Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Employer
-
Field
-
queries within embedded knowledge graphs. It will involve designing or adapting efficient indexing structures tailored for vector databases and exploring hybrid neurosymbolic techniques to enhance query
-
approaches based on antibiotic vectorization for the destruction of bacterial biofilms. The general aim of this project is to characterize the relationship between the intensity and type of ultrasonic
-
Climate change impacts on human health through a multitude of pathways, leading to a range of negative health outcomes, such as heat stroke, cardiovascular issues, PTSD, asthma, and vector-borne
-
Gene expression modulation CRISPR/Cas9 (including knock-out, knock-in, CRISPRa, CRISPRi, viral vector systems) Next-generation sequencing (RNA-, ATAC-, ChIP-Seq, CUT&RUN, Hi-C and others) Pulldown and
-
programming (Matlab and/or IgorPro). Experience using and programming ImageJ or another image analysis software. Molecular biology and/or experience with the use of viral vectors is a plus. Online Application
-
area with several hundred currently in various stages of development. Many of these are based on using recombinant Adeno-associated virus (rAAV) as a delivery vector. If even a small portion of them
-
at the Faculty of Mathematics at TUD. Tasks: generation of hyper uniform patterns (point, scalar and vector fields) application of topological data analysis tools such as persistent homology and graph statistics
-
programming and know how to use version control. ▪ You are experienced in the usage of machine learning (e.g., Actor-critic algorithms, deep neural networks, support vector machines, unsupervised learning
-
construct novel CAR-T cell therapies, including vector design, gene editing, and the development of innovative receptor constructs. In Vitro and In Vivo Studies: Conduct a wide range of experiments to assess
-
become experts in hardware-based trust mechanisms, secure AI integration, and attack resilience. The experience of working with real attack vectors, cryptographic primitives, and tamper-evident