...injection, URL jump, file upload test, etc.), system application vulnerabilities and other content testing and [url removed, login to view] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabiliti...
...company logo already. The symbol should describe the functionality of the scientific instrument and should put into a symbol the phase described below: Symbol 1) label free detection Symbol 2) measuring the size of a particle Symbol 3) measuring the concentration of particles symbol 4) measuring fluorescence symbol 5) The ability to measure multiple
we want a such project in c# using emgu API which takes a microscopic images from the saved data set an on the base of their shapes etc it will decide weathers its a healthy cell or nor
I need a photobooth application that will be used in shopping malls. Can be done in any technology as long as the following features can be implemented: * Take Picture(s) * Recognize face(s) * Optionally apply filter (Similar to Snapchat) * Print Photo * Share (Facebook, Instagram, Twitter, upload image to a CDN and email / sms link to provided
I want to have a competent android developer to upgrade an android app to do more, which includes fingerprint detection and communication with a server. This is a small short term project, which needs a competent android developer.
Handset application working with an open source back end and delivering sensor detection and application content based on rules. For example: Upon sensor detection, send a notification to user or present a webpage offering discount or welcome user with a personal message etc.
...topics are all related to cyber security. We will give some pointers to sites and books for you to narrow down your research for each topic. One such topic is "Intrusion Detection through deception - Learn how to easily set up honeypots and wire-traps to detect if you are under attack" We have a couple of sites and videos which we will give you for
i am looking for facial recognition expert. it must be able to defect if it is a real person or not. that means when a man is ...camera with mask on his face, it must alert that he is using mask or other fake thing. please bid only if you have made this engine and put "i have already my own liveness detection engine" in your bid. thanks in advance
Put it in short, we are looking for a script that could bypass GeoEdge Emulator. If visitor is coming from real mobile phone, they will see Page A but if the visitor uses GeoEdge and come to our page, it will see Page B. Please submit your idea to us and we are willing to pay up to $300/script. ** GeoEdge has a 5 days Trial that you could use to test the script you made.
...Description are - RTSP network video input - 2-4 way vehicle moving detection - size filtering algorithm for motorbike, vehicle, or truck - should consider day and night condition - report : data log by time, direction, and size - configurable : threshold for image recognition related factors - operation : up to windows 7 and windows
Skills and specifications: 1- Coding style: MVC 2- NO third-party SDK required 3- GENERATE, SCAN, and Print (AirPrint) PDF417 2D barcode 4- Document Detection and Scanning (Create Doc (PDF) for multiple pages, Auto crop, Auto adjustment) 5- Database (CRUD): MySQL Kindly DON'T bid if you are not elligable
...anyone perfect for the job. Whilst trying to find a solution to our problem, I came across your work on Stackoverflow; [url removed, login to view] Just need to confirm: 1. Is it the same multiscale peak detector on LabVIEW? 2. Do you still have it (the updated one to reduce the noise and errors)
OBJECTIVE ------------------- Measure the people flow, face detection and attractivity of physical showcases (offline stores) through cameras. The result will be a selling funnel an overview with the best days and times of the business and the customer profile with gender classification and age estimative.
...firewall And also the screenshot how system should work The program will detect phishing attack using rule based phishing detection algorithm. Spoofing attack will be detected by analyzing the email header and for malware detection the mail attachment and the URL within the body (if any) of the email will be sent to Virus Total There are some modifications
I need to implement a system which consists of camera, FPGA and screen and this system will detect the total number of faces inside the captured image by camera and show the result on screen. The algorithm used for this is viola-jones algorithm.
...app. We know the one function of LabVIEW we need. Everything else can be developed into the app, however we want to know if it's possible the LabVIEW WA Multiscale Peak Detection algorthm can be made into a C# function. This is the only function from LabVIEW that is required, so looking to see if anyone can make this into a C#. We have also looked
Mobile part [url removed, login to view] -registration and -login screen 2. order screen. (user has to select time and date for pick-up/drop-off) and auto detection for the location. Mobile admin screen 1. list of orders / sorted by nearest location. Web part 1. User API endpoint -login -registration 2. orders API endpoint -List of