WA

Wasim Ali

PostDoctorate Felow at Laboratory of Control and Automation (LCA), Politecnico di Bari, Italy
📚 PostDoc Fellow | , Bari, Italy
Mutual Connections
Loading...

Send Message

No file chosen
4 Publications
0 Followers
0 Following
0 Questions

👤 About

Skills & Expertise

Cyber Security Network Security AI and Machine Learning Data Science Big Data Analytics Traffic Simulation(SUMO) and Network Simulation (OMNeT++).

Research Interests

No research interests added yet.

Connect With Me

💼 Experience

PostDoctorate Felow

Laboratory of Control and Automation (LCA), Politecnico di Bari, Italy · January 2024 - Present

OM TECHNICIAN

Public Telecommunication Corporation(PTC) - Yemen, sanaa (Yemen) · February 2006 - November 2014
-Technician of switches (Alcatel-283) in the department Traffic at PTC -IT specialist in the department of operation and maintainance at PTC

🎓 Education

Politecnico di Bari

PhD in Electrical and Information Engineering · 2024

University of Mysore

Master of Computer Science (MSC) in Computer Science · 2017

University of science and technology, Yemen

baccalaureate B.cs in Computer Science - IT · 2014
Description (between 50 and 1500 characters)

🎤 Conferences & Seminars (2)

Conference: 2024 IEEE 20th International Conference on Automation Science and Engineering (CASE)
IEEE - Institute of Electrical and Electronics Engineers · City , Bari, Country · August 2024
No descriptions
International Conference on Control, Decision and Information Technologies (CoDIT)
IEEE and IFAC · Istanbul, Istanbul, Country · May 2022
Its purpose is to be a forum for technical exchange amongst scientists having interests in Control, Optimization, Decision, all areas of Engineering, Computer Science and Information Technologies. This conference will provide a remarkable opportunity for the academic and industrial communities to address new challenges, share solutions and discuss future research directions. The technical program will include plenary lectures, regular technical sessions, and special sessions.

🏆 Awards & Achievements (1)

🏆 Award for ranking 2nd in Master Graduation of MSC in Computer Science under the University of Mysore for the academic year 2015-2017
Awarded by: University of Mysore || Year: 2017
Description

👨‍🎓 Thesis Guided (2)

CRIME ANALYSIS AND PREDICTION USING K-MEANS CLUSTERING TECHNIQUE
Name: Master thesis || Type: Project
Institution: St. Philomena's College
Computer science, Machine learning
Intelligent Vehicle T3-based Internet of Things and Embedded Systems
Name: Master thesis || Type: Project
Institution: St. Philomena's College
Computer science, IoT

Professional Memberships (1)

IEEE - Institute of Electrical and Electronics Engineers
Member: Student || Join dt: 2022 - 2024
Country: Italy

📚 Publications (4)

Journal: Journal of Intelligent Systems and Applied Data Science • July 2023
The optical burst switching (OBS) paradigm is an intermediate optical switching solution between optical packet switching (OPS) and optical circuit switching (OCS). In addition, OBS has enormous band...
Obs networks Fota Fuzzy logiccontroller Average e-to-enddelay Blr
Journal: Journal of Intelligent Systems and Applied Data Science • July 2023
Cloud computing has revolutionized IT infrastructure management and service delivery across industries. This study provides a comprehensive analysis of deployment models and service models in cloud co...
Cloud computing Service models Cloud management Cloud threats
Journal: Journal of Intelligent Systems and Applied Data Science • July 2023
Abstract :The study's objective was to use machine learning techniques to provide an overview of resource management issues. In order to demonstrate how resource management machine learning algorithms...
Machine learning (ml); resource management; virtual machines (vms); deep learning (dl); reinforcement learning (rl); artificial intelligence (ai); heterogeneous networks (hetnets)
Journal: Journal of Intelligent Systems and Applied Data Science • August 2023
API Malware Analysis and Forensics is a key field of research in cybersecurity. It is critical to have strong defenses in place to detect and prevent malware attacks. APIs, since they can have disastr...
Api malware Forensics Cybersecurity
dd