199 structural-engineering-"https:"-"https:"-"https:"-"https:"-"https:"-"Kiel-University" positions at Monash University
Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
on this technology for its automated warehouses and fulfilment centres. The aim of this project is to use discrete optimisation techniques (e.g. Integer Programming) to design new algorithms for MAPF. An example
-
beyond the visual to other senses (haptic, aural) and sensibilities. Research may turn its investigative focus to immersive design, inclusive design, multimodality and assistive technology application
-
Contemporary filmmakers and visual artists alike are embracing the potential of immersive digital technology – such as Augmented and Virtual Reality – to tell stories in powerful, new and affective
-
with generous top-up scholarships. We're looking for talented students with a background in mathematics, computer science, statistics, economics, engineering or other related fields. These positions
-
you to build on your passion, gain exposure, and contribute to the energy community. You will work with supervisors from the engineering , information technology , and business & economics faculties
-
assistance to disadvantaged students seeking to complete a Monash undergraduate Engineering degree. Applications Not awarded in 2025 Total scholarship value Up to $32,000 Number offered One See details Richard
-
Recent advances in technology mean we can now reappraise the exploration of the past as a future-aligned endeavour. The definition of the ‘past’ here is broad; the reconstruction of a bygone world
-
quantum computing technology. This project investigates the design, analysis and efficient implementation of alternative `quantum-resistant' public-key cryptosystems and protocols, focusing
-
including substantial research project, GPA 80%+ in Software Engineering or related area Bachelor with Honours or Masters by research degree in a related area. Desirable Refereed publications including
-
today will no longer provide security in the presence of such technology. Therefore, cryptography based on “Post-Quantum” (PQ) techniques (that resists attacks by quantum computers) is a central goal for