350 data-"https:" "https:" "https:" "https:" "https:" "J. F" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Environmental Engineering Mechanical and Aerospace Engineering Electrical and Computer Systems Engineering Chemical and Biological Engineering Materials Science and Engineering About the Role We are seeking
-
measurements in particle physics. Many of my projects are informed directly by current measurements, e.g. addressing new or unexpected features seen in the data. Others focus on improving the formal accuracy
-
an electrical and computer systems engineering degree in the Faculty of Engineering. Total scholarship value $20,000 Number offered One at any time See details Farrell Raharjo Clive Weeks Community Leadership
-
health economics, labour economics, economics and econometrics. We will also consider other quantitative disciplines such as data science, mathematical statistics, actuarial science or public health
-
. MNM is dedicated to enhancing our capacity to lead innovative nursing curricula and pioneering teaching methods. For more information, visit: www.monash.edu/medicine/nursing If you are committed
-
weighted sum of the risks from tens to millions of independent disease-associated SNPs from across the genome. The conventional, or gold-standard, approach to analysis of GWAS data is to fit a regression
-
, presentations, committees, funders and community groups • Provide expertise in governance, compliance, reporting and process improvement • Maintain oversight of confidential and sensitive research information
-
, and their decisions can be confusing due to brittleness, there is a critical need to understand their behaviour, analyse the (potential) failures of the models (or the data used to train them), debug
-
, data management and coordination support to keep the UCAT ANZ program running efficiently. The position oversees processes across candidate results, research databases, committee activities, financial
-
increasingly rely on digital systems to issue, store, and verify qualifications, new risks arise—ranging from data breaches and identity fraud to profiling and surveillance through credential verification logs