Sort by
Refine Your Search
-
enabling precise and rapid identification of adulteration. Spectral techniques generate unique chemical fingerprints of food items, which machine learning algorithms analyse to detect inconsistencies and
-
architectures, implement co-evolutionary algorithms, and develop rigorous evaluation frameworks measuring adversarial robustness. Outputs include an agent-based simulation toolkit, stress-testing methods, and
-
. Dwork, C. & Roth, A. (2014). "The Algorithmic Foundations of Differential Privacy." *Foundations and Trends in Theoretical Computer Science*, 9(3-4), 211-407. 4. Jordon, J., Yoon, J., & van der Schaar, M
-
advanced AI/ML methods to neural and behavioural data to uncover the computational foundations of decision-making in humans and animals. Designing novel AI algorithms inspired by brain function, to improve
-
visual inspection. The research will address several challenges: Complex Surfaces: Developing robust algorithms (leveraging Convolutional Neural Networks and Transformers) capable of identifying tiny
-
” Advances in Experimental Medicine and Biology, vol. 1364, pp. 373–396, 2022. [3] M.-K. Sun, J. Shieh, C.-S. Chen, H. Chiang, C.-W. Huang, and W.-S. Chen, “Effects of an implant on temperature distribution in
-
of records and developing a toolkit relating to using AI in archives. Based at PRONI for 3 x 6 week blocks of time (distributed evenly across the three year studentship), the researcher will be provided with
-
of the firm size distribution. Conversely, other research has shown that medium-sized businesses can have a higher growth potential than small businesses due to their greater resources and ability to access
-
identity. The cultural, social, and design dimensions of regeneration material heritage, distributed making, attachment, and identity are comparatively underexplored. There is also a persistent disconnection
-
already developed bio-inspired methods for distributed repair, fault-tolerant interconnects, and secure hardware. These approaches allow electronic systems to adapt to failures, handle security breaches and