Sort by
Refine Your Search
-
on the following topics (but not limited to): Quantum Cryptography IoT Security Blockchain Key duties: The Postdoctoral researcher will be expected to: Publish in high impact journals in the field. Participate
-
several major areas that aim to ensure the challenging Food and Water security goal in Africa, with a special focus on developing methods/tools that use multi-source remotely sensed data. The research aims
-
to improve disease management and animal productivity. Writing research proposals and securing external funding to support the Animal, Veterinary, and Food Science Research Group research projects. Publishing
-
with cloud-based computing platforms (AWS, Azure, Google Cloud) and high-performance computing (HPC) environments. Understanding of data privacy, security, and ethical considerations in handling clinical
-
terms of research and education, covering all aspects of computer science, including but not limited to algorithms, databases, cloud computing, machine learning, operating systems and security. Jobs
-
of Cryptography, Computer security or any related field. Strong publication record in high impact conferences / journals. Very good programming skills (e.g., C, C++, Python), familiarity with Linux. Proficiency in
-
on creating and optimizing state-of-charge (SOC) and state-of-health (SOH) prediction models to ensure the safety, efficiency, and longevity of lithium iron phosphate (LFP) batteries. Key Responsibilities
-
or related fields. Experience in securing research funding through grants, contracts, or collaborations, Demonstrated collaboration with peers at national and international levels, Thorough understanding
-
. Strong analytical and problem-solving skills, including the ability to interpret and analyze simulation and/or experiment results. Familiarity with safety protocols and quality control measures in
-
communications-related performance metrics were considered, such as reliability, connectivity, throughput, delay, network lifetime, power efficiency, and security. In the literature, WSN design is typically