Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by co ....Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by collecting incremental face exemplars. The result of the research will be an algorithm that can improve its performance on-line adapting in a stable learning process each identity model to the correct facial examples.
The research has significant practical implication in visual surveillance increasing the robustness of identification of person identity, state and intent.
Read moreRead less
Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effec ....Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effective. The developed system will improve the productivity of Australian cattle industry.Read moreRead less
Integrating deep-earth and surface processes for frontier-basin exploration. It is well-known that mantle convection has a profound influence on basin evolution, and the next step will be to quantify this relationship and provide the science that will make these concepts applicable to exploration. To do this, we will develop a workflow to link plate-reconstruction software with the mantle convection modelling to link plate motions mantle convection and the history of sedimentation systematically ....Integrating deep-earth and surface processes for frontier-basin exploration. It is well-known that mantle convection has a profound influence on basin evolution, and the next step will be to quantify this relationship and provide the science that will make these concepts applicable to exploration. To do this, we will develop a workflow to link plate-reconstruction software with the mantle convection modelling to link plate motions mantle convection and the history of sedimentation systematically for the first time for frontier basin-scale applications. We will apply these emerging technologies to the evolution of basins in the Arctic borderlands frontier for resource exploration and on the Australian continent.Read moreRead less
Defence Against Phishing Attacks. Australian businesses and citizens are losing millions of dollars in cybercrimes every year. Rural and regional businesses depend on the integrity of their Internet banking service, and yet, cybercriminals are working hard to defraud these users. This project aims to build a reliable defence against phishing attacks which rely on social engineering to steal online identities, using intelligence gathered from the brazen trade of credentials in the public domain.
Investigation and Development of Parallel Large Scale Record Linkage Techniques. Record linkage aims at matching records of the same entity (like customer or patient) in large (administrative) databases. The outcomes of the proposed research will improve current techniques in terms of efficiency, accuracy and the need for human intervention. Through experimental studies and stochastic modelling the performance of traditional and new methods for data cleaning, standardisation and linkage will be ....Investigation and Development of Parallel Large Scale Record Linkage Techniques. Record linkage aims at matching records of the same entity (like customer or patient) in large (administrative) databases. The outcomes of the proposed research will improve current techniques in terms of efficiency, accuracy and the need for human intervention. Through experimental studies and stochastic modelling the performance of traditional and new methods for data cleaning, standardisation and linkage will be assessed. The effect of the statistical dependency of attribute values will be studied. New methods using clustering for blocking large datasets, and predictive models including interaction terms will be implemented, analysed and evaluated on high-performance computers and office-based PC clusters.
Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
UNLOCKING BENEFITS FROM ENTERPRISE SYSTEMS IN THE AUSTRALIAN PUBLIC SECTOR: Benefits Realisation in the Context of the Virtual Organisation. This study proposes to provide an innovative Virtual Organisation perspective to identify factors that can assist Australian government agencies to maximise the potential benefits from Enterprise System (ES) implementation. Study aims include: Identify and explicate major characteristics of the Virtual Organisation created through collaboration between gove ....UNLOCKING BENEFITS FROM ENTERPRISE SYSTEMS IN THE AUSTRALIAN PUBLIC SECTOR: Benefits Realisation in the Context of the Virtual Organisation. This study proposes to provide an innovative Virtual Organisation perspective to identify factors that can assist Australian government agencies to maximise the potential benefits from Enterprise System (ES) implementation. Study aims include: Identify and explicate major characteristics of the Virtual Organisation created through collaboration between government agency and (external) ES Implementation Partner; Identify and document features and constraints peculiar to ES implementation in the Australian public sector; Identify and explicate factors impacting on benefits realisation, relating these to theory from related fields; Highlight consensus and difference among stakeholders; Develop a validated, repeatable methodology for major impact studies; Inform ES research directions.Read moreRead less
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advance ....Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments. The project's benefits can be summarised as follows. (a) The project will provide new solutions that enable remote access to health-care data in a secure and privacy-preserving manner. (b) This will improve health care services in northern metropolitan Melbourne, and provide shorter medical response time, which is particularly important in emergency scenarios. (c) It will exemplify advanced IT support for health care, which can be utilised by other providers. (d) The project will make a direct link between IT research and its industrial application. (e) The project will also give the opportunity to a postdoctoral researcher and PhD students to perform leading edge research on privacy protection of information in an industrial environment.Read moreRead less
Real-time special effects in live video. Allowing a user to model objects in the real world in real time greatly improves the efficiency of the large-scale modelling process. A user might thus generate a model of a city block by navigating it it, construct a 3D model of a factory by traversing it, generate a simulation of an industrial process by carrying it out, or design a new building directly upon the space it will occupy. The augmentation of reality will be a critical component of the fut ....Real-time special effects in live video. Allowing a user to model objects in the real world in real time greatly improves the efficiency of the large-scale modelling process. A user might thus generate a model of a city block by navigating it it, construct a 3D model of a factory by traversing it, generate a simulation of an industrial process by carrying it out, or design a new building directly upon the space it will occupy. The augmentation of reality will be a critical component of the future of video cameras, computers and phones. The business opportunities associated with developing technologies in these areas offer significant prospects for Australian ICT industries.Read moreRead less