Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
particular connectivity within and between complex system? Would you like to apply efficient AI techniques for adaptive configuration and optimization of industrial communication networks to enhance
-
Wetsus - European centre of excellence for sustainable water technology | Netherlands | about 1 month ago
networks. Your assignment You will develop innovative methods to detect and predict failure risks in drinking water distribution and transport networks. You will combine operational hydraulic data, asset
-
the money! REconstructing Belief systems behind Urban Intensification and Land-rent Distribution (REBUILD)”, funded by the Swiss National Science Foundation. Focusing on case studies in the Netherlands and
-
now As a successful candidate, you will be part of the international research project “Follow the money! REconstructing Belief systems behind Urban Intensification and Land-rent Distribution (REBUILD
-
these techniques, X-ray fluorescence (XRF) imaging provides detailed information on the distribution of chemical elements across paint layers, giving unique access to pigments, mixtures, and underlying compositions
-
scenario; Develop a novel self-calibrating, heterogeneous distributed platform capable of providing the necessary sensing, transport, compute and data aggregation capabilities on demand. Consider how partial
-
of tomographic imaging techniques to capture oil/water distributions in a 3D geometry. In the second half, we will use these techniques to study the flow and stability of an emulsion through a constriction
-
of optical surfaces (reflector/lens) that convert a given source distribution, typically LED, into a desired target distribution. The surfaces are referred to as freeform since they do not have any symmetries
-
for all societal groups. It must ensure that these essential goods are produced and distributed equitably and sustainably. This PhD position is intended to explore solutions for the challenges
-
for phishing, malware distribution, and other cybercriminal activities. The speed and volume of these registrations pose a persistent challenge for defenders, who are often forced into a reactive cycle, not to