Submissions from 2013
Response of wetland vegetation to climate change and groundwater decline on the Swan Coastal Plain, Western Australia: Implications for management, Robyn Loomes, Raymond H. Froend, and Beate Sommer
Importance of catchment vegetation and design to long-term rehabilitation of acidic pit lakes, Mark A. Lund, Eddie J. Van Etten, and Clinton D. Mccullough
WAMbot: Simulation and modelling of a team of autonomous mobile robots, Martin Masek, Frank Ophelders, Sushil Pangeni, Adrian Boeing, and Thomas Braunl
Improving assessment of groundwater-resource sustainability with deterministic modelling: A case study of the semi-arid Musi sub-basin, South India [Amélioration de l'évaluation de la pérennité de la ressource en eau souterraine à l'aide d'une modélisation déterministe: Cas du sous-bassin semi aride Musi, Inde du Sud], S Massuel, B A. George, J P. Venot, L Bharati, and S Acharya
Nano-engineered RuO2 thin film pH sensor for water quality evaluation, Davendra Maurya, A Sardarinejad, and Kamal Alameh
Breach and decant of an acid mine lake by a eutrophic river: river water quality and limitations of use, Clinton D. Mccullough, Elmien Ballot, and Digby Short
Mine closure of pit lakes as terminal sinks: best available practice when options are limited?, Clinton D. Mccullough, G. Marchand, and J Unseld
Unexpected shifts in fatty acid composition in response to diet in a common littoral amphipod, Rebecca McLeod, Glenn A. Hyndes, Catriona Hurd, and Russell Frew
Identifying robust bioindicators of light stress in seagrasses: A meta-analysis, Kathryn M. McMahon, Catherine Collier, and Paul S. Lavery
Identity and behaviour of herbivorous fish influence large-scale spatial patterns of macroalgal herbivory in a coral reef, Peter Michael, Glenn A. Hyndes, Mathew A. Vanderklift, and Adriana Verges
Identifying thresholds for responses of amphibians to groundwater and rainfall decline, Nicola Mitchell, Beate Sommer, and Peter Speldewinde
Species distribution modelling using bioclimatic variables to determine the impacts of a changing climate on the western ringtail possum (Pseudocheirus occidentalis; Pseudocheiridae), Shaun W. Molloy, Robert A. Davis, and Eddie J. Van Etten
An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart
Opto-VLSI-based adaptive optical power splitter/combiner for next generation dynamic optical telecommunication networks, Haithem A. Mustafa
Geospatial data mining to explore watershed development in rainfed regions, Sreedhar Acharya Nallan, Leisa Armstrong, Andreas Neuhaus, B Croke, and N Dunstan
Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone
Using genetic algorithms to find cellular automata rule sets capable of generating maze-like game level layouts, Andrew Pech
Global imprint of climate change on marine life, Elvira Poloczanska, Christopher J. Brown, William Sydeman, Wolfgang Kiessling, David Schoeman, Philippa J. Moore, Keith Brander, John Bruno, Lauren Buckley, Michael Burrows, Carlos Duarte, Benjamin Halpern, Johnna Holding, Carrie Kappel, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, Sarah Thompson, and Anthony Richardson
Upper and lower concentration thresholds for bioremediation of Acid Mine Drainage using bulk organic substrates, Naresh K. Radhakrishnan, Clinton D. Mccullough, and Mark A. Lund
Testing a distributed denial of service defence mechanism using red teaming, Samaneh Rastegari, Philip Hingston, Chiou-Peng Lam, and Murray Brand
Maternal exposure to organochlorine pesticides in Western Australia, Alison Reid, Anna C. Callan, Ania Stasinska, Jane Heyworth, Duong Trong Phi, Jon Odland, and Andrea Hinwood
Current and emerging technologies employed to abate crime and to promote security, Rick Sarre, David J. Brooks, Clifton L. Smith, and Rick Draper
'It's not about believing': Exploring the transformative potential of cultural acknowledgement in an Indigenous tourism context, Pascal Scherrer and Kim Doohan
Technology Corner: Visualising forensic data: Evidence guidelines (Part 2), Damian Schofield and Ken Fowle
Technology corner: Visualising forensic data: Evidence (Part 1), Damian Schofield and Ken Fowle
Environmental and Conservation Volunteering as Workplace Integrated Learning for University Students, Rowena H. Scott and Eddie van Etten
University student volunteering alignment with sustainability principles, Rowena H. Scott and Eddie J. Van Etten
Millennial scale impact on the marine biogeochemical cycle of mercury from early mining on the Iberian Peninsula, Oscar Serrano Gras, A. Martinez-Cortizas, M. A. Mateo, H. Biester, and R. Bindler
Cartoons for e-health informatics, Moira G. Sim, Eric L. Khong, Ashleigh C. Mcevoy, Toni Wain, Mick Sim, and Patricia A. Williams
The relationship between the meaning of water and sense of place : a grounded theory study from northern Thailand, Katesuda Sitthisuntikul
Threats and knowledge gaps for ecosystem services provided by kelp forests: A northeast Atlantic perspective, Dan A. Smale, Michael T. Burrows, Philippa J. Moore, Nessa O'Connor, and Stephen J. Hawkins
Assessing risks to groundwater dependent wetland ecosystems in a drying climate: an approach to facilitate adaptation to climate change, Beate Sommer, Shireen McGuinness, Raymond H. Froend, and Pierre Horwitz
Concentrations of polybrominated diphenyl ethers (PBDEs) in residential dust samples from Western Australia, Ania Stasinska, Alison Reid, Andrea Hinwood, G Stevenson, Anna C. Callan, Jon Odland, and Jane Heyworth
WAMSI 2 - Dredging Node - Project 5.5.2 - Defining thresholds and indicators of primary producers - Seagrass pressure-response relationships - Experiment 2, John Statton, Gary Kendrick, Paul Lavery, and Kathryn McMahon
Pictures in words : indexing, folksonomy and representation of subject content in historic photographs, Brian Stewart
Pine as fast food: Foraging ecology of an endangered cockatoo in a forestry landscape, William Stock, Hugh Finn, Jackson Parker, and Ken Dods
Connectivity check for modular self reconfigurable robots, Rajesh Subramanian, Martin Masek, and Chang Su Lee
Human factors and cultural influences in implementing agile philosophy and agility in global software development, Anuradha Sutharshan
Usability and security support offered through ADSL router user manuals, Patryk S. Szewczyk
Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk S. Szewczyk, Nikki Robins, and Krishnun Sansurooah
A new species of neocauculus (acari: prostigmata: caeculidae) from Barrow Island, Western Australia, with a checklist of world cauculidae, Christopher Taylor, Nihara Gunawardene, and Adrianne C. Kinnear
Developing an explanatory model for the process of online radicalisation and terrorism, Robyn Torok
Mining climate data for shire level wheat yield predictions in Western Australia, Yunous Vagh
Changes to land tenure and pastoral lease ownership in Western Australia's central rangelands: Implications for co-operative, landscape-scale management, Eddie J. Van Etten
Antioxidant enzyme activity in salt tolerant selected clones of stylo 184 (Stylosanthes guianensis CIAT 184), an important forage legume, Varaporn Veraplakorn, Malee Nanakorn, Ian J. Bennett, Lily Kaveeta, and Srisom Suwanwong
Benchmarking web accessibility evaluation tools: Measuring the harm of sole reliance on automated tests, Markel Vigo, Justin A. Brown, and Vivienne L. Conway
Lichens as a biomonitoring tool for detecting heavy metal air pollution associated with industrial activities in Collie, south-western Australia, Meenu Chathurika Vitarana
Herbivory by Parma mccullochi (Pomacentridae) : its role as an ecosystem engineer in temperate algal-dominated reefs, Frederico Vitelli
The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook
An extreme climatic event alters marine ecosystem structure in a global biodiversity hotspot, Thomas Wernberg, D Smale, Fernando Tuya, Mads Thomsen, T Langlois, Thibaut De Bettignies, S Bennett, and C Rousseaux
Dynamically adjusting game-play in 2D platformers using procedural level generation, Daniel Wheat
Usefulness of infeasible solutions in evolutionary search: an empirical and mathematical study, Lyndon While and Philip Hingston
Creating context: Making sense of geo-location and social media data for health, Patricia A. Williams
Does the PCEHR mean a new paradigm for information security? Implications for health information management, Patricia A. Williams
Information security governance: A risk assessment approach to health information systems protection, Patricia A. Williams
It will never happen to us: The likelihood and impact of privacy breaches on health data in Australia, Patricia A. Williams and Emma Hossack
A conceptual framework for secure use of mobile health, Patricia A. Williams and Anthony Maeder
A rapidly moving target: Conformance with e-health standards for mobile computing, Patricia A. Williams and Vincent McCauley
Artificial intelligence and data mining: algorithms and applications, Jianhong Xia, Fuding Xie, Yong Zhang, and Craig Caulfield
Coastal bacterioplankton community dynamics in response to a natural disturbance, Sara K. Yeo, Megan J. Huggett, Alexander Eiler, and Michael Rappe
Submissions from 2012
Temporal variation in root penetration ability of wheat genotypes through thin wax layers in contrasting water regimes and in the field, T L Acuna, Xinhua He, and L J Wade
Scholarly use of E-books in a virtual academic environment: A Case Study, Pervaiz Ahmad and Mark Brogan
An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand
A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability, Symon Aked, Christopher Bolan, and Murray Brand
A revised UTAUT model to investigate E -health acceptance of health professionals in Africa, James Ami -Narh and Patricia Williams
A response strategy model for intrusion response systems, Nor B. Anuar, Maria Papadaki, Steven Furnell, and Nathan Clarke
Use of information and communication technology (ICT) tools by rural famers in Ratnagiri District of Maharashtra, India, Leisa Armstrong and N. Gandhi
Use of Information and Communication Technology (ICT) tools by rural farmers in Ratnagiri District of Maharastra, India, Leisa Armstrong, Niketa Gandhi, and K. Lanjekar
A Technical Guide to Designing and Implementing Effective Web Surveys, Gregory Baatard
A Technical Guide to Effective and Accessible Web Surveys, Gregory Baatard
Creating a counter-insurgency plan: Elements required based upon a comparative analysis of research findings, William Bailey
Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology, William Bailey and Robert Doleman
Using Monte Carlo Tree Search for Replanning in a Multistage Simultaneous Game, Daniel Beard, Philip Hingston, and Martin Masek
Population recovery of the New Zealand fur seal in Southern Australia: A molecular DNA analysis, O Berry, L C Spiller, Richard Campbell, Y Hitchen, and W J Kennington
Importance of Lake MacLeod, northwestern Australia, to shorebirds: a review and update, Demetrios Bertzeletos, Robert Davis, and Pierre Horwitz
Fire suppression and burnt sediments: effects on the water chemistry of fire-affected wetlands, David Blake, Hoa Lu, Pierre Horwitz, and Mary Boyce
WAMbot: Team MAGICian's entry to the Multi Autonomous Ground-robotic International Challenge 2010, Adrian Boeing, Mark Boulton, Thomas Braunl, Brian Frisch, Sam Lopes, Aidan Morgan, Frank Ophelders, Sushil Pangeni, Robert Reid, Kevin Vinsen, Nicolas Garel, Chang Su Lee, Martin Masek, Anthony Attwood, Michael Fazio, and Adam Gandossi
Real-Time Tactical Motion Planning and Obstacle Avoidance for Multi-Robot Cooperative Reconnaissance, Adrian Boeing, Sushil Pangeni, Thomas Braunl, and Chang Su Lee
A proposed formula for comparing kill password effectiveness in single password RFID systems, Christopher Bolan
Utilizing the RFID LOCK Command Against Multiple Targets, Christopher Bolan
In the shadow of the cloud - technology in the RIM workspace: RIMPA 2010 Technology Survey - Part 2, Mark Brogan and David Roberts
Corporate Security: Using knowledge construction to define a practising body of knowledge, David Brooks
Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities, David Brooks
Online Course Content Auditing: Templates and Practices, Justin Brown and Gregory Baatard
Web Accessibility in Corporate Australia: Perceptions versus Reality, Justin Brown and Vivienne Conway
The status of the critically endangered freshwater crayfi sh Engaewa pseudoreducta (Crustacea: Parastacidae) in south-western Australia, Quinton Burnham, Annette Koenders, and Pierre Horwitz
Urinary bisphenol A concentrations in pregnant women, Anna Callan, Andrea Hinwood, Amy Heffernan, Geoff Eaglesham, Jochen Mueller, and Jon Odland
Do eucalypt plantations provide habitat for native forest biodiversity?, Maria Calvino-Cancela, Margarita Rubido-Bará, and Eddie Van Etten
Dynamics of phreatophyte root growth relative to a seasonally fluctuating water table in a Mediterranean-type environment, Caroline Canham, Raymond Froend, William Stock, and Muriel Davies
Seeing through others' eyes : towards a hybrid ecology of marine turtle and dugong in Australia, Zoe Car
Shall we play a game? [journal article], Craig William Caulfield, Stanislaw Maj, J C Xia, and David Veal
Public Libraries : Celebrating Diversity, Rajeswari Chelliah, Justin A. Brown, and Barbara Combes
An improved APIT location algorithm for wireless sensor networks, WenHua Cheng, Jia Li, and Huaizhong Li
The impact of Black swan (Cygnus atratus) grazing on the seagrass Halophila ovalis in the Lower Swan River estuary, Gary Choney
Website Accessibility: a Comparative Analysis of Australian National and State/Territory Library Websites, Vivienne Conway, Justin Brown, Scott Hollier, and Cam Nicholl
User Reaction Towards End User License Agreements on Android Smartphones, Hamish Cotton and Christopher Bolan
Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct, Christopher Cubbage and David Brooks
The detection of abnormal events in activities of daily living using a Kinect sensor, Laurence Da Luz
Gut content and stable isotope analyses provide complementary understanding of ontogenetic dietary shifts and trophic relationships among fishes in a tropical river, Aaron Davis, Melanie Blanchette, Bradley Pusey, Tim Jardine, and Richard Pearson