Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
leadership capabilities, enabling them to reach their full potential and make a real difference to people's lives and the future of pharmacy. You will participate in a leadership program throughout the course
-
. Digital Creativity 27(1) McCormack J. (2017) Niche Constructing Drawing Robots. In: Correia J., Ciesielski V., Liapis A. (eds) Computational Intelligence in Music, Sound, Art and Design. EvoMUSART 2017
-
This project is technical in nature and would suit a candidate with a background and interest in #Java programming, health informatics or health data (or a combination thereof). The primary aim
-
D.L. Dowe (1994b), Intrinsic classification by MML - the Snob program. Proc. 7th Australian Joint Conf. on Artificial Intelligence, UNE, Armidale, Australia, November 1994, pp37-44 Wallace, C.S. and D.L
-
analytical imaging methods, then working with collaborators to apply these methods to biomedical research, diagnostic imaging and beyond. Research projects vary from purely theoretical, to computational
-
possess translational symmetry, the role of structure and symmetry in glasses is not established. This research programme involves the development of new x-ray and electron diffraction-based methods
-
I supervise computational projects in electron microscopy imaging for investigating materials at atomic resolution. Some projects centre on analysing experimental data acquired by experimental
-
, Authorship and Intention in Computer Generated Art. In: Ekárt A., Liapis A., Castro Pena M. (eds) Computational Intelligence in Music, Sound, Art and Design. EvoMUSART 2019. Lecture Notes in Computer
-
/C++) computer codes implementing a cryptographic algorithm. Although desired, background in advanced cryptography is not a must. Application of a PET algorithm to solve a real-life problem: This
-
Cybersecurity is regarded as a high priority for governments and individuals today. With the practical realization of quantum computers just around the corner, classical cryptographic schemes in use