scispace - formally typeset
Search or ask a question
Author

Wang Kechao

Bio: Wang Kechao is an academic researcher from Harbin University. The author has contributed to research in topics: Overhead (computing) & Smacker video. The author has an hindex of 3, co-authored 9 publications receiving 22 citations.

Papers
More filters
Proceedings ArticleDOI
Wang Kechao1, Ren Xiangmin1, Wang Zhifei1, Jia Zongfu1, Yu Jingwei1 
10 Jun 2011
TL;DR: Test results show that the embedded network video monitoring terminal designed and implemented by this company can better utilize TCP/IP network bandwidth and can play without latency and fitter, as a result of real-time transmission and reception of digital video signal.
Abstract: Diggitalization of network video monitoring system, which has advantages of unlimited distance control, flexible extension and so on, is becoming a new standard of security system. Due to limitations of network bandwidth, video signals collected must be compressed to achieve real-time video transmission on the network. Therefore, how to maintain the high quality of the compressed signal, and meanwhile minimize the amount of data becomes a key technical problem To achieve this goal, an embedded network video monitoring terminal was designed and implemented by us This terminal consists of dedicated MPEG-4 compression ASIC, 32-bit embedded processor, 8-bit micro controller, 4-channel video capturing and decoding chips etc. Its corresponding software has been developed Users can not only watch the real-time monitoring images directly with the built-in embedded web server through the network,but also login central server, watch the monitoring images and control the network video terminal through dedicated software. Test results show that our terminal can better utilize TCP/IP network bandwidth Video can play without latency and fitter, as a result of real-time transmission and reception of digital video signal.

5 citations

Proceedings ArticleDOI
Wang Kechao1, Wang Tiantian1, Zong Mingkui1, Wang Zhifei1, Ren Xiangmin1 
01 Dec 2012
TL;DR: Compared with the widely used plagiarism detection tool MOSS, the proposed approach can not only more accurately give statistical information of the similar program detected, but also be able to visualize the similar code fragments, which can greatly increase detection efficiency.
Abstract: Studies have shown that many students have similar programs in programming class, most of which due to plagiarism. Students may simply modify others' programs as their own. This makes the assessment standards for students' programs with lots of ambiguity and uncertainty, limiting assessment accuracy and efficiency, and reducing the reliability of test results. To solve this problem, a student program plagiarism detection approach is proposed based on a data mining algorithm. Firstly, similar code fragments are mined by the CloSpan algorithm. Then, similarities between programs are calculated. Finally, the plagiarism list is output. Experiments showed that compared with the widely used plagiarism detection tool MOSS, our approach is can not only more accurately give statistical information of the similar program detected, but also be able to visualize the similar code fragments, which can greatly increase detection efficiency.

3 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: A comprehension oriented software fault location approach (COFL) is proposed in this paper to provide automated assistance in bug location that not only locates program predicates predicting bugs, but also provides high efficiency demand-driven data flow and control flow analysis to help developers understand the causes and contexts of bugs.
Abstract: Software errors can potentially lead to disastrous consequences. Unfortunately, debugging software errors can be difficult and time-consuming. A comprehension oriented software fault location approach (COFL) is proposed in this paper to provide automated assistance in bug location. It not only locates program predicates predicting bugs, but also provides high efficiency demand-driven data flow and control flow analysis to help developers understand the causes and contexts of bugs.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This review gives an overview of definitions of plagiarism, plagiarism detection tools, comparison metrics, obfuscation methods, datasets used for comparison, and algorithm types and identifies interesting insights about metrics and datasets for quantitative tool comparison and categorisation of detection algorithms.
Abstract: Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers. This article focuses only on plagiarism detection and presents a detailed systematic review of the field of source-code plagiarism detection in academia. This review gives an overview of definitions of plagiarism, plagiarism detection tools, comparison metrics, obfuscation methods, datasets used for comparison, and algorithm types. Perspectives on the meaning of source-code plagiarism detection in academia are presented, together with categorisations of the available detection tools and analyses of their effectiveness. While writing the review, some interesting insights have been found about metrics and datasets for quantitative tool comparison and categorisation of detection algorithms. Also, existing obfuscation methods classifications have been expanded together with a new definition of “source-code plagiarism detection in academia.”

75 citations

Patent
Colin Laird Lazier1
30 Sep 2014
TL;DR: In this paper, methods and systems for implementing redundancy encoding schemes with data storage systems are described, where redundancy encoding may be scheduled according to system and data characteristics, such as transaction rate requirement, data durability requirement or in the context of the stored data.
Abstract: Techniques for optimizing data storage are disclosed herein. In particular, methods and systems for implementing redundancy encoding schemes with data storage systems are described. The redundancy encoding schemes may be scheduled according to system and data characteristics. The schemes may span multiple tiers or layers of a storage system. The schemes may be generated, for example, in accordance with a transaction rate requirement, a data durability requirement or in the context of the age of the stored data. The schemes may be designed to rectify entropy-related effects upon data storage. The schemes may include one or more erasure codes or erasure coding schemes. Additionally, methods and systems for improving and/or accounting for failure correlation of various components of the storage system, including that of storage devices such as hard disk drives, are described.

59 citations

Posted Content
TL;DR: The state-of-the-art of Spectrum-based Fault Localization techniques is discussed, including the different techniques that have been proposed, the type and number of faults they address, the types of spectra they use, the programs they utilize in their validation, the testing data that support them, and their use at industrial settings.
Abstract: Despite being one of the most basic tasks in software development, debugging is still performed in a mostly manual way, leading to high cost and low performance. To address this problem, researchers have studied promising approaches, such as Spectrum-based Fault Localization (SFL) techniques, which pinpoint program elements more likely to contain faults. This survey discusses the state-of-the-art of SFL, including the different techniques that have been proposed, the type and number of faults they address, the types of spectra they use, the programs they utilize in their validation, the testing data that support them, and their use at industrial settings. Notwithstanding the advances, there are still challenges for the industry to adopt these techniques, which we analyze in this paper. SFL techniques should propose new ways to generate reduced sets of suspicious entities, combine different spectra to fine-tune the fault localization ability, use strategies to collect fine-grained coverage levels from suspicious coarser levels for balancing execution costs and output precision, and propose new techniques to cope with multiple-fault programs. Moreover, additional user studies are needed to understand better how SFL techniques can be used in practice. We conclude by presenting a concept map about topics and challenges for future research in SFL.

42 citations

Journal ArticleDOI
10 Feb 2020-Sensors
TL;DR: The proposed Hy-Bridge, a hybrid blockchain-based billing and charging framework, provides a credit-sharing feature for IoT users in the energy and utility market and introduces a local block framework for service management in the credit- sharing group.
Abstract: In the current centralized IoT ecosystems, all financial transactions are routed through IoT platform providers. The security and privacy issues are inevitable with an untrusted or compromised IoT platform provider. To address these issues, we propose Hy-Bridge, a hybrid blockchain-based billing and charging framework. In Hy-Bridge, the IoT platform provider plays no proxy role, and IoT users can securely and efficiently share a credit with other users. The trustful end-to-end functionality of blockchain helps us to provide accountability and reliability features in IoT transactions. Furthermore, with the blockchain-distributed consensus, we provide a credit-sharing feature for IoT users in the energy and utility market. To provide this feature, we introduce a local block framework for service management in the credit-sharing group. To preserve the IoT users' privacy and avoid any information leakage to the main blockchain, an interconnection position, called bridge, is introduced to isolate IoT users' peer-to-peer transactions and link the main blockchain to its subnetwork blockchain(s) in a hybrid model. To this end, a k-anonymity protection is performed on the bridge. To evaluate the performance of the introduced hybrid blockchain-based billing and charging, we simulated the energy use case scenario using Hy-Bridge. Our simulation results show that Hy-Bridge could protect user privacy with an acceptable level of information loss and CPU and memory usage.

32 citations

Journal ArticleDOI
31 Oct 2013
TL;DR: This work is proposing a novel system to prevent robbery in highly secure areas with lesser power consumption which has face-recognition technology which grants access to only authorized people to enter that area.
Abstract: Even though there are various security systems consuming large power are available in market nowadays, robbery rate is very high. We are proposing a novel system to prevent robbery in highly secure areas with lesser power consumption. T his system has face-recognition technology which grants access to only authorized people to enter that area. If others enter the place without access using some other means, then the system alerts the security personnel and streams the video captured by th e security camera. The facerecognition is done using PCA algorithm. The video transmitted is compressed and transmitted by ENVMT. By using this ENVMT, the video can play with lesser bandwidth consumption, latency and jitter.

21 citations