Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Arts and Literature
- Law
- Linguistics
- Education
- Materials Science
- Science
- Humanities
- Biology
- Philosophy
- Mathematics
- Environment
- Chemistry
- Design
- Psychology
- Sports and Recreation
- Earth Sciences
- Electrical Engineering
- Social Sciences
- 13 more »
- « less
-
students who list Monash University as a VTAC course preference will be automatically assessed. This scholarship cannot be deferred Every scholarship may have a different application process – or none at all
-
this scholarship: You must maintain a Weighted Average Mark (WAM) of 60 each semester. How to apply This scholarship cannot be deferred. Every scholarship may have a different application process – or none at all
-
classification'', Computer Journal, Vol 11, No 2, August 1968, pp 185-194 Wallace, C.S. and D.L. Dowe (1999a). Minimum Message Length and Kolmogorov Complexity, Computer Journal (special issue on Kolmogorov
-
include: 1. Identify a novel co-design methodology along with the structural templates that could be used to drive the further design process of collocated teamwork analytics with critical educational
-
" "Machine-learning-based imaging processing" webpage For further details or alternative opportunities, please contact: haoran.ren@monash.edu.
-
I offer projects broadly related to supernova explosions and the final stages in the lives of massive stars. Specific topics of interest include fluid dynamics processes in stellar explosions and
-
. Eligible students will be invited to an interview. Final selection will be determined by a two stage interview process with industry partners. To retain this scholarship: To retain this scholarship you must
-
Epilepsyecosystem.org as a way to bring researchers, code and data together from all over the world to help solve the problem of seizure prediction. Required knowledge Machine learning, AI, signal processing, dynamical
-
explore unconventional ideas, develop computer algorithms for data analysis, create new experimental approaches, and apply the technique in areas like biomedicine, materials science, and geology. My group
-
Privacy-Enhancing Technologies (PETs) are a set of cryptographic tools that allow information processing in a privacy-respecting manner. As an example, imagine we have a user, say Alice, who wants