Validating And Optimising The Analysis Of Magnetic Resonance Physiology Data
Funder
National Health and Medical Research Council
Funding Amount
$91,725.00
Summary
Combined electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) is used to detect the anatomical areas in the brain that show electrical activity. Several centres worldwide use this technique to localise the seizure focus in patients with epilepsy. However, there is a lack of validation of the currently applied techniques. Current analysis methods have been developed and validated for other fMRI paradigms, such as motor tasks. It is not known whether the same principles ar ....Combined electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) is used to detect the anatomical areas in the brain that show electrical activity. Several centres worldwide use this technique to localise the seizure focus in patients with epilepsy. However, there is a lack of validation of the currently applied techniques. Current analysis methods have been developed and validated for other fMRI paradigms, such as motor tasks. It is not known whether the same principles are applicable and optimal for fMRI-EEG data. The proposed project aims at validating and optimising the analysis strategies for fMRI-EEG data.Read moreRead less
E-DADS: Early Detection Of Alzheimer’s Disease Subtypes
Funder
National Health and Medical Research Council
Funding Amount
$488,725.00
Summary
Alzheimer's disease manifests differently in different people. Some people may get the disease at younger ages or they may progress in the disease much faster than others. This grant aims to use large amounts of data from around the world to understand why these differences exist. This knowledge will be converted into a tool where data from a specific individual can be used to forecast if and when they will get the disease and how fast that disease will progress and how it could be prevented.
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
New Insights on Modelling Time Trends with Panel Data: Theory and Practice. This project aims to tackle important challenges in time trend modelling by taking advantage of panel data structures. This project expects to propose flexible models in time trend modelling to retrieve reliable inference. The expected outcomes include innovative econometric models and methods that have a wide range of applications, and are particularly suited for empirical problems within large and complex systems. This ....New Insights on Modelling Time Trends with Panel Data: Theory and Practice. This project aims to tackle important challenges in time trend modelling by taking advantage of panel data structures. This project expects to propose flexible models in time trend modelling to retrieve reliable inference. The expected outcomes include innovative econometric models and methods that have a wide range of applications, and are particularly suited for empirical problems within large and complex systems. This will provide significant benefits to all fields in which data displays any form of trending behaviour. The proposed model is used to evaluate the economic consequences of climate change and global housing market contagion, which provide strong evidence-based insights to the environmental and economic policies in Australia.Read moreRead less
If Australia’s health system is to benefit from the digital revolution, we need much more than new technology; we need research evidence, skills and workforce to translate these advances into effective working health services. The Centre for Research Excellence in Digital Health brings together for the first time the major Australian centres of e-health research to tackle the fundamental challenges that impede the creation of truly safe, efficient and effective digital health services.
The Use Of Real-World Evidence To Support Regulatory And Reimbursement Decisions
Funder
National Health and Medical Research Council
Funding Amount
$91,538.00
Summary
Traditionally, medicines are studied extensively in clinical trials before they are widely available. More recently, some medicines have been allowed to enter the market without complete data on their benefits and risks. This means that these issues can only be studied once a medicine is on the market and used in routine clinical practice; this is referred to as real-world evidence. This research evaluates if this evidence is sufficient to prove that a medicine is safe and that it works
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less