Search this site
Embedded Files
MUGHALS Since 1917
  • HOME
    • ABOUT
    • AREAS OF RESEARCH
    • COOPERATIVES
    • ECONOMIC SECURITY
    • ENDOWMENT
    • LEGAL ENTITIES
    • METHODOLOGY
    • TECHNOLOGY 2
  • AL-ILM
    • AI ECONOMY
    • ARBITRAGE PRICING FORMULA
    • COOPERATIVES
    • ENDOWMENT
    • PUBLICATIONS
  • AGRICULTURE
    • AGRO TURNKEY SOLUTION
    • COOPERATIVES
    • DESERT HYDROLOGY
    • ENERGY DEREGULATION
    • FERTILIZER
    • FINANCIAL MODELING 4-AGRO
    • REMOTE SENSING
    • WATER 1
  • AI-AGRO-PHARMA
    • WATER 1
    • FINANCIAL MODELING 5-PHARMA
  • AI-ALGORITHMS
    • ALGORITHMS - AI APPs
    • AI PROGRAMMING LANGUAGES
  • AI ECONOMY
    • AREAS OF RESEARCH 2AI
    • COOPERATIVES
    • DIGITAL CRYPTO ASSETS 2AIE
    • E-WASTE PREFEASEABILITY
    • E-WASTE RECYCLING
    • EMBEDDED CHIPS
    • FINANCIAL MODELING 2-AI-Economy
    • OPTICAL SYSTEMS
    • PROGRAMMING LANGUAGES
    • PROJECT NOVA-7
  • AI EDUCATION
    • AI-STEM EDUCATION
    • COOPERATIVES
    • PUBLICATIONS
  • AI-QUANTUM
    • DATA SCIENCES
    • DATA SCIENCE QUANTUM AI
  • COOPERATIVES
    • FINANCIAL MODELING 3-COOP
  • COSMOLOGY
    • DATA SCIENCES
    • DEEP SPACE MISSIONS
    • OPTICAL SYSTEMS
    • PROJECT NOVA-7
    • SENSOR TECHNOLOGIES
    • SPACE CRAFTS
  • CRYPTO INDUSTRY
    • DIGITAL CRYPTO ASSETS
  • DEEP SPACE
  • ECONOMY
    • AREAS OF RESEARCH 2E
    • COOPERATIVES 2E
    • FINANCIAL STRUCTURING
  • ENDOWMENT HKE
    • AL-ILM
    • COOPERATIVES 2
    • PROJECT NOVA-7
  • ENERGY
  • ENERGY 1
    • COOPERATIVES
    • EMBEDDED CHIPS
    • ENERGY RENEWABLE
    • ENERGY SYSTEMS
    • ENERGY VALUE CHAIN
    • E-WASTE RECYCLING
  • INITIATIVES
    • AEROSPACE
    • AREAS OF RESEARCH
    • COOPERATIVES
    • ENDOWMENT
  • LEGAL ENTITIES
  • MANUFACTURING
    • AMCO
      • Copy of AMCO
      • EMBEDDED CHIPS
      • EMBEDDED PROCESSORS
    • COOPERATIVES
    • DIGITAL TWINS
    • DEEP SPACE
    • EMBEDDED CHIPS
    • EMBEDDED PROCESSORS
    • E-WASTE RECYCLING
    • SPACE SYSTEMS
  • MINING
    • ASGR PROGRAM
    • CRITICAL MINERALS Texas
    • OMAN MINERALS
    • PAKISTAN COPPER-GOLD
    • PAKISTAN MINING
    • PAKISTAN OIL & GAS
  • TECHNOLOGY
    • BLOCKCHAIN
    • COOPERATIVES
    • CLU-IN TECHNOLOGY
    • COMPOSITE MATERIALS
    • EARTH OBSERVATION
    • EMERGING TECHNOLOGIES
    • LIDAR SYSTEMS
    • OPTICAL SYSYTEMS
    • QUANTUM
    • REMOTE SENSING
      • RS LICENCING
      • RS APPs - USE CASES
      • RS REMOTE SENSING
      • RS TYPES
    • SECURITY IMPLICATIONS
    • TECHNOLOGY TRANSFER
  • WATER 1
    • DESERT HYDROLOGY
    • DRILLING PUMPS
    • EMBEDDED CHIPS
    • LiDAR
    • MINING
    • REMOTE SENSING
    • REMOTE SENSING TYPES
MUGHALS Since 1917

﷽

BLOCKCHAIN

Lawful Innovative Partnerships

Our Focused Sectors

Aerospace  |  Agriculture  |  AI-Ilm  |  AI Economy  |  Deep Space

Economy  |  Education  |  Energy  |  Logistics  |  Manufacturing  

Mining  |  Optical Systems  |  Technology  |  Water

Our Blockchain Specific Services

Global Lead Generation | Risk Mitigation | Legal | Technical

Roots of Blockchain Technology

Immutable Ledger

Consensus Algorithms

Context

  • According to United Nations, US$93 trillion would be needed in Sustainable Infrastructure Projects during 2015-2030 to achieve the United Nations' SDGs, with the bulk going to the Energy Sector (US$ 40 trillion or 43%), followed by Transport (US$27 trillion or 29%), Water and Waste (US$ 19 trillion or 20.4%) and Telecommunications (US$ 7 trillion or 7.5%). 

  • The Funding Gap for the period is estimated to be between US$ 39 trillion (under an aggressive Investment Growth Scenario) to US$ 51 trillion (under Conservative Investment Growth assumptions). 

Blockchain Use Cases

1. Lean Supply Chain Management

2. Digital Identity Verification

3. Smart Contracts

4. Cryptocurrencies

5. Healthcare Record Management

6. Voting Systems

7. Intellectual Property Protection

8. Cybersecurity

9. Real Estate

10. Cross-Border Payments

11. Blockchain and Health Care:

12. Blockchain Identity Management

13. Data Compliance

14. Digital Credentials

15. How to Prevent Certificate Fraud

16. How to Prevent Supply Chain Fraud

17. Decentralized Identity

20 Blockchain Types

Each has its own Strengths, Weaknesses, Use Cases

1. Public Blockchain

- Open-source, decentralized, and accessible to anyone

- Examples: Bitcoin, Ethereum, Litecoin

- Characteristics: transparent, immutable, censorship-resistant

2. Private Blockchain

- Restricted access, centralized control, and permission-based

- Examples: Enterprise blockchains (e.g., Hyperledger Fabric)

- Characteristics: secure, scalable, customizable

3. Consortium Blockchain

- Hybrid of public and private blockchains

- Examples: Corda, Quorum

- Characteristics: decentralized, yet controlled access

4. Hybrid Blockchain

- Combination of public and private blockchains

- Examples: Polkadot, Cosmos

- Characteristics: interoperable, scalable, flexible

5. Sidechain

- Separate blockchain connected to a main blockchain

- Examples: Liquid, RSK

- Characteristics: increased scalability, flexibility

6. Distributed Ledger Technology (DLT)

- Decentralized, yet not necessarily blockchain-based

- Examples: Hashgraph, IOTA

- Characteristics: fast, secure, energy-efficient

7. Directed Acyclic Graph (DAG)

- Alternative to traditional blockchain

- Examples: IOTA, Nano

- Characteristics: fast, scalable, energy-efficient

8. Blockchain-as-a-Service (BaaS)

- Cloud-based blockchain infrastructure

- Examples: AWS Blockchain, Google Cloud Blockchain

- Characteristics: scalable, secure, easy to deploy

9. Enterprise Blockchain

- Customizable, private blockchains for businesses

- Examples: Hyperledger Fabric, Corda

- Characteristics: secure, scalable, regulatory-compliant

10. Decentralized Blockchain

- Fully decentralized, community-driven blockchains

- Examples: Bitcoin, Ethereum (pre-ETH 2.0)

- Characteristics: censorship-resistant, immutable, transparent

11. Federated Blockchain

- Consortium blockchain with decentralized governance

- Examples: Cosmos, Polkadot

- Characteristics: scalable, secure, decentralized

12. Sharded Blockchain

- Horizontal scaling solution for public blockchains

- Examples: Ethereum 2.0, Polkadot

- Characteristics: scalable, secure, energy-efficient

13. Proof-of-Stake (PoS) Blockchain

- Consensus algorithm based on staking tokens

- Examples: Ethereum 2.0, Tezos

- Characteristics: energy-efficient, secure, decentralized

14. Proof-of-Work (PoW) Blockchain

- Consensus algorithm based on mining

- Examples: Bitcoin, Litecoin

- Characteristics: secure, decentralized, energy-intensive

15. Leased Proof-of-Stake (LPoS) Blockchain

- Variance of PoS with leasing mechanisms

- Examples: NEO, ONT

- Characteristics: energy-efficient, secure, decentralized

16. Delegated Proof-of-Stake (DPoS) Blockchain

- Variance of PoS with voting mechanisms

- Examples: EOS, Tron

- Characteristics: energy-efficient, secure, decentralized

17. Byzantine Fault Tolerance (BFT) Blockchain

- Consensus algorithm for high-performance blockchains

- Examples: Hyperledger Fabric, Corda

- Characteristics: secure, scalable, fault-tolerant

18. Non-Fungible Token (NFT) Blockchain

- Blockchain for unique digital assets

- Examples: Ethereum, Flow

- Characteristics: secure, decentralized, unique assets

19. Central Bank Digital Currency (CBDC) Blockchain

- Blockchain for national digital currencies

- Examples: China's DCEP, Sweden's e-krona

- Characteristics: secure, centralized, regulated

20. Interplanetary File System (IPFS) Blockchain

- Decentralized storage solution

- Examples: IPFS, Filecoin

- Characteristics: secure, decentralized, storage-focused

Private Blockchain

Private Blockchain is developed and maintained by a private organization who has the authority over the mining process and consensus algorithm. The private organization decides who can join the network and have the access download the nodes. 

Blockchain Regulatory Frameworks - USA

Federal Level

1. Securities and Exchange Commission (SEC): Regulates blockchain-based securities and investments.

2. Commodity Futures Trading Commission (CFTC): Oversees derivatives markets, including cryptocurrency futures.

3. Financial Crimes Enforcement Network (FinCEN): Regulates anti-money laundering (AML) and know-your-customer (KYC) compliance.

4. Office of the Comptroller of the Currency (OCC): Regulates banking and financial services, including blockchain-based activities.

State Level

1. Wyoming: Passed blockchain-friendly laws, exempting cryptocurrencies from state money transmission regulations.

2. Delaware: Implemented blockchain-based corporate governance and record-keeping.

3. New York: Introduced the BitLicense regulatory framework for cryptocurrency businesses.

4. California: Enacted blockchain-related legislation, including digital asset storage and insurance.

Key Regulations

1. Securities Act of 1933: Applies to blockchain-based securities offerings.

2. Investment Company Act of 1940: Regulates investment companies, including blockchain-based funds.

3. Bank Secrecy Act (BSA): Requires AML/KYC compliance for financial institutions.

4. USA PATRIOT Act: Enhances AML/KYC requirements.

Blockchain-Specific Regulations

1. SEC's "Framework for Investment Contract Analysis of Digital Assets" (2019)

2. CFTC's "Guidance on Virtual Currency Transactions" (2017)

3. FinCEN's "Guidance on Virtual Currency" (2019)

4. OCC's "Interpretive Letter 1170" (2020) on blockchain-based activities.

Proposed Legislation

1. Cryptocurrency Act of 2020 (H.R. 6154)

2. Digital Commodity Exchange Act of 2020 (H.R. 6123)

3. Blockchain Promotion Act of 2019 (H.R. 2154)

Regulatory Bodies

1. Blockchain Association

2. Chamber of Digital Commerce

3. Coin Center

4. Digital Currency Group

Resources

1. SEC's Blockchain and Distributed Ledger Technology webpage

2. CFTC's Virtual Currency webpage

3. FinCEN's Virtual Currency webpage

4. National Conference of State Legislatures' Blockchain

Blockchain Regulatory Frameworks EU

Blockchain Regulatory Frameworks (BRF) are being developed globally to ensure the technology's secure and decentralized nature is preserved while protecting consumers and maintaining financial stability.

The European Union is at the forefront of this effort, with the European Commission proposing a comprehensive package of legislative proposals for the regulation of crypto-assets ¹. This package includes the Markets in Crypto-Assets Regulation (MiCA), which supports innovation while protecting consumers and the integrity of cryptocurrency exchanges ¹. Additionally, the European Central Bank and the European Commission services are jointly reviewing policy, legal, and technical questions related to the possible introduction of a digital Euro.

Global Regulatory Framework for Crypto-asset Activities

The Financial Stability Board (FSB) has finalized a global regulatory framework for crypto-asset activities, promoting comprehensive and internationally consistent regulatory and supervisory approaches ² ³. This framework is based on the principle of "same activity, same risk, same regulation" and addresses risks to financial stability ² ³. The FSB has developed two sets of recommendations: high-level recommendations for crypto-asset activities and markets, and revised high-level recommendations for global stablecoin arrangements.

Key Components of Blockchain Regulatory Frameworks

Some key components of blockchain regulatory frameworks include:

- Regulatory Sandboxes: Facilities that bring together regulators, companies, and tech experts to test innovative solutions and identify obstacles.

- Crypto-asset Classification: Clear guidelines on classifying crypto-assets as financial instruments, utility tokens, or payment tokens.

- Consumer Protection: Measures to protect consumers from fraud, market manipulation, and other risks.

- Financial Stability: Regulations to prevent crypto-asset market volatility from affecting traditional financial systems.

What is Blockchain Technology

Definition: A decentralized, digital ledger that records transactions, data, or events across a network of computers in a secure and transparent manner.

Key Components

1. Distributed Ledger Technology (DLT)

2. Cryptographic Algorithms (e.g., hash functions, digital signatures)

3. Consensus Mechanisms (e.g., Proof of Work, Proof of Stake)

4. Smart Contracts (self-executing contracts with predefined rules)

5. Decentralized Network (nodes, miners, validators)

Key Features

1. Decentralization: No single entity controls the network.

2. Immutable: Transactions are tamper-proof and permanent.

3. Transparency: All transactions are publicly visible.

4. Consensus: Network nodes verify transactions through complex algorithms.

5. Cryptography: Secure data transmission and storage.

How it Works

1. Network nodes create and verify blocks of transactions.

2. Each block contains a unique code (hash) and reference to the previous block.

3. Blocks are linked together, forming a chain (blockchain).

4. Network nodes update their copies of the blockchain.

Types of Blockchain

1. Public (e.g., Bitcoin, Ethereum)

2. Private (e.g., enterprise blockchains)

3. Consortium (e.g., hybrid public-private blockchains)

4. Hybrid (e.g., combination of public and private blockchains)

Use Cases

1. Cryptocurrencies (e.g., Bitcoin, Ethereum)

2. Supply Chain Management

3. Smart Contracts

4. Identity Verification

5. Healthcare Record Management

6. Voting Systems

7. Intellectual Property Protection

8. Cybersecurity

Benefits

1. Security

2. Transparency

3. Efficiency

4. Immutable record-keeping

5. Reduced transaction costs

6. Increased trust

Challenges

1. Scalability

2. Regulation

3. Interoperability

4. Energy consumption

5. Security vulnerabilities

Blockchain Platforms

1. Ethereum

2. Hyperledger Fabric

3. Corda

4. Polkadot

5. Solana

Programming Languages

1. Solidity (Ethereum)

2. Chaincode (Hyperledger Fabric)

3. Rust (Solana)

4. JavaScript ( blockchain.js)

5. Python

Resources

1. Blockchain Council

2. Coindesk

3. Blockchain News

4. IEEE Blockchain Initiative

5. World Economic Forum Blockchain Reports

Case Study

Companies like Alibaba, Amazon, IBM, Microsoft, Siemens, Toyota etc. are heavily investing in Blockchain

Blockchain is a shared, Immutable Ledger (i.e., a ledger that uses (1) cryptographic techniques to verify transactions and (2) many computers, or peers, sharing copies of the transaction) that facilitates the process of recording transactions and tracking Assets in realtime in a Digital Network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights, branding). 

In simple words, blockchain is a Digital Ledger that keeps a record of all transactions or data exchanges within a Decentralized Network. Unlike traditional centralized systems, blockchain operates on a Distributed Ledger Technology (DLT) where multiple computers (or nodes) maintain and validate the transactions1.

👉1. Chain of Blocks: As its name suggests, a blockchain is made up of a chain of blocks. Each block stores data related to transactions. When new data is added to the system, it leads to a new block being added and attached to the previous Chain of Blocks2.

👉 2. Decentralization: Unlike centralized databases controlled by a single entity, a blockchain is decentralized. No single person or group has control; instead, all users collectively retain control. This decentralization enhances security and transparency.

👉3. Immutable and Secure: Once data is entered into a blockchain, it becomes immutable—irreversible. For example, in Bitcoin’s blockchain, transactions are permanently recorded and viewable by anyone. The use of cryptography ensures the security of the data.

👉4. Beyond Cryptocurrency: While blockchains are best known for their role in cryptocurrencies, they are not limited to that. They can be used for various purposes, including Decentralized Finance (DeFi) applications, Non-Fungible Tokens (NFTs), and Smart Contracts3.

In summary, blockchain technology provides a secure, transparent, and decentralized way to record and manage data across a network. It’s like a digital ledger that everyone can access and trust.

Distributed Ledger Technology (DLT)

Distributed Ledger Technology (DLT) basically implies a new and rapidly evolving approach for recording and sharing information across multiple data stores. 

Each of the data stores (i.e., ledgers) has the same data records, subject to maintenance and control through a distributed network of computer servers, referred to as nodes. You can thus think of DLT as a distributed database with certain unique properties.

👉Blockchain is just a variant of DLT that uses Cryptographic and algorithmic approaches to create and verify a continuously expanding, append-only data structure that gradually turns into a chain of transaction blocks that serve the role of a ledger. Diving into the working of DLT can also help in further refining your knowledge of DLT.

👉The nodes initiate new additions to the database through the creation of a new data ‘block’ which includes the records of different transactions. Then, the information about the new data ‘block’ is shared across the whole network in the form of encrypted information. As a result, Blockchains ensure that transaction details are not publicly available.

👉Then, all the participants in the network evaluate the data block and verify its validity according to the pre-defined Algorithmic Validation Method. The pre-defined algorithmic validation method is also known as the Blockchain Consensus mechanism. When the data block is validated, all participants can add the block to their own ledgers, creating, hence a ‘chain of blocks’: The Blockchain.

👉To summarize, DLT ensures that changes to the ledger are reflected throughout the whole network, and all network members have a detailed, identical copy of the whole ledger at any specific instance. One can clearly notice that the functionalities of DLT are primarily responsible due to two core components

✋The first core aspect of DLT-based systems or infrastructure is the ability for storage, recording, and exchange of digital information across different, consenting parties without the need for any central trust authority or record-keeper. 

✋The second core component of DLT refers to avoiding double-spending, i.e., sending the same digital asset or token to multiple parties. Without a central controlling authority, the risk of double-spending is quite high, especially between parties that do not know each other.

Types of Distributed Ledger Technology

There are two general categories of distributed ledgers, such as Permissioned and Permissionless variants.

The permissioned distributed ledger involves the requirement of permission for nodes from central entities for accessing the network and making modifications in the ledger. The access controls in a permissioned distributed ledger generally include identity verification.

On the other hand, in the case of permissionless distributed ledgers, every node in the network contains (or can access) a full and updated copy of the entire ledger. All the proposed local additions to the ledger by network participants are communicated to all nodes throughout the network.

In either category, nodes are collectively responsible for validating the modification through a consensus mechanism based on a pre-defined algorithm.

Hybrid DLT is another type of DLT that combines both permissionless and permissioned networks and offers a network that benefits from both of them.

After the validation process, the new addition to all the respective ledgers can help in ensuring the consistency of data throughout the entire network. Considering the flexibility of DLT, many projects are opting for implementations of DLT variants.

Permissioned vs Permissionless Blockchains

Permissionless Blockchains?

Permissionless blockchains are blockchains that require no permission to join and interact with. They are also known as public blockchains. Most of the time, permissionless blockchain is ideal for running and managing digital currencies.

In a permissionless blockchain, a user can create a personal address and then interact with the network by either helping the network to validate transactions or simply send transactions to another user on the network.

The very first type of permissionless blockchain is Bitcoin. It enabled users to transfer digital currencies among themselves. Also, users can interact with the network by participating in the mining process. It is a process of solving complex mathematical equations and then using it to validate transactions. The consensus algorithm used by bitcoin is Proof-of-Work (PoW).

There are also other blockchains that are permissionless. Ethereum(ETH) is another popular public permissionless type that utilizes another consensus method Proof-of-Stake(PoS). It also introduces other concepts such as smart contracts.

Characteristics of Permissionless Blockchains

Permissionless blockchains have some interesting characteristics. Let’s list them below.

  • Truly decentralized → Permissionless blockchain technology is truly decentralized. But, what do we mean by truly decentralized? Well, there are some platforms that aren’t truly decentralized. We will talk about them shortly.

  • Anonymity → Permissionless blockchain is open to everyone. However, that doesn’t mean that it is not anonymous. Anyone who joins the network can remain anonymous as you won’t need a KYC to join and navigate the network. 

  • Transparency → Public nodes can see the transactions, making the network transparent.

  • Trust → You can trace or read the transactions. Thus, you can trust these permissionless blockchains more than a closed or permissioned blockchain.

  • Immutable → Every single data on the platform is immutable that means you can’t change them anytime.

  • Enhanced security → Cryptography and other security parameters make permissionless blockchains more secure.

Apart from these, another big characteristic of permissionless blockchains is that anyone can join the network if they want. Permissionless blockchains are also very good when it comes to incentivizing the users in the network. They can be used for the betterment of the participants as it brings transparency and trust to the whole network.

Most Popular DeFi Protocols

What is DeFi?

The definition of decentralized finance is the most basic information you need to understand DeFi protocols. Decentralized Finance, or DeFi, basically points out the transition from conventional, centralized financial systems towards a peer-to-peer finance model. The DeFi ecosystem has been successful in establishing lending and borrowing platforms alongside tokenized digital currency and Stablecoins. Over the course of time, the DeFi landscape has developed into a massive network with integrated financial instruments and protocols. Did someone read ‘protocol’? 

What are DeFi Protocols?

The best DeFi protocols have witnessed profound levels of growth in the recent two years. The year 2020 proved to be quite a promising one for DeFi as the total value locked in DeFi assets crossed the $12 billion mark. DeFi protocols are basically autonomous programs that have been tailored for addressing specific setbacks in the traditional finance sector. More than half of the world’s population does not have access to a bank account, and DeFi protocols aim to change it. 

The evolution of DeFi protocols will open the way for introducing more financial instruments. As of now, many DeFi protocols have become integral parts of a complex ecosystem with many notable tokens and projects. With the substantially soaring values of DeFi protocols, the opportunities for startups in the DeFi space become clearly evident. 

Future of Crypto in the Next 5 Years: A Deep Analysis

What is Decentralized Finance (DeFi)? 

Decentralized Finance (DeFi) is all about monetary systems using public blockchains. It is a new monetary system and hence is one of the hot topics among the industrialists, blockchain experts, and learners like you!

At the core, the term “public” is important here. It can be equated to similar to that of Ethereum public blockchain. In the public blockchain, there is no place for centralized authority.

Our Mission

Level Playing Field for Islamic Monetary System

Our Focus

Policies, Regulatory Frameworks, Institutions

Constitution, Statutes, Regulations, Court Decisions, and International Treaties

Context

According to United Nations, US$93 trillion would be needed in Sustainable Infrastructure Projects during 2015-2030 to achieve the United Nations' SDGs, with the bulk going to the Energy Sector (US$ 40 trillion or 43%), followed by Transport (US$27 trillion or 29%), Water and Waste (US$ 19 trillion or 20.4%) and Telecommunications (US$ 7 trillion or 7.5%). 

The Funding Gap for the period is estimated to be between US$ 39 trillion (under an aggressive Investment Growth Scenario) to US$ 51 trillion (under Conservative Investment Growth assumptions). 

Global Problems Root Cause: Economic Inequality is the Largest, Constantly Growing, Super-Complexed Phenomenon[1] 

Historical Money Supply Mechanisms: Circulation of Wealth (Devine; Islamic); Concentration of Wealth (Non-Divine; Manmade)

Root Cause of Concentration of Wealth: Disparity; Fractional Prosperity

Solution: Divine Justice based Shared Prosperity

Our Strategic Approach: Develop and Implement Quantum Compatible Digital Infrastructure Interoperable Interfaces (Commercial Cybersecurity Solutions) Using NIST Post-Quantum Cryptography Standardized Algorithms

Preferred Methodology 

Equity Based Intrinsic Value Macroeconomics 

Legal Frameworks

Our Research Focus: Global Regulatory Policies and Reforms to Strengthen Oversight of the Sharia Acquiescent Monetary System (SAMS).

Methodology: Based on the selected country experiences, a number of important lessons and policy options can be drawn that have implications for the stable and sound development of Global Islamic Financial System (GIFS).

An enabling regulatory and institutional framework and a level playing field for Conventional and Islamic Banks is critical for the sound and stable growth of the Islamic banking industry. The country experiences also underscore the importance of providing an enabling framework while letting market forces determine the size of the industry1.

Monetary System

A Monetary System components include a set of Policies, Regulatory Frameworks, and Institutions by which a Government Creates Money in an economy. Such institutions include the Mint, the Central Bank, Treasury, and other Financial Institutions. 

There are Three Common Types of Monetary Systems;

1. Commodity Money 

2. Commodity-based Money 

3. Fiat Money

Country Case Study

USA Monetary System

Major Regulatory Agencies

DoT: Department of the Treasury

FCA: Farm Credit Administration

FDIC: Federal Deposit Insurance Corporation

FHFA: Federal Housing Finance Agency

FRS: Federal Reserve System

NCUA: National Credit Union Administration

OCC: Office of the Comptroller of the Currency

OTS: Office of Thrift Supervision

A Monetary System is defined as a set of policies, frameworks, and institutions by which the government creates money in an economy. Such institutions include the mint, the Central Bank, treasury, and other Financial Institutions. There are three common types of monetary systems – commodity money, commodity-based money, and fiat money. 

1. Commodity Money

This is made up of precious metals or other commodities that have intrinsic value. In order words, the monetary system uses the commodity physically in terms of currency. This form of money retains its value even if it’s melted down. For example, gold and silver coins have been commonly used throughout history as a form of money.

2. Commodity-based Money

This draws its value from a commodity but doesn’t involve handling the commodity regularly. The notes don’t have tangible value but can be exchanged for the commodity it is backed by. For example, the US Dollar used to draw its value on gold. This was known as the Gold Standard.

3. Fiat Money

In this monetary system the currency, which by government decree is legal tender, i.e., that the government guarantees the value of the currency. Today, most of Fiat Money is in the form of bank balances and records of credit or debit card purchases. 

Key Components: 

👉 Mint: The mint is responsible for physically producing currency. It manufactures coins and banknotes that circulate as legal tender.

👉 Central Bank: The central bank plays a crucial role in the monetary system. Its functions include:

👉 Issuing Currency: The central bank has the authority to create and distribute currency.

👉 Monetary Policy: It formulates and implements policies to regulate money supply, interest rates, and inflation.

👉 Central Bank Banker to Commercial Banks: Commercial banks maintain accounts with the central bank, which acts as their banker.

👉 Lender of Last Resort: During financial crises, the central bank provides emergency liquidity to banks.

👉 Currency Reserves: The central bank holds foreign exchange reserves to stabilize the national currency.

👉 Treasury: The government’s treasury manages public finances, including revenue collection, expenditure, and debt issuance. It collaborates with the central bank to ensure fiscal and monetary coordination.

👉 Commercial Banks: These banks serve as intermediaries between the central bank and the public. Their roles include:

👉 Depository Institutions: They accept deposits from individuals, businesses, and other entities.

👉 Lending and Credit: Commercial banks provide loans and credit to borrowers.

👉 Money Creation: Through fractional reserve banking, they create money by lending out a portion of the deposits they receive.

👉 Holders of Money (the Public): Individuals, businesses, and governmental units constitute the public. They use money for transactions, savings, and investment.

Uses of Money:

👉 Medium of Exchange: Money facilitates transactions, eliminating the challenges of barter systems.

👉 Unit of Measurement: It standardizes prices and allows comparison of value across goods and services.

👉 Store of Value: While money can store value, inflation affects its long-term stability.

Three Levels: 

👉 The Holders of Money (the “Public”), which comprise Individuals, Businesses, and Governmental Units

👉 Commercial Banks (Private or Government-owned), which Borrow from the Public, primarily by taking 

Public Deposits, and making Loans to Individuals, Firms, or Governments.

👉 Central Banks, which have a monopoly on the issue of certain types of money, serve as the bankers for the central government and the commercial banks, and have the power to determine the quantity of money 

ASSETS BASED ECONOMY 

(EQUITY INVESTMENT)

Asset-based Economic Development

👉 Asset-based economic development can have many benefits for communities, including: 

👉 Long-term, sustained economic growth 

👉 Local return on investment 

👉 Job Creation and Retention 

👉 Increase in Per Capital Income 

👉 Increase in Local Tax Base 

👉 Strengthening Regional Networks

Intrinsic Value

Intrinsic Value is a measure of what an asset is worth. This measure is arrived at by means of an objective calculation or Complex Financial Model. Intrinsic Value is different from the current market price of an asset. However, comparing it to that current price can give investors an idea of whether the asset is undervalued or overvalued.

Financial analysis uses cash flow to determine the intrinsic, or underlying, value of a company or stock. In options pricing, intrinsic value is the difference between the strike price of the option and the current market price of the underlying asset.

👉 Intrinsic value refers to some fundamental, objective value contained in an object, asset, or financial contract. (If the market price is below that value it may be a good buy—if above, a good sale.)

👉 When Evaluating Stocks, there are several methods for arriving at a fair assessment of a share's intrinsic value.

👉 Models utilize factors such as dividend streams, discounted cash flows, and residual income.

👉 Each model relies crucially on good assumptions. If the assumptions used are inaccurate or erroneous, then the values estimated by the model will deviate from the true intrinsic value.

Policy Options

Policy Principles and Practice

USA Federal Reserve

How the Fed Implements Monetary Policy with Its Tools

Expansionary Monetary Policy  is a form of macroeconomic Monetary Policy that seeks to amplify Economic Growth and Aggregate Demand. In order to do so, regulatory authorities like Central Banks “loosen” monetary policy by increasing the Money Supply and/or lowering Interest Rates. This has the effect of increasing overall economic activity: not only do consumers spend more money, but businesses also make more capital investments.

Contractionary Monetary Policy is a type of monetary policy that is intended to reduce the rate of monetary expansion to fight inflation. 

European Economic and Monetary Union (EMU)

The European Economic and Monetary Union (EMU) combines several of the European Union (EU) member states into a cohesive economic system. It is the successor to the European Monetary System (EMS). Note that there is a difference between the 19-member European Economic and Monetary Union (EMU), and the larger European Union (EU) which has 27 member states as of 2022.

Also referred to as the Eurozone, the European Economic and Monetary Union (EMU) is quite a broad umbrella, under which a group of policies has been enacted aimed at economic convergence and free trade among European Union member states. The EMU's development occurred through a three-phase process, with the third phase initiating the adoption of the common Euro Currency in place of former national currencies. This has been completed by all initial EU members except for the United Kingdom and Denmark, who have opted out of adopting the euro. The U.K. subsequently left the EMU in 2020 following the Brexit referendum.

European Commission. "Economic and Monetary Union (EMU)."

Barter System vs. Currency System: What's the Difference?

The primary difference between barter and currency systems is that a currency system uses an agreed-upon form of paper or coin money as an exchange system rather than directly trading goods and services through bartering. Both systems have advantages and disadvantages, although currency systems are more widely used in modern economies.

Cooperative - Mutual Company Structuring

A mutual company is a private firm that is owned by its customers or policyholders. The company's customers are also its owners. As such, they are entitled to receive a share of the profits generated by the mutual company.

The distribution of profits is typically made in the form of dividends paid on a pro rata basis, based on the amount of business each customer conducts with the mutual company. Alternately, some mutual companies choose to use their profits to reduce members' premiums.

A mutual company is sometimes referred to as a cooperative. 

Arbitrage Pricing Theory (APT)

Arbitrage Pricing Theory (APT) is a multi-factor asset pricing model based on the idea that an asset's returns can be predicted using the linear relationship between the asset’s expected return and a number of macroeconomic variables that capture systematic risk. It is a useful tool for analyzing portfolios from a Value Investing perspective, in order to identify securities that may be temporarily mispriced.

KEY TAKEAWAYS

👉 Arbitrage Pricing Theory (APT) is a multi-factor asset pricing model based on the idea that an asset's returns can be predicted using the linear relationship between the asset’s expected return and a number of macroeconomic variables that capture systematic risk.

👉 Unlike the CAPM, which assumes markets are perfectly efficient, APT assumes markets sometimes misprice securities, before the market eventually corrects and securities move back to fair value.

👉 Using APT, arbitrageurs hope to take advantage of any deviations from fair market value.

Formula for the Arbitrage Pricing Theory Model 

E(R)i​=E(R)z​+(E(I)−E(R)z​)×βn

where:

E(R)i​=Expected return on the asset

Rz​=Risk-free rate of return

βn=Sensitivity of the asset price to macroeconomicfactor n

Ei=Risk premium associated with factor i​

Mathematical Model for the APT

While APT is more flexible than the CAPM, it is more complex. The CAPM only takes into account one factor—market risk—while the APT formula has multiple factors. And it takes a considerable amount of research to determine how sensitive a security is to various macroeconomic risks.

The factors as well as how many of them are used are subjective choices, which means investors will have varying results depending on their choice. However, four or five factors will usually explain most of a security's return. (For more on the differences between the CAPM and APT, read more about how CAPM and arbitrage pricing theory differ.)

APT factors are the systematic risk that cannot be reduced by the diversification of an investment portfolio. The macroeconomic factors that have proven most reliable as price predictors include unexpected changes in inflation, Gross National Product (GNP), corporate bond spreads and shifts in the yield curve. 

Other commonly used factors are Gross Domestic Product (GDP), commodities prices, market indices, and exchange rates.


Major USA Regulator Agencies: 

DoT: Department of the Treasury

FCA: Farm Credit Administration

FDIC: Federal Deposit Insurance Corporation

FHFA: Federal Housing Finance Agency

FRS: Federal Reserve System

NCUA: National Credit Union Administration

OCC: Office of the Comptroller of the Currency

OTS: Office of Thrift Supervision

ABOUT

AL-ILM

ECONOMY

FINANCE

Focal Contact: mirza@themughals.net

TwitterLinkFacebookInstagramYouTube

"Sustainable Shared Prosperity Using Indigenous Resources”

Aerospace | Agriculture | Economy | Energy | Manufacturing | Mining | Water

About the Group: We are a small group of Multi Disciplines Multinational Professionals. We provide Strategic Policy Advice on Strategic Assets Management Systems, Disruptive Technologies to Mitigate Competitive Innovation for Sustainable Growth. 

Core Team Combined Experience: 373+ years (December 2024).

Focused Sectors: Aerospace | Agriculture | Economy | Energy | Manufacturing | Mining | Water

Since 1984, our emphasis remains on the Digital Economy Socio-Economic Impacts on Supply Chain Lifecycle; Digital Transformation; Critical Minerals and Self-healing Materials.

We prefer to work on Equity Based Catalyst Projects and Conduct Business on Ethical Financing, Based on Islamic Principles, focusing hot-spot areas.

Group Core Expertise: Capital Project Structuring; Sustainable Growth Methodology; Lawful Technology Transfer & Commercialization Strategy ($2.5 Trillion Global Market Potential - 30 Million Jobs Worldwide) 

Group Core Strategic Projects Experience:

1) Assets Valuation and Management; Sustainable Growth; Good Governance; Risk and Disaster Mitigation; Operational Efficiency 

2) Capital Project Strategy; Economic Models; Quantum Algorithm; Data Analytics; Capacity Building

3) Disruptive Technology Assessment; Appraisal; Adoption; Data Mining; Policy Review; Project Life Cycle Analysis (LCA) 

4) Clean Energy Resources Programs; Renewable Energy Projects; Energy Efficiency

5) Performance Measuring System (PMS); Human Resource Development (HRD)

 Focal Contact: peis@themughals.net

Cookie Policy

Legal Disclaimer:

MUGHALS makes every effort to ensure the accuracy and completeness of the information provided, above, to the web site visitors.  The information is not legal advice, but provides insight into the market or company from which Company/Participant utilizes its own business judgment in conducting such relations or transactions. 

In utilizing the information, Company/Participant is responsible for complying with all applicable laws and regulations of the United States and foreign territories of business operation and does not hold the MUGHALS, and all of their associates, affiliates and vendors, liable for any business decisions made thereof.

External Links Disclaimer

The appearance of external hyperlinks does not constitute endorsement by the MUGHALS of linked websites, or the information, products or services contained therein. Other than for authorized activities, as per applicable laws country of operations, of the does not exercise any editorial control over the information you may find at these locations.

All provided links are consistent with the mission of this website.

Please let us know about existing external links that you believe are inappropriate.

 Copyright 1998-2025 - Global Digital Networks - GDN, All rights reserved.

Report abuse
Page details
Page updated
Report abuse