Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Engineering
- Economics
- Linguistics
- Humanities
- Biology
- Science
- Business
- Law
- Mathematics
- Philosophy
- Arts and Literature
- Materials Science
- Psychology
- Sports and Recreation
- Chemistry
- Earth Sciences
- Education
- Electrical Engineering
- Social Sciences
- Design
- Environment
- 13 more »
- « less
-
result of my scholarship, I have been able to purchase a new computer to assist in my studies. This improved my capacity to focus on my studies and achieve my academic goals. Law has been a dream of mine
-
Senior Advisor, Quality and Projects Job No.: 680000 Location: Clayton campus Employment Type: Full-time Duration: Continuing appointment Remuneration: $140,157 - $148,769 pa HEW Level 09 (plus 17% employer superannuation) Amplify your impact at a world top 50 University Join our inclusive,...
-
of Computer Science in Data Science (Honours) Anban Raj Thank you will never suffice to express my gratitude to the Ng Family for believing in my potential and enabling me to access a world-class education. I will
-
the Humanities and Social Sciences (HASS) disciplines. one in the Science, Technology, Engineering and Mathematics (STEM) disciplines. Selection criteria Monash scholarships are highly competitive and are awarded
-
J K Ellis Scholarship Industry Leaders Scholarship This scholarship has been generously supported by Jerry Ellis and his wife Ann. It is intended to support an Engineering undergraduate student
-
, augmented virtual reality, voice assistance, and medical diagnosis. This new paradigm is further accelerated by AI chips and ASICs embedded on mobile devices, e.g., Apple’s Bionic neural engine. Compared
-
intending to enrol in the Bachelor of Music (and Double Degrees) with a specialisation in any stream (Classical Music Performance, Composition and Music Technology, Jazz and Improvisation Performance, Popular
-
In recent years, the rise in cybercrimes has significantly increased the vulnerability of the open internet to various threats and cyber-attacks. Among these, phishing stands out as one of the most perilous crimes worldwide. In a phishing attack, perpetrators create fraudulent websites that...
-
This project focuses on developing algorithms capable of automatically identifying and categorizing mobile ringtones. This involves leveraging machine learning techniques to analyze audio signals from mobile devices and classify them into different categories or types of ringtones. The...
-
aims to explore who takes physics and astrophysics major units, why they pursue them, and what obstacles they may face. There are a number of research questions under this umbrella. Computational