Pattern Recognition and Scene Analysis via Machine Learning. We plan to use kernel methods, a novel machine learning technique, for computer vision problems, such as scene analysis and real time object recognition. Such capabilities are relevant for the design of intelligent and adaptive systems, suitable for complex real world environments. Expected outcomes are the design of efficient statistical tools which take the special nature of visual data into account (structure, decomposition, prior ....Pattern Recognition and Scene Analysis via Machine Learning. We plan to use kernel methods, a novel machine learning technique, for computer vision problems, such as scene analysis and real time object recognition. Such capabilities are relevant for the design of intelligent and adaptive systems, suitable for complex real world environments. Expected outcomes are the design of efficient statistical tools which take the special nature of visual data into account (structure, decomposition, prior knowledge of physical environments, etc.) and combine the advantages of feature based high-level vision methods with low-level machine learning techniques.
This proposal is part of a joint IST project with partners from the European Union.Read moreRead less
Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, ....Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, diving style) of a sports-person, or capture the motion of an actor for animation or game applications. Development of a reliable technology requires new optimization techniques, which will place Australia at the forefront of the application of such research, commercially and for the public benefit.Read moreRead less
Generic Content-based News Picture Retrieval with Local Invariant Features. Image Retrieval searches for images from large databases whose visual content meets the requirements submitted by users. Besides directly benefiting the Partner Organization, this project will enable more efficient access to large picture repositories in news agencies and publishers, digital libraries and film archives. It will make public use of visual information much more convenient and economical. It will help securi ....Generic Content-based News Picture Retrieval with Local Invariant Features. Image Retrieval searches for images from large databases whose visual content meets the requirements submitted by users. Besides directly benefiting the Partner Organization, this project will enable more efficient access to large picture repositories in news agencies and publishers, digital libraries and film archives. It will make public use of visual information much more convenient and economical. It will help security officers to effortlessly and accurately find particular scenes from the images generated by a large closed-circuit TV networks. Also, the developed technology can be applied to tele-education and e-commerce. New algorithms developed in this project will benefit the Australian and world scientific communities.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Parallel and Distributed Machine Learning - Smart Data Analysis in the Multicore Era. In large data centres our research will lead to reduced energy consumption by using graphics cards which have a much better computation to power ratio than traditional processors. On desktop computers, it will make machine learning practical by enabling efficient algorithms for spam filtering and content analysis. On networked systems it will lead to distributed inference, caching and collaborative filtering ap ....Parallel and Distributed Machine Learning - Smart Data Analysis in the Multicore Era. In large data centres our research will lead to reduced energy consumption by using graphics cards which have a much better computation to power ratio than traditional processors. On desktop computers, it will make machine learning practical by enabling efficient algorithms for spam filtering and content analysis. On networked systems it will lead to distributed inference, caching and collaborative filtering applications which will both reduced the bandwidth required and make the internet safer for users. Finally, it will enable rapid deployment of sensor networks for monitoring and detection, such as for environmental monitoring and safeguarding Australia's borders.Read moreRead less
Geometric parameters in Learning Theory. We aim to investigate the behaviour of geometric parameters which appear naturally in Statistical Learning Theory. Those parameters are used to control the sample complexity, which is the size of a random sample needed to produce an accurate prediction. They are also of independent interest in the local theory of Banach spaces. We shall use geometric methods originating in the local theory of Banach spaces to investigate the parameters and the way they in ....Geometric parameters in Learning Theory. We aim to investigate the behaviour of geometric parameters which appear naturally in Statistical Learning Theory. Those parameters are used to control the sample complexity, which is the size of a random sample needed to produce an accurate prediction. They are also of independent interest in the local theory of Banach spaces. We shall use geometric methods originating in the local theory of Banach spaces to investigate the parameters and the way they influence sample complexity. All the problems we focus on are not only important from the Machine Learning point of view, but are intriguing in their theoretical implications.Read moreRead less
Reconceiving Machine Learning. The proposed research will develop a new way to consider problems to which machine learning can be applied. Machine learning is crucial enabler of the digital economy. The research will provide better opportunities for Australian industry to gain a competitive advantage with machine learning technology. The framework developed will enable better opportunities for collaborative research and will build and strengthen international linkages.
Special Research Initiatives - Grant ID: SR0566892
Funder
Australian Research Council
Funding Amount
$220,000.00
Summary
The EarthByte software and database system. Earth processes over geological timescales cannot be understood outside of a plate tectonic context. However, no standard tool exists to explore the causes and effects of lithosphere-mantle interaction in accordance with past plate configurations. Our aim is to develop a Palaeo-Geographic Information System called EarthByte that will connect the open source and architecture-independent GPlates and GMT software, and implement XML-based service interfac ....The EarthByte software and database system. Earth processes over geological timescales cannot be understood outside of a plate tectonic context. However, no standard tool exists to explore the causes and effects of lithosphere-mantle interaction in accordance with past plate configurations. Our aim is to develop a Palaeo-Geographic Information System called EarthByte that will connect the open source and architecture-independent GPlates and GMT software, and implement XML-based service interfaces and databases. EarthByte will create the foundation for an e-geoscience framework for grid-based data access and Earth process modelling by linking geological and geophysical observations to palaeogeographic models for constraining mantle convection and lithospheric deformation.Read moreRead less
Accurate Performance Modelling and Prediction of Cluster Computers. The tools, methodologies and data produced by this project will assist
Australian academic and industrial organisations in choosing the most
cost-effective cluster configurations for their specific high
performance computing requirements. It will also help an Australian
company to compete with increasing strength against the major
multinationals. The project will also draw together and promote future
research links between ....Accurate Performance Modelling and Prediction of Cluster Computers. The tools, methodologies and data produced by this project will assist
Australian academic and industrial organisations in choosing the most
cost-effective cluster configurations for their specific high
performance computing requirements. It will also help an Australian
company to compete with increasing strength against the major
multinationals. The project will also draw together and promote future
research links between two major academic institutions in this field.
Finally, the project will provide high-level training in research,
with industrial grounding, in the high performance computing industry.
Read moreRead less
Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, rec ....Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, recently
developed algorithms to estimate the support of a distribution and
detect rare events will be employed in this context.
The project is in cooperation with Dr. Ralf Herbrich (Microsoft
Research, Cambridge).
Read moreRead less