Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
-throughput phenotyping. You will develop novel methodologies, execute experiments, analyse data, and present your project results in the form of manuscripts and oral presentations. In addition to your research
-
quantitative data and qualitative fieldwork. Publishing research findings in peer-reviewed academic journals and presenting them at conferences. Collaborating with interdisciplinary researchers and engaging with
-
the six universities. For more information, check the individual vacancy pages of the universities, or check the project website www.heritour.eu Opens external About the research project This PhD project
-
(such as data annotation, online content creation, or software testing) provide chances for social enterprises – i.e. mission-driven business that prioritize societal impact above maximizing profit, such as
-
sizes and frequencies by: Measuring rock fractures from UAV data using manual and automated mapping approaches (e.g., machine learning, convolutional neural networks). Monitoring physical weathering
-
, involving a large network of academic and industrial partners across the Netherlands. Information and application Are you interested in this position? Please send your application via the 'Apply now' button
-
, 2020 . In this PhD project you will work on applying RNPU networks for solving computational problems that are considered hard. Information and application Are you interested in this position? Please
-
, fundamental research and/or studies involving matters of scientific urgency. Information and application Are you interested in this position? Please send your application via the 'Apply now' button below before
-
to the premise that the disease is more prevalent in southern Africa than the official data suggest. Birnie is thus ensuring that this ‘neglected’ disease is given the attention necessary to combat it effectively
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate