Sort by
Refine Your Search
-
Employer
-
Field
-
the diseased retina in order to restore vision and also to prevent the network from further degeneration in animal models of inherited gene mutations most frequent in humans. In the second part of the project we
-
laboratory work and statistical modelling. The postdoc will work together with the PI, Dr. Netherlands, and other team members, including a network of international collaborators. Where to apply E-mail
-
), about PLN 6900 net per month. Contact More information can be obtained from prof. Ryszard Buczko (e-mail: buczko@ifpan.edu.pl ) Where to apply E-mail rekrutacja@ifpan.edu.pl Requirements Research
-
Technologies AMU, Uniwersytetu Poznańskiego 10, 61-614 Poznań, Poland Monthly salary: 7700 PLN (gross amount, which includes social security contributions, the tax, and the net amount; it is the amount specified
-
starting date 1st April 2025 Additional comments Remuneration/stipend amount/month (16 000 PLN of full remuneration cost, i.e. expected net salary at 10 500 PLN per month) Website for additional job details
-
of extension – 48 months). Work in international networks with research institutes and industrial companies. Access to the research potential of NOMATEN’s three partners between NCBJ (Poland), CEA (France) and
-
processing using deep neural networks; knowledge of methods of statistical data analysis; ability to work with large data sets; experience of working in R or Python; LanguagesENGLISHLevelExcellent Research
-
900 PLN per month net. Contact More information can be obtained from dr hab. Ryszard Sobierajski (e-mail: ryszard.sobierajski@ifpan.edu.pl ) Where to apply E-mail rekrutacja@ifpan.edu.pl Requirements
-
secure information transfer and collection essential. However, communication networks are vulnerable to attacks, and cryptographic codes can become breakable with advances in computer algorithms. Quantum
-
The increasing number of interconnected devices has made secure information transfer and collection essential. However, communication networks are vulnerable to attacks, and cryptographic codes can become