The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, top ....The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, topology, geometry, and computer graphics will be developed to characterise system/graph growth and stability. The aim is two-fold: first to reduce real complex systems (mainly financial systems) to computationally manageable structures (including direct visualisation) and second to construct realistic models of the evolution of such systems.Read moreRead less
Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in bu ....Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in building trusted computer applications. Process calculi and logic represent two promising disciplines in which the principles of analysis and design of secure systems can be studied systematically, out of which formal verification tools can be constructed.Read moreRead less
Expressive power and complexity of temporal logics for model-checking. Hardware verification based upon mathematical logic is now routinely
used in industry to verify the correctness of large digital circuits
using a technique called model-checking. Such discrete systems move
from one state to another according to the regular ticks of a clock.
The challenge now is to find tractable methods for reasoning about
real-time systems and hybrid systems that move in a continuous manner
with respec ....Expressive power and complexity of temporal logics for model-checking. Hardware verification based upon mathematical logic is now routinely
used in industry to verify the correctness of large digital circuits
using a technique called model-checking. Such discrete systems move
from one state to another according to the regular ticks of a clock.
The challenge now is to find tractable methods for reasoning about
real-time systems and hybrid systems that move in a continuous manner
with respect to time: examples include aeroplanes flying according to
the laws of physics and a moving robot arm. We shall invent new logics
which are specifically tailored for tractable reasoning about
real-time and hybrid systems.Read moreRead less
Cascades of Violence and Nonviolence. Why did the Arab Spring spread so fast? Why did so many communist regimes collapse so quickly in 1989? This project explains why tactics of violence and of nonviolence cause contagion. It develops a new evidence-based theory of how to contain cascades of violence and accelerate contagions of nonviolence to create a less violent world.
Automated internet warnings to prevent viewing of minor-adult sex images. Since the advent of the internet and digital cameras, the market for child exploitation material (CEM) has boomed. This project aims to explore how the visual appearance of warning messages influences internet users. It plans to conduct a randomised controlled experiment with naïve participants on a real-life website to test the effectiveness of messages designed to discourage viewers of legal ‘barely legal’ pornography. I ....Automated internet warnings to prevent viewing of minor-adult sex images. Since the advent of the internet and digital cameras, the market for child exploitation material (CEM) has boomed. This project aims to explore how the visual appearance of warning messages influences internet users. It plans to conduct a randomised controlled experiment with naïve participants on a real-life website to test the effectiveness of messages designed to discourage viewers of legal ‘barely legal’ pornography. It is anticipated that results will assist policing efforts by indicating whether warnings can be used to dissuade first-time CEM viewers and whether differences exist between harm or deterrent-focused messages.Read moreRead less
Aboriginal and non-Aboriginal sex-offenders in Australia: Assessing risk for practice and policy. A key priority of Australian governments is to improve community safety through reducing the risk of sex offenders re-offending after release from prison. This project will assess the validity of tools used to predict the risk of sexual offender recidivism and identify alternate risk assessment tools for Indigenous and non-Indigenous sex offenders.
Optimising illicit dark net marketplace interventions. Optimising illicit dark net marketplace interventions. This project aims to develop and test a series of interventions to disrupt identify theft activities, and design an operational risk framework that will aid law enforcement agencies and organisations to timely and appropriately intervene in cyber space. The buying and selling of identity credentials via dark net forums is a significant and growing problem. This research— based on systems ....Optimising illicit dark net marketplace interventions. Optimising illicit dark net marketplace interventions. This project aims to develop and test a series of interventions to disrupt identify theft activities, and design an operational risk framework that will aid law enforcement agencies and organisations to timely and appropriately intervene in cyber space. The buying and selling of identity credentials via dark net forums is a significant and growing problem. This research— based on systems analyses of dark net forums, and bringing together researchers, practitioners, theories and methods from human factors, sociotechnical systems, criminology, and cyber security—is expected to increase understanding of the dark net and improve ways of disrupting identity theft and trading.Read moreRead less
Testosterone Intervention For The Prevention Of Diabetes Mellitus In High Risk Men: A Randomised Trial
Funder
National Health and Medical Research Council
Funding Amount
$5,054,654.00
Summary
Type 2 diabetes (T2DM) is increasingly common, costly and deadly. Some men at risk of T2DM have low testosterone (T) levels. Our preliminary data suggests that T treatment may prevent the development of T2DM, and improve cardiovascular and sexual function, body composition and bone density, and mood. This remains to be fully tested in a randomized placebo-controlled trial, and this project will do so in a 2-year study of T treatment compared to placebo in men at risk of T2DM participating in a l ....Type 2 diabetes (T2DM) is increasingly common, costly and deadly. Some men at risk of T2DM have low testosterone (T) levels. Our preliminary data suggests that T treatment may prevent the development of T2DM, and improve cardiovascular and sexual function, body composition and bone density, and mood. This remains to be fully tested in a randomized placebo-controlled trial, and this project will do so in a 2-year study of T treatment compared to placebo in men at risk of T2DM participating in a lifestyle program.Read moreRead less
Centre Of Research Excellence In Eradicating Food Allergy: Prevention, Cure And Reducing Adverse Events
Funder
National Health and Medical Research Council
Funding Amount
$2,496,041.00
Summary
Australia has the highest reported rate of food allergy in the world. We aim to eradicate food allergy through improved prevention and cure, supported by evidence generated by our collaborative network of research. In addition, we aim to help prevent children with food allergy having anaphylaxis through improved public health policy and clinical pathways. As a second wave of the allergy epidemic, we are well positioned to turn back the tide of this newly emergent health threat to the public.
Epigenetic Regulation By PKC-theta In Human Breast Cancer Stem Cells.
Funder
National Health and Medical Research Council
Funding Amount
$818,132.00
Summary
Treating women with advanced breast cancer is difficult, and new drugs are needed to kill the cancer stem cells that cause recurrence. We think that a newly discovered protein, PKC-?, plays an important role in recurring breast cancer and can be targeted using novel ‘epigenetic’ drugs. Here, we will use cutting-edge DNA techniques to learn how this protein controls how cancer cells grow and produce the necessary data to show that targeting this protein is likely to be effective in real patients.