Project List

Mechanisation of subtyping for Go 1.18 (available)

Go 1.18 [1] has recently been released. This new version includes generics and more flexible interfaces. Generics allow programmers to define data structures and functions that work safely for several types, e.g., like List<E> in Java which defines lists that can store any value of type E, where E is any type (String, Boolean, etc). … full description “Mechanisation of subtyping for Go 1.18 (available)”

National cultures and security behaviours (available)

National culture, namely, the culture in a given country, can be broken down into specific variables. These variables define and influence social norms and behaviours of a society and its individuals. However, they also influence cyber security related perceptions and behaviours. Ans indicative and well-known approach on national cultures is the one by Hofstede, where … full description “National cultures and security behaviours (available)”

OSN Mining Platform – Building a public dataset for fake news research (available)

Project Description According to the Statista, in 2018 the UK had 44 million (66% of the population) active Online Social Networks (OSN) users. Whereas, globally, active OSN user population is 3,397 million. The most popular reason for using the OSN is to stay in touch with friends and family (42% of respondents) and stay up … full description “OSN Mining Platform – Building a public dataset for fake news research (available)”

Penetration Testing of Autonomous Vehicle Sensor Arrays (available)

Project Description The adoption of autonomous vehicles is a matter of when and how, rather than if it will happen. Domestic (private) and commercial (freight) autonomous vehicles are a proven concept, with most remaining questions regarding adoption hanging on the reliability and security of said vehicles. It is well-known that side-channel attacks exploiting peripheral systems, … full description “Penetration Testing of Autonomous Vehicle Sensor Arrays (available)”

Presenting Agent Simulation Experiments in COGNISIM (available)

When we simulate a system or a process, we normally want to imitate its operation over time. This need arises in a variety of contexts, from engineering to testing, training, education and video games. We are interested in simulation models that involve modeling human systems to gain an understanding of how they behave over time. … full description “Presenting Agent Simulation Experiments in COGNISIM (available)”

Prototyping access to FAIR digital objects (available)

Open data drives much of research. The FAIR principles are a set of general principles on how to enable sharing of open data. The workflow for programmatic access of such data requires developing an understanding of the API (usually with RESTful interface) of the relevant data set even if one has the relevant Persistent Identifier … full description “Prototyping access to FAIR digital objects (available)”

Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)

Project Description With an increase in the use of internet technologies in various fields, the traditional broadcasting industry also started to adopt systems, software and services based on internet technologies to provide their contents to viewers. Most of the connected media devices deployed still tend to have a low-security threshold inherited from the era of … full description “Security Evaluation of Broadcasting Network – Protecting the Entertainment Media (available)”

Self-localisation of drones using machine learning (available)

Drones are cool, but sometimes things go wrong. Imagine a drone is exploring an area, and all of a sudden the GPS signal becomes unreliable. How can the drone estimate its location, and avoid getting lost? Perhaps we can use data from its sensors and picture from the camera. In this project, we would like … full description “Self-localisation of drones using machine learning (available)”

Smart cars – Accident scene reconstruction (available)

Smart cars have a number of sensors monitoring the status of the vehicle and  at the same time assisting the driver. These sensors traditionally monitor temperature, battery levels, etc. They are relatively simple circuits that may also alert the driver for possible vehicle damage. Some of these are also working towards collision mitigation by monitoring … full description “Smart cars – Accident scene reconstruction (available)”

Smart Home Privacy Framework – Giving Right of Data Control to Individual Users (available)

Project Description The smart home is a collection of intelligent sensors and actuators that collect information of their vicinity with varying granularity. The collected data is of various formats audio, video, action (turn on and off buttons) and text, etc. Furthermore, these sensors will be collecting data from every person active in the vicinity. Separating … full description “Smart Home Privacy Framework – Giving Right of Data Control to Individual Users (available)”

Software framework implementation for air quality monitoring system (available)

The project requires the installation and use of commercially developed Python based software packages on a Raspberry Pi 3 board which access commercial sensors to measure air quality. The software has calibration, data acquisition and data storage functions. The hardware platform is based around 4 air contaminants Alphasense sensors mounted on an Alphasense AFE (analogue … full description “Software framework implementation for air quality monitoring system (available)”

Speak to Pay – Voice and Chip Payment Framework (available)

Project Description Payment architectures are in constant evolution, from Chip&Pin to contactless to facial-recognition based transactions. Also, with the advent of smart assistants like Siri, Amazon Alexa, and Google Assistant takes a cue from their respective users through voice commands. This project will explore the potential of using voice recognition/control as an authorisation of an … full description “Speak to Pay – Voice and Chip Payment Framework (available)”

The complexity of Neural Networks (available)

Neural Networks (NN) are powerful learning machines that allow you to extract meaningful information from historical data. Their strengths come from their flexibility and the possibility of training them through scalable methods, e.g. stochastic gradient descent. On the other hand, since NN depend on millions of real-valued parameters, using them has a high memory and … full description “The complexity of Neural Networks (available)”

Transparent Governance – Technology to hold Public/Private Sector to Account (available)

Project Description The costs to society of government corruption and low accountability are staggering. Countries on every continent struggle with entrenched corruption and opaque government processes, from graft and diversion of public funds to non-competitive procurement bidding processes. For several countries, public corruption is their single-largest challenge, costing the loss of funds, loss of opportunity, … full description “Transparent Governance – Technology to hold Public/Private Sector to Account (available)”

Transparent Supply Chain – Know the provenance of products in superstores (available)

Project Description Blockchain platform provides an immutable temporal record which can be utilised to collect transactional data throughout the supply chain. This can potentially offer an immutable provenance of individual goods/products with full traceability from source to store. A transparent supply chain creates an opportunity to optimise supply-and-demand management, build resilience and ultimately enable more … full description “Transparent Supply Chain – Know the provenance of products in superstores (available)”