Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
experimentation with Asst. Prof. Eli N. Weinstein. Your goal will be to develop fundamental algorithmic techniques to overcome critical bottlenecks on data scale and quality, enabling scientists to gather vastly
-
on developing and demonstrating a modular, containerized fuel cell system capable of dual-fuel operation with either hydrogen or methanol. The system aims to provide electrical power to critical infrastructure
-
for dynamic simulations of renewable power systems, addressing critical challenges in stability and dynamics. Specifically, the aim of this position is to develop comprehensive guidelines for verifying and
-
. Completing courses and training required for being awarded the PhD degree. Design and perform strain engineering works in Bacillus. Perform OMICS data analysis, especially RNAseq analysis. Specific
-
of diverse teams with multiple technical and theoretical expertise. Applicable responsibilities for both positions: You are expected to be able to organize and perform your own experiments, and critically
-
collaborate closely with a postdoctoral researcher responsible for in-situ fatigue testing under corrosive environments, and will participate in the 4D (x,y,z,time) analysis of the AM microstructure and crack
-
hands-on experience in molecular cloning, cell culture systems, mouse models, and interest in liver disease biology. Experience with R or Python and the computational analysis of next-generation
-
ethnic background are encouraged to apply. As DTU works with research in critical technology, which is subject to special rules for security and export control, open-source background checks may be
-
on conventional computing platforms such as GPUs, CPUs and TPUs. As language models become essential tools in society, there is a critical need to optimize their inference for edge and embedded systems
-
, regardless of personal background, to apply for the position. SDU conducts research in critical technologies, which, due to the risk of unwanted knowledge transfer, are subject to a number of security measures