Save this Search
     
Sort by:
  • Posted Date
Time Left: Less than 24 hours
Fixed Price: Not Sure   |  Posted: Jul 15, 2015  |  Ends: 23h, 19m  |   14 Proposals
I am writing a academic journal article in social psychology on social network. I need help with data analysis and visualizing, and maybe writing things up as well. Main skills involved would probably be mixed effect logistic regressions, interpretation and visualizing of interaction (or moderation) effect in terms of odds ratio or predicted probabilities, and R. The key challenge is to understand the problem and model it correctly. I will present the details of my design here: I have some ego-based social network data. I am extracting two kinds of triads from the data (see attached graph). 1) transitive triads (triangle) in which all three parties know each other. 2) intransitive triads where both alters know the broker but they don't know each other. It's a partially crossed partially nested design as each individual belong to multiple triads and be either the broker, or any of the alters. so I believe I should use a mixed effect logistic regression model to predict the transiti...
Category: Data Analysis       

y****_12
 [?]
Sign in to view client's details.
| y****_12
|    United States
Fixed Price: Not Sure   |  Posted: Jun 25, 2015  |  Ends: 21h, 24m  |   12 Proposals
Freelancer Requirement: 1) Need high resolution scans of two pieces of government picture ID. 2) Need to sign a NDA and NCA. 3) Certifications check. Equipment: 1) We have 2 ESXi Host Machines. They have 3VM's running on them: Windows Server 2012 R2 Standard, Bitrix24, FreePBX/Elastix. 2) We have 1 Storage Machine running FreeNAS with storage VLAN. 3) We have 1 pfSense UTM and Gateway Machine which also runs Snort, OpenVPN, Radius. This pfSense is connected to a Linksys E3000 as a Wifi A.P. with Captive Portal. 4) We have 1 HP JG240A Switch. Project: 1) Full check for bad firewall rules, malware, virus, unnecessary/hidden user accounts, hidden back doors etc. 2) Do a full security checkup/inventory on all of the above physical and virtual machines and provide written documentation. 3) Do a full penetration test from outside and from inside network. 4) Make improvements on potentially all of the above machines using industry best practices. 5) Recommend tools and document how to maint...
Category: Networking & Security       

l****234
 [?]
Sign in to view client's details.
| l****234
|    United States
Hourly Rate: Not Sure   |  Duration: Not Sure  |  Posted: May 01, 2015  |  Ends: 17h, 5m  |   12 Proposals
I am in search of someone who can help me learn how to use R or another software program to do social network analysis. Must have and be willing to show proof of appropriate certifications.
Category: Data Analysis       
Skills: Network Analysis, R       

N****day
 [?]
Sign in to view client's details.
| N****day
|    United States
Symbol Key
Payment method not yet verified
Payment verified
Purchased $1-$500
Purchased $500-$5,000
Purchased more than $5,000
You have already submitted a
proposal to this job