Sort by
Refine Your Search
-
control, basic course (study periods 1 & 2), FRTN65 Modeling and learning from data (study periods 1–2), FRTF01 Physiological models and computations (study period 2), and FRTN90 Cloud computing (study
-
on strategic planning can be used in research-led education within spatial planning. This work will lay the foundations for development of courses and program and will take place in close collaboration with
-
Information Science (GIS), and computational science for health and environment, to study processes spanning from the microscopic to the planetary, across all time scales. Subject description Forests play an important
-
tomorrow through pioneering projects and research ideas? If so, you have the opportunity to start as an assistant professor (associate senior lecturer) as part of Lund University Programme for Global
-
this field is performed in relation to the Helsingborg Safety Hub located in Lund University Campus Helsingborg. Work duties You will primarily devote yourself to your doctoral programme, which includes
-
design and operation processes. Work duties You will primarily devote yourself to your doctoral programme, including participation in the research project and third-cycle courses, seminars, and conferences
-
lidar. The development is done by raytracing, Computer Aided Design and 3D printing. After calibration, the instruments will be tested in field for applications within bloodsucking disease vectors as
-
for computational analyses. Use of software and applications for modelling in development cohorts and testing in validation cohorts. Development of predictive software and, in collaboration, management of the group’s
-
models, statistical signal processing, statistical theory and computational statistics, and probability theory, with applications in areas such as medicine, environmental research, and financial
-
and Information Technology at Lund University, the Faculty of Engineering, LTH, works broadly with research within Cryptography, Computer Security, Wireless and Fixed Networks. The security group has