Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (39)

Search Parameters:
Keywords = human-supervisory control

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 2127 KB  
Perspective
Making AI Tutors Empathetic and Conscious: A Needs-Driven Pathway to Synthetic Machine Consciousness
by Earl Woodruff
AI 2025, 6(8), 193; https://doi.org/10.3390/ai6080193 - 19 Aug 2025
Cited by 1 | Viewed by 1415
Abstract
As large language model (LLM) tutors evolve from scripted helpers into adaptive educational partners, their capacity for self-regulation, ethical decision-making, and internal monitoring will become increasingly critical. This paper introduces the Needs-Driven Consciousness Framework (NDCF) as a novel, integrative architecture that combines Dennett’s [...] Read more.
As large language model (LLM) tutors evolve from scripted helpers into adaptive educational partners, their capacity for self-regulation, ethical decision-making, and internal monitoring will become increasingly critical. This paper introduces the Needs-Driven Consciousness Framework (NDCF) as a novel, integrative architecture that combines Dennett’s multiple drafts model, Damasio’s somatic marker hypothesis, and Tulving’s tripartite memory system into a unified motivational design for synthetic consciousness. The NDCF defines three core regulators, specifically Survive (system stability and safety), Thrive (autonomy, competence, relatedness), and Excel (creativity, ethical reasoning, long-term purpose). In addition, there is a proposed supervisory Protect layer that detects value drift and overrides unsafe behaviours. The core regulators compute internal need satisfaction states and urgency gradients, feeding into a softmax-based control system for context-sensitive action selection. The framework proposes measurable internal signals (e.g., utility gradients, conflict intensity Ω), behavioural signatures (e.g., metacognitive prompts, pedagogical shifts), and three falsifiable predictions for educational AI testbeds. By embedding these layered needs directly into AI governance, the NDCF offers (i) a psychologically and biologically grounded model of emergent machine consciousness, (ii) a practical approach to building empathetic, self-regulating AI tutors, and (iii) a testable platform for comparing competing consciousness theories through implementation. Ultimately, the NDCF provides a path toward the development of AI tutors that are capable of transparent reasoning, dynamic adaptation, and meaningful human-like relationships, while maintaining safety, ethical coherence, and long-term alignment with human well-being. Full article
Show Figures

Figure 1

21 pages, 806 KB  
Tutorial
Multi-Layered Framework for LLM Hallucination Mitigation in High-Stakes Applications: A Tutorial
by Sachin Hiriyanna and Wenbing Zhao
Computers 2025, 14(8), 332; https://doi.org/10.3390/computers14080332 - 16 Aug 2025
Viewed by 2284
Abstract
Large language models (LLMs) now match or exceed human performance on many open-ended language tasks, yet they continue to produce fluent but incorrect statements, which is a failure mode widely referred to as hallucination. In low-stakes settings this may be tolerable; in regulated [...] Read more.
Large language models (LLMs) now match or exceed human performance on many open-ended language tasks, yet they continue to produce fluent but incorrect statements, which is a failure mode widely referred to as hallucination. In low-stakes settings this may be tolerable; in regulated or safety-critical domains such as financial services, compliance review, and client decision support, it is not. Motivated by these realities, we develop an integrated mitigation framework that layers complementary controls rather than relying on any single technique. The framework combines structured prompt design, retrieval-augmented generation (RAG) with verifiable evidence sources, and targeted fine-tuning aligned with domain truth constraints. Our interest in this problem is practical. Individual mitigation techniques have matured quickly, yet teams deploying LLMs in production routinely report difficulty stitching them together in a coherent, maintainable pipeline. Decisions about when to ground a response in retrieved data, when to escalate uncertainty, how to capture provenance, and how to evaluate fidelity are often made ad hoc. Drawing on experience from financial technology implementations, where even rare hallucinations can carry material cost, regulatory exposure, or loss of customer trust, we aim to provide clearer guidance in the form of an easy-to-follow tutorial. This paper makes four contributions. First, we introduce a three-layer reference architecture that organizes mitigation activities across input governance, evidence-grounded generation, and post-response verification. Second, we describe a lightweight supervisory agent that manages uncertainty signals and triggers escalation (to humans, alternate models, or constrained workflows) when confidence falls below policy thresholds. Third, we analyze common but under-addressed security surfaces relevant to hallucination mitigation, including prompt injection, retrieval poisoning, and policy evasion attacks. Finally, we outline an implementation playbook for production deployment, including evaluation metrics, operational trade-offs, and lessons learned from early financial-services pilots. Full article
Show Figures

Figure 1

26 pages, 6637 KB  
Article
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
by Abdulmohsen Almalawi, Shabbir Hassan, Adil Fahad, Arshad Iqbal and Asif Irshad Khan
Symmetry 2025, 17(4), 616; https://doi.org/10.3390/sym17040616 - 18 Apr 2025
Cited by 1 | Viewed by 1680
Abstract
Supervisory control and data acquisition (SCADA) systems are vulnerable to cyberattacks; hence, cybersecurity is a major concern. Hybrid methodologies using advanced machine learning (ML) may increase intrusion detection and system security. The intrusion detection algorithms have little adaptability, high false-positive rates for novel [...] Read more.
Supervisory control and data acquisition (SCADA) systems are vulnerable to cyberattacks; hence, cybersecurity is a major concern. Hybrid methodologies using advanced machine learning (ML) may increase intrusion detection and system security. The intrusion detection algorithms have little adaptability, high false-positive rates for novel threats, and restricted feature extraction. SCADA systems are subject to sophisticated attacks. This study’s hybrid autoencoder-hybrid ResNet–long short-term memory (LSTM) (HAE–HRL) architecture includes deep feature extraction, anomaly detection, and sequential analysis. This framework uses these three methods to improve threat detection. AI can scan massive amounts of data and find patterns humans and traditional systems miss. The hybrid approach gives defenders an unequal edge. Autoencoders identify anomalies, convolutional neural networks (CNNs) extract features, and hybrid ResNet–LSTM learns temporal patterns. Cyber risks are correctly classified using this method. With SCADA security and intrusion detection, the model may considerably enhance network abnormality and hostile activity detection. According to experimental tests, HAE–HRL reduces false positives and improves detection accuracy, making it a robust cybersecurity solution. Full article
(This article belongs to the Special Issue Advanced Studies of Symmetry/Asymmetry in Cybersecurity)
Show Figures

Figure 1

26 pages, 4992 KB  
Article
Enhanced GAIN-Based Missing Data Imputation for a Wind Energy Farm SCADA System
by Liulin Yang, Zhenning Huang, Xiujin Mo and Tianlu Luo
Electronics 2025, 14(8), 1590; https://doi.org/10.3390/electronics14081590 - 14 Apr 2025
Cited by 1 | Viewed by 873
Abstract
The integrity and reliability of wind turbine electrical data (such as active power, voltage, current, etc.) are crucial for operational monitoring, fault diagnosis, and predictive analysis in wind energy systems. However, due to various reasons such as hardware failures, network communication issues, environmental [...] Read more.
The integrity and reliability of wind turbine electrical data (such as active power, voltage, current, etc.) are crucial for operational monitoring, fault diagnosis, and predictive analysis in wind energy systems. However, due to various reasons such as hardware failures, network communication issues, environmental interference, and human errors, data gaps still exist in the Supervisory Control and Data Acquisition (SCADA) systems. Existing multivariate wind power time series imputation methods face two main limitations: (1) inadequate handling of continuous missing patterns (band missing and feature missing) and (2) insufficient utilization of spatiotemporal and feature correlations among wind turbines. To address these shortcomings, this study proposes an imputation framework that includes two types of SCADA data missing scenarios in wind turbines. For band missing, the framework leverages similar wind turbine data matching to explore spatiotemporal correlations in wind power data. For feature missing, the framework focuses on feature correlations in wind power data using Pearson coefficients and normalized mutual information. Additionally, we designed a novel Dual-Type Deep Convolutional Generative Adversarial Imputation Network (DT-DCGAIN) model within this framework to impute different types of missing data. Finally, by evaluating the proposed method on real-world wind farm SCADA datasets, it achieved a 13.91% to 28.32% improvement in Root Mean Square Error (RMSE). Ablation experiments on the model further validated the contributions of each correlation extraction module. Full article
Show Figures

Figure 1

42 pages, 16651 KB  
Article
Internet of Things-Cloud Control of a Robotic Cell Based on Inverse Kinematics, Hardware-in-the-Loop, Digital Twin, and Industry 4.0/5.0
by Dan Ionescu, Adrian Filipescu, Georgian Simion and Adriana Filipescu
Sensors 2025, 25(6), 1821; https://doi.org/10.3390/s25061821 - 14 Mar 2025
Cited by 2 | Viewed by 1604
Abstract
The main task of the research involves creating a Digital Twin (DT) application serving as a framework for Virtual Commissioning (VC) with Supervisory Control and Data Acquisition (SCADA) and Cloud storage solutions. An Internet of Things (IoT) integrated automation system with Virtual Private [...] Read more.
The main task of the research involves creating a Digital Twin (DT) application serving as a framework for Virtual Commissioning (VC) with Supervisory Control and Data Acquisition (SCADA) and Cloud storage solutions. An Internet of Things (IoT) integrated automation system with Virtual Private Network (VPN) remote control for assembly and disassembly robotic cell (A/DRC) equipped with a six-Degree of Freedom (6-DOF) ABB 120 industrial robotic manipulator (IRM) is presented in this paper. A three-dimensional (3D) virtual model is developed using Siemens NX Mechatronics Concept Designer (MCD), while the Programmable Logic Controller (PLC) is programmed in the Siemens Totally Integrated Automation (TIA) Portal. A Hardware-in-the-Loop (HIL) simulation strategy is primarily used. This concept is implemented and executed as part of a VC approach, where the designed PLC programs are integrated and tested against the physical controller. Closed loop control and RM inverse kinematics model are validated and tested in PLC, following HIL strategy by integrating Industry 4.0/5.0 concepts. A SCADA application is also deployed, serving as a DT operator panel for process monitoring and simulation. Cloud data collection, analysis, supervising, and synchronizing DT tasks are also integrated and explored. Additionally, it provides communication interfaces via PROFINET IO to SCADA and Human Machine Interface (HMI), and through Open Platform Communication—Unified Architecture (OPC-UA) for Siemens NX-MCD with DT virtual model. Virtual A/DRC simulations are performed using the Synchronized Timed Petri Nets (STPN) model for control strategy validation based on task planning integration and synchronization with other IoT devices. The objective is to obtain a clear and understandable representation layout of the A/DRC and to validate the DT model by comparing process dynamics and robot motion kinematics between physical and virtual replicas. Thus, following the results of the current research work, integrating digital technologies in manufacturing, like VC, IoT, and Cloud, is useful for validating and optimizing manufacturing processes, error detection, and reducing the risks before the actual physical system is built or deployed. Full article
Show Figures

Figure 1

27 pages, 12488 KB  
Article
Smart Transparency: A User-Centered Approach to Improving Human–Machine Interaction in High-Risk Supervisory Control Tasks
by Keran Wang, Wenjun Hou, Leyi Hong and Jinyu Guo
Electronics 2025, 14(3), 420; https://doi.org/10.3390/electronics14030420 - 21 Jan 2025
Cited by 3 | Viewed by 2451
Abstract
In supervisory control tasks, particularly in high-risk fields, operators need to collaborate with automated intelligent agents to manage dynamic, time-sensitive, and uncertain information. Effective human–agent collaboration relies on transparent interface communication to align with the operator’s cognition and enhance trust. This paper proposes [...] Read more.
In supervisory control tasks, particularly in high-risk fields, operators need to collaborate with automated intelligent agents to manage dynamic, time-sensitive, and uncertain information. Effective human–agent collaboration relies on transparent interface communication to align with the operator’s cognition and enhance trust. This paper proposes a human-centered adaptive transparency information design framework (ATDF), which dynamically adjusts the display of transparency information based on the operator’s needs and the task type. This ensures that information is accurately conveyed at critical moments, thereby enhancing trust, task performance, and interface usability. Additionally, the paper introduces a novel user research method, Heu–Kano, to explore the prioritization of transparency needs and presents a model based on eye-tracking and machine learning to identify different types of human–agent interactions. This research provides new insights into human-centered explainability in supervisory control tasks. Full article
(This article belongs to the Special Issue Emerging Trends in Multimodal Human-Computer Interaction)
Show Figures

Figure 1

22 pages, 3762 KB  
Article
Eye-Tracking Characteristics: Unveiling Trust Calibration States in Automated Supervisory Control Tasks
by Keran Wang, Wenjun Hou, Huiwen Ma and Leyi Hong
Sensors 2024, 24(24), 7946; https://doi.org/10.3390/s24247946 - 12 Dec 2024
Cited by 2 | Viewed by 2150
Abstract
Trust is a crucial human factor in automated supervisory control tasks. To attain appropriate reliance, the operator’s trust should be calibrated to reflect the system’s capabilities. This study utilized eye-tracking technology to explore novel approaches, given the intrusive, subjective, and sporadic characteristics of [...] Read more.
Trust is a crucial human factor in automated supervisory control tasks. To attain appropriate reliance, the operator’s trust should be calibrated to reflect the system’s capabilities. This study utilized eye-tracking technology to explore novel approaches, given the intrusive, subjective, and sporadic characteristics of existing trust measurement methods. A real-world scenario of alarm state discrimination was simulated and used to collect eye-tracking data, real-time interaction data, system log data, and subjective trust scale values. In the data processing phase, a dynamic prediction model was hypothesized and verified to deduce and complete the absent scale data in the time series. Ultimately, through eye tracking, a discriminative regression model for trust calibration was developed using a two-layer Random Forest approach, showing effective performance. The findings indicate that this method may evaluate the trust calibration state of operators in human–agent collaborative teams within real-world settings, offering a novel approach to measuring trust calibration. Eye-tracking features, including saccade duration, fixation duration, and the saccade–fixation ratio, significantly impact the assessment of trust calibration status. Full article
(This article belongs to the Special Issue Sensing Technology to Measure Human-Computer Interactions)
Show Figures

Figure 1

31 pages, 17989 KB  
Article
IoT-Cloud, VPN, and Digital Twin-Based Remote Monitoring and Control of a Multifunctional Robotic Cell in the Context of AI, Industry, and Education 4.0 and 5.0
by Adrian Filipescu, Georgian Simion, Dan Ionescu and Adriana Filipescu
Sensors 2024, 24(23), 7451; https://doi.org/10.3390/s24237451 - 22 Nov 2024
Cited by 6 | Viewed by 2980
Abstract
The monitoring and control of an assembly/disassembly/replacement (A/D/R) multifunctional robotic cell (MRC) with the ABB 120 Industrial Robotic Manipulator (IRM), based on IoT (Internet of Things)-cloud, VPN (Virtual Private Network), and digital twin (DT) technology, are presented in this paper. The approach integrates [...] Read more.
The monitoring and control of an assembly/disassembly/replacement (A/D/R) multifunctional robotic cell (MRC) with the ABB 120 Industrial Robotic Manipulator (IRM), based on IoT (Internet of Things)-cloud, VPN (Virtual Private Network), and digital twin (DT) technology, are presented in this paper. The approach integrates modern principles of smart manufacturing as outlined in Industry/Education 4.0 (automation, data exchange, smart systems, machine learning, and predictive maintenance) and Industry/Education 5.0 (human–robot collaboration, customization, robustness, and sustainability). Artificial intelligence (AI), based on machine learning (ML), enhances system flexibility, productivity, and user-centered collaboration. Several IoT edge devices are engaged, connected to local networks, LAN-Profinet, and LAN-Ethernet and to the Internet via WAN-Ethernet and OPC-UA, for remote and local processing and data acquisition. The system is connected to the Internet via Wireless Area Network (WAN) and allows remote control via the cloud and VPN. IoT dashboards, as human–machine interfaces (HMIs), SCADA (Supervisory Control and Data Acquisition), and OPC-UA (Open Platform Communication-Unified Architecture), facilitate remote monitoring and control of the MRC, as well as the planning and management of A/D/R tasks. The assignment, planning, and execution of A/D/R tasks were carried out using an augmented reality (AR) tool. Synchronized timed Petri nets (STPN) were used as a digital twin akin to a virtual reality (VR) representation of A/D/R MRC operations. This integration of advanced technology into a laboratory mechatronic system, where the devices are organized in a decentralized, multilevel architecture, creates a smart, flexible, and scalable environment that caters to both industrial applications and educational frameworks. Full article
(This article belongs to the Special Issue Intelligent Robotics Sensing Control System)
Show Figures

Figure 1

26 pages, 2375 KB  
Article
Flight-Based Control Allocation: Towards Human–Autonomy Teaming in Air Traffic Control
by Gijs de Rooij, Adam Balint Tisza and Clark Borst
Aerospace 2024, 11(11), 919; https://doi.org/10.3390/aerospace11110919 - 8 Nov 2024
Cited by 2 | Viewed by 1830
Abstract
It is widely recognized that airspace capacity must increase over the coming years. It is also commonly accepted that meeting this challenge while balancing concerns around safety, efficiency, and workforce issues will drive greater reliance on automation. However, if automation is not properly [...] Read more.
It is widely recognized that airspace capacity must increase over the coming years. It is also commonly accepted that meeting this challenge while balancing concerns around safety, efficiency, and workforce issues will drive greater reliance on automation. However, if automation is not properly developed and deployed, it represents something of a double-edged sword, and has been linked to several human–machine system performance issues. In this article, we argue that human–automation function and task allocation may not be the way forward, as it invokes serialized interactions that ultimately push the human into a problematic supervisory role. In contrast, we propose a flight-based allocation strategy in which a human controller and digital colleague each have full control authority over different flights in the airspace, thereby creating a parallel system. In an exploratory human-in-the-loop simulation exercise involving six operational en route controllers, it was found that the proposed system was considered acceptable after the users gained experience with it during simulation trials. However, almost all controllers did not follow the initial flight allocations, suggesting that allocation schemes need to remain flexible and/or be based on criteria capturing interactions between flights. In addition, the limited capability of and feedback from the automation contributed to this result. To advance this concept, future work should focus on substantiating flight-centric complexity in driving flight allocation schemes, increasing automation capabilities, and facilitating common ground between humans and automation. Full article
(This article belongs to the Special Issue Future Airspace and Air Traffic Management Design)
Show Figures

Figure 1

24 pages, 10669 KB  
Article
Smart IoT SCADA System for Hybrid Power Monitoring in Remote Natural Gas Pipeline Control Stations
by Muhammad Waqas and Mohsin Jamil
Electronics 2024, 13(16), 3235; https://doi.org/10.3390/electronics13163235 - 15 Aug 2024
Cited by 10 | Viewed by 11133
Abstract
A pipeline network is the most efficient and rapid way to transmit natural gas from source to destination. The smooth operation of natural gas pipeline control stations depends on electrical equipment such as data loggers, control systems, surveillance, and communication devices. Besides having [...] Read more.
A pipeline network is the most efficient and rapid way to transmit natural gas from source to destination. The smooth operation of natural gas pipeline control stations depends on electrical equipment such as data loggers, control systems, surveillance, and communication devices. Besides having a reliable and consistent power source, such control stations must also have cost-effective and intelligent monitoring and control systems. Distributed processes are monitored and controlled using supervisory control and data acquisition (SCADA) technology. This paper presents an Internet of Things (IoT)-based, open-source SCADA architecture designed to monitor a Hybrid Power System (HPS) at a remote natural gas pipeline control station, addressing the limitations of existing proprietary and non-configurable SCADA architectures. The proposed system comprises voltage and current sensors acting as Field Instrumentation Devices for required data collection, an ESP32-WROOM-32E microcontroller that functions as the Remote Terminal Unit (RTU) for processing sensor data, a Blynk IoT-based cloud server functioning as the Master Terminal Unit (MTU) for historical data storage and human–machine interactions (HMI), and a GSM SIM800L module and a local WiFi router for data communication between the RTU and MTU. Considering the remote locations of such control stations and the potential lack of 3G, 4G, or Wi-Fi networks, two configurations that use the GSM SIM800L and a local Wi-Fi router are proposed for hardware integration. The proposed system exhibited a low power consumption of 3.9 W and incurred an overall cost of 40.1 CAD, making it an extremely cost-effective solution for remote natural gas pipeline control stations. Full article
Show Figures

Figure 1

19 pages, 6135 KB  
Article
Integration of Legacy Industrial Equipment in a Building-Management System Industry 5.0 Scenario
by Adrian Korodi, Ioana-Victoria Nițulescu, Adriana-Anamaria Fülöp, Vlad-Cristian Vesa, Petru Demian, Robert-Adelin Braneci and Daniel Popescu
Electronics 2024, 13(16), 3229; https://doi.org/10.3390/electronics13163229 - 15 Aug 2024
Cited by 9 | Viewed by 3330
Abstract
Considering Industry 4.0 directions, followed by recent Industry 5.0 principles, interest in integrating legacy systems in industrial manufacturing has emerged. Due to the continuous evolution of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT), as well as the rapid [...] Read more.
Considering Industry 4.0 directions, followed by recent Industry 5.0 principles, interest in integrating legacy systems in industrial manufacturing has emerged. Due to the continuous evolution of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT), as well as the rapid extension of the scope and adoption of broader technologies, such integration has become feasible. Even though newly developed equipment provides easier interoperability, the replacement of legacy systems highly impacts cost and sustainability, which usually extends to the entire production process, the operators and the maintenance team, and sometimes even the robustness of the production process. Ensuring the interoperability of legacy systems is a problematic task, being dependent on technologies and development techniques and specific industrial domain particularities. This paper considers strategies to ensure the interoperability of legacy systems in a building-management system scenario where local structures are approached using both industrial protocols and web-based contexts. The solution is built following the Industry 5.0 pillars (sustainability, human focus, resilience) and conceives the entire data acquisition and supervisory solution to be flexible, open-source, resilient, and under the control of company engineers. The chosen environment for interfacing and supervision is Node-RED, enabling IoT and IIoT tools, together with a complete orientation toward digital transformation. This way, it is possible to construct a final result that enhances security while bridging outdated protocols and technologies, eliminating compatibility risks in the context of the evolutionary IIoT, ensuring critical process functions are possible, and aiding operators in complying with regulations governing building-management system (BMS) operations, thus solving the challenges that arise in the complex task of adopting the IoT backbone of digital transformation in relation to the integration of legacy equipment. The obtained solution is tested in an automotive industry building-management system, and the results demonstrate its performance, reliability, and high customizability in a context of openness and low cost. Full article
Show Figures

Figure 1

20 pages, 7143 KB  
Article
An Open-Source Supervisory Control and Data Acquisition Architecture for Photovoltaic System Monitoring Using ESP32, Banana Pi M4, and Node-RED
by Wei He, Mirza Jabbar Aziz Baig and Mohammad Tariq Iqbal
Energies 2024, 17(10), 2295; https://doi.org/10.3390/en17102295 - 10 May 2024
Cited by 10 | Viewed by 4551
Abstract
To overcome the issues of the existing properties and the non-configurable supervisory control and data acquisition (SCADA) architecture, this paper proposes an IoT-centered open-source SCADA system for monitoring photovoltaic (PV) systems. The system consists of three voltage sensors and three current sensors for [...] Read more.
To overcome the issues of the existing properties and the non-configurable supervisory control and data acquisition (SCADA) architecture, this paper proposes an IoT-centered open-source SCADA system for monitoring photovoltaic (PV) systems. The system consists of three voltage sensors and three current sensors for data accumulation from the PV panel, the battery, and the load. As a part of the system design, a relay is used that controls the load remotely. An ESP32-E microcontroller transmits the collected data to a Banana Pi M4 Berry (BPI-M4 Berry) through the Message Queuing Telemetry Transport (MQTT) protocol over a privately established communication channel using Wi-Fi. The ESP32-E is configured as the MQTT publisher and the BPI-M4 Berry serves as the MQTT broker. Locally installed on the BPI-M4 Berry, the Node-RED platform creates highly customizable dashboards as human–machine interfaces (HMIs) to achieve real-time monitoring of the PV system. The proposed system was successfully tested to collect the PV system voltage/current/power data and to control the load in a supervisory way under a laboratory setup. The complete SCADA architecture details and test results for the PV system data during the total eclipse on 8 April 2024 and another day are presented in this paper. Full article
(This article belongs to the Section A2: Solar Energy and Photovoltaic Systems)
Show Figures

Figure 1

18 pages, 2889 KB  
Article
Outage Analysis of Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer System for Industrial Emergency Applications
by Aleksandra Cvetković, Vesna Blagojević, Jelena Anastasov, Nenad T. Pavlović and Miloš Milošević
Sensors 2023, 23(18), 7779; https://doi.org/10.3390/s23187779 - 9 Sep 2023
Cited by 2 | Viewed by 1616
Abstract
In the scenario of a natural or human-induced disaster, traditional communication infrastructure is often disrupted or even completely unavailable, making the employment of emergency wireless networks highly important. In this paper, we consider an industrial Supervisory Control and Data Acquisition (SCADA) system assisted [...] Read more.
In the scenario of a natural or human-induced disaster, traditional communication infrastructure is often disrupted or even completely unavailable, making the employment of emergency wireless networks highly important. In this paper, we consider an industrial Supervisory Control and Data Acquisition (SCADA) system assisted by an unmanned aerial vehicle (UAV) that restores connectivity from the master terminal unit (MTU) to the remote terminal unit (RTU). The UAV also provides power supply to the ground RTU, which transmits the signal to the end-user terminal (UT) using the harvested RF energy. The MTU-UAV and UAV-RTU channels are modeled through Nakagami-m fading, while the channel between the RTU and the UT is subject to Fisher–Snedecor composite fading. According to the channels’ characterization, the expression for evaluating the overall probability of outage events is derived. The impact of the UAV’s relative position to other terminals and the amount of harvested energy on the outage performance is investigated. In addition, the results obtained based on an independent simulation method are also provided to confirm the validity of the derived analytical results. The provided analysis shows that the position of the UAV that leads to the optimal outage system performance is highly dependent on the MTU’s output power. Full article
(This article belongs to the Special Issue RF Energy Harvesting and Wireless Power Transfer for IoT)
Show Figures

Figure 1

29 pages, 1960 KB  
Article
Autonomous Machinery Management for Supervisory Risk Control Using Particle Swarm Optimization
by Simon Blindheim, Børge Rokseth and Tor Arne Johansen
J. Mar. Sci. Eng. 2023, 11(2), 327; https://doi.org/10.3390/jmse11020327 - 2 Feb 2023
Cited by 9 | Viewed by 2333
Abstract
Safe navigation for maritime autonomous surface ships (MASS) is a challenging task, and generally highly dependent on effective collaboration between multiple sub-systems in environments with various levels of uncertainty. This paper presents a novel methodology combining risk-based optimal control and path following with [...] Read more.
Safe navigation for maritime autonomous surface ships (MASS) is a challenging task, and generally highly dependent on effective collaboration between multiple sub-systems in environments with various levels of uncertainty. This paper presents a novel methodology combining risk-based optimal control and path following with autonomous machinery management (AMM) for MASS navigation and supervisory risk control. Specifically, a risk-aware particle swarm optimization (PSO) scheme utilizes “time-to-grounding” predictions based on weather data and electronic navigational charts (ENC) to simultaneously control both the ship’s motion as well as the machinery system operation (MSO) mode during transit. The proposed autonomous navigation system (ANS) is comprised of an online receding horizon control that uses a PSO approach from previous works, which produces a dynamic risk-aware path with respect to grounding obstacles from a pre-planned MASS path, subsequently given as the input to a line-of-sight guidance controller for path following. Moreover, the MSO mode of the AMM system is simultaneously selected and assigned to explicit segments along the risk-aware path throughout the receding horizon, which effectively introduces into the optimization scheme an additional safety layer as well as another dimension for risk or resource minimization. The performance of the resulting ANS is demonstrated and verified through simulations of a challenging scenario and human assessment of the generated paths. The results show that the optimized paths are more efficient and in line with how human navigators would maneuver a ship close to nearby grounding obstacles, compared to the optimized paths of selected previous works. Full article
(This article belongs to the Special Issue Young Researchers in Ocean Engineering)
Show Figures

Figure 1

20 pages, 1388 KB  
Article
A Matter of Health? A 24-Week Daily and Weekly Diary Study on Workplace Bullying Perpetrators’ Psychological and Physical Health
by Gülüm Özer, Yannick Griep and Jordi Escartín
Int. J. Environ. Res. Public Health 2023, 20(1), 479; https://doi.org/10.3390/ijerph20010479 - 28 Dec 2022
Cited by 2 | Viewed by 3759
Abstract
Workplace bullying (WB) studies focusing on perpetrators are increasing. Many processes, events, circumstances and individual states are being studied to understand and inhibit what causes some employees to become perpetrators. Using a 24-week diary design and drawing on the Conservation of Resources Theory, [...] Read more.
Workplace bullying (WB) studies focusing on perpetrators are increasing. Many processes, events, circumstances and individual states are being studied to understand and inhibit what causes some employees to become perpetrators. Using a 24-week diary design and drawing on the Conservation of Resources Theory, we investigated how sleep, physical activity (PA), and being bullied predicted perpetration on a within-level. On a between-level, we controlled for a supervisory position, psychological distress and mental illnesses over 38 employees from Spain and Turkey. Their average age was 38.84 years (SD = 11.75). They were from diverse sectors (15.8% in manufacturing, 15.8% in education, 13.2% in wholesale and retail trade, 13.2% in information and communication, 7.9% in health, 7.9% in other services and 26.3% from other sectors) with diverse professions such as finance manager, psychologist, graphic designer, academic, human resources professional, forensic doctor, IT and Administration head, municipality admin executive, waiter, and sales executives. Data collection was conducted over 24 consecutive work weeks, where only 31 participants were involved in perpetration (final observations = 720). We analyzed the data using multilevel structural equation modeling decomposed into within-and-between-person variance parts. The results indicated that on a within-level, PA as steps taken during the work week and being bullied positively predicted perpetration the same week, while sleep quality did not. By connecting sleep, physical exercise and WB literature, we draw attention to the health condition of perpetrators. Organizations should actively inhibit workplace bullying and be mindful of employees’ physical activities at work or commuting to work. Managers should also be attentive to physical fatigue that employees may feel due to their responsibilities in their private lives and allow employees to rest and recuperate to inhibit negative behaviors at work. Full article
(This article belongs to the Special Issue Impact of Work Environment on Occupational Health and Productivity)
Show Figures

Figure 1

Back to TopTop