Business intelligence guiPekerjaan

Filter

Pencarian saya terakhir
Filter menurut:
Anggaran
hingga
hingga
hingga
Tipe
Keahlian
Bahasa
    Pernyataan Pekerjaan
    16,320 business intelligence gui pekerjaan ditemukan, seharga USD

    lebih ke hashing file, blockchain , hanya demo bukan main net

    $25 (Avg Bid)
    $25 Rata-rata
    1 penawaran

    Kami dari Universitas Sarjanawiyata Tamansiswa sedang membutuhkan seorang freelance programmer untuk membuat dashboard Business Intelligence di kampus kami.

    $1211 (Avg Bid)
    $1211 Rata-rata
    5 penawaran

    saya bikin program pengolahan citra tentang deteksi diameter kanker payudara, program sudah jadi tp di mfile, masih ada yg error, program yang mau saya deteksi tu sel kankernya tp yg keditek bukan sel kankernya

    $446 (Avg Bid)
    $446 Rata-rata
    1 penawaran

    Realizar boceto para una GUI para desarrollo en Android

    $1090 (Avg Bid)
    $1090 Rata-rata
    3 penawaran

    Saya membeli sebuah produk dari luar negeri. Dan saat ini memiliki tampilan dalam bahasa inggris. Saya membutuhkan orang yang bisa mentranslate tampilan situs tersebut ke dalam bahasa indonesia. Translate ini bukan pada content, namun mencakup pada sistem yang ada di dalam sebuah website seperti menu, kategori, pesan error, bagaimana cara membuat dsb dsb.

    $19 (Avg Bid)
    $19 Rata-rata
    13 penawaran

    ...Peminatan di IT BiNus sendiri ada 7, yaitu : Software Engineering Networking Applied Networking (CISCO) Database Applied Database (Oracle) Intelligence System Interactive Multimedia Sekilas Tentang Software Engineering :Pada peminatan ini mahasiswa akan mendalami berbagai metodologi dan alat bantu pengembangan piranti

    $113 (Avg Bid)
    $113 Rata-rata
    2 penawaran

    Membuat software artificial intelligence dengan fitur minimal : a. Chat dengan software b. Asisten offline c. Ensiklopedia offline d. Antivirus Spesifikasi komputer maksimal : Intel core 2 duo 2,1 Ghz RAM 512 MB Internet 300 KB/s Windows 7 Anda perlu membuat dan memberikan software sebelum transaksi.

    $153 - $153
    $153 - $153
    0 penawaran

    ...30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink / stateflow 3. product designing ( mechanical part ) 4. embedded iot ( circuit design , firmware developer 5. Android iOS

    $27 / hr (Avg Bid)
    $27 / hr Rata-rata
    10 penawaran

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $32 / hr (Avg Bid)
    $32 / hr Rata-rata
    1 penawaran

    ...services and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on google search

    $586 (Avg Bid)
    $586 Rata-rata
    36 penawaran

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $50000 (Avg Bid)
    $50000 Rata-rata
    1 penawaran

    Categories and Subject Descriptors > Artificial Intelligence > Probability and Statistics > Nonparametric statistics > Database Management > Database applications—Data mining KEYWORD TAXONOMY BUILDING > Building a domain specific taxonomy from a set of keyword phrases augmented with knowledge and contexts > Obtain knowledge (concepts that correspond

    $625 (Avg Bid)
    $625 Rata-rata
    2 penawaran

    I Need 2 algorithms: -The Nearest Neighbor Algorithm (Here is the tutorial on how to do it ---> [login untuk melihat URL]) -Genetic Algorithm (Here is the tutorial on how to do it ---> [login untuk melihat URL]) The program needs to; -Read a ".txt" file (In the file there is the city number, the X coordinate of the location of the city, the Y coordinate of the location of the cit...

    $25 (Avg Bid)
    $25 Rata-rata
    6 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran
    Trophy icon afrointelligence logo2 5 Hari left

    Please look at the included image. What I need is this: I need a logo made! Please keep the "afro - intelligence the same," but please add in the braids for the two "Ls" and please add the head to the right of the logo. Please use the same style as the head that is to the right. Get creative with the hairstyle. Either use braids etc. Please look up

    $150 (Avg Bid)
    Bergaransi Bersegel
    $150
    21 entri

    Hi there, We're an innovative start-up B2B brand creating Artificial Intelligence solutions for our customers - We have a pipeline of business but we understand that sometimes people judge you by the way you look not just the power of the product you put infront of them. Hence, skills like yours are key for us moving forward. We're looking for a design

    $190 (Avg Bid)
    $190
    1 entri

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $251 (Avg Bid)
    $251 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    I am sonali masrankar, an artificial intelligence researcher and programmer. I am busy with a data analytics project and would like some help in creating a module for implementation of group lasso on the dataset. The dataset is available in the attachments. We can provide more information on the dataset by conversation.

    $131 (Avg Bid)
    $131 Rata-rata
    6 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran
    GUI modeling 4 Hari left
    TERVERIFIKASI

    I need you to develop some software for me. I would like this software to be developed.

    $24 (Avg Bid)
    $24 Rata-rata
    5 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $568 (Avg Bid)
    $568 Rata-rata
    1 penawaran

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $555 (Avg Bid)
    $555 Rata-rata
    1 penawaran

    shows how to build a graphical user interface (GUI) application in Haskell using bindings to GTK+. While working on a calculator program

    $35 (Avg Bid)
    $35 Rata-rata
    1 penawaran

    ...information about the organization (e.g. business model, industry it operates in, products, customers, size) IS: definitions, characteristics, benefits/value of IS to the organization, the advantages vs limitations, any other points that you see as being relevant. Accepted topics/IS: • Business Intelligence (BI), • Enterprise Resource Planning (ERP)

    $109 (Avg Bid)
    $109 Rata-rata
    60 penawaran
    Data Entry Clerk 4 Hari left

    ... Company: Serco Inc. (Serco) is the Americas division of Serco Group, plc. Serco serves every branch of the U.S. military, numerous U.S. federal civilian agencies, the intelligence community, the Government of Canada, state and local governments, and commercial clients. We help our clients deliver vital services more efficiently, while increasing the

    $33 / hr (Avg Bid)
    $33 / hr Rata-rata
    38 penawaran
    Build A Website 4 Hari left
    TERVERIFIKASI

    ...performance that drives business impact via increased server speed, which itself also aids google ranking. Specialising exclusively in WordPress, We offer a WordPress digital experience platform that is enterprise-grade without the enterprise hassle. You can build remarkable web experiences with the agility, performance, intelligence and integrations that

    $862 (Avg Bid)
    $862 Rata-rata
    54 penawaran

    I need a novel proposal project about BI, Bigdata and Industry 4.0. Some interesting proposal to develop a academic research. I need 2 products. 1) A proposal with 20 references from ieeexplorer, acm, springer or elsiever (format and examples will be given). 2000 words 2) A research framework (Conceptual and theorical-Format and examples will be given ). 3000 words with tables and neccesary graph...

    $27 (Avg Bid)
    $27 Rata-rata
    5 penawaran