PLOS ONE: [sortOrder=DATE_NEWEST_FIRST, filterJournals=PLoSONE, sort=Date, newest first, q=subject:"Control engineering"]PLOShttps://journals.plos.org/plosone/webmaster@plos.orgaccelerating the publication of peer-reviewed sciencehttps://journals.plos.org/plosone/search/feed/atom?sortOrder=DATE_NEWEST_FIRST&filterJournals=PLoSONE&sort=Date,+newest+first&unformattedQuery=subject:%22Control+engineering%22All PLOS articles are Open Access.https://journals.plos.org/plosone/resource/img/favicon.icohttps://journals.plos.org/plosone/resource/img/favicon.ico2024-03-29T11:21:25ZCybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEsJawad ManzoorAbdul WaleedAbdul Fareed JamaliAmmar Masood10.1371/journal.pone.03011832024-03-28T14:00:00Z2024-03-28T14:00:00Z<p>by Jawad Manzoor, Abdul Waleed, Abdul Fareed Jamali, Ammar Masood</p>
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today’s evolving digital landscape. Small and Medium Enterprises (SMEs), which are the backbone of the global economy are particularly vulnerable to these threats due to inadequate protection for critical and sensitive information, budgetary constraints, and lack of cybersecurity expertise and personnel. Security Information and Event Management (SIEM) systems have emerged as pivotal tools for monitoring, detecting, and responding to security incidents. While proprietary SIEM solutions have historically dominated the market, open-source SIEM systems have gained prominence for their accessibility and cost-effectiveness for SMEs. This article presents a comprehensive study focusing on the evaluation of open-source SIEM systems. The research investigates the capabilities of these open-source solutions in addressing modern security challenges and compliance with regulatory requirements. Performance aspects are explored through empirical testing in simulated enterprise-grade SME network environments to assess resource utilization, and real-time data processing capabilities. By providing a rigorous assessment of the security and performance features of open-source SIEM systems, this research offers valuable insights to cybersecurity practitioners, organizations seeking cost-effective security solutions, and the broader academic community. The findings shed light on the strengths and limitations of these systems, aiding decision-makers in selecting the most suitable SIEM solution for their specific requirements while enhancing the cybersecurity posture of SMEs.Triggering Chinese lecturers’ intrinsic work motivation by value-based leadership and growth mindset: Generation difference by using multigroup analysisXiangge ZhaoWalton WiderXinxin ZhangMuhammad Ashraf FauziChee Hoo WongLeilei JiangLester Naces Udang10.1371/journal.pone.02977912024-03-27T14:00:00Z2024-03-27T14:00:00Z<p>by Xiangge Zhao, Walton Wider, Xinxin Zhang, Muhammad Ashraf Fauzi, Chee Hoo Wong, Leilei Jiang, Lester Naces Udang</p>
This cross-sectional study investigated the effects of value-based leadership and growth mindset on the intrinsic work motivation of Chinese lecturers. In addition, this study used age as a categorical moderator to investigate generational differences between the effects of Millennials and their predecessors. A sample of 518 lecturers from various Chinese universities was used to collect data, and SEM-PLS was used to analyse the data. The results showed that value-based leadership and growth mindset had a significant positive impact on both younger and older lecturers’ intrinsic work motivation, with the effect of value-based leadership on younger lecturers’ intrinsic motivation being significantly stronger than on older lecturers’ intrinsic motivation, whereas the effect of growth mindset on intrinsic work motivation did not differ significantly between the younger and older groups. This study contributes to the existing research literature by contrasting the value-based leadership and growth mindset in relation to lecturers’ intrinsic work motivation across younger and older groups in Chinese higher education settings, where greater heterogeneity between age groups was identified. The findings also provided university administrators with recommendations for boosting the intrinsic work motivation of lecturers, influencing future education policy.A flexible mixed-optimization with <i>H</i><sub>∞</sub> control for coupled twin rotor MIMO system based on the method of inequality (MOI)- An experimental studyNadir AbbasXiaodong LiuJamshed Iqbal10.1371/journal.pone.03003052024-03-22T14:00:00Z2024-03-22T14:00:00Z<p>by Nadir Abbas, Xiaodong Liu, Jamshed Iqbal</p>
This article introduces a cutting-edge <i>H</i><sub>∞</sub> model-based control method for uncertain Multi Input Multi Output (MIMO) systems, specifically focusing on UAVs, through a flexible mixed-optimization framework using the Method of Inequality (MOI). The proposed approach adaptively addresses crucial challenges such as unmodeled dynamics, noise interference, and parameter variations. Central to the design is a two-step controller development process. The first step involves Nonlinear Dynamic Inversion (NDI) and system decoupling for simplification, while the second step integrates <i>H</i><sub>∞</sub> control with MOI for optimal response tuning. This strategy is distinguished by its adaptability and focus on balancing robust stability and performance, effectively managing the intricate cross-coupling dynamics in UAV systems. The effectiveness of the proposed approach is validated through simulations conducted in MATLAB/Simulink environment. Results demonstrated the efficiency of the proposed robust control approach as evidenced by reduced steady-state error, diminished overshoot, and faster system response times, thus significantly outperforming traditional control methods.A smart mask to enforce social contracts based on IOTA TangleLianna ZhaoPietro FerraroRobert Shorten10.1371/journal.pone.02928502024-03-22T14:00:00Z2024-03-22T14:00:00Z<p>by Lianna Zhao, Pietro Ferraro, Robert Shorten</p>
In this paper we present the design for a smart-mask to mitigate the impact of an airborne virus such as COVID-19. The design utilises recent results from feedback control theory over a distributed ledger that have been developed to enforce compliance in a pseudo-anonymous manner. The design is based on the use of the IOTA distributed ledger. A hardware-in-the-loop simulation based on indoor positioning, paired with Monte-Carlo simulations, is developed to demonstrate the efficacy of the designed prototype.An open-source FACS automation system for high-throughput cell biologyDiane M. WienerEmily HuynhIlakkiyan JeyakumarSophie BaxSamia SamaJoana P. CabreraVerina TodorovaMadhuri VangipuramShivanshi VaidFumitaka OtsukaYoshitsugu SakaiManuel D. LeonettiRafael Gómez-Sjöberg10.1371/journal.pone.02994022024-03-21T14:00:00Z2024-03-21T14:00:00Z<p>by Diane M. Wiener, Emily Huynh, Ilakkiyan Jeyakumar, Sophie Bax, Samia Sama, Joana P. Cabrera, Verina Todorova, Madhuri Vangipuram, Shivanshi Vaid, Fumitaka Otsuka, Yoshitsugu Sakai, Manuel D. Leonetti, Rafael Gómez-Sjöberg</p>
Recent advances in gene editing are enabling the engineering of cells with an unprecedented level of scale. To capitalize on this opportunity, new methods are needed to accelerate the different steps required to manufacture and handle engineered cells. Here, we describe the development of an integrated software and hardware platform to automate Fluorescence-Activated Cell Sorting (FACS), a central step for the selection of cells displaying desired molecular attributes. Sorting large numbers of samples is laborious, and, to date, no automated system exists to sequentially manage FACS samples, likely owing to the need to tailor sorting conditions (“gating”) to each individual sample. Our platform is built around a commercial instrument and integrates the handling and transfer of samples to and from the instrument, autonomous control of the instrument’s software, and the algorithmic generation of sorting gates, resulting in walkaway functionality. Automation eliminates operator errors, standardizes gating conditions by eliminating operator-to-operator variations, and reduces hands-on labor by 93%. Moreover, our strategy for automating the operation of a commercial instrument control software in the absence of an Application Program Interface (API) exemplifies a universal solution for other instruments that lack an API. Our software and hardware designs are fully open-source and include step-by-step build documentation to contribute to a growing open ecosystem of tools for high-throughput cell biology.The analysis of collective orientation and process feedback in relation to coordination and performance in interdependently working teamsVera HagemannMichèle RiethKai N. Klasmeier10.1371/journal.pone.02975652024-03-21T14:00:00Z2024-03-21T14:00:00Z<p>by Vera Hagemann, Michèle Rieth, Kai N. Klasmeier</p>
Effective teamwork is not only essential for teams themselves, but also for organizations and our society. To facilitate team processes and enhance team performance, feedback interventions are a widely used means. However, different types of feedback (i.e., individual vs. team-level feedback, performance vs. process feedback) can have various effects leaving the question of their effectiveness unanswered. This is especially important when team members’ attitudes (namely collective orientation) are considered. Thus, understanding the interplay between types of feedback and team members’ attitudes would reveal new opportunities for fostering reliable teamwork. The methodology of the present study is based on a laboratory approach. Teams (<i>N</i> = 142) of two worked together over four scenarios to extinguish forest fires in a microworld. We examined the effects of collective orientation on team coordination and team performance. To understand the interplay between feedback and attitudes we examined the effect of different feedback interventions on team performance and on a change in collective orientation. For analyzing multilevel mediation and changes over time, Bayesian multilevel models were applied. Results show a positive relationship between collective orientation and team performance mediated by coordination. Additionally, team-level process and performance feedback seem to be slightly more beneficial for maintaining performance over time with increasing difficulty of the task compared to individual-level process feedback. Feedback can lead to an increase in collective orientation if these values are low at the beginning. Our research highlights the importance of collective orientation and feedback interventions on team processes and performance for interdependently working teams.Linear feedback coding scheme for multiple-access fading channels with degraded message setsYuan LiaoXiaofang Wang10.1371/journal.pone.02953692024-03-18T14:00:00Z2024-03-18T14:00:00Z<p>by Yuan Liao, Xiaofang Wang</p>
Channel coding technology plays an important role in wireless communication systems, and it serves as a crucial mechanism to reduce interference during the transmission process. As the fifth-generation (5G) and sixth-generation (6G) wireless communication systems rapidly advance, requirements of the users on the quality and security of wireless service are increasing. To solve these problems, it calls for us to explore the new channel coding technologies. In this paper, a linear feedback coding scheme for fading multiple-access channels with degraded message sets (FMAC-DMS) is proposed. In this scheme, the transmitting beamforming and channel splitting are used to transform the channel with complex signals into scalar equivalent sub-channels. Then, the extended Schalkwijk-Kailath coding scheme (SK) is further applied to each sub-channel. The channel capacity, finite blocklength (FBL) sum-rate and FBL secrecy achievable sum-rate of the FMAC-DMS in single-input single-output (SISO) and multi-input single-output (MISO) cases are derived. Finally, we show that the proposed scheme not only provides a FBL coding solution but also guarantees physical layer security(PLS). The numerical and simulation results show the effectiveness of the proposed scheme as a channel coding solution. The study of this paper provides a new method to construct a practical FBL scheme for the FMAC-DMS.A dynamic traffic signal scheduling system based on improved greedy algorithmGuangling SunRui QiYulong LiuFeng Xu10.1371/journal.pone.02984172024-03-15T14:00:00Z2024-03-15T14:00:00Z<p>by Guangling Sun, Rui Qi, Yulong Liu, Feng Xu</p>
Urbanization has led to accelerated traffic congestion, posing a significant obstacle to urban development. Traditional traffic signal scheduling methods are often inefficient and cumbersome, resulting in unnecessary waiting times for vehicles and pedestrians, exacerbating the traffic situation. To address this issue, this article proposes a dynamic traffic signal scheduling system based on an improved greedy algorithm. Unlike conventional approaches, we introduce a reward function and a cost model to ensure fair scheduling plans. A constraint function is also established, and the traffic signal scheduling is iterated through the feasible matrix using the greedy algorithm to simplify the decision-making process and enhance solution efficiency. Moreover, an emergency module is integrated to prioritize special emergency vehicles, reducing their response time during emergencies. To validate the effectiveness of our dynamic traffic signal scheduling system, we conducted simulation experiments using the Simulation of Urban Mobility (SUMO) traffic simulation suite and the SUMO traffic control interface Traci. The results indicate that our system significantly improves intersection throughput and adapts well to various traffic conditions, effectively resolving urban traffic congestion while ensuring fair scheduling plans.An estimation method for sensor faults based on observer in interconnected systemsYanxiu SunHong Li10.1371/journal.pone.02968482024-03-11T14:00:00Z2024-03-11T14:00:00Z<p>by Yanxiu Sun, Hong Li</p>
In this research, a class of nonlinear interconnected systems with sensor faults were investigated and an estimation method was proposed for system sensor faults based on the theory of system state reconstruction. Considering sensor fault vectors in nonlinear interconnected systems, this method constructed a generalized nonlinear interconnected system, whose state was designed by augmenting the original system state and fault vectors, which provides a foundation for fault estimation of nonlinear interconnected systems. An augmented observer was developed by equivalent transformation of generalized interconnected system, so as to realize robust estimations of sensor faults in interconnected systems. This estimation method took into account the effect of external disturbance of the system on fault estimation and estimated the convergence speed of error system; the developed method also considered the convenience of solving the gain matrix of the augmented observer, which was beneficial to the realization of sensor fault estimation in interconnected system. The sensor estimation method proposed in the paper has the advantages of robustness in fault estimation,rapidity in error convergence, and convenience in solving the gain matrix. Finally, the state and sensor fault estimation errors of two interconnected systems can both approach 0 within 10 seconds, thus achieving the purpose of fault estimation. Two simulation experiments verified the effectiveness of the proposed fault estimation method and provided a reference for the fault estimation method of nonlinear interconnected systems with disturbance.Control strategies for inverted pendulum: A comparative analysis of linear, nonlinear, and artificial intelligence approachesSaqib IrfanLiangyu ZhaoSafeer UllahAdeel MehmoodMuhammad Fasih Uddin Butt10.1371/journal.pone.02980932024-03-07T14:00:00Z2024-03-07T14:00:00Z<p>by Saqib Irfan, Liangyu Zhao, Safeer Ullah, Adeel Mehmood, Muhammad Fasih Uddin Butt</p>
An inverted pendulum is a challenging underactuated system characterized by nonlinear behavior. Defining an effective control strategy for such a system is challenging. This paper presents an overview of the IP control system augmented by a comparative analysis of multiple control strategies. Linear techniques such as linear quadratic regulators (LQR) and progressing to nonlinear methods such as Sliding Mode Control (SMC) and back-stepping (BS), as well as artificial intelligence (AI) methods such as Fuzzy Logic Controllers (FLC) and SMC based Neural Networks (SMCNN). These strategies are studied and analyzed based on multiple parameters. Nonlinear techniques and AI-based approaches play key roles in mitigating IP nonlinearity and stabilizing its unbalanced form. The aforementioned algorithms are simulated and compared by conducting a comprehensive literature study. The results demonstrate that the SMCNN controller outperforms the LQR, SMC, FLC, and BS in terms of settling time, overshoot, and steady-state error. Furthermore, SMCNN exhibit superior performance for IP systems, albeit with a complexity trade-off compared to other techniques. This comparative analysis sheds light on the complexity involved in controlling the IP while also providing insights into the optimal performance achieved by the SMCNN controller and the potential of neural network for inverted pendulum stabilization.Research on the dust-control technology of a double-wall attached-ring air curtain on an excavation faceJingxue YanBaoshan JiaXuerong PanJinyi ZhangNiujun Jia10.1371/journal.pone.02950452024-03-07T14:00:00Z2024-03-07T14:00:00Z<p>by Jingxue Yan, Baoshan Jia, Xuerong Pan, Jinyi Zhang, Niujun Jia</p>
On the basis of the jet theory of airflow fields and the gas–solid two-phase flow theory, we studied the law of dust migration in a simulated dusting space. We used the control variable method and numerical simulation software to explore the airflow field and dust concentration distribution on the working surface of the dusting under different inlet wind speeds and different attached blades of the double-walled annular air curtain. We determined the speed of the inlet of the annular air curtain to be 30 m/s. When the angle of the attached blade was 30°, the dust concentration of the driver and other workers was controlled below 100 mg/m<sup>3</sup>, which produced the best dust control effect is the best. Using real data, we built a similar test platform to test the airflow field and dust concentration. Through data measurement and analysis, we proved that a dust control system with a double-wall attached-ring air curtain formed a circulating airflow field that could shield dust and effectively reduce dust concentration in the simulated space. The dust removal efficiency of total dust and exhaled dust reached 98.5% and 97.5%, respectively. We compared the test data and simulation results and concluded that the double-wall attached-ring air curtain could effectively ensure the safety of mine production and provide a better underground working environment for operators.Access authentication via blockchain in space information networkMuhammad ArshadLiu JianweiMuhammad KhalidWaqar KhalidYue CaoFakhri Alam Khan10.1371/journal.pone.02912362024-03-07T14:00:00Z2024-03-07T14:00:00Z<p>by Muhammad Arshad, Liu Jianwei, Muhammad Khalid, Waqar Khalid, Yue Cao, Fakhri Alam Khan</p>
Space Information Network (SIN) has significant benefits of providing communication anywhere at any time. This feature offers an innovative way for conventional wireless customers to access enhanced internet services by using SIN. However, SIN’s characteristics, such as naked links and maximum signal latency, make it difficult to design efficient security and routing protocols, etc. Similarly, existing SIN authentication techniques can’t satisfy all of the essentials for secure communication, such as privacy leaks or rising authentication latency. The article aims to develop a novel blockchain-based access authentication mechanism for SIN. The proposed scheme uses a blockchain application, which has offered anonymity to mobile users while considering the satellites’ limited processing capacity. The proposed scheme uses a blockchain application, which offers anonymity to mobile users while considering the satellites’ limited processing capacity. The SIN gains the likelihood of far greater computational capacity devices as technology evolves. Since authenticating in SIN, the technique comprises three entities: low Earth orbit, mobile user, and network control centre. The proposed mutual authentication mechanism avoids the requirement of a ground station, resulting in less latency and overhead during mobile user authentication. Finally, the new blockchain-based authentication approach is being evaluated with AVISPA, a formal security tool. The simulation and performance study results illustrate that the proposed technique delivers efficient security characteristics such as low authentication latency, minimal signal overhead and less computational cost with group authentication.How automated machines influence employment in manufacturing enterprises?Hong JiangYingfan GeChunhao YangHongxin Yu10.1371/journal.pone.02991942024-03-05T14:00:00Z2024-03-05T14:00:00Z<p>by Hong Jiang, Yingfan Ge, Chunhao Yang, Hongxin Yu</p>
This paper theoretically analyzes and empirically examines the impact and mechanisms of automated machines on employment in manufacturing enterprises, drawing on task-based model and using micro data from listed Chinese manufacturing enterprises between 2012 and 2019. Our findings reveal that: (1) Automated machines in manufacturing enterprises leads to a substitution effect on the total labor force, with a substitution effect on low-skilled labor and a creation effect on high-skilled labor in terms of employment structure. (2) Further analysis indicates that automated machines primarily have a positive effect on R&D and technical staff, a non-significant effect on sales staff, and a negative impact on production, administrative, and financial staff. (3) The primary influencing mechanisms of automated machines on employment in manufacturing firms are productivity effects and output scale effects, based on the mediation effect model. (4) Considering the industry linkage effect, we employ the input-output method and the Input-Output Table and find that automated machines for upstream (downstream) manufacturing enterprises will result in a substitution effect on employment for downstream (upstream) enterprises. The novelties and research contributions are as follows: (1) we conduct a structural decomposition of total employment, and further decompose employment positions into production, R&D, sales, finance, and administration. (2) We try to investigate the industry linkage effect about the impact of automated machines on the employment of upstream and downstream enterprises. (3) We use data from listed manufacturing companies, and the data of existing research are about provincial and industry-level data.Intelligent control decision integrating fuzziness and randomness for automatic management of cash flowHongli WangLiguo FeiYuqiang Feng10.1371/journal.pone.02927482024-03-01T14:00:00Z2024-03-01T14:00:00Z<p>by Hongli Wang, Liguo Fei, Yuqiang Feng</p>
Automatic management of cash flow from the perspective of cybernetics decisions can improve work efficiency and accuracy of cash flow management. Disadvantage of traditional fuzzy control method is that it only expresses fuzziness and ignores randomness. The automatic management of cash flow involves variables representing the fuzziness and randomness of human cognition which need new calculation methods to solve. Based on fuzzy control this paper proposes a cloud set control decision method for cash flow management. Cloud set and its <i>I</i> operation and <i>P</i> operation are described. Methods are studied including observation variables and control variables, fuzziness of observation variables and control variables, description of rules, and cloud reasoning based on cloud set. The method is applied successfully in automatic management of cash flow in which control amount of expenditure intensity is -2.285. It is shown that this method can effectively obtain reasonable control quantities considering fuzzy and random properties by the comparison with fuzzy control method. The method for automatic management of cash flow proposed has greater objectivity and effectiveness for the integration of fuzzy and randomness representing human cognition and decision.The signaling role of feedback in the repeated public goods game: Experimental evidence from the laboratoryChi-Hsiang LiuShih-Feng TsaiTing-Cih ChenHsiu-Wen Cheng10.1371/journal.pone.02991962024-02-29T14:00:00Z2024-02-29T14:00:00Z<p>by Chi-Hsiang Liu, Shih-Feng Tsai, Ting-Cih Chen, Hsiu-Wen Cheng</p>
This paper empirically examines the signaling role of feedback in the repeated public goods game. To eliminate the potential impact of feedback’s informative function, we test whether the provision of detailed yet redundant feedback leads to increased contributions. Our findings demonstrate that redundant information significantly promotes contributions. Given the equal informative power in both treatments, the observed increase in contributions can be attributed to the signaling effect. Furthermore, an examination of cooperative disposition heterogeneity reveals that conditional cooperators primarily utilize feedback for its informative function, while free riders primarily exploit it for its signaling function. These results offer empirical evidence of the signaling function of feedback and offer valuable insights into the design of feedback provision in repeated public goods settings.