Hello there, I need your help with m...there, I need your help with my online data set I have this online clinic data and I need to do a new method or model to analyze it ( need to do for example (deep learning algorithm). https://archive.ics.uci.edu/ml/datasets/Diabetes+130-US+hospitals+for+years+1999-2008 if you have can help me please send me ASAP
...to moved with the well known WASD keyboard buttons. You can also implement mouse event handlers to other functions of the game. You can generate the game levels with an algorithm, or simply load them from files. If you load the levels from file, then each one should be put into different files, and you have to create at least 10 predefined levels.
i need a chat application connected to ubuntu server and...server and have a database clients should be able to add each other by usernames only clients should be able to text,send videos ,voice notes,send voice no need to use encryption last seen feature also should be added programming language is kotlin design need to be very simple and smooth
...Access real time data from mobile • Sms, call records, whatsapp etc • Website record • Keylogger • Direct installation • Installation without permission • Use any method • Encryption • Mobile access from distance • Data spoofing from nearest place • Real time location etc • (we can configure application for special clients so when ...
...3121 IC Card (EMV) Reader/Writer – ARQC ARPC STATIC AND Dynamic bins I also know software like R.B v 5.0 Chipso emv msr2006 for reference Because of the ARQC-ARPC bypass algorithm you can insert any pin, even if you insert 0000 the POS is going to approve the transaction. You will need Java credit cards, the software is compatible with any Java JACOP
I have an already developed algorithm which needs some changes in its thresholds to get the required results.
...be specific. - How would you store the data? in what format? and the reasons for the selection - How would the data be encrypted, compressed, and downloaded? whats the encryption, compression, and speed for d/l of 10gigs via a cable connection. - How is the data presented? etc... T Those with true knowledge can answer these questions in detail.
The application should use openssl libraries. The user upload a file to encrypt/decrypt. The application can...application should use openssl libraries. The user upload a file to encrypt/decrypt. The application can show the performance/metrics of encryption like time and memory. The user can select the different algorithm and mode on the application.
language could be anyone .for example a n-queen problem with A* algorithm
...have to navigate harsh/icy conditions to find a series of test sites and perform scientific sampling and analysis. The project will be developed in python 2.7 and uses SLAM algorithm to process a series of landmarks. The software will also have a planner that will make the rover measure, move & process information etc. Serious programmers only with
I have managed to get a developer to create the algorithm and api database for uk cell towers for the purpose of triangulating GSM cell phone signal however, as the developer is new to this he cannot find out which cell tower the other (target) cell phone is connected to. Triangulating will be done using a PC software via https and just by simply inputting
...clustering 5. Mechanisms for feature selection. 6. Performing analytics on the organised data ( both collected data and online data). STAGE:3 1. Development of a new algorithm to design a prediction model. 2. Comparing the effectiveness of our applied techniques with the existing ones. 3. Measuring the efficiency and effectiveness of the obtained
We need Cisco routing, Cisco ASA firewall Fortinet developer to provide job support. It's a long-term job support you need to...reflectors, hard and soft clearing of BGP, redistributing prefixes into BGP from OSPF. . IPsec VPN - ability to set up this particular VPN connection. can you explain how encryption domains relate to them. **Fortinet firewall
We want to run our own Email Service for business costumers.(Email Service Provider) Very important is End-to-End Encryption. We want use implementations of AES, RSA, along with OpenPGP. Costumers should be able to register a Emailadresse with our service, and they should use our Webclient. Also there must be the poebillity that costumers can sync there
Implement the Genetic Algorithm in JAVA for Prediction, based on average, Stock Closing Values of the Stock Exchange. Implement Evaluation, Selection , crossover, mutation, update and finalization. Example: start with a vector with the previous price of 90 days stock. Data, Open, High, Low, Close *, Adj Close **, Volume. Example: https://finance
...View contact queries by users 8. Add new service locations 9. View recent leads 10. View accept leads 11. View completed job Overall platform features – 1. 2 or 4 Level encryption for saving passwords ( Depend of server you are buying ) 2. Security feature to block Cross site scripting attacks 3. Security features to block SQL injection attacks 4.
Data mining for image processing fingerprint processing image by algorithm, like anyone of common novel,SVM, Gabour etc...tools matlab, requirements should be unique idea. This is 250 page work, submission in 3 moths.
Hello Can you detect below list from image? age , gender , mood , jewelry ,beard ,headgear, Headphone I need this urgently. Please bid who has alread...age , gender , mood , jewelry ,beard ,headgear, Headphone I need this urgently. Please bid who has already experience for this part. you should expert in deep learning algorithm or machine learning.
Hello, I have a project on clustering a multi-attribute dataset by k-means algorithm. Actually, I have knowledge about clustering but I have a problem in passing dataset to k-means, So i am waiting your help :)
algorithm and scheme for efficient spectrum utilization of D2D in 5G networks
Integrate self hosted chat/messaging module for chats,audio/video chats, file (doc/audio/video) transfers,group chats and channels. Messaging should have end to end encryption and saves on browser and not on our server