Sort by
Refine Your Search
-
Intelligence (AI) services in Internet of Things (IoT) networks, where latency and timeliness are paramount. The successful candidate will be responsible for the end-to-end investigation of novel edge-assisted
-
Artificial Intelligence (AI) services in Internet of Things (IoT) networks, where latency and timeliness are paramount. The successful candidate will be responsible for the end-to-end investigation of novel
-
the Infocomm Technology cluster at SIT. This project addresses the critical challenge of delivering real-time Artificial Intelligence (AI) services in Internet of Things (IoT) networks, where latency and
-
off-chain data integrity. Implement TEE-based off-chain computation for confidential transaction execution. Integrate blockchain with IoT devices, metering systems, and energy assets for real-time
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
. • Familiarity with reinforcement learning and more generally machine learning. • Experience with communication protocols such as LoRaWAN, Zigbee, BACnet, Modbus, and IoT integration using MQTT and RESTful APIs
-
Description of Post The WiSAR Lab and Technology Gateway is a successful and innovative industry facing research centre, focused on the research and development of wireless systems including IoT
-
have expertise in one or more of the following areas: Sustainable building systems or materials science Power system modeling, control systems, or HVAC alternatives IoT and sensor networks in the built
-
factors, and data provenance. o Develop data pipelines integrating BIM/IFC, schedules (4D), IoT/telemetry, procurement/ERP, and emissions factor databases. • Analytics and optimization o Apply data
-
. Supported Areas for START - Infocomm Technology Information Security: Mobile security, cyber-physical systems, IoT security, security analytics, operational cybersecurity, digital forensics, vulnerability