ME-465: Advanced heat transferThe course will deepen the fundamentals of heat transfer. Particular focus will be put on radiative and convective heat transfer, and computational approaches to solve complex, coupled heat transfer p
EE-536: Physical models for micro and nanosystemsStudents will learn simple theoretical models, the theoretical background of finite element modeling as well as its application to modeling charge, mass and heat transport in electronic, fluidic and e
DH-406: Machine learning for DHThis course aims to introduce the basic principles of machine learning in the context of the digital humanities. We will cover both supervised and unsupervised learning techniques, and study and imple
CS-401: Applied data analysisThis course teaches the basic techniques, methodologies, and practical skills required to draw meaningful insights from a variety of data, with the help of the most acclaimed software tools in the dat
HUM-226: Wellbeing and Planetary BoundariesL'objectif de ce cours est de donner une compréhension globale des enjeux de la durabilité et de ses implications. Que signifie "durabilité" ? Comment est-elle mesurée ? Comment l'atteindre ?
ENG-410: Energy supply, economics and transitionThis course examines energy systems from various angles: available resources, how they can be combined or substituted, their private and social costs, whether they can meet the energy demand, and how
ME-443: Hydroacoustic for hydropower plantsIntroduction to pressure wave propagation phenomena in hydraulic circuits, water hammer calculations, transient behaviour of hydroelectric plants, 1D numerical simulation of the dynamic behaviour of F
COM-405: Mobile networksThis course provides a detailed description of the organization and operating principles of mobile and wireless communication networks, as well as the use of wireless signals for sensing and imaging.
COM-401: Cryptography and securityThis course introduces the basics of cryptography. We review several types of cryptographic primitives, when it is safe to use them and how to select the appropriate security parameters. We detail how