Statistical data analysis research jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    8,481 statistical data analysis research jobs found, pricing in USD
    Making a report 6 days left

    Here is an article about "A review of non-standard applications of statistical process control (SPC) charts" and I need to make a report for this article.

    $33 (Avg Bid)
    $33 Avg Bid
    14 bids

    I need a Mathematics, Statistical Analysis expert for my current projects. If you have knowledge please bid. Details will be shared in message with the freelancers.

    $22 - $179
    Sealed
    $22 - $179
    11 bids
    Statistical Analysis Excel 6 days left
    VERIFIED

    I want someone to do some Excel p-value tests on a data set I have.

    $103 (Avg Bid)
    $103 Avg Bid
    38 bids
    statistical methods 5 days left
    VERIFIED

    i need someone who's good at statistical methods

    $35 (Avg Bid)
    $35 Avg Bid
    20 bids

    ...for and identify specific trends in horse racing data. I have the data and am keen to identify specific trends that occur. Key elements must be: 1. The ability to add data and have the statistical trend analysis adapt to this additional data 2. The ability to identify specific details of what data is the driving factor behind results I have ...

    $146 (Avg Bid)
    $146 Avg Bid
    16 bids

    ...for and identify specific trends in horse racing data. I have the data and am keen to identify specific trends that occur. Key elements must be: 1. The ability to add data and have the statistical trend analysis adapt to this additional data 2. The ability to identify specific details of what data is the driving factor behind results I have ...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    20 bids

    Details will be shared with winning bidder.

    $20 - $170
    Sealed
    $20 - $170
    8 bids

    SPSS Statistics, Statistical Analysis, Statistics experienced person required. Detail will be share later.

    $20 - $170
    Sealed
    $20 - $170
    12 bids

    I need a Mathematics, Statistical Analysis expert for my current projects. If you have knowledge please bid. Details will be shared in message with the freelancers.

    $20 - $170
    Sealed
    $20 - $170
    17 bids

    This is a meta-analysis with data on the cost and time of hospitalization of two groups of patients with and without preoperative pathology, based on information from several works. It is also interesting to know the mean hospitalization cost and the average hospitalization time for each of the two groups and if there is Statistic Significance based

    $350 (Avg Bid)
    $350 Avg Bid
    5 bids

    Hi, got some STATA work need to be done. More info on PMs please bid only if YOU HAVE WORKED WITH STATA BEFORE! Thanks

    $141 (Avg Bid)
    $141 Avg Bid
    9 bids

    I need a R Programming Language, Statistical Analysis expert for my current projects. If you have knowledge please bid. Details will be shared in message with the freelancer.

    $97 (Avg Bid)
    $97 Avg Bid
    18 bids

    I need a R Programming Language, Statistical Analysis expert for my current projects. If you have knowledge please bid. Details will be shared in message with the freelancer.

    $100 (Avg Bid)
    $100 Avg Bid
    9 bids

    Data analysis, statistical graphical methods. Computing methods for collecting, manipulating and graphing data.

    $27 (Avg Bid)
    $27 Avg Bid
    9 bids
    Solve my questins 3 days left
    VERIFIED

    Production Operation Management, Statistical questions.

    $41 (Avg Bid)
    $41 Avg Bid
    21 bids

    I have a data analysis project comparing population data I have two datasets of data: 1. 250,000 rows of data with salary data for 10 countries in 2017 2. 180,000 rows of data with salary data for US-onlu in 2018 I was hoping there is a way to determine some type of statistical relationship between the two tables (e.g. correlation, pr...

    $67 (Avg Bid)
    $67 Avg Bid
    18 bids

    Job Description - Research business, analytical, and reporting needs, including the identification of critical metrics and KPIs. - Work with development & design team to implement needs to ensure needed data capture and code deployment. - Design, develop, distribute and support reports and admin/user dashboards to meet the needs of all stakeholders

    $282 (Avg Bid)
    $282 Avg Bid
    19 bids

    ...result for statistical analyst job description Statistical data analysts interpret quantitative data and design statistical models for researching problems or questions. They also maintain databases and ensure that their data are reliable. ... Almost any field that relies on collecting and analyzing large amounts of data employs statistical...

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    21 bids

    We need academic writer who can do Statistical Analysis in final report. You should have strong writing and Statistical Analysis skill for this job. It will take approx 4-5 hours and we can pay INR 2000/- fixed. Please apply with complete resume and sample of your Statistical Analysis as a sample.

    $28 (Avg Bid)
    $28 Avg Bid
    2 bids
    Article retouching 18 hours left
    VERIFIED

    Retouch a statistical newsletter to meet as good as the requirement requires.

    $91 (Avg Bid)
    $91 Avg Bid
    28 bids

    Admission portal Website • Looking for a web application developm...functionality. • Expect to have Social login enabled too with google, Facebook, twitter, etc. • Usage of BI to show a range of courses in demand currently with statistical graphs and data. • Apply for a College/Course application page. • An About-us page • A Contact-us Page

    $594 (Avg Bid)
    $594 Avg Bid
    16 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I have developed a research model which needs to be empirically tested using SEM-PLS in spss or R preferably. Data is collected in the form of a likert [login to view URL] factor analysis and descriptive statistics needs to be [login to view URL] is not going to be more than 70

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    26 bids

    to evaluate investments and identify trading opportunities by analyzing statistical trends gathered from trading activity,

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids