Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
the competent authority of the Ministry of Higher Education, Research and Innovation (MESR). "Video content security in a deep learning coding architecture" Over the past few decades, numerous video compression
-
well as potential power deposition on accelerator elements and potential damage. •Subsequently perform the benchmarking of the accelerator model from the Bmad code to the Xsuite / RF-Track codes. This work will
-
of materials. The main activities will include: – adapting the generative LegoXtal code to the design of MOF coordination polymers and porous materials by assembling elementary molecular bricks in the generation
-
count regime, joint gamma/neutrino studies of VHE data. The requited person will achieve these research studies within the H.E.S.S., CTAO or KM3NeT collaboration. - Gammapy developer (code, test
-
will work directly with Prof. Aurélie Perrier, specialist in computational photochemistry, and will interact closely with all members of the SIMULACTOR consortium. The quantum chemistry codes required
-
Infrastructure? No Offer Description This project is part of the European Commission Marie Sklodowska-Curie (MSCA) Doctoral Network GRAIL “Gamma Radiation from the Atmosphere for Investigation and Learning” https
-
- Numerical simulations with optical propagation and Particle-in-Cell codes - Scientific communication: writing scientific articles and presenting at conferences The Laboratoire d'Optique Appliquée (LOA) is a
-
-field code, written in the Cuda C language and parallelized on a single GPU (Graphical Processor Unit). A parallelization on multiple GPUs would be a welcome development during the thesis. Where to apply
-
offers and actions on https://cluster-ia-enact.ai/ . You will work in a rare environment at the intersection of frugal AI, analog computing, reconfigurable electronics and THz imaging. The PhD is directly
-
applies to protocols using "short" codes, where these codes have a non-negligible probability of being guessed by an attacker. The goal of this postdoctoral research is to develop new methods