Follow

Submissions from 2007

Link

The Effect of an Exercise Intervention on Physical and Cognitive Function, Emotional Health and Quality of Life Among Older Adults with Dementia in Bangkok, Sirikul Karuncharernpanit

PDF

Analysis of PKI as a means of securing ODF documents, Gautham Kasinath and Leisa Armstrong

PDF

Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa Armstrong

PDF

Analysis of PKI as a Means of Securing ODF Documents, Gautham Kasinath and Leisa J. Armstrong

PDF

Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa J. Armstrong

Securing J2ME Mobile Application API Using XACML, Gautham Kasinath and Leisa J. Armstrong

PDF

Always the optimist?, Eric Kordt and Craig Standing

Link

Reliability of time-to-exhaustion versus time-trial running tests in runners, Paul B. Laursen, Graeme T. Francis, Chris Abbiss, Michael J. Newton, and Kazunori Nosaka

PDF

Effect of leaf movement on epiphytic algal biomass of seagrass leaves, Paul Lavery, Tara Reid, Glenn Hyndes, and Beverley Van Elven

Knowledge mapping readiness, Joseph Lee and Dieter Fink

PDF

Tracing USB Device artefacts on Windows XP operating system for forensic purpose, Victor Chileshe Luo

Link

Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes

Link

Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton

Link

Molecular Markers of Circulating Melanoma Cells, Sandra Medic, Robert L. Pearce, Peter J. Heenan, and Melanie Ziman

Link

Working in a cross-cultural setting, Peter Milnes, Clare Fenwick, Keith Truscott, and Winsome St John

Link

Attenuation of muscle damage by preconditioning with muscle hyperthermia 1-day prior to eccentric exercise, Kazunori Nosaka, Makii Mishan Muthalib, A Lavender, and Paul B. Laursen

PDF

Network Security Devices and Protocols Using State Model Diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj

Link

On diverse routing for Shared Risk Link Groups (SRLGs) in Optical Mesh Networks, Quoc Viet Phung, Daryoush Habibi, and Hoang Nguyen

Link

A Novel Beam Deflection Method for Wide Angle Laser Scanning, Kaveh Sahba, Kamal Alameh, and Clifton Smith

PDF

Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, and Clifton Smith

PDF

Cylindrical quasi-cavity waveguide for static wide angle pattern projection, Kaveh Sahba, Kamal Alameh, Clifton Smith, and Arie Paap

Link

Photonics-based spectral reflectance sensor for plant discrimination, Kaveh Sahba, Sreten Askraba, and Kamal Alameh

PDF

An approach in identifying and tracing back spoofed IP packets to their sources, Krishnun Sansurooah

Link

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

PDF

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

Link

Intrusion Detection System (IDS) techniques and responses for mobile wireless networks, Krishnun Sansurooah

PDF

Managing Analysis, David Shaw

Link

The Effect of Accentuated Eccentric Load on Jump Kinetics in High-Performance Volleyball Players, Jeremy Sheppard, Robert U. Newton, and Michael Mcguigan

Link

Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek

PDF

The Phantasm of ATM Withdrawal, Nattakant Utakrit

Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes

Link

Electoral violence in mid nineteenth-century England and Wales, Justin Wasserman and Edwin Jaggard

Link

The Effect of Classical Music on Painting Quality and Classroom Behaviour for Students with Severe Intellectual Disabilities in Special Schools, Russell F. Waugh and Jane V. Riddoch

PDF

Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb

Link

Exposure assessment: a case study, Hayden Wing and Jacques Oosthuizen

PDF

Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks, Justin Wyatt, Daryoush Habibi, Iftekhar Ahmad, and Hushairi Zen

Link

A Segregation Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad, and Justin Wyatt

PDF

Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, and Justin Wyatt

Submissions from 2006

Link

Dynamic pacing strategies during the cycle phase of an ironman triathlon, Chris Abbiss, Marc Quod, David Martin, Kevin Netto, Kazunori Nosaka, Hamilton Lee, Rob Suriano, David Bishop, and Paul Laursen

PDF

Mobile Handset Forensic Evidence: a challenge for Law Enforcement, Marwan Al-Zarouni

Link

Mobile handset forensic evidence: a challenge for law enforcement, Marwan Al-Zarouni

PDF

The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni

PDF

Security risk assessment: Group approach to a consensual outcome, Ben Beard and David J. Brooks

PDF

Managing Information Security Complexity, Murray Brand

Link

Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw

PDF

Literacy and recent history of diarrhoea are predictive of plasmodium falciparum parasitaemia in Kenyan adults, Rodney Coldren, Trish Prosser, Fredrick Ogolla, and Victor Ofula

Link

Influence of different volumes and types of detached macrophytes on fish community structure in surf zones of sandy beaches, Karen Crawley, Glenn Hyndes, and Susanne Ayvazian

Link

The effects of biotechnology education on Australian high school students' understandings and attitudes about biotechnology processes, Vaille Dawson and Christina Soames

Link

From Systems to Network? Developments in the state records authority of New South Wales regional repositories, Wayne Andrew Doubleday

Link

Pollution minimisation practices in the Australian mining and mineral processing industries, Catherine Driussi and Janis Jansz

Link

Technological options for waste minimisation in the mining industry, Catherine Driussi and Janis Jansz

Link

Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model, Ivana Elpez and Dieter Fink

Link

A model of information security governance for e-business, Dieter Fink, Tobias Huegle, and Martin Dortschy

Link

In search of community in Western Australia: A qualitative study of adults conceptualisations of their communities, Andria Green, Lynne Cohen, and Julie Ann Pooley

PDF

Identifying the Challenges in Teaching Computer Science Topics Online, Yuwanuch Gulatee and Barbara Combes

Link

A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward

PDF

Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan

Link

The framing of ATSIC Chairman Geoff Clark in the Australian, Lauren Heinritz and Beate Josephi

Link

Gender Differences in Performance of Script Analysis by Older Adults, Edward Helmes, J Bush, Donna Pike, and Deirdre Drake

Link

The influences of lawfulness attitudes on consumers' willingness to purchase counterfeit goods, Anas Hidayat and Katherine Mizerski

Link

Phonological and syntactic processing and the role of working memory in reading comprehension among secondary school students, John Vincent Holsgrove and Alison Garton

Link

Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime, Fahmid Imitaz

PDF

Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime, Fahmid Imtiaz

PDF

Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli

PDF

Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli

PDF

Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward

PDF

Core temperature and hydration status during an Ironman triathlon, Paul B. Laursen, Rob Suriano, Marc Quod, Hamilton Lee, Chris Abbiss, Kazunori Nosaka, David Martin, and David Bishop

PDF

Efficient p-Cycle Design by Heuristic p-Cycle Selection and Refinement for Servivable WDM Mesh Networks, Kungmang Lo, Daryoush Habibi, Quoc Viet Phung, Alexander Rassau, and Hoang N. Nguyen

PDF

A Hybrid p-Cycle Search Algorithm for Protection in WDM Mesh Networks, Kungmang Lo, Daryoush Habibi, Alexander Rassau, Quoc Viet Phung, Hoang Nguyen, and Byung Kang

Link

Validated age and growth of the sandbar shark, Carcharhinus plumbeus (Nardo 1827) in the waters off Western Australia, Rory Brian Mcauley, Colin Simpfendorfer, Glenn Hyndes, Richard Allison, Justin Chidlow, Stephen Newman, and Rod C Lenanton

An in silico investigation into the discovery of novel cis-acting elements within the intronic regions of human PAX7, Maika G. Mitchell and Melanie Ziman

Link

Loss of Heterozygosity Analysis at selected Single Nucleotide Polymorphism Sites in the Intronic Regions of PAX7 via In Silico biology and Microsatelite Analysis, Marika Mitchell, Diane Tabarini, and Melanie Ziman

Link

Enhancing the forensic ICQ logfile extraction tool, Kim Morfitt

PDF

Structural Analysis of the Log Files of the ICQ Client Version 2003b, Kim Morfitt

PDF

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli

PDF

Joint optimization in capacity design of networks with p-cycle using the fundamental cycle set, Hoang Nguyen, Daryoush Habibi, Viet Q Phung, Stefan Lachowicz, Kungmang Lo, and Byung Kang

Link

General Practitioners' Attitudes to Palliative Care: a Western Australian Rural Perspective, Moira O'Connor and Richelle Lee-Steere

PDF

Tackling Talk Through Action Learning, Rhonda Oliver, Yvonne Haig, and Samantha Vanderford

Link

Issues in E-Learning: A Thai case study, Penporn Pagram and Jeremy Pagram

Link

Nearshore sea temperature variability off Rottnest Island (Western Australia) derived from satellite data, Alan Pearce, Fabienne Faskel, and Glenn Hyndes

PDF

A segmentation method for shared protection in WDM networks, Quoc Viet Phung, Daryoush Habibi, Hoang Nguyen, and Kungmeng Lo

PDF

Non-contact Laser Spectroscopy for Plant Discrimination in Terrestrial Crop Spraying, Kaveh Sahba, Sreten Askraba, and Kamal Alameh

PDF

An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah

PDF

Taxonomy of computer forensics methodologies and procedures for digital evidence seizure, Krishnun Sansurooah

Improving community water conservation behaviour in Chachoengsao, Thailand, Kuakul Sathapornvajana, Lynne Cohen, Neil Drew, and Julie Ann Pooley

PDF

Improving Community Water Conservation Behaviour in Chachoengsao, Thailand, Kuakul Sathapornvajana, Lynne Cohen, Neil Drew, and Julie Ann Pooley

Link

Electronic records management criteria and information Security, Alison Shaw and David Thomas Shaw

Link

Mediated identification, David Thomas Shaw

Link

An information operation model and classification scheme, David Thomas Shaw and Steven Cikara

PDF

Mediated Identification, D T. Shaw

PDF

An Information Operation Model and Classification Scheme, D T. Shaw and S Cikara

Link

An Evaluation of a New Test of Reactive Agility and its Relationship to Sprint Speed and Change of Direction Speed, Jeremy Sheppard, Warren B. Young, Timothy Doyle, T A. Sheppard, and Robert U. Newton

Link

Child Care For Infants and Toddlers: Where in The World Are We Going?, Margaret Sims, Andrew Guilfoyle, and Trevor Parry (Afl)

Link

What is it about digital media games that engrosses young boys? A study in the sub-culture of Yu-Gi-Oh and its potential for improving educational outcomes, Kim Tomlinson-Baillie and Terence De Jong

Link

Fatigue in Frail Elderly People, Christine Toye, Kate White, and Karen Rooksby

Link

Belguim's intelligence community: new challenges and opportunities, Maarten Vanhorenbeeck

Computers can be your EFL friends if you ask them nicely, Vijittra Vonganusith and Jan Gray

PDF

Telemedicine and the Digital Door Doctor, Darren Webb and Patricia A. Williams

Link

Forensics analysis of the contents of Nokia mobile phones, Brendan Williamson, Paul Apeldoorn, Ben Cheam, and Meaghan Mcdonald

Link

Investigating the Accuracy of Wired and Wireless TCP/IP Fingerprinting on Honeyd, Suen Yek