23 post-doc-image-processing positions at Singapore University of Technology & Design
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
treatment, AI and humans brainstorm, spar and prototype together, resulting in solutions that are elevated several-fold. This human-AI team concept has been made possible because of SUTD’s unique cohort-based
-
, fabrication and characterization. The below key responsibilities may be adjusted according to the shortlisted candidates’ technical strengths: Device Design & Fabrication: Develop and prototype textile-based
-
given - Perform microscopy and nanodevice analysis Program and design PLC systems Apply Computer Vision for machine hardware feedback and control Generate technical reports, white papers, and
-
, AI and humans brainstorm, spar and prototype together, resulting in solutions that are elevated several-fold. This human-AI team concept has been made possible because of SUTD’s unique cohort-based
-
bonding activities) for the group, including booking of venue, arrangement of food and beverage (F&B), and other logistics such as furniture and audio-visual equipment. Compile and process the group members
-
microelectronics / materials science / electronic materials as well as experience in applying AI / machine learning techniques (both data and image-based) on interesting use cases as well as strong programming
-
The job holder will be responsible to provide secretariat support to the SUTD Institutional Review Board (SUTD-IRB). This role involves managing the review and approval process for human biomedical and
-
on the services of the TTO and Technology Disclosure process. Coordinate the submission of Technology Disclosures (TDs) by the SUTD community, perform preliminary assessments of the TDs, leveraging on analysis
-
workflows and SmartForms, and a keen interest or experience in Artificial Intelligence (AI). The ideal candidate will be responsible for developing and maintaining automated business process applications
-
The role is primarily responsible for information security operation which encompass managing security tools such as privilege access monitoring and vulnerability assessment technologies. The role