Documentation artificial intelligence jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    14,520 documentation artificial intelligence jobs found, pricing in USD

    Logo desi...Le Tour de France (bicycle) Sony vaio FedEx ( the arrow) Our company represents: Artificial intelligence Customer relationship Business growth and success Data Data analytics Modern Industry is data analytics, artificial intelligence, consulting, business intelligence. Want it to look very modern like Silicon Valley startup companies

    $144 (Avg Bid)
    $144 Avg Bid
    1 bids

    A 6 pages APA paper regarding a Business Intelligence topic

    $58 (Avg Bid)
    $58 Avg Bid
    25 bids

    Logo desig...Le Tour de France (bicycle) Sony vaio FedEx ( the arrow) Our company represents: Artificial intelligence Customer relationship Business growth and success Data Data analytics Modern Industry is data analytics, artificial intelligence, consulting, business intelligence. Want it to look very modern like Silicon Valley startup companies

    $108 (Avg Bid)
    $108 Avg Bid
    1 bids
    IOT DASHBOARD 6 days left

    We are a business intelligence company and we have a need to design a dashboard webpage that shows information about a production line.

    $145 (Avg Bid)
    $145 Avg Bid
    16 bids

    ...am looking for somone who will join our team to help us manage our SAAS platform. From the candidate we expect to be commited to his own obligations and ability to write documentation and instructions. We will teach you how to manage our app and how to test it - we looking for long term cooperation. (project language is ENGLISH - we have in project people

    $1194 (Avg Bid)
    $1194 Avg Bid
    20 bids

    i need business intelligence guy for my task know about math and stat.......................................................

    $33 (Avg Bid)
    $33 Avg Bid
    6 bids

    i need business intelligence guy who is bcs and expert in math and stat and i will provide u all in detail........................................................................................................................................................................

    $37 (Avg Bid)
    $37 Avg Bid
    6 bids

    i need business intelligence task i will provide u all in chat bsc engineer can understand easily ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

    $33 (Avg Bid)
    $33 Avg Bid
    4 bids

    ...Oats [Picture] 1 dl greek yogurt 1 dl rolled oats 1.5 dl cup unsweetened almond milk 1 teaspoon chia seed 1 teaspoon flax seed 1 teaspoon maple syrup, stevia, or other artificial sweetener. Mix all incredients together in a small bowl, and place coverd in a sheet of plastic film in the fridge over night. Enjoy with some fresh banana slices on top

    $18 (Avg Bid)
    $18 Avg Bid
    4 bids

    I have a range of workflows and procedures to be developed within Global Mapper. Data sets are from UAV/Drone data and workflows will consist of - automated analysis routines from custom scripts - procedures generated by me to be documented with step by step instructions and accompanying screenshots and commands.

    $15 / hr (Avg Bid)
    $15 / hr Avg Bid
    2 bids

    ...Freelancers! This project consists of 2 indepedent projects. Both have a bit of excel 1 is on linear programming and the other on forecasting methos. For both we need documentation of 1K words. For each one i can give $20-25AUD. All the data processing and modeling should be made in excel. I ATTACH data here: [login to view URL] I ATTACH project

    $29 (Avg Bid)
    $29 Avg Bid
    7 bids

    I need an iPhone app. I would like it designed and built. Creates a time and date stamp on a new calendar when ambient light sensor on iPhone registers (1) decrease in light value for seconds or minutes AND (2) when magnetic sensor on iPhone detects increase in magnetic field during same period AND (3) when proximity sensor on iPhone notes a change in proximity during same time interval. Below...

    $1159 (Avg Bid)
    $1159 Avg Bid
    19 bids

    ...using R programming language and analyse them. 5. “A good data warehousing professional is always scouting for new sources of data that can be applied to business intelligence”. In this spirit, develop a DTD/XML Schema based on a data warehouse cube and apply it to develop an XML document.

    $211 (Avg Bid)
    $211 Avg Bid
    4 bids

    i will give u all things in chat i need app report in 1 hour............................................................................................................................................................................

    $22 (Avg Bid)
    $22 Avg Bid
    4 bids

    ...identify if a text has product, name, organization name, stock name . Also help us guide if a string is question, feedback or a service/sales request. 3. Search powered Intelligence API - 4. Face recognition API - Tag every unique face, identify detailed aspects and help create a matching server API 5. Article Spinner API - Something like WORD AI

    $4306 (Avg Bid)
    Featured
    $4306 Avg Bid
    30 bids

    We need someone to do some research/business intelligence for us before we implement some new business changes. The question is relatively simple but it will require detailed web research in addition to including your research links, findings and recommendations, all supported by direct, verifiable citations and online references. The reason

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    25 bids

    ...weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink / stateflow 3. product designing ( mechanical part ) 4. embedded iot ( circuit design , firmware developer 5. Android

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    43 bids

    ...weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink / stateflow 3. product designing ( mechanical part ) 4. embedded iot ( circuit design , firmware developer 5. Android

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    42 bids

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $32 / hr (Avg Bid)
    $32 / hr Avg Bid
    1 bids
    Build me a website and Logo 4 days left
    VERIFIED

    We are...and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on google search

    $575 (Avg Bid)
    $575 Avg Bid
    60 bids

    We are looking for the best node js developers to help build AI 3d models talking characters that talk. You must speak great English. We will test your English skill...team are some of the best in the world. This not a job for beginners. This is challenging and only best survive. You must provide demo of your past work. Thank you AI Team artificial

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    6 bids

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $52777 (Avg Bid)
    $52777 Avg Bid
    2 bids

    Categories and Subject Descriptors > Artificial Intelligence > Probability and Statistics > Nonparametric statistics > Database Management > Database applications—Data mining KEYWORD TAXONOMY BUILDING > Building a domain specific taxonomy from a set of keyword phrases augmented with knowledge and contexts > Obtain knowledge (concepts that correspond

    $625 (Avg Bid)
    $625 Avg Bid
    2 bids
    Project Documentation 3 days left
    VERIFIED

    Preparation of Detailed Project Report (DPR) includes 1. Formatting of complete document (approx. 250 pages) 2. Copy-Paste from a similar Project Report 3. Preparation of Index with Page number 4. Submission of final report in Word & PDF format with indexing feature 5. I will explain further details after project is awarded 6. Payment Terms : 20% Advance, 80% after completion and acceptance 7....

    $17 (Avg Bid)
    $17 Avg Bid
    8 bids

    I Need 2 algorithms: -The Nearest Neighbor Algorithm (Here is the tutorial on how to do it ---> [login to view URL]) -Genetic Algorithm (Here is the tutorial on how to do it ---> [login to view URL]) The program needs to; -Read a ".txt" file (In the file there is the city number, the X coordinate of the location of the city, the Y coordinate of the location of the city) Here ar...

    $25 (Avg Bid)
    $25 Avg Bid
    6 bids

    Hi there, I am looking for java application developed with documentation report about School Management System. Please message me to discuss the details.... Thanks

    $471 (Avg Bid)
    $471 Avg Bid
    15 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    a general program for electronic archiving to reorder the documentation in the library or school by Access in Microsoft

    $19 (Avg Bid)
    $19 Avg Bid
    2 bids
    Trophy icon afrointelligence logo2 3 days left

    Please look at the included image. What I need is this: I need a logo made! Please keep the "afro - intelligence the same," but please add in the braids for the two "Ls" and please add the head to the right of the logo. Please use the same style as the head that is to the right. Get creative with the hairstyle. Either use braids etc. Please look up

    $150 (Avg Bid)
    Guaranteed Sealed
    $150
    27 entries

    Hi there, We're an innovative start-up B2B brand creating Artificial Intelligence solutions for our customers - We have a pipeline of business but we understand that sometimes people judge you by the way you look not just the power of the product you put infront of them. Hence, skills like yours are key for us moving forward. We're looking for a design

    $189 (Avg Bid)
    $189
    5 entries

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I am sonali masrankar, an artificial intelligence researcher and programmer. I am busy with a data analytics project and would like some help in creating a module for implementation of group lasso on the dataset. The dataset is available in the attachments. We can provide more information on the dataset by conversation.

    $116 (Avg Bid)
    $116 Avg Bid
    9 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids