Preventing railway suicide: An open-systems perspective. Preventing railway suicide: An open-systems perspective. This project aims to develop an automated suicide risk detection system to reduce the incidence and impact of railway suicide, which has a devastating effect on victims’ families, station staff, train drivers, emergency workers, and bystanders. This project will use open-systems theory to develop two complementary information systems for more effective detection and reporting of suic ....Preventing railway suicide: An open-systems perspective. Preventing railway suicide: An open-systems perspective. This project aims to develop an automated suicide risk detection system to reduce the incidence and impact of railway suicide, which has a devastating effect on victims’ families, station staff, train drivers, emergency workers, and bystanders. This project will use open-systems theory to develop two complementary information systems for more effective detection and reporting of suicide risk; use these systems to investigate how different situational factors interact with different combinations of service interventions to influence suicide risk; and share the findings to reduce railway suicide in Australia and overseas.Read moreRead less
Context and Activity Recognition for Personalised Behaviour Recommendation. The Internet of Things (IoT) together with the rising popularity of smartphones opens a new world for many exciting opportunities. The overall goal of this project is to develop new algorithms and data analytical techniques in an IoT environment that can accurately monitor and analyse personalised daily activities on a continuous, real-time basis. The expected result of this project will support many critical application ....Context and Activity Recognition for Personalised Behaviour Recommendation. The Internet of Things (IoT) together with the rising popularity of smartphones opens a new world for many exciting opportunities. The overall goal of this project is to develop new algorithms and data analytical techniques in an IoT environment that can accurately monitor and analyse personalised daily activities on a continuous, real-time basis. The expected result of this project will support many critical applications such as better wellness tracking and lifestyle-related illness prevention, which will be particularly critical to Australia's aging population. This project will also serve as a vehicle to educate and train Australia’s young scholars and engineers.Read moreRead less
Development, implementation and private and public sector adoption of Standard Business Reporting in Australia. Standard Business Reporting is a government response to the business regulatory burden and streamlines business to government reporting, but involves some cost to business in its initial uptake. This project examines the adoption decisions made and their consequences for business entities choosing to use this voluntary reporting channel.
Reconciliation strategies for continuous variable quantum key distribution. This project aims to advance a novel key distribution method, called quantum key distribution, which distributes secure keys using the quantum state of optical channels. Key distribution is a foundational part of data security, allowing digital keys to be securely exchanged between two or more parties, before they are used to protect and share information. The expected outcome is new rateless error correction codes desi ....Reconciliation strategies for continuous variable quantum key distribution. This project aims to advance a novel key distribution method, called quantum key distribution, which distributes secure keys using the quantum state of optical channels. Key distribution is a foundational part of data security, allowing digital keys to be securely exchanged between two or more parties, before they are used to protect and share information. The expected outcome is new rateless error correction codes designed specifically to implement quantum key distribution over long distances. Quantum key distribution is beneficial for ultra-secure communications as it avoids the vulnerability to weak random numbers and quantum-computing brute force attacks that currently threated the security of data protected by existing methods. Read moreRead less
Predictive analytics from at home telemonitoring of vital signs. Predictive analytics from at home telemonitoring of vital signs. This project aims to reduce unscheduled admissions to hospital, by developing statistical models of people’s health using longitudinal measurements of vital signs and questionnaires. Hospital costs are becoming unsustainable and will overwhelm state budgets within thirty years. Telehealth monitoring to manage chronic disease is becoming increasingly routine internatio ....Predictive analytics from at home telemonitoring of vital signs. Predictive analytics from at home telemonitoring of vital signs. This project aims to reduce unscheduled admissions to hospital, by developing statistical models of people’s health using longitudinal measurements of vital signs and questionnaires. Hospital costs are becoming unsustainable and will overwhelm state budgets within thirty years. Telehealth monitoring to manage chronic disease is becoming increasingly routine internationally and should reduce unnecessary hospital admissions and health service costs. To scale up telehealth services nationally, automated means of assessing changes in an individual health status are needed. This project’s automated risk assessment models are expected to identify exacerbations and orchestrate an optimal response from health services to reduce unscheduled admissions to hospital.Read moreRead less
Exposing the anonymous attacker: detecting identity crimes using real-time entity resolution on large dynamic databases. Given the increasingly large costs of identity crimes in Australia, developing improved electronic identity verification techniques is highly significant in reducing losses from such crimes, making the Australian economy more competitive, and increasing consumer confidence in Australian financial institutions. Veda Advantage is widely used for identity verification by Australi ....Exposing the anonymous attacker: detecting identity crimes using real-time entity resolution on large dynamic databases. Given the increasingly large costs of identity crimes in Australia, developing improved electronic identity verification techniques is highly significant in reducing losses from such crimes, making the Australian economy more competitive, and increasing consumer confidence in Australian financial institutions. Veda Advantage is widely used for identity verification by Australian financial service providers, so the benefits of the techniques developed in this project will automatically flow through to the Australian community. These techniques will be sufficiently generic to be of use for real-time identity verification in a broad range of applications, including e-Government portals, electronic banking, online stores, or national security systems.Read moreRead less
New error correction strategies for continuous variable quantum key distribution. Quantum key distribution is a completely secure method for two distant parties to share a unique secret key. The aim of this project is to design new algorithms, construction tools and analysis techniques to produce new iterative error correction codes, which will improve the operational distance and performance of quantum key distribution.
From the Desert to the Sea: Managing Rock Art, Country and Culture. This Project will expand our understanding of Aboriginal settlement and land-use in north-west Australia by investigating how the mythological narratives of Australia’s deserts enable the transmission of knowledge in water-limited environments. Combining traditional ecological knowledge and novel scientific approaches (e.g. anthracology, remote sensing, oxygen-isotopes) will provide new insights into human behaviours at rock art ....From the Desert to the Sea: Managing Rock Art, Country and Culture. This Project will expand our understanding of Aboriginal settlement and land-use in north-west Australia by investigating how the mythological narratives of Australia’s deserts enable the transmission of knowledge in water-limited environments. Combining traditional ecological knowledge and novel scientific approaches (e.g. anthracology, remote sensing, oxygen-isotopes) will provide new insights into human behaviours at rock art site complexes. It will develop management regimes and formal certification for Indigenous rangers while building heritage capacity in these partner communities: enabling intergenerational, culturally appropriate knowledge transfer protocols are in place to ensure sustainable economic heritage futures.Read moreRead less
Unlocking IP - Expanding public rights and the public domain in Australian copyright. This research investigates how Australia's digital commons, comprising both the public domain and public rights created by open content and open software licensing, can be expanded and protected. It focuses on 'self help' actions within the existing statutory context, in Australia's distinct legal and cultural context, and on comprehensiveness. Its significance is that healthy commons-based production of inform ....Unlocking IP - Expanding public rights and the public domain in Australian copyright. This research investigates how Australia's digital commons, comprising both the public domain and public rights created by open content and open software licensing, can be expanded and protected. It focuses on 'self help' actions within the existing statutory context, in Australia's distinct legal and cultural context, and on comprehensiveness. Its significance is that healthy commons-based production of information is essential to Australia as an innovative country and a democracy. The principal outcomes will be better understood and more efficient public rights licences, incentives to copyright owners to create them, and technical aids to allow users to find commons content.Read moreRead less
Computational Intelligence for Complex Structured Data. This project aims to use computational intelligence techniques to reliably learn adaptive natural human pointing and gestures to control an interface on a pseudo-3D display. Highly complex data with interconnections between elements is hard to visualise on screens. Most current tools are operated using point/click/drag on 2D screens. The physical technology to capture appropriate human behaviours exists already, but not the adaptive learnin ....Computational Intelligence for Complex Structured Data. This project aims to use computational intelligence techniques to reliably learn adaptive natural human pointing and gestures to control an interface on a pseudo-3D display. Highly complex data with interconnections between elements is hard to visualise on screens. Most current tools are operated using point/click/drag on 2D screens. The physical technology to capture appropriate human behaviours exists already, but not the adaptive learning of the syntax and semantics of individual gestures and actions, nor the multi-gesture information fusion required for understanding, which could significantly enhance efficiency, for example, in sorting through named entities in an investigation. All of this is done naturally by most human beings, using biological neural networks.Read moreRead less