
Ahmed AliUniversity of the Cumberlands · computer science
Ahmed Ali
Master CS PhD Student
About
44
Publications
47,776
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3
Citations
Introduction
Experienced Software Engineer and Senior Architect with more than 16 years of successful professional experience. Master in computer science and Ph.D. student at the University of Cumberlands.
Publications
Publications (44)
The use of keys is necessary for database management. Primary keys allow distinct records, and foreign keys match records to create unique relationships between two or more objects and tables. In Blockchain, we understand that a hash is the equivalent to a key - and makes the chain secure and accurate. Why is it that with an RDBMS, a primary key an...
This report reviews Deutsche Bank's case study, examines blockchain as new technology, and discusses possible examples of applying blockchain in organizations and industries to produce value. Moreover, the report reviews uncertainty, disputes, risks, and arguments about whether or not the blockchain is a disruptive technology. Furthermore, the stud...
The innovation of cryptocurrencies creates a new financial system and changing the global economy. The technology of cryptocurrencies still in the earlier stages; however, the infrastructure is robust and opens many new opportunities in different ways. These opportunities, linked with the growing demand for a new technology burden on existing and n...
The blockchain trend is expanding, offering new services in various business domains such as financial services through financial technology (Fintech). Many financial institutions invested their resources towards an operational shift to get sustainable benefits. This study reviews and examine the "R3: Putting the 'Fin' Back into Fintech." case stud...
Cryptocurrencies show potential innovation, transparency, and benefits in different areas; however, these opportunities may also create challenges and disruption. This paper investigates the security-related challenges of cryptocurrencies and potential dispute resolution through the ecosystem. Moreover, cryptocurrencies offer convenient and reliabl...
Filecoin case study review FILECOIN CASE STUDY REVIEW 2 Abstract The recent development of the blockchain-based product through Initial Coin Offerings (ICOs) fundamentally attracts startup companies to raise funds through new products and services and improve the blockchain platforms. This paper review the case study "Filecoin's initial coin offeri...
Blockchain and peer-to-peer technology open many new opportunities, extend current business models, and bring new investment. Many countries have utilized innovation to enhance their national economy. Dianrong is one of China's largest online marketplace companies that offers online peer-to-peer lending platforms in China (Malloy, Cohen & Woo, 2019...
The author of this paper provides an overview of the digital currency's future and its implications on taxation. Moreover, the author discusses digital currency's pros and cons and addresses its possible impacts on businesses. While several studies consider the digital currency will negatively impact the global economy. Many scholars argue that dig...
This paper provides an overview of the Scotiabank case study. It discusses the success factors of the Scotiabank and Financial technology (fintech) Kabbage partnership. It overviews the circumstances that influence Scotiabank to form partnerships with fintech. Furthermore, this study highlights the proposed sectors and a geographic market where a f...
Blockchain technology provides multiple ways to reduce costs with high security. It builds and manages the distributed and decentralized system and records information about transactions without verifying the third party. Blockchain, electronic voting, is an example of a possible business domain that could eliminate fraud and improve voter access....
This paper review Alibaba's case study and provides an overview of the blockchain-based remittance within Alibaba's cloud offerings. It discusses the impact of blockchain technology's unique features in Alibaba's remittance offering. The paper focuses on other areas of application for blockchain in Alibaba's cloud business. It reviews Alibaba's str...
This report reviews blockchain technology's potential impact on trade and the effect of realizing a blockchain arrangement in economics and industry. Moreover, this report will survey how the organization may minimize any adverse effects. There are sorts of costs that blockchain innovation can diminish; the blockchain will decrease companies' costs...
This report overviews blockchain technology and its potential capabilities of reducing the
cost; we will overview the organization's most impact; the information will also overview
most of the four types of expenses that blockchain technology can reduce and its result
from using the blockchain. Finally, the report will review how the organization c...
This document's main objective is to provide a proposed design for eCommerce for an online service that facilitates the buying and selling the products with minimal or no direct interaction between the two parties. Similarly, In this project, we build a database system for UCOnline, an eCommerce social network system where customers can search, pur...
This report overviews the blockchain technology and most suitable use-cases that align most closely with blockchain technology in different areas and business domains. The blockchain’s fundamental premise is to solve the time and trust; most businesses nowadays depend heavily on the trust parties. Industries like supply chains, logistics, financial...
This report reviews blockchain security's potential impact on public organization
collection and handles their data realizing the impact of security breaches on business.
Moreover, this report will survey how the organization may minimize security issues. The
attack comes among increased cybersecurity concerns and a rising number of internet
securi...
This report reviewed the Bitcoin wallet and plan to use the wallet to buy or sell merchandise or services in the future. Bitcoin (BTC) become one of the most famous digital currencies. As Bitcoins do not exist in any physical shape or frame, they cannot save away anyplace. Alternatively, it is the private keys utilized to access an available Bitcoi...
Introduction Problem/Market consideration
Literature Review Solution Summary Abstraction
In this white paper, we examine and provide an Initial coin offering (ICO) known as Lcto token and exchange that offers a powerful platform and solution tool for blockchain-based trading that provides a fundamental way of controlling the money, data, and identity, loans, trading cards, and rewarding incentive system. However, we are not compromisin...
Breast cancer is the second-highest in terms of mortality rates, and one of the most common types of cancer in women. Diagnosis of breast cancer is observed when a speck of calcium is seen or when an abnormal lump is found
The dataset extracted from Adult Census Income in 1994 by Ronny
Kohavi and Barry Becker provide sample data to find the relation of US Adult demography and Income
The data in this sheet retrieved and collected from Kaggle by Perera (2018) for Boston.
Housing Dataset, which was derived from by U.S. Census Service concerning housing in
the area of Boston, MA.
The Iris Dataset Analysis The Iris data set used in a specific set of information compiled by Ronald Fisher, a biologist in the 1930s. The data set contains three classes of 50 instances each, where each class refers to a type of iris plant this report provides exploratory data analysis
The automobile data analysis includes a dataset introduced from the Univerisity of
California Irvine Machine Learning Repository UCI and refined from Kaggle. According
to UCI (1985), the attributes consist of three different types of entities: (a) the model and
specification of an auto, which includes the characteristics, (b) the personal insurance...
The dataset extracted from Adult Census Income in 1994 by Ronny Kohavi and Barry Becker,
the dataset includes 15 variables. One predication goal is to determine if a person makes over $50K a year based on the biography and background.
Over past years, IT complexity has grown while efficiency promoted; Virtualization reverses this track simplifying IT infrastructure, improving efficiency by performing more with less effort. Virtualization lets the application run in a few physical servers where each App operates in a separate container called a virtual machine. VM is entirely iso...
The Big Data has thrown a tremendous impact on the computational space. "The average employee creates roughly one gigabyte of data annually and growing. Data volumes are expected to increase over the next decade, not 10-fold or even 20-fold, but as much as 40 to 50 times what it is today"[1]. This massive amount of data must meet the legal requirem...
network Neutrality refers to the principle of communication equality. Where the internet service provider (ISPs) should not discriminate against the users, rules, or restrictions; this includes content, website, platform, destination, or source. Applying the freedom of the internet requires formulating policies such as a first-come, first-served, a...
Stakeholders are one of the important key components of any information technology project and they can be individuals, teams or even organizations. We can divide the stakeholders to internal or external depending on the viewpoint of the actors whether from the social or economic perspective of the organization. While the organization's actions, po...
An event-driven architecture consists of event producers that generate a stream of events, and event consumers that listen for the events,
A key element of event notification is that the source system doesn't really care much about the response. Often it doesn't expect any answer at all, or if there is a response that the source does care about, it...
In Single Tenancy architecture , each customer runs on their copy of the system, with their own copies of the processes. The more customers you have, the more copies of the processes you need to manage. The more moving parts your system has, the more processes you'll need for each customer. This can be a reason against having finer-grained architec...
Microservice complexity is hard to define, but the general concept is associated with many components and parts that interact in timeframes to become a system. Complex systems are a subject of research in many prestigious institutions, and a microservices architecture is a perfect case of a complex system. It not only means a shift in technology, b...
managing transactions in a distributed Microservice architecture is very sensitive, in monolithic applications primarily stick to ACID properties while dealing with transactions. The biggest advantage for monolithic application in transaction management is a single and common database server.When a microservice architecture decomposes a monolithic...
Scale of Microservices tend to generate a higher volume of service metrics data. Thus, it requires salable monitoring system that are cabal be enough to process those data and take corrective actions. In general, there is too much more data to understand and respond to
From the very beginning the Sorting problem has attracted a great deal of research that has been developed and analyzed during past years and yet still there are a room for developing new techniques to improve the time and space complexity for better efficiency. Sorting algorithms give an abstract way of studying program accuracy also sorting is im...
What are Microservices? Microservices-also known as the microservice architecture-is an architectural style that structures an application as a collection of loosely coupled services, which implement business capabilities What is Microservice architecture? The Microservices architecture enables the continuous delivery/deployment of large, complex a...
The Microservices architecture enables the continuous delivery/deployment of large, complex applications. It also enables an organization to evolve its technology stack
Definition Microservice architecture is a distinctive method of developing software systems that has grown in popularity in recent years. In fact, even though there is not a whole lot out there on what it is and how to do it, for many developers it has become a preferred way of creating enterprise applications. Also known as the Microservice archit...
Multi-tenancy architecture is often used where single instance of software or components run on server the central idea is that multiple tenant applications share single instance or components stored in the infrastructure Meta data., In other words, in Multi-tenancy architecture each tenant application not only needs to develop its own functionalit...
Message queuing has been used in data processing for many years. It is most commonly used today in electronic mail. Without queuing, sending an electronic message over long distances requires every node on the route to be available for forwarding messages, and the addressees to be logged on and conscious of the fact that you are trying to send them...
Simplify and decrease complexity of developing, managing, and deploying micro-services