Virtual assistant artificial intelligence jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    11,739 virtual assistant artificial intelligence jobs found, pricing in USD

    writing an article about artificial intelligence 3 pages to be published in a domestic magazine

    $32 (Avg Bid)
    $32 Avg Bid
    24 bids
    Creative Fashion Logo 6 days left
    VERIFIED

    I need a logo for a press on artificial nail company. no more salon visits, do it yourself in 5 min application, change and reuse. Not the same old tired thing I need creative thinkers. The company name is TEMPS

    $56 (Avg Bid)
    $56 Avg Bid
    59 bids

    We are a Business Intelligence Company from Brazil working to a important client that needs a dashboard realtime webpage to show on TV and BIG [login to view URL] want proposals with UX, design, CSS/JavaScript and HTML and we expect for a prototipo before approving the purchase.

    $32 (Avg Bid)
    $32 Avg Bid
    4 bids
    Design a logo for my company 6 days left
    VERIFIED

    Hi, I have a website www.aricrypta.com. My Business is about data analytics, business intelligence, software technology and services I want someone to comeup with a createive logo for my business. It should be unique and not a copy of anything. Regards Syed

    $27 (Avg Bid)
    $27 Avg Bid
    84 bids

    The project is being assigned by Germin8 Social Intelligence, We are a techno-based social media listening firm and have two subscription-based proprietary software. Owing to our subsequent growth over the year we are expanding our consultant base and are searching for service providers who can assist us in compiling a high-quality contact database

    $174 - $521
    $174 - $521
    0 bids

    Hello everyone . I am Looking for an Artificial Intellegince software Programers who can create a Software that will give me the ability to get information on any topic from the best sources and import them into a DataBase in Excel format. For Example: Give me the best top distributers in Medicine filed.. It will generate a full list of suppliers and

    $1245 (Avg Bid)
    Featured
    $1245 Avg Bid
    21 bids

    We are looking for designing a brochure of our software product, which is intended to simplify data collection process. Product Category: Technology & Artificial Intelligence Keywords: Analytics, SaaS, Technology, Enterprise, Data Collection Output Format: CorelDraw, Illustrator, JPEG, High Resolution PDF etc. Note: We are looking for an ultra-modern

    $77 (Avg Bid)
    $77 Avg Bid
    34 bids

    Logo desi...Le Tour de France (bicycle) Sony vaio FedEx ( the arrow) Our company represents: Artificial intelligence Customer relationship Business growth and success Data Data analytics Modern Industry is data analytics, artificial intelligence, consulting, business intelligence. Want it to look very modern like Silicon Valley startup companies

    $144 (Avg Bid)
    $144 Avg Bid
    1 bids

    A 6 pages APA paper regarding a Business Intelligence topic

    $58 (Avg Bid)
    $58 Avg Bid
    25 bids

    Logo desig...Le Tour de France (bicycle) Sony vaio FedEx ( the arrow) Our company represents: Artificial intelligence Customer relationship Business growth and success Data Data analytics Modern Industry is data analytics, artificial intelligence, consulting, business intelligence. Want it to look very modern like Silicon Valley startup companies

    $108 (Avg Bid)
    $108 Avg Bid
    1 bids

    i need business intelligence guy for my task know about math and stat.......................................................

    $33 (Avg Bid)
    $33 Avg Bid
    6 bids

    i need business intelligence guy who is bcs and expert in math and stat and i will provide u all in detail........................................................................................................................................................................

    $38 (Avg Bid)
    $38 Avg Bid
    8 bids

    i need business intelligence task i will provide u all in chat bsc engineer can understand easily ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

    $33 (Avg Bid)
    $33 Avg Bid
    4 bids

    ...Oats [Picture] 1 dl greek yogurt 1 dl rolled oats 1.5 dl cup unsweetened almond milk 1 teaspoon chia seed 1 teaspoon flax seed 1 teaspoon maple syrup, stevia, or other artificial sweetener. Mix all incredients together in a small bowl, and place coverd in a sheet of plastic film in the fridge over night. Enjoy with some fresh banana slices on top

    $18 (Avg Bid)
    $18 Avg Bid
    4 bids

    ...using R programming language and analyse them. 5. “A good data warehousing professional is always scouting for new sources of data that can be applied to business intelligence”. In this spirit, develop a DTD/XML Schema based on a data warehouse cube and apply it to develop an XML document.

    $211 (Avg Bid)
    $211 Avg Bid
    4 bids

    i will give u all things in chat i need app report in 1 hour............................................................................................................................................................................

    $22 (Avg Bid)
    $22 Avg Bid
    4 bids

    ...identify if a text has product, name, organization name, stock name . Also help us guide if a string is question, feedback or a service/sales request. 3. Search powered Intelligence API - 4. Face recognition API - Tag every unique face, identify detailed aspects and help create a matching server API 5. Article Spinner API - Something like WORD AI

    $4496 (Avg Bid)
    Featured
    $4496 Avg Bid
    31 bids

    We need someone to do some research/business intelligence for us before we implement some new business changes. The question is relatively simple but it will require detailed web research in addition to including your research links, findings and recommendations, all supported by direct, verifiable citations and online references. The reason

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    29 bids

    ...weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink / stateflow 3. product designing ( mechanical part ) 4. embedded iot ( circuit design , firmware developer 5. Android

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    44 bids

    ...weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink / stateflow 3. product designing ( mechanical part ) 4. embedded iot ( circuit design , firmware developer 5. Android

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    43 bids

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $32 / hr (Avg Bid)
    $32 / hr Avg Bid
    1 bids
    Build me a website and Logo 3 days left
    VERIFIED

    We are...and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on google search

    $592 (Avg Bid)
    $592 Avg Bid
    60 bids

    We are looking for the best node js developers to help build AI 3d models talking characters that talk. You must speak great English. We will test your English skill...team are some of the best in the world. This not a job for beginners. This is challenging and only best survive. You must provide demo of your past work. Thank you AI Team artificial

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    8 bids

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $52777 (Avg Bid)
    $52777 Avg Bid
    2 bids

    Categories and Subject Descriptors > Artificial Intelligence > Probability and Statistics > Nonparametric statistics > Database Management > Database applications—Data mining KEYWORD TAXONOMY BUILDING > Building a domain specific taxonomy from a set of keyword phrases augmented with knowledge and contexts > Obtain knowledge (concepts that correspond

    $575 (Avg Bid)
    $575 Avg Bid
    3 bids

    I Need 2 algorithms: -The Nearest Neighbor Algorithm (Here is the tutorial on how to do it ---> [login to view URL]) -Genetic Algorithm (Here is the tutorial on how to do it ---> [login to view URL]) The program needs to; -Read a ".txt" file (In the file there is the city number, the X coordinate of the location of the city, the Y coordinate of the location of the city) Here ar...

    $25 (Avg Bid)
    $25 Avg Bid
    6 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids
    Trophy icon afrointelligence logo2 2 days left

    Please look at the included image. What I need is this: I need a logo made! Please keep the "afro - intelligence the same," but please add in the braids for the two "Ls" and please add the head to the right of the logo. Please use the same style as the head that is to the right. Get creative with the hairstyle. Either use braids etc. Please look up

    $200 (Avg Bid)
    Guaranteed Sealed
    $200
    30 entries

    Hi there, We're an innovative start-up B2B brand creating Artificial Intelligence solutions for our customers - We have a pipeline of business but we understand that sometimes people judge you by the way you look not just the power of the product you put infront of them. Hence, skills like yours are key for us moving forward. We're looking for a design

    $188 (Avg Bid)
    $188
    9 entries

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    I am sonali masrankar, an artificial intelligence researcher and programmer. I am busy with a data analytics project and would like some help in creating a module for implementation of group lasso on the dataset. The dataset is available in the attachments. We can provide more information on the dataset by conversation.

    $116 (Avg Bid)
    $116 Avg Bid
    9 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids