Ahmed Ali

Ahmed Ali
University of the Cumberlands · computer science

Master CS PhD Student

About

44
Publications
47,776
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3
Citations
Introduction
Experienced Software Engineer and Senior Architect with more than 16 years of successful professional experience. Master in computer science and Ph.D. student at the University of Cumberlands.

Publications

Publications (44)
Experiment Findings
Full-text available
The use of keys is necessary for database management. Primary keys allow distinct records, and foreign keys match records to create unique relationships between two or more objects and tables. In Blockchain, we understand that a hash is the equivalent to a key - and makes the chain secure and accurate. Why is it that with an RDBMS, a primary key an...
Article
Full-text available
This report reviews Deutsche Bank's case study, examines blockchain as new technology, and discusses possible examples of applying blockchain in organizations and industries to produce value. Moreover, the report reviews uncertainty, disputes, risks, and arguments about whether or not the blockchain is a disruptive technology. Furthermore, the stud...
Article
Full-text available
The innovation of cryptocurrencies creates a new financial system and changing the global economy. The technology of cryptocurrencies still in the earlier stages; however, the infrastructure is robust and opens many new opportunities in different ways. These opportunities, linked with the growing demand for a new technology burden on existing and n...
Article
Full-text available
The blockchain trend is expanding, offering new services in various business domains such as financial services through financial technology (Fintech). Many financial institutions invested their resources towards an operational shift to get sustainable benefits. This study reviews and examine the "R3: Putting the 'Fin' Back into Fintech." case stud...
Article
Full-text available
Cryptocurrencies show potential innovation, transparency, and benefits in different areas; however, these opportunities may also create challenges and disruption. This paper investigates the security-related challenges of cryptocurrencies and potential dispute resolution through the ecosystem. Moreover, cryptocurrencies offer convenient and reliabl...
Article
Full-text available
Filecoin case study review FILECOIN CASE STUDY REVIEW 2 Abstract The recent development of the blockchain-based product through Initial Coin Offerings (ICOs) fundamentally attracts startup companies to raise funds through new products and services and improve the blockchain platforms. This paper review the case study "Filecoin's initial coin offeri...
Article
Full-text available
Blockchain and peer-to-peer technology open many new opportunities, extend current business models, and bring new investment. Many countries have utilized innovation to enhance their national economy. Dianrong is one of China's largest online marketplace companies that offers online peer-to-peer lending platforms in China (Malloy, Cohen & Woo, 2019...
Article
Full-text available
The author of this paper provides an overview of the digital currency's future and its implications on taxation. Moreover, the author discusses digital currency's pros and cons and addresses its possible impacts on businesses. While several studies consider the digital currency will negatively impact the global economy. Many scholars argue that dig...
Article
Full-text available
This paper provides an overview of the Scotiabank case study. It discusses the success factors of the Scotiabank and Financial technology (fintech) Kabbage partnership. It overviews the circumstances that influence Scotiabank to form partnerships with fintech. Furthermore, this study highlights the proposed sectors and a geographic market where a f...
Article
Full-text available
Blockchain technology provides multiple ways to reduce costs with high security. It builds and manages the distributed and decentralized system and records information about transactions without verifying the third party. Blockchain, electronic voting, is an example of a possible business domain that could eliminate fraud and improve voter access....
Article
Full-text available
This paper review Alibaba's case study and provides an overview of the blockchain-based remittance within Alibaba's cloud offerings. It discusses the impact of blockchain technology's unique features in Alibaba's remittance offering. The paper focuses on other areas of application for blockchain in Alibaba's cloud business. It reviews Alibaba's str...
Article
Full-text available
This report reviews blockchain technology's potential impact on trade and the effect of realizing a blockchain arrangement in economics and industry. Moreover, this report will survey how the organization may minimize any adverse effects. There are sorts of costs that blockchain innovation can diminish; the blockchain will decrease companies' costs...
Article
Full-text available
This report overviews blockchain technology and its potential capabilities of reducing the cost; we will overview the organization's most impact; the information will also overview most of the four types of expenses that blockchain technology can reduce and its result from using the blockchain. Finally, the report will review how the organization c...
Technical Report
Full-text available
This document's main objective is to provide a proposed design for eCommerce for an online service that facilitates the buying and selling the products with minimal or no direct interaction between the two parties. Similarly, In this project, we build a database system for UCOnline, an eCommerce social network system where customers can search, pur...
Article
Full-text available
This report overviews the blockchain technology and most suitable use-cases that align most closely with blockchain technology in different areas and business domains. The blockchain’s fundamental premise is to solve the time and trust; most businesses nowadays depend heavily on the trust parties. Industries like supply chains, logistics, financial...
Article
Full-text available
This report reviews blockchain security's potential impact on public organization collection and handles their data realizing the impact of security breaches on business. Moreover, this report will survey how the organization may minimize security issues. The attack comes among increased cybersecurity concerns and a rising number of internet securi...
Article
Full-text available
This report reviewed the Bitcoin wallet and plan to use the wallet to buy or sell merchandise or services in the future. Bitcoin (BTC) become one of the most famous digital currencies. As Bitcoins do not exist in any physical shape or frame, they cannot save away anyplace. Alternatively, it is the private keys utilized to access an available Bitcoi...
Presentation
Full-text available
Introduction  Problem/Market consideration  Literature Review  Solution  Summary Abstraction 
Article
Full-text available
In this white paper, we examine and provide an Initial coin offering (ICO) known as Lcto token and exchange that offers a powerful platform and solution tool for blockchain-based trading that provides a fundamental way of controlling the money, data, and identity, loans, trading cards, and rewarding incentive system. However, we are not compromisin...
Article
Full-text available
Breast cancer is the second-highest in terms of mortality rates, and one of the most common types of cancer in women. Diagnosis of breast cancer is observed when a speck of calcium is seen or when an abnormal lump is found
Presentation
Full-text available
The dataset extracted from Adult Census Income in 1994 by Ronny Kohavi and Barry Becker provide sample data to find the relation of US Adult demography and Income
Article
Full-text available
The data in this sheet retrieved and collected from Kaggle by Perera (2018) for Boston. Housing Dataset, which was derived from by U.S. Census Service concerning housing in the area of Boston, MA.
Article
Full-text available
The Iris Dataset Analysis The Iris data set used in a specific set of information compiled by Ronald Fisher, a biologist in the 1930s. The data set contains three classes of 50 instances each, where each class refers to a type of iris plant this report provides exploratory data analysis
Article
Full-text available
The automobile data analysis includes a dataset introduced from the Univerisity of California Irvine Machine Learning Repository UCI and refined from Kaggle. According to UCI (1985), the attributes consist of three different types of entities: (a) the model and specification of an auto, which includes the characteristics, (b) the personal insurance...
Article
Full-text available
The dataset extracted from Adult Census Income in 1994 by Ronny Kohavi and Barry Becker, the dataset includes 15 variables. One predication goal is to determine if a person makes over $50K a year based on the biography and background.
Research
Full-text available
Over past years, IT complexity has grown while efficiency promoted; Virtualization reverses this track simplifying IT infrastructure, improving efficiency by performing more with less effort. Virtualization lets the application run in a few physical servers where each App operates in a separate container called a virtual machine. VM is entirely iso...
Article
Full-text available
The Big Data has thrown a tremendous impact on the computational space. "The average employee creates roughly one gigabyte of data annually and growing. Data volumes are expected to increase over the next decade, not 10-fold or even 20-fold, but as much as 40 to 50 times what it is today"[1]. This massive amount of data must meet the legal requirem...
Thesis
Full-text available
network Neutrality refers to the principle of communication equality. Where the internet service provider (ISPs) should not discriminate against the users, rules, or restrictions; this includes content, website, platform, destination, or source. Applying the freedom of the internet requires formulating policies such as a first-come, first-served, a...
Article
Full-text available
Stakeholders are one of the important key components of any information technology project and they can be individuals, teams or even organizations. We can divide the stakeholders to internal or external depending on the viewpoint of the actors whether from the social or economic perspective of the organization. While the organization's actions, po...
Article
An event-driven architecture consists of event producers that generate a stream of events, and event consumers that listen for the events, A key element of event notification is that the source system doesn't really care much about the response. Often it doesn't expect any answer at all, or if there is a response that the source does care about, it...
Article
In Single Tenancy architecture , each customer runs on their copy of the system, with their own copies of the processes. The more customers you have, the more copies of the processes you need to manage. The more moving parts your system has, the more processes you'll need for each customer. This can be a reason against having finer-grained architec...
Article
Full-text available
Microservice complexity is hard to define, but the general concept is associated with many components and parts that interact in timeframes to become a system. Complex systems are a subject of research in many prestigious institutions, and a microservices architecture is a perfect case of a complex system. It not only means a shift in technology, b...
Article
managing transactions in a distributed Microservice architecture is very sensitive, in monolithic applications primarily stick to ACID properties while dealing with transactions. The biggest advantage for monolithic application in transaction management is a single and common database server.When a microservice architecture decomposes a monolithic...
Method
Full-text available
Scale of Microservices tend to generate a higher volume of service metrics data. Thus, it requires salable monitoring system that are cabal be enough to process those data and take corrective actions. In general, there is too much more data to understand and respond to
Article
From the very beginning the Sorting problem has attracted a great deal of research that has been developed and analyzed during past years and yet still there are a room for developing new techniques to improve the time and space complexity for better efficiency. Sorting algorithms give an abstract way of studying program accuracy also sorting is im...
Method
Full-text available
Article
What are Microservices? Microservices-also known as the microservice architecture-is an architectural style that structures an application as a collection of loosely coupled services, which implement business capabilities What is Microservice architecture? The Microservices architecture enables the continuous delivery/deployment of large, complex a...
Method
Full-text available
The Microservices architecture enables the continuous delivery/deployment of large, complex applications. It also enables an organization to evolve its technology stack
Article
Full-text available
Definition Microservice architecture is a distinctive method of developing software systems that has grown in popularity in recent years. In fact, even though there is not a whole lot out there on what it is and how to do it, for many developers it has become a preferred way of creating enterprise applications. Also known as the Microservice archit...
Article
Full-text available
Multi-tenancy architecture is often used where single instance of software or components run on server the central idea is that multiple tenant applications share single instance or components stored in the infrastructure Meta data., In other words, in Multi-tenancy architecture each tenant application not only needs to develop its own functionalit...
Article
Full-text available
Message queuing has been used in data processing for many years. It is most commonly used today in electronic mail. Without queuing, sending an electronic message over long distances requires every node on the route to be available for forwarding messages, and the addressees to be logged on and conscious of the fact that you are trying to send them...
Method
Full-text available
Simplify and decrease complexity of developing, managing, and deploying micro-services

Network

Cited By