Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vecto ....Semantic Vectorisation: From Bitmaps to Intelligent Representations. The objective of this innovative project is to provide a solution to the open question of representing natural images by semantically rich vector graphics. The challenges are to identify key visual and temporal elements for images and videos, and efficiently decompose the visual data into semantic vector representations that are faithful to original data, compact and editable. The project aims to investigate new bitmap-to-vector conversion methods. It is expected to develop a framework where semantic labels and hyperlinks can be embedded in visual data automatically. It hopes to pioneer the creation of a web of images where the links are on image/video regions. New image simplification, stylisation, and non-photorealistic rendering methods are expected to be provided.Read moreRead less
Natural form, aesthetics and the human brain. This project aims to study how the brain represents the emotion of aesthetic experience. This project will establish the characteristics of flowers and floral design that govern their appeal using large scale web based data collection, and identify the neural representation of floral beauty using integrative data analysis. Outcomes of the project are expected to help flower growers and designers with product planning, supporting industry sustainabili ....Natural form, aesthetics and the human brain. This project aims to study how the brain represents the emotion of aesthetic experience. This project will establish the characteristics of flowers and floral design that govern their appeal using large scale web based data collection, and identify the neural representation of floral beauty using integrative data analysis. Outcomes of the project are expected to help flower growers and designers with product planning, supporting industry sustainability. The project will also establish how the brain generates positive experience in response to our visual environment, promoting well-being by enabling informed visual design decisions.Read moreRead less
A new theory of Aboriginal art. The paradigms developed by scholars have a huge impact on the value of art. After the Australian artworld repositioned Aboriginal art from the frame of 'primitive art' to that of contemporary art, the price of and market for Aboriginal art increased enormously. However, Aboriginal art failed to penetrate the international contemporary artworld because the paradigms of contemporary art within which it was framed were outmoded. Through examining the production of Ab ....A new theory of Aboriginal art. The paradigms developed by scholars have a huge impact on the value of art. After the Australian artworld repositioned Aboriginal art from the frame of 'primitive art' to that of contemporary art, the price of and market for Aboriginal art increased enormously. However, Aboriginal art failed to penetrate the international contemporary artworld because the paradigms of contemporary art within which it was framed were outmoded. Through examining the production of Aboriginal art from the perspectives of its producers and recent globalised contemporary art practices, this project aims to develop a new theory of Aboriginal art that is more aligned with the thinking of current curators who set the agenda at the upper end of the market.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE150100081
Funder
Australian Research Council
Funding Amount
$220,000.00
Summary
DomeLab: an ultra-high resolution experimental fulldome. DomeLab - an ultra-high resolution experimental fulldome: This project will establish the first ultra-high resolution (4000 x 4000 pixels) experimental fulldome in Australia (DomeLab). This fulldome facility will provide a powerful immersive dome-based video projection environment. Partners will work collaboratively across three themes: interactive media, future museology and experimental humanities. Through the national research services ....DomeLab: an ultra-high resolution experimental fulldome. DomeLab - an ultra-high resolution experimental fulldome: This project will establish the first ultra-high resolution (4000 x 4000 pixels) experimental fulldome in Australia (DomeLab). This fulldome facility will provide a powerful immersive dome-based video projection environment. Partners will work collaboratively across three themes: interactive media, future museology and experimental humanities. Through the national research services AARNet and Intersect's research data storage infrastructure, DomeLab will extend pioneering research in aesthetic frameworks and frontier technologies to benefit artistic, cultural, museological and humanities researchers. DomeLab is designed as a touring system and will be installed throughout the country at leading institutions. Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal healt ....Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal health monitoring. Embedded wireless communications software, however, is difficult to test and debug owing to the complexity of the operational environment and complications arising from the interplay between software and hardware. This project will develop an effective and automatic technology to alleviate these difficulties and achieve higher quality software.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
THE DEVELOPMENT OF MECHANISTIC MODELS FOR BUBBLY FLOWS WITH HEAT AND MASS TRANSFER. Commercially available CFD computer codes are currently widely used in many Australian industrial sectors. It is clearly recognised that the state-of-the-art models for dealing with complex bubbly flows with/without heat and mass transfer in these computer codes require further developments and improvements. This research project will address the prevalent deficiency in many of these computer codes. It is antici ....THE DEVELOPMENT OF MECHANISTIC MODELS FOR BUBBLY FLOWS WITH HEAT AND MASS TRANSFER. Commercially available CFD computer codes are currently widely used in many Australian industrial sectors. It is clearly recognised that the state-of-the-art models for dealing with complex bubbly flows with/without heat and mass transfer in these computer codes require further developments and improvements. This research project will address the prevalent deficiency in many of these computer codes. It is anticipated that through this major development of new models capable of predicting a wide range of industrial bubbly flow problems and implementation thereafter in these computer codes, industries will experience significant benefits especially reduce time and costs in their design and production.Read moreRead less
Experimental and Numerical Modelling of Gas-Liquid Flows. Multiphase flow systems are encountered in many process industries such as chemical, petroleum, mining, energy, food and pharmaceutical, which are fundamental to the Australian economy. Commercially available computer codes for simulating such systems are currently widely used in many Australian industrial sectors. This research project will address the prevalent deficiency in many of these computer codes and develop new models capable of ....Experimental and Numerical Modelling of Gas-Liquid Flows. Multiphase flow systems are encountered in many process industries such as chemical, petroleum, mining, energy, food and pharmaceutical, which are fundamental to the Australian economy. Commercially available computer codes for simulating such systems are currently widely used in many Australian industrial sectors. This research project will address the prevalent deficiency in many of these computer codes and develop new models capable of predicting a wide range of industrial bubbly flow problems. The resultant improved computer codes will provide industries with significant benefits - especially reduced times and costs in their design and production.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less