Sort by
Refine Your Search
-
Employer
-
Field
-
”, led by Associate Professor Valeria Vitelli. Successful candidates will work on Bayesian models for unsupervised learning when multiple data sources are available, mostly tailored to the case
-
. Integrate hydraulic-hydrologic modeling and surrogate models (e.g., Bayesian Networks) to simulate stormwater behavior under future scenarios. Apply optimization techniques to design and evaluate nature-based
-
providing a basis for decision support and lifetime extension. This may be obtained by comparing existing design practice with results based on application of Bayesian updating to account for uncertainties in
-
ethnomycology or ethnobiology large-scale (ethnographic) database construction phylogenetic comparative analyses with Bayesian computational tools The applicant must have the ability to work independently and in
-
on graphite deposits: structural and metamorphic evolution (number of events and timescales) and remobilization of graphite by deformation and/or fluids. Several graphite deposits will be targeted based
-
, target group, research methods, and expected scientific and societal contributions Names and contact information of three relevant referees If all, or parts, of your education has been taken abroad, we
-
manuscripts based on findings, targeting publication in peer-reviewed journals and dissemination of results within partner networks Thesis Writing: Compile research outcomes and manuscripts into a cohesive
-
courses Career The target group of this programme is those who wish to achieve research competence in sustainability studies, within the areas of design, arts, computer science, cultural and social studies
-
to three proposals (max. 750 words each) for a focused research plan, including main research question(s), thematic application area, target group, research methods, and expected scientific and societal
-
leader will be the Head of Department. About the project Modern control systems rely on being at least partially predictive while digital twins also must maintain a state model of the targeted cyber