QUT offers a diverse range of student topics for Honours, Masters and PhD study. Search to find a topic that interests you or propose your own research topic to a prospective QUT supervisor. You may also ask a prospective supervisor to help you identify or refine a research topic.
Found 484 matching student topics
Displaying 25–36 of 484 results
Facilitating gaining trust in IOT systems
Many organisations have shown an increasing interest in deploying IOT systems. However, most of them and their stakeholders are new to these systems, and it is difficult for them to trust the technology. What are the technological, managerial and societal aspects that contribute to trust in IOT systems? What can we do to improve the level of trust and increase adoption of the technology?
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Information Systems
Visualisation and sonification for genomic data sets
Successive revolutions in sequencing technology over the past two decades have led to an explosion in the availability of genomic data. Analysing biological datasets and identifying relationships within them is challenging - some of the process can be automated but interactive exploration offers a number of advantages, and supports serendipitous discovery.This project looks at visual analytics and sonification - the use of sound and musical encodings - to enhance our understanding of biological networks.
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Multi-modal sentiment analysis
In deep learning models, language models and word embedding methods have become popular to understand the context of text data. Popular language models such as BERT have limitations in terms of the token length. There exist some corpora that have longer text with an average of 1000 tokens. Additionally, these corpora are text-heavy and only include some images.In our prior works, we have developed several multi-modality models on social media datasets.
- Study level
- Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Curvature dependence of reaction-diffusion wave front speed with nonlinear diffusion.
Reaction-diffusion waves describe the progression in space of wildfires, species invasions, epidemic spread, and biological tissue growth. When diffusion is linear, these waves are known to advance at a rate that strongly depends on the curvature of the wave fronts. How nonlinear diffusion affects the curvature dependence of the progression rate of these wavefronts remains unknown.
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Mathematical Sciences
- Research centre(s)
- Centre for Biomedical Technologies
Optimising bone shape with memory networks
Bone is a dynamic tissue that optimises its shape to the mechanical loads that it carries. Bone mass is accrued where loads are high, and reduced where loads are low. This adaptation of bone tissue to mechanical loads is well-known and observed in many instances. However, what serves as a reference mechanical state in this shape optimisation remains largely unknown.
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Mathematical Sciences
- Research centre(s)
- Centre for Biomedical Technologies
Automatic Generation of Software Vulnerability Datasets for Machine Learning
In recent years, machine learning has enjoyed profound success in a range of interesting applications such as natural language processing, computer vision and speech recognition. It has been possible mainly due to, in addition to better computing resources, the availability of large amounts of training datasets to these applications. However, in software security research, the lack of large datasets is an open problem that makes it challenging for machine learning to reason about security vulnerabilities found in real-world software. The …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Building explainable and trustworthy intelligent systems
Existing machine learning-based intelligent systems are autonomous and opaque (often considered “black-box” systems), which has led to the lack of trust in AI adoption and, consequently, the gap between machine and human being.In 2018, the European Parliament adopted the General Data Protection Regulation (GDPR), which introduces a right of explanation for all human individuals to obtain “meaningful explanations of the logic involved” when a decision is made by automated systems. To this end, it is a compliance that an intelligent …
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Information Systems
- Research centre(s)
- Centre for Data Science
Surprising genomes
Genomic sequencing has changed radically since the first public sequencing projects more than 25 years ago. The original human genome project cost more than two billion dollars; sequencing a human genome now costs as little as a thousand, and we may sequence whole viruses and bacteria as a matter of routine.The challenge now lies in rapidly analysing these genomes as they appear, and understanding quickly whether there is anything interesting in the new sequence to warrant further inquiry. This project …
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Advanced materials for redox flow batteries
Grid-scale energy storage for intermittent renewables like solar and wind is an essential element of the transition away from fossil fuel based electricity production. Redox flow batteries have some very interesting characteristics for this stationary storage application:they are safer than other battery typesthe amount of energy stored can typically be scaled up easilythe power and energy of a system are more decoupled compared to lithium and other batteries, making them flexible in their design parameters.Ion exchange membrane and electrode are …
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Chemistry and Physics
- Research centre(s)
- Centre for Materials Science
Analysis of professional squash matches
This project concerns computer vision and statistical analysis of performance in professional level matches in the game of squash.The goal is to use computer vision and existing systems to capture and analyse patterns of play, allowing coaches and professional players to develop strategies to improve performance, to counter particular types of play and even to tailor game plans to attack individual opponents.
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Computer Science
- Research centre(s)
- Centre for Data Science
Process-data governance patterns
Data is recognised a strategic asset for organisations. There is a growing need to manage the voluminous data an organisation is exposed to in order to use it for decision-making.Of particular significance is process data, which consists of information about the execution of processes. Such information is used to uncover behaviour of processes within an organisation. This brings forth the significance of data governance. Data governance is the exercise of control and authority over management of data. Despite its significance, …
- Study level
- PhD, Master of Philosophy, Honours
- Faculty
- Faculty of Science
- School
- School of Information Systems
Unified def-site and use-site security policies for component-based software systems
Securing the information manipulated by computer systems, such as privacy and integrity in social software, is a challenge. Traditional methods to impose limits on the information disclosure, such as access control lists, firewalls, and cryptography, provide no guarantees about information propagation. For instance, cryptography provides no guarantees about the confidentiality of the data are given once it is decrypted.Information flow control (IFC) is the problem of ensuring secure information flow according to specified policies within computer systems. Modern applications are …
- Study level
- PhD, Master of Philosophy
- Faculty
- Faculty of Science
- School
- School of Computer Science
Contact us
If you have questions about the best options for you, the application process, your research topic, finding a supervisor or anything else, get in touch with us today.