A tool for testing global accessibility of open data resources (available)

Research depends on data that is openly available. Recently, it has become clear that access to repositories that store these data sets is variable across the country that accesses the data. This can be due to poor connectivity for Lower income countries to countries that are actively blocked from accessing specific sites. A set of … full description “A tool for testing global accessibility of open data resources (available)”

A Web interface to the ART software language engineering toolkit (available)

ART is a software tool developed with the Centre for Software Language Engineering which addresses a spectrum of modern programming language technologies, including generalised parsing, attribute grammar evaluation and executable formal semantics specifications. ART is used extensively in our course CS3480 Software Language Engineering and will shortly be released for general use. We would like to … full description “A Web interface to the ART software language engineering toolkit (available)”

Algorithmic Game Theory and Computational Social Choice (available)

This project will be co-supervised with Eduard Eiben. We will study a topic arising from Algorithmic Game Theory and/or Computational Social Choice. The specific topic/area will be defined during an inital meeting with Eduard and myself. Some examples of such topics are (this list is by no means exhaustive):– Computation of Nash Equilibria;– Fair Division … full description “Algorithmic Game Theory and Computational Social Choice (available)”

Automated verification of Rowhammer mitigations (available)

Rowhammer [1], first introduced in [2], is a security exploit that relies on electromagnetic side-effects happening in DRAM memories due to repeated accesses to the same row(s) in a short period of time. In fact, accessing the same row in the DRAM many times in a short span of time may cause electromagnetic interactions with … full description “Automated verification of Rowhammer mitigations (available)”

Binary Neural Networks in C (available)

Neural Networks (NNs) are powerful and popular machine learning models used in natural and social sciences and various commercial frameworks. Their strengths come from the potentially-large flexibility and the possibility of training them through scalable methods, e.g. stochastic gradient descent. On the other hand, trained NNs have a huge memory footprint, as millions of real-valued … full description “Binary Neural Networks in C (available)”

Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)

Project Description Data, primarily related to consumers is a crucial part of the modern tech-companies like Google, Facebook, Instagram, and non-tech-companies (superstores, insurance companies, etc.) alike have now started to rely heavily on consumer data for various commercial activities. Although the General Data Protection Regulation (GDPR) enhances the rights of the consumers from a technical … full description “Corporate Transparency – Enabling Consumers Track and Vet their Data Usage (available)”

Correct and Certified Regular Expressions (available)

In programming language research ideas are explored in an ofte repeated loop. You have an idea then propose the language feature to study, its semantics, and the prove it has the properties you expect (type safety, performance, expressivity, etc.). In this project, we want to explore such a cycle working with regular expressions as the … full description “Correct and Certified Regular Expressions (available)”

COVID-19 – Mobile phone based passport applications (available)

Project Description We have all been affected by COVID19. Amongst the main driving forces for reopening international borders and enabling traveling is the existence of COVID19 immunity passports. However, there are serious considerations around the overall trust, security, privacy but also ethical dimensions of such proposals. This project aims to take into account the views … full description “COVID-19 – Mobile phone based passport applications (available)”

Increasing the Efficiency of Low-land Natural Disaster Search and Rescue through ‘Supervised Hybrid Animal-UAV Interactions’ (available)

Search and Rescue (SAR) is a time-critical event: after a finite period of time the chances of recovering individuals who have become lost, or trapped in the wake of a disaster, trend towards zero. As a result, management of search and rescue resources is paramount. Travel time, planning and executing search grids, are pivotal tasks … full description “Increasing the Efficiency of Low-land Natural Disaster Search and Rescue through ‘Supervised Hybrid Animal-UAV Interactions’ (available)”

Natural Language Understanding: Measuring the Semantic Similarity between Sentences (ongoing)

Overview To implement and design various deep neural networks for measuring the semantic similarities between sentence pairs. Background Natural language understanding (NLU) is widely viewed as a grand challenge in Artificial Intelligence (AI). An important sub-task in NLU is to measure the semantic similarity between sentence pairs, also known as the Semantic Textual Similarity (STS) task. A … full description “Natural Language Understanding: Measuring the Semantic Similarity between Sentences (ongoing)”

Penetration Testing of Autonomous Vehicle Sensor Arrays (available)

Project Description The adoption of autonomous vehicles is a matter of when and how, rather than if it will happen. Domestic (private) and commercial (freight) autonomous vehicles are a proven concept, with most remaining questions regarding adoption hanging on the reliability and security of said vehicles. It is well-known that side-channel attacks exploiting peripheral systems, … full description “Penetration Testing of Autonomous Vehicle Sensor Arrays (available)”

Personality Identification Using Online Social Media Networks (completed)

Project Description Personality is a combination of all the attributes—behavioural, temperamental, emotional, and mental—that characterise a unique individual. Ability to identify the personalities of people has always been of great interest to the researchers due to its importance. Owing to the increasing popularity of online social networks there is a possibility of predicting a user’s … full description “Personality Identification Using Online Social Media Networks (completed)”

Prototyping access to FAIR digital objects (available)

Open data drives much of research. The FAIR principles are a set of general principles on how to enable sharing of open data. The workflow for programmatic access of such data requires developing an understanding of the API (usually with RESTful interface) of the relevant data set even if one has the relevant Persistent Identifier … full description “Prototyping access to FAIR digital objects (available)”

Software framework implementation for air quality monitoring system (available)

The project requires the installation and use of commercially developed Python based software packages on a Raspberry Pi 3 board which access commercial sensors to measure air quality. The software has calibration, data acquisition and data storage functions. The hardware platform is based around 4 air contaminants Alphasense sensors mounted on an Alphasense AFE (analogue … full description “Software framework implementation for air quality monitoring system (available)”

Speak to Pay – Voice and Chip Payment Framework (available)

Project Description Payment architectures are in constant evolution, from Chip&Pin to contactless to facial-recognition based transactions. Also, with the advent of smart assistants like Siri, Amazon Alexa, and Google Assistant takes a cue from their respective users through voice commands. This project will explore the potential of using voice recognition/control as an authorisation of an … full description “Speak to Pay – Voice and Chip Payment Framework (available)”

The Security Theory Map (completed)

Description of the project: Real world security is a multi-dimensional problem and therefore needs multiple theoretical lenses and analyses to understand and positively impact the application of security. This digital tool presents to the user a large range of the underpinning theories about security (and their constituent parts). These theories condition the outputs of security … full description “The Security Theory Map (completed)”