Resource-aware Signal Processing and Control Algorithms for Networked Sensor Systems. Networked sensing and control is an important technology for Australia's future. Applications range from monitoring wildlife habitats to safety management of large civil structures. This project will lead to sustainable engineering solutions for these applications and provide key fundamental performance limits. Beyond the creation of new theory and algorithms, the national and community benefits will include: ....Resource-aware Signal Processing and Control Algorithms for Networked Sensor Systems. Networked sensing and control is an important technology for Australia's future. Applications range from monitoring wildlife habitats to safety management of large civil structures. This project will lead to sustainable engineering solutions for these applications and provide key fundamental performance limits. Beyond the creation of new theory and algorithms, the national and community benefits will include: (i) enhancement of Australia's reputation for innovative Engineering research through quality publications and international collaborations; and (ii) improvement of the research and development capability in the ICT sector through rigorous training of postgraduate students and postdoctoral fellows.Read moreRead less
Distributed Estimation and Control under Communication Constraints. Sensor networks will be an important technology for Australia's future. Applications range from monitoring water quality to controlling complex defence systems. This project will lead to a better understanding of the fundamental limits of wireless sensor networks. Above and beyond the creation of new theory and algorithms, the national and community benefits will include: (i) enhancement of Australia's reputation for innovative ....Distributed Estimation and Control under Communication Constraints. Sensor networks will be an important technology for Australia's future. Applications range from monitoring water quality to controlling complex defence systems. This project will lead to a better understanding of the fundamental limits of wireless sensor networks. Above and beyond the creation of new theory and algorithms, the national and community benefits will include: (i) enhancement of Australia's reputation for innovative Engineering research through quality publications and international collaborations; and (ii) improvement of the research and development capability in the information and communications technology sector through high level training of postgraduate students and postdoctoral fellows in this important technology.Read moreRead less
A Methodology for Designing Information Systems based on Situational Theories of Agency. Information systems (IS) are part of work systems that are goal-directed. Existing methodologies for designing IS implicitly assume that goal-directed behaviour is enabled by deliberation upon abstract models (the 'thinker' metaphor). Recent work in robotics and artificial intelligence has tested an alternative theory of goal-directed behaviour that emphasises reactive responses to situations (the 'routine' ....A Methodology for Designing Information Systems based on Situational Theories of Agency. Information systems (IS) are part of work systems that are goal-directed. Existing methodologies for designing IS implicitly assume that goal-directed behaviour is enabled by deliberation upon abstract models (the 'thinker' metaphor). Recent work in robotics and artificial intelligence has tested an alternative theory of goal-directed behaviour that emphasises reactive responses to situations (the 'routine' metaphor). We will refine and test a new IS design methodology based on this situational theory and show that it can produce effective IS designs, applicable to time-constrained routine operational domains, which are radically different from those produced using existing methodologies.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Service-oriented negotiation and coordination in multi-agent systems. Australia has a strong competitive advantage in the area of agent software. The outcomes of this project will provide an improved platform for services in application areas such as finance, e-commerce, tourism, and multi-platform media. More broadly, the work proposed here will enable the IT industry in Australia, and Melbourne specifically, to adopt and utilise agent-technology in developing the complex software that is inc ....Service-oriented negotiation and coordination in multi-agent systems. Australia has a strong competitive advantage in the area of agent software. The outcomes of this project will provide an improved platform for services in application areas such as finance, e-commerce, tourism, and multi-platform media. More broadly, the work proposed here will enable the IT industry in Australia, and Melbourne specifically, to adopt and utilise agent-technology in developing the complex software that is increasingly required to meet the needs of the software-driven knowledge economy of the 21st century.Read moreRead less
Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering bus ....Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering business operations towards consistent and compliant outcomes and higher performance, and assist analysts and auditors to explain deviant operations. This should significantly benefit industries such as healthcare, insurance, retail and the government where compliance and integrity management are imperative.Read moreRead less
Stream Data Classification in the Age of 5G Networks. This project aims to develop a novel stream data classification model to handle the challenges in the era of 5G networks, such as the scope of the stream data, the complexity of their relationship, the diversity of contained information and the incorrect readings of numerous sensors. The project addresses a significant knowledge gap by exploring and modelling the stronger correlation between data instances in the streams. The outcome is a sys ....Stream Data Classification in the Age of 5G Networks. This project aims to develop a novel stream data classification model to handle the challenges in the era of 5G networks, such as the scope of the stream data, the complexity of their relationship, the diversity of contained information and the incorrect readings of numerous sensors. The project addresses a significant knowledge gap by exploring and modelling the stronger correlation between data instances in the streams. The outcome is a system that is highly efficient, accurate and corrupted-data-tolerant classification solutions for individual stream data as well as multiple stream data. The expected benefits will be far-ranging and adaptable to many domains, such as smart home, medical and healthcare, transportation and manufacturing. Read moreRead less
Organisational Motivation as a Predictor of Benefits from the Adoption of Information Technology. IOS are becoming increasingly important for organisations to remain competitive in a global marketplace. By using organisational motivations to better understand how to design and structure the processes for IOS implementation and set more realistic expectation, Australian organisations will be able to develop more effective, evidence-based methods for IOS implementation. The theory being tested is ....Organisational Motivation as a Predictor of Benefits from the Adoption of Information Technology. IOS are becoming increasingly important for organisations to remain competitive in a global marketplace. By using organisational motivations to better understand how to design and structure the processes for IOS implementation and set more realistic expectation, Australian organisations will be able to develop more effective, evidence-based methods for IOS implementation. The theory being tested is an original contribution in a growing area of information technology research. The data and rigorously tested research protocols developed will enhance Australia'a research standing, contribute to university teaching and researcher training, and improve the effectiveness and efficiency of the Australian information technology industry. Read moreRead less
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advance ....Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advanced IT support for health care, which can be utilised by other providers. (d) The project will make a direct link between IT research and its industrial application. (e) The project will also give the opportunity to a postdoctoral researcher and PhD students to perform leading edge research on privacy protection of information in an industrial environment.Read moreRead less
A Model for IT Security Outsourcing of Critical Services. IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. The decision-making process associated with outsourcing security is complex. To improve the effectiveness of the decision-making process a conceptual model that integrates security benefits, costs and their respective performance measures will be developed. This model will support m ....A Model for IT Security Outsourcing of Critical Services. IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. The decision-making process associated with outsourcing security is complex. To improve the effectiveness of the decision-making process a conceptual model that integrates security benefits, costs and their respective performance measures will be developed. This model will support management in their aim of overseeing IT security effectively. The research will make a valuable contribution towards determining the impact of IT security outsourcing within Australia.Read moreRead less