The project consists of building a machine learning algorithm that is capable of : (1) being trained (2) detecting TCP/IP packets with anomalies (3) classifying the packets with anomalies into classes/categories *** TCP/IP skills are necessary ***
Work Description: Based on a designed model and algorithm freelancer must be capable to modify and implement MATLAB code accurately. Freelancer should have knowledge on GA, Swarm etc. algorithms. Freelancer having idea about the Light Scattering and its basic principle will be preferred. Mathematically and statistically skilled personnel are encouraged
I am looking for a person able to help me with algorithms of operation research. Some skills required are: graph optimization, critical path method for project scheduling, good knowledge of linear programming, Gomory cuts etc etc. For more details please contact me!
Thank you for reading my work proposal i would like to get help to complete my first mini project on data analysis using unsupervised machine learning algorithm . The data needs to go under Pre-processing tasks: Data Cleaning Data Exploration Feature Engineering Feature Transformation (Feature Engineering) Feature Selection and Model Building Dataset
In this project I need to optimize the code for Groestl miner VCU 1525 to smaller FPGA (Artix-7 XC7A200T). Groestl will be slightly modified and this modification w...com/sprocket-fpga/FPGA_Mining_AWS) You'll need to adjust the mining program for control and run on Linux (Raspberry Board). I also want to switch the miner to another PHI 1612 algorithm.
...rigorous programming environment excites you, send us your resume. Required skills, experience and traits - Strong computer science fundamentals in design, data structures, algorithm design, problem solving, and complex analysis - Expertise in developing ReactJS applications - Experience with high volume applications preferred - More than 3 years of work
A Class report is a report to describe a cryptography algorithm, this report focuses on the algorithms mechanism and an example to explain the mechanism. The report covers one of the following: Lattice-Based Cryptography (You need to go through Vector Space first) Quantum Cryptography Post-quantum Cryptography Blowfish Twofish MARS DEAL, a Feistel
Looking for an algorithm that does clothing recognition and segmentation in images for 3 classes: tops (top half of clothing), bottoms (bottom half of clothing), and dresses (full body clothing). You should have experience working on these types of problems. Remember it's not just detection but segmentation that matters. so bounding boxes is not
...preferences Swipe to Accept/Decline/Chat Summarize each flash card activity Secured Real Time Chat feature Notifications/Feeds Geopositioning Great UI Better Match Making Algorithm Social Shares Navigation to Other Users Gamification Free Paid Memberships Location Search Multi-Lingual Behavior Analysis Acquaintance Representation GeoTagging Completely
Looking at a way to build a programme which could do valuation on companies automatically from a list. From there, find a way to effectively rank the companies based on the financials, industry trends etc.
I am working to do Matlab code to optimize the Trailing Edge of the airfoil using the formula of a numerical model. a n...Trailing Edge of the airfoil using the formula of a numerical model. a non-linear objective function and non-equal constraints (upper and lower). I am trying to use GRG algorithm and also fmincon in optimization app(in Matlab).
I need a Java programmer to implement the algorithms in the planning main to [login to view URL] file in the [login to view URL] file provided in the attached files of the project and generate the same results included in the paper .more details are attached to this project
...can create an iRule to generate a password that will be submitted to Guacamole that can match some pre-created users in Guacamole that have passwords that use a matching algorithm to create them and have been pre-populated into the Guacamole database. I just need help in getting two parts of this working: the submission of the password into guacamole
Take a sample of Plain text, encrypt this plaintext step by step using AES, you must show each step how it has been done with all tables and codes, till you generate the Ciphertext. the reverse your work step by step until you generate the Plaintext Your plaintext is: “Here you can encrypt a block of bytes with a key using the popular Advanced Encryption Standard cipher” . All the in...
I have the algorithm. Need help for MATLAB coding Prefer freelancer who can do in 6days. Sample algorithm is attached as [login to view URL] optimal scheduling of hydro-thermal wind power plant using information gap decision theory to deal with wind power uncertainty my objective function is to minimise the fuel cost of the thermal power plant by make a robust
...presence/following online, specifically in Quebec Canada. I am open to influencers from all corners of the industry: doctors, medical patients, musicians and DJs, investment bankers, bloggers, podcasters, stay at home moms, old people, chefs, retired police officers etc etc. I would prefer to have influencers who have something to say about cannabis and