Tapis

Carian terbaru saya
Tapis melalui:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    12,309 detection tugasan ditemui, harga dalam USD
    face detection Tamat left

    matlab

    $139 (Avg Bid)
    $139 Avg Bida
    5 bida

    hi friend i have hire freelance from fivver to develop for me python ml script that will ...for sample . he said that i have to use powerful cloud hosting with strong gpu. i want to concluse with you is it possible to achieve true live video cleavage body parts detection and automatically blurring this frames? maybe with google cloud vision.. thanks

    $2 / hr (Avg Bid)
    $2 / hr Avg Bida
    1 bida

    ...and design calculations. the scope included lighting, Small Power Distribution, HVAC Telecom: Telephony & Ethernet, Security System: Intrusion detection @ windows + Movement Detection @ patio, F&G detection System. the apartment is around 95sqm and having mainly kitchen, living room+dining space, 2 bedrooms, toilette, bathroom, entrance + corridor and

    $435 (Avg Bid)
    $435 Avg Bida
    9 bida

    Our initial intention was to implement a delay and stuck at fault detection system for a 32-bit AVR microcontroller. Starting from a configuration involving professional J-Link EDU equipment, we would check the White-box testing algorithm for the solar tracker by placing breakpoints and watch points inside the code to monitor changes in the registries

    $373 (Avg Bid)
    $373 Avg Bida
    8 bida

    ...installation services and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on

    $586 (Avg Bid)
    $586 Avg Bida
    36 bida

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [log masuk untuk melihat URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time. So, the whole idea would be tha...

    $10 - $30
    $10 - $30
    0 bida

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [log masuk untuk melihat URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time.   So, the whole idea woul...

    $14 (Avg Bid)
    $14 Avg Bida
    1 bida

    we aim to develop a machine learning method in email spam detection. The project is between 2018.12.08---2018.12.31 We hope the candidate have good programming capability and excellent at research writing.

    $1344 (Avg Bid)
    $1344 Avg Bida
    25 bida

    Just a basic indoor positioning system app which will help me manually make a floor map with the help of wifi fingerprinting and magnetic field detection and show just two functions which is locate me and directions to a position.

    $132 (Avg Bid)
    $132 Avg Bida
    9 bida

    ...Register User Reference Face Detection Photo: - User Access Code - Capture Face Detection Image from Device Cam - Submit: will be save captured Photo in User record @DB according to user Access Code. ————————————- Main View: - First Screen : User Type his Access Code. The following appear: 1. Real Time P...

    $550 (Avg Bid)
    $550 Avg Bida
    1 bida

    Hi, i want to create website for photo uploading and finding website should have following fea...c1)project uploader can upload photo c2)user can upload his photo and object (u need to call php program to find photo) and will explain to person who wants to bilt remember face detection and other is my work u r just creating website and calling function

    $41 (Avg Bid)
    $41 Avg Bida
    8 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    hello~ i'm Bo from Korea. If you see the photo 1.PNG. There are letters and numbers which is '5 2 d 8' and i have to click them!. But numbers in order first and then letters in order. For example) there are '5 2 d 8' in photo [log masuk untuk melihat URL] The correct answer is i have to click '2 5 8 d' in order. So the correct ans...

    $500 (Avg Bid)
    $500 Avg Bida
    13 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...Hydraulic Calculations 4. HVAC Load Computations 5. Energy Analysis 6. Solar design (I have the calculation) 7. Duct Design 8. 4D information modeling using Navisworks + Clash detection ...

    $298 (Avg Bid)
    $298 Avg Bida
    20 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $251 (Avg Bid)
    $251 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $568 (Avg Bid)
    $568 Avg Bida
    1 bida

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    $555 (Avg Bid)
    $555 Avg Bida
    1 bida

    ...Creates a random pixels icon Assembly Cloner - Cloned Assembly is a Perfect match File Binder - Supports any file format + Compression Anti Memory Scanner - Prevent memory detection for .net files Private stub - Gives Long Fud time, upto 3 weeks Silent execution - Does not trigger UAC or any annoying Black window Persistence - Guards the injection process

    $541 (Avg Bid)
    $541 Avg Bida
    4 bida

    ...that simulates a limited real world scenario with interactions such as : - Ability for objects to follow paths - Gravity affecting objects of differing mass - Collision detection and notification - Objects on paths responding to other objects signals on the paths - Continual logging of all positions of objects and their interactions - Ability to control

    $34 / hr (Avg Bid)
    $34 / hr Avg Bida
    27 bida

    ...implement the radon transform for line detection in OpenCV C++. Following is the reference paper: A FAST DISCRETE APPROXIMATION ALGORITHM FOR THE RADON TRANSFORM by MARTIN L. BRADY The final implementation will be a modified version of the discrete radon transform using dynamic programming for line detection. Check the attached folder for sample code

    $156 (Avg Bid)
    $156 Avg Bida
    8 bida

    ...an engineer and a computer science expert experienced in computer vision machine learning, Artificial intelligence and deep learning and its applications in facial & face detection to design and develop a commercial software. The commercial software will be using Artificial intelligence and deep learning in detecting faces, including at what time, the

    $616 (Avg Bid)
    $616 Avg Bida
    10 bida

    Hi I am looking for a Object detection, recognition and segmentation of vehicles in ANPR problem using deep learning models. In that we can use [log masuk untuk melihat URL] dataset for our work. So will it be possible for you

    $5 / hr (Avg Bid)
    $5 / hr Avg Bida
    7 bida
    Trophy icon Design logo 3 hari left

    Design a logo for “Proactive Health Detection”. The logo should use the letters “PHD”. This is a new medical device that collects biometric data.

    $50 (Avg Bid)
    $50
    26 penyertaan

    ...assignment you can use any Dataset from Kaggle. In many real-life Data Analytic/Mining cases we focus on to identify outliers. For example; network intrusion detection or bank fraud detection. Find a similar field that we look for outliers. Work on a dataset that main focus is to identify outliers. Original fields will be rewarded with extra points

    $100 (Avg Bid)
    $100 Avg Bida
    1 bida

    I want you to write a small report on malware detection All the necessary documents and links for reference will be provided

    $22 (Avg Bid)
    $22 Avg Bida
    12 bida

    Technical Specifications  Electrical input: 2 flow (pulse) - 10Hz, 6 ana...hour in defined increments o Data storage: Rotating store.  Alarm Dial-Out: o Programmable high and low flow rate, Pressure and daily consumption alarms. o Alarm on tamper detection. o Low battery alarm.  Environmental: o Operating ambient temperature: -30°C to +60°C

    $2 - $8 / hr
    Sulit
    $2 - $8 / hr
    3 bida

    Artikel Komuniti detection Teratas