The project need to be finished by black hat . 1. The requirements of the actual use of hacking attacks on the site of the non-destructive nature of the site of the offensive test, the main analysis includes information collection class, configuration management class (HTTP method testing, information disclosure, etc.), authentication class (user enumeration, Password verification, password reset ...
...company logo already. The symbol should describe the functionality of the scientific instrument and should put into a symbol the phase described below: Symbol 1) label free detection Symbol 2) measuring the size of a particle Symbol 3) measuring the concentration of particles symbol 4) measuring fluorescence symbol 5) The ability to measure multiple
we want a such project in c# using emgu API which takes a microscopic images from the saved data set an on the base of their shapes etc it will decide weathers its a healthy cell or nor
...(user should still be able to apply filters and print, in case Internet connectivity not available) so a "windows desktop application" would be first choice, but if face detection implementation proves too difficult, then web solution also fine. If filters can be applied in real-time it would be first prize (willing to pay extra if this can be done
I want to have a competent android developer to upgrade an android app to do more, which includes fingerprint detection and communication with a server. This is a small short term project, which needs a competent android developer.
We're all set to launch our ad fraud detection and traffic optimisation platform this September, so we're seeking for someone to help us finalise the core website content, and also create a visually engaging sales presentation (.ppt, .pdf or Prezi). We're proud to say our product is one of the few of its kind on the market and we're very confident
Handset application working with an open source back end and delivering sensor detection and application content based on rules. For example: Upon sensor detection, send a notification to user or present a webpage offering discount or welcome user with a personal message etc.
...topics are all related to cyber security. We will give some pointers to sites and books for you to narrow down your research for each topic. One such topic is "Intrusion Detection through deception - Learn how to easily set up honeypots and wire-traps to detect if you are under attack" We have a couple of sites and videos which we will give you for
i am looking for facial recognition expert. it must be able to defect if it is a real person or not. that means when a man is ...camera with mask on his face, it must alert that he is using mask or other fake thing. please bid only if you have made this engine and put "i have already my own liveness detection engine" in your bid. thanks in advance
Put it in short, we are looking for a script that could bypass GeoEdge Emulator. If visitor is coming from real mobile phone, they will see Page A but if the visitor uses GeoEdge and come to our page, it will see Page B. Please submit your idea to us and we are willing to pay up to $300/script. ** GeoEdge has a 5 days Trial that you could use to test the script you made.
I am looking for a developer who have experience CCTV real time video analysis. Description are - RTSP network video input - 2-4 way vehicle moving detection - size filtering algorithm for motorbike, vehicle, or truck - should consider day and night condition - report : data log by time, direction, and size - configurable : threshold
Skills and specifications: 1- Coding style: MVC 2- NO third-party SDK required 3- GENERATE, SCAN, and Print (AirPrint) PDF417 2D barcode 4- Document Detection and Scanning (Create Doc (PDF) for multiple pages, Auto crop, Auto adjustment) 5- Database (CRUD): MySQL Kindly DON'T bid if you are not elligable
We would need writing for description of life science research used pr...Monoclonal Antibodies Polyclonal Antibodies Flow Cytometry (FACS) IHC Antibodies Phospho Antibodies Tag and Control Antibodies Secondary Antibodies ELISA & Array Kits ELISA Kits Detection Kits Every category article would need 400 words in total ( a snippet + an open paragraph ).
...anyone perfect for the job. Whilst trying to find a solution to our problem, I came across your work on Stackoverflow; [url removed, login to view] Just need to confirm: 1. Is it the same multiscale peak detector on LabVIEW? 2. Do you still have it (the updated one to reduce the noise and errors)
OBJECTIVE ------------------- Measure the people flow, face detection and attractivity of physical showcases (offline stores) through cameras. The result will be a selling funnel an overview with the best days and times of the business and the customer profile with gender classification and age estimative.
...firewall And also the screenshot how system should work The program will detect phishing attack using rule based phishing detection algorithm. Spoofing attack will be detected by analyzing the email header and for malware detection the mail attachment and the URL within the body (if any) of the email will be sent to Virus Total There are some modifications
I need to implement a system which consists of camera, FPGA and screen and this system will detect the total number of faces inside the captured image by camera and show the result on screen. The algorithm used for this is viola-jones algorithm.