303 parallel-computing-numerical-methods "https:" positions at Oak Ridge National Laboratory
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
transmission construction and maintenance methods, perform tasks associated with the position. Install and remove poles, towers, and structures. Install and change transformers. Install and maintain underground
-
detection, and power grid waveform analytics. You will apply methods traditionally used in wireless communications and signal intelligence — including time-frequency analysis, interference modeling, multi
-
radiological facilities. Utilize Windows based personal computers, instrumentation operation, data reporting, analytical calculations, and sample management. Ensure compliance with environment, safety, health
-
work closely with the ORNL Isotope and Enrichment Project Director and the Infrastructure Program Manager within ISED. ORNL is the largest DOE science and energy laboratory, conducting basic and applied
-
control methods to optimize pellet-fueled plasma scenarios. These studies will primarily be conducted on the Wendelstein 7-X stellarator located in Greifswald, Germany. This position is located at Oak Ridge
-
control methods to optimize pellet-fueled plasma scenarios. These studies will primarily be conducted on the Wendelstein 7-X stellarator located in Greifswald, Germany. This position is located at Oak Ridge
-
methods towards improving our understanding of unique target materials. You will be working with scientists, engineers, technicians, and safety and quality assurance staff to support material testing and
-
Postdoctoral Research Associate in the areas Artificial Intelligence (AI) for Integrated Hydrology Modeling. The successful candidate will have a strong background in computational science, data analysis, and
-
manufacturing of polymer composites for industrially relevant applications Lead research in composite joining technologies, with emphasis on ultrasonic welding and advanced joining methods Support scale-up
-
on-site execution of program security requirements for assigned Special Access Program (SAP) program(s), to include designing and successfully conducting a security program which ensures compliance with