-
a next step, you will explore to what extent these pathways match stakeholder’s values and the increase of drought resilience. You will subsequently design a serious game to support interaction with
-
enabled technologies and methods for the design and operation of future manufacturing. In line with the Industry 5.0 paradigm, aspects like sustainability in manufacturing (e.g. circular manufacturing
-
aims to bring about a paradigm shift in the design, fabrication, and functionalization of 3D-printed structures to create an innovative thermochemical heat transformer. These will assist in temperature
-
operational hydropower experts from the early development stages of technologies to inform and influence the design processes. Next to analysing global environmental impacts along the supply chain, you will
-
PhD position in “Economic Life Cycle Costing and Life Cycle Sustainability Assessment of Hydropower”
with technological and operational hydropower experts from the early development stages of technologies to inform and influence the design processes. By means of economic life cycle costing analysis (LCC
-
check: Bremer, S. J. L., et. al. (2023). Laser intensity profile as a means to steer microstructure of deposited tracks in Directed Energy Deposition. Materials and Design, 227, [111725]. Ya, W. , et. al
-
challenging novel membrane approach to effectively remove MPs from surface and drinking water. Charge-mosaic membranes comprise a nanoscale pattern of positively and negatively charged patches. These membranes
-
approaches to technology such as capability sensitive design, intersectional theory and critical disability studies, as well as extension theories of technology to come to a deeper understanding of human
-
. About the department The geoinformation Processing Department (GIP) works on the design and development of methods & techniques for processing (acquiring, organizing, analysing) heterogeneous collections
-
more potential flaws than organizations can fix. We plan to design and develop automated techniques to analyze discovered vulnerabilities, assess their risk, prioritize the critical ones, and generate