1,938 machine-learning-"https:"-"https:"-"https:"-"https:"-"https:"-"SUNY" positions at Duke University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
or military status. Duke aspires to create a community built on collaboration, innovation, creativity, and belonging. Our collective success depends on the robust exchange of ideas—an exchange that is best when
-
related conditions), sexual orientation or military status. Duke aspires to create a community built on collaboration, innovation, creativity, and belonging. Our collective success depends on the robust
-
conditions), sexual orientation or military status. Duke aspires to create a community built on collaboration, innovation, creativity, and belonging. Our collective success depends on the robust exchange of
-
organization. Ability to record activities, document assessments, plan of care, interventions, evaluation and re-evaluation of patient status. Ability to use computer and learn new software programs. Ability
-
computer and learn new software programs Ability to document and communicate pertinent information using computer and/or paper documentation tools Ability to navigate the entity to provide clinical care for
-
functions to process and prioritize information, treatment, and follow- up Ability to use computer and learn new software programs Ability to establish and maintain effective working relationshipsAbility
-
, employees and corporation-related activities. Instruct students, fellows, nurses, or health personnel as requested. Communicates technical and patient care related information according to established
-
intervention (e.g. BPAP, O2 administration). Assist with following "lights on" procedures to verify the integrity of collected data and complete the data collection process. (e.g. learn to perform
-
medication histories, assess compliance and suggest modifications so as to achieve desired outcomes; instruct patients in the proper use of prescribed drugs; participate in patient care rounds with
-
. Follows required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new