Profile cover photo
Bạn đang theo dõi
Lỗi khi theo dõi người dùng.
Người dùng này không cho phép người dùng khác theo dõi họ.
Bạn đã theo dõi người dùng này rồi.
Gói thành viên của bạn chị cho phép 0 lượt theo dõi. Hãy nâng cấp lên ở đây.
Bỏ theo dõi thành công
Lỗi khi bỏ theo dõi người dùng.
Bạn đã đề xuất thành công
Lỗi khi đề xuất người dùng.
Đã xảy ra lỗi. Hãy làm mới trang và thử lại.
Đã xác thực email thành công.
Avatar người dùng
$20 USD / giờ
Cờ của TAIWAN
taoyuan, taiwan
$20 USD / giờ
Hiện ở đây đang là 7:43 CH
Đã tham gia vào tháng 9 23, 2021
0 Khuyến nghị

Ali A.

@Asadalibajwaa

annual-level-three.svg
5,0 (6 nhận xét)
3,1
3,1
100%
100%
$20 USD / giờ
Cờ của TAIWAN
taoyuan, taiwan
$20 USD / giờ
100%
Công Việc Hoàn Thành
100%
Đúng Ngân Sách
100%
Đúng Thời Hạn
14%
Tỉ Lệ Thuê Lại

Ph.D. | Computer Scientist | Electrical Engineer

Professional Electrical Engineer with 10+ years of experience, who also has a Ph.D. in Computer Science. I am currently residing in Taiwan where I work in the domain of Cyber Security. If you are looking to get some work done in LaTeX, MATLAB, Proteus, AMPL, Tableau, Excel, Python, C++, and C#, I am your go to guy. Apart from that, I have 10+ years of research experience. I have a couple of patents (U.S. and Taiwan), along with numerous journal publications (IEEE COMST, IEEE Network Magazine, Elsevier JNCA, IEEE Access, JCN) and conference proceedings (IEEE ICC, IEEE EuCNC) to my name. I can not only edit or proofread your research work, but can also provide valuable research input which will get your work accepted in top tier journals. Reach me out if you need any work done in the following domains and softwares: - LateX - Python - C++, - MATLAB - AMPL - Linear programming - Proteus - Excel - Research - Cybersecurity - Network Design and Modeling

Liên hệ Ali A. về công việc của bạn

Đăng nhập để thảo luận thông tin thông qua chat.

Portfolio

Nhận xét

Đã lưu thay đổi
Hiện 1 - 5 trong số 6 nhận xét
Lọc nhận xét theo:
5,0
$160,00 USD
thanks for on time good work
Proofreading
Editing
Research Writing
English (US) Translator
English Grammar
A
Cờ của Saif B.
@alhloul7
6 tháng trước
5,0
$30,00 AUD
Out of over 100 other bids Ali A actually took time to read my brief and understood my requirements. That's why I hired him. Thank you Ali.
Excel
Microsoft Word
P
Cờ của Terry M.
@Proofalot
6 tháng trước
5,0
$35,00 AUD
Fantastic freelancer. understood my requirements and completed the task very fast
Data Processing
Data Entry
Research
Excel
Web Search
J
Cờ của John-Carlos E.
@jc1986
7 tháng trước
5,0
$20,00 USD
Awesome work in time and with professional skills
Matlab and Mathematica
Technical Writing
Editing
Research Writing
LaTeX
M
Cờ của Mercedez F.
@menene
7 tháng trước
5,0
$85,00 USD
I really recommend Asad for any work related to Latex. He is an experience user of Latex and provide useful feedback about the problems you face
Matlab and Mathematica
Editing
Research Writing
LaTeX
Mathematics
M
Cờ của Mercedez F.
@menene
7 tháng trước

Kinh nghiệm

Senior Engineer

National Institute of Cybersecurity (NICS), Ministry of Digital Affairs (Taiwan)
thg 1 2023 - Hiện tại
• Leading a team to enhance the performance of CyberTotal and ThreatWall in terms of: o Cyber Threat Intelligence evaluation and quality enhancement. o Cyber Attack Causal Relationship & Root Cause Analysis. o Cyber Threat Intelligence relationships extraction & Indicators of Compromise lifetime prediction. o Integration of social intelligence with CTI.

Project Assistant Researcher

Cybersecurity Center of Excellence, NARLabs (Taiwan)
thg 3 2022 - thg 1 2023 (10 tháng, 1 ngày)
• Extracting CTI from unstructured input via NLP using machine learning and deep learning. • Collecting threat intelligence from various source and propose how to effectively increase the quality of CyberTotal. • Design of research problems related to CyberTotal. • Preparing tutorials for CyberTotal and ThreatWall (Threat intelligence platforms). • Testing 5G cellular network implementation vulnerabilities.

Research Assistant

High Speed Network Lab, NYCU (Taiwan)
thg 3 2018 - thg 3 2022 (4 năm)
• Conducted research in the fields of Computer Networks, Cloud Computing, Edge computing, Fog computing, Network security, and Optimization Theory. • Designed and implemented a universal fog proxy, universal federator, OAI based 4G-LTE MEC testbed, and multiple testbeds related to testing authentication and application mobility in federated cloud, edge, and fog computing systems.

Học vấn

Ph.D. in Electrical Engineering & Computer Science

National Chiao Tung University, Taiwan 2018 - 2022
(4 năm)

Masters in Electrical Engineering (Telecom & Computer Networks)

National University of Science and Technology, Pakistan 2012 - 2015
(3 năm)

Bằng cấp

GRE

Educational Testing Service
2016
314/340

IELTS

AEO
2016
8 out of 9

Nội dung đã đăng

Communication system and method for performing third-party authentication

U.S. Patent No. 11,502,987. 15 Nov. 2022.
A communication system performs a third-party authentication between a home service end and a foreign service end, wherein the home service end and the foreign service end each have a type of a cloud, an edge or a fog.

Offloading using Traditional Optimization and Machine Learning in Federated Cloud-Edge-Fog Systems:

IEEE COMST, doi: 10.1109/COMST.2023.3239579
This study provides a novel federal classification between cloud, edge, and fog and presents a comprehensive research roadmap on offloading for different federated scenarios. We survey the relevant literature on the various optimization approaches used to solve this offloading problem and compare their salient features. We then provide a comprehensive survey on offloading in federated systems with machine learning approaches and the lessons learned as a result of these surveys.

Multicasting in cognitive radio networks: Algorithms, techniques and protocols

Journal of Network and Computer Applications 45 (2014): 44-61.
We provide a self-contained tutorial on algorithms and techniques useful for solving the multicast problem, and then provide a comprehensive survey of protocols that have been proposed for multicasting in cognitive radio networks. We conclude this paper by identifying open research questions and future research directions.

Learning automata based multipath multicasting in cognitive radio networks

Journal of Communications and Networks 17.4 (2015): 406-418.
we have proposed a novel multipath on-demand multicast routing protocol for CRNs. The approach of multipath routing, although commonly used in unicast routing, has not been explored for multicasting earlier. Motivated by the fact that CRNs have highly dynamic conditions, whose parameters are often unknown, the multicast routing problem is modeled in the reinforcement learning based framework of learning automata.

Modeling packet loss probability and busy time in multi-hop wireless networks

EURASIP Journal on Wireless Communications and Networking (2016): 1-16.
We accurately predict per-flow throughput in general multi-hop wireless networks while addressing CSMA’s coordination problem. Unlike the previous work, our analytical throughput prediction model can clearly differentiate between links interfering from transmission range and carrier sensing range.

A network flow approach for simultaneous escape routing in PCB

HONET-ICT (pp. 78-82). IEEE.
We employed network flow approach to solve the SER problem using optimization modeling technique. We propose two optimal algorithms that use integer linear program for testing different sizes of grids to check their efficiency.

Transparent 3rd-Party authentication with application mobility for 5G mobile edge computing

EuCNC (pp. 219-224). IEEE.
We propose two solutions, namely TC3A (Token-based Cookie transfer & 3 rd -party Authentication) and TS3A (Token-based State transfer & 3 rd -party Authentication) for resolution of authentication and application mobility issues while achieving low latency.

Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation

IEEE Network, vol. 34, no. 6, pp. 220-227, November/December 2020, doi: 10.1109/MNET.011.2000136.
This work proposes a transparent and standard-compliant proxy-based federated authentication for solving the third-party authentication problem in federated cloud and edge computing paradigms. Transparency allows cloud and edge operators to deploy this proxy without having to change the existing authentication protocols.

A dual model node based optimization algorithm for simultaneous escape routing in PCBs

PeerJ Computer Science 7 (2021): e499.
We propose network flow based optimal algorithm that uses integer linear program to solve SER problem and area routing problem in two stages. In the first stage, pins are escaped to the boundaries of pin arrays simultaneously. These escaped pins are connected with each other in the second stage.

The Universal Fog Proxy: A Third-party Authentication Solution for Federated Fog Systems

IEEE Network Magazine, vol. 35, no. 6, pp. 285-291, Nov/Dec 2021, doi: 10.1109/MNET.111.2100168.
We propose a transparent and standard-compliant universal fog proxy that provides third-party authentication among OpenID Connect (OIDC), 802.1x, and Protocol for Carrying Authentication for Network Access (PANA) without requiring a new protocol.

Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication

IEEE Access, vol. 10, pp. 35106-35119, 2022, doi: 10.1109/ACCESS.2022.3162851.
We propose a Federated State transfer and 3rd-party Authentication (FS3A) mechanism that uses a transparent proxy to transfer the information of both authentication and application state across operators to resolve these issues.

Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility

IEEE ICC, 2022, pp. 4926-4931, doi: 10.1109/ICC45855.2022.9838904.
1) A proxy-based state transfer and third-party authentication (PS3A) that uses a transparent proxy to transfer the authentication and application state information. 2) A token-based state transfer and proxy-based third-party authentication (TSP3A) that uses the proxy to transfer the authentication information and tokens to transfer the application state from 3GPP MEC to the fog.

Liên hệ Ali A. về công việc của bạn

Đăng nhập để thảo luận thông tin thông qua chat.

Xác thực

Freelancer Ưa Thích
Đã Xác Thực Danh Tính
Đã Xác Thực Thanh Toán
Đã Xác Thực Điện Thoại
Đã Xác Thực Email
Đã Kết Nối Facebook

Chứng chỉ

us_eng_1.png US English 1 95%

Các kỹ năng hàng đầu

Xem Các Trường Hợp Tương Tự

Người dùng trước Người dùng kế tiếp
Đã gửi lời mời thành công!
Người Dùng Đã Đăng Ký Tổng Số Việc Đã Đăng
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2023 Freelancer Technology Pty Limited (ACN 142 189 759)
Đang tải xem trước
Đã cấp quyền truy cập vị trí.
Phiên đăng nhập của bạn đã hết hạn và bạn đã bị đăng xuất. Hãy đăng nhập lại.