A scheme of local compilation of mobile collectors for image and video search engines. The object collector is an important component in a Web search engine. A collector collects Web objects (text, image, video, etc), extracts their features and builds an index file for the search engine. Sending each object to the collector is always the worst option with respect to resource usage because it is the feature, not the entire object, which will be used in indexing and retrieval. An alternative is t ....A scheme of local compilation of mobile collectors for image and video search engines. The object collector is an important component in a Web search engine. A collector collects Web objects (text, image, video, etc), extracts their features and builds an index file for the search engine. Sending each object to the collector is always the worst option with respect to resource usage because it is the feature, not the entire object, which will be used in indexing and retrieval. An alternative is to send a collector to the source site, which has an advantage of distributing computational load and performing summarization and compression. This project proposes a locally compiled mobile collector for image and video search engines.Read moreRead less
Supply Chain Management and eProcurement. This project will assist Australian firms assess the impact of emerging Internet-enabled electronic business (e-business) initiatives in the area of procurement and supply chain management. The aims are to identify factors that constrain/enable e-procurement in creating sustained value; describe key elements of suceses in the development, application and effective use of e-procurement; provide the basis for assessing progress in understanding and use of ....Supply Chain Management and eProcurement. This project will assist Australian firms assess the impact of emerging Internet-enabled electronic business (e-business) initiatives in the area of procurement and supply chain management. The aims are to identify factors that constrain/enable e-procurement in creating sustained value; describe key elements of suceses in the development, application and effective use of e-procurement; provide the basis for assessing progress in understanding and use of successive waves of innovation in areas of e-procurement and supply chain management; and develop industry benchmarks for critical dimensions of effectiveness in these areas.Read moreRead less
Data Management Technologies for the Magnetic Resonance Imaging e-Research Grid. Howard Florey Institute researchers will collaborate with SGI's file-systems engineering team. Substantial benefits are expected from the development of techniques to support centralized and distributed processing medical image datasets. Issues requiring research include file space allocation algorithms and caching strategies. The proposed rapid database access technologies aim at solving these problems in the medic ....Data Management Technologies for the Magnetic Resonance Imaging e-Research Grid. Howard Florey Institute researchers will collaborate with SGI's file-systems engineering team. Substantial benefits are expected from the development of techniques to support centralized and distributed processing medical image datasets. Issues requiring research include file space allocation algorithms and caching strategies. The proposed rapid database access technologies aim at solving these problems in the medical imaging research context. The project attempts to 'improve data management for existing and new business applications'. This enhanced sharing of information will improve critical mass therefore fostering national and international collaboration. Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Practical methodologies for agent-oritented conceptual modelling. Conceptual modelling involves using knowledge representation techniques to support the requirements engineering phase of the software life-cycle. Agent-oriented conceptual modelling is a relatively new technique that offers significant benefits in modelling complex organisational information systems. However, several problems need to be addressed with current agent-oriented conceptual modelling languages and methodologies. In the ....Practical methodologies for agent-oritented conceptual modelling. Conceptual modelling involves using knowledge representation techniques to support the requirements engineering phase of the software life-cycle. Agent-oriented conceptual modelling is a relatively new technique that offers significant benefits in modelling complex organisational information systems. However, several problems need to be addressed with current agent-oriented conceptual modelling languages and methodologies. In the context of a PhD dissertation, this project will develop an improved agent-oriented conceptual modelling framework and related requirements elicitation techniques drawing on advances in Artificial intelligenct, Requireents Engineering and Organisational Semiotics. The practical deliverables of this project will address the needs of a large complex government organisation.Read moreRead less
Data Mining of Activity Transactions to Strengthen Debt Prevention. A national benefit from this research will be the significant analytical contribution to the prevention of incorrect payment directly associated with 30% of Commonwealth outlays. Funds not incorrectly paid will be available for direction to other areas of national importance. Another benefit is the new technology will have application in commercial, state and federal government agencies where research into activity, event or pro ....Data Mining of Activity Transactions to Strengthen Debt Prevention. A national benefit from this research will be the significant analytical contribution to the prevention of incorrect payment directly associated with 30% of Commonwealth outlays. Funds not incorrectly paid will be available for direction to other areas of national importance. Another benefit is the new technology will have application in commercial, state and federal government agencies where research into activity, event or process data can be used to improve service delivery outcomes. A further national benefit will be the development and use of frontier activity transaction mining techniques to ensure Australia a leading role in enterprise data mining research and development.Read moreRead less
Pattern Analysis and Risk Control of E-Commerce Transactions to Secure Online Payments. The instant filtering of risky online payments is critical for merchants and online payment service providers to control fraud and thus reduce immense losses every year. This project will deliver new and workable techniques for on-the-fly discovering e-payment fraudsters in e-commerce. It can safeguard Australian online businesses and build and transform Australian merchants and online payment associations by ....Pattern Analysis and Risk Control of E-Commerce Transactions to Secure Online Payments. The instant filtering of risky online payments is critical for merchants and online payment service providers to control fraud and thus reduce immense losses every year. This project will deliver new and workable techniques for on-the-fly discovering e-payment fraudsters in e-commerce. It can safeguard Australian online businesses and build and transform Australian merchants and online payment associations by delivering frontier techniques and smart e-payment fraud prevention and risk control to boost Australian online businesses and competitive capabilities globally. The resulting systems, researchers trained and publications will further enhance Australia's global leading role in tackling critical data mining challenges and applications.Read moreRead less
Design of Service Interfaces for e-Business Applications. Economic pressures are rapidly driving businesses towards automation of e-business (electronic business) transactions. Successful e-business relies on accurate interchange of information among large numbers of autonomous partner organizations with different business semantics. Web services are widely regarded as having the potential to provide a suitable platform for the implementation of e-business applications, however so far only limit ....Design of Service Interfaces for e-Business Applications. Economic pressures are rapidly driving businesses towards automation of e-business (electronic business) transactions. Successful e-business relies on accurate interchange of information among large numbers of autonomous partner organizations with different business semantics. Web services are widely regarded as having the potential to provide a suitable platform for the implementation of e-business applications, however so far only limited attention was paid to Web services design. The aim of this project is to develop a design method suitable for developing a comprehensive and consistent set of Web services for a given application domain and to verify this method using a prototype implementation.Read moreRead less
Introducing computer-based documentation to Residential Aged Care: a multi-method evaluation of success. Improvements to quality and use of evidence-based methods in residential aged-care are restricted due to the very slow adoption of electronic information systems. This research will provide key investors, government, aged care providers and IT vendors, with tools to measure success in introducing IT into this sector. The project will create a platform with the national peak body, to dissemina ....Introducing computer-based documentation to Residential Aged Care: a multi-method evaluation of success. Improvements to quality and use of evidence-based methods in residential aged-care are restricted due to the very slow adoption of electronic information systems. This research will provide key investors, government, aged care providers and IT vendors, with tools to measure success in introducing IT into this sector. The project will create a platform with the national peak body, to disseminate lessons in successful implementation of computerised systems in residential aged-care, based on studies in two states. The studies will also benefit the international community researching technology adoption, by extending its boundary condition to a novel setting.Read moreRead less
Personalized, Adaptive, and Semantic-driven Selection and Composition of Web Services. Web services are the pillar of the new generation of Internet technologies. They provide standardized access to functionality that would otherwise be hidden inside enterprise information systems. As the existing base of web services expands, there is a need for techniques to select, configure, assemble, and coordinate web services to perform complex user tasks. This project will advance the fundamental underst ....Personalized, Adaptive, and Semantic-driven Selection and Composition of Web Services. Web services are the pillar of the new generation of Internet technologies. They provide standardized access to functionality that would otherwise be hidden inside enterprise information systems. As the existing base of web services expands, there is a need for techniques to select, configure, assemble, and coordinate web services to perform complex user tasks. This project will advance the fundamental understanding and know-how in this area by addressing three complementary research challenges: how to, organize and search semantically rich service descriptions; select services with respect to flexible and personalized criteria; and coordinate services in an adaptive and context-aware manner.Read moreRead less