Achieving sharpened (enhanced detail) features of a multi-dimensional data source using the linear prediction (LP) bandwidth extrapolation (BWE) technique in the transform domain is the main objective of this research. The evolution of sensor technology has provided acquisition scenarios in which the data format is inherently multi-dimensional, including hyperspectral imaging...
Cryptographic devices leak timing and power consumption information that is easily measurable, radiation of various levels, and more. Such devices also have additional inputs, other than plaintext and keys, like voltage, which can be modified to force the device to produce certain faulty outputs that can be used to reveal...
Authentication protocols play important roles in network security. A variety of authentication protocols ranging from complex public-key cryptosystems to simple password-based authentication schemes have been proposed. However, currently there is no fully secure authentication scheme that can resist all known attacks. When a user authentication is performed over an insecure...
This investigation focuses on gaining a better understanding of the complex relationship between melt generation, source variability and mid-ocean ridge morphology. The approach adopted here uses a variety of geochemical techniques to evaluate the ability of 'global' models to predict regional scale geochemical variability associated with axial depth and axial...
The atmospheric transport of anthropogenic semivolatile organic compounds (SOCs) from Asian sources to the Western U.S. was investigated. In addition, the SOC extraction method was optimized. Hansen solubility parameter plots were used to aid in the pressurized liquid extraction (PLE) solvent selection of air sampling media in order to minimize...