Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
the diverse range of knowledge and skills of CaLD customers and employees. This project aims to use social identity theory and role theory to develop a comprehensive conceptual model for the process by which
-
These scholarships are funded by the Australian Research Council (3) and the University of Adelaide (1) to support 4 full-time PhD students who are undertaking research in the field of battery recycling: Project 1 (2 PhD students): Development and optimisation of DES battery recycling process -...
-
an ARC Discovery Project in conjunction with support from Curtin University. The purpose of the scholarship is to support a PhD student to carry out research in quantum collision theory. Currently
-
efficacy at reducing couples relationship distress through several recent meta-analyses (e.g., Yong et al., 2023; Elliott et al., 2021). The therapy was largely built on task analytic micro-theories
-
. Eligibility criteria We seek a highly motivated PhD student with the following qualifications: A bachelor's or master's degree in computing or mathematics with research experience. Proficiency in programming
-
the field of robotics the application must be able to demonstrate that you are from an under-represented minority group in the fields of science, technology, engineering or mathematics. This may include
-
, mechanical engineering, or intelligent systems, this PhD will allow you to merge theory with application in one of the most forward-looking areas of engineering today. Take the next step in your research
-
with ADHD. By applying recent advances in emotion regulation theory (Gross, 2015) and measurement (Preece et al., 2018) to the ADHD field, this project has the potential to significantly enhance
-
, the candidate should ideally possess the following skillset: A strong security background (in cryptography, mathematics, information security, or a related field) Previous industrial experience is not required
-
addition, the candidate should ideally possess the following skillset: A strong security background (in cryptography, mathematics, information security, or a related field) Previous industrial experience is