Robust and Scalable Autonomous Landing for Drones. The aim of this project is to develop a transformative robust and scalable autonomous landing system for drones. This is the critical missing technology needed to unleash exponential growth in a potentially enormous drone delivery industry by enabling a multitude of applications to deliver goods and supplies via drones to a wide range of destinations in Australia and the world in a timely, flexible and accurate manner. Such an autonomous landi ....Robust and Scalable Autonomous Landing for Drones. The aim of this project is to develop a transformative robust and scalable autonomous landing system for drones. This is the critical missing technology needed to unleash exponential growth in a potentially enormous drone delivery industry by enabling a multitude of applications to deliver goods and supplies via drones to a wide range of destinations in Australia and the world in a timely, flexible and accurate manner. Such an autonomous landing solution would revolutionise drone technology, and propel Australia to the forefront of technology innovation. This project would benefit not only large scale delivery by drone in urban and suburban areas of Australia but also long distance delivery via drone to remote areas of Australia.Read moreRead less
An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used b ....An extensible framework for analysis of Java language-based security conformance. Java is a programming language and platform running on 3 billion devices. While Java provides a sandbox-based security architecture within the Java Class Library to protect systems from untrusted code downloaded from Internet, it cannot defend against implementation bugs that occur in the Java Class Library. The goal of this project is to provide a formal model of the Java security architecture, which can be used by program analysers to identify faulty or insufficient security checks in the Java Class Library that may lead to the sandbox being bypassed.Read moreRead less
Onset Theory: Pushing the design envelope for textile composite structures. This study aims to exploit an innovative physics-based approach to predict the strength of textile composites. This is particularly important in areas such as aircraft design, where drastic weight savings are needed to allow designers to remain competitive in a low-carbon future. Improved theory and design tools will remove conservatism and account for a large part of these weight savings. The new approach is the first t ....Onset Theory: Pushing the design envelope for textile composite structures. This study aims to exploit an innovative physics-based approach to predict the strength of textile composites. This is particularly important in areas such as aircraft design, where drastic weight savings are needed to allow designers to remain competitive in a low-carbon future. Improved theory and design tools will remove conservatism and account for a large part of these weight savings. The new approach is the first to be consistent at all length scales — from atoms to aeroplanes — ensuring relevance for new and evolving composite material systems. A novel understanding of crack initiation in textile laminates is intended to reduce design and certification effort for new aircraft and help to design more efficient airframes at a lower cost.Read moreRead less
Vision Model Based Perceptual Digital Video Coding. Digital video coding and compression is an enabling technology and has diversified applications in audiovisual communications, multimedia computing, digital television broadcast and electronic entertainment industries. The project aims at spearheading research in theory, techniques and implementation of perceptual video coding in order to achieve constant and guaranteed quality in visual communications and services. It will explore a new appr ....Vision Model Based Perceptual Digital Video Coding. Digital video coding and compression is an enabling technology and has diversified applications in audiovisual communications, multimedia computing, digital television broadcast and electronic entertainment industries. The project aims at spearheading research in theory, techniques and implementation of perceptual video coding in order to achieve constant and guaranteed quality in visual communications and services. It will explore a new approach to digital video coding other than the constant bit rate coding techniques which have dominated digital video research for the past four decades. It will form a part of the theoretical foundation and principles for the next generation video coding and compression techniques, and may lead to new standards and practice.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE140100082
Funder
Australian Research Council
Funding Amount
$500,000.00
Summary
An Australasian facility for the automated fabrication of high performance bespoke components. A facility for the automated fabrication of high performance bespoke components: The project will create a new coordinated facility for composites research including modern automated infrastructure. The facility will bring Australia in line with leading international research centres and promote fundamental and applied research into a range of fields including underwater renewable energy systems, space ....An Australasian facility for the automated fabrication of high performance bespoke components. A facility for the automated fabrication of high performance bespoke components: The project will create a new coordinated facility for composites research including modern automated infrastructure. The facility will bring Australia in line with leading international research centres and promote fundamental and applied research into a range of fields including underwater renewable energy systems, space vehicle structures, multifunctional and smart materials and infrastructure capacity extension. The facility will position Australian research for significant international collaboration through endorsement of next-generation manufacturing technology and enable leading outcomes for Australasian science and engineering in aerospace, marine, civil, automotive, renewable energy and primary resources.Read moreRead less
Improving Upper and Lower Bounds on the Order of Large Graphs under Degree and Distance Constraints. Networks govern all aspects of society, including transportation networks, communication networks, computer networks and networks for the distribution of goods etc. - and the theoretical analysis of such networks has become a subject of fundamental importance. Networks can be modelled by graphs. This project will provide new theoretical results which will improve our knowledge of network topologi ....Improving Upper and Lower Bounds on the Order of Large Graphs under Degree and Distance Constraints. Networks govern all aspects of society, including transportation networks, communication networks, computer networks and networks for the distribution of goods etc. - and the theoretical analysis of such networks has become a subject of fundamental importance. Networks can be modelled by graphs. This project will provide new theoretical results which will improve our knowledge of network topologies. The new knowledge will then be utilised in the construction of large graphs with respect to given maximum degree and distance constraints.Read moreRead less
Development of an Integrated Platform for Performance-Based Safety Assessment. Building fires are the cause of major fatalities and injuries amongst all types of accidental fires in Australia. With significant advancement in numerical simulation technique, computer models are becoming acceptable tools for fire safety designs. Nonetheless, these methods still suffer from large amount of manual inputs and lengthy computational times. This research project will address the prevalent deficiency in m ....Development of an Integrated Platform for Performance-Based Safety Assessment. Building fires are the cause of major fatalities and injuries amongst all types of accidental fires in Australia. With significant advancement in numerical simulation technique, computer models are becoming acceptable tools for fire safety designs. Nonetheless, these methods still suffer from large amount of manual inputs and lengthy computational times. This research project will address the prevalent deficiency in many of these computer models and develop a novel and innovative design methodology. The success of this project will revolutionize the computational tools for the industry realizing a convenient, robust and time-saving integrated platform catering for increasing future market demand.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less