The Sakai scheme-Askey table correspondence, analogues of isomonodromy and determinantal point processes. The Australian mathematical sciences enjoys two research groups with active interests on Painleve equations in applied mathematics which are able to address difficult problems. Such a problem is to give a formulation of Sakai's 2001 classification of the Painleve equations in a form most suitable for applications. For this links will be made with a seemingly distinct area of mathematics - t ....The Sakai scheme-Askey table correspondence, analogues of isomonodromy and determinantal point processes. The Australian mathematical sciences enjoys two research groups with active interests on Painleve equations in applied mathematics which are able to address difficult problems. Such a problem is to give a formulation of Sakai's 2001 classification of the Painleve equations in a form most suitable for applications. For this links will be made with a seemingly distinct area of mathematics - the Askey table from the theory of hypergeometric orthogonal polynomials. A number of tractable PhD projects are suggested by this proposal.Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Continued Fractions and Torsion on Hyperelliptic Curves. Scientific advance should not blindly add to our knowledge; a true advance brings insights that collapse different issues into one. Understanding more is to need to remember less. For an important class of examples, this project identifies the study of a fundamental invariant of a quadratic number field, its regulator and hence its class number, with maximum torsion on the Jacobian variety of an hyperelliptic curve. The investigator's meth ....Continued Fractions and Torsion on Hyperelliptic Curves. Scientific advance should not blindly add to our knowledge; a true advance brings insights that collapse different issues into one. Understanding more is to need to remember less. For an important class of examples, this project identifies the study of a fundamental invariant of a quadratic number field, its regulator and hence its class number, with maximum torsion on the Jacobian variety of an hyperelliptic curve. The investigator's methods will surprise some longstanding problems into submission and in particular will lead them to reveal full data on torsion on hyperelliptic curves of low genus.
Read moreRead less
Symmetry in Differential Geometry. Differential geometry is a major branch of mathematics studying shape by using calculus and differential equations. This is a fundamental research project in this area, especially concerned with the interaction between geometry, differential equations, and symmetry. The mathematical notion of symmetry was already formalised early last century and nowadays lies at the very heart of mathematics and physics. Advances in this area provide essential tools in basic s ....Symmetry in Differential Geometry. Differential geometry is a major branch of mathematics studying shape by using calculus and differential equations. This is a fundamental research project in this area, especially concerned with the interaction between geometry, differential equations, and symmetry. The mathematical notion of symmetry was already formalised early last century and nowadays lies at the very heart of mathematics and physics. Advances in this area provide essential tools in basic science and unexpected technological benefits can easily arise (for example, in medical imaging). Fundamental mathematical research is absolutely necessary if Australia is to maintain a presence on the international scientific stage.
Read moreRead less
Classification and Invariants in Complex Differential Geometry. Differential geometry is the study of shape using calculus and differential equations. This is a fundamental research project in this area. Complex differential geometry refers to geometry based on the complex numbers, generally a rich and intriguing setting. Geometries will be distinguished by the construction of suitable invariants, both algebraic and analytic. Classification problems will be solved by these means. Of particular i ....Classification and Invariants in Complex Differential Geometry. Differential geometry is the study of shape using calculus and differential equations. This is a fundamental research project in this area. Complex differential geometry refers to geometry based on the complex numbers, generally a rich and intriguing setting. Geometries will be distinguished by the construction of suitable invariants, both algebraic and analytic. Classification problems will be solved by these means. Of particular interest are geometries with a high degree of symmetry, a critical feature that pervades both mathematics and physics. Twistor theory provides the unifying theme for this project.Read moreRead less
Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less
Proper Group Actions in Complex Geometry. The results of the project will enhance Australia's performance in several key mathematical areas as well as mathematical applications to physics critical for expanding Australia's knowledge base and research capability. The project has strong international aspects, it will foster the international competitiveness of Australian research and establish long-term collaborations between Australian researchers and high profile world experts in the area of the ....Proper Group Actions in Complex Geometry. The results of the project will enhance Australia's performance in several key mathematical areas as well as mathematical applications to physics critical for expanding Australia's knowledge base and research capability. The project has strong international aspects, it will foster the international competitiveness of Australian research and establish long-term collaborations between Australian researchers and high profile world experts in the area of the proposal. It will create an opportunity for a Ph.D. graduate to be involved in top-class research as a Research Associate, and will attract Ph.D. and honours students thus enabling research training in a high-quality mathematical environment.Read moreRead less
Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is ....Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is relevant to public-key cryptography, where breaking an encryption scheme should be infeasible, and to many real-life situations where NP-complete problems need to be solved, either exactly or approximately.Read moreRead less
New lattice approach for digital broadband communications. A main limiting factor in supplying future broadband communications is overcoming signal dispersion in the transmission channel. Recent preliminary collaboration by the chief investigators has uncovered a novel approach to this problem based on powerful mathematical lattice theory. The techniques have potential to significantly increase bandwidth and reliability compared to current technologies. This project will use lattice theory to pr ....New lattice approach for digital broadband communications. A main limiting factor in supplying future broadband communications is overcoming signal dispersion in the transmission channel. Recent preliminary collaboration by the chief investigators has uncovered a novel approach to this problem based on powerful mathematical lattice theory. The techniques have potential to significantly increase bandwidth and reliability compared to current technologies. This project will use lattice theory to propose, develop, analyse and test new data transmission techniques including joint coding, modulation and equalisation. The research will include theoretical analysis and hardware implementation. The overall aim is to dramatically improve reliability and throughput of data communication systems.Read moreRead less
Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, ....Mathematics of Cryptography. The Australian society and economy requires fast, reliable, and secure communication. First-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less