Validating And Optimising The Analysis Of Magnetic Resonance Physiology Data
Funder
National Health and Medical Research Council
Funding Amount
$91,725.00
Summary
Combined electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) is used to detect the anatomical areas in the brain that show electrical activity. Several centres worldwide use this technique to localise the seizure focus in patients with epilepsy. However, there is a lack of validation of the currently applied techniques. Current analysis methods have been developed and validated for other fMRI paradigms, such as motor tasks. It is not known whether the same principles ar ....Combined electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) is used to detect the anatomical areas in the brain that show electrical activity. Several centres worldwide use this technique to localise the seizure focus in patients with epilepsy. However, there is a lack of validation of the currently applied techniques. Current analysis methods have been developed and validated for other fMRI paradigms, such as motor tasks. It is not known whether the same principles are applicable and optimal for fMRI-EEG data. The proposed project aims at validating and optimising the analysis strategies for fMRI-EEG data.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Constrained and Stable Solutions of Nonlinear and Semismooth Equations. In this project, comprehensive models for designing safe power system parameters will be proposed, efficient algorthms for solving these models will be constructed. The new models and algorithms in this project will provide efficient tools to prevent catastrophic events in power systems, which is related with national security. This project will also strengthen collaboration of Australian applied
mathematians with inter ....Constrained and Stable Solutions of Nonlinear and Semismooth Equations. In this project, comprehensive models for designing safe power system parameters will be proposed, efficient algorthms for solving these models will be constructed. The new models and algorithms in this project will provide efficient tools to prevent catastrophic events in power systems, which is related with national security. This project will also strengthen collaboration of Australian applied
mathematians with international researchers and engineering scientists. This is important for the advance of science and technology in
Australia.Read moreRead less
Fast, practical and effective algorithms for clustering with advice. To maintain a safe and healthy society, government and industry need high quality immunization and national security databases. Since we cannot afford to have duplicate, incomplete and conflicting records that refer to the same person, we unify them by identifying clusters of related records.
In the emerging field of functional genomics, diagnosis of certain diseases is enhanced by determining which genes act together. Diffe ....Fast, practical and effective algorithms for clustering with advice. To maintain a safe and healthy society, government and industry need high quality immunization and national security databases. Since we cannot afford to have duplicate, incomplete and conflicting records that refer to the same person, we unify them by identifying clusters of related records.
In the emerging field of functional genomics, diagnosis of certain diseases is enhanced by determining which genes act together. Different experimental runs might result in different clusterings of genes: we need one consensus clustering that summarizes the experimental outcomes.
Cleaning databases and combining clusterings by hand would require vast amounts of time. This project will result in faster and more accurate computational procedures.Read moreRead less
Determining The Impact Of Pharmaceutical Opioid Use In Australia: A Focus On Burden, Risks And Harms
Funder
National Health and Medical Research Council
Funding Amount
$320,891.00
Summary
Despite a dramatic increase in opioid use in Australia and increasing concern about this issue, there are few detailed and robust data on the magnitude of opioid use in the community, and the characteristics of those at risk of adverse outcomes. This program of work will produce unique population-level evidence about the burden, risks and health consequences of opioid use in Australia, to better inform future policies and interventions regarding opioid prescribing to improve clinical outcomes.
Driving Towards Greener and Safer Roads using Big Spatiotemporal Data. This project aims to design novel techniques for using big spatiotemporal data to reduce the impact of road transport on the environment and improve road safety. This project expects to address key challenges and lay scientific foundations of using the big data for developing a next-generation eco-friendly navigation system and increasing situational awareness for road transport safety. Expected outcomes of this project inclu ....Driving Towards Greener and Safer Roads using Big Spatiotemporal Data. This project aims to design novel techniques for using big spatiotemporal data to reduce the impact of road transport on the environment and improve road safety. This project expects to address key challenges and lay scientific foundations of using the big data for developing a next-generation eco-friendly navigation system and increasing situational awareness for road transport safety. Expected outcomes of this project include novel big data management and analytics techniques, and new edge computing models for vehicular networks. The success of this project should bring several key benefits including reducing greenhouse gas emissions on roads, facilitating urban planning, and improving road safety.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less