72 results on '"Cozzolino, G."'
Search Results
2. Analyse digital forensic evidences through a semantic-based methodology and NLP techniques
- Author
-
Amato, F., Cozzolino, G., Moscato, V., and Moscato, F.
- Published
- 2019
- Full Text
- View/download PDF
3. Why are so huge differences reported in the occurrence rate of skin lipohypertrophy? Does it depend on method defects or on lack of interest?
- Author
-
Brancario, C., Corigliano, M., Cozzolino, G., Improta, M.R., Fasolino, A., Lamberti, C., Lapice, M., Martino, C., Oliva, D., Raffaele, A., Selleri, A., Simonetti, R., Stile, A., Vecchiato, A., Vetrano, A., Volpe, P., Caputo, G., Del Sorbo, A., Di Capua, M.G., Durazzo, G., Egidio, M., Garofalo, G., Grasso, L., Meo, A., Murano, A., Perillo, L., Procida, R., Vietsi, F., Gentile, S., Strollo, F., and Guarino, G.
- Published
- 2019
- Full Text
- View/download PDF
4. Privacy-aware design for E-Health Information Systems
- Author
-
Amato, F., Cozzolino, G., Moscato, F., Moscato, V., Picariello, A., Sperli, G., Amato, F., Cozzolino, G., Moscato, F., Moscato, V., Picariello, A., and Sperlì, G.
- Subjects
Formal verification ,E-health ,Model driven engineering ,Multi agent systems - Abstract
Many research works had the aim of creating frameworks able to model systems, of defining their requirements and properties, and of verifying their satisfiability. Many approaches involve the usage of the Model Driven Engineering throughout the whole system lifecycle in order to build systems that are correct by construction. Using models as primary artefacts helps to reduce costs and time of development. The possibility of having automatic code generation from model tools en- A ct the possibility to produce (theoretically) bug-free code starting from correct models. In this work we describe the usage of a modelling and verification tool, MetaMORP(h)OSY, for performing quality control in E-Health Domain. © 2020 CEUR-WS. All rights reserved.
- Published
- 2020
5. Vanadium: A Transition Metal for Sustainable Energy Storing in Redox Flow Batteries
- Author
-
Dassisti, M., Mastrorilli, P., Rizzuti, A., Cozzolino, G., Chimienti, M., Olabi, A.G., Matera, F., Carbone, A., and Ramadan, Mohamad
- Published
- 2015
- Full Text
- View/download PDF
6. Is pizza sutable to type 1 diabetes? A real life identification of best compromise between taste and low glycemic index in patients on insulin pump.
- Author
-
Della-Corte, T., Gentile, S., Di Blasi, V., Guarino, G., Corigliano, M., Cozzolino, G., Fasolino, A., Martino, C., Improta, M.R., Oliva, D., Lamberti, C., Vecchiato, A., Vaia, S., Satta, E., Romano, C., Alfarone, C., and Strollo, F.
- Abstract
Opposed to whole wheat (WWP), traditional pizza (TP) is loved by patients with type 1 diabetes mellitus (T1DM) despite causing hyperglycemia. 50 well-trained T1DM patients had higher glucose levels after TP than after WWP or mixed flour pizza, which however was tasty, digestible and metabolically appropriate to break diet monotony. Image 1 • Consumption of traditional pizza causes high post meal glucose levels in patients with diabetes, especially those with type 1 disease. • Traditional pizza causes high post meal glucose levels in type 1 diabetes disease. 50 patients with type 1 diabetes, we compared effects of refined (traditional), whole wheat and mixed flour pizzas. • The latter two varieties cause lower glucose post meal hyperglycemia, and also have a pleasant taste. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
7. Investigation on a new mixed acid based support electrolyte for a Vanadium Redox FLow Battery
- Author
-
Mastrorilli, P, Rizzuti, A, Dassisti, M, Cozzolino, G, and Chimienti, M
- Subjects
Sustainability ,Energy management - Published
- 2014
8. Vapor Condensation for Particulate Abatement
- Author
-
de Joannon M., Cozzolino G., Sabia P., Ragucci R., and Cavaliere A.
- Subjects
heterogeneous condensation ,flue gas cleaning ,pollutant - Abstract
The reduction of particulate emission is among the most challenging problems in research field of pollutant control in combustion systems. This is due to very low efficiency of conventional separators, such as electrostatic precipitator, cyclone wet scrubber, in the collection of submicronic particles. To increase the diameter of fine and ultrafine particles by means of condensation of water vapor on the particles themselves seems to be a promising technique for industrial applications [1, 2]. Although several data are present in literature in the field of meteorology, cloud physics and aerosol science on nucleation and growth of droplets on foreign nuclei, a systematic analysis on dependence of such a process on parameters relevant from industrial point of view is not yet available. As a matter of a fact, temperature, partial pressure, properties of solid nuclei strongly affect the characteristic time and the efficiency of heterogeneous nucleation and the related dependence are needed for a proper design of a real abatement device. The aim of this work is to summarize the main physical relations governing the nucleation process and to describe the criteria followed in the design and set up of an experimental apparatus realized for the study of heterogeneous nucleation on submicronic particles in different conditions.
- Published
- 2009
9. Oxidative stress and physiological defences in the sea bass, Dicentrarchus labrax
- Author
-
CIARCIA, GAETANO, GUERRIERO, GIULIA, ABRESCIA, PAOLO, COZZOLINO G., PAOLUCCI M., Ciarcia, Gaetano, Guerriero, Giulia, Abrescia, Paolo, Cozzolino, G., and Paolucci, M.
- Published
- 1998
10. Sustainability of vanadium redox-flow batteries: Benchmarking electrolyte synthesis procedures.
- Author
-
Dassisti, M., Cozzolino, G., Chimienti, M., Rizzuti, A., Mastrorilli, P., and L'Abbate, P.
- Subjects
- *
VANADIUM redox battery , *ELECTROLYTES , *CHEMICAL synthesis , *FEASIBILITY studies , *ELECTROLYTIC reduction , *CHEMICAL reduction - Abstract
This work focuses on the assessment, in terms of effectiveness, feasibility and sustainability, of three different procedures for the synthesis of vanadium-based mixed-acid electrolytes to be used in vanadium redox-flow batteries (VRFBs). Procedures considered consisted in: a) the mere mixing of suitable vanadium precursors (Electrolyte A); b) the chemical reduction of V 2 O 5 by oxalic acid (Electrolyte B); c) the electrochemical reduction of V 2 O 5 using a home-made “H-shaped” electrolysis cell (Electrolyte C). VRFB properties such as energy efficiency, mean charge–discharge voltages, cycle duration as well as stability and conductivity of the electrolyte were analysed and compared with the state-of-the-art. Experimental tests carried out on a laboratory scale VRFB battery comprised: thermal stability test, cyclic voltammetry, electrochemical impedance spectroscopy measurements and charge–discharge tests. A Life Cycle Assessment of the three electrolytes is also presented for benchmarking purposes. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
11. Heterogeneous nucleation activation in a condensational scrubber for particulate abatement
- Author
-
de Joannon, M., Cozzolino, G., Cavaliere, A., and Ragucci, R.
- Subjects
- *
INHOMOGENEOUS materials , *NUCLEATION , *CONDENSATION , *SCRUBBER (Chemical technology) , *PARTICULATE matter , *TEMPERATURE effect - Abstract
Abstract: The effectiveness of a condensational growth technique for particle abatement, activated via heterogeneous nucleation, was evaluated both theoretically and experimentally. Based upon information present in the literature, the heterogeneous nucleation rate and particle activation probability were estimated as a function of the environmental conditions. This work demonstrated that it is possible to capture the dispersed particles in the water droplets with high efficiency, depending on operating conditions. Increased final particle size, which improves removal from the gas stream, was found with relatively high inlet vapor concentrations and low working temperatures. It is also worth noting that extreme working conditions might be useful for the particle coverage. In fact, both nucleation and growth processes are active at very low vapor concentrations, although the maximum growth factor at these conditions is relatively low. Although it is not valid in predicting the induction time, a theoretical evaluation of the activation probability provides an indication of the process effectiveness at high vapor concentrations and low inlet temperatures. In contrast, at low vapor concentrations, this method fails to predict the occurrence of the vapor condensation on particles. At the experimentally evaluated conditions, the characteristic induction and growth times are compatible with practical applications. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
12. Pyrolitic and Oxidative Structures in Hot Oxidant Diluted Oxidant (HODO) MILD Combustion.
- Author
-
de Joannon, M., Sabia, P., Cozzolino, G., Sorrentino, G., and Cavaliere, A.
- Subjects
PYROLYSIS ,OXIDATION ,OXIDIZING agents ,COMBUSTION ,CHEMICAL structure ,DIFFUSION ,CHEMICAL kinetics - Abstract
The typical reactive structure stabilized in a diffusion layer in standard conditions can be significantly modified whether injected flows are diluted and/or preheated. The flow high initial enthalpy and the low fuel and/or oxygen concentration can drastically modify the structure of the oxidative and pyrolytic region due to change of the physical and chemical kinetics respect to conventional diffusion flame. Such operative conditions are typical of MILD (Moderate or Intense Low-oxygen Dilution)combustion processes. The effect of inlet conditions on the stabilized reactive structure has been studied by analyzing the behavior of a steady, one-dimensional diffusive layer. The change of the structures of the reactive region induced by a hot oxidant and diluted oxidant flow (HODO) fed towards a fuel jet at environmental temperature was numerically analyzed by means of temperature and heat release profiles, that are key parameters to understand the main features of the reactive region. In addition, the effect of diluent nature was studied by comparing the reactive structures also obtained with steam and carbon dioxide. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
13. Inhibition of HBsAg Immunologic Reactivity and Intestinal Aerobic Flora.
- Author
-
Molinari, V., Cacciatore, L., Cozzolino, G., and Piazza, M.
- Published
- 1975
- Full Text
- View/download PDF
14. Differential Diagnosis between Hepatic Cirrhosis and Chronic Active Hepatitis: Specificity and Sensitivity of Physical and Laboratory Findings in a Series from the Mediterranean Area.
- Author
-
Cozzolino, G., Lonardo, A., Francica, G., Amendola, F., and Cacciatore, L.
- Subjects
CIRRHOSIS of the liver ,CHRONIC active hepatitis ,HYPOCHOLESTEREMIA ,BLOOD platelets ,JAUNDICE - Abstract
Sensitivity and specificity of physical and laboratory findings have been evaluated for the purpose of establishing a differential diagnosis between cirrhosis and chronic active hepatitis on clinicolaboratory grounds. Data from 213 patients from southern Italy with biopsyproven chronic active hepatitis or cirrhosis have been studied retrospectively. Splenomegaly, hypocholesterolemia, and decreased sulfobromophthalein-K
i were among the most sensitive individual findings in cirrhosis, whereas decreased platelet count, jaundice, and hypoprothrombinemia were the most specific ones. The presence in the same patient of both one of the former and one of the latter findings yields a correct diagnosis of cirrhosis with at least 90% likelihood. Advantages of the proposed diagnostic technique and comparison with data from an American series are discussed. [ABSTRACT FROM AUTHOR]- Published
- 1983
15. Extracting Information from Food-Related Textual Sources
- Author
-
Francesco Bonavolonta, Alessandra Amato, Giovanni Cozzolino, Amato, A., Bonavolonta, F., and Cozzolino, G.
- Subjects
Information retrieval ,Exploit ,Computer science ,media_common.quotation_subject ,020208 electrical & electronic engineering ,Experimental data ,02 engineering and technology ,Python (programming language) ,Image (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,020201 artificial intelligence & image processing ,Prejudice ,computer ,Simple (philosophy) ,media_common ,computer.programming_language - Abstract
Often when we think of the world of analysis, we always think of numerical experimental data that will then have to be somehow processed and then visualized on a graph. In reality, analysis has no prejudice regarding the type of “data to be analyzed”. This can be a simple number and an image, a sound, or even a text. And it is precisely the analysis of texts, and in particular of the language used, that we will discuss in this article. This article aims to exploit Python libraries that allow Language Processing and text analysis in general to extract the information of interest.
- Published
- 2021
16. Analysis of COVID-19 Data
- Author
-
Giovanni Cozzolino, Serena Pelosi, Alessandro Maisto, Alessandra Amato, Amato, A., Cozzolino, G., Maisto, A., and Pelosi, S.
- Subjects
2019-20 coronavirus outbreak ,020205 medical informatics ,Coronavirus disease 2019 (COVID-19) ,Computer science ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,0202 electrical engineering, electronic engineering, information engineering ,02 engineering and technology ,Python (programming language) ,Data science ,computer ,computer.programming_language - Abstract
A lot of research has been done during the first months of 2020 regarding the Covid-19. Researchers of different fields worked and cooperated to understand the virus better, in order to manage the pandemic and to model its spread. A series of tools have been developed in this sense, but there is a lack of work with regards to what has been developed from the scientific community. We would like to, at least partially, summarise the results obtained so far by analysing some of the published papers on the matter. To achieve such a result, we are going to use different python libraries that allow analysing texts. The entire work has been done with python on the Google Colaboratory platform.
- Published
- 2021
17. A model for verification and validation of law compliance of smart contracts in IoT environment
- Author
-
Giovanni Cozzolino, Francesco Moscato, Flora Amato, Vincenzo Moscato, Fatos Xhafa, Universitat Politècnica de Catalunya. Departament de Ciències de la Computació, Universitat Politècnica de Catalunya. IMP - Information Modeling and Processing, Amato, F., Cozzolino, G., Moscato, F., Moscato, V., and Xhafa, F.
- Subjects
Internet of things ,Smart contract ,Industry 4.0 ,Internet de les coses ,Computer science ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Computer security ,computer.software_genre ,Cadena de blocs (Bases de dades) ,Blockchain ,Unified Modeling Language ,Internet of Things (IoT) ,Multiagent systems ,Smart contracts ,Electrical and Electronic Engineering ,Informàtica::Arquitectura de computadors [Àrees temàtiques de la UPC] ,computer.programming_language ,Soundness ,business.industry ,Multi-agent system ,Industry 4.0 [Blockchain] ,Automation ,Computer Science Applications ,Innovacions tecnològiques ,Blockchains (Databases) ,Control and Systems Engineering ,Software agent ,Multiagent system ,Technological innovations ,business ,computer ,Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Internet [Àrees temàtiques de la UPC] ,Information Systems ,Verification and validation - Abstract
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works The interest of Industry 4.0 in smart contracts and blockchain technologies is growing up day by day. Smart contracts have enabled new kinds of interactions whereby contractors can even fully automate processes they agree on. This technology is really appealing in Internet of Things (IoT) domain because smart devices generate events for software agents involved in a smart contract execution, making full automation possible. However, smart contracts have to comply with national and international laws and accountability of participant's actions. Soundness of a smart contract has to be verified in terms of law compliance. Here, we propose a model for verification and validation of law compliance of smart contracts in IoT environments. The main goal of this article is to propose a formal model (based on multiagent logic and ontological description of contracts) for validating law compliance of smart contracts and to determine potential responsibilities of failures
- Published
- 2021
- Full Text
- View/download PDF
18. Cognitive Analysis in Social Networks for Viral Marketing
- Author
-
Francesco Moscato, Aniello Castiglione, Giovanni Cozzolino, Vincenzo Moscato, Castiglione, A., Cozzolino, G., Moscato, F., and Moscato, V.
- Subjects
Computer science ,02 engineering and technology ,computer.software_genre ,influence diffusion ,Viral marketing ,viral marketing ,0202 electrical engineering, electronic engineering, information engineering ,Selection (linguistics) ,Electrical and Electronic Engineering ,Viral Marketing, Cognitive Analytics, Online Social Networks models, Influence Diffusion, Influence Maximization ,Graph database ,Social network ,business.industry ,020208 electrical & electronic engineering ,Behavioral pattern ,Cognition ,Maximization ,Cognitive analytics ,Data science ,Computer Science Applications ,Control and Systems Engineering ,influence maximization (IM) ,online social networks (OSN) models ,Graph (abstract data type) ,business ,computer ,Information Systems - Abstract
Viral Marketing can be considered as the modern version of the ancient "word-of-mouth" advertising, in which companies choose a restricted number of persons, considered "influential", recommending them products or services that will be thus iteratively suggested. In this paper, we propose cognitive models and algorithms for marketing applications through Online Social Networks, considered as a graph database, and define the concept of influence graph leveraging particular user behavioral patterns, by querying the initial heterogeneous graph network. We also model the diffusion across the network, without any preliminary information, as a Combinatorial Multi-Armed Bandit problem, for the selection of most influential users. We have used the YELP social network as case study for our approach, showing how it is possible to generate an influence graph considering several kinds of relevant paths (mainly considering reviews to the same firms) by which a user can influence other ones. Several experiments have been carried out and discussed, putting into evidence the effectiveness and efficacy of the proposed methods for influence maximization with respect to other approaches of state of the art.
- Published
- 2021
19. A Security and Privacy Validation Methodology for e-Health Systems
- Author
-
AmatoFlora, MazzoccaNicola, De BenedictisAlessandra, MoscatoFrancesco, CasolaValentina, CozzolinoGiovanni, Amato, F., Casola, V., Cozzolino, G., De Benedictis, A., Mazzocca, N., and Moscato, F.
- Subjects
Formal methods for security validation ,Computer Networks and Communications ,Computer science ,Remote patient monitoring ,Process (engineering) ,E-Health management systems ,Security and privacy for e-Health data ,Security and privacy validation ,020207 software engineering ,02 engineering and technology ,E-Health management system ,Risk analysis (engineering) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Healthcare system - Abstract
e-Health applications enable one to acquire, process, and share patient medical data to improve diagnosis, treatment, and patient monitoring. Despite the undeniable benefits brought by the digitization of health systems, the transmission of and access to medical information raises critical issues, mainly related to security and privacy. While several security mechanisms exist that can be applied in an e-Health system, they may not be adequate due to the complexity of involved workflows, and to the possible inherent correlation among health-related concepts that may be exploited by unauthorized subjects. In this article, we propose a novel methodology for the validation of security and privacy policies in a complex e-Health system, that leverages a formal description of clinical workflows and a semantically enriched definition of the data model used by the workflows, in order to build a comprehensive model of the system that can be analyzed with automated model checking and ontology-based reasoning techniques. To validate the proposed methodology, we applied it to two case studies, subjected to the directives of the EU GDPR regulation for the protection of health data, and demonstrated its ability to correctly verify the fulfillment of desired policies in different scenarios.
- Published
- 2021
20. A Smart ChatBot for Specialist Domains
- Author
-
Vincenzo Moscato, Roberto Canonico, Antonio Picariello, Giovanni Cozzolino, Giancarlo Sperlì, Fabio Raimondo Sorrentino, Antonino Ferraro, Canonico, R., Cozzolino, G., Ferraro, A., Moscato, V., Picariello, A., Sorrentino, F. R., and Sperlì, G.
- Subjects
Cultural heritage ,Software ,Computer science ,Order (business) ,Human–computer interaction ,business.industry ,Interface (computing) ,computer.software_genre ,business ,Chatbot ,computer ,Domain (software engineering) - Abstract
Artificial Intelligence application are becoming increasingly complex and sophisticated in order to shorten the gap between the users and digital systems. Nowadays, researchers and companies are making a big effort to develop new forms of interactions with a growing number and kinds of electronic devices, with a particular attention on the conversational interface, spoken or written. A chatbot is software that simulates and processes human conversations, allowing users to interact with digital devices as if they were communicating with a real person. In this paper we introduce a Chatbot for the cultural heritage domain [1], able to respond to a simple single-line query or to suggest users, as a digital assistants, by providing increasing levels of customisation through the collection and the processing of users’ conversations. © 2020, Springer Nature Switzerland AG.
- Published
- 2020
21. Monitoring Airplanes Faults Through Business Intelligence Tools
- Author
-
Alessandro Maisto, Serena Pelosi, Giovanni Cozzolino, Alessandra Amato, Amato, A., Cozzolino, G., Maisto, A., and Pelosi, S.
- Subjects
On board ,Data processing ,Data visualization ,Work (electrical) ,business.industry ,Computer science ,Order (business) ,Business intelligence ,business ,Software engineering ,Visualization - Abstract
In this work we propose a tool able to monitor aeroplanes crashes, providing reports and views to managers, in order to improve services for the safety of passengers on board. We exploited Business Intelligence data visualisation tools functionalities to design specific data processing phases, from the pre-processing to the cleaning and filtering and finally visualisation of the reports. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.
- Published
- 2020
22. C’meal! the chatbot for food information
- Author
-
Giovanni Cozzolino, Alessandra Amato, Amato, A., and Cozzolino, G.
- Subjects
World Wide Web ,020205 medical informatics ,Computer science ,Rank (computer programming) ,Recipe ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,computer.software_genre ,Chatbot ,computer ,Relevant information - Abstract
Conversational systems are growing their success among users thanks to their ability to collect and rank users’ preferences and provide them relevant information in a simple way. In this paper we present C’Meal, a chatbot-based conversational framework which, given some ingredients and other requests entered by the user as input, researches the most appropriate recipe. Two categories of people are addressed in the program: those who want to discover new recipes, and those who want to create a recipe with the few ingredients left in the fridge to reduce food waste. The user must formulate his request in both cases by inserting the desired ingredients and other specific requests as a meal type or method of cooking. © Springer Nature Switzerland AG 2021.
- Published
- 2020
23. SafeEat: Extraction of information about the presence of food allergens in recipes
- Author
-
Giovanni Cozzolino, Alessandra Amato, Amato, A., and Cozzolino, G.
- Subjects
Allergic reaction ,Exploit ,Computer science ,020209 energy ,Recipe ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,Food allergens ,Data science - Abstract
The application of artificial intelligence is becoming increasingly complex and sophisticated to shorten the gap between users and digital systems. IA techniques can bring a lot of advantage in facing the issue of allergic reaction related to food allergies. Recognising and avoiding the foods on which it is based is an effective way to avoid an allergic reaction. To identify possible allergens, it is important to read the food labels carefully or to know what are the ingredients from which it is made. In this paper we present a system that exploits the techniques and tools of Artificial Intelligence to extract and analyse the ingredients of a recipe, and alert the user to the presence of possible allergens. The performed experimentation shows that the system can alert the user of allergens in Wikipedia Cookbok dataset recipes. © Springer Nature Switzerland AG 2021.
- Published
- 2020
24. Design of a Cloud-Oriented Web Application for Legal Conflict Resolution Through Equitative Algorithms
- Author
-
Francesco Romeo, Giovanni Cozzolino, Marco Giacalone, Alessandra Amato, Flora Amato, Amato, F., Cozzolino, G., Giacalone, Marco, Romeo, F., Law Science Technology and Society, and Metajuridica
- Subjects
Signal processing ,Service (systems architecture) ,business.industry ,Computer science ,End user ,Computer Networks and Communications ,Intelligence ,Cloud computing ,Algorithm ,Software ,Control and Systems Engineering ,Conflict resolution ,Artificial ,Web application ,The Internet ,Architecture ,Resolution ,business ,Cloud - Abstract
With the terms “Cloud Computing” we mean a model in which computation, software and storage resources do not require knowledge of the physical location and configuration of the system that provides the service in question by the end user. Thanks to the widespread use of the Internet, applications can now be used as services on the network. Many interesting areas of application are enjoying of these benefits, such as legal domain: The use of systems for conflict resolution can help lawyers, mediators and judges with the objective to reach an agreement between the parties. In this paper we introduce the architecture of a cloud-oriented web application, developed within the European project CREA (Conflict Resolution with Equitative Algorithms, Figure). Its objective is the application of algorithms to solve civil matters, into the allocation of goods, leading the parties to a friendly solution before or during the trial comparison. © Springer Nature Switzerland AG 2020.
- Published
- 2020
25. Artificial Intelligent ChatBot for Food Related Question
- Author
-
Antonino Ferraro, Alessandra Amato, Giovanni Cozzolino, Amato, A., Cozzolino, G., and Ferraro, A.
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,Closing (real estate) ,Context (language use) ,computer.software_genre ,Chatbot ,Domain (software engineering) ,Order (business) ,Reading (process) ,Artificial intelligence ,business ,computer ,Word (computer architecture) ,media_common - Abstract
This work wants to simulate dialogue with an artificial intelligent ChatBot, which reading the questions from clients, analysing each word and searching for a keyword tries to build the correct answer. The application’s domain chosen concerns a culinary context, in which our ChatBot represents the waiter, ready to take orders and give some more information about the restaurant. The user will be able to: Order one or more courses from the menu, get restaurant’s information about daily opening and closing times, get restaurant’s information about taking order away, get the full list containing his/her orders. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.
- Published
- 2020
26. Ultrasonographic findings in two cases of xanthogranulomatous cholecystitis
- Author
-
Varriale, A., Sperandeo, M., Sperandeo, G., and Cozzolino, G.
- Published
- 1991
- Full Text
- View/download PDF
27. Alpha-L-fucosidase in the diagnosis of hepatocellular carcinoma
- Author
-
Matarazzo, M., Varriale, A., Morante, R., De Marco, F., Cigolari, S., Albore, S., Cozzolino, G., and Giardina, M.G.
- Published
- 1991
- Full Text
- View/download PDF
28. Comparison of effect of alfa interferon in italian patients with cryptogenetic chronic active hepatitis and in patients with posttransfusion chronic active hepatitis non A non B
- Author
-
Marcellin, P., Cerini, R., Ginstra, E., Cozzolino, G., Bover, N., Dionisio, M., Cacciatore, L., and Benhamou, J.P.
- Published
- 1989
- Full Text
- View/download PDF
29. Trust Analysis for Information Concerning Food-Related Risks
- Author
-
Alessandra Amato, Giovanni Cozzolino, Amato, A., and Cozzolino, G.
- Subjects
Identification (information) ,Advertising campaign ,Social network ,Exploit ,business.industry ,Computer science ,Semantic analysis (knowledge representation) ,Social media ,business ,Set (psychology) ,Data science ,Publication - Abstract
In last years many business activities, scientific researches and applications exploit social networks as important sources for gathering data with different aims. Knowing the habits and preferences of user can be useful for different purposes, firstly to build marketing and advertising campaigns, but also to analyse other social phenomena for statistics, demography or security reasons. Thanks to their wide adoption among people, social networks are becoming the first media adopted to publish and share real-time news about happening events and, consequently, also the main media to retrieve information on what happens around you. Taking into account this consideration, in this paper we investigate a methodology for semantic analysis of textual information obtained from social media streams, in order to perform an early identification of food contaminations. As a case study, we consider a set of reviews gathered from the social network Yelp [26], on which we perform the textual analysis foreseen in the proposed methodology. © 2019, Springer Nature Switzerland AG.
- Published
- 2019
30. Domain Formalization for Metaphorical Reasoning
- Author
-
Flora Amato, Giovanni Cozzolino, Francesco Moscato, Amato, F., Cozzolino, G., Moscato, F., and TBA
- Subjects
Cultural heritage ,Painting ,Computer science ,Linked data ,Variety (linguistics) ,Semantics ,Asset (computer security) ,Linguistics ,Figure of speech ,Domain (software engineering) - Abstract
It is commonplace that cultural heritage is always discussed and analysed by using references to figures of speech. In particular, metaphors and allegories are very frequent in ancient and historical documents, painting and sculptures. It is also frequent to have some hints about the assets and their authors by comparing their contents with elements in the domain of the figures of speech to which the asset refer. In order to enable reasoning by figures of speech, we propose here a methodology able to link concepts in the domain of cultural assets with concepts in the domain of the figure of speech. We show here how reasoning in all these domains help in discovering some elements related to the cultural heritage that humans may neglect at first glance. Our approach can be useful in a variety of applications related to cultural heritage such as semantics annotations, linked data, crowd-sensing, etc. © 2019, Springer Nature Switzerland AG.
- Published
- 2019
31. Textual Processing in Social Network Analysis
- Author
-
Walter Balzano, Giovanni Cozzolino, Flora Amato, Francesco Moscato, Alessandro De Luca, Amato, F., Balzano, W., Cozzolino, G., de Luca, A., Moscato, F., Barolli L., Takizawa M., Xhafa F., Enokido T., and de Luca, Alberto
- Subjects
World Wide Web ,Social network ,Computer science ,Process (engineering) ,business.industry ,Event (computing) ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,020201 artificial intelligence & image processing ,02 engineering and technology ,business ,Social network analysis ,Domain (software engineering) - Abstract
Social Networks are responsible of generating a huge amount of information, intrinsically heterogeneous and coming from different sources. In the social networks domain, the number of active users is impressive, active users process and publish information in different formats and data remain heterogeneous in their topics and in the published media (text, video, images, audio, etc.). In this work, we present a general framework for event detection in processing of heterogeneous data from social networks. The framework we propose, implements some techniques that users can exploit for malicious events detection on Twitter. © 2019, Springer Nature Switzerland AG.
- Published
- 2019
32. Using semantic tools to represent data extracted from mobile devices
- Author
-
Giovanni Cozzolino and Cozzolino, G.
- Subjects
0209 industrial biotechnology ,Information retrieval ,Computer science ,02 engineering and technology ,Semantics ,Data structure ,Ranking (information retrieval) ,Set (abstract data type) ,020901 industrial engineering & automation ,Data model ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,Representation (mathematics) ,Mobile device - Abstract
In this paper, it is proposed a novel data model for Multimedia Social Networks, i.e. particular social media networks that combine information on users belonging to one or more social communities together with the content that is generated and used within the related environments. The focus of the work is the representation of data coming from mobile devices, that enrich the set of information related to the media shared on social communities. The proposed model relies on the hypergraph data structure to capture and represent in a simple way all the different kinds of relationships that are typical of social media networks, and in particular among users and multimedia content. Some user and multimedia ranking functions are also introduced to enable different retrieval applications. Finally, some experiments concerning effectiveness of the approach for supporting relevant information retrieval activities are reported and discussed. © 2018 IEEE.
- Published
- 2018
33. Using multilayer perceptron in computer security to improve intrusion detection
- Author
-
Flora Amato, Giovanni Cozzolino, Emilio Vivenzio, Antonino Mazzeo, Amato, F. and Cozzolino, G. and Mazzeo, A. and Vivenzio, E., Howlett R.J., Jain L.C., Jain L.C., Howlett R.J., Jain L.C., De Pietro G., Gallo L., Amato, Flora, Cozzolino, Giovanni, Mazzeo, Antonino, and Vivenzio, Emilio
- Subjects
Generalization ,Network security ,Computer science ,Property (programming) ,Backpropagation ,Intrusion detection system ,Machine learning ,computer.software_genre ,Multimedia system ,Personal computing ,Multimedia service ,Performance of system ,Computer and network security ,Multilayer ,False positive paradox ,Multilayer perceptron ,Intrusion detection ,Multilayer neural network ,Hacker ,Security of data, Common interest ,Intrusion Detection System ,Multi layer perceptron ,Artificial neural network ,Backpropagation algorithm ,business.industry ,Mercury (metal) ,Sigmoidal activation function ,Neural network ,Training epochs, Network security ,Interactive computer system ,Generalization propertie ,Learning system ,Artificial intelligence ,business ,computer ,Neural networks - Abstract
Nowadays computer and network security has become a major cause of concern for experts community, due to the growing number of devices connected to the network. For this reason, optimizing the performance of systems able to detect intrusions (IDS - Intrusion Detection System) is a goal of common interest. This paper presents a methodology to classify hacking attacks taking advantage of the generalization property of neural networks. In particular, in this work we adopt the multilayer perceptron (MLP) model with the back-propagation algorithm and the sigmoidal activation function. We analyse the results obtained using different configurations for the neural network, varying the number of hidden layer sand the number of training epochs in order to obtaina low number of false positives. The obtained results will be presented in terms of type of attacks and training epochs and we will show that the best classification is carried out for DOS and Probe attacks. © Springer International Publishing AG 2018.
- Published
- 2018
34. Correlation of digital evidences in forensic investigation through semantic technologies
- Author
-
Giovanni Cozzolino, Flora Amato, Nicola Mazzocca, Antonino Mazzeo, Amato, F. and Cozzolino, G. and Mazzeo, A. and Mazzocca, N., Enokido T., Takizawa M., Lin C.-Y., Hsu H.-H., Barolli L., Amato, Flora, Cozzolino, Giovanni, Mazzeo, Antonino, and Mazzocca, Nicola
- Subjects
Forensic investigation ,Computer science ,Computer crime ,media_common.quotation_subject ,Digital technologie ,02 engineering and technology ,Forensic data ,World Wide Web ,Presentation ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Digital forensic ,Digital investigator ,Digital evidence ,RDF ,Semantic Web ,media_common ,Event (computing) ,020207 software engineering ,computer.file_format ,Data science ,Forensic science ,Semantic Web, Analysis tool ,Semantic technology ,Semantic technologie ,Semantic Web technology, Digital devices ,computer - Abstract
Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply 'witness' of a criminal event. Forensic investigations include recovery, analysis and presentation of information stored in digital devices and related to computer crimes. These activities often involve the adoption of a wide range of imaging and analysis tools and the application of different techniques on different devices, with the consequence that the reconstruction and presentation activities result complicated. This work presents a method, based on Semantic Web technologies, that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstruction of events or actions in order to reach case conclusions. © 2017 IEEE.
- Published
- 2017
35. Semantic integration and correlation of digital evidences in forensic investigations
- Author
-
Nicola Mazzocca, Giovanni Cozzolino, Flora Amato, Amato, F., Cozzolino, G., and Mazzocca, N.
- Subjects
020203 distributed computing ,Process (engineering) ,Computer science ,business.industry ,Interoperability ,02 engineering and technology ,computer.file_format ,Data science ,020202 computer hardware & architecture ,Child pornography ,0202 electrical engineering, electronic engineering, information engineering ,Crime scene ,SPARQL ,The Internet ,Semantic integration ,business ,Semantic Web ,computer - Abstract
The growing adoption of digital and computer-related technologies has led to the increase of computer crimes occurrences. Today we are exposed to a great number of threats that involve IT technologies, such as terrorism or cyber-scams through Internet, child pornography, espionage and tampering of computer equipment. Digital investigations play a leading role to guarantee a legal use of digital technologies, as well to search for evidences left by the author of a crime. Digital investigations often combine a wide span of skills and require the adoption of different tools and techniques in order to capture, store and analyze evidences from a Computer Crime Scene. The lack of integration and interoperability between these tools protract the analysis process and pauperize presentation results for non-technical parties (from legal, academic or business areas). This work presents a method, based on Semantic Web technologies, to integrate, correlate and query different sources of forensic data with the goal of more valuable reconstruction of a case. © Springer International Publishing AG 2017.
- Published
- 2017
36. Pyrolitic and oxidative structures in HODO MILD Combustion
- Author
-
M. de Joannon, G. Cozzolino, G. Sorrentino, P. Sabia, CAVALIERE, ANTONIO, de Joannon, M., Cozzolino, G., Sorrentino, G., Sabia, P., and Cavaliere, Antonio
- Abstract
The typical reactive structure stabilized in a diffusion layer in standard conditions can be significantly modified whether injected flows are diluted and/or pre-heated. The increase of the fuel and/or oxidant flow dilution up to extreme conditions could lead to the formation of not ignitable mixtures so that the oxidation processes could be sustained just in case the pre-heating temperature of one of the two flows is high enough to promote the auto-ignition of the system. The flows high initial enthalpy and the low fuel and/or oxygen concentration can drastically modify the structure of the oxidative and pyrolytic region due to change of the physical and chemical kinetics respect to conventional diffusion flame. Such operative conditions are typical of Mild Combustion processes. More specifically a combination of both heating and dilution of oxidant and/or fuel can yields to a not premixed combustion process named Hot Diluted Diffusion Ignition (HDDI). The effect of inlet conditions on the stabilized reactive structure has been studied by analyzing the behavior of a steady, unidimensional diffusive layer. Numerical simulations have been carried out by means of OPPDIF application of ChemKin code and kinetic mechanisms available in literature, which simulates the behavior of two opposed jets. The change of the structures of the reactive region induced by a hot and diluted oxidant flow (HDDI-HODO) fed towards a fuel jet at environmental temperature has been numerically analyzed. Temperature and heat release profiles are considered as key parameters to understand the main features of the reactive region. The oxidant flow dilution causes a lower maximum temperature and more uniform temperature profiles with respect to un-diluted traditional diffusion flames even though oxidant flow is pre-heated. At the same time, higher oxidant flow dilution levels affect drastically heat release profiles and cause the disappearance of fuel pyrolitic reactions (negative heat release values). Further simulations were performed to understand the effect of water and carbon dioxide on flame structure.
- Published
- 2011
37. Pyrolitic and oxidative structures in HDDI MILD combustion
- Author
-
G. Cozzolino, Pino Sabia, Antonio Cavaliere, Giancarlo Sorrentino, M. de Joannon, Sabia, P., De Joannon, M., Sorrentino, G., Cozzolino, G., and Cavaliere, A.
- Subjects
Pollution ,HODF ,Materials science ,media_common.quotation_subject ,HODO ,Energy Engineering and Power Technology ,Combustion ,Counterflow diffusion flame ,Chemical engineering ,Automotive Engineering ,Organic chemistry ,HDDI ,Pyrolytic carbon ,media_common - Abstract
The typical structure of un-premixed counter-diffusion flames in standard conditions can be significantly modified when injected flows are diluted and/or pre-heated. The increase of the fuel and/or oxidant flow dilution up to extreme conditions can lead to the formation of nonignitable mixtures. The oxidation processes can be sustained just in case the pre-heating temperature of one flow is high enough to promote self-ignition of the system. A high initial enthalpy of flows and a low fuel and/or oxygen concentration can drastically modify the structure of the oxidative region as well as the physical and chemical kinetics with respect to conventional diffusion flame. Such operating conditions are typical of mild combustion processes. More specifically a combination of both heating and dilution of oxidant and/or fuel yields an un-premixed combustion process named Hot Diluted Diffusion Ignition (HDDI). Numerical simulation was carried out by means of commercial codes and kinetic mechanisms available in the literature in order to analyze the change of the structures of the reactive region induced by pre-heating and dilution of flows in two different configurations.
- Published
- 2010
- Full Text
- View/download PDF
38. Adherence to Mediterranean diet and prevalence of differentiated thyroid cancer: a single-center Unit of Thyroid Surgery experience in a Southern-Italy cohort.
- Author
-
Monaco A, Verde L, Filograna Pignatelli M, Docimo A, Ferrandes S, Barrea L, Calisti F, Cozzolino G, Muscogiuri G, and Docimo G
- Subjects
- Humans, Italy epidemiology, Male, Female, Middle Aged, Prevalence, Adult, Aged, Cohort Studies, Feeding Behavior, Patient Compliance statistics & numerical data, Surveys and Questionnaires, Diet, Mediterranean statistics & numerical data, Thyroid Neoplasms surgery, Thyroid Neoplasms epidemiology, Thyroidectomy
- Abstract
Background: The Mediterranean diet (MD) is recognized as a cultural heritage by UNESCO, thus, is a nutritional model widely spread in all Mediterranean countries. As already demonstrated by several studies, high adherence to MD is a protective factor against many chronic diseases. Conversely, poor adherence to the diet is correlated with an increased prevalence of these pathologies. The aim of the current study was to investigate the relationship between the adherence to MD and the prevalence of benign and malignant thyroid disease., Methods: We analyzed the health status of 60 patients, referred to total thyroidectomy and histological examination, due to nodular thyroid disease. Eating habits were evaluated according to the PREDIMED questionnaire, and patients' results were evaluated according to histological findings of benign or malignant disease., Results: PREDIMED Score was lower in patients with malignant thyroid disease (MTD) than those with benign thyroid disease (BTD) (5.27±0.87 vs. 7.00±1.23, respectively; P value <0.001). A significant correlation was found between poor adherence to MD and diagnosis of MTD (r=0.454; P<0.001). Excessive consumption of butter and sugary drinks, along with low consumption of pasta, white meat, and rice were found to be predictive factors of MTD., Conclusions: In our cohort, a PREDIMED Score ≤7 resulted significantly related to MTD diagnosis, while a good adherence to MD resulted associated with BTD. Moreover, high consumption of sweetened beverages seemed to predict MTD histologic diagnosis, while, conversely, low consumption resulted predictor of BTD. Nevertheless, more studies are needed to evaluate the effective impact of MD on MTD incidence on larger cohorts.
- Published
- 2024
- Full Text
- View/download PDF
39. The value of ACR, European, Korean, and ATA ultrasound risk stratification systems combined with RAS mutations for detecting thyroid carcinoma in cytologically indeterminate and suspicious for malignancy thyroid nodules.
- Author
-
Scappaticcio L, Di Martino N, Caruso P, Ferrazzano P, Marino FZ, Clery E, Cioce A, Cozzolino G, Maiorino MI, Docimo G, Trimboli P, Franco R, Esposito K, and Bellastella G
- Subjects
- Humans, Female, Male, Middle Aged, Retrospective Studies, Adult, Mutation, Risk Assessment, Aged, Proto-Oncogene Proteins p21(ras) genetics, Thyroid Neoplasms genetics, Thyroid Neoplasms diagnostic imaging, Thyroid Neoplasms diagnosis, Thyroid Nodule genetics, Thyroid Nodule diagnostic imaging, Thyroid Nodule pathology, Ultrasonography methods
- Abstract
Purpose: The aim of this study was to evaluate the diagnostic value of four commonly utilized ultrasound (US) RSSs, namely, the American College of Radiology [ACR], European [EU], Korean [K] TI-RADSs and American Thyroid Association [ATA] US-based RSS criteria, in combination with activating point mutations of the RAS genes (NRAS, HRAS, and KRAS) for detection of thyroid carcinoma in cytologically indeterminate and suspicious for malignancy thyroid nodules., Methods: We retrospectively analyzed cytologically indeterminate and suspicious for malignancy thyroid nodules which underwent US, molecular testing and surgery between September 1, 2018, and December 31, 2023. Receiver operating characteristic (ROC) curves were generated, and the area under the curve (AUC, 95% confidence interval [CI]) was calculated., Results: A total of 100 cytologically indeterminate and 24 suspicious for malignancy thyroid nodules were analyzed. Compared to the four US-based RSSs alone, the diagnostic value of the four US-based RSSs combined with RAS mutations did not significantly improved (cytologically indeterminate, AUC [95% CI] 0.6 [0.5-0.7] and 0.6 [0.5-0.7], respectively, p = 0.70; cytologically suspicious for malignancy, AUC [95% CI] 0.7 [0.5-0.9] and 0.8 [0.6-0.9], respectively, p = 0.23)., Conclusions: The diagnostic value of the four main US-based RSSs (ACR, EU, K, and ATA) was not improved in conjunction with the evaluation of RAS mutations for preoperative risk stratification of cytologically indeterminate thyroid nodules., Clinical Relevance Statement: In cytologically indeterminate nodules categorized according to US-based RSSs, isolated RAS positivity does not reliably distinguish between benignity and malignancy., (© 2024. The Author(s).)
- Published
- 2024
- Full Text
- View/download PDF
40. Optimized Sulfonated Poly(Ether Ether Ketone) Membranes for In-House Produced Small-Sized Vanadium Redox Flow Battery Set-Up.
- Author
-
Rizzuti A, Dilonardo E, Cozzolino G, Matera F, Carbone A, Musio B, and Mastrorilli P
- Abstract
The ionic exchange membranes represent a core component of redox flow batteries. Their features strongly affect the performance, durability, cost, and efficiency of these energy systems. Herein, the operating conditions of a lab-scale single-cell vanadium flow battery (VRFB) were optimized in terms of membrane physicochemical features and electrolyte composition, as a way to translate such conditions into a large-scale five-cell VRFB stack system. The effects of the sulfonation degree (SD) and the presence of a filler on the performances of sulfonated poly(ether ether ketone) (SPEEK) ion-selective membranes were investigated, using the commercial perfluorosulfonic-acid Nafion 115 membrane as a reference. Furthermore, the effect of a chloride-based electrolyte was evaluated by comparing it to the commonly used standard sulfuric acid electrolyte. Among the investigated membranes, the readily available SPEEK50-0 (SD = 50%; filler = 0%) resulted in it being permeable and selective to vanadium. Improved coulombic efficiency (93.4%) compared to that of Nafion 115 (88.9%) was achieved when SPEEK50-0, in combination with an optimized chloride-based electrolyte, was employed in a single-cell VRFB at a current density of 20 mA·cm
-2 . The optimized conditions were successfully applied for the construction of a five-cell VRFB stack system, exhibiting a satisfactory coulombic efficiency of 94.5%.- Published
- 2024
- Full Text
- View/download PDF
41. Many-Body MYP2 Force-Field: Toward the Crystal Growth Modeling of Hybrid Perovskites.
- Author
-
Mattoni A, Argiolas S, Cozzolino G, Dell'Angelo D, Filippetti A, and Caddeo C
- Abstract
Hybrid perovskites are well-known for their optoelectronic and photovoltaic properties. Molecular dynamics simulations allow the study of these soft and ionic crystals by including dynamical effects (e.g., molecular rotations, octahedra tilting, ionic diffusion and hysteresis), yet the high computational cost restricts the use of accurate ab initio forces for bulk or small atomic systems. Hence, great interest exists in the development of classical force-fields for hybrid perovskites of low and linear scaling computational cost, via both empirical methods and machine-learning. This work aims at extending the transferability of our MYP0 model, which has been successfully tailored to methylammonium lead iodide (MAPI) and applied to the study of molecular rotations, vibrations, diffusion of defects, and many other properties. The extended model, named MYP2, improves the description of inorganic or hybrid fragments and the processes of crystal formation while preserving a good description of bulk properties. More importantly, it allows for the direct simulation of the crystal growth of cubic MAPI from deposition of PbI and MAI precursors on the surfaces. Our findings pave the way toward classical force-fields able to model the microstructure evolution of hybrid perovskites and the crystalline synthesis from deposition in vacuo .
- Published
- 2024
- Full Text
- View/download PDF
42. Perfect digital impression of natural abutment teeth without using retraction cords.
- Author
-
Redemagni M, Bracchetti G, Pagano G, Cozzolino G, Premoli M, and Garlini G
- Subjects
- Humans, Dental Impression Materials chemistry, Dental Impression Technique, Dental Abutments, Computer-Aided Design
- Abstract
Digital technologies are gradually gaining ground in dentistry. In particular, taking impressions with intraoral scanners is becoming routine; however, even this must often be preceded by the use of retraction cords. This article presents an innovative technique to record digital impressions of natural tooth abutments using interim restorations relined with impression material instead of retraction cords. In the laboratory, using computer-aided design, the technician can segment the internal surface of the interim restoration and use it to replace the abutment of the intraoral scan, thus obtaining an accurate coping that yields more detailed information about the supragingival and intrasulcular surface of the preparation.
- Published
- 2024
43. Pancreatic Neuroendocrine Tumors: What Is the Best Surgical Option?
- Author
-
Patrone R, Mongardini FM, Conzo A, Cacciatore C, Cozzolino G, Catauro A, Lanza E, Izzo F, Belli A, Palaia R, Flagiello L, De Vita F, Docimo L, and Conzo G
- Abstract
Background : Pancreatic neuroendocrine tumors (pNETs) represent a rare subset of pancreatic cancer. Functional tumors cause hormonal changes and clinical syndromes, while non-functional ones are often diagnosed late. Surgical management needs multidisciplinary planning, involving enucleation, distal pancreatectomy with or without spleen preservation, central pancreatectomy, pancreaticoduodenectomy or total pancreatectomy. Minimally invasive approaches have increased in the last decade compared to the open technique. The aim of this study was to analyze the current diagnostic and surgical trends for pNETs, to identify better interventions and their outcomes. Methods : The study adhered to the PRISMA guidelines, conducting a systematic review of the literature from May 2008 to March 2022 across multiple databases. Several combinations of keywords were used ("NET", "pancreatic", "surgery", "laparoscopic", "minimally invasive", "robotic", "enucleation", "parenchyma sparing") and relevant article references were manually checked. The manuscript quality was evaluated. Results : The study screened 3867 manuscripts and twelve studies were selected, primarily from Italy, the United States, and China. A total of 7767 surgically treated patients were collected from 160 included centers. The mean age was 56.3 y.o. Enucleation (EN) and distal pancreatectomy (DP) were the most commonly performed surgeries and represented 43.4% and 38.6% of the total interventions, respectively. Pancreatic fistulae, postoperative bleeding, re-operation, and follow-up were recorded and analyzed. Conclusions : Enucleation shows better postoperative outcomes and lower mortality rates compared to pancreaticoduodenectomy (PD) or distal pancreatectomy (DP), despite the similar risks of postoperative pancreatic fistulae (POPF). DP is preferred over enucleation for the pancreas body-tail, while laparoscopic enucleation is better for head pNETs.
- Published
- 2024
- Full Text
- View/download PDF
44. Post-Irradiation Breast Angiosarcoma: All the Possible Treatments and Electrochemotherapy. Case Report and Literature Review.
- Author
-
Parisi S, Gambardella C, Iovino F, Ruggiero R, Lucido FS, Nesta G, Tolone S, Brusciano L, Fisone F, Mongardini FM, Cozzolino G, Della Corte CM, Napolitano S, Orditura M, Esposito R, and Docimo L
- Abstract
Breast angiosarcoma is a rare malignancy, accounting for less than 1% of all soft tissue cancers. It comprises primitive and secondary subtypes, such as radiogenic breast angiosarcoma (RAS). Despite multimodal treatment, angiosarcomas represent an incurable disease for many patients and a significant cause of deterioration in their quality of life. Surgery is a cornerstone in management, but high recurrence rates are reported. Electrochemotherapy (ECT) is a practicable locoregional treatment for patients with advanced angiosarcoma as part of a multimodal therapeutic strategy. The palliative benefits of ECT include optimal patient compliance, good local hemostasis control, and positive local responses. Since only 22 cases are described in the literature, we reported a rare case of RAS treated with ECT after a multidisciplinary approach, including Next Generation Sequencing (NGS). A literature review on the feasibility of ECT in RAS management was also performed., Competing Interests: The authors have no conflicts of interest to declare.
- Published
- 2024
- Full Text
- View/download PDF
45. Rare axillary cancer of unknown primary originating from the breast of a 64‑year‑old male patient: A case report and literature review.
- Author
-
Parisi S, Gambardella C, Ruggiero R, Tolone S, Iovino F, Lucido FS, Fisone F, Lanza Volpe M, Cozzolino G, Mongardini FM, Brusciano L, Andrea R, and Docimo L
- Abstract
Cancers of unknown primary (CUPs) are a heterogeneous group of tumors characterized by a difficult diagnosis. The primitive tumor remains unknown, whereas metastases are the most common manifestation. Occult male breast cancers are very rare types of CUPs. The present study describes the case of a 64-year-old man affected by a CUP of presumed mammary origin. The aim of the article and the present review was to focus on their management. To the best of our knowledge, only thirteen cases have been reported in the literature. Because no specific guidelines are available, various approaches have been applied, influencing the treatment and the prognosis of patients with CUP., Competing Interests: The authors declare that they have no competing interests., (Copyright: © Parisi et al.)
- Published
- 2024
- Full Text
- View/download PDF
46. Short- and long-term outcomes of sphincteroplasty for anal incontinence related to obstetric injury: a systematic review.
- Author
-
Mongardini FM, Cozzolino G, Karpathiotakis M, Cacciatore C, and Docimo L
- Subjects
- Pregnancy, Humans, Female, Aged, Treatment Outcome, Quality of Life, Retrospective Studies, Prospective Studies, Anal Canal surgery, Fecal Incontinence etiology, Fecal Incontinence surgery
- Abstract
Anal incontinence is a frequent pathological condition with devastating impact on quality of life. The prevalence is approximately 15% of the population, with higher incidence reported in the elderly and multiparous women, and several factors have a major role in its pathogenesis, such as anatomical sphincter defects (Glasgow and Lowry in Dis Colon Rectum 55(4): 482-490, 2012), delivery injuries, and colorectal, uro-gynecological, and perineal surgery. The direct surgical approach is the gold standard treatment for fecal incontinence, especially through anterior sphincteroplasty, although a permanent defect of continence persists over time. The aim of our study is to evaluate, throughout a systematic review of the literature, the short- and long-term outcomes of sphincteroplasty performed for obstetric injuries anal incontinence. A systematic review of the studies published in the literature from January 2000 to December 2021 was performed in accordance with the PRISMA guidelines. Of the 2543 studies extrapolated, only eight fulfilled the inclusion criteria and were admitted represented by retrospective and prospective studies. The data analyzed from the included studies were number and mean age of the female population, and incontinence improvement with preoperative and postoperative short- and long-term outcomes, as reported by QoL questionaries and incontinence scores. Overall 355 patients with obstetric sphincter damage underwent sphincteroplasty with an anterior external sphincter overlapping procedure. A consistent improvement in fecal incontinence at short-term follow-up with relative improvement in QoL was reported. In 7 of 8 studies, the authors found a progressive worsening of the incontinence symptoms on the long-term follow-up. However, it is not clear whether the decrease in long-term continence results is parallel to a simultaneous decrease in QoL scores. Nevertheless, compared to the preoperative findings, the improvement was maintained in the long-term follow-up. Despite the limited data in the literature, a properly performed sphincteroplasty can guarantee a consistent improvement of the continence in short term with encouraging outcomes, especially for solid stool continence, in long time. We believe that anterior sphincteroplasty, as a low cost, feasible, and safe procedure, still has a role in the treatment of fecal incontinence for obstetric injury. Further large cohort randomized clinical trials are necessary to validate these results., (© 2023. Italian Society of Surgery (SIC).)
- Published
- 2023
- Full Text
- View/download PDF
47. Impact of Current Technology in Laparoscopic Adrenalectomy: 20 Years of Experience in the Treatment of 254 Consecutive Clinical Cases.
- Author
-
Conzo G, Patrone R, Flagiello L, Catauro A, Conzo A, Cacciatore C, Mongardini FM, Cozzolino G, Esposito R, Pasquali D, Bellastella G, Esposito K, and Docimo L
- Abstract
Background: Laparoscopic adrenalectomy (LA), which avoids large abdomen incisions, is considered the gold standard technique for the treatment of benign small- and medium-size adrenal masses (<6 cm) and weighing < 100 g. A trascurable mortality and morbidity rate, short hospitalization and patient rapid recovery are the main advantages compared to traditional surgery. During the past decade, a new surgical technology has been developed that expedites a "clipless" adrenalectomy. Here, the authors analyze a clinical series of 254 consecutive patients who were affected by adrenal gland neoplasms and underwent LA by the transabdominal lateral approach over the two last decades. A literature review is also presented., Methods: Preoperative, intraoperative and postoperative data from 254 patients who underwent LA between January 2003 and December 2022 were retrospectively collected and reviewed. Diagnosis was obtained on the basis of clinical examination, laboratory values and imaging techniques. Doxazosin was preoperatively administered in the case of pheochromocytoma (PCC) while spironolactone and potassium were employed to treat Conn's disease. The same surgeon (CG) performed all the LA and utilized the same laparoscopic transabdominal lateral approach. Different dissection tools-ultrasonic, bipolar or mixed scissors-and hemostatic agents were used during this period. The following results were obtained: 254 patients were included in the study; functioning tumors were diagnosed in 155 patients, 52 patients were affected by PCCs, 55 by Conn's disease, 48 by Cushing's disease. Surgery mean operative time was 137.33 min (range 100-180 min) during the learning curve adrenalectomies and 98.5 min (range 70-180) in subsequent procedures. Mean blood loss was respectively 160.2 mL (range 60-280) and 96.98 mL (range 50-280) in the first 30 procedures and the subsequent ones. Only three conversions (1.18%) to open surgery occurred. No mortality or postoperative major complications were observed, while minor complications occurred in 19 patients (3.54%). In 153 out of 155 functioning neoplasms, LA was effective in the normalization of the endocrine profile. According to our experience, a learning curve consisting of 30 cases was identified. In fact, a lower operative time and a lower complication rate was reported following 30 LA., Conclusions: LA is a safe procedure, even for masses larger than 6 cm and PCCs. Undoubtedly, the development of surgical technology has made it possible reducing operative times, performing a "clipless" adrenalectomy and extending the indications in the treatment of more complex patients. A multidisciplinary team, in referral high-volume centers, is recommended in the management of adrenal pathology. A 30-procedure learning curve is necessary to improve surgical outcomes.
- Published
- 2023
- Full Text
- View/download PDF
48. Role of Inflammatory Biomarkers (NLR, LMR, PLR) in the Prognostication of Malignancy in Indeterminate Thyroid Nodules.
- Author
-
Gambardella C, Mongardini FM, Paolicelli M, Bentivoglio D, Cozzolino G, Ruggiero R, Pizza A, Tolone S, Del Genio G, Parisi S, Brusciano L, Cerbara L, Docimo L, and Lucido FS
- Subjects
- Humans, Neutrophils pathology, Monocytes pathology, Retrospective Studies, Biomarkers, Lymphocytes pathology, Thyroid Nodule diagnosis, Thyroid Nodule pathology
- Abstract
Indeterminate follicular thyroid lesions (Thyr 3A and 3B) account for 10% to 30% of all cytopathologic diagnoses, and their unpredictable behavior represents a hard clinical challenge. The possibility to preoperatively predict malignancy is largely advocated to establish a tailored surgery, preventing diagnostic thyroidectomy. We analyzed the role of the neutrophil-to-lymphocyte ratio (NLR), the platelet-to-lymphocyte ratio (PLR) and the lymphocyte-to-monocyte ratio (LMR) as prognostic factors of malignancy for indeterminate thyroid nodules. In patients affected by cytological Thyr 3A/3B nodules, NLR, PLR and LMR were retrospectively compared and correlated with definitive pathology malignancy, utilizing student's t -test, ROC analysis and logistic regression. One-hundred and thirty-eight patients presented a Thyr 3A and 215 patients presented a Thyr 3B. After the logistic regression, in Thyr 3A, none of the variables were able to predict malignancy. In Thyr 3B, NLR prognosticated thyroid cancer with an AUC value of 0.685 ( p < 0.0001) and a cut-off of 2.202. The NLR results were also similar when considering the overall cohort. The use of cytological risk stratification in addressing the management of indeterminate thyroid nodules in patients is not always reliable. NLR is an easy and reproducible inflammatory biomarker capable of improving the accuracy of preoperative prognostication of malignancy.
- Published
- 2023
- Full Text
- View/download PDF
49. Thyroid-Bed Schwannoma Mimicking a Thyroid Neoplasm: A Challenging Diagnosis: Report of a Case and Literature Review.
- Author
-
Gambardella C, Docimo L, Candela G, Cozzolino G, Mongardini F, Serilli F, Nesta G, Filograna Pignatelli M, Ferrandes S, Gambardella A, and Docimo G
- Subjects
- Male, Humans, Aged, Thyroidectomy methods, Neck, Thyroid Neoplasms diagnosis, Thyroid Neoplasms surgery, Neurilemmoma diagnosis, Neurilemmoma pathology, Neurilemmoma surgery
- Abstract
Background: Schwannomas, also called neurinomas, are rare benign tumors of the neural cells that can develop from the sheaths of nervous structures of several districts, although the most frequent sites are the cranial nerves (25%-45%). Rarely, cases show neck schwannomas in the thyroid parenchyma, while the cases of thyroid-bed schwannomas mimicking a thyroid-gland lesions are anecdotal., Methods: We report the case of a 70-year-old man with a preoperative-imaging diagnosis of a thyroid neoplasm, confirmed as Thyr 4 by fine-needle cytology., Results: During surgery, an extra-thyroidal lesion was discovered, determined to be a neck schwannoma through definitive pathology. A literature review of cases of thyroid-bed-lesion schwannomas misinterpreted as thyroid neoplasms was carried out., Conclusions: In the case of suspicious extra-thyroidal lesions, we advocate for a close routine cooperation between the cytologist, the radiologist, and the surgeon in the attempt to reach an accurate preoperative diagnosis.
- Published
- 2022
- Full Text
- View/download PDF
50. Team approach in esthetic dentistry.
- Author
-
D'Amato S, Redemagni M, and Cozzolino G
- Subjects
- Humans, Patient Care Team, Dentistry, Esthetics, Dental
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.