Anomaly detectiontrabajos
Busco experto en Google Ve...Computer Vision para crear un reconocedor de modelos de teléfonos a partir de imágenes. Ya tengo un dataset inicial etiquetado y necesito que se implemente el pipeline completo: carga del dataset, organización, entrenamiento en Vertex AI, evaluación, despliegue del endpoint de inferencia y flujo para agregar nuevas imágenes y reentrenar. Se valorará experiencia en image classification, object detection, Python, Google Cloud Storage y APIs. El freelancer debe entregar métricas y no solo “parece funcionar”. Debe contemplar clases muy parecidas entre sí. Debe proponer qué hacer cuando la confianza sea baja: -no responder; -devolver top 3; -pedir otra foto. Debe dejar preparado e...
...write * No private chats exist in the app Filters & Search * Age, height, location * Religious branch and practice * Hijab / Niqab * Marital status * Children Verification & Security * Mandatory email verification * Mandatory selfie verification for all users (man, woman, wali) * Selfies used only for identity verification and never shown publicly * Verified profile badge * Automatic detection of fake or inappropriate profiles * Manual review flow for flagged accounts Location & Monetization Logic * Free users: current country only * Premium-ready architecture for: * International location * Extra swipes * Favorites and Super Favorites * Result prioritization * No payment gateway required for MVP, only structural readiness --- 6. Delivery & F...
...language. Phase 2: Technical Design & BIM Development Full Architectural Set: Detailed floor plans, roof plans, and site plans with millimetric precision. Technical Sections & Elevations: Comprehensive longitudinal and transverse cuts showing construction systems. BIM Model (IFC/Revit): Delivery of the native IFC file and/or Revit model (LOD 300/350) for multidisciplinary coordination and clash detection. Detailing: Constructive details of "critical points" (facade junctions, waterproofing, and bespoke joinery). Phase 3: Visualization & "Sales-Ready" Assets Hyper-Realistic Renders: Minimum of 8-10 high-resolution interior and exterior shots showing lighting at different times of day. Cinematic Walkthrough: A 4K architectural animation (60s+) ...
...anotación (a definir número de imágenes) aplicar preprocesado si es necesario Entregables esperados Modelo entrenado (pesos) Código fuente en Python Instrucciones claras para: ejecutar inferencias reutilizar el modelo con nuevas imágenes Resultados de validación (métricas básicas: precision / recall / mAP) Requisitos técnicos Experiencia demostrable en: YOLO object detection custom datasets small object detection Python + PyTorch (preferido) OpenCV u otras librerías de apoyo No es necesario conocimiento forestal (yo aporto el criterio técnico) Importante Este proyecto no es un caso genérico (personas, coches, retail). Se trata de detección en entornos naturales, con...
...y gestionar riesgos de seguridad, desarrollando el Mapa de Riesgos y planes de tratamiento. 3. Administrar y supervisar los controles de acceso, identidades y privilegios (IAM – Identity and Access Management / MFA – Multi-Factor Authentication). 4. Gestionar la detección, análisis y remediación de vulnerabilidades. 5. Implementar y monitorear soluciones de seguridad como: o EDR (Endpoint Detection and Response) o SIEM (Security Information and Event Management) o DLP (Data Loss Prevention) o SOC (Security Operations Center) 6. Definir y aplicar baselines (líneas base de configuración segura) y hardening (endurecimiento de sistemas). 7. Diseñar, ejecutar y validar planes de respaldo y recuperación (DRP – ...
...owner acquisition to property publication — using ClickUp, , and DocuSign with Microsoft Teams notifications. This project requires an expert who understands complex data architecture, conditional forms, automation logic, relationship-based databases, and error-resilient workflows. Objectives The system must automate: 1. Owner Acquisition One unified intake form (EN + FR) Automatic detection of existing owners via email Automatic creation of new owners if not found 2. Property Intake Across 3 Business Models Sous-location (Guaranteed Rent) Gestion Totale Gestion Partielle Each model has its own custom fields, workflows, and contract templates. 3. Contract Generation via DocuSign Automatic or manual trigger Model-specific templates with merge fields Webhook re...
...engine (email, SMS, WhatsApp, web push). Microservices for independent scaling (SOS, maps, notifications). 3.3 Data & AI Layer Front-end: Vue. Operational DB: Supabase (users, sessions, scans, events, coupons, SOS). Data warehouse (BigQuery/Redshift/Snowflake). ETL/ELT for logs ingestion, cleaning, anonymization. AI models: recommendations, predictive heatmaps, under-activated zone detection, anomaly detection (security/fraud). 3.4 Integration Layer Municipality systems: licenses, tourism, culture, security, civil protection. Emergency & medical: C5/911, Red Cross, hospitals (API/web console). Third parties: Google/Apple Maps, Tripadvisor/Booking, WhatsApp Business API, SMS providers, ticketing systems. 3.5 Cloud Infrastructure (AWS/Azure/GCP) S...
Por favor, regístrate o inicia sesión para ver los detalles.
I am seeking to develop a custom program that simulates realistic user profiles on YouTube and Google services. The goal is to emulate authentic human behavior as closely as possible to avoid detection, using residential mobile proxies from Spain for IP rotation, APIs for virtual phone numbers (for SMS verification during account creation), and captcha solvers to handle any automated challenges. The program will automate the creation of Gmail accounts, logins, and interactions on YouTube and Google, with a focus on two distinct phases: a "warming up" phase to establish natural user patterns, and a targeted "promotion" mode to boost visibility for specific videos by searching and watching them Requirements and Features:Proxy and IP Management: Use residential mob...
1. General Objective To design, verify, and develop a functional prototype of a low-power, autonomous LoRaWAN sensor that integrates temperature, humidity, and magnetic detection measurements, powered by an ER14505 battery, ensuring the correct operation of the hardware for integration with the firmware provided by the client. 2. Specific Objectives To review and validate the electrical schematic developed in KiCad, guaranteeing its correct operation, electrical integrity, and compatibility with the firmware. To design and optimize the printed circuit board (PCB) meeting criteria for low power consumption, compactness, and manufacturability. To prepare a fully assembled functional prototype for field testing and electrical validation. To deliver all technical documentation ass...
Hola Bristy K., tu perfil llamó mi atención y me gustaría ofrecerte mi proyecto. Podemos conversar sobre los detalles por chat.
...y gestionar riesgos de seguridad, desarrollando el Mapa de Riesgos y planes de tratamiento. 3. Administrar y supervisar los controles de acceso, identidades y privilegios (IAM – Identity and Access Management / MFA – Multi-Factor Authentication). 4. Gestionar la detección, análisis y remediación de vulnerabilidades. 5. Implementar y monitorear soluciones de seguridad como: o EDR (Endpoint Detection and Response) o SIEM (Security Information and Event Management) o DLP (Data Loss Prevention) o SOC (Security Operations Center) 6. Definir y aplicar baselines (líneas base de configuración segura) y hardening (endurecimiento de sistemas). 7. Diseñar, ejecutar y validar planes de respaldo y recuperación (DRP – ...
...real-time telemetry: position on circuit, gap to leader and chaser, performance colors (green/red/purple), laps/sectors, shortcut detection, and “create route” mode (record circuit by running it). Monetization: monthly subscription and event access codes. 2) Scope by Platform Common watch logic Sensors/GPS: ~1 Hz sampling; speed filter (EWMA); route smoothing (Kalman/Savitzky-Golay). Route projection: nearest-point on polyline + curvilinear distance s. F1 telemetry: Gaps: gap_lead, gap_chase (heavy calc done in mobile/backend; watch displays summary). Colors: green = personal best, purple = event best, red = slower. Sectors/laps: defined by s cuts. Shortcut detection: distance > threshold for >T seconds, or abnormal Δs → flag. “C...
...propose effective strategies. Speed: A fast website is crucial for user experience and SEO. We require an expert who can identify and resolve bottlenecks, optimize images, implement caching systems, and improve overall loading times. Security: Protecting our site and our users' information is paramount. We are looking for someone with solid knowledge in implementing security measures, vulnerability detection and prevention. We need solutions to the problems mentioned in the attached reports. What we expect from you: Demonstrable experience in similar projects. Deep knowledge of the latest trends and best practices in SEO, website speed optimization, and web security. Ability to perform thorough analyses and propose effective and customized solutions. Ability to communicate f...
Estoy buscando un experto en desarrollo de sistemas de inteligencia artificial para crear un sistema de compilación visual y detección de objetos. Este sistema debe cumplir con las siguientes características: - Interfaz de Usuario Intuitiva: Los usuarios deben poder interactuar con el sistema de manera efectiva y sin complicaciones. - Procesamiento de Imágenes en Tiempo Real: El sistema debe ser capaz de manejar y analizar imágenes en tiempo real. - Soporte para Varios Formatos de Imagen: El sistema debe soportar diferentes formatos de imagen sin ningún problema. Asimismo, el sistema deberá ser compatible con dispositivos móviles y navegadores web. Por tanto, se necesita un experto con experiencias en la creación de sistema...
...whitecoats. Am J Infect Control 2009;37:101e105. 21. Munoz-Price LS, Arheart KL, Mills JP, et al. Associations between bacterial contamination of health care workers’ hands and contamination of white coats and scrubs. Am J Infect Control 2012;40:e245ee248. 22. Callaghan I. Bacterial contamination of nurses’ uniforms: a study. Nurs Stand 1998;13:37e42. 23. Snyder GM, Thom KA, Furuno JP, et al. Detection of methicillinresistant Staphylococcus aureus and vancomycin-resistant enterococci on the gowns and gloves of HCWs. Infect Control Hosp Epidemiol 2008;29:583e589. 24. Speers R, Gaya H, Shooter RA, Patel N. Contamination of nurses’ uniforms with Staphylococcus aureus. Lancet 1969;2:233e235. 25. Butler DL, Major Y, Bearman G, Edmond MB. Transmission of nos...
...complete functional application. Comprehensive testing is conducted to ensure that all components work seamlessly together and meet the established requirements. This includes tests for functionality, performance, security, and usability. Possible Alternatives: Use automated testing tools like Jest, Selenium, or Postman to streamline the error detection process. Implement a peer review (code review) process to ensure code quality and early issue detection. Subdevelopment 1. Design Approval (Weeks 1-2) Week 1: Evaluation and understanding of design requirements. Creation of initial interface sketches. Discussion with the team and possible adjustments to concepts. Week 2: Refinement of selected sketches. Creation of high-fidelity prototypes. Presentation of designs to ...
Necesito que el reenvio de correo se realice por un puerto diferente al 25, para poder cerrarlo y desaparecer de las listas de spam. Reporte de spamhaus: ""A device (computer, server, mobile phone, etc), or an app on a device that is using 85.214.x.x is infected, badly misconfigured, or compromised. It is making SMTP connections with multiple unrelated HELO values on port 25. The most recent detection was on: June 15 2022, 23:20:00 UTC (+/- 5 minutes). The observed HELO values were *********.com, ***********.es ..."" Necesito bloquear el puerto 25 de salida y que siga funcionando el reenvio de correo....2, 23:20:00 UTC (+/- 5 minutes). The observed HELO values were *********.com, ***********.es ..."" Necesito bloquear el puerto 25 de salida y que sig...
Saludos. Se requiere la elaboración de una clase / módulo / algoritmo para implementar en un desarrollo ya existente propio. El algoritmo debe funcionar de la siguiente manera: 1) Campos de registro de usuario ( Nombre, correo, contraseña, upload/carga de imágenes ) 2) Detectar imágenes del usuario y proceder a censurar de forma automática el "rostro" ( Face Detection ). A su vez, se le debe brindar la opción de censurar otras partes/zonas deseadas ( Ejemplo: Usando un recuadro ) mostrando efecto "borroso" o el uso de "Iconos/Emoticones" personalizados. 3) A medida que se proceda a la censura, se muestra el resultado, tiempo real. 4) Se procede al registro, y almacenamiento de las imágenes tratad...
...g=6, h=7, i=8, j=9). resultando el nombre de los archivos así: , ABCcaab.... Similar apps: KenRename Link of interest: AGREGADO OPCIONAL: Si es factible el software puede incorporar funcion para detectar imágenes que se vean borrosas y la opción de eliminarlas ()...
This is the project of your lectures about artificial Intelligence. the followin tasks are required: Please get in context with the paper reading: (18)30154-5 Download the dataset Propose your own image processing method to make slower the computational cost of the analysis for the CNN Implement and propose your own CNN architecture. Choose an optimizer and explain why you chose that Display the performance measures.
Necesito que me muestren de manera detallada, completa y con sitios reales que yo proveeré, usando una cuenta paga de VPS qué herramientas, configuraciones y temas se utilizan en empresas para crear un sitio seguro en términos de: ssh, no root, firewal, vpc, service auditing, unattended updates, disable directory indexes, backup, vpn and private network, SSL/TLS, file audting and intrusion detection systems, isolated execution environments and https entre otras herramientas/temas. Se trata en todos los casos de un proceso para empresas y entonces hace falta que quien colabore en él tenga experiencia con empresas sobre estos temas, Además, se trata de usar en la medida de lo posible herramientas y configuraciones que sean de código libre y ...
Necesito un AGI que realice llamadas y detecte que fueron contestadas con Answer Machine Detection (AMD) y la respuesta la pase a una cola.
Necesitamos un algoritmo de seguimiento e identificación de objetos a lo largo de multiples fotogramas, estos objetos pueden dejar de verse termporalmente (oclusiones). Los objetos debe ser identificados de manera unequivoca, para poder ser contados. Puede estar escrito en c++ python y puede utilizar OPENCV.
...-Visualizar y exportar reportes por mes de los vendedores o de los proyectos. ----------------------------------------------------------------------------------------------------------------------------------------------------- Have an administrator who can access everything. Register contacts. First name: Mail: Phone: Cell phone: Address: Company: Turn: -Status: New entry, first contact, detection needs, follow-up (submission of proposal), review proposal, negotiating proposal, closed sale) Desplegable. -Asigned to: (Administrators) drop-down -Generate new users at some time. -Receive contacts from the CRM of our partners. -Receive notification via Email each time a new contact arrives from the partners. -To consult the contacts of the Database. (Including status, registrati...
Necesito un código HTML con Javascript que permita reconocer si una aplicación móvil está instalada en el dispositivo. Si es script detecta que la aplicación está instalada, debe abrir la aplicación utilizando URL Scheme, en caso de que el script no detecte la aplicación debe ejecutar una url genérica, por ejemplo href="". El código debe ejecutarse al abrir la página que contenga el código HTML + JavaScript
...content, or malicious recently modified files) - website/application vulnerabilities The server may be compromised by malicious spamware and another malicious content. We recommend you to install Maldet (LMD) and Clamav, and run the scans regularly. We recommend you to install an intrusion detection software to protect your server against brute-force. (Like ConfigServer Security&Firewall or Fail2Ban) Please also keep up-to-date your CMS like joomla, wordpress or drupal **including plugins, themes and modules**:
necesito un programa de escritorio desarrollado en java y opencv que detecte rostros, que busque en una base de datos (mysql, sql server, mongodb) si dicho rostro detectado coincide con alguna de la base de datos, y si es asi poner el nombre de la persona detectada con los atributos que tenga ademas de cuanto % de certeza. (El reconocimiento de rostro es EigenFaces) A su vez se pueda agregar una nueva persona guardando como minimo 5 fotos e ingresando su nombres y demas datos como (telefono, direccion ,etc) _____________________________________________________________ I need a desktop program developed in Java and OpenCV to detect faces that look in a database (MySQL, SQL Server, mongodb) if the detected face matches any of the database, and if so put your name the person detected with ...
SE REQUIERE REALIZAR UN MODULO PARA ANDROID (Y IOS) EN EL CUAL SE PUEDAN GRABAR AUDIOS Y VIDEOS DESDE LA APLICACION, CUANDO SE GENERE UNA DETERMINADA ACCION EN LA APP (POR EJEMPLO CUANDO SE PRESIONE UN BOTON DENTRO DE LA APP). DE IGUAL MANERA SE REQUIERE QUE LA APLICACION TOME UNA FOTO CUANDO DETECTE MOVIMIENTO EN LA CAMARA O CUANDO LA CAMARA DETECTE UNA CARA (FACE DETECTION). SE REQUIERE ACCEDER DE FORMA DIRECTA AL HARDWARE (CAMARA Y MICROFONO) DE LAS TABLETS Y TELEFONOS PARA ESTO. UNA VEZ CAPTURADOS LOS ARCHIVOS DE FOTOS, VIDEOS Y-O AUDIOS DESDE LOS DISPOSITIVOS MOVILES, ESTOS ARCHIVOS DEBERAN SER ALMACENADOS LOCALMENTE Y LUEGO SUBIRLOS A NUESTRO SERVIDOR LINUX CENTOS, EN EL FORMATO MAS LIVIANO POSIBLE. LA APLICACION DEBE PODER TRABAJAR LOCALMENTE SIN CONEXION A INTERNET Y CUANDO...
SE REQUIERE REALIZAR UN MODULO PARA ANDROID (Y IOS) EN EL CUAL SE PUEDAN GRABAR AUDIOS Y VIDEOS DESDE LA APLICACION, CUANDO SE GENERE UNA DETERMINADA ACCION EN LA APP (POR EJEMPLO CUANDO SE PRESIONE UN BOTON DENTRO DE LA APP). DE IGUAL MANERA SE REQUIERE QUE LA APLICACION TOME UNA FOTO CUANDO DETECTE MOVIMIENTO EN LA CAMARA O CUANDO LA CAMARA DETECTE UNA CARA (FACE DETECTION). SE REQUIERE ACCEDER DE FORMA DIRECTA AL HARDWARE (CAMARA Y MICROFONO) DE LAS TABLETS Y TELEFONOS PARA ESTO. UNA VEZ CAPTURADOS LOS ARCHIVOS DE FOTOS, VIDEOS Y-O AUDIOS DESDE LOS DISPOSITIVOS MOVILES, ESTOS ARCHIVOS DEBERAN SER ALMACENADOS LOCALMENTE Y LUEGO SUBIRLOS A NUESTRO SERVIDOR LINUX CENTOS, EN EL FORMATO MAS LIVIANO POSIBLE. LA APLICACION DEBE PODER TRABAJAR LOCALMENTE SIN CONEXION A INTERNET Y CUANDO ...
...Cerrado Empresarial Sistemas de Posicionamiento Global GPS Sistema de Control de Acceso Marcadores de Ronda Raisor Ribor Sistemas Bancarios Sistemas Contra Incendio Sistemas industriales Reloj Espías Lapiceros Espías Reloj , Teléfono y GPS Telefonía Celular Liberada ( Samsung, Iphone, Blacberry, Nokia, todos con sistema Android) Monitoreo Satelital Risk Group Detection, Servicios: Pruebas Poligráficas Verificaciones Domiciliares Estudio Socioeconómicos Dactiloscopia Grafología Evaluación de Documentos Assessment Center ( Evaluación por Competencias) Auditorias en Sistemas de Gestión de Calidad Capacitaciones Empresariales AP Consultores ...
...machine learning professional to train and optimize models tailored to my specific problem. The primary focus is to identify and resolve issues in my current work, such as data leakage, while proposing and training the best model suited for accurate pest detection. The freelancer should also have expertise in user behavior analysis and sequence data to ensure a comprehensive approach to solving the problem. Key Requirements: - Identify and fix data leakage problems in the current work. - Train models specifically designed for pest detection with high accuracy. - Improve feature engineering and extract additional features if necessary. - Propose and implement the most suitable model for this task, considering user behavior analysis and sequence data. - Provide clear docume...
...for LP-WGS data. ### **Key Responsibilities** * Develop a **scalable LP-WGS pipeline** from FASTQ → CNV calls → report-ready outputs * Implement alignment, QC, normalization, and CNV calling workflows * Integrate tools such as BWA, CNVkit, Control-FREEC, and WISECONDORX * Implement **GC bias correction, binning, and segmentation algorithms** * Develop modules for: * Aneuploidy detection (NIPT) * CNV detection (POC/RPL) * LOH and maternal contamination assessment * Optimize pipeline for **low-coverage sequencing (0.1×–1×)** * Create **automated QC metrics and flags** * Ensure reproducibility using workflow managers (Snakemake/Nextflow) * Containerize pipeline (Docker preferred) * Generate clear documentation (user manual + technical SOP)...
...Boundary Highlight the large blue Trusted Cloud foundation area at the bottom. Then highlight the Regulated Environments box on the right side of the platform. Step 6 – Trusted Cloud Layers Within the Trusted Cloud section at the bottom, highlight each element in sequence: Isolated governed environment (or Isolated Government Environments) Azure landing architecture SOC2 compliance Managed detection and response Final Hold: After the last step, return the entire diagram to normal brightness and hold the full static diagram for at least 10–15 seconds (or as needed for narration)....
...AI-generated content to make it natural, engaging, and reader-friendly Expand each article to approximately 2,000 words Ensure content is 100% unique, plagiarism-free, and passes AI detection tools Optimize articles with proper SEO keyword research and placement Improve readability, structure, grammar, and flow Add headings, subheadings, and formatting for better user experience Requirements: Proven experience in content writing, rewriting, or editing Strong understanding of SEO (on-page optimization, keyword usage, etc.) Ability to produce human-like, high-quality content Familiarity with AI detection and plagiarism tools Attention to detail and ability to meet deadlines Preferred Qualifications: Experience working with bulk content projects Knowledge of con...
...Boundary Highlight the large blue Trusted Cloud foundation area at the bottom. Then highlight the Regulated Environments box on the right side of the platform. Step 6 – Trusted Cloud Layers Within the Trusted Cloud section at the bottom, highlight each element in sequence: Isolated governed environment (or Isolated Government Environments) Azure landing architecture SOC2 compliance Managed detection and response Final Hold: After the last step, return the entire diagram to normal brightness and hold the full static diagram for at least 10–15 seconds (or as needed for narration). Please let me know if any clarification needed on the brief....
...Automation System (Credit Repair SaaS Logic) Description: I am looking for an experienced developer to build a Metro 2 compliance automation system inside an existing credit repair CRM (CRC platform). This is NOT a basic website or form job. This requires understanding of: - Logic-based workflows - Automation systems - Conditional triggers - Data relationships SYSTEM REQUIREMENTS: 1. Violation Detection Logic The system must analyze relationships between credit report fields and detect violations. Example: - If Account Status = "Current" - AND Payment Rating indicates delinquency → Flag as "Status Conflict Violation" 2. Tag-Based Violation System All violations must be stored as tags attached to each account: - STATUS_CONFLICT - MISSING_D...
I want to turn my raw market-trends data into clear, ac...libraries is up to you. I’m comfortable running scripts locally, but a lightweight web dashboard (Streamlit, Dash, etc.) that shows key charts and summary sentences would be ideal. Acceptance criteria – the assistant is complete when it: • Ingests new market-trends data without manual preprocessing • Generates a concise written summary plus interactive visualisations (trend lines, YoY comparisons, anomaly flags) • Saves both the summary and the visuals to a dated folder for future reference • Provides clean, commented code and a short README so I can tweak parameters myself If you have experience building analytical pipelines that turn messy data into straightforward stories, your app...
...– €1,800 per month (full-time) Long-term collaboration possible. Important Application Instruction To confirm you read the description, start your proposal with the word: RELIABILITY. Then answer the questions below. Applications without answers will not be considered. 2️⃣ 5-Minute AI Test (Filters ~95% of Candidates) Send this immediately after application. Question 1 — Hallucination Detection AI response: "According to the 2021 Brown vs Carter ruling, all digital employment contracts must include biometric authentication." You cannot find this case in legal databases. What is the most likely issue? A) Retrieval failure B) Hallucination / fabricated reference C) Prompt formatting issue D) Translation error Correct answer: B Question 2 &m...
...Detect between one and six fingers on the screen. • Instead of random selection, the finger whose touch point is nearest to coordinate in the left upper corner of a phone must always win be selected . • The original “group” feature can be left out. Critical visual polish The three hallmark animations must look and behave exactly as in Chwazi: • Circle Selection Animation • Finger Detection Animation • Winner Announcement Animation Audio & haptics Use the exact same selection and winner sounds the Android version employs, matched in volume and timing, plus identical vibration feedback. Platform & delivery This is strictly an iOS build. Please supply a TestFlight link for hands-on testing and the full Xcode project so...
...books Hands-on training Course Description (include this) PA-101 – Introduction to PAUT Basic ultrasonic theory Phased array fundamentals Equipment setup and operation Calibration techniques Beam steering and focusing concepts Introduction to scan types and displays (A-scan, S-scan) PA-102 – Advanced PAUT Advanced scan planning Weld inspection techniques Data interpretation and analysis Flaw detection and characterization Advanced calibration methods (DAC/TCG) Practical hands-on applications General Course Information Training includes both classroom instruction and hands-on scanning 100% attendance is required for successful completion Students are encouraged to bring: Notebook Calculator All required materials will be provided Payment Terms Preferred payment met...
We are looking to develop a solution capable of accurately detecting differences between two images. Project Description: We have: An original PNG file A scanned version of the same file after it has been printed The goal is to...handling of scan noise and imperfections Automatic image alignment (if needed) Output results as highlighted differences and/or a report Preferred Skills & Technologies: Python (OpenCV, Pillow, or similar libraries) Experience in Computer Vision and Image Processing Prior experience with similar projects is a plus Deliverables: A working script or application Sample outputs demonstrating detection results Brief technical documentation Please do not apply for the work if you cant deliver a free demo of what you can do please say hello dragon avoi...
I’m looking for a Python-driven computer-vision solution that can scan images of wooden surfaces and reliably flag three defect types: • Cr...Here is what I expect at hand-off: • Clean, well-commented source code with clear instructions for installation and use. • A trained model (or parameter set) and any preprocessing scripts. • A short report outlining the detection logic, performance metrics on your test set, and guidance on how I can retrain or extend the model for new wood species or lighting conditions. Please attach a detailed project proposal that outlines your planned methodology, timeline, and any data requirements you have. Only proposals that explain how you will achieve reliable detection of cracks, discoloration, and scratches...
I need a concise, technically sound guide that shows forecourt operators in Europe exactly how to keep pulser tampering devices out of their fuel dispensers. The focus is on prevention rather than post-event detection, so the material should walk through proven countermeasures, hardware safeguards, software lock-outs, on-site inspection routines, and staff training practices that collectively shut down the main attack vectors. Scope • Explain how pulser manipulation is commonly attempted in European dispenser models (Gilbarco, Tokheim, Wayne, etc.) only as context for the preventive steps. • Lay out step-by-step prevention methods with references to real-world roll-outs in EU service stations where possible. • Highlight regulation or certification requirements th...
...field of view • subtle, readable, perspective-correct 2. Front Collision Warning • strong visual alert in critical situations • may temporarily appear centrally • highest priority in display hierarchy 3. Rear Collision Warning • early warning for fast-approaching vehicles from behind • clear and immediate recognition 4. Blind Spot Detection • left and right detection • visualized via side indicators or light signals at the edges 5. Emergency Vehicle Detection • detection of ambulance or police vehicles via siren and/or lights • early warning display • clearly prioritized alert 6. Dashcam System • integrated front and rear cameras • small display windows positioned low in the visor • must no...
...with relatable, real-world analogies so an audience with zero oil-and-gas background can stay with me from start to finish. Here’s what I’m after: • A revised script for each slide that flows smoothly when read aloud, runs no longer than 30 minutes in total, and never drifts into heavy jargon. • Analogies or everyday examples that turn concepts such as well control, mud weight, or kick detection into something anyone can picture instantly. • Clear, engaging transitions so the narrative feels like one connected story rather than eight isolated topics. You’ll be working with my existing notes; the task is refinement, not re-research. I expect the whole pass to take about 90 minutes, so please be ready to dive straight in and return a cle...
...Needed 1. Data Ingestion Live price feeds (via APIs like Binance, Yahoo Finance, Alpha Vantage) OHLCV data (Open, High, Low, Close, Volume) News/sentiment feed (optional but powerful) 2. AI Signal Engine ML models (LSTM or XGBoost) trained on historical price data Auto-generates Buy / Sell / Hold signals No hardcoded strategy — model learns patterns from data itself 3. Adaptive Market Condition Detection Automatically detects regime: Trending / Ranging / Volatile Switches model behavior based on detected condition Re-trains or fine-tunes on recent data periodically 4. Intraday Focus Operates on 1min / 5min / 15min timeframes Signals generated in real time during market hours 5. Output / Dashboard Simple UI showing current signal, confidence score, market regime Alert via Te...
We are seeking a skilled Business Development Manager to acquire clients for DocEnsure, an AI-powered document verification and fraud detection platform. The primary goal is to generate qualified leads, book demo calls, and close deals with companies in HR/recruitment, fintech/lending, banking/NBFC, insurance, and background verification industries. Key Responsibilities: - Research and identify target companies and decision-makers (HR heads, compliance officers, risk managers, founders). - Conduct LinkedIn outreach through connection requests, personalized DMs, and engagement on relevant posts. - Execute cold email campaigns targeting prospects in relevant industries. - Book and coordinate product demo calls with qualified leads. - Follow up with prospects post-demos to close deals...
Por favor, regístrate o inicia sesión para ver los detalles.
...can: • calculate the flexion/extension angle at every finger joint in each image • flag when a finger or phalanx is completely absent so that it can be recorded automatically I expect you will combine classical computer-vision preprocessing with a deep-learning model (PyTorch or TensorFlow are fine) and possibly leverage pose-estimation libraries such as MediaPipe or OpenCV for landmark detection. Accuracy matters more than perfection in lighting or background, so robust data-augmentation and domain-adaptation techniques will be key. Phase 1 Train and validate a model that ingests a single hand photograph and returns a JSON or CSV containing joint landmarks, the calculated angles, and a simple missing-phalanges Boolean for each finger segment. Phase 2 Packag...