• Home
  • Vito Santarcangelo
Vito Santarcangelo

Vito Santarcangelo
Centro Studi , Buccino (SA), Italy · Process Development & Applied Research

Computer Engineer

About

62
Publications
37,504
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
149
Citations
Citations since 2016
28 Research Items
129 Citations
201620172018201920202021202205101520253035
201620172018201920202021202205101520253035
201620172018201920202021202205101520253035
201620172018201920202021202205101520253035
Additional affiliations
January 2012 - present
Independent Researcher
Independent Researcher
Position
  • Applied Research Engineer

Publications

Publications (62)
Article
Full-text available
The traceability of the supply chain with strict compliance with the specification to demonstrate in "transparency" the production processes in compliance with legislation and from a corporate social responsibility perspective, represents a fundamental requirement at the basis of competitive advantage in the food industries (Patelli and Mandrioli,...
Article
The present work shows the importance of the Big Data Analytics (Anisetti et al, 2018) scenario applied to corporate COVID-19 compliance, following the concept of “accountability” related privacy issues introduced by the new General Data Protection Regulation. This compliance approach is very useful for territorial security, environmental monitorin...
Conference Paper
Full-text available
This paper shows a revolutionary approach about Semantic Block-chain and relative fuzzy approach. Blockchain is characterized by proof of work approach, which logic is to be solved by miner. Our analysis is focused on potentiality of semantic proof of work, that adds a lot of complexity to the mining scope. The fuzzy hashing approach is the key to...
Article
Full-text available
This paper presents Visual Market Basket Analysis (VMBA), a novel application domain for egocentric vision systems. The final goal of VMBA is to infer the behavior of the customers of a store during their shopping. The analysis relies on image sequences acquired by cameras mounted on shopping carts. The inferred behaviors can be coupled with classi...
Article
In the healthcare sector, information is the most important aspect, and the human body in particular is the major source of data production: as a result, the new challenge for world healthcare is to take advantage of these huge amounts of data de-structured among themselves. In order to benefit from this advantage, technology offers a solution call...
Chapter
In the Network Society the use of hashtags has become a daily routine for the participation on the Big Conversation Iorio and Ruoto (Nessun tempo, 2015). Designated by a ‘hash’ symbol (#), a hashtag is a keyword assigned to information that describes it and aides in searching. Hashtags are now central to organize information on Social Networks. Has...
Article
Nowadays, it is easy to trace a large amount of information on the web, to access documents and produce a digital storage. The current work is submitted as an introduction to an innovative system for the investigation about notoriety of web data which is based on the evaluation of judicial sentences and it is implemented to reduce the duration of a...
Patent
Full-text available
Metodo di localizzazione intelligente di oggetti basato sulla computer vision in un'area delimitata
Patent
Full-text available
Metodo di identificazione avanzata basato sulla visione artificiale in un'area delimitata
Conference Paper
The role of internet in our society is growing day by day and is becoming more and more the only way for getting information, exchange opinions and for improving our personal culture. So, an huge mole of data, in all fields, is today easily accessible and everybody can express and exchange ideas. This represents the greatness of the web. But at the...
Article
Full-text available
Nowadays Cryptolocker is a real threat for business data. Business data are related to business value, then this is a further problem in an already difficult economic context. It is important to improve awareness on IT Security beginning from business environments [4], more and more affected by this threat. The current piece of work aims to show ho...
Patent
Full-text available
Sistema per la misurazione della variazione dello stato comportamentale di un interlocutore
Conference Paper
Full-text available
This paper introduces a new application scenario for egocen-tric vision: Visual Market Basket Analysis (VMBA). The main goal in the proposed application domain is the understanding of customers behaviours in retails from videos acquired with cameras mounted on shopping carts (which we call narrative carts). To properly study the problem and to set...
Conference Paper
Full-text available
Starting by the initial step of applying a simplified BSC model and a three to five successive key lead indicators, to make simple successive diagnosis and strategic decisions, the work describes the phase period, decisional process, followed to lead a Company Group to a new way of approaching and managing its future. The role of a sister Company p...
Article
Full-text available
The Computer of 21st Century is called ubiquitous Computer. In present era of technology, computers are connected with each other through communication devices like Bluetooth, Infrared and Microwaves and communication links. The day to day increase in the importance and utilization of Ubiquitous computing in our daily life required new solutions. T...
Conference Paper
Full-text available
A lot of information about processes is today available on internet, then it is possible to retrieve documents and produce a digital repository. Thanks to techniques of text mining is possible to extract information useful to reach the task of define a statistical index to describe the quality and efficiency in law. It is also possible to produce a...
Conference Paper
Full-text available
Cloud Computing provides a scalable, high availability and low cost services over the Internet. The advent of newer technologies introduces new risks and threats as well. Although the cloud has a very advanced structures and expansion of services, but security and privacy concerns have been creating obstacles for the enterprise to entirely shift to...
Conference Paper
Full-text available
Process analysis and process control are two important business topics for the business improvement today. ISO standards are based on the PDCA cycle, then workflow development and analysis is a very important task in all business scenarios. However, the comparison between real and predefined workflows is a really important strategy to define the pr...
Conference Paper
Full-text available
The role of internet in our society is growing day by day and is becoming more and more the only way for getting information, exchange opinions and for improving our personal culture. So, an huge mole of data, in all fields, is today easily accessible and everybody can express and exchange ideas. This represents the greatness of the web. But at the...
Conference Paper
Full-text available
In the Network Society the use of hashtags has become a daily routine for the participation on the Big Conversation [3]. Designated by a ‘hash' symbol (#), a hashtag is a keyword assigned to information that describes it and aides in searching. Hashtags are now central to organize information on Social Networks. Hashtags organize discussion around...
Conference Paper
Full-text available
“Analisi dell’affidabilità delle informazioni sul web” presenta un approccio innovativo per stima della “notoriety” (affidabilità) di una informazione presente sul web. Tale approccio di ingegneria forense consente di definire una metrica innovativa per l’analisi della qualità delle informazioni online , al fine di una loro usabilità all’interno di...
Conference Paper
Full-text available
“Sentiment Analysis sui Social Network” presenta uno studio in merito all’analisi automatica delle opinioni presenti sui social network mediante tecniche dell’ingegneria dell’informazione. Sempre più i web crawler effettuano attività di text-mining intelligente delle informazioni presenti online, in particolar modo nei social network. L’analisi aut...
Conference Paper
Full-text available
Il seminario “Internet delle cose fra opportunità e rischi” mostra una panoramica sull’internet delle cose dal punto di vista delle opportunità applicative e dal punto di vista dei rischi connessi alla sicurezza delle informazioni.
Article
Full-text available
More and more innovations are introduced everyday, and consequently a lot of tools for communication tasks. However, some potentialities of these technologies are not explored. An example is represented by 2D BARCODE technology, that allows to hide a link, a text, a contact vcard inside. In this work after a presentation of 2D BARCODE technology in...
Article
Full-text available
Cloud computing has brought new innovations in the paradigm of IT industry through virtualization and by offering low price services on pay-as-per-use basis. Since the development of cloud computing, several issues like security, privacy, cost, load balancing, power consumption, scheduling algorithms are still under research. Cloud simulators are u...
Conference Paper
Full-text available
Today web data are one of the most important sources in all of the world interconnected through the internet network. Digital information, growing day by day, are becoming more and more important for people and business. At same time, the growing of fake data indubitably decreases the overall quality, that is an indispensable requisite for their us...
Conference Paper
Full-text available
Conference Paper
Full-text available
Opinion Mining or Sentiment Analysis is an important Computer Science topic, that allows the discovery of the web user’s attitude on one or more topics. Marketing, Social Engineering and Information Retrieval are achieved through the application of Opinion Mining on Web Data. Today Social Networks represent one of the most important places on the w...
Conference Paper
Full-text available
Heartbleed, a big Open Secure Socket Layer (OpenSSL) vulnerability appeared on the web on 7th April 2014. This highly risked vulnerability enabled attackers to remotely read protected memory contents from Hyper Text Transfer Protocol Secure (HTTPS) sites. In this paper, the authors will review and analyze Heartbleed vulnerability effects on secured...
Technical Report
Full-text available
Tables for ISO 27001:2013’s evaluation for Cloud Computing
Conference Paper
Full-text available
United States Department of Defense defines the Open Source Intelligence (OSINT) as “The intelligence discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information...
Conference Paper
Full-text available
The process mining is defined as a research “to discover, monitor and improve real process (i.e., not assumed processes) by extracting knowledge from event logs readily available in today’s system” [P. van der Aalst]. Discovering a process models by event logs and by actual process monitoring can be seen as a research field belonging to Big Data An...
Conference Paper
Full-text available
More and more information appear in the web every day, in our world interconnected by the web. However, the growing of misinformation (unintentional inaccurate information) and disinformation (intentional inaccurate information) of the web contents introduces a lot of noise in the analysis and results of “Big Data”. In this work we show a review ab...
Article
Full-text available
More and more accommodations (hotels, b & b) are born in Italy and always the same are less sensitive to the problems of computer security related to the presence and sharing of web access in their structure. Sniffing, spoofing, poisoning and social engineering attacks can become a real problem for the business and customer connected to the accommo...
Conference Paper
Full-text available
Digital Out Of Home (DOOH) applications which exploit computer vision algorithms to automatically collect soft bio-metrics of people in front a smart screen are of great interest for industry. In the last years many gender recognition pipelines have been proposed in literature. Different benchmark datasets have been introduced and used for testing...
Article
Full-text available
L'obiettivo del presente lavoro, si traduce in un'analisi dettagliata e pratica degli strumenti digitali recentemente messi a disposizione della pubblica amministrazione per agevolare e snellire le procedure di comunicazione tra il cittadino/imprese e le amministrazioni pubbliche stesse. Strumenti che richiedono una modernizzazione reale degli Enti...
Conference Paper
Full-text available
More and more accommodations (hotels, b & b) are born in Italy and always the same are less sensitive to the problems of computer security related to the presence and sharing of web access in their structure. Sniffing, spoofing, poisoning and social engineering attacks can become a real problem for the business and customer connected to the accommo...
Article
Full-text available
Nel presente lavoro viene affrontata la tematica dei campi elettrici e magnetici alle basse frequenze. In particolare, nel caso di studio in oggetto, viene effettuata una revisione di letteratura dal punto di vista dell’impatto biologico, questione oggi di estrema attualità, per la sempre più crescente diffusione di dispositivi elettrici ed elettro...
Patent
Full-text available
Sistema per la progettazione e il monitoraggio di tecnologie fosforescenti
Patent
Full-text available
Sistema per la determinazione e il monitoraggio del livello di inquinamento dovuto ad agenti foto catalizzabili mediante nanotecnologia attiva in un'area delimitata.
Article
Full-text available
Riassunto Il lavoro offre una panoramica sullo spoofing (falsificazione di identità), tematica di notevole attualità, riguardante le comunicazioni telematiche. Telefonate, fax, sms e e-mail sono i principali mezzi utilizzati dalla Social Engineering (ingegneria sociale) per compiere azioni illecite. L'obiettivo del lavoro è di contribuire alla cono...
Article
Full-text available
Il lavoro presenta un'analisi dettagliata di una indagine informatica, sia per richiamare l’attenzione sui rischi connessi anche ad un uso del tutto lecito di uno strumento informatico, sia per cercare di comunicare agli esperti alcuni possibili gravi errori procedurali assolutamente da evitare, sia, infine, per sensibilizzare coloro che, eventualm...
Article
Full-text available
Riassunto Nel lavoro viene presentata la piattaforma hardware e software open-source Arduino utile per la progettazione e la implementazione di strumenti personalizzati per il monitoraggio di parametri ambientali. Nel caso di studio in oggetto, viene utilizzato un sistema, realizzato in Arduino, per il monitoraggio della tossicità da VOC (Composti...
Article
Full-text available
Nel presente lavoro viene introdotto, inizialmente, il concetto di telemedicina con relativi esempi. Fra questi vengono citati applicativi per Iphone in ambito medico, che consentono la automedicazione con farmaci senza prescrizione medica. Vengono, quindi, introdotte le idee innovative riguardanti la realizzazione di sistemi esperti per la gestion...
Conference Paper
Full-text available
The aim of this paper is to show the application of a Thesaurus based approach to several issues of interest for an Italian Publishing House. Final experimental results reveal good performance in terms of rate of retrieval and recall and then encourage the prosecution of the multidisciplinary research.
Chapter
Full-text available
The present paper stresses the potentiality of RDF and the possibility of its application in medicine. The most important areas where semantic medicine is applied are the ontology for indexing of publications and the organization of patient data for diagnosis. In this paper breast cancer patient data organization has been considered. This assessmen...
Article
Full-text available
In this paper, two different methodologies respectively based on an unsupervised self-organizing (SOM) neural network and on a graph matching are shown and discussed to validate the performance of a new 3D facial feature identification and localization algorithm. Experiments are performed on a dataset of 23 3D faces acquired by a 3D laser camera at...
Article
This paper represents a survey of the state of art reached in 3D Face Recognition frameworks and show some different approaches developed and tested by its authors. We have designed a strong algorithm that is based on genetic algorithms, Principal Component Analysis (PCA) and face geometry assumptions, for head pose normalization of 3D scanned face...
Article
Full-text available
Nel presente lavoro si dimostra, inizialmente, la potenzialità di alcuni strumenti di apprendimento basati su algoritmi attualmente disponibili nella piattaforma WEKA di Pentaho, sempre più utilizzata sia in ambito sanitario scientifico sia in ambito professionale. Successivamente, si presenta un nuovo ambiente progettato e implementato presso il D...
Article
Full-text available
The automatic screening of retinal images for an early detection of diabetic symptoms and an early prevention of diabetic retinopathies has been a prime focus in recent times. In this paper a contribution to improve diabetic damage detection in retinal images via neural networks is proposed by comparing two neural strategies. By considering the fir...
Conference Paper
Full-text available
In this paper, starting to the previous work on 3D face recognition, is presented an optimization of the search of the points ALS and ALD of the nose and a new graph approach for the recognition base on several new points. Experiments are performed on a dataset (44 3D faces) acquired by a 3D laser camera at eBIS lab with pose and expression variati...
Article
Full-text available
This paper describes a comparative study between an Artificial Neural Network (ANN) and a geometric technique to detect for biometric applications,the bifurcation points of blood vessels in the retinal fundus. The first step is an image pre-processing phase to extract retina blood vessels. The contrast of the blood vessels from the retinal image ba...
Conference Paper
Full-text available
This paper represents a survey of the state of art reached in 3D Face Recognition frameworks and show some different approaches developed and tested by some of its authors during the last years. In previous work we have presented a novel approach to 3D stereo-matching which uses an evolutionary algorithm in order to optimise 3D reconstruction. Comm...

Questions

Question (1)
Question
Ignoring the medical and psychological aspects, i see this topic as an interesting debate about computer vision and artificial intelligence:
1) the computer vision can give answers on how human subjectivity
can alter even the simplest decision processes ( an algorithm or a reference system created by human can be affected by uncertainty due to its subjectivity )
2) it is an evidence of the importance of fuzzy modeling also in the simplest decision logics
3) considering the histogram of the image colors , the technique of histogram specification applied to other photos could alter the perception of other ones and get similar results from the people
What do you think about?

Network

Cited By

Projects

Projects (2)
Project
We shall revert with info in few weeks after the completion of the presentation procedure