Design of a Reference Methodology for Extended Enterprise Architecture. Enterprises have nowadays a very critical perception of the actual benefits of Information Technology (IT). Significant investments in IT infrastructures have been made. However, in many cases no monetary benefits could be demonstrated. Enterprises Architectures provide a way to link the business and the IT perspective. This project aims to develop an operational methodology with a solid theoretical foundation for the design ....Design of a Reference Methodology for Extended Enterprise Architecture. Enterprises have nowadays a very critical perception of the actual benefits of Information Technology (IT). Significant investments in IT infrastructures have been made. However, in many cases no monetary benefits could be demonstrated. Enterprises Architectures provide a way to link the business and the IT perspective. This project aims to develop an operational methodology with a solid theoretical foundation for the design of such Enterprise Architectures. The outcomes and the innovation of this project are an extension of the popular Zachman Framework. Integrated modelling techniques proposed within the Architecture of Integrated Information Systems will be used to populate this framework.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Application of the Wavelet Transform to Isostatic Analyses in Australia. Existing methods of determining the Earth's isostatic response assume ideal but unrealistic conditions. This project will develop a new technique for isostatic analysis, using the two-dimensional wavelet transform. This tool can resolve spectral components of geophysical data in the space domain, thus avoiding the problems arising during the conventional Fourier analysis. With innovative processing methods, maps of the crus ....Application of the Wavelet Transform to Isostatic Analyses in Australia. Existing methods of determining the Earth's isostatic response assume ideal but unrealistic conditions. This project will develop a new technique for isostatic analysis, using the two-dimensional wavelet transform. This tool can resolve spectral components of geophysical data in the space domain, thus avoiding the problems arising during the conventional Fourier analysis. With innovative processing methods, maps of the crustal thickness from gravity and topography data can be generated, a task usually reserved for costly seismic experiments. Analysis of the wavelet power spectrum would also benefit the exploration industry by identifying previously unknown sedimentary basins.Read moreRead less
Optimal Robust Fitting under the Framework of LP-Type Problems. The project aims to develop algorithms to support the development of robust and accurate computer vision systems. Real-world visual data (images, videos) is inherently noisy and outlier prone. To build computer vision systems that work reliably in the real world, it is necessary to ensure that the underlying algorithms are robust and efficient. The project aims to devise novel algorithms that can compute the best possible result giv ....Optimal Robust Fitting under the Framework of LP-Type Problems. The project aims to develop algorithms to support the development of robust and accurate computer vision systems. Real-world visual data (images, videos) is inherently noisy and outlier prone. To build computer vision systems that work reliably in the real world, it is necessary to ensure that the underlying algorithms are robust and efficient. The project aims to devise novel algorithms that can compute the best possible result given the input data in a short amount of time. The expected outcomes would support the construction of reliable and accurate computer vision-based systems, such as large-scale 3-D reconstruction from photo collections, self-driving cars and domestic robots.Read moreRead less
Information Systems Enabled Corporate Transformation: Evaluation of Electronic Customer Relationship Management in the Service Sector. Customer relationship management (CRM) is a business and marketing strategy that integrates technology, process and business activities around the customer. Only 30% of electronic CRM efforts have been successfully implemented because stakeholder expectations are typically neglected. This issue underlines the importance of the ?soft? organisational issues involve ....Information Systems Enabled Corporate Transformation: Evaluation of Electronic Customer Relationship Management in the Service Sector. Customer relationship management (CRM) is a business and marketing strategy that integrates technology, process and business activities around the customer. Only 30% of electronic CRM efforts have been successfully implemented because stakeholder expectations are typically neglected. This issue underlines the importance of the ?soft? organisational issues involved with the evaluation of information systems. By evaluating the change management process and modelling the impact of e-CRM enabled change, management strategies will be developed to enable its successful implementation. The research will provide a greater understanding for evaluating the performance of e-CRM solutions, as well as uncover opportunities for organisational related change.Read moreRead less
Visual Solutions for Automated Translation Between Spoken and Signed Languages. We propose to build a robust visual speech recognition system that analyzes images of spoken language and achieves a recognition of the utterances with at least human expert recognition rates. This visual speech recognition system will then be integrated with our existing gesture recognition system to improve performance, just as humans combine visual and audio data for language understanding. The result will be a sy ....Visual Solutions for Automated Translation Between Spoken and Signed Languages. We propose to build a robust visual speech recognition system that analyzes images of spoken language and achieves a recognition of the utterances with at least human expert recognition rates. This visual speech recognition system will then be integrated with our existing gesture recognition system to improve performance, just as humans combine visual and audio data for language understanding. The result will be a system providing translation between English and the Australian sign language Auslan in a practical application domain. Significantly, our work will provide insights into the cognitive models of neural activity linking language and gesture.Read moreRead less
WAVELET-BASED MODELLING AND MODEL PREDICTIVE CONTROL OF COMPLEX MULTIDIMENSIONAL CRYSTALLISATION PROCESSES. The results of this project will directly contribute to a better understanding of crystallisation which is an important unit operation to achieve high purity separations. Many Australian industries for example, mineral processing, sugar processing, pharmaceuticals, etc will benefit from the results in order to enhance optimal operation and control to ensure globally competitive production ....WAVELET-BASED MODELLING AND MODEL PREDICTIVE CONTROL OF COMPLEX MULTIDIMENSIONAL CRYSTALLISATION PROCESSES. The results of this project will directly contribute to a better understanding of crystallisation which is an important unit operation to achieve high purity separations. Many Australian industries for example, mineral processing, sugar processing, pharmaceuticals, etc will benefit from the results in order to enhance optimal operation and control to ensure globally competitive production which is on time, minimize wastes and raw materials and inventories. The leading edge results will increase the contributions of these industries to the Australian economy and our global competitiveness necessary to maintain our culture and the beauty of our environment. Read moreRead less
Validation of Synthetic Regional Gravity Field Models. This research will further develop the theoretical and practical methods required to test any model of the Earth's gravity field. Previously, geodesists have had to rely on analytical error estimates, usually based on observed data. A synthetic Earth gravity model avoids this scenario by giving an exact validation technique of the methods used. The synthetic model will allow users of geoid models (e.g., for GPS heighting) to have much mor ....Validation of Synthetic Regional Gravity Field Models. This research will further develop the theoretical and practical methods required to test any model of the Earth's gravity field. Previously, geodesists have had to rely on analytical error estimates, usually based on observed data. A synthetic Earth gravity model avoids this scenario by giving an exact validation technique of the methods used. The synthetic model will allow users of geoid models (e.g., for GPS heighting) to have much more confidence in their results. When used with a precise geoid model, GPS is faster and cheaper than conventional spirit-levelling, offering around 800% productivity gains. Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less