38 assistant-professor-computer-science-data "https:" "https:" "https:" "https:" "Dr" "St" "St" PhD positions at Cranfield University
Sort by
Refine Your Search
-
Researchers Core Development programme (transferable skills training), provide those studying a research degree with a wealth of social and networking opportunities. How to apply For further information please
-
groundwater ecosystems. To find more information on the programme, please see the official CONNECT website. At a glance Application deadline25 Feb 2026 Award type(s)PhD Start date28 Sep 2026 Duration of award4
-
. The project focuses on power-aware computing, thermal optimization, and sustainable electronic design, targeting critical applications in aerospace, healthcare, and industrial automation. Hosted by the renowned
-
commercial models that may best support this transition. In doing so, the research will assist airports in their long-term development strategies and support them in planning for the introduction of hydrogen
-
, finance, and healthcare, where data integrity and system reliability are non-negotiable. This PhD project addresses the integration of robust security measures within AI-enabled electronic systems
-
second class UK honours degree or equivalent in a related discipline. This project would suit students with an aerospace or mechanical engineering background. Experience of computational fluid dynamics
-
opportunities. How to apply For further information please contact: Name: Professor Saba Al-Rubaye Email: s.alrubaye@cranfield.ac.uk If you are eligible to apply for this studentship, please complete the online
-
infrastructure. This project sits at the interface of environmental engineering, water quality management, and sustainable infrastructure. This PhD project will explore how ICWs can be strengthened through design
-
are part of the programme. Entry requirements Applicants should have a first or second class UK honours degree or equivalent in a related discipline. This project would suit students with an aerospace
-
mitigating jamming and spoofing threats in real-time. Integration of Trusted Execution Environments (TEEs): Investigate the use of TEEs to create secure zones within embedded systems, facilitating secure data