Responding to new information technologies and data collection methods that are disrupting society by engaging our experts across multiple disciplines.
We inform researchers and the wider community about how to exploit disruptions caused by the steep increase in data, communications and sensors; deep advances in automation; new energy production; and, the challenges of cyber security.
Our work covers four key areas: data and sensors focuses on the capture, communication, collation, and analysis of data; automation and intelligence concentrates on the understanding and exploitation of data; energy production and systems examines energy systems, user behaviour and integrated predictive control of networks; and, cyber security examines how we can better protect the profusion of computational systems in our society.
Matt Duckham, Director, RMIT Information and Systems (Engineering) ECP
We are working to understand and exploit the disruptions resulting from the explosion of sensors, telecommunication, data and automation, as well as facing the related challenges of cyber security.
Along with harnessing existing research networks and projects to respond to COVID-19, RMIT’s Enabling Capability Platforms (ECPs) launched five cross-platform initiatives in June 2020 to address various key areas for post COVID-19 recovery.
A major new research centre will investigate how rapidly emerging autonomous decision-making technologies can be used safely and ethically for all Australians.
Manufacturing and fabrication, Local, State and Federal government, Energy retail and distribution, Global corporations and supply chains
Focusing on data capture, collation and analysis and telecommunications. This area encompasses:
This area focuses on the production of energy from advanced and renewable energy sources, and its transformation into electrical form for distribution and consumer usage with maximum efficiency, minimum losses and reduced greenhouse gas emissions.
Focusing on protecting the profusion of computational systems in our society. This encompasses all aspects of cyber security, including:
This area focuses on how to understand and exploit data.
It covers using data-focused computational and mathematical tools to optimally design, predictively model, prescriptively simulate, and intelligently control the operation of complex cyber and physical systems.
Acknowledgement of country
RMIT University acknowledges the people of the Woi wurrung and Boon wurrung language groups of the eastern Kulin Nation on whose unceded lands we conduct the business of the University. RMIT University respectfully acknowledges their Ancestors and Elders, past and present. RMIT also acknowledges the Traditional Custodians and their Ancestors of the lands and waters across Australia where we conduct our business. - Artwork created by Louisa Bloomer