Data processing analysis työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    8,627 data processing analysis työtä löytyi, hinnoittelu EUR

    File attached

    €6 (Avg Bid)
    €6 Keskimäär. tarjous
    1 tarjoukset

    ...fine. Enabled plugins 1-by-1. All are up-to-date including Woocommerce and its database. When WooCommerce activated the error messages appear again: "an error occurred while processing this directive." Ran the Wpress updater to v5.0 - ran ok without Woocommerce activated. Ran update to the Genesis framework theme (Enterprise Pro child theme) to latest version

    €102 (Avg Bid)
    €102 Keskimäär. tarjous
    47 tarjoukset

    This mobile app should available for Android and IOS. It will need to have the capability of processing payments using a credit card and debit card with and without a chip. I would prefer it be done through a q code reader but that is to be discussed with the developer.

    €691 (Avg Bid)
    €691 Keskimäär. tarjous
    72 tarjoukset

    Need to process a tsv file and write the result to the excel file using python code.

    €26 (Avg Bid)
    €26 Keskimäär. tarjous
    16 tarjoukset
    Data processing 6 päivää left

    ...when you have finished reading and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. A data processing technician is mainly responsible for organizing and cataloging data. The job requires a technician to be very detail-oriented and to maintain focus while performing repetitive duties. Job candidates usually

    €16 / hr (Avg Bid)
    €16 / hr Keskimäär. tarjous
    16 tarjoukset

    ...statements for mailing. • Basic payroll and bookkeeping. Qualifications At least a two year business degree with an accounting emphasis. Minimum of 3 years of heavy payroll processing experience in a multi-state environment. Experience handling bonuses, 401(k) and other benefits. Must have excellent customer-service orientation and a high degree of professionalism

    €954 (Avg Bid)
    €954 Keskimäär. tarjous
    6 tarjoukset

    The...reading and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. Data processing technicians operate computers and other communications equipment and may perform data entry work as part of a larger data processing system. Being a technician is a very detail-oriented job involving many repetitive...

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    19 tarjoukset

    Hello me in Image processing edge detection

    €133 (Avg Bid)
    €133 Keskimäär. tarjous
    18 tarjoukset

    Hi, we search for support to participate in a tender regarding partition of store construction. You had to do the analyse of the tender as well as material requirements planning and calculation. Hearing from you. Best regards, Christian

    €42 / hr (Avg Bid)
    €42 / hr Keskimäär. tarjous
    7 tarjoukset
    Data Processing 5 päivää left

    The...reading and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. Data processing technicians operate computers and other communications equipment and may perform data entry work as part of a larger data processing system. Being a technician is a very detail-oriented job involving many repetitive...

    €15 / hr (Avg Bid)
    €15 / hr Keskimäär. tarjous
    35 tarjoukset
    Data Processing 5 päivää left

    The name...and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. . Data processing technicians operate computers and other communications equipment and may perform data entry work as part of a larger data processing system. Being a technician is a very detail-oriented job involving many repetitive...

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    25 tarjoukset
    Data processing 5 päivää left

    ...when you have finished reading and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. A data processing technician is mainly responsible for organizing and cataloging data. The job requires a technician to be very detail-oriented and to maintain focus while performing repetitive duties. Job candidates usually

    €15 / hr (Avg Bid)
    €15 / hr Keskimäär. tarjous
    18 tarjoukset

    Hello, i need to implement urgent paper in matlab

    €81 (Avg Bid)
    €81 Keskimäär. tarjous
    9 tarjoukset
    Database Processing 5 päivää left

    The name...and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. . Data processing technicians operate computers and other communications equipment and may perform data entry work as part of a larger data processing system. Being a technician is a very detail-oriented job involving many repetitive...

    €16 / hr (Avg Bid)
    €16 / hr Keskimäär. tarjous
    27 tarjoukset
    Data Processing 5 päivää left

    The...reading and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. Data processing technicians operate computers and other communications equipment and may perform data entry work as part of a larger data processing system. Being a technician is a very detail-oriented job involving many repetitive...

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    37 tarjoukset

    Hello, i need to implement urgent paper in matlab

    €78 (Avg Bid)
    €78 Keskimäär. tarjous
    6 tarjoukset

    Hello, i need to implement urgent paper in matlab

    €61 (Avg Bid)
    €61 Keskimäär. tarjous
    4 tarjoukset

    Must be knowledgeable for the below topics please sen...z-transform and solving systems. Analog filter design using Matlab, Digital filter design. Design of IIR digital filters using the bilinear transformation. Intro. to spectral analysis methods as applied to cont.-time signals. The Kaiser window method for frequency resolution and reducing leakage.

    €169 (Avg Bid)
    €169 Keskimäär. tarjous
    20 tarjoukset
    Data Processing 4 päivää left

    ...when you have finished reading and understand every line ..You are to respond back with an ''DONE'' ..I advise you read with care. A data processing technician is mainly responsible for organizing and cataloging data. The job requires a technician to be very detail-oriented and to maintain focus while performing repetitive duties. Job candidates usually

    €13 / hr (Avg Bid)
    €13 / hr Keskimäär. tarjous
    2 tarjoukset

    ...LEDs/photodiode. Nordic chip is controling the TI chip, accelerometers, recording the data on the memory and sending the informtion through bluetooth to the mobile app. The information is the collected data by photodiode with frequency of 100hz without any processing. we don't do any analysis by the nordic chip, only controlling accelerometer, TI chip, recording...

    €1099 (Avg Bid)
    €1099 Keskimäär. tarjous
    14 tarjoukset
    Project for Anudeep K. 6 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Gili L. 6 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for macitaytac 6 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    I need a person who is best at excel, psf ,data processing and data entry and finish in 2 to 3 days

    €13 (Avg Bid)
    €13 Keskimäär. tarjous
    48 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Hashem A. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Saikumar U. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Ahmed M. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Miftahul A. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Meenoy S. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Kemal H. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Robert Y. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Xiaodong C. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Joan A M. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Daniyal A. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Yuan N. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Aqeel F. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Xiaoqi D. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Chunyan Y. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €221 (Avg Bid)
    €221 Keskimäär. tarjous
    1 tarjoukset
    Project for Jin C. 5 päivää left

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €502 (Avg Bid)
    €502 Keskimäär. tarjous
    1 tarjoukset

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    €490 (Avg Bid)
    €490 Keskimäär. tarjous
    1 tarjoukset

    In this project, you will implement an Image Processing/Computer Vision system to analyze and extract the state of a tic-tac-toe board using OpenCV, details will be given later

    €42 (Avg Bid)
    €42 Keskimäär. tarjous
    3 tarjoukset