438 engineering-computation-"https:"-"https:"-"https:"-"https:"-"https:"-"BioData"-"BioData" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Digital versions of technical documents, like textbooks and academic papers, are usually produced as static PDF files. Research has shown that working with these on electronic devices is frustrating and inefficient, partly because people do not read such documents in a linear fashion as they do...
-
completion); Applied for admission to a PhD program at an Australian university or be a student enrolled in their first 12 months of study in a PhD program at an Australian University; A university supervisor
-
result of my scholarship, I have been able to purchase a new computer to assist in my studies. This improved my capacity to focus on my studies and achieve my academic goals. Law has been a dream of mine
-
. Leveraging techniques such as federated learning, differential privacy, and secure multiparty computation, the goal is to enable collaborative ML tasks without compromising the privacy of individual data
-
Bachelor of Occupational Therapy (Honours) The Betty Amsden program helped me gain clarity about my career pathway and increase my confidence. I think these were strong contributing factors to excelling in
-
an undergraduate degree in STEMM (Engineering, Science, IT, FMNHS) at a Monash campus in Australia. ATAR 85+ for Indigenous. Are an Indigenous Australian ** **To be eligible you must provide a Confirmation of
-
the different actors' beliefs and intentions. We will study the properties of such explanations, present algorithms for automatically computing them as well as extensions to existing frameworks and evaluate
-
largely opaque to computational analysis, into a transparent phenomenon from which selected features can be captured and rendered visible for the purposes of professional development for teachers. Depending
-
In recent years, the rise in cybercrimes has significantly increased the vulnerability of the open internet to various threats and cyber-attacks. Among these, phishing stands out as one of the most perilous crimes worldwide. In a phishing attack, perpetrators create fraudulent websites that...
-
This project focuses on developing algorithms capable of automatically identifying and categorizing mobile ringtones. This involves leveraging machine learning techniques to analyze audio signals from mobile devices and classify them into different categories or types of ringtones. The...