Integrating deep-earth and surface processes for frontier-basin exploration. It is well-known that mantle convection has a profound influence on basin evolution, and the next step will be to quantify this relationship and provide the science that will make these concepts applicable to exploration. To do this, we will develop a workflow to link plate-reconstruction software with the mantle convection modelling to link plate motions mantle convection and the history of sedimentation systematically ....Integrating deep-earth and surface processes for frontier-basin exploration. It is well-known that mantle convection has a profound influence on basin evolution, and the next step will be to quantify this relationship and provide the science that will make these concepts applicable to exploration. To do this, we will develop a workflow to link plate-reconstruction software with the mantle convection modelling to link plate motions mantle convection and the history of sedimentation systematically for the first time for frontier basin-scale applications. We will apply these emerging technologies to the evolution of basins in the Arctic borderlands frontier for resource exploration and on the Australian continent.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise th ....A Data-Centric Mobile Edge Platform for Resilient Logistics & Supply Chain. This project aims to develop a secure mobile edge computing platform for resilient logistic and supply chain management. It consists of easy-used functions that help businesses realise low latency, high reliability, low cost, and high security in their logistics and supply chain system. To cope with the vast generated application data, we invent new data replication, placement, and deduplication techniques to optimise the mobile edge computing platform from the computation, storage, and network aspects. The invented mobile edge computing platform will enable more intelligent business applications for various industries, e.g., IT, manufacturing, and media, to appear, thus benefiting both the economy of Australia.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Thermoforming Mechanisms for Cost-effective Manufacturing of Advanced Composite Structures. The cost barrier in thermoforming, due to the lack of understanding of shear deformation and wrinkling, has inhibited the large-scale application of fibre-reinforced composite structures in aerospace and automobile industries. This project aims to develop a cost-effective diaphragm thermoforming process through an in-depth understanding of the thermoforming mechanisms. The outcomes will include novel theo ....Thermoforming Mechanisms for Cost-effective Manufacturing of Advanced Composite Structures. The cost barrier in thermoforming, due to the lack of understanding of shear deformation and wrinkling, has inhibited the large-scale application of fibre-reinforced composite structures in aerospace and automobile industries. This project aims to develop a cost-effective diaphragm thermoforming process through an in-depth understanding of the thermoforming mechanisms. The outcomes will include novel theories for thermoforming, a standard method for material property characterization and new finite element models compatible with the most popular software available for industry. The project will form the basis for establishing the effective production window and enhance greatly the competitive edge of the Australian manufacturing industry.Read moreRead less
Remote sensing to improve structural efficiency of high-speed catamarans. This project aims to develop a monitoring system to remotely measure ship motions, loads and ride control activity under commercial operations. Data will be analysed using advanced statistical methods to inform evidence-based design to improve both structural efficiency and passenger comfort. The research will impact on design rules used worldwide, reducing weight and increasing payload and transport efficiency for this cl ....Remote sensing to improve structural efficiency of high-speed catamarans. This project aims to develop a monitoring system to remotely measure ship motions, loads and ride control activity under commercial operations. Data will be analysed using advanced statistical methods to inform evidence-based design to improve both structural efficiency and passenger comfort. The research will impact on design rules used worldwide, reducing weight and increasing payload and transport efficiency for this class of vessel. A "Smart” semi-autonomous interface will be developed to provide on-board seakeeping guidance to the ship captain. This technology will have significant benefits such as increased ship safety, vessel longevity and improving passenger comfort for all types of vessels worldwide including high-speed catamarans.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Talking about place: tapping human knowledge to enrich national spatial data sets. Place descriptions are a common way for people to describe a location, but no current tools are smart enough to understand them. Emergency call centres are risking lives, users of navigation or web services are frustrated and addressing these problems costs billions of dollars per year. This project comes with a novel, interdisciplinary approach to automatically interpret human place descriptions and will develop ....Talking about place: tapping human knowledge to enrich national spatial data sets. Place descriptions are a common way for people to describe a location, but no current tools are smart enough to understand them. Emergency call centres are risking lives, users of navigation or web services are frustrated and addressing these problems costs billions of dollars per year. This project comes with a novel, interdisciplinary approach to automatically interpret human place descriptions and will develop novel methods to capture placenames with their meaning for smarter databases and automatic interpretation procedures. This acquired knowledge will be an important step forward for Australia's data custodians and users. Australia's location information industry will gain a significant advantage on a highly competitive global market.Read moreRead less
Onset Theory: Pushing the design envelope for textile composite structures. This study aims to exploit an innovative physics-based approach to predict the strength of textile composites. This is particularly important in areas such as aircraft design, where drastic weight savings are needed to allow designers to remain competitive in a low-carbon future. Improved theory and design tools will remove conservatism and account for a large part of these weight savings. The new approach is the first t ....Onset Theory: Pushing the design envelope for textile composite structures. This study aims to exploit an innovative physics-based approach to predict the strength of textile composites. This is particularly important in areas such as aircraft design, where drastic weight savings are needed to allow designers to remain competitive in a low-carbon future. Improved theory and design tools will remove conservatism and account for a large part of these weight savings. The new approach is the first to be consistent at all length scales — from atoms to aeroplanes — ensuring relevance for new and evolving composite material systems. A novel understanding of crack initiation in textile laminates is intended to reduce design and certification effort for new aircraft and help to design more efficient airframes at a lower cost.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less