Sort by
Refine Your Search
-
, ecosystems, or the critical zone (e.g. Cividini et al. 2010, Dessert et al., 2015). In this respect, the trace element boron (B) appears as a powerful tool as it is a micronutrient involved in a wide variety
-
ability to work collaboratively in a multidisciplinary research environment. Preferred Skills: Experience in graph-based learning, attention mechanisms, and transformer architectures applied to chemical
-
system for bacterial genomes using cutting-edge genomic language models. This project aims to adapt and extend transformer-based architectures to create a powerful tool for understanding and predicting
-
collaboration between Geology and Sustainable Mining Institute (UM6P, Morocco), and Mineral-X (Stanford University, USA). Qualifications PhD in process mineralogy, mineral processing, mining, chemical or
-
journals in the field. Participate to the supervision of PhD students and research internships. Criteria of the candidate: PhD in the field of Cryptography, Computer security or any related field. Strong
-
using advanced geological modeling tools such as Datamine software, Leapfrog Geo and Surfer. Supervise MSc/PhD students working on related tasks. Publish high-impact papers and contribute to funding
-
to scientific publications and project reporting Candidate Profile PhD in electrochemistry, chemical engineering, materials science, or a related field. Hands-on experience with electrodialysis, electrochemical
-
, grant applications, and stakeholder engagement materials to sustain and expand research activities. Candidate Profile: PhD in related fields Excellent communication in both English and French languages
-
functional digital twin environment. Contribute to industrial validations, results presentations, and scientific publications. Candidate Profile PhD in Mining Engineering, Industrial Engineering, Applied
-
. Parallel Computing: Explore opportunities for parallelism in the tensor completion process to enhance computational efficiency. Investigate parallel algorithms and architectures that can exploit the inherent