Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less
Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is ....Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is relevant to public-key cryptography, where breaking an encryption scheme should be infeasible, and to many real-life situations where NP-complete problems need to be solved, either exactly or approximately.Read moreRead less
Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, ....Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
THE DEVELOPMENT OF MECHANISTIC MODELS FOR BUBBLY FLOWS WITH HEAT AND MASS TRANSFER. Commercially available CFD computer codes are currently widely used in many Australian industrial sectors. It is clearly recognised that the state-of-the-art models for dealing with complex bubbly flows with/without heat and mass transfer in these computer codes require further developments and improvements. This research project will address the prevalent deficiency in many of these computer codes. It is antici ....THE DEVELOPMENT OF MECHANISTIC MODELS FOR BUBBLY FLOWS WITH HEAT AND MASS TRANSFER. Commercially available CFD computer codes are currently widely used in many Australian industrial sectors. It is clearly recognised that the state-of-the-art models for dealing with complex bubbly flows with/without heat and mass transfer in these computer codes require further developments and improvements. This research project will address the prevalent deficiency in many of these computer codes. It is anticipated that through this major development of new models capable of predicting a wide range of industrial bubbly flow problems and implementation thereafter in these computer codes, industries will experience significant benefits especially reduce time and costs in their design and production.Read moreRead less
Experimental and Numerical Modelling of Gas-Liquid Flows. Multiphase flow systems are encountered in many process industries such as chemical, petroleum, mining, energy, food and pharmaceutical, which are fundamental to the Australian economy. Commercially available computer codes for simulating such systems are currently widely used in many Australian industrial sectors. This research project will address the prevalent deficiency in many of these computer codes and develop new models capable of ....Experimental and Numerical Modelling of Gas-Liquid Flows. Multiphase flow systems are encountered in many process industries such as chemical, petroleum, mining, energy, food and pharmaceutical, which are fundamental to the Australian economy. Commercially available computer codes for simulating such systems are currently widely used in many Australian industrial sectors. This research project will address the prevalent deficiency in many of these computer codes and develop new models capable of predicting a wide range of industrial bubbly flow problems. The resultant improved computer codes will provide industries with significant benefits - especially reduced times and costs in their design and production.Read moreRead less
Foundations of Executable Temporal Logic. In many computer applications, including those of temporal reasoning, distributed computations and knowledge representations, the concept of time is of central importance. Multiple granularity of time also plays a critical role as not all events are necessarily defined over a uniform model of time. This project will develop the foundations of executable logical representations, supporting multiple granularity of time. This will allow system developers a ....Foundations of Executable Temporal Logic. In many computer applications, including those of temporal reasoning, distributed computations and knowledge representations, the concept of time is of central importance. Multiple granularity of time also plays a critical role as not all events are necessarily defined over a uniform model of time. This project will develop the foundations of executable logical representations, supporting multiple granularity of time. This will allow system developers access to powerful logical techniques in those applications. In the process, fundamental problems in modelling multiple granularity of time will be identified, and application-independent solutions to those problems will be provided.Read moreRead less
Refinement of Temporal and Epistemic Specifications in Asynchronous Systems. Designing distributed systems is a complex activity requiring rigorous mathematical models of designs and specifications. It is desirable for the mathematical notations to be as close as possible to intuitive notions used by designers. One such notion is the idea that components in a distributed system have states of knowledge. Previous work has developed a calculus enabling derivation of systems with global clock by s ....Refinement of Temporal and Epistemic Specifications in Asynchronous Systems. Designing distributed systems is a complex activity requiring rigorous mathematical models of designs and specifications. It is desirable for the mathematical notations to be as close as possible to intuitive notions used by designers. One such notion is the idea that components in a distributed system have states of knowledge. Previous work has developed a calculus enabling derivation of systems with global clock by series of correctness-preserving transformations from a knowledge-based specification. This project will generalize this work to a calculus for systems that lack a global clock, and implement a tool providing automated support for use of the calculus.Read moreRead less
Automated Determination of the Pose of a Human from Visual Information - Markerless 3D Pose Recovery of Humans from Videos. The development of 3D human pose recovery has been sought by computer vision researchers for many years. Our results will, firstly, have benefit for Australia's standing in the international computer vision community. Over time, the research outcomes will be developed into a software product for rehabilitation analysis by recognizing discrepancies between the walking pat ....Automated Determination of the Pose of a Human from Visual Information - Markerless 3D Pose Recovery of Humans from Videos. The development of 3D human pose recovery has been sought by computer vision researchers for many years. Our results will, firstly, have benefit for Australia's standing in the international computer vision community. Over time, the research outcomes will be developed into a software product for rehabilitation analysis by recognizing discrepancies between the walking patterns of healthy individuals and those with abnormalities as a result of accidents or diseases. The Australian economy will benefit by the reduction in the lifetime cost of injuries. This software will also provide benefits to the movie animation, computer games industry, and the training of athletes.Read moreRead less
Analysis and design of control systems with saturation and time-delay. Control engineering is an enabling technology without which most modern engineering systems, such as aircrafts or Internet, can not operate properly. Actuator saturation and time-delays are undesirable phenomena that often arise in control systems leading to poor performance and sometimes instability. For example, both of these phenomena arise in control of modern telecommunication systems, such as Active Queue Management in ....Analysis and design of control systems with saturation and time-delay. Control engineering is an enabling technology without which most modern engineering systems, such as aircrafts or Internet, can not operate properly. Actuator saturation and time-delays are undesirable phenomena that often arise in control systems leading to poor performance and sometimes instability. For example, both of these phenomena arise in control of modern telecommunication systems, such as Active Queue Management in TCP networks. The project aims at tackling these phenomena by using recently developed techniques in antiwindup for saturating actuators and by revisiting some classical methods for Smith predictor design for time-delayed systems.Read moreRead less
Large Scale Complex Multiagent Systems : Control Methodologies and Information Architectures. Future military operations are likely to involve increasing use of unmanned vehicles, airborne, underwater or on land. In some cases there will be very large formations. This research will develop methodologies which allow formations of unmanned vehicles to be configured. Much of the same methodology is applicable to the construction and operation of large scale sensor networks, identified by some comm ....Large Scale Complex Multiagent Systems : Control Methodologies and Information Architectures. Future military operations are likely to involve increasing use of unmanned vehicles, airborne, underwater or on land. In some cases there will be very large formations. This research will develop methodologies which allow formations of unmanned vehicles to be configured. Much of the same methodology is applicable to the construction and operation of large scale sensor networks, identified by some commentators as one of the most important technologies of the 21st century. They comprise large numbers of low cost networked sensors and will increasingly find application in security, agricultural and environmental monitoring.Read moreRead less