Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Field
-
for monitoring people’s health. You will focus on developing new solutions, electronics, algorithms and methods to assist individuals, physicians and sports coaches to effortlessly and continuously monitor health
-
program integrates the study of wireless networking, protocols, sensor networks, security, software development, embedded systems, data analytics, and big data to provide students with the knowledge and
-
researcher to join our dynamic animal science and artificial intelligence team. The candidate will develop novel algorithms that advance the use of computer vision in precision livestock farming (PLF) and
-
for advancements in critical DoD areas, such as integrated hypersonics, directed energy, advanced materials, trusted AI and autonomy, robotics, FutureG, human-machine interfaces, and integrated sensors. We
-
, micro and nano sensors, and actuators with interfaces for communication. Fraunhofer ENAS develops individual components, the technologies for their production, as well as system concepts and system
-
water sensor at the molecular level. Our measurement techniques and numerical models based on constrained regularization algorithms allow us to link these measurements with other techniques including
-
combine electronic components, micro and nano sensors and actuators with interfaces for communication. Fraunhofer ENAS develops individual components, the technologies for their production as well as system
-
, path finding and routing algorithms, sense of direction, human computer interaction, cognitive navigation, intelligent mobility, and artificial intelligence. Sensor fusion and Signals of Opportunity We
-
-acquisition circuitry, and signal-processing/pattern-recognition algorithms. The sensors must be tailored for the particular nature of a given chemical or biochemical measurement problem by optimizing and
-
Sonmez Turan meltem.turan@nist.gov 301.975.4391 Description NIST standardized cryptographic algorithms are intended to be "bulletproof". That is, the computational complexity needed to break them is