28 data-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"Dr"-"P" positions at Cranfield University in United Kingdom
Sort by
Refine Your Search
-
performance degradations and unwarranted system failures can occur. There is certain physical information known a priori in such aerospace platform operations. The main research hypothesis to be tested in
-
will have sound knowledge of data protection regulations and be experienced in co-ordinating events and activities. Experience of working within an Apprenticeship or Higher Education environment and
-
AI techniques for damage analysis in advanced composite materials due to high velocity impacts - PhD
intelligence, particularly in computer vision and deep learning, offer an opportunity to automate and enhance damage assessment by learning patterns from multimodal data. This research seeks to bridge the gap
-
reliability and maintenance strategies. Filter Rig: An experimental setup to study filter clogging phenomena, allowing for the collection of data to develop and validate prognostic models for filter
-
mitigating jamming and spoofing threats in real-time. Integration of Trusted Execution Environments (TEEs): Investigate the use of TEEs to create secure zones within embedded systems, facilitating secure data
-
information about application please visit Applying for a research degree . Apply now
-
have some expertise in business analysis and techniques, such as ‘as is’ and ‘to be’, and swimlanes. Specific project experience of CRM, intranet, research systems and student information systems (e.g
-
usability and accuracy, as well as conducting field tests to validate their effectiveness. Additionally, the research will explore the economic viability of these sensors to enhance real-time data collection
-
responses and mitigation scenarios across realistic European agricultural landscapes (illustrative example shown in Figure 1). There is also an opportunity to collect original movement and behavioural data
-
multilayer printed circuit boards (PCBs). It draws from disciplines including electrical and electronic engineering, embedded systems, computer vision, and cybersecurity. The ability to verify hardware without