Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
the selection process for the Integrated PhD program. Information about the application process for the Integrated PhD program is provided here Shortlisted applicants will be invited to attend a 30-minute
-
for computational analysis. This learning analytics project will be conducted in the context of simulation-based healthcare education, and it will support the development of effective strategies to improve teamwork
-
enrolled in the Bachelor of Biomedical Science (Scholar Program) Course. Applications No application required Total scholarship value Up to $9,000 Number offered Variable See details Bachelor of Biomedical
-
crucial stage of the research process. In brief, evaluating a visualisation technique requires engaging human participants in using the technique, observing how they use it, and determining whether it is
-
per annum paid towards your course fees. Applications No application required Total scholarship value Up to $12,000 Number offered Varies (Depending on funding) See details Bachelor of Computer Science
-
Baccalaureate student. Commencing one of the following scholars programs at a Monash campus in Australia: Bachelor of Pharmaceutical Science (Advanced) Honours Scholars Program Bachelor of Pharmacy (Honours
-
project will combine data science and artificial intelligence expertise from the Faculty of Information Technology with gravitational-wave astrophysics expertise from the School of Physics and Astronomy in
-
representation from traditional software, the existing development lifecycle can not fully suit the characteristics of DL systems. This project, from the engineering perspective, aims to explore a better
-
the Faculty of Medicine, Nursing and Health Sciences, to access a Monash education Applications Not offered in 2025 Total scholarship value Up to $30,000 Number offered One at any time See details Madeline May
-
this goal, we expect to deeply and comprehensively explore the following directions: 1) Investigate privacy-enhancing techniques (e.g., differential privacy and/or secure multi-party computation) and design