Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
This project is technical in nature and would suit a candidate with a background and interest in #Java programming, health informatics or health data (or a combination thereof). The primary aim
-
D.L. Dowe (1994b), Intrinsic classification by MML - the Snob program. Proc. 7th Australian Joint Conf. on Artificial Intelligence, UNE, Armidale, Australia, November 1994, pp37-44 Wallace, C.S. and D.L
-
analytical imaging methods, then working with collaborators to apply these methods to biomedical research, diagnostic imaging and beyond. Research projects vary from purely theoretical, to computational
-
possess translational symmetry, the role of structure and symmetry in glasses is not established. This research programme involves the development of new x-ray and electron diffraction-based methods
-
I supervise computational projects in electron microscopy imaging for investigating materials at atomic resolution. Some projects centre on analysing experimental data acquired by experimental
-
an electrical and computer systems engineering degree in the Faculty of Engineering. Total scholarship value $20,000 Number offered One at any time See details Farrell Raharjo Clive Weeks Community Leadership
-
Many machine learning (ML) approaches have been applied to biomedical data but without substantial applications due to the poor interpretability of models. Although ML approaches have shown promising results in building prediction models, they are typically data-centric, lack context, and work...
-
, Authorship and Intention in Computer Generated Art. In: Ekárt A., Liapis A., Castro Pena M. (eds) Computational Intelligence in Music, Sound, Art and Design. EvoMUSART 2019. Lecture Notes in Computer
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This
-
Cybersecurity is regarded as a high priority for governments and individuals today. With the practical realization of quantum computers just around the corner, classical cryptographic schemes in use