Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
machine learning methods, including symbolic regression and neural networks. You will apply the algorithms to the discovery of new models in different fields, including robotic control, fluid mechanics and
-
positive and supportive team environment. You prefer to stay organized and take pride in completing your tasks in a thoughtful and structured way. As a formal qualification, you must hold a PhD degree (or
-
the project. Qualified candidates should have: A PhD degree in Computer Science, Electrical Engineering or equivalent. Research interests and a scientific track record in Edge Computing research fields, such as
-
to collaborate with fellow researchers, fostering a collaborative and innovative research culture. The ideal candidate has the following skills: PhD in computational biology, bioinformatics, computer science
-
with academic and industry partners Disseminate results through publications and stakeholder engagement Your primary qualifications are: As a formal qualification, you must hold a PhD degree (or
-
PhD degree (or equivalent) in Environmental Engineering, Industrial Ecology, Design for Sustainability, Circular Economy, Remanufacturing, or a closely related field Experience with developing digital
-
PhD degree (or equivalent) in Environmental Engineering, Industrial Ecology, Design for Sustainability, Circular Economy, Remanufacturing, or a closely related field Experience with developing digital
-
PhD degree (or equivalent) in Manufacturing Engineering, AM, or related field Experience with metrology of small to large scale laser-based metal AM components (e.g. DED, powder-bed fusion) Experience
-
part of the Dynamical Systems Section. We perform research within a broad range of areas within dynamical systems including modeling, optimization, forecasting, and controlling in both deterministic and
-
description As a Postdoc, you will: Conducting research in cybersecurity for automotive control systems such as BMS (battery management systems), focusing on secure communication, access control, and anomaly