Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
interests and educational background a CV your degree certificate or equivalent your English results, and other documents you wish to be considered (grade transcripts, contact information for your references
-
groups, and an awareness of security and ethical issues associated with working with health and sensitive data. A full list of selection criteria is available within the position description. About
-
Status: Closed Applications open: 1/07/2024 Applications close: 18/08/2024 View printable version [.pdf] About this scholarship Description/Applicant information Project Overview Energy security
-
Status: Closed Applications open: 1/07/2024 Applications close: 18/08/2024 View printable version [.pdf] About this scholarship Description/Applicant information Project Overview Historically
-
, criminology, statistics, or data science experience in managing and analysing large relational datasets in R, SPSS, Stata or similar software strong quantitative skills excellent communication skills, both
-
-biofouling of large scale surfaces used underwater. This Project combines expertise in the fabrication of nanomaterials, including magnetic nanostructures (Fe3O4, Fe3O4-Au core-satellites, etc.) using laser
-
analysing large-scale datasets such as StatsBomb, which provide detailed technical and tactical data across multiple leagues and seasons. By applying advanced analytical and machine learning techniques
-
Nations. We also pay respect to the wisdom of our Elders past and present. Quick links Degrees Library Maps Staff directory Canvas MyUni Online tools AskUON The Shop Information about Our Uni Strategic Plan
-
Status: Closed Applications open: 1/07/2024 Applications close: 18/08/2024 View printable version [.pdf] About this scholarship Description/Applicant information Project Overview About 12 billion
-
. This inspiring project involves: Advanced Persistent Threats (APTs) are sophisticated cyber-attacks against the government and large organisations' networks and systems. These attacks, enacted over a prolonged