Personal details

Abdelfettah B. - Remote data scientist

Abdelfettah B.

Based in: đŸ‡ș🇩 Ukraine
Timezone: Kyiv (UTC+3)

Summary

Embedded Systems Engineer and Certified Tensorflow Developer with a strong technical/coding background, including C, C++, Java, Python and Assembly. Additionally skilled back-end development based on Spring/Django Framework, and Machine Learning with Tensorflow and Pytorch.

Work Experience

Mentor / Consultant
URA Academy | Sep 2018 - Present
Python
Java
C++
C
Arduino
Raspberry Pi
Embedded C
Embedded Systems
Electrical Engineering
Robotics Engineering
URA provides different courses based on projects in robotics and programming for all ages. I work at URA as a mentor and Curriculum consultant
Founder, Director
JMP | Sep 2017 - Present
Python
C++
Machine Learning
Raspberry Pi
Internet of things
Embedded Systems
Electrical Engineering
Robotics Engineering
Academy of Robotics, Embedded Systems and Computer Science, specialized in teaching juniors and preparing students for future engineering.

Personal Projects

2018
C
Linux
Shell
42sh is a Unix Shell Interpreter which is compliant with the POSIX standard. It is totally coded from scratch in C language with very strict limitation of allowed functions from the C-Standard Library. The line editing features and the vim mode are implemented by the help of the Termcaps library knowing that Ncurses library is forbidden. Additionally Lex/Yacc are also forbidden so I had to code the Lexer/Parser from scratch for lexical, syntactic and semantic analysis. The most challenging and exciting part of this project is implementing the Job Control feature.
T-Auth
2019
Spring
OAuth
Spring Security
Spring Boot
T-Auth is a Biometrics Authentication as a Service, which can be integrated in any web client application to enable behavioral biometric authentication. A listener interface is implemented in the client application to record keystroke dynamics statistics about keys a user presses and turns them into typing patterns. And then it sends them to the authentication server which analyzes and verifies the recorded typing patterns against previous patterns from the real user. The results (Similarity Score) are sent back to the client application to decide about authenticating the user. It was an exciting project but what I have enjoyed more was the implementation of the authorization server using OAuth2.0 standard protocol with JWT.