Linkage Infrastructure, Equipment And Facilities - Grant ID: LE240100131
Funder
Australian Research Council
Funding Amount
$539,000.00
Summary
Federated Omniverse Facilities for Smart Digital Futures. A world-first trans-disciplinary, -domain, and -institutional smart 3D omniverse R&D ecosystem AuVerse will be built in NSW, affiliated with Queensland, and accessible to academia and industry. AuVerse will support cloud-based, reality-virtuality-fused, immersive, interactive and secure future-oriented digital design, development, training and society. In the new era of digital innovation and paradigm shift, AuVerse will substantially boo ....Federated Omniverse Facilities for Smart Digital Futures. A world-first trans-disciplinary, -domain, and -institutional smart 3D omniverse R&D ecosystem AuVerse will be built in NSW, affiliated with Queensland, and accessible to academia and industry. AuVerse will support cloud-based, reality-virtuality-fused, immersive, interactive and secure future-oriented digital design, development, training and society. In the new era of digital innovation and paradigm shift, AuVerse will substantially boost Australia’s pivotal research leadership and business competitiveness in nurturing new-generation, collaborative and transformative digital R&D and talent pipeline. It will enable large-scale strategic business innovation and transformation including smart manufacturing and Industry 4.0.Read moreRead less
Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are propos ....Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are proposed to develop recommender systems in a more responsible manner. The result of this project will not only maintain Australia's leadership in this frontier research area, but also serve as an excellent vehicle for the education and training of Australia's next generation of scholars and engineers.Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linea ....Use of Interval Arithmetic and GRID Computing in Computational Molecular Science: Bounding Errors and Locating Global Minima. Catastrophic failure of the Ariane 5 rocket in 1996 and the inability of Patriot missile systems to reach their targets during the 1991 Gulf war were both attributed to numerical computing errors. Less dramatic, but in a similar vein, this project aims to study the numerical stability of contemporary computational molecular science applications. The focus will be on linear scaling electronic structure codes, methods that are critical to the study of nano- and bio-materials, and are therefore of great importance to our economic future and medical well being. The project will build expertise within Australia in the area of interval arithmetic, an area that is currently poorly represented.Read moreRead less
Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and wo ....Rigorous Privacy Compliance in Modern Application Ecosystems. Modern network applications such as mobile applications and browser extensions have become the primary gateways for consumers to access the Internet in today’s digital landscape. This project aims to address privacy issues in these ecosystems by developing a new privacy-compliance assessment framework. The framework will evaluate the current privacy practices of application ecosystems, enabling users and developers in Australia and worldwide to reliably identify potential privacy risks and issues on their applications. The intended outcomes should endow data controllers with the capability of evidencing their compliance of data protection legislations such as Australia Privacy Act 1988 and EU General Data Protection Regulation (GDPR).Read moreRead less
Optimising throughput and Delay in network coded systems. This project addresses one main disadvantage of network coding: decoding delay. By solving this issue, we will unlock the true potential of network coding: delivery of high data rates in wireless and wireline networks. This will make network coding an attractive choice for live video streaming and mission-critical delay-sensitive applications.
Using data mining methods to remove uncertainties in sensor data streams. This project will develop key techniques for removing uncertainties in sensor data streams and thus improve the monitoring quality of sensor networks. The expected outcomes will benefit Australia by enabling improved, lower-cost monitoring of natural resources and management of stock raising.
Privacy-preserving record linkage on multiple large databases. Record linkage has been recognised as a crucial infrastructure component in many information systems, however privacy concerns commonly prevent the linking of databases that contain personal information. This project will develop techniques that will enable the linking of multiple large databases without revealing any private information.
Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is ....Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is relevant to public-key cryptography, where breaking an encryption scheme should be infeasible, and to many real-life situations where NP-complete problems need to be solved, either exactly or approximately.Read moreRead less