Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
of Twente, in close collaboration with the MESA+ Institute for Nanotechnology and clinical and international partners. Information and application You can apply for this position until 31 March 2026 by
-
, involving a large network of academic and industrial partners across the Netherlands. Information and application Are you interested in this position? Please send your application via the 'Apply now' button
-
quantitative data and qualitative fieldwork. Publishing research findings in peer-reviewed academic journals and presenting them at conferences. Collaborating with interdisciplinary researchers and engaging with
-
investing in your personal and professional development. For more information, please visit Working at Utrecht University . About us A better future for everyone. This ambition motivates our scientists in
-
studies the tropical infectious disease melioidosis. The results of her research lend credence to the premise that the disease is more prevalent in southern Africa than the official data suggest. Birnie is
-
(such as data annotation, online content creation, or software testing) provide chances for social enterprises – i.e. mission-driven business that prioritize societal impact above maximizing profit, such as
-
sizes and frequencies by: Measuring rock fractures from UAV data using manual and automated mapping approaches (e.g., machine learning, convolutional neural networks). Monitoring physical weathering
-
, 2020 . In this PhD project you will work on applying RNPU networks for solving computational problems that are considered hard. Information and application Are you interested in this position? Please
-
, fundamental research and/or studies involving matters of scientific urgency. Information and application Are you interested in this position? Please send your application via the 'Apply now' button below before
-
to what extent data poisoning attacks can influence the output of LLM models in security and safety critical infrastructure. 3. Perform the attack under different scenarios and model the impact. 4. Evaluate