Papers from 2008
Power quality survey factor analysis using multivariable linear regression (MVLR), Chandana Herath, Victor J. Gosbell, Sarath Perera, and David A. Stirling
Evaluation of human gait through observing body movements, Amir S. Hesami, Fazel Naghdy, David A. Stirling, and Harold C. Hill
Perception of human gestures through observing body movements, Amir S. Hesami, Fazel Naghdy, David A. Stirling, and Harold C. Hill
Application of fuzzy NARX to human gait modelling and identification, Seyed Hesami, Fazel Naghdy, David A. Stirling, and Harold C. Hill
Encapsulation of the Anticancer Drug Cisplatin into Nanotubes, T. A. Hilder and James M. Hill
Carbon nanotubes as drug delivery nanocapsules, Tamsyn Hilder and James M. Hill
A continuous model for the joining of two fullerenes, James M. Hill, Duangkamon Baowan, and Barry J. Cox
Coulomb-Mohr granular materials: Quasi-static flows and the highly frictional limit, James M. Hill, Grant M. Cox, Ngamta Thamwattana, and Scott McCue
Lie group symmetry analysis of transport in porous media with variable transmissivity, James M. Hill, Maureen P. Edwards, and A P S Selvadurai
Theoretical comparison of nanotube materials for drug delivery, James M. Hill and Tamsyn A. Hilder
Mechanics of fullerene-carbon nanotube bundle oscillators, James M. Hill, Ngamta Thamwattana, Duangkamon Baowan, and Barry J. Cox
Continuum modelling of gigahertz nano-oscillators, James M. Hill, Ngamta Thamwattana, Duangkamon Baowan, Tamsyn A. Hilder, and Barry J. Cox
Spherical and spheroidal fullerenes entering carbon nanotubes, James M. Hill, Ngamta Thamwattana, and Barry J. Cox
Productivity and sustainability of a spring wheat-field pea rotation in a semi-arid environment under conventional and conservation tillage systems, G B. Huang, R Z. Zhang, G D. Li, L L. Li, K Y. Chan, D P. Heenan, W Chen, M J. Unkovish, M J. Roberston, Brian R. Cullis, and W D. Belloti
A five-round algebraic property of the advanced encryption standard, Jianyong Huang, Jennifer Seberry, and Willy Susilo
Ambiguous optimistic fair exchange, Qiong Huang, Guomin Yang, Duncan S. Wang, and Willy Susilo
Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles, Qiong Huang, Guomin Yang, Duncan S. Wang, and Willy Susilo
Making carrier frequency offset an advantage for orthogonal frequency division multiplexing, Xiaojing Huang
Multipath diversity of precoded OFDM with linear equalization, Xiaojing Huang
Higher order parallel concatenated spreading matrices OFDM, Xiaojing Huang and Ibrahim Raad
Secure universal designated verifier signature without random oracles, Xinyi Huang, Willy Susilo, Yi Mu, and Wei Wu
Short designated verifier signature scheme and its identity-based variant, Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang
Barriers to using ICT in mathematics teaching: issues in methodology, Rebecca Hudson, Anne L. Porter, and Mark I. Nelson
Study on Generalized Analysis Model for Fringe Pattern Profilometry, Y. Hu, Jiangtao Xi, Z. Yang, Enbang Li, and Joe F. Chicharo
Amal Graafstra- The Do-It-Yourselfer RFID Implantee: The culture, values and ethics of hobbyist implantees: a case study, R. Ip, Katina Michael, and M G. Michael
The social implications of humancentric chip implants: a scenario - ‘Thy chipdom come, thy will be done’, Rodney Ip, Katina Michael, and M G. Michael
Supporting a seamless map in peer-to-peer system for massively multiplayer online role playing games, Xinbo Jiang and Farzad Safaei
Proper actions, fixed-point algebras and naturality in nonabelian duality, S. Kaliszewski, John Quigg, and Iain F. Raeburn
Developing ontology revision framework: A case study on the use of the coherence theory for semantic shopping mall, Seung Hwan Kang and Sim Kim Lau
A scalable lightweight distributed crawler for crawling with limited resources, Milly W. Kc, Markus Hagenbuchner, and Ah Chung Tsoi
Quality information retrieval for the World Wide Web, Milly W. Kc, Markus Hagenbuchner, and Ah Chung Tsoi
In pursuit of a sustainable supply chain: insights from Westpac Banking Corporation, Byron Keating, Ali Quazi, Anton Kriz, and Tim Coltman
Managing ethics in the tourism supply chain: the case of Chinese travel to Australia, Byron W. Keating
Outbound Tourism From China: Literature Review and Research Agenda, Byron W. Keating and A. Kriz
In pursuit of a sustainable supply chain: Insights from Westpac Banking Corporation, Byron W. Keating, A. Quazi, A. Kriz, and T. Coltman
Using a novel variable block size image compression algorithm for hiding secret data, F. Keissarian
Adaptive independence samplers, Jonathan M. Keith, Dirk P. Kroese, and Georgy Sofronov
Network Structure, Position, Ties and ICT Use in Distributed Knowledge-Intensive Work, Kon Shing Kenneth Chung and Liaquat Hossain
A Spatially Aware RFID-Enhanced Wireless Sensor Network, Dheeraj Klair, Kwan-Wu Chin, Raad Raad, and Darryn Lowe
Voltage unbalance emission limits for installations: general guidelines and system specific considerations, Robert Koch, Alexander Baitch, Sarath Perera, and Prabodha Paranavithana
Towards an Enterprise Business Process Architecture standard, George Koliadis, Aditya K. Ghose, and Srinivas Padmanabhuni
ICT education issues and challenges in Australia and the UK, Anthony J. Koppi, Fazel Naghdy, and Joe F. Chicharo
Issues in Australian ICT education, Tony J. Koppi, Fazel Naghdy, and Joe F. Chicharo
The crisis in ICT education: an academic perspective, Tony J. Koppi, Fazel Naghdy, Joe F. Chicharo, Judy Sheard, Sylvia Edwards, and David Wilson
New orthogonal designs from weighing matrices, Ilias Kotsireas, Christos Koukouvinos, and Jennifer Seberry
Requirements elicitation using goal-based organizational model, Aneesh Krishna and He Lu
C*-algebras associated to coverings of k-graphs, Alexander Kumjian, David A. Pask, and Aidan Sims
Advanced location-based services, Miguel A. Labrador, Katina Michael, and Axel Kuepper
East coast mainline rail track: options for 2014, Philip G. Laird
Branch and Bound Algorithms to Solve Semiring Constraint Satisfaction Problems, Louise Leenen and Aditya K. Ghose
Evaluation of perennial pasture legumes and herbs to identify species with high herbage production and persistence in mixed farming zones in southern Australia, G. D. Li, G. M. Lodge, G. A. Moore, A. D. Craig, B. S. Dear, S. P. Boschma, T. O. Albertsen, S. M. Miller, S. Harden, R. C. Hayes, S. J. Hughes, R. Snowball, A B. Smith, and Brian R. Cullis
Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme, Jiguo Li, Xinyi Huang, Yi Mu, and Wei Wu
The security and improvement of an ultra-lightweight RFID authentication protocol, Tieyan Li, Robert Deng, and Guilin Wang
Security analysis on a family of ultra-lightweight RFID authentication protocols, Tieyan Li, Guilin Wang, and Robert Deng
The analysis of stratified multiple responses, Ivy Liu and Thomas F. Suesse
Certificate-based signature schemes without pairings or random oracles, Joseph K. Liu, Joonsang Baek, Willy Susilo, and Jianying Zhou
Hierarchical Identity-Based Online/Offline Encryption, Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, and Fuchun Guo
The HCM for perceptual image segmentation, Wanqing Li, Ling Guan, Jonathon Randall, and Xing Zhang
Expandable data-driven graphical modeling of human actions based on salient postures, Wanqing Li, Zhengyou Zhang, and Zicheng Liu
Graphical modeling and decoding of human actions, Wanqing Li, Zhengyou Zhang, and Zicheng Liu
Identify and extract delta of materialized view with limited collaborations, Z. Lu and Janusz R. Getta
Abnormal behavior detection using a multi-modal stochastic learning approach, Philippa M. Lyons-Wall, Abdesselam Bouzerdoum, Son Lam Phung, and Azeddine Beghdadi
Barriers to e-Commerce adoption in SMEs: a comparison of the perception of barriers in a developed and a developing country, Robert Macgregor and Mira Kartiwi
A profile of Australian regional SME non-adopters of E-commerce, Robert Macgregor and Lejla Vrazalic
Kinetic analysis of oleic acid esterification using lipolytic enzyme as catalyst, Mohd S. Mahmud, James W. Ryan, Cyrus Cooper, Tomasz Safinski, Mark I. Nelson, Harvinder S. Sidhu, and Soji A. Adesina
Undular bores and the initial-boundary value problem for the modified Korteweg-de Vries equation, Timothy R. Marchant
Nonlocal validity of an asymptotic one-dimensional nematicon solution, Timothy R. Marchant and Noel Smyth
Helices for mathematical modelling of proteins, nucleic acids and polymers, James A. McCoy
Acoustic Flow, Phillip J. McKerrow
A software architecture for mobile robot navigation, Phillip J. McKerrow and Sherine M. Antoun
Identifying and distinguishing various varieties of abelian topological groups, Carolyn E. McPhail and Sidney A. Morris
Varieties of abelian topological groups and scattered spaces, Carolyn E. McPhail and Sidney A. Morris
Head-pose tracking with a time-of-flight camera, Simon Meers and Koren Ward
Simple, robust and accurate head-pose tracking using a single camera, S. Meers, Koren Ward, and I. Piper
Application of Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB, Alfred Mertins and Le Chung Tran
Social and Organizational Aspects of Information Security Management, Katina Michael
Editorial: What is evidence-based policy (EBP)?, Katina Michael and M G. Michael
Schengen Information System II: The balance between civil liberties, security and justice, Katina Michael and M G. Michael
Microchip implants for humans as unique identifiers: a case study on VeriChip, Katina Michael, M G. Michael, and Rodney Ip
Policy implications of convergence in the new security environment: An investigation into the symbiosis between risk management and intelligence, K. Michael and M. Loves
Schengen Information System II: The balance between civil liberties, security and justice, K. Michael and M. G. Michael
A research note on ethics in the emerging age of Überveillance, M. G. Michael, Sarah Jean Fusco, and Katina Michael
Überveillance: 24/7 x 365 People Tracking & Monitoring, MG. Michael and K. Michael
National security and the misology-misanthropy paradox of technology, George M. Mickhail
Location Constraints in Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, and Martin Jan Surminen
Strong shift equivalence of C*correspondences, Paul Muhly, David A. Pask, and Mark Tomforde
Identity-based online/offline encryption, Yi Mu, Zhide Chen, and Fuchun Guo
Multi-Identity Management for Identity-Based Cryptography, Yi Mu, Zhide Chen, and Fuchun Guo
Concurrent signatures without a conventional keystone, Yi Mu, Duncan S. Wang, Liqun Chen, Willy Susilo, and Qianhong Wu
Methods for estimating special variations in rotating panel surveys, Mohammad-Reza Namazi-Rad
Modelling of Hydraulic Governor-Turbine for Control Stabilisation, Michael Negnevitsky, Kashem Muttaqi, and Yin Chin Choo
Efficient modular arithmetic in adapted modular number system using lagrange representation, Christophe Negre and Thomas Plantard
Reducing the emission of pollutants in industrial wastewater through the use of membrane bioreactors, Mark Nelson, Xiao Dong Chen, and Harvinder Sidhu
Autoignition of hydrocarbons in a batch reactor: Analysis of a reduced model, Mark I. Nelson and E Balakrishnan
A fundamental analysis of continuous flow bioreactor models and membrane reactor models to process industrial wastewaters, Mark I. Nelson, Xiao Dong Chen, Easwaran Balakrishnan, and Harvinder S. Sidhu
A fundamental analysis of continuous flow bioreactor and membrane reactor models with death and maintenance included, Mark Nelson, Tara Kerr, and Xiao Dong Chen
An operational model for a well-stirred membrane bioreactor: reactor performance analysis, Mark Nelson, Harvinder Sidhu, and Soji Adesina
The passage of food through animal stomachs: a chemical reactor engineering approach, Mark Nelson, Harvinder S. Sidhu, and Xiao Dong Chen
RFID privacy models revisited, Ching Yu Ng, Willy Susilo, Yi Mu, and Reihaneh Safavi-Naini
A supervised learning approach for imbalanced data sets, Giang H. Nguyen, Abdesselam Bouzerdoum, and Son Lam Phung