Cryptography equation jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 cryptography equation jobs found, pricing in GBP

    At "" we have created an initial cryptography course , with no prior knowledge required to get started , after some time of testing the market of high ticket courses sales we have decided to offer the course for just 33$ with a target "sales goal" to sell at least 100k units of it , hence i need multiple sales agents to do email marketing and social media marketing across all social media platforms , hence i created a discount code for freelancers here to use "FREELANCERMARK13" for 5% off and to know that this sale is coming from you not other channels , this is a commission based project with no base pay , your compensation would be 10% "3$" of each sale , however it's a 33$ course so for an experienced marketer i think you can sell hun...

    £33 / hr (Avg Bid)
    £33 / hr Avg Bid
    10 bids

    ... as it must be for our purposes. The formulas should be in a format that allows me to edit the text within Word. This will involve creating a clean and readable representation of complex mathematical expressions and also testing that they can be converted to pdf in a clear manner. Ideal Skills: - Strong background in algebra and mathematical notation - Proficiency in Microsoft Word and its equation editor - Attention to detail to ensure correct transcription of equations - Familiarity with formatting mathematical expressions in a way that's easy to work with in Word - Ability to deliver a polished, error-free final document. Your work will be essential in helping me to manipulate and work with these equations in my personal documents. I will also need to know that the d...

    £754 (Avg Bid)
    £754 Avg Bid
    23 bids
    Urgently Solve Elliptic PDE 4 days left
    VERIFIED

    I am in immediate need of a skilled mathematician or physicist who can solve an Elliptic Partial Differential Equation (PDE) using analytical methods. Key Requirements: - Proficiency in solving Elliptic PDEs using analytical methods - Demonstrated experience in similar projects - Ability to work under tight timelines Time is of the essence, and as such, I need someone who can dedicate their time to this task ASAP. Please include an estimate of your expected delivery time in your proposal.

    £15 (Avg Bid)
    £15 Avg Bid
    15 bids

    I'm in search of a highly qualified Chinese tutor who can help me elevate my language skills to an advanced level. With a particular emphasis on reading, writing, and conversation, I'm aiming for a holistic understanding and improvement. The ideal freelancer for this job should: - Be experienced in teaching advanced-level Chinese - Have a strong focus on developing reading, writing, and conversational skills - Be able to commit to 3-5 hours of lessons per week If you have a track record of helping students attain high levels of proficiency, I would love to hear from you.

    £598 - £1195
    Local
    £598 - £1195
    0 bids

    We're looking for a programmer skilled in scraping and converting APIs into PHP or Python code (reverse engineering)! If you have the following skills, join us: 1. Proficiency in JavaScript: Ability to work with this popular programming language and fully interpret and modify codes. 2. Knowledge of Cryptography: Ability to understand and use cryptographic algorithms and methods to comprehend how data is encoded and to transform unencrypted data. 3. Familiarity with Progressive Web Apps (PWA): Deep understanding of PWA structure and methods to bypass installation on iOS. 4. Experience with network monitoring and traffic analysis software such as Fiddler: Ability to use these tools for analyzing network traffic and related information, including identifying and addressing PWA...

    £16 / hr (Avg Bid)
    Featured
    £16 / hr Avg Bid
    51 bids

    I'm searching for an experienced developer to create a crypto flash coin generation platform based on BEP20 or Binance n...Registration and Login: A robust system that guarantees seamless user registration and login. - Coin Generation Algorithm: Implement an algorithm that facilitates efficient and reliable generation of coins. - Wallet Integration: Integrate a user wallet into the platform for seamless transactions. The design of the platform should be minimalistic, clean, and user-friendly. Your knowledge in cryptography is highly desirable as the system needs to be secure and should employ cryptographic security measures to ensure the safety of transactions and user data. An appreciation for fintech and past experience in similar jobs will make you an ideal candidate fo...

    £732 (Avg Bid)
    £732 Avg Bid
    3 bids

    As the owner of a web-based platform, I've encountered a troublesome problem concerning Google Pay integration. Specifically, the issue lies within cryptography - however, the exact aspect of cryptography posing the problem remains unclear due to lack of further information. Therefore, I need an expert who possesses a deep understanding of payment processing systems, particularly Google Pay, and who is proficient with cryptographic systems on the web platform. Your tasks will include the following, depending on the discovered problem: - Debugging and resolving encryption problems - Sorting out decryption issues - Overcoming challenges related to key generation and management Despite the puzzle-like nature of the job, a meticulous and patient troubleshooter with stro...

    £60 (Avg Bid)
    £60 Avg Bid
    11 bids

    I need help with solving 40 college-level math problems. T...solving 40 college-level math problems. The topics include coordinates and basis, diagonalization, eigenvectors and eigenvalues, introduction of linear transformation, row column and null space, the characteristic equation, vector space and subspaces. It's not a crazy assignment, just a bunch of problems that I don't have time to solve. Ideal Skills & Experience: - Proficiency in College-level Math - Understanding of coordinates and basis, diagonalization, eigenvectors and eigenvalues, introduction of linear transformation, row column and null space, the characteristic equation, vector space and subspaces. - Ability to provide correct, concise answers without detailed explanations. - Familiarity with ...

    £19 (Avg Bid)
    £19 Avg Bid
    35 bids

    ...related parameters based on the optimal aperture efficiency. Use the cosine q model to derive the edge taper requirement and find the other parameters as well using the characteristics equations of parabola especially offset parabola. All design equations must have proper reference where the equation taken from. better use balanis book - after finding the edge taper requirement need to find the feed requirements based on the reflector edge taper requirement - Provide MATLAB code for the all equation with reference of formulas in terms of report - there are two feeds will be used for a single reflector one is X band and one is Ka band. both calculations are required for optimum placement. Ideal skills and experience: - Proven track record in antenna design, particularly...

    £29 (Avg Bid)
    £29 Avg Bid
    3 bids

    As a founder of "", I'm taking on an advanced cryptography course selling project. This comprehensive course encompasses: - Symmetric Key Cryptography - Public Key Cryptography - Hash Functions and Digital Signatures I'm looking for candidates with a deep understanding of these concepts, given the course is of advanced level. Furthermore, an affiliate marketer with a knack for turning complex content into engaging, easily digestible information is ideal. This course should be marketed as moderately interactive, featuring occasional quizzes to keep learners engaged. Skills and Experience: - Advanced cryptography knowledge - Proven affiliate marketing success - Ability to simplify complex information The Course Costs 1330.33$ You will use t...

    £79 (Avg Bid)
    £79 Avg Bid
    8 bids

    ...a web-based application for iot edge device that focuses on securing sensitive data and minimizing packet loss using forward error correction techniques. This project will be a great opportunity for you to apply your knowledge of cryptography and networking concepts. Key Requirements: - The main aim of the project is to secure sensitive data using ECC based elgamal. - need to integrate this with forward error correction algorithms like reed solomon, ldpc. -integrate this with web based chat application Ideal Skills and Experience: - Proficiency in cryptography and packet loss concepts of networking - Experience with web application development - Understanding of ECC and elgamal -strong in forward error correction algorithms - Strong programming skills in languages th...

    £102 (Avg Bid)
    £102 Avg Bid
    2 bids

    I require a competent programmer to create a RSA (South African) drivers license decryption class library in C#. The library needs to take encoded strings (Barcode scan) as input and generate a decoded file as output. Key requirements: - Extensive experience with C# - Capability to handle encoded strings - Generate a decoded file ...required data. - The library need to work within a .NET Core 3.1 API. - A detailed explanation of how to use use this library needs to be provided. PLEASE NOTE: The focus is on creating a reliable and efficient library, hence a solid understanding of performance optimization is necessary. A strong grasp of cryptography, as well as drivers license formats would be beneficial.

    £114 (Avg Bid)
    £114 Avg Bid
    25 bids

    I am seeking a skilled professional to enhance the squash equation within the CapsuleNet model to improve its accuracy. Key Requirements: - Experience with CapsuleNet model and its squash equation - Proficiency in neural networks and deep learning - Ability to enhance model accuracy through squash equation modifications If you feel confident in your ability to help me achieve better accuracy through the squash equation, I would love to discuss this further.

    £77 (Avg Bid)
    £77 Avg Bid
    12 bids

    To win this contest you will need to have 5 selected design related to "Zero-Knowledge Proof" or "ZK Proof" concept which is a Blockchain and Cryptography and Math related topic. So feel free to be creative and not just stick to simple typography. I am willing to purchase as many as 60 designs at the same rate, so we might get multiple winners or I will deal with you after the contest ends. Capitalisation: either "Zero-Knowledge Proof" or "ZERO-KNOWLEDGE PROOF" Here are the quotes you can choose from: Zero-Knowledge Proof: Because my secrets are too good to share. I'm like a Zero-Knowledge Proof — complex, mysterious, and verifiable Trust me, I'm a Zero-Knowledge Proof expert. No further questions, please. Zero-Knowledge ...

    £7 (Avg Bid)
    Guaranteed
    £7
    272 entries

    I require an experienced cryptographer skilled in C programming for a unique assignment. This role involves developing encryption, decryption, and key generation functionalities. Key Project Requirements: - Extensive knowledge and application of Cryptography - Proficiency in the C programming language - Experience in generating SHA keys The Cryptographer will perform the following tasks: 1. Encryption and Decryption: You will write code that facilitates both encryption and decryption processes using the AES (Advanced Encryption Standard) algorithm. 2. Key Generation: Involves the creation of a safe and secure key generation mechanism utilizing SHA. You should prioritize key security to guarantee the confidentiality and integrity of the encrypted contents. 3. File Support: The...

    £14 (Avg Bid)
    £14 Avg Bid
    3 bids

    I'm looking for a skilled individual who can enhance the squash equation in CapsuleNet to improve the accuracy of image classification. The focus will be on medical images, and the ideal candidate will be able to introduce a new method that has not been used in this context before. Key requirements: - Expertise in CapsuleNet and its squash equation - Strong background in image classification, particularly with medical images - Ability to innovate and introduce novel techniques to improve accuracy The successful applicant will help us push the boundaries of what's possible in medical image classification, and contribute to the development of cutting-edge technology.

    £134 (Avg Bid)
    £134 Avg Bid
    12 bids

    I'm seeking a researcher well-versed in cryptography for an advanced project targeting two specific areas: Symmetric and Asymmetric cryptography. Key responsibilities: - Detailed research into Symmetric and Asymmetric cryptography - Clearly convey advanced, complex cryptography concepts Ideal applicant: - Extensive experience with cryptography research - Ability to explain complex cryptography ideas to an advanced audience Please include your relevant experience in your application. Looking forward to potentially working together on this fascinating project.

    £91 (Avg Bid)
    £91 Avg Bid
    35 bids

    ...DNA database. b. Identify any conditional aspects of the process, for example if there are any stages of the process where resources only become available once the previous sample has been processed. c. Second, write out the relevant equations associated with each step of the process, and construct a formula for the overall time in system. d. Use relevant notation and write out equations using Equation Editor in Word. e. Note – the rule of thumb is that any reader can pick up your report and replicate your results by following the methods. 2. Use mean values of each parameter to construct an “average” solution. a. Unit of interest – a DNA sample collected by a CSI. That is, each sample must be modelled individually. b. Assume both CSI and forensics lab ope...

    £136 (Avg Bid)
    £136 Avg Bid
    22 bids

    ...DNA database. b. Identify any conditional aspects of the process, for example if there are any stages of the process where resources only become available once the previous sample has been processed. c. Second, write out the relevant equations associated with each step of the process, and construct a formula for the overall time in system. d. Use relevant notation and write out equations using Equation Editor in Word. e. Note – the rule of thumb is that any reader can pick up your report and replicate your results by following the methods. 2. Use mean values of each parameter to construct an “average” solution. a. Unit of interest – a DNA sample collected by a CSI. That is, each sample must be modelled individually. b. Assume both CSI and forensics lab op...

    £103 (Avg Bid)
    £103 Avg Bid
    24 bids

    Build a website for "online practice tests" for an exam called Mock Test. The online test series software should be integrated within the website. The website should have following features Upload questions from Word document Upload questions from word document in a single click MCQ uploader works even with image / equation / graph based questions. Schedule your exams and result publishing Schedule an exam without uploading the questions. This helps students to know about exam details like exam start date, exam duration, syllabus and number of questions. Questions can be uploaded at later point of time before the exam actually starts. Ranks of the test takers will be displayed in the students dashboard from the given date. Real Time Exam Templates Templates support IBPS ...

    £515 (Avg Bid)
    £515 Avg Bid
    82 bids

    ...keep improving the equation with every cycle of generation -In general, GENETIC PROGRAMMING will be used for this process Genetic programming uses four steps to solve problems: 1) Generate an initial population of random compositions of the functions and terminals of the problem (computer programs). 2) Execute each program in the population and assign it a fitness value according to how well it solves the problem. 3) Create a new population of computer programs. i) Copy the best existing programs ii) Create new computer programs by mutation. iii) Create new computer programs by crossover 4) The best computer program that appeared in any generation, the best-so-far solution, is designated as the result of genetic programming -Each program is GRAPH CUT using a different equati...

    £491 (Avg Bid)
    £491 Avg Bid
    32 bids

    ...Within these group chats, users should be able to share media files securely. - Video Call Group: Another desirable feature is the ability to have group video calls. This will require audio and video processing skills to achieve good call quality and connection stability. The ideal freelancer for this project should have a strong background in web app development and security, specifically cryptography. A portfolio demonstrating experience in these areas would be appreciated. Let's work together on creating a chat app that prioritizes user security and functionality! - Delete message from both size - Login using gmail and create account We have a related source code which you can check and confrim To start the project, you need to specify - What is backing using (we pr...

    £465 (Avg Bid)
    £465 Avg Bid
    99 bids

    ...and Application Middleware, PhoneGap/iOS/Android SDKs, CI/CD, etc. • Strong understanding of mobile and web application security concepts, session management, performance optimization, automated testing techniques, high availability engineering, and database technologies for mobile and web applications. • Familiarity with cryptography, key management, and security solutions on both mobile and server sides, including an understanding of security protocols and cryptography like PKI, SSL, RSA, authentication, encryption, and digital signatures. • Experience working with payment solutions, including mainframe environments, is advantageous. Additional Skills:- • Profound knowledge of emerging technologies and a strong grasp of how technology aligns ...

    £128 (Avg Bid)
    Local
    £128 Avg Bid
    2 bids

    Details are provided in the attached files. Please read them all!

    £38 (Avg Bid)
    £38 Avg Bid
    11 bids

    ...DNA database. b. Identify any conditional aspects of the process, for example if there are any stages of the process where resources only become available once the previous sample has been processed. c. Second, write out the relevant equations associated with each step of the process, and construct a formula for the overall time in system. d. Use relevant notation and write out equations using Equation Editor in Word. e. Note – the rule of thumb is that any reader can pick up your report and replicate your results by following the methods. 2. Use mean values of each parameter to construct an “average” solution. a. Unit of interest – a DNA sample collected by a CSI. That is, each sample must be modelled individually. b. Assume both CSI and forensics lab op...

    £135 (Avg Bid)
    £135 Avg Bid
    30 bids

    ...cybersecurity professional for mentoring and guiding a student through various cybersecurity courses and projects. Requirements: - Experienced cybersecurity professional with preferable certifications such as Security+, CISSP, GSEC, SSCP, etc. - Outstanding communication skills and proficiency in English. - Strong teaching and mentoring experience. - Advanced knowledge in Network Security, Cryptography, and Ethical Hacking - Cybersecurity certification as mentioned below. - Outstanding communication abilities. - Teaching or training experience preferred but not essential - Ability to break down complex cyber security concepts. Experience: Minimum of 10 years' practical experience in cybersecurity, preferably with recognized companies. Pro...

    £9 - £15 / hr
    Featured Sealed
    £9 - £15 / hr
    9 bids

    I need a professional progra...program. The problem lies in the document authentication process, specifically with reading the chip data of ID cards. The ideal candidate should have: - Proficiency in Java and experience with the jmrtd program - Prior experience dealing with document authentication, especially with ID cards - Strong problem-solving skills and ability to troubleshoot complex issues - Good understanding of cryptography and secure communication The main tasks in this project include: - Diagnosing the root cause of the issue when reading the chip data - Implementing a solution that ensures successful document authentication for ID cards - Testing the updated program to ensure it works as expected Your expertise and efficiency in resolving this issue will be highly ap...

    £92 (Avg Bid)
    £92 Avg Bid
    11 bids

    I am seeking knowledgeable developers to construct a centralized cryptocurrency exchange with a comprehensive inclusion of Bitcoin, Ethereum, and Ripple. Key requirements for the task are: - Efficient Development: You should have a strong backgr...cyber threats, you'll need to harness your end-to-end cryptographic knowledge to ensure top-notch security measures. - Engaging User Interface: The ability to build an intuitive, easily navigable and engaging user interface is crucial. Proven experience designing user-friendly platforms is advantageous. The ideal candidate will have a blend of technical versatility in blockchain technology, cryptography, and platform interface design. A comprehensive understanding of commonly traded cryptocurrencies Bitcoin, Ethereum, and Ripple is...

    £15 / hr (Avg Bid)
    £15 / hr Avg Bid
    15 bids

    ...functionality. - Provide comprehensive documentation and support resources for users, including tutorials, FAQs, and troubleshooting guides. **Key Requirements:** - Proven experience in developing cryptocurrency platforms or similar financial systems, with a focus on Bitcoin (BTC) transactions. - Expertise in relevant programming languages, frameworks, and technologies, such as blockchain development, cryptography, and secure web development. - Strong understanding of Bitcoin (BTC) protocol specifications, wallet management principles, and security best practices. - Effective communication skills and a collaborative approach to project management, including regular updates, feedback sessions, and milestone reviews. - Demonstrated ability to deliver high-quality projects on time ...

    £533 (Avg Bid)
    £533 Avg Bid
    33 bids

    ...Processes - Handling Unix signals, processes, and threads management (fork, exec). Virtual Memory - Concepts, page tables, and memory management techniques. Caches - Understanding caching, memory hierarchy, and cache-related strategies. Synchronization and Deadlocks - Locks, mutexes, barriers, and deadlock prevention. Networking - IP, TCP, DNS, and secure channel foundations. Secure Channels and Cryptography - Fundamentals of secure communications, public key infrastructure. Pipelining and Processors - CPU pipelining, hazards, out-of-order execution. Out-of-Order Execution and Side Channels - Advanced CPU architecture features and security implications. Meltdown/Spectre - Discussing speculative execution vulnerabilities. Past final exam has been attached with this proposal. Plea...

    £102 (Avg Bid)
    £102 Avg Bid
    8 bids

    Details are provided in the attached files. Please read them all!

    £26 (Avg Bid)
    £26 Avg Bid
    12 bids

    I'm looking for a skilled researcher in the field of cryptography, specifically focused on Oblivious Transfer (OT). Find all OT extension implementations and compare them for efficiency and security (sometimes the security assumptions are different hence the security levels are also different. Efficiency can be compared in terms of average memory usage and average time required to complete one OT/OTe of same size in different libraries). Key Requirements: - Strong background in cryptography - Proven experience in conducting research within this field - Ability to evaluate security and efficiency of cryptographic libraries - Familiarity with the implementation of OT in different environments, particularly within OT libraries. The primary goal of this project is to prov...

    £69 (Avg Bid)
    £69 Avg Bid
    8 bids

    This project is all about extracting insights from survey data. We're seeking to analyze complex relationships between variables. - Data analysis is based on Structural Equation Modelling, using AMOS software. - The provided data type is survey-intense; inside experience with large survey datasets will be a big plus. - Proficiency in AMOS is required; prior usage in a similar project context is ideal. - Objectives include finding connections between our data points and making them comprehensible. - An relevant academic or research background is a definite advantage. The end goal is to generate a transparent analysis that reveals hidden patterns and relationships. If you are a keen analyser with AMOS mastering, we would love to hear from you.

    £114 (Avg Bid)
    £114 Avg Bid
    20 bids

    ...have made sure that the sample is random. Explain your methods to get a truly random sample. Generate Scatterplot Create a scatterplot of the x and y variables noted above. Include a trend line and the regression equation. Label the axes. Observe patterns Answer the following questions based on the scatterplot: Define x and y. Which variable is useful for making predictions? Is there an association between x and y? Describe the association you see in the scatter plot. What do you see as the shape (linear or nonlinear)? If you had a 1,800 square foot house, based on the regression equation in the graph, what price would you choose to list at? Do you see any potential outliers in the scatterplot? Why do you think the outliers appeared in the scatterplot you generated? What d...

    £24 (Avg Bid)
    £24 Avg Bid
    35 bids

    I'm in need of an expert proficient in creating chemical thermodynamics, mathematical model and a corresponding Matlab simulation for ternary systems, focusing on vapor-liquid equilibrium . Key Tasks: - Developing a mathematical model for calculating vapor-liquid equilibrium for a ternary system. - Applying the Patel Teja equation of state to this model. - Creating a corresponding Matlab simulation code for the model. Ideal Candidate: - Proficient chemical engineering and thermodynamics. - Prior experience with creating mathematical models for vapor-liquid equilibrium. - Equipped with advanced skills in Matlab programming. - Able to provide step-by-step explanations for the developed model and code. Please be prepared to share relevant samples of your prior work in this are...

    £96 (Avg Bid)
    £96 Avg Bid
    10 bids

    ...effectiveness of these three sample selection adjustment methodologies in quantile regression modelling framework is to be tested, and the best one is to be further used in “decomposition” analysis. The three types of sample selection adjustment methodologies are: • Albrecht et al. (Research Paper): This procedure combines a semiparametric binary model for the participation equation with a linear quantile regression model for the wage equation and follows Buchinsky's (1998) approach. The research paper is based on this approach. • Arhomme (Stata Package): ssc install arhomme • Qregsel (Stata Package): ssc install qregsel To determine the impact of various characteristics of workers on their wage in the regular and casual sectors using &ldquo...

    £92 (Avg Bid)
    £92 Avg Bid
    9 bids

    ...problem-solving process. What NOT to Do - Do Not Use Bitcoin Libraries for Transaction Validation: You must not use any Bitcoin-specific libraries or frameworks that automate transaction validation processes. The intent of this task is for you to implement the validation logic manually. - Permissible Libraries: The use of standard cryptographic libraries, such as secp256k1 for elliptic curve cryptography, and standard hashing libraries (e.g., for SHA-256) is allowed and encouraged. These libraries are essential for implementing the cryptographic underpinnings of bitcoin without reinventing the wheel. - Implement the Mining Algorithm Yourself: You are required to implement the mining algorithm on your own. This includes creating a way to correctly form a block header, calculate ...

    £9 (Avg Bid)
    £9 Avg Bid
    3 bids

    I need someone to help write up a script that allows users to do some calculation on a web page. The idea is that when you have a mathematic formula, you plug in data and then perform the calculation. It is very tedious and inconvenient. It would be nice that the users do not have to see or touch the formulas, they simply input the numerical data and then click calculate button, the result pops up immediately. The formulas A/L - B/W = F and B=1-A (1+F*W)^A multiplied by (1-F*L)^B and the product is designated as R or something like this. There will be some fields for users to fill out including A, L and W (B can be calcuated when A is known, or users can define B as well), and then they are instructed to click on the calculate button to get F and R. So basically, users define A,...

    £55 (Avg Bid)
    £55 Avg Bid
    15 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    £166 (Avg Bid)
    £166 Avg Bid
    12 bids

    I am looking for an expert in blockchain technology to create a Metamask wallet that supports the Ethereum network. This project will involve: - The core feature of sending and receiving ETH. This is a feat... - An integration with hardware wallets functionality. User security is paramount to this project. As such, the aim is to have our Metamask wallet integrate with hardware wallets, which is an advanced security measure. Successful implementation should ensure a higher level of safeguarding for Ethereum transactions. Ideal freelancer for this project should be well-versed in blockchain and cryptography, and have prior experience in creating and working with blockchain wallets, particularly Metamask. Knowledge of how to integrate wallets with hardware devices will be especial...

    £130 (Avg Bid)
    £130 Avg Bid
    8 bids

    ...effectiveness of these three sample selection adjustment methodologies in quantile regression modelling framework is to be tested, and the best one is to be further used in “decomposition” analysis. The three types of sample selection adjustment methodologies are: • Albrecht et al. (Research Paper): This procedure combines a semiparametric binary model for the participation equation with a linear quantile regression model for the wage equation and follows Buchinsky's (1998) approach. The research paper is based on this approach. • Arhomme (Stata Package): ssc install arhomme • Qregsel (Stata Package): ssc install qregsel To determine the impact of various characteristics of workers on their wage in the regular and casual sectors using &ldquo...

    £84 (Avg Bid)
    £84 Avg Bid
    10 bids

    ...cryptographic-based random number generator, or RNG, which is used in a casino setting. I have output sequences of the RNG that can be utilized for this prediction. - Successful prediction has potential for great gambling strategies. ## What YOU Can Do: - With your knowledge and experience in RNGs and cryptography, I am hopeful you can create an algorithm or a model to predict the next sequences. ## What You Should Have: - Extensive experience with RNGs, especially those that are based in cryptography, is absolutely crucial for this project. - Experience in creating predictive algorithms or models. - Good understanding of gambling methodologies would be a plus. - Understand that the goal is not to exploit or hack, but to generate effective gambling strat...

    £56 / hr (Avg Bid)
    £56 / hr Avg Bid
    5 bids

    I'm seeking a highly experienced tutor for advanced statistics, specifically within the realm of multivariate analysis and experimental design. While it is not mandatory, familiarity with structural equation modeling, multivariate regression and factor analysis would be highly beneficial. Tutoring sessions should be scheduled once per week. Ideal freelancers for this project would be those with: - Expertise in advanced, graduate-level statistical methods - Familiarity with several advanced statistical topics - Proven experience in tutoring or teaching statistics. I am halfway through this course and it will end on May 25th. I will also have 5 courses after this that are similar that I would need help with as well. Please submit your bid to include the cost for the entire ...

    £147 (Avg Bid)
    £147 Avg Bid
    18 bids

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that i...hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the succes...

    £96 (Avg Bid)
    £96 Avg Bid
    54 bids

    I'm looking for a skilled developer who can integrate Metamask and Phantom Wallet into my existing PHP script. The main objective is the implementation of sign-in functionalities using these crypto wallets. Key Responsibilities: - Integrate Metamask wallet into the PHP script - Integrate Phantom Wallet into the PHP script - Enable signing in via bo...freelancer for this task should possess: - Expertise in Blockchain technology - Proficiency in integrating wallet systems, specifically Metamask and Phantom wallet - Proficient knowledge of PHP scripting - Experience in implementing sign-in functionalities with Blockchain wallets will be a plus. Your role will be critical for the security and functionality of the project, thus understanding of cryptography and blockchain princ...

    £41 (Avg Bid)
    £41 Avg Bid
    29 bids

    I'm searching for an EES (Engineering Equation Solver) expert tasked with modeling and simulation of a furnace for heating purposes. As this project dives into thermal systems, relevant experience in this field is invaluable. Report with calculation formula, step by step. EES calculation file, result data in the table You can do it in Python This project is only report writing and all the codes and implementation, we can find on google or ChatGPT I want plaig and Ai free work as I’ve to submit it Project specifics will include: - Detailed thermal system simulation of a furnace - Deliver an accurate and efficient furnace model Ideal candidates will: - Apply profound knowledge of EES - Demonstrate experience with thermal system modeling - Be proficient in furnace desig...

    £104 (Avg Bid)
    £104 Avg Bid
    3 bids

    ...Requirements: - Exceptional typing skills and attention to detail - Adherence to specific font style, headers, footers, indentation, and margins - Must be adept at formatting complex document structures - Creation of a comprehensive table of contents (titles, figures, glossary, ...) - All figures and images should be copied and depicted at the proper scale - All formulas must be type in accurately as equation formatting - All parts, sections and titles should be indexed and formatted properly - Font to be used: Sabon font - The document should have a cover page Ideal candidates should have relevant experience with document transcription, Microsoft Word functionality and creating tables of contents, special care should be . Your performance will be measured by the accuracy of the...

    £126 (Avg Bid)
    £126 Avg Bid
    140 bids

    Show Me Your Skills With a 1 minute Test video: exaplaining how to solve this linear equation: " 3x-7 = 14 " Coul be a Easy Sketch Pro animation Style or, Like the one of 3blue 1 brown or the style you choose, exaplaining how to solve this linear equation: " 3x-7 = 14 " MATH VIDEO OF 5 MINUTES - ABOUT LINEAR EQUATIONS -BETTER THAN VIDEOS OF THE LINKS I POST BELOW OR IF YOU COULD DO IT LIKE THE VIDEO OF 3 BLUE 1BROWN or WITH EASY SKETCH PRO GO AHEAD, NO MATTER WHATS THE METHOD I WANT THEM TO BE BETTER THAT THE VIDEOS I POST IN THE LINKS BELOW I'm looking to produce a captivating educational video that makes learning basic math concepts engaging for elementary school students. EXAMPLES THE VIDEO I NEED SOMEONE THAT COULD DO IT BETTER THAN THIS ...

    £8 (Avg Bid)
    Guaranteed
    £8
    14 entries

    ...imbalances: different number of buyers/sellers compare to similar price (I will share screenshot, but I don't know the logic how to make it - I required consultation and idea) 2. show places where there were many buyers/sellers but the the price didn't go in that direction (absorption) 3. some KPI how strong the change of the price was compare to buyers/sellers participation (don't have specific equation, need consultation nad tests) I am open to suggestions for any specific customization requirements for the indicator. The indicator should be integrated with my existing trading tools - Ninjatrader 8. The indicator will be in C#. You will share the source code with me and assist with testing and adjustments in case the fake behavior of the indicator will be spot...

    £112 (Avg Bid)
    £112 Avg Bid
    76 bids

    I am looking for a keen psychologist or statistician with proficiency in Amos, R , or Mplus . The project primarily entails executing structural equation modeling on observational data. Key Requirements: - You must be proficient in using Amos. - Statistical modeling experience with observational data. - Ability to handle a medium-sized data set (100-500 samples) - Detail-oriented and can deliver accurate results. Your understanding of the subtleties of observational data and structural equation modeling will be critical to the success of this project. Looking forward to your bid!

    £95 (Avg Bid)
    £95 Avg Bid
    38 bids