Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
image sequences. As a benchmark, end-to-end deep learning models will be developed using raw image data. In parallel, shallow learning models (e.g., Gaussian processes) will be explored based on insights
-
a PhD candidate to conduct research in in the areas of criminal law and/or criminal procedure law, ideally in connection with its European, international and interdisciplinary aspects. The doctoral
-
tools. In this PhD position, you will investigate the use of logic-based methods to provide decision support for the process of designing electromechanical systems. Here, the focus is not on the system
-
of more efficient cancer detection methods and revolutionary therapies. The center is looking for A PhD for the project “Intraoperative assessment of resection margins in breast cancer surgery by Raman
-
monitoring and health monitoring of the different machine components. To this end, multiple dedicated measurement campaigns have been performed throughout the Belgian offshore zone, resulting in a large in
-
many real-world applications, finding a solution requires high-performance computer clusters that consume large amounts of energy and run for a long time. Our project aims to create a radically new
-
The overarching goal of the TOBI-team is to enhance precision cancer management through the development of innovative wet-lab and bioinformatic tools for diagnostic, prognostic, and predictive analysis. Prof
-
finance and payments: electronic attestations of attributes certification processes and security measures in digital wallets using privacy-enhancing technologies to ensure end-user privacy while mitigating
-
finance and payments: electronic attestations of attributes certification processes and security measures in digital wallets using privacy-enhancing technologies to ensure end-user privacy while mitigating
-
finance and payments: electronic attestations of attributes certification processes and security measures in digital wallets using privacy-enhancing technologies to ensure end-user privacy while mitigating