Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-ba ....Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-based multimedia mining in Australia and elsewhere. In this project, we will explore techniques and develop algorithms for content-based multimedia retrieval and mining in multimedia databases.Read moreRead less
Ontologically-based Evaluation, Comparison and Engineering of Integrated Process Modelling Techniques. Integrated process modelling techniques such as UML and ARIS form the conceptual platform for many management and IT projects. Though most IS development tools contain these techniques, anecdotal evidence indicates many shortcomings. This project uses a well-established theory developed in philosophy and applied in information systems domains for the evaluation of these techniques. The expec ....Ontologically-based Evaluation, Comparison and Engineering of Integrated Process Modelling Techniques. Integrated process modelling techniques such as UML and ARIS form the conceptual platform for many management and IT projects. Though most IS development tools contain these techniques, anecdotal evidence indicates many shortcomings. This project uses a well-established theory developed in philosophy and applied in information systems domains for the evaluation of these techniques. The expected outcomes are evaluations of ARIS and UML. Thus, this project contributes to the development of two of the most popular modelling techniques. Based on the theory used and the results of an international empirical study, suggestions for the further development of these techniques will be derived.Read moreRead less
Design of a Reference Methodology for Extended Enterprise Architecture. Enterprises have nowadays a very critical perception of the actual benefits of Information Technology (IT). Significant investments in IT infrastructures have been made. However, in many cases no monetary benefits could be demonstrated. Enterprises Architectures provide a way to link the business and the IT perspective. This project aims to develop an operational methodology with a solid theoretical foundation for the design ....Design of a Reference Methodology for Extended Enterprise Architecture. Enterprises have nowadays a very critical perception of the actual benefits of Information Technology (IT). Significant investments in IT infrastructures have been made. However, in many cases no monetary benefits could be demonstrated. Enterprises Architectures provide a way to link the business and the IT perspective. This project aims to develop an operational methodology with a solid theoretical foundation for the design of such Enterprise Architectures. The outcomes and the innovation of this project are an extension of the popular Zachman Framework. Integrated modelling techniques proposed within the Architecture of Integrated Information Systems will be used to populate this framework.Read moreRead less
Integrating Database Technologies and Visual Analysis in Bioinformatics for Genome Data. Solving modern biological problems, especially those involving genome data, requires advanced computational and analytical methods. The huge quantities of data and escalating demands of modern biological research increasingly require the sophistication and power of object-relational database tools. Key techniques include relational data management, pattern recognition, data mining and visualization of biolog ....Integrating Database Technologies and Visual Analysis in Bioinformatics for Genome Data. Solving modern biological problems, especially those involving genome data, requires advanced computational and analytical methods. The huge quantities of data and escalating demands of modern biological research increasingly require the sophistication and power of object-relational database tools. Key techniques include relational data management, pattern recognition, data mining and visualization of biological data. In this project we will develop efficient methodologies and data structures for gathering high-quality approximations of full genomic information, and will use these innovations as the foundation to develop novel, practical tools for clustering and visualization in genomic data mining and database management.
Read moreRead less
Spotting Near-duplicate Sequences from Online Databases, Streams and Communities. This project studies a very important problem which has significant research and economy value. Advances in this project will reshape the landscape of media, commercial and legal service industries. Success of this project will not only establish us as an internationally leading research group but also bring significant economic and social benefits. Australia organizations with media assets will be benefited by sav ....Spotting Near-duplicate Sequences from Online Databases, Streams and Communities. This project studies a very important problem which has significant research and economy value. Advances in this project will reshape the landscape of media, commercial and legal service industries. Success of this project will not only establish us as an internationally leading research group but also bring significant economic and social benefits. Australia organizations with media assets will be benefited by saving enormous cost, improving service quality, protecting their intelligence properties, etc. It will also advance Australia's intellectual leadership in copyright compliance and benefit commercialization of research results.Read moreRead less
Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process mo ....Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process models. This language will enable superior approaches to business process modelling and hence smarter use of information. This will place Australia at the forefront of developments in business process management: a crucial technology in today's global, dynamic and heterogeneous environments.Read moreRead less
Understanding the impact of enterprise system use on system performance. To optimise organizational benefits, resource intensive enterprise systems must be appropriately used by all user cohorts. This study investigates the impact of system-use on system success. System-use patterns derived for all key user cohorts across the lifecycle phases will create management matrices to assist organizations maximise system-use.
UNLOCKING BENEFITS FROM ENTERPRISE SYSTEMS IN THE AUSTRALIAN PUBLIC SECTOR: Benefits Realisation in the Context of the Virtual Organisation. This study proposes to provide an innovative Virtual Organisation perspective to identify factors that can assist Australian government agencies to maximise the potential benefits from Enterprise System (ES) implementation. Study aims include: Identify and explicate major characteristics of the Virtual Organisation created through collaboration between gove ....UNLOCKING BENEFITS FROM ENTERPRISE SYSTEMS IN THE AUSTRALIAN PUBLIC SECTOR: Benefits Realisation in the Context of the Virtual Organisation. This study proposes to provide an innovative Virtual Organisation perspective to identify factors that can assist Australian government agencies to maximise the potential benefits from Enterprise System (ES) implementation. Study aims include: Identify and explicate major characteristics of the Virtual Organisation created through collaboration between government agency and (external) ES Implementation Partner; Identify and document features and constraints peculiar to ES implementation in the Australian public sector; Identify and explicate factors impacting on benefits realisation, relating these to theory from related fields; Highlight consensus and difference among stakeholders; Develop a validated, repeatable methodology for major impact studies; Inform ES research directions.Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less