Sort by
Refine Your Search
-
/liu/bkv We are looking for a PhD student in Medical Science in the area of Tumor Immunology. Your work assignments The candidate will be part of a research program that integrates experimental mouse
-
project aims at improving existing methods and exploring new ways to efficiently and systematically model and simulate all aspects of CVD processes. The basis for this will be Computational Fluid Dynamics
-
with fluid dynamics. Thin layers, or films, of various materials are of high technological importance in many aspects of our everyday lives. Thin films prevent food from spoiling, make cutting tools last
-
and computational methods within quantum mechanics and statistical physics with the aim to design alloys for rare-earth-free high-performance permanent magnets. You will use computational techniques
-
models, also through neuroadaptations in the opioid and dopamine systems. However, little is known about the molecular mechanisms underlying the effects of the social environment on alcohol use, or about
-
qualifications You have a Master’s degree in electrical engineering, engineering physics, mechanical engineering, computer engineering, engineering mathematics or have completed courses with a minimum of 240
-
machine learning techniques into a modern AI planning system. The project will involve both theoretical and experimental work As a PhD student, you devote most of your time to doctoral studies and the
-
to: Independently undertake the research activities Work collaboratively and openly as part of a team Act as a source of information and advice to other members of the group on scientific protocols and experimental
-
for antenna modeling and design is required, as is experience with programming languages like MATLAB, Python, or similar for antenna array analysis and algorithm development. Basic familiarity with experimental
-
security analysis by providing the means and the tools to leverage model structures (e.g., dynamic key dependencies) in models of security mechanisms and to use these structures to automate security analysis