297 data-"https:"-"https:"-"https:"-"https:"-"Inserm-UMR-S-1250" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Candidates should hold a previous degree (Bachelor’s and/or Master’s) in Computer Science, Data Science, Robotics, Mechatronics, or Software Engineering, with demonstrated knowledge in machine
-
) to support surgeons, operating room technicians, and other professionals in and around operating room activities. Particular areas that may be explored are: Immersive OR analytics: using XR to analyse data
-
I supervise computational projects in electron microscopy imaging for investigating materials at atomic resolution. Some projects centre on analysing experimental data acquired by experimental
-
Minimum Message Length (MML) is an elegant information-theoretic framework for statistical inference and model selection developed by Chris Wallace and colleagues. The fundamental insight of MML is
-
Understanding factors related to student retention and experience in physics and astrophysics major units. Using quantitative (surveys) and qualitative data (interviews with students) this project
-
Methods of balancing model complexity with goodness of fit include Akaike's information criterion (AIC), Schwarz's Bayesian information criterion (BIC), minimum description length (MDL) and minimum
-
outcomes through service delivery, data analysis, reporting, and scientific service delivery Stay at the forefront of veterinary and research innovations, recommending new methodologies and technologies
-
, which are some of the most numerous stars in the Universe. "Weighing stars using stellar vibrations: Asteroseismic masses of Red Giant Stars using space telescope data" "Using optical telescope
-
management of laboratory animals, ensuring optimal welfare outcomes while supporting researchers with accurate data and expert technical services. This is a rewarding opportunity to contribute to meaningful
-
existing tokenization frameworks, analyzing potential risks, and developing novel security protocols to protect sensitive data and ensure the integrity of tokenized assets. Applicants will investigate