Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
systems, including their reliability and resource efficiency during production and operation. To support our team, we are looking for a working student in the field of “Classical and Quantum Computing
-
Scheduled Hours 40 Position Summary Collect neuroimaging data and perform innovative analyses on these and related data. Develop and implement computer algorithms for analyzing the data. Assume
-
Job Purpose To make a leading contribution to the development of innovative muon tracking algorithms for cutting-edge applied nuclear physics research. The successful candidate will be expected
-
econometric analysis and preparing results tables, managing large data sets, handling spatial data, applying machine learning algorithms, conducting computationally intensive statistical analyses, summarizing
-
, and language modeling. Students will acquire hands-on experience by implementing models such as clustering algorithms, automatic text categorization, and experimental evaluation. As an introduction
-
minimizing error and maximizing efficiency, is computationally challenging—no known polynomial-time algorithm exists to solve it optimally in all cases. Because of this complexity, researchers typically rely
-
algorithms in statistics and machine learning Type of programme/project/ undertaking MAESTRO-16 Funding institution National Science Centre (NCN) Duration of programme/ project/undertaking 09.04.2025
-
on developing innovative algorithms and models to address complex problems in diverse fields such as robotics, healthcare, and finance. The department offers a range of undergraduate and graduate programs
-
algorithms proficiency in both general-purpose programming (e.g., Python) and scientific computing, with a preference for experience in Julia Experience in writing up research work for publication Highly
-
research for digital security and is a pioneer in developing highly innovative concepts, algorithms and systems for anomaly detection, cyber threat intelligence, penetration testing and cryptography. Through