Kaiyu Wan

Kaiyu Wan
Xi'an Jiaotong-Liverpool University

About

45
Publications
18,994
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
374
Citations
Citations since 2017
0 Research Items
114 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025

Publications

Publications (45)
Chapter
Planar Inverted F Antenna (PIFA) is popular and widely used in handheld wireless devices because of several significant advantages. However, PIFA also has many shortages that become big limitations for its commercial application, such as narrow bandwidth. Therefore, it is a great challenge to design a PIFA with good performance. In this paper, a co...
Article
Full-text available
In this work, a process algebraic framework known as PAFSV is applied to the formal specication and analysis of IEEE 1800TM SystemVerilog design. The formal semantics of PAFSV is defined by means of deduction rules that associate a time transition system with a PAFSV process. In addition, a set of properties of PAFSV is defined for a notion of bisi...
Article
Full-text available
Contemporary learning process becomes integrated and complicated. Therefore, a smart learning environment (SLE) is needed to adapt this change. In this paper, we describe how cyber-physical systems (CPSs) can be used to automatically provide suitable services in a SLE based on ambient conditions. Technical and pedagogical challenges are also outlin...
Article
Full-text available
Activities in laboratories, workshops, and offices can be significantly affected by their ambiance and environmental conditions, such as lighting, humidity, and temperature. This research focuses on laboratories and aims to improve people’s performance of activities inside them. To this end, we have developed a cyber-physical system (CPS) for a sma...
Conference Paper
Embedded systems took a leap as combining computational elements with physical systems led to many novel applications, further saw the rise of a new domain - Cyber-Physical Systems (CPS). Growing importance for CPS in industry threw down many challenges in a designer's perspective ranging from computational methods, modeling platforms, programming...
Conference Paper
This paper details an ongoing research aimed at developing computational approach to reducing/eliminating vibration and light glare in images captured by digital cameras especially when the scene contains moving objects or the camera is mounted on a moving vehicle/flying drone. The algorithms developed are focused at real-time image acquisition whe...
Article
Full-text available
In this paper, we present a case for the design and implementation of responsive, dynamic architectural surfaces as potential instruments to provide a structural function together with an aesthetic purpose and informative one. Responsive architectural surfaces are those than provide a dynamic structure-that is, it can morph or change in terms of it...
Conference Paper
We present our study on the optimal mortgage refinancing problem under a stochastic interest rate environment. Through Monte Carlo simulations we try to identify the optimal time for refinancing such that the overall cost is minimised. Experimental results reveal that such a time is more likely to appear at the early stage of a mortgage contract. T...
Conference Paper
We present out work on computing the prices of American call and put options and the values of their Greek letters. The underlying stocks of the options are assumed to pay out cash dividends. For calculating option prices and their Greek letters we use the Leisen-Reimer binomial method. Through experiments we demonstrate that it converges both fast...
Conference Paper
Full-text available
Computer systems used in safety-critical applications like space, avionic and biomedical applications require high reliable integrated circuits (ICs) to ensure the accuracy of data they process. As Arithmetic Logic Units (ALUs) are essential element of computers, designing reliable ALUs is becoming an appropriate strategy to design fault-tolerant c...
Conference Paper
Full-text available
In this work the well-known Particle Swarm Optimization (PSO) algorithm is applied to some Dynamic Optimization Problems (DOPs). The PSO algorithm is improved by simplification instead of introducing additional strategies into the algorithm as done by many other researchers in the aim of improving an algorithm. Several parameters (w, V max , V min...
Conference Paper
Robots play an important role in space exploration whereby the presence of human is almost impossible in some environments. Instead of using a robot, we incorporate a group of robots working together to achieve the definitive goal. Evolutionary algorithm, namely Genetic Algorithm is applied in the multi-agent robotics for space exploration. Hereby,...
Article
Full-text available
One of the most important and indispensable parameters of a Battery Management System (BMS) is to accurately estimate the State of Charge (SoC) of battery. Precise estimation of SoC can prevent battery from damage or premature aging by avoiding over charge or discharge. Due to the limited capacity of a battery, advanced methods must be used to esti...
Article
Full-text available
The goal of radiation therapy is to give as much dose as possible to the target volume of tissue and avoid giving any dose to a healthy tissue. Advances of the digital control allow performing accurate plans and treatments. Unfortunately, motion compensation during the treatment remains a considerable prob-lem. Currently, a combination of the diffe...
Conference Paper
Complex transactions are part of the most commonly used systems. Substantial part of such transactions are business transactions. Usually, they coordinate complex interaction among multiple systems, so called Long Running Transactions (LRT). Well known roll-back mechanism does not suffice to handle faults in LRTs, therefore compensation mechanisms...
Article
Full-text available
Pedagogy with Web 2.0 technologies is shown to facilitate the teaching-learning process through content sharing and idea collaboration. In this paper, we explore the possibility of using social networking tools, to support teaching practice in technological courses. In our study, we utilized i) Facebook Page as a platform to share content, experien...
Conference Paper
Full-text available
The goal of radiation therapy is to give as much dose as possible to the exact target location and minimizing any dose to a normal tissue. Advances of Cyber-physical control systems allow planning and provide very accurate treatments. However, the current technology does not sufficiently compensate a respiratory movement, that is especially importa...
Conference Paper
Full-text available
A wide variety of programming abstractions have been developed for cyber-physical systems. These approaches provide support for the composition of cyber-physical systems from generic units of application functionality. This paper surveys the current state-of-the-art in composition mechanisms for cyber physical systems and reviews each approach in t...
Article
Cyber-Physical Systems (CPS) integrate computation with physical processes. By merging computing and communication with physical processes CPS allows computer systems to monitor and interact with the physical world. However, today's computing and networking abstractions do not adequately reflect the properties of the physical world. This shortcomin...
Article
This paper introduces context-aware adaptation as an important part of power distribution architectures. In our view context-awareness is a necessary part of administering the business policies concerning power distribution and is orthogonal to the core engineering aspects of power distribution. By decoupling the engineering logic from the business...
Conference Paper
Medical Diagnosis System is widely used in health care domain. Nowadays, advent of the era of Medical Diagnosis System means healthcare services at any time and at any places, which leads to advance studying and exploring of Medical Diagnosis Systems based on context-awareness framework. As a typical complex and widely used context aware system, re...
Conference Paper
Software that impact our lives are embedded in the environment in which we act and hence our security and safety are dependent on its flawless functioning. An assessment of dependability of such embedded software systems includes an assessment of the process to develop the system and the system’s observable properties. Dependability criteria depend...
Article
Context aware system (CAS) is a large scale system which senses information and changes of surrounding environment, and adapts its response correspondingly. Recently, CAS is widely investigated and developed both in academy and industry. CAS is notoriously heterogeneous and complex. For this reason, it is especially important to achieve a complete...
Article
Full-text available
A wide variety of programming abstractions have been developed for cyber-physical systems. These approaches provide support for the composition of cyber-physical systems from generic units of application functionality. This paper surveys the current state-of-the-art in composition mechanisms for cyber physical systems and reviews each approach in t...
Article
The modeling, simulation and verification of real-time systems can be unified and the efficiency of system development can be improved if the UML timing diagram model can be translated into the timed automata model. The conversion rules and the algorithm are given in this paper. A coffee machine control system is given as an example in which we giv...
Conference Paper
Service-oriented systems offer the potential for minimizing the development time of business applications within an enterprise while promoting collaborative joint ventures among enterprisers distributed geographically. Service-oriented applications assembled from services obtained from different vendors, sometimes anonymous, should be trustworthy....
Conference Paper
Full-text available
Currently there are many service providers on the Web. Industry recognizes that from Web services many different business applications can be quickly created. A Web services composition tool can automate this process. The challenge lies in the creation of an automatic service composition facility which will tap into the potential of Web services, i...
Conference Paper
Computers have been in use for many years to build high confidence systems in safety-critical domains such as aircraft control, space transportation and exploration, and nuclear power plant management. However, due to the recent rush in developing ubiquitous and pervasive computing applications and a demand from across the world to access informati...
Conference Paper
Existing intrusion detection systems (IDS) operate inde- pendently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detect- ing only anomaly in system behavior and system misuse. In order to assist system administrators in restoring and strengthening system security after an intrusion is detected t...
Conference Paper
Ad-hoc agent networks are self-organizing societies of agents. Each society of agents is composed of autonomous agents forming an ad-hoc network having no infrastructure. A network community has an interface agent that serves as the certified access point for that network. Communication between two agents within a society requires the cooperation o...
Conference Paper
Ad-hoc agent networks are self-organizing societies of agents. Each society of agents is composed of autonomous agents forming an ad-hoc network having no infrastructure. A network community has an interface agent that serves as the certified access point for that network. Communication between two agents within a society requires the cooperation o...
Article
A Multi-agent system (MAS) is an open distributed sys- tem of agents, some that are autonomous and some that are reactive. They interact among themselves according to a set of norms and a variety of protocols. Due to the dynamic changes in the environment of the MAS there may not be a perfect correspondence between the actual global state of the ag...
Conference Paper
This paper discusses the requirements for a context-aware mobile tour guide (MTG) and proposes a design for constructing it. With increasing wireless and network connectivity available in the world today, a MTG device is a powerful hand-held device for adaptive information gathering, query processing, and collaborative work among ad hoc groups of p...
Conference Paper
Abstract A Multi-agent system (MAS) is an open distributed sys- tem of agents. The agents in a MAS may,form certain specific groups, where agents in each group jointly en- gage in solving a specific problem. Since problem solv- ing in a specific domain,requires agents to have the BDI set that is specific to that application domain, and several grou...
Conference Paper
Full-text available
This paper proposes a component-based architecture and development methodology for context-aware systems. A context is formally defined from relational point of view. The architecture of a context-aware system is conceived as a composition of the two components context constructor and context adapter. To process dynamically changing contextual info...
Conference Paper
We explore the suitability of Intensional Programming Paradigm for providing a programming model for coordinated problem solving in a multi-agent system. We extend our previous work on Lucx, an Intensional Programming Language extended with context as first class object, to support coordination activities in a distributed network of agents. We stud...
Conference Paper
Full-text available
In this paper, we give an overview of our current work on introduc-ing context as first-class objects in Lucid. It allows us to write programs in Lucx (Lucid enriched with context) in a high level of abstraction which is closer to the problem domain. We include a discussion on context theory, representation of context aggregations, and the syntax a...
Conference Paper
Full-text available
In this paper, we give an overview of our current work on introducing context as first-class objects in Lucid. The use of contexts as first class values increases the expressive power of Lucx (Lucid enriched with context). It allows us to use the paradigm for agent communication, for real-time reactive programming and for constraint programming. We...
Conference Paper
Full-text available
We present a synchronous,approach,to real-time reactive program- ming,in Lucid enriched with contexts as first class objects. The declarative in- tensional approach allows real-time reactive programs,to manipulate both events and state-based representations of complex,systems. We show,the formal speci- fication of the Train-Gate-Controllerproblem,...
Conference Paper
This article investigates the intensional programming paradigm for agent communication by introducing context as a first class object in the intensional programming language Lucid. For the language thus extended, a calculus of contexts and a logic of contexts are provided. The paper gives definitions, syntax, and operators for context, and introduc...
Article
The full potential of E-Commerce systems can be realized only when the security and dependability of transactions are ensured to the end users. Ad-hoc development methods cannot be analyzed for the satisfaction of either security or dependability. The architecture discussed in this paper is based on rigorous design principles, and is supported by a...
Conference Paper
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the traditional security model can not be applied to ACS any more. The goal of our research is to develop a context-based security model and architecture for ACS. Our focus is on s...

Network

Cited By