Hong Wang

Learn More
The symmetric encryption problem which manifests itself when two parties must securely transmit a message m with a short shared secret key is considered in conjunction with a computationally unbounded adversary. As the adversary is unbounded, any encryption scheme must leak information about m; in particular, the mutual information between m and its(More)
Magnetic Resonance Imaging (MRI), being noninvasive and having no radiation hazards, provides abundant tissue information and has become an efficient instrument for clinical diagnoses and research in recent years. When tissues are classified by means of MRI, the images are multi-spectral. Therefore, if only a single image with a certain spectrum is(More)
An asteroid landing trajectory optimization method is studied based on Gauss Pseudo-spectral. Firstly, we analyze the characteristics of probe landing on asteroid, and put forward the initial conditions, process constraints, terminal constraints and the optimization performance index. The probe's landing trajectory optimization should meet the index.(More)
Some nonlinear weakly singular integral inequalities in two variables which generalize some known results are discussed. The results can be used as powerful tools in the analysis of certain classes of differential equations, integral equations, and evolution equations. An example is presented to show boundedness of solution of a differential equation here.
We have fabricated the TaN– ͓SiO 2 – LaAlO 3 ͔ – ZrON– ͓LaAlO 3 – SiO 2 ͔ – Si charge-trapping flash device with highly scaled 3.6 nm equivalent-Si 3 N 4-thickness. This device shows large 4.9 V initial memory window, and good retention of 3.4 V ten-year extrapolated retention window at 85 ° C, under very fast 100 ␮s and low Ϯ16 V program/erase. These(More)