Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Employer
-
Field
-
trustworthy AI for science. At Eindhoven University of Technology (TU/e), you will contribute to the project’s core technical components: scientific data orchestration and knowledge graphs architecture and
-
to translate emerging technologies into practical solutions with societal impact. You have: A MSc in Computer Science or a closely related field A strong background in software engineering and data architecture
-
requirements should be implemented; design and propose architecture and operations concepts and propose recommendations on the most promising technologies that should be leveraged; prototype software
-
to completion, including milestones and reviews, on the segment and element procurement processes where new technologies and modern software technologies applicable to the ground segment play a major role
-
Systems, or related background and strong hardware design skills. Strong background in computer architecture, digital design, and real-time systems. Knowledge of embedded systems and hardware/software co
-
software systems engineering, the Section works with young professionals, researchers and students at universities. Through its diverse setup, the Section handles tasks ranging from technical infrastructure
-
required. Technical competencies Knowledge and experience of satellite ground navigation systems and security monitoring systems, including their operations, architecture and implementation Solid experience
-
, crypto, hardware and software security, link and data protection, frameworks, processes, vulnerability assessment, and countermeasures at system, element and application levels, including AI and quantum
-
hyperspectral — to support early warning, strategic situational awareness and the monitoring of emerging risks. A key focus of the fellowship will be the development of explainable AI architectures capable not
-
responsibility. Technical competencies Knowledge and experience of satellite ground navigation systems, cyber security and security monitoring systems, including their operations, architecture and implementation