Events

Forthcoming events for the Faculty and all Departments are shown below. You may also wish to view Faculty only events or Departmental only events.

Learning and Teaching Lunchtime Seminar

Thursday 17 May 2012

1pm to 2pm
Kevin Wells, Andy Adcroft

FEPS Learning and Teaching seminars showcase some of the excellent teaching activity in the Faculty, as well as in expertise from outside to provide examples of best practice.

Lecture: Human Powered Flight

Tuesday 12 March 2013

19:30
Br Bill Brooks (Chairman, RAeS Human-powered flight group)

This lecture will trace the history and development of human-powered flight over the past 40 to 50 years and explain the technical advances that have made it possible.  

The Development of 'Chevron' Nozzles for Aeroengines

Tuesday 26 March 2013

14:00 to 15:00
Mr Craig Mead, Director at Aero Acoustics Ltd

Chevron nozzles are noise reduction devices for aeroengines, as perhaps most noticeably used on the Boeing 787. The development of these devices will be presented with the aim of illustrating the path of development of a new low-noise technology for an aeroengine and to show the on-going value of experimental R&D in an increasingly computational field.

Energy Storage Materials and Supercapacitors

Thursday 25 July 2013

10:00 to 16:00

This one-day workshop will focus on recent developments in the FP7 AUTOSUPERCAP project on energy storage materials for supercapacitors in automotive applications and will also include an overview of related work at the University of Surrey on nanomaterials and within the EPSRC SUPERGEN Consortium. There will also be a presentation on the European Energy Research Alliance (EERA).

You can register for the event and purchase tickets using the Surrey Store.

Opening of the new Engineering Design Centre

Monday 18 November 2013

15:00

On Monday 18th November, the Mechanical Engineering Sciences Department announces the opening of the new Engineering Design Centre. 

The opening will showcase the recent £500,000 investment in facilties and equipment by the University.  The Centre will be used for teaching and support for undergraduate design, advanced projects and provides an exciting new space for the Formula Student racing team.  The Centre will be opened by IMechE CEO Stephen Tetlow MBE FIMechE CEng.

The afternoon, which will start at 3pm in room 24 BA 02 (Surrey Space Centre), includes an opening talk from the Department of Mechanical Engineering Sciences, followed by the official opening at the Design Centre and an open exhibition with the opportunity to talk to staff and students.

UK Space - Past, Present and Future

Wednesday 20 November 2013

19:30
Abigail Hutty, Structures Engineer (Astrium Ltd)

This lecture is presented by the IMechE Thameswey Region Farnborough and Guildford Area, jointly with the RAeS Weybridge Branch.

Investing Sustainably - can it really make a difference?

Thursday 9 January 2014

13.00 hrs to 14.00 hrs
Dr Peter Michaelis, A former doctoral student in CES and now Head of Sustainable and Responsible Investment (SRI) at Alliance Trust - looks back on his fourteen years experience in SRI

As individuals our influence on the economy is generally thought to be limited to our spending habits. What is overlooked is the influence we have as investors: it is our pensions and life cover plans which own large percentages of the companies which dominate our economies. We have just as much choice in where we invest as in where we shop. So should those of us wanting to create a more sustainable economy, care more about where we invest?

Eavesdropping near field contactless payments: A quantitative analysis

Tuesday 14 January 2014

15:00 to 16:00
Thomas Diakos, PhD Student, University of Surrey

We present a quantitative assessment in terms of frame error rates for the success of an eavesdropping attack on a contactless transaction using easily concealable antennas and low cost electronics. An inductive loop, similar in size to those found in mobile devices equipped with NFC capabilities, was used to emulate an ISO 14443 transmission. For eavesdropping we used an identical loop antenna as well as a modified shopping trolley. Synchronisation and frame recovery were implemented in software. As a principal result of our experiments we present the FER achieved over a range of eavesdropping distances, up to 1m, at different magnetic field strengths within the range specified by the ISO 14443 standard.

Spatio-temporal video segmentation with shape growth or shrinkage constraint

Wednesday 15 January 2014

15:30 to 16:30
Dr Yuliya Tarabalka, INRIA Sophia-Antipolis Méditerranée, Sophia Antipolis (France)

Civil Engineering Research Seminar - January 2014

Thursday 16 January 2014

13:00 to 14:00
Pam Billy Fom

A Novel Image Restoration Scheme Based on Structured Side Information in Digital Watermarking Systems

Monday 20 January 2014

11:00 to 12:00
Hui Wang, PhD Student, University of Surrey

In this talk the speaker will present a new image restoration method based on a linear optimization model which restores part of the image from structured side information (SSI). The SSI can be transmitted to the receiver or embedded into the image itself by digital watermarking technique. In this talk the main focus is a special type of SSI for digital watermarking where the SSI is composed of mean values of 4x4 image blocks which can be used to restore manipulated blocks. Different from existing image restoration methods for similar types of SSI, the proposed method minimizes image discontinuity according to a relaxed definition of smoothness based on a 3x3 averaging filter of four adjacent pixel value differences, and the objective function of the optimization model has a second regularization term corresponding to a 2nd-order smoothness criterion. Experiments showed that when the proposed image restoration method is applied to the target self-restoration watermarking scheme, the average visual quality of 100 recovered images is improved by around 2dB measured in Peak Signal-to-Noise Ratio (PSNR) and around 0.04 in Structural Similarity Index (SSIM).

Perceptually Optimized Sound Zones Research Talk

Tuesday 21 January 2014

18:30

Perceptually Optimised Sound Zones - IOA Southern Branch joint evening meeting

Tuesday 21 January 2014

18:30 (AGM), 19:00 start

Often, two people in a single room want to listen to different items of audio. It may be that one person wants to watch television whilst the other wants to listen to the radio, or even that one wants to play a computer game whilst the other reads in silence. The obvious solution to this would be for all individuals to wear headphones, however this dramatically increases isolation (not just in acoustic terms), is impractical when multiple people want to listen to one or other of the audio streams, and could be uncomfortable over an extended period.

Crime, Corruption and Development: the Case of the Caribbean

Thursday 23 January 2014

13.00 hrs to 14.00 hrs
Professor Tony Clayton CES Visiting Professor, Professor of Caribbean Sustainable Development, University of the West Indies

This seminar will examine the impacts of crime and corruption on the development of small island developing states (SIDS), with particular regard to the Caribbean nations. The SIDS nations are regarded as highly vulnerable to natural disasters, climate change and external shocks. However, crime, corruption and poor governance have actually inflicted far more harm.

Improving Conditional Probability Based Camera Source Identification

Monday 27 January 2014

11:00 to 12:00
Syamsul Yahaya, PhD Student, University of Surrey

Conditional probabilities (CP) in frequency domain have been proposed as a feature space in multimedia forensics for identifying sources of digital images and videos produced by digital cameras. While this approach has been proved very effective for both image and video source identification, the CP features used in previous work are selected in a rather arbitrary way and it remains a question if all of them indeed contribute to the final classification result. In this paper, we revisit the selection process of CP features and propose to identify good features using some statistical analysis. In previous work, 72 CP features were used for video source identification and this allowed us to reduce the number of selected features to 15 “good” ones but keep the classification performance at the same level. To be more exact, when frame-based CP features are used with simple majority voting to classify digital videos produced by eight cameras of different models, the reduced set of 15 CP features gave an overall recognition rate of 96.2%, which is nearly the same as the rate when all the 72 features are used (96.3%). In addition to the feature reduction approach, we also investigate using means and standard deviations of CP features across frames as new (video-based) features. Experimental results show that this approach can drastically reduce the computational costs by a factor close to 100 but achieve similar classification accuracy (96.8%) compared with the case when the 15 good frame-based CP features are used with simple majority voting.

Shape Knowledge in Segmentation and Tracking

Wednesday 29 January 2014

14:00 to 15:00
Dr Victor Adrian Prisacariu, University of Oxford

Energy symbiosis and decentral energy supply as a part of German renewable energy transformation

Thursday 30 January 2014

13.00 hrs to 14.00 hrs
Prof. Dr.-Ing. Susanne Hartard, Professor Industrial Ecology, University of Applied Sciences Trier Environmental Campus Birkenfeld

Germany is following the sustainable path towards a future 100% renewable energy supply and will close the last atomic power plant in 2022. The challenge is high investments, the expansion of the electricity grid and especially a complete transformation from a former pure central energy supply towards decentral concepts with a lot of plants included. New investment and organization structures are needed and local and new networking concepts become more important.

WSMS February Talk

Tuesday 4 February 2014

6.45pm
Presented by Dr Peter Northover, Senior Research Fellow, Head of Materials Science-based Archaeology Group, Oxford Materials

Civil Engineering Research Seminar - February 2014

Thursday 6 February 2014

13:00 to 14:00
Mr Jianfei Peng

Cloning Localization Based on Feature Extraction and K-means Clustering

Monday 10 February 2014

11:00 to 12:00
Areej Alfraih, PhD Student, University of Surrey

The field of image forensics is expanding rapidly. Many passive image tamper detection techniques have been presented. Some of these techniques use feature extraction methods for tamper detection and localization. This work is based on extracting Maximally Stable Extremal Regions (MSER) features for cloning detection, followed by k-means clustering for cloning localization. Then for comparison purposes, we implement the same approach using Speeded Up Robust Features (SURF) and Scale-Invariant Feature Transform (SIFT). Experimental results show that we can detect and localize cloning in tampered images with an accuracy reaching 97% using MSER features. The usability and efficacy of our approach is verified by comparing with recent state-of-the-art approaches.

Developing your career in the Satellites Industry: A lecture on NanoSats/CubeSats and a tour of the Surrey Space Centre

Wednesday 12 February 2014

18:30 to 21:00
Professor Craig Underwood, Deputy Director of the Surrey Space Centre

The University of Surrey and its spin-out, SSTL, are world leaders in the design, construction and operation of micro-satellites. Recent technological advances have made it possible to construct even smaller satellites, at an order of magnitude less cost. These “nano-satellites” open up many new possibilities for space exploration. 

Making A Better World

Thursday 13 February 2014

14.15 hrs to 15.30 hrs
Jonathon Porritt, Founder Director Forum for the Future

Once again CES is delighted to welcome the distinguished writer and campaigner Jonathon Porritt to address students and staff as part of the Sustainable Development: Applications course.

Tomorrow's Mathematicians Today 2014

Saturday 15 February 2014

09:00 to 17:00
Professor Luis Fernando Alday
Tomorrow's Mathematicians Today 2014

The Institute of Mathematics and its Applications (IMA) and the University of Surrey are proud to present Tomorrow's Mathematicians Today, an undergraduate mathematics conference supported by the IMA.

Special thanks go to Noel-Ann Bradshaw (University of Greenwich, initiator of the conference series) for her assistance and help with the organisation, and to Adam Sebestyen who designed the initial TMT logo.

Registration for this event is now closed.

The programme for the day is now available (PDF, 0.9 MB), and the abstracts for the talks are also available (PDF, 146 KB)



Threshold Blind Signatures

Monday 17 February 2014

11:00 to 12:00
Veronika Kuchta, PhD Student, University of Surrey

This paper formalizes the concept of threshold blind signatures (TBS) that bridges together properties of the two well-known signature flavors, blind signatures and threshold signatures. Using TBS users can obtain the signature through interaction with t-out-of-n in a blind way, i.e. without disclosing the corresponding message to any of those signers.

In addition, the paper shows how to construct a secure TBS scheme in the standard model. The resulting scheme can be seen as an extension of Okamoto's blind signature scheme (TCC 2006) with secret sharing techniques. The most significant applications of the scheme can be found in e-voting, where the threshold property offers stronger security guarantees.

Socio-economic assessment of biomass supply chains. What needs to be assessed?

Thursday 20 February 2014

13.00 hrs to 14.00 hrs
Dr Rocio A Diaz-Chavez, Research Fellow, Centre for Environmental Policy, Imperial College London

The potential on the use of biomass resources for the production of power, transport fuels and chemicals has become an important target in many countries looking for added economic value to the biomass. To achieve this, it will be necessary a change in the technology used for producing, handling and processing the raw biomass materials.

Multi-Level Security (MLS) - What is it, why do we need it, and how can we get it

Friday 21 February 2014

10:00 to 12:00
Dr Adrian Waller, Consultant, Thales Research and Technology, Thales UK

MLS has been a field of study in computer science for decades, and MLS systems have been developed and deployed for high assurance defence and government applications. However, in recent years other users with less stringent security requirements have been talking about their need for "MLS", and have been attempting to use traditional MLS solutions in their systems. In this talk, we take a look at the varied applications that are claimed to require "MLS" and attempt to reconcile their different interpretations of the term. We then survey existing and proposed MLS technologies, discuss some of their drawbacks when compared with these applications' requirements, and propose some areas for future research.

Secure Mobile Logins

Monday 24 February 2014

11:00 to 12:00
Franziskus Kiefer, PhD Student, University of Surrey

Password based authentication remains the most common authentication method on the internet and in particular on mobile devices. Yet, no satisfying, secure methods are deployed on mobile devices. We discuss challenges for secure password-based login mechanisms in mobile browsers and propose a solution secure against impersonation attacks, i.e. phishing attacks. We design and implement a drop-in replacement for the password over HTML authentication mechanism in mobile browsers that builds upon cryptographically sound primitives. Our result includes a ready to use Android application and an easy to set-up and use authentication server for integration into existing application servers.

The Internet of Things and building a digital ecosystem

Monday 24 February 2014

18:00 to 19:00
Dave Locke, Senior Inventor, Pervasive and Advanced Messaging Technologies, IBM

The Internet of Things is IBM’s cloud services solution and it is consider one of the best and most widely-used out there, connecting millions of devices everyday! This interactive talk is organised by the CompSoc (Computer Society) run by students of the Department of Computing.

Dense 3D Reconstruction from High Frame-Rate Video using a Static Grid Pattern

Thursday 27 February 2014

11:00 to 12:00
Dr Ryusuke Sagawa, National Institute of Advanced Industrial Science and Technology (AIST), Japan

The Energy of Nations - Risk Blindness and the Road to Renaissance

Thursday 27 February 2014

13:00 to 14:00
Dr Jeremy Leggett, Chair Solarcentury and SolarAid

Brain scientists tell us we have a very worrying collective tendency for blindness to the kind of risks that can crash economies, and imperil civilisations. The shocking recent history of the financial industries suggests they are right.

Evolutionary Learning of Counter-propagation Neuro-Controllers for Multi-objective Robot Navigation

Thursday 27 February 2014

15:30 to 16:30
Amiram Moshiov, Tel-Aviv University, Israel

This study explores evolutionary training of Counter-Propagation Neuro-Controllers (CPNCs) for applications in Evolutionary Robotics. It concerns navigating a robot in an environment that differs from the trained one. The evolutionary training of CPNCs is compared with that of the traditional Feed-Forward Neuro-Controllers (FFNCs). In contrast to FFNCs, CPNCs are neuro-controllers that do not process sensory information directly into actions. Rather, there are two mappings involved. First, the sensed input is mapped into a class that represents prototypical information about the environment. This is achieved in the first layer of Kohonen neurons. Next, each class, which is represented by a weight vector, is mapped into actions, via a Grossberg layer. The evolutionary training of the CPNCs is done using a two phase approach. The first phase primarily involves the unsupervised learning of the classes, and the second phase mostly deals with the adjustment of the control mapping.

To diversify trained solutions, and to obtain controllers for various scenarios, a multi-objective evolutionary approach is used. The evolved CPNCs exhibit multi-objective characteristics. These are reflected by the different degrees of path safety and attraction to targets, in both the trained and tested environments. For the studied case, the CPNCs are found to be statistically superior to the FFNCs with respect to the obtained performances, the learning rates and the generalization capabilities. Following the comparison, we provide initial results concerning an overall analysis of the correlation between the evolved number of Kohonen clusters, in the combined non-dominated set of controllers, and the evolved overall multi-objective performance.

Security: Where is IBM placing its bets?

Friday 28 February 2014

10:00 to 12:00
Prof Steve Legg, IBM University Relations Manager and Royal Academy of Engineering Visiting Professor

As a large and diverse hardware / software / services organisation IBM needs to decide where and how to deploy its resources to compete in a wide range of markets. The investment of over $6B annually in its Development and its Research activities is guided by a formal process to pick technology areas that will make a difference in the future for IBM and its clients.

In this lecture Steve will describe how IBM makes its investment priority choices, how they have evolved over the last decade and where it is placing its bets in IT and  in Security for the next few years.

Cryptanalysis of a Class of Chaos-Based Image Encryption Schemes

Tuesday 4 March 2014

15:30 to 16:30
Dr Chengqing Li, Associate Professor, Xiangtan University, China

The subtle similarities between cryptography and chaos theory make the design of chaos-based encryption schemes become a hot research subject in the past two decades. As a result, a large number of encryption schemes based on chaos theory have been proposed to date. Among them, many schemes share the same structure, namely combination of multiple rounds of two basic parts: position permutation and value substitution, which is also a typical structure of the traditional text encryption schemes. In this talk, first, preliminary knowledge of cryptanalysis is introduced. Then, a class of chaos-based image encryption schemes, which share the same structure, is reviewed. Further, recent research progress on breaking the aforementioned two separate basic parts, when the round number is equal to one, is presented. Finally, the recent research results on breaking the two basic parts separately, when the round number is more than one, are reported with detailed discussions.

Secure Futures

Friday 7 March 2014

Today, cyber security is headline news and touches every corner of society.

The University of Surrey is collaborating with e-skills UK to help local school children to discover this exciting field at a Secure Futures event, held at Surrey's Department of Computing.

Quality as a prerequisite for security in interoperable systems

Friday 7 March 2014

10:00 to 12:00
Mr Peter Davies, Technical Director, Thales UK

We are all facing enormous challenges, now and into the future, in the way that assurance of ICT products and systems is provided and there is a pressing need to review the thinking about assurance. I will argue that we only truly understand the 'security' of an interoperable system when we understand the 'quality' level to which that system has been implemented. I will further argue that a laxity in our linguistic definitions means that we increasingly do not understand what is meant when we are discussing the security.

11th Annual Computing Department PhD Conference

Monday 10 March 2014

9:00 to 17:00
To be announced

The 11th Annual Computing Department PhD Conference will be taking place on Monday 10 March 2014 in Lecture Theatre 1DK02 in the morning and in Lecture Theatre L in the afternoon, University of Surrey, Guildford.

The Boeing Dreamliner

Wednesday 12 March 2014

19:00
João Miguel Santos FRAeS, Vice President of Africa Boeing International

"The 787 Dreamliner - where we have been, how did we get here and where are we going?"

Joint with the RAeS Farnborough Branch

Civil Engineering Research Seminar - March 2014

Thursday 13 March 2014

13:00 to 14:00
Francisco Comin

The Future of Security

Friday 14 March 2014

10:00 to 12:00
Dr Alastair MacWilson, Former Global Managing Director, Accenture Technology Consulting

This seminar is going to describe where the future of the security is and where it is not.  It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research, It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators. It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Gait Analysis Using Wearable Sensors

Friday 14 March 2014

13:00 to 14:00
Dr Delaram Jarchi, Research Associate, Department of Computing, Imperial College London

Gait analysis or systematic evaluation of bipedal locomotion provides important information about the human biomechanics, pathology and behaviour. One important application of gait analysis is to create a mobility assessment tool for patients following orthopaedic surgery. With recent advances in wearable sensing technologies, the practical use of the wireless inertial sensors for gait analysis has been widely increased. However, the use of a reliable gait analysis system for everyday clinical utilisation and home-based monitoring under realistic real-life situations remains limited. For patient studies, integration of all sensing capabilities into a single wireless sensor node has specific advantages. In this talk we look into the recent advances in gait analysis based on a single sensor and discuss the performance, reliability and practical use of a developed gait analysis platform for creating future monitoring systems.

Causal Mode Decomposition for Motion Correction and Segmentation in Renal DCE-MRI Medical Imaging

Monday 17 March 2014

11:00 to 12:00
Santosh Tirunagari, PhD Student, Department of Computing, University of Surrey

Dynamic contrast enhanced magnetic resonance renography (DCE-MRI), in common with other medical imaging techniques, is influenced by respiratory motion. As a result the data quantification may be inaccurate. This paper presents a novel method for motion correction as well as segmentation using Causal Mode Decomposition (CMD). In the present study, for the first time, we introduce CMD to the field of medical imaging by analysing the renal DCE-MRI imaging data. Analysing these images is essential in understanding the fundamental characteristics of renal perfusion and filteration. This novel method is applied to ten healthy volunteers' renal DCE-MRI data. CMD reconstruction results in the motion correction and CMD projections result in segmentation of the renal DCE-MRI data. Both qualitative and quantitative evaluation was performed against the original images using region of interest analysis.

Advanced Materials for a Modern Age Symposium

Wednesday 19 March 2014

13:30 to 17:15

As part of the “Surrey Sevens for 2014” programme we will be holding a half day symposium on Advanced Materials on Wednesday 19 March 2014 in the Ivy Arts Centre on campus.

Identity is the New Money

Friday 21 March 2014

10:00 to 12:00
David Birch, Director, Consult Hyperion

David Birch from Consult Hyperion will give a talk based on his forthcoming book “Identity is the New Money” explaining Bitcoins and the stone currency of island of Yap, the reason why social networks will replace cash and the case for a National Entitlement Scheme. In 2013, Wired magazine named him one of their global top 15 favourite sources of finance and business information and he was ranked Europe’s most influential commentator on emerging payments by Total Payments magazine so you’d be mad to miss out.

This seminar is going to describe where the future of the security is and where it is not.   It will provide a contrarian view of current thinking on the issues relating to information security and will range broadly across the key trends relating to technology, methodologies and research,  It will provide a rundown of what is new and will predict what little time is left for many of today’s products, purveyors and regulators.  It will attempt to set out why new thinking is needed to drive fresh approaches to information security and the cyber security problem, and will argue that if this is not done, the party will be over for the security field.

Family Bootstrapping: a Genetic Transfer Learning Approach for Onsetting the Evolution for a Set of Related Robotic Tasks

Thursday 27 March 2014

15:30 to 16:30
Amiram Moshaiov, Tel-Aviv University, Israel

Studies on the bootstrap problem in evolutionary robotics help lifting the barrier from the way to evolve robots for complex tasks. It remains an open question, though, how to reduce the need for designer knowledge when devising a bootstrapping approach for any particular complex task. Recent developments in the field of transfer learning may help reducing this need and support the evolution of solutions to complex tasks, through task relatedness. Relying on the commonalities of similar tasks, we introduce a new concept of Family Bootstrapping (FB). FB refers to the creation of biased ancestors that are expected to onset the evolution of "a family" of solutions not just for one task, but for a set of related robot tasks. A general FB paradigm is outlined and the unique potential of the proposed concept is discussed. To highlight the validity of the FB concept, a simple demonstration case, concerning the evolution of neuro-controllers for a set of robot navigation tasks, is provided. The FB concept resulted from an earlier work on bootstrapping the co-evolution of soccer-like players, which is also briefly reported.  The presentation is concluded with some suggestions for future research.

Can shale gas be part of the UK's low-carbon transition?

Thursday 27 March 2014

13.00 hrs to 14.00 hrs
Dr Maria Sharmina, Tyndall Centre for Climate Change Research

With conventional natural gas reserves declining globally, shale gas has emerged as a potentially significant new fossil fuel source. This new availability and apparent abundance of shale gas in the US (and potentially elsewhere) has led some to argue that shale gas could, in principle, be used to substitute more carbon intensive fuels such as coal in electricity generation.

Computer Vision on Mobile Platforms

Thursday 27 March 2014

11:00 to 12:00
Tony King-Smith, Imagination Technologies

Building Integrated Cyber Defences

Friday 28 March 2014

10:00 to 12:00
Peter Kemp, Technical Lead for Cyber Intelligence, QinetiQ

Computer Network Defence is a fascinating and ever changing subject. Having worked with some of the best, and worst, organised network defences in the UK, I propose to show you how to consider your Cyber Defences as a whole, not focussing on a single aspect, and how to plan to build a capability from scratch in a methodical way, encompassing hardware, software, and the people who will operate it, and how the system becomes stronger than the sum of its parts.

Multimodal Ageing (or habituation)

Monday 31 March 2014

11:00 to 12:00
Dr Norman Poh, Lecturer, Department of Computing, University of Surrey

As we grow old, our biometric traits will also change. Indeed, there is increasing evidence of ageing across a number of biometric modalities. However, whether or not a multimodal biometric system suffers from the ageing is an issue that has not been investigated. We conjecture that if the underlying biometric modalities may change over time, the resultant multimodal biometric system should also change. In order to detect minute score changes over time, we use a subject-dependent regression-based framework to detect ageing. Based on the Mobile Biometry (MOBIO) database with talking face and speech modalities, our findings suggest that the change of biometric performance over time can be positive or negative, that is, for some subjects, the system performance actually improves with use, hence suggesting potential habituation. Yet, for most other users, the system performance degrade over time.

Civil Engineering Research Seminar - April 2014

Tuesday 1 April 2014

13:00 to 14:00
Ms Hooi Ying Lee

Business Development: How to Connect and Work with Business

Wednesday 2 April 2014

12:45
Celia Gaffney, Business Development Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Business Development: How to Connect and Work with Business on Wednesday 2nd April in room 40 AA 03, with lunch available from 12:45 for a 13:00 start.

Modelling Climate Change and Development - Starting with our development goals

Wednesday 2 April 2014

13.00 hrs to 14.00 hrs
Jeremy Webb, African Minerals Development Centre, UN Economic Commission for Africa (UNECA)

It is widely recognised that climate change is a development issue, not just in terms of the impacts of climate change but also the development implications associated with climate change negotiations.  

Touch and pay... or far and pay?!

Thursday 3 April 2014

14:00 to 15:00
Dr Ioana Boureanu Carlson, researcher in cyber security

Smartcard-based protocols represent an increasingly large share of the wireless authentication solutions market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to this development. However, such attacks could be mitigated through the use of distance-bounding protocols. In this talk, we will discuss the core challenges for distance-bounding, of which some have recently been overcome, whereas others still stand prominently.

We will focus mostly on the security of these wireless protocols, from attacks and new, secure designs. We will finish with a vision for the future of these protocols, the possible and advisable paths towards, e.g., securing contactless payments.

The Cyber Threat Landscape and Hunting the Adversary

Friday 4 April 2014

10:00 to 12:00
Dr Adrian Nish, Senior Consultant and Cyber Threat Intelligence Lead, Detica

The corporate IT network is a battle-ground for a range of modern threats. Cybercriminals looking to make financial gain, attention-seekers trying to create headlines, professional hackers aiming to steal sensitive documents, and even moles acting as legitimate employees all create significant risks for those tasked with defending the network. To make matters worse, the traditional technology and methods of these defenders has failed to keep pace with the ingenuity of the attackers and the industrialisation of their methods. This seminar will give an overview of the threat landscape and draw on real case studies from investigations done by Detica’s Cyber Security services. Examples of social engineering tricks, exploits, custom malware, and threat correlation will be presented along with descriptions of some of the cutting-edge techniques being used to detect them.

The Privatisation of Biodiversity? - New Approaches to Nature Conservation Law

Wednesday 9 April 2014

13.00 hrs to 14.00 hrs
Dr Walters Nsoh, School of Law, University of Dundee

The UK failed to meet its target of halting biodiversity loss by the end of 2010. A new biodiversity plan launched in 2011, “Biodiversity 2020”, further extends the target of halting overall biodiversity loss to 2020. Although some progress is being made, the current policy and regulatory approaches have not prevented, far less reversed, the loss of biodiversity across the country.

Brain Computer Interfaces for Neurofeedback and Medical Applications

Thursday 24 April 2014

14:00 to 15:00
Dr Loukianos Spyrou, Donders Research Institute, Radboud University Nijmegen, Netherlands

Brain Computer Interface (BCI) technology has advanced over the last decade to the point that it can be applied with success in a variety of fields. Two novel and mobile BCI designs and their technical details (signal processing and machine learning) from the Donders Institute research group in Netherland (www.donders.ru.nl) will be presented. One is based on event-related neurofeedback to aid language and sound learning. The second one is an intra-operative awareness monitor which aims to serve as an indication of increased awareness during a surgical procedure.

Getting your hands dirty - how to engage industrial partners and bid to the TSB

Wednesday 30 April 2014

12:45
Peter Lancaster, Impact Acceleration Account KE Manager in RES

As part of the FEPS e3i ‘Inform’ strand, we will be holding a lunchtime seminar on Getting your hands dirty - how to engage industrial partners and bid to the TSB on Wednesday 30th April in room 33 AB 03, with lunch available from 12:45 for a 13:00 start.  

Science Showoff

Wednesday 30 April 2014

19:30

The night before the British Science Association Science Communications Conference begins at the University of Surrey, we bring you Science Showoff. Join us for a fun packed evening of science humour and general silliness.

Buy tickets

Application of Surface Analysis to Turbine Blades, Tissue Scaffolds and Plastic LEDs

Wednesday 30 April 2014

14:30
Dr David McPhail, Imperial College

Further information to follow.

STRaND1 - Raising the bar in COTS electronics

Wednesday 7 May 2014

16:00
Dr Chris Bridges

Professor Josef Kittler invites you to come and celebrate the Department of Electronic Engineering's excellence in research at a lecture to be given by the winner of the Industrial Advisory Board Departmental Prize for Excellence in Research 2013, Dr Bridges.

The Chairman of the Department's Industrial Advisory Board, Professor Chris Firth, Thales Research, will present the prize to Dr Bridges at this event. Drinks and nibbles will follow in the upper lecture theatre concourse (this can be accessed via the rear doors of the lecture theatre).

Going Data-Driven - How AI is leading the way to a new scientific paradigm (and why this is not necessarily a good thing)

Wednesday 7 May 2014

14:00 to 15:00
Professor Nello Christianini, Professor of Artificial Intelligence, University of Bristol, UK

The talk will cover the paradigm shift that has been brought about by the availability of large amounts of data, both its historical roots in AI and its effects on other fields of science and society.

Security issues for developers using Microsoft technologies

Friday 9 May 2014

10:00 to 12:00
Chris Seary, Consultant for Info-Assure

His first presentation will demonstrate application security threats, showing actual code exploits and how they can be prevented. This is based on Chris' experience as a security consultant, and also his time working as a developer. The presentation will involve actual demonstrations of various types of web site attack, with full code examples. Chris will then proceed to give an overview of the secure application life cycle within a large organisation, and some of the issues faced. How do banks keep ahead of both external attackers and internal threats, such as rogue traders?

The second presentation will look at application specific methods for securing communications. This will delve into subjects such as WS-Security and WS-Federation. This is true application-level security, incorporating XML encryption methods. Many third party applications now offer a WS-Security authentication suite, allowing complex web service security facilities, such as federated identity.

Message Dissemination in Vehicular Ad Hoc Networks

Monday 12 May 2014

11:00 to 12:00
Mr Leandros Maglaras, Research Fellow, Department of Computing, University of Surrey

A vehicular network is a challenging environment since it combines a fixed infrastructure (roadside units, e.g., proxies), and ad hoc communications among vehicles. Vehicular networks have the diverse range of applications that varies from safety applications to comfort applications. As the dissemination requirements (reliability, delay, coverage, etc.) may be different from one application to another, the dissemination mechanism could be implemented at the application layer where the interaction with the routing layer is limited. This talk addresses several aspects of vehicular communications related to data dissemination.

A Bitcoin Walkthrough

Tuesday 13 May 2014

12:00 to 13:00
Dan Jayasinghe, Smart Card Center, Information Security Group, Royal Holloway, University of London

What is Bitcoin? How did it all start? What is Bitcoin mining? Is Bitcoin really anonymous? Has fair-exchange just got even more difficult?  While answering these questions, we will take a quick overview of the Bitcoin digital cash system and look into cryptography used in its clever design with attractive reward schemes. The walkthrough also touches up on setting-up, start making & receiving payments and Bitcoin mining. We conclude with some recent developments in Bitcoin and give insight into further research carried out.

WSMS May Talk

Tuesday 13 May 2014

6.45pm to 8:00pm

Walking to Wellbeing and Sustainability? Walking and promotion of outdoor activities for health and sustainable living

Tuesday 13 May 2014

13.00 hrs to 14.00 hrs
Jim Walker, Chief Executive of the Outdoor Trust

There is wide agreement that more walking and public engagement in outdoor activities can make a contribution to personal well-being, health and collective sustainability. But how do we go about promoting the benefits of walking and 'the great outdoors' in a culture where it is ever easier to be sedentary and disconnected from the natural environment? Our seminar speaker Jim Walker of the Outdoor Trust charity draws on a wealth of experience as a ranger, trail designer and urban well-being consultant in discussing these challenges for sustainable lifestyle change. Jim will look at methods for engaging citizens in outdoor activities and how these can contribute to wider behavioural change.

Action Detection in Video Sequences

Thursday 15 May 2014

14:00 to 15:00
Professor Pavel Zemčík, Faculty of Information Technology (FIT), Brno University of Technology, Brno, Czech Republic

Cyber security - what is happening and why?

Friday 16 May 2014

10:00 to 12:00
Mike St John Green, Recently retired from government

The Internet of Things, Smart Meters, the IP connection of Process Control Systems, Big Data, consumerisation and mobility are all part of the rapidly changing landscape of cyberspace, a place we all rely on for an ever increasing proportion of our social and economic activity. But news stories reveal that the environment is far from safe and secure. What are the forces at play? I will consider how the shape of cyberspace is changing and the issues this poses for industry, governments and users as we work to make cyberspace sufficiently safe and secure.

NASA's Exploration Program: A Path to Mars

Friday 16 May 2014

11:00 to 12:00

NASA’s Chief Scientist and Deputy Chief Technologist will provide an overview of NASA’s plans to develop a human exploration pathway to Mars, including plans for a human mission to an asteroid, with a specific focus on how science and technology will impact, and be impacted by, these ambitious plans. They will also discuss opportunities for international cooperation.

Re-assessing resource risks and criticality

Wednesday 21 May 2014

13.00 hrs to 14.00 hrs
Prof Raimund Bleischwitz, BHP Billiton Chair in Sustainable Global Resources University College London (UCL) UCL Institute for Sustainable Resources

While strategic studies on natural resources usually focus on the criticality of certain single materials, this lecture starts from the inter-linkages between and among resources (called “the resource nexus”). It discusses the impact any food and water stress may have on extraction activities in fragile states and regions.

The department of Physics proudly presents its 5-a-side football tournament

Wednesday 21 May 2014

13:00

The tournament starts at 1pm on Wednesday 21st May on the AGP1 pitch at Surrey Sports Park.

If you are interested in participating please email PhySoc: ussu.physics@surrey.ac.uk with your name, team name, and affiliation (eg:  Level 1,2,3, MSc, Phd, staff, research group, alumni).  

Entry is free and on a first-come-first-served basis since teams numbers are limited. Each team must have at least one female member on the pitch at all times.

The winning team will be awarded the highly prestigious Al-Khalili Challenge Plate!

Polynomial Matrix Factorisation Techniques for Multi-Channel Signal Processing

Tuesday 27 May 2014

12:00 to 13:00
Prof J G McWhirter, School of Engineering, Cardiff University

The term polynomial matrix (PM) is used to describe a matrix whose elements take the form of polynomials. This provides a very useful and compact representation for multi-channel digital filtering and other important operations in digital signal processing. For example, since polynomials in the delay operator z-1 are normally used to specify linear time-invariant processes, an m x n polynomial matrix may be used to represent a fast fading wireless communication channel from n transmitters to m receivers.

For almost ten years now, I have been carrying out research with numerous colleagues into a range of polynomial matrix (PM) factorisation techniques. These include PM eigenvalue decomposition (PEVD), singular value decomposition (PSVD) and QR decomposition (PQRD). By analogy with the role played by the EVD, SVD and QRD of conventional matrices in DSP, these polynomial factorisation techniques have potential advantage for a wide range of multi-channel signal processing problems such as broadband adaptive beamforming, blind signal separation, data compaction and spectral factorisation.

In this talk, I will attempt to give a brief review of this research, omitting details of the various PM factorisation algorithms but concentrating on some of the potential applications. In this context I will present the results of some computer simulation studies designed to demonstrate the performance of the PM algorithms in comparison with alternative techniques, where available.

Bayesian Early Mode Decision Technique for View Synthesis Prediction-enhanced Multiview Video Coding

Wednesday 28 May 2014

14:00 to 15:00
Professor Raouf Hamzaoui, Head of Research, Faculty of Technology, De Montfort University, UK

View synthesis prediction (VSP) is a coding mode that predicts video blocks from synthesised frames. It is particularly useful in a multi-camera setup with large inter-camera distances. Adding a VSP-based SKIP mode to a standard Multiview Video Coding (MVC) framework improves the rate-distortion performance but increases the time complexity of the encoder. The talk will present an early mode decision technique for VSP SKIP-enhanced MVC. The method uses the correlation between the rate-distortion costs of the VSP SKIP mode in neighbouring views and Bayesian decision theory to reduce the number of candidate coding modes for a given macroblock. Simulation results show that the technique can save up to 36.20% of the encoding time without any significant loss in rate-distortion performance.

Blind Source Separation in Neural Signal Processing

Wednesday 28 May 2014

14:30
Professor Christopher James, University of Warwick

Further information to follow.

What is string theory?

Wednesday 28 May 2014

15:15 to 17:30

String theory is well-known as a theory unifying gravity with the remaining fundamental forces of physics. What is perhaps less well-known is that string theory is far more useful than that.

On Wednesday 28 May, come and hear the latest research in string theory as pioneered by the newly established Field, Strings and Geometry group within the Department of Mathematics at Surrey.

Imaging challenges for Single Cell Irradiation at the Surrey Ion Beam Centre

Wednesday 28 May 2014

14:00 to 15:00
Dr Michael Merchant and Dr Jonathan (Charlie) Jeynes, Ion Beam Centre, University of Surrey

Challenges of modeling human experience and ground truth for machine vision applications

Thursday 29 May 2014

14:00 to 15:00
Professor Heikki Kalviainen, Machine Vision and Pattern Recognition Laboratory (MVPR), Lappeenranta University of Technology (LUT), Finland

Usability in Biometrics

Thursday 29 May 2014

11:00 to 12:00
Mr Ramon Blanco-Gonzalo, Visiting PhD Student at University of Surrey from Carlos III University of Madrid (Universidad Carlos III de Madrid), Spain

The increasing demand for security systems in mobile environments has encouraged the development of several authentication approaches to access mobile devices. Up to now, biometric recognition offers the unique advantage and convenience of not requiring a password or carrying a token. Since it has only been fairly recent that biometrics is used in mobile devices, there are few works that address usability and accessibility concerns that meet the user’s requirements. The University Group for Identification Technologies (GUTI) is currently focused on security and specially in mobile biometrics. In this talk, we will review the main GUTI's research lines paying special attention to usability and accessibility in biometrics.

Wigner flow reveals quantum phase space features we thought could not be there

Thursday 29 May 2014

13:00
Dr Ole Steuernagel, University of Hertfordshire

The behaviour of classical mechanical systems is characterised by their phase portraits, the collections of their trajectories.

Anti-forensic Resistant Likelihood Ratio Computation

Monday 2 June 2014

11:00 to 12:00
Nik Nurul Ain Binti Nik Suki, PhD Student, Department of Computing, University of Surrey

One of the major utilities of biometrics in the context of crime scene investigation is to identify people. However, in the most sophisticated cases, criminals may introduce the biometric samples of innocent individuals in order to evade their own identities as well as to incriminate the innocent individuals. To date, even a minute suspect of an anti-forensic threat can potentially jeopardize any forensic investigation to the point a potentially vital piece of evidence suddenly becomes powerless in the court of law. In order to remedy this situation, we propose an anti-forensic resistant likelihood ratio computation. This approach renders the strength of evidence to a level that is proportional to the trustworthiness of the trace, such that a highly credible evidence will bear its full strength of evidence whilst a highly suspicious trace can have its strength of evidence reduced to naught. Using simulation as well as a spoof fingerprint and face database, we show that the existing likelihood ratio computation is extremely vulnerable to an antiforensic threat whereas our proposed computation is robust to it, thereby striking the balance between the utility and threat of a trace.

Multidisciplinary Studies Linking Altered Loading to Biology, Inflammation and Pain

Wednesday 4 June 2014

14:30
Dr Cathy Holt, University of Cardiff

Further information to follow.

Intellectual Property and Non-Disclosure Agreements

Wednesday 4 June 2014

12:45
Rob Yates, Trevor Hartman, Daniele Giannone (RES)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Intellectual Property and Non-Disclosure Agreements on Wednesday 4th June in 40AA03, with lunch available from 12:45 and the seminar running from 13:00 to 14:00.

Measuring the Complexity of Visual and Auditory Patterns

Wednesday 4 June 2014

14:30 to 15:30
Professor Godfried Toussaint, New York University Abu Dhabi (United Arab Emirates)

Introduction to Approximate Polytope Ensembles for Machine Learning

Thursday 5 June 2014

14:00 to 15:00
Dr Oriol Pujol, Vision and Computational Learning Research Group, University of Barcelona (Spain)

Automating the Design of Data Mining Algorithms with an Evolutionary Algorithm

Tuesday 10 June 2014

14:00 to 15:00
Prof Alex A Freitas, University of Kent

Decision-tree induction algorithms are one of the most popular types of classification algorithms in the field of data mining and knowledge discovery. Research on this type of algorithms produced many new algorithms in the last 30 years or so. However, all the decision-tree induction algorithms created over that period have in common the fact that they have been manually designed, typically by incrementally modifying a few basic decision-tree induction algorithms. Having these basic algorithms and their components in mind, we propose an evolutionary algorithm to automate the process of designing decision-tree induction algorithms. The basic motivation is to automatically create complete decision-tree induction algorithms in a data-driven way, trying to avoid the human biases and preconceptions incorporated in manually-designed algorithms. The proposed evolutionary algorithm is evaluated on a number of datasets, and the results show that the machine-designed decision-tree induction algorithms are very competitive with well-known human-designed decision-tree algorithms.

Magnetron Sputtering: A Versatile Technique for High Quality Engineering Coatings

Wednesday 11 June 2014

14:30
Professor Peter Kelly, Manchester Metropolitan University

Further information to follow.

Neural Network Ensembles For Image Identification Using Pareto-optimal Features

Thursday 12 June 2014

15:30 to 16:30
Mr Wissam Albukhanajer, PhD Student, Department of Computing, University of Surrey

In this presentation, an ensemble classifier is constructed for invariant image identification, where the inputs to the ensemble members are a set of Pareto-optimal image features extracted by an evolutionary multi-objective Trace transform algorithm. The Pareto-optimal feature set, called Triple features, gains various degrees of trade-off between sensitivity and invariance. Multilayer perceptron neural networks are adopted as ensemble members due to their simplicity and capability for pattern classification. The diversity of the ensemble is mainly achieved by the Pareto-optimal features extracted by the multi-objective evolutionary Trace transform. Empirical results show that the general performance of proposed ensemble classifiers is more robust to geometric deformations and noise in images compared to single neural network classifiers using one image feature.

A panoramic VISTA of the stellar halo of NGC 253

Thursday 12 June 2014

16:00
Prof. Laura Greggio

I will introduce the general topic on the properties of stellar halos around late type galaxies, and on what they tell us with respect to the galaxy formation models.

Herschel and ALMA find supernovae as dust factories

Friday 13 June 2014

15:00
Mikako Matsuura, University College London

The formation of dust by core-collapse supernovae (CCSNe) is one of the key processes in the chemical and physical evolution of supernova ejecta, with implications for the origin of dust in the interstellar media of galaxies.

Ian Castro

Wednesday 18 June 2014

14:30
Professor Ian Castro, University of Southampton

Further information to follow.

Acquisition and Modeling of Facial and Material Appearance

Wednesday 18 June 2014

14:00 to 15:00
Dr Abhijeet Ghosh, Department of Computing, Imperial College London

Quasi Steady State Petri Nets

Wednesday 18 June 2014

14:00 to 15:00
Prof Andrzej M. Kierzek, Professor of Systems Biology, FHMS, University of Surrey

I will present Quasi Steady State Petri Net (QSSPN), an algorithm for simulation of dynamic Place/Transition systems controlling flow networks at steady state. The QSSPN is a hybrid algorithm integrating qualitative, stochastic and continuous Petri Nets (PN) with Linear Programming (LP) optimisation of flow networks at steady state. We introduce “constraint” PN nodes, which map node state to flow capacity bounds and “objective” PN nodes that execute LP evaluation of objective functions. The algorithm is motivated by applications in computer simulation of molecular interaction networks of the living cell, where slow, dynamic, gene regulatory and signaling processes re-direct steady state flux in metabolic networks. The QSSPN algorithm will be illustrated by the first dynamic simulation of molecular interaction network describing gene regulation, signaling and whole-cell metabolism in human cell. I will present formal verification of biological responses, by Monte Carlo simulation and generation of reachability graph.

Multi-Objective Evolutionary Recurrent Neural Network Ensemble for Convergence Based Prediction of Computational Fluid Dynamic Simulations

Thursday 19 June 2014

15:30 to 16:30
Chris Smith, PhD Student, Department of Computing, University of Surrey

Using a surrogate model to evaluate the expensive fitness of candidate solutions in an evolutionary algorithm can significantly reduce the overall computational cost of optimization tasks.

In this talk I will present a hybrid multi-objective evolutionary algorithm that trains and optimizes the structure of a recurrent neural network ensemble that is used as a surrogate for the long-term prediction of computational fluid dynamic (CFD) simulations.

The surrogate model is used to predict the outcome of fully converged CFD simulations, based on intermediate convergence data. The aim is to stop each CFD simulation early, before full convergence and project what the outcome would be. This type of surrogate could reduce the computational cost of each individual CFD calculation and hence represent an overall computational saving during an optimization procedure.

Initial work concentrated on the prediction of transonic flow conditions and five selection methods for constructing the ensemble of predictors were tested on six data sets. The accuracy of the ensembles is compared to the converged CFD data, as well as to the delta change between two flow conditions. The method presented can produce accurate and stable results using a third of the intermediate data needed for convergence.

Following this initial work a second study has been performed on a data set for high-lift aerodynamic flow conditions, where the flow features are typically highly complex. Analysis of 2D high-lift RANS CFD computations will be presented, as well as the prediction performance for a parametric study of flap_lap, flap_gap and angle of incidence.

Recent Robotic Systems Developed in China's State Key Laboratory of Robotics

Monday 23 June 2014

14:00 to 15:00
Dr. Jinguo Liu, Professor, Assistant Director, State Key Laboratory of Robotics (SKLR), Shenyang Institute of Automation (SIA), Chinese Academy of Sciences (CAS), China

This presentation aims to provide an overview of the main research and development issues in the State Key Laboratory of Robotics (China). SKLR has over forty years of experience in robotics R&D since the Father of Robotics in China Mr. Xinsong Jiang (1931-1997), an Academician of the China Academy of Engineering, first initiated relevant advocacy in 1972. SKLR’s recent advancement in robotics has made impact in a wide range of application areas, most notably for exploration in extreme environments such as the space and deep sea, such as: the first Chinese lunar rover Yutu (‘Jade rabbit’) landed successfully on the Moon in December 2013; three different types of robots were deployed to assist the search and rescues following the Ya’an earthquake in 2013; In deep sea exploration, Chinese submersible vehicle Jiaolong reached a record depth of 7062 meters in 2012. SKLR also applied robotic technologies during various expeditions to the Poles including to Antarctica in 2007 and 2012, and to Arctic in 2008 and 2010. Nevertheless, SKLR’s researchers have also identified major technical challenges for achieving robust, reliable, and autonomous operations in future deep sea or space using robots. To meet China government’s mid-long term goals of robotics technology, SKLR would benefit greatly from more basic researches as well as international collaboration to enhance its capability in both technology and hardware development.

Provenance of 3D printed objects

Monday 23 June 2014

11:00 to 12:00
Nawfal Al Hashimy, PhD Student, Department of Electronic and Computer Science, University of Southampton

The introduction of affordable 3D printers made a significant impact on personal fabrication artistic designs that may or may not be covered by Intellectual Property Rights (IPR). Therefore copyright holders or creators of 3D objects have a legitimate concern about sharing 3D objects. my work presents a model for signing printable 3D objects to address the IPR issue. 3D files contain object geometry plus a number of attributes however it lacks security attributes when it comes to provenance procedures as it uses inherited security protocols for digital documents, digital media that are not intended for 3D objects.

Stuart Irvine

Wednesday 25 June 2014

14:30
Professor Stuart Irvine, Prifysgol Glyndŵr University

Further information to follow.

Pre- and Post-Award Research Finance

Wednesday 25 June 2014

12:45
Michele Dodd, Sarah Gillies, Phil Lidiard (Research Finance), Phil Walker (Physics), Adrian Hilton (CVSSP)

As part of the FEPS e3i ‘Inform’ programme, we will be holding a lunchtime seminar on Pre- and Post-Award Research Finance on Wednesday 25th June in 40AA03, with lunch available from 12:45 and the seminar running from 13:00 to 14:00.

Physics Open Days June 2014

Friday 27 June 2014

10:00am

The Department of Physics welcomes prospective undergraduate students and their families during the University wide Open Days on 27th and 28th June 2014.

CV Workshop & Surgery for PGRs

Tuesday 1 July 2014

11:00 to 13:00

All PGR students are invited to a CV workshop, followed by a ‘surgery’ with bookable 1:1 slots where you can have a personal CV review with an employer. The session is being run by Sally Williams from NPL and Keira Lawrence from BAE Systems Applied Intelligence, (formerly Detica).

UKSAF Summer Meeting

Wednesday 2 July 2014

09:00 to 16:30

Material, Fuel, and Power Train Selection for Low Carbon Vehicles

Wednesday 16 July 2014

13.00 hrs to 14.00 hrs
Roland Geyer, Associate Professor – Industrial Ecology, Green Supply Chain Management

Worldwide, efforts are increasing to reduce greenhouse gas (GHG) emissions from transportation in general and road vehicles in particular. The two technological avenues for road vehicles that arguably receive the most attention at the moment are alternative structural materials and alternative fuel-powertrain combinations.

Civil Engineering Research Seminar - July 2014

Thursday 17 July 2014

13:00 to 14:00
Miss Anju Goel

Acoustic source tracking in a room environment

Monday 21 July 2014

14:00 to 15:00
Dr Xionghu Zhong, Nanyang Technological University (Singapore)

2014 BYOB CubeSat Workshop

Friday 25 July 2014

Following on from the success of our 2013 event, Surrey Space Centre (SSC) and AMSAT-UK invite CubeSat developers to bring their equipment to a ‘Bring Your Own Board’ (BYOB) workshop. The aims are to demonstrate your latest CubeSat developments, to foster new partnerships and links within the UK and EU community, and encouraging more interaction with AMSAT-UK and the Colloquium (more info at: http://amsat-uk.org/colloquium/colloquium-2014/).

Civil Engineering Research Seminar - August 2014

Thursday 28 August 2014

13:00 to 14:00
Miss Leticia Llano Trueba

Inventing the Future: An Evening with Greg Foot

Tuesday 23 September 2014

18:00 to 19:30
Greg Foot

An evening celebrating researchers making their scientific creativity a reality, hosted by Greg Foot.

Please register for the event on the form provided.

Baxter Research Robot - A safe, affordable platform for academic and corporate labs

Monday 29 September 2014

11:00 to 12:00
Becky Yelling, Horatio Coles-Abell and Alan Braithewaite, Active Robots Limited

The 21st Joint Annual Conference of CSCST-SCI

Saturday 25 October 2014

08:00 to 18:00
TBC

To register, please visit http://conference2014.cscst.org/.

Site Visit to CCFE (Culham Centre for Fusion Energy)

Wednesday 3 December 2014

CCFE (http://www.ccfe.ac.uk/CCFE.aspx) is the UK's national laboratory for fusion research and is owned and operated by the UKAEA.

ISIE Biennial Conference at the University of Surrey

Tuesday 7 July 2015

The Society’s next conference will be held at the University of Surrey - a campus University at the town of Guildford in the county of Surrey in the South East of England, about 50km (35 minutes by rail) from central London. Transport to Guildford is easy, via Heathrow or Gatwick airport, by Eurostar train to London or, for a more leisurely journey, by ferry from St. Malo or Cherbourg to Portsmouth with a direct train from the ferry terminal to Guildford (one hour).

BAMC 2017 to be hosted at Surrey

Monday 10 April 2017

The 2017 British Applied Mathematics Colloquium will be hosted by the Department of Mathematics at Surrey. It will be held around Easter time in 2017. The chair of the organising committee is Peter Hydon, the secretary is David Lloyd, and the treasurer is Anne Skeldon. A key aim of the programme is to encourage applied mathematicians to cross disciplinary boundaries

Page Owner: th0011
Page Created: Wednesday 15 July 2009 10:49:41 by lb0014
Last Modified: Friday 27 June 2014 16:42:53 by pg0016
Expiry Date: Friday 15 October 2010 10:48:33
Assembly date: Fri Aug 01 19:40:31 BST 2014
Content ID: 9749
Revision: 23
Community: 1056