Reconceiving Machine Learning. The proposed research will develop a new way to consider problems to which machine learning can be applied. Machine learning is crucial enabler of the digital economy. The research will provide better opportunities for Australian industry to gain a competitive advantage with machine learning technology. The framework developed will enable better opportunities for collaborative research and will build and strengthen international linkages.
Privacy Preserving Data Mining as Autonomous Data Analysis Expands into Safeguarding from Threats like Crime and Terrorism. In a world characterized by digitally coded data, Data Mining allows automatic exploration of huge numbers of personal records for target marketing, as well as demographic, medical and criminal research. Investigations into terrorist attacks use this technology, but a balance with privacy protection is necessary. Even if names and unique identifiers are removed, computer me ....Privacy Preserving Data Mining as Autonomous Data Analysis Expands into Safeguarding from Threats like Crime and Terrorism. In a world characterized by digitally coded data, Data Mining allows automatic exploration of huge numbers of personal records for target marketing, as well as demographic, medical and criminal research. Investigations into terrorist attacks use this technology, but a balance with privacy protection is necessary. Even if names and unique identifiers are removed, computer methods can be used to infer confidential information about individuals. This project develops new techniques to ensure privacy and alleviate public concerns such as secondary use of personal data. We shall develop new methods for replacing original data with data that exhibits approximately the same patterns, but conceals sensitive data.Read moreRead less
A more intelligent knowledge-based system apprentice. Our previous techniques already had an impact on Australian industry, with five Australian companies marketing such technology, and for three of these it is a central technology. We expect an early uptake of the enhancements we propose by these companies, greatly increasing their international competitiveness against other rule technologies. Three of these companies are very recent, so we would expect other company uptake of the new enhance ....A more intelligent knowledge-based system apprentice. Our previous techniques already had an impact on Australian industry, with five Australian companies marketing such technology, and for three of these it is a central technology. We expect an early uptake of the enhancements we propose by these companies, greatly increasing their international competitiveness against other rule technologies. Three of these companies are very recent, so we would expect other company uptake of the new enhanced technology. In turn Australian companies using the technology will improve their competitiveness in an increasingly knowledge-based economy by being able to more rapidly and easily deploy knowledge-based systems. Our previous techniques have already had a significant impact in medical practice.Read moreRead less
Pattern Recognition and Scene Analysis via Machine Learning. We plan to use kernel methods, a novel machine learning technique, for computer vision problems, such as scene analysis and real time object recognition. Such capabilities are relevant for the design of intelligent and adaptive systems, suitable for complex real world environments. Expected outcomes are the design of efficient statistical tools which take the special nature of visual data into account (structure, decomposition, prior ....Pattern Recognition and Scene Analysis via Machine Learning. We plan to use kernel methods, a novel machine learning technique, for computer vision problems, such as scene analysis and real time object recognition. Such capabilities are relevant for the design of intelligent and adaptive systems, suitable for complex real world environments. Expected outcomes are the design of efficient statistical tools which take the special nature of visual data into account (structure, decomposition, prior knowledge of physical environments, etc.) and combine the advantages of feature based high-level vision methods with low-level machine learning techniques.
This proposal is part of a joint IST project with partners from the European Union.Read moreRead less
Emergency Control of Catastrophic Disturbances in a Power System. Following the tragic events of 11 September 2001, there are increased concerns about the security and robustness of power systems to evolving spectra of threats, such as natural disasters (e.g., earthquakes and hurricanes), equipment failure, human error, or deliberate sabotage and attack by terrorists. In this project, pattern recognition of local parameter changes in distributed monitoring systems will be used to identify any th ....Emergency Control of Catastrophic Disturbances in a Power System. Following the tragic events of 11 September 2001, there are increased concerns about the security and robustness of power systems to evolving spectra of threats, such as natural disasters (e.g., earthquakes and hurricanes), equipment failure, human error, or deliberate sabotage and attack by terrorists. In this project, pattern recognition of local parameter changes in distributed monitoring systems will be used to identify any threatened breakdown in the power system. Once identified, methods based on intelligent agents will be used to trigger the appropriate countermeasures to maintain the integrity of transmission grids.Read moreRead less
Kernel and Margin Based Machine Learning Algorithms. Certain machine learning algorithms, such as support vector machines, utilizing
the ideas of large margins and kernels have attracted much attention lately
because of their impressive performance on real world problems such as optical
character recognition. We plan to refine and extend such algorithms to a wide
range of different machine learning problems such as gene sequence analysis,
image processing and text classification. Expected ....Kernel and Margin Based Machine Learning Algorithms. Certain machine learning algorithms, such as support vector machines, utilizing
the ideas of large margins and kernels have attracted much attention lately
because of their impressive performance on real world problems such as optical
character recognition. We plan to refine and extend such algorithms to a wide
range of different machine learning problems such as gene sequence analysis,
image processing and text classification. Expected outcomes include the
development of software that allows the solution of hitherto unsolved machine
learning problems, and the ability to solve problems larger than those solvable
by the current generation of machine learning tools.Read moreRead less
Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by co ....Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by collecting incremental face exemplars. The result of the research will be an algorithm that can improve its performance on-line adapting in a stable learning process each identity model to the correct facial examples.
The research has significant practical implication in visual surveillance increasing the robustness of identification of person identity, state and intent.
Read moreRead less
Surviving the data deluge: Scalable feature extraction, discrimination and analysis for computer vision tasks using compressed sensed data. Strategically, our pioneering solutions besides being technically and socially significant, open fresh options for sensor-agnostic data analysis. The technical significance lies through the creation of new technologies for the critical national and global security markets, currently overwhelmed by data. The social significance arises from our solutions being ....Surviving the data deluge: Scalable feature extraction, discrimination and analysis for computer vision tasks using compressed sensed data. Strategically, our pioneering solutions besides being technically and socially significant, open fresh options for sensor-agnostic data analysis. The technical significance lies through the creation of new technologies for the critical national and global security markets, currently overwhelmed by data. The social significance arises from our solutions being privacy preserving, providing new avenues for the production of novel, socially acceptable products for aged care monitoring. Our methods spearhead future advancement in diverse disciplines due to the wide applicability of the methods to other sensor networks (Square Kilometre Array) and data types, providing new frameworks for addressing crucial problems of data management. Read moreRead less
Robust speech recognition in realistic hostile environments. Australia leads the world in the adoption of speech recognition technology but sadly lags in the development of the fundamental advances in the area. This research will help propel Australia to the forefront of new innovations in speech recognition technology and contributions to fundamental science. Our project will provide an excellent training ground for graduate students and researchers, with the real possibility of significant com ....Robust speech recognition in realistic hostile environments. Australia leads the world in the adoption of speech recognition technology but sadly lags in the development of the fundamental advances in the area. This research will help propel Australia to the forefront of new innovations in speech recognition technology and contributions to fundamental science. Our project will provide an excellent training ground for graduate students and researchers, with the real possibility of significant commercial benefit to the nation. The deployment of our system in the community will greatly enhance the defence and police forces ability for surveillance and security, and will provide new assistive aids to improve the quality of life and safety for the elderly and disabled.Read moreRead less
Enhanced Multilingual Speaker Recognition through the Incorporation of High-Level Features, Late Fusion and Discriminative Classification Methods. The development of robust multilingual speaker recognition systems will benefit the community through the elimination of fraud incurred by financial institutions and customers by enabling several person authentication applications such as: voice based signatures and document issuance; credit card verification by voice and secure over-the-phone financi ....Enhanced Multilingual Speaker Recognition through the Incorporation of High-Level Features, Late Fusion and Discriminative Classification Methods. The development of robust multilingual speaker recognition systems will benefit the community through the elimination of fraud incurred by financial institutions and customers by enabling several person authentication applications such as: voice based signatures and document issuance; credit card verification by voice and secure over-the-phone financial transactions. The technology will also assist in the protection of the community and safeguard Australia by enabling the implementation of the following: suspect identification using voice print; national security measures for combating terrorism by using voice to locate and track terrorists; preemptive criminal activity counter-measures; surveillance and secure building access by voice.Read moreRead less