Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the ....Interaction Mining for Cyberbullying Detection on Social Networks. This project plans to build an interactive mining system to detect cyberbullying on social networks that have a large number of participants and a variety of inputs, including conversation texts, time-variant changes and user profiles. The project is designed to change the existing cyberbullying prevention services from reactive keyword filtering to proactive social interaction pattern mining. The intended outcome will enable the early detection and warning of cyberbullying and approach open a new way to discover interaction patterns with a large number of participants over evolving and complex social networks.Read moreRead less
A theoretical framework for practical partial fingerprint identification. Fingerprints captured from a crime scene are often partial and poor quality which makes it difficult to identify the criminal suspects from large databases. This project will find mathematical models which can estimate the missing information located in the blank areas of a partial fingerprint and effectively identify it.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Integrated Planning for Uncertainty-Centric Pilot Assistance Systems. This project aims to deliver a novel pilot assistance system to improve the viability, speed and safety of Helicopter Emergency Medical Services (HEMS) and Search and Rescue (SAR) missions. It will advance fundamental algorithms for probabilistic planning in partially observable scenarios to form the core technology of a pilot assistance system that accounts the various types of uncertainty faced by pilots in a typical HEMS/S ....Integrated Planning for Uncertainty-Centric Pilot Assistance Systems. This project aims to deliver a novel pilot assistance system to improve the viability, speed and safety of Helicopter Emergency Medical Services (HEMS) and Search and Rescue (SAR) missions. It will advance fundamental algorithms for probabilistic planning in partially observable scenarios to form the core technology of a pilot assistance system that accounts the various types of uncertainty faced by pilots in a typical HEMS/SAR missions. It will exploit recent advances in Partially Observable Markov Decision Processes (POMDPs) to recommend robust, safe, and pilot-aware mission and manoeuvring strategies to make HEMS/SAR operations safer for helicopter crews, and more effective for those in need of the service.Read moreRead less
Thermo-mechanical interactive atlas of basin evolution. We propose to create a thermo-mechanical interactive atlas of basin evolution as a desktop geodynamic modelling resource for exploration geologists. The atlas will allow the user to iteratively run our 2D/3D basin modelling software ELLIPSIS to alter model parameters until they match observed basin geometries or thermal history. Model iteration will be based on interactive user evaluation of model outputs and genetic algorithms, which pr ....Thermo-mechanical interactive atlas of basin evolution. We propose to create a thermo-mechanical interactive atlas of basin evolution as a desktop geodynamic modelling resource for exploration geologists. The atlas will allow the user to iteratively run our 2D/3D basin modelling software ELLIPSIS to alter model parameters until they match observed basin geometries or thermal history. Model iteration will be based on interactive user evaluation of model outputs and genetic algorithms, which progressively modify the solution set by mimicking the evolutionary behavior of biological systems (selection, cross-over and mutation), until an acceptable result is achieved. The interactive atlas will be applied to Australian and international case studies.Read moreRead less
Mathematics and computing for integrated stockyard-centric management of mining supply chains. Blended mineral products, such as coal and iron ore, make a strong contribution to Australia's economy. Blending occurs in stockpiles, so to realise product value, stockyard and supply chain operational plans must align with blend targets. This project will provide new mathematical and computational planning tools to maximise this value.
Subject-specific computational models for accurate evaluation of muscle function in human locomotion. The purpose of this project is to advance current understanding of muscle function during human locomotion. The most significant outcome will be the development of novel computational tools that can play a pivotal role in the healthcare industry through the prevention, diagnosis and treatment of movement disorders.
Discovering Patterns using Near Unsupervised Leaning to Support the Quick Detection of New Animal Disease Outbreaks Caused by Viruses. Without the capability to identify and study the vast majority of extant viruses using traditional laboratory techniques, emerging threats to Australian livestock health cannot be efficiently diagnosed or treated. New approaches based on high-throughput sequencing have recently been developed to study such viruses, but making sense of the sequence data is still a ....Discovering Patterns using Near Unsupervised Leaning to Support the Quick Detection of New Animal Disease Outbreaks Caused by Viruses. Without the capability to identify and study the vast majority of extant viruses using traditional laboratory techniques, emerging threats to Australian livestock health cannot be efficiently diagnosed or treated. New approaches based on high-throughput sequencing have recently been developed to study such viruses, but making sense of the sequence data is still a complex problem. Together with the project's Partner Organisations, including YourGene Biosciences Australia and the CSIRO Australian Animal Health Laboratory, this project aims to develop new computational methods to broaden the scope of detection and analysis of unknown viruses, enhancing the capability for research into the causative viral agents of animal diseases.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.