Artificial intelligent jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    14,607 Artificial intelligent jobs found, pricing in AUD

    ...months . weekly 30-40 hours . kindly bid if you have expertise in any of the below skills . interview will be there so only professional people bid . required skill : 1. Artificial intelligence / Machine learning 2. Matlab / simulink / stateflow 3. product designing ( mechanical part ) 4. embedded iot ( circuit design , firmware developer 5.

    $38 / hr (Avg Bid)
    $38 / hr Avg Bid
    14 bids

    ...Which will have a CMS so that answers can be fed into it against possible question. We would like the ability to add as many questions and answers and the CMS should be intelligent and should also understand variable etc to add and act accordingly. The bot should have the ability record the questions that bot was not able to answer and we can check

    $280 (Avg Bid)
    $280 Avg Bid
    10 bids

    We are looking for the best node js developers to help build AI 3d models talking characters that talk. You must speak great English. We will test your English skill...team are some of the best in the world. This not a job for beginners. This is challenging and only best survive. You must provide demo of your past work. Thank you AI Team artificial

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    3 bids

    Categories and Subject Descriptors > Artificial Intelligence > Probability and Statistics > Nonparametric statistics > Database Management > Database applications—Data mining KEYWORD TAXONOMY BUILDING > Building a domain specific taxonomy from a set of keyword phrases augmented with knowledge and contexts > Obtain knowledge (concepts that correspond

    $871 (Avg Bid)
    $871 Avg Bid
    2 bids

    I Need 2 algorithms: -The Nearest Neighbor Algorithm (Here is the tutorial on how to do it ---> [login to view URL]) -Genetic Algorithm (Here is the tutorial on how to do it ---> [login to view URL]) The program needs to; -Read a ".txt" file (In the file there is the city number, the X coordinate of the location of the city, the Y coordinate of the location of the city) Here ar...

    $35 (Avg Bid)
    $35 Avg Bid
    6 bids

    I WOULD LIKE TO CREATE A SOFTWARE BOT...TARGET DIRECTORIES TO MAINTAIN, FORMAT AND SIZE OF THE CONVERTED IMAGES FOR EVERY TARGET DIRECTORY, TIME INTERVAL TO CHECK FOR NEW FILES. OF COURSE IT SHOULD USE SOME INTELLIGENT SORTING OF THE SOURSE DIRECTORIES IN ORDER TO WASTE FEW NETWORK AND MACHINE RESOURCES TO CHECK FOR NEW FILES AND MAINTAIN INTEGRITY.

    $278 (Avg Bid)
    $278 Avg Bid
    4 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $349 (Avg Bid)
    $349 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $349 (Avg Bid)
    $349 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $349 (Avg Bid)
    $349 Avg Bid
    1 bids

    Hi there, We're an innovative start-up B2B brand creating Artificial Intelligence solutions for our customers - We have a pipeline of business but we understand that sometimes people judge you by the way you look not just the power of the product you put infront of them. Hence, skills like yours are key for us moving forward. We're looking for a design

    $265 (Avg Bid)
    $265
    1 entries

    ...graph you put in your report o Since your website is not selling at the moment, we are not interested in sales o Focus on visitor behavior o Analyze your statistics and make intelligent inferences about your visitor/customer website usage to improve your web business...

    $95 (Avg Bid)
    $95 Avg Bid
    11 bids
    Social Media Account Manager 4 days left
    VERIFIED

    We need a Social Media Account Manager for an Instagram Model about 360.000 follower...Instagram Model about 360.000 followers. Part of the job is answering and ordering messages and requests and write posts in English. Most important is good english, funny and intelligent ways of writing, trust and the ability to identify usefull and spammy messages.

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    62 bids

    We need a Social Media and Content Manager for an Insta...for an Instagram Model about 360.000 followers. Part of the job is answering messages and requests and write posts in English. Most important is good english, funny and intelligent ways of writing, trust and the ability to identify usefull and spammy messages. It's about 1-2 hours work per day.

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    39 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $349 (Avg Bid)
    $349 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    I am sonali masrankar, an artificial intelligence researcher and programmer. I am busy with a data analytics project and would like some help in creating a module for implementation of group lasso on the dataset. The dataset is available in the attachments. We can provide more information on the dataset by conversation.

    $183 (Avg Bid)
    $183 Avg Bid
    6 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $349 (Avg Bid)
    $349 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $348 (Avg Bid)
    $348 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $791 (Avg Bid)
    $791 Avg Bid
    1 bids

    ...Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms

    $773 (Avg Bid)
    $773 Avg Bid
    1 bids

    artificial inteligence I would like to build a portal with recognition or reading of PDF / JPG / PNG etc. invoices. 1. Someone has an invoice from his electricity provider. He can upload the bill to the website or take photographs and send. 2. The bill is read. All data from invoice. From name to all numbers on the bill. 3. In a few seconds he gets

    $1000 (Avg Bid)
    $1000 Avg Bid
    25 bids
    web Development 4 days left

    We are looking web developer with fo... Angular JS / Meteor frameworks would be required. - Excellent working experience in Javascript, SQL/mongoDB, node.js. - Web pages are communicating with backend Artificial Intelligent(AI) system, to input and display data. Knowledge of Python is desirable but not mandatory. - Integrating existing HTML5 theme.

    $230 (Avg Bid)
    $230 Avg Bid
    22 bids

    ...engineer and a computer science expert experienced in computer vision machine learning, Artificial intelligence and deep learning and its applications in facial & face detection to design and develop a commercial software. The commercial software will be using Artificial intelligence and deep learning in detecting faces, including at what time, the gender

    $858 (Avg Bid)
    $858 Avg Bid
    10 bids

    Hi i need u to prepare presentation with Artificial intelligence topic (5-7 mins) for job interview I want this presentation from the sales point of view. like presentation for application for sale to customer. thanks.

    $180 (Avg Bid)
    $180 Avg Bid
    14 bids

    Design a futuristic looking logo for our technology company. We are an artificial intelligence software company that helps people day-trade in the FOREX markets. The logo needs to be futuristic, feel free to include symbols that would represent "trading" or "the markets". Our company is called "A.I. Global Markets" Look at solarin

    $139 (Avg Bid)
    Featured Guaranteed Top Contest
    $139
    241 entries

    searching for someone for AI lecture in college. good in public speaking knowledge of AI

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    2 bids

    I have a business plan of over 100 slides (PowerPoint) that I would like to have graphically designed. The business plan is for an Digital/Artificial Intelligence project - so need a creative graphic designer with demonstrated experience in delivering amazing proposals of similar nature. The designer will need to produce a few sample design options

    $892 (Avg Bid)
    $892 Avg Bid
    65 bids

    I need an intelligent and hard worker to help with medical research. I have a medical condition and need to find specific doctors and clinics that offer medical procedures in Turkey. The only requirements are that you live in Turkey, speak Turkish and have medical knowledge and background. If you have these qualifications, the job should be pretty easy

    $84 / hr (Avg Bid)
    $84 / hr Avg Bid
    6 bids
    Google Ad Word Expert 3 days left
    VERIFIED

    ...proper keywords (including long tail), ad titles and copy, create ad groups, set proper budgets, send daily reports, create tags, optimize target pages, analyze data and make intelligent decisions to drive leads etc. Must be a master. Please describe your experience level and how you will deliver daily reports to help us manage keywords and conversions

    $451 (Avg Bid)
    $451 Avg Bid
    49 bids

    it is related to A* algorithms, java, and artificial intelligence

    $188 (Avg Bid)
    $188 Avg Bid
    20 bids
    Design me a logo 3 days left

    ...logo for a domain with concept of artificial intelligence and ice. Very simple but elegant. Simplicity in color ( blue, black white) and elegance in design (no much happening, non-crowded ) but very symbolic. The application for which logo is required is for processing invoices ( Symbolic for ICE) using artificial intelligence. The product / company

    $29 (Avg Bid)
    $29 Avg Bid
    68 bids

    Top Artificial intelligent Community Articles