Log in
Our research team has developed new approaches to classifying demand series as `intermittent' and `lumpy', and devised new variants of the standard Croston's method for intermittent demand forecasting, which improve forecast accuracy and stock performance. These approaches have impacted the forecasting software of Syncron and Manugistics, through the team's consultancy advice and knowledge transfer. Subsequently, this impact has extended to Syncron International and JDA Software, which took over Manugistics. These companies' forecasting software packages have a combined client base turnover of over £200 billion per annum, and their clients benefit from substantial inventory savings from the new approaches adopted.
Work undertaken at the Applied DSP and VLSI Research Group since the early/mid nineties, has led to a number of significant contributions underpinning the development and commercial exploitation by industry of power efficient and complexity reduced integrated Digital Signal Processing (DSP) systems and products. These developments have paved the way for a new paradigm in the design of complexity reduced electronic systems aiding the emergence of numerous new commercial application areas and products in a diversity of fields. Indeed, these developments continue their currency and applicability in today's electronic products sector and thus shall be at the core of this case study.
Our impact on the theory and practice of biometrics (identification of individuals through measurement/analysis of their physiological/behavioural characteristics) embraces contributions to technological development, to general systems-level principles and to public policy and professionalisation issues. Our research and consequent engagement across the stakeholder community has impacted on the technological development of practical biometrics through take-up by industry (e.g. InMezzo, one of the UK's leading secure information specialists, has enhanced identity authentication procedures), company spinout (the EFIT-V facial recognition suite from VisionMetric Ltd fundamentally changed the means by which facial composites are created and is now used by more than 85% of Britain's Police Forces), leadership of the development of standards for the expanding commercial marketplace (e.g. establishment of standards for image acquisition for e-passports and other access control applications) and policy-level input to Government and International Professional Bodies, providing long-term support for practical deployment and end- user engagement (the Biometrics Assurance Group with Fairhurst as an independent member reported the security risk and problems identifying fingerprints within the UK government's £5.6bn ID card scheme proposal).
This case study reports our work on the development, application and dissemination of innovative cloud-based technologies to industrial problem domains. First, decentralised scheduling is implemented within federated Clouds, to facilitate the new drug discovery process for a global pharmaceutical company. Second, multi-objective approaches to the management and optimisation of video processing and analysis workflows in distributed environments is described in the context of an SME organisation that is developing new products, services and markets. Both of these examples have attracted, and continue to attract, commercial funding, and demonstrate the efficacy of knowledge transfer into industry from University of Derby (UoD) research.
Impact:
The underpinning research was exploited to design an exceptionally efficient Real-Time Operating System (RTOS), used in automotive Electronic Control Units (ECUs), and its associated schedulability analysis tools. Since 2008, the RTOS has been deployed in 50 to 55 million new ECUs each year. The RTOS has been standardised upon (used by default in all ECUs) by [text removed for publication]. ([text removed for publication] in terms of world-wide automotive powertrain systems suppliers. [text removed for publication] all rank in the top [text removed for publication] world-wide for chassis electronics). The RTOS is used in cars produced by [text removed for publication] as well as many others. Revenues from the RTOS exceed [text removed for publication] per year.
Advanced technologies for data visualisation and data mining, developed in the Unit in collaboration with national and international teams, are widely applied for development of medical services. In particular, a system for canine lymphoma diagnosis and monitoring developed with [text removed for publication] has now been successfully tested using clinical data from several veterinary clinics. The risk maps produced by our technology provide early diagnosis of lymphoma several weeks before the clinical symptoms develop. [text removed for publication] has estimated the treatment test, named [text removed for publication], developed with the Unit to add [text removed for publication] to the value of their business. Institute Curie (Paris), applies this data mapping technique and the software that has been developed jointly with Leicester in clinical projects.
Memory violations are a major cause of security breaches and operational flaws in today's software systems. Proving memory safety was traditionally a core challenge in program verification due to the high complexity of reasoning about pointer manipulations. Researchers at Queen Mary and Imperial jointly produced breakthrough algorithms for automatically reasoning about pointers, enabling highly-scalable automatic verification for industrial code. These techniques resulted in the industrial program analysis tool INFER developed by Monoidics Ltd, and used by customers across the world. The verification algorithms developed at Queen Mary and Imperial were also incorporated in Microsoft tools used to secure Windows device drivers.
The Network & Information Security Technology Lab (NISTL) at Liverpool John Moores University (LJMU) conducts research in securing networked systems against the growing threat of cyber crime. The research has generated a correlated set of new security protocols, novel system composition methods and efficient digital forensic analysis schemes for more effective layered security protection. Their main impacts for the period 01/2008 - 07/2013 are highlighted below:
In addition to the above direct impacts, our work is also beneficial to other organisations and even the general public, as they all require security techniques for information protection.
By default, Internet traffic is vulnerable to eavesdropping and modification. TLS is a protocol that has become the de facto method for securing application-layer messages. TLS is implemented in all major web browsers and servers and is used daily by hundreds of millions of people for applications such as e-commerce, social networking and Internet banking. Royal Holloway researchers identified flaws in the way in which TLS encrypts data, resulting in practical attacks that compromised the security goals of TLS. The researchers also helped major vendors, such as Google, Microsoft and Oracle, to assess and develop countermeasures to the attacks.
Inverse kinematics mathematics developed at Surrey for satellite control is being commercialised for motion capture, film animation and for real-time animation in computer games through IKinema, a University of Surrey spin-out company. Ikinema is the most advanced full-body IK solver and has been used in films such as X-men First Class and Wrath of the Titans 2; it is embedded in Luxology's modo-601, and is used by major film studios including 20th Century Fox, Disney, Lucas Film, ILM, and visual effects specialists and game developers such as Framestore, Square Enix, and AudioMotion. IKinema currently employs 6 staff and is profitable, with 80% of sales revenues generated by export.