Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
Algorithms of Pursuit søk stillingen se annonse This is NTNU NTNU is a broad-based university with a technical-scientific profile and a focus in professional education. The university is located in three
-
in the Phi_Lab, led by Dr. Azeem Ahmad, and will focus on the development of advanced reconstruction algorithms and next-generation quantitative optical microscopy and tomography systems for imaging
-
of Physics and Technology . The position will be hosted in the Phi_Lab, led by Dr. Azeem Ahmad, and will focus on the development of advanced reconstruction algorithms and next-generation quantitative optical
-
operationally safe position in real-time. This research focuses on real-time multi-objective optimization of wells, that may be achieved with a mixture of algorithmic and machine-learning approaches. Updating
-
of cryptographic algorithms through solving polynomial systems of equations. It is crucial for building confidence in quantum safe cryptography, as well as novel symmetric encryption algorithms designed for use with
-
the Department). About the project/work tasks Algebraic cryptanalysis examines the security of cryptographic algorithms through solving polynomial systems of equations. It is crucial for building confidence in
-
topics, in collaboration with the rest of the team: Develop and apply evolutionary algorithms to jointly optimize both the robot’s morphology and autonomy, and apply quality-diversity methods to discover a
-
particular focus on developing fundamental AI algorithms and methods that can be used in systems for real-time creative and artistic settings. The candidate will be part of a team that creates algorithms
-
. Any appointment is conditional upon submission of documentation confirming completion of the PhD degree. solid programming skills applied to machine learning algorithms, interactive systems, audio and
-
developed countries, smartphone penetration exceeds 80%. The automatic transport mode detection (TMD), when effectively exploited, possibly using some kind of machine learning algorithm, provides more