Sort by
Refine Your Search
-
Listed
-
Program
-
Employer
-
Field
-
Malawi. Through a mixed-methods research design-combining household surveys, focus group discussions, key informant interviews, and on-farm agronomic trials-the project aims to deliver scalable solutions
-
Marine) funded project entitled “Detect PNP: Detecting plant nursery pathogens using HTS technology”. The project aims to provide methods for the detection of pathogens in plant nurseries using high
-
Post Summary The Complex Software Lab at Trinity College Dublin seeks a Postdoctoral Researcher for the Sign-2-Me translational project, funded under the SFI ARC Hub programme. The project aims
-
including prison officers, psychologists, and others. The post-doctoral researcher will be an integral part of a mixed methods two-year study with a Research Team led by Principal Investigator, Dr Joe Garrihy
-
integrating large complex datasets is likewise essential as is training in Bayesian sample assessment methods. The post is based in UCC and requires the successful candidate to work closely and in person with
-
Hospital. This role requires excellent communication and interpersonal skills, computer literacy, organisation and an awareness of time management. The Research Assistant is required to manage data in
-
cancers and inflammatory conditions. The research project is supported by a Research Ireland-funded Frontiers for the Future Award programme. We are seeking highly motivated candidates with a PhD and
-
creative activities on flourishing in older adults. This project, funded by the Creative Ireland Programme, builds on a successful partnership examining how engagement in the arts supports health and
-
/particulates. The project relies heavily on advanced microscopy, particularly confocal scanning laser microscopy (CSLM). This is a five year research programme and is based in the UCD School of Chemical and
-
) domain-oriented cyber ranges for training and exercises, incorporating sophisticated methods and techniques for simulation of users, analysis of the performance of the cyber operators, and scoring cyber