Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
only if sociotechnical systems are appropriately designed. “Command and Control” (C2) is the process taken by organisations and teams to achieve shared goals, and the C2 system is the underpinning
-
to integrate floating offshore wind turbines and wave energy converters to capture wind and wave energy. The hybrid system’s dynamic responses will be investigated and advanced vibration control technologies
-
Status: Open Applications open: 30/10/2024 Applications accepted at any time View printable version [.pdf] About this scholarship Description/Applicant information Applications are open for the 2024 HDR Scholarship in flow assurance and corrosion mitigation at Curtin Corrosion Centre. Curtin...
-
in control systems and fluid-structure interaction. The students will be supervised by Prof Khac Duc Do and the co-CIs of the project. Student type Future Students Faculties and centres Faculty
-
, DynamoDB). Strong grasp of software engineering best practices, including design patterns, testing, security, and maintainability. Familiarity with Agile methodologies, CI/CD pipelines, and of source control
-
hazards, support security, and promote a safe environment. Support major events and emergencies with traffic control, cordons, and area management. We are looking for someone with: A genuine commitment to
-
monitor implementation plans. Work with the relevant areas to review their functions and identify their risks and controls and recommend risk management and improvement opportunities. Identification
-
working on backend systems. Familiarity with version control tools and workflows (e.g. Github). Comfortable working with Linux-based environments. Strong interpersonal and communication skills with
-
environments, taking into consideration new work arrangements (e.g., gig work and remote work) and technology (e.g., remote control, algorithmic management). The dominance of AT has contributed to an over
-
remediation. Support vulnerability assessments and recommend mitigation strategies. Operate and maintain IT security controls. Investigate and report on suspected policy breaches. Contribute to the development