A Novel System for Surveillance of Moving Objects. Surveillance of moving objects is critical in numerous applications such as detection and recognition of motor vehicles. It is important for detection to be fast and accurate with low cost. In this project, we aim to implement a surveillance system consisting of an efficient algorithm on a PC network with a camera. Our detection algorithm will be achieved with an advanced and computationally powerful image representation for fast computation. It ....A Novel System for Surveillance of Moving Objects. Surveillance of moving objects is critical in numerous applications such as detection and recognition of motor vehicles. It is important for detection to be fast and accurate with low cost. In this project, we aim to implement a surveillance system consisting of an efficient algorithm on a PC network with a camera. Our detection algorithm will be achieved with an advanced and computationally powerful image representation for fast computation. Its accuracy will be enhanced by adapting a well recognized theory for fast removal of image noise. Our implementation on the PC network will provide a flexible and extensible platform for parallel computing to further reduce detection time while keeping costs low.Read moreRead less
Investigation and Development of Parallel Large Scale Record Linkage Techniques. Record linkage aims at matching records of the same entity (like customer or patient) in large (administrative) databases. The outcomes of the proposed research will improve current techniques in terms of efficiency, accuracy and the need for human intervention. Through experimental studies and stochastic modelling the performance of traditional and new methods for data cleaning, standardisation and linkage will be ....Investigation and Development of Parallel Large Scale Record Linkage Techniques. Record linkage aims at matching records of the same entity (like customer or patient) in large (administrative) databases. The outcomes of the proposed research will improve current techniques in terms of efficiency, accuracy and the need for human intervention. Through experimental studies and stochastic modelling the performance of traditional and new methods for data cleaning, standardisation and linkage will be assessed. The effect of the statistical dependency of attribute values will be studied. New methods using clustering for blocking large datasets, and predictive models including interaction terms will be implemented, analysed and evaluated on high-performance computers and office-based PC clusters.
Read moreRead less
Efficient Techniques for Mining Exceptional Patterns. This research will develop totally new techniques for exceptional pattern discovery that are useful for deeper understanding data mining and capturing the hidden interactions (class-bridge rules and out-expectation patterns) within data. This will enable Australian data marketers to access valuable implicit information that is contained in their data, but not currently accessible. The outcomes will keep Australia in the international leading ....Efficient Techniques for Mining Exceptional Patterns. This research will develop totally new techniques for exceptional pattern discovery that are useful for deeper understanding data mining and capturing the hidden interactions (class-bridge rules and out-expectation patterns) within data. This will enable Australian data marketers to access valuable implicit information that is contained in their data, but not currently accessible. The outcomes will keep Australia in the international leading edge and preserve its competitive status in preemptively defining the information market of tomorrow. To 'Frontier Technologies for Building and Transforming Australian Industries', discovering new exceptional patterns within data will lead to increased efficiency in Australian Industries.Read moreRead less
Analysing Iterative Machine Learning Algorithms with Information Geometric Methods. Online machine learning problems arise from situations where data is provided a point at a time. There are many classical algorithms for solving such problems based on the principle of stochastic gradient descent. Recent research by the CIs and others have thrown up interesting but diverse geometric connections that offer new insights. The proposed research aims to integrate the understanding of these algori ....Analysing Iterative Machine Learning Algorithms with Information Geometric Methods. Online machine learning problems arise from situations where data is provided a point at a time. There are many classical algorithms for solving such problems based on the principle of stochastic gradient descent. Recent research by the CIs and others have thrown up interesting but diverse geometric connections that offer new insights. The proposed research aims to integrate the understanding of these algorithms with the aim of designing algorithms better able to exploit prior knowledge, and to extend existing algorithms to new problem domains thus offering well principled and well understood algorithms for solving a variety of novel online problems.Read moreRead less
Privacy Preserving Data Mining as Autonomous Data Analysis Expands into Safeguarding from Threats like Crime and Terrorism. In a world characterized by digitally coded data, Data Mining allows automatic exploration of huge numbers of personal records for target marketing, as well as demographic, medical and criminal research. Investigations into terrorist attacks use this technology, but a balance with privacy protection is necessary. Even if names and unique identifiers are removed, computer me ....Privacy Preserving Data Mining as Autonomous Data Analysis Expands into Safeguarding from Threats like Crime and Terrorism. In a world characterized by digitally coded data, Data Mining allows automatic exploration of huge numbers of personal records for target marketing, as well as demographic, medical and criminal research. Investigations into terrorist attacks use this technology, but a balance with privacy protection is necessary. Even if names and unique identifiers are removed, computer methods can be used to infer confidential information about individuals. This project develops new techniques to ensure privacy and alleviate public concerns such as secondary use of personal data. We shall develop new methods for replacing original data with data that exhibits approximately the same patterns, but conceals sensitive data.Read moreRead less
Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by co ....Robust face detection and recognition for computer-based security surveillance. The research aims at improving the existing and creating new automated face detection and recognition methods by making them invariant, firstly to head pose, orientation, scale and rotation, and then to occlusion, lighting conditions and facial expressions.
A robust face detector will be developed first and then a new face recognition algorithm that continues to learn identity-specific discriminants on-line by collecting incremental face exemplars. The result of the research will be an algorithm that can improve its performance on-line adapting in a stable learning process each identity model to the correct facial examples.
The research has significant practical implication in visual surveillance increasing the robustness of identification of person identity, state and intent.
Read moreRead less
A more intelligent knowledge-based system apprentice. Our previous techniques already had an impact on Australian industry, with five Australian companies marketing such technology, and for three of these it is a central technology. We expect an early uptake of the enhancements we propose by these companies, greatly increasing their international competitiveness against other rule technologies. Three of these companies are very recent, so we would expect other company uptake of the new enhance ....A more intelligent knowledge-based system apprentice. Our previous techniques already had an impact on Australian industry, with five Australian companies marketing such technology, and for three of these it is a central technology. We expect an early uptake of the enhancements we propose by these companies, greatly increasing their international competitiveness against other rule technologies. Three of these companies are very recent, so we would expect other company uptake of the new enhanced technology. In turn Australian companies using the technology will improve their competitiveness in an increasingly knowledge-based economy by being able to more rapidly and easily deploy knowledge-based systems. Our previous techniques have already had a significant impact in medical practice.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effec ....Methodologies for automatic visual identification in heat detection aids. New techniques will be designed and developed to automate the existing manual heat detection of cattle, under general imaging conditions. The proposed intelligent system will consist of six stages: 1- image acquisition, 2- image preprocessing, 3- presence detection, 4- illumination compensation, 5- HD detection, and 6- heat detection. The proposed system will handle various image variations, and will be fast and cost-effective. The developed system will improve the productivity of Australian cattle industry.Read moreRead less
Unsupervised learning of finite mixture models in data mining applications. The extraction of useful information from massively large databases is known as data mining. Its broad but vague goal is to find "interesting structure" in the data, which typically leads to breaking the data into clusters. To this end, we consider the fast, efficient, and automatic learning of finite mixture models in hugh data sets without any prior knowledge of the structure. This probabilistic approach to the discove ....Unsupervised learning of finite mixture models in data mining applications. The extraction of useful information from massively large databases is known as data mining. Its broad but vague goal is to find "interesting structure" in the data, which typically leads to breaking the data into clusters. To this end, we consider the fast, efficient, and automatic learning of finite mixture models in hugh data sets without any prior knowledge of the structure. This probabilistic approach to the discovery and validation of group structure in data mining applications will considerably enhance knowledge management and decision support in science, industry, and government.
Read moreRead less