Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well ....Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well, better safeguarding Australia from disease and crime. This project will also support a young research group of international standing. It will train the involved researchers to attain a high level of proficiency and excellence in machine learning research and development.Read moreRead less
Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by co ....Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by collecting incremental face exemplars. The result of the research will be an algorithm that can improve its performance on-line adapting in a stable learning process each identity model to the correct facial examples.
The research has significant practical implication in visual surveillance increasing the robustness of identification of person identity, state and intent.
Read moreRead less
Resource-bounded adaptive inference of accurate conditional probability estimates from data. This project will develop machine learning techniques with a valuable new capability: the ability to produce estimates of complex conditional probabilities to varying levels of expected accuracy depending upon the constraints of available computational resources. This will provide significant competitive advantage to developers of many types of online application by allowing them to maximise utilisation ....Resource-bounded adaptive inference of accurate conditional probability estimates from data. This project will develop machine learning techniques with a valuable new capability: the ability to produce estimates of complex conditional probabilities to varying levels of expected accuracy depending upon the constraints of available computational resources. This will provide significant competitive advantage to developers of many types of online application by allowing them to maximise utilisation of available computational resources when making inferences from data, together with the flexibility to trade-off accuracy and computing resources during system design. Australia will also benefit by strengthening its machine learning expertise, which is central to many complex and intelligent systems and the booming data mining industry.Read moreRead less
Supporting adaptive, interactive documents. The project will improve comprehensibility of technical material, reduce paper usage, encourage collaborative science, improve the reliability of published science (by allowing post-publication annotation and correction), and improve the accessibility of technical material for readers who are blind or have poor vision. The project also holds considerable potential for supporting Australian companies in the publishing and document processing industries.
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effec ....Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effective. The developed system will improve the productivity of Australian cattle industry.Read moreRead less
Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of grea ....Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of great importance to Australia's security and safety. The outcome of this research will provide the first steps towards formulating the next generation recognition systems that will improve the suitability of the face recognition for use in security, surveillance, intelligent robotics, banking, and smart environments.Read moreRead less
Special Research Initiatives - Grant ID: SR0566892
Funder
Australian Research Council
Funding Amount
$220,000.00
Summary
The EarthByte software and database system. Earth processes over geological timescales cannot be understood outside of a plate tectonic context. However, no standard tool exists to explore the causes and effects of lithosphere-mantle interaction in accordance with past plate configurations. Our aim is to develop a Palaeo-Geographic Information System called EarthByte that will connect the open source and architecture-independent GPlates and GMT software, and implement XML-based service interfac ....The EarthByte software and database system. Earth processes over geological timescales cannot be understood outside of a plate tectonic context. However, no standard tool exists to explore the causes and effects of lithosphere-mantle interaction in accordance with past plate configurations. Our aim is to develop a Palaeo-Geographic Information System called EarthByte that will connect the open source and architecture-independent GPlates and GMT software, and implement XML-based service interfaces and databases. EarthByte will create the foundation for an e-geoscience framework for grid-based data access and Earth process modelling by linking geological and geophysical observations to palaeogeographic models for constraining mantle convection and lithospheric deformation.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advance ....Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advanced IT support for health care, which can be utilised by other providers. (d) The project will make a direct link between IT research and its industrial application. (e) The project will also give the opportunity to a postdoctoral researcher and PhD students to perform leading edge research on privacy protection of information in an industrial environment.Read moreRead less