Theses from 2012
A method for securing online community service: A study of selected Western Australian councils, Sunsern Limwiriyakul
Stratification of soil organic C, N and C: N ratio as affected by conservation tillage in two maize fields of China, Y Lou, M Xu, Xianni Chen, Xinhua He, and K Zhao
Soil nitrate distribution, N 2O emission and crop performance after the application of N fertilizers to greenhouse vegetables, Y Lou, M Xu, Xinhua He, Y Duan, and L Li
The Collie Pit Lake District, Western Australia: An Overview, Mark Lund, Clinton Mccullough, and Naresh Radhakrishnan
Compositional variation in sugars and organic acids at different maturity stages in selected small fruits from Pakistan, T Mahmood, F Anwar, M Abbas, Mary Boyce, and N Saari
Closure planning in a developing country - a case study from the Phu Kham Mine, Laos, Southeast Asia, Amy Mauric, Clinton Mccullough, Charlie Wilson-Clark, Andrew Witcomb, and Jeff Millgate
Strategies for the intelligent selection of components, Valerie Maxville
Pit lakes as evaporative 'terminal' sinks: an approach to best available practice mine closure, Clinton Mccullough, Genevieve Marchant, Jorg Unseld, Michael Robinson, and Benjamin O'Grady
Riverine breach and subsequent decant of an acidic pit lake: evaluating the effects of riverine flow-through on lake stratification and chemistry, Clinton Mccullough, Naresh Radhakrishnan, Mark Lund, Michelle Newport, Elmien Ballot, and Digby Short
Inhibition of protein translocation at the endoplasmic reticulum promotes activation of the unfolded protein response, Craig McKibbin, Alina Mares, Michela Piacenti, Helen Williams, Peristera Roboti, Marjo Puumalainen, Anna Callan, Karolina Lesiak-Mieczkowska, Stig Linder, Hanna Harant, Stephen High, Sabine Flitsch, Roger Whitehead, and Eileithyia Swanton
Estimating Maternal and Prenatal Exposure to Glyphosate in the Community Setting, Heather Lilian Mcqueen, Anna Callan, and Andrea Hinwood
Assessment of Climate Change Effect on Water Harvesting Structures in Rainfed Regions: Geospatial Data Mining Approach, Sreedhar Nallan and Leisa Armstrong
Impact assessment of agricultural watersheds using geospatial data mining techniques: A conceptual framework, Sreedhar Nallan and Leisa J. Armstrong
Exploration games played on a DDR Pad can constitute beneficial physical exercise, Kimthy Nguyen, Bohan Li, Martin Masek, and Yuwanuch Gulatee
LSK Derived LSK– Cells Have a High Apoptotic Rate Related to Survival Regulation of Hematopoietic and Leukemic Stem Cells, Cong Peng, Yaoyu Chen, Yi Shan, Haojian Zhang, Zhiru Guo, Dongguang Li, and Shaoguang Li
Facilitating adaptation of biodiversity to climate change: a conceptual framework applied to the world’s largest Mediterranean-climate woodland, S Prober, Kevin Thiele, Philip Rundel, Colin Yates, Sandra Berry, Margaret Byrne, Les Christidis, Carl Gosper, Pauline Grierson, Kristina Lemson, T Lyons, Craig Macfarlane, Michael O'Connor, John Scott, Rachel Standish, William Stock, Eddie Van Etten, G Wardell-Johnson, and A Watson
Flat-plate techniques for measuring reflectance of macro-algae (Ulva curvata), E Ramsey, A Rangoonwala, Mads Thomsen, and A Schwarzschild
Spectral definition of the macro-algae ulva curvata in the back-barrier bays of the eastern shore of Virginia, USA, E Ramsey, A Rangoonwalaj, Mads Thomsen, and A Schwarzschild
Coevolutionary algorithms for the optimization of strategies for red teaming applications, Tirtha Ranjeet
A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011, Krishnun Sansurooah and Patryk Szewczyk
Fussy feeders: Phyllosoma larvae of the Western Rocklobster (Panulirus cygnus) demonstrate prey preference, M I Saunders, P A Thompson, A G Jeffs, Christin Sawstrom, N Sachlikidis, L E Beckley, and A M Waite
Environmental influences on virus–host interactions in an Australian subtropical reservoir, Christin Sawstrom and Peter Pollard
An investigation into remote transactions, David Shaw
A review of Bennelongia De Deckker & McKenzie, 1981(Crustacea, Ostracoda) species from eastern Australia with the description of three new species, Rylan Shearn, Annette Koenders, Stuart Halse, Isa Schoen, and Koen Martens
Identification requirements and policy in alternative remittance : a measure of legislative adherence, Timothy J. Smith
Interactive effects of altered rainfall and simulated nitrogen deposition on seedling establishment in a global biodiversity hotspot, Rachel Standish, Joseph B Fontaine, R Harris, William Stock, and R Hobbs
Molecular delineation of species in the coral holobiont, Michael Stat, Andrew Baker, David Bourne, Adrienne Correa, Zac Forsman, Megan Huggett, Xavier Pochon, Derek Skillings, Robert Toonen, Madeleine van Oppen, and Ruth Gates
Dendroecological indicators of historical responses of pines to water and nutrient availability on a superficial aquifer in south-western Australia, William Stock, Lindsay Bourke, and Raymond Froend
Phylogenetic ecology of foliar N and P concentrations and N:P ratios across mediterranean-type ecosystems, William Stock and G Anthony Verboom
A case study of internet banking security of mainland Chinese banks: A customer perspective, Panida Subsorn and Sunsern Limwiriyakul
Prediction of water retention curve of a layer packed with soil particles from particle size distribution, Nobuhide Takahashi, Masataka Tsurukawa, Chikao Arai, Hiroshi Fukunaga, and Koichi Yamada
Harmful algae are not harmful to everyone, Mads Thomsen, Thibaut De Bettignies, Thomas Wernberg, M Holmer, and Bastien Debeuf
A Meta-Analysis of Seaweed Impacts on Seagrasses: Generalities and Knowledge Gaps, Mads Thomsen, Thomas Wernberg, Aschwin H. Engelen, Fernando Tuya, Mat A. Vanderklift, Marianne Holmer, Karen J. McGlathery, Francisco Arenas, Jonne Kotta, and Brian R. Silliman
Al-Jihad Fi Sabilillah: in the Heart of Green Birds, Robyn Torok
Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok
Security awareness by online banking users in Western Australian of phishing attacks, Nattakant Utakrit
An Investigation into the effect of stochastic annual rainfall on crop yields in South Western Australia, Yunous Vagh
The application of a visual data mining framework to determine soil, climate and land-use relationships, Yunous Vagh
A Data Mining Perspective of the Dual Effect of Rainfall and Temperature on Wheat Yield, Yunous Vagh and Jitian Xiao
Mining temperature profile data for shire-level crop yield prediction, Yunous Vagh and Jitian Xiao
Importance of topography and topsoil selection and storage in successfully rehabilitating post-closure sand mines featuring pit lakes, Eddie Van Etten, Clinton Mccullough, and Mark Lund
Diversity among Macroalgae-Consuming Fishes on Coral Reefs: A Transcontinental Comparison, Adriana Verges, Scott Bennett, and David R. Bellwood
Validation of portable digital voltammeter, pdv6000+ instrument for detection of lead in rain water samples in Esperance, Western Australia, Magdelena Wajrak and P McCafferty
Developing an empirical model of canopy water flux describing the common response of transpiration to solar radiation and VPD across five contrasting woodlands and forests, Rhys Whitley, Daniel Taylor, Catriona Macinnis-Ng, Melanie Zeppel, Isa Yunusa, Anthony O'Grady, Raymond Froend, Belinda Medlyn, and Derek Eamus
Ecohealth: Connecting Ecology, Health and Sustainability, Bruce Wilcox, Alonso Aguirre, and Pierre Horwitz
The Development of a National Approach to CDA: Successes, Challenges and Lessons Learned from Australia, Patricia Williams, Sarah Gaunt, Grahame Grieve, Vincent McCauley, and Hugh Leslie
Sound Foundations: Leveraging International Standards for Australia's National Ehealth System, Patricia Williams and Vincent McCauley
Noise Tolerance for Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While
Real-Time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While
Spatial distribution of glomalin-related soil protein and its relationships with root mycorrhization, soil aggregates, carbohydrates, activity of protease and β-glucosidase in the rhizosphere of Citrus unshiu, Qiangsheng Wu, Xinhua He, YingNing Zou, KaiPing He, YaHong Sun, and MingQin Cao
Arbuscular mycorrhizas alter root system architecture of Citrus tangerine through regulating metabolism of endogenous polyamines, Q S Wu, Xinhua He, Y. N. Zou, C Y Liu, Jie XIAO, and Yan Li
A new latex price forecasting model to reduce the risk of rubber overpopulation in Thailand, Jitian Xiao and Panida Subsorn
The Blk Pathway Functions As A Tumor Suppressor In Chronic Myeloid Leukemia Stem Cells, Haojian Zhang, Cong Peng, Yiguo Hu, Huawei Li, Zhi Sheng, Yaoyu Chen, Con Sullivan, Jan Cerny, Lloyd Hutchinson, Anne Higgings, Patricia Miron, Xueqing Zhang, Michael A. Brehm, Dongguang Li, Michael R. Green, and Shaoguang Li
Scd1 plays a tumor-suppressive role in survival of leukemia stem cells and the development of chronic myeloid leukemia, H Zhang, H Li, N Ho, Dongguang Li, and Shaoguang Li
Decomposition of Abies faxoniana litter varies with freeze-thaw stages and altitudes in subalpine/alpine forests of southwest China, J Zhu, Xinhua He, F Wu, Wanquin Yang, and B Tan
Submissions from 2011
Antioxidant and Antimicrobial Attributes of Different Solvent Extracts from Leaves and Flowers of Akk [Calotropis Procera (Ait.) Ait. F.)], Naveed Ahmad, Farooq Anwar, Sohail Hameed, and Mary C. Boyce
An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked
Guidelines for the digital forensic processing of Smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Martin
Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk
A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadakil, and Nathan Clarke
Effective ICTs in Agricultural Value Chains to Improve Food Security: An International Perspective, Leisa Armstrong, Dean Diepeveen, and Niketa Gandhi
Case studies: A security science research methodology, Bill Bailey
Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk
Enhancing automated red teaming with Monte Carlo Tree Search, Daniel Beard
Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp
Assessing the relationship between fire and grazing on soil characteristics and mite communities in a semi-arid savanna of northern Australia, Stephen Beyer, Adrianne Kinnear, Lindsay Hutley, Keith McGuinness, and Karen Gibb
Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen
A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan
Can we learn how systems work? , Fabio Boschetti, Pierre Yves-Hardy, Nicola Grigg, and Pierre Horwitz
Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks
Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand
A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward
AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek
RIM Professionals Australasia Technology Survey 2010-Part 1, Mark Brogan and David Roberts
Security risk management: A psychometric map of expert knowledge structure, David Brooks
Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton
Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks
Quantitative approaches in climate change ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, and Anthony J. Richardson
The pace of shifting climate in marine and terrestrial ecosystems, Michael Burrows, David Schoeman, Lauren Buckley, Pippa Moore, Elvira Poloczanska, Keith Brander, Chris Brown, John Bruno, Carlos Duarte, Benjamin Halpern, Johanna Holding, Carrie Kappel, Wolfgang Kiessling, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, William Sydeman, and Anthony Richardson
Children's Exposure to Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, and Andrea Lee Hinwood
Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci
Shall we play a game?, Craig Caulfield
Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj
An investigation into the use of neural networks for the prediction of the stock exchange of Thailand, Suchira Chaigusin
Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams
Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes
Website Accessibility in Australia and the Australian Government's national transition strategy, Vivienne Conway
Website Accessibility in Western Australian Public Libraries, Vivienne Conway
E-governance of the Forest: Management by Multivalence, David Cook
Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith
The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks
Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill
User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan
An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs