Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
29 Feb 2024 Job Information Organisation/Company UNIVERSITE ANGERS Department Human Resources - Recruitment Research Field Biological sciences » Zoology Researcher Profile Recognised Researcher (R2
-
imaging (fMRI). Recent studies [2, 3, 4] have shown the high potential of combining EEG and fMRI in a bi-modal NF training (i.e., NF scores are estimated in real-time from features of both modalities
-
18 Apr 2024 Job Information Organisation/Company Universite de Montpellier Department Human Resources Research Field Biological sciences » Biology Physics » Biophysics Researcher Profile First Stage
-
lithography, optical microscopy, nanometrology (i.e. profilometry, AFM, SEM), and image processing. 2) Measure and analyze the propagation of MHz to GHz ultrasonic waves in the fabricated samples using laser
-
appreciated : An important part of the assignment is the evaluation of human-machine collaborations, i.e. assessing the impact of AI and XIA models on human decision-making; initial experience of working with
-
their partners i.e. CHR Metz-Thionville, GeorgiaTech Institut and CHU Nancy. The project draws on the resources (in equipment and personnel) of the CRAN PhotoVivo platform and the IJL Optics-Lasers competence
-
electromagnetic sources with two different technologies: (i) one for surface medical applications, i.e., cutaneous or subcutaneous electroporation, (ii) the other will use a device inducing a focusing of the
-
the atom substitution occurs). A longstanding controversy since the emergence of SCA in the 1960s was whether the vibration of a given bond is “blind” to the alloy disorder, i.e., generates a unique mode at
-
Ecole Nationale Supérieure des Mines de Saint Etienne | Saint Etienne, Rhone Alpes | France | about 1 month ago
performances. Some of these dimensions are available online: Hugging Face, as an example, publishes model cards that indicate how many trainable parameters are model has, what training data has been used and
-
that the specifications are met even in the face of malicious behavior or unforeseen events. Historically divided into the fight against physical attacks and the protection of information technologies, the significant