New high-performance iterative error correction codes. This project develops new error correction codes to underpin the success of next-generation communications technologies. The nature of the project presents significant potential for project outcomes to be beneficial to the Australian telecommunications industry in a wide range of application areas from optical communication to digital broadcasting.
Optimising throughput and Delay in network coded systems. This project addresses one main disadvantage of network coding: decoding delay. By solving this issue, we will unlock the true potential of network coding: delivery of high data rates in wireless and wireline networks. This will make network coding an attractive choice for live video streaming and mission-critical delay-sensitive applications.
Autoconfiguration of critical network infrastructure. In 2000, Vitek Boden hacked into Maroochy Shire's sewerage system, causing hundreds of kilolitres of raw sewage to flow into a public area, causing financial and environmental damage, and the potential for the spread of life-threatening disease. The goal of this project is to improve the security of Australia's critical infrastructure, for instance, electricity and water supply. The project’s approach is to simplify the critical bottlenecks i ....Autoconfiguration of critical network infrastructure. In 2000, Vitek Boden hacked into Maroochy Shire's sewerage system, causing hundreds of kilolitres of raw sewage to flow into a public area, causing financial and environmental damage, and the potential for the spread of life-threatening disease. The goal of this project is to improve the security of Australia's critical infrastructure, for instance, electricity and water supply. The project’s approach is to simplify the critical bottlenecks in communication between plant equipment and company management, namely, the firewall that protects the critical plant equipment from viruses and hackers. Simplification will improve transparency and hence reduce the possibility that security holes allow an incident similar to that of this incident, or worse.Read moreRead less