Securing Our Future (Past Projects)
2023 projects
-
Hypersonics: Shaping Air Travel
This project focuses on developing a hypersonic aircraft prototype with minimal drag through aerodynamic shape optimisation. The increasing interest in hypersonic flight for both military and commercial use highlights the challenge of excessive drag forces at extreme speeds. This study involves a literature review of hypersonic aircraft design issues, followed by computational fluid dynamics (CFD) analysis of past supersonic and hypersonic aircraft to determine optimal aerodynamic features. Validation simulations using simple geometries precede the creation of preliminary designs for hypersonic vehicle prototypes with reduced drag coefficients. CFD analysis covers lift and drag across subsonic, supersonic, and hypersonic conditions. Additional shape optimisation was applied to more complicated geometries with the aim to minimise hypersonic drag and maximise subsonic lift. Wind tunnel tests on a 3D-printed prototype, conducted at the Thebarton wind tunnel, validate subsonic performance and authenticate outcomes. This comprehensive approach ensures an aerodynamically functional vehicle for diverse flight conditions.
Group members
- Michael Leventeris
- Jye Paladino
-
Ventilation systems beyond Earth
When humans want to survive and engage in a series of scientific activities outside of Earth, a complete ventilation system is crucial because it can provide the following functions. Firstly, the outdoor ventilation system can maintain breathable air quality and remove excess carbon dioxide and polluting gases. Secondly, a complete ventilation system can freely adjust temperature and humidity. Finally, the outdoor ventilation system is basically noise-free and very safe. So, these functions are sufficient to solve some of the problems to help humans survive in harsh environments outside of Earth.
Group members
- Yiyang Wang
-
Detecting Cyber Threats
Computer networks are now an essential part of daily life and modern enterprises rely on them operating normally to perform essential functions. This reliance makes our society vulnerable to cybersecurity threats, which can lead to the disruption of essential services and the loss of sensitive data. To address these threats, enterprises invest significant sums in protecting their networks from external threats. However, trusted insiders with legitimate network access often pose the gravest and most difficult to detect threats. This project investigates the detection of cyber threats, with a focus on insider threats, within enterprise networks using graph-based machine learning techniques. Using data collected from multiple sources within enterprise networks, we constructed dynamic graphs that model user behaviour and network traffic over time. The models we developed were then able to learn the normal behaviour of users and network traffic and flag anomalous behaviour as potential threats.
Group member
- Bradyn Walsh
-
Getting your bearings
A critical element of defence is locating targets, that is, aircraft and submarines, and tracking them as they move. This process happens continuously; it entails not just following the target but also predicting where it might move next. Many algorithms, such as the Kalman Filter, allow us to predict and update the target's location. We can also track features such as the bearing, velocity, and range from the observer. This project examines the issue from a more statistical approach by describing the problem analytically. An analytical framework better describes the expected behaviour of the target, including the level of uncertainty about its position. The outcome is a series of exact equations that describe where the target might be, with, ideally, a higher degree of accuracy and efficiency.
Group member
- Athena Helena Xiourouppa
-
How much evidence is enough?
You have just been arrested, and your phone has been seized. Your phone is a digital reflection of your day-to-day life and becomes the centre of attention for the investigation. Your lawyer says the police are only allowed to the take information needed for their investigation. But does your lawyer have it right?
In this project, we look at proportionality, and the challenge whether proportionality is the right way to deliver justice. The findings of this project call into question the feasibility of applying the proportionality in mobile forensics investigations.
While police might want evidence that could make you look guilty, what about evidence that proves your innocence? Did you get a message you didn't ask for? We're exploring if it's right to decide what's important without considering the contextual metadata that describes the bigger picture.
Group member
- Daniel Mosey
- Rukudzo Ndudzo
-
Perpetual Autonomous Submarine
Autonomous Underwater Vehicles (AUVs) are the future of investigating what lies beneath the waves, however they are currently dependent on the use of non-renewable energy. This can limit the operation time, reduce the search capability and increase the need for human intervention. Our project aim is to design an AUV which is not restricted by the operation life of the system. We investigated the feasibility of an autonomous system which can recharge itself with onboard renewable energy sources. We designed an AUV which is able to charge using solar power and wave energy during deployment, without the need for human control. We developed the supporting sub-systems including the depth control, propulsion, electrical architecture and software capabilities. The culmination of these efforts produce an small, inexpensive AUV prototype for testing how far the deployment life of AUVs can be pushed.
Group members
- Angelo Bollella
- Blake Robertson
- Jack Hislop
- Hayley Richardson
- Brandon Dobrzinski
-
Mobile Device Cybersecurity Testbed
Internet services such as social media have become vital in our daily lives. This new-found reliance on the internet has been facilitated by the worldwide usage of mobile devices. Subsequently, mobile devices are prime targets for user analytics and malicious attacks. Thus, it is essential to undertake research into the security risks that accompany the use of these devices. To facilitate this research, a mobile device testbed is used to simulate user behaviour, generating network traffic. This project aims to improve and expand upon an existing mobile device testbed which has been developed at the University of Adelaide. A network visualisation dashboard and application prediction machine learning model have been implemented to concisely present data and predict applications from the generated network traffic in real-time. A graphical testbed controller program has been developed to simplify management of mobile devices and testing routines, aiding future research into mobile cybersecurity risks.
Group members
- Sam Eriksson
- Matthew Forrest
- Mingzhe Ruan
-
Unlocking the Potential of Electric Aircraft
Electric aircraft have the potential to be cheaper and greener than petrol aircraft, but they aren't feasible using current aircraft designs. A new design method known as Distributed Propulsion gives electric aircraft an edge that isn't possible with petrol aircraft. Utilising many small electric motors rather than a few large ones increases aerodynamic efficiency, reduces noise, and allows for greater manoeuvrability, including vertical take-off and landing. This project seeks to better understand the flight dynamics of this new design method through repeated flight tests. A previous research project group designed and built a large and expensive distributed electric propulsion aircraft which never achieved flight testing due to fear of damaging it. We have adapted the design to be constructed smaller and cheaper while maintaining identical aerodynamic characteristics. The data from these flight tests will allow the full-sized aircraft to fly with confidence, and pave the way for future electric aircraft.
Group members
- Zachary Annese
- Holly Evans
- Toby Hunt
- Samuel Miller
- Elliot Ridgway
- Donny Tran
-
Morphing into the Future
Unmanned Aerial Vehicles (UAVs) have been used with great success and reliability for decades, which begs the question, what can be done to take them to the next level? Our solution, Morphing. Although inflight morphing has been achieved before with the implementation of conventional methods in twist and sweep angle manipulation, we have devised a more unique solution to provide UAVs additional inflight efficiency and dynamic ability. Thus, we have designed and built a proof of concept UAV that utilises pressure morphing technology, with the focus being the change in wing profile to suit either subsonic or supersonic conditions. One might ask, how do you know it won’t collapse at a moments notice? Fortunately, we can confidently say, it wont! we think? The Thebarton wind tunnel allowed us to test, validate and gain results for 30 m/s conditions. For supersonic speeds, simulation technology was incorporated into the validation process.
Group members
- Paxton Silby
- Rohan Barbara
- Thomas Wells
- Jordan Schultz
- Joshua Piantadosi
- Christopher Davidson
-
Propelling into the Future
Our mission is simple – quiet, sustainable flight. Fossil-fuel’s domination of the aviation industry not only poses environmental issues – noise pollution is a key challenge. Hydrogen-ready distributed electric propulsion technology will revolutionise aviation, disrupting the negative impacts of traditional aircraft. We want to find an economical way to establish and optimise aircraft sound performance. To achieve this, we’ve developed a system of microphones and electric-powered propellers, housed within a soundproof chamber. Our testing phase involved industry-leading software and state-of-the-art acoustics equipment, verifying the sound measurements of our cost-effective system. We compared the performance of several propeller configurations, forming a basis for the future of quieter aircraft. By establishing a way to compare aircraft acoustic performance, we now have a base model to inform the development of new technologies. Get on board the game changing potential of reduced aircraft noise pollution: come fly with us into the future of air travel!
Group members
- Jack Branford
- Thu Rein Win
-
3D Metal Printing for Defence
With the adoption of additive manufacturing techniques by defence industries, process optimisation is needed so that high quality components can be produced to withstand extreme environments. Selective laser melting (SLM) uses high powered lasers and metallic powders to produce complex components from exotic alloys with minimal material waste. Working with Defence Science and Technology (DST), this project aims to improve the SLM process for Inconel and stainless steel materials. Using optical microscopy, scanning electron microscopy, tensile testing and micro-CT imaging, 3D printed samples have been evaluated for mechanical quality to determine the impact of printing parameters. The outcomes of our analyses will be used to inform the optimisation of the printing processes at DST to achieve 3D printed materials with consistently high mechanical strength and minimal porosity/defects.
Group members
- Harrison Gramp
- Michelle Lutz
-
Inlet Modelling for Supersonic Flow
Achieving and maintaining supersonic flight presents a multitude of complex challenges. One such challenge is optimising inlet design for supersonic airbreathing engines to ensure efficient and high-performance operation. This entails minimising the drag force and maximising the pressure recovery of the inlet. The aim of this project was to investigate the relationships between inputs such as velocity, angle of attack and inlet geometry, and to see their impact on the drag coefficient and pressure recovery. Through this research, the findings can be used to advance the defence and aerospace industries. Using Computational Fluid Dynamics (CFD) simulations, the team was to investigate the sensitivity of the output parameters to the input parameters. The results were then to be visualised through various 2D and 3D graphics. The project achieved success through the creation of an extensive database which describes the correlations between the variables and their impacts on the inlet's performance.
Group members
- Andrew Flynn
- Harry Kinsman
- Sakshi
-
Self-Adaptive Software for the Edge
When emergency services respond to major events, such a floods or bushfires, software systems and apps provide capability for them to do their job better. Those software systems are supported by services which may not work well when they are disconnected from the internet.
We want to investigate an autonomous, distributed micro service system that can keep services running optimally, even when the network connection is poor and there are limited computing resources available.
We aim to test this concept in a controlled environment where we set the networking and computing constraints to the system. This was achieved by researching and experimenting with deploying a framework called "KubeEdge", which provides cluster computing capabilities with a focus on running in unreliable network environments.
Group members
- Joshua Burge
- William Moorcraft
- Matthew Volaris
-
ROOTS: Vision, Tracking & Space
Imagine a world where anyone, not just governments, could launch satellites into space. But wait, how do we prevent these things from bumping into each other up there? That's where Space Domain Awareness comes in—it's like space traffic control. To help with this we created the Rapid Optical Object Tracking System or ROOTS.
Collaborating up with experts from Defence, Science, and Technology we created object tracking software that can track stars, satellites, and even airplanes from a live video feed on a telescope mount. While this software tracks, the mount moves to keep the desired object in the camera view on a bunch of different mounts: $20,000 mounts, basic off the shelf mounts, and custom altered mounts. Be it a sparkling star, a high-tech satellite, or a distant airplane, ROOTS ensures safety, making space a vast, exciting, and collision-free area for everyone to explore.
Group members
- Luke Battjes
- Philippa Bergin
- Olivia Griscti
- Bianca Vidal
-
No Face is Safe
Facial recognition is a trusted method of security and authentication used in smartphones, law and border enforcement and banking. Given the abundance of images of our faces online, alongside the development of high-resolution colour 3D printers, the belief that a face is a secure authentication method is under scrutiny, and begs the question: is your face safe? The goal of this project was to investigate whether modern 3D printing techniques could be leveraged to produce accurate facial masks capable of spoofing the state-of-the-art facial recognition systems in use today. High-fidelity scans of real-world faces were obtained and validated, before a material selection process was undertaken to find the best analogue to realistic human skin. The final hyper-realistic facial masks produced were tested against prevalent facial recognition algorithms, the results of which will help better identify vulnerabilities in the existing software and future-proof our security systems against these kinds of attacks.
Group member
- Seb Kilmartin
- Fouad Nehme Badanai
- Michael Lazaros
- Luke Bruno
-
Aerospace Propulsion by Detonation
Rotating Detonation Engines (RDEs) are a novel engine studied as a more efficient and versatile alternative to existing propulsion and power devices. Supersonic flight, spaceflight, and gas turbine systems are all applications that could be enhanced by high-performance RDEs. As a relatively new technology with significant theoretical potential, much work is required to better understand RDEs and the mechanisms that govern them. This project aims to apply numerical modelling (Computational Fluid Dynamics) to analyse the effects of plenum pressure and propellant stoichiometry on the operating characteristics of an RDE. Modelling techniques were developed gradually, culminating in a numerical model of a detonation, validated against literature, that could be applied to an engine. Simulations were conducted to assess engine performance across a range of operating conditions. While difficulties in modelling injection precluded the study of a complete engine, simulations still provided meaningful insight into the use of detonation engines.
Group member
- Jonathan Adams
-
Wearable RF for Mesh Network Creation
Fire services, police, and Defence services all require reliable and easy-to-use communications systems to perform their duties. An important feature is wearability, which allows the user to free up the hands for other tasks. They also need to operate over large areas. In this project, we have designed, simulated and fabricated patch antennae to facilitate communication and integrated it into a custom-made portable communication system. We used industry standard software to design and fabricate various types of antennae. We measured our fabricated antennae's performance in the anechoic chamber and improved the designs in an iterative manner. We designed a prototype transmission and receiving system for field testing and collected the data for further use. These systems will be usable for a mesh network platform in future work.
Group members
- Jade Carter
- James Ward
-
Sleep fatigue in combat simulation
Combat simulations form a vital component in military planning, acquisitions and force structure analysis. However, for such an important technology, they do not represent the impacts of human factors, such as sleep fatigue, on soldier performance and mission success. This project has implemented a modern biomathematical fatigue model into the discrete event combat simulation, the Combined Arms Analysis Tool for the 21st Century (COMBATXXI). To map the output of the fatigue model to performance effects, the results of a range of studies from literature were plotted against the fatigue level predicted by the fatigue model. Then, regression was used to determine the relationship between the fatigue levels predicted and the impact on soldier performance. Using this method, we were able to represent the effects of fatigue on reaction time and target detection, with a case study proving the significant role fatigue can play in mission success.
Group member
- Jack Hynds
-
Improving Submarine Air Ventilation
Silence is golden in the world of submarines, as keeping the on-board air-conditioning system quiet while providing adequate air flow to the crew is a vital component in keeping the submarine operational. A Royal Australian Navy engineering report found that the noise level inside the crew cabins exceeded the recommended exposure level. Modelling the air vent showed that the current vent design created pockets of turbulence which disrupted the flow of air. Using this information, we have designed modifications which will allow the air to flow through the vent more efficiently. To verify the simulation results, models of the air vents were fabricated and tested. Through computer simulations and experimental measurements, factors such as flow rate, pressure drop, velocity profile and noise level can be accurately modelled. These findings will aid in determining the most efficient air vent design so that the air flow is improved while the noise level is reduced.
Group member
- William Norrington
-
Contested Communications in C2
The communication challenges in military Command and Control (C2) systems have been increasingly complicated by the volatile and contested environments in which they operate. The effectiveness of military operations is highly dependent on the ability of units to communicate and coordinate with each other in real time. In warfare, communication infrastructure is often targeted, making it challenging to maintain command and control (C2) over units. In order to provide a platform for validating communications, networking models and their limitations, a distributed multi-agent network simulation is implemented as part of a C2 simulation. This provides a wargaming capability that evaluates the effectiveness of routing protocols and network topologies in different failure scenarios and models challenges expected in a contested environment.
Group members
- Huey Pretila
-
Metaverse Refinement: Secure VR User Privacy
The rise of the term 'Metaverse' has boosted the Virtual Reality market. In 2022, the global VR market reached a value of 28 billion US dollars. Yet, security concerns have surfaced. Imagine a Virtual Reality game company wants to collect users' data for research or game improvements, but users worry about their personal data being misused. Is there a balanced solution? Our project gives the answer! We are using a method called 'Differential Privacy' to protect VR users' behaviour data. 'Differential Privacy' maintain the statistical data, which allows game companies can access statistical data for research. On the other hand, users' individual behavioural data are 'corrupted' and protected from misuse. Therefore, 'Differential Privacy' is like setting up a shield for users' virtual adventures, ensuring personal privacy is not accessed and always a top priority.
Group member
- Hanwen Wang
-
Smart Graphs: Comparing NOTEARS & DAG-GNN
Have you ever wondered how computers make decisions based on lots of information? Just like a flowchart showing steps to bake a cake, computers use something called 'graphs' to show how different pieces of information relate. Our project dives deep into two methods that help computers make these graphs: NOTEARS and DAG-GNN. We created scenarios and tested how well these methods can create accurate graphs, just like testing two chefs on who bakes the best cake! We are curious: which method is better in different situations, like if the scenario is straightforward (linear) or more complex (non-linear)? By the end of our study, we'll know more about the strengths of each method, helping future computer scientists pick the best tool for the job!
Group member
- Jiasheng Tang