68 computational-physics "https:" "https:" "https:" "https:" "Caltech" positions at Cranfield University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
knowledge co-evolution and addressing complex challenges in a super-intelligent society. This project is situated within the rapidly evolving field of Cyber-Physical-Social Systems (CPSS), which is of
-
. The studentship is funded by the Leverhulme Trust through the Connected Waters Leverhulme Doctoral Programme. Urban blue networks, including rivers, canals and wetlands, are dynamic systems that shape how cities
-
models and physics-based models. More recently, hybrid prognostics approaches have been presented, attempting to leverage the advantages of combining the prognostics models in the aforementioned different
-
sponsors to deliver the outputs and will have access to a bespoke training programme. Per- and polyfluoroalkyl substances (PFAS), also known as “Forever Chemicals”, are micropollutants of increasing concern
-
-efficient research that prevents fatigue failures has pushed towards integrated computational materials engineering approaches that improve competitiveness. These approaches rely on physics-based models
-
). The WIRe programme offers a bespoke training programme in technical and personal skills, and access to world-leading experimental facilities. The successful candidate will also have the opportunity
-
the Researchers Core Development programme alongside PhD students, together with access to the University Doctoral Core Research Methods Training (DCRMT) Programme courses, as well as a tailored programme of
-
will have the option of indicating this in the equal opportunities form that is part of our online application process. We aim to award a number of studentships to applicants coming from
-
of first or second class UK honours degree or equivalent in a related discipline, science (chemistry/physics) or engineering. The ideal candidate should have some understanding in the area of materials
-
elements like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) to secure hardware components. Embedded Trust Protocols: Design protocols that establish and maintain trust within