2026
Authors
Bongiovi, G; Dias, TG; Nauri Junior, J; Campos Ferreira, M;
Publication
Applied Sciences
Abstract
2026
Authors
Ricardo Pires; Pedro Torres; Nuno A. Valente; E. J. Solteiro Pires; Arsénio Reis; P. B. de Moura Oliveira; João Barroso;
Publication
Lecture notes in computer science
Abstract
2026
Authors
Dintén, R; Zorrilla, M; Veloso, B; Gama, J;
Publication
INFORMATION FUSION
Abstract
One of the key aspects of Industry 4.0 is using intelligent systems to optimize manufacturing processes by improving productivity and reducing costs. These systems have greatly impacted in different areas, such as demand prediction and quality assessment. However, the prognostics and health management of industrial equipment is one of the areas with greater potential. This paper presents a comparative analysis of deep learning architectures applied to the prediction of the remaining useful life (RUL) on public real industrial datasets. The analysis includes some of the most commonly employed recurrent neural network variations and a novel approach based on a hybrid architecture using transformers. Moreover, we apply explainability techniques to provide comprehensive insights into the model's decision-making process. The contributions of the work are: (1) a novel transformer-based architecture for RUL prediction that outperforms traditional recurrent neural networks; (2) a detailed description of the design strategies used to construct the models on two under-explored datasets; (3) the use of explainability techniques to understand the feature importance and to explain the model's prediction and (4) making models built for reproducibility available to other researchers.
2026
Authors
Fernandes, P; Ciardhuáin, SO; Antunes, M;
Publication
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2025, PT I
Abstract
The increasing connectivity of Internet of Medical Things (IoMT) devices has accentuated their susceptibility to cyberattacks. The sensitive data they handle makes them prime targets for information theft and extortion, while outdated and insecure communication protocols further elevate security risks. This paper presents a lightweight and innovative approach that combines Benford's law with statistical distance functions to detect attacks in IoMT devices. The methodology uses Benford's law to analyze digit frequency and classify IoMT devices traffic as benign or malicious, regardless of attack type. It employs distance-based statistical functions like Jensen-Shannon divergence, KullbackLeibler divergence, Pearson correlation, and the Kolmogorov test to detect anomalies. Experimental validation was conducted on the CIC-IoMT-2024 benchmark dataset, comprising 45 features and multiple attack types. The best performance was achieved with the Kolmogorov test (alpha = 0.01), particularly in DoS ICMP attacks, yielding a precision of.99.24%, a recall of.98.73%, an F1 score of.98.97%, and an accuracy of.97.81%. Jensen-Shannon divergence also performed robustly in detecting SYN-based attacks, demonstrating strong detection with minimal computational cost. These findings confirm that Benford's law, when combined with well-chosen statistical distances, offers a viable and efficient alternative to machine learning models for anomaly detection in constrained environments like IoMT.
2026
Authors
de Sousa, PR; Bronzo, M; Torres, NT Jr; Vivaldini, M; Simoes, AC; de Jesus, TS; Couto, G;
Publication
OPERATIONS MANAGEMENT RESEARCH
Abstract
As collaborative robots increasingly redefine industrial automation, understanding the factors that drive their adoption is essential to operations management. This study examines the main drivers of collaborative robot adoption in the Brazilian manufacturing sector by combining theory-driven framing with a machine learning classification approach. It was developed a Random Forest classifier to identify the strongest predictors of cobot adoption and to rank their relative importance. Data were collected from a sample of respondents-primarily managers and chief executive officers-representing 300 industrial companies. Grounded in the Technology-Organization-Environment (TOE) framework and complemented by Diffusion of Innovations (DoI) and Institutional (INT) perspectives, the analysis shows that technological advantages, namely space efficiency, cost reduction, and ease of integration, are critical drivers of adoption. Organizational factors, including proactive managerial involvement and alignment with an innovation-oriented culture, significantly increase the likelihood of collaborative robot uptake. The model demonstrated robust predictive performance and produced interpretable variable importance scores that confirm the relative influence of technological and managerial factors. These findings provide a structured lens for understanding and guiding managerial decision-making on cobot adoption and translate into practical recommendations for managers.
2026
Authors
Palma, A; Antunes, M; Alves, A;
Publication
PATTERN RECOGNITION AND IMAGE ANALYSIS, IBPRIA 2025, PT I
Abstract
Ensuring the security of Industrial Control Systems (ICS) is increasingly critical due to increasing connectivity and cyber threats. Traditional security measures often fail to detect evolving attacks, necessitating more effective solutions. This paper evaluates machine learning (ML) methods for ICS cybersecurity, using the ICS-Flow dataset and Optuna for hyperparameter tuning. The selected models, namely Random Forest (RF), AdaBoost, XGBoost, Deep Neural Networks, Artificial Neural Networks, ExtraTrees (ET), and Logistic Regression, are assessed using macro-averaged F1-score to handle class imbalance. Experimental results demonstrate that ensemble-based methods (RF, XGBoost, and ET) offer the highest overall detection performance, particularly in identifying commonly occurring attack types. However, minority classes, such as IP-Scan, remain difficult to detect accurately, indicating that hyperparameter tuning alone is insufficient to fully deal with imbalanced ICS data. These findings highlight the importance of complementary measures, such as focused feature selection, to enhance classification capabilities and protect industrial networks against a wider array of threats.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.