Analista de business intelligence freelancerработы

Фильтр

Мои последние поисковые запросы
Фильтровать по:
Бюджет
по
по
по
Тип
Навыки
Языки
    Статус работы
    13,346 analista de business intelligence freelancer работ(-а,-ы) найдено, цены указаны в USD
    Web development 6 дней(-я) left

    Looking for an artificial intelligence Programer

    $1137 (Avg Bid)
    $1137 Ср. ставка
    4 ставки

    writing an article about artificial intelligence 3 pages to be published in a domestic magazine

    $33 (Avg Bid)
    $33 Ср. ставка
    37 ставки
    IOT Bag Dashboard 6 дней(-я) left

    We are a Business Intelligence Company from Brazil working to a important client that needs a dashboard realtime webpage to show on TV and BIG [войдите, чтобы посмотреть URL] want proposals with UX, design, CSS/JavaScript and HTML and we expect for a prototipo before approving the purchase.

    $33 (Avg Bid)
    $33 Ср. ставка
    5 ставки
    Design a logo for my company 6 дней(-я) left
    ПОДТВЕРЖДЕН

    Hi, I have a website www.aricrypta.com. My Business is about data analytics, business intelligence, software technology and services I want someone to comeup with a createive logo for my business. It should be unique and not a copy of anything. Regards Syed

    $27 (Avg Bid)
    $27 Ср. ставка
    84 ставки
    Customer Database Creation 6 дней(-я) left

    The project is being assigned by Germin8 Social Intelligence, We are a techno-based social media listening firm and have two subscription-based proprietary software. Owing to our subsequent growth over the year we are expanding our consultant base and are searching for service providers who can assist us in compiling a high-quality contact database

    $174 - $521
    $174 - $521
    0 ставки
    Design a Software Product Brochure - 12/12/2018 01:28 EST 6 дней(-я) left
    ПОДТВЕРЖДЕН

    We are looking for designing a brochure of our software product, which is intended to simplify data collection process. Product Category: Technology & Artificial Intelligence Keywords: Analytics, SaaS, Technology, Enterprise, Data Collection Output Format: CorelDraw, Illustrator, JPEG, High Resolution PDF etc. Note: We are looking for an ultra-modern

    $77 (Avg Bid)
    $77 Ср. ставка
    34 ставки
    Project for Gustavo D. 9 дней(-я) left

    ...meaning such as in: Amazon ( the smile) Le Tour de France (bicycle) Sony vaio FedEx ( the arrow) Our company represents: Artificial intelligence Customer relationship Business growth and success Data Data analytics Modern Industry is data analytics, artificial intelligence, consulting, business intelligence. Want it to look very modern like Silicon

    $144 (Avg Bid)
    $144 Ср. ставка
    1 ставки

    ...meaning such as in: Amazon ( the smile) Le Tour de France (bicycle) Sony vaio FedEx ( the arrow) Our company represents: Artificial intelligence Customer relationship Business growth and success Data Data analytics Modern Industry is data analytics, artificial intelligence, consulting, business intelligence. Want it to look very modern like Silicon

    $108 (Avg Bid)
    $108 Ср. ставка
    1 ставки

    i need business intelligence guy for my task know about math and stat.......................................................

    $33 (Avg Bid)
    $33 Ср. ставка
    6 ставки

    i need business intelligence guy who is bcs and expert in math and stat and i will provide u all in detail........................................................................................................................................................................

    $38 (Avg Bid)
    $38 Ср. ставка
    8 ставки

    i need business intelligence task i will provide u all in chat bsc engineer can understand easily ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

    $33 (Avg Bid)
    $33 Ср. ставка
    4 ставки
    CREATE DATAWARE HOUSE 4 дней(-я) left

    ...using R programming language and analyse them. 5. “A good data warehousing professional is always scouting for new sources of data that can be applied to business intelligence”. In this spirit, develop a DTD/XML Schema based on a data warehouse cube and apply it to develop an XML document.

    $211 (Avg Bid)
    $211 Ср. ставка
    4 ставки

    i will give u all things in chat i need app report in 1 hour............................................................................................................................................................................

    $22 (Avg Bid)
    $22 Ср. ставка
    4 ставки

    ...identify if a text has product, name, organization name, stock name . Also help us guide if a string is question, feedback or a service/sales request. 3. Search powered Intelligence API - 4. Face recognition API - Tag every unique face, identify detailed aspects and help create a matching server API 5. Article Spinner API - Something like WORD AI

    $4496 (Avg Bid)
    Избранный
    $4496 Ср. ставка
    31 ставки
    International Business Research Task 4 дней(-я) left
    ПОДТВЕРЖДЕН

    We need someone to do some research/business intelligence for us before we implement some new business changes. The question is relatively simple but it will require detailed web research in addition to including your research links, findings and recommendations, all supported by direct, verifiable citations and online references. The reason

    $4 / hr (Avg Bid)
    $4 / hr Ср. ставка
    29 ставки
    experts required from various field long term project -- 2 4 дней(-я) left
    ПОДТВЕРЖДЕН

    ...working on a big project . required freelancer from various field . it will be a long term project approx. 12 -15 months . weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink

    $34 / hr (Avg Bid)
    $34 / hr Ср. ставка
    44 ставки
    experts required from various field long term project 4 дней(-я) left
    ПОДТВЕРЖДЕН

    ...working on a big project . required freelancer from various field . it will be a long term project approx. 12 -15 months . weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink

    $30 / hr (Avg Bid)
    $30 / hr Ср. ставка
    43 ставки

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $32 / hr (Avg Bid)
    $32 / hr Ср. ставка
    1 ставки
    Build me a website and Logo 3 дней(-я) left
    ПОДТВЕРЖДЕН

    ...services and maintenance. We are a system integrator that provides customised solutions based on customer needs. Things such as Video analytics for intruder detection and Business intelligence analytics for retail stores. Our companies name is Slam Systems, we are looking for a logo and professional website including SEO and appearing on google search

    $592 (Avg Bid)
    $592 Ср. ставка
    60 ставки

    ...self-direction. 12. Out of the box thinking 13. Fast reading 14. Negotiation skill 15. Novel thinking 16. Public speech and presentation 17. Social intelligence 18. Team working 19. Other Innovative technologies you recommend that are suitable for banking. If interested, please send us your profile listing the clients

    $52777 (Avg Bid)
    $52777 Ср. ставка
    2 ставки

    Categories and Subject Descriptors > Artificial Intelligence > Probability and Statistics > Nonparametric statistics > Database Management > Database applications—Data mining KEYWORD TAXONOMY BUILDING > Building a domain specific taxonomy from a set of keyword phrases augmented with knowledge and contexts > Obtain knowledge (concepts that correspond

    $575 (Avg Bid)
    $575 Ср. ставка
    3 ставки

    I Need 2 algorithms: -The Nearest Neighbor Algorithm (Here is the tutorial on how to do it ---> [войдите, чтобы посмотреть URL]) -Genetic Algorithm (Here is the tutorial on how to do it ---> [войдите, чтобы посмотреть URL]) The program needs to; -Read a ".txt" file (In the file there is the city number, the X coordinate of the location of the city, the Y coordinate of the locatio...

    $25 (Avg Bid)
    $25 Ср. ставка
    6 ставки
    Project for Anudeep K. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Debabrata P. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Gili L. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for macitaytac 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Trophy icon afrointelligence logo2 2 дней(-я) left

    Please look at the included image. What I need is this: I need a logo made! Please keep the "afro - intelligence the same," but please add in the braids for the two "Ls" and please add the head to the right of the logo. Please use the same style as the head that is to the right. Get creative with the hairstyle. Either use braids etc. Please look up

    $200 (Avg Bid)
    Гарантированный Скрытый

    Hi there, We're an innovative start-up B2B brand creating Artificial Intelligence solutions for our customers - We have a pipeline of business but we understand that sometimes people judge you by the way you look not just the power of the product you put infront of them. Hence, skills like yours are key for us moving forward. We're looking for a design

    $188 (Avg Bid)
    Project for Chaudhry Talha H. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Marco Saul C. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Hashem A. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Gnanateja K. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Rajaganapathy S. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $251 (Avg Bid)
    $251 Ср. ставка
    1 ставки
    Project for Jitendrakumar B. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Saikumar U. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки

    I am sonali masrankar, an artificial intelligence researcher and programmer. I am busy with a data analytics project and would like some help in creating a module for implementation of group lasso on the dataset. The dataset is available in the attachments. We can provide more information on the dataset by conversation.

    $116 (Avg Bid)
    $116 Ср. ставка
    9 ставки
    Project for Ahmed M. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Alecsandr K. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Miftahul A. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Meenoy S. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Kemal H. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Robert Y. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Xiaodong C. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Joan A M. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Daniyal A. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Yuan N. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Aqeel F. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки
    Project for Xiaoqi D. 5 дней(-я) left

    ...Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as

    $250 (Avg Bid)
    $250 Ср. ставка
    1 ставки