Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Nearest-neighbour-induced isolation similarity and its impact on density-based clustering
- Qin, Xiaoyu, Ting, Kai, Zhu, Ye, Lee, Vincent
- Authors: Qin, Xiaoyu , Ting, Kai , Zhu, Ye , Lee, Vincent
- Date: 2019
- Type: Text , Conference paper
- Relation: 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Annual Conference on Innovative Applications of Artificial Intelligence, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, 27 January to 1 February 2019. p. 4755-4762
- Full Text:
- Reviewed:
- Description: A recent proposal of data dependent similarity called Isolation Kernel/Similarity has enabled SVM to produce better classification accuracy. We identify shortcomings of using a tree method to implement Isolation Similarity; and propose a nearest neighbour method instead. We formally prove the characteristic of Isolation Similarity with the use of the proposed method. The impact of Isolation Similarity on density-based clustering is studied here. We show for the first time that the clustering performance of the classic density-based clustering algorithm DBSCAN can be significantly uplifted to surpass that of the recent density-peak clustering algorithm DP. This is achieved by simply replacing the distance measure with the proposed nearest-neighbour-induced Isolation Similarity in DBSCAN, leaving the rest of the procedure unchanged. A new type of clusters called mass-connected clusters is formally defined. We show that DBSCAN, which detects density-connected clusters, becomes one which detects mass-connected clusters, when the distance measure is replaced with the proposed similarity. We also provide the condition under which mass-connected clusters can be detected, while density-connected clusters cannot. © 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org).
- Authors: Qin, Xiaoyu , Ting, Kai , Zhu, Ye , Lee, Vincent
- Date: 2019
- Type: Text , Conference paper
- Relation: 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Annual Conference on Innovative Applications of Artificial Intelligence, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019, 27 January to 1 February 2019. p. 4755-4762
- Full Text:
- Reviewed:
- Description: A recent proposal of data dependent similarity called Isolation Kernel/Similarity has enabled SVM to produce better classification accuracy. We identify shortcomings of using a tree method to implement Isolation Similarity; and propose a nearest neighbour method instead. We formally prove the characteristic of Isolation Similarity with the use of the proposed method. The impact of Isolation Similarity on density-based clustering is studied here. We show for the first time that the clustering performance of the classic density-based clustering algorithm DBSCAN can be significantly uplifted to surpass that of the recent density-peak clustering algorithm DP. This is achieved by simply replacing the distance measure with the proposed nearest-neighbour-induced Isolation Similarity in DBSCAN, leaving the rest of the procedure unchanged. A new type of clusters called mass-connected clusters is formally defined. We show that DBSCAN, which detects density-connected clusters, becomes one which detects mass-connected clusters, when the distance measure is replaced with the proposed similarity. We also provide the condition under which mass-connected clusters can be detected, while density-connected clusters cannot. © 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org).
Peer review in blended teaching: A reviewers perspective
- Authors: Paulet, Renee
- Date: 2019
- Type: Text , Conference paper
- Relation: 33rd ANZAM Annual Australian New Zealand Academy of Management Conference, Wicked solutions to wicked problems. The challenge facing management research and practice; Cairns, QLD; 3-6 December, 2019 p. 96-107
- Full Text:
- Reviewed:
- Description: Peer Review of Teaching can be a useful tool in the development of academic teaching and learning within the management discipline. This research paper reports on key areas of importance from the reviewer’s perspective within the Peer Review of Blended Teaching (PRoBT). The research revealed that reviewers found their participation in PRoBT to be a positive experience, that participation in PRoBT was a learning experience for developing the reviewer’s own teaching, and that reviewers have valuable input into the nature of the framework that guides the PRoBT process. Acknowledging and incorporating the reviewer’s perspective in the design and application PRoBT contributes to the literature in the field, and may improve the acceptance and applicability of PRoBT in the tertiary environment.
- Authors: Paulet, Renee
- Date: 2019
- Type: Text , Conference paper
- Relation: 33rd ANZAM Annual Australian New Zealand Academy of Management Conference, Wicked solutions to wicked problems. The challenge facing management research and practice; Cairns, QLD; 3-6 December, 2019 p. 96-107
- Full Text:
- Reviewed:
- Description: Peer Review of Teaching can be a useful tool in the development of academic teaching and learning within the management discipline. This research paper reports on key areas of importance from the reviewer’s perspective within the Peer Review of Blended Teaching (PRoBT). The research revealed that reviewers found their participation in PRoBT to be a positive experience, that participation in PRoBT was a learning experience for developing the reviewer’s own teaching, and that reviewers have valuable input into the nature of the framework that guides the PRoBT process. Acknowledging and incorporating the reviewer’s perspective in the design and application PRoBT contributes to the literature in the field, and may improve the acceptance and applicability of PRoBT in the tertiary environment.
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Jolfaei, Alireza, Kant, Krishna
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019, Portland, United States; 24-27 June 2019. p. 9-10
- Full Text:
- Reviewed:
- Description: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight permutation mechanism for preserving the confidentiality and privacy of sensory data. © 2019 IEEE.
- Description: E1
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019, Portland, United States; 24-27 June 2019. p. 9-10
- Full Text:
- Reviewed:
- Description: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight permutation mechanism for preserving the confidentiality and privacy of sensory data. © 2019 IEEE.
- Description: E1
Productivity improvement though OEE measurement : a TPM case study for meat processing plant in Australia
- Chundhoo, Vickram, Chattopadhyay, Gopinath, Parida, Aditya
- Authors: Chundhoo, Vickram , Chattopadhyay, Gopinath , Parida, Aditya
- Date: 2019
- Type: Text , Conference paper
- Relation: Proceedings of the 5th International Workshop and Congress on eMaintenance: eMaintenance: Trends in Technologies & methodologies, challenges, possibilites and applications p. 81-87
- Full Text:
- Reviewed:
- Description: Fluctuating demands and increased competition in Australia and Asian countries have been putting more pressure on plants for packaged meat products in Australia. Total Productive Maintenance (TPM) was seen a solution and is currently being implemented within a major meat processing facility in Melbourne, Australia for achieving high Overall Equipment Effectiveness (OEE). Concerns were raised by board of directors due to OEE targets not meant. TPM was initially applied in key areas of the business, thermoforming and packaging for reducing wastes and further enhancing productivity and quality. It is now being rolled out to other sections of the plant. Data collected from fifty-two weeks of production has been analysed and recommendations made to achieve OEE targets for the R145 production line. Risk based maintenance was applied to control adverse effects of packaging quality which significantly influences shelf life. Shelf life of a modified atmosphere packaged product assures safety for consumption of meat products by consumers. Risk based maintenance considered asset failure probabilities, impacts on quality and availability of spare parts. Reliability Centred Maintenance (RCM) resulted in a Risk score for each maintenance activity and as a component was used for TPM program. Findings from this study have been passed on to the meat processing facility for implementation in the entire plant.
- Description: E1
- Authors: Chundhoo, Vickram , Chattopadhyay, Gopinath , Parida, Aditya
- Date: 2019
- Type: Text , Conference paper
- Relation: Proceedings of the 5th International Workshop and Congress on eMaintenance: eMaintenance: Trends in Technologies & methodologies, challenges, possibilites and applications p. 81-87
- Full Text:
- Reviewed:
- Description: Fluctuating demands and increased competition in Australia and Asian countries have been putting more pressure on plants for packaged meat products in Australia. Total Productive Maintenance (TPM) was seen a solution and is currently being implemented within a major meat processing facility in Melbourne, Australia for achieving high Overall Equipment Effectiveness (OEE). Concerns were raised by board of directors due to OEE targets not meant. TPM was initially applied in key areas of the business, thermoforming and packaging for reducing wastes and further enhancing productivity and quality. It is now being rolled out to other sections of the plant. Data collected from fifty-two weeks of production has been analysed and recommendations made to achieve OEE targets for the R145 production line. Risk based maintenance was applied to control adverse effects of packaging quality which significantly influences shelf life. Shelf life of a modified atmosphere packaged product assures safety for consumption of meat products by consumers. Risk based maintenance considered asset failure probabilities, impacts on quality and availability of spare parts. Reliability Centred Maintenance (RCM) resulted in a Risk score for each maintenance activity and as a component was used for TPM program. Findings from this study have been passed on to the meat processing facility for implementation in the entire plant.
- Description: E1
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Liang, Shen, Zhang, Yanchun, Ma, Jiangang
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019; Chiang Mai, Thailand; 22nd-25th April 2019; part of the Lecture Notes in Computer Science book series, also part of the Information Systems and Applications, incl. Internet/Web and HCI sub series Vol. 11446 LNCS, p. 87-103
- Full Text:
- Reviewed:
- Description: Real-world time series classification applications often involve positive unlabeled (PU) training data, where there are only a small set PL of positive labeled examples and a large set U of unlabeled ones. Most existing time series PU classification methods utilize all readings in the time series, making them sensitive to non-characteristic readings. Characteristic patterns named shapelets present a promising solution to this problem, yet discovering shapelets under PU settings is not easy. In this paper, we take on the challenging task of shapelet discovery with PU data. We propose a novel pattern ensemble technique utilizing both characteristic and non-characteristic patterns to rank U examples by their possibilities of being positive. We also present a novel stopping criterion to estimate the number of positive examples in U. These enable us to effectively label all U training examples and conduct supervised shapelet discovery. The shapelets are then used to build a one-nearest-neighbor classifier for online classification. Extensive experiments demonstrate the effectiveness of our method.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019; Chiang Mai, Thailand; 22nd-25th April 2019; part of the Lecture Notes in Computer Science book series, also part of the Information Systems and Applications, incl. Internet/Web and HCI sub series Vol. 11446 LNCS, p. 87-103
- Full Text:
- Reviewed:
- Description: Real-world time series classification applications often involve positive unlabeled (PU) training data, where there are only a small set PL of positive labeled examples and a large set U of unlabeled ones. Most existing time series PU classification methods utilize all readings in the time series, making them sensitive to non-characteristic readings. Characteristic patterns named shapelets present a promising solution to this problem, yet discovering shapelets under PU settings is not easy. In this paper, we take on the challenging task of shapelet discovery with PU data. We propose a novel pattern ensemble technique utilizing both characteristic and non-characteristic patterns to rank U examples by their possibilities of being positive. We also present a novel stopping criterion to estimate the number of positive examples in U. These enable us to effectively label all U training examples and conduct supervised shapelet discovery. The shapelets are then used to build a one-nearest-neighbor classifier for online classification. Extensive experiments demonstrate the effectiveness of our method.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Security hardening of implantable cardioverter defibrillators
- Jaffar, Iram, Usman, Muhammad, Jolfaei, Alireza
- Authors: Jaffar, Iram , Usman, Muhammad , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1173-1178
- Full Text:
- Reviewed:
- Description: Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Jaffar, Iram , Usman, Muhammad , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1173-1178
- Full Text:
- Reviewed:
- Description: Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Striking a balance between children’s need of support and parental roles in mathematics homework
- Authors: Weerasinghe, Daya
- Date: 2019
- Type: Text , Conference paper
- Relation: 42nd Annual Conference of the Mathematics Education Research Group of Australasia MERGA 2019, 30th June-4th July, Perth, Western Australia
- Full Text:
- Reviewed:
- Description: The purpose of this article is to provide insights into parent-child engagement in mathematics homework of senior school children. A mixed-methods approach was employed in the study, utilising survey questionnaires and semi-structured interviews of eight parent-child dyads from three secondary schools in Melbourne. Data collection and analysis were guided by a conceptual framework developed using the findings in relevant literature. Results indicated that children are differentially responsive to parental roles in homework and excessive involvement is not always helpful.
- Authors: Weerasinghe, Daya
- Date: 2019
- Type: Text , Conference paper
- Relation: 42nd Annual Conference of the Mathematics Education Research Group of Australasia MERGA 2019, 30th June-4th July, Perth, Western Australia
- Full Text:
- Reviewed:
- Description: The purpose of this article is to provide insights into parent-child engagement in mathematics homework of senior school children. A mixed-methods approach was employed in the study, utilising survey questionnaires and semi-structured interviews of eight parent-child dyads from three secondary schools in Melbourne. Data collection and analysis were guided by a conceptual framework developed using the findings in relevant literature. Results indicated that children are differentially responsive to parental roles in homework and excessive involvement is not always helpful.
Take me back…but to where? A content analysis of how countr e? A content analysis of how country of origin impacts on the authenticity of souvenirs
- Backer, Elisa, Zaveri, Moulik
- Authors: Backer, Elisa , Zaveri, Moulik
- Date: 2019
- Type: Text , Conference paper
- Relation: 50th Annual Travel and Tourism Research Association International conference, 25-27 June 2019, Melbourne, Australia Vol. 82
- Full Text:
- Reviewed:
- Description: Souvenirs are a popular commodity for purchase by tourists. Souvenirs can serve as an emotional connection for people to bring back fond memories of touristic experiences. They can also be gifts for friends and relatives to showcase and share touristic events when the tourist returns back home. In recent years, research has been undertaken on the importance of souvenirs and the aspect of authenticity. However, the relationship between country of origin, more specifically the ‘Made in...’ labels, and souvenirs has attracted little research interest. Importantly, despite the importance of souvenirs to tourism, a content analysis has not been undertaken. Such research seems important in order to guide future research and hold important implications for tourism practitioners. Accordingly, this research involves a content analysis of the relationship between authenticity and souvenirs. Key themes are highlighted and future research identified.
- Authors: Backer, Elisa , Zaveri, Moulik
- Date: 2019
- Type: Text , Conference paper
- Relation: 50th Annual Travel and Tourism Research Association International conference, 25-27 June 2019, Melbourne, Australia Vol. 82
- Full Text:
- Reviewed:
- Description: Souvenirs are a popular commodity for purchase by tourists. Souvenirs can serve as an emotional connection for people to bring back fond memories of touristic experiences. They can also be gifts for friends and relatives to showcase and share touristic events when the tourist returns back home. In recent years, research has been undertaken on the importance of souvenirs and the aspect of authenticity. However, the relationship between country of origin, more specifically the ‘Made in...’ labels, and souvenirs has attracted little research interest. Importantly, despite the importance of souvenirs to tourism, a content analysis has not been undertaken. Such research seems important in order to guide future research and hold important implications for tourism practitioners. Accordingly, this research involves a content analysis of the relationship between authenticity and souvenirs. Key themes are highlighted and future research identified.
Telling the whole story : a manually annotated Chinese dataset for the analysis of humor in jokes
- Zhang, Dongyu, Zhang, Heting, Liu, Xikai, Lin, Hongfei, Xia, Feng
- Authors: Zhang, Dongyu , Zhang, Heting , Liu, Xikai , Lin, Hongfei , Xia, Feng
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP 2019, Hong Kong, 3 to 7 November 2019, EMNLP-IJCNLP 2019 - 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint Conference on Natural Language Processing, Proceedings of the Conference p. 6402-6407
- Full Text:
- Reviewed:
- Description: Humor plays important role in human communication, which makes it important problem for natural language processing. Prior work on the analysis of humor focuses on whether text is humorous or not, or the degree of funniness, but this is insufficient to explain why it is funny. We therefore create a dataset on humor with 9,123 manually annotated jokes in Chinese. We propose a novel annotation scheme to give scenarios of how humor arises in text. Specifically, our annotations of linguistic humor not only contain the degree of funniness, like previous work, but they also contain key words that trigger humor as well as character relationship, scene, and humor categories. We report reasonable agreement between annotators. We also conduct an analysis and exploration of the dataset. To the best of our knowledge, we are the first to approach humor annotation for exploring the underlying mechanism of the use of humor, which may contribute to a significantly deeper analysis of humor. We also contribute with a scarce and valuable dataset, which we will release publicly. © 2019 Association for Computational Linguistics
- Authors: Zhang, Dongyu , Zhang, Heting , Liu, Xikai , Lin, Hongfei , Xia, Feng
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP 2019, Hong Kong, 3 to 7 November 2019, EMNLP-IJCNLP 2019 - 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint Conference on Natural Language Processing, Proceedings of the Conference p. 6402-6407
- Full Text:
- Reviewed:
- Description: Humor plays important role in human communication, which makes it important problem for natural language processing. Prior work on the analysis of humor focuses on whether text is humorous or not, or the degree of funniness, but this is insufficient to explain why it is funny. We therefore create a dataset on humor with 9,123 manually annotated jokes in Chinese. We propose a novel annotation scheme to give scenarios of how humor arises in text. Specifically, our annotations of linguistic humor not only contain the degree of funniness, like previous work, but they also contain key words that trigger humor as well as character relationship, scene, and humor categories. We report reasonable agreement between annotators. We also conduct an analysis and exploration of the dataset. To the best of our knowledge, we are the first to approach humor annotation for exploring the underlying mechanism of the use of humor, which may contribute to a significantly deeper analysis of humor. We also contribute with a scarce and valuable dataset, which we will release publicly. © 2019 Association for Computational Linguistics
The visceral embodiment of digital pleasures
- Smith, Naomi, Davis, Jenny, Maddox, Alexia Maddox, Patella-Rey, P.
- Authors: Smith, Naomi , Davis, Jenny , Maddox, Alexia Maddox , Patella-Rey, P.
- Date: 2019
- Type: Text , Conference paper
- Relation: 20th Annual conference of the Association of Internet Researchers, Brisbane, Australia p. 18
- Full Text:
- Reviewed:
- Description: This panel explores digital pleasures that arise through the entanglement of bodies and digital technologies. Focusing on the digital structures and affordances that facilitate seeking, receiving and giving pleasure we analyse the ways in which intimacy is not only interactive, but also profoundly embodied. Haraway’s work in particular highlights the importance of taking seriously the nexus of human bodies and technologies and attending to the ways in which technologies not only deliver and mediate pleasure, but potentially expand upon our capacity to experience it. This panel explores how mediated practices engage the body as a site of pleasure and embodied affective intensity. Within this frame, we suggest that digitally mediated pleasures, while widely consumed, still have a hint of the ‘fringe’ or ‘subversive’. As well as proposing a theoretical framework for understanding embodied digital pleasures, this panel also examines specific examples of digital pleasure from sex to drugs and sound. To date the research corpus has largely focused upon the micro-social interactions of digital intimacies. This emphasis on relational intimacy puts the body into the background of the digitally mediated encounter and limits the ways in which we can talk about embodiment, sex and pleasure online. Embodied pleasure is intrinsic to the human condition, and digital media is deeply embedded in contemporary life. How these intersect is a key piece of the puzzle of what it means to be human in contemporary society.
- Authors: Smith, Naomi , Davis, Jenny , Maddox, Alexia Maddox , Patella-Rey, P.
- Date: 2019
- Type: Text , Conference paper
- Relation: 20th Annual conference of the Association of Internet Researchers, Brisbane, Australia p. 18
- Full Text:
- Reviewed:
- Description: This panel explores digital pleasures that arise through the entanglement of bodies and digital technologies. Focusing on the digital structures and affordances that facilitate seeking, receiving and giving pleasure we analyse the ways in which intimacy is not only interactive, but also profoundly embodied. Haraway’s work in particular highlights the importance of taking seriously the nexus of human bodies and technologies and attending to the ways in which technologies not only deliver and mediate pleasure, but potentially expand upon our capacity to experience it. This panel explores how mediated practices engage the body as a site of pleasure and embodied affective intensity. Within this frame, we suggest that digitally mediated pleasures, while widely consumed, still have a hint of the ‘fringe’ or ‘subversive’. As well as proposing a theoretical framework for understanding embodied digital pleasures, this panel also examines specific examples of digital pleasure from sex to drugs and sound. To date the research corpus has largely focused upon the micro-social interactions of digital intimacies. This emphasis on relational intimacy puts the body into the background of the digitally mediated encounter and limits the ways in which we can talk about embodiment, sex and pleasure online. Embodied pleasure is intrinsic to the human condition, and digital media is deeply embedded in contemporary life. How these intersect is a key piece of the puzzle of what it means to be human in contemporary society.
Transactive energy trading of residential prosumers using battery energy storage systems
- Nizami, M. J., Hossain, M. J., Amin, B.M. Ruhul, Kashif, Muhammad, Fernandez, Edstan, Mahmud, Khizir
- Authors: Nizami, M. J. , Hossain, M. J. , Amin, B.M. Ruhul , Kashif, Muhammad , Fernandez, Edstan , Mahmud, Khizir
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 IEEE Milan PowerTech, PowerTech 2019, Milan, 23 June to 27 June 2019
- Full Text:
- Reviewed:
- Description: In a transactive energy (TE) framework, prosumers can participate in peer-to-peer (P2P) energy trading with neighbors. TE also allows prosumers to participate in grid services by trading their excess energy or energy consumption flexibility with the grid operators, energy suppliers, and third-party energy companies (e.g., Aggregators). This paper presents a novel bidding strategy for small-scale residential prosumers for energy trading in the day-ahead TE market using the flexibilities of residential battery energy storage systems to maximize the profit from energy trading. The bidding model is formulated as a bi-level optimization problem that determines energy trading bids to maximize profits for the prosumer in the upper level, while the lower-level problem schedules the operation of residential storage units with respect to minimum storage degradation and optimum user comfort. A comprehensive storage model is developed that incorporates the operational constraints and the degradation of storage units when they undergo frequent charge-discharge cycles for the energy trading. The proposed bidding model is evaluated via a case study for a typical Australian prosumer and results indicate the efficacy of the proposed model in terms of profit maximization for the prosumer while satisfying user preferences and constraints related to the operation of the storage units. © 2019 IEEE.
- Authors: Nizami, M. J. , Hossain, M. J. , Amin, B.M. Ruhul , Kashif, Muhammad , Fernandez, Edstan , Mahmud, Khizir
- Date: 2019
- Type: Text , Conference paper
- Relation: 2019 IEEE Milan PowerTech, PowerTech 2019, Milan, 23 June to 27 June 2019
- Full Text:
- Reviewed:
- Description: In a transactive energy (TE) framework, prosumers can participate in peer-to-peer (P2P) energy trading with neighbors. TE also allows prosumers to participate in grid services by trading their excess energy or energy consumption flexibility with the grid operators, energy suppliers, and third-party energy companies (e.g., Aggregators). This paper presents a novel bidding strategy for small-scale residential prosumers for energy trading in the day-ahead TE market using the flexibilities of residential battery energy storage systems to maximize the profit from energy trading. The bidding model is formulated as a bi-level optimization problem that determines energy trading bids to maximize profits for the prosumer in the upper level, while the lower-level problem schedules the operation of residential storage units with respect to minimum storage degradation and optimum user comfort. A comprehensive storage model is developed that incorporates the operational constraints and the degradation of storage units when they undergo frequent charge-discharge cycles for the energy trading. The proposed bidding model is evaluated via a case study for a typical Australian prosumer and results indicate the efficacy of the proposed model in terms of profit maximization for the prosumer while satisfying user preferences and constraints related to the operation of the storage units. © 2019 IEEE.
Use of MEA oxidation intermediates to monitor oxidation conditions during post-combustion capture of CO2
- Reynolds, Alicia, Verheyen, Vincent
- Authors: Reynolds, Alicia , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference paper
- Relation: 14th Greenhouse Gas Control Technologies Conference (GHGT-14); Melbourne 21-26 ; October 2018 p.
- Full Text:
- Reviewed:
- Description: Amine oxidation is a serious concern for post-combustion capture (PCC) of CO2 from fossil-fuel fired power stations. Organic acids are important oxidation products and have been measured in different ratios at different pilot plants. The concentrations of acetate, formate, glycolate and oxalate were measured in samples of degraded monoethanolamine from a variety of PCC pilot plants as well as laboratory-scale degradation experiments. The results suggest that the ratios of monoethanolamine oxidation intermediates (particularly glycolate and oxalate) have potential as process monitoring tools. Ultimately, ratios of these oxidation intermediates could be used to proactively manage and minimise oxidation of amine-based PCC absorbents by indicating the need for oxygen-scavenger addition or alerting operators to imminent increases in oxidative degradation rates.
- Authors: Reynolds, Alicia , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference paper
- Relation: 14th Greenhouse Gas Control Technologies Conference (GHGT-14); Melbourne 21-26 ; October 2018 p.
- Full Text:
- Reviewed:
- Description: Amine oxidation is a serious concern for post-combustion capture (PCC) of CO2 from fossil-fuel fired power stations. Organic acids are important oxidation products and have been measured in different ratios at different pilot plants. The concentrations of acetate, formate, glycolate and oxalate were measured in samples of degraded monoethanolamine from a variety of PCC pilot plants as well as laboratory-scale degradation experiments. The results suggest that the ratios of monoethanolamine oxidation intermediates (particularly glycolate and oxalate) have potential as process monitoring tools. Ultimately, ratios of these oxidation intermediates could be used to proactively manage and minimise oxidation of amine-based PCC absorbents by indicating the need for oxygen-scavenger addition or alerting operators to imminent increases in oxidative degradation rates.
Utilising novel green binders in ground improvement applications
- Yaghoubi, Mohammadjavad;, Arulrajah, A., Disfani, M., Horpibulsuk, S., Darmawan, S., Bo, Myint
- Authors: Yaghoubi, Mohammadjavad; , Arulrajah, A. , Disfani, M. , Horpibulsuk, S. , Darmawan, S. , Bo, Myint
- Date: 2019
- Type: Text , Conference paper
- Relation: 13th Australia New Zealand Conference on Geomechanics, 1-3 April 2019, Perth, Australia
- Full Text:
- Reviewed:
- Description: Special attention is being paid currently to geopolymers as novel binders in ground improvement applications. The use of industrial by-products such as fly ash (FA) and slag (S) in the synthesis of geopolymers makes these alternatives to traditional binders, such as Portland cement, sustainable binders with low-carbon footprint. Geopolymers have been studied and used in a variety of applications, such as concrete or ceramic manufacturing, with controllable conditions of production environment. There are however limited knowledge on the use of geopolymers, as stabilising binders, in ground improvement projects and lack of certainties as to how these new binders would behave in the field where varying factors such as water table or temperature could affect the strength development. This study evaluates the reliability of using a FA and S based geopolymer to stabilise a soft marine clay. The strength development and the mineralogy of the mixtures were studied. The combined FA+S contents were 10, 20 and 30%, and mixtures were prepared at water contents of 0.75, 1.0 and 1.25 liquid limit (LL). Samples were cured for 28 days at temperatures of 10, 25 and 40°C. Strength development was significantly increased by adding the FA+S content, particularly at 20% and higher. Moreover, when the water content was increased from 0.75 to 1.0 LL, strength development was enhanced, followed by a decrease at water content of 1.25 LL. Furthermore, by increasing the curing temperature, higher strengths were achieved and the strength development was accelerated. The results indicated that green geopolymeric binders could be used as reliable binders in ground improvement applications.
- Authors: Yaghoubi, Mohammadjavad; , Arulrajah, A. , Disfani, M. , Horpibulsuk, S. , Darmawan, S. , Bo, Myint
- Date: 2019
- Type: Text , Conference paper
- Relation: 13th Australia New Zealand Conference on Geomechanics, 1-3 April 2019, Perth, Australia
- Full Text:
- Reviewed:
- Description: Special attention is being paid currently to geopolymers as novel binders in ground improvement applications. The use of industrial by-products such as fly ash (FA) and slag (S) in the synthesis of geopolymers makes these alternatives to traditional binders, such as Portland cement, sustainable binders with low-carbon footprint. Geopolymers have been studied and used in a variety of applications, such as concrete or ceramic manufacturing, with controllable conditions of production environment. There are however limited knowledge on the use of geopolymers, as stabilising binders, in ground improvement projects and lack of certainties as to how these new binders would behave in the field where varying factors such as water table or temperature could affect the strength development. This study evaluates the reliability of using a FA and S based geopolymer to stabilise a soft marine clay. The strength development and the mineralogy of the mixtures were studied. The combined FA+S contents were 10, 20 and 30%, and mixtures were prepared at water contents of 0.75, 1.0 and 1.25 liquid limit (LL). Samples were cured for 28 days at temperatures of 10, 25 and 40°C. Strength development was significantly increased by adding the FA+S content, particularly at 20% and higher. Moreover, when the water content was increased from 0.75 to 1.0 LL, strength development was enhanced, followed by a decrease at water content of 1.25 LL. Furthermore, by increasing the curing temperature, higher strengths were achieved and the strength development was accelerated. The results indicated that green geopolymeric binders could be used as reliable binders in ground improvement applications.
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
- Authors: Ur-Rehman, Attiq , Gondal, Iqbal , Kamruzzuman, Joarder , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1186-1191
- Full Text:
- Reviewed:
- Description: Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed model. CVSSIoT is not only effective, simple and capable of vulnerability evaluation for traditional IT system, but also exploits unique characteristics of IoT devices.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Ur-Rehman, Attiq , Gondal, Iqbal , Kamruzzuman, Joarder , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1186-1191
- Full Text:
- Reviewed:
- Description: Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed model. CVSSIoT is not only effective, simple and capable of vulnerability evaluation for traditional IT system, but also exploits unique characteristics of IoT devices.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Young people’s decision-making as they leave school in non-metropolitan areas in Australia : insights from those working with young people
- Smith, Erica, Foley, Annette
- Authors: Smith, Erica , Foley, Annette
- Date: 2019
- Type: Text , Conference paper
- Relation: SCUTREA (Standing Conference on University Teaching and Research in the Education of Adults) Adult Education 100: Reflections & Reconstructions, University of Nottingham, U.K., 2-4 July 2019 p. 107-114
- Full Text:
- Reviewed:
- Authors: Smith, Erica , Foley, Annette
- Date: 2019
- Type: Text , Conference paper
- Relation: SCUTREA (Standing Conference on University Teaching and Research in the Education of Adults) Adult Education 100: Reflections & Reconstructions, University of Nottingham, U.K., 2-4 July 2019 p. 107-114
- Full Text:
- Reviewed:
An Attention-Based Approach for Single Image Super Resolution
- Liu, Yuan, Wang, Yuancheng, Li, Nan, Cheng, Xu, Zhang, Yifeng, Huang, Yongming, Lu, Guojun
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
Analysis of Classifiers for Prediction of Type II Diabetes Mellitus
- Barhate, Rahul, Kulkarni, Pradnya
- Authors: Barhate, Rahul , Kulkarni, Pradnya
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 4th International Conference on Computing, Communication Control and Automation, ICCUBEA 2018
- Full Text:
- Reviewed:
- Description: Diabetes mellitus is a chronic disease and a health challenge worldwide. According to the International Diabetes Federation, 451 million people across the globe have diabetes, with this number anticipated to rise up to 693 million people by 2045. It has been shown that 80% of the complications arising from type II diabetes can be prevented or delayed by early identification of the people who are at risk. Diabetes is difficult to diagnose in the early stages as its symptoms grow subtly and gradually. In a majority of the cases, the patients remain undiagnosed until they are admitted for a heart attack or begin to lose their sight. This paper analyzes the different classification algorithms based on a patient's health history to aid doctors identify the presence of as well as promote early diagnosis and treatment. The experiments were conducted on Pima Indian Diabetes data set. Various classifiers used include K Nearest Neighbors, Logistic Regression, Decision Trees, Random Forest, Gradient Boosting, Support Vector Machine and Neural Network. Results demonstrate that Random Forests performed well on the data set giving an accuracy of 79.7%. © 2018 IEEE.
- Description: E1
- Authors: Barhate, Rahul , Kulkarni, Pradnya
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 4th International Conference on Computing, Communication Control and Automation, ICCUBEA 2018
- Full Text:
- Reviewed:
- Description: Diabetes mellitus is a chronic disease and a health challenge worldwide. According to the International Diabetes Federation, 451 million people across the globe have diabetes, with this number anticipated to rise up to 693 million people by 2045. It has been shown that 80% of the complications arising from type II diabetes can be prevented or delayed by early identification of the people who are at risk. Diabetes is difficult to diagnose in the early stages as its symptoms grow subtly and gradually. In a majority of the cases, the patients remain undiagnosed until they are admitted for a heart attack or begin to lose their sight. This paper analyzes the different classification algorithms based on a patient's health history to aid doctors identify the presence of as well as promote early diagnosis and treatment. The experiments were conducted on Pima Indian Diabetes data set. Various classifiers used include K Nearest Neighbors, Logistic Regression, Decision Trees, Random Forest, Gradient Boosting, Support Vector Machine and Neural Network. Results demonstrate that Random Forests performed well on the data set giving an accuracy of 79.7%. © 2018 IEEE.
- Description: E1
Enhanced colour image retrieval with cuboid segmentation
- Murshed, Manzur, Karmakar, Priyabrata, Teng, Shyh, Lu, Guojun
- Authors: Murshed, Manzur , Karmakar, Priyabrata , Teng, Shyh , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018; Canberra, Australia; 10th-13th December 2018
- Full Text:
- Reviewed:
- Description: In this paper, we further investigate our recently proposed cuboid image segmentation algorithm for effective image retrieval. Instead of using all cuboids (i.e. segments), we have proposed two approaches to choose different subsets of cuboids appropriately. With the experimental results on eBay dataset, we have shown that our proposals outperform retrieval performance of the existing technique. In addition, we have investigated how many segments are required for the most effective image retrieval and provide a quick method to determine the suitable number of cuboids.
- Description: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018
- Authors: Murshed, Manzur , Karmakar, Priyabrata , Teng, Shyh , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018; Canberra, Australia; 10th-13th December 2018
- Full Text:
- Reviewed:
- Description: In this paper, we further investigate our recently proposed cuboid image segmentation algorithm for effective image retrieval. Instead of using all cuboids (i.e. segments), we have proposed two approaches to choose different subsets of cuboids appropriately. With the experimental results on eBay dataset, we have shown that our proposals outperform retrieval performance of the existing technique. In addition, we have investigated how many segments are required for the most effective image retrieval and provide a quick method to determine the suitable number of cuboids.
- Description: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018
Experimental evaluation of methods for reclaiming sulfur loaded amine absorbents
- Garg, Bharti, Pearson, Pauline, Cousins, Ashleigh, Verheyen, Vincent, Puxty, Graeme, Feron, Paul
- Authors: Garg, Bharti , Pearson, Pauline , Cousins, Ashleigh , Verheyen, Vincent , Puxty, Graeme , Feron, Paul
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 14th Greenhouse Gas Control Technologies Conference (GHGT-14); Melbourne, Australia; 21st-26th October 2018 p. 1-8
- Full Text:
- Reviewed:
- Description: Sulfur dioxide (SO2) is a major flue gas contaminant that has a direct effect on the performance of amine-based carbon dioxide capture units operating on power plant flue gases. In many countries, flue gas desulfurisation (FGD) is an essential upstream requirement to CO2 capture systems, thereby increasing the overall operational and capital cost of the capture system. In Australia, the efficacy of CO2 capture may be compromised by the accumulation of SO2 in the absorption solvent. CSIRO’s CS-Cap process is designed to capture of both these acidic gases in one absorption column, thereby eliminating the need for a separate FGD unit which could potentially save millions of dollars. Previous research at CSIRO’s post-combustion capture pilot plant at Loy Yang power station has shown that mono-ethanolamine (MEA) solvent absorbs both CO2 and SO2, resulting in a spent amine absorbent rich in sulfates. Further development of the CS-Cap concept requires a deeper understanding of the properties of the sulfate-rich absorbent and the conditions under which it can be effectively regenerated. In the present study, thermal reclamation and reactive crystallisation processes were investigated, allowing the parameters affecting the regeneration of sulfate-loaded amine to be identified. It was found that amine losses were considerably higher in thermal reclamation than in reactive precipitation. During thermal reclamation, vacuum conditions were more effective than atmospheric, and pH of the initial solution played a significant role in recovery of MEA from the sulfate-rich absorbent. Reactive crystallisation could be effectively accomplished with the addition of KOH. An advantage of this process was that high purity K2SO4 crystals (~99%) were formed, despite the presence of degradation products in the solvent.
- Authors: Garg, Bharti , Pearson, Pauline , Cousins, Ashleigh , Verheyen, Vincent , Puxty, Graeme , Feron, Paul
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 14th Greenhouse Gas Control Technologies Conference (GHGT-14); Melbourne, Australia; 21st-26th October 2018 p. 1-8
- Full Text:
- Reviewed:
- Description: Sulfur dioxide (SO2) is a major flue gas contaminant that has a direct effect on the performance of amine-based carbon dioxide capture units operating on power plant flue gases. In many countries, flue gas desulfurisation (FGD) is an essential upstream requirement to CO2 capture systems, thereby increasing the overall operational and capital cost of the capture system. In Australia, the efficacy of CO2 capture may be compromised by the accumulation of SO2 in the absorption solvent. CSIRO’s CS-Cap process is designed to capture of both these acidic gases in one absorption column, thereby eliminating the need for a separate FGD unit which could potentially save millions of dollars. Previous research at CSIRO’s post-combustion capture pilot plant at Loy Yang power station has shown that mono-ethanolamine (MEA) solvent absorbs both CO2 and SO2, resulting in a spent amine absorbent rich in sulfates. Further development of the CS-Cap concept requires a deeper understanding of the properties of the sulfate-rich absorbent and the conditions under which it can be effectively regenerated. In the present study, thermal reclamation and reactive crystallisation processes were investigated, allowing the parameters affecting the regeneration of sulfate-loaded amine to be identified. It was found that amine losses were considerably higher in thermal reclamation than in reactive precipitation. During thermal reclamation, vacuum conditions were more effective than atmospheric, and pH of the initial solution played a significant role in recovery of MEA from the sulfate-rich absorbent. Reactive crystallisation could be effectively accomplished with the addition of KOH. An advantage of this process was that high purity K2SO4 crystals (~99%) were formed, despite the presence of degradation products in the solvent.