Sort by
Refine Your Search
-
Listed
-
Field
-
following criteria: Must be enrolled to commence in, or hold an offer for one of the 3 listed IT single degree courses: Bachelor of Information Technology (C2000) Bachelor of Computer Science (C2001) Bachelor
-
As humans we have the ability, and even the necessity of distinguishing between orders that are ethical, safe and necessary and orders that may be harmful or unethical. Theoretically this ability should exist in robots. To coin Assimov’s second law “A robot must obey orders given by human beings...
-
Problem: Almost 1 million people in Australia suffer from a long-term skin condition. Without early intervention, skin conditions become chronic conditions with significant health, psychosocial and economic impacts, including anxiety, depression and social isolation. Access...
-
. Digital Creativity 27(1) McCormack J. (2017) Niche Constructing Drawing Robots. In: Correia J., Ciesielski V., Liapis A. (eds) Computational Intelligence in Music, Sound, Art and Design. EvoMUSART 2017
-
This project is technical in nature and would suit a candidate with a background and interest in #Java programming, health informatics or health data (or a combination thereof). The primary aim
-
Many machine learning (ML) approaches have been applied to biomedical data but without substantial applications due to the poor interpretability of models. Although ML approaches have shown promising results in building prediction models, they are typically data-centric, lack context, and work...
-
Skip to main content Main Menu - Primary Home Projects Supervisors Expression of Interest Contact Faithful and Salient Multimodal Data-to-Text Generation Primary supervisor Teresa Wang Co-supervisors Yuan-Fang Li Derry Wijaya Mohammed Eunus Ali Research area Vision and Language While large...
-
an electrical and computer systems engineering degree in the Faculty of Engineering. Total scholarship value $20,000 Number offered One at any time See details Farrell Raharjo Clive Weeks Community Leadership
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This
-
Cybersecurity is regarded as a high priority for governments and individuals today. With the practical realization of quantum computers just around the corner, classical cryptographic schemes in use