#### Filter Results:

- Full text PDF available (19)

#### Publication Year

1997

2017

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

We develop an ELLAM (Eulerian-Lagrangian localized adjoint method) scheme to solve two-dimensional advection-diiusion equations with all combinations of innow and outtow Dirichlet, Neumann, and ux boundary conditions. The ELLAM formalism provides a systematic framework for implementation of general boundary conditions, leading to mass-conservative numerical… (More)

- Alexander Russell, Hong Wang
- IEEE Transactions on Information Theory
- 2002

The symmetric encryption problem which manifests itself when two parties must securely transmit a message m with a short shared secret key is considered in conjunction with a computationally unbounded adversary. As the adversary is unbounded, any encryption scheme must leak information about m; in particular, the mutual information between m and its… (More)

- Ying Shun Zhou, Yi Zhang, +7 authors Cheng Zeng
- Veterinary microbiology
- 2013

Infectious bronchitis virus (IBV) strain H120 was successfully rescued as infectious clone by reverse genetics. Thirteen 1.5-2.8 kb fragments contiguously spanning the virus genome were amplified and cloned into pMD19-T. Transcription grade complete length cDNA was acquired by a modified "No See'm" ligation strategy, which employed restriction enzyme Bsa I… (More)

- Ying-Ping Gai, Yi-Qun Li, +5 authors Xian-Ling Ji
- Scientific reports
- 2014

The yellow dwarf disease associated with phytoplasmas is one of the most devastating diseases of mulberry and the pathogenesis involved in the disease is poorly understood. To analyze the molecular mechanisms mediating gene expression in mulberry-phytoplasma interaction, the comprehensive sRNA changes of mulberry leaf in response to phytoplasma-infection… (More)

- Hong Wang
- 2010

In this paper, the concept of weakly compact set in L-fuzzy topological space have been introduced. The characterization of weakly compact set are researched. Also it is pointed out that weakly compactness is an L-good extension of usual weak compactness. compact set，fuzzy mapping.

- Hong Wang
- 2003

Let k, t and n be three integers with t ~ 2, k ~ 2t and n ~ 3t. We conjecture that if G is a graph of order n with minimum degree at least k, then G contains t vertex-disjoint cycles covering at least min(2k, n) vertices of G. We will show the conjecture to be true for t = 2.

- Hong Wang
- 1999

We propose a conjecture: for each integer k 2:: 2, there exists N (k) such that if G = (Vb \12; E) is a bipartite graph with IV 1 1 = 1\121 = n 2: N(k) and d(x) + d(y) 2: n + k for each pair of non-adjacent vertices x and y of G with x E V 1 and y E \12, then for any k independent edges Let k be a positive integer and let G = (Vi, \12; E) be a bipartite… (More)

In this paper, a multi-scale image fusion method based on discrete wavelet frame (DWF) is proposed for merging a high-resolution panchromatic image and a low-resolution multispectral image. The downampling process is avoided by using discrete wavelet frame decomposition. It leads to translation invariant and is available for the image fusion. The… (More)

- Yajie Sun, Zhengtao Ding, Hong Wang
- Proceedings of the 10th World Congress on…
- 2012

This paper focused on the development of the Hamiltonian theory and building Hamiltonian model, especially power system. To obtain better control result of Hamiltonian system, adaptive control and energy-balancing-based control are considered. Combined those two methods with Hamiltonian control system, by using simulation, the performing result can be… (More)

- Hong Wang, Kelong Zheng
- 2011

Some nonlinear weakly singular integral inequalities in two variables which generalize some known results are discussed. The results can be used as powerful tools in the analysis of certain classes of differential equations, integral equations, and evolution equations. An example is presented to show boundedness of solution of a differential equation here.