For employers

Hire this AI Trainer

Sign in or create an account to invite AI Trainers to your job.

Invite to Job
UCISION

UCISION

Agency
Ghana flagTema, Accra, Ghana
$30.00/hrExpert100+

Key Skills

Software

AWS SageMakerAWS SageMaker
AppenAppen
CloudFactoryCloudFactory
CVATCVAT
DataloopDataloop
DatasaurDatasaur
Kili TechnologyKili Technology
LabelboxLabelbox
Label StudioLabel Studio
Scale AIScale AI
V7 LabsV7 Labs
Don't disclose
Other

Top Subject Matter

No subject matter listed

Top Data Types

ImageImage
TextText
VideoVideo

Top Task Types

Data Collection
Object Detection
Prompt Response Writing SFT
RLHF
Translation Localization

Company Overview

Elevate your machine learning projects with our comprehensive end-to-end solutions, integrating precise human-in-the-loop services to ensure superior data quality and transformative AI insights.

ExpertZuluHausaMossiFrenchYorubaEnglishSpanishChinese Mandarin

Security

Security Overview

At UCISION, we are dedicated to safeguarding client data and projects with top-tier security and privacy measures. Physical Security CCTV Surveillance: 24/7 monitoring ensures unauthorized access or suspicious behavior is promptly detected. Secure Access: Authorized personnel only, using biometric authentication and key card entry. Visitor Management: Visitors sign in and are escorted by authorized personnel. Cybersecurity Policies Secure Network Infrastructure: Encrypted connections, secure VPNs, and segmented networks minimize unauthorized access risks. Firewalls and Intrusion Detection: Real-time monitoring and blocking of potential threats. Antivirus and Anti-Malware: Regular updates and scans on all devices. Employee Confidentiality and Data Handling Non-Disclosure Agreements (NDAs): All employees, contractors, and third-party vendors sign NDAs to protect client data and proprietary information. Training on Data Privacy: Regular sessions ensure everyone is aware of responsibilities and latest security protocols. Role-Based Access Control: Access to client data is granted based on the principle of least privilege. Regular Audits and Compliance Internal Audits: Regular reviews to enhance security policies and identify vulnerabilities. Compliance: Adherence to GDPR, HIPAA, and ISO 27001, with policies regularly updated to meet evolving standards.

Labeling Experience

Labelbox

Content Tagging

LabelboxTextEntity Ner Classification
Tagging of at least 100 various ontologies on lease documents for a total of 800 .txt files. Acceptance rate: 95%+

Tagging of at least 100 various ontologies on lease documents for a total of 800 .txt files. Acceptance rate: 95%+

2024 - 2024

Video Collection - Onsite

OtherVideoData Collection
108 videos were collected with cell phone cameras within a span of a week, by 4 data collectors in total. All protocols and permissions were sought for by authorities and participants before the project start, and accounted for in a final report to both authorities and client. The collection process involved training participants to make certain jaw movements with cheek retractors, which was replicated in front of the camera in under 30 seconds per participant. The scope of this project was to forge training data for a model aimed at identifying the various teeth types regardless of whether there is a misalignment or not. Acceptance rate = 95%

108 videos were collected with cell phone cameras within a span of a week, by 4 data collectors in total. All protocols and permissions were sought for by authorities and participants before the project start, and accounted for in a final report to both authorities and client. The collection process involved training participants to make certain jaw movements with cheek retractors, which was replicated in front of the camera in under 30 seconds per participant. The scope of this project was to forge training data for a model aimed at identifying the various teeth types regardless of whether there is a misalignment or not. Acceptance rate = 95%

2024 - 2024

Video Description

OtherVideoAction Recognition
Videos were sourced from YouTube, and were described by our annotators based on key parameters including: motion, camera angle, subject identification, environment, and physical description of subject.

Videos were sourced from YouTube, and were described by our annotators based on key parameters including: motion, camera angle, subject identification, environment, and physical description of subject.

2023 - 2024

Video Collection - YouTube

OtherVideoData Collection
Scope: The overall scope of the project was to collect as much video data as possible to train a model to generate high quality videos from a human text prompt, and also describe videos accurately if presented any. Task: Download required number of daily videos and trim to achieve desired client quality Project Type: A mass video collection project from a public online source. Quality Standards: HD Quality, no transitions in video, not more than 30-second videos, domain specifications should not extend beyond gaming, interviews with celebrities, HQ Movies, Vlogs, Accuracy: 95%+

Scope: The overall scope of the project was to collect as much video data as possible to train a model to generate high quality videos from a human text prompt, and also describe videos accurately if presented any. Task: Download required number of daily videos and trim to achieve desired client quality Project Type: A mass video collection project from a public online source. Quality Standards: HD Quality, no transitions in video, not more than 30-second videos, domain specifications should not extend beyond gaming, interviews with celebrities, HQ Movies, Vlogs, Accuracy: 95%+

2023 - 2024