Driving Large Scale Live Internet Broadcasting of Streaming Video. Recent experience of Internet service providers has seen a booming market demand for live Internet broadcasting services. Live broadcasting of high-profile events, such as the Live Earth concerts in July 2007 by MSN, has drawn a global audience of the order of millions of viewers across the Internet. The technology developed in this project will drastically reduce Internet bandwidth consumption for provisioning such large-scale I ....Driving Large Scale Live Internet Broadcasting of Streaming Video. Recent experience of Internet service providers has seen a booming market demand for live Internet broadcasting services. Live broadcasting of high-profile events, such as the Live Earth concerts in July 2007 by MSN, has drawn a global audience of the order of millions of viewers across the Internet. The technology developed in this project will drastically reduce Internet bandwidth consumption for provisioning such large-scale Internet broadcasting services while meeting user satisfaction with guaranteed Quality of Service. It is crucial for Australia to invest in this frontier technology since Australian service providers rely on expensive Internet infrastructure to communicate with major data hubs in other continents.Read moreRead less
Congestion Control for the Future Internet. Australia relies very much on its telecommunications infrastructure due to its geographic dispersion. Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Australia industries and rural communities) and at lower cost. This project will put Australia on the internati ....Congestion Control for the Future Internet. Australia relies very much on its telecommunications infrastructure due to its geographic dispersion. Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Australia industries and rural communities) and at lower cost. This project will put Australia on the international stage as an leading contributor to Internet technology. We will provide training for PhD students and the management of postdoctoral fellows in the important area of Internet traffic engineering and control.
Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0668381
Funder
Australian Research Council
Funding Amount
$750,000.00
Summary
Foundational National Nanotechnology Infrastructure. Breakthough nanotechnologies based on quantum mechanics promise useful devices for absolutely secure transmission of information encoded in quantum states, ultra-rapid searching through genome databases for unique gene sequences, faster electronic and photonic devices, robust devices made from diamond and better processing of biomedical materials for diagnosis of illness. Fabrication and characterization of these devices provides training for ....Foundational National Nanotechnology Infrastructure. Breakthough nanotechnologies based on quantum mechanics promise useful devices for absolutely secure transmission of information encoded in quantum states, ultra-rapid searching through genome databases for unique gene sequences, faster electronic and photonic devices, robust devices made from diamond and better processing of biomedical materials for diagnosis of illness. Fabrication and characterization of these devices provides training for research students in state-of-the-art techniques with many uses. Deeper understanding of these quantum technologies will lead to better models for some of the most puzzling aspects of quantum mechanical systems that are the foundation of the physical processes of
our universe.Read moreRead less
Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, rec ....Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, recently
developed algorithms to estimate the support of a distribution and
detect rare events will be employed in this context.
The project is in cooperation with Dr. Ralf Herbrich (Microsoft
Research, Cambridge).
Read moreRead less
Special Research Initiatives - Grant ID: SR0567533
Funder
Australian Research Council
Funding Amount
$120,000.00
Summary
Scientific Instruments as ICT Components in Building a GrEMLIN for e-Research. The proposal seeks to initiate the development of a GrEMLIN, a Grid Enabled Multi-Level Instrument Network, for e-Research. Scientific instruments, whether at conventional laboratories or at major facilities, may be regarded as specialised ICT components in a network providing remote access to such instrumentation. Collaborative remote access and data analysis brings efficiency and effectiveness dividends, that can ....Scientific Instruments as ICT Components in Building a GrEMLIN for e-Research. The proposal seeks to initiate the development of a GrEMLIN, a Grid Enabled Multi-Level Instrument Network, for e-Research. Scientific instruments, whether at conventional laboratories or at major facilities, may be regarded as specialised ICT components in a network providing remote access to such instrumentation. Collaborative remote access and data analysis brings efficiency and effectiveness dividends, that can be enhanced through the harnessing of Grid technologies. The collaborative project will leverage middleware, Web Services and e-Science software developments in the US and UK, to provide Grid enabled remote instrument access and data analysis as a powerful e-Research tool.Read moreRead less
Data Mining by Clustering in Very Large Relational Databases. Many commercial and governmental entities possess very large relational data that cannot be feasibly analyzed by today's computers, e.g., gene expression data, product usage databases and telecommunication call records. The clustering tools developed in this project will have a significant benefit on many business processes that involve clustering this type of data, such as fraud detection and market segmentation.
Modelling and Removal of Noise and Artefacts in Surveillance and Security Video for Forensic Image Analysis and Enhancement. This project spearheads research in advanced digital image and video processing technology, placing Australia at the forefront of both theoretical and applied research to safeguard Australia. It tackles fundamental issues identified in our earlier research in this area and consulting work for Victoria and NSW Police Departments in forensic investigations since 2000. Althou ....Modelling and Removal of Noise and Artefacts in Surveillance and Security Video for Forensic Image Analysis and Enhancement. This project spearheads research in advanced digital image and video processing technology, placing Australia at the forefront of both theoretical and applied research to safeguard Australia. It tackles fundamental issues identified in our earlier research in this area and consulting work for Victoria and NSW Police Departments in forensic investigations since 2000. Although the main investigation focuses on video surveillance and security systems for public safety, policing, crime prevention and border control, the outcomes of the investigation will have other applications, including digital photography for fine-art, medical imaging, picture archiving and communication systems for telemedicine and rural healthcare systems.Read moreRead less
Vision Model Based Perceptual Digital Video Coding. Digital video coding and compression is an enabling technology and has diversified applications in audiovisual communications, multimedia computing, digital television broadcast and electronic entertainment industries. The project aims at spearheading research in theory, techniques and implementation of perceptual video coding in order to achieve constant and guaranteed quality in visual communications and services. It will explore a new appr ....Vision Model Based Perceptual Digital Video Coding. Digital video coding and compression is an enabling technology and has diversified applications in audiovisual communications, multimedia computing, digital television broadcast and electronic entertainment industries. The project aims at spearheading research in theory, techniques and implementation of perceptual video coding in order to achieve constant and guaranteed quality in visual communications and services. It will explore a new approach to digital video coding other than the constant bit rate coding techniques which have dominated digital video research for the past four decades. It will form a part of the theoretical foundation and principles for the next generation video coding and compression techniques, and may lead to new standards and practice.Read moreRead less
Intelligent techniques to exploit the dynamic temporal structure in detection of attacks in credit application fraud. Obtaining credit using fraudulent information costs financial institutions billions of dollars. This project develops fraud detection methods in credit applications, working with credit bureau data. Existing fraud detection models are mostly applicable to transaction fraud, rather than application fraud, and are static. Fraudsters however constantly change their method of attack. ....Intelligent techniques to exploit the dynamic temporal structure in detection of attacks in credit application fraud. Obtaining credit using fraudulent information costs financial institutions billions of dollars. This project develops fraud detection methods in credit applications, working with credit bureau data. Existing fraud detection models are mostly applicable to transaction fraud, rather than application fraud, and are static. Fraudsters however constantly change their method of attack. The temporal characteristics of fraud attacks provide an additional source of information that can be exploited to gain increased predictive power. We propose a hybrid intelligent approach to construct models that are sensitive to the temporal dynamics of fraud attacks, and evolve to acknowledge the changing behaviour of fraudsters.Read moreRead less
Handling unreliable, uncertain and inadequate data for Intelligence led Investigation. Intelligence led investigation has been successful recently in drug and people smuggling, preparation or instigation of acts of terrorism, and can benefit profoundly from the techniques we will develop, in the timely management and inference from many sources and kinds of uncertain information. This work will assist in making Australia a safer and more secure country.
E.g., Australian Bureau of Statistics ....Handling unreliable, uncertain and inadequate data for Intelligence led Investigation. Intelligence led investigation has been successful recently in drug and people smuggling, preparation or instigation of acts of terrorism, and can benefit profoundly from the techniques we will develop, in the timely management and inference from many sources and kinds of uncertain information. This work will assist in making Australia a safer and more secure country.
E.g., Australian Bureau of Statistics figures show that for 2004, investigations of some 35% of murders, 63% of kidnappings, and 80% of robberies are incomplete at 30 days. Terrorism investigations are harder in that usually there is no initial crime trigger for an investigation. Any assistance our tools can provide in will be of significant benefit to Australia.Read moreRead less