Sort by
Refine Your Search
-
Vulnerabilities This project aims to explore the dynamic nature of the human replisome, with a focus on replisome protein architecture, replisome speed control, and replication stress responses in cancer cells. By
-
The Department of Electronic Systems at The Technical Faculty of IT and Design invites applications for one or more postdoc positions in the field of advanced antenna architectures for small
-
electrolysis plays a vital role in the emerging hydrogen economy, yet its performance and cost are still limited by traditional component architectures. There is a clear need for breakthroughs in the design and
-
. The project focuses on high-precision optical computing for neural network applications and leverages a radically new digitized optical computing architecture. You will play a central role in advancing
-
, including robotic control, mechanics of materials, fluid mechanics and biological systems, in collaboration with other researchers and companies. Your profile Applicants should hold a PhD in Computer
-
high academic quality and societal impact. The Department of Electronic Systems employs more than 200 people, of which about 90 are PhD students, and about 40 % of all employees are internationals. In
-
potential to Danish growing conditions; evaluate the adaptability of these accessions and investigate their genetic background; Uncover the genomic, metabolomic and sensory architecture of edamame taste and
-
potential to Danish growing conditions; evaluate the adaptability of these accessions and investigate their genetic background; Uncover the genomic, metabolomic and sensory architecture of edamame taste and
-
, including robotic control, mechanics of materials, fluid mechanics and biological systems, in collaboration with other researchers and companies. Your profile Applicants should hold a PhD in Computer
-
device-to-architecture level models of emerging nanoscale devices (spintronic, resistive, or hybrid) for in-memory and neuromorphic computing. Exploring hardware-level security mechanisms based