Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less
Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of inf ....Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of information and communications technology (ICT). The nature of the project presents significant potential for project outcomes to be beneficial to the Australian telecommunications industry in a wide range of application areas including wireless networks, mobile communications, and data storage.
Read moreRead less
Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Inter ....Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Internet and digital television, and improved lower-power wireless sensor networks for applications such as remote monitoring bushfire early warning systems.Read moreRead less
Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will un ....Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will underpin next generation communication networks. With a focus on implementable technologies, this project presents significant potential for project outcomes to impact the Australian information economy, spawning new businesses, transforming established industries, and creating new jobs. Read moreRead less
Structured low-density parity-check codes for next-generation digital communications. The promise of essentially error-free information transmission is a cornerstone of digital communications. Next-generation applications demand increasingly effective error correction, yet traditional systems fall well short of fundamental capacity limits established some fifty years ago. Exciting breakthroughs in the mid-1990s delivered capacity-approaching codes on graphs employing iterative decoding algorithm ....Structured low-density parity-check codes for next-generation digital communications. The promise of essentially error-free information transmission is a cornerstone of digital communications. Next-generation applications demand increasingly effective error correction, yet traditional systems fall well short of fundamental capacity limits established some fifty years ago. Exciting breakthroughs in the mid-1990s delivered capacity-approaching codes on graphs employing iterative decoding algorithms, including low-density parity-check (LDPC) codes. This project applies techniques from discrete mathematics to design structured LDPC coding schemes for widespread implementation. Outcomes of this research will be new LDPC codes, encoding algorithms and analysis techniques for applications including wireless networks, data storage and Internet communications.Read moreRead less
Secure Multi-Party Computation. The outcomes of this project will enhance information protection which is crucial fore rapidly growing e-commerce service and strengthen national safeguard capability of our digital systems and infrastructure. It will contribute to maintain Australia's leading position in the telecommunication and information industries. It will contribute to the quality of our culture by protecting individual's privacy and providing security for sensitive data.
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Communications strategies for the internet of things. This project aims to facilitate expanded wireless connectivity by designing novel random access strategies and multilevel channel codes to enable new massive multiple access communication strategies for cellular networks. The internet of things will play a fundamental role in the future of health monitoring and smart energy systems, critical components of human health and carbon emission reduction. Other domains including agriculture, manufac ....Communications strategies for the internet of things. This project aims to facilitate expanded wireless connectivity by designing novel random access strategies and multilevel channel codes to enable new massive multiple access communication strategies for cellular networks. The internet of things will play a fundamental role in the future of health monitoring and smart energy systems, critical components of human health and carbon emission reduction. Other domains including agriculture, manufacturing, home automation and smart cities will be revolutionized by embedded devices communicating wirelessly. This project aims to redesign cellular networks to accommodate billions of embedded devices and thus play an important role in facilitating the internet of things.Read moreRead less