Sort by
Refine Your Search
-
for on-board, runtime engine fault detection, with experimental validation on the ASCENT bi-liquid propulsion system. Our partner Orbital Paradigm contributes online trajectory reconfiguration upon fault
-
imaging. Your Profile: * Master's degree in Computer Science, Electrical and Computer Engineering, Mathematics, Physics, or a related field * Strong background in mathematical and computational sciences
-
imaging. Your Profile: The successful applicant must have the following: • Master’s degree in physics, biophysics, biomedical engineering, computer engineering or electrical engineering. • Excellent track
-
Chair of Biological Imaging 02.02.2026, Academic staff We are looking for a candidate (m/f/x) who will use the combination of our spectroscopy infrastructure, and structural information
-
, data-centric research, and applications to scientific and medical imaging. Your Profile: * Master's degree in Computer Science, Electrical and Computer Engineering, Mathematics, Physics, or a related
-
use of machine learning methods to process complex data sets. The focus is on techniques such as ultrasound, radar, computed tomography, acoustic emission analysis, and infrared thermography. Industry
-
according to the German public sector rates. Applicants should be available from December 1st , 2023. The Chair of Computational Modeling and Simulation is part of the TUM School of Engineering and Design
-
to study translational aspects of cancer (single-cell sequencing of immune cells, organoid co-cultures, cellular engineering via CRISPR/Cas9 technology, in vivo imaging, advanced animal models of allo-SCT
-
with team members and colleagues. Essential qualifications: M.Sc. in Computer Science, Machine Learning, or equivalent with interest in Medical Imaging and Deep Learning. Strong knowledge in Machine/Deep
-
Computer Science, Machine Learning, or equivalent with interest in Medical Imaging and Deep Learning. Strong knowledge in Machine/Deep Learning with experience in discriminative models, adversarial attacks, and