Sort by
Refine Your Search
-
We invite applications for a fully funded PhD research scholarship in “Unsupervised Machine Learning for Cardiovascular Image Analysis”. This opportunity is available to UK (Home) candidates only
-
Overview:Fully Funded, £23,237 Tax-Free Stipend + £7,000 for Research & Travel, Co-funded by MBDA Are you driven by cutting-edge research and excited to shape the future of energy transfer technologies? Join the EPSRC Energy Transfer Technologies Doctoral Training Hub and embark on a fully...
-
the sites to normal use. X-ray backscatter imaging is a non-destructive analysis technique, where X-rays are directed at a target and Compton/back-scattered photons imaged. Existing industrial systems with
-
This specific project, with Prof. Michael Holynski at University of Birmingham, is on novel momentum separation and scaling schemes for atom interferometry. It will form part of QuSIT's Underground Infrastructure work package. This is an opportunity to join a cohort of post-graduate researchers...
-
the duration of the project. The project is set to begin in September 2025. Project Overview This fully funded PhD project explores AI-driven methods to enhance dynamic PET imaging, a key tool for
-
simple identification of nuclear material even when the typical signatures of the materials may be unavailable. X-ray imaging is commonly used to image concealed objects but x-rays are attenuated in
-
A crucial image processing task is image segmentation: we often seek to identify the presence and location of key features in an image, for example a tumour in a medical scan. But in practice, we do
-
disabling memory encryption (Hardware-on-hardware attack). Integration of AI introduces additional vulnerabilities across security domains, affecting malware detection and vulnerability discovery
-
Background The rise of quantum computers could break many existing encryption methods, making post-quantum cryptography (PQC) vital for future security. Digital signatures, which act like electronic
-
wandering safety with enhanced privacy. The advanced cryptography and privacy enhancing technology (e.g. homomorphic encryption, differential privacy) will be explored and utilised to construct a privacy