Sort by
Refine Your Search
-
Listed
-
Field
-
neurophysiological variable estimation framework we have been developing that can be applied to all kinds of brain activity recordings. There are two projects to be completed under this program and we are looking
-
temporal data. See my time series research for more details of the research program on which this research will build. Required knowledge A solid grounding in machine learning Project funding Project based
-
The United Nations Development Programme has identified access to information as an essential element to support poverty eradication. People living in poverty are often unable to access information
-
. Benefits 100% course fees paid until the minimum number of points for your degree are completed (excludes OSHC, accommodation and living costs). Participation in the Monash Global Ambassadors program from
-
diverse learning experience within the JD program. Applications See below Total scholarship value Tuition fees paid Number offered Variable See details Dylan Thomas Glatz Monash Juris Doctor Law Dean's
-
material in a format other than ordinary print (i.e. large print, audio-type) communication in other than oral mode (i.e. written, interpreter, computer with voice synthesizer) Applications closes 31 March
-
Antimicrobial resistance (AMR) is one of the most significant and immediate threats to health in Australia and globally. We are working on harnessing new technologies such as artificial intelligence and next-generation sequencing and to improve the diagnosis, treatment and prevention of AMR...
-
of the Association for Computational Linguistics - Human Language Technologies (NAACL-HLT), 2019. [2] Contextual Neural Model for Translating Bilingual Multi-Speaker Conversations Sameen Maruf, Andre Martins
-
student enrolled or intending to enrol full-time in a single or double Bachelor of Computer Science or Bachelor of Information Technology degree at a Monash campus in Australia. From one or more of Monash
-
this goal, we expect to deeply and comprehensively explore the following directions: 1) Investigate privacy-enhancing techniques (e.g., differential privacy and/or secure multi-party computation) and design