Monthly consumption of resources.
\r\n\tAnimal food additives are products used in animal nutrition for purposes of improving the quality of feed or to improve the animal’s performance and health. Other additives can be used to enhance digestibility or even flavour of feed materials. In addition, feed additives are known which improve the quality of compound feed production; consequently e.g. they improve the quality of the granulated mixed diet.
\r\n\r\n\tGenerally feed additives could be divided into five groups:
\r\n\t1.Technological additives which influence the technological aspects of the diet to improve its handling or hygiene characteristics.
\r\n\t2. Sensory additives which improve the palatability of a diet by stimulating appetite, usually through the effect these products have on the flavour or colour.
\r\n\t3. Nutritional additives, such additives are specific nutrient(s) required by the animal for optimal production.
\r\n\t4.Zootechnical additives which improve the nutrient status of the animal, not by providing specific nutrients, but by enabling more efficient use of the nutrients present in the diet, in other words, it increases the efficiency of production.
\r\n\t5. In poultry nutrition: Coccidiostats and Histomonostats which widely used to control intestinal health of poultry through direct effects on the parasitic organism concerned.
\r\n\tThe aim of the book is to present the impact of the most important feed additives on the animal production, to demonstrate their mode of action, to show their effect on intermediate metabolism and heath status of livestock and to suggest how to use the different feed additives in animal nutrition to produce high quality and safety animal origin foodstuffs for human consumer.
",isbn:"978-1-83969-404-2",printIsbn:"978-1-83969-403-5",pdfIsbn:"978-1-83969-405-9",doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!0,hash:"8ffe43a82ac48b309abc3632bbf3efd0",bookSignature:"Prof. László Babinszky",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/10496.jpg",keywords:"Technological Feed Additives, Feed Industry, Quality of Compound Feed, Non-Antibiotic Growth Promoter, Product Quality, Additive Enzymes, Digestibility of Nutrients, NSP Enzymes, Farm Animals, Livestock, Immunity, Microbiome",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"November 24th 2020",dateEndSecondStepPublish:"December 22nd 2020",dateEndThirdStepPublish:"February 20th 2021",dateEndFourthStepPublish:"May 11th 2021",dateEndFifthStepPublish:"July 10th 2021",remainingDaysToSecondStep:"a month",secondStepPassed:!0,currentStepOfPublishingProcess:3,editedByType:null,kuFlag:!1,biosketch:"Professor Emeritus from the University of Debrecen, Hungary who authored 297 publications (papers, book chapters) and edited 3 books. Member of various committees and chairman of the World Conference of Innovative Animal Nutrition and Feeding (WIANF).",coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"53998",title:"Prof.",name:"László",middleName:null,surname:"Babinszky",slug:"laszlo-babinszky",fullName:"László Babinszky",profilePictureURL:"https://mts.intechopen.com/storage/users/53998/images/system/53998.jpg",biography:"László Babinszky is Professor Emeritus of animal nutrition at the University of Debrecen, Hungary. From 1984 to 1985 he worked at the Agricultural University in Wageningen and in the Institute for Livestock Feeding and Nutrition in Lelystad (the Netherlands). He also worked at the Agricultural University of Vienna in the Institute for Animal Breeding and Nutrition (Austria) and in the Oscar Kellner Research Institute in Rostock (Germany). From 1988 to 1992, he worked in the Department of Animal Nutrition (Agricultural University in Wageningen). In 1992 he obtained a PhD degree in animal nutrition from the University of Wageningen.He has authored 297 publications (papers, book chapters). He edited 3 books and 14 international conference proceedings. His total number of citation is 407. \r\nHe is member of various committees e.g.: American Society of Animal Science (ASAS, USA); the editorial board of the Acta Agriculturae Scandinavica, Section A- Animal Science (Norway); KRMIVA, Journal of Animal Nutrition (Croatia), Austin Food Sciences (NJ, USA), E-Cronicon Nutrition (UK), SciTz Nutrition and Food Science (DE, USA), Journal of Medical Chemistry and Toxicology (NJ, USA), Current Research in Food Technology and Nutritional Sciences (USA). From 2015 he has been appointed chairman of World Conference of Innovative Animal Nutrition and Feeding (WIANF).\r\nHis main research areas are related to pig and poultry nutrition: elimination of harmful effects of heat stress by nutrition tools, energy- amino acid metabolism in livestock, relationship between animal nutrition and quality of animal food products (meat).",institutionString:"University of Debrecen",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"University of Debrecen",institutionURL:null,country:{name:"Hungary"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"25",title:"Veterinary Medicine and Science",slug:"veterinary-medicine-and-science"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"185543",firstName:"Maja",lastName:"Bozicevic",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/185543/images/4748_n.jpeg",email:"maja.b@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"7144",title:"Veterinary Anatomy and Physiology",subtitle:null,isOpenForSubmission:!1,hash:"75cdacb570e0e6d15a5f6e69640d87c9",slug:"veterinary-anatomy-and-physiology",bookSignature:"Catrin Sian Rutland and Valentina Kubale",coverURL:"https://cdn.intechopen.com/books/images_new/7144.jpg",editedByType:"Edited by",editors:[{id:"202192",title:"Dr.",name:"Catrin",surname:"Rutland",slug:"catrin-rutland",fullName:"Catrin Rutland"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"878",title:"Phytochemicals",subtitle:"A Global Perspective of Their Role in Nutrition and Health",isOpenForSubmission:!1,hash:"ec77671f63975ef2d16192897deb6835",slug:"phytochemicals-a-global-perspective-of-their-role-in-nutrition-and-health",bookSignature:"Venketeshwer Rao",coverURL:"https://cdn.intechopen.com/books/images_new/878.jpg",editedByType:"Edited by",editors:[{id:"82663",title:"Dr.",name:"Venketeshwer",surname:"Rao",slug:"venketeshwer-rao",fullName:"Venketeshwer Rao"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4816",title:"Face Recognition",subtitle:null,isOpenForSubmission:!1,hash:"146063b5359146b7718ea86bad47c8eb",slug:"face_recognition",bookSignature:"Kresimir Delac and Mislav Grgic",coverURL:"https://cdn.intechopen.com/books/images_new/4816.jpg",editedByType:"Edited by",editors:[{id:"528",title:"Dr.",name:"Kresimir",surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"54829",title:"Greening Accounting II: Exploring Feasibility of Environmental Accounting Framework",doi:"10.5772/intechopen.68403",slug:"greening-accounting-ii-exploring-feasibility-of-environmental-accounting-framework",body:'\nPast decades have witnessed the efforts to integrate ‘environmental thinking’ within the accounting domain, where contributions from scholars and practitioners theorized how this would enable businesses to significantly reorient their behaviour towards environmental sustainability. In the previous chapter, author highlighted how the efforts in this regard have not moved significantly beyond rhetoric and why not having environmental concerns at the core of the prevalent accounting theories is a natural outcome of their existence, as these remain grounded within economic paradigm. This led to conceptualize a new accounting viewpoint as a theoretical solution that would hold environmental care as its core concern, instead of investing resources in retrofitting the existing mechanisms. This chapter validates the argument by experimenting with the proposed construct, so as to test the operational feasibility of environmental accounting (EA) in capturing firm-environment exchange. Leveraging transactions from a real-life case study, the construct could not only build temporal repository of aspects (stock), but also accounted for externalized liabilities of the firm, including how these assets are handled by the firm (flow). This feasibility supports the capability to generate information for firms to improve environmental insight of its processes, products, and decisions while maintaining temporality and auditability. Learning from the study provides inputs on how this could enable accounting to shape the corporate responsiveness of firms towards nature, and redefine the boundaries of accounting theory.
\nTo explore the pragmatic elements of EA framework proposed in the previous chapter, this section details how EA can capture firm-environment exchange to integrate externalities by using inputs from a real-life case example (Section 3), before generalizing information produced by such a framework (Section 4) and summarizing learning from the experiment (Section 5).
\nThe case study selected to support this experiment was conducted by the author in 2012–13 to study the relevance of environmental management accounting (EMA) in the hospitality sector and to expand the knowledge base with the findings. The study involved understanding the operating environment of two co-located hotels (five-star and three-star) in the western suburbs of Mumbai, India, that are managed by concept hospitality services (CHS facilities, hereafter) (Figure 1), and how they managed to reduce the impact on environment. Rationale for using this case study is to generate a view on the working of a firm from an industry where mass-balance is not the primary method to establish input-output link that has not been covered very often in literature. A service organization is expected to improve our understanding of the stock and flow of environmental aspects that differ from the manufacturing organization. Readers interested in the complete case study1 can refer to Debnath [1]. Due to limited space, only the major features of the case are highlighted here.
\nOperational layout of CHS (Sourced from Ref. [1]).
The CHS facilities are Ecotel® certified —certification of environmental and social leadership in hotel/hospitality business [2]—and equipped with the infrastructural and operational arrangements to support environmental conscious operational arrangements. Both the facilities are full-service business hotels and offered boarding/lodging, boutique restaurants, bars, and lounge facilities to the business travellers along with banquet and conference halls for corporate use. Guest service lifecycle covered reservation of rooms and guest check-in, followed by stay, boarding, and checkouts. The amenities and services consumed materials, water, energy and other resources, and produced wastes as outputs. Cumulative waste quantities (solid waste and waste water) reported in Table 1 were collected from the organizational records, whereas GHG emission due to energy consumptions is as per the norms of GHG accounting [3].
\nMonth (Unitsa) | \nFood production (Covers) | \nGarbage (mt) | \nLinen for wash (Par) | \nWater consumption (kL) | \nEnergy (kWh) | \nGHG (tCO2e) | \n||
---|---|---|---|---|---|---|---|---|
Supply | \nLaundry outsourced | \nTotal | \n||||||
Apr | \n9069 | \n14.8 | \n43555 | \n4156 | \n7170 | \n11326 | \n347783 | \n341 | \n
May | \n8248 | \n14.1 | \n51949 | \n5140 | \n8507 | \n13647 | \n353394 | \n346 | \n
Jun | \n5283 | \n10.3 | \n35045 | \n5899 | \n5775 | \n11674 | \n332496 | \n326 | \n
Jul | \n5585 | \n10.9 | \n39003 | \n6356 | \n6416 | \n12772 | \n352577 | \n346 | \n
Aug | \n7586 | \n11.1 | \n54359 | \n4906 | \n8916 | \n13822 | \n368708 | \n361 | \n
Sep | \n10111 | \n11.0 | \n45280 | \n5632 | \n7443 | \n13075 | \n357025 | \n350 | \n
Oct | \n8144 | \n11.4 | \n57461 | \n4344 | \n9428 | \n13772 | \n380822 | \n373 | \n
Nov | \n7790 | \n10.7 | \n47311 | \n4041 | \n7761 | \n11802 | \n341721 | \n335 | \n
Dec | \n13434 | \n9.2 | \n52360 | \n8956 | \n8597 | \n17553 | \n347388 | \n340 | \n
Total | \n75250 | \n103.7 | \n426323 | \n49431 | \n70012 | \n119443 | \n3181914 | \n3118 | \n
Monthly consumption of resources.
aUnits: kL—kilo liters; mt—metric tons; kWh—kilo watt-hours; tCO2e—tons of carbon dioxide equivalent.
All types of solid waste were segregated at source and collected through a 4-bin system that optimized its reuse/recycling. In regards to disposal of waste, CHS had invested in developing a vermicomposting facility to treat biotic waste that converted waste to compost (bio-fertilizer), which was sold at a nominal rate. Waste categorized and collected as unfit for recycling or reusing (e.g. butter paper, oil cans, etc.) was sent to landfill (a miniscule percentage say, 1–2% by weight). CHS also routed waste water to the community ETP for recycling, from where the treated water (mainly grey water) was received back for further use. CHS had laid pipes to circulate grey water and used it for designated purposes, such as cleaning and gardening. This reduced its operational dependency on fresh water. Complete recycling of organic waste and use of grey water saved CHS from contributing to the environmental impacts that it would have otherwise if waste was disposed using conventional means. However, the tangible savings in social costs cannot be incorporated as a part of EMA construct (Table 2). Neither would the liability arising due to waste water generated by laundry services that it outsourced to the external commercial washers. Table 2 details cost of environmental care for CHS as per EMA norms by keeping it restricted within the organizational boundary.
\nAs per EMA | \nAs per the case study | \nAmount (in INR) | \n
---|---|---|
(a) Material waste | \nDry and wet garbage—Bottles, packing materials, empty containers, food wastes, and others (100% recycled)—150 mt per annum | \n0.00 | \n
(b) Non-product outputs | \nWaste water (100% recycled) ~ 45,000 kL per annum | \n0.00 | \n
(c) Waste and pollutionprevention costs | \nFixed costs per annum of maintaining Ecotel certification Running cost of vermicomposting facility Operating cost of other activities with environmental considerations | \n250,000 +60,000a Unascertainable | \n
(d) R&D expenditure | \nNew initiatives for reducing environmental load | \nNot available | \n
(e) Less tangible costs | \nEmission externality of ~ 4.5 mtCO2e per annum | \n1,015,000b | \n
Total cost | \n\n | 1,325,000 | \n
EMA computations for CHS.
aAssumed maintenance cost of vermicomposting facility (1 person @ INR 5000 per month).
bEmission costs at INR 225/tCO2e (USD 4.5 at assumed exchange rate of INR 50/USD) [4].
To account for the aspects that CHS business activities generated, monetization norms were needed, so as to journalize these in the EA books. To monetize, valuation methods are used as proxies that would translate the externalized liability corresponding to the aspect. For example, externalized liability due to solid waste disposed through municipal infrastructure is pegged at INR 3500 mt−1 as the cost not internalized by CHS [5]. Externalized cost included actual cost of disposal incurred by municipalities along with externalities due to GHG generation from organic waste and social costs contributed by the informal sector. Similarly, GHG emission is valued at opportunity cost of market rate at USD 4.5 per tCO2e (INR 225 at exchange rate of INR 50 per USD) which has been the average rate of carbon for Indian projects in voluntary emission credit market [3]. Waste water has been valued at resource replacement rate of INR 50 kL−1, as followed in other EMA case studies [6]. Accordingly, environmental ledgers are drawn by journalizing entries that followed double-entry system, where respective aspect ledger (of asset nature) is debited to represent the release of specific type of waste to the common pool. These ledgers correspond to the physical nature of the aspects (waste and emissions) and reflect the environmental asset generated by the firm, akin to the finished products. Corresponding credit would go to the respective environmental account (of liability nature) so as to reflect externalized liability. A reversed entry on the other hand would reflect liability that has been annulled due to the changed processes/activities or any other reason. In simple terms, following accounting rules are abstracted from the generalized schematics for EA (as per Appendix 1) and have been used to draw the ledgers (Tables 3–7):
\nJournal entries should be balanced across quantity and value.
One accounting entry would always use same units of measurements.
To account for more than one aspect per business transaction, each aspect would have to have its own journal entry.
In case suitable monetization norm is not available for an aspect, it will remain in physical inventory.
The ledgers are interpreted as under:
\nLedger entries are summarized for different periods and represented combined form of t-accounts to record physical and monetary values together. However, firms can maintain separate accounts record aspect inventory and corresponding monetized liability.
Credit balance of Table 3 reflects social externality saved by CHS due to vermicomposting to treat bio-waste, instead of using municipal solid waste disposal system. Table 4 brings in the supply chain effects into the books of the CHS by performing resource accounting of waste water from outsourced laundry, and accounted it as an environmental liability for CHS. Table 5 reflects equivalent carbon value of GHG emissions due to energy usage.
Based on the selective performance data, these externalities created environmental obligation of around INR 3.8 million for 26 thousand guest nights (annualized) or INR 147 per guest night (Table 7). Accordingly, environmental liability at period-end represents monetized balance (in quantity and monetary terms) to reflect externalities, not annulled.
Management information (Table 7) is generated based on data/inputs from the sample ledgers and can be traced back to the individual ledgers, but without positive social externalities due to knowledge sharing by the firms [7] that cannot be quantified due to lack of suitable numeraire.
Date | \nParticulars | \nQty. (mt) | \nDebit (INR) | \nDate | \nParticulars | \nQty. (mt) | \nCredit (INR) | \n
---|---|---|---|---|---|---|---|
12/12 | \nTo balance c/f | \n103.7 | \n362,950 | \n04/12 05/12 06/12 07/12 08/12 09/12 10/12 11/12 12/12 | \nBy Env. liability A/c By Env. liability A/c By Env. liability A/c By Env. liability A/c By Env. liability A/c By Env. liability A/c By Env. liability A/c By Env. liability A/c By Env. liability A/c | \n14.8 14.1 10.3 10.9 11.1 11.0 11.4 10.7 9.2 | \n51,800 49,350 36,050 38,150 38,850 38,500 39,900 37,450 32,200 | \n
\n | Total | \n103.7 | \n362,950 | \n\n | Total | \n103.7 | \n362,950 | \n
Solid waste (externality) T-account.
Date | \nParticulars | \nQty. (kL) | \nDebit (INR) | \nDate | \nParticulars | \nQty. (kL) | \nCredit (INR) | \n
---|---|---|---|---|---|---|---|
04/12 05/12 06/12 07/12 08/12 09/12 10/12 11/12 12/12 | \nTo Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c | \n7170 8507 5775 6416 8916 7443 9428 7761 8597 | \n358,500 425,350 288,750 320,800 445,800 372,150 471,400 388,050 429,500 | \n12/12 | \nBy balance c/f | \n70,012 | \n3,506,000 | \n
\n | Total | \n70,012 | \n3,506,000 | \n\n | Total | \n70,012 | \n3,506,000 | \n
Waste water (outsourced laundry) T-account.
Date | \nParticulars | \nQty. (tCO2e) | \nDebit (INR) | \nDate | \nParticulars | \nQty. (tCO2e) | \nCredit (INR) | \n
---|---|---|---|---|---|---|---|
04/12 05/12 06/12 07/12 08/12 09/12 10/12 11/12 12/12 | \nTo Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c To Env. liability A/c | \n341 346 326 346 361 350 373 335 340 | \n76,725 77,850 73,350 77,850 81,225 78,750 83,925 75,375 76,500 | \n12/11 | \nBy balance c/f | \n3118 | \n701,550 | \n
\n | Total | \n3118 | \n701,550 | \n\n | Total | \n3118 | \n701,550 | \n
GHG emissions T-account.
Date | \nParticulars | \nQty. (mt) | \nDebit (INR) | \nDate | \nParticulars | \nQty. (tCO2e) | \nQty. (kL) | \nCredit (INR) | \n
---|---|---|---|---|---|---|---|---|
12/12 12/12 | \nTo solid waste A/c To balance c/f | \n103.7 | \n362,950 3,844,600 | \n12/12 12/12 | \nBy waste water A/c. By emission A/c | \n3118 | \n70,012 | \n3,506,000 701,550 | \n
\n | Total | \n103.7 | \n4,207,550 | \n\n | Total | \n3118 | \n70,012 | \n4,207,550 | \n
Environmental liability control ledger.
Type of activity | \nEnvironmental aspects | \nSavings | \nValue (in INR) | \n
---|---|---|---|
Vermicomposting | \nSolid waste | \nSaved 104 mt reduction in wastes for landfill | \n+362,950 | \n
Composting of floral wastes from festivals | \nSolid waste | \nSaved 10 mt (assumed) floral wastes composted | \n+35,000 | \n
Outsourced linen washing | \nWaste water | \nNegative cost at replacement rate of water for ~ 70,000 kL per annum | \n−3,506,000 | \n
Use of non-renewable energy sources | \nEmissions from energy use | \nNegative costs of ~3.2 mtCO2e | \n−701,550 | \n
Total | \n−3,809,600 | \n
Annualized externalized liability of CHS.
This segment explains how EA framework adapts systematic approach of accounting to bookkeep aspects and externalized liability of firm. Although EA is exploratory in here and lacks the breadth and support enjoyed by other established accounting frameworks, which could lead to generate information that has not been studied to remove interpretive bias of decision-makers, especially to reflect how this might help firms to adapt to the changing expectations of the society. Still, it enables firms to compare its environmental performance with the economic ones, and trace its responses through indicators that can be a part of the overall enterprise risk framework.
\nWaste is an inevitable by-product of any transformation process. Information regarding internal costs incurred in generating and disposing waste could lead to the operational improvements of the firm, as EMA proposed, whereas information on externalized liabilities is expected to improve the firms’ response towards permanent cure. Even though having market mechanism to dispose waste, as in developed countries, has resulted in internalization of costs to a certain degree [8], this has also led to institutionalize ‘right to waste’ that is available for firms at a price, which has not been validated to bring a permanent change in the attitude of firms. Improved information on externalized liabilities through accounting that EA aims for, would push the firms to acknowledge accountability beyond using social infrastructure, where dissemination of valid information translates to improved transparency for investors, others stakeholders and society at a large, to appreciate such a behaviour. EA is expected to help firms improve their overall approach towards environmental care by providing a mechanism that can directly reflect its performance in real-time. Conscientious corporate citizens like Interface Global, Patagonia, and 3M (to name a few) have developed sustainable waste reduction techniques by resorting to servicizing, cradle-to-cradle lifecycle, and other initiatives [9]. EA can support firms develop insights about their decisions (e.g. externalized liability for CHS due to landfilled waste that needs a permanent cure) by generating temporal information that remains tied to the source.
\nDisposal of waste water through local or site-specific effluent treatment plant (ETP) is a common practice for firms, before releasing it to the public drainage system that ultimately releases treated water to the water bodies. However, this has not always been the case, for example, in case of developing and underdeveloped countries, where waste water could be released directly to the water bodies, resulting in severe loss of water resources. At the same time, waste water has not always been reused by developing in-house or community level grey water recycling system, where treated water could be used for reasons other than for drinking or human consumption. Missing legislative support to promote grey water recycling has also hindered the development of necessary infrastructure. With depleting levels of potable water globally and ever rising population, market mechanism to price such a scare resource would hardly do any justice to improve the situation in the long run. Mahadevia and Wolfe [10] have rightly pointed out that the next world war would be fought to control the water resources. The intent of accounting for waste water is to help firms understand the stress that they are contributing to within a region, which could lead to business disruptions as well [11]. This could also help firms to participate in improving the disparity within the region so as to be recognized as a valued member of the community that it serves [12].
\nEmission of GHGs and non-GHGs has harmful effects on biosphere and contributes to the changing climatic conditions. While GHG accounting is a methodical approach towards inventorizing emissions [3], it remains to be integrated within accounting where loss of temporality might lead to wrong choices, as detailed by the author with reference to a different case study [13], and is universally applicable. In any case, business decisions like moving away from high energy intensive machineries and processes to the lower ones (e.g. installation of bagasse-based boiler instead of using oil-fired boilers or to optimize energy utilization by using technological solutions) depend primarily on the associated economics of it (lowering cost per kg of steam), where environmental outcomes become by-products of the decisions. The argument here is, environmental impact of a business decision can be evaluated better if it could be tied with the performance levels (before and after the effective change), where temporality becomes a natural requirement that EA support. Same is true for carbon trade where accounting of initial emission allowance and other related transactions would need the accountants to separate emissions accounting from corresponding financial impacts, but which cannot be achieved as discussed in previous chapter, unless accounting can guide the practitioners to account for both the areas simultaneously. Author posits that EA supports this delineation and to separately account for temporal generation/savings of emission and the underlying economics, which cannot be dealt in here due to space constraints.
\nAs compared to EMA, where insights of environmental performance are limited within the organizational boundary of the firms (Table 2), EA offers information on the type of aspects and how these are being handled. For example, solid waste account of CHS details saved social cost and is treated as an asset (Table 3), whereas waste water account from outsourced laundry (Table 4) registered as liability that CHS should be looking into with improved commitment to remain a pro-environmental business that it has declared itself to be. Same is the case of emissions that CHS should be caring for. These insights could not have been possible without letting EA break the boundary of ownership and reflect how firms are contributing to the environmental duress. Although this might not resolve differences that are inherent to the industries in regards to how they operate and/or use resources (e.g. discrete manufacturing vs. hospitality business vs. mining sector), information generated and disseminated by EA could still institutionalize shared vocabulary that is the need of the hour, including devising common terminologies to express how firms might be viewing its performance as compared to others, or in analysing industry specific trends (e.g. environmental care institutionalized by extractive industry as its operating norms). The framework also generalizes the boundary to handle areas that lack computational insights like emission of non-GHG gases (like F-gases) or positive social externalities that CHS generated through the workshops it conducted for other firms to become environmentally friendly, and could be pursued as a part of future research.
\nThis section assimilates different aspects of the experiment and validates the relevance of information generated by EA in its capacity to support decision-making. While a single case study can never bring the complete set of facts to reflect the uniqueness of different industries, still it offers a good number of points to relate to generalize the capability of EA in generating information of practical relevance to support firms, and can be characterized through the needs of decision-making in managerial accounting.
\nTraceability: EA creates the transactional backbone of environmental aspects to become a part of an information system and offer relevant and verifiable data for environmentally conscious decision-making without losing temporality, transparency and traceability. Traceability links pieces of information to the source event/transaction from a particular time period (e.g. quantity of GHG emission for a quarter) and absolves EMA and corporate management information system from the need of using arbitrary methods to quantify and accumulate information on the environmental aspects and impacts.
Timeliness: EA opens the door for the organizations to actively consider externalities as integral to the business activities, and improves transparency in the reporting of ethical negatives, that the previous chapter detailed, as mandatory for voluntary reports to drive ethical positives. Here, an accounting construct can generate information as soon as the underlying activities are recorded and available for its real-time dissemination for decision-making purposes.
Relevance: EA allows the existing accounting frameworks to continue in ‘as-is’ form, which saves time and resources required to modify and institutionalize accounting to care for within a single framework. Relevance of information from managerial decision-making purposes can only be hypothesized here, as its practical utility is yet to be tested, and leaves the door open for future research to address, including how it might support the standards of sustainability and ecological accounting.
Uniformity: EA separates the computational complexities of quantification and monetization from the accounting process. Needless to mention, identification of aspects based on the business activities and methods for quantification would need inputs and active cooperation of environmental experts, while accounting of aspects including valuation and ledgerisation can remain within the accounting domain. This not only brings uniformity to the entire process, and seeks active role of environmental management system (EMS) to establish uniformity while interpreting, as well as, disseminating information.
Valuation of externalities and corresponding limitations to develop it as an acceptable norm in business, has been a lexicon in environmental accounting theories. Methodological improvements in developing verifiable basis of ascertaining cost of waste or in ascertaining corresponding externalities that it contributes to, is expected to support businesses with improved understanding, capturing the impacts in nominal terms and to contribute to the scholarship of ecological modelling [14–16]. However, different class of waste could follow different routes of recycling, reuse, and ultimate disposal (cradle-to-grave), or return to the material cycle (cradle-to-cradle), or anything in between. For example:
\nManufacturer →
\n(Recyclable waste) Recycler → Reprocessing → Entry to material chain.
(Hazardous waste) Hazmat handler → Safe disposal.
(Non-recyclable waste) Municipal disposal → Landfill.
(End of life) Reclaiming for recycling → Recycler → Disposal.
As evident, each route of disposal would generate separate set of externalities that would be specific to the movement of waste. In other words, even though firms can scan the upstream and downstream supply chains to develop inventory of externalized liabilities, it would remain relative (or incomplete). With loss of causal relationship that waste suffer after entering into the pool of common/public goods, where regional complexities and multiple interaction upon dissemination makes it difficult to trace and capture impacts, quantification and monetization of aspects would results from our contemporary, not comprehensive, understanding of the ecological profile of waste. This brings in the cognitive limitations in discovering how waste might interact with different receptors in nature that would always be dynamic, and accordingly, would make it impossible to cover complete set of impacts and costs to be known at any given point of time (Figure 2). Other than the layered nature of truth, that would get exposed as collective human knowledge would grow, it would always lead to a certain degree of uncertainty in simultaneous determination of impacts (Δi) within a complex adaptive system, along with the cost (Δc) associated in neutralizing it (analogous to the Heisenberg’s uncertainty principle), and is contrary to the deterministic nature of costs and impacts that accounting theories are used to.
\nLayered nature of environmental impacts and costs (Sourced by Author).
Accordingly, we have to acknowledge the boundary of knowledge regarding future impacts of health and ecological effects and related monetary assessment of damage/remediation/restoration to remain outside the collective knowledge base (methodological limitations). Lack of information on exact causal relationship between aspect and impacts that are time-delayed might limit interpretation of damages (cognitive limitations), along with the second and higher order impacts that fail causation (interpretive challenges). This leads to two important conclusions for EA: (a) offering interpretation of business events by accepting probabilistic nature of outcomes as against the deterministic ones, and, (b) to view cost only as a proxy and not an outcome of elemental interactions. Accordingly, EA would need to support multiple measurements and valuation schemes, holding these as proxies to translate firm-environment exchange.
\nThis sub-section explores how EA improves the information base and supports sustainability. Firstly, it is relevant to explain how accounting—a two dimension construct of time and money—has evolved to be the language of business from economic perspectives. EA extends it to the third dimension by bringing in calculative practices of accounting to the domain of firm-environment exchange, aiming to help firms measure its impact on environment and resources. This process also encapsulates stakeholders’ demands and organizational interests to help firms identify, understand, and improve environmental performance.
\nSecond, environmental aspects generated by business and its impacts on biosphere are subject to the cognitive limitations of human knowledge, and would remain so, until and unless intricate nature of human activities and corresponding ecological responses across time are well understood. While these cognitive limitations would lead us to explore the complete cycle of natural interaction for the sake of improving scientific accuracy, it also supports layered nature of externalities that limits our ‘complete’ view. Accordingly, all impacts of an aspect would not be known at all times, and so would our efforts to derive costs to abate or harvest the aspects. Continuing with the argument, externalities generated by waste is not absolute, and instead, would depend on how organizations have chosen to deal with them. So in altruist sense, it is the externalities generated by the chosen path of the waste that should be reflected as the environmental liability of a firm.
\nWith reference to sustainability, this boundary reflects perennial nature of approximate understanding that we humans would have to live with, in regards to how we are engaged with our surroundings. Accordingly, the need for developing an accounting argument that is not dependent on frozen information of constituent elements and their reactions, as traditional accounting practices would have expected, becomes eminent. EA offers an in-principle arrangement to develop repository of the outcomes of firm-environmental interactions while preserving the capabilities of traditional accounting practices. Also, this can help firms review the very first step to deal with it, as that is within the sphere of its control, instead of investing in the efforts to analyse complete cycle, where EA can limit itself to account for the first-order impacts of the interactions. Although, such a view is proximate, it still highlights the important areas where firms should pay attention to, and redefine its accountability towards nature and society.
\nAn artificial system, like accounting, imitates human requirements to study events for abstracting information so as to generate a map that would help others to navigate and/or interact with the information produced and shared. However, EMA and contemporary sustainability theories are yet to develop a construct to support and measure the environmental embeddedness of firms, the in situ environmental care with which firms operate, where actions and decisions of a firm are guided by the degree to which firms are upholding their commitments to be environmentally benign as agents of societal progress. While critical theories have advocated to consider the constraints within the accounting capabilities to consider these, albeit theoretically, normative view preferred to look elsewhere, mostly due of the inability of a structure that cannot wrap these challenges within the current form of enactment, pushing the need itself to the fringes of our collective conscience. The two chapters on greening accounting aimed at carving a conceptual space for accounting to hold the intent, i.e. having ‘environmental well-being’ at its core, where accounting language can be leveraged to decipher business transactions in accordance to the needs. While the second part is always easy, it is the first part that is crucial and hopes to pave for enriching accounting, from being a pragmatic solution to uphold accountability that it is ingrained in!
\nThis section provides scheme to analyse business transactions of a firms from bookkeeping perspective, reflecting how the corresponding business activities might be generating or subsuming environmental assets. While the transaction categories covered here are not exhaustive and can be enhanced subsequently, the accounting schema represents how EA separates environmental dimension of business transactions from the financial/cost accounting-related transactions.
\nActivities that generate environmental aspects: This category of transactions would result in generation of aspects like emissions, solid waste, waste water, etc. that add to the stock of environmental assets. The corresponding liability would reflect environmental contingency arising due to the addition to common pool, where the accounting treatment would be:\n Dr. Environmental asset (aspect type) Aspect Qty X Valuation norm To Environmental liability (corresponding transaction class)
Sequestration/transfer of environmental aspects: Business activities that would result in sequestering or transferring environmental assets are part of this set. For example, reuse and recycling of food waste using in-house vermicomposting facility or recycling of waste water to improve grey water usage (as CHS did from the case study) to reduce environmental load. Similarly, sale of electricity by utilities would result as transfer-out of GHG load from producer to the consumer(s). Journal entry in this case could be:\n In case of sequestration: Dr. Environmental liability sequestered Aspect Qty saved X Valuation norm To Environmental Asset (aspect type) In case of transfer: Dr. Environmental liability transferred Aspect Qty saved X Valuation norm To Environmental Asset (aspect type)
Business activities earning environmental credits: Involvement of firms in community activities would result in reducing local waste and save social costs, e.g. reducing community waste by using organizational facilities, thereby helping the business to earn environmental credits. Journal entry in such cases would be to create a credit (or reward):\n Dr. Environmental savings generated Aspect Qty X Social costs saved To Environmental/Social Cost saved
Permit/fees/legal charges/other environmental expenses incurred by business: These transactions are driven by organizational interactions with market and legal system to improve/regulate environmental and social considerations of the firm and would include expenses incurred in purchasing/selling permits and/or licenses, and/or any other expenditure incurred that is/are related to or impacted due to environmental obligations/decisions. These transactions would generally be accounted within the financial books, and can also be EA to accumulate financial impacts supporting environment decisions of firms.\n Journal for expenditures: Dr. Environmental Expenditure (individual head) Amount incurred To Environmental contingency covered Journal for income: Dr. Environmental contingency impacted Amount incurred To Environmental Income (individual head)
Adjustment transactions in environmental ledgers: These entries would take place within the environmental ledgers to transfer balances, enter corrections, or revalue aspects due to change in quantification and/or valuation norms of the aspects. The journal entry would be:\n Dr. Environmental Ledger A Change in value To Environmental Ledger B
In recent years, researchers in the software engineering (SE) field have turned their interest to data mining (DM) and machine learning (ML)-based studies since collected SE data can be helpful in obtaining new and significant information. Software engineering presents many subjects for research, and data mining can give further insight to support decision-making related to these subjects.
Figure 1 shows the intersection of three main areas: data mining, software engineering, and statistics/math. A large amount of data is collected from organizations during software development and maintenance activities, such as requirement specifications, design diagrams, source codes, bug reports, program versions, and so on. Data mining enables the discovery of useful knowledge and hidden patterns from SE data. Math provides the elementary functions, and statistics determines probability, relationships, and correlation within collected data. Data science, in the center of the diagram, covers different disciplines such as DM, SE, and statistics.
The intersection of data mining and software engineering with other areas of the field.
This study presents a comprehensive literature review of existing research and offers an overview of how to approach SE problems using different mining techniques. Up to now, review studies either introduce SE data descriptions [1], explain tools and techniques mostly used by researchers for SE data analysis [2], discuss the role of software engineers [3], or focus only on a specific problem in SE such as defect prediction [4], design pattern [5], or effort estimation [6]. Some existing review articles having the same target [7] are former, and some of them are not comprehensive. In contrast to the previous studies, this article provides a systematic review of several SE tasks, gives a comprehensive list of available studies in the field, clearly states the advantages of mining SE data, and answers “how” and “why” questions in the research area.
The novelties and main contributions of this review paper are fivefold.
First, it provides a general overview of several SE tasks that have been the focus of studies using DM and ML, namely, defect prediction, effort estimation, vulnerability analysis, refactoring, and design pattern mining.
Second, it comprehensively discusses existing data mining solutions in software engineering according to various aspects, including methods (clustering, classification, association rule mining, etc.), algorithms (k-nearest neighbor (KNN), neural network (NN), etc.), and performance metrics (accuracy, mean absolute error, etc.).
Third, it points to several significant research questions that are unanswered in the recent literature as a whole or the answers to which have changed with the technological developments in the field.
Fourth, some statistics related to the studies between the years of 2010 and 2019 are given from different perspectives: according to their subjects and according to their methods.
Five, it focuses on different machine learning types: supervised and unsupervised learning, especially on ensemble learning and deep learning.
This paper addresses the following research questions:
RQ1. What kinds of SE problems can ML and DM techniques help to solve?
RQ2. What are the advantages of using DM techniques in SE?
RQ3. Which DM methods and algorithms are commonly used to handle SE tasks?
RQ4. Which performance metrics are generally used to evaluate DM models constructed in SE studies?
RQ5. Which types of machine learning techniques (e.g., ensemble learning, deep learning) are generally preferred for SE problems?
RQ6. Which SE datasets are popular in DM studies?
The remainder of this paper is organized as follows. Section 2 explains the knowledge discovery process that aims to extract interesting, potentially useful, and nontrivial information from software engineering data. Section 3 provides an overview of current work on data mining for software engineering grouped under five tasks: defect prediction, effort estimation, vulnerability analysis, refactoring, and design pattern mining. In addition, some machine learning studies are divided into subgroups, including ensemble learning- and deep learning-based studies. Section 4 gives statistical information about the number of highly validated research conducted in the last decade. Related works considered as fundamental by journals with a highly positive reputation are listed, and the specific methods they used and their categories and purposes are clearly expressed. In addition, widely used datasets related to SE are given. Finally, Section 5 offers concluding remarks and suggests future scientific and practical efforts that might improve the efficiency of SE actions.
This section basically explains the consecutive critical steps that should be followed to discover beneficial knowledge from software engineering data. It outlines the order of necessary operations in this process and explains how related data flows among them.
Software development life cycle (SDLC) describes a process to improve the quality of a product in project management. The main phases of SDCL are planning, requirement analysis, designing, coding, testing, and maintenance of a project. In every phase of software development, some software problems (e.g., software bugs, security, or design problems) may occur. Correcting these problems in the early phases leads to more accurate and timely delivery of the project. Therefore, software engineers broadly apply data mining techniques for different SE tasks to solve SE problems and to enhance programming efficiency and quality.
Figure 2 presents the data mining and knowledge discovery process of SE tasks including data collection, data preprocessing, data mining, and evaluation. In the data collection phase, data are obtained from software projects such as bug reports, historical data, version control data, and mailing lists that include various information about the project’s versions, status, or improvement. In the data preprocessing phase, the data are preprocessed after collection by using different methods such as feature selection (dimensionality reduction), feature extraction, missing data elimination, class imbalance analysis, normalization, discretization, and so on. In the next phase, DM techniques such as classification, clustering, and association rule mining are applied to discover useful patterns and relationships in software engineering data and therefore to solve a software engineering problem such as defected or vulnerable systems, reused patterns, or parts of code changes. Mining and obtaining valuable knowledge from such data prevents errors and allows software engineers to deliver the project on time. Finally, in the evaluation phase, validation techniques are used to assess the data mining results such as k-fold cross validation for classification. The commonly used evaluation measures are accuracy, precision, recall, F-score, area under the curve (AUC) for classification, and sum of squared errors (SSE) for clustering.
KDD process for software engineering.
In this review, we examine data mining studies in various SE tasks and evaluate commonly used algorithms and datasets.
A defect means an error, failure, flaw, or bug that causes incorrect or unexpected results in a system [8]. A software system is expected to be without any defects since software quality represents a capacity of the defect-free percentage of the product [9]. However, software projects often do not have enough time or people working on them to extract errors before a product is released. In such a situation, defect prediction methods can help to detect and remove defects in the initial stages of the SDLC and to improve the quality of the software product. In other words, the goal of defect prediction is to produce robust and effective software systems. Hence, software defect prediction (SDP) is an important topic for software engineering because early prediction of software defects could help to reduce development costs and produce more stable software systems.
Various studies have been conducted on defect prediction using different metrics such as code complexity, history-based metrics, object-oriented metrics, and process metrics to construct prediction models [10, 11]. These models can be considered on a cross-project or within-project basis. In within-project defect prediction (WPDP), a model is constructed and applied on the same project [12]. For within-project strategy, a large amount of historical defect data is needed. Hence, in new projects that do not have enough data to train, cross-project strategy may be preferred [13]. Cross-project defect prediction (CPDP) is a method that involves applying a prediction model from one project to another, meaning that models are prepared by utilizing historical data from other projects [14, 15]. Studies in the field of CPDP have increased in recent years [10, 16]. However, there are some deficiencies in comparisons of prior studies since they cannot be replicated because of the difference in utilizing evaluation metrics or preparation way of training data. Therefore, Herbold et al. [16] tried to replicate different CPDP methods previously proposed and find which approach performed best in terms of metrics such as F-score, area under the curve (AUC), and Matthews correlation coefficient (MCC). Results showed that 7- or 8-year approaches may perform better. Another study [17] replicated prior work to demonstrate whether the determination of classification techniques is important. Both noisy and cleaned datasets were used, and the same results were obtained from the two datasets. However, new dataset gave better results for some classification algorithms. For this reason, authors claimed that the selection of classification techniques affects the performance of the model.
Numerous defect prediction studies have been conducted using DM techniques. In the following subsections, we will explain these studies in terms of whether they apply ensemble learning or not. Some defect prediction studies in SE are compared in Table 1. The objective of the studies, the year they were conducted, algorithms, ensemble learning techniques and datasets in the studies, and the type of data mining tasks are shown in this table. The bold entries in Table 1 have better performance than other algorithms in that study.
Ref. | Year | Task | Objective | Algorithms | Ensemble learning | Dataset | Evaluation metrics and results |
---|---|---|---|---|---|---|---|
[18] | 2011 | Classification | Comparative study of various ensemble methods to find the most effective one | NB | Bagging, boosting, RT, RF, RS, AdaBoost, Stacking, and Voting | NASA datasets: CM1 JM1 KC1 KC2 KC3 KC4 MC1 MC2 MW1 PC1 PC2 PC3 PC4 PC5 | 10-fold CV, ACC, and AUC Vote 88.48% random forest 87.90% |
[19] | 2013 | Classification | Comparative study of class imbalance learning methods and proposed dynamic version of AdaBoost.NC | NB, RUS, RUS-bal, THM, SMB, BNC | RF, SMB, BNC, AdaBoost.NC | NASA and PROMISE repository: MC2, KC2, JM1, KC1, PC4, PC3, CM1, KC3, MW1, PC1 | 10-fold CV Balance, G-mean and AUC, PD, PF |
[20] | 2014 | Classification | Comparative study to deal with imbalanced data | Base Classifiers: C4.5, NB Sampling: ROS, RUS, SMOTE | AdaBoost, Bagging, boosting, RF | NASA datasets: CM1, JM1, KC1, KC2, KC3, MC1, MC2, MW1, PC1, PC2, PC3, PC4, PC5 | 5 × 5 CV, MCC, ROC, results change according to characteristics of datasets |
[17] | 2015 | Clustering/classification | To show that the selection of classification technique has an impact on the performance of software defect prediction models | Statistical: NB, Simple Logistic Clustering: KM, EM Rule based: Ripper, Ridor NNs: RBF Nearest neighbor: KNN DTs: J48, LMT | Bagging, AdaBoost, rotation forest, random subspace | NASA: CM1, JM1, KC1, KC3, KC4, MW1, PC1, PC2, PC3, PC4 PROMISE: Ant 1.7, Camel 1.6, Ivy 1.4, Jedit 4, Log4j 1, Lucene 2.4, Poi 3, Tomcat 6, Xalan 2.6, Xerces 1.3 | 10 × 10-fold CV AUC > 0.5 Scott-Knott test α = 0.05, simple logistic, LMT, and RF + base learner outperforms KNN and RBF |
[21] | 2015 | Classification | Average probability ensemble (APE) learning module is proposed by combining feature selection and ensemble learning | APE system combines seven classifiers: SGD, weighted SVMs (W-SVMs), LR, MNB and Bernoulli naive Bayes (BNB) | RF, GB | NASA: CM1, JM1, KC1, KC3, KC4, MW1, PC1, PC2, PC3, PC4 PROMISE (RQ2): Ant 1.7, Camel 1.6, Ivy 1.4, Jedit 4, Log4j 1, Lucene 2.4, Poi 3, Tomcat 6, Xalan 2.6, Xerces 1.3 | 10 × 10-fold CV, AUC > 0.5 Scott-Knott test α = 0.05, simple logistic, LMT, and RF + base learner outperforms KNN and RBF |
[22, 23] | 2016 | Classification | Comparative study of 18 ML techniques using OO metrics on six releases of Android operating system | LR, NB, BN, MLP, RBF SVM, VP, CART, J48, ADT, Nnge, DTNB | Bagging, random forest, Logistic model trees, Logit Boost, Ada Boost | 6 releases of Android app: Android 2.3.2, Android 2.3.7, Android 4.0.4, Android 4.1.2, Android 4.2.2, Android 4.3.1 | 10-fold, inter-release validation AUC for NB, LB, MLP is >0.7 |
[24] | 2016 | Classification | Caret has been applied whether parameter settings can have a large impact on the performance of defect prediction models | NB, KNN, LR, partial least squares, NN, LDA, rule based, DT, SVM | Bagging, boosting | Cleaned NASA JM1, PC5 Proprietary from Prop-1 to Prop-5 Apache Camel 1.2, Xalan 2.5–2.6 Eclipse Platform 2.0–2.1–3.0, Debug 3.4, SWT 3.4, JDT, Mylyn, PDE | Out-of-sample bootstrap validation technique, AUC Caret AUC performance up to 40 percentage points |
[25] | 2017 | Regression | Aim is to validate the source code metrics and identify a suitable set of source code metrics | 5 training algorithms: GD, GDM, GDX, NM, LM | Heterogeneous linear and nonlinear ensemble methods | 56 open-source Java projects from PROMISE Repository | 10-fold CV, t-test, ULR analysis Neural network with Levenberg Marquardt (LM) is the best |
[16] | 2017 | Classification | Replicate 24 CDPD approaches, and compare on 5 different datasets | DT, LR, NB, SVM | LE, RF, BAG-DT, BAG-NB, BOOST-DT, BOOST-NB | 5 available datasets: JURECZKO, NASA MDP, AEEEM, NETGENE, RELINK | Recall, PR, ACC, G-measure, F-score, MCC, AUC |
[26] | 2017 | Classification | Just-in-time defect prediction (TLEL) | NB, SVM, DT, LDA, NN | Bagging, stacking | Bugzilla, Columba, JDT, Platform, Mozilla, and PostgreSQL | 10-fold CV, F-score |
[13] | 2017 | Classification | Adaptive Selection of Classifiers in bug prediction (ASCI) method is proposed. | Base classifiers: LOG (binary logistic regression), NB, RBF, MLP, DT | Voting | Ginger Bread (2.3.2 and 2.3.7), Ice Cream Sandwich (4.0.2 and 4.0.4), and JellyBean (4.1.2, 4.2.2 and 4.3.1) | 10-fold, inter-release validation AUC for NB, LB, MLP is >0.7 |
[27] | 2018 | Classification | MULTI method for JIT-SDP (just in time software defect prediction) | EALR, SL, RBFNet Unsupervised: LT, AGE | Bagging, AdaBoost, Rotation Forest, RS | Bugzilla, Columba, Eclipse JDT, Eclipse Platform, Mozilla, PostgreSQ | CV, timewise-CV, ACC, and POPT MULTI performs significantly better than all the baselines |
[28] | 2007 | Classification | To found pre- and post-release defects for every package and file | LR | — | Eclipse 2.0, 2.1, 3.0 | PR, recall, ACC |
[8] | 2014 | Clustering | Cluster ensemble with PSO for clustering the software modules (fault-prone or not fault-prone) | PSO clustering algorithm | KM-E, KM-M, PSO-E, PSO-M and EM | Nasa MDP, PROMISE | |
[29] | 2015 | Classification | Defect identification by applying DM algorithms | NB, J48, MLP | — | PROMISE, NASA MDP dataset: CM1, JM1, KC1, KC3, MC1, MC2, MW1, PC1, PC2, PC3 | 10-fold CV, ACC, PR, FMLP is the best |
[30] | 2015 | Classification | To show the attributes that predict the defective state of software modules | NB, NN, association rules, DT | Weighted voting rule of the four algorithms | NASA datasets: CM1, JM1, KC1, KC2, PC1 | PR, recall, ACC, F-score NB > NN > DT |
[31] | 2016 | Classification | Authors proposed a model that finds fault-proneness | NB, LR, LivSVM, MLP, SGD, SMO, VP, LR Logit Boost, Decision Stamp, RT, REP Tree | RF | Camel1.6, Tomcat 6.0, Ant 1.7, jEdit4.3, Ivy 2.0, arc, e-learning, berek, forrest 0.8, zuzel, Intercafe, and Nieruchomosci | 10-fold CV, AUC AUC = 0.661 |
[32] | 2016 | Classification | GA to select suitable source code metrics | LR, ELM, SVML, SVMR, SVMP | — | 30 open-source software projects from PROMISE repository from DS1 to DS30 | 5-fold CV, F-score, ACC, pairwise t-test |
[33] | 2016 | — | Weighted least-squares twin support vector machine (WLSTSVM) to find misclassification cost of DP | SVM, NB, RF, LR, KNN, BN, cost-sensitive neural network | — | PROMISE repository: CM1, KC1, PC1, PC3, PC4, MC2, KC2, KC3 | 10-fold CV, PR, recall, F-score, G-mean Wilcoxon signed rank test |
[34] | 2016 | — | A multi-objective naive Bayes learning techniques MONB, MOBNN | NB, LR, DT, MODT, MOLR, MONB | — | Jureczko datasets obtained from PROMISE repository | AUC, Wilcoxon rank test CP MO NB (0.72) produces the highest value |
[35] | 2016 | Classification | A software defect prediction model to find faulty components of a software | Hybrid filter approaches FISHER, MR, ANNIGMA. | — | KC1, KC2, JM1, PC1, PC2, PC3, and PC4 datasets | ACC, ent filters, ACC 90% |
[36] | 2017 | Classification | Propose an hybrid method called TSC-RUS + S | A random undersampling based on two-step cluster (TSC) | Stacking: DT, LR, kNN, NB | NASA MDP: i.e., CM1, KC1, KC3, MC2, MW1, PC1, PC2, PC3, PC4 | 10-fold CV, AUC, (TSC-RUS + S) is the best |
[37] | 2017 | Classification | Analyze five popular ML algorithms for software defect prediction | ANN, PSO, DT, NB, LC | — | Nasa and PROMISE datasets: CM1, JM1, KC1, KC2, PC1, KC1-LC | 10-fold CV ANN < DT |
[38] | 2018 | Classification | Three well-known ML techniques are compared. | NB, DT, ANN | — | Three different datasets DS1, DS2, DS3 | ACC, PR, recall, F, ROC ACC 97% DT > ANN > NB |
[10] | 2018 | Classification | ML algorithms are compared with CODEP | LR, BN, RBF, MLP, alternating decision tree (ADTree), and DT | Max, CODEP, Bagging J48, Bagging NB, Boosting J48, Boosting NB, RF | PROMISE: Ant, Camel, ivy, Jedit, Log4j, Lucene, Poi, Prop, Tomcat, Xalan | F-score, PR, AUC ROC Max performs better than CODEP |
Data mining and machine learning studies on the subject “defect prediction.”
Ensemble learning combines several base learning models to obtain better performance than individual models. These base learners can be acquired with:
Different learning algorithms
Different parameters of the same algorithm
Different training sets
The commonly used ensemble techniques bagging, boosting, and stacking are shown in Figure 3 and briefly explained in this part. Bagging (which stands for bootstrap aggregating) is a kind of parallel ensemble. In this method, each model is built independently, and multiple training datasets are generated from the original dataset through random selection of different feature subsets; thus, it aims to decrease variance. It combines the outputs of each ensemble member by a voting mechanism. Boosting can be described as sequential ensemble. First, the same weights are assigned to data instances; after training, the weight of wrong predictions is increased, and this process is repeated as the ensemble size. Finally, it uses a weighted voting scheme, and in this way, it aims to decrease bias. Stacking is a technique that uses predictions from multiple models via a meta-classifier.
Common ensemble learning methods: (a) Bagging, (b) boosting, (c) stacking.
Some software defect prediction studies have compared ensemble techniques to determine the best performing one [10, 18, 21, 39, 40]. In a study conducted by Wang et al. [18], different ensemble techniques such as bagging, boosting, random tree, random forest, random subspace, stacking, and voting were compared to each other and a single classifier (NB). According to the results, voting and random forest clearly exhibited better performance than others. In a different study [39], ensemble methods were compared with more than one base learner (NB, BN, SMO, PART, J48, RF, random tree, IB1, VFI, DT, NB tree). For boosted SMO, bagging J48, and boosting and bagging RT, performance of base classifiers was lower than that of ensemble learner classifiers.
In study [21], a new method was proposed of mixing feature selection and ensemble learning for defect classification. Results showed that random forests and the proposed algorithm are not affected by poor features, and the proposed algorithm outperforms existing single and ensemble classifiers in terms of classification performance. Another comparative study [10] used seven composite algorithms (Ave, Max, Bagging C4.5, bagging naive Bayes (NB), Boosting J48, Boosting naive Bayes, and RF) and one composite state-of-the art study for cross-project defect prediction. The Max algorithm yielded the best results regarding F-score in terms of classification performance.
Bowes et al. [40] compared RF, NB, Rpart, and SVM algorithms to determine whether these classifiers obtained the same results. The results demonstrated that a unique subset of defects can be discovered by specific classifiers. However, whereas some classifiers are steady in the predictions they make, other classifiers change in their predictions. As a result, ensembles with decision-making without majority voting can perform best.
One of the main problems of SDP is the imbalance between the defect and non-defect classes of the dataset. Generally, the number of defected instances is greater than the number of non-defected instances in the collected data. This situation causes the machine learning algorithms to perform poorly. Wang and Yao [19] compared five class-imbalanced learning methods (RUS, RUS-bal, THM, BNC, SMB) and NB and RF algorithms and proposed the dynamic version of AdaBoost.NC. They utilized balance, G-mean, and AUC measures for comparison. Results showed that AdaBoost.NC and naive Bayes are better than the other seven algorithms in terms of evaluation measures. Dynamic AdaBoost.NC showed better defect detection rate and overall performance than the original AdaBoost.NC. To handle the class imbalance problem, studies [20] have compared different methods (sampling, cost sensitive, hybrid, and ensemble) by taking into account evaluation metrics such as MCC and receiver operating characteristic (ROC).
As shown in Table 1, the most common datasets used in the defect prediction studies [17, 18, 19, 39] are the NASA MDP dataset and PROMISE repository datasets. In addition, some studies utilized open-source projects such as Bugzilla Columba and Eclipse JDT [26, 27], and other studies used Android application data [22, 23].
Although use of ensemble learning techniques has dramatically increased recently, studies that do not use ensemble learning are still conducted and successful. For example, in study [32], prediction models were created using source code metrics as in ensemble studies but by using different feature selection techniques such as genetic algorithm (GA).
To overcome the class imbalance problem, Tomar and Agarwal [33] proposed a prediction system that assigns lower cost to non-defective data samples and higher cost to defective samples to balance data distribution. In the absence of enough data within a project, required data can be obtained from cross projects; however, in this case, this situation may cause class imbalance. To solve this problem, Ryu and Baik [34] proposed multi-objective naïve Bayes learning for cross-project environments. To obtain significant software metrics on cloud computing environments, Ali et al. used a combination of filter and wrapper approaches [35]. They compared different machine learning algorithms such as NB, DT, and MLP [29, 37, 38, 41].
Software effort estimation (SEE) is critical for a company because hiring more employees than required will cause loss of revenue, while hiring fewer employees than necessary will result in delays in software project delivery. The estimation analysis helps to predict the amount of effort (in person hours) needed to develop a software product. Basic steps of software estimation can be itemized as follows:
Determine project objectives and requirements.
Design the activities.
Estimate product size and complexity.
Compare and repeat estimates.
SEE contains requirements and testing besides predicting effort estimation [42]. Many research and review studies have been conducted in the field of SEE. Recently, a survey [43] analyzed effort estimation studies that concentrated on ML techniques and compared them with studies focused on non-ML techniques. According to the survey, case-based reasoning (CBR) and artificial neural network (ANN) were the most widely used techniques. In 2014, Dave and Dutta [44] examined existing studies that focus only on neural network.
The current effort estimation studies using DM and ML techniques are available in Table 2. This table summarizes the prominent studies in terms of aspects such as year, data mining task, aim, datasets, and metrics. Table 2 indicates that neural network is the most widely used technique for the effort estimation task.
Ref. | Year | Task | Objective | Algorithms | Ensemble learning | Dataset | Evaluation metrics and results |
---|---|---|---|---|---|---|---|
[45] | 2008 | Regression | Ensemble of neural networks with associative memory (ENNA) | NN, MLP, KNN | Bagging | NASA, NASA 93, USC, SDR, Desharnais | MMRE, MdMRE and PRED(L) For ENNA PRED(25) = 36.4 For neural network PRED(25) = 8 |
[46] | 2009 | Regression | Authors proposed the ensemble of neural networks with associative memory (ENNA) | NN, MLP, KNN | Bagging | NASA, NASA 93, USC, SDR, Desharnais | Random subsampling, t-test MMRE, MdMRE, and PRED(L) ENNA is the best |
[47] | 2010 | Regression | To show the effectiveness of SVR for SEE | SVR, RBF | — | Tukutuku | LOOCV, MMRE, Pred(25), MEMRE, MdEMRE SVR outperforms others |
[48] | 2011 | Regression | To evaluate whether readily available ensemble methods enhance SEE | MLP, RBF, RT | Bagging | 5 datasets from PROMISE: cocomo81, nasa93, nasa, sdr, and Desharnais 8 datasets from ISBSG repository | MMRE, MdMRE, PRED(25) RTs and Bagging with MLPs perform similarly |
[49] | 2012 | Regression | To show the measures behave in SEE and to create good ensembles | MLP, RBF, REPTree, | Bagging | cocomo81, nasa93, nasa, cocomo2, desharnais, ISBSG repository | MMRE, PRED(25), LSD, MdMRE, MAE, MdAE Pareto ensemble for all measures, except LSD. |
[50] | 2012 | Regression | To use cross-company models to create diverse ensembles able to dynamically adapt to changes | WC RTs, CC-DWM | WC-DWM | 3 datasets from ISBSG repository (ISBSG2000, ISBSG2001, ISBSG) 2 datasets from PROMISE (CocNasaCoc81 and CocNasaCoc81Nasa93) | MAE, Friedman test Only DCL could improve upon RT CC data potentially beneficial for improving SEE |
[51] | 2012 | Regression | To generate estimates from ensembles of multiple prediction methods | CART, NN, LR, PCR, PLSR, SWR, ABE0-1NN, ABE0-5NN | Combining top M solo methods | PROMISE | MAR, MMRE, MdMRE, MMER, MBRE, MIBRE. Combinations perform better than 83% |
[52] | 2012 | Classification/regression | DM techniques to estimate software effort. | M5, CART, LR, MARS, MLPNN, RBFNN, SVM | — | Coc81, CSC, Desharnais, Cocnasa, Maxwell, USP05 | MdMRE, Pred(25), Friedman test Log + OLS > LMS, BC + OLS, MARS, LS-SVM |
[53] | 2013 | Clustering/classification | Estimation of software development effort | NN, ABE, C-means | — | Maxwell | 3-fold CV and LOOCV, RE, MRE, MMRE, PRED |
[54] | 2014 | Regression | ANNs are examined using COCOMO model | MLP, RBFNN, SVM, PSO-SVM Extreme learning Machines | — | COCOMO II Data | MMRE, PRED PSO-SVM is the best |
[55] | 2014 | — | A hybrid model based on GA And ACO for optimization | GA, ACO | — | NASA datasets | MMRE, the proposed method is the best |
[56] | 2015 | Regression | To display the effect of data preprocessing techniques on ML methods in SEE | CBR, ANN, CART Preprocessing rech: MDT, LD, MI, FS, CS, FSS, BSS | — | ISBSG, Desharnais, Kitchenham, USPFT | CV, MBRE, PRED (0.25), MdBRE |
[57] | 2016 | Regression | Four neural network models are compared with each other. | MLP, RBFNN, GRNN, CCNN | — | ISBSG repository | 10-fold CV, MAR The CCNN outperforms the other three models |
[58] | 2016 | Regression | To propose a model based on Bayesian network | GA and PSO | — | COCOMO NASA Dataset | DIR, DRM The proposed model is best |
[59] | 2016 | Classification/regression | A hybrid model using SVM and RBNN compared against previous models | SVM, RBNN | — | Dataset1 = 45 industrial projects Dataset2 = 65 educational projects | LOOCV, MAE, MBRE, MIBRE, SA The proposed approach is the best |
[60] | 2017 | Classification | To estimate software effort by using ML techniques | SVM, KNN | Boosting: kNN and SVM | Desharnais, Maxwell | LOOCV, k-fold CV ACC = 91.35% for Desharnais ACC = 85.48% for Maxwell |
Data mining and machine learning studies on the subject “effort estimation.”
Several studies have compared ensemble learning methods with single learning algorithms [45, 46, 48, 49, 51, 60] and examined them on cross-company (CC) and within-company (WC) datasets [50]. The authors observed that ensemble methods obtained by a proper combination of estimation methods achieved better results than single methods. Various ML techniques such as neural network, support vector machine (SVM), and k-nearest neighbor are commonly used as base classifiers for ensemble methods such as bagging and boosting in software effort estimation. Moreover, their results indicate that CC data can increase performance over WC data for estimation techniques [50].
In addition to the abovementioned studies, researchers have conducted studies without using ensemble techniques. The general approach is to investigate which DM technique has the best effect on performance in software effort estimation. For instance, Subitsha and Rajan [54] compared five different algorithms—MLP, RBFNN, SVM, ELM, and PSO-SVM—and Nassif et al. [57] investigated four neural network algorithms—MLP, RBFNN, GRNN, and CCNN. Although neural networks are widely used in this field, missing values and outliers frequently encountered in the training set adversely affect neural network results and cause inaccurate estimations. To overcome this problem, Khatibi et al. [53] split software projects into several groups based on their similarities. In their studies, the C-means clustering algorithm was used to determine the most similar projects and to decrease the impact of unrelated projects, and then analogy-based estimation (ABE) and NN were applied. Another clustering study by Azzeh and Nassif [59] combined SVM and bisecting k-medoids clustering algorithms; an estimation model was then built using RBFNN. The proposed method was trained on historical use case points (UCP).
Zare et al. [58] and Maleki et al. [55] utilized optimization methods for accurate cost estimation. In the former study, a model was proposed based on Bayesian network with genetic algorithm and particle swarm optimization (PSO). The latter study used GA to optimize the effective factors’ weight, and then trained by ant colony optimization (ACO). Besides conventional effort estimation studies, researchers have utilized machine learning techniques for web applications. Since web-based software projects are different from traditional projects, the effort estimation process for these studies is more complex.
It is observed that PRED(25) and MMRE are the most popular evaluation metrics in effort estimation. MMRE stands for the mean magnitude relative error, and PRED(25) measures prediction accuracy and provides a percentage of predictions within 25% of actual values.
Vulnerability analysis is becoming the focal point of system security to prevent weaknesses in the software system that can be exploited by an attacker. Description of software vulnerability is given in many different resources in different ways [61]. The most popular and widely utilized definition appears in the Common Vulnerabilities and Exposures (CVE) 2017 report as follows:
Vulnerability is a weakness in the computational logic found in software and some hardware components that, when exploited, results in a negative impact to confidentiality, integrity or availability.
Vulnerability analysis may require many different operations to identify defects and vulnerabilities in a software system. Vulnerabilities, which are a special kind of defect, are more critical than other defects because attackers exploit system vulnerabilities to perform unauthorized actions. A defect is a normal problem that can be encountered frequently in the system, easily found by users or developers and fixed promptly, whereas vulnerabilities are subtle mistakes in large codes [62, 63]. Wijayasekara et al. claim that some bugs have been identified as vulnerabilities after being publicly announced in bug databases [64]. These bugs are called “hidden impact vulnerabilities” or “hidden impact bugs.” Therefore, the authors proposed a hidden impact vulnerability identification methodology that utilizes text mining techniques to determine which bugs in bug databases are vulnerabilities. According to the proposed method, a bug report was taken as input, and it produces feature vector after applying text mining. Then, classifier was applied and revealed whether it is a bug or a vulnerability. The results given in [64] demonstrate that a large proportion of discovered vulnerabilities were first described as hidden impact bugs in public bug databases. While bug reports were taken as input in that study, in many other studies, source code is taken as input. Text mining is a highly preferred technique for obtaining features directly from source codes as in the studies [65, 66, 67, 68, 69]. Several studies [63, 70] have compared text mining-based models and software metrics-based models.
In the security area of software systems, several studies have been conducted related to DM and ML. Some of these studies are compared in Table 3, which shows the data mining task and explanation of the studies, the year they were performed, the algorithms that were used, the type of vulnerability analysis, evaluation metrics, and results. In this table, the best performing algorithms according to the evaluation criteria are shown in bold.
Ref. | Year | Task | Objective | Algorithms | Type | Dataset description | Evaluation metrics and results |
---|---|---|---|---|---|---|---|
[71] | 2011 | Clustering | Obtaining software vulnerabilities based on RDBC | RDBC | Static | Database is built by RD-Entropy | FNR, FPR |
[42] | 2011 | Classification/regression | To predict the time to next vulnerability | LR, LMS, MLP, RBF, SMO | Static | NVD, CPE, CVSS | CC, RMSE, RRSE |
[65] | 2012 | Text mining | Analysis of source code as text | RBF, SVM | Static | K9 email client for the Android platform | ACC, PR, recall ACC = 0.87, PR = 0.85, recall = 0.88 |
[64] | 2012 | Classification/text mining | To identify vulnerabilities in bug databases | — | Static | Linux kernel MITRE CVE and MySQL bug databases | BDR, TPR, FPR 32% (Linux) and 62% (MySQL) of vulnerabilities |
[72] | 2014 | Classification/regression | Combine taint analysis and data mining to obtain vulnerabilities | ID3, C4.5/J48, RF, RT, KNN, NB, Bayes Net, MLP, SVM, LR | Hybrid | A version of WAP to collect the data | 10-fold CV, TPD, ACC, PR, KAPPA ACC = 90.8%, PR = 92%, KAPPA = 81% |
[73] | 2014 | Clustering | Identify vulnerabilities from source codes using CPG | — | Static | Neo4J and InfiniteGraph databases | — |
[63] | 2014 | Classification | Comparison of software metrics with text mining | RF | Static | Vulnerabilities from open-source web apps (Drupal, Moodle, PHPMyAdmin) | 3-fold CV, recall, IR, PR, FPR, ACC. Text mining provides benefits overall |
[69] | 2014 | Classification | To create model in the form of a binary classifier using text mining | NB, RF | Static | Applications from the F-Droid repository and Android | 10-fold CV, PR, recall PR and recall ≥ 80% |
[74] | 2015 | Classification | A new approach (VCCFinder) to obtain potentially dangerous codes | SVM-based detection model | — | The database contains 66 GitHub projects | k-fold CV, false alarms <99% at the same level of recall |
[70] | 2015 | Ranking/classification | Comparison of text mining and software metrics models | RF | — | Vulnerabilities from open-source web apps (Drupal, Moodle, PHPMyAdmin) | 10-fold CV Metrics: ER-BCE, ERBPP, ER-AVG |
[75] | 2015 | Clustering | Search patterns for taint-style vulnerabilities in C code | Hierarchical clustering (complete-linkage) | Static | 5 open-source projects: Linux, OpenSSL, Pidgin, VLC, Poppler (Xpdf) | Correct source, correct sanitization, number of traversals, generation time, execution time, reduction, amount of code review <95% |
[76] | 2016 | Classification | Static and dynamic features for classification | LR, MLP, RF | Hybrid | Dataset was created by analyzing 1039 test cases from the Debian Bug Tracker | FPR, FNR Detect 55% of vulnerable programs |
[77] | 2017 | Classification | 1. Employ a deep neural network 2. Combine N-gram analysis and feature selection | Deep neural network | — | Feature extraction from 4 applications (BoardGameGeek, Connectbot, CoolReader, AnkiDroid) | 10 times using 5-fold CV ACC = 92.87%, PR = 94.71%, recall = 90.17% |
[67] | 2017 | Text mining | To analyze characteristics of software vulnerability from source files | — | — | CVE, CWE, NVD databases | PR = 70%, recall = 60% |
[68] | 2017 | Text mining | Deep learning (LSTM) is used to learn semantic and syntactic features in code | RNN, LSTM, DBN | — | Experiments on 18 Java applications from the Android OS platform | 10-fold CV, PR, recall, and F-score Deep Belief Network PR, recall, and F-score > 80% |
[66] | 2018 | Classification | Identify bugs by extracting text features from C source code | NB, KNN, K-means, NN, SVM, DT, RF | Static | NVD, Cat, Cp, Du, Echo, Head, Kill, Mkdir, Nl, Paste, Rm, Seq, Shuf, Sleep, Sort, Tail, Touch, Tr, Uniq, Wc, Whoami | 5-fold CV ACC, TP, TN ACC = 74% |
[78] | 2018 | Regression | A deep learning-based vulnerability detection system (VulDeePecker) | BLSTM NN | Static | NIST: NVD and SAR project | 10-fold CV, PR, recall, F-score F-score = 80.8% |
[79] | 2018 | Classification | A mapping between existing requirements and vulnerabilities | LR, SVM, NB | — | Data is gathered from Apache Tomcat, CVE, requirements from Bugzilla, and source code is collected from Github | PR, recall, F-score LSI > SVM |
Data mining and machine learning studies on the subject “vulnerability analysis.”
Vulnerability analysis can be categorized into three types: static vulnerability analysis, dynamic vulnerability analysis, and hybrid analysis [61, 80]. Many studies have applied the static analysis approach, which detects vulnerabilities from source code without executing software, since it is cost-effective. Few studies have performed the dynamic analysis approach, in which one must execute software and check program behavior. The hybrid analysis approach [72, 76] combines these two approaches.
As revealed in Table 3, in addition to classification and text mining, clustering techniques are also frequently seen in software vulnerability analysis studies. To detect vulnerabilities in an unknown software data repository, entropy-based density clustering [71] and complete-linkage clustering [75] were proposed. Yamaguchi et al. [73] introduced a model to represent a large number of source codes as a graph called control flow graph (CPG), a combination of abstract syntax tree, CFG, and program dependency graph (PDG). This model enabled the discovery of previously unknown (zero-day) vulnerabilities.
To learn the time to next vulnerability, a prediction model was proposed in the study [42]. The result could be a number that refers to days or a bin representing values in a range. The authors used regression and classification techniques for the former and latter cases, respectively.
In vulnerability studies, issue tracking systems like Bugzilla, code repositories like Github, and vulnerability databases such as NVD, CVE, and CWE have been utilized [79]. In addition to these datasets, some studies have used Android [65, 68, 69] or web [63, 70, 72] (PHP source code) datasets. In recent years, researchers have concentrated on deep learning for building binary classifiers [77], obtaining vulnerability patterns [78], and learning long-term dependencies in sequential data [68] and features directly from the source code [81].
Li et al. [78] note two difficulties of vulnerability studies: demanding, intense manual labor and high false-negative rates. Thus, the widely used evaluation metrics in vulnerability analysis are false-positive rate and false-negative rate.
During the past years, software developers have used design patterns to create complex software systems. Thus, researchers have investigated the field of design patterns in many ways [82, 83]. Fowler defines a pattern as follows:
“A pattern is an idea that has been useful in one practical context and will probably be useful in others.” [84]
Patterns display relationships and interactions between classes or objects. Well-designed object-oriented systems have various design patterns integrated into them. Design patterns can be highly useful for developers when they are used in the right manner and place. Thus, developers avoid recreating methods previously refined by others. The pattern approach was initially presented in 1994 by four authors—namely, Erich Gama, Richard Helm, Ralph Johnson, and John Vlissides—called the Gang of Four (GOF) in 1994 [85]. According to the authors, there are three types of design patterns:
Creational patterns provide an object creation mechanism to create the necessary objects based on predetermined conditions. They allow the system to call appropriate object and add flexibility to the system when objects are created. Some creational design patterns are factory method, abstract factory, builder, and singleton.
Structural patterns focus on the composition of classes and objects to allow the establishment of larger software groups. Some of the structural design patterns are adapter, bridge, composite, and decorator.
Behavioral patterns determine common communication patterns between objects and how multiple classes behave when performing a task. Some behavioral design patterns are command, interpreter, iterator, observer, and visitor.
Many design pattern studies exist in the literature. Table 4 shows some design pattern mining studies related to machine learning and data mining. This table contains the aim of the study, mining task, year, and design patterns selected by the study, input data, dataset, and results of the studies.
Ref. | Year | Task | Objective | Algorithms | EL | Selected design patterns | Input data | Dataset | Evaluation metrics and results |
---|---|---|---|---|---|---|---|---|---|
[86] | 2012 | Text classification | Two-phase method: 1—text classification to 2—learning design patterns | NB, KNN, DT, SVM | — | 46 security patterns, 34 Douglass patterns, 23 GoF patterns | Documents | Security, Douglass, GoF | PR, recall, EWM PR = 0.62, recall = 0.75 |
[87] | 2013 | Regression | An approach is to find a valid instance of a DP or not | ANN | — | Adapter, command, composite, decorator, observer, and proxy | Set of candidate classes | JHotDraw 5.1 open-source application | 10 fold CV, PR, recall |
[88] | 2014 | Graph mining | Sub-graph mining-based approach | CloseGraph | — | — | Java source code | Open-source project:YARI, Zest, JUnit, JFreeChart, ArgoUML | No any empirical comparison |
[89] | 2015 | Classification/clustering | MARPLE-DPD is developed to classify instances whether it is a bad or good instance | SVM, DT, RF, K-means, ZeroR, OneR, NB, JRip, CLOPE. | — | Classification for singleton and adapter Classification and clustering for composite, decorator, and factory method | — | 10 open-source software systems DPExample, QuickUML 2001, Lexi v0.1.1 alpha, JRefactory v2.6.24, Netbeans v1.0.x, JUnit v3.7, JHotDraw v5.1, MapperXML v1.9.7, Nutch v0.4, PMD v1.8 | 10-fold CV, ACC, F-score, AUC ACC > =85% |
[90] | 2015 | Regression | A new method (SVM-PHGS) is proposed | Simple Logistic, C4.5, KNN, SVM, SVM-PHGS | — | Adapter, builder, composite, factory method, iterator, observer | Source code | P-mart repository | PR, recall, F-score, FP PR = 0.81, recall =0.81, F-score = 0.81, FP = 0.038 |
[91] | 2016 | Classification | Design pattern recognition using ML algorithms. | LRNN, DT | — | Abstract factory, adapter patterns | Source code | Dataset with 67 OO metrics, extracted by JBuilder tool | 5-fold CV, ACC, PR, recall, F-score ACC = 100% by LRNN |
[92] | 2016 | Classification | Three aspects: design patterns, software metrics, and supervised learning methods | Layer Recurrent Neural Network (LRNN) | RF | Abstract factory, adapter, bridge, singleton, and template method | Source code | Dataset with 67 OO metrics, extracted by JBuilder tool | PR, recall, F-score F-score = 100% by LRNN and RF ACC = 100% by RF |
[93] | 2017 | Classification | 1. Creation of metrics-oriented dataset 2. Detection of software design patterns | ANN, SVM | RF | Abstract factory, adapter, bridge, composite, and Template | Source code | Metrics extracted from source codes (JHotDraw, QuickUML, and Junit) | 5-fold and 10-fold CV, PR, recall, F-score ANN, SVM, and RF yielded to 100% PR for JHotDraw |
[94] | 2017 | Classification | Detection of design motifs based on a set of directed semantic graphs | Strong graph simulation, graph matching | — | All three groups: creational, structural, behavioral | UML class diagrams | — | PR, recall High accuracy by the proposed method |
[95] | 2017 | Text categorization | Selection of more appropriate design patterns | Fuzzy c-means | Ensemble-IG | Various design patterns | Problem definitions of design patterns | DP, GoF, Douglass, Security | F-score |
[96] | 2018 | Classification | Finding design pattern and smell pairs which coexist in the code | J48 | — | Used patterns: adapter, bridge, Template, singleton | Source code | Eclipse plugin Web of Patterns The tool selected for code smell detection is iPlasma | PR, recall, F-score, PRC, ROC Singleton pattern shows no presence of bad smells |
Data mining and machine learning studies on the subject “design pattern mining.”
In design pattern mining, detecting the design pattern is a frequent study objective. To do so, studies have used machine learning algorithms [87, 89, 90, 91], ensemble learning [95], deep learning [97], graph theory [94], and text mining [86, 95].
In study [91], the training dataset consists of 67 object-oriented (OO) metrics extracted by using the JBuilder tool. The authors used LRNN and decision tree techniques for pattern detection. Alhusain et al. [87] generated training datasets from existing pattern detection tools. The ANN algorithm was selected for pattern instances. Chihada et al. [90] created training data from pattern instances using 45 OO metrics. The authors utilized SVM for classifying patterns accurately. Another metrics-oriented dataset was developed by Dwivedi et al. [93]. To evaluate the results, the authors benefited from three open-source software systems (JHotDraw, QuickUML, and JUnit) and applied three classifiers, SVM, ANN, and RF. The advantage of using random forest is that it does not require linear features and can manage high-dimensional spaces.
To evaluate methods and to find patterns, open-source software projects such as JHotDraw, Junit, and MapperXML have been generally preferred by researchers. For example, Zanoni et al. [89] developed a tool called MARPLE-DPD by combining graph matching and machine learning techniques. Then, to obtain five design patterns, instances were collected from 10 open-source software projects, as shown in Table 4.
Design patterns and code smells are related issues: Code smell refers to symptoms in code, and if there are code smells in a software, its design pattern is not well constructed. Therefore, Kaur and Singh [96] checked whether design pattern and smell pairs appear together in a code by using J48 Decision Tree. Their obtained results showed that the singleton pattern had no presence of bad smells.
According to the studies summarized in the table, the most frequently used patterns are abstract factory and adapter. It has recently been observed that studies on ensemble learning in this field are increasing.
One of the SE tasks most often used to improve the quality of a software system is refactoring, which Martin Fowler has described as “a technique for restructuring an existing body of code, altering its internal structure without changing its external behavior” [98]. It improves readability and maintainability of the source code and decreases complexity of a software system. Some of the refactoring types are: Add Parameter, Replace Parameter, Extract method, and Inline method [99].
Code smell and refactoring are closely related to each other: Code smells represent problems due to bad design and can be fixed during refactoring. The main challenge is to obtain which part of the code needs refactoring.
Some of data mining studies related to software refactoring are presented in Table 5. Some studies focus on historical data to predict refactoring [100] or to obtain both refactoring and software defects [101] using different data mining algorithms such as LMT, Rip, and J48. Results suggest that when refactoring increases, the number of software defects decreases, and thus refactoring has a positive effect on software quality.
Ref. | Year | Task | Objective | Algorithms | EL | Dataset | Evaluation metrics and results |
---|---|---|---|---|---|---|---|
[100] | 2007 | Regression | Stages: (1) data understanding, (2) preprocessing, (3) ML, (4) post-processing, (5) analysis of the results | J48, LMT, Rip, NNge | — | ArgoUML, Spring Framework | 10-fold CV, PR, recall, F-score PR and recall are 0.8 for ArgoUML |
[101] | 2008 | Classification | Finding the relationship between refactoring and defects | C4.5, LMT, Rip, NNge | — | ArgoUML, JBoss Cache, Liferay Portal, Spring Framework, XDoclet | PR, recall, F-score |
[102] | 2014 | Regression | Propose GA-based learning for software refactoring based on ANN | GA, ANN | — | Xerces-J, JFreeChart, GanttProject, AntApache, JHotDraw, and Rhino. | Wilcoxon test with a 99% confidence level (α = 0.01) |
[103] | 2015 | Regression | Removing defects with time series in a multi-objective approach | Multi-objective algorithm, based on NSGA-II, ARIMA | FindBugs, JFreeChart, Hibernate, Pixelitor, and JDI-Ford | Wilcoxon rank sum test with a 99% confidence level (α < 1%) | |
[104] | 2016 | Web mining/clustering | Unsupervised learning approach to detect refactoring opportunities in service-oriented applications | PAM, K-means, COBWEB, X-Means | — | Two datasets of WSDL documents | COBWEB and K-means max. 83.33% and 0%, inter-cluster COBWEB and K-means min. 33.33% and 66.66% intra-cluster |
[105] | 2017 | Clustering | A novel algorithm (HASP) for software refactoring at the package level | Hierarchical clustering algorithm | — | Three open-source case studies | Modularization Quality and Evaluation Metric Function |
[99] | 2017 | Classification | A technique to predict refactoring at class level | PCA, SMOTE LS-SVM, RBF | — | From tera- PROMISE Repository seven open-source software systems | 10-fold CV, AUC, and ROC curves RBF kernel outperforms linear and polynomial kernel The mean value of AUC for LS-SVM RBF kernel is 0.96 |
[106] | 2017 | Classification | Exploring the impact of clone refactoring (CR) on the test code size | LR, KNN, NB | RF | data collected from an open-source Java software system (ANT) | PR, recall, accuracy, F-score kNN and RF outperform NB ACC (fitting (98%), LOOCV (95%), and 10 FCV (95%)) |
[107] | 2017 | — | Finding refactoring opportunities in source code | J48, BayesNet, SVM, LR | RF | Ant, ArgoUML, jEdit, jFreeChart, Mylyn | 10-fold CV, PR, recall 86–97% PR and 71–98% recall for proposed tech |
[108] | 2018 | Classification | A learning-based approach (CREC) to extract refactored and non-refactored clone groups from repositories | C4.5, SMO, NB. | RF, Adaboost | Axis2, Eclipse.jdt.core, Elastic Search, JFreeChart, JRuby, and Lucene | PR, recall, F-score F-score = 83% in the within-project F-score = 76% in the cross-project |
[109] | 2018 | Clustering | Combination of the use of multi-objective and unsupervised learning to decrease developer’s effort | GMM, EM | — | ArgoUML, JHotDraw, GanttProject, UTest, Apache Ant, Azureus | One-way ANOVA with a 95% confidence level (α = 5%) |
Data mining and machine learning studies on the subject “refactoring.”
While automated refactoring does not always give the desired result, manual refactoring is time-consuming. Therefore, one study [109] proposed a clustering-based recommendation tool by combining multi-objective search and unsupervised learning algorithm to reduce the number of refactoring options. At the same time, the number of refactoring that should be selected is decreasing with the help of the developer’s feedback.
Since many SE studies that apply data mining approaches exist in the literature, this article presents only a few of them. However, Figure 4 shows the current number of papers obtained from the Scopus search engine for each year from 2010 to 2019 by using queries in the title/abstract/keywords field. We extracted publications in 2020 since this year has not completed yet. Queries included (“data mining” OR “machine learning”) with (“defect prediction” OR “defect detection” OR “bug prediction” OR “bug detection”) for defect prediction, (“effort estimation” OR “effort prediction” OR “cost estimation”) for effort estimation, (“vulnerab*” AND “software” OR “vulnerability analysis”) for vulnerability analysis, and (“software” AND “refactoring”) for refactoring. As seen in the figure, the number of studies using data mining in SE tasks, especially defect prediction and vulnerability analysis, has increased rapidly. The most stable area in the studies is design pattern mining.
Number of publications of data mining studies for SE tasks from Scopus search by their years.
Figure 5 shows the publications studied in classification, clustering, text mining, and association rule mining as a percentage of the total number of papers obtained by a Scopus query for each SE task. For example, in defect prediction, the number of studies is 339 in the field of classification, 64 in clustering, 8 in text mining, and 25 in the field of association rule mining. As can be seen from the pie charts, while clustering is a popular DM technique in refactoring, no study related to text mining is found in this field. In other SE tasks, the preferred technique is classification, and the second is clustering.
Number of publications of data mining studies for SE tasks from Scopus search by their topics.
Defect prediction generally compares learning algorithms in terms of whether they find defects correctly using classification algorithms. Besides this approach, in some studies, clustering algorithms were used to select futures [110] or to compare supervised and unsupervised methods [27]. In the text mining area, to extract features from scripts, TF-IDF techniques were generally used [111, 112]. Although many different algorithms have been used in defect prediction, the most popular ones are NB, MLP, and RBF.
Figure 6 shows the number of document types (conference paper, book chapter, article, book) published between the years of 2010 and 2019. It is clearly seen that conference papers and articles are the most preferred research study type. It is clearly seen that there is no review article about data mining studies in design pattern mining.
The number of publications in terms of document type between 2010 and 2019.
Table 6 shows popular repositories that contain various datasets and their descriptions, which tasks they are used for, and hyperlinks to download. For example, the PMART repository includes source files of java projects, and the PROMISE repository has different datasets with software metrics such as cyclomatic complexity, design complexity, and lines of code. Since these repositories contain many datasets, no detailed information about them has been provided in this article.
Repository | Topic | Description | Web link |
---|---|---|---|
Nasa MDP | Defect Pred. | NASA’s Metrics Data Program | |
Android Git | Defect Pred. | Android version bug reports | |
PROMISE | Defect Pred. Effort Est. | It includes 20 datasets for defect prediction and cost estimation | |
Software Defect Pred. Data | Defect Pred. | It includes software metrics, # of defects, etc. Eclipse JDT: Eclipse PDE: | |
PMART | Design pattern mining | It has 22 patterns 9 Projects, 139 ins. Format: XML Manually detected and validated |
Description of popular repositories used in studies.
Refactoring can be applied at different levels; study [105] predicted refactoring at package level using hierarchical clustering, and another study [99] applied class-level refactoring using LS-SVM as learning algorithm, SMOTE for handling refactoring, and PCA for feature extraction.
Data mining techniques have been applied successfully in many different domains. In software engineering, to improve the quality of a product, it is highly critical to find existing deficits such as bugs, defects, code smells, and vulnerabilities in the early phases of SDLC. Therefore, many data mining studies in the past decade have aimed to deal with such problems. The present paper aims to provide information about previous studies in the field of software engineering. This survey shows how classification, clustering, text mining, and association rule mining can be applied in five SE tasks: defect prediction, effort estimation, vulnerability analysis, design pattern mining, and refactoring. It clearly shows that classification is the most used DM technique. Therefore, new studies can focus on clustering on SE tasks.
LMT | logistic model trees |
Rip | repeated incremental pruning |
NNge | nearest neighbor generalization |
PCA | principal component analysis |
PAM | partitioning around medoids |
LS-SVM | least-squares support vector machines |
MAE | mean absolute error |
RBF | radial basis function |
RUS | random undersampling |
SMO | sequential minimal optimization |
GMM | Gaussian mixture model |
EM | expectation maximizaion |
LR | logistic regression |
SMB | SMOTEBoost |
RUS-bal | balanced version of random undersampling |
THM | threshold-moving |
BNC | AdaBoost.NC |
RF | random forest |
RBF | radial basis function |
CC | correlation coefficient |
ROC | receiver operating characteristic |
BayesNet | Bayesian network |
SMOTE | synthetic minority over-sampling technique |
You have been successfully unsubscribed.
",metaTitle:"Unsubscribe Successful",metaDescription:"You have been successfully unsubscribed.",metaKeywords:null,canonicalURL:"/page/unsubscribe-successful",contentRaw:'[{"type":"htmlEditorComponent","content":""}]'},components:[{type:"htmlEditorComponent",content:""}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5717},{group:"region",caption:"Middle and South America",value:2,count:5179},{group:"region",caption:"Africa",value:3,count:1696},{group:"region",caption:"Asia",value:4,count:10260},{group:"region",caption:"Australia and Oceania",value:5,count:890},{group:"region",caption:"Europe",value:6,count:15670}],offset:12,limit:12,total:117458},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{sort:"dateendthirdsteppublish"},books:[],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:11},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:14},{group:"topic",caption:"Business, Management and Economics",value:7,count:2},{group:"topic",caption:"Chemistry",value:8,count:7},{group:"topic",caption:"Computer and Information Science",value:9,count:10},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:4},{group:"topic",caption:"Engineering",value:11,count:16},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:4},{group:"topic",caption:"Materials Science",value:14,count:5},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:51},{group:"topic",caption:"Neuroscience",value:18,count:1},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:5},{group:"topic",caption:"Physics",value:20,count:3},{group:"topic",caption:"Psychology",value:21,count:3},{group:"topic",caption:"Robotics",value:22,count:1},{group:"topic",caption:"Social Sciences",value:23,count:3},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:2}],offset:0,limit:12,total:null},popularBooks:{featuredBooks:[],offset:0,limit:12,total:null},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"7802",title:"Modern Slavery and Human Trafficking",subtitle:null,isOpenForSubmission:!1,hash:"587a0b7fb765f31cc98de33c6c07c2e0",slug:"modern-slavery-and-human-trafficking",bookSignature:"Jane Reeves",coverURL:"https://cdn.intechopen.com/books/images_new/7802.jpg",editors:[{id:"211328",title:"Prof.",name:"Jane",middleName:null,surname:"Reeves",slug:"jane-reeves",fullName:"Jane Reeves"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9961",title:"Data Mining",subtitle:"Methods, Applications and Systems",isOpenForSubmission:!1,hash:"ed79fb6364f2caf464079f94a0387146",slug:"data-mining-methods-applications-and-systems",bookSignature:"Derya Birant",coverURL:"https://cdn.intechopen.com/books/images_new/9961.jpg",editors:[{id:"15609",title:"Dr.",name:"Derya",middleName:null,surname:"Birant",slug:"derya-birant",fullName:"Derya Birant"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,isOpenForSubmission:!1,hash:"13aaddf5fdbbc78387e77a7da2388bf6",slug:"animal-reproduction-in-veterinary-medicine",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9157",title:"Neurodegenerative Diseases",subtitle:"Molecular Mechanisms and Current Therapeutic Approaches",isOpenForSubmission:!1,hash:"bc8be577966ef88735677d7e1e92ed28",slug:"neurodegenerative-diseases-molecular-mechanisms-and-current-therapeutic-approaches",bookSignature:"Nagehan Ersoy Tunalı",coverURL:"https://cdn.intechopen.com/books/images_new/9157.jpg",editors:[{id:"82778",title:"Ph.D.",name:"Nagehan",middleName:null,surname:"Ersoy Tunalı",slug:"nagehan-ersoy-tunali",fullName:"Nagehan Ersoy Tunalı"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8686",title:"Direct Torque Control Strategies of Electrical Machines",subtitle:null,isOpenForSubmission:!1,hash:"b6ad22b14db2b8450228545d3d4f6b1a",slug:"direct-torque-control-strategies-of-electrical-machines",bookSignature:"Fatma Ben Salem",coverURL:"https://cdn.intechopen.com/books/images_new/8686.jpg",editors:[{id:"295623",title:"Associate Prof.",name:"Fatma",middleName:null,surname:"Ben Salem",slug:"fatma-ben-salem",fullName:"Fatma Ben Salem"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7434",title:"Molecular Biotechnology",subtitle:null,isOpenForSubmission:!1,hash:"eceede809920e1ec7ecadd4691ede2ec",slug:"molecular-biotechnology",bookSignature:"Sergey Sedykh",coverURL:"https://cdn.intechopen.com/books/images_new/7434.jpg",editors:[{id:"178316",title:"Ph.D.",name:"Sergey",middleName:null,surname:"Sedykh",slug:"sergey-sedykh",fullName:"Sergey Sedykh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9208",title:"Welding",subtitle:"Modern Topics",isOpenForSubmission:!1,hash:"7d6be076ccf3a3f8bd2ca52d86d4506b",slug:"welding-modern-topics",bookSignature:"Sadek Crisóstomo Absi Alfaro, Wojciech Borek and Błażej Tomiczek",coverURL:"https://cdn.intechopen.com/books/images_new/9208.jpg",editors:[{id:"65292",title:"Prof.",name:"Sadek Crisostomo Absi",middleName:"C. Absi",surname:"Alfaro",slug:"sadek-crisostomo-absi-alfaro",fullName:"Sadek Crisostomo Absi Alfaro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7831",title:"Sustainability in Urban Planning and Design",subtitle:null,isOpenForSubmission:!1,hash:"c924420492c8c2c9751e178d025f4066",slug:"sustainability-in-urban-planning-and-design",bookSignature:"Amjad Almusaed, Asaad Almssad and Linh Truong - Hong",coverURL:"https://cdn.intechopen.com/books/images_new/7831.jpg",editors:[{id:"110471",title:"Dr.",name:"Amjad",middleName:"Zaki",surname:"Almusaed",slug:"amjad-almusaed",fullName:"Amjad Almusaed"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9343",title:"Trace Metals in the Environment",subtitle:"New Approaches and Recent Advances",isOpenForSubmission:!1,hash:"ae07e345bc2ce1ebbda9f70c5cd12141",slug:"trace-metals-in-the-environment-new-approaches-and-recent-advances",bookSignature:"Mario Alfonso Murillo-Tovar, Hugo Saldarriaga-Noreña and Agnieszka Saeid",coverURL:"https://cdn.intechopen.com/books/images_new/9343.jpg",editors:[{id:"255959",title:"Dr.",name:"Mario Alfonso",middleName:null,surname:"Murillo-Tovar",slug:"mario-alfonso-murillo-tovar",fullName:"Mario Alfonso Murillo-Tovar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9139",title:"Topics in Primary Care Medicine",subtitle:null,isOpenForSubmission:!1,hash:"ea774a4d4c1179da92a782e0ae9cde92",slug:"topics-in-primary-care-medicine",bookSignature:"Thomas F. Heston",coverURL:"https://cdn.intechopen.com/books/images_new/9139.jpg",editors:[{id:"217926",title:"Dr.",name:"Thomas F.",middleName:null,surname:"Heston",slug:"thomas-f.-heston",fullName:"Thomas F. Heston"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"6934",title:"Psycho-Social Aspects of Human Sexuality and Ethics",subtitle:null,isOpenForSubmission:!1,hash:"44731b106aa0d1ab5c64a7394483c7d5",slug:"psycho-social-aspects-of-human-sexuality-and-ethics",bookSignature:"Dhastagir Sultan Sheriff",coverURL:"https://cdn.intechopen.com/books/images_new/6934.jpg",editedByType:"Edited by",editors:[{id:"167875",title:"Dr.",name:"Dhastagir Sultan",middleName:null,surname:"Sheriff",slug:"dhastagir-sultan-sheriff",fullName:"Dhastagir Sultan Sheriff"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10062",title:"Forecasting in Mathematics",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"9a3ad05fef0502040d2a238ad22487c0",slug:"forecasting-in-mathematics-recent-advances-new-perspectives-and-applications",bookSignature:"Abdo Abou Jaoude",coverURL:"https://cdn.intechopen.com/books/images_new/10062.jpg",editedByType:"Edited by",editors:[{id:"248271",title:"Dr.",name:"Abdo",middleName:null,surname:"Abou Jaoude",slug:"abdo-abou-jaoude",fullName:"Abdo Abou Jaoude"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9043",title:"Parenting",subtitle:"Studies by an Ecocultural and Transactional Perspective",isOpenForSubmission:!1,hash:"6d21066c7438e459e4c6fb13217a5c8c",slug:"parenting-studies-by-an-ecocultural-and-transactional-perspective",bookSignature:"Loredana Benedetto and Massimo Ingrassia",coverURL:"https://cdn.intechopen.com/books/images_new/9043.jpg",editedByType:"Edited by",editors:[{id:"193200",title:"Prof.",name:"Loredana",middleName:null,surname:"Benedetto",slug:"loredana-benedetto",fullName:"Loredana Benedetto"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10075",title:"Nonlinear Optics",subtitle:"From Solitons to Similaritons",isOpenForSubmission:!1,hash:"b034b2a060292c8511359aec0db1002c",slug:"nonlinear-optics-from-solitons-to-similaritons",bookSignature:"İlkay Bakırtaş and Nalan Antar",coverURL:"https://cdn.intechopen.com/books/images_new/10075.jpg",editedByType:"Edited by",editors:[{id:"186388",title:"Prof.",name:"İlkay",middleName:null,surname:"Bakırtaş",slug:"ilkay-bakirtas",fullName:"İlkay Bakırtaş"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10116",title:"Nano- and Microencapsulation",subtitle:"Techniques and Applications",isOpenForSubmission:!1,hash:"8d92c5999718734b36a0cc3a6af7c7f6",slug:"nano-and-microencapsulation-techniques-and-applications",bookSignature:"Nedal Abu-Thabit",coverURL:"https://cdn.intechopen.com/books/images_new/10116.jpg",editedByType:"Edited by",editors:[{id:"308436",title:"Associate Prof.",name:"Nedal",middleName:null,surname:"Abu-Thabit",slug:"nedal-abu-thabit",fullName:"Nedal Abu-Thabit"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9881",title:"Perovskite and Piezoelectric Materials",subtitle:null,isOpenForSubmission:!1,hash:"8fa0e0f48567bbc50fbb3bfdde6f9a0b",slug:"perovskite-and-piezoelectric-materials",bookSignature:"Someshwar Pola, Neeraj Panwar and Indrani Coondoo",coverURL:"https://cdn.intechopen.com/books/images_new/9881.jpg",editedByType:"Edited by",editors:[{id:"177037",title:"Dr.",name:"Someshwar",middleName:null,surname:"Pola",slug:"someshwar-pola",fullName:"Someshwar Pola"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9394",title:"Genotoxicity and Mutagenicity",subtitle:"Mechanisms and Test Methods",isOpenForSubmission:!1,hash:"9ee7e597358dbbfb5e33d0beb76e6fff",slug:"genotoxicity-and-mutagenicity-mechanisms-and-test-methods",bookSignature:"Sonia Soloneski and Marcelo L. Larramendy",coverURL:"https://cdn.intechopen.com/books/images_new/9394.jpg",editedByType:"Edited by",editors:[{id:"14863",title:"Dr.",name:"Sonia",middleName:null,surname:"Soloneski",slug:"sonia-soloneski",fullName:"Sonia Soloneski"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7434",title:"Molecular Biotechnology",subtitle:null,isOpenForSubmission:!1,hash:"eceede809920e1ec7ecadd4691ede2ec",slug:"molecular-biotechnology",bookSignature:"Sergey Sedykh",coverURL:"https://cdn.intechopen.com/books/images_new/7434.jpg",editedByType:"Edited by",editors:[{id:"178316",title:"Ph.D.",name:"Sergey",middleName:null,surname:"Sedykh",slug:"sergey-sedykh",fullName:"Sergey Sedykh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,isOpenForSubmission:!1,hash:"13aaddf5fdbbc78387e77a7da2388bf6",slug:"animal-reproduction-in-veterinary-medicine",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",editedByType:"Edited by",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9569",title:"Methods in Molecular Medicine",subtitle:null,isOpenForSubmission:!1,hash:"691d3f3c4ac25a8093414e9b270d2843",slug:"methods-in-molecular-medicine",bookSignature:"Yusuf Tutar",coverURL:"https://cdn.intechopen.com/books/images_new/9569.jpg",editedByType:"Edited by",editors:[{id:"158492",title:"Prof.",name:"Yusuf",middleName:null,surname:"Tutar",slug:"yusuf-tutar",fullName:"Yusuf Tutar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"200",title:"Public Health",slug:"medicine-public-health",parent:{title:"Medicine",slug:"medicine"},numberOfBooks:70,numberOfAuthorsAndEditors:1681,numberOfWosCitations:851,numberOfCrossrefCitations:670,numberOfDimensionsCitations:1695,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"medicine-public-health",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"9376",title:"Contemporary Developments and Perspectives in International Health Security",subtitle:"Volume 1",isOpenForSubmission:!1,hash:"b9a00b84cd04aae458fb1d6c65795601",slug:"contemporary-developments-and-perspectives-in-international-health-security-volume-1",bookSignature:"Stanislaw P. Stawicki, Michael S. Firstenberg, Sagar C. Galwankar, Ricardo Izurieta and Thomas Papadimos",coverURL:"https://cdn.intechopen.com/books/images_new/9376.jpg",editedByType:"Edited by",editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",middleName:null,surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9047",title:"Nursing",subtitle:"New Perspectives",isOpenForSubmission:!1,hash:"1500bf539d1400c51b941e95f3a1f0f9",slug:"nursing-new-perspectives",bookSignature:"Serpil Çelik Durmuş",coverURL:"https://cdn.intechopen.com/books/images_new/9047.jpg",editedByType:"Edited by",editors:[{id:"189558",title:"Ph.D.",name:"Serpil",middleName:null,surname:"Çelik Durmuş",slug:"serpil-celik-durmus",fullName:"Serpil Çelik Durmuş"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6951",title:"Personalized Medicine, in Relation to Redox State, Diet and Lifestyle",subtitle:null,isOpenForSubmission:!1,hash:"2940f812b4520a28d958f5c23c606f02",slug:"personalized-medicine-in-relation-to-redox-state-diet-and-lifestyle",bookSignature:"Faik Atroshi",coverURL:"https://cdn.intechopen.com/books/images_new/6951.jpg",editedByType:"Edited by",editors:[{id:"65639",title:"Dr.",name:"Faik",middleName:null,surname:"Atroshi",slug:"faik-atroshi",fullName:"Faik Atroshi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"3",chapterContentType:"chapter",authoredCaption:"Authored by"}},{type:"book",id:"8467",title:"Accident Analysis and Prevention",subtitle:null,isOpenForSubmission:!1,hash:"81f08fa6308d78fe644f8544321511cf",slug:"accident-analysis-and-prevention",bookSignature:"Murat Darçın",coverURL:"https://cdn.intechopen.com/books/images_new/8467.jpg",editedByType:"Edited by",editors:[{id:"196869",title:"Dr.",name:"Murat",middleName:null,surname:"Darçın",slug:"murat-darcin",fullName:"Murat Darçın"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8270",title:"Maternal and Child Health Matters Around the World",subtitle:null,isOpenForSubmission:!1,hash:"970e2fb7930d29a8d805900b86da459f",slug:"maternal-and-child-health-matters-around-the-world",bookSignature:"Masoud Mohammadnezhad and Nafisa Huq",coverURL:"https://cdn.intechopen.com/books/images_new/8270.jpg",editedByType:"Edited by",editors:[{id:"257189",title:"Dr.",name:"Masoud",middleName:null,surname:"Mohammadnezhad",slug:"masoud-mohammadnezhad",fullName:"Masoud Mohammadnezhad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9138",title:"Public Health in Developing Countries",subtitle:"Challenges and Opportunities",isOpenForSubmission:!1,hash:"28c7e86f71905feb65668941c4f259f4",slug:"public-health-in-developing-countries-challenges-and-opportunities",bookSignature:"Edlyne Eze Anugwom and Niyi Awofeso",coverURL:"https://cdn.intechopen.com/books/images_new/9138.jpg",editedByType:"Edited by",editors:[{id:"293469",title:null,name:"Edlyne Eze",middleName:null,surname:"Anugwom",slug:"edlyne-eze-anugwom",fullName:"Edlyne Eze Anugwom"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8831",title:"Environmental Factors Affecting Human Health",subtitle:null,isOpenForSubmission:!1,hash:"88c049685e3808385ac61471dd7f4fbf",slug:"environmental-factors-affecting-human-health",bookSignature:"Ivan Uher",coverURL:"https://cdn.intechopen.com/books/images_new/8831.jpg",editedByType:"Edited by",editors:[{id:"227237",title:"Prof.",name:"Ivan",middleName:null,surname:"Uher",slug:"ivan-uher",fullName:"Ivan Uher"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9105",title:"Heavy Metal Toxicity in Public Health",subtitle:null,isOpenForSubmission:!1,hash:"a2e4f3c444775950ab18bce58a754777",slug:"heavy-metal-toxicity-in-public-health",bookSignature:"John Kanayochukwu Nduka and Mohamed Nageeb Rashed",coverURL:"https://cdn.intechopen.com/books/images_new/9105.jpg",editedByType:"Edited by",editors:[{id:"107866",title:"Dr.",name:"John Kanayochukwu",middleName:null,surname:"Nduka",slug:"john-kanayochukwu-nduka",fullName:"John Kanayochukwu Nduka"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7620",title:"Safety and Health for Workers",subtitle:"Research and Practical Perspective",isOpenForSubmission:!1,hash:"1233909d682e2cced428e1042fd40ad4",slug:"safety-and-health-for-workers-research-and-practical-perspective",bookSignature:"Bankole Fasanya",coverURL:"https://cdn.intechopen.com/books/images_new/7620.jpg",editedByType:"Edited by",editors:[{id:"214494",title:"Dr.",name:"Bankole",middleName:"Kolawole",surname:"Fasanya",slug:"bankole-fasanya",fullName:"Bankole Fasanya"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8036",title:"Healthcare Access",subtitle:"Regional Overviews",isOpenForSubmission:!1,hash:"84f870b3d688da8dd09779ef7507b850",slug:"healthcare-access-regional-overviews",bookSignature:"Umar Bacha, Urška Rozman and Sonja Šostar Turk",coverURL:"https://cdn.intechopen.com/books/images_new/8036.jpg",editedByType:"Edited by",editors:[{id:"244265",title:"Dr.",name:"Umar",middleName:null,surname:"Bacha",slug:"umar-bacha",fullName:"Umar Bacha"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7856",title:"Nutrition and HIV/AIDS",subtitle:"Implication for Treatment, Prevention and Cure",isOpenForSubmission:!1,hash:"94229224705db9f1cd430a32aa777bef",slug:"nutrition-and-hiv-aids-implication-for-treatment-prevention-and-cure",bookSignature:"Nancy Dumais",coverURL:"https://cdn.intechopen.com/books/images_new/7856.jpg",editedByType:"Edited by",editors:[{id:"40783",title:"Dr.",name:"Nancy",middleName:null,surname:"Dumais",slug:"nancy-dumais",fullName:"Nancy Dumais"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8607",title:"Evaluation of Health Services",subtitle:null,isOpenForSubmission:!1,hash:"dbea1d7a6cd5428a713f35c234f5583b",slug:"evaluation-of-health-services",bookSignature:"Sandeep Reddy and Aida Isabel Tavares",coverURL:"https://cdn.intechopen.com/books/images_new/8607.jpg",editedByType:"Edited by",editors:[{id:"230704",title:"Associate Prof.",name:"Sandeep",middleName:null,surname:"Reddy",slug:"sandeep-reddy",fullName:"Sandeep Reddy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:70,mostCitedChapters:[{id:"27687",doi:"10.5772/29869",title:"Heavy Metals and Human Health",slug:"heavy-metals-and-human-health",totalDownloads:18248,totalCrossrefCites:52,totalDimensionsCites:106,book:{slug:"environmental-health-emerging-issues-and-practice",title:"Environmental Health",fullTitle:"Environmental Health - Emerging Issues and Practice"},signatures:"Simone Morais, Fernando Garcia e Costa and Maria de Lourdes Pereira",authors:[{id:"13875",title:"Prof.",name:"Simone",middleName:null,surname:"Morais",slug:"simone-morais",fullName:"Simone Morais"},{id:"79715",title:"Prof.",name:"Maria De Lourdes",middleName:null,surname:"Pereira",slug:"maria-de-lourdes-pereira",fullName:"Maria De Lourdes Pereira"},{id:"87294",title:"Prof.",name:"Fernando",middleName:null,surname:"Garcia E Costa",slug:"fernando-garcia-e-costa",fullName:"Fernando Garcia E Costa"}]},{id:"36935",doi:"10.5772/37886",title:"Gender Differences in Food Choice and Dietary Intake in Modern Western Societies",slug:"gender-differences-in-food-choice-and-dietary-intake-in-modern-western-societies",totalDownloads:17179,totalCrossrefCites:32,totalDimensionsCites:87,book:{slug:"public-health-social-and-behavioral-health",title:"Public Health",fullTitle:"Public Health - Social and Behavioral Health"},signatures:"Claudia Arganini, Anna Saba, Raffaella Comitato, Fabio Virgili and Aida Turrini",authors:[{id:"114665",title:"Dr.",name:"Aida",middleName:null,surname:"Turrini",slug:"aida-turrini",fullName:"Aida Turrini"},{id:"116008",title:"Dr.",name:"Claudia",middleName:null,surname:"Arganini",slug:"claudia-arganini",fullName:"Claudia Arganini"},{id:"116171",title:"MSc.",name:"Anna",middleName:null,surname:"Saba",slug:"anna-saba",fullName:"Anna Saba"},{id:"116173",title:"Dr.",name:"Fabio",middleName:null,surname:"Virgili",slug:"fabio-virgili",fullName:"Fabio Virgili"},{id:"116174",title:"Dr.",name:"Raffaella",middleName:null,surname:"Comitato",slug:"raffaella-comitato",fullName:"Raffaella Comitato"}]},{id:"29979",doi:"10.5772/25344",title:"The Therapeutic Benefits of Essential Oils",slug:"the-therapeutic-benefits-of-essential-oils",totalDownloads:23334,totalCrossrefCites:31,totalDimensionsCites:83,book:{slug:"nutrition-well-being-and-health",title:"Nutrition, Well-Being and Health",fullTitle:"Nutrition, Well-Being and Health"},signatures:"Abdelouaheb Djilani and Amadou Dicko",authors:[{id:"63044",title:"Prof.",name:"Jilani",middleName:null,surname:"AbdelWahab",slug:"jilani-abdelwahab",fullName:"Jilani AbdelWahab"},{id:"116762",title:"Prof.",name:"Amadou",middleName:null,surname:"Dicko",slug:"amadou-dicko",fullName:"Amadou Dicko"}]}],mostDownloadedChaptersLast30Days:[{id:"56223",title:"Volunteering in Palliative Care in France: “A Tough Job”; Patient, Family, Caregiver, and Volunteer Perspectives",slug:"volunteering-in-palliative-care-in-france-a-tough-job-patient-family-caregiver-and-volunteer-perspec",totalDownloads:2366,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"highlights-on-several-underestimated-topics-in-palliative-care",title:"Highlights on Several Underestimated Topics in Palliative Care",fullTitle:"Highlights on Several Underestimated Topics in Palliative Care"},signatures:"Yaël Tibi-Lévy and Martine Bungener",authors:[{id:"88839",title:"Dr.",name:"Martine",middleName:null,surname:"Bungener",slug:"martine-bungener",fullName:"Martine Bungener"},{id:"205065",title:"Ph.D.",name:"Yaël",middleName:null,surname:"Tibi-Levy",slug:"yael-tibi-levy",fullName:"Yaël Tibi-Levy"}]},{id:"58916",title:"Factors Affecting the Attitudes of Women toward Family Planning",slug:"factors-affecting-the-attitudes-of-women-toward-family-planning",totalDownloads:5683,totalCrossrefCites:2,totalDimensionsCites:6,book:{slug:"family-planning",title:"Family Planning",fullTitle:"Family Planning"},signatures:"Nazli Sensoy, Yasemin Korkut, Selcuk Akturan, Mehmet Yilmaz,\nCanan Tuz and Bilge Tuncel",authors:[{id:"216377",title:"Prof.",name:"Nazli",middleName:null,surname:"Sensoy",slug:"nazli-sensoy",fullName:"Nazli Sensoy"},{id:"216589",title:"Dr.",name:"Yasemin",middleName:null,surname:"Korkut",slug:"yasemin-korkut",fullName:"Yasemin Korkut"},{id:"216595",title:"Dr.",name:"Selcuk",middleName:null,surname:"Akturan",slug:"selcuk-akturan",fullName:"Selcuk Akturan"},{id:"216596",title:"Dr.",name:"Canan",middleName:null,surname:"Tuz",slug:"canan-tuz",fullName:"Canan Tuz"},{id:"216598",title:"Dr.",name:"Bilge",middleName:null,surname:"Tuncel",slug:"bilge-tuncel",fullName:"Bilge Tuncel"},{id:"216599",title:"Dr.",name:"Mehmet",middleName:null,surname:"Yilmaz",slug:"mehmet-yilmaz",fullName:"Mehmet Yilmaz"}]},{id:"44569",title:"Health Care Waste Management – Public Health Benefits, and the Need for Effective Environmental Regulatory Surveillance in Federal Republic of Nigeria",slug:"health-care-waste-management-public-health-benefits-and-the-need-for-effective-environmental-regulat",totalDownloads:7272,totalCrossrefCites:4,totalDimensionsCites:12,book:{slug:"current-topics-in-public-health",title:"Current Topics in Public Health",fullTitle:"Current Topics in Public Health"},signatures:"Nkechi Chuks Nwachukwu, Frank Anayo Orji and Ositadinma\nChinyere Ugbogu",authors:[{id:"85404",title:"Dr.",name:"Nkechi Chuks",middleName:null,surname:"Nwachukwu",slug:"nkechi-chuks-nwachukwu",fullName:"Nkechi Chuks Nwachukwu"},{id:"120194",title:"Dr.",name:"Orji",middleName:null,surname:"Frank Anayo",slug:"orji-frank-anayo",fullName:"Orji Frank Anayo"},{id:"161783",title:"Dr.",name:"Ositadinma Chinyere",middleName:null,surname:"Ugbogu",slug:"ositadinma-chinyere-ugbogu",fullName:"Ositadinma Chinyere Ugbogu"}]},{id:"56224",title:"Diet Quality Indices for Nutrition Assessment: Types and Applications",slug:"diet-quality-indices-for-nutrition-assessment-types-and-applications",totalDownloads:3618,totalCrossrefCites:1,totalDimensionsCites:4,book:{slug:"functional-food-improve-health-through-adequate-food",title:"Functional Food",fullTitle:"Functional Food - Improve Health through Adequate Food"},signatures:"Maria Luisa Poyatos Guerrero and Fernando Pérez-Rodríguez",authors:[{id:"82252",title:"Dr.",name:"Fernando",middleName:null,surname:"Pérez-Rodríguez",slug:"fernando-perez-rodriguez",fullName:"Fernando Pérez-Rodríguez"},{id:"207713",title:"MSc.",name:"Maria Luisa",middleName:null,surname:"Poyatos-Guerrero",slug:"maria-luisa-poyatos-guerrero",fullName:"Maria Luisa Poyatos-Guerrero"}]},{id:"55808",title:"The Role of Legumes in Human Nutrition",slug:"the-role-of-legumes-in-human-nutrition",totalDownloads:3763,totalCrossrefCites:19,totalDimensionsCites:37,book:{slug:"functional-food-improve-health-through-adequate-food",title:"Functional Food",fullTitle:"Functional Food - Improve Health through Adequate Food"},signatures:"Yvonne Maphosa and Victoria A. Jideani",authors:[{id:"201151",title:"Ph.D. Student",name:"Yvonne",middleName:null,surname:"Maphosa",slug:"yvonne-maphosa",fullName:"Yvonne Maphosa"}]},{id:"64294",title:"Evaluation of Effectiveness of Peer Education on Smoking Behaviour",slug:"evaluation-of-effectiveness-of-peer-education-on-smoking-behaviour",totalDownloads:622,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"smoking-prevention-and-cessation",title:"Smoking Prevention and Cessation",fullTitle:"Smoking Prevention and Cessation"},signatures:"Nurcan Bilgiç and Türkan Günay",authors:[{id:"228458",title:"Dr.",name:"Nurcan",middleName:null,surname:"Bilgiç",slug:"nurcan-bilgic",fullName:"Nurcan Bilgiç"},{id:"270102",title:"Prof.",name:"Türkan",middleName:null,surname:"Günay",slug:"turkan-gunay",fullName:"Türkan Günay"}]},{id:"29979",title:"The Therapeutic Benefits of Essential Oils",slug:"the-therapeutic-benefits-of-essential-oils",totalDownloads:23334,totalCrossrefCites:31,totalDimensionsCites:83,book:{slug:"nutrition-well-being-and-health",title:"Nutrition, Well-Being and Health",fullTitle:"Nutrition, Well-Being and Health"},signatures:"Abdelouaheb Djilani and Amadou Dicko",authors:[{id:"63044",title:"Prof.",name:"Jilani",middleName:null,surname:"AbdelWahab",slug:"jilani-abdelwahab",fullName:"Jilani AbdelWahab"},{id:"116762",title:"Prof.",name:"Amadou",middleName:null,surname:"Dicko",slug:"amadou-dicko",fullName:"Amadou Dicko"}]},{id:"62561",title:"Preventing Vaccine Failure in Poultry Flocks",slug:"preventing-vaccine-failure-in-poultry-flocks",totalDownloads:2672,totalCrossrefCites:1,totalDimensionsCites:4,book:{slug:"immunization-vaccine-adjuvant-delivery-system-and-strategies",title:"Immunization",fullTitle:"Immunization - Vaccine Adjuvant Delivery System and Strategies"},signatures:"Aamir Sharif and Tanveer Ahmad",authors:[{id:"246237",title:"Dr.",name:"Aamir",middleName:null,surname:"Sharif",slug:"aamir-sharif",fullName:"Aamir Sharif"},{id:"259271",title:"Dr.",name:"Tanveer",middleName:null,surname:"Ahmad",slug:"tanveer-ahmad",fullName:"Tanveer Ahmad"}]},{id:"66183",title:"Introductory Chapter: Bio-Psychosocial Model of Health",slug:"introductory-chapter-bio-psychosocial-model-of-health",totalDownloads:1642,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"psychology-of-health-biopsychosocial-approach",title:"Psychology of Health",fullTitle:"Psychology of Health - Biopsychosocial Approach"},signatures:"Simon George Taukeni",authors:[{id:"202046",title:"Dr.",name:"Simon George",middleName:null,surname:"Taukeni",slug:"simon-george-taukeni",fullName:"Simon George Taukeni"}]},{id:"69876",title:"Leadership Styles in Nursing",slug:"leadership-styles-in-nursing",totalDownloads:512,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"nursing-new-perspectives",title:"Nursing",fullTitle:"Nursing - New Perspectives"},signatures:"Serpil Çelik Durmuş and Kamile Kırca",authors:null}],onlineFirstChaptersFilter:{topicSlug:"medicine-public-health",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"chapter.detail",path:"/books/accounting-and-corporate-reporting-today-and-tomorrow/greening-accounting-ii-exploring-feasibility-of-environmental-accounting-framework",hash:"",query:{},params:{book:"accounting-and-corporate-reporting-today-and-tomorrow",chapter:"greening-accounting-ii-exploring-feasibility-of-environmental-accounting-framework"},fullPath:"/books/accounting-and-corporate-reporting-today-and-tomorrow/greening-accounting-ii-exploring-feasibility-of-environmental-accounting-framework",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()