Gianni D'Angelo

Gianni D'Angelo
Università degli Studi del Sannio | UniSannio · Department of Science and Technology (DST)

About

46
Publications
8,856
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
864
Citations
Citations since 2017
35 Research Items
834 Citations
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250

Publications

Publications (46)
Article
Diabetes mellitus is a global health problem, recognized as the seventh cause of death in the world. One of the most debilitating complications of diabetes mellitus is the diabetic foot (DF), resulting in an increased risk of hospitalization and significant morbidity and mortality. Amputation above or below the knee is a feared complication and the...
Article
Full-text available
Coronavirus disease 19 (COVID-19) is an infectious disease caused by the SARS-CoV-2 virus, which is responsible for the ongoing global pandemic. Stringent measures have been adopted to face the pandemic, such as complete lockdown, shutting down businesses and trade, as well as travel restrictions. Nevertheless, such solutions have had a tremendous...
Article
Full-text available
In the last decades, mobile-based apps have been increasingly used in several application fields for many purposes involving a high number of human activities. Unfortunately, in addition to this, the number of cyber-attacks related to mobile platforms is increasing day-by-day. However, although advances in Artificial Intelligence science have allow...
Article
Full-text available
Ductal adenocarcinoma of the pancreas is a cancer with a high mortality rate. Among the main reasons for this baleful prognosis is that, in most patients, this neoplasm is diagnosed at a too advanced stage. Clinical oncology research is now particularly focused on decoding the cancer molecular onset by understanding the complex biological architect...
Article
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims’ devices, steal sensitive data, or perform fraudulent actions against third parties without their knowledge. The fraudulent traffic is encapsulated into DNS queries to evade intrusion detection. Unfortunately, traditional defense systems based on Deep Packet Inspecti...
Article
Full-text available
Resource Planning Optimization (RPO) is a common task that many companies need to face to get several benefits, like budget improvements and run-time analyses. However, even if it is often solved by using several software products and tools, the great success and validity of the Artificial Intelligence-based approaches, in many research fields, rep...
Chapter
The outbreak of the COVID-19 pandemic has forced worldwide employees to massive use of their mobile devices to access corporate systems. This new scenario has made mobile devices more susceptible to malicious applications, which are yearly developed to conduct several hostile activities. Concerned about this fact, many Deep Learning (DL) based solu...
Preprint
Full-text available
Ductal adenocarcinoma of the pancreas is a cancer with a high mortality rate. Among the main reasons for this baleful prognosis is that, in most patients, this neoplasm is diagnosed at a too advanced stage. Clinical oncology research is now particularly focused on decoding the cancer molecular onset by understanding the complex biological architect...
Article
Full-text available
Modern interconnected power grids are a critical target of many kinds of cyber‐attacks, potentially affecting public safety and introducing significant economic damages. In such a scenario, more effective detection and early alerting tools are needed. This study introduces a novel anomaly detection architecture, empowered by modern machine learning...
Preprint
Full-text available
Resource Planning Optimization (RPO) is a common task that many companies need to face to obtain several benefits, like budget improvements and run-time analyses. It is often addressed by using several software products and tools, based on sophisticated mathematical artifacts. However, these tools are not able to provide a practical solution becaus...
Article
Full-text available
With the emergence of COVID-19, mobile health applications have increasingly become crucial in contact tracing, information dissemination, and pandemic control in general. Apps warn users if they have been close to an infected person for sufficient time, and therefore potentially at risk. The distance measurement accuracy heavily affects the probab...
Article
Emerging malware pose increasing challenges to detection systems as their variety and sophistication continue to increase. Malware developers use complex techniques to produce malware variants, by removing, replacing, and adding useless API calls to the code, which are specifically designed to evade detection mechanisms, as well as do not affect th...
Article
Due to their open nature and popularity, Android-based devices have attracted several end-users around the World and are one of the main targets for attackers. Because of the reasons given above, it is necessary to build tools that can reliably detect zero-day malware on these devices. At the moment, many of the frameworks that have been proposed t...
Article
The right choice of features to be extracted from individual or aggregated observations is an extremely critical factor for the success of modern network traffic classification approaches based on machine learning. Such activity, usually in charge of the designers of the classification scheme is strongly related to their experience and skills, and...
Article
In the last few decades, genetic algorithms (GAs) demonstrated to be an effective approach for solving real-world optimization problems. However, it is known that, in presence of a huge solution space and many local optima, GAs cannot guarantee the achievement of global optimality. In this work, in order to make GAs more effective in finding the gl...
Article
At present, 96% of the resources available into the World‐Wide‐Web belongs to the Deep Web , which is composed of contents that are not indexed by search engines. The Dark Web is a subset of the Deep Web , which is currently the favorite place for hiding illegal markets and contents. The most important tool that can be used to access the Dark Web i...
Article
SARS‐CoV‐2 is a novel severe acute respiratory syndrome‐like coronavirus (SARS‐CoV), which is responsible of the ongoing world pandemic of COVID‐19 disease. Although many approaches are being investigated to address this issue, nowaday there are no vaccines available and there is little evidence supporting the efficiency of potential therapeutic ag...
Article
Full-text available
This Special Issue aims at collecting several original state-of-the-art research experiences in the area of intelligent applications in the IoT and Sensor networks environment, by analyzing several open issues and perspectives associated with such scenarios, in order to explore novel potentialities and solutions and face with the emerging challenge...
Article
This paper presents new perspectives on the application of Artificial Intelligence (AI) solutions to process Spacecraft (S/C) flight data in order to augment currently used operational S/C health monitoring and diagnostics systems. It captures the growing general interest in the usage of such techniques in the Space engineering domain and applicati...
Article
Full-text available
Malignant pleural effusion is diagnostically challenging in presence of negative cytology. The assessment of tumor markers in serum has become a standard tool in cancer diagnosis, while pleural fluid sampling has not met universal consensus. The evaluation of a panel of markers both in serum and pleural fluid may be crucial to improve the diagnosti...
Article
Full-text available
Meningitis is an inflammation of the protective membranes covering the brain and the spinal cord. Meningitis can have different causes, and discriminating between meningitis etiologies is still considered a hard task, especially when some specific clinical parameters, mostly derived from blood and cerebrospinal fluid analysis, are not completely av...
Article
Due to their open nature and popularity, Android-based devices represent one of the main targets for malware attacks that may adversely affect the privacy of their users. Considering the huge Android market share, it is necessary to build effective tools able to reliably detect zero-day malware on these platforms. Therefore, several static and dyna...
Article
In non-destructive testing of aerospace structures’ defects, the tests reliability is a crucial issue for guaranteeing security of both aircrafts and passengers. Most of the widely recognized approaches rely on precision and reliability of testing equipment, but also the methods and techniques used for processing measurement results, in order to de...
Article
Dynamic programming (DP) and Markov Decision Process (MDP) offer powerful tools for formulating, modeling, and solving decision making problems under uncertainty. In real-world applications, the applicability of DP is limited by severe scalability issues. These issues can be addressed by Approximate Dynamic Programming (ADP) techniques. ADP methods...
Article
In pervasive/ubiquitous computing environments, interacting users may evaluate their respective trustworthiness by using historical data coming from their past interactions. Nevertheless, when two users are at the first interaction, they have no historical data involving their own activities to be analyzed, and then use information (recommender-dat...
Article
Full-text available
This paper describes a novel Video Surveillance as a Service (VSaaS) architecture. The proposed solution uses an add-on component, named WS-Gateway (WebSocket-based gateway), installed in the client’s private network (along with IP-cameras network). The WebSocket protocol is used to establish a bi-directional communication among the actors in the s...
Article
Full-text available
Exposure to high levels of hyperbaric oxygen (\(\hbox {HBO}_{2}\)) can induce central nervous system oxygen toxicity in humans and animals, a phenomenon characterized by repeated tonic–clonic seizures. The risk of developing this type of convulsions represents the limiting factor in using \(\hbox {HBO}_{2}\) for a number of clinical and diving appl...
Article
In this paper, we present a fast method for classification of defects detected by eddy current testing (ECT). This is done by using defects derived by lab experiments. For any defect, the ECT magnetic field response for different EC-probe's paths is represented on a complex plane to obtain Lissajous' figures. Their shapes are described through the...
Article
Full-text available
Nowadays, satellites are becoming increasingly software dependent. Satellite Flight Software (FSW), that is to say, the application software running on the satellite main On-Board Computer (OBC), plays a relevant role in implementing complex space mission requirements. In this paper, we examine relevant technical approaches and programmatic strateg...
Chapter
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks presents current, state-of-the-art work on novel research in theoretical and practical resilience and security aspects of intelligent data-centric critical systems and networks. The book analyzes concepts and technologies that are successfully used in the impleme...
Article
Full-text available
Pervasive computing is one of the latest and more advanced paradigms currently available in the computers arena. Its ability to provide the distribution of computational services within environments where people live, work or socialize leads to make issues such as privacy, trust and identity more challenging compared to traditional computing enviro...
Conference Paper
Spacecraft on-board autonomy is an important topic in currently developed and future space missions. In this study, we present a robust approach to the optimal policy of autonomous space systems modeled via Markov Decision Process (MDP) from the values assigned to its transition probability matrix. After addressing the curse of dimensionality in so...
Article
Full-text available
This study concerns the effectiveness of several techniques and methods of signals processing and data interpretation for the diagnosis of aerospace structure defects. This is done by applying different known feature extraction methods, in addition to a new CBIR-based one; and some soft computing techniques including a recent HPC parallel implement...
Conference Paper
Pervasive Computing is one of the latest and more advanced paradigms currently available in the computers arena. Its ability to provide the distribution of computational services within environments where people live, work or socialize leads to make issues such as privacy, trust and identity more challenging compared to traditional computing enviro...
Article
Full-text available
The aim of this work is to classify the aerospace structure defects detected by eddy current non-destructive testing. The proposed method is based on the assumption that the defect is bound to the reaction of the probe coil impedance during the test. Impedance plane analysis is used to extract a feature vector from the shape of the coil impedance i...
Article
The main aim in network anomaly detection is effectively spotting hostile events within the traffic pattern associated to network operations, by distinguishing them from normal activities. This can be only accomplished by acquiring the a-priori knowledge about any kind of hostile behavior that can potentially affect the network (that is quite impos...
Chapter
Full-text available
Worldwide, foodborne diseases are an important cause of mortality. There is a strong need to strengthen surveillance systems for foodborne diseases. Traceability is an increasingly common element of public and private systems for monitoring compliance with quality, environmental, and other product and process attributes related to food. The key iss...
Chapter
Intelligent communities and territories belong to an emerging movement targeting the creation of better environments. Technological information is recognized as an important factor shaping territorial systems of innovation. This paper focuses on territorial intelligence: distributed information systems localized over a region allowing continuous up...
Article
Full-text available
Background: The huge quantity of data produced in Biomedical research needs sophisticated algorithmic methodologies for its storage, analysis, and processing. High Performance Computing (HPC) appears as a magic bullet in this challenge. However, several hard to solve parallelization and load balancing problems arise in this context. Here we discus...
Conference Paper
Full-text available
This study concerns with the diagnosis of aerospace structure defects by applying a HPC parallel implementation of a novel learning algorithm, named U-BRAIN. The Soft Computing approach allows advanced multi-parameter data processing in composite materials testing. The HPC parallel implementation overcomes the limits due to the great amount of data...
Conference Paper
Full-text available
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is relat...
Conference Paper
The sophisticated sonar system of bats is capable of extracting a complete set of information in order to locate and characterize the prey. Curved piezopolymer transducers were already used in the same frequency range to generate ultrasonic waves in air. In this article we investigate the possibility to process echo-signals by using a neural networ...

Questions

Question (1)
Question
Is it possible to transform a bilevel linear programming in a multiobjective optimization problem? If yes, how to do it?

Network

Cited By