Pattern vector jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    3,004 pattern vector jobs found, pricing in USD

    Hi, I need php code to find and replace the number in every "height='360'" in a string. The number 360 may be 440, 200.. it could be anything.. so I need the code to replace whatever the number is with the number 500 Thanks for bidding!

    PHP
    $29 (Avg Bid)
    $29 Avg Bid
    22 bids

    We need fabric pattern, we are clothing and fabric printing company we need a designer who can create beautiful seamless pattern for clothing and for various textile products

    $93 (Avg Bid)
    $93 Avg Bid
    16 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    Hi, I have a picture of a pattern on a pillow. I need this pattern recreated digitally in vector graphics. Must have all lines/features exactly like the pattern has. Looking to get this done in the next 48 hours. Please bid if you can do this in less than 48 hours.

    $22 (Avg Bid)
    $22 Avg Bid
    26 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $568 (Avg Bid)
    $568 Avg Bid
    1 bids

    ...firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware device

    $555 (Avg Bid)
    $555 Avg Bid
    1 bids

    ...of the logos I like is LOGO OAXACA CON LAS MANOS in which the company name ALL OAXACA can be in very bold letters with images of chilis and spices and crickets and indian pattern drawings and corn can be inserted into the words ALL OAXACA (no hands). I would like a logo that captures the essence of the traditional culture of Oaxaca, highlighting gourmet

    $33 (Avg Bid)
    $33 Avg Bid
    78 bids

    need to put pattern onto shorts then send to me in ai and jpeg files. dont have much of budget so possibly need a quick job done on this

    $21 (Avg Bid)
    $21 Avg Bid
    26 bids

    Hi my client runs a fashion store and range we require patterns to be made for printing onto our fabrics this is an express project the timeframe is limited to 1 week must be working files and ready print files adjustable for resizing or touchups

    $101 (Avg Bid)
    $101 Avg Bid
    29 bids

    Looking for a pattern maker for mens travel/doctor bag. Bag will be made from Vegan Crocodile Leather. See attached pic for an idea of the look we are trying to achieve.

    $467 (Avg Bid)
    $467 Avg Bid
    6 bids

    As part of an art installation (see attachment) we created a cube with 36 unique patterns (...patterns (9 for every face of the cube... see attachment 2 for one of the patterns). Visitors should be able to download an app on their mobile. Once the app recognizes a pattern it uploads Audio Visual material. We are looking for someone to develop the app.

    $759 (Avg Bid)
    $759 Avg Bid
    33 bids

    I want to design a new camo pattern based off of a image of an animal. The pattern must be able to be printed on today's textile printers. I would like the pattern to be 36"x30" in size. It must be 3-D. I would like 4 color schemes from the original color; one based on the original color of the image, one based on spring colors, one based on fall

    $1170 (Avg Bid)
    $1170 Avg Bid
    28 bids

    I need an experienced freelancer to work in a range of corporate uniforms. The person need to create patterns and specs

    $68 / hr (Avg Bid)
    $68 / hr Avg Bid
    19 bids

    ...would like a graphic designs for the wall. wall is 4mx3m so graphic must be vector. Please prepare the file in the 4:3 ratio so can be used straight away. Yellow as the main colour and the symbols or icons in grey, white and black etc. i want icons in some sort of pattern. icons should be anything related to mobile and tablets. ie. cables, covers

    $72 (Avg Bid)
    Guaranteed Top Contest
    $72
    35 entries

    fpga pattern generator connected to a pc starting from an evaluation board and an HDL from TI.

    $305 (Avg Bid)
    $305 Avg Bid
    8 bids

    I have pictures of several articles of clothing that I would like duplicated and possibly augmented in a custom way. I need someone who can work with me to make those...several articles of clothing that I would like duplicated and possibly augmented in a custom way. I need someone who can work with me to make those changes and develop a flat pattern.

    $383 (Avg Bid)
    $383 Avg Bid
    13 bids

    this is the project of bouncing ball javafx project where you have to reorganize the code as you see fit and add x direction physics to it.

    $30 (Avg Bid)
    $30 Avg Bid
    9 bids

    65-70 patterns for gent’s leather shoes on frelance

    $786 (Avg Bid)
    $786 Avg Bid
    3 bids

    Looking for freelance Pattern maker for t shirts.. sweat shirts..for kids ..boys .. girls ,,men and women.

    $241 (Avg Bid)
    $241 Avg Bid
    7 bids

    ...[login to view URL] - [login to view URL] - [login to view URL]

    $200 (Avg Bid)
    Guaranteed
    $200
    286 entries
    Trophy icon Redesign a pattern Ended

    I need a camouflage pattern. Could be very close to those in the market, but we can not use an identical pattern. We need one that is somewhat re-designed.. Similar to the ones shown here, although at least 4 times bigger. (Next step will be to design a jacket or shirt with the same pattern)

    $30 (Avg Bid)
    Guaranteed
    $30
    16 entries

    I need fashion designers who can come up with fresh designs of Indian ethnic wear including bridal lehengas, anarkali, gowns. the deliverable will include digital coloured illustration, digital sketch / flat drawings from front back (and side, of required), embroidery detailing and explanations (showing impirtnat motifs separately for crafstman to understand)

    $78 (Avg Bid)
    $78 Avg Bid
    5 bids

    I have a concept for a hand bag that I would like converted into a pattern. Initial fee will be $30 for a 20 minute skype consultation so we can discuss the brief and I can get comfortable with you.

    $249 (Avg Bid)
    $249 Avg Bid
    44 bids

    Hello, I would like this design hand drawn and as a repeated seamless pattern. It needs to look obviously hand drawn too please. The tiny dots I want to be more naturally positioned and shaped. A similar size to these dots but just not so perfect (see the example attachment for understanding of request) And the elements (cubes etc) need to be in

    $7 (Avg Bid)
    Guaranteed
    $7
    16 entries