.ru.nl) will be presented. One is based on event-related neurofeedback to aid language and sound learning. The second one is an intra-operative awareness monitor which aims to serve as an indication of increased awareness during a surgical procedure.

Getting your hands dirty - how to engage industrial partners and bid to the TSB

Wednesday 30 April 2014

12:45
Peter Lancaster, Impact Acceleration Account KE Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Getting your hands dirty - how to engage industrial partners and bid to the TSB on Wednesday 30th April in room 33 AB 03, with lunch available from 12:45 for a 13:00 start.  

Science Showoff

Wednesday 30 April 2014

19:30

The night before the British Science Association Science Communications Conference begins at the University of Surrey, we bring you Science Showoff. Join us for a fun packed evening of science humour and general silliness.

Buy tickets

Application of Surface Analysis to Turbine Blades, Tissue Scaffolds and Plastic LEDs

Wednesday 30 April 2014

14:30
Dr David McPhail, Imperial College

Further information to follow.

STRaND1 - Raising the bar in COTS electronics

Wednesday 7 May 2014

16:00
Dr Chris Bridges

Professor Josef Kittler invites you to come and celebrate the Department of Electronic Engineering's excellence in research at a lecture to be given by the winner of the Industrial Advisory Board Departmental Prize for Excellence in Research 2013, Dr Bridges.

The Chairman of the Department's Industrial Advisory Board, Professor Chris Firth, Thales Research, will present the prize to Dr Bridges at this event. Drinks and nibbles will follow in the upper lecture theatre concourse (this can be accessed via the rear doors of the lecture theatre).

Going Data-Driven - How AI is leading the way to a new scientific paradigm (and why this is not necessarily a good thing)

Wednesday 7 May 2014

14:00 to 15:00
Professor Nello Christianini, Professor of Artificial Intelligence, University of Bristol, UK

The talk will cover the paradigm shift that has been brought about by the availability of large amounts of data, both its historical roots in AI and its effects on other fields of science and society.

Message Dissemination in Vehicular Ad Hoc Networks

Monday 12 May 2014

11:00 to 12:00
Mr Leandros Maglaras, Research Fellow, Department of Computing, University of Surrey

A vehicular network is a challenging environment since it combines a fixed infrastructure (roadside units, e.g., proxies), and ad hoc communications among vehicles. Vehicular networks have the diverse range of applications that varies from safety applications to comfort applications. As the dissemination requirements (reliability, delay, coverage, etc.) may be different from one application to another, the dissemination mechanism could be implemented at the application layer where the interaction with the routing layer is limited. This talk addresses several aspects of vehicular communications related to data dissemination.

A Bitcoin Walkthrough

Tuesday 13 May 2014

12:00 to 13:00
Dan Jayasinghe, Smart Card Center, Information Security Group, Royal Holloway, University of London

What is Bitcoin? How did it all start? What is Bitcoin mining? Is Bitcoin really anonymous? Has fair-exchange just got even more difficult?  While answering these questions, we will take a quick overview of the Bitcoin digital cash system and look into cryptography used in its clever design with attractive reward schemes. The walkthrough also touches up on setting-up, start making & receiving payments and Bitcoin mining. We conclude with some recent developments in Bitcoin and give insight into further research carried out.

WSMS May Talk

Tuesday 13 May 2014

6.45pm to 8:00pm

Walking to Wellbeing and Sustainability? Walking and promotion of outdoor activities for health and sustainable living

Tuesday 13 May 2014

13.00 hrs to 14.00 hrs
Jim Walker, Chief Executive of the Outdoor Trust

There is wide agreement that more walking and public engagement in outdoor activities can make a contribution to personal well-being, health and collective sustainability. But how do we go about promoting the benefits of walking and 'the great outdoors' in a culture where it is ever easier to be sedentary and disconnected from the natural environment? Our seminar speaker Jim Walker of the Outdoor Trust charity draws on a wealth of experience as a ranger, trail designer and urban well-being consultant in discussing these challenges for sustainable lifestyle change. Jim will look at methods for engaging citizens in outdoor activities and how these can contribute to wider behavioural change.

Action Detection in Video Sequences

Thursday 15 May 2014

14:00 to 15:00
Professor Pavel Zemčík, Faculty of Information Technology (FIT), Brno University of Technology, Brno, Czech Republic

Cyber security - what is happening and why?

Friday 16 May 2014

10:00 to 12:00
Mike St John Green, Recently retired from government

The Internet of Things, Smart Meters, the IP connection of Process Control Systems, Big Data, consumerisation and mobility are all part of the rapidly changing landscape of cyberspace, a place we all rely on for an ever increasing proportion of our social and economic activity. But news stories reveal that the environment is far from safe and secure. What are the forces at play? I will consider how the shape of cyberspace is changing and the issues this poses for industry, governments and users as we work to make cyberspace sufficiently safe and secure.

NASA's Exploration Program: A Path to Mars

Friday 16 May 2014

11:00 to 12:00

NASA’s Chief Scientist and Deputy Chief Technologist will provide an overview of NASA’s plans to develop a human exploration pathway to Mars, including plans for a human mission to an asteroid, with a specific focus on how science and technology will impact, and be impacted by, these ambitious plans. They will also discuss opportunities for international cooperation.

Re-assessing resource risks and criticality

Wednesday 21 May 2014

13.00 hrs to 14.00 hrs
Prof Raimund Bleischwitz, BHP Billiton Chair in Sustainable Global Resources University College London (UCL) UCL Institute for Sustainable Resources

While strategic studies on natural resources usually focus on the criticality of certain single materials, this lecture starts from the inter-linkages between and among resources (called “the resource nexus”). It discusses the impact any food and water stress may have on extraction activities in fragile states and regions.

The department of Physics proudly presents its 5-a-side football tournament

Wednesday 21 May 2014

13:00

The tournament starts at 1pm on Wednesday 21st May on the AGP1 pitch at Surrey Sports Park.

If you are interested in participating please email PhySoc: ussu.physics@surrey.ac.uk with your name, team name, and affiliation (eg:  Level 1,2,3, MSc, Phd, staff, research group, alumni).  

Entry is free and on a first-come-first-served basis since teams numbers are limited. Each team must have at least one female member on the pitch at all times.

The winning team will be awarded the highly prestigious Al-Khalili Challenge Plate!

Polynomial Matrix Factorisation Techniques for Multi-Channel Signal Processing

Tuesday 27 May 2014

12:00 to 13:00
Prof J G McWhirter, School of Engineering, Cardiff University

The term polynomial matrix (PM) is used to describe a matrix whose elements take the form of polynomials. This provides a very useful and compact representation for multi-channel digital filtering and other important operations in digital signal processing. For example, since polynomials in the delay operator z-1 are normally used to specify linear time-invariant processes, an m x n polynomial matrix may be used to represent a fast fading wireless communication channel from n transmitters to m receivers.

For almost ten years now, I have been carrying out research with numerous colleagues into a range of polynomial matrix (PM) factorisation techniques. These include PM eigenvalue decomposition (PEVD), singular value decomposition (PSVD) and QR decomposition (PQRD). By analogy with the role played by the EVD, SVD and QRD of conventional matrices in DSP, these polynomial factorisation techniques have potential advantage for a wide range of multi-channel signal processing problems such as broadband adaptive beamforming, blind signal separation, data compaction and spectral factorisation.

In this talk, I will attempt to give a brief review of this research, omitting details of the various PM factorisation algorithms but concentrating on some of the potential applications. In this context I will present the results of some computer simulation studies designed to demonstrate the performance of the PM algorithms in comparison with alternative techniques, where available.

Bayesian Early Mode Decision Technique for View Synthesis Prediction-enhanced Multiview Video Coding

Wednesday 28 May 2014

14:00 to 15:00
Professor Raouf Hamzaoui, Head of Research, Faculty of Technology, De Montfort University, UK

View synthesis prediction (VSP) is a coding mode that predicts video blocks from synthesised frames. It is particularly useful in a multi-camera setup with large inter-camera distances. Adding a VSP-based SKIP mode to a standard Multiview Video Coding (MVC) framework improves the rate-distortion performance but increases the time complexity of the encoder. The talk will present an early mode decision technique for VSP SKIP-enhanced MVC. The method uses the correlation between the rate-distortion costs of the VSP SKIP mode in neighbouring views and Bayesian decision theory to reduce the number of candidate coding modes for a given macroblock. Simulation results show that the technique can save up to 36.20% of the encoding time without any significant loss in rate-distortion performance.

Blind Source Separation in Neural Signal Processing

Wednesday 28 May 2014

14:30
Professor Christopher James, University of Warwick

Further information to follow.

What is string theory?

Wednesday 28 May 2014

15:15 to 17:30

String theory is well-known as a theory unifying gravity with the remaining fundamental forces of physics. What is perhaps less well-known is that string theory is far more useful than that.

On Wednesday 28 May, come and hear the latest research in string theory as pioneered by the newly established Field, Strings and Geometry group within the Department of Mathematics at Surrey.

Imaging challenges for Single Cell Irradiation at the Surrey Ion Beam Centre

Wednesday 28 May 2014

14:00 to 15:00
Dr Michael Merchant and Dr Jonathan (Charlie) Jeynes, Ion Beam Centre, University of Surrey

Challenges of modeling human experience and ground truth for machine vision applications

Thursday 29 May 2014

14:00 to 15:00
Professor Heikki Kalviainen, Machine Vision and Pattern Recognition Laboratory (MVPR), Lappeenranta University of Technology (LUT), Finland

Usability in Biometrics

Thursday 29 May 2014

11:00 to 12:00
Mr Ramon Blanco-Gonzalo, Visiting PhD Student at University of Surrey from Carlos III University of Madrid (Universidad Carlos III de Madrid), Spain

The increasing demand for security systems in mobile environments has encouraged the development of several authentication approaches to access mobile devices. Up to now, biometric recognition offers the unique advantage and convenience of not requiring a password or carrying a token. Since it has only been fairly recent that biometrics is used in mobile devices, there are few works that address usability and accessibility concerns that meet the user’s requirements. The University Group for Identification Technologies (GUTI) is currently focused on security and specially in mobile biometrics. In this talk, we will review the main GUTI's research lines paying special attention to usability and accessibility in biometrics.

Wigner flow reveals quantum phase space features we thought could not be there

Thursday 29 May 2014

13:00
Dr Ole Steuernagel, University of Hertfordshire

The behaviour of classical mechanical systems is characterised by their phase portraits, the collections of their trajectories.

Anti-forensic Resistant Likelihood Ratio Computation

Monday 2 June 2014

11:00 to 12:00
Nik Nurul Ain Binti Nik Suki, PhD Student, Department of Computing, University of Surrey

One of the major utilities of biometrics in the context of crime scene investigation is to identify people. However, in the most sophisticated cases, criminals may introduce the biometric samples of innocent individuals in order to evade their own identities as well as to incriminate the innocent individuals. To date, even a minute suspect of an anti-forensic threat can potentially jeopardize any forensic investigation to the point a potentially vital piece of evidence suddenly becomes powerless in the court of law. In order to remedy this situation, we propose an anti-forensic resistant likelihood ratio computation. This approach renders the strength of evidence to a level that is proportional to the trustworthiness of the trace, such that a highly credible evidence will bear its full strength of evidence whilst a highly suspicious trace can have its strength of evidence reduced to naught. Using simulation as well as a spoof fingerprint and face database, we show that the existing likelihood ratio computation is extremely vulnerable to an antiforensic threat whereas our proposed computation is robust to it, thereby striking the balance between the utility and threat of a trace.

Multidisciplinary Studies Linking Altered Loading to Biology, Inflammation and Pain

Wednesday 4 June 2014

14:30
Dr Cathy Holt, University of Cardiff

Further information to follow.

Intellectual Property and Non-Disclosure Agreements

Wednesday 4 June 2014

12:45
Rob Yates, Trevor Hartman, Daniele Giannone (RES)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Intellectual Property and Non-Disclosure Agreements on Wednesday 4th June in 40AA03, with lunch available from 12:45 and the seminar running from 13:00 to 14:00.

Measuring the Complexity of Visual and Auditory Patterns

Wednesday 4 June 2014

14:30 to 15:30
Professor Godfried Toussaint, New York University Abu Dhabi (United Arab Emirates)

Introduction to Approximate Polytope Ensembles for Machine Learning

Thursday 5 June 2014

14:00 to 15:00
Dr Oriol Pujol, Vision and Computational Learning Research Group, University of Barcelona (Spain)

Automating the Design of Data Mining Algorithms with an Evolutionary Algorithm

Tuesday 10 June 2014

14:00 to 15:00
Prof Alex A Freitas, University of Kent

Decision-tree induction algorithms are one of the most popular types of classification algorithms in the field of data mining and knowledge discovery. Research on this type of algorithms produced many new algorithms in the last 30 years or so. However, all the decision-tree induction algorithms created over that period have in common the fact that they have been manually designed, typically by incrementally modifying a few basic decision-tree induction algorithms. Having these basic algorithms and their components in mind, we propose an evolutionary algorithm to automate the process of designing decision-tree induction algorithms. The basic motivation is to automatically create complete decision-tree induction algorithms in a data-driven way, trying to avoid the human biases and preconceptions incorporated in manually-designed algorithms. The proposed evolutionary algorithm is evaluated on a number of datasets, and the results show that the machine-designed decision-tree induction algorithms are very competitive with well-known human-designed decision-tree algorithms.

Magnetron Sputtering: A Versatile Technique for High Quality Engineering Coatings

Wednesday 11 June 2014

14:30
Professor Peter Kelly, Manchester Metropolitan University

Further information to follow.

Neural Network Ensembles For Image Identification Using Pareto-optimal Features

Thursday 12 June 2014

15:30 to 16:30
Mr Wissam Albukhanajer, PhD Student, Department of Computing, University of Surrey

In this presentation, an ensemble classifier is constructed for invariant image identification, where the inputs to the ensemble members are a set of Pareto-optimal image features extracted by an evolutionary multi-objective Trace transform algorithm. The Pareto-optimal feature set, called Triple features, gains various degrees of trade-off between sensitivity and invariance. Multilayer perceptron neural networks are adopted as ensemble members due to their simplicity and capability for pattern classification. The diversity of the ensemble is mainly achieved by the Pareto-optimal features extracted by the multi-objective evolutionary Trace transform. Empirical results show that the general performance of proposed ensemble classifiers is more robust to geometric deformations and noise in images compared to single neural network classifiers using one image feature.

A panoramic VISTA of the stellar halo of NGC 253

Thursday 12 June 2014

16:00
Prof. Laura Greggio

I will introduce the general topic on the properties of stellar halos around late type galaxies, and on what they tell us with respect to the galaxy formation models.

Herschel and ALMA find supernovae as dust factories

Friday 13 June 2014

15:00
Mikako Matsuura, University College London

The formation of dust by core-collapse supernovae (CCSNe) is one of the key processes in the chemical and physical evolution of supernova ejecta, with implications for the origin of dust in the interstellar media of galaxies.

Ian Castro

Wednesday 18 June 2014

14:30
Professor Ian Castro, University of Southampton

Further information to follow.

Acquisition and Modeling of Facial and Material Appearance

Wednesday 18 June 2014

14:00 to 15:00
Dr Abhijeet Ghosh, Department of Computing, Imperial College London

Quasi Steady State Petri Nets

Wednesday 18 June 2014

14:00 to 15:00
Prof Andrzej M. Kierzek, Professor of Systems Biology, FHMS, University of Surrey

I will present Quasi Steady State Petri Net (QSSPN), an algorithm for simulation of dynamic Place/Transition systems controlling flow networks at steady state. The QSSPN is a hybrid algorithm integrating qualitative, stochastic and continuous Petri Nets (PN) with Linear Programming (LP) optimisation of flow networks at steady state. We introduce “constraint” PN nodes, which map node state to flow capacity bounds and “objective” PN nodes that execute LP evaluation of objective functions. The algorithm is motivated by applications in computer simulation of molecular interaction networks of the living cell, where slow, dynamic, gene regulatory and signaling processes re-direct steady state flux in metabolic networks. The QSSPN algorithm will be illustrated by the first dynamic simulation of molecular interaction network describing gene regulation, signaling and whole-cell metabolism in human cell. I will present formal verification of biological responses, by Monte Carlo simulation and generation of reachability graph.

Multi-Objective Evolutionary Recurrent Neural Network Ensemble for Convergence Based Prediction of Computational Fluid Dynamic Simulations

Thursday 19 June 2014

15:30 to 16:30
Chris Smith, PhD Student, Department of Computing, University of Surrey

Using a surrogate model to evaluate the expensive fitness of candidate solutions in an evolutionary algorithm can significantly reduce the overall computational cost of optimization tasks.

In this talk I will present a hybrid multi-objective evolutionary algorithm that trains and optimizes the structure of a recurrent neural network ensemble that is used as a surrogate for the long-term prediction of computational fluid dynamic (CFD) simulations.

The surrogate model is used to predict the outcome of fully converged CFD simulations, based on intermediate convergence data. The aim is to stop each CFD simulation early, before full convergence and project what the outcome would be. This type of surrogate could reduce the computational cost of each individual CFD calculation and hence represent an overall computational saving during an optimization procedure.

Initial work concentrated on the prediction of transonic flow conditions and five selection methods for constructing the ensemble of predictors were tested on six data sets. The accuracy of the ensembles is compared to the converged CFD data, as well as to the delta change between two flow conditions. The method presented can produce accurate and stable results using a third of the intermediate data needed for convergence.

Following this initial work a second study has been performed on a data set for high-lift aerodynamic flow conditions, where the flow features are typically highly complex. Analysis of 2D high-lift RANS CFD computations will be presented, as well as the prediction performance for a parametric study of flap_lap, flap_gap and angle of incidence.

Recent Robotic Systems Developed in China's State Key Laboratory of Robotics

Monday 23 June 2014

14:00 to 15:00
Dr. Jinguo Liu, Professor, Assistant Director, State Key Laboratory of Robotics (SKLR), Shenyang Institute of Automation (SIA), Chinese Academy of Sciences (CAS), China

This presentation aims to provide an overview of the main research and development issues in the State Key Laboratory of Robotics (China). SKLR has over forty years of experience in robotics R&D since the Father of Robotics in China Mr. Xinsong Jiang (1931-1997), an Academician of the China Academy of Engineering, first initiated relevant advocacy in 1972. SKLR’s recent advancement in robotics has made impact in a wide range of application areas, most notably for exploration in extreme environments such as the space and deep sea, such as: the first Chinese lunar rover Yutu (‘Jade rabbit’) landed successfully on the Moon in December 2013; three different types of robots were deployed to assist the search and rescues following the Ya’an earthquake in 2013; In deep sea exploration, Chinese submersible vehicle Jiaolong reached a record depth of 7062 meters in 2012. SKLR also applied robotic technologies during various expeditions to the Poles including to Antarctica in 2007 and 2012, and to Arctic in 2008 and 2010. Nevertheless, SKLR’s researchers have also identified major technical challenges for achieving robust, reliable, and autonomous operations in future deep sea or space using robots. To meet China government’s mid-long term goals of robotics technology, SKLR would benefit greatly from more basic researches as well as international collaboration to enhance its capability in both technology and hardware development.

Provenance of 3D printed objects

Monday 23 June 2014

11:00 to 12:00
Nawfal Al Hashimy, PhD Student, Department of Electronic and Computer Science, University of Southampton

The introduction of affordable 3D printers made a significant impact on personal fabrication artistic designs that may or may not be covered by Intellectual Property Rights (IPR). Therefore copyright holders or creators of 3D objects have a legitimate concern about sharing 3D objects. my work presents a model for signing printable 3D objects to address the IPR issue. 3D files contain object geometry plus a number of attributes however it lacks security attributes when it comes to provenance procedures as it uses inherited security protocols for digital documents, digital media that are not intended for 3D objects.

Stuart Irvine

Wednesday 25 June 2014

14:30
Professor Stuart Irvine, Prifysgol Glyndŵr University

Further information to follow.

Pre- and Post-Award Research Finance

Wednesday 25 June 2014

12:45
Michele Dodd, Sarah Gillies, Phil Lidiard (Research Finance), Phil Walker (Physics), Adrian Hilton (CVSSP)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Pre- and Post-Award Research Finance on Wednesday 25th June in 40AA03, with lunch available from 12:45 and the seminar running from 13:00 to 14:00.

Physics Open Days June 2014

Friday 27 June 2014

10:00am

The Department of Physics welcomes prospective undergraduate students and their families during the University wide Open Days on 27th and 28th June 2014.

CV Workshop & Surgery for PGRs

Tuesday 1 July 2014

11:00 to 13:00

All PGR students are invited to a CV workshop, followed by a ‘surgery’ with bookable 1:1 slots where you can have a personal CV review with an employer. The session is being run by Sally Williams from NPL and Keira Lawrence from BAE Systems Applied Intelligence, (formerly Detica).

UKSAF Summer Meeting

Wednesday 2 July 2014

09:00 to 16:30

Material, Fuel, and Power Train Selection for Low Carbon Vehicles

Wednesday 16 July 2014

13.00 hrs to 14.00 hrs
Roland Geyer, Associate Professor – Industrial Ecology, Green Supply Chain Management

Worldwide, efforts are increasing to reduce greenhouse gas (GHG) emissions from transportation in general and road vehicles in particular. The two technological avenues for road vehicles that arguably receive the most attention at the moment are alternative structural materials and alternative fuel-powertrain combinations.

Civil Engineering Research Seminar - July 2014

Thursday 17 July 2014

13:00 to 14:00
Miss Anju Goel

Acoustic source tracking in a room environment

Monday 21 July 2014

14:00 to 15:00
Dr Xionghu Zhong, Nanyang Technological University (Singapore)

2014 BYOB CubeSat Workshop

Friday 25 July 2014

Following on from the success of our 2013 event, Surrey Space Centre (SSC) and AMSAT-UK invite CubeSat developers to bring their equipment to a ‘Bring Your Own Board’ (BYOB) workshop. The aims are to demonstrate your latest CubeSat developments, to foster new partnerships and links within the UK and EU community, and encouraging more interaction with AMSAT-UK and the Colloquium (more info at: http://amsat-uk.org/colloquium/colloquium-2014/).

New Trends in Quantum Integrability

Monday 18 August 2014

The Department of Mathematics is hosting the International Conference on New Trends in Quantum Integrability, co-organised by Sara Pasquetti, Vidas Regelskis and Alessandro Torrielli, to be held from 18-22 August 2014.  This conference aims to bring together researchers working on quantum groups, classical and quantum integrable systems, and applications of integrability in string and gauge theories.

Evolutionary Computation and Complex Networks

Tuesday 26 August 2014

11:00 to 12:00
Professor Jing Liu, Xidian University, Xi'an, China

Both evolutionary computation and complex networks have received considerable attention in recent years. Instead of introducing each field individually, this talk focuses on the research combining these two fields. In general, this talk includes two parts: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods; (2) how evolutionary computation methods are used to solve the problems in complex networks.

Civil Engineering Research Seminar - August 2014

Thursday 28 August 2014

13:00 to 14:00
Miss Leticia Llano Trueba

Möbius Transformations

Tuesday 2 September 2014

15:30 to 16:30
Yağmur Kaya, MSc Student, Balıkesir University, Turkey

In geometry and complex analysis, a Möbius transformation of the complex plane is a rational function with complex variable z and complex coefficients. These transformations preserve angles, map every straight line to a line or circle, and map every circle to a line or circle. They form a group called the Möbius group which is the projective linear group PGL(2,C). Möbius transformations are named after August Ferdinand Möbius, and are also known as linear fractional transformations, bilinear transformations, or fractional linear transformations. In this talk, we will discuss how such mathematical entity is very much embedded into the fabric of complex-valued Neural Networks.

Score-informed source separation

Wednesday 3 September 2014

15:00 to 16:00
Dr Sebastian Ewert, Queen Mary University of London

Evolutionary algorithm with direction search strategy for dynamic multi-objective optimization

Thursday 4 September 2014

15:30 to 16:30
Dr Yan Wu, Associate Professor, Xidian University, China

Many real-world multiobjective problems are dynamic, requiring an optimization algorithm which is able to continuously track moving pareto front over time. In this paper, we proposed direction search strategy(DSS) which includes two mechanisms to improve the performance of multiobjective optimization evolutionary algorithms in dynamic environment. The first mechanism reinitializes the population using coarse prediction and local search based on the moving direction of centroid of pareto solutions between two consecutive environments after a change. The second mechanism guides the search by introducing the "better" individuals to accelerate the convergence speed. The two mechanisms provide a good balance between exploration and convergence for dynamic multiobjective optimization evolutionary algorithms. We systematically compare DSS with two prediction strategies on a variety of test instances with predictable and sudden irregular change. The statistical results show that DSS is promising for dealing with dynamic environments.

Secure Data Integration Systems

Monday 8 September 2014

12:00 to 13:00
Fatmah Akeel, PhD Student, University of Southampton

With the web witnessing an immense shift towards publishing data, integrating data from diverse sources that have heterogeneous security and privacy levels and varying in trust become even more challenging. In a Data Integration System (DIS) that integrates confidential data in critical domains to contain a problem and make faster and reliable decisions, there is a need to integrate multiple data sources while maintaining the security levels and privacy requirements of each data source before and during the integration. However, such systems face a threat of data leakage that compromises data confidentiality and privacy. The literature found lacks the comprehensive perspective of considering security, privacy and trust together; therefore, we propose SecureDIS, a novel framework that aims to prevent data leakage in a DIS considering these aspects. It is comprised of six components that represent a conceptualized DIS architectural components which are: data and data sources, security policy, integration approach, integration location, data consumers and finally system security management. Each component contains a set of guidelines to be used by system analysts who build and design a DIS that handles critical confidential data.

Currently the framework and the guidelines are confirmed by 14 experts in the areas of data integration, security and software engineering. However, we are currently investigating approaches on applying the framework to validate its applicability in real use cases.

Human-robot interaction

Friday 12 September 2014

14:00 to 15:00
Dr Vita Beran, Brno University of Technology, Brno (Czech Republic)

How to Overcome the Forgetting Factor when applying Synaptic Plasticity and Unsupervised Learning in General

Thursday 18 September 2014

15:30 to 16:30
Joseph Chrol-Cannon, PhD Student, Department of Computing, University of Surrey

We aim to build networks that learn spatio-temporal patterns in time series data such as speech, weather and human motion recognition tasks. Synaptic plasticity is the main mechanism employed to reach this goal and it is inspired by how the brain works to achieve its great feats of learning.

However, a problem of catastrophic forgetting arises when the neural networks parameters are all updated according to synaptic plasticity mechanisms. After a short period of convergence, consecutive samples fed to the network will drive synaptic weight changes in directly opposing directions. This leads to an effective overwriting of memory as new samples are presented and means that the network learns an average of its input data, rather than specific features, and differences, of individual instances.

This short talk illustrates the problem through analysis of weight matrix adaptation and discusses the wider implications of the phenomenon in feed-forward networks, deep neural networks and the mechanisms of local learning that can provide a solution.

Inventing the Future: An Evening with Greg Foot

Tuesday 23 September 2014

18:00 to 19:30
Greg Foot

You are invited to the University for an evening to celebrate scientific creativity which has now become a reality. TV scientist Greg Foot will be interviewing four of the University’s scientists and engineers who have recently had their research projects become a reality.

Innovation in Action

Tuesday 23 September 2014

13:30 to 17:30
Various

Exploitation of research - the successes and opportunities 

The University of Surrey, supported by their EPSRC funded Impact Acceleration Account, would like to welcome the technology, engineering and science community to see how research and innovation at the University can be, and has been, exploited for maximum benefit.

A brief introduction to College of Automation, Harbin Engineering University, China (first talk) / Ship Navigation: Fiber Optical Gyroscope, Inertial Navigation and Integrated Navigation Systems (second talk)

Wednesday 24 September 2014

14:30 to 16:00
Prof. Lin Zhao and Prof. Yuxin Zhao, Harbin Engineering University, China (first talk) / Prof. Yonggang Zhang, Harbin Engineering University, China (second talk)

Civil Engineering Research Seminar - September 2014

Thursday 25 September 2014

13:00 to 14:00
Mr Ojajuni Oluwatosin

Local Descriptors for Computer Vision Applications

Friday 26 September 2014

11:00 to 12:00
Dr. B H Shekar, Mangalore University (India)

Baxter Research Robot - A safe, affordable platform for academic and corporate labs

Monday 29 September 2014

11:00 to 12:00
Becky Yelling, Horatio Coles-Abell and Alan Braithewaite, Active Robots Limited

The most accurate measurement of temperature ever made

Wednesday 1 October 2014

Dr Michael de Podesta

Dr Michael de Podesta, Principal Research Scientist, National Physical Laboratory

WSMS October Talk

Tuesday 7 October 2014

6:45pm
Dr Suze Kundu (Imperial College)

SEPNet Careers Outside Academia for PhDs and Post Docs

Tuesday 14 October 2014

1:45 pm to 3:00 pm
Dr Kim Nilsson (Pivigo)

Talk on Data Science

Inspirational Physics

Wednesday 15 October 2014

12:45 to 16:00

This event is aimed at Year 12 students who have just started A-level Physics.

Researchfish

Wednesday 15 October 2014

13:00 to 14:00
Dee Summers, Senior Project Officer – Research, RES

You are invited to attend a session of the FEPS ‘e3i’ programme on the Researchfish research outcomes reporting system.

Why did I choose aviation and why Boeing?

Thursday 16 October 2014

18:00 to 19:45
Miguel Santos, Vice President - Africa, Boeing International and Director, International Sales - Africa, Boeing Commercial Airplanes

Abstract

I was born into aviation, but it became a passion of mine in a variety of ways. My aviation background, the Univ of Washington combined with commitment, persevearence and hard work... gave me the two career opportunities of the past 36 years. I enjoy working for Boeing and I love what our products can do for our customers and their customers. I hope you will embrace our industry. It needs your talent and creativeness to continue to lead in technological advancements.    

Civil Engineering Research Seminar - October 2014

Tuesday 21 October 2014

13:00 to 14:00
Mr Ali Behnejad

SEPNet Careers Talk

Tuesday 21 October 2014

1:00 pm to 2:00 pm

First steps to an amazing career!

Celebrating Alumni Success 2014

Wednesday 22 October 2014

18:30 to 19:30
Steve Harridge, BSc Civil Engineering Surrey graduate, 1973

Former Executive Director & Partner at Tony Gee and Partners LLP, Steve Harridge, will give an insight into
some of the major international construction projects he has led on during his extensive career. 

Improving Spectral Efficiency of Half-Duplex Decode-and-Forward Relay

Friday 24 October 2014

15:00 to 16:00
Chuyi Qian, Research Fellow, Department of Computing, University of Surrey

A fundamental research problem of cooperative half-duplex relaying network is to find its capacity as well as a practical approach in order to achieve the capacity. For a degraded channel with multiple parallel relays, it has been known that the achievable rate and a capacity upper bound can be derived using the max-flow min-cut theorem. However, the capacity of the relay channel for general case remains unknown. In this talk, I will describe some of the technological challenges that cooperative relaying is facing, and introduce some of the possible solutions. The relaying strategies pushing the performance towards the capacity will be discussed. In particular, we look at link adaptation and spectrum sharing techniques, and discuss the potential performance improvement.

The 21st Joint Annual Conference of CSCST-SCI

Saturday 25 October 2014

08:00 to 18:00
TBC

To register, please visit http://conference2014.cscst.org/.

Cloud Storage in the Bitcoin Era

Monday 27 October 2014

10:30 to 11:30
Dr Giuseppe Ateniese, Sapienza – University of Rome, Italy

Cloud computing is revolutionizing the entire field of information technology but it also prompts new security and privacy challenges. Several cryptographic techniques have been devised that allow users to verify that cloud providers are storing their entire databases intact, even portions that are rarely accessed. Such proof-of-storage schemes (PDP/POR) have witnessed remarkable improvements over the years but leave unsettled several risk management issues. Arguably, the most important open question of all is: What happens if a proof-of-storage scheme fails, indicating that a client¡¦s outsourced database has been damaged?

Clearly, the cloud is liable for this damage, and the client should be compensated for her loss. But the client no longer stores her database locally and may not be able to assess the damage incurred. In addition, she will be forced to follow cumbersome legal procedures, specified in a service level agreement (SLA), in order to be compensated for her loss.

In this talk, we will cover a new framework that is part of joint works with Michael Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas and Roberto Tamassia. In this framework, users are compensated for data loss even when the cloud provider does not cooperate and without involving any trusted authorities. As a first attempt, we show that it is possible to automatically compensate users with Bitcoins if the cloud provider misbehaves. The compensation will be inescapable and proportional to the level of data loss or manipulation incurred.

The Annual Roland Clift Lecture Series on Industrial Ecology

Wednesday 29 October 2014

19:00 to 20:30
Professor David Fisk, Imperial College London

Data Forensic Techniques Using Benford's Law and Zipf's Law for Keystroke Dynamics

Friday 7 November 2014

15:00 to 16:00
Aamo Iorliam, PhD Student, Department of Computing, University of Surrey

The selection and application of biometrics traits for authentication and identification have recently attracted a significant amount of research interest. In this paper we investigate the use of keystroke data to distinguish between humans using keystroke biometric systems and non-humans for auditing application. Recently, Benford’s Law and Zipf’s Law, which are both discrete Power law probability distributions, have been effectively used to detect fraud and discriminate between genuine data and fake/tampered data.

As such, our motivation is to apply the Benford’s Law and Zipf’s Law on keystroke data and to determine whether they follow these laws and discriminate between humans using keystroke biometric systems from non-humans. From the results, we observe that, the latency values of the keystroke data from humans actually follow the Benford’s law and Zipf’s law, but not the duration values. This implies that, latency values from humans would follow the two laws, whereas the latency values from non-humans would deviate from the Benford’s law and Zipf’s law.

Even though, the duration values from humans deviates from the Benford’s law, they do follow a pattern that we can develop an accurate model for the duration values. We perform experiments using the benchmark data set developed by Killourhy and Maxion and obtain divergences of 0.0008, 0.029 and 0.05 for the keyup-keydown (Latency), keydown-keydown, and duration of the keystroke data, respectively. Moreover, P-value’s of 0.7770, 0.6230 and 0.0160 are obtained for the keyup-keydown (Latency), keydown-keydown, and duration of the keystroke data, respectively.
We observe that the latency (which is the time elapsed between release of the first key and pressing down of the next key) is one of the most important features used by administrators for auditing purposes to detect anomalies during their employees logging into their company system.

WSMS November Talk

Tuesday 11 November 2014

6:45pm
Professor Richard Murphy

Mastering Online Applications

Tuesday 11 November 2014

1pm
John Lillington, Chief Technologist (Nuclear) from AMEC

Online competency-based applications are used by employers of all sizes, not just large corporates. 

SEPNet Student Expo

Wednesday 12 November 2014

10:00 am to 04:00 pm

We would be delighted if you would attend our forthcoming SEPnet Students’ Expo. 

The International Day of Medical Physics: Advances in Cancer Therapy

Wednesday 12 November 2014

16:30 to 19:30

 

The University of Surrey, in collaboration with the National Physical Laboratory, is organising an inaugural event to mark the International Day of Medical Physics (IDMP, http://www.iomp.org/idmp). The IDMP recognises the birthday of Marie Curie with world-wide events in medical physics. This is part of a new initiative by the International Organization for Medical Physics to raise awareness of the role of medical physicists.

The increased usage of cutting edge technologies in the UK’s healthcare has proven to be a successful strategy in increasing the public’s quality of life. It is therefore extremely important to ensure that both the public and the clinical staff are aware of these new rapidly-developing treatment technologies. Medical physics is one of the fast growing fields of impact-driven science where new technologies are making a real difference to the lives of our citizens.

The event at Surrey will be one of its first kinds in the UK to gather public, medical physicist, researchers and students from around the UK to mark the International Day of Medical Physics. It will provide a platform for high profile speakers on the topic of cancer therapy, drawn from Clinical, Academia and Industry. The event has support from the Royal Surrey County Hospital and Institute of Physics and Engineering in Medicine who are the leading organisations in the field of Cancer Therapy, plus major industrial companies at the forefront of medical physics technology. Find out more about the companies participating in the exhibition (some to be confirmed) (PDF, 320KB).

Our evening program will feature key note speakers, leading into a panel discussion focused around UK’s healthcare and utilization of technologies and the impact of associated medical research. The event will also include an award presentation to Prof Nicholas Spyrou (Surrey’s Emeritus Professor of Medical Physics) for his lifelong commitment to the fields of Medical Physics and Nuclear Physics.

Find out more about the keynote speakers and panelists at the event (PDF, 335 KB).

The Confirmation Process: A Supervisor and Examiner’s Update

Wednesday 12 November 2014

13:00 to 14:00
Dawn Duke (Researcher Development)

You are invited to attend a session of the FEPS ‘e3i’ programme on the PhD Confirmation Process, designed for academics involved in supervising and examining PhD students.

Civil Engineering Research Seminar - November 2014

Thursday 13 November 2014

13:00 to 14:00
Mr Hadi Gorouhi

Marshall of Cambridge, Past, Present and Future

Tuesday 18 November 2014

19:30 to 21:30
Terry Holloway, Marshall Group Support Executive

ECMA-407 – The World's First 3D Audio Standard

Tuesday 18 November 2014

15:30 to 16:30
Dr Junaid Jameel Ahmad, Scientific Research Engineer, SCI-STI-MM Laboratory, School of Electrical Engineering, École polytechnique fédérale de Lausanne (EPFL), Switzerland

The ECMA International have recently standardized "ECMA-407" as the first 3D audio standard worldwide titled "Scalable Sparse Spatial Sound System (S5) – Base S5 Coding". The ECMA-407 standard layouts a general framework for 3D audio spatial coding, which is based on the key components of signal-analysis assisted spatial downmix, inverse-coding (VoidCode®) assisted spatial upmix from the downmix, base audio codec, and very little side information. ECMA-407 is compliant with both waveform preserving base audio codecs as well as non-waveform preserving audio codecs such as USAC and HE-AAC v2.

An ECMA-407 complaint technology solution is also currently being submitted and evaluated in the core-experiment process for MPEG’s "Phase 2" technologies (aiming to provide low-bitrate 3D coding technologies). This technology solution supports a wide of 3D loudspeaker configurations (ranging from 5.1 upto NHK 22.2) and provides excellent psychoacoustic quality at various bitrates (as low as 48kbps). This technology solution can be equally applied for 3D spatial coding of any audio content involving channels, channels and objects and Higher Order Ambisonics (HOA).

Swarming models with attractive-repulsive effects

Thursday 20 November 2014

13:30 to 14:30
Prof J.A. Carillo, Department of Mathematics, Imperial College London

The speaker will discuss some models for the collective behavior of animals and self-organization. He will concentrate in showing some structural stability of patterns. He will also discuss some hydrodynamic models and their simulation patterns.

User aspects of stereoscopic 3D video interaction

Friday 21 November 2014

15:00 to 16:00
Dr Haiyue (Andy) Yuan, Research Fellow, Department of Computing, University of Surrey

The recent development of stereoscopic three dimensional (3D) display technologies has resulted in a proliferation of 3D video production and broadcasting, attracting a lot of research into capture, compression and delivery of stereoscopic content. However, little research has been dedicated to design practices of meaningful user interaction with stereoscopic 3D video content. Having this in mind, this thesis presents a series of studies in Human Computer Interaction (HCI) that analyse user aspects of stereoscopic 3D video interaction, propose technical solutions and give design guidelines for intuitive interaction with the stereoscopic 3D video content. Three main user studies have been conducted to look into this research topic. The user requirement analysis in terms of interactive functionalities and interaction modality requirements showed strong demand for object selection task in 3D video interaction, that resulted in a follow-up study of user preferences in 3D selection using virtual-pointer and ray-casting metaphors.

In addition, the immersive experience of stereoscopic 3D displays to the audience is caused by artificially stimulating binocular stereopsis in the human visual system. The binocular disparity between the left and right view is the key factor in creating the convincing impression of depth, distinguishing the stereoscopic 3D video from other types of video paradigms. Taking into consideration the imperfections of current disparity estimation algorithm, this thesis finally presents a study into the impact of disparity error on users’ perception of depth and its implications to interaction tasks in 3D stereoscopic systems.

A further investigation of pointing modalities in the context of stereoscopic 3D television (TV) was conducted, adopting the ISO 9241-9 standard for multi-directional tapping task and the Fitts’ law model. This experimental study compared and evaluated three pointing modalities: standard mouse-based interaction, virtual laser pointer implemented using Wiimote, and hand movement modality using Kinect. The results suggest that the virtual laser pointer modality is more advantageous than other modalities in terms of user performance and user comfort.

Life Cycle Thinking: assessing the footprints of products, companies and lifestyles

Monday 24 November 2014

Please note that this workshop is aimed at PhD students.

Although most people are aware that their actions have direct environmental, social and economic impacts, they are generally less are aware of the impacts that they cause indirectly. For example, driving a car or a lorry causes environmental impacts through carbon dioxide emissions from burning fuel, social impacts through jobs in the petrol station and economic profit for the petrol company.  However, there are also impacts all the way along the value chain, including, for example, the emissions due to oil extraction, the conditions of the workers who carry out the extraction, and the profits of the manufacturers who make the oil extraction equipment.

Non-Rigid Alignment of 3D Motion Sequences

Wednesday 26 November 2014

11:00 to 12:00
Dr Stefanie Wuhrer, Saarland University and MPI Informatik (Germany)

Wearable Algorithms != Electronics & Algorithms. Lessons from Wearable EEG

Thursday 27 November 2014

15:30 to 16:30
Dr Alex Casson (Lecturer), Sensing, Imaging and Signal Processing Group, School of Electrical and Electronic Engineering, University of Manchester

Wearable sensors are quickly emerging as next generation devices for the ubiquitous monitoring of the human body. The potential benefits of including low power, local signal processing are well accepted: the system battery life can be increased by compressing data so there is less to transmit or store; closed-loop, recording-stimulation, devices can be created without the latency associated with requiring a wireless link; and the device functionality can be increased by allowing alarms to be generated automatically, and similar. The challenge, of course, is in realising reliable, robust, and trustworthy algorithms which can operate within the very limited power budgets available. “Wearable algorithms” is the name given to the signal processing approaches, combined with dedicated hardware implementations, which are attempting to do meet this challenge.

In this talk I will overview developments in algorithms and circuits for very low power wearable sensor nodes. Using wearable EEG monitoring as an example I will explore circuits for real-time time-frequency transformations, and use this to highlight that wearable algorithms are not a simple combination of an algorithm and a low power circuit. As one illustration: traditional circuit design would always endeavour to minimise the effective noise present in a system, often by trading-off with increased power consumption. However noise-enhanced algorithms are a branch of signal processing theory where algorithm performance is not only robust in the presence of noise, but up to a certain point it actually gets better as more noise is introduced. By combining the two, the fact that a sensor node has an algorithm embedded in it opens up substantial new design avenues and opportunities for power optimisation: having noisey-er input amplifiers in the example given here. I will look at this and other potential techniques.

Civil Engineering Research Seminar - 28th November 2014

Friday 28 November 2014

13:00 to 14:00
Dr Theodore Karavasilis

Site Visit to CCFE (Culham Centre for Fusion Energy)

Wednesday 3 December 2014

CCFE (http://www.ccfe.ac.uk/CCFE.aspx) is the UK's national laboratory for fusion research and is owned and operated by the UKAEA.

The Sound of Bubbles (from the IET)

Wednesday 3 December 2014

19:00
Gianluca Memoli, National Physical Laboratory

Did you know bubbles are everywhere? And that they all make different sounds!

Research Data Management

Wednesday 3 December 2014

13:00 to 14:00
Adam Kirby (FEPS IT Manager), Fiona Greig (Library, Head of e-Strategy and Resources)

Many research funders now require researchers to manage data in an organised way and to share it appropriately, with future funding dependent on institutional compliance with open data policies.  From May 2015, this will also become an expectation for EPSRC-funded research.

Is the Milky Way Special

Thursday 4 December 2014

7:30pm
Professor Chris Linott (University of Oxford)

Guildford Astronomical Society presents

Semi-fragile Watermarking for Image Content Authentication and Self-restoration

Tuesday 9 December 2014

15:00 to 16:00
Miss Hui Wang, PhD Student, Department of Computing, University of Surrey

With the popularity and affordability of advanced digital image editing software, users can manipulate images relatively easily and professionally. As a result, the task of guaranteeing the authenticity of digital images, particularly as evidence in the court of law, is becoming more important. In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and to localize the tampered areas, while simultaneously tolerating some non-malicious manipulations. Moreover, some researchers have proposed self-restoration schemes such that the content of tampered areas can be recovered after the authentication process. In this thesis, we introduce three semi-fragile watermarking schemes for image content authentication and self-restoration based on a fast self-restoration, a perceptual image hashing, and an image restoration method using SSI. Moreover, we propose a general-purpose digital watermarking benchmarking framework with high reconfigurability which is also configured to evaluate the performance of our proposed semi-fragile watermarking systems.

3MT (Three Minute Thesis)

Tuesday 9 December 2014

18:00

Fancy hearing an 80,000 word thesis explained in less than 180 seconds? 

Research students from across the globe are doing just that in preparation for the Three Minute Thesis Competition (3MT®).

WSMS December Talk

Tuesday 9 December 2014

18:00 to 20:00

Improving the performance against real-life factors of EMG controlled upper-limb prostheses for transradial amputees

Wednesday 10 December 2014

15:00 to 16:00
Dr Javier Escudero, University of Edinburgh

There are many disabled people who have lost limbs. In the UK alone, more than 300 people suffer from different levels of upper limb amputation every single year. Most of these people are yet to be provided with prosthetic devices able to meet the challenges they face in their daily life. Advanced commercial devices are limited in their control strategies. The recognition of patterns in surface electromyogram (sEMG) signals is a promising alternative to achieve a more dexterous control of hand prostheses. We will describe a recent method for the classification of finger movements based on the analysis of sEMG signals and explore how to minimise the number of sEMG channels needed to achieve a high-performance classification. Then, we will evaluate how variations in the force level of the muscle contractions affect the classification performance. Finally, we propose a novel set of features that aim at reducing the impact of force level variations on the prosthesis. These features are computed directly in the time domain and are related to descriptors of the spectral moments of the sEMG.

This talk presents the results of previous and recent research in the latter area.

Civil Engineering Research Seminar - December 2014

Thursday 11 December 2014

13:00 to 14:00
Mr Hristo Dikanski

CES SEMINAR - ECOLOGICAL FINANCE

Thursday 8 January 2015

13:00 to 14:00
Dr Steve Waygood - Chief Responsible Investment Officer, Aviva Investors
Steve will outline how the capital markets currently work, why they undermine sustainable development, why it is in our financial interests that this changes, and how the markets could be changed so that they capitalise a green economy. For further information please click here.

Detection of Video-based Spoof Attacks Using Visual Dynamics

Tuesday 13 January 2015

15:00 to 16:00
Mr Santosh Tirunagari, PhD Student, Department of Computing, University of Surrey

Rendering a face recognition system robust is vital in order to safeguard it against spoof attacks carried out by using printed pictures of a victim (also known as print attack) or a replayed video of the person (replay attack). A key property in distinguishing a live, genuine video from print or reply attacks is by exploiting the information dynamics of the video content, such as blinking eyes and talking mouth. We advance the state of the art in facial anti-spoofing by introducing a system architecture that is composed of Dynamic Mode Decomposition (DMD), Local Binary Patterns (LBP), and Support Vector Machines (SVM) with a histogram intersection kernel. Fundamental to the success of our proposal is the use of DMD in representing the temporal information as an image of the same dimension as that of each and every image contained in a video. In comparison, conventional methods treat the video as a set or sequence of images. The pipeline of DMD-LBP-SVM proves to be efficient, convenient to use, and effective. The efficiency is achieved by introducing a faster data-driven means of matrix factorisation for DMD. In fact only the spatial configuration for LBP needs to be tuned. Finally, the effectiveness of the methodology was demonstrated using two publicly available databases, achieving the best results so far on the unseen tests, following the published experimental protocols.

Civil Engineering Research Seminar - January 2015

Thursday 15 January 2015

13:00 to 14:00
Mr Mehdi Rouholamin

Statistical-relational- and key-graphs for detection, segmentation and recognition

Monday 19 January 2015

14:00 to 15:00
Professor Roberto M. Cesar Jr., University of São Paulo (Brazil)

WSMS January Talk

Tuesday 20 January 2015

18:45 to 20:00

Observing hands in action

Wednesday 21 January 2015

14:30 to 15:30
Professor Antonis Argyros, University of Crete, Greece

Mobile Privacy Leakage Detection and Prevention for Android Devices

Friday 23 January 2015

15:00 to 16:00
Mr Saeed Ibrahim Saeed Alqahtani, PhD Student, Department of Computing, University of Surrey

Android has been the most popular operating system (OS) for mobile devices such as smartphones and tablets, and starts entering other areas such as smart home (Android TV) and automobiles (Android Auto). A large number of mobile apps have been developed for Android and more are being introduced to the official Android App market (Google Play) and other third-party markets. Due to the openness of Android OS, it is actually also possible to download a mobile app directly from a developer's website. While most mobile apps are useful, it has been found that many mobile apps leak sensitive information to third parties without the user's consent. That occurs in some cases due to a careless programming error and in some other cases embedded maliciously. As a consequence, nowadays commercial companies and attackers can collect private information about a large number of users for many different purposes. To better protect users or at least inform users about such privacy leakage, a lot of efforts have been made by the research community to provide better methods and tools.

In this talk I will present my PhD study around mobile privacy leakage detection and prevention, highlighting some possible improvements that I am currently working on. I will also present my work in progress regarding a benchmarking environment for testing privacy protection tools on Android platform.

Computing Employability Day

Tuesday 3 February 2015

10:00 to 15:00

In the last NSS, students asked for more help with "boosting communication skills", "presenting yourself with self-confidence" and "trackling unfamiliar problems". To this end, the Department would like to invite all students to the Department's Computing Career Day!

Department of Physics PhD Fair

Thursday 5 February 2015

2-5pm

Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it?

Friday 20 February 2015

10:00 to 12:00
Prof Adrian Waller, Thales UK Research and Technology

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Winton Capital: Applying science to finance

Tuesday 24 February 2015

1pm

All welcome.

Output Diversity as a Test Selection Criterion

Wednesday 25 February 2015

12:00 to 13:00
Dr Nadia Alshahwan, Research Associate, University College London (UCL)

The uniqueness (or otherwise) of test outputs ought to have a bearing on test effectiveness, yet it has not previously been studied. We investigate the whitebox coverage and fault detection achieved by Output Uniqueness, a newly proposed blackbox test criterion, using 6 web applications. We find that output uniqueness exhibits average correlation coefficients of 0.85, 0.83 and 0.97 with statement, branch and path coverage respectively. More interestingly, output uniqueness finds 92% of the real faults found by branch coverage (and a further 47% that remained undetected by such whitebox techniques). These results suggest that output uniqueness may provide a useful surrogate when whitebox techniques are inapplicable and an effective complement where they are.

Cyber crime: What is happening and why?

Friday 27 February 2015

10:00 to 12:00
Mike StJohn-Green, Independent Consultant in Cyber Security

Why is cyber security so difficult? Why can’t the IT team just make our systems secure? Why doesn’t the government protect us from cyber crime? What is the role of international standards like ISO-27001? Mike StJohn-Green will demystify a topic that is too often shrouded in secrecy, obscured by abbreviations and characterised by ‘Fear, Uncertainty and Doubt’. For example, what is the real significance of stories like Shellshock and Heartbleed? What are the trends we should be anticipating over the next few years? Hear Mike tackle these questions, put your own questions, and find out what you should be doing about this topical and increasingly important issue.

Ways of erecting steel bridges

Monday 2 March 2015

13:00 to 14:00
Steve Harridge

Short lunchtime seminar presented Steve Harridge.

Object detection with the Ensemble of Exemplar-SVMs: contextual guidance and optimal calibration

Wednesday 4 March 2015

11:00 to 12:00
Dr Vittorio Ferrari, University of Edinburgh

The Influence of Astronomy on Life in Ancient Times

Thursday 5 March 2015

7:30pm
Emeritus Professor David W. Hughes

Guildford Astronomical Society presents...

Quality as a Prerequisite for Security in Interoperable Systems

Friday 6 March 2015

10:00 to 12:00
Peter Davies, Thales e-Security Ltd

We are all facing enormous challenges, now and into the future, in the way that assurance of ICT products and systems is provided and there is a pressing need to review the thinking about assurance. I will argue that we only truly understand the ‘security’ of an interoperable system when we understand the ‘quality’ level to which that system has been implemented.  I will further argue that a laxity in our linguistic definitions means that we increasingly do not understand what is meant when we are discussing the security.

Civil Engineering Research Seminar - March 2015

Monday 9 March 2015

13:00 to 14:00
Professor Chris Frey

Managing short-term and long-term risks

Monday 9 March 2015

12:00 to 12:50
R. Kerry Rowe P.Eng Professor and Canada Research Chair in Geotechnical and Geoenvironmental Engineering Dept. of Civil Engineering, Queen’s University at Kingston, ON, Canada

Privacy-Conscious Information Sharing in Online Social Media Sites

Wednesday 11 March 2015

11:00 to 12:00
Dr Anna Squiccianrini, Assistant Professor, Pennsylvania State University, US

In this seminar, I will present my recent work in Access Control and Privacy issues for Social Network sites.

I will discuss security implications related to disclosure of inappropriate data across Social Networks, and use as a case study the problem of digital images distribution and misuse. Two specific issues will be discussed: first, how to assess co-ownership, if multiple users appear to be stakeholders of the same image. Second, we will look into the problem of image control within and across social network sites. I will discuss our approach to these issues, which draw from game theory and algorithmic results. I will provide an overview of the deployed prototype and provide some interesting insights obtained from performance and user studies. Our studies provided us with interesting findings, in terms of users’ perception of privacy and protection from security threats. I will conclude with highlighting interesting issues that represent open problems and with insights on  new lines of research for this work.

Automatic Mitosis Detection Using Breast Cancer Histopathology Slide Image: Challenges and Solutions

Wednesday 11 March 2015

11:00 to 12:00
Mr Ashkan Tashk, Shiraz University of Technology, Iran

Pivigo: managing your online presence and CV reviews

Thursday 12 March 2015

12:30pm

Postgraduates only.

Flexible Neural Tree as an Effective Tool for the Function Approximation and Feature Selection

Thursday 12 March 2015

15:30 to 16:30
Varun Kumar Ojha, PhD Student, VSB-Technical University of Ostrava, The Czech Republic

IPROCOM is a multidisciplinary and inter-sectoral consortium funded by European Commission under the FP7-PEOPLE-2012-ITN Programme. Our objective is to apply computational intelligence tools for managing the data generated in the consortium, which deals with the powder technology and pharmaceuticals. Mainly, the function approximation and feature selection will play role in managing the data obtained. We have developed a Flexible Neural Tree software that will address both the said tasks. Flexible Neural Tree (FNT) resembles a multi-layer feed-forward neural network model that is evolved using an evolutionary procedure. The key features that FNT provides are the adaptation of an optimal network structure and the adaptive selection of the input feature for a given problem/dataset. The effectiveness in the performance of the Flexible neural tree in many applications motivate us to carry-out our research for the improvement of the existing model.

The Business of Security-Protecting the Crown Jewels

Friday 13 March 2015

10:00 to 12:00
Steven O’Sullivan and Professor Steve Legg, IBM

In this lecture Steven will discuss the "business of security" and how organisations view security, security drivers e.g. compliance, cloud , and will delve into the most common issues (and barriers) that lead to organisations being vulnerable to security incidents and attacks.

This will be rounded off with how IBM positions security for its clients (protecting the crown jewels) , scope of solutions, how we work with clients, and where it is placing its bets in security for the next few years.

Open Days: Diamon Light Source

Saturday 14 March 2015

Email diamondcomms@diamond.ac.uk to register your interest.

Ways of building concrete bridges - erection gantries, travellers, launching

Monday 16 March 2015

13:00 to 14:00
Mr Steve Harridge (Tony Gee and Partners)

This is a fantastic opportunity to understand better "constructability" in design. This will be a helpful first guide to the topic and ideal opportunity for both staff and students (all levels).

Toptica Photonics

Tuesday 17 March 2015

1:00pm

All welcome.

The Fall and Rise of Manufacturing

Tuesday 17 March 2015

19.30 to 21.30
Philip Spiers, Head of Advanced Structural Test Centre, AMRC

Hosted by the Royal Aeronautical Society and the Institute of Mechanical Engineers, Farnborough and Guildford area. 

ABOUT THE EVENT

Since its earliest days the University of Sheffield has been a world leader in metallurgy and engineering research, working closely with local industry to develop new manufacturing techniques and technologies. The AMRC was established in 2001 as a collaboration between the University and Boeing Aerospace, with the aim of applying its traditional expertise to new materials, focusing particularly on machining research. The center grew rapidly and moved into a purpose-built facility in 2008, with the opening of the Rolls-Royce Factory of the Future. It works in close collaboration with industrial partners to meet new technology needs, piloting innovative processes to bridge the gap between scientific research and mainstream production.

This lecture will look briefly at the history of the AMRC, before discussing the research currently being pursued there. Major projects include machine dynamics, composite materials production and product design and validation, including the exploitation of 3D printing. Among the examples described will be a small Unmanned Air Vehicle, produced using 3D printing, which has been built and flown by the AMRC. The importance of such work to manufacturing, the technological challenges involved and the impact it has already had on industry will be highlighted.

Astro Evening: Eclipse

Wednesday 18 March 2015

18.30 to 19.45

After the success of our first ‘Astro Evening’ here at the University of Surrey, we invite you to join us for our next event.

The Astrophysics Group will be holding an outdoor lecture at the telescope location followed by a live presentation of the night sky with our new learning and outreach telescope. Members of our Astrophysics group will be also be on hand during the evening to answer your questions.

As a solar eclipse will take place in the UK a few days later, we theme this month’s event on the ‘Eclipse’.

Infrastructure Sustainability and Low Carbon Design

Wednesday 18 March 2015

14:00 to 15:30
Keith Clarke CBE

Infrastructure is always too early, too late, too much and too little.  Nobody wants to pay for it even though it remains essential to not only the economic but social integrity of society.  This has always been true since the Industrial Revolution but it now becomes doubly important given the absolute necessity to transition to a low carbon society and the way we now define and evolve our infrastructure to undergo the greatest revolution since we learned how to dig canals.

CES Seminar - Success in Chinese Urban Food Waste Recycling

Thursday 19 March 2015

12:00 to 13:00
Professor Marie Harder - China National Thousand Talents Professor, Fudan University, Shanghai and Professor of Sustainable Waste Management, University of Brighton

Marie will show how the viewpoints of different stakeholders, as to why behaviour change occurred, can be simply analysed with respect to a common framework to pin down which determinants were key to some very successful, durable, urban food waste sorting/recycling schemes in dense urban areas of Shanghai.  The framework consists of twelve domains pooled from many theories (cf Michie) and operationalised for this context.  Because of its ease of use by practitioners and transferability, it will be developed into a handbook for general use.

Watch the Eclipse at Surrey

Friday 20 March 2015

0900 to 1030

March 20th 2015 will be the last total eclipse visible in Europe until 2026! Although here in Surrey we will only see a partial eclipse, it is still a great opportunity to learn about eclipses, take part in some experiments and observe the Sun using our solar telescopes. 

There will also be the chance to take part in a collaborative climate measuring activity in partnership with the University of Reading.

Please note this event is only open to schools. 

Identity is the New Money

Friday 20 March 2015

10:00 to 12:00
Dave Birch, Global Ambassador, Consult Hyperion

David Birch from Consult Hyperion will give a talk based on his forthcoming book “Identity is the New Money” explaining Bitcoins and the stone currency of island of Yap, the reason why social networks will replace cash and the case for a National Entitlement Scheme. In 2013, Wired magazine named him one of their global top 15 favourite sources of finance and business information and he was ranked Europe’s most influential commentator on emerging payments by Total Payments magazine so you’d be mad to miss out.

This seminar is going to describe where the future of the security is and where it is not.   It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research,  It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators.  It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.  

Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

Tuesday 24 March 2015

11:30 to 12:30
Dr Emmanuela Orsini, Research Associate, University of Bristol

Gentry's bootstrapping technique is still the only known method of obtaining fully homomorphic encryption. We describe a method to bootstrap a packed BGV ciphertext which does not depend (as much) on any special properties of the plaintext and ciphertext moduli. This enables our method to be applied in a larger number of situations. Also unlike previous methods our depth grows only as $O(\log p + \log \log q)$ as opposed to the $\log q$ of previous methods. Our basic bootstrapping technique makes use of a representation of the group $\Z_q^+$ over the finite field $\F_p$ (either based on polynomials or elliptic curves), followed by polynomial interpolation of the reduction mod $p$ map over the coefficients of the algebraic group. This technique is then extended to the full BGV packed ciphertext space, using a method whose depth depends only logarithmically on the number of packed elements.

(This is joint work with Joop van de Pol and Nigel Smart.)

Careers in the space industry

Wednesday 25 March 2015

1:00pm

All welcome.

Spectrogram factorization methods for music and audio signal analysis

Wednesday 25 March 2015

15:00 to 16:00
Dr Emmanouil Benetos, Department of Computer Science, City University London

Simple temporary works

Wednesday 25 March 2015

13:00 to 14:00
Steve Harridge

Short lunchtime seminar presented Steve Harridge.

Phase-contrast x-ray imaging for life and materials science

Thursday 26 March 2015

2:00 pm
Dr Irene Zanette, Diamond Light Source

Conventional absorption-contrast x-ray imaging is a well-established tool in medical diagnosis, security screening, and industrial testing among others. However, features with tiny density differences, such as different types of biological soft tissues, or very small details such as cracks, are often not revealed with absorption contrast.

Front Line Digital Forensics in the Police

Thursday 26 March 2015

10:00 to 12:00
Colin Smith, Digital Forensics Team, Surrey Police

This 2-hour long talk is part of the COMM046 module on Multimedia Security and Digital Forensics (which is part of the Department's MSc in Information Security programme). The speaker will describe how front line digital forensics is conducted at Surrey Police's Digital Forensics Team. ACPO best practice guides and four principles will be covered as the background. The digital forensics software tool EnCase Forensics will be used to demonstrate the whole digital forensics process including hard drive imaging, loading an image into EnCase, navigating through the loaded data, searching/eliminating data using keywords, filters and hash values, and data carving. Link files, history records, backups of mobile devices, user information, and information about USB devices will also be covered. The talk will be completed with a discussion on reporting and presentation at a court of law.

Building Integrated Cyber Defences

Friday 27 March 2015

10:00 to 12:00
Bryan Lillie, Chief Technical Officer, Cyber Security for QinetiQ

Computer Network Defence is a fascinating and ever changing subject. Having worked with some of the best, and worst, organised network defences in the UK, I propose to show you how to consider your Cyber Defences as a whole, not focussing on a single aspect, and how to plan to build a capability from scratch in a methodical way, encompassing hardware, software, and the people who will operate it, and how the system becomes stronger than the sum of its parts.

The Sky at Night

Friday 27 March 2015

6:30 pm to Late (subject to cloud cover)

Guildford Astronomical Society presents The Sky at Night

New approaches to the min-cost flow problem

Wednesday 1 April 2015

14:00 to 15:00
Dr Andreas Karrenbauer, Senior Researcher, Max Planck Institute for Informatics in Saarbuecken, Germany

Min-cost flows belong to one of the most important combinatorial optimization problems and have applications in image processing, among many other areas. In the past years, interior point methods for network flow problems have become popular and led to a series of improvements in terms of worst-case running time guarantees. These methods are rather involved numerical algorithms using combinatorial pre-conditioners for solving systems of linear equations. We present a simpler variant of a potential reduction interior point method for the min-cost flow problem that sheds more light on combinatorial aspects of the whole approach. We first construct an equivalent auxiliary network and initial interior primal and dual points, i.e., flows, node potentials, and reduced costs.

By augmenting flows along cycles or adjusting the reduced costs along the arcs over cuts, we transform the initial primal and dual interior points to ones with a duality gap less than 1. These updates are computed by solving an electrical flow problem with a resistor and a voltage source on each edge. Finally, we present a crossover procedure that computes optimal integral node potentials in O(m+n log n) time. This is joint work with Ruben Becker.

A Hierarchical Approach for Regular Centroidal Voronoi Tessellations

Tuesday 14 April 2015

11:00 to 12:00
Dr Franck Hétroy-Wheeler, Grenoble Institute of Technology/Laboratoire Jean Kuntzmann/INRIA (France)

Connecting Industry and Researchers in Physics

Thursday 16 April 2015

5pm to 8pm

A SEPnet Networking Evening

Doing Science

Friday 17 April 2015

7:30pm
Professor Sir Paul Nurse

Guildford Astronomical Society presents...

4th International Tyre Colloquium: Tyre Models for Vehicle Dynamics Analysis

Monday 20 April 2015

The International Tyre Colloquium has a successful history in discussing the latest progress in the understanding and simulation of tyre-road-vehicle interactions.

WSMS April Talk

Tuesday 21 April 2015

6:45pm to 8:00pm
Dr David A. Bond Vice President Engineering Messier-Bugatti-Dowty

Civil Engineering Research Seminar - April 2015

Thursday 23 April 2015

13:00 to 14:00
Mr Georgios Nikitas

Research Data Management in Practice

Monday 27 April 2015

13:00 to 14:00
Adam Kirby (FEPS IT Manager), Fiona Greig (Library, Head of e-Strategy and Resources)

Message Dissemination and Security issues in VANETs

Tuesday 28 April 2015

14:30 to 15:30
Dr Leandros Maglaras, Lecturer, School of Computer Science and Informatics, De Montfort University

A vehicular network is a challenging environment since it combines a fixed infrastructure (roadside units, e.g., proxies), and ad hoc communications among vehicles. Vehicular networks have the diverse range of applications that varies from safety applications to comfort applications. As the dissemination requirements (reliability, delay, coverage, etc.) may be different from one application to another, the dissemination mechanism could be implemented at the application layer where the interaction with the routing layer is limited. Packet routing mechanisms must be efficient in terms of delay, throughput and number of rebroadcasts. Routing of packets based on clustering of the network in smaller parts is crucial especially in situations where the density of vehicles is relatively high. Proper scheduling/routing protocols must cope with the special characteristics of VANETs, i.e. Dynamic and dense network topology high mobility, frequent disconnected network, broadcast storm problem and hard delay constraints.

Due to the scale of a VANET and its decentralized character, full control of each and every node in the network becomes unlikely and hence, the system is vulnerable to attacks. An attacker, on the other hand, is not necessarily a malicious user trying to disrupt the cooperative systems functionality. For, even ordinary drivers might be motivated to misuse vehicular ad hoc communications selfishly in order to free the fast lane on a highway or switch  a traffic light to green. As a result, DIDS are needed that constantly observe the system functionality and ensure fairness in the network.

Political Realities and Role of Government in Infrastructure

Wednesday 29 April 2015

14:00 to 15:30
Sir John ARMITT (CBE, FREng, FICE, FCGI)

Abstract: Across the world there has been a trend to the privatisation of infrastructure over the last 30 years. However public expectation of quantity, quality and price has remained strong with Government as the target for their demands. At the same time the ability of Government to ignore those who oppose infrastructure development has become more difficult as they have become louder and more sophisticated in their opposition.  It has therefore been impossible for Governments to extract themselves from responsibility either directly or indirectly. The result is a complex mixture of policy, regulation, private capital, Government subsidy and guarantees, private and public operators. Sir John Armitt will address these challenges from his background and experience as a supplier, client, asset owner and advisor to Government.

This talk is held as part of our new MSc Programme in Infrastructure Engineering and Management which is aimed at providing graduate engineers in-depth knowledge about specialised aspects about the planning, operation and management of infrastructure systems.

The Cyber Threat Landscape and Hunting the Adversary

Friday 1 May 2015

10:00 to 12:00
Dr Adrian Nish, Principle Consultant and Cyber Threat Intelligence Lead, BAE Systems

The corporate IT network is a battle-ground for a range of modern threats. Cybercriminals looking to make financial gain, attention-seekers trying to create headlines, professional hackers aiming to steal sensitive documents, and even moles acting as legitimate employees all create significant risks for those tasked with defending the network. To make matters worse, the traditional technology and methods of these defenders has failed to keep pace with the ingenuity of the attackers and the industrialisation of their methods. This seminar will give an overview of the threat landscape and draw on real case studies from investigations done by BAE’s Cyber Security services. Examples of social engineering tricks, exploits, custom malware, and threat correlation will be presented along with descriptions of some of the cutting-edge techniques being used to detect them.

Changing the Paradigm for Amputees

Tuesday 5 May 2015

18.00 to 19.30
Professor Gordon Blunn, Professor or Bioengineering - Director of the Institute of Orthopaedics, University College London, President of the British Othopaedic Society, Royal National Orthopaedic Hospital.

Abstract

Work at the Institute of Orthopaedics and The Royal National Orthopaedic Hospital has led to the development of Transcutaneous Amputation Prostheses. These implants securely attach the external prosthesis to the skeleton. The key to this invention is a soft tissue skin seal, which prevents bacterial infection. The development of these implants has involved computer modelling, nanotechnology and implant design. The control, however, of these prostheses is limited and we are currently investigating novel electrodes to avoid some of the problems currently experienced.

Feature reduction and selection for EMG signal classification

Wednesday 6 May 2015

14:00 to 15:00
Dr Pornchai Phukpattaranont, Prince of Songkla University (Thailand)

Application Security

Friday 8 May 2015

10:00 to 12:00
Mr Chris Seary, Consultant for Info-Assure

Chris will be speaking on Application Security. His presentation will go into the details of how malicious code is inserted into applications, and discuss the controls that can be implemented to mitigate this. He will also cover other aspects of secure development, such as integration of secure development methodologies into Agile processes.

WSMS May Talk

Tuesday 12 May 2015

19:00 to 20:00

Discovery of point-set patterns: computational modelling of visual and auditory processing

Wednesday 13 May 2015

16:00 to 17:00
Dr Tom Collins, Music, Technology and Innovation Research Centre, De Montfort University

Cyber Security Vectors

Friday 15 May 2015

10:00 to 12:00
Dr Alastair MacWillson, Former Global Managing Director, Accenture Technology Consulting

Cyber security is now a riveting concern, a top issue in many organisations, business and government. Every speaker, every writer, every practitioner in the field of cyber security who wished that its topic, were taken seriously has got their wish. Whether we are talking about laws like the European Union Network Security Directive and the forthcoming EU Data Protection Directive, the US Digital Millennium Copyright Act Copyright Act or the Computer Fraud and Abuse Act, or the non-law making, but perhaps even more significant actions that the Executive agencies are undertaking, the cyber issue has never been more at the forefront of policy.

Not only has cyber security reached the highest levels of attention, it has spread into nearly every corner of business, technology and regulation. The footprint of cyber security has surpassed the grasp of any one of us, so has the range of weaknesses and ‘vectors’ of attack that exploit system vulnerabilities. In the cyber security occupation, we seem to be getting better at what we do. We have better tools, better understood practices, and we have more and better colleagues. But are we winning the battle? This presentation looks at the scale and rising complexity of the cyber security challenge.

Privacy Preserving Speech Processing on the Cloud

Tuesday 19 May 2015

10:00 to 12:00
Dr. Gérard Chollet, Emeritus Researcher, CNRS (Centre National de la Recherche Scientifique), France

Speech is usually thought as quite public. It is easily recorded, stored, broadcasted and shared. It also reveals the identity of the speaker. Rapid developments on cloud computing and the availability of cloud-based spoken dialogue systems exacerbate the issue of privacy. A cloud operator should not be allowed to gain any information about who are the users of its system. It should not use speech data of its clients without prior agreement. In most cases, these data should be encrypted. In such a case, all computations on the cloud should be performed in the encrypted domain. This talk reviews the principles of homomorphic encryption and discusses on-going developments to allow for Privacy Preserving Speech Processing on the Cloud.

Supporting On-Time Completion

Wednesday 20 May 2015

12:00 to 13:00
Dawn Duke (Researcher Development)

You are invited to attend a session of the FEPS ‘e3i’ programme on Supporting On-Time completion, designed for academics involved in supervising PhD students.

Next-Generation Immersive Audio Content Standard and Consumer Delivery Format

Friday 22 May 2015

11:00 to 12:00
Dr Jean-Marc Jot, DTS, Los Gatos, CA (USA)

Multimedia Forensics: a game theoretic approach

Wednesday 27 May 2015

11:00 to 12:00
Mauro Barni, Associate Professor, Department of Information Engineering, University of Siena, Italy

Multimedia forensics (MF) is a new discipline aiming at collecting evidence about the past history of multimedia documents, including the identification of the source of the document, the distinction between computer generated and natural images, the detection of traces left by the application of certain processing tools like resampling or JPEG compression, the modification of the semantic content of the document through cut and paste or copy-move operations. Early works did not consider the presence of an adversary aiming at impeding the forensic analysis; as a result most techniques do not work properly if some simple countermeasures (collectively referred to as anti-forensic techniques) are taken. In an attempt to re-establish the validity of forensic analysis, researchers has started building new tools to detect the traces left by anti-forensic algorithms. It is evident that any attempt to improve the forensic analysis will be accompanied by a dual effort to devise more powerful anti-forensic techniques that leave less and less evidence into the forged documents. While this is an unavoidable and possibly virtuous loop that will finally lead to more powerful forensic and anti-forensic tools, the need to investigate the ultimate limits of forensic analysis clearly exists. It is the goal of this talk to review some recent results that by relying on a bunch of disciplines including game-theory, hypothesis testing and information theory have started laying the basis for a rigorous theory of MF in which the presence of an adversary is explicitly taken into account.

Civil Engineering Research Seminar - May 2015

Thursday 28 May 2015

13:00 to 14:00
David Collings

Machine vision based traffic sign inventory with simultaneous condition analysis

Monday 1 June 2015

11:00 to 12:00
Prof. Heikki Kalviainen, Lappeenranta University of Technology (Finland)

WSMS June Talk

Tuesday 2 June 2015

7:00pm to 8:00pm

e3i Lunchtime Seminar: Research Finance

Tuesday 9 June 2015

12:00 to 13:00
Michele Dodd (Pre-Award), Sarah Gillies and Rochelle Deans (Post-Award)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Research Finance. Colleagues from the Pre-Award and Post-Award Teams will offer advice and answer your questions on the following:

Joint CIVIL/CES/MES Research Seminar - June 2015

Tuesday 9 June 2015

13:00 to 14:00
William F. Hunt, PhD, III

Sustainability Strategy and Implementation

Thursday 18 June 2015

13.00 to 14.00
Greg Chant-Hall, Head of Sustainability, Skanska Infrastructure Development

Guest Speaker:

 


GREG CHANT-HALL
Head of Sustainability, Skanska Infrastructure Development

Greg will recount some of his experiences within a large multinational corporate of developing, communicating and implementing a sustainability vision and strategy.  The session will cover engagement with internal and external stakeholders, from top management to local communities, and will recount experiences from construction projects around the world.  Various elements of the sustainability agenda will be discussed, ranging from employee wellbeing and business ethics, to green thinking and life cycle cost and analysis.

Likelihoods and Constraints for 3D Scene Understanding

Wednesday 24 June 2015

14:00 to 15:00
Mr David Fouhey, Robotics Institute, Carnegie Mellon University (USA)

Passive Forensic Analysis for Anti-Piracy

Monday 29 June 2015

10:30 to 11:30
Gwenaël Doërr, Technicolor R&D France

Cryptography and traitor-tracing watermarking are routinely used today to combat piracy of entertainment content. In this talk, we will explore how passive multimedia forensic analysis, recently proposed for content authentication, could be incorporated in the anti-piracy arsenal. After reviewing the piracy ecosystem, the talk will detail forensic techniques (i) to detect the type of piracy, (ii) to compensate for the effects of the piracy path e.g. prior to traitor tracing watermark detection, and (iii) to infer intrinsic parameters of the devices used to produce pirate samples. In particular, the talk will focus on a particular artefact referred to as luminance flicker that is the byproduct of the interplay between a LCD screen and a camcorder.

ISIE Biennial Conference at the University of Surrey

Tuesday 7 July 2015

The Society’s next conference will be held at the University of Surrey - a campus University at the town of Guildford in the county of Surrey in the South East of England, about 50km (35 minutes by rail) from central London. Transport to Guildford is easy, via Heathrow or Gatwick airport, by Eurostar train to London or, for a more leisurely journey, by ferry from St. Malo or Cherbourg to Portsmouth with a direct train from the ferry terminal to Guildford (one hour).

A Unifying Neural Network Perspective on Transfer Learning

Wednesday 8 July 2015

11:00 to 12:00
Dr Timothy Hospedales, Queen Mary University of London

e3i Lunchtime Seminar: The EPSRC Funding Landscape and How to Influence

Monday 13 July 2015

12:00 to 13:00
Atti Emecz, Director of Strategic Partnerships

Atti Emecz will be advising on recent changes to the EPSRC funding landscape and how this affects FEPS researchers. He will also advise on how researchers can influence the landscape and raise their profile within it.

The talk itself will be ca. 30 minutes, with ample opportunity for staff to ask questions and discuss specific issues thereafter.

Dividing objects into functional parts using planar cuts at convex-concave 3D surface transitions: From Alhazen's ideas around 1000 A.D. to a modern computer vision approach

Thursday 16 July 2015

14:00 to 15:00
Prof Florentin Wörgötter, Bernstein Center for Computational Neuroscience, Georg-August University Göttingen (Germany)

Civil Engineering Research Seminar - July 2015

Thursday 23 July 2015

13:00 to 14:00
Dr Rao Martand Singh

Putting Sustainability into Practice

Thursday 23 July 2015

13:00 to 14:00
Andre Loureiro Chaves, Associate Professor at Universidade Luterana do Brasil (ULBRA), Porto Alegre, Brazil

Guest Speaker:

 

 

 

 

 

 

DR ANDRE LOUREIRO CHAVES

Associate Professor at Universidade Luterana do Brasil (ULBRA), Porto Alegre, Brazil

Laws and Technologies - friends, foes and fictions

Tuesday 28 July 2015

6:00pm to 8:30pm
Dr Anna Vartapetiance, University of Surrey

Dr Anna Vartapetiance, a postdoctoral researcher of the Department and a Committee Member of the BCS ICT Ethics Specialist Group, will be presenting a talk on "Laws and Technologies - friends, foes and fictions" at the BCS headquarters, in collaboration with the BCS Law Specialist Group, on 28th July 2015.

Physics by the Lake

Sunday 2 August 2015

EPSRC UK Graduate Summer School in Condensed Matter Theory

The Road Ahead for Cars Around the World

Thursday 3 September 2015

13:00 to 14:00
Professor George Martin

Guest Speaker:

 

 

 

 

 

Professor George Martin

Citizen Security in the Caribbean

Friday 4 September 2015

14:00 to 15:00
Professor Anthony Clayton

Guest Speaker:

 

 

 

 

 

  

Professor Anthony Clayton

Tony has been one of our longest-serving Visiting Professors, and he has been working on many and different aspects of sustainability for Jamaica, adopting approaches that, over the years, combine clean technology, then long-range foresighting and planning and, of late, human rights approaches to security as a foundation for sustainable development. He has also been awarded a CD in the latest Jamaican honours list for his services to Sustainable Development in the region.

On Saliency and Human Detection From an Image

Friday 4 September 2015

14:00 to 15:00
Prof Seiji Ishikawa, Kyushu Institute of Technology (Japan)

Image processing applications of convolutional neural networks and random forests

Friday 11 September 2015

11:15 to 12:15
Professor Pavel Zemčík, Faculty of Information Technology (FIT), Brno University of Technology, Brno, Czech Republic

WSMS October Talk

Tuesday 6 October 2015

19:00 to 20:00
Dr Thomas Trevethan

Surrogate Model Assisted Evolutionary Algorithms for Medium Scale and Computationally Very Expensive Design Optimisation Problems with Applications

Wednesday 7 October 2015

14:00 to 15:00
Bo Liu, Lecturer, Department of Computing, Glyndwr University

Evolutionary algorithms (EAs) are attracting more and more attention in the design automation area because of their high optimisation ability, free from an initial design and generality. While promising results have been shown, the weakness of EAs is becoming clear: when the fitness function evaluation is time consuming, impractical optimisation time may be induced. Employing computationally cheap surrogate models in the optimisation process is shown to be an effective method to address this problem and intensive research has been carried out on surrogate model assisted evolutionary algorithms (SAEAs).

Although there are successful SAEAs for small-scale and reasonably expensive optimisation problems, challenges on scalability, expensiveness and multiple objectives are attracting much attention of SAEA researchers. This presentation will focus on two challenges from real-world applications: (1) When the number of design variables is around 20 to 40, how to maintain the large efficiency improvement as well as effective search of an SAEA? (2) When a single evaluation (simulation) needs from 40 minutes to several hours, how to perform effective optimisation in a practical timeframe by an SAEA?

The following topics will be included: (1) evolutionary algorithms and simulation-driven optimisation; (2) machine learning and surrogate modelling; (3) surrogate model assisted evolutionary algorithms: frameworks and model management methods; (4) surrogate model-aware search framework; (5) multi-fidelity surrogate model-aware search framework supported by data mining methods; (6) Applications in electronic design automation.  

On challenges of solving multiobjective optimization problems in practice - own experiences

Thursday 8 October 2015

14:00 to 15:00
Dr Jussi Hakanen, Department of Mathematical Information Technology, University of Jyväskylä, Finland

Many real-world optimization problems typically have multiple objective functions that need to be optimized simultaneously. Nowadays in many cases, due to e.g. advances in modelling of more complex phenomena, the evaluation of the objective and/or constraint functions is time consuming. Therefore, solving (multiobjective) optimization problems including such computationally costly functions may take too much time using basic methods that are not developed for such purposes. Other challenges in solving real-world multiobjective optimization problems include, for example, formulating the optimization problem properly, combining a simulator or modelling tool with the optimization software used, graphical user interface development for interacting with the decision maker who chooses the most preferred solution. In this presentation, I will discuss the challenges mentioned above based on my own experiences of working with multiobjective optimization for the past 10+ years.

Celebrating Alumni Success CEE Annual Lecture - Mike Putnam

Thursday 8 October 2015

17:00 to 20:00
Mike Putnam (CEO Skanska)

Keynote Talk: Professor Lynne Frostick

Wednesday 14 October 2015

14:00 to 15:00
Professor Lynne Frostick

Investing in Surrey's Natural Capital

Thursday 15 October 2015

13:00 to 14:00
Sarah Jane Chimbwandira

Guest Speaker:

Sarah Jane Chimbwandira

Sarah is the Director of the Surrey Nature Partnership and Biodiversity, Evidence & Policy department of Surrey Wildlife Trust.  She is a Member of the Chartered Institute for Ecology and Environmental Management (currently serving on the Advisory Forum) and sits on the Advisory Group of the Ecosystems Knowledge Network.

Telegraph UK STEM Awards 2016

Monday 19 October 2015

The STEM awards 2016 are an opportunity for undergraduate students to win £25,000 with a world changing idea.

Inspirational Physics 2015

Wednesday 21 October 2015

12.45pm to 4.00pm
Professor Jim Al-Khalili, University of Surrey

This event is aimed at Years 9-13 students who are interested in studying Physics.

For the third year running we will be hosting our Inspirational Physics lecture at the University of Surrey, featuring engaging talks from our own academics plus a special guest. 

Schedule


13:00 – 13:05 Welcome and Introduction

13:05 – 13:45 Dr Maggie Aderin-Pocock, “International Year of Light”

13:45 – 14:25 Professor Justin Read, “One Hundred Years of General Relativity”

14:25 – 14:50 Refreshment Break

14:50 – 15:20 Dr Elizabeth Cunningham, "Careers in Science: Nuclear Astrophysics"

15:20 – 16:00 Professor Jim Al-Khalili, "Time Travel in Einstein's Universe"

 

 

Please ensure that you book your place to ensure entry to this event. 

Implementing Green Infrastructure Workshop

Thursday 22 October 2015

13.15 to 17.00

Green Infrastructure offers multiple benefits including urban flood mitigation, water quality improvement and the provision of open space. However, many of these benefits are yet to be well understood or quantified. A team from North Carolina State University and the University of Surrey are investigating the benefits of green infrastructure and developing design standards for the wider engineering and regulatory communities. This workshop presents research findings from an ongoing initiative between the two universities focused on green infrastructure.

The workshop is free and open to anyone interested in green infrastructure, however, places are limited so please register in advance by contacting Dr Jonathan Chenoweth in the Centre for Environmental Strategy, University of Surrey on j.chenoweth@surrey.ac.uk

A surrogate-assisted reference vector guided evolutionary algorithm for many objective optimization problems

Thursday 22 October 2015

14:00 to 15:00
Tinkle Chugh, Department of Mathematical Information Technology, University of Jyväskylä, Finland

Evolutionary multiobjective optimization (EMO) algorithms are widely used for solving multiobjective optimization problems but are often criticized for their lack of convergence to optimal solutions and long computation time. For example, many engineering problems involve functions which take long computation time to be solved e.g. problems involving computational fluid dynamics simulations utilizing finite-element methods take substantial time to obtain one solution. In such cases, it is necessary to modify EMO algorithms to make them efficient for solving such problems. Several methods have been proposed in the literature to apply the approximation of the objective functions or using metamodel in an EMO algorithm. Most of these methods are used for 2-3 objective optimization problems. In the present work, we use metamodel or surrogate for many objective optimization problems. The proposed method is based on a recently proposed algorithm for many objective optimization problems known as reference vector guided evolutionary algorithm for many objective optimization (RVEA). Evolution control or model management is the very important factor while using surrogate in an EMO. For example, how to build surrogate, how to update surrogate and when to update to surrogate are the major issues while using surrogate. In the present work, we use Kriging for all objective functions and angle penalized distance (APD) and uncertainty information with the help of reference vectors to update it. The main advantage for using Kriging is that uncertainty information is also obtained for the predicted values which can be used to update the metamodels. The proposed surrogate-assisted RVEA was tested on multiobjective optimization problems with 3-10 objectives and free radical polymerization problem with four objectives. In addition, the performance of the method was also compared with state of the art surrogateassisted EMO methods.

The Future of Metallic Railway Bridges

Monday 2 November 2015

18:00 to 20:30
Dr Boulent Imam

Dr Boulent Imam of Surrey University will be presenting this talk.

Talk: David Collings

Tuesday 3 November 2015

16:00 to 17:00
David Collings

A Multiobjective Evolutionary Algorithm using Gaussian Process based Inverse Modeling

Thursday 5 November 2015

14:00 to 15:00
Ran Cheng, PhD Student, Department of Computer Science, University of Surrey

To approximate the Pareto front, most existing multiobjective evolutionary algorithms store the non-dominated solutions found so far in the population or in an external archive during the search. Such algorithms often require a high degree of diversity of the stored solutions and only a limited number of solutions can be achieved. By contrast, model-based algorithms can alleviate the requirement on solution diversity and in principle, as many solutions as needed can be generated. This paper proposes a new model-based method for representing and searching non-dominated solutions. The main idea is to construct Gaussian process based inverse models that map all found non-dominated solutions from the objective space to the decision space. These inverse models are then used to create offspring by sampling the objective space. To facilitate inverse modeling, the multivariate inverse function is decomposed into a group of univariate functions, where the number of inverse models is reduced using a random grouping technique. Extensive empirical simulations demonstrate that the proposed algorithm exhibits robust search performance on a variety of medium to high dimensional multiobjective optimization test problems. Additional non-dominated solutions are generated a posteriori using the constructed models to increase the density of solutions in the preferred regions at a low computational cost.

5th South East Mathematical Physics Seminars

Friday 6 November 2015

10:30 to 17:00

The Department of Mathematics at the University of Surrey is hosting the 5th Meeting of the South East Mathematical Physics Seminars on Friday 6 November 2015. This event is funded by the London Mathematical Society.  The local organisers are Andrea Prinsloo and Alessandro Torrielli. This meeting is aimed at bringing together mathematical and theoretical physicists in the south east of the UK.

Please visit the SEMPS5 webpage for further details.

Joint Object-Material Category Segmentation from Audio-Visual Cue; SemanticPaint: Interactive Segmentation and Learning of 3D Worlds

Monday 9 November 2015

11:00 to 12:00
Mr Anurag Arnab and Dr Michael Sapienza, University of Oxford

Evolutionary Design and Optimization

Tuesday 10 November 2015

15:00 to 16:00
Dr Kay Chen Tan, Associate Professor, Department of Electrical and Computer Engineering, National University of Singapore

Evolutionary design and optimization are widely found in many fields, such as logistics, economics, engineering, or whenever optimal decisions need to be made in the presence of trade-offs. The problem is challenging because it often involves the simultaneous optimization of several conflicting objectives in the Pareto optimal sense. This talk will provide an overview of evolutionary computation for multi-objective optimization (EMO). It will then present various applications of EMO for solving engineering problems particularly in the area of robust prognostic. As one of the key enablers of condition based maintenance, prognostic involves the core task of determining the remaining useful life (RUL) of the system. This talk will discuss the use of neural network ensembles to improve the prediction accuracy of RUL estimation as well as the use of EMO to optimize the ensemble hyper-parameters in order to achieve the trade-off between accuracy and diversity of deep neural networks as ensemble members. A case study involving the estimation of RUL for turbofan engines will also be presented in the talk.

Web Security: History, Horror and Hope

Wednesday 11 November 2015

15:00 to 16:00
Mr Mark Goodwin, Security Engineer, Mozilla

The web today is a large, complex platform. It is far removed from the intended purpose of many of the technologies it builds upon. Few building for the web today would hold it up as an example of things done right... Yet billions use it, many for tasks where security is important. This talk will attempt to answer some questions: Why is the web the way it is? What are some interesting problems in Web Security? Are there reasons to think things can get better?"

WSMS November Talk

Tuesday 17 November 2015

7pm to 8pm
Stephen Kyle-Henney

An overview of Crossrail 2 and its importance to London

Wednesday 18 November 2015

14:00 to 15:00
Speaker: Michèle Dix CBE – Managing Director of Crossrail 2

Michèle Dix, Managing Director of CrossRail 2 will be carrying out a talk giving an overview of the developments behind the project and its importance on London’s economy.
This talk is held as part of our new MSc Programme in Infrastructure Engineering and Management which is aimed at providing graduate engineers in-depth knowledge about specialised aspects on the planning, operation and management of infrastructure systems.

Civil Engineering Research Seminar - November 2015

Thursday 19 November 2015

13:00 to 14:00
Dr George S. Skouteris

Two-Arch2: An Improved Two-Archive Algorithm for Many-Objective Optimization

Thursday 19 November 2015

14:00 to 15:00
Dr. Handing Wang, Department of Computer Science, University of Surrey

Many-objective optimization problems (ManyOPs) refer, usually, to those multi-objective problems (MOPs) with more than three objectives. Their large numbers of objectives pose challenges to multi-objective evolutionary algorithms (MOEAs) in terms of convergence, diversity, and complexity. Most existing MOEAs can only perform well in one of those three aspects. In view of this, we aim to design a more balanced MOEA on ManyOPs in all three aspects at the same time. Among the existing MOEAs, the two-archive algorithm (Two_Arch) is a low-complexity algorithm with two archives focusing on convergence and diversity separately. Inspired by the idea of Two_Arch, we propose a significantly improved two-archive algorithm (i.e., Two_Arch2) for ManyOPs in this paper. In our Two_Arch2, we assign different selection principles (indicator-based and Pareto-based) to the two archives. In addition, we design a new Lp-norm-based (p<1) diversity maintenance scheme for ManyOPs in Two_Arch2. In order to evaluate the performance of Two_Arch2 on ManyOPs, we have compared it with several MOEAs on a wide range of benchmark problems with different numbers of objectives. The experimental results show that Two_Arch2 can cope with ManyOPs (up to 20 objectives) with satisfactory convergence, diversity, and complexity.

Fuzzy Cognitive Map Learning and Gene Regulatory Network Reconstruction

Thursday 26 November 2015

14:00 to 15:00
Prof Jing Liu, Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education, Xidian University, China

Fuzzy cognitive maps are a kind of modeling techniques used to model fuzzy causal relations among different concepts in the form of directed weighted graphs. Evolutionary algorithm are used to learn fuzzy cognitive maps automatically. Fuzzy cognitive maps are also used to model gene regulatory networks, and an evolution-based fuzzy cognitive map learning algorithm is used to reconstruct gene regulatory networks.

Rapid On-Line Detection of Spiking Neural Patterns

Thursday 3 December 2015

14:00 to 15:00
Dr Joseph Chrol-Cannon, Department of Computer Science, University of Surrey

The brains computations are known to be implemented biologically with precise temporal patterns of spiking neural activity. In order to understand and analyse how mental representations are formed in this way, a theory of spatio-temporal neural structure was put forward called Polychronization. This theory arose from the principles of Neural Darwinism and the Hebbian Synapse.

Polychronization is a powerful theory and methodology that is proven to have a far higher representational capacity than other forms of rate- and binary- coded neural network which are actively used in the area of machine learning. The main limitation of the utilization of Polychronization comes from the extreme computational complexity that is required to detect the existence and activation of these neural structures.

We introduce a new on-line algorithm that is integrated into the spiking neural simulation instead of running as a separate set of processes that must interrupt the simulation. There is negligible overhead added to the core simulation while all other computation previously required for such Polychronous pattern detection is simply removed. Hours of simulation time have been reduced literally to milliseconds.

Biomass as a Source of Low Carbon Solutions for the UK Bioeconomy

Thursday 3 December 2015

13:00 to 14:00
Professor Angela Karp FSB

Bioenergy is embedded in the future plans of governments as critical to achieving a low carbon future and to halting the increase in degree temperature rise associated with greenhouse gas emissions (GHG) from fossil fuels. Industrial biotechnology, clean energy, green chemistry and the renewable material sectors are also seen as emerging areas of rapid growth in the bioeconomy. This raises questions over whether or not sufficient biomass can be supplied in a sustainable way to meet the demands of all these potentially conflicting markets.

This talk will review how biomass can be produced sustainably from different crop feedstocks and then focus on the future role of woody biomass, particularly from short rotation coppice willows, as a source of energy, transport fuels and diverse bio-products. Production at different scales will be considered in relation to industrial and rural development opportunities.  

Self-control of inbreeding in natural honey bee populations

Friday 4 December 2015

14:00 to 15:00
Stanislaw Cebrat, Department of Genomics, Faculty of Biotechnology, Wroclaw University, Poland

In popular belief, the reproduction success of a pair is a monotonous positive function of the genetic distance between the two partners. It is not true. In many populations, including the populations of humans, there is an optimal genetic distance between individuals ensuring the highest reproduction success. Honey bee (Apis mellifera) reproduces in a very particular way. In a huge family only one female (diploid queen) can produce individuals of the next generation. In the same hive many male individuals (haploid drones) live. These males are usually sons of this queen and they cannot inseminate her. The queen is inseminated only once during her “wedding flight” when she can choose the males for copulation, controlling the inbreeding. There is one known gene - complementary sex determiner (csd) involved in the controlling process – which could be called gamete preselection. There is probably hundreds of versions of that gene in the world wide bee population and its new versions could be generated with high frequency. We suggest that the generation rate of new versions of csd and their recognition could be responsible for keeping the optimal level of inbreeding in natural honey bee populations. Bee keepers violate the natural way of gamete preselection lowering biodiversity of bee populations and making them more vulnerable for extinction.

Mobile Security Half-Day Workshop

Wednesday 9 December 2015

14:00 to 17:00
Prof N. Asokan, Alto University and University of Helsinki, Finland; Dr Athanasios Giannetsos, Lecturer in Secure Systems, University of Surrey; Mr Robert Brown, Market Solutions Director, Trustonic

This half-day workshop is a combination of three talks including two given by invited external speakers and one given by an academic of the Department.

  • 14:00-15:00 Talk 1: The Quest for Usable Security (speaker: Prof N. Asokan, Alto University and University of Helsinki, Finland)
  • 15:00-15:40 Talk 2:"My private life, Exposed" - Security and Privacy in Mobile Crowd Sensing (speaker: Dr Athanasios Giannetsos, Lecturer in Secure Systems, University of Surrey)
  • 15:40-16:00: Coffee break
  • 16:00-17:00 Talk 3: Introduction to Trusted Execution Environments (speaker: Mr Robert Brown, Market Solutions Director, Trustonic)

To register for the workshop, please go to https://www.eventbrite.co.uk/e/mobile-security-tickets-19673061657 and click "Register" link.

Systems Design at Honda Research Institute Europe

Thursday 10 December 2015

14:00 to 15:00
Dr Markus Olhofer, Complex Systems Optimisation and Analysis Group, Honda Research Institute Europe

Tools and methods from the field of computational intelligence are well established in industry in the design and development process of products. However the use is limited to selected applications and still a high potential for their utilisation do exist. Currently several changes related to topics like model based development, cloud computing and industry 4.0 can be observed which will make these methods not only more widespread but mandatory in the development process. These transitions in industry result also in new challenges and new requirements which have to be reflected in current research projects in the related field. In the talk some aspects of the changes in CAE methods and tools are discussed and an overview on research projects carried out at the Honda Research Institute will be given.

Voting with Transparent Verification and Coercion Mitigation

Monday 14 December 2015

15:30 to 16:30
Prof Peter Y A Ryan, University of Luxembourg

In conventional cryptographic E2E verification schemes, voters are provided with encrypted ballots that enable them to confirm that their vote is accurately included in the tally. Technically this is very appealing, but voters, election officials etc. need to understand some rather subtle arguments to appreciate the integrity and ballot secrecy guarantees provided by such mechanisms.

A simple way to achieve a degree of verifiability and ballot privacy is to provide each voter with a unique, private tracking number. Votes are posted on a bulletin board in the clear along with their tracking number. Thus voters can visit the WBB confirm that there is an entry with their tracking number showing the correct vote. The beauty of this approach is its simplicity and understandability. There are, however, two drawbacks: we must ensure that trackers are unique and a coercer can demand that the voter reveal her tracking number. It is interesting to note that the coercer must ask for the tracker before posting. If he asks after posting the voter has a simple strategy to fool him: just reads off a tracker number with the coercer's required vote from the WBB.

In this talk, I describe a scheme that addresses both of these problems. The main idea is to close off the coercer's window of opportunity by ensuring that the voters only learn their tracker numbers after votes have been posted. Notification of the trackers must provide high assurance but be deniable. The resulting scheme provides receipt-freeness but also provides a more immediately understandable form of verifiability: voters can find their vote, in the clear, in the tally identified by their secret tracker.

However, there is a sting in the tail: a coerced voter might light on the coercer's tracker, or the coercer may simply claim that the tracker is his. I describe some elaborations of the basic scheme to counter this problem.

More details about the talk can be found at http://eprint.iacr.org/2015/1105.pdf.

Combination of Evolutionary Algorithms with Experimental Design and Traditional Optimization

Monday 14 December 2015

14:00 to 15:00
Prof Qingfu Zhang, Department of Computer Science, City University of Hong Kong, Hong Kong and School of Computer Science and Electronic Engineering, University of Essex, UK

Evolutionary algorithms alone cannot solve optimization problems very efficiently since there are many random (not very rational) decisions in these algorithms. Combination of evolutionary algorithms and other techniques have been proven to be an efficient optimization methodology. In this talk, I will explain the basic ideas of our three algorithms along this line (1): Orthogonal genetic algorithm which treats crossover/mutation as an experimental design problem, and (2) Multiobjective evolutionary algorithm based on decomposition (MOEA/D) which uses decomposition techniques from traditional mathematical programming in multiobjective optimization evolutionary algorithm.

Modeling Neural Plasticity in Echo State Networks for Classification and Regression

Thursday 17 December 2015

15:00 to 16:00
Mr Hanif Yusoff, PhD Student, Department of Computer Science, University of Surrey

Echo state networks (ESNs) are one of two major neural network models belonging to the reservoir computing framework. Traditionally, only the weights connecting to the output neuron, termed read-out weights, are trained using a supervised learning algorithm, while the weights inside the reservoir of the ESN are randomly determined and remain unchanged during the training. In this paper, we investigate the influence of neural plasticity applied to the weights inside the reservoir on the learning performance of the ESN. We examine the influence of two plasticity rules, anti-Oja's learning rule and the Bienenstock-Cooper-Munro (BCM) learning rule on the prediction and classification performance when either offline or online supervised learning algorithms are employed for training the read-out connections. Empirical studies are conducted on two widely used classification tasks and two time series prediction problems. Our experimental results demonstrate that neural plasticity can more effectively enhance the learning performance when offline learning is applied. The results also indicate that the BCM rule outperforms the anti-Oja rule in improving the learning performance of the ENS in the offline learning mode.

Keynote Talk: Chris Weston

Monday 11 January 2016

18:00 to 20:00
Chris Weston

A Dynamic Optimization Approach to The Design of Cooperative Coevolutionary Algorithms

Thursday 14 January 2016

14:00 to 15:00
Dr Xingguang Peng, School of Marine Science and Technology, Northwestern Polytechnical University (NPU), China

Cooperative coevolutionary algorithm (CCEA) decomposes a problem into several subcomponents and optimizes them separately. This divide-and-conquer feature endow the CCEAs the capability of distributed and high-efficiency problem solving. However, traditional CCEAs trend to converge to Nash equilibrium rather than the global optimum due to information loss accompanied with problem decomposition. Moreover, the interactive nature makes the subcomponents' landscapes dynamic, which increases the challenge to for global optimization. To address these problems, this paper proposed a multi-population mechanism based CCEA (mCCEA) to compensate information in dynamic landscapes. The mCCEA is decentralized for each subcomponent since it doesn’t need centralized archive or information sharing. It focuses on both the global and the local optima of each subcomponent by maintaining multiple populations and conducting local search in dynamic landscapes. These optima are seen as the current representatives of the subcomponent and used by the other subcomponents to construct their complete solutions for fitness evaluation. Experimental study is conducted based on a wide range of benchmark functions. The performance of the proposed algorithm is compared with several peer algorithms from the literature. The experimental results show effectiveness and advantage of the proposed algorithm.

From Automatic Verification to Code Synthesis

Friday 22 January 2016

10:30 to 11:30
Prof Doron Peled, Department of Computer Science, Bar Ilan University, Israel

Model checking was suggested in the early 80s as an algorithmic method for comparison between a (model of a) system and its formal specification. Over the past 25 years, it has been gaining great success in finding errors in many projects of software development and hardware design, with companies such as Intel, IBM, Microsoft, NASA and many others using model checking techniques on a regular basis, and even developing related methods and tools of their own.

There are several competing approaches for model checking, based e.g. on graph algorithms and SAT solving.

The desire to construct correct-by-design systems rather than apply a loop of design-check-correct was raised already in some of the early works on model checking. However, only recently we are starting to see practical progress in software synthesis. In this lecture I will survey some of the milestones in developing and applying model checking and present some current approaches for the automatic synthesis of systems.

Research for Fun

Thursday 28 January 2016

14:00 to 15:00
Prof Yaochu Jin, Department of Computer Science, University of Surrey

This talk starts with an introduction of typical methodologies for performing innovative research. It then discusses various issues to be attended in preparing a manuscript and in responding to reviewers’ comments. The talk concludes with tips for how to get one’s publications cited.

How important is it to increase the sustainability of the supply chain in the UK construction industry?

Thursday 28 January 2016

13:00 to 14:00
Erica Russell

Speaker: Erica Russell

WSMS February Talk

Tuesday 2 February 2016

19:00 to 21:00
Dr Ahmed Shibli of European Technology Development Ltd

A Logical Approach for Automated Model Composition

Wednesday 3 February 2016

14:00 to 15:00
Dr Juliana Bowles, Department of Computer Science, University of St Andrews

As modern systems become more complex, design approaches commonly model different aspects of the system separately. These need to be brought together in order to obtain a better understanding of the system, check for inconsistencies, and so on. We have developed an automated approach which focuses on the composition of (static or behavioural) design models (with a well-defined metamodel) via constraint solvers. We generate a number of logical constraints characterising different models and use an automated solver to find a solution (if existing) that produces the composed model. This is done in two steps. First, we obtain the logical constraints that uniquely characterise a model by restricting the corresponding metamodel. Second, we add behavioural constraints for the intended composition (for instance, indicating how elements from both models may be matched,  orderings that may have to be preserved, and so on). The augmented model for the composition (if existing) needs to satisfy the conjunction of all these constraints. The composed model is semantically equivalent to one obtained by an enriched form of parallel composition with synchronisation and additional constraints on permitted combined behaviour. The automatic generation of such a solution is the main novelty and contribution of the approach. We will discuss how the approach is in fact applicable to a much wider context and other domains.

The AudioCommons Initiative and the technologies for facilitating the reuse of open audio content

Monday 8 February 2016

15:00 to 16:00
Dr Xavier Serra and Dr Frederic Font, Universitat Pompeu Fabra, Barcelona

Keynote Talk: Andrew Wolstenholme

Wednesday 10 February 2016

12:00 to 13:00
Andrew Wolstenholme

Crossrail’s Chief Executive, Andrew Wolstenholme, will deliver a guest lecture about Europe’s largest infrastructure project.  Andrew will talk about how complex infrastructure projects like Crossrail are planned, initiated and delivered and the wider benefits that investment in economic infrastructure delivers. 

Debt, Growth and Sustainability

Thursday 11 February 2016

13:00 to 14:00
Adair Turner

Joint CUSP / CES seminar given by:

Adair Turner, Chairman of the Institute for New Economic Thinking

Real Time Optimization of Chemical Process

Thursday 11 February 2016

14:00 to 15:00
Prof Xuhua Shi, Department of Electrical Automatic Control, Faculty of Electrical Engineering and Computer Science, Ningbo University, China

In recent days, aiming at the necessity of reducing costs, maximizing profits, and efficient operations, chemical process optimization has gained tremendous attention in both research and industrial applications. Because of the highly complex and integrated nature of chemical processes, it is really challenging to model the large-scale chemical systems and optimize the operation processes effectively.

Here are the outline of the talk:

  • What is real-time optimization
    • Optimal plant operation
    • Steady-state optimization, Dynamic-state optimization
    • Key issues: how to best exploit measurements, how to optimize
  • Real-time optimization framework
    • Three optimization frameworks
    • Experimental case studies
    • Distillation modeling
    • Distillation Resource optimization
    • Crude oil distillation operational optimization
  • Challenges and opportunities

The Neutron Dripline from the Outside

Tuesday 16 February 2016

2:00pm
Miguel Marques (LPC Caen, France)

The Radioactive Isotope Beam Factory (RIBF) at RIKEN, Tokyo, has become the world's most powerful machine for the production of exotic nuclei.

Com-Note: Designing a composer’s notebook for collaborative music composition

Wednesday 17 February 2016

14:00 to 15:00
Professor David Frohlich, University of Surrey

Civil Engineering Research Seminar - February 2016

Thursday 18 February 2016

13:00 to 14:00
Mr Friday Ekuje

Qinetiq: drop-in sessions to meet the employer

Friday 19 February 2016

10am to 4pm

CGI Group – CV writing skills

Monday 22 February 2016

6.00pm

Careers in the Space industry – employer panel

Tuesday 23 February 2016

1.00pm

All Welcome

Lighthouse Systems: drop-in sessions to meet the employer

Tuesday 23 February 2016

12.00pm to 2.00pm

Careers in the space industry

Tuesday 23 February 2016

1pm to 2pm

CGI Inc (Space Group): Peter Van Zetten and Andy Reynolds

Satellite Applications Catapult: Dr Chris Brunskill

Surrey Satellite Technology: Dr Peter Shaw (Surrey alumnus)

Come and find out about career options for physicists/other STEM students in the space sector

Transverse wobbling and new chiral modes in lanthanide nuclei

Tuesday 23 February 2016

2:00pm
C. M. Petrache (Centre de Sciences Nucléaires et Sciences de la Matière, CNRS/IN2P3, Université Paris-Saclay)

The wobbling motion and the chiral symmetry breaking are unique fingerprints of triaxiality in nuclei and have been intensively studied in recent years.

Gravitational Waves: A new window on the cosmos

Wednesday 24 February 2016

3:30pm

A new window on the cosmos talks

Wednesday 24 February 2016

4:00pm

Gravitational Waves: A new window on the cosmos

Dense 2D Tracking, 3D Reconstruction and Modelling of Non-rigid Objects with Variational Methods

Thursday 25 February 2016

14:30 to 15:30
Dr Anastasios Roussos, Imperial College London

Government Operational Research Service – Careers evening

Thursday 25 February 2016

IoP Event (finalists/PGR)

Network-based Supervised Learning

Thursday 25 February 2016

14:00 to 15:00
Mr Murillo Carneiro, Faculty of Computing, Federal University of Uberlândia, Brazil

Complex networks have become one of the major research themes in complex systems and have been employed in a wide range of problems in many distinct fields of research. Their ability to detect spatial, topological and functional relations of the data is one of their most important characteristic. In the context of machine learning, complex networks have been widely applied to unsupervised and semi-supervised learning tasks. In the former, the techniques usually try to exploit functional and topological features of the network, by using for example the well-known modularity measure, to detect communities (or clusters). In the latter, the idea is to exploit some label or other information propagation process in the network to classify the unlabeled data. Despite complex networks have been barely explored in supervised learning, some network-based techniques have been designed recently and their results really bring interesting features for supervised learning tasks. In the talk, some of these techniques, such as the highlevel classification and the graph embedding dimension reduction framework, are discussed and an overview on network-based learning will be given.

Babcock: drop-in sessions to meet the employer

Friday 26 February 2016

10:00am to 4:00pm

Teaching Physics as a graduate & postgrad

Tuesday 1 March 2016

12:30pm to 2:00pm

Postgrad talk: 12:30pm

Undergrad talk: 1:00pm - 2:00pm

Ab Initio Structure and Reactions of Light Nuclei

Tuesday 1 March 2016

2:00pm
Guillaume Hupin (CEA, DAM, DIF, F-91297 Arpajon, France; Institut de Physique Nucl´eaire, Universit´e Paris-Sud, IN2P3/CNRS, F-91406 Orsay Cedex, France; Lawrence Livermore National Laboratory, P.O. Box 808, L-414, Livermore, California 94551, USA)

Advances in the fundamental description of the interaction among nucleons in many-body techniques and in scientific computing have opened new avenues for modeling low-energy light-ion structure and reactions on an equal footing.

Image-based Analysis and Synthesis of Static and Deformable Objects

Thursday 3 March 2016

15:00 to 16:30
Professor Peter Eisert, Heinrich Hertz Institute, Berlin

Beta-¬‐delayed neutron spectroscopy with trapped fission products

Monday 7 March 2016

2:00pm
Agnieszka Czeszumska (Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, California 94550, USA, Department of Nuclear Engineering, University of California, Berkeley, California 94720, USA)

For  decays  where  β−  decay  populates  excitation  energies  above  the  neutron  separation  energy,  the  daughter  nucleus  may  de-¬‐excite  by  emitting  a  neutron,  a  process  referred  to  as  β-¬‐delayed  neutron  emission  (βn).  

Using your physics degree outside the lab – Page White & Farrer

Tuesday 8 March 2016

1:00pm

Patent Attorney/IP talk finalists/PGRs.

Nucleosynthesis beyond Fe and related nuclear uncertainties

Tuesday 8 March 2016

2:00pm
Thomas Rauscher (Basel)

Details TBC

Decomposition of optical-flow features using Hilbert-Huang transform for unusual motion detection

Thursday 10 March 2016

14:00 to 15:00
Dr Moacir Ponti, University of Sao Paulo, Brazil

Surrogate-assisted Cooperative Swarm Optimization for High-dimensional Expensive Problems

Thursday 10 March 2016

14:00 to 15:00
Dr Chaoli Sun, Department of Computer Science, University of Surrey

Surrogate models provide an efficient means to assist meta-heuristic algorithms for solving the complex optimization problems which are time consuming. In this talk, surrogate-assisted cooperative swarm optimization, called SA-COSO, is introduced, in which a particle swarm optimization (PSO) algorithm and a social learning based particle swarm optimization (SL-PSO) algorithm cooperatively search for the global optimum assisted by fitness estimation strategy and a surrogate, respectively. The surrogate, a radial-basis-function (RBF) network, is utilized to learn the global profile of the fitness landscape, which aims to assist the SL-PSO to find the region where the optimal solution is located. Meanwhile, a fitness estimation strategy (FES) is proposed to approximate the fitness value of the particles in the PSO. These two algorithms work together to find the optimal solution of expensive high dimensional optimization. In addition, the surrogate-assisted SL-PSO and FES-assisted PSO exchange information between them by sharing some positional information which are evaluated using the real objective function. Empirical study on six 50-dimensional and six 100-dimensional benchmark problems demonstrates the proposed algorithm is able to final high-quality solutions on a limited computational budget.

Keynote Talk: Dr R Kerry Rowe

Monday 14 March 2016

11:00 to 12:00
DR R Kerry Rowe

Human Factors in Cyber Security Half-Day Workshop

Wednesday 16 March 2016

14:00 to 17:00
Dr Mirco Musolesi, Reader in Data Science, Department of Geography, UCL; Dr Shujun Li, Senior Lecturer of Department of Computer Science and Deputy Director of Surrey Centre for Cyber Security, University of Surrey; Dr Gianluca Stringhini, Lecturer, Department of Computer Science and Department of Security and Crime Science, UCL

This half-day workshop is a combination of three talks including two given by invited external speakers from UCL and one given by an academic of the Department.

  • 14:00-15:00 Talk 1: Privacy and the City: Identity and Identification in the Smartphone Era (speaker: Dr Mirco Musolesi, Reader in Data Science, Department of Geography, UCL)
  • 15:00-15:40 Talk 2: Observer-Resistant Password Systems: How hard to make them both usable and secure? (speaker: Dr Shujun Li, Senior Lecturer of Department of Computer Science and Deputy Director of Surrey Centre for Cyber Security, University of Surrey)
  • 15:40-16:00: Coffee break
  • 16:00-17:00 Talk 3: Following the Trail of Cybercriminal Operations (speaker: Dr Gianluca Stringhini, Lecturer, Department of Computer Science and Department of Security and Crime Science, UCL)

Gamma rays: imaging the invisible

Wednesday 16 March 2016

19:00 to 20:00
Laura Harkness-Brennan

Climate Change Arcadis Conference

Wednesday 16 March 2016

12:15 to 17:00

CONFERENCE SUMMARY:


In response to the changing climate Arcadis is hosting an afternoon of seminars and debate focused on the increasing pressures faced by infrastructure
and development. Climate Change Arcadis is a new event which will bring together key stakeholders from academia, local authority, developers and infrastructure providers in order to highlight current issues and constraints and how these can be best addressed.
The afternoon will highlight the effects of climate change and draw on expertise and experience both internationally and domestically in order to inform on current issues, approaches and best practice.

Department of Physics PhD Fair

Friday 18 March 2016

11am to 2pm

All Undergraduate and Masters students are invited to the Physics PhD Fair

COMMANDO-HUMANS project public event

Tuesday 12 April 2016

13:00 to 15:30
See the agenda

The COMMANDO-HUMANS project, a new Singapore-UK research project on "COMputational Modelling and Automatic Non-intrusive Detection Of HUMan behAviour based iNSecurity" jointly funded by UK's EPSRC and Singapore's National Research Foundation (NRF), will see its official kick-off meeting from 11th to 12th April at Surrey. On the second day (12th), there will be a public event of the project kick-off meeting, for which the project team would like to invite participation of people who are interested in human factors in cyber security, human behaviour modelling, and human-computer interface. The public event will have a number of short talks given by the COMMANDO-HUMANS project team members from Surrey, Singapore, Australia and Croatia, by a visitor from University of Southampton's Agents, Interaction and Complexity (AIC) Research Group, and by several local Surrey academics. After the short talks, there will be an interactive open session for discussing potential collaborations among participants not limited to research topics around the COMMANDO-HUMANS project.

Protecting Personal Data (notably healthcare data) with User-Managed Access

Wednesday 13 April 2016

14:00 to 15:00
Dr Maciej Machulak, Chief Identity Architect, Synergetics

The amount of personal information stored in online systems is increasing. Such information is distributed and is often duplicated, incomplete or out-dated, and cannot be shared selectively by end-users. Personal Data Stores, where users input data once and use it many times with other parties, address the problem of managing distributed information. These systems, however, require authorisation to allow secure data sharing. User-Managed Access (UMA), a standardisation effort incubated at Kantara Initiative, is a new approach to access control. It allows end-users to share online data selectively. Users can easily determine what information will be revealed to which parties, or enforce how such data will be handled. In this talk, we discuss UMA and explain how it builds on OAuth 2.0, OpenID Connect and other Web standards. We will show an UMA Authorisation Server as well as UMA-enabled applications. We will also focus on the use of UMA in healthcare applications and how it supports individual users with management of their health-related data.

Balance Convergence and Diversity in Evolutionary Multi-Objective Optimisation

Wednesday 13 April 2016

10:00 to 11:00
Dr Ke Li, Centre of Excellence for Research in Computational Intelligence and Applications (CERCIA), University of Birmingham

Convergence and diversity are two cornerstones of evolutionary multi-objective optimization. The former means to approach the Pareto-optimal front as close as possible, while the latter one means to make the spread of Pareto-optimal solutions as uniform as possible. A well balance between convergence and diversity can provide decision makers more useful alternatives at the end. The balance between convergence and diversity can be achieved either through the selection procedure or reproduction operator. In this talk, I will introduce my recent work on how to achieve this balance by designing a selection mechanism based on stable matching and an adaptive reproduction operator based on multi-armed bandits.

Site visit to RSCH Medical Physics dept (Mammography & Physics)

Wednesday 20 April 2016

1:30pm to 3:00pm

Depart 1:00pm for 1:30pm start

Front Line Digital Forensics in the Police

Thursday 21 April 2016

9:00 to 11:00
Matt Gamble, DC, Digital Forensics Team, Surrey Police

This 2-hour long talk is part of the COMM046 module on Multimedia Security and Digital Forensics (which is part of the Department's MSc in Information Security programme). The speaker will describe how front line digital forensics is conducted at Surrey Police's Digital Forensics Team.

Creating and exploiting data-driven human body models

Friday 22 April 2016

11:00 to 12:00
Dr Javier Romero, Max Planck Institute for Intelligent Systems, Tübingen (Germany)

Improving Cyber Security Competence and Readiness: Malaysia case study

Friday 22 April 2016

15:00 to 16:00
Mohd Zabri Adil Bin Talib, CyberSecurity Malaysia

The speaker will speak about CyberSecurity Malaysia experience in securing Malaysia cyber space since 1997 until to the current state of cyber security landscape.

In the next 5 years, CyberSecurity Malaysia intends to go deep into cyber security domain through applied research. This includes:

  1. Implementing total cyber security solution in Governance sector, Financial sector and Health sector.
  2. Providing in-house technology to assist law enforcement agencies combating crime
  3. Nurturing the science knowledge of digital forensics in cyber security industry
  4. Producing new cyber security talents in local universities.

The speaker will share the method to achieve all the above points within 5 years time.

Localization and Enhancement of Speech in Reverberant Environments

Tuesday 26 April 2016

14:00 to 15:00
Dr Jesper Rindom Jensen, Aalborg University (Denmark)

Workshop: Introduction to Bid Writing

Wednesday 27 April 2016

9:30am to 1pm
Alison Ray (RES), Carol Spencely and Alison Yeung (Researcher Development), Steve Schneider (FEPS ADR, Introduction) and other FEPS academic staff

TALK by Steve Harridge on mechanised methods for building concrete bridges

Wednesday 27 April 2016

12:00 to 13:00
Steve Harridge

Brian Cox meets....Jim Al-Khalili

Thursday 28 April 2016

7:30pm (Doors open at 6:30pm)

Join us as the tables are turned, and University of Surrey Science Physics Professor and Radio 4 Life Scientific presenter Jim Al-Khalili is interviewed by Professor Brian Cox, OBE.

Tickets have now sold out.

Keynote Talk: Tim Chapman

Thursday 28 April 2016

4:00pm to 5:00pm

Digital Forensics in the Industry

Thursday 28 April 2016

9:00 to 11:00
Gavin Holt, Security Consultant, NCC Group

This 2-hour long talk is part of the COMM046 module on Multimedia Security and Digital Forensics (which is part of the Department's MSc in Information Security programme). The speaker will describe how digital forensics is used in the industrial context (pentesting and cyber security in this case).

Morphogenetic Self-organizing Collective Movement for Minimalist Swarm Robotic Systems

Thursday 5 May 2016

14:00 to 15:00
Mr Ataollah Ramezan Shirazi, PhD Student, Department of Computer Science, University of Surrey

In this research, we present a morphogenetic approach to self-organized collective movement of a swarm. We assume that the robots (agents) do not have global knowledge of the environment and can communicate only locally with other robots.  In addition, we assume that the robots are not able to perform directional sensing. To self-organize such systems, we adopt here a simplified diffusion mechanism inspired from biological morphogenesis. A guidance mechanism is proposed based on the history of morphogen concentrations. The division of labor is achieved by type differentiation to allocate different tasks to different type of robots. Simulations are run to show the efficiency of the proposed algorithm. The robustness of the algorithm is demonstrated by introducing an obstacle into the environment and removing a subset of robots from the swarm.

CCFE Open day

Saturday 7 May 2016

AM and PM slots 

Transit of Mercury

Monday 9 May 2016

12:00 to 20:00

On the 9th of May Mercury passes between us and the Sun. We can all witness this exciting transit using our telescopes on campus at Surrey University.

Keynote Talk: Professor Eddie Bromhead

Monday 9 May 2016

18:00 to 20:00
Professor Eddie Bromhead

WSMS May Talk

Tuesday 10 May 2016

7:00pm to 8:00pm
Dr Valeska Ting

Careers & Employability Fair (Careers Service)

Wednesday 11 May 2016

11:00am to 2:30pm

Light tags - An experiment in augmented paper

Wednesday 11 May 2016

14:00 to 15:00
Dr Radu Sporea, Advanced Technology Institute, University of Surrey

Keynote Talk: Sir David Higgins

Wednesday 11 May 2016

12:00 to 13:00
Sir David Higgins

Open discussion with Oracle in MSc course on Database Systems

Thursday 12 May 2016

16:00 to 17:30
John Abel, Engineered Systems and Public Technology Cloud Leader, ORACLE Corporation UK Ltd

Oracle, one of the key players in the database systems arena, are coming to Surrey to talk to postgraduate and final year students in the Department of Computer Science and give a global landscape overview of how they think IT and Technology is changing. The event is within the context of the MSc module on Database Systems (COMM051) which looks at data science and business intelligence, taught by Dr Sotiris Moschoyiannis, but anyone is welcome if they have an interest.

Gravitational Waves: A new window on the cosmos

Thursday 12 May 2016

Talks begin at 6.30pm. Doors open at 6.00pm

Fully Booked.

Gravitational Waves have finally been discovered! To celebrate this tremendous achievement, we will give a series of short talks explaining the discovery.

NPL Open House

Tuesday 17 May 2016

2pm to 8pm

The Future of Sound Reproduction: Getting Personal

Wednesday 18 May 2016

16.00 to 18.00
Dr Philip Coleman

Professor Adrian Hilton and Dr David Carey invite you to come and celebrate the Department of Electrical and Electronic Engineering's research at a lecture to be given by the winner of the Industrial Advisory Board Departmental Prize for Excellence in Research 2015, Dr Philip Coleman.

The Chairman of the Department Industrial Advisory Board, Professor Chris Firth, Thales Research, will present the prize to Dr Coleman at this event. Drinks and nibbles will follow in the lower lecture theatre concourse.

TALK by Steve Harridge ways of lifting and sliding heavy structures around a site

Wednesday 18 May 2016

12:00 to 13:00
Steve Harridge

The Key to Quantum Technologies: Being in Two Places at Once

Wednesday 18 May 2016

17:15 to 18:15
Professor Ben Murdin

The Rise and Rise of the Climate Change Novel

Thursday 19 May 2016

13:00 to 14:00
Dr Adeline Johns-Putra

In the last ten years, climate change has emerged as a dominant theme in literature.  Its popularity in fiction has given rise to the term cli-fi, or climate change fiction, and speculation that this constitutes a distinctive literary genre. There have been similar, though not as remarkable, trends in theatre and poetry. I discuss some of the background to the emergence of climate change fiction, summarise some of its dominant themes, narrative arcs, and motifs, and speculate on its relationship to public responses to climate change.

The Nature of Prosperity

Monday 23 May 2016

14.30 to 18.30

Object perception through tactile images

Wednesday 1 June 2016

11:00 to 12:00
Dr Shan Luo, King's College London

Connecting Industry and Researchers in Physics

Thursday 9 June 2016

17:00 to 20:00

SEPnet’s Graduate Network (GRADnet) is organising its 5th networking evening to facilitate greater collaboration and links between industry, postgraduate research students (PGRs) and researchers. Approximately 60 employer representatives, PhD students and researchers will attend this event.

Modelling Moisture Migration in Manufactured Ice Cream Cones

Thursday 9 June 2016

13:00 to 14:00
Paschalia Mavrou

SMALL-SCALE ANAEROBIC DIGESTER IN THE UK

Thursday 16 June 2016

13:00 to 14:00
George Trowbridge

Stormwater and Air Quality Impacts of a Green Street Retrofit in Fayetteville, NC

Tuesday 21 June 2016

13:00 to 14:00
Katy Conroy

Bio: Katy is a PhD student in the Biological and Agricultural Engineering Department at North Carolina State University. She is part of the Stormwater Engineering Group that studies green infrastructure and stormwater control measures led by Dr. William F. Hunt. Katy is at the University of Surrey for one month working with Dr. Prashant Kumar in the Civil and Environmental Engineering Department to look at the impacts of green infrastructure on particulate matter in the atmosphere. This research collaboration is funded by the University Global Partnership Network (UPGN).

The modelling of coupled fluid and granular flow

Wednesday 22 June 2016

12:00 to 13:00
Dr Yansong Shen

Speaker Bio:
Dr Yansong Shen is a Senior Lecturer in School of Chemical Engineering at University of New South Wales (UNSW). He obtained his BEng and MEng degrees in Northeastern University (China) and PhD degree in UNSW. His research interests include process modelling and simulation and its applications in the areas of process metallurgy, coal preparation and utilization, biomass conversion, and renewable energy reactor designs. He published over 40 journal papers in the field of process engineering with H-index 14 as of 2015, secured 5 ARC grants since 2012 as lead CI or co-CI, established industry engagements in Australia and overseas, and won several honours/fellowships e.g. ARC APDI Fellowship and ATSE Emerging Future Leaders in Low Emissions Coal Technology Fellowship. He is member of Chartered IChemE, TMS, AIST, and invited/plenary speakers in several international conferences.

A modified teaching-learning-based optimisation algorithm for bi-objective re-entrant hybrid flowshop scheduling

Wednesday 22 June 2016

14:00 to 15:00
Ms Jingnan Shen, PhD Student, Department of Automation, Tsinghua University, China

The flowshop scheduling problem (FSP) is widely studied due to its practical importance in the manufacturing systems. In this paper, a modified teaching–learning-based optimisation (mTLBO) algorithm is proposed to solve a special case of the FSP, which is called the re-entrant hybrid flowshop scheduling problem (RHFSP) with the makespan and the total tardiness criteria. Based on the simple job-based representation, a novel decoding method named equivalent due date-based permutation schedule is proposed to transfer an individual to a feasible schedule. At each generation, a number of superior individuals are selected as the teachers by the Pareto-based ranking phase. To enhance the exploitation ability in the promising area, the insertion-based local search is embedded in the search framework as the training phase for the TLBO. Due to the characteristics of the permutation-based discrete optimisation, the linear order crossover operator and the swap operator are adopted to imitate the interactions among the individuals in both the teaching phase and the learning phase. To store the non-dominated solutions explored during the search process, an external archive is used and updated when necessary. The influence of the parameter setting on the mTLBO in solving the RHFSP is investigated, and numerical tests with some benchmarking instances are carried out. The comparative results show that the proposed mTLBO outperforms the existing algorithms significantly.

FEPS Festival of Research: 'From Theory into Practice'

Tuesday 28 June 2016

09.15 to 16.00
Professor Muffy Calder OBE and Professor G.Q. Max Lu

University of Surrey staff are invited to join us for the Faculty of Engineering and Physical Sciences' first 'Festival of Research'. The day will provide a platform to showcase our excellent research and an opportunity to foster new internal collaborations. 

The day will involve a number of presentations, panel discussions and exhibitions across all departments as well as a Three Minute Research competition! We are delighted to open the event with a talk from our new Vice-Chancellor, world-renowned academic and engineer, Professor G. Q. Max Lu.

The Annual Roland Clift Lecture Series On Industrial Ecology and CES Showcase

Wednesday 29 June 2016

19:00 to 17:00
Jacqueline Cramer, Professor in Sustainable Innovation at Utrecht University

International Partnership Space Programme workshop

Thursday 30 June 2016

9:00 to 17:00

Nanotechnology for a Sustainable and Eco-Friendly Future

Thursday 21 July 2016

13:00 to 14:00
Professor Mustafa Abbas Mustafa

One of the main technological limitations to the advancement of sustainable and eco-friendly solutions is the advancement in materials. However, things are changing really fast nowadays with nanotechnology influencing our future in a leap which is only matched by science fiction movies. Current research, in some of the areas applicable in developing countries such as catalysis, energy and water treatment, is presented.

Modelling and designing concrete 3D D-Regions

Thursday 21 July 2016

13:00 to 14:00
Mr Carlos Melendez

The Theory of Multi-Sensor Image Fusion and Its Applications

Friday 22 July 2016

11:00 to 12:00
Dr Xiaoqing Luo, Jiangnan University

Camera Calibration and Tracking in Industrial Applications

Friday 12 August 2016

11:00 to 12:00
Dr Markus Michaelis, Signum Bildtechnik, Munich (Germany)

Civil Engineering Research Seminar - August 2016

Thursday 18 August 2016

13:00 to 14:00
Mr. Guilherme Martins Pereira

Size–segregated particulate matter inside elderly residences in São Paulo

Thursday 1 September 2016

13:00 to 14:00
Ms. Bruna Segalin

Celebrating Alumni Success - 2016 Civil Engineering Anniversary Lecture

Thursday 13 October 2016

18:30 to 21:00
Dr Ian Collins

We are delighted to welcome Dr Ian Collins, CEO of Novum Structures, back to Surrey as we celebrate the 50th anniversary of the signing of the University's Charter and that of our MSc in Structural Engineering. 

BAMC 2017 to be hosted at Surrey

Monday 10 April 2017

The 2017 British Applied Mathematics Colloquium will be hosted by the Department of Mathematics at Surrey. It will be held around Easter time in 2017. The chair of the organising committee is Peter Hydon, the secretary is David Lloyd, and the treasurer is Anne Skeldon. A key aim of the programme is to encourage applied mathematicians to cross disciplinary boundaries

Page Owner: th0011
Page Created: Wednesday 15 July 2009 10:49:41 by lb0014
Last Modified: Wednesday 16 March 2016 09:30:49 by jg0036
Expiry Date: Friday 15 October 2010 10:48:33
Assembly date: Fri Aug 26 16:58:20 BST 2016
Content ID: 9749
Revision: 25
Community: 1056

Rhythmyx folder: //Sites/surrey.ac.uk/FEPS/news/events
Content type: rx:EventCalendar