
Vito Santarcangelo- Researcher
- Research Director at iinformatica Srl
Vito Santarcangelo
- Researcher
- Research Director at iinformatica Srl
About
69
Publications
43,219
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
220
Citations
Introduction
Current institution
iinformatica Srl
Current position
- Research Director
Publications
Publications (69)
In recent years, digital technologies and serious game have widely affected the cultural heritage sector, offering incredible opportunities to enhance the experiential value of heritage assets and improve cultural activities. Due to pandemic and the closure of museums the demand for new digital remote solutions for Cultural Heritage has seen a grea...
This research paper was created to tackle the issue of sustainability by exploiting new artificial intelligence and machine learning models such as ChatGPT, a prototype chatbot for natural language processing which, thanks to advanced machine learning algorithms, can generate responses that are completely similar to human responses. The texts in th...
This paper shows a real overview of the interconnection and automated integration of 4.0 machinery within the supply chain or logistics of two companies in the southern Italian territory. The authors provide an exhaustive analysis of the Italian legislation and the strict requirements in order to assess which investments are part of Industry 4.0 wi...
This volume collects the contributions presented at the conference “Data-driven Decision Making” organized by the Italian Association for Applied Statistics, held in Genoa from 12 to 14 September 2022. The papers cover a broad range of topics, with a common thread: the use of statistical methods to support decision-making both in public administrat...
This volume collects the contributions presented at the conference “Data-driven Decision Making” organized by the Italian Association for Applied Statistics, held in Genoa from 12 to 14 September 2022. The papers cover a broad range of topics, with a common thread: the use of statistical methods to support decision-making both in public administrat...
The traceability of the supply chain with strict compliance with the specification to demonstrate in "transparency" the production processes in compliance with legislation and from a corporate social responsibility perspective, represents a fundamental requirement at the basis of competitive advantage in the food industries (Patelli and Mandrioli,...
The present work shows the importance of the Big Data Analytics (Anisetti et al, 2018) scenario applied to corporate COVID-19 compliance, following the concept of “accountability” related privacy issues introduced by the new General Data Protection Regulation. This compliance approach is very useful for territorial security, environmental monitorin...
This paper shows a revolutionary approach about Semantic Block-chain and relative fuzzy approach. Blockchain is characterized by proof of work approach, which logic is to be solved by miner. Our analysis is focused on potentiality of semantic proof of work, that adds a lot of complexity to the mining scope. The fuzzy hashing approach is the key to...
This paper presents Visual Market Basket Analysis (VMBA), a novel application domain for egocentric vision systems. The final goal of VMBA is to infer the behavior of the customers of a store during their shopping. The analysis relies on image sequences acquired by cameras mounted on shopping carts. The inferred behaviors can be coupled with classi...
In the healthcare sector, information is the most important aspect, and the human body in particular is the major source of data production: as a result, the new challenge for world healthcare is to take advantage of these huge amounts of data de-structured among themselves. In order to benefit from this advantage, technology offers a solution call...
In the Network Society the use of hashtags has become a daily routine for the participation on the Big Conversation Iorio and Ruoto (Nessun tempo, 2015). Designated by a ‘hash’ symbol (#), a hashtag is a keyword assigned to information that describes it and aides in searching. Hashtags are now central to organize information on Social Networks. Has...
Nowadays, it is easy to trace a large amount of information on the web, to access documents and produce a digital storage.
The current work is submitted as an introduction to an innovative system for the investigation about notoriety of web data which is based on the evaluation of judicial sentences and it is implemented to reduce the duration of a...
Metodo di localizzazione intelligente di oggetti basato sulla computer vision in un'area delimitata
Metodo di identificazione avanzata basato sulla visione artificiale in un'area delimitata
The role of internet in our society is growing day by day and is becoming more and more the only way for getting information, exchange opinions and for improving our personal culture. So, an huge mole of data, in all fields, is today easily accessible and everybody can express and exchange ideas. This represents the greatness of the web. But at the...
Nowadays Cryptolocker is a real threat for business data. Business data are related to business value, then this is a further problem in an already difficult economic context. It is important to improve awareness on IT Security beginning from business environments [4], more and more affected by this threat. The current piece of work aims to show ho...
Sistema per la misurazione della variazione dello stato comportamentale di un interlocutore
This paper introduces a new application scenario for egocen-tric vision: Visual Market Basket Analysis (VMBA). The main goal in the proposed application domain is the understanding of customers behaviours in retails from videos acquired with cameras mounted on shopping carts (which we call narrative carts). To properly study the problem and to set...
Starting by the initial step of applying a simplified BSC model and a three to five successive key lead indicators, to make simple successive diagnosis and strategic decisions, the work describes the phase period, decisional process, followed to lead a Company Group to a new way of approaching and managing its future. The role of a sister Company p...
The Computer of 21st Century is called ubiquitous Computer. In present era of technology, computers are connected with each other through communication devices like Bluetooth, Infrared and Microwaves and communication links. The day to day increase in the importance and utilization of Ubiquitous computing in our daily life required new solutions. T...
A lot of information about processes is today available on internet, then it is possible to retrieve documents and produce a digital repository. Thanks to techniques of text mining is possible to extract information useful to reach the task of define a statistical index to describe the quality and efficiency in law. It is also possible to produce a...
Cloud Computing provides a scalable, high availability and low cost services over the Internet. The advent of
newer technologies introduces new risks and threats as well. Although the cloud has a very advanced structures and expansion of services, but security and privacy concerns have been creating obstacles for the enterprise to entirely shift to...
Process analysis and process control are two important business topics for the business improvement today.
ISO standards are based on the PDCA cycle, then workflow development and analysis is a very important task in all business scenarios.
However, the comparison between real and predefined workflows is a really important strategy to define the pr...
The role of internet in our society is growing day by day and is becoming more and more the only way for getting information, exchange opinions and for improving our personal culture. So, an huge mole of data, in all fields, is today easily accessible and everybody can express and exchange ideas. This represents the greatness of the web. But at the...
In the Network Society the use of hashtags has become a daily routine for the participation on the Big Conversation [3].
Designated by a ‘hash' symbol (#), a hashtag is a keyword assigned to information that describes it and aides in searching. Hashtags are now central to organize information on Social Networks. Hashtags organize discussion around...
“Analisi dell’affidabilità delle informazioni sul web” presenta un approccio innovativo per stima della “notoriety” (affidabilità) di una informazione presente sul web. Tale approccio di ingegneria forense consente di definire una metrica innovativa per l’analisi della qualità delle informazioni online , al fine di una loro usabilità all’interno di...
“Sentiment Analysis sui Social Network” presenta uno studio in merito all’analisi automatica delle opinioni presenti sui social network mediante tecniche dell’ingegneria dell’informazione. Sempre più i web crawler effettuano attività di text-mining intelligente delle informazioni presenti online, in particolar modo nei social network. L’analisi aut...
Il seminario “Internet delle cose fra opportunità e rischi” mostra una panoramica sull’internet delle cose dal punto di vista delle opportunità applicative e dal punto di vista dei rischi connessi alla sicurezza delle informazioni.
More and more innovations are introduced everyday, and consequently a lot of tools for communication tasks. However, some potentialities of these technologies are not explored. An example is represented by 2D BARCODE technology, that allows to hide a link, a text, a contact vcard inside. In this work after a presentation of 2D BARCODE technology in...
Cloud computing has brought new innovations in the paradigm of IT industry through virtualization and by offering low price services on pay-as-per-use basis. Since the development of cloud computing, several issues like security, privacy, cost, load balancing, power consumption, scheduling algorithms are still under research. Cloud simulators are u...
Today web data are one of the most important sources in all of the world interconnected through the internet network. Digital information, growing day by day, are becoming more and more important for people and business. At same time, the growing of fake data indubitably decreases the overall quality, that is an indispensable requisite for their us...
Opinion Mining or Sentiment Analysis is an important Computer Science topic, that allows the discovery of the
web user’s attitude on one or more topics. Marketing, Social Engineering and Information Retrieval are achieved through the application of Opinion Mining on Web Data. Today Social Networks represent one of the most important places on the w...
Heartbleed, a big Open Secure Socket Layer (OpenSSL) vulnerability appeared on the web on 7th April 2014.
This highly risked vulnerability enabled attackers to remotely read protected memory contents from Hyper Text Transfer Protocol Secure (HTTPS) sites. In this paper, the authors will review and analyze Heartbleed vulnerability effects on secured...
Tables for ISO 27001:2013’s evaluation for Cloud Computing
United States Department of Defense defines the Open Source Intelligence (OSINT) as “The intelligence discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information...
The process mining is defined as a research “to discover, monitor and improve real process (i.e., not
assumed processes) by extracting knowledge from event logs readily available in today’s system” [P. van der Aalst]. Discovering a process models by event logs and by actual process monitoring can be seen as a research field belonging to Big Data An...
More and more information appear in the web every day, in our world interconnected by the web. However, the growing of misinformation (unintentional inaccurate information) and disinformation (intentional inaccurate information) of the web contents introduces a lot of noise in the analysis and results of “Big Data”.
In this work we show a review ab...
More and more accommodations (hotels, b & b) are born in Italy and always the same are less sensitive to the problems of computer security related to the presence and sharing of web access in their structure. Sniffing, spoofing, poisoning and social engineering attacks can become a real problem for the business and customer connected to the accommo...
Digital Out Of Home (DOOH) applications which exploit computer vision algorithms to automatically collect soft bio-metrics of people in front a smart screen are of great interest for industry. In the last years many gender recognition pipelines have been proposed in literature. Different benchmark datasets have been introduced and used for testing...
L'obiettivo del presente lavoro, si traduce in un'analisi dettagliata e pratica degli strumenti digitali recentemente messi a disposizione della pubblica amministrazione per agevolare e snellire le procedure di comunicazione tra il cittadino/imprese e le amministrazioni pubbliche stesse. Strumenti che richiedono una modernizzazione reale degli Enti...
More and more accommodations (hotels, b & b) are born in Italy and always the same are less sensitive to the problems of computer security related to the presence and sharing of web access in their structure. Sniffing, spoofing, poisoning and social engineering attacks can become a real problem for the business and customer connected to the accommo...
Nel presente lavoro viene affrontata la tematica dei campi elettrici e
magnetici alle basse frequenze. In particolare, nel caso di studio in oggetto,
viene effettuata una revisione di letteratura dal punto di vista dell’impatto
biologico, questione oggi di estrema attualità, per la sempre più crescente
diffusione di dispositivi elettrici ed elettro...
Sistema per la progettazione e il monitoraggio di tecnologie fosforescenti
Sistema per la determinazione e il monitoraggio del livello di inquinamento dovuto ad agenti foto
catalizzabili mediante nanotecnologia attiva in un'area delimitata.
Riassunto Il lavoro offre una panoramica sullo spoofing (falsificazione di identità), tematica di notevole attualità, riguardante le comunicazioni telematiche. Telefonate, fax, sms e e-mail sono i principali mezzi utilizzati dalla Social Engineering (ingegneria sociale) per compiere azioni illecite. L'obiettivo del lavoro è di contribuire alla cono...
Il lavoro presenta un'analisi dettagliata di una indagine informatica, sia per richiamare
l’attenzione sui rischi connessi anche ad un uso del tutto lecito di uno strumento
informatico, sia per cercare di comunicare agli esperti alcuni possibili gravi errori
procedurali assolutamente da evitare, sia, infine, per sensibilizzare coloro che,
eventualm...
Riassunto Nel lavoro viene presentata la piattaforma hardware e software open-source Arduino utile per la progettazione e la implementazione di strumenti personalizzati per il monitoraggio di parametri ambientali. Nel caso di studio in oggetto, viene utilizzato un sistema, realizzato in Arduino, per il monitoraggio della tossicità da VOC (Composti...
Nel presente lavoro viene introdotto, inizialmente, il concetto di telemedicina con relativi esempi. Fra questi vengono citati applicativi per Iphone in ambito medico, che consentono la automedicazione con farmaci senza prescrizione medica. Vengono, quindi, introdotte le idee innovative riguardanti la realizzazione di sistemi esperti per la gestion...
The aim of this paper is to show the application of a Thesaurus based approach to several issues of interest for an Italian Publishing House. Final experimental results reveal good performance in terms of rate of retrieval and recall and then encourage the prosecution of the multidisciplinary research.
The present paper stresses the potentiality of RDF and the possibility of its application in medicine. The most important
areas where semantic medicine is applied are the ontology for indexing of publications and the organization of patient data
for diagnosis. In this paper breast cancer patient data organization has been considered. This assessmen...
In this paper, two different methodologies respectively based on an unsupervised self-organizing (SOM) neural network and on a graph matching are shown and discussed to validate the performance of a new 3D facial feature identification and localization algorithm. Experiments are performed on a dataset of 23 3D faces acquired by a 3D laser camera at...
This paper represents a survey of the state of art reached in 3D Face Recognition frameworks and show some different approaches developed and tested by its authors. We have designed a strong algorithm that is based on genetic algorithms, Principal Component Analysis (PCA) and face geometry assumptions, for head pose normalization of 3D scanned face...
Nel presente lavoro si dimostra, inizialmente, la potenzialità di alcuni strumenti di apprendimento basati su algoritmi attualmente disponibili nella piattaforma WEKA di Pentaho, sempre più utilizzata sia in ambito sanitario scientifico sia in ambito professionale. Successivamente, si presenta un nuovo ambiente progettato e implementato presso il D...
The automatic screening of retinal images for an early detection of diabetic symptoms and an early prevention of diabetic retinopathies has been a prime focus in recent times. In this paper a contribution to improve diabetic damage detection in retinal images via neural networks is proposed by comparing two neural strategies. By considering the fir...
In this paper, starting to the previous work on 3D face recognition, is presented an optimization of the search of the points
ALS and ALD of the nose and a new graph approach for the recognition base on several new points. Experiments are performed
on a dataset (44 3D faces) acquired by a 3D laser camera at eBIS lab with pose and expression variati...
This paper describes a comparative study between an Artificial Neural Network (ANN) and a geometric technique to detect for biometric applications,the bifurcation points of blood vessels in the retinal fundus. The first step is an image pre-processing phase to extract retina blood vessels. The contrast of the blood vessels from the retinal image ba...
This paper represents a survey of the state of art reached in 3D Face Recognition frameworks and show some different approaches developed and tested by some of its authors during the last years. In previous work we have presented a novel approach to 3D stereo-matching which uses an evolutionary algorithm in order to optimise 3D reconstruction. Comm...
Questions
Question (1)
Ignoring the medical and psychological aspects, i see this topic as an interesting debate about computer vision and artificial intelligence:
1) the computer vision can give answers on how human subjectivity
can alter even the simplest decision processes ( an algorithm or a reference system created by human can be affected by uncertainty due to its subjectivity )
2) it is an evidence of the importance of fuzzy modeling also in the simplest decision logics
3) considering the histogram of the image colors , the technique of histogram specification applied to other photos could alter the perception of other ones and get similar results from the people
What do you think about?