Android eye detection closed open jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    12,528 android eye detection closed open jobs found, pricing in GBP

    ...implement the radon transform for line detection in OpenCV C++. Following is the reference paper: A FAST DISCRETE APPROXIMATION ALGORITHM FOR THE RADON TRANSFORM by MARTIN L. BRADY The final implementation will be a modified version of the discrete radon transform using dynamic programming for line detection. Check the attached folder for sample code

    £27 / hr (Avg Bid)
    £27 / hr Avg Bid
    6 bids

    hi friend i have hire freelance from fivver to develop for me python ml script that will ...for sample . he said that i have to use powerful cloud hosting with strong gpu. i want to concluse with you is it possible to achieve true live video cleavage body parts detection and automatically blurring this frames? maybe with google cloud vision.. thanks

    £2 / hr (Avg Bid)
    £2 / hr Avg Bid
    1 bids

    ...and design calculations. the scope included lighting, Small Power Distribution, HVAC Telecom: Telephony & Ethernet, Security System: Intrusion detection @ windows + Movement Detection @ patio, F&G detection System. the apartment is around 95sqm and having mainly kitchen, living room+dining space, 2 bedrooms, toilette, bathroom, entrance + corridor and

    £277 (Avg Bid)
    £277 Avg Bid
    12 bids

    Our initial intention was to implement a delay and stuck at fault detection system for a 32-bit AVR microcontroller. Starting from a configuration involving professional J-Link EDU equipment, we would check the White-box testing algorithm for the solar tracker by placing breakpoints and watch points inside the code to monitor changes in the registries

    £293 (Avg Bid)
    £293 Avg Bid
    8 bids

    ...installation services and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on

    £460 (Avg Bid)
    £460 Avg Bid
    36 bids

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [login to view URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time. So, the whole idea would be that you coul...

    £8 - £24
    £8 - £24
    0 bids

    The idea I have is to make a security camera. It would basically be a camera that starts recording when motion is detected. The hardware raspberry pi camera board and a PIR motion [login to view URL] added idea to this would be that have the pi send an email or text to the person when motion is detected also a 7 sigment desplay to show the recording time.   So, the whole idea would be that ...

    £11 (Avg Bid)
    £11 Avg Bid
    1 bids

    we aim to develop a machine learning method in email spam detection. The project is between 2018.12.08---2018.12.31 We hope the candidate have good programming capability and excellent at research writing.

    £1054 (Avg Bid)
    £1054 Avg Bid
    25 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    hello~ i'm Bo from Korea. If you see the photo 1.PNG. There are letters and numbers which is '5 2 d 8' and i have to click them!. But numbers in order first and then letters in order. For example) there are '5 2 d 8' in photo [login to view URL] The correct answer is i have to click '2 5 8 d' in order. So the correct answer of pho...

    £392 (Avg Bid)
    £392 Avg Bid
    13 bids

    ...Hydraulic Calculations 4. HVAC Load Computations 5. Energy Analysis 6. Solar design (I have the calculation) 7. Duct Design 8. 4D information modeling using Navisworks + Clash detection ...

    £234 (Avg Bid)
    £234 Avg Bid
    20 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £197 (Avg Bid)
    £197 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids
    Trophy icon Need a Eye catching LOGO 11 hours left

    WE NEED EYE CATCHING LOGO FOR OUR UPCOMING WEBSITE NAME RUMMYWAR TYPE INDIAN RUMMY GAME - TYPE OF CARDS GAME - TYPE OF POKER GAME YOU NEED TO CREATE AN EYE CATCHING LOGO FOR MY WEBSITE URL : [login to view URL] - UNDER MAINTENANCE NAME : RUMMYWAR

    £7 (Avg Bid)
    £7
    41 entries

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £196 (Avg Bid)
    £196 Avg Bid
    1 bids

    ...ML/neural net techniques, will check the integrity of firmware, ensuring that only approved firmware is operating and blocking untrusted updates. A Neural Network can ensure the detection of altered firmware at runtime or each time a firmware update is requested. This functionality enhances system security functionality by complementing device authentication

    £435 (Avg Bid)
    £435 Avg Bid
    1 bids

    ...Creates a random pixels icon Assembly Cloner - Cloned Assembly is a Perfect match File Binder - Supports any file format + Compression Anti Memory Scanner - Prevent memory detection for .net files Private stub - Gives Long Fud time, upto 3 weeks Silent execution - Does not trigger UAC or any annoying Black window Persistence - Guards the injection process

    £424 (Avg Bid)
    £424 Avg Bid
    4 bids

    Looking for an incredible Wordpress expert who can help troubleshoot and fix the visual composer on our site. Some other items to add as well: - Troubleshoot visual composer and get working - Add new responsive landing page (mobile as well) to both of my websites - Update Menu items - Add about page with desired design (link to menu) - Update Terms & Conditions - Update photo on Pop up for b...

    £99 (Avg Bid)
    £99 Avg Bid
    48 bids

    ...implement the radon transform for line detection in OpenCV C++. Following is the reference paper: A FAST DISCRETE APPROXIMATION ALGORITHM FOR THE RADON TRANSFORM by MARTIN L. BRADY The final implementation will be a modified version of the discrete radon transform using dynamic programming for line detection. Check the attached folder for sample code

    £122 (Avg Bid)
    £122 Avg Bid
    9 bids

    I need some graphic design for standup bags. This is for dried fruit packaging. The design should be eye catching within 2 secs and the focus will be to able out among the many packaging. Attached is an example of standby bag with zipper. If you are not familiar with this trade please don’t attempt this project. Thank you.

    £42 (Avg Bid)
    £42 Avg Bid
    22 bids

    ...an engineer and a computer science expert experienced in computer vision machine learning, Artificial intelligence and deep learning and its applications in facial & face detection to design and develop a commercial software. The commercial software will be using Artificial intelligence and deep learning in detecting faces, including at what time, the

    £483 (Avg Bid)
    £483 Avg Bid
    10 bids
    Eye triage 3 days left

    ...referral from opticians and other doctors regarding eye conditions. The aim is to help them triage how urgent the patient needs to be seen. I have designed pre-made flowcharts with a series of questions. Depending on a few questions, it will result in a grade of urgency to see the patient in the hospital eye services. My idea is to put that on a web-site

    £450 (Avg Bid)
    £450 Avg Bid
    50 bids

    Hi I am looking for a Object detection, recognition and segmentation of vehicles in ANPR problem using deep learning models. In that we can use [login to view URL] dataset for our work. So will it be possible for you

    £4 / hr (Avg Bid)
    £4 / hr Avg Bid
    7 bids

    I want you to write a small report on malware detection All the necessary documents and links for reference will be provided

    £17 (Avg Bid)
    £17 Avg Bid
    12 bids

    Technical Specifications  Electrical input: 2 flow (pulse) - 10Hz, 6 ana...hour in defined increments o Data storage: Rotating store.  Alarm Dial-Out: o Programmable high and low flow rate, Pressure and daily consumption alarms. o Alarm on tamper detection. o Low battery alarm.  Environmental: o Operating ambient temperature: -30°C to +60°C

    £2 - £7 / hr
    Sealed
    £2 - £7 / hr
    3 bids
    Trophy icon Write a Book 13 hours left

    ...CAN BE. There is no word minimum or maximum limit. Whatever the subject entails is acceptable. As long as it is as concise and as comprehensive as it can be. Plagiarism Detection Tools will be used in choosing the winner [login to view URL] [login to view URL] [login to view URL]

    £24 (Avg Bid)
    Guaranteed
    £24
    4 entries

    I need some help for this work, A cyclic code of length 7 bits wit...this work, A cyclic code of length 7 bits with the generator polynomial of 1. Explain the systematic and non-systematic methods 2. Evaluate the error-correction and error-detection capability 3. Explain how the capability of the code can help improve the performance of the system.

    £40 (Avg Bid)
    £40 Avg Bid
    2 bids
    Trophy icon Write an Article 13 hours left

    The subject is "Important Tips in Doing Keto" Use all youtube resources out there that has the most views of all time and a...CAN BE. There is no word minimum or maximum limit. Whatever the subject entails is acceptable. As long as it is as concise and as comprehensive as it can be. Plagiarism Detection Tools will be used in choosing the winner

    £24 (Avg Bid)
    Guaranteed
    £24
    7 entries

    I need to draw the bounding box over an image based on classifier’s output

    £74 (Avg Bid)
    £74 Avg Bid
    9 bids

    I am IT guy which is trying to do capture my own network to see if it malicious but Im bad in java programming. What I needed is: -Java program that is running JPCAP and store the result. -Java program that have VirusTotal API. -Java program that able to show the result of the stored JPCAP data after it been scan with VirusTotal API.

    £119 (Avg Bid)
    £119 Avg Bid
    5 bids

    The logo should simple and eye catching It should be something involving technology,photography and Photoshop I recently started my online store and low on payment methods This means im looking for an expert/someone with talent to showcase their work

    £52 (Avg Bid)
    £52 Avg Bid
    50 bids

    need a Matlab code or java code Changeable Gentle Random Early Detection for Congestion Control at the Router Buffer message for more details. code should be orginal. description for the results Budget max 100$

    £83 (Avg Bid)
    £83 Avg Bid
    8 bids