SlideShare una empresa de Scribd logo
1 de 4
No 1: Ontology-Driven Text Mining for Digital Forensics

Supervisors: Dr Warren Jin and Dr Nianjun Liu

Period: Semesters 1 and 2, 2007

The use of digital devices such as computers, Internet, personal digital assistants
(PDAs), cell phones, and cameras, etc., as sources of evidence in terrorism, fraud,
white-collar crime, and other criminal investigations has been steadily increasing in
recent years. Digital forensics involves understanding specific aspects of digital
evidence and the general forensic procedures used when analysing any form of digital
evidence. Digital evidence can be any information of probative value that is either
stored or transmitted in a binary form, such as Emails, Office documents, computer
system log files, as well as digital audio and video. It can be used to decide whether a
crime has been committed and can provide a link between a crime and its victim or a
crime and its perpetrator.

This project aims at implementing (or developing) effective text mining techniques to
analyse textual information, especially Emails and computer system log files by
embodying terminological ontology. Ontology can bring necessary background
knowledge, e.g., terms “ball”, “football”, and “basketball” are semantically related to
each other. Driven by ontology, textual information then can be indexed, summarised
or analysed semantically. This enables the text mining techniques can highlight most
interesting textual digital evidences automatically and effectively for a digital forensic
investigation.

The project involves various techniques such as text mining, temporal data mining,
information retrieval, machine learning and statistics. Applicants are expected to have
a major in information technology, computer engineering, computer science or
electrical engineering, preferably with excellent programming skills (C/C++, Java,
and/or Python). Applicants who are interested in research are also welcome,
preferably with strong background in the information retrieval, temporal data mining,
statistics or/and optimisation.

Contact Dr Warren Jin (Huidong.Jin@nicta.com.au)

No 2: Apply Data Mining Techniques for Cyber Intrusion Detection

Supervisors: Dr Warren Jin and Dr Nianjun Liu

Period: Semesters 1 and/or 2, 2007

Intrusion detection is the process of monitoring the events occurring in a computer
system or network and analysing them for signs of intrusions, which are defined as
attempts to bypass the security mechanisms of a computer or network (“compromise
the confidentiality, integrity, availability of information resources”). Due to the
proliferation of high-speed Internet access, more and more organizations are
becoming vulnerable to time-varying cyber attacks (intrusions). Most existing
intrusion detection systems are based on extensive knowledge of patterns associated
with known attacks provided by human experts. They are unable to detect novel and
unanticipated attacks.

This project aims at applying data mining techniques to learn real-time profiles that
represent normal behaviour of users, hosts, or networks, and then detect attacks as
significant deviations from these profiles. The project will implement (or develop) an
efficient learning technique to establish stochastic process models from large volume
of network accessing data, such as source IP address and port, protocol type and
accessing timestamps. The dataset may be sized in gigabytes. The stochastic process
model can be temporal association rules, sequential patterns, dynamic Bayesian
networks, or a mixture of Markov models. The technique will be examined on real-
world network intrusion data. Its performance as well as intrusion signs will be
visualised in order to help non-domain experts for understanding.

The project involves various techniques, including temporal data mining, time series
analysis and computer network security. Applicants are expected to have a major in
information technology, computer science, computer engineering or electrical
engineering, preferably with excellent programming skills (Matlab, C/C++, R, and/or
Python) for implementation. Applicants who are interested in research are also
welcome, preferably with strong background in the data mining, statistical machine
learning, artificial intelligence or/and time series.

Contact Dr Warren Jin (Huidong.Jin@nicta.com.au)

No 3: Apply Dynamical Bayesian Network to Query Digital Forensics

Period: Semesters 1 and 2, 2007

Supervisors: Dr Nianjun Liu and Dr Warren Jin

Digital forensics undertakes the post-mortem reconstruction of the causal sequence of
events arising from an intrusion perpetrated by one or more external agents, or as a
result of unauthorised activities generated by authorised users, in one or more digital
systems. The field of digital forensics covers a broad set of applications, uses a variety
of evidence and is supported by a number of techniques. Application areas include
forensic accounting, law enforcement, commodity flow analysis and threat analysis.
Forensic investigations often focus on unusual and interesting events that may not
have arisen previously. A major objective of a digital investigation is to extract these
interesting pieces of evidence and to identify the causal relationship between this
evidence.

This project aims at extending an existing Dynamical Bayesian Network model
developed for digital forensics by investigating a number of possible topics. The
model developed uses a Bayesian network and hidden Markov model network
structure to (i) estimate typical digital crime scenario models from data and (ii) given
such models, infer the most likely criminal act given current observations and past
criminal acts.
First, the addition of multi forward linkages in the BN+HMM network structure to
allow direct linkages between BN nodes at consecutive time intervals. Second is the
design of an SQL based query tool to explore the activities of criminals and their
interactions and explain what happened in the past, as well as predict what will
happen in the near future. Finally, the application of a graphical model to data mining
of relational digital forensic databases, including construction of a relational pattern
structural database for known types of digital crime portfolios and their associated
forensics Bayesian Network models.

Applicants must have a major in information technology, computer science, or
electrical engineering, preferably with excellent programming abilities (MATLAB, C/
C++ and JAVA) OR strong mathematical/machine learning/data mining/statistics
background.

Contact Dr Nianjun Liu (nianjun.liu@nicta.com.au)

No 4: Intelligent Environmental Query on Spatial Data

Period: Semesters 1 or 2, 2007

Supervisors: Dr Nianjun Liu and Dr Warren Jin

Analysis of spatial information in natural resources management is crucial to support
a decision making process. However, with the advent of various technologies to
acquire the data, analysis of multiple spatial data becomes a very challenging area.
Those technologies will produce different accuracy and different resolution in the
data. In spite of multi representation of spatial data, evidences of an area can be from
different time and different observer’s view that makes combining those evidences is
quite complicated. Combining spatial data or evidences is not just simply combining
evidences from different technologies, but it is also combining multi criteria
evidences.

Australian Bureau of Rural Science (BRS) has developed a system known as multi
criteria analysis shell for spatial decision support (MCAS-S). The project is to
incorporate an option for use of (Dynamical) Bayesian network approaches to model
multiple types of evidences for intelligent environmental query and decision supports.

The project involves various techniques: image processing to preprocess the spatial
GIS data, machine learning, pattern recognition and probability theory. Applicants
must have a major in information technology, computer science, or electrical
engineering, preferably with excellent programming abilities (MATLAB, C/C++ and
JAVA) OR strong mathematical/machine learning/data mining/statistics/GIS
background.

Contact Dr Nianjun Liu (nianjun.liu@nicta.com.au)

No 5: Intelligent Land Planning on Relational Spatial Data

Period: Semesters 1 or 2, 2007
Supervisors: Dr Nianjun Liu and Dr Warren Jin

Multi-criteria approaches to the analysis of complex issues in environment decision
systems have found wide application across business, government and communities
around the world. Such approaches may be readily applied in the context of land
planning, which is a prerequisite to the development of a city, town or suburb.
Generally, planners collect a range of information about an area, including
information about natural resources, topography, demographics, political issues,
economic characteristics and proximity to neighbouring settlements and services, and
combine this information to make planning decisions. Computer aided Multi-criteria
decision support tools allow for measurement and analysis of alternatives or options,
involving a variety of both qualitative and quantitative dimensions.

The project involves collaboration with the ACT Planning and Land Authority
(ACTPLA) to present a sample demonstration of an Intelligent Land Planning tool
using Bayesian Networks. Specifically, it will aim to develop a tool for the selection
of optimal sites for community services within existing areas of settlement in the
ACT, including recreational facilities, schools, childcare centres, aged care facilities
and community centres. The factors of interest include existing settlement patterns,
demographics (current and anticipated), future development, available land resources,
existing services and community need.

Bayesian Network is designed to apply when there is uncertainty about evidence and
how it should be combined in decision making. The proposed approach is to use a
supervised strategy whereby experts provide known thematic layers of the land cover
GIS spatial database as known successful decisions. The Bayesian Networks then
trained to optimize the predications of such decision with the aim of applying the
optimal decision model to new situations or scenarios.

After exploring the ACT spatial database and other data sources, the scholar will
identify the relevant decision factors with the aid of ACTPLA experts and will then
build the Bayesian Network model. After the iterative data mining on the relational
database, the model will be continuously learned and its structure and parameters
adjusted accordingly. Finally, the scholar will create the new tool and test it in the
real-world context within ACTPLA.

The project involves various techniques: spatial relational database, Structure Query
Languages (SQL), machine learning, pattern recognition and time series. Applicants
must have a major in information technology, computer science, or electrical
engineering, preferably with excellent programming abilities (C/C++ and JAVA) OR
strong mathematical/machine learning/data mining/statistics/demography background.

Contact Dr Nianjun Liu (nianjun.liu@nicta.com.au)

Más contenido relacionado

La actualidad más candente

UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)Alex Rutherford
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...ijwscjournal
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...AIRCC Publishing Corporation
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
 
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...Manoj895639
 
Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmartheijes
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things IJECEIAES
 
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...IJECEIAES
 
Internet Prospective Study
Internet Prospective StudyInternet Prospective Study
Internet Prospective StudyjournalBEEI
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.docbutest
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
 
Neches Overview CV, June 2012
Neches Overview CV,  June 2012Neches Overview CV,  June 2012
Neches Overview CV, June 2012RNeches
 
Poster Abstracts
Poster AbstractsPoster Abstracts
Poster Abstractsbutest
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Pvrtechnologies Nellore
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 

La actualidad más candente (18)

UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
 
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing...
 
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGE
 
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
a-novel-web-attack-detection-system-for-internet-of-things-via-ensemble-class...
 
Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmar
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
 
Internet Prospective Study
Internet Prospective StudyInternet Prospective Study
Internet Prospective Study
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.doc
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...
 
Neches Overview CV, June 2012
Neches Overview CV,  June 2012Neches Overview CV,  June 2012
Neches Overview CV, June 2012
 
Poster Abstracts
Poster AbstractsPoster Abstracts
Poster Abstracts
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 

Destacado

PMDC NEB Step-1 Day-6 (Review of Abdomen)
PMDC NEB Step-1 Day-6 (Review of Abdomen)PMDC NEB Step-1 Day-6 (Review of Abdomen)
PMDC NEB Step-1 Day-6 (Review of Abdomen)DrSaeed Shafi
 
Printable version (must have Word)
Printable version (must have Word)Printable version (must have Word)
Printable version (must have Word)butest
 
Strategyproof Classification Under Constant Hypotheses: A Tale of ...
Strategyproof Classification Under Constant Hypotheses: A Tale of ...Strategyproof Classification Under Constant Hypotheses: A Tale of ...
Strategyproof Classification Under Constant Hypotheses: A Tale of ...butest
 
Machine Learning and Statistical Analysis
Machine Learning and Statistical AnalysisMachine Learning and Statistical Analysis
Machine Learning and Statistical Analysisbutest
 
Lite Tid Och Penger Tur2010
Lite Tid Och Penger Tur2010Lite Tid Och Penger Tur2010
Lite Tid Och Penger Tur2010tellUs IT AS
 
The Story of the Semantic Grid
The Story of the Semantic GridThe Story of the Semantic Grid
The Story of the Semantic Gridbutest
 
Маркетинг онлайн-проекта JOB.RU: Смена парадигм
Маркетинг онлайн-проекта JOB.RU: Смена парадигмМаркетинг онлайн-проекта JOB.RU: Смена парадигм
Маркетинг онлайн-проекта JOB.RU: Смена парадигмGeorgii Chibisov
 
PSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITY
PSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITYPSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITY
PSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITYbutest
 
MikroBasic
MikroBasicMikroBasic
MikroBasicbutest
 
SATANJEEV BANERJEE
SATANJEEV BANERJEESATANJEEV BANERJEE
SATANJEEV BANERJEEbutest
 
DƯƠNG HỒNG GARDEN HOUSE
DƯƠNG HỒNG GARDEN HOUSEDƯƠNG HỒNG GARDEN HOUSE
DƯƠNG HỒNG GARDEN HOUSEDuoc Daiphuc
 
SoundSense
SoundSenseSoundSense
SoundSensebutest
 
Probability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning PerspectiveProbability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning Perspectivebutest
 
Basic Web Design.doc
Basic Web Design.docBasic Web Design.doc
Basic Web Design.docbutest
 
Guided Interactive Machine Learning
Guided Interactive Machine LearningGuided Interactive Machine Learning
Guided Interactive Machine Learningbutest
 
Summary.ppt
Summary.pptSummary.ppt
Summary.pptbutest
 

Destacado (19)

PMDC NEB Step-1 Day-6 (Review of Abdomen)
PMDC NEB Step-1 Day-6 (Review of Abdomen)PMDC NEB Step-1 Day-6 (Review of Abdomen)
PMDC NEB Step-1 Day-6 (Review of Abdomen)
 
Printable version (must have Word)
Printable version (must have Word)Printable version (must have Word)
Printable version (must have Word)
 
Strategyproof Classification Under Constant Hypotheses: A Tale of ...
Strategyproof Classification Under Constant Hypotheses: A Tale of ...Strategyproof Classification Under Constant Hypotheses: A Tale of ...
Strategyproof Classification Under Constant Hypotheses: A Tale of ...
 
Machine Learning and Statistical Analysis
Machine Learning and Statistical AnalysisMachine Learning and Statistical Analysis
Machine Learning and Statistical Analysis
 
Describing others
Describing othersDescribing others
Describing others
 
Lite Tid Och Penger Tur2010
Lite Tid Och Penger Tur2010Lite Tid Och Penger Tur2010
Lite Tid Och Penger Tur2010
 
The Story of the Semantic Grid
The Story of the Semantic GridThe Story of the Semantic Grid
The Story of the Semantic Grid
 
Маркетинг онлайн-проекта JOB.RU: Смена парадигм
Маркетинг онлайн-проекта JOB.RU: Смена парадигмМаркетинг онлайн-проекта JOB.RU: Смена парадигм
Маркетинг онлайн-проекта JOB.RU: Смена парадигм
 
PSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITY
PSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITYPSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITY
PSU LMS RFP FINAL.docx - PORTLAND STATE UNIVERSITY
 
0vi b
0vi b0vi b
0vi b
 
MikroBasic
MikroBasicMikroBasic
MikroBasic
 
SATANJEEV BANERJEE
SATANJEEV BANERJEESATANJEEV BANERJEE
SATANJEEV BANERJEE
 
DƯƠNG HỒNG GARDEN HOUSE
DƯƠNG HỒNG GARDEN HOUSEDƯƠNG HỒNG GARDEN HOUSE
DƯƠNG HỒNG GARDEN HOUSE
 
SoundSense
SoundSenseSoundSense
SoundSense
 
Probability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning PerspectiveProbability Forecasting - a Machine Learning Perspective
Probability Forecasting - a Machine Learning Perspective
 
Basic Web Design.doc
Basic Web Design.docBasic Web Design.doc
Basic Web Design.doc
 
Guided Interactive Machine Learning
Guided Interactive Machine LearningGuided Interactive Machine Learning
Guided Interactive Machine Learning
 
1000263
10002631000263
1000263
 
Summary.ppt
Summary.pptSummary.ppt
Summary.ppt
 

Similar a by Warren Jin

Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensicsIJECEIAES
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformSean Ben
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
 
A Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsA Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsIRJET Journal
 
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE... BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...Nexgen Technology
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkparry prabhu
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingIJSRED
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 

Similar a by Warren Jin (20)

Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 
ACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdfACCESS.2020.3028420.pdf
ACCESS.2020.3028420.pdf
 
A Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows SystemsA Novel Methodology for Offline Forensics Triage in Windows Systems
A Novel Methodology for Offline Forensics Triage in Windows Systems
 
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE... BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
BIG DATA SANITIZATION AND CYBER SITUATIONALAWARENESS: A NETWORK TELESCOPE PE...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Resume_CV___1_.pdf
Resume_CV___1_.pdfResume_CV___1_.pdf
Resume_CV___1_.pdf
 
Ngdm09 han gao
Ngdm09 han gaoNgdm09 han gao
Ngdm09 han gao
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 

Más de butest

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEbutest
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jacksonbutest
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer IIbutest
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.docbutest
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1butest
 
Facebook
Facebook Facebook
Facebook butest
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...butest
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTbutest
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docbutest
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docbutest
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.docbutest
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!butest
 

Más de butest (20)

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBE
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jackson
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer II
 
PPT
PPTPPT
PPT
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.doc
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1
 
Facebook
Facebook Facebook
Facebook
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENT
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.doc
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.doc
 
hier
hierhier
hier
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!
 

by Warren Jin

  • 1. No 1: Ontology-Driven Text Mining for Digital Forensics Supervisors: Dr Warren Jin and Dr Nianjun Liu Period: Semesters 1 and 2, 2007 The use of digital devices such as computers, Internet, personal digital assistants (PDAs), cell phones, and cameras, etc., as sources of evidence in terrorism, fraud, white-collar crime, and other criminal investigations has been steadily increasing in recent years. Digital forensics involves understanding specific aspects of digital evidence and the general forensic procedures used when analysing any form of digital evidence. Digital evidence can be any information of probative value that is either stored or transmitted in a binary form, such as Emails, Office documents, computer system log files, as well as digital audio and video. It can be used to decide whether a crime has been committed and can provide a link between a crime and its victim or a crime and its perpetrator. This project aims at implementing (or developing) effective text mining techniques to analyse textual information, especially Emails and computer system log files by embodying terminological ontology. Ontology can bring necessary background knowledge, e.g., terms “ball”, “football”, and “basketball” are semantically related to each other. Driven by ontology, textual information then can be indexed, summarised or analysed semantically. This enables the text mining techniques can highlight most interesting textual digital evidences automatically and effectively for a digital forensic investigation. The project involves various techniques such as text mining, temporal data mining, information retrieval, machine learning and statistics. Applicants are expected to have a major in information technology, computer engineering, computer science or electrical engineering, preferably with excellent programming skills (C/C++, Java, and/or Python). Applicants who are interested in research are also welcome, preferably with strong background in the information retrieval, temporal data mining, statistics or/and optimisation. Contact Dr Warren Jin (Huidong.Jin@nicta.com.au) No 2: Apply Data Mining Techniques for Cyber Intrusion Detection Supervisors: Dr Warren Jin and Dr Nianjun Liu Period: Semesters 1 and/or 2, 2007 Intrusion detection is the process of monitoring the events occurring in a computer system or network and analysing them for signs of intrusions, which are defined as attempts to bypass the security mechanisms of a computer or network (“compromise the confidentiality, integrity, availability of information resources”). Due to the proliferation of high-speed Internet access, more and more organizations are becoming vulnerable to time-varying cyber attacks (intrusions). Most existing intrusion detection systems are based on extensive knowledge of patterns associated
  • 2. with known attacks provided by human experts. They are unable to detect novel and unanticipated attacks. This project aims at applying data mining techniques to learn real-time profiles that represent normal behaviour of users, hosts, or networks, and then detect attacks as significant deviations from these profiles. The project will implement (or develop) an efficient learning technique to establish stochastic process models from large volume of network accessing data, such as source IP address and port, protocol type and accessing timestamps. The dataset may be sized in gigabytes. The stochastic process model can be temporal association rules, sequential patterns, dynamic Bayesian networks, or a mixture of Markov models. The technique will be examined on real- world network intrusion data. Its performance as well as intrusion signs will be visualised in order to help non-domain experts for understanding. The project involves various techniques, including temporal data mining, time series analysis and computer network security. Applicants are expected to have a major in information technology, computer science, computer engineering or electrical engineering, preferably with excellent programming skills (Matlab, C/C++, R, and/or Python) for implementation. Applicants who are interested in research are also welcome, preferably with strong background in the data mining, statistical machine learning, artificial intelligence or/and time series. Contact Dr Warren Jin (Huidong.Jin@nicta.com.au) No 3: Apply Dynamical Bayesian Network to Query Digital Forensics Period: Semesters 1 and 2, 2007 Supervisors: Dr Nianjun Liu and Dr Warren Jin Digital forensics undertakes the post-mortem reconstruction of the causal sequence of events arising from an intrusion perpetrated by one or more external agents, or as a result of unauthorised activities generated by authorised users, in one or more digital systems. The field of digital forensics covers a broad set of applications, uses a variety of evidence and is supported by a number of techniques. Application areas include forensic accounting, law enforcement, commodity flow analysis and threat analysis. Forensic investigations often focus on unusual and interesting events that may not have arisen previously. A major objective of a digital investigation is to extract these interesting pieces of evidence and to identify the causal relationship between this evidence. This project aims at extending an existing Dynamical Bayesian Network model developed for digital forensics by investigating a number of possible topics. The model developed uses a Bayesian network and hidden Markov model network structure to (i) estimate typical digital crime scenario models from data and (ii) given such models, infer the most likely criminal act given current observations and past criminal acts.
  • 3. First, the addition of multi forward linkages in the BN+HMM network structure to allow direct linkages between BN nodes at consecutive time intervals. Second is the design of an SQL based query tool to explore the activities of criminals and their interactions and explain what happened in the past, as well as predict what will happen in the near future. Finally, the application of a graphical model to data mining of relational digital forensic databases, including construction of a relational pattern structural database for known types of digital crime portfolios and their associated forensics Bayesian Network models. Applicants must have a major in information technology, computer science, or electrical engineering, preferably with excellent programming abilities (MATLAB, C/ C++ and JAVA) OR strong mathematical/machine learning/data mining/statistics background. Contact Dr Nianjun Liu (nianjun.liu@nicta.com.au) No 4: Intelligent Environmental Query on Spatial Data Period: Semesters 1 or 2, 2007 Supervisors: Dr Nianjun Liu and Dr Warren Jin Analysis of spatial information in natural resources management is crucial to support a decision making process. However, with the advent of various technologies to acquire the data, analysis of multiple spatial data becomes a very challenging area. Those technologies will produce different accuracy and different resolution in the data. In spite of multi representation of spatial data, evidences of an area can be from different time and different observer’s view that makes combining those evidences is quite complicated. Combining spatial data or evidences is not just simply combining evidences from different technologies, but it is also combining multi criteria evidences. Australian Bureau of Rural Science (BRS) has developed a system known as multi criteria analysis shell for spatial decision support (MCAS-S). The project is to incorporate an option for use of (Dynamical) Bayesian network approaches to model multiple types of evidences for intelligent environmental query and decision supports. The project involves various techniques: image processing to preprocess the spatial GIS data, machine learning, pattern recognition and probability theory. Applicants must have a major in information technology, computer science, or electrical engineering, preferably with excellent programming abilities (MATLAB, C/C++ and JAVA) OR strong mathematical/machine learning/data mining/statistics/GIS background. Contact Dr Nianjun Liu (nianjun.liu@nicta.com.au) No 5: Intelligent Land Planning on Relational Spatial Data Period: Semesters 1 or 2, 2007
  • 4. Supervisors: Dr Nianjun Liu and Dr Warren Jin Multi-criteria approaches to the analysis of complex issues in environment decision systems have found wide application across business, government and communities around the world. Such approaches may be readily applied in the context of land planning, which is a prerequisite to the development of a city, town or suburb. Generally, planners collect a range of information about an area, including information about natural resources, topography, demographics, political issues, economic characteristics and proximity to neighbouring settlements and services, and combine this information to make planning decisions. Computer aided Multi-criteria decision support tools allow for measurement and analysis of alternatives or options, involving a variety of both qualitative and quantitative dimensions. The project involves collaboration with the ACT Planning and Land Authority (ACTPLA) to present a sample demonstration of an Intelligent Land Planning tool using Bayesian Networks. Specifically, it will aim to develop a tool for the selection of optimal sites for community services within existing areas of settlement in the ACT, including recreational facilities, schools, childcare centres, aged care facilities and community centres. The factors of interest include existing settlement patterns, demographics (current and anticipated), future development, available land resources, existing services and community need. Bayesian Network is designed to apply when there is uncertainty about evidence and how it should be combined in decision making. The proposed approach is to use a supervised strategy whereby experts provide known thematic layers of the land cover GIS spatial database as known successful decisions. The Bayesian Networks then trained to optimize the predications of such decision with the aim of applying the optimal decision model to new situations or scenarios. After exploring the ACT spatial database and other data sources, the scholar will identify the relevant decision factors with the aid of ACTPLA experts and will then build the Bayesian Network model. After the iterative data mining on the relational database, the model will be continuously learned and its structure and parameters adjusted accordingly. Finally, the scholar will create the new tool and test it in the real-world context within ACTPLA. The project involves various techniques: spatial relational database, Structure Query Languages (SQL), machine learning, pattern recognition and time series. Applicants must have a major in information technology, computer science, or electrical engineering, preferably with excellent programming abilities (C/C++ and JAVA) OR strong mathematical/machine learning/data mining/statistics/demography background. Contact Dr Nianjun Liu (nianjun.liu@nicta.com.au)