Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 68

Full-Text Articles in Entire DC Network

Gradient Descent Localization In Wireless Sensor Networks, Nuha A.S. Alwan, Zahir M. Hussain Oct 2017

Gradient Descent Localization In Wireless Sensor Networks, Nuha A.S. Alwan, Zahir M. Hussain

Research outputs 2014 to 2021

Meaningful information sharing between the sensors of a wireless sensor network (WSN) necessitates node localization, especially if the information to be shared is the location itself, such as in warehousing and information logistics. Trilateration and multilateration positioning methods can be employed in two-dimensional and threedimensional space respectively. These methods use distance measurements and analytically estimate the target location; they suffer from decreased accuracy and computational complexity especially in the three-dimensional case. Iterative optimization methods, such as gradient descent (GD), offer an attractive alternative and enable moving target tracking as well. This chapter focuses on positioning in three dimensions using time-of-arrival …


A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell Sep 2017

A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell

Research outputs 2014 to 2021

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, …


A Feature-Based Structural Measure: An Image Similarity Measure For Face Recognition, Noor A. Shnain, Zahir Hussain, Song F. Lu Aug 2017

A Feature-Based Structural Measure: An Image Similarity Measure For Face Recognition, Noor A. Shnain, Zahir Hussain, Song F. Lu

Research outputs 2014 to 2021

Facial recognition is one of the most challenging and interesting problems within the field of computer vision and pattern recognition. During the last few years, it has gained special attention due to its importance in relation to current issues such as security, surveillance systems and forensics analysis. Despite this high level of attention to facial recognition, the success is still limited by certain conditions; there is no method which gives reliable results in all situations. In this paper, we propose an efficient similarity index that resolves the shortcomings of the existing measures of feature and structural similarity. This measure, called …


A Compact, Flexible Fiber-Optic Surface Plasmon Resonance Sensor With Changeable Sensor Chips, David Michel, Feng Xiao, Kamal Alameh Jul 2017

A Compact, Flexible Fiber-Optic Surface Plasmon Resonance Sensor With Changeable Sensor Chips, David Michel, Feng Xiao, Kamal Alameh

Research outputs 2014 to 2021

We propose and demonstrate the concept of a novel compact, flexible fiber optic Surface Plasmon Resonance (SPR) sensor based on a double-pass Kretschmann-type configuration, where the SPR sensor chip can be replaced for various sensing applications. Simulation and experimental results demonstrate that the proposed fiber-optic SPR structure has a sensitivity to salt concentration of around 4.8 μW/ppt.


Plasmonic Nanomaterials For Optical Sensor And Energy Storage And Transfer, Xuanhua Li, Baofu Ding, Xingang Ren, Yongxing Zhang Jun 2017

Plasmonic Nanomaterials For Optical Sensor And Energy Storage And Transfer, Xuanhua Li, Baofu Ding, Xingang Ren, Yongxing Zhang

Research outputs 2014 to 2021

Nanomaterials including noble metal nanomaterials and some metal oxide nanomaterials exhibit very strong lightmatter interactions under resonant excitation. Very large absorption and scattering at the localized wavelengths can been achieved. Because of their attractive optical properties, optical NPs and nanostructures have been commonly used in various fields from nanophotonics, analytical chemistry, biotechnology, and information storage to energy applications including photovoltaics and photocatalysisphotocatalysis


Using Surface Regolith Geochemistry To Map The Major Crustal Blocks Of The Australian Continent, E. C. Grunsky, P. De Caritat, Ute A. Mueller Jun 2017

Using Surface Regolith Geochemistry To Map The Major Crustal Blocks Of The Australian Continent, E. C. Grunsky, P. De Caritat, Ute A. Mueller

Research outputs 2014 to 2021

Multi-element near-surface geochemistry from the National Geochemical Survey of Australia has been evaluated in the context of mapping the exposed to deeply buried major crustal blocks of the Australian continent. The major crustal blocks, interpreted from geophysical and geological data, reflect distinct tectonic domains comprised of early Archean to recent Cenozoic igneous, metamorphic and sedimentary rock assemblages. The geochemical data have been treated as compositional data to uniquely describe and characterize the geochemistry of the regolith overlying the major crustal blocks across Australia according to the following workflow: imputation of missing/censored data, log-ratio transformation, multivariate statistical analysis, multivariate geospatial (minimum/maximum …


A Global Synthesis Of Managing Groundwater Dependent Ecosystems Under Sustainable Groundwater Policy, Melissa M. Rohde, Raymond H. Froend, Jeanette Howard May 2017

A Global Synthesis Of Managing Groundwater Dependent Ecosystems Under Sustainable Groundwater Policy, Melissa M. Rohde, Raymond H. Froend, Jeanette Howard

Research outputs 2014 to 2021

Groundwater is a vital water supply worldwide for people and nature. However, species and ecosystems that depend on groundwater for some or all of their water needs, known as groundwater dependent ecosystems (GDEs), are increasingly becoming threatened worldwide due to growing human water demands. Over the past two decades, the protection and management of GDEs have been incorporated into several water management policy initiatives worldwide including jurisdictions within Australia, the European Union, South Africa, and the United States. Among these, Australia has implemented the most comprehensive framework to manage and protect GDEs through its water policy initiatives. Using a science-based …


Carbon Sequestration By Australian Tidal Marshes, Peter I. Macreadie, Q. R. Oliver, J. J. Kelleway, Oscar Serrano, P. E. Carnell, C. J. Ewers Lewis, T. B. Atwood, J. Sanderman, J. Baldock, R. M. Connolly, C. M. Duarte, Paul Lavery, A. Steven, C. E, Lovelock Mar 2017

Carbon Sequestration By Australian Tidal Marshes, Peter I. Macreadie, Q. R. Oliver, J. J. Kelleway, Oscar Serrano, P. E. Carnell, C. J. Ewers Lewis, T. B. Atwood, J. Sanderman, J. Baldock, R. M. Connolly, C. M. Duarte, Paul Lavery, A. Steven, C. E, Lovelock

Research outputs 2014 to 2021

Australia’s tidal marshes have suffered significant losses but their recently recognised importance in CO2 sequestration is creating opportunities for their protection and restoration. We compiled all available data on soil organic carbon (OC) storage in Australia’s tidal marshes (323 cores). OC stocks in the surface 1 m averaged 165.41 (SE 6.96) Mg OC ha − 1 (range 14 – 963 Mg OC ha − 1). The mean OC accumulation rate was 0.55 ± 0.02 Mg OC ha − 1 yr − 1. Geomorphology was the most important predictor of OC stocks, with fluvial sites having twice the stock of OC …


Seagrass Meadows Provide 3d Habitat For Reef Fish, Oscar Serrano, Eduard Serrano, Karina Inostroza, Paul S. Lavery, Miguel A. Mateo, Enric Ballesteros Feb 2017

Seagrass Meadows Provide 3d Habitat For Reef Fish, Oscar Serrano, Eduard Serrano, Karina Inostroza, Paul S. Lavery, Miguel A. Mateo, Enric Ballesteros

Research outputs 2014 to 2021

For large fishes, seagrass canopies typically provide a relatively flat habitat on seabeds, but seagrasses in the genus Posidonia can provide additional habitat complexity by forming organic-rich deposits known as mats. Erosional processes can scour channels through the mats, resulting in the formation of escarpments with caves. Here we report that reef fishes, such as groupers, inhabit the caves found within mat escarpments. The characteristics of the cavities are highly variable, ranging from small-elongated holes to deep caves with large entrances. The origin of these caves (biological and/or geological) is unknown, but it is possible that fish behavior enhance their …


Sediment Burial Stress Response, Bio-Indicators And Thresholds For A Tropical Multi-Species Seagrass Assemblage: Report Of Theme 5 - Project 5.5.2 Prepared For The Dredging Science Node, John Statton, Kathryn Mcmahon, Roisin Mccallum, Gary Kendrick, Paul Lavery Feb 2017

Sediment Burial Stress Response, Bio-Indicators And Thresholds For A Tropical Multi-Species Seagrass Assemblage: Report Of Theme 5 - Project 5.5.2 Prepared For The Dredging Science Node, John Statton, Kathryn Mcmahon, Roisin Mccallum, Gary Kendrick, Paul Lavery

Research outputs 2014 to 2021

Deterioration in water clarity by resuspension of dredged sediments is presumed to be a major mechanism by which dredging can impact seagrasses. This report presents findings from a controlled light experiment that aimed to determine the effects of low light stress on the growth of three seagrass species found in the northwest of Western Australia.

Aims

  • To determine the effects of sediment burial stress under dredge-simulated conditions on the growth and health of three seagrass species found in the northwest of Western Australia.
  • Provide guidance and protocols for the application of the research outputs (e.g. seagrass burial stress:response relationships, sub-lethal …


High Prevalence Of Toxigenic Clostridium Difficile In Public Space Lawns In Western Australia, Peter Moono, Su Chen Lim, Thomas V. Riley Feb 2017

High Prevalence Of Toxigenic Clostridium Difficile In Public Space Lawns In Western Australia, Peter Moono, Su Chen Lim, Thomas V. Riley

Research outputs 2014 to 2021

Clostridium difficile is a well-established hospital pathogen. Recently, it has been detected increasingly in patients without hospital contact. Given this rise in community associated infections with C. difficile, we hypothesized that the environment could play an important role in transmission of spores outside the hospital. Lawn samples (311) collected in public spaces in the metropolitan area of Perth, Western Australia, from February to June 2016 were cultured for C. difficile. C. difficile was isolated from the samples by direct and enrichment culture, and characterized by standard molecular methods using toxin gene PCR and ribotyping. The overall prevalence of …


A Six Thousand-Year Record Of Climate And Land-Use Change From Mediterranean Seagrass Mats, Lourdes Lopez-Merino, Nieves Colas-Ruiz, Maria Adame, Oscar Serrano, Antonio Cortizas, Miguel-Angel Mateo Jan 2017

A Six Thousand-Year Record Of Climate And Land-Use Change From Mediterranean Seagrass Mats, Lourdes Lopez-Merino, Nieves Colas-Ruiz, Maria Adame, Oscar Serrano, Antonio Cortizas, Miguel-Angel Mateo

Research outputs 2014 to 2021

The Mediterranean seagrass Posidonia oceanica maintains a biodiverse ecosystem and it is a world-wide important carbon sink. It grows for millennia, accumulating organic-rich soils (mats) beneath the meadows. This marine habitat is protected by the European Union; however, it is declining rapidly due to coastal development. Understanding its response to disturbances could inform habitat restoration, but many environmental impacts predate monitoring programs (years).
This research explores the palaeoecological potential of Posidonia mats to reconstruct six thousand years of environmental change that could have affected Posidonia meadows and, in turn, left an imprint on the mats.
Palynological, microcharcoal, magnetic susceptibility and …


A Sri Lankan Hacking Case Study, Ishan Senarathna, Matthew Warren Jan 2017

A Sri Lankan Hacking Case Study, Ishan Senarathna, Matthew Warren

Australian Information Security Management Conference

The aim of the paper is to consider how hacking could impact a country that had historically experienced major cyber-attacks. The aim of the paper is to explore a cyber incident that occurred against the Sri Lankan president and how Sri Lankan authorities reacted to the incident. The paper will focus upon the motivations of the attack, the impact of the attack and how Sri Lankan authorities reacted to the situation.


Evaluating Ip Surveillance Camera Vulnerabilities, Brian Cusack, Zhuang Tian Jan 2017

Evaluating Ip Surveillance Camera Vulnerabilities, Brian Cusack, Zhuang Tian

Australian Information Security Management Conference

Hacking of IP surveillance camera systems came to public attention in 2016 when the high bandwidth and resources were exploited for a massive DDoS attack that affected one third of all US Internet services. A review of previous studies show that a vast number of IP cameras have been hacked because the default usernames and passwords have not been changed from the factory defaults. In this research we asked, What are the vulnerabilities of an IP surveillance camera? The purpose of the study was to provide identification of vulnerabilities and guidance for the protection of surveillance camera systems. The research …


Neurosecurity For Brainware Devices, Brian Cusack, Kaushik Sundararajan, Reza Khaleghparast Jan 2017

Neurosecurity For Brainware Devices, Brian Cusack, Kaushik Sundararajan, Reza Khaleghparast

Australian Information Security Management Conference

Brainware has a long history of development down into the present day where very simple and usable devices are available to train for the control of games and services. One of the big areas of application has been in the health sciences to provide compensatory control to humans who may lack the usual capabilities. Our concern has been the protection of information in brainware so that a human intention may have confidentiality, integrity, and accessibility to the required implementation mechanisms for services. The research question was: What are the consequences of security failure in brainware? Our research tested a brainware …


The 2017 Homograph Browser Attack Mitigation Survey, Tyson Mcelroy, Peter Hannay, Greg Baatard Jan 2017

The 2017 Homograph Browser Attack Mitigation Survey, Tyson Mcelroy, Peter Hannay, Greg Baatard

Australian Information Security Management Conference

Since their inception, International Domain Names (IDN) have allowed for non-Latin characters to be entered into domain names. This feature has led to attackers forging malicious domains which appear identical to the Latin counterpart. This is achieved through using non-Latin characters which appear identical to their Latin counterpart. This attack is referred to as a Homograph attack. This research continues the work of Hannay and Bolan (2009), and Hannay and Baatard (2012), which assessed the mitigation methods incorporated by web browsers in mitigating IDN homograph attacks. Since these works, time IDN mitigation algorithms have been altered, such as the one …


Core Elements In Information Security Accountability In The Cloud, Zahir Al-Rashdi, Martin Dick, Ian Storey Jan 2017

Core Elements In Information Security Accountability In The Cloud, Zahir Al-Rashdi, Martin Dick, Ian Storey

Australian Information Security Management Conference

This paper proposes 9 core elements of information security accountability in the area of cloud computing. The core elements were determined via a series of 18 case studies with Omani government organisations that were actively using and/or providing cloud computing. 36 interviews were conducted and then analysed using a grounded theory methodology As a result of the analysis, responsibility, transparency, assurance, remediation, accountability support environment, flexible change process, collaboration, mechanisms and commitment to external criteria. The research also found that the emphasis on specific core elements is context-dependent and that there was considerable variation in emphasis amongst the case study …


The Convergence Of It And Ot In Critical Infrastructure, Glenn Murray, Michael N. Johnstone, Craig Valli Jan 2017

The Convergence Of It And Ot In Critical Infrastructure, Glenn Murray, Michael N. Johnstone, Craig Valli

Australian Information Security Management Conference

Automation and control systems, such as SCADA (Supervisory Control and Data Acquisition), DCS (Distributed Control Systems) and are often referred to as Operational Technology (OT). These systems are used to monitor and control critical infrastructures such as power, pipelines, water distribution, sewage systems and production control,). Traditionally, these OT systems have had a degree of physical separation from Information Technology (IT) infrastructures. With changing technologies and a drive towards data-driven and remote operations the two technology environments are starting to converge. With this convergence, what was a relatively standalone secure and isolated environment is now connected and accessible via the …


Security Readiness Evaluation Framework For Tonga E-Government Initiatives, Raymond Lutui, Semisi Hopoi, Siaosi Maeakafa Jan 2017

Security Readiness Evaluation Framework For Tonga E-Government Initiatives, Raymond Lutui, Semisi Hopoi, Siaosi Maeakafa

Australian Information Security Management Conference

The rapid expansion of the Information and Communication Technologies (ICTs) in the Pacific have reached the Kingdom of Tonga. The submarine fibre-optic cable which connects Tonga to Fiji and onward to a hub in Sydney went live 2013. Now the people of Tonga experience the high-speed impact of digital communication, fast international access, and social changes such as the government is implementing a digital society through e-government services. This study focuses on identifying the factors that will later become a vulnerability and a risk to the security of Tonga government e-government initiatives. Data was collected through interviews with three government …


Assessment Of Security Vulnerabilities In Wearable Devices, Brian Cusack, Bryce Antony, Gerard Ward, Shaunak Mody Jan 2017

Assessment Of Security Vulnerabilities In Wearable Devices, Brian Cusack, Bryce Antony, Gerard Ward, Shaunak Mody

Australian Information Security Management Conference

Wearable devices have proliferated in usage and human experience, and they provide convenience for personal information requirements. These devices are both sensory and immersive for the diverse global network that is generally termed the Internet of things (IoT). The immediacy of the two-way communication created in the IoT has made vulnerable human behaviour and raised debate around information ownership and privacy expectations. The legitimacy of ownership of information and its reuse are prevalent problems. In this research, we tested four wearable devices that share 44% of the current market, for security vulnerabilities. We found serious weaknesses that could result in …


Deceptive Security Based On Authentication Profiling, Andrew Nicholson, Helge Janicke, Andrew Jones, Adeeb Alnajaar Jan 2017

Deceptive Security Based On Authentication Profiling, Andrew Nicholson, Helge Janicke, Andrew Jones, Adeeb Alnajaar

Australian Information Security Management Conference

Passwords are broken. Multi-factor Authentication overcomes password insecurities, but its potentials are often not realised. This article presents InSight, a system to actively identify perpetrators by deceitful adaptation of the accessible system resources using Multi-factor Authentication profiles. This approach improves authentication reliability and attributes users by computing trust scores against profiles. Based on this score, certain functionality is locked, unlocked, buffered, or redirected to a deceptive honeypot, which is used for attribution. The novelty of this approach is twofold; a profile-based multi-factor authentication approach that is combined with a gradient, deceptive honeypot.


Building A Dataset For Image Steganography, Chris Woolley, Ahmed Ibrahim, Peter Hannay Jan 2017

Building A Dataset For Image Steganography, Chris Woolley, Ahmed Ibrahim, Peter Hannay

Australian Digital Forensics Conference

Image steganography and steganalysis techniques discussed in the literature rely on using a dataset(s)created based on cover images obtained from the public domain, through the acquisition of images from Internet sources, or manually. This issue often leads to challenges in validating, benchmarking, and reproducing reported techniques in a consistent manner. It is our view that the steganography/steganalysis research community would benefit from the availability of common datasets, thus promoting transparency and academic integrity. In this research, we have considered four aspects: image acquisition, pre-processing, steganographic techniques, and embedding rate in building a dataset for image steganography.


A Centralised Platform For Digital Forensic Investigations In Cloud-Based Environments, Shaunak Mody, Alastair Nisbet Jan 2017

A Centralised Platform For Digital Forensic Investigations In Cloud-Based Environments, Shaunak Mody, Alastair Nisbet

Australian Digital Forensics Conference

Forensic investigations of digital media traditionally involve seizing a device and performing a forensic investigation. Often legal and physical obstructions must be overcome so that the investigator has access to the device and the right to secure it for investigation purposes. Taking a forensic image of a hard disk may need to be done in the field but analysis can usually be performed at a later time. With the rapid increase in hard disk size, the acquiring of a forensic image can take hours or days. This poses significant issues for forensic investigators when potential evidence resides in the cloud. …


Proceedings Of The 15th Australian Digital Forensics Conference, 5-6 December 2017, Edith Cowan University, Perth, Australia, Craig Valli Jan 2017

Proceedings Of The 15th Australian Digital Forensics Conference, 5-6 December 2017, Edith Cowan University, Perth, Australia, Craig Valli

Australian Digital Forensics Conference

Conference Foreword This is the sixth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 8 papers were submitted and following a double blind peer review process, 5 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, …


A Comparison Of 2d And 3d Delaunay Triangulations For Fingerprint Authentication, Marcelo Jose Macedo, Wencheng Yang, Guanglou Zheng, Michael N. Johnstone Jan 2017

A Comparison Of 2d And 3d Delaunay Triangulations For Fingerprint Authentication, Marcelo Jose Macedo, Wencheng Yang, Guanglou Zheng, Michael N. Johnstone

Australian Information Security Management Conference

The two-dimensional (2D) Delaunay triangulation-based structure, i.e., Delaunay triangle, has been widely used in fingerprint authentication. However, we also notice the existence of three-dimensional (3D) Delaunay triangulation, which has not been extensively explored. Inspired by this, in this paper, the features of both 2D and 3D Delaunay triangulation-based structures are investigated and the findings show that a 3D Delaunay structure, e.g., Delaunay tetrahedron, can provide more feature types and a larger number of elements than a 2D Delaunay structure, which was expected to provide a higher discriminative capability. However, higher discrimination does not necessarily lead to better performance, especially in …


Literature-Based Analysis Of The Influences Of The New Forces On Isms: A Conceptual Framework, Zahir Al-Rashdi, Martin Dick, Ian Storey Jan 2017

Literature-Based Analysis Of The Influences Of The New Forces On Isms: A Conceptual Framework, Zahir Al-Rashdi, Martin Dick, Ian Storey

Australian Information Security Management Conference

This paper presents an analysis that arose from a comprehensive review of the academic and professional literature of two areas – information security management systems (ISMS) and information resources – and their relationship with information security. It analyzes the role of ISMS in protecting an organization’s information environment and infrastructure. It has identified four key areas that strongly influence the safety of information resources: cloud computing; social media/networking; mobility; and information management/big data. Commonly referred to as ‘new forces’, these four aspects are all growing exponentially and are not easily controlled by IT. Another key finding of the paper is …


Response And Recovery Of A Mixed Tropical Seagrass Assemblage To Variation In The Frequency And Magnitude Of Light Deprivation. Report Of Theme 5 - Project 5.5.3 Prepared For The Dredging Science Node, John Statton, Kathryn Mcmahon, Rosin Mccallum, Gary Kendrick, Paul Lavery Jan 2017

Response And Recovery Of A Mixed Tropical Seagrass Assemblage To Variation In The Frequency And Magnitude Of Light Deprivation. Report Of Theme 5 - Project 5.5.3 Prepared For The Dredging Science Node, John Statton, Kathryn Mcmahon, Rosin Mccallum, Gary Kendrick, Paul Lavery

Research outputs 2014 to 2021

The capacity of seagrasses to cope with episodes of light deprivation from overlying turbid waters may not only depend on the absolute quantity of light they receive during that episode, but also on how the light deprivation varies through time. For example, turbidity and therefore light reduction may be relatively constant over the episode or it may fluctuate depending on the frequency of pulsed turbidity events.

This report presents findings from a controlled mesocosm experiment that aimed to determine the responses of seagrasses to, and recovery from, differences in the pattern of the delivery of light. The study focussed on …


Iseek, A Tool For High Speed, Concurrent, Distributed Forensic Data Acquisition, Richard Adams, Graham Mann, Valerie Hobbs Jan 2017

Iseek, A Tool For High Speed, Concurrent, Distributed Forensic Data Acquisition, Richard Adams, Graham Mann, Valerie Hobbs

Australian Digital Forensics Conference

Electronic discovery (also written as e-discovery or eDiscovery) and digital forensics are processes in which electronic data is sought, located, secured, and processed with the expectation that it may be used as evidence in legal proceedings. Electronic evidence plays a fundamental role in many aspects of litigation (Stanfield, 2009). However, both eDiscovery and digital forensic approaches that rely on the creation of an index as part of their processing are struggling to cope with the huge increases in hard disk storage capacity. This paper introduces a novel technology that meets the existing and future data volume challenges faced by practitioners …


A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet Jan 2017

A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet

Australian Digital Forensics Conference

Spontaneous ad hoc networks are distinguished by rapid deployment for a specific purpose, with no forward planning or pre-design in their topology. Often these networks will spring up through necessity whenever a network is required urgently but briefly. This may be in a disaster recovery setting, military uses where often the network is unplanned but the devices are pre-installed with security settings, educational networks or networks created as a one-off for a meeting such as in a business organisation. Generally, wireless networks pose problems for forensic investigators because of the open nature of the medium, but if logging procedures and …


Muddy Waters: Unintentional Consequences Of Blue Carbon Research Obscure Our Understanding Of Organic Carbon Dynamics In Seagrass Ecosystems, E. Fay Belshe, Miguel-Angel Mateo, Lucy Gillis, Martin Zimmer, Mirta Teichberg Jan 2017

Muddy Waters: Unintentional Consequences Of Blue Carbon Research Obscure Our Understanding Of Organic Carbon Dynamics In Seagrass Ecosystems, E. Fay Belshe, Miguel-Angel Mateo, Lucy Gillis, Martin Zimmer, Mirta Teichberg

Research outputs 2014 to 2021

The recent surge in research on organic carbon sequestration by seagrass ecosystems has begun to reveal the complexity of the carbon cycle within these ecosystems. In this prospective we discuss two areas of investigation that require further scrutiny: (1) why organic carbon is stabilized in seagrass sediments, and (2) how long organic carbon resides within these sediments. By delving into these topics, pointing out current pitfalls, and highlighting methodological advances, our motive is to focus future efforts and provide a frame work to manage the complexity found within the diverse seagrass bioregions. The high rate of seagrass degradation and loss, …