Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-ba ....Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-based multimedia mining in Australia and elsewhere. In this project, we will explore techniques and develop algorithms for content-based multimedia retrieval and mining in multimedia databases.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues ....Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues within these projects and develops improved modelling techniques and project management approaches for large modelling initiatives. The outcomes will streamline the design, integration, maintenance and communication of models with a focus on Enterprise Systems.Read moreRead less
Ontologically-based Evaluation, Comparison and Engineering of Integrated Process Modelling Techniques. Integrated process modelling techniques such as UML and ARIS form the conceptual platform for many management and IT projects. Though most IS development tools contain these techniques, anecdotal evidence indicates many shortcomings. This project uses a well-established theory developed in philosophy and applied in information systems domains for the evaluation of these techniques. The expec ....Ontologically-based Evaluation, Comparison and Engineering of Integrated Process Modelling Techniques. Integrated process modelling techniques such as UML and ARIS form the conceptual platform for many management and IT projects. Though most IS development tools contain these techniques, anecdotal evidence indicates many shortcomings. This project uses a well-established theory developed in philosophy and applied in information systems domains for the evaluation of these techniques. The expected outcomes are evaluations of ARIS and UML. Thus, this project contributes to the development of two of the most popular modelling techniques. Based on the theory used and the results of an international empirical study, suggestions for the further development of these techniques will be derived.Read moreRead less
A Theory of Innovation Systems. The goal of the project is to develop and validate a new theory for how information systems can be designed to assist organisations in becoming innovative. Technological innovation is designed to increase productivity and economic growth, but knowledge is lacking about how information systems can meaningfully support organisations in becoming innovative. The goal of this project is to develop and test a theory of ‘innovation systems’ that would describe design pri ....A Theory of Innovation Systems. The goal of the project is to develop and validate a new theory for how information systems can be designed to assist organisations in becoming innovative. Technological innovation is designed to increase productivity and economic growth, but knowledge is lacking about how information systems can meaningfully support organisations in becoming innovative. The goal of this project is to develop and test a theory of ‘innovation systems’ that would describe design principles for information systems that provide effective and efficient support to organisational innovation processes. The expected project outcomes would assist the development of new systems to support organisational innovations, the management of innovation initiatives to increase productivity and growth, and the effective assessment of technologies to support innovation.Read moreRead less
Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on lang ....Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on languages supported by commercial tools. The outcome will be a framework for comparing the expressiveness of process execution languages and defining mappings between them. This will place Australia at the forefront of developments in business process management systems: a crucial technology in today's global, dynamic, and heterogeneous environments.
Read moreRead less
Integrating Database Technologies and Visual Analysis in Bioinformatics for Genome Data. Solving modern biological problems, especially those involving genome data, requires advanced computational and analytical methods. The huge quantities of data and escalating demands of modern biological research increasingly require the sophistication and power of object-relational database tools. Key techniques include relational data management, pattern recognition, data mining and visualization of biolog ....Integrating Database Technologies and Visual Analysis in Bioinformatics for Genome Data. Solving modern biological problems, especially those involving genome data, requires advanced computational and analytical methods. The huge quantities of data and escalating demands of modern biological research increasingly require the sophistication and power of object-relational database tools. Key techniques include relational data management, pattern recognition, data mining and visualization of biological data. In this project we will develop efficient methodologies and data structures for gathering high-quality approximations of full genomic information, and will use these innovations as the foundation to develop novel, practical tools for clustering and visualization in genomic data mining and database management.
Read moreRead less
Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communic ....Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communication and providing accesses to group members for many database systems. The approach leads to a great understanding of advocating selective information sharing in role-based systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aim ....Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aims to develop techniques for purpose-based usage control and detecting possible conflicts between obligations. The approach leads to a great understanding of advocating limited disclosure in usage control systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less