Ibrahim N. Imam
University of Louisville
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ibrahim N. Imam.
southeastcon | 1989
Ibrahim N. Imam; L.M. Lamont
The Schur complement is used to invert a matrix that is otherwise too large to invert on a personal computer. The implementation of this program relies heavily on the usage of files. Although the file I/O (input/output) increases the time of inverting these matrices, this does not lessen the value of this method since it will invert matrices that are too large to reside in the memory. This method hinges on blocking the matrix M and using the Schur complement to invert the blocked matrix.<<ETX>>
southeastcon | 1989
Judith Parks-Gornet; Ibrahim N. Imam
The rank factorization method is used to calculate the Moore-Penrose inverse of any arbitrary real m*n matrix A. The rank factorization method uses the fact that any matrix A of rank r can be factored as A=BC, where B is an m*r matrix of rank r and C is an r*n matrix of rank r. Using this factorization and other facts from matrix theory, the problem is reduced to that of calculating (B/sup T/B)/sup -1/ and (CC/sup T/)/sup -1/. After deriving an algorithm for calculating the Moore-Penrose inverse, the authors wrote a software package to perform the necessary computations and the actual generation of the Moore-Penrose inverse.<<ETX>>
Archive | 1992
Julius P. Wong; Ibrahim N. Imam; Ali Khosravi-Kamrani; Hamid R. Parsaei; Fariborz Tayyari
The use of computers in manufacturing has proven to be an effective approach to increase the productivity and to control the manufacturing related costs. Since 1960, computer-aided design and computer-aided manufacturing have been the subject of discussion in many engineering and trade publications. Due to the initiation of links between computer-aided design and manufacturing, the manufacturing firms have been able to develop a new and sophisticated manufacturing philosophy which is called flexible manufacturing systems (FMSs).
annual conference on computers | 1991
Julius P. Wong; Hamid R. Parsaei; Ibrahim N. Imam; Ali K. Kamrani
Abstract Concurrent engineering is the simultaneous design of the product and the processes required to produce it as well as to support it. It is a philosophy, not a process. When it is implemented, it can help to reduce product development cycle time for the introduction of high quality products and at low cost. Many tools and methods have been developed for supporting concurrent engineering environment. Often the traditional cost estimating systems are utilized in the concurrent engineering environment. The traditional cost estimating systems are not structured for concurrent engineering. This paper presents the concept of an integrated cost estimating system specifically designed for concurrent engineering (ICESCE). It is designed to work in the concurrent engineering environment and to enhance the power of concurrent engineering. The design of ICESCE consists of four modules: a database module, a central processing module, an interface module, and a utility module.
southeastcon | 1988
K. Kamel; Ibrahim N. Imam
A structural recognition approach to the problem of computerized transcription of cursive shorthand (SH) writing is described. Methods of extracting critical points and segmentations of SH outlines are presented. Critical points are cusps, self-intersections, and corners (discontinuities in curvature). The authors have designed a software that recognizes SH words written separately and made up of SH characters separated by permutations of critical points. The results show that computerized transcription of cursive SH is a practical possibility.<<ETX>>
2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering | 2008
Jeffrey S. Marean; Mike Losavio; Ibrahim N. Imam
Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with a configurable research environment ideally suited for conducting network forensic testing on all TCP/IP network protocols passing through it. Of particular interest are protocols that are commonly used for file sharing, message passing, and those that actively obfuscate or encrypt message traffic. Notably, Bit Torrent protocol, P2P protocols, IM (instant messaging) protocols, and anonymizing protocols such as I2P, Thor, and Freenet. Items of interest in protocol analysis include packet payload, sender and receiver real IP address, and crypto analysis.The forensic test bed consists of an a main node populated with a Cisco WAN router. This is the master router for the lab. It routes internal traffic between the three research nodes and selected outside networks. Populating the a node and the two remote nodes, B and C, are a combination of a Cisco routers, Cisco firewalls, Cisco switches, and computers. Each node has five dual core X86 computers capable of running combinations of Linux x86- 32 or -64 OSs, Microsoft x86-32 or -64 OSs, and, if necessary, both OSs can be configured to either use Microsoft, VMWare or Xen virtualization software. The a main node is connected remotely to the C node via a campus fast Ethernet circuit. While the B node, co-located with the a main node, is connected together via a fast Ethernet and Tl circuit. To increase the infrastructure component of the lab we have the ability to selectively place the forensic lab into an existing classroom domain for wider access to students and faculty researchers.
international conference on digital forensics | 2009
Michael Losavio; Olfa Nasraoui; Vincent Thacker; Jeffrey S. Marean; Nick Miles; Roman V. Yampolskiy; Ibrahim N. Imam
This paper presents a framework for identifying the legal risks associated with performing network forensics on public networks. The framework is discussed in the context of the Gnutella P2P network protocol for which the legal issues related to authorized access have not yet been addressed.
2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering | 2009
Cedric J. Jeannot; Ibrahim N. Imam; Adel Said Elmaghraby
Over the years, JavaTM has become a popular language for standalone as well as web based applications. Portability and security are the major reasons for JavaTM’s success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new set of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a JavaTM framework that evaluates the traces left by JavaTM applications in order to then be able to design forensics resistant JavaTM applications.
southeastcon | 1989
W.R. Anderson; Ibrahim N. Imam
The authors present the design of an arithmetic parsing and evaluation subroutine for the evaluation of multivariable inorder algebraic expressions. The method used is based on the parsing of an inorder algebraic expression into its equivalent postorder-reverse Polish form, through the use of a modified push down automaton. The evaluation subroutine is used to evaluate the resulting postorder expression, substituting given values for variables in the equation. Supporting algorithms are provided for the access and updating of a specified variables value.<<ETX>>
southeastcon | 1989
Ibrahim N. Imam; D.T. Nguyen
The authors present the design and implementation of the enhanced video driver (EVD), a display handler to be used on IBM personal computers equipped with an IBM color graphics adapter (CGA). Once activated, this software resides permanently in memory and, effectively, becomes a part of the operating system. The EVD provides the user with a virtual video buffer which is more than three times larger than the video memory supplied by the CGA. It also contains the handler for a full set of functions that allows the users to access this buffer using interrupt calls in exactly the same way they access the video memory using the ROM-BIOS video services. A high-level language interface is also designed to enable the not-so-technical user to use this driver.<<ETX>>