Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
world. You will find more information about working at NTNU and the application process here. About the position Studies of phase formation, evolution of microstructure and casting defects in high
-
The molecular biosciences are undergoing a major paradigm shift – away from analysing individual genes and proteins to studying large molecular machines and cellular pathways, with the ultimate goal
-
application process here. About the Job We have a vacancy for a reseearcher at Department of Information Security and Communication Technology (IIK) Campus Gjøvik. The IIK Department is proud to announce
-
» Programming Engineering » Computer engineering Computer science Researcher Profile First Stage Researcher (R1) Positions PhD Positions Application Deadline 26 Apr 2026 - 23:59 (Europe/Oslo) Country Norway Type
-
the development of the adolescent brain. As one of the first in the world, she has been systematically monitoring adolescents, their lifestyle and the neurological processes in their brains on a long-term basis
-
AI techniques for damage analysis in advanced composite materials due to high velocity impacts - PhD
developed a dataset by conducting high-velocity impact experiments on CFRP specimens using controlled testing setups. The multimodal dataset is to be processed using X-ray CT scans, SEM imaging, and
-
NTNU and the application process here. ... (Video unable to load from YouTube. Accept cookie and refresh page to watch video, or click here to open video) About the position A central challenge in
-
to create knowledge for a better world. You will find more information about working at NTNU and the application process here. About the position At the Department of Design at NTNU we educate designers with
-
employees and 43,000 students work to create knowledge for a better world. You will find more information about working at NTNU and the application process here. ... (Video unable to load from YouTube. Accept
-
for image classification and other domains against existing open source LLM (e.g., Llama 3, Phi-3), as well as develop new kinds of attacks, for example based on evolutionary algorithms. 2. Investigate