Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
project, co-funded by the Innovation Fund Denmark and the Department of Management, Aarhus BSS, Aarhus University. Candidate profile We are seeking applicants with strong knowledge of data analytics and
-
in working with large data sets and the development of numerical models. Basic knowledge of glaciology or geodesy. Good expertise in programming, e.g. in Python, MATLAB, or other high-level programming
-
a profound knowledge on the majority of the following topics: Robot control Reinforcement learning Simulation of robot dynamics Deployment of learning-based solutions Preferably, the candidate has
-
. The trained Doctoral Candidates will be able to convert knowledge and ideas into new products, and services for economic and social benefit. DTU is a leading technical university globally recognized
-
scientific research and innovation. The Villum Young Investigator grant signifies a commitment to advancing knowledge and innovation in the field of Power-to-X systems. It provides a robust support structure
-
hardware description language such as Chisel, VDHL, or Verilog. Knowing Chisel is a bonus. Knowledge of real-time systems System programming in C You must have a two-year master's degree (120 ECTS points
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background
-
conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures. Therefore, based on information from open sources, background
-
Electrical Engineering, Semiconductor Physics, Materials Science, or a related field. Basic knowledge of semiconductor device physics, preferably wide-bandgap materials (e.g., GaN). Experience or coursework in
-
, regardless of personal background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures