Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    3,005 pattern vector jobs fundet, i prisklassen EUR

    Patterns made for lingerie

    €143 (Avg Bid)
    €143 Gns Bud
    5 bud
    Line Drawing 6 dage left

    ...line based vector image with clean lines, using mostly blacks and grays Here are the ideas I’d like the image to convey while using some creativity: 1. Image alludes to a secret that is causing the body to be overweight. I want this to raise curiosity and make the image viewer wonder what the secret might be. 2. Image should create a Pattern Interrupt

    €125 (Avg Bid)
    €125 Gns Bud
    11 bud

    Hi, I need php code to find and replace the number in every "height='360'" in a string. The number 360 may be 440, 200.. it could be anything.. so I need the code to replace whatever the number is with the number 500 Thanks for bidding!

    PHP
    €26 (Avg Bid)
    €26 Gns Bud
    22 bud

    We need fabric pattern, we are clothing and fabric printing company we need a designer who can create beautiful seamless pattern for clothing and for various textile products

    €82 (Avg Bid)
    €82 Gns Bud
    16 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    Hi, I have a picture of a pattern on a pillow. I need this pattern recreated digitally in vector graphics. Must have all lines/features exactly like the pattern has. Looking to get this done in the next 48 hours. Please bid if you can do this in less than 48 hours.

    €19 (Avg Bid)
    €19 Gns Bud
    26 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €220 (Avg Bid)
    €220 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €500 (Avg Bid)
    €500 Gns Bud
    1 bud

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    €488 (Avg Bid)
    €488 Gns Bud
    1 bud

    ...of the logos I like is LOGO OAXACA CON LAS MANOS in which the company name ALL OAXACA can be in very bold letters with images of chilis and spices and crickets and indian pattern drawings and corn can be inserted into the words ALL OAXACA (no hands). I would like a logo that captures the essence of the traditional culture of Oaxaca, highlighting gourmet

    €29 (Avg Bid)
    €29 Gns Bud
    78 bud

    need to put pattern onto shorts then send to me in ai and jpeg files. dont have much of budget so possibly need a quick job done on this

    €18 (Avg Bid)
    €18 Gns Bud
    26 bud

    Hi my client runs a fashion store and range we require patterns to be made for printing onto our fabrics this is an express project the timeframe is limited to 1 week must be working files and ready print files adjustable for resizing or touchups

    €89 (Avg Bid)
    €89 Gns Bud
    29 bud

    Looking for a pattern maker for mens travel/doctor bag. Bag will be made from Vegan Crocodile Leather. See attached pic for an idea of the look we are trying to achieve.

    €411 (Avg Bid)
    €411 Gns Bud
    6 bud

    As part of an art installation (see attachment) we created a cube with 36 unique patterns (...patterns (9 for every face of the cube... see attachment 2 for one of the patterns). Visitors should be able to download an app on their mobile. Once the app recognizes a pattern it uploads Audio Visual material. We are looking for someone to develop the app.

    €668 (Avg Bid)
    €668 Gns Bud
    33 bud

    I want to design a new camo pattern based off of a image of an animal. The pattern must be able to be printed on today's textile printers. I would like the pattern to be 36"x30" in size. It must be 3-D. I would like 4 color schemes from the original color; one based on the original color of the image, one based on spring colors, one based on fall

    €1029 (Avg Bid)
    €1029 Gns Bud
    28 bud
    Pattern making Udløbet left

    I need an experienced freelancer to work in a range of corporate uniforms. The person need to create patterns and specs

    €60 / hr (Avg Bid)
    €60 / hr Gns Bud
    19 bud

    ...would like a graphic designs for the wall. wall is 4mx3m so graphic must be vector. Please prepare the file in the 4:3 ratio so can be used straight away. Yellow as the main colour and the symbols or icons in grey, white and black etc. i want icons in some sort of pattern. icons should be anything related to mobile and tablets. ie. cables, covers

    €63 (Avg Bid)
    Garanteret Topkonkurrence
    €63
    35 indlæg

    fpga pattern generator connected to a pc starting from an evaluation board and an HDL from TI.

    €268 (Avg Bid)
    €268 Gns Bud
    8 bud

    I have pictures of several articles of clothing that I would like duplicated and possibly augmented in a custom way. I need someone who can work with me to make those...several articles of clothing that I would like duplicated and possibly augmented in a custom way. I need someone who can work with me to make those changes and develop a flat pattern.

    €337 (Avg Bid)
    €337 Gns Bud
    13 bud

    this is the project of bouncing ball javafx project where you have to reorganize the code as you see fit and add x direction physics to it.

    €26 (Avg Bid)
    €26 Gns Bud
    9 bud

    65-70 patterns for gent’s leather shoes on frelance

    €691 (Avg Bid)
    €691 Gns Bud
    3 bud
    pattern making Udløbet left

    Looking for freelance Pattern maker for t shirts.. sweat shirts..for kids ..boys .. girls ,,men and women.

    €212 (Avg Bid)
    €212 Gns Bud
    7 bud

    ...[log ind for at se URL] - [log ind for at se URL] - [log ind for at se URL]

    €176 (Avg Bid)
    Garanteret
    €176
    286 indlæg
    Trophy icon Redesign a pattern Udløbet left

    I need a camouflage pattern. Could be very close to those in the market, but we can not use an identical pattern. We need one that is somewhat re-designed.. Similar to the ones shown here, although at least 4 times bigger. (Next step will be to design a jacket or shirt with the same pattern)

    €26 (Avg Bid)
    Garanteret
    €26
    16 indlæg

    I need fashion designers who can come up with fresh designs of Indian ethnic wear including bridal lehengas, anarkali, gowns. the deliverable will include digital coloured illustration, digital sketch / flat drawings from front back (and side, of required), embroidery detailing and explanations (showing impirtnat motifs separately for crafstman to understand)

    €69 (Avg Bid)
    €69 Gns Bud
    5 bud