Abdelfettah Besbes

Abdelfettah Besbes

Mentor
5.0
(868 reviews)
US$30.00
For every 15 mins
983
Sessions/Jobs
ABOUT ME
Software Engineer
Software Engineer

Embedded Systems Engineer and Certified Tensorflow Developer with a strong technical/coding background, including C, C++, Java, Python and Assembly. Additionally skilled back-end development based on Spring/Django Framework, and Machine Learning with Tensorflow and Pytorch.

French, English
Kyiv (+02:00)
Joined November 2020
EXPERTISE
4 years experience | 109 endorsements

REVIEWS FROM CLIENTS

5.0
(868 reviews)
Ian Winters
Ian Winters
October 2024
Competent and capable. He was good at highlighting where I was just frazzled in my code implementation. Would hire again.
Daniel Lynch
Daniel Lynch
September 2024
Abdel was able to dive through 300+ lines of my code and find the bug through some vigorous testing.
Daniel Lynch
Daniel Lynch
September 2024
Fast as f***, as usual.
Doug Jay
Doug Jay
September 2024
Very helpful with data science support
Daniel Lynch
Daniel Lynch
September 2024
Abdel will make sure he takes the time to understand your problem- this way, the solution will be fast. Showed me lots of helpful tips and tricks along the way!
Danil
Danil
July 2024
Abdelfettah was extremely helpful with JSON processing in Python, I highly recommend him
jeff
jeff
July 2024
I am satisfied with the quality of work provided by Abdel. He has in initial check-in with me, asked questions to understand the deliverables, and kept me updated the whole time. Thank you!
julia ann Mathew
julia ann Mathew
July 2024
Helped with pagination issues in web scraping.
julia ann Mathew
julia ann Mathew
July 2024
Knowledgeable and explained the code well.
Max
Max
July 2024
BEAST
EMPLOYMENTS
Mentor / Consultant
URA Academy
2018-09-01-Present
URA provides different courses based on projects in robotics and programming for all ages. I work at URA as a mentor and Curriculum cons...
URA provides different courses based on projects in robotics and programming for all ages. I work at URA as a mentor and Curriculum consultant
Python
Java
C++
View more
Python
Java
C++
C
Arduino
Raspberry Pi
Embedded C
Embedded Systems
Electrical Engineering
Robotics Engineering
View more
Founder, Director
JMP
2017-09-01-Present
Academy of Robotics, Embedded Systems and Computer Science, specialized in teaching juniors and preparing students for future engineering.
Academy of Robotics, Embedded Systems and Computer Science, specialized in teaching juniors and preparing students for future engineering.
Python
C++
Machine learning
View more
Python
C++
Machine learning
Raspberry Pi
IoT
Embedded Systems
Electrical Engineering
Robotics Engineering
View more
PROJECTS
Education
2018
42sh is a Unix Shell Interpreter which is compliant with the POSIX standard. It is totally coded from scratch in C language with very str...
42sh is a Unix Shell Interpreter which is compliant with the POSIX standard. It is totally coded from scratch in C language with very strict limitation of allowed functions from the C-Standard Library. The line editing features and the vim mode are implemented by the help of the Termcaps library knowing that Ncurses library is forbidden. Additionally Lex/Yacc are also forbidden so I had to code the Lexer/Parser from scratch for lexical, syntactic and semantic analysis. The most challenging and exciting part of this project is implementing the Job Control feature.
C
Linux
Shell
View more
C
Linux
Shell
View more
T-Auth
2019
T-Auth is a Biometrics Authentication as a Service, which can be integrated in any web client application to enable behavioral biometric ...
T-Auth is a Biometrics Authentication as a Service, which can be integrated in any web client application to enable behavioral biometric authentication. A listener interface is implemented in the client application to record keystroke dynamics statistics about keys a user presses and turns them into typing patterns. And then it sends them to the authentication server which analyzes and verifies the recorded typing patterns against previous patterns from the real user. The results (Similarity Score) are sent back to the client application to decide about authenticating the user. It was an exciting project but what I have enjoyed more was the implementation of the authorization server using OAuth2.0 standard protocol with JWT.
Spring
OAuth
Spring Security
View more
Spring
OAuth
Spring Security
Spring Boot
View more