Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
Machine Learning algorithms Experience in conducting neuroimaging studies in educational contexts Experience in working with databases. Responsibilities Liaise with stakeholders (E.g. participating schools
-
platforms and experimental pipelines for algorithm validation. Visualize simulation and experimental results to support decision-making and research findings. Contribute to: High-impact publications in top
-
. Implement Docker-based deployment, memory footprint reduction, and GPU acceleration. Collaborate with algorithm and hardware teams for integration and benchmarking. Job Requirements: Master’s with experience
-
, such as data storage, budgets, expenses, assets, and ethics approvals. Key Responsibilities: Design and implement research, including statistical models and algorithms to extract insights from data Develop
-
. • Establish a framework for the preparation and distribution of press releases and the coordination of media inquiries and interviews. • Drive the development of media capabilities amongst key academics in
-
science Designing, implementing, and testing algorithms Engaging in scientific exchange with collaboration partners of the project Preparing reports, scientific papers, and presentations Project duration: 6
-
applications, and AI integration with surgical robotics. The RA will design advanced algorithms and develop AI tools tailored for medical applications, bridging computational solutions with practical use
-
fusion, and ROS2 implementation. Key Responsibilities: Design and implement real-time radar-inertial odometry algorithms. Extract ego-motion estimation from 4D radar and fuse with IMU data. Evaluate
-
scene understanding algorithms (e.g., object detection, semantic segmentation) for fire-response environments. Integrate generative AI models to infer fire dynamics, structural layout, or human presence
-
software modules, protocols, or frameworks that use NIST-standardized PQC algorithms Evaluate performance, interoperability, and security implications of replacing classical cryptographic schemes with