Sort by
Refine Your Search
-
Listed
-
Field
-
research grant aims to achieve the following objectives:; • Expand scientific and technical knowledge in real-time simulation, creating the conditions for the remote control of a real-time computational
-
-bolseirosEN ) The grant holder will benefit from health insurance, supported by INESC TEC. 2. OBJECTIVES: 1. Formulate and validate automated inspection methodologies based on computer vision and AI techniques
-
infrastructure. More specifically, this research grant aims to achieve the following objectives:; • Expand scientific and technical knowledge in real-time simulation, creating the conditions for the remote control
-
industrial-grade communication protocols for automation in electric power systems.; Implement the interface between OPAL-RT and HMI/SCADA software: connecting the real-time model or digital twin with the SCADA
-
interfaces (HMI), and industrial-grade communication protocols for automation in electric power systems.; • Develop and adapt a test network — a simulation model or a replica of a real network — for DIgSILENT
-
-bolseirosEN ) The grant holder will benefit from health insurance, supported by INESC TEC. 2. OBJECTIVES: The main objective of this work is to develop an intelligent control and coordination module for robotic
-
requirements that must be respected in spite of their integration in a product’s Digital Passport, potentially requiring differentiated access control and/or that raw data cannot be transferred out to comply
-
optimize reimbursement claims with health insurers. The solution will be based on advanced hyper automation and generative artificial intelligence techniques, focusing on efficiency in terms of performance
-
requirements: Educational background in Electrical Power Systems and/or Automation 5. EVALUATION OF APPLICATIONS AND SELECTION PROCESS: Selection criteria and corresponding valuation: the first phase comprises
-
to analyze, monitor, and strengthen the security of these pipelines. The goal is to propose mechanisms capable of mitigating attacks in real time, thereby increasing trust in the use of automated workflows in