2026
Autores
Bongiovi, G; Dias, TG; Nauri Junior, J; Campos Ferreira, M;
Publicação
Applied Sciences
Abstract
2026
Autores
Pires, R; Torres, P; Valente, A; Pires, EJS; Reis, AMD; Oliveira, P; Barroso, JMP;
Publicação
Lecture Notes in Computer Science
Abstract
Forest fires represent a significant and growing threat to natural ecosystems and human settlements, with their unpredictable behavior and capacity for rapid expansion over time, creating substantial challenges for effective prevention, control, and mitigation. This paper presents the development of a forest fire simulator designed to model and predict fire spread under varying environmental conditions. Such a simulator must consider how fire spreads in different locations and climate conditions, showing the final shape of the fire in a given period of time. Using the NetLogo agent-based modeling platform, a simulated forest environment was created in which trees function as autonomous agents interacting with one another and the environment. Identifying and understanding the risk factors that increase the likelihood of a fire occurring, as well as those that contribute to its spread and intensity, is essential for the development of an accurate forest fire simulator. Such a simulator can integrate the complex interactions among these variables to produce dynamic visualizations of fire progression, allowing users to evaluate different scenarios and make informed decisions for preventing, controlling and fighting forest fires. By incorporating key factors—such as vegetation density, temperature, humidity, topography, and wind direction—the system calculates the probability of fire propagation and generates visual representations of fire behavior over time. This tool allows users to forecast fire behavior and assess response strategies proactively, thereby improving the accuracy and efficiency of firefighting efforts. In addition, the simulator yields significant social benefits, especially for older adults residing in fire-prone areas, by supporting early warning systems, enabling prompt evacuations, and mitigating their susceptibility to fire-related risks through enhanced preparedness and coordinated response measures. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
2026
Autores
Dintén, R; Zorrilla, M; Veloso, B; Gama, J;
Publicação
INFORMATION FUSION
Abstract
One of the key aspects of Industry 4.0 is using intelligent systems to optimize manufacturing processes by improving productivity and reducing costs. These systems have greatly impacted in different areas, such as demand prediction and quality assessment. However, the prognostics and health management of industrial equipment is one of the areas with greater potential. This paper presents a comparative analysis of deep learning architectures applied to the prediction of the remaining useful life (RUL) on public real industrial datasets. The analysis includes some of the most commonly employed recurrent neural network variations and a novel approach based on a hybrid architecture using transformers. Moreover, we apply explainability techniques to provide comprehensive insights into the model's decision-making process. The contributions of the work are: (1) a novel transformer-based architecture for RUL prediction that outperforms traditional recurrent neural networks; (2) a detailed description of the design strategies used to construct the models on two under-explored datasets; (3) the use of explainability techniques to understand the feature importance and to explain the model's prediction and (4) making models built for reproducibility available to other researchers.
2026
Autores
Fernandes, P; Ciardhuáin, SO; Antunes, M;
Publicação
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2025, PT I
Abstract
The increasing connectivity of Internet of Medical Things (IoMT) devices has accentuated their susceptibility to cyberattacks. The sensitive data they handle makes them prime targets for information theft and extortion, while outdated and insecure communication protocols further elevate security risks. This paper presents a lightweight and innovative approach that combines Benford's law with statistical distance functions to detect attacks in IoMT devices. The methodology uses Benford's law to analyze digit frequency and classify IoMT devices traffic as benign or malicious, regardless of attack type. It employs distance-based statistical functions like Jensen-Shannon divergence, KullbackLeibler divergence, Pearson correlation, and the Kolmogorov test to detect anomalies. Experimental validation was conducted on the CIC-IoMT-2024 benchmark dataset, comprising 45 features and multiple attack types. The best performance was achieved with the Kolmogorov test (alpha = 0.01), particularly in DoS ICMP attacks, yielding a precision of.99.24%, a recall of.98.73%, an F1 score of.98.97%, and an accuracy of.97.81%. Jensen-Shannon divergence also performed robustly in detecting SYN-based attacks, demonstrating strong detection with minimal computational cost. These findings confirm that Benford's law, when combined with well-chosen statistical distances, offers a viable and efficient alternative to machine learning models for anomaly detection in constrained environments like IoMT.
2026
Autores
de Sousa, PR; Bronzo, M; Torres, NT Jr; Vivaldini, M; Simoes, AC; de Jesus, TS; Couto, G;
Publicação
OPERATIONS MANAGEMENT RESEARCH
Abstract
As collaborative robots increasingly redefine industrial automation, understanding the factors that drive their adoption is essential to operations management. This study examines the main drivers of collaborative robot adoption in the Brazilian manufacturing sector by combining theory-driven framing with a machine learning classification approach. It was developed a Random Forest classifier to identify the strongest predictors of cobot adoption and to rank their relative importance. Data were collected from a sample of respondents-primarily managers and chief executive officers-representing 300 industrial companies. Grounded in the Technology-Organization-Environment (TOE) framework and complemented by Diffusion of Innovations (DoI) and Institutional (INT) perspectives, the analysis shows that technological advantages, namely space efficiency, cost reduction, and ease of integration, are critical drivers of adoption. Organizational factors, including proactive managerial involvement and alignment with an innovation-oriented culture, significantly increase the likelihood of collaborative robot uptake. The model demonstrated robust predictive performance and produced interpretable variable importance scores that confirm the relative influence of technological and managerial factors. These findings provide a structured lens for understanding and guiding managerial decision-making on cobot adoption and translate into practical recommendations for managers.
2026
Autores
Palma, A; Antunes, M; Alves, A;
Publicação
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2025, PT I
Abstract
Ensuring the security of Industrial Control Systems (ICS) is increasingly critical due to increasing connectivity and cyber threats. Traditional security measures often fail to detect evolving attacks, necessitating more effective solutions. This paper evaluates machine learning (ML) methods for ICS cybersecurity, using the ICS-Flow dataset and Optuna for hyperparameter tuning. The selected models, namely Random Forest (RF), AdaBoost, XGBoost, Deep Neural Networks, Artificial Neural Networks, ExtraTrees (ET), and Logistic Regression, are assessed using macro-averaged F1-score to handle class imbalance. Experimental results demonstrate that ensemble-based methods (RF, XGBoost, and ET) offer the highest overall detection performance, particularly in identifying commonly occurring attack types. However, minority classes, such as IP-Scan, remain difficult to detect accurately, indicating that hyperparameter tuning alone is insufficient to fully deal with imbalanced ICS data. These findings highlight the importance of complementary measures, such as focused feature selection, to enhance classification capabilities and protect industrial networks against a wider array of threats.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.