Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. The mining risk at former mining locations should be determined by considering different factors: predisposition, the triggering or aggravating factor of external origin and intensity. As an aggravating factor
-
of Information Technology. We investigate and develop methods, theories, and technologies for digitalized data and the information centric society. Strong mathematical, algorithmic, and computational thinking and
-
generation Energy Management Systems (EMS) to be integrated by different stakeholders, while demonstrating the value added of asset’s connection to common data space, reducing uncertainty and hence increasing
-
optimization and coordination algorithms for BC Hydro–cVPP interaction and evaluate grid performance through simulated case studies, and analyze service offerings and pricing via case studies and apply social
-
ourselves into one of the best universities in the world. Our culture empowers people to achieve this aim and to collectively, and individually, make a real difference. The role This is an exciting new
-
algorithms Correlate/Integrate In Vivo and Ex Vivo metabolite analysis to understand the key metabolic pathways in different tumour types and subtypes Identify and harmonise MRI and MRS acquisition protocols
-
models for signal transmission and reception, derivation of fundamental performance limits, algorithmic-level system design, and performance evaluation through computer simulations and/or experimental
-
About The University Swansea University is a research-led university that has been making a difference since 1920. The University community thrives on exploration and discovery and offers the right
-
Europe | about 2 months ago
manufacturing, development of machine learning algorithms and design of optical communication networks or power consumption and energy saving. The synergies of MATCH consortium act together to enable the thirteen
-
differences or random direction stochastic approximations, offer general-purpose strategies that only rely on function evaluations. While conceptually simple, zeroth-order methods tend to scale poorly with