Mohammed Kemal

Mohammed Kemal
Independent researcher

MSc in Big Data Analytics

About

69
Publications
187,399
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
37
Citations
Introduction
Mohammed Kemal is a graduate student with the University of Liverpool specializing in Big Data Analytics. Kemal currently works at Independent researcher. Mohammed does research in Computer and Society, Artificial Neural Network and Artificial Intelligence. Their current project is 'EC3 project'.

Publications

Publications (69)
Article
Full-text available
According to Reuters (2019), Target Corporation is a general merchandise retailer selling products in stores and digital channels across the globe. Target encountered a cyber attack back in 2013, just one week before Christmas. According to Mike (2019), retail stores were rushing to meet the demands of last-minute shoppers, pushing their employees...
Experiment Findings
Detailing how a greedy algorithm works (and under what conditions it can work correctly) is straightforward, as explained in the following four steps:
Experiment Findings
Full-text available
Detailing how a greedy algorithm works (and under what conditions it can work correctly) is straightforward, as explained in the following four steps:
Experiment Findings
Full-text available
The main steps of greedy algorithms
Article
Full-text available
RapidMiner is a data science platform for teams that unites data prep, machine learning, and predictive model deployment.
Article
Full-text available
A few years ago, an attacker compromised Code Spaces’ Amazon Web Services (AWS) account used to deploy Code Spaces’ commercial code-hosting service. According to Ajmal (2017), the attacker gained access to their control panel and demanded money. When Code Spaces refused, the attacker began to systematically delete Code Spaces’ resources hosted on A...
Data
Burnout is a state of emotional, physical, and mental exhaustion caused by excessive and prolonged stress. It occurs when you feel overwhelmed, emotionally drained, and unable to meet constant demands. This graphic info will give you tips on how to overcome burnout.
Data
Managing Amazon S3 buckets and objects using their high-level aws s3 commands. In this post, I will share a few major commands. According to AWS (2019), we are highly recommended to set our default credentials before we run any commands.
Presentation
Full-text available
Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. Virtualization of the application delivered via the cloud is essentially a more manageable version of the late 1990s Application Service Provider (ASP) model, and not SaaS. A major benefit of SaaS is the...
Data
Advantage and Disadvantages of Cloud Computing!
Poster
Full-text available
Presentation
Full-text available
Article
Full-text available
Virtualization programs include the use of a host machine that has physical hardware. According to Kurt and David (2011), such device then holds many virtual guest machines that run operating systems (OS) of their own. Based on Stephen (2019), virtualization works by abstracting physical hardware and devices from the applications running on that ha...
Article
Full-text available
Cloud computing is massively transforming the IT landscape. According to Isaac, Frank, and Rowland (2018), on a pay-as-you-use basis, cloud consumers can access applications already deployed by cloud providers. It could be in the form of the capability to develop and deploy user applications using the services of a cloud provider. In addition, mass...
Poster
Full-text available
Preprint
The 50 most common BA interview questions and answers!
Presentation
Full-text available
As part of the long term solution to ensure timely, completeness and accuracy of immunization data, BID and the MOHSW have deployed a standards-based electronic immunization information system to track children and their vaccination records. All children will be registered into an immunization system at birth. This system will produce the list of a...
Presentation
Application of KNN Classification on online Peer to Peer Loan Applications
Article
Full-text available
A person or a company may want to access applications that sits at a certain location different from their own computers or servers, like Microsoft Office, for example. This would eliminate the need to install apps locally on every computer at home or the office. And when an update or even upgrade becomes available, there's no work to be done at th...
Article
Full-text available
I was part of a multivendor project development team to develop an enterprise-wide application. Primarily the project started with four vendors with a budget cost of half billion dollars. When we did a review of requirements to merge two update sets that come from the different team, we have identified two risks. The identified risks were discovere...
Article
Full-text available
During the past decade, the scope of IT outsourcing arrangements evolved from a single vendor to multivendor relationships requiring new forms of governance. Recently, I was part of a multi-vendor development team in large enterprise organizations. Development teams were either in different cities or even different countries. Often, I have found th...
Presentation
Full-text available
Presentation
Full-text available
Organizations today have more data than they have ever had before. Advancements in technology play a critical role in generating large volumes of data. According to Babcock (2006), a study published by Information Week, the average company’s data volumes nearly double every 12 to 18 months. Databases are not only growing bigger, but they also are b...
Article
Full-text available
Data is all around us. The billions of devices and sensors in The Internet of Things rarely sleep and are constantly gathering zettabytes of digital information. According to Lisa (2017), the tidal wave of data dumped into storage repositories offer both challenges and opportunities. The key is for businesses to harness this data, analyze it and tu...
Presentation
Full-text available
Economics is the study of how men and society end up CHOOSING, with or Without the use of money, to employ SCARCE productive RESOURCES that could have ALTERNATIVE uses, to produce various commodities and DISTRIBUTE them for consumption, now or in the future, among various people and groups in society.
Article
Innumerable judgments are executed every day at Bank as we accomplish our plan to establish a secure environment while providing our clients with personalized financial solutions they need to thrive. The decisions we make as individuals and as an organization not only have a profound effect on the company and its employees, but our clients’ life, t...
Article
Full-text available
Social media programs are more spreading throughout the globe. According to Al-Sabti1, Ajay, and S.K. Jha3(2017), Facebook users touched more than 1.4 billion users per month in the United States of America in 2015, that indicates the majority of the people of Americans have left foot step in social networks. Also, in emerging countries like Ethiop...
Preprint
Full-text available
In any organization, from small to large corporate, new hires passed within some form of training. They might also be trained about a code of conduct for the company they are going to join. In a big company, the human resources department implement a policy and guidelines manual that directions be accessible in copy form or on the corporate portal....
Experiment Findings
Full-text available
Preprint
Full-text available
With advanced analytics at the current age of information and digitalization has brought with it new technologies and methods for improving corporate and enterprise business operations by maintaining extra competitive advantage: * New big data technologies enable cost-effective storage, processing, and analysis of large amounts of data; * Modern an...
Experiment Findings
Full-text available
The CEO is able to see the profits and sales per product category during the last three years.
Experiment Findings
Full-text available
The CEO is able to see the profits and sales per product category during the last three years.
Experiment Findings
The CEO is able to see the profits and sales per product category during the last three years.
Presentation
Full-text available
Choosing the proper data warehouse development methodology is often the most decisive decision and crucial to ensuring that we get appropriate information. The first thing we need to consider is the organizational structure and developmental culture of our company. I laid out seven detailed steps in developing a data warehouse for the Ministry of H...
Technical Report
Full-text available
Building an interactive data visualization takes a bit of creativity; there is as much science to it as an art. Almost all data visualization software is demanded to transform mysterious information into great visualizations to communicate the secret intelligence in the data to the target audience. According to Daniel (2013), data visualization too...
Preprint
Full-text available
Goal: To gain insight and thus provide valuable knowledge for better decision making. Project Overview I am leading a team of experts that provide data-driven advice to managers and CEOs to inform their business strategy. The CEO of a company which owns a chain of shops approaches my team. The shops sell various categories of products. The CEO want...
Presentation
Full-text available
I want to take this opportunity to introduce you one thing in ServiceNow, agent intelligent. The availability of infinite data pool, and utilizing the functionality of chat boot are becoming prevalent with the booming of big data functionality. IT department is the main gate away for almost all departments in the enterprise organizations. If inform...
Article
Full-text available
We are wired for story and we can crave it. Storytelling using data visualization has played an integral role in our ability to show progress, change over time, and many more by getting peoples attention quickly. It should come as no surprise, then, that presenting data visualization and information within the story form maximizes the effectiveness...
Technical Report
Full-text available
Great Data visualization essentials include effective data design strategies to combine, unify and standardize data coming from different sources. Well-designed visual illustrations present obvious access to large amounts of data in easily ingestible chunks. This promotes increased usage and enhanced learning, and facilitates better task performanc...
Technical Report
Full-text available
When planning for a modern cloud data warehouse development project, having some form or outline around understanding the business and IT needs and pain points will be key to the ultimate success of your venture. Being able to tell the right story will give the business the structure it needs to be successful in data warehousing efforts.
Presentation
Full-text available
Have you ever used summary statistics, things like what's the average height? what's the average selling? These numbers can be a useful summary of a data set, but they can also hide detail within the data. There is a danger that relying on summaries can lead to misleading or even incorrect answers. It's only by visualizing the data that we're able...
Article
Full-text available
The last wave of innovation and globalization produced winners and innovation The last wave of innovation and globalization produced winners and losers. One group of winners were the investors, entrepreneurs, and high-skilled laborers that congregated around fast-growing markets and new inventions. Another class of winners was the more than 1 billi...
Preprint
Full-text available
Enterprise organizations demand quality data to get the best out of their data. Contrarily, their performance is endangered, and services to consumers break, as inaccurate data wastes time and energy of workers, requiring them to implement hand-operated methods to produce reports and dashboards: garbage in, garbage out if you put the wrong figures...
Presentation
Full-text available
Goal setting: steps on how to set a perfect goal.
Article
Full-text available
In today's time, there are dozens of methodologies to choose from when we are thinking about an enterprise data warehousing. Each of those many methodologies falls into one of two major categories according to Alan (2015). One camp revolves around a Data First philosophy and the other is primarily Functionality Oriented.
Research
Full-text available
Forecasting Customer loan Default using Ensemble Learning. We have used the Lending Club datasets of comprehensive credit data for all loans issued within the time 2007 to 2011 period. We are able to find the most important variables used in deciding individual loans.
Article
High population growth demands alternative sources for producing valuable products from waste materials. One such waste material in Ethiopia is mango seed kernel and the oil extracted from the mango seed kernel, have immense application in the cosmetics industry. The main aim of this research is to determine the optimum operating condition for the...
Article
Full-text available
CHILD SURVIVAL ARTICLE POSTINGS Readers with interests in polio and global vaccine plans are directed to items 1 and 2. Those with country interests in Nigeria, Kenya, and Ethiopia are directed to items 8, 9 and 16. Meningitis vaccination is covered in item 17.
Presentation
Full-text available
Joint statement of the World Federation of Public Health Associations (WFPHA) and the African Federation of Public Health Associations (AFPHA) on the current Ebola situation: Mobilizing public health resources and revitalizing primary health care for a sustainable response to the public health emergencies.
Presentation
Full-text available
As part of the long term solution to ensure timely, completeness and accuracy of immunization data, BID and the MOHSW have deployed a standards-based electronic immunization information system to track children and their vaccination records. All children will be registered into an immunization system at birth. This system will produce the list of a...
Presentation
Full-text available
የሚጠበቀው ውጤት  ከፍተኛ አመራሩ ያለበትን የአመለካከት፣ የክህሎትና የግብዓት ችግሩን አውቆ በውይይት ፈትቶ ለቀጣዩ ስራ ሂስና ግለሂስ መድረክን በማዘጋጀት እራሱን ዝግጁ ያደርጋል።  በክልሉ ከፍተኛ አመራርና በ ጤናው ሴክተር ጠንካራ የስራ ትስስር ይፈጠራል።  ከፍተኛ አመራሩ የመንግስት የጤና ፖሊሲዎችና ስትራቴጂዎች ክብደትና ትኩረት ሰጥቶ ሴክተሩን በስትራቴጂካዊ አስተሳሰብ ለመምራት የሚያስችል አቅሙ ይዳብራል።  የሴክተሩ አመራር ለዴሞክራሲያዊ አሰራርና ለመልካም አስተዳደር ተገቢ ትኩረት በመስጠት በሴክተሩ የክትትልና የግምገማ ስርዓት የማጠና...
Conference Paper
In 2004, Ethiopia launched Health Extension Program (HEP), to expand the national health program to include community based health interventions as a primary component of the HSDP. HEP is "a package of basic and essential promotive, preventive, and curative health services targeting households in a community, based on the principle of Primary Healt...
Presentation
Full-text available
While there is a multitude of strategies that can be used to deliver immunization services, there are only two types of doses that can be given -- routine or supplemental. The main the distinction is that a supplemental dose is "additional" or "extra" to the doses required by the national immunization schedule and may, or may not, be recorded in th...
Book
Full-text available
In Ethiopia disease-carrying vectors such as insects, rodents, and other insects invertebrate biting species play a significant role in transmitting several essential diseases, inflicting poisoning by biting and Being nuisance. The vectors of Public Health importance included here are insect species such as flies, mosquito, arthropods; e.g., Cockro...
Book
Full-text available
Adolescence is a transitional period when a person is young and dependent. At the same time, the brain is being matured and there is rapid physical development. It is also an important period to obtain the necessary knowledge and skills to prepare oneself to engage in social affairs and activities. Hence, it is an age-group undergoing through the c...
Book
Full-text available
Family planning service was introduced in Ethiopia in 1948. Although at the beginning the services were limited to only major cities, gradually the services expanded to the rural areas and are being used now by the rural communities. According to the Ministry of Health report of 1994 E.C. in Ethiopia, the coverage of family planning services had re...
Book
Full-text available
First aid is the initial assistance or treatment given to an injured or sick individual before professional medical care becomes available, with the Materials at hand. Such intervention aims at reducing the pains or situations that threaten the victim until a professional arrives or the sick, the individual is brought to a health facility. The rura...
Book
Full-text available
The health status of its people is one of the important determinants of a country’s development level. Ill health or lack of health leads to poverty. Thus the health status and development are closely linked to each other. As it is known, the developing countries of the world have low health service coverage, as a result, the health problems of the...

Questions

Questions (165)
Question
There is positive and negative news about what 5G and its technology will bring to our world. One thing I am confident about it is the benefit toward the emerging technologies like my favourite one, Augmented Reality. No one can stop tech; it's a matter of time and commitment. My always concern is not to see security and privacy as an afterthought of the technology, and they should be one of the first. Share your research-based perspective of the 5G impact on privacy and security? Thanks
Question
The initial configuration of devices, networks, or software is aimed at usability rather than security, but this trade-off comes at great risk.
Do you think that Default configuration = insecure setting,
Do you agree or disagree and Why?
Question
Home Wi-Fi is one entry-point hacker can use to get into one's network without setting foot inside their building because wireless is much more open to eavesdroppers than wired networks. There’s a lot more to Wi-Fi security than just setting a simple password.
How one can reduce the vulnerability of cybercrime in-home network?
Question
According to ZDNet, USB connections were designed to work as both data and power transfer mediums, with no strict barrier between the two. As smartphones became more popular in the past decade, security researchers figured out they could abuse USB connections that a user might think was only transferring electrical power to hide and deliver secret data payloads.
Any thoughts?
Question
Some websites have added an option to check if the user wants to stay signed in or not.
With this option selected, the user's account on the device will keep signed in until the user signs out.
What are your thoughts?
Stay signed in? Good or bad in terms of cybersecurity?
Question
Can you trust open source applications? Yes/No and Why?
Question
Customer data is often stored in many applications and locations in a large organization. The knee-jerk reaction of IT is to do a big data integration project and get all the digital assets under one roof. If one does succeed in getting all the data in one place, is it gonna attract the attackers to come over? Do you support global data integration or want to keep sensitive data separately?

Network

Cited By

Projects

Projects (48)
Project
Create an interactive environment through new electronic devices and technologies, and the presence of a variety of sources of information and experience. Not to attend the same location through distance learning, and this is one of the most important goals of e-learning. In times of corona virus isolation, the educational process should not "suffer" and we should not lack contacts with students and colleagues.
Archived project
To study the opinion of intellectuals on human society and behavior.
Project
To be a senior ServiceNow trainer!