66 data-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"U.S" positions at Cranfield University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
sensors to deliver resilient, high-accuracy positioning. The project sits at the intersection of navigation, AI-enhanced signal and data analysis, and wireless communication systems, with applications in
-
. SENSS offers high-calibre supervision, driven by our members’ emphasis on formal training and research culture. For further information about SENSS, please visit the SENSS website About CAM-DTP The CAM
-
-Performance Computing and Future Data Centres AI-Optimized Electronics for Edge and Cloud AI Acceleration – Investigate AI-enhanced data centre electronics, optimizing workload distribution, energy efficiency
-
offshore renewable energy. Access to digital twin modelling platforms, metocean data tools, and human simulation models. Support for publishing in journals and presenting at conferences in human factors and
-
academia and industry. Uncover and quantify critical degradation mechanisms to inform the design of next-generation fusion materials. Translate sophisticated scientific data into impactful insights through
-
to inform the design of next-generation fusion materials. Translate sophisticated scientific data into impactful insights through clear communication to diverse audiences, including industry stakeholders and
-
significantly to the current body of knowledge. This experience will equip you with valuable research skills, including methodologies, data analysis, and critical thinking, highly sought after in both academic
-
for more information. •30 September 2024 •27 January 2025 •2 June 2025 •29 September 2025 We highly recommend you prepare the following information, as this will be requested at the application stage. Your
-
reliability and maintenance strategies. Filter Rig: An experimental setup to study filter clogging phenomena, allowing for the collection of data to develop and validate prognostic models for filter
-
mitigating jamming and spoofing threats in real-time. Integration of Trusted Execution Environments (TEEs): Investigate the use of TEEs to create secure zones within embedded systems, facilitating secure data