i need to work on fusion algorithms and fractional wavelets for images in medical domain. Anyone who is expert and can work immediately get in touch. Need people from INDIA preferably. More details on chat I shall.
Need a copywriter in english to write the descriptions of apartments and houses in differents platforms. Exper...platforms. Experienced in Airbnb, VRBO. homeway marketing, social media marketing for vacation rental apartments/houses. Knowledge in Airbnb , homeway and other platforms algorithms, ranking. Will provide all the informations and pictures.
...run, 75 c$ :after out put result and testing. Last step (output and testing): maybe need two weeks to four weeks. Deadline: August 10, 2018. ORL database Implement below algorithms by python (version 3.6 or 3.5) 1- CNN : attach paper help you. 2- Alex Net : the link below help you . [log ind for at se URL]~guerzhoy/tf_alexnet/ [log ind for at se URL]
To implement Naive bayes, Decision trees, svm, k-means and Gaussian mixture models algorithms on 2 datasets without using inbuilt functions in R language and finally calculate accuracy, sensitivity, precision for those prediction algorithms.
...a key market for daily user engagement. We are looking for a News Analyst to gather, update, categorize and analyze our daily news content to extract trends and serve our algorithms and News product. You will report to a Product Manager leading News. You should also be comfortable working with little supervision to meet multiple deadlines each day.
Need to implement ECDSA algorithm which works on both iOS and Android platform. Same public keys would be used on both the pl...implement ECDSA algorithm which works on both iOS and Android platform. Same public keys would be used on both the platforms and verification should happen accordingly, keeping algorithms and parameters same across platforms.
We want to develop a project where Freelancer will have to provide dll in C# or C++. Project information: We want to encrypt and decrypt different file formats like DOC, DOCX, XLS,XLSX, PPT,PPTX, PDF, EXE, DLL, JPG, JPEG,PNG,TXT,DWG. When we encrypt except metadata all the other data will be encrypted. However metadata should not be [log ind for at se URL]
there is no standard way to ...modifying a few existing networks. I want those 4 algorithms to generate successful CNN architectures for CIFAR-10. Each algorithm should be tested to generate CNN architecture on the same dataset and compare their performance. each algorithm should be tested 10 times(E.g in case of GA tested on 10 different generation).
I have a fashion website active now for 3 years. Most of my sales come from facebook but with the change in algorithms that has decreased. Wanting someone who can actively work to market and raise awareness of my brand and website.
...and functional call must be properly commented. 5. The freelancer needs to provide the full source code and a brief documentation regarding the libraries, frameworks and algorithms he/she has used. > The full payment will be released only after we review the code and the output to ensure that the above points has been followed. Please bid only if
Looking to work with someone who knows how to build systems and punch into known APIs for auto trades. Post example work and what you charged. Provide list of systems you work with. Do you use Interactive Brokers API or recommend another? If another, why?
I have a functioning algorithm in a program that allows trading algorithms to be created and tested. I need this algorithm, written in C#, to be translated to work with an online broker, which has released a pre-API. I have seen two options on how to connect to the API. The code is basic and must be adjusted. Specific details given upon request.
I am making a php-based dynamic webapp that uses databases. I have already coded many algorithms and functions, but I want someone to polish it up. I need someone good at PHP, and someone who can help with improving the website graphics (perhaps through wordpress or bootstrap). I have set up hosting account and bought domain through bluehost.
The secret key generation in physical layer security achievement through Reinforcement learning algorithms
...self-contained project's source code. Your code must be properly formatted and have significant explanation comments throughout, explaining the advanced technologies and/or algorithms you are using, and the justification behind them. Your zip file will also include a proper [log ind for at se URL] file to guide installation and usage, as well as include a licenses