Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by co ....Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by collecting incremental face exemplars. The result of the research will be an algorithm that can improve its performance on-line adapting in a stable learning process each identity model to the correct facial examples.
The research has significant practical implication in visual surveillance increasing the robustness of identification of person identity, state and intent.
Read moreRead less
Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effec ....Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effective. The developed system will improve the productivity of Australian cattle industry.Read moreRead less
Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of grea ....Methodologies for face recognition under varying imaging conditions. Face recognition systems are heavily dependent on the nature of the input to the system. Variability in appearance due to changes in illumination, expression, pose, etc. can reduce the recognition results of the existing systems. The aim of this project is to develop new techniques to improve the recognition accuracy in natural environment where unwanted image variations exist. The development of such techniques will be of great importance to Australia's security and safety. The outcome of this research will provide the first steps towards formulating the next generation recognition systems that will improve the suitability of the face recognition for use in security, surveillance, intelligent robotics, banking, and smart environments.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
DEVELOPING A SMART FIRE RISK ADVISORY SYSTEM USING FIRE MODELLING AND KNOWLEDGE-BASED SYSTEMS TECHNOLOGIES. This project aims to develop a prototype fire risk advisory system for fire prevention and protection. Intelligent knowledge-based systems technologies will be tailored to provide a standardised approach for fire risk analysis by using collective expertise of fire engineers and fire modelling. This project will lead to a significant advancement to the development of intelligent systems tec ....DEVELOPING A SMART FIRE RISK ADVISORY SYSTEM USING FIRE MODELLING AND KNOWLEDGE-BASED SYSTEMS TECHNOLOGIES. This project aims to develop a prototype fire risk advisory system for fire prevention and protection. Intelligent knowledge-based systems technologies will be tailored to provide a standardised approach for fire risk analysis by using collective expertise of fire engineers and fire modelling. This project will lead to a significant advancement to the development of intelligent systems techniques for industrial applications and provide a better fire risk analysis tool for fire protection and preventions with the benefit of reduced risk for buildings.
Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well ....Learning Semi-Naive Bayesian Classifiers from Numeric Data. This project addresses research priority 3, offering frontier technologies. It will deliver better and faster classification technologies that greatly help accomplish many real-world tasks including medical diagnosis, fraud detection, spam filtering and webpage search, where accurate and fast classification is critical to save life, increase efficiency, reduce crime and conserve resources. Hence this project addresses priority 4 as well, better safeguarding Australia from disease and crime. This project will also support a young research group of international standing. It will train the involved researchers to attain a high level of proficiency and excellence in machine learning research and development.Read moreRead less
Resource-bounded adaptive inference of accurate conditional probability estimates from data. This project will develop machine learning techniques with a valuable new capability: the ability to produce estimates of complex conditional probabilities to varying levels of expected accuracy depending upon the constraints of available computational resources. This will provide significant competitive advantage to developers of many types of online application by allowing them to maximise utilisation ....Resource-bounded adaptive inference of accurate conditional probability estimates from data. This project will develop machine learning techniques with a valuable new capability: the ability to produce estimates of complex conditional probabilities to varying levels of expected accuracy depending upon the constraints of available computational resources. This will provide significant competitive advantage to developers of many types of online application by allowing them to maximise utilisation of available computational resources when making inferences from data, together with the flexibility to trade-off accuracy and computing resources during system design. Australia will also benefit by strengthening its machine learning expertise, which is central to many complex and intelligent systems and the booming data mining industry.Read moreRead less
Supporting adaptive, interactive documents. The project will improve comprehensibility of technical material, reduce paper usage, encourage collaborative science, improve the reliability of published science (by allowing post-publication annotation and correction), and improve the accessibility of technical material for readers who are blind or have poor vision. The project also holds considerable potential for supporting Australian companies in the publishing and document processing industries.
A Compositional Model for Verifying and Programming Ecologies of Smart Internet Devices. Emerging in 21st century computing is what we perceive as device ecologies, or collections of devices that can exhibit smart behaviour, automate tasks, interact synergistically with one another, with users and Internet resources, and provide aid and value in daily life and work. Device ecologies will be seen in areas as diverse as e-commerce, health care, home automation, office automation, manufacturing, an ....A Compositional Model for Verifying and Programming Ecologies of Smart Internet Devices. Emerging in 21st century computing is what we perceive as device ecologies, or collections of devices that can exhibit smart behaviour, automate tasks, interact synergistically with one another, with users and Internet resources, and provide aid and value in daily life and work. Device ecologies will be seen in areas as diverse as e-commerce, health care, home automation, office automation, manufacturing, and defense. This project will develop a novel model and language for analyzing and programming device ecologies. This will be an Australian contribution towards techniques for constructing advanced applications that work over the computing infrastructure of the future.Read moreRead less