The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage.
View Article and Find Full Text PDFDue to the rapid technological evolution and communications accessibility, data generated from different sources of information show an exponential growth behavior. That is, volume of data samples that need to be analyzed are getting larger, so the methods for its processing have to adapt to this condition, focusing mainly on ensuring the computation is efficient, especially when the analysis tools are based on computational intelligence techniques. As we know, if you do not have a good control of the handling of the volume of the data, some techniques that are based on learning iterative processes could represent an excessive load of computation and could take a prohibitive time in trying to find a solution that could not come close to desired.
View Article and Find Full Text PDFThe Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics make it very vulnerable to security attacks. Ciphers are a security primitive that can prevent some of the attacks; however, the constrained computing and energy resources of IoT devices impede them from implementing current ciphers.
View Article and Find Full Text PDFMobile ad-hoc networks (MANETs) are dynamic by nature; this dynamism comes from node mobility, traffic congestion, and other transmission conditions. Metrics to evaluate the effects of those conditions shine a light on node's behavior in an ad-hoc network, helping to identify the node or nodes with better conditions of connection. In this paper, we propose a relative index to evaluate a single node reliability, based on the link disconnection entropy disorder using neighboring nodes as reference.
View Article and Find Full Text PDFPurpose: The purpose of this study was to assess the stability of sandblasted and acid-etched miniscrew implants based on orthodontic mechanics for space closure after tooth extraction.
Materials And Methods: Twenty-four orthodontic mini-implants were placed in 13 patients, for a skeletal anchorage purpose, all prepared by the manufacturer (3M Unitek-IMTEC Ortho USA) with sandblasting and acid treatment. Anchorage measurements were made on occlusal radiographs, on a monthly basis in a 6-month period.