PhD Projects SEIT

Scholarships of $35,000 (AUD) are available for PhD students  who have achieved Honours 1/High Distinction in their UG program and/or have completed a Masters by Research.

Comparative Evaluation of Cybersecurity Test Design Strategies and Analysis Techniques

The pervasive cyber threat to DoDs, public sector and industry means cyber vulnerability and penetration assessment (CVPA) and testing is no longer an option but rather about managing an acceptable risk of how much testing is enough (Christensen, 2017 & 2015).

Uncertainty quantifications in insect flight simulations: effect of flow gust and insect/wing geometry and kinematics

The mechanisms of insect flight become one of central issues for researchers and engineers who wish to develop aerial crafts with superior locomotion capability. One of the most fascinating yet least understood attributes of aerial animals is the uncertainties from environment flow gust as well as insect/wing geometry and kinematics.

Numerical simulations of surgically changed arteries

In this program, computational structure/structure dynamics and model experiments will be integrated to study the structure dynamic responses, turbulence flows and local stresses with long-term goal of exploring clinic applications. There are more than 30,000 patients receiving artery related implants in Australia, incurring substantial cost for treating and nursing these patients.

Solving the WiFi Tragedy of the Commons

Cyber-Physical Systems (CPS) are becoming the backbone of our critical infrastructure, for example in health care, emergency services, transportation services, and energy management, as well as in many other areas just being envisioned. The core of CPS operation often lies in the use of wireless technologies such as WiFi, Zigbee, Bluetooth, LTE-U, LoRa, and some varieties of 5G.

Integrating Supply Chain

In contemporary enterprises, single project settings are rare today. Hence, issues involving the simultaneous management of multiple projects (or portfolio of projects) have become more prevalent. Up to 90 % of all projects worldwide are executed in a multi-project context (i.e., portfolio of projects). This portfolio of projects (POP) is considered as the simultaneous scheduling of two or more projects which demand the same scarce resources.

Intelligent Home Network Performance and Security Analysis

Broadband service providers receive many help‐desk calls because of networking issues in their customers' homes, and ever more of those are related to wireless technologies and security issues.

The exponential growth of space objects in near-Earth orbit is placing new demands on space traffic management systems. Instead of hundreds to thousands of objects, future space traffic management systems will be required to maintain and provide a space catalogue of thousands to tens of thousands of objects. Essential to enabling this capability is the simultaneous improvement in current force modelling techniques and a reduction in their computational cost. 

 

Flapping Wing Micro Aerial Robots – (II) Wing Actuation and  Flight-Control

The role of robotic systems including miniature unmanned autonomous vehicles is expected to grow significantly in the near future. With rapid advancement in sensor and robotic technologies, unmanned aerial vehicles are envisaged to be assigned various tasks including disaster monitoring, product delivery and, surveillance and reconnaissance.

System Architecture Evaluation and Optimization at Early Conceptual Design Stage

Defence systems acquisition is fraught with all sorts of financial, technical and political risks. The most effective way of mitigating risks associated with acquisition of complex systems is through identification of these risks as early as possible. This project’s aim is to facilitate optimal decision making for multi stakeholder system design.

Secure control and estimation

The emergence of technologies relying on information networks have brought into prominence new challenges in the area of cyber-security concerned with security of industrial control and data acquisition systems. This project will involve research into the theory of cyber secure distributed control and estimation systems networks, focused on systems cooperation in the presence of strategic adversaries.

Pages