Sort by
Refine Your Search
-
outcomes will be of interest to policymakers, government officials, cloud service providers, and researchers in the field of digital government and artificial intelligence. Research Objectives: The primary
-
information about the APE group please use the following link: https://www.rug.nl/research/ape Qualifications Candidates should have a master degree in materials science and engineering. A strong background in
-
Sciences With more than 1,000 employees, including 135 pioneering principal investigators, as well as a population of about 3,400 passionate students, the Faculty of Applied Sciences is an inspiring
-
should have a master degree in materials science and engineering. A strong background in materials physics and tribology will be a clear advantage for the position. The successful candidate is expected
-
communication, presentation and writing skills. We are You will join the Data Science group of the Institute for Computing and Information Sciences at Radboud University. The group's main research foci are 1
-
interests and skills as relevant for this position (see qualifications). Full list of grades/transcripts (bachelor and master). Contact information of 2 references. Please note that incomplete applications
-
Psychology, Faculty of Behavioral and Social Sciences) and Prof. Bob Fennis (Marketing, Faculty of Economics and Business). Qualifications For this position you are expected to Have a (research) Master's
-
view the video . Do you recognize yourself in this profile and would you like to know more? Please contact Job Beckers, Principal Investigator CIMlabs, [email protected] . Visit our website for more
-
collaboration with the other TRIAS PhD projects on (a) physical and digital healthcare accessibility, and (b) integrated mobility and healthcare capacity planning. Profile You should hold a Master's degree in (a
-
artifacts will be co-created, developed, and evaluated to cater to dynamic levels of vulnerability. The main goals for this PhD project are to: Identify pathways to vulnerability and investigate how different