Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
The School of Computer Science at the University of Nottingham is pleased to invite applications for a fully funded PhD studentship in deployable, efficient, and trustworthy computer vision. This is
-
of Pharmacy. The project will focus on the synthesis of polymers that resist the formation of biofilms and the development of processes to formulate / process them into new health/consumer care products e.g
-
of Pharmacy. The project will focus on the synthesis of polymers that resist the formation of biofilms and the development of processes to formulate / process them into new health/consumer care products e.g
-
PhD Studentship: Rolls-Royce sponsored PhD scholarship – Intelligent Mechatronics and Robotics Systems Engineering Rolls-Royce University Technology Centre (UTC) in Manufacturing and On-Wing Technology, The University of Nottingham. Applicants are invited to undertake a three-year PhD programme...
-
PhD Studentship: Rolls-Royce Sponsored PhD Scholarship – Micromechanics and In-Depth Materials Analysis of Advanced Aerospace Materials Upon the Manufacturing Process Engineering Applications
-
dealing with investigations on the development of bespoke high-tech laser beam processing methods for surface treatment and repair of aero-engine components. The project will deal with the study of a new
-
PhD studentship: Improving reliability of medical processes using system modelling and Artificial Intelligence techniques Supervised by: Rasa Remenyte-Prescott (Faculty of Engineering, Resilience
-
such as wrinkles can occur, which cause parts to be scrapped. To minimise material and energy wastage, digital models of the manufacturing processes can be developed and linked to process control and
-
to develop new skills in line with changes to University procedures and legislation. Applicants should have good working knowledge of payroll and pensions processes, ideally gained within a large organisation
-
will be responsible for monitoring all computer systems connected to the university network to identify known vulnerabilities, potential weaknesses, security breaches, unusual activity and unauthorised