Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    3,986 data evaluation jobs fundet, i prisklassen EUR

    ...company CCL Design Munich are developing a QA-Software via PHP/HTML/MySQL and we need to evaluate data from our database. It should be visible as a bar / pie chart (whichever the user chooses) and it should be possible to filter and search for certain data. You can use PHP 7, HTML 5, MySQL and Javascript for development. If you have any questions or

    €169 (Avg Bid)
    €169 Gns Bud
    28 bud

    ...be composed a database, forms for entering data into the database, and reports. I have a previous experience with Microsoft Access, and I would like to implement the system using this software. I am attaching a detailed description of the required accounting system. In addition, I am attaching an Evaluation form with Questions. Please answer the questions

    €496 (Avg Bid)
    €496 Gns Bud
    38 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ARM firmware with LINUX for DE10-Nano board A. Play with the evaluation board 1. Project Owner will provide a P0496 ARM Processor base on Cyclone V SE FPGA computer board (DE10-Nano board). The board will have Ethernet port and SD card. 2. Developer needs to prepare LINUX Kernel to run on embedded computer board with Ethernet TCP/IP to connect with

    €3583 (Avg Bid)
    €3583 Gns Bud
    21 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €502 (Avg Bid)
    €502 Gns Bud
    1 bud

    ...firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating conditions. During this training

    €490 (Avg Bid)
    €490 Gns Bud
    1 bud

    ...their proposals. E-AWARDING Supports the opening and evaluation of tenders, in line with the related legal regulations. The proposals evaluation is achieved with the use of the established methods (Most Financially Profitable Proposal or according to the Lowest Price criterion), while the evaluation procedure can include the conducting of e-Auctions.

    €973 (Avg Bid)
    €973 Gns Bud
    20 bud

    ...techniques discussed in class and covered by the textbook are strongly encouraged, and speculative or indicative data is permitted. Your assignment should illustrate the application of techniques in areas such as: 1. Project Selection and Evaluation Methods 2. Work Breakdown Structures, 3. Planning techniques such as Gantt Charts or the Critical Path

    €153 (Avg Bid)
    €153 Gns Bud
    37 bud

    need code to get results of implementation for this topic Evaluation of core-loss ignorance in induction machine 1)parameters identification (regression):by matlab optimization algorithm -with core loss -without core loss 2)modeling of IM: Matlab for differential equations solutions 3)comparison for different conditions: max budget 100$

    €145 (Avg Bid)
    €145 Gns Bud
    10 bud

    I need the data miner expert in Matlab - Should know - decision. Trees and K means I need the report + power point by using this structure - Title - Authors - Abstract - Introduction - Data pre-processing - Data mining methods - Model evaluation - Conclusion - Reference - Appendix The report could be 7 max pages Need this to be done as soon as possible

    €64 (Avg Bid)
    €64 Gns Bud
    1 bud

    I need the data miner expert in Matlab - Should know - decision. Trees and K means I need the report + power point by using this structure - Title - Authors - Abstract - Introduction - Data pre-processing - Data mining methods - Model evaluation - Conclusion - Reference - Appendix The report could be 7 max pages Need this to be done as soon as possible

    €64 (Avg Bid)
    €64 Gns Bud
    2 bud

    I need the data miner expert in Matlab - Should know - decision. Trees and K means I need the report + power point by using this structure - Title - Authors - Abstract - Introduction - Data pre-processing - Data mining methods - Model evaluation - Conclusion - Reference - Appendix The report could be 7 max pages Need this to be done as soon as possible

    €67 (Avg Bid)
    €67 Gns Bud
    2 bud

    I need the data miner expert in Matlab - Should know - decision. Trees and K means I need the report + power point by using this structure - Title - Authors - Abstract - Introduction - Data pre-processing - Data mining methods - Model evaluation - Conclusion - Reference - Appendix The report could be 7 max pages Need this to be done as soon as possible

    €64 (Avg Bid)
    €64 Gns Bud
    5 bud

    Need to map Supplier Evaluation Configuration in S4 Hana 1709

    SAP
    €8 / hr (Avg Bid)
    €8 / hr Gns Bud
    3 bud

    Research on management and evaluation of logistics service providers.

    €24 (Avg Bid)
    €24 Gns Bud
    11 bud

    ...Projected mechanical results, -----> Thermophysical properties, or -----> Recent experimental data Additionally, the review committee will have interest in: - Projected material cost; - Potential supply chain; - Target applications EVALUATION CRITERIA - Innovation (35/100): Degree to which proposed concept does not currently

    €2825 (Avg Bid)
    Fremhævet Haster Garanteret Forseglet Topkonkurrence
    €2825
    2 indlæg

    ...PHP tool that retrieves data via Google Adwords API and saves the data into a MySQL database for further statistical evaluation. The tool should be able to retrieve the reporting data from multiple Adwords accounts, and we should be able to add them via Adwords account number. In a defined interval: After retrieving the data via Adwords API the tool

    €210 (Avg Bid)
    €210 Gns Bud
    15 bud

    ...(RDC) - model construction for the linear model, BIC stepwise, and LASSO with corresponding evaluation metrics RDC code can be found here: [log ind for at se URL] We have uploaded the exact data to produce these results. It is important to bring this data into a Pandas dataframe, as that is our preference. All these outputs should be provided

    €61 (Avg Bid)
    €61 Gns Bud
    8 bud

    • Input data: Lidar data (point clouds), sensor calibration parameters. • Output: highlighted road • Evaluation: visually • Suggested main steps: • Use a prior knowledge of road position. • Use RANSAC to find planes. • Select the most probable one. for the dataset you download it from the site: [log ind for at se URL] with

    €351 (Avg Bid)
    €351 Gns Bud
    3 bud
    Website evaluation Udløbet left

    Evaluation of my website by Alexa

    €23 (Avg Bid)
    €23 Gns Bud
    3 bud

    ...return B as an IP Disconnect from access destination and perform rotation only between ACDE. 6. API linkage with database A database that automatically captures and updates the data collected by the scraping tool · Automatically update the database by placing it on the cloud. Delivery hope in the state where it can operate immediately · Since the number

    €405 (Avg Bid)
    €405 Gns Bud
    14 bud

    Analysing the finances of a business

    €162 (Avg Bid)
    €162 Gns Bud
    55 bud

    Set up a DB cluster (using Big Data) and perform an experimental evaluation of the technology (MySQL, Oracle) CHAPTERS - System setup and configuration - Experimental evaluation, including environment setup and experimental setup. - Conclusions REQUIREMENTS ▪The whole experiment should be described step by step including the difficulties, problems

    €95 (Avg Bid)
    €95 Gns Bud
    5 bud

    Our game report sheets (PDF) are to be evaluated. For this, the results (points, fouls, players, et...(points, fouls, players, etc.) are transferred to an Excel file. It's about a total of 312 games. More than 120 score sheets are already available. From January we need the evaluation every Monday, every Sunday evening all sheets are available as PDF.

    €383 (Avg Bid)
    €383 Gns Bud
    42 bud

    Product tester/product evaluation JOB DESCRIPTION: *Use and evaluate the product you received in your free time. * You will be assessing a wide range of products, such as household appliances, electronic products, office supplies, sports supplies, kitchen supplies etc. MAJOR RESPONSIBILITIES: * Use the product correctly and experience the performance

    €26 (Avg Bid)
    €26 Gns Bud
    2 bud