The relation between critical Larmor frequency and angular quantum number
\r\n\t
",isbn:"978-1-78984-473-3",printIsbn:"978-1-78984-472-6",pdfIsbn:null,doi:null,price:0,priceEur:null,priceUsd:null,slug:null,numberOfPages:0,isOpenForSubmission:!1,hash:"b9ddbf132ac8ea9d2a7613836e5a27ca",bookSignature:"Dr. Sahra Kırmusaoğlu",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/8032.jpg",keywords:"Gram-positive, Cocci, Pathogen, Microflora, Antibiotic Resistant Strains, Community Infections, Nosocomial Infections, Indwelling Device Associated Infections, Virulence Factors",numberOfDownloads:530,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:0,numberOfTotalCitations:0,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"January 8th 2019",dateEndSecondStepPublish:"January 29th 2019",dateEndThirdStepPublish:"March 30th 2019",dateEndFourthStepPublish:"June 18th 2019",dateEndFifthStepPublish:"August 17th 2019",remainingDaysToSecondStep:"10 months",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:null,kuFlag:!1,editors:[{id:"179460",title:"Dr.",name:"Sahra",middleName:null,surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu",profilePictureURL:"https://mts.intechopen.com/storage/users/179460/images/system/179460.jpeg",biography:"Dr. Kırmusaoğlu is an Assistant Professor of Microbiology at the Department of Molecular Biology and Genetics, T.C. Haliç University where she had previously held an administrative position as Vice Head of the same department. \r\n\r\nShe specialized microbiology at Abant Izzet Baysal University (Biology Department), Turkey. Her previous experience includes the position of the Laboratory Manager at microbiology laboratories in several research and private hospitals. \r\nThroughout her career, she collaborated with academicians/researchers from AIBU, METU and IU Cerrahpaşa Medical Faculty, and participated in various research projects. She also worked as a lecturer in the Medical Laboratory Techniques Program held at the Department of Medical Services and Techniques, T.C. Istanbul Kavram Vocational Training School before transitioning to T.C. Haliç University as an Assistant Professor. \r\n\r\nDr. Kırmusaoğlu’s research interests include pathogenic bacterial biofilms, antibiofilm and antimicrobial agents, effects and synergistic effects of new alternative agents such as chemical compounds and natural plant extracts against pathogenic bacteria, such as antibiotic resistant and biofilm producing microorganisms. \r\n\r\nShe is also interested in research on antibiofilm medical devices and food package design for preventing biofilm infections associated with indwelling devices which could lead to systemic infections, foodborne infections, and prolongation of food’s shelf life. She has published several international research articles, book chapters, and congress proceedings. \r\nMore specifically, Dr. Kırmusaoğlu participated as an author in books titled 'Microbial Biofilms - Importance and Applications” and 'Staphylococcus aureus” with her chapters 'Staphylococcal Biofilms: Pathogenicity, Mechanism and Regulation of Biofilm Formation by Quorum Sensing System and Antibiotic Resistance Mechanisms of Biofilm Embedded Microorganisms” and 'The Mechanism of Methicillin Resistance and the Influence of Meticillin Resistance on Biofilm Phenotype of Staphylococcus aureus”. \r\nShe is the editor of the books 'Bacterial Pathogenesis and Antibacterial Control” and 'Disinfection,” both published by IntechOpen. \r\nShe is also the author and the editor of the book 'Genel Biyoloji Laboratuvar Kılavuzu” (General Biology Laboratory Manual) published by Hipokrat Publisher. \r\nShe has also edited the book project 'Antimicrobials” and she has translated a chapter for the Turkish translation of the book 'Sherris Medical Microbiology\\ by Ryan et al.",institutionString:"Haliç University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"5",totalChapterViews:"0",totalEditedBooks:"3",institution:{name:"Haliç University",institutionURL:null,country:{name:"Turkey"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"13",title:"Immunology and Microbiology",slug:"immunology-and-microbiology"}],chapters:[{id:"68429",title:"Nemonoxacin (Taigexyn®): A New Non-Fluorinated Quinolone",slug:"nemonoxacin-taigexyn-a-new-non-fluorinated-quinolone",totalDownloads:82,totalCrossrefCites:0,authors:[null]},{id:"66903",title:"Staphylococcus aureus in the Meat Supply Chain: Detection Methods, Antimicrobial Resistance, and Virulence Factors",slug:"staphylococcus-aureus-in-the-meat-supply-chain-detection-methods-antimicrobial-resistance-and-virule",totalDownloads:312,totalCrossrefCites:0,authors:[null]},{id:"68398",title:"An Emerging Multidrug-Resistant Pathogen: Streptococcus pneumoniae",slug:"an-emerging-multidrug-resistant-pathogen-streptococcus-pneumoniae",totalDownloads:91,totalCrossrefCites:0,authors:[null]},{id:"68220",title:"Toward Better Understanding on How Group A Streptococcus Manipulates Human Fibrinolytic System",slug:"toward-better-understanding-on-how-group-a-streptococcus-manipulates-human-fibrinolytic-system",totalDownloads:47,totalCrossrefCites:0,authors:[null]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"280415",firstName:"Josip",lastName:"Knapic",middleName:null,title:"Mr.",imageUrl:"https://mts.intechopen.com/storage/users/280415/images/8050_n.jpg",email:"josip@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copy-editing and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"8427",title:"Antimicrobials, Antibiotic Resistance, Antibiofilm Strategies and Activity Methods",subtitle:null,isOpenForSubmission:!1,hash:"0fdedc9bf6c23241235a0ae011c0304c",slug:"antimicrobials-antibiotic-resistance-antibiofilm-strategies-and-activity-methods",bookSignature:"Sahra Kırmusaoğlu",coverURL:"https://cdn.intechopen.com/books/images_new/8427.jpg",editedByType:"Edited by",editors:[{id:"179460",title:"Dr.",name:"Sahra",surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6601",title:"Disinfection",subtitle:null,isOpenForSubmission:!1,hash:"ea121cf9b26d006bc6d7c7f92195852d",slug:"disinfection",bookSignature:"Sahra Kırmusaoğlu",coverURL:"https://cdn.intechopen.com/books/images_new/6601.jpg",editedByType:"Edited by",editors:[{id:"179460",title:"Dr.",name:"Sahra",surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6148",title:"Bacterial Pathogenesis and Antibacterial Control",subtitle:null,isOpenForSubmission:!1,hash:"92128a5094670f6b0c9321640f60d3a3",slug:"bacterial-pathogenesis-and-antibacterial-control",bookSignature:"Sahra",coverURL:"https://cdn.intechopen.com/books/images_new/6148.jpg",editedByType:"Edited by",editors:[{id:"179460",title:"Dr.",name:"Sahra",surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4816",title:"Face Recognition",subtitle:null,isOpenForSubmission:!1,hash:"146063b5359146b7718ea86bad47c8eb",slug:"face_recognition",bookSignature:"Kresimir Delac and Mislav Grgic",coverURL:"https://cdn.intechopen.com/books/images_new/4816.jpg",editedByType:"Edited by",editors:[{id:"528",title:"Dr.",name:"Kresimir",surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"59789",title:"A Quantum Trajectory Interpretation of Magnetic Resistance in Quantum Dots",doi:"10.5772/intechopen.74409",slug:"a-quantum-trajectory-interpretation-of-magnetic-resistance-in-quantum-dots",body:'As the size of electronic devices is narrowed down to the nanoscale, quantum effects become so prominent that classical mechanics is no longer able to provide an accurate description for electrons moving in nanostructures. However, due to the lack of the sense of trajectory in quantum mechanics, classical or semi-classical mechanics so far has been the sole tool in determining ballistic orbits in quantum dots. Classical orbits satisfying commensurability conditions of geometrical resonances were derived in the literature to determine the magneto-transport behavior of periodic quantum systems. It was reported that the observed regular peaks in the magneto-resistance corresponded to backscattering of commensurate orbits [1], and the critical magnetic fields determined from the backscattering orbits showed an excellent agreement with the observed peak positions in the magneto-resistance curves [2]. A recent study showed that the ballistic motion of electrons within quantum dots can be controlled by an externally applied magnetic field so that the resulting conductance images resemble the classical transmitted and backscattered trajectories [3].
The use of an anisotropic harmonic function, instead of an abrupt hard potential, to describe the confining potential in a quantum dot was shown to be helpful to improve the accuracy of predicting magneto-resistance peaks based on backscattering orbits [4]. Nowadays, the confinement potential forming an electron billiard can be practically patterned to almost arbitrary profile, through which ballistic orbits with chaotic dynamics can be generated to characterize magneto transport [5]. However, the chaotic behavior and its change with magnetic field could not be described in the usual quantum-mechanical picture due to the lack of a trajectory interpretation. Regarding this aspect, the classical description becomes a valued tool for detailed understanding of the transition from low to high magnetic fields in quantum dot arrays [6]. On the other hand, quantum mechanical model for electron billiards was known as quantum billiards [7], in which moving point particles are replaced by waves. Quantum billiards are most convenient for illustrating the phenomenon of Fano interference [8] and its interplay with Aharonov-Bohm interference [9], which otherwise cannot be described by classical methods.
From the existing researches, we have an observation that the ballistic motion in electron billiards was solely described by classical mechanics, while the wave motion in quantum billiards could only be described by quantum mechanics. The aim of this chapter is to give a unified treatment of electron billiards and quantum billiards. We point out that quantum Hamilton mechanics [10, 11] can describe both ballistic motion and wave motion of electrons in a quantum dot to provide us with a quantum commensurability condition to determine backscattering orbits as well as with the wave behavior to characterize the magneto-resistance in a quantum dot.
Quantum Hamilton mechanics is a dynamical realization of quantum mechanics in the complex space [12], under which each quantum operator is realized as a complex function and each wavefunction is represented by a set of complex-valued Hamilton equations of motion. With quantum Hamilton mechanics, we can recover the quantum-mechanical meanings of the classical commensurability condition by showing that there are integral numbers of oscillation in the radial direction, as an electron undergoes a complete angular oscillation around a quantum dot. When the radial and angular dynamics are commensurable, the shape of electronic quantum orbits is found to be stationary like a standing wave. Furthermore, the wave number
The electronic standing-wave motions considered in this chapter will reveal that a jump of the magneto-resistance in quantum dots is accompanied by a phenomenon of magnetic stagnation, which is a quantum effect that an electron is stagnated or trapped within a quantum dot by an applied magnetic field in such a way that the electron’s cyclotron angular velocity is exactly counterbalanced by its quantum angular velocity. We point out that magnetic stagnation is a degenerate case from the electronic standing-wave motion as the wave number
In the following sections, we first introduce quantum Hamilton mechanics and apply it to derive Hamilton equations, which are then used in Section 2 to describe the electronic quantum motions in a quantum dot. By solving the Hamilton equations of motion, Section 3 demonstrates electronic standing-wave motions in various quantum states and characterizes the magnetic field leading to the phenomenon of magnetic stagnation. In Section 4, we show that the magnetic stagnation is the main cause to the resistance oscillation of quantum dots in low magnetic field by comparing the theoretical predictions obtained from Section 3 with the experimental results of the magneto-resistance curve [4, 13].
To probe the quantum to classical transition, which involves both classical and quantum features, quantum dots are the most natural systems [14]. Analyzing such systems, we need an approach that can provide both classical and quantum descriptions. Quantum Hamilton mechanics is one of the candidates satisfying this requirement. This chapter will apply quantum Hamilton mechanics to an open quantum dot with circular shape, which is connected to reservoirs with strong coupling. The electronic transport through an open quantum dot can be realized by nano-fabrication techniques as a two-dimensional electron gases system (2DES) at an AlGaAs/GaAs heterostructure, as depicted in Figure 1.
Schematic illustration of a semiconductor heterostructure with a circular dot between the two tunnel barriers.
Under the framework of quantum Hamilton mechanics [10, 12], the equivalent mathematical model of a quantum dot is described as an electron moving in an electromagnetic field with scalar potential
We adopt polar coordinates
where
where
where
the quantum Hamilton-Jacobi Eq. (4) associated with the Hamiltonian in Eq. (3) turns out to be
The recognition of the complex Hamiltonian
to Eq. (6) to produce the expected Schrodinger equation:
Due to the time-independent nature of the applied potentials
where
On the other hand, Eq. (3) can be rewritten by using the substitutions Eqs. (5) and (7) as
where
Upon performing the differentiations
Apart from deriving the Schrodinger equation, the above complex Hamiltonian also gives electronic quantum motions in the state
The appearance of the imaginary number
The Hamilton equation for
which can be conceived of as a complex-valued version of Bohmian mechanics [18, 19]. The complex quantum trajectory method based on Eq. (16) has been recently developed into a potential computational tool to analyze wave-packet interference [20] and wave-packet scattering [21].
The wavefunction
where
where the dimensionless time is expressed by
The conductivity of a quantum dot depends on how electrons move under the confinement potential within the quantum dot. Eqs. (19) and (20) provides us with all the required information to describe the underlying electronic quantum motion. The radial motion
Four types of electronic quantum trajectory in a quantum dot. (a) a magnetic field (Bc=0.4T) not satisfying the commensurability condition Eq. (21) yields precessing trajectories. (b) A critical magnetic field Bc=0.204T yields standing-wave like quantum trajectory, whose five wavelengths on the circumference do not contact the exit of the quantum dot. (c) A magnetic field Bc=0.26T yields similar standing-wave trajectory as that in part (b) but with six wavelengths which contact both the entrance and exit of the quantum. (d) At Bc=0.65T, a stagnation magnetic field, the electron is stagnated within an isolated region of θ.
On the other hand, if
where
As shown in Figure 2d, the standing-wave motion degenerates into a confined motion such that the electron is trapped into a closed trajectory, in the extreme case
The pattern and the orientation of the standing waves can be controlled by the applied magnetic field
which, in turn, is solely determined by the magnetic field
According to the residue theorem, the contour integral in Eq. (23) is equal to
where
The sequence
(A) Standing Wave with
In case of
It appears that that the ground-state electron rotates with a constant angular velocity
where
The commensurability condition Eq. (21) with the calculated
where we note
where
Regarding excited states, there are multiple periods in the radial motion
which has four equilibrium points at
According to different encirclements of equilibrium points, four sets of complex trajectories
(a) Four sets of complex trajectories ρτ are identified according to different encirclements of equilibrium points in the state nl=10. (b) Typical time response of an increasing Reθ corresponds to the trajectory shown in Figure 2b. (c) Typical time response of an oscillatory Reθ corresponds to the trajectory shown in Figure 2d.
Corresponding to the four different ways of encirclement, the four quantization levels of
The commensurability condition for the occurrence of standing wave in the four contour sets now can be derived from Eq. (21) as
The related critical magnetic field
(B) Standing Wave with
In the case of
The time average
Substituting the above
Due to the constraint
where
The period
Using
The comparison between Eqs. (33) and (40) leads to the observation that the number of the allowed integer
(C) Standing Waves with
In this case, the cyclotron angular velocity
Range of | Critical | Range of integer |
---|---|---|
The relation between critical Larmor frequency and angular quantum number
The cases of
where the admissible integer
The critical magnetic field
The critical
In a case study of
The radial trajectories
Set | Frequency range | Critical frequency | Integer |
---|---|---|---|
Distribution of the critical frequencies in the state
Typical standing waves in
Typical standing-wave motions in the state nl=1−1 with wave number N=5,7 and 9. The trajectory sets Ω1, Ω2, and Ω3 refer to the three sets of radial trajectory defined in Figure 3a.
In the state
Apart from the consequence of
There are infinitely many wavelengths distributed on the circumference of the quantum dot, as
(a) The variation of wave number N with respect to the Larmor frequency ωL/ω in the quantum state nl=1−1. (b) The two stagnation frequencies, ωL/ω=11−73/12 and 2/3, coincide with the two peaks of the experimental curve of resistance.
This section will compare the above theoretical predictions with the existing experimental data [4, 13] to confirm the fact that the effect of magnetic stagnation is the main cause to the resistance oscillation of quantum dots in low magnetic field. The experiment was performed in an AlGaAs/GaAs heterostructure with a carrier concentration
Thus far, our analysis on quantum trajectory focuses on some specific states. In order to know the influence of the applied magnetic field on the resistance, we have to consider all the possible quantum states occupied in the device. At temperature
where
0 | 1 | 2 | 3 | 4 | ||
---|---|---|---|---|---|---|
0 | 0 | 0 | 0 | 0 | 0 | |
−1 | 2/3 | 2/3, 0.205 | 2/3, 0.373, 0.119 | 2/3, 0.52, 0.19 | 2/3, 0.252, 0.124 | |
−2 | 4/5 | 4/5, 0.316 | 4/5, 0.543, 0.2 | 4/5, 0.73, 0.31, 0.146 | 0.4, 0.213, 0.115 | |
−3 | 6/7 | 6/7, 0.391 | 6/7, 0.64, 0.26 | 0.39, 0.196 | ||
−4 | 8/9 | 8/9, 0.445 | 0.7, 0.3, 8/9 | 0.454, 0.237 | ||
−5 | 0.486 | 0.75, 0.347 | ||||
−6 | 0.52 | 0.78, 0.38 | ||||
−7 | 0.546 | |||||
−8 | 0.57 |
Stagnation frequencies
An incident electron subjected to an applied magnetic field
where the summation is taken over all the states listed in Table 3. The expression of
which in turn is substituted into Eq. (46) to express the magneto-stagnation function
The electron’s total angular velocity via all admissible quantum states at
If magnetic stagnation takes place simultaneously in many states, its effect will be amplified. Stagnation frequencies such as
Figure 6 demonstrates the strong correspondence between the stagnation function
A gray-level plot of the stagnation function SB with the darkness intensity representing the value of SB is compared with the resistance curve. The resistance curve [4, 13] has a strong peak located around B=0.22T and three weak peaks at B=0.65T, 0.97T, and 1.21T. It appears that the locations of the three narrow dark bands coincide with the three weak peaks of the resistance curve, while the broad dark band covers the neighborhood of the strong peak of the resistance curve.
Parallel to the existing probabilistic description for a quantum dot by a probability density function
Artificial intelligence has made significant gains in operational context in the last two decades. One area of success has been demonstrated by the widespread implementation of agent-based modeling (ABM). Used extensively in a variety of contexts, there has been increased interest in the implementation of ABM’s where the agents represent the behavior of individual or groups of human beings in a social context. This leads to the application of the irreversible concept of narrative [1]. The narrative is a fundamental concept for the theoretical understanding and presentation of virtually any kind of human behavior. Our discussion here presents an abstract, yet working, definition of the narrative. A basic structure that must be incorporated into any computer system which is required to deal with human behavior is offered, and the implications of that structure in a variety of human contexts are examined.
\nThis approach to agent-based modeling has been in development for nearly two decades now. The first demonstration of the context in which a narrative became an essential part of a software system was created by AirMarkets Corporation, a collaboration of individuals from the air travel industry. It simulates the behavior of individuals and groups that have elected to fly from one city to another, including when they are going to fly, how much each is going to pay, and how likely any particular flight option is [2].
\nThe work supporting the initial formulation, resulted from extensive research by the author and his associates, culminating in the writing and publication of a doctoral thesis under the tutorage of global experts at the University of Technology in Sydney, Australia [3]. At that time artificial intelligence was still in its infancy, and the development of pattern recognition and the emergence of artificial intelligence technology based on such capability has since argued for the consideration of human-replacement computer systems. But artificial intelligence technology has a great deal of work to do before it can even come close to replacing ordinary humans, or even a broad class of animal life, in any kind of depth. This presentation gives a substantial indication of how far we have to go.
\nThe next section of the discussion describes the narrative construct. The notion of event, time, and associated probability are essential concepts. We then incorporate these important narrative ideas used routinely in mathematical and computer models and simulation. These concepts are exemplified by a range of rational choice models, common to artificial intelligence computer development, but viewed from the perspective of human behavior modeling. This approach is illustrated briefly in the next section, which describes in overview form the AirMarkets Simulation, which is a computer program that represents the booking of over 40 million travelers on the world’s commercial airline system using an agent-based, narrative structured methodology. We then move to a survey of heuristic choice model concepts, followed by an exploration of even more human—and less computer—narrative structures, including social network protocols and sources of bias in human narrative execution.
\nWe close with a review of future needed work, including mention of several mathematical theorems that limit the applicability of relevant software development regarding computer-based narrative software and distinctions between human and computer-based analysis that such analyses imply.
\nThe objective of this research is to develop computing machine ability to represent behavior in an agent-based software architectural context, so we can build agent-based models of activity such as market behavior, political contexts, or social interaction. Our first consideration is the creation of a framework for describing how human behavior can be characterized in a fashion consistent with observed patterns while dynamic enough to describe actions and activities that exist only, at least at some point in time, in the imagination of the individual. And time is an essential feature of such a characterization, since all behavior (of virtually all mobile biological entities) is selected, observed, enacted, realized, or even is cited as existing occurs over some distinct and evident time period. In addition, we want the description of the framework to be able to differentiate between what happens within the creature, such as choices based on memory or mental understanding, and external to the agent, such as weather and the behavior of other agents. That is, the construct must describe the relationship between what an agent perceives the world to be and what the world actually is.
\nVirtually all animal organisms show evidence of memory-based pattern creation and maintenance. In his fun discussion Montague [4] makes the case that virtually all biological entities that can move about has some ability to forecast at least the immediate future, and therefore must have at least a basic mental image of what the effect of its future activity is likely to be. The creature compares the perceived state of its current environment with its internal understanding of it and uses a cause-and-effect chain to determine what it expects the future state of the environment will be if it undertakes some appropriate activity. The phrase cause-and-effect refers to an internal conception by the creature that the state of affairs perceived by the creature as currently the case is due, in large part, to relationships between things that occurred in the past and the current state, and the anticipated future state of affairs that will exist if the creature does some appropriate thing. It is this internal, mental construct that we call a narrative. Indeed, for the artificial intelligence purposes of this discussion, the definition of narrative that applies to the modeling of human agents is as follows: The term ‘narrative’ will be taken to mean a pattern maintained internally by an agent that represents temporal cause-and-effect chains which define events that are perceived by the agent, with which the agent ‘understands’ the events, and based on which the agent takes action. Since narratives are temporal cause and effect chains maintained in a mental structure, they are essentially independent of the reality they represent.
\nNarratives are favorite topics of people who are interested in human creative activity, so much of the insight into their nature come from authors, poets, playwrights and composers. The term narratology is used to identify such discussions. Danto [5] defines the term atomic narrative to be a single event with related past and future. Figure 1 is an illustration of the concept. Note that there is past and future narrative time, and the event has a history and a range of outcomes.
\nSchematic conceptualization of an atomic narrative.
This is the state space that obtained before the event occurs. To the right is an arc representing the set of possible outcomes of the event. An atomic narrative can have a set of discrete outcomes, a continuous range of outcomes, as shown in Figure 2, or, at least theoretically, a mixture of the two. The history here, of course, is history in narrative time, and compared with history in real time, is woefully incomplete. That is, there must exist states in real time history that are not in a narrative history, no matter how thorough the recording of that history might be. The actual content of the existence of reality is never completely known to humans because we are unable to completely absorb and understand a description of reality in a finite interval of time.
\nDiscrete and continuous outcome sets.
That there can be more than one possible outcome is a vital property of the event. An event occurs when something in reality changes because the agent recognizing and responding to the event promulgates the change. The change is actually realized as an event outcome. There is a family of probability distributions associated with the outcome set of every event. This family is a stochastic process indexed by a set of narrative variables referred to as resources and is thus called the event stochastic process. The stochastic process can be denoted PΛ(Y|X) which is the probability that outcome Y occurs given history X and resource allocation Λ. A molecular narrative is simply of a sequence (in time) of atomic narratives and a narrative can be made up of multiple molecular narratives that are simultaneous in narrative time. A narrative that contains such multiple molecular narratives is called compound and is illustrated in Figure 3. As real time transpires, the course of the narrative is realized, which is illustrated in Figure 3 with the solid line connecting the relevant events.
\nMolecular narratives.
Thus, narratives are memory structures that are retrieved under a currently perceived state configuration. The retrieval is not only representative of the present, but also reflects the relevant past and future. The future portion of the narrative is created from the expectation property created by the probability associated with the narrative. If one outcome results, the narrative will go one course, while if a different one results, it will follow a different path. The narrative carries with it a description of the expected consequences of these event outcomes. Thus, the description of the future consists of a set of branches, each opening a new course for the narrative to take. Furthermore, there is a probability distribution associated with each potential outcome which dictates a probability that the branch initiated by that outcome will be realized.
\nIt should be noted that the stochastic structure of the probabilities cannot be assumed to be simple. The likelihood of outcome A vs. outcome B may depend on outcomes that were the result of previous events or sets of previous events. More succinctly, every atomic narrative has a probability distribution associated with its outcomes, but the distribution associated with the outcome of the last atomic narrative in a molecular narrative is not independent of the other atomic narratives which make up the molecular narrative. Therefore, every narrative has a past which contains the information required to support the future outcome stochastic processes.
\nBut the narrative past is not a completely accurate description of what lead to the present and is conditioning the future. It has inaccuracies caused by imperfect recall and incomplete data. Memory deteriorates as events recede into the past, and hence there must be a probability associated with the accuracy of the recall, and hence the past of a narrative also has an associated stochastic process structure. This is illustrated in Figure 4. The past and the future are shown as the widening ends of a hyperbolic cone representing the increasing uncertainty surrounding the past and future of the narrative, and the present is the narrowest part of the hyperbolic surface. The small circles connected by the lines inside the hyperbolic solid represent the events of the narrative and their relationships, as perceived at that point in the narrative. These event conditions change from past to future, but the degree of uncertainty in the narrative increases as the past recedes and the looming distant future is contemplated. This results in the loss of resolution of the event description.
\nThe time structure of narratives.
The individual that creates and maintains a narrative is called its owner. All narratives have owners, and all narratives are unique, to a greater or lesser extent, to their owners. But narratives are also shared. Language and communications are important adaptive tools for the human species and a vital purpose served by language is the sharing of narratives. Indeed, some suggest [6] it is the sole purpose of language, since all communications in his view is the description of a narrative. Shared narratives are not, however, perfect copies held by each individual that is, part of the sharing group. Each individual owner at least modifies the shared narrative structure to fit their own unique set of compound narratives that include the shared one. Moreover, shared narratives become institutionalized into laws, codes of conduct, norms, and other social constructions that serve to assist in group adaptation and evolution. Shared narratives are a very powerful social and evolutionary tool. In fact, it could be argued that the interconnections of the atomic narratives that make up shared compound narratives may set the framework for the multilevel selection adaptation evidenced by group evolution. While beyond the scope of this discussion, future research in this area using computer-based agents designed with the narrative construct might yield very useful results. It also should be noted that other modes of communications aside from formal speech are also available both to humans and to other species. Indeed, the question arises as to whether or not there is some form of communications available to plants?
\nIt is reasonable to conclude that narratives are mechanisms that result from human evolution. Much like the arguments presented by Sober and Wilson [7] and Shermer [8], the narrative hypothesis can be reinforced by evolutionary feasibility and their proven success as an adaptive device in support of both individual and group survival. This leads to the inference that the outcome of a narrative is either desirable or undesirable. Some are very simple, like what to have for lunch. At the other extreme, compound narratives that support religious beliefs and institutions can be invoked to portray a future where death is merely a change in physical state from this world to another, which may be Heaven (desirable), Purgatory (not so well favored) or Hell (clearly undesirable). Given this property of desirability, narratives then can be considered to be the vehicle by which value is expressed by the individual, and it is from narratives that values arise as identifiable attributes of human behavior.
\nThe narrative framework can be considered as a storage device for not only memories, but also expectations. The role of expectation in narrative structure—the projection of the effect associated with some cause in the future—is quite clear. The maintenance of a set of expectations associated with the various outcomes in a particular event-based choice situation is required for the mental storage of such expectations. It is implying too much inherent human analytic ability to assert that each such expectation set has a formal probability distribution also maintained as part of its mental representation, especially since such distributions would be dependent on the pathway by which the event itself arose, and not only on the fact that the event came about at all. Nonetheless, narratives provide both a context and framework within which expectation can be stored, recalled and manipulated. However, for the purposes of modeling human agents, the expectation-storage property is important. Indeed, one of the most useful applications of an agent model might be that both the “correct (logical)” application of probabilities, or the “deficient (logically false but commonly held),” expectation distributions can be modeled, and the results as expressed in specific choice contexts compared.
\nA human individual is part of a world and is in constant interaction with it. The intervention in the real world by the agent occurs by means of the allocation resources to the event at hand in order to alter its perceived probability distribution of the outcomes, either toward those it favors, or away from those it dislikes. In this way, the values held in the narrative are expressed in action. Since compound narratives are molecular, and thus made up of sequences of atomic narratives, any attempt by an agent to affect what it thinks will be the desired course of a narrative involves choosing a specific outcome from the set of outcomes of the narrative representation of that event. And it must do so one event at a time. Otherwise contradictions, uncontrolled feedback, process deadlock or other dangerous anomalies would emerge. Thus, in the narrative framework, the relationship between the narrative owner and its environment is always an event, and therefore always a choice problem. And there are a number of other issues of interest, but beyond the scope of this discussion. What about the time it takes to select outcomes? What happens during that selection process? And what about the cost of being wrong? Or how does the narrative accommodate the shifting environment.
\nNotice there is absolutely no requirement that any of the events or sequences of events described by a narrative be true, in the sense that there is Karl Popper’s intersubjective verifiability of narrative content [9]. Indeed, everyone has experienced erratic and unpredictable behavior on the part of others. Such behavior is seen because the narrative driving the erratic individual is different in some important way from what the observer expects, given her constellation of narratives. Since narratives exist as neurological entities (fundamentally memories), study of their physical existence and attendant properties resides in the domain of the neuroscientist. But what is represented by the narrative pattern, and whether or not that has any reality outside of the narrative itself, is an entirely separate question. It can be as fanciful or factual as the owner wishes and is capable of managing. The fact that fanciful narratives can be as real as factual ones creates the conditions on which wonderful fiction can be portrayed, both in books, on television, and in the theatre. It also creates the capability for popular politicians and dangerous authoritarians to put forth absurd and violent behaviors as within human and normal perspectives. Simply review the history of political activity in Europe prior to World War II.
\nWith respect to building a computer program, there is a minimal organization required for the implementation of a narrative in the context of agent-based modeling. The general definition of agent has been presented in Parker and Bakken [10] and in Parker and Perroud [11]. For our purposes, agents will always be implemented in the form of computer programs. Within the agent are mechanisms for perceiving the environment, making choices about what to do given the environmental information and from the context of the agent’s motivating narrative, and taking actions that advance the agent’s narrative. This simple agent structure consists of four components and is illustrated in Figure 5.
\nThe general structure of an agent.
Corresponding to the memory for a human being, the state vector is an array of variables which describe the current state of the agent. Referring to this array as a vector does not imply that it is necessarily a precise set of real numbers laid out in a row or column manner. Structures more complex than simple numbers can be specified. However, it does imply the memory object is both precisely well-defined and finite. The state vector also encodes the appropriate narrative structures that represent the beliefs and aspirations of the agent being considered. For example, it contains the probability distributions of the outcome sets relevant to the events the agent will encounter during the simulation. The state vector is maintained as appropriately defined data structure.
\nLike the ability of humans to receive, filter and understand information, a computer agent can receive information about the current conditions in its environment through the code component called the perceptor. Almost without exception, perceptors are message-handling routines the purpose of which is to ‘observe’ the current state of the agent’s environment, and filter and translate that information into a form that can be used by the choice-making component of the agent, converting the messages from the environment into an internal form of use to the agent. This internal translation is unique to each agent, which thus allows for agents that interpret the same external message differently. This would be important if different agents have different narrative events that were triggered by the same external environmental conditions.
\nThe actions of the agents to external messages, both those which are put into the environment as output messages by other agents, those required for changes in the internal state vector of the agent, and those that require the attention of other agents, are managed by the ratiocinator component. The ratiocinator makes choices and adapts the behavior of the agent. This is the part of the agent which replicates how the human intersects with the simulated world in accordance with the then-active narrative structure. How such stochastic choice mechanisms are implemented are within the purview of the agent’s ratiocinator.
\nWhen it is required that an agent create input to other components of the agent-based simulation, it can issue messages out to the environment by way of what we call an actor. It specifically engages the agent environment. Messages intended for other agents are detected by those agents as they interact with the environment.
\nFor even the simplest case of the atomic narrative with a single event, the agent components must contain significant data. The perceptor needs to be designed to recognize the occurrence of the event and the perceived state of the environment at the time of the occurrence. The ratiocinator must be programmed to perform one of a set of choice protocols the agent will apply to exercise the choice required by the event, including the availability and allocation conditions of the resources at the agent’s disposal. And the actor must have, in its repertoire of possible actions, those that are suitable given the event perception and protocol requirements. If the narrative construct driving the event recognition and intervention is a molecular narrative, with a number of events connected in a time-ordered and contingency network, then each atomic narrative must be delineated as described above. Furthermore, the connections between the component events must also be precisely represented in order to reliably represent the agent’s actions.
\nThis definition of agent contains the basic outline of all the pieces of the programmer’s art necessary to build and execute a virtual market simulation. At first glance, these requirements may seem onerous. But in cases where the construct has been applied, the problem reduces itself to a tractable, if perhaps complex, computer algorithm programming task. As with all computing programs, two elements are present: the data on which the algorithms operate and the computing code which executes the algorithms themselves. Looking at the agent definition from that perspective, the state vector holds the data, and the perceptor, ratiocinator and actor consist of algorithms. From experience to date, and from reflection of how a particular agent behavior might be implemented in a variety of other contexts, the programming of the choice protocol set that resides in the ratiocinator seems the most daunting.
\nWhy do care in the least about narratives? Because they represent—in fact are the existential structure—of what us advanced species of humans refer to as models. Now let us look at that!
\nHuman beings think in terms of mental models of the world around them and their relationship to it [12]. We formulate concepts and ideas and link them together to represent the way we think the world works in some significant regard and use those representations to make decisions on our future actions. These models can range from simple statements of assumed cause and effect—“if I step out in front of a moving bus, there’s a good chance I could be seriously hurt”—through physical scale models of buildings or vehicles in their design stages through mathematical representations of complex social or physical systems. Common to models of whatever composition or subject is that they are abstractions, and therefore simplifications, of reality, retaining what is believed to be salient features of the problem at hand.
\nWe are only concerned with models that are represented mathematically, either in the form of one or more equations or as a computer program. Consider the simple “What if?” scenario analysis applied to the results from a conjoint analysis, or more elaborate “war games” in which competing teams of managers (or MBA students) develop and implement strategies in an interactive fashion. An underlying principle of modeling is the representation of one process or set of processes with a simpler process or set of processes. The Monopoly® board game, for example, reduces a complex economic system into a limited set of transactions. Part of the fun of playing the game derives from the degree to which the outcomes (wealth accumulation and bankruptcy) resemble the outcomes from a real-world process that is, sort of being simulated.
\nAn important concept regarding simulation is time. This temporal property is an essential characteristic of process-representative simulation and differentiates the application of simulation as an analytic and scientific tool from many other approaches, such as deductive logic or statistical inference. As noted in the previous section, the central role of time is also an integral part of agent-based model simulations. With an express representation of time, the dynamics of a system can be explicitly studied.
\nIn many circumstances, the phenomenon under investigation cannot be ethically or safely subjected to experimentation. The study of disease epidemics, social intolerance and military tactics are obvious examples. In many situations the scale of the process under study prohibits any other approach. In astronomy and astrophysics, the universe is not available for experimental manipulation, but a simulation of important aspects of it are available for such study. Similarly, explorations of cultural development or species evolution cannot be executed with physical laboratory environment, while a simulation permits hypothesis testing and inference on a reasonable time scale. Finally, some systems are so complex that traditional experimental science seems hopeless as a research approach. Among these systems are ecological dynamics and evolutionary economics.
\nFigure 6 lays out the “ethnology” of mathematical modeling in general and simulation modeling in particular, starting with the invention of the calculus in the 1700s and continuing up to the present day. (This diagram is adapted from Gilbert and Troitszch [13].) The two broad categories of stochastic and deterministic simulation models are indicated by the shaded ovals. The bold face labels define the mathematical contexts of the various modeling formalizations, while their genealogy is spelled out with the lines. As illustrated in this diagram, agent-based simulation belongs to the class of stochastic simulations and descended from a form of simulation called discrete-event simulations. Discrete event simulations are stochastic simulations that attempt to mimic the behavior of the discrete parts of a system and their interaction. As indicated in Figure 6, a number of other varieties of simulation have evolved from the discrete event form.
\nThe ethnology of mathematical modeling and simulation.
Also contributing to the heritage of agent simulation are game theory, artificial intelligence and cellular automata models. Some of the early applications of agent-based models were in the area of rational game play. Axelrod’s [14] experiments with the prisoner’s dilemma game is the classic example and is cited by virtually every practitioner of agent-modeling somewhere in their writings. Artificial intelligence models are a key component of the development of robotic systems (Wooldridge [15] is a chief proponent). If the behavior modeled by the discrete event simulation contains stochastic elements, as it usually does, then the simulation can be run repeatedly using random numbers generated by the relevant probability distributions, and the distributional characteristics of the resulting dynamics portrayed. In fact, for a system of even moderate scope this is the only way such dynamics can be validly studied. The ability to express dynamics through ordinary or stochastic partial differential equations can quickly exceed any reasonable closed form.
\nMathematical models can be classified into two forms: reductive models and structural models. In a reductive model, a set of data is reduced to one or more equations or similar relationships that represent the data, but in a simpler, more parsimonious form. There is some loss of accuracy, the price of which is greater understandability. Linear regression is a ready example, where a set of pairs (or n-tuples) of data is replaced with an equation representing the relationship between the data values of one element of the set, called the dependent variable, as a linear combination of some collection of the other (n−1)-tuples, called independent variables. Structural models, on the other hand, are intended to be representations that not only reproduce patterns of observed data, but also characterize the process, or structure, by which the variables represented by the data relate to one another. Reductive models are not required to completely replicate the process by which the observed data is generated. They need only reproduce the observed results in a more economical and parsimonious way. Structural models focus on the way in which the observed values come about.
\nA good deal of applied mathematics and a substantial part of modern statistics is aimed at easing the problem of the generation of reductive models. Beyond linear regression, there are literally thousands of other applied techniques; Fourier series [16], time series analysis [17], discrete choice modeling (e.g., [18, 19]), and proportional hazard models [20] to name only a very few. Indeed, the so-called Stone-Weierstrass theorem in classical abstract analysis [21] describes a set of general conditions under which an arbitrary data set can be approximated to any desired degree of accuracy by a broad class of simpler functional forms. And reductive models are powerful and extremely useful tools. In econometrics, for example, reductive models are widely used for forecasting [22, 23]. For a thorough treatment of the structures and formal aspects of mathematical models, see Chang and Keisler [24].
\nBut in the “harder” sciences like physics, reductive models give way to structural models. Newton’s laws of motion, or Einstein’s theories of relativity, are mathematical constructs which purport to not only represent the results of data sets arising from observations of natural phenomena, but also how the objects in the natural world interact with each other to generate the observed data. That is, the models do not merely represent the observations, but also describe the process by which the observations come about. As such, they carry more explanatory weight than reductive descriptions. They are more likely to be valid beyond the range of the initial observed data sets that lead to their formulation. Also, they have repeatedly been shown to be robust across varied data sets and when connected to other models which represent related systems.
\nSimulation is one of the more powerful structural modeling techniques. A simulation is a model which, by design, represents the relationships between entities in a system. In particular, a simulation captures the dynamics of the relationships between components of a system, reflecting how changes in one component create changes and affect the response of other components. Humphreys [25], in fact, defines a simulation as a structural model that explicitly includes time as a dimension, so that the dynamics between the variables described in the model can be appropriately portrayed.1 The increasingly wide spread use of simulation also is tied to the development of computing power.
\nNote that the use of the word simulation here as a modeling technique should not be confused with the phrase when applied to certain methods of finding solutions to equations. For example, computing the volume of a complex solid in a multi-dimensional space, such as the area under a multi-dimensional normal probability distribution, can be done by generating a very large number of points in the relevant space and determining the ratio of those in the solid vs. those not in the solid.
\nModeling and simulation which incorporates a definition of time (unidirectionality, non-repeatability, uncontrollability) are representations of narratives. Fisher incorporates the rationality of traditional logic into the narrative paradigm (with a somewhat critical slant):
\n“Narrative rationality is not simply an account of the ‘laws of thought,’ nor is it normative in the sense that one must reason according to prescribed rules of calculation or inference making. Traditional rationality prescribes the way people should think when they reason truly or toward certainty. … Traditional rationality is, therefore, a normative construct. Narrative rationality is, on the other hand, descriptive; it offers an account, an understanding, of any instance of human choice and action, including science.” [6].
\nHow does this narrative construct relate in the modeling of human agents? As was stated earlier, the narrative provides the mechanism for separating reality from what the agent thinks is reality. That is, it defines the context, values and resources required to change the realization of a narrative to a desired outcome. Many consider individual narrative discovery as the central problem of marketing research, as exemplified by the strong methodological presence of ethnology in some marketing research quarters, such as ESOMAR (a European society of marketing research). It is clear that the choice process is a vital aspect of any such description. In fact, the narrative framework provides an ontological justification for pursuing the study of choice as the critical component of replicating the behavior of humans in agent-based models. It is not necessary to know the full constellation of narratives maintained by an individual to incorporate the concept into agent models. It is often sufficient, at least as a starting point, to model a few essential atomic narratives.
\nNarratives are needed for the construction of agents in a computing context because the distinction between the reality of the environment that an agent finds itself in and the perception and interpretation of that environment by the agent must be kept clear. Formally speaking, all narratives are models.2 And, since a narrative is a sequence of events, there exists a finite sequence {1, 2, 3, …, k} such that each member of which has an associated stochastic process Ei = PΛ(i)(Y|Xi). So a narrative can be expressed as the ordered k-tuple (E1, E2, E3, …, Ek), representing the possible outcomes of the narrative execution.
\nNarratives are to a significant degree a product of evolutionary history. As we observe human society across multiple cultures we should repeatedly encounter common behavioral attributes, since the environment in which humans have evolved have many essential elements in common. Moreover, we can then assert a behavioral universality that would support hypotheses that could be tested across cultures. Finally, if such universality can be supported, then the construction of agents that replicate important behavioral characteristics can be expected to be applicable in a wide range of contexts.
\nA thorough cataloging of human behavior patterns in cultures around the world has been assembled by the anthropology community. The University of Illinois at Urbana-Champaign maintains the Human Relations Area Files (HRAF), an organized and indexed compilation of every reported ethnographic study of human culture (UIUC [26]). Many scholars have used this resource in recent years to undertake cross-cultural studies of human behavior. Brown [27] has compiled a list of patterns of behavior that have been recorded in every human society that has been studied—anywhere in the world, large or small, old or modern. Brown focused on the hypothesis that a number of features of human culture would be found in all human experience, regardless of time, place, or history. When originally published, his views were sharply opposed to the prevailing anthropological wisdom. At the heart of the controversy was the nature-nurture debate, which still circulates actively today. Brown spent considerable space refuting the concept of cultural relativism, which holds that human cultures are vastly different with limitless variety.3 Further, culture completely determines human behavior, and therefore there can be no human universals. (For example, by taking a contrary view, Brown contradicted the great anthropologist Margaret Mead.4) This position is important for this analysis because, if there were no human traits that were independent of culture, then the problem of simulating human behavior with agents becomes extensively more difficult. In that case every culture would have a unique heritage and historical path, making generalization very difficult. Brown’s refutation of the relativistic view of human behavior is therefore valuable to the arguments justifying agent modeling in computer science. If we cannot characterize human behavior in some reasonably perspicacious and parsimonious way, the task of defining human simulation agents will be significantly more onerous.
\nNarratives are also the mechanisms by which agents communicate with each other—so-called shared narratives—and understand the world around them. They need not, however, be true descriptions of the world. All narratives are compounded from sequences of atomic events (are molecular narratives) and thus the choice process of the atomic narrative is the key focus. The set of choice protocols can be classified into four broad groups: (1) rational methods, including various concepts of bounded rationality, (2) heuristics, which are quick and easy (but often very inaccurate) rules-of-thumb, (3) social network protocols, which rely on communications between individuals to make choices, and (4) biases, which are significant errors often found in choice-making.
\nConsider what are usually referred to as protocols for rational choice. Perhaps the easiest of these would be rule-invocation methods. This is the situation where the agent making the choice has an available set of rules, and, depending on value of the state space when the event is encountered, one or more of these rules are used to determine the choice. Rule-based agents are widely used in agent-based models. Axelrod [14], Epstein [28], and Wooldridge [15] insist that rule-based agency is the wisest course of agent construction. This press for simplicity is in response to the need to explore and understand some of the unusual emergent results that are observed with agent-based models. A complicated agent structure makes analysis of such emergent structure much more arduous. And such a protocol is trivial to build into an agent. Merely specify the action to be engaged for each appropriate set of state space variable values. But this is not a choice protocol, since the outcome of the choice is predetermined by the rule set. It’s a pre-defined action invocation, and since there is no probability associated with the rule-invocation, there can be no associated narrative event. Therefore, this kind of choice mechanism is not within the purview of agent-based models as defined here, which require such a stochastic mechanism.
\nThe classic statistical decision problem is perhaps the oldest, and most ‘rational’ of this class of choice protocols. The fundamental problem of statistical decision theory is to select a possible action from a set of actions that minimizes expected loss. The loss function \n
The choice problem is to select the decision rule d from the set of all possible decision rules D that minimizes R. If it is assumed that each \n
Ferguson [29] delineates a conceptualization of much of the field of statistics based on this definition, coupling it in with a game-theoretic construction. In fact, the triple \n
In a general sense, all “rational” choice protocols are described by the statistical decision process defined above. Indeed, some would consider this formulation the axiomatic definition of a rational decision. This general formulation says nothing about the nature of the decision rules \n
This utility function is assumed to have an observable part \n
Very often the \n
The general discrete choice problem is based on the assumption that there exists a set of alternatives J with finite number of elements #(J). Furthermore, the agent making the choice has determined a complete preference order \n
However, human beings are not bound by the definitions of preference orders. Non-transitive, circular orderings are common. For example, when Mary is asked to choose between chocolate and vanilla ice cream, she selects chocolate. When asked her preference between vanilla and strawberry, she chooses vanilla, and when asked her choice between strawberry and chocolate, she prefers strawberry. The ordering is not transitive. This situation occurs because humans generally determine orderings pair-wise over some (possibly quite short) period of time, and the circular inconsistency is quite easy to manage if the time of the preference comparison can vary. Moreover, there’s no reason why the completeness property needs to be met in real-life situations. (An ordering that does not meet the transitivity and complete conditions is termed a partial ordering.) Fortunately, it is possible to derive a set of completely ordered sets from any partially ordered set (by considering each completely ordered set as a separate entity, and ignoring singleton sets), so the utility maximization problem reduced to a bookkeeping issue, (assuming there is sufficient data to estimate the number of models that might arise). In some cases, the collection of completely ordered sets can be represented in a hierarchy. But the point is that agent designers do not need to insist on complete choice sets. In fact, any kind of pairing relationship can be used as a preference ordering, and each can have a unique (empirically derived) utility function.
\nThe domain of rational choice models is not exhausted by the utility maximization of a discrete choice structure. Indeed, most choice situations are not even discrete, often requiring the selection of a parameter vector from a multiple-dimensioned real-valued vector space. Other methods are called upon here. Bayesian statistics have faded in and out of fashion over the past two centuries. Of special note are simulation approaches to statistical parameter estimation, confidence interval determinations, and hypothesis testing. In this context, the meaning of the word simulation is somewhat different from when it is applied to an agent-based model. What is referred to in this case is actually artificial sampling, where data values are generated with a computer from a known probability distribution, so that complex and otherwise intractable parameter estimates can be determined without expensive, perhaps even impossible, data collection.
\nThe significant power for efficient allocation of resources in aid of narrative fulfillment represented by these rational protocols gives them superior positions in the pantheon of choice processes. It is this superior performance, historically incontrovertible, that suggests an ever-widening venue of application. But most humans cannot enlist the aid of these methods without extensive training and the assistance of a variety of other parties. Even as powerful as they are, they are bounded by the time and other resources required for their utilization in the face of the urgency and importance of the particular choice problem at hand. That is, they are examples of bounded rationality, in spite of what they may seem. Bounded rationality is almost always portrayed in contrast to the messianic alternative of the demonic methods noted by Gigerenzer. This “Laplacian Daemon” is the all-seeing, all-knowing supreme intelligence that can solve any resource allocation problem and select the globally best option for all individuals for all time. Fortunately, but beyond in the context of this discussion, it cannot exist.
\nAll of the rational choice mechanisms mentioned above are available for the specification of agent choice protocols. All have computer programs that fully specify how they should be executed, what the data should look like, how the results should be presented and the limitations on and conditions of their application. Moreover, it is clear that a number of organizations and institutions make extensive use of these methods. Companies routinely use operations research for a variety of optimal resource allocation tasks. Perhaps one of the more interesting and successful applications of operations research is the revenue management process used in the sale of tickets in the airline industry, now being extended to similar perishable goods such as hotel rooms, rental cars, and theater seats.
\nBut the individual human being does not routinely engage such mechanisms in making choices. In fact, as noted above, they are very likely to be reductive and not structural models, and therefore may describe no actual process found in real world. There is no evidence that human beings actually make routine choices using any of these tools. Humans tend to employ much simpler approaches to day-to-day choices, and in many instances extend these simple protocols to serious, far reaching and life-changing circumstances where the more sophisticated, rational methods would seem to be called for. Given that an agent model of the human decision-maker must describe what the modeled human actually does, and not what it could or should do, these less rigorous and more ad hoc choice protocols must also be made available to the human agent modeler.
\nA specific example of an agent-based, rational choice model is the AirMarkets Simulator, which is a representation of the narrative structure and related choice protocol which portrays the behavior of customers selecting from a set of alternative air flight choices. Because the available flights at any point in time is partially a function of the choices made by others previously, a run of the simulation consists of all individuals (or groups traveling together) in the world traveling on commercial air service for a week’s time period, with travel bookings starting 120 days before the subject week. (That time period insures that no flight is unavailable at any time before the 120-day booking period, so all individuals booking before the start can be done at once.) About 27 million travel individuals or parties are booked on each simulation run, making up about 42,000,000 individual customers.
\nEach travel party chooses from all available service connecting the desired origin to the desired destination. The alternative is chosen using a random number generator to produce a probability between 0 and 1, and then the probabilities associated with the available options are examined in arbitrary order to determine which is selected by that particular customer. The utility shown in Eq. (4) above has the following form for the value of V(i, j), where i is the indicator of the customer and j the indicator of the air travel option:
\nIn this equation, the β’s are coefficients that reflect the values carried by the traveler with index i associated with the of the flight option reflected by the attribute denoted by the j-value. For example, βf(i) is the value for traveler i with respect to the fare f(j) associated with flight option j. Other important flight attributes include travel time, d(j), the shortest flight time dbase, the number of stops in the flight that are associated with allied airlines Ndc(j) and non-allied carriers Nic(j), and the cabin class of the flight option (first or economy). The β coefficients are estimated from extensive empirical data collected for that purpose.
\nThe function G(τ(i) – t(j)) is peculiar in the sense that it represents the desirability of the departure or arrival time of a flight option. (Note that either departure or arrival time is dominant, since the actual flight time cannot be altered by the traveler.) The passenger does not care if a flight takes off (or arrives) between two values a or b. If it is outside this range, then the further away from the a or b value, the less desirable the option is. The function G is referred to as a Box-Cox formulation, and is of the following form:
\nIn this equation, t(j) is the departure (arrival) time of flight option j, τ(i) is the desired departure (arrival) time by traveler i, βE(i) and βL(i) are coefficients associated with the traveler i if the departure (arrival) is early E or late L, and λE and λL are empirical values for the traveling population estimated from observed data.
\nIf the G function expresses the cost to a traveler of not departing (or arriving) when desired, then the compliment to it is the preference structure in the travel population of the desired departure (arrival) times. This function is purely empirical, and is denoted by Θ(τ), where τ is the desired departure (arrival) time. Then, in accordance with the probability function illustrated by Eq. (5), we can represent the probability that traveler i will select flight option j over the time period [0, W] (nominally 1 week) is given by
\nThis gives us an idea of the nature of a rational narrative protocol of use in an agent-based model describing human behavior with a computer system. The data which characterizes the behavior of the 27 million traveling parties moving by air in a typical week around the world is a substantial, but not at all difficult to create or maintain. (It is, however, expensive. Over $2.5 million were spent collecting the data that represents the empirical values of appropriate traveler data.) The AirMarkets Simulator executes on an Intel 8-processor desktop computer in about 35 minutes, with no other activity being executed simultaneously. A complete, detailed description of the underlying structure of the Simulator is given in [3], pp. 156–269.
\nThe models of rational human behavior implicit in the realization in economic theory briefly described so far—homo economicus—are not the only kind of human choice that is, possible. In fact, there is scant evidence that people behave anything like the optimizing behavior suggested by these protocols. Virtually every scholar who examines the problem derides the idyllic nature of rational, economic humans. Indeed, the economic man model is often more normative than descriptive. While quite useful, as demonstrated by its singular success, applying a normative model ultimately begs the question of how people ‘really’ make choices, and to that extent the economic theory that is, the foundation of discrete choice and utility maximization methods is defective. And it is not necessary with the development of agent-based simulation models. The alternative to economic man is often couched somewhat inappropriately in terms of bounded rationality.
\nBounded rationality refers to the limitations in resources available to undertake and perform data collection and analysis leading up to a decision, in other words, the execution of benefit/cost analyses, formal or otherwise. In this regard, two streams of thought are discernable in the analysis of human rational behavior. The one, stemming from game theory explores human decision making as a real-valued trade-off endeavor. Indeed, classic economic theory assumes that all the entities in a given economy converge to such utility function rationality as equilibrium is reached. Among the many tributaries of this line of thought is the utility structure that leads to discrete choice theory and the modern study of consumer choice behavior discussed previously. The second stream is the notion of satisficing as a decision structure. Satisficing is choice-making based on being “good enough” rather than “utility maximizing.” This idea fits into the narrative framework.
\nGigerenzer and Selten[30] captures this idea with a simple taxonomy of rational choice. Which he refers to as “visions of rationality.” He breaks rationality down into two broad classes. One he calls demons, referring to the demonic capabilities he views as necessary to carry out rational decision-making in the real world without regard for constraints of time or resources, as mentioned. Demonic reasoning is dissected into unbounded rationality and optimization under constraints. The former is literally applying limitless resources to a decision problem or being presented with a decision problem so simple (such as a statistical estimation problem) that all relevant issues are easily known. The latter refers to concepts such as those frequently seen in operations research, in which the problem at hand has been constrained to become manageable. In this case, however, the choice of the nature and values of the constraints are subject to the same resource limitations as any decision problem, thus only begging the issue of what level of demonic strength is available. Gigerenzer suggests that the bounded rationality side consists of two components; the search for options or alternatives, encompassed under the label of “satisficing,” and the actual choice among alternatives, referred to with the term “fast and frugal” heuristics. The searching activity includes methods for finding options and methods for stopping the search. Some of the search methods Gigerenzer notes include: random search, where the agent explores the decision environment without any apparent organization until time runs out; ordered search, using the validity of environmental cues as they apply to the choice problem at hand as the ordering mechanism; search by imitation using apparent similarities of this decision problem to those encountered in the past (imitation allows us to know where to look and what to look for, but does limit results if the environment within which we are searching is novel or unexpected); and emotions, which apparently act to narrow down the search space in effective, but not well understood, ways. Other search methods readily come to mind, but all of them can be interpreted as being enabled by the narrative context in which the choice event is presented. That is, the search process is governed by what the agent, because of the controlling narrative that is, creating the decision context, considers important to the resource allocation and outcome probabilities associated with the atomic narrative.
\nStopping the search is where satisficing comes in—when have we searched long enough and established enough options? When we are satisfied that further research will not add any important alternatives, or when we have no more time to gain additional knowledge? Gigerenzer [31], pp. 129–165, proposes what he calls the probabilistic mental model (PMM) as a construct to account for the satisficing and fast and frugal heuristic choice protocols. In a PMM, the individual puts the choice event in hand into a mental construct of similar choice situations it has encountered in the past, or has learned by one method or another, and uses that context as the satisficing criterion. In other words, people fit decision problems into models that seem somehow appropriate to the problem, make the decision, then modify the model if expected results are not realized. This approach argues that the limited cognitive and computational ability of humans mitigate against a purely analytic benefit/cost structure in favor of agile and adaptive, if less than optimal, heuristic decision rules.
\nHeuristic protocols are choice mechanisms that rely on relatively little information and rule-of-thumb thinking. There is strong evidence that much of the choice behavior of humans is of this variety, if for no other reason that bounds on available time for decision-making prohibit any other approach. For example, Malcolm Gladwell’s discussion of virtually instantaneous human decision making in his book Blink [32] addresses this phenomenon. Todd [33] offers a simple listing of some of the more important fast and frugal heuristics:
When choosing between two alternatives, one recognized and the other not, the recognition heuristic says choose the recognized one. The basis for this heuristic seems to be that recognized alternatives are apt to be more successful, and therefore more likely to be recognized, and thus to evaluate the remaining options using the second most important criterion. He proceeds this way, moving down the prioritized list of criteria, until only one alternative remains. If he gets through the choosing them is a better idea. Note that increased option search can reduce choice efficiency if more recognized options are added.
In the take the best heuristic the agent selects the best alternative as measured by one single criterion (e.g., price). Other dimensions which characterize the issue in question are not considered at all. One can see how this fits neatly into the narrative framework if the criterion reflects a resource deemed supremely important for the realization of the narrative, as it becomes the dominant factor in the decision. And different agents may have different criteria for what constitutes “best.”
An extended form of the take-the-best heuristic (which in fact can be shown to actually be rational) is lexicographic ordering. This is a multi-dimensional extension of take-the-best. This line of thought has been explored more fully by Tversky [34] with his elimination by aspects approach. Elimination by aspects is a choice method wherein the individual has a set of criteria in mind on which he will evaluate a set of alternative choices. He ranks the criteria from most to least important, and then proceeds to evaluate each alternative against the first criterion. If two more alternatives have equal values according to that criterion, he eliminates all the others from consideration and moves on to the next criterion. If he reaches the last criterion evaluation and he has more than one choice alternative left, he selects among the remaining alternatives at random; that is, engages a random protocol. The phrase ‘lexicographic’ is also used to describe this protocol, since alphabetic ordering is done this way. Tversky also showed the equivalence of elimination by aspects to discrete choice thus moving this seeming heuristic into the domain of the rational.
Another fast and frugal heuristic approach that lies on the boundary between pure rule of thumb and the rational choice operations is Dawes’s rule [35]. This is a type of linear result choice method. Evaluate the alternatives against a set of criteria by determining if the alternative is either positive or negative with respect to each criterion and subtract the number of negatives from the number of positives. The option with the highest score is chosen.
Other heuristics are described by scholars in several fields, especially cognitive psychology. Kunda [12] offers an extensive array. She mentions the representative heuristic, wherein a choice is based on the similarity of the choice situation a category of choices that have been faced or witnessed before (Kunda [12], pp. 57–89). The determination of similarity is based on characteristics of the situation at hand to the one or more of the attributes that define a class of situations but may differ from members of the class in details. This is conceptually coherent if viewed from a narrative perspective, in the sense that the value of resources and the weight put on the factors which assess that value that play in a narrative may be the among the criteria that define the class similarity. In this sense it is somewhat like the recognition heuristic described above.
Another family of heuristic methods cited by Kunda is the collection of statistical heuristics, referring to statistical rules-of-thumb most people seem to have learned and carry around with them. They generally seem to arise as a result of dealing with the pervasive uncertainty life brings. For example, the observation that while having all nine of one’s grandchildren be of the same gender would seem quite unusual to most people, having all three of your grandchildren would not seem that odd. But why? The suggestion is that people apply an elementary bit of statistics to the problem, reasoning that the gender of a child is a fifty-fifty proposition, and, equating that to the tosses of a coin, where tossing nine heads in a row happens much less often then than tossing three in a row.
One final contribution to the heuristic array is more subtle than the others. This is anchoring and adjustment ([12] pp. 102–109). This is the tendency for people to base a decision about a specific issue based on a reference to other (perhaps completely irrelevant) situations. That is, some change in an element of the context in which the choice operation is taking place may cause a choice to vary from one instance to another, even though the context change is not part of the choice event. This setting of an anchor (the changing context element) will cause individuals to tend to adjust their choices to be consistent with the anchor, even though the anchor does not bear on the choice event itself.
There are many additional heuristic processes that could be identified, and this would seem to be a fertile area for further research. There is a considerable psychological and sociological literature that should be explored to extract current understanding of the choice mechanisms and formulate computing structures that would be applicable to agent-based models. There is little doubt these mechanisms are used very frequently in many day-to-day choice situations and they should be available to the human agent modeler as much as the more flamboyant rational methods are. But in their implementation their sometime severe bias must also be recognized. That is, just as much a part of the protocol as the actual choice itself.
\nHumans rarely make decisions completely alone. Many choices are subject to consideration and examination by not only the chooser directly, but also by other individuals who are connected to her in some way. Friends, relatives, other respected (or not so respected) experts, celebrities, people in authority, co-workers and many others enter into the choice making process in a host of ways, and with a variety of consequences. Only a few of such mechanisms can be considered here.
\nIn a sense, social network choice protocols are somewhere between the rational approaches and the individual heuristics. Gigerenzer poses the dilemma:
\n“In many real-world situations, there are multiple pieces of information, which are not independent, but redundant. Here Bayes’ rule and other ‘rational’ algorithms quickly become mathematically intractable, at least for ordinary human minds.6 These situations make neither of these two views [laws of probability, and reasoning error] look promising. If one was to apply the classical view to complex, real-world environments, this would suggest that the mind is a supercalculator—carrying around the collected works of Kolmogoroff, Fisher and Neyman—and simply needs a memory jog …. On the other hand, the heuristics and biases view of human irrationality would lead us to believe that humans are hopelessly lost in the face of real-world complexity, given their supposed inability to reason according to the canon of classical rationality, even in simple laboratory experiments.” ([31], pp. 167)
\nThat most people survive without falling into Gigerenzer’s abyss is due in part to social network choice methods. Clark [36] makes a compelling argument in support of this vital role, suggesting that the “scaffolding” of the social network in which all humans are embedded is central to our ability to make decisions, survive and advance. Kunda provides a broad but insightful survey of the field, and Sternberg and Ben-Zeev [37] offer an excellent introduction. The rapid rise of social networking sites on the internet—Facebook, Twitter—testify to both the importance of the social network and the ease with which people adapt to new forms of it.
\nThe development of formal methods of social network analysis has become quite active, as well, partly because of the advances in computing and agent-based modeling. Network analysis as a formal field of academic endeavor dates back at least to Erdos and Renyi [38] but the emergence of the worldwide web has spurred more recent advances, including the exploration of scale free and stochastic network analysis. An easily accessible introductory survey of modern methods can be found in Barabasi [39] or Buchanan [40]. A more advanced and formal treatment is offered by Dorogovtsev and Mendes [41]. Newman et al., [42] have compiled a compendium of more recent developments in the field.
\nIn an agent-based modeling context, networks are an expression of the topology of the explicit space required by Epstein’s definition of agent model (Epstein [28]). That is, a network defines which agent is “close to” which other agent. Moreover, it defines what the word “close” means in a particular model. Epstein and Axtell illustrate the network role on the Sugerscape grid with respect to economic and social interaction ([43], pp. 130–135). As they show, a network in an agent-based model is a communication connection between one agent and another. A single agent can have such connections with a number of other agents. The connection can be one-way or two-way. Different kinds of connections can reflect differences in the nature of the inter-agent communication. And, perhaps more importantly, networks change over time, with new connections being made and older ones dying out.
\nA convenient way to consider the network structure of an agent-based model is to stipulate that each agent will maintain a list of the other agents to whom it is connected. Separate lists can be kept for different kinds of communications. If two agents have each other in their individual lists, then the network communication link is mutual, otherwise it is just one way. The message posting function of the computer implementation of an agent model can then be engaged to manage the communications between agents during the simulation. However, network structures are not a requirement of an agent model. Space can be portrayed in other ways. In a cellular automaton, agents reside on a grid where communications between agents is based on being physically next to each other on the grid. In the AirMarkets Simulator, simple agent communication networks are used to define the relationships between distribution system agents and airline agents.
\nPerhaps the most common form of social network-dictated choice protocol is imitation. There is strong evidence human beings learn by imitation, and thus it is reasonable that the same approach would be called on when faced with a new choice situation. What action did others do in this same situation? Very often the narrative event which creates the choice is encountered in the context of a shared narrative, and thus the choice by the individual is apt to follow the course of the underlying narrative supporting the event definition. In terms of agent-modeling, the agent which uses this protocol must be linked through a social network to the individual or group of individuals whom it wants to imitate. The imitation cannot be certain, however, for that is, reserved for consilvocation. There must be a randomizing mechanism that allows for the imitation to have a stochastic element, such as being linked to two or more individuals who can be imitated, but with a randomization device that dictates which one is followed in a particular event.
\nClosely related to imitation is expert advice. It is natural that someone believed to know more about a particular narrative event—an expert in the field—would make a wiser choice than a novice. And as humans learn as children and adolescents, the courses of action suggested by experts with more experience are important techniques in determining the probability of the outcomes of various choice options. From an agent modeling perspective, clearly a social network link is needed between the agent and the expert. Again, some stochastic mechanism needs to be present if the requirements of the narrative construct are going to be met. In this case, however, in addition to the selection of one of a possible set of experts, whether or not to follow the expert advice can be employed as the randomization method. Taleb ([44], pp. 145–156) examines what he refers to as the “expert problem” in some depth, classifying experts into those who have expertise in subjects for which expertise exists, such as science and medicine, and reserves the phrase “empty suits” for those who claim expertise in things for which no expertise can possibly exist, such as the forecasting the value of a stock exchange index tomorrow morning.
\nThis raises an issue to be addressed by an agent model that uses either imitation or reference to experts: How do those experts make a decision which can be imitated or on which expert opinion can be founded? One might suggest that the “imitand” or the expert use a rational choice method, for example. Or there could be hierarchies of imitators or experts, each imitating others while providing expertise to other agents. It would be quite interesting to explore how such networks might work with a simple agent model. In particular, emergent properties of agent-based simulations which contain such social mechanisms could be most curious. Finally, note that the required stochastic property of the choice process of an agent using imitation or experts could be inherited from the stochastic property of the imitated or expert agents.
\nA third kind of social network choice protocol is voting. An individual can make a choice by polling a set of other individuals to see what they would choose, and then determine his or her choice by tallying the results. For a simple binary choice, this technique is trivial. (Again, how those who cast votes determined their respective choices is a modeling design issue.) For choice events where three or more options and three or more individuals are polled, however, Kenneth Arrow’s Impossibility Theorem enters the picture, and some form of bias has to be introduced to guarantee an outcome [45]. Again, implementation of this type of social network decision protocol is straightforward in the design of an agent-based model. The agent in question maintains a list of voters and polls each one by supplying the voter with the choice problem and accepting that voter’s choice as the vote. The agent then tallies the votes and determines its choice.
\nA particularly strong form of social choice is not extensively discussed in the literature, at least as far as he research of this author has been able to find. The concept has been termed by associates as consilvocation.7 In this situation, an agent turns over to another agent complete control over the choice to be made. A trivial example is the husband leaving to the wife the choice of restaurant for dinner. Consilvocation happens all the time in a democratic political context. The individual citizen elects a representative to sit in a legislative body and make decisions on his behalf. The citizen has thus turned over the choice function to the representative.
\nConsilvocation is a way of eliminating choice events that are out of an individual’s control but will have an impact on the course of a compound narrative. It simplifies matters considerably. Another attribute of the consilvocation choice protocol is that the consilvocated right to make the decision can be revoked. The process by which revocation occurs can be simple (the husband elects to pick the restaurant himself) or complex (the citizen must wait for the next election or invoke a recall process). Adding consilvocation to an agent model is generally not difficult but could well have a dramatic impact on the number of individuals demonstrating a specific behavior in relatively a large-scale agent model simulation. Recall that in the AirMarkets Simulator, a single agent actually represents multiple passengers, and one agent buys tickets for everyone in the group it represents.
\nFinally, the term bias in the context of this analysis refers to the difference between the choice that is, actually made and the choice that would be made if the “correct” alternative were selected. Obviously, this calls for a definition of “correct.” In a formal statistical decision problem, bias refers to the difference between the expectation of a particular statistic that is, used to estimate the parameter and the value of the estimate itself. That is, a statistic S used to estimate a parameter θ is unbiased if E[S] = θ, and the search for unbiased estimators is a long-standing topic of statistical research. The definition of correct is not so easily determined in the agent choice circumstance.
\nMany authors identify and describe choice bias in a manner similar to the statistical definition, holding that the choice that results from the engagement of a rational decision protocol is the correct one, and other heuristic or social network protocols that lead to different choices for the same narrative event are biased. As has been said before, if human beings are to be validly represented by agent-based models, then they must be represented as they are, not how someone thinks they ought to be.8
\nSome biases are perceptual in nature, and arise from inaccurate representations of reality, which in terms of the formal definition of agent can be accommodated with properties of the perceptor component. Festinger et al. [46] and Tumminia [47] explore some of the implication of cognitive dissonance, which occurs when an individual believes in a reality that is, directly contradicted by the sensory evidence before him. The mistakes-were-made assertion described by Shermer [8], pp. 67–71 is an example of self-justification bias [48]. Inattentional blindness is the failure to recognize some feature of the surrounding environment because attention is focused on some other environmental feature [49]. Blind spot bias is the ability to see biased perception on the part of others but fail to see it in oneself. It is similar to better-than-average bias, which causes a person to think they are more capable at any given skill or talent than the average individual [50]. Humans also tend to see themselves in a more positive light than they see others [51], and therefore create a self-serving bias. People tend to accept credit when they behave in socially acceptable ways and blame circumstances outside themselves when they do not do so well. This is an example of an attribution bias [52].
\nBut not all biases are perceptual. Two, in particular, are based on misunderstanding fundamental concepts in probability theory. Kunda ([12], pp. 54–62) notes that probability theory, as a formal mathematical discipline, dates only back 300 years,9 and that its relatively late development speaks to its intuitive difficulty. One is the base rate bias, described nicely by Kunda, and the other is the so-called Let us Make A Deal fallacy, described by Shermer ([8] pp. 83–84). Base rate bias is very common. It stems from misunderstanding the incidence of some particular characteristic in the underlying population, and thus from a miss-application of Bayes’ Rule to an intuitive inference. For example, consider John, who is a small gentleman with a quiet demeanor, who wears glasses, dresses conservatively, and often is seen carrying a book. Is John a factory worker or a librarian? Many would say a librarian. But the likelihood that he is a factory worker is far higher than he is a librarian. None of the distinguishing criteria disqualifies him from being a factory worker, and there are far more factory workers than librarians. This is the base rate fallacy; failing to account for the actual rate of incidence of a factor in making a judgment. It is a primary reason for bias in the representative heuristic.
\nThe Let us-Make-a-Deal fallacy is significantly more subtle. The name refers to a game show popular on American daytime television. A contestant stands before three closed doors, behind one of which is a valuable prize, usually a car. Behind the other two are valueless prizes, historically goats (but animal rights advocates objected, so some other worthless offering is now used). Which door hides which prize is unknown to the contestant. The contestant chooses one of the doors and is awarded the prize behind that door, hopefully the car. But before the chosen door is opened, the host opens one of the other two doors (always revealing a goat) and asks the contestant if she wants to change her door choice and take the prize behind the remaining door. Should the contestant take the offer, or should she stay with her original selection? Most people will say it does not matter. Assuming that the likelihood of a car being behind any of the three doors is the same (one third) for each, then knowing that it is not behind one of them only means that the probability of it being behind either of the remaining two is now changed to one half, and therefore switching does not affect the odds of winning. But that is, incorrect. In fact, the probability that the car is behind the door that was chosen originally by the contestant is one third, and that it is behind the unrevealed other door is two thirds.10 The explanation is clear (but for many, not convincing). The contestant faces three possibilities: the doors can hide (1) car, goat, goat; (2) goat, car, goat; or (3) goat, goat, car. Suppose she starts the game by selecting door number one. Then if she switches and the first possibility is the true situation, she loses. But if either of the other two possibilities are the case and she switches, she wins. Thus, the probability of winning by switching is two thirds. A simple computer application is easy to write that simulates the game any desired number of times. Execution of that simulation verifies the correctness of the analysis.
\nThere are, of course, many similar examples of incorrect reasoning. That they exist and should be avoided in the making of careful decisions is obvious. But it is equally obvious that these “errors” can be subtle, and difficult to detect. Once again, human agents in computer simulations must be modeled as they are, not as they should be. That means determining when bias is an important part of the agent behavior and building that bias into the agent. But as difficult as the task might seem initially, it is ameliorated by the knowledge that choice protocols span cultures and societies, so what is learned on one context can be applied in others, and, with the connection of the choice protocol to the narrative framework, complex behaviors can be built up out of simpler, atomic elements.
\nThis presentation sets the stage for more exhaustive incorporation of narrative structures into human behavior-based computer artificial intelligence applications. One such application has been in operation for the last several years in the AirMarkets Corporation, consisting of an agent-based model of air passenger behavior, including flight schedule development, revenue management of air fares as a function of advanced booking time, departure and arrival times, group size and available service. Because of the interdependency of air fares, available service and air demand, for each run the AirMarkets Simulation replicates the air travel utilization for every seat on every scheduled flight taking place in the world for a week time period. That is, more than 42,000,000 passengers buying tickets in approximately 288,000 directional city-pair markets over a single week time period, with advanced booking being as much as 120 days in advance of departure. The narrative structure supporting this agent-based simulation is not complex. Since travel is usually a utility associated with some other activity, a choice function based on the utility value of departure/arrival times, fares, booking times and travel purpose is sufficient for the AirMarkets Simulation. Other behavior activities, however, will require more in-depth structuring.
\nBeyond the semi-rational construction of narratives using hard logic and mathematics, the description of human narrative decision-making gets much softer and more obscure. The heuristic thinking by individuals is perhaps rational, perhaps not. It depends on how accurate the time-dependent, context-constricted thinking of the decision-maker turns out to be. In a logically-looser setting, social structure can become the basis for narrative behavior and the guidelines for assessing the validity of the option choices become even less rigorous. Finally, there is a substantial level of human narrative activity that can only be classified as bias. There is no logic, no bounded rationality and no social context which explains such narrative behavior. In this area several frivolous, and several dangerous, actions by human narrative holders are justified.
\nHowever, there is one pressing issue among the several that exist must be addressed. It is necessary to explore the impacts of at least four mathematical anomalies on the structure of even a simple, atomic narrative. These are: (1) the Stone-Weierstrass Theorem, which stipulates the minimum mathematical structure for a data set contents to be represented by a polynomial (which in turn can become part of a narrative, but might not be consistent across several data sets); (2) the Arrow Impossibility Theorem, which shows the theoretical limits of rational decision-making on electoral processes; (3) Godel’s Theorem, which determines that any logical structure is subject to questions about completeness that can only be addressed using a logical structure more in question than the one being assessed; and (4) the Heisenberg Uncertainty Principle, which cites limits on observable, non-probabilistic statements of the physical universe. The exploration of these issues are the subject of my current research.
\nIntechOpen is the first native scientific publisher of Open Access books, with more than 116,000 authors worldwide, ranging from globally-renowned Nobel Prize winners to up-and-coming researchers at the cutting edge of scientific discovery. Established in Europe with the new headquarters based in London, and with plans for international growth, IntechOpen is the leading publisher of Open Access scientific books. The values of our business are based on the same ones that any scientist applies to their research -- we have created a culture of respect, collegiality and collaboration within an atmosphere that’s relaxed, friendly and progressive.
",metaTitle:"Social Media Community Manager and Marketing Assistant",metaDescription:"We are looking to add further talent to our team in The Shard office in London with a full-time Marketing and Communications Specialist position. The candidate will bring with them a creative and enthusiastic mindset, high level problem-solving skills, the latest marketing and social media platforms skills and strong involvement in community-best practices to engage with researchers and scholars online. The ideal candidate will be a dynamic, forward thinking, approachable team player, able to communicate with all in the global, growing company, with an ability to understand and build a rapport within the research community.",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"We are looking to add further talent to our team in The Shard office in London with a full-time Social Media Community Manager and Marketing Assistant position. The candidate will bring with them a creative and enthusiastic mindset, high level problem-solving skills, the latest marketing and social media platforms skills and strong involvement in community-best practices to engage with researchers and scholars online. The ideal candidate wll be a dynamic, forward thinking, approachable team player, able to communicate with all in the global, growing company, with an ability to understand and build a rapport within the research community.
\\n\\nThe Social Media Community Manager and Marketing Assistant will report to the Senior Marketing Manager. They will work alongside the Marketing and Corporate Communications team, supporting the preparation of all marketing programs, assisting in the development of scientific marketing and communication deliverables, and creating content for social media outlets, as well as managing international social communities.
\\n\\nResponsibilities:
\\n\\nEssential Skills:
\\n\\nDesired Skills:
\\n\\nWhat makes IntechOpen a great place to work?
\\n\\nIntechOpen is a global, dynamic and fast-growing company offering excellent opportunities to develop. We are a young and vibrant company where great people do great work. We offer a creative, dedicated, committed, passionate, and above all, fun environment where you can work, travel, meet world-renowned researchers and grow your career and experience.
\\n\\nTo apply, please email a copy of your CV and covering letter to hogan@intechopen.com stating your salary expectations.
\\n\\nNote: This full-time position will have an immediate start. In your cover letter, please indicate when you might be available for a block of two hours. As part of the interview process, all candidates that make it to the second phase will participate in a writing exercise.
\\n\\n*IntechOpen is an Equal Opportunities Employer consistent with its obligations under the law and does not discriminate against any employee or applicant on the basis of disability, gender, age, colour, national origin, race, religion, sexual orientation, war veteran status, or any classification protected by state, or local law.
\\n"}]'},components:[{type:"htmlEditorComponent",content:'We are looking to add further talent to our team in The Shard office in London with a full-time Social Media Community Manager and Marketing Assistant position. The candidate will bring with them a creative and enthusiastic mindset, high level problem-solving skills, the latest marketing and social media platforms skills and strong involvement in community-best practices to engage with researchers and scholars online. The ideal candidate wll be a dynamic, forward thinking, approachable team player, able to communicate with all in the global, growing company, with an ability to understand and build a rapport within the research community.
\n\nThe Social Media Community Manager and Marketing Assistant will report to the Senior Marketing Manager. They will work alongside the Marketing and Corporate Communications team, supporting the preparation of all marketing programs, assisting in the development of scientific marketing and communication deliverables, and creating content for social media outlets, as well as managing international social communities.
\n\nResponsibilities:
\n\nEssential Skills:
\n\nDesired Skills:
\n\nWhat makes IntechOpen a great place to work?
\n\nIntechOpen is a global, dynamic and fast-growing company offering excellent opportunities to develop. We are a young and vibrant company where great people do great work. We offer a creative, dedicated, committed, passionate, and above all, fun environment where you can work, travel, meet world-renowned researchers and grow your career and experience.
\n\nTo apply, please email a copy of your CV and covering letter to hogan@intechopen.com stating your salary expectations.
\n\nNote: This full-time position will have an immediate start. In your cover letter, please indicate when you might be available for a block of two hours. As part of the interview process, all candidates that make it to the second phase will participate in a writing exercise.
\n\n*IntechOpen is an Equal Opportunities Employer consistent with its obligations under the law and does not discriminate against any employee or applicant on the basis of disability, gender, age, colour, national origin, race, religion, sexual orientation, war veteran status, or any classification protected by state, or local law.
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:null},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5319},{group:"region",caption:"Middle and South America",value:2,count:4830},{group:"region",caption:"Africa",value:3,count:1471},{group:"region",caption:"Asia",value:4,count:9372},{group:"region",caption:"Australia and Oceania",value:5,count:837},{group:"region",caption:"Europe",value:6,count:14789}],offset:12,limit:12,total:108348},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{},books:[{type:"book",id:"6842",title:"Aerosols",subtitle:null,isOpenForSubmission:!0,hash:"efe043290c576559ee15f293bc924f65",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6842.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6926",title:"Biological Anthropology",subtitle:null,isOpenForSubmission:!0,hash:"db6aa70aa47f94b3afa5b4951eba6d97",slug:null,bookSignature:"Dr. Alessio Vovlas",coverURL:"https://cdn.intechopen.com/books/images_new/6926.jpg",editedByType:null,editors:[{id:"313084",title:"Dr.",name:"Alessio",surname:"Vovlas",slug:"alessio-vovlas",fullName:"Alessio Vovlas"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6931",title:"Personality Disorders",subtitle:null,isOpenForSubmission:!0,hash:"cc530c17b87275c5e284fcac8047d40e",slug:null,bookSignature:"Dr. Catherine Athanasiadou-Lewis",coverURL:"https://cdn.intechopen.com/books/images_new/6931.jpg",editedByType:null,editors:[{id:"287692",title:"Dr.",name:"Catherine",surname:"Athanasiadou-Lewis",slug:"catherine-athanasiadou-lewis",fullName:"Catherine Athanasiadou-Lewis"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6934",title:"Sexual Ethics",subtitle:null,isOpenForSubmission:!0,hash:"44731b106aa0d1ab5c64a7394483c7d5",slug:null,bookSignature:"Dr. Dhastagir Sultan Sheriff",coverURL:"https://cdn.intechopen.com/books/images_new/6934.jpg",editedByType:null,editors:[{id:"167875",title:"Dr.",name:"Dhastagir Sultan",surname:"Sheriff",slug:"dhastagir-sultan-sheriff",fullName:"Dhastagir Sultan Sheriff"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6937",title:"Subcultures and Lifestyles",subtitle:null,isOpenForSubmission:!0,hash:"870d7f9f5ac0d8068a64507ef2fd0e3c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6937.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6940",title:"E-Services",subtitle:null,isOpenForSubmission:!0,hash:"0dd6e0f6c0a6d3be53af40ae99a1529d",slug:null,bookSignature:"Dr. Sam Goundar",coverURL:"https://cdn.intechopen.com/books/images_new/6940.jpg",editedByType:null,editors:[{id:"280395",title:"Dr.",name:"Sam",surname:"Goundar",slug:"sam-goundar",fullName:"Sam Goundar"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6947",title:"Contemporary Topics in Graduate Medical Education - Volume 2",subtitle:null,isOpenForSubmission:!0,hash:"4374f31d47ec1ddb7b1be0f15f1116eb",slug:null,bookSignature:"Dr. Stanislaw P. Stawicki, Michael S. S Firstenberg, Dr. James P. Orlando and Dr. Thomas John Papadimos",coverURL:"https://cdn.intechopen.com/books/images_new/6947.jpg",editedByType:null,editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6972",title:"Soybean for Human Consumption and Animal Feed",subtitle:null,isOpenForSubmission:!0,hash:"4bc6f95dc8630c9a8be84bb46286c445",slug:null,bookSignature:"Dr. Aleksandra Sudarić",coverURL:"https://cdn.intechopen.com/books/images_new/6972.jpg",editedByType:null,editors:[{id:"21485",title:"Dr.",name:"Aleksandra",surname:"Sudarić",slug:"aleksandra-sudaric",fullName:"Aleksandra Sudarić"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6997",title:"Amphibians",subtitle:null,isOpenForSubmission:!0,hash:"56a54f7a7f42b3e90257f5c8859a52ed",slug:null,bookSignature:"Associate Prof. Suman Pratihar",coverURL:"https://cdn.intechopen.com/books/images_new/6997.jpg",editedByType:null,editors:[{id:"223034",title:"Associate Prof.",name:"Suman",surname:"Pratihar",slug:"suman-pratihar",fullName:"Suman Pratihar"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7003",title:"Herbs and Spices",subtitle:null,isOpenForSubmission:!0,hash:"1f33df17010fa5e54988c44e32db2b40",slug:null,bookSignature:"Dr. Muhammad Akram",coverURL:"https://cdn.intechopen.com/books/images_new/7003.jpg",editedByType:null,editors:[{id:"275728",title:"Dr.",name:"Muhammad",surname:"Akram",slug:"muhammad-akram",fullName:"Muhammad Akram"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7016",title:"Cardiovascular Risk Factors in Pathology",subtitle:null,isOpenForSubmission:!0,hash:"7937d2c640c7515de372282c72ee5635",slug:null,bookSignature:"Ph.D. Alaeddin Abukabda",coverURL:"https://cdn.intechopen.com/books/images_new/7016.jpg",editedByType:null,editors:[{id:"307873",title:"Ph.D.",name:"Alaeddin",surname:"Abukabda",slug:"alaeddin-abukabda",fullName:"Alaeddin Abukabda"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7025",title:"Honey, Propolis and Royal Jelly",subtitle:null,isOpenForSubmission:!0,hash:"937380806bea25e744d4d3b2298b8479",slug:null,bookSignature:"Prof. Banu Yucel and Dr. Sibel Silici",coverURL:"https://cdn.intechopen.com/books/images_new/7025.jpg",editedByType:null,editors:[{id:"191429",title:"Prof.",name:"Banu",surname:"Yucel",slug:"banu-yucel",fullName:"Banu Yucel"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:36},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:36},{group:"topic",caption:"Business, Management and Economics",value:7,count:10},{group:"topic",caption:"Chemistry",value:8,count:30},{group:"topic",caption:"Computer and Information Science",value:9,count:26},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:15},{group:"topic",caption:"Engineering",value:11,count:71},{group:"topic",caption:"Environmental Sciences",value:12,count:13},{group:"topic",caption:"Immunology and Microbiology",value:13,count:4},{group:"topic",caption:"Materials Science",value:14,count:38},{group:"topic",caption:"Mathematics",value:15,count:14},{group:"topic",caption:"Medicine",value:16,count:137},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:6},{group:"topic",caption:"Neuroscience",value:18,count:7},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:8},{group:"topic",caption:"Physics",value:20,count:20},{group:"topic",caption:"Psychology",value:21,count:2},{group:"topic",caption:"Robotics",value:22,count:6},{group:"topic",caption:"Social Sciences",value:23,count:14},{group:"topic",caption:"Technology",value:24,count:9},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:4},{group:"topic",caption:"Insectology",value:39,count:1},{group:"topic",caption:"Genesiology",value:300,count:1},{group:"topic",caption:"Machine Learning and Data Mining",value:521,count:1},{group:"topic",caption:"Intelligent System",value:535,count:1}],offset:12,limit:12,total:987},popularBooks:{featuredBooks:[{type:"book",id:"7640",title:"Perspective of Carbon Nanotubes",subtitle:null,isOpenForSubmission:!1,hash:"8b85a9957fad5206369eadf0c1ffa27d",slug:"perspective-of-carbon-nanotubes",bookSignature:"Hosam El-Din Saleh and Said Moawad Mohamed El-Sheikh",coverURL:"https://cdn.intechopen.com/books/images_new/7640.jpg",editors:[{id:"144691",title:"Prof.",name:"Hosam El-Din",middleName:"M.",surname:"Saleh",slug:"hosam-el-din-saleh",fullName:"Hosam El-Din Saleh"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7583",title:"Advanced Computational Fluid Dynamics for Emerging Engineering Processes",subtitle:"Eulerian vs. Lagrangian",isOpenForSubmission:!1,hash:"896509fa2e7e659811bffd0f9779ca9d",slug:"advanced-computational-fluid-dynamics-for-emerging-engineering-processes-eulerian-vs-lagrangian",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/7583.jpg",editors:[{id:"21045",title:"Prof.",name:"Albert S.",middleName:null,surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7839",title:"Malaria",subtitle:null,isOpenForSubmission:!1,hash:"91cde4582ead884cb0f355a19b67cd56",slug:"malaria",bookSignature:"Fyson H. Kasenga",coverURL:"https://cdn.intechopen.com/books/images_new/7839.jpg",editors:[{id:"86725",title:"Dr.",name:"Fyson",middleName:"Hanania",surname:"Kasenga",slug:"fyson-kasenga",fullName:"Fyson Kasenga"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7698",title:"Educational Psychology",subtitle:"Between Certitudes and Uncertainties",isOpenForSubmission:!1,hash:"740943e2d029253e777150e98ebe2f0d",slug:"educational-psychology-between-certitudes-and-uncertainties",bookSignature:"Victori?a Trif",coverURL:"https://cdn.intechopen.com/books/images_new/7698.jpg",editors:[{id:"201656",title:"Ph.D.",name:"Victorița",middleName:null,surname:"Trif",slug:"victorita-trif",fullName:"Victorița Trif"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7000",title:"Legume Crops",subtitle:"Characterization and Breeding for Improved Food Security",isOpenForSubmission:!1,hash:"4d0f73bf883bbb984cc2feef1259a9a7",slug:"legume-crops-characterization-and-breeding-for-improved-food-security",bookSignature:"Mohamed Ahmed El-Esawi",coverURL:"https://cdn.intechopen.com/books/images_new/7000.jpg",editors:[{id:"191770",title:"Dr.",name:"Mohamed A.",middleName:null,surname:"El-Esawi",slug:"mohamed-a.-el-esawi",fullName:"Mohamed A. El-Esawi"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7093",title:"Pneumothorax",subtitle:null,isOpenForSubmission:!1,hash:"0b1fdb8bb0448f48c2f234753898f3f8",slug:"pneumothorax",bookSignature:"Khalid Amer",coverURL:"https://cdn.intechopen.com/books/images_new/7093.jpg",editors:[{id:"63412",title:"Dr.",name:"Khalid",middleName:null,surname:"Amer",slug:"khalid-amer",fullName:"Khalid Amer"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7612",title:"Electrospinning and Electrospraying",subtitle:"Techniques and Applications",isOpenForSubmission:!1,hash:"77e9708250507395a4bea2c17d012982",slug:"electrospinning-and-electrospraying-techniques-and-applications",bookSignature:"Sajjad Haider and Adnan Haider",coverURL:"https://cdn.intechopen.com/books/images_new/7612.jpg",editors:[{id:"110708",title:"Dr.",name:"Sajjad",middleName:null,surname:"Haider",slug:"sajjad-haider",fullName:"Sajjad Haider"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8323",title:"Traditional and Complementary Medicine",subtitle:null,isOpenForSubmission:!1,hash:"60eadb1783d9bba245687adf284d4871",slug:"traditional-and-complementary-medicine",bookSignature:"Cengiz Mordeniz",coverURL:"https://cdn.intechopen.com/books/images_new/8323.jpg",editors:[{id:"214664",title:"Associate Prof.",name:"Cengiz",middleName:null,surname:"Mordeniz",slug:"cengiz-mordeniz",fullName:"Cengiz Mordeniz"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7646",title:"Scientometrics Recent Advances",subtitle:null,isOpenForSubmission:!1,hash:"86bbdd04d7e80be14283d44969d1cc32",slug:"scientometrics-recent-advances",bookSignature:"Suad Kunosic and Enver Zerem",coverURL:"https://cdn.intechopen.com/books/images_new/7646.jpg",editors:[{id:"88678",title:"Prof.",name:"Suad",middleName:null,surname:"Kunosic",slug:"suad-kunosic",fullName:"Suad Kunosic"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8516",title:"Metacognition in Learning",subtitle:null,isOpenForSubmission:!1,hash:"5fa6eaad7b509b8b7ec5124d79e5f605",slug:"metacognition-in-learning",bookSignature:"Nosisi Feza",coverURL:"https://cdn.intechopen.com/books/images_new/8516.jpg",editors:[{id:"261665",title:"Prof.",name:"Nosisi",middleName:"N.",surname:"Feza",slug:"nosisi-feza",fullName:"Nosisi Feza"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7404",title:"Hysteresis of Composites",subtitle:null,isOpenForSubmission:!1,hash:"8540fa2378dbb92e50411cfebfb853a6",slug:"hysteresis-of-composites",bookSignature:"Li Longbiao",coverURL:"https://cdn.intechopen.com/books/images_new/7404.jpg",editors:[{id:"260011",title:"Dr.",name:"Li",middleName:null,surname:"Longbiao",slug:"li-longbiao",fullName:"Li Longbiao"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7878",title:"Advances in Extracorporeal Membrane Oxygenation",subtitle:"Volume 3",isOpenForSubmission:!1,hash:"f95bf990273d08098a00f9a1c2403cbe",slug:"advances-in-extracorporeal-membrane-oxygenation-volume-3",bookSignature:"Michael S. Firstenberg",coverURL:"https://cdn.intechopen.com/books/images_new/7878.jpg",editors:[{id:"64343",title:null,name:"Michael S.",middleName:"S",surname:"Firstenberg",slug:"michael-s.-firstenberg",fullName:"Michael S. Firstenberg"}],productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4404},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"7640",title:"Perspective of Carbon Nanotubes",subtitle:null,isOpenForSubmission:!1,hash:"8b85a9957fad5206369eadf0c1ffa27d",slug:"perspective-of-carbon-nanotubes",bookSignature:"Hosam El-Din Saleh and Said Moawad Mohamed El-Sheikh",coverURL:"https://cdn.intechopen.com/books/images_new/7640.jpg",editors:[{id:"144691",title:"Prof.",name:"Hosam El-Din",middleName:"M.",surname:"Saleh",slug:"hosam-el-din-saleh",fullName:"Hosam El-Din Saleh"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7583",title:"Advanced Computational Fluid Dynamics for Emerging Engineering Processes",subtitle:"Eulerian vs. Lagrangian",isOpenForSubmission:!1,hash:"896509fa2e7e659811bffd0f9779ca9d",slug:"advanced-computational-fluid-dynamics-for-emerging-engineering-processes-eulerian-vs-lagrangian",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/7583.jpg",editors:[{id:"21045",title:"Prof.",name:"Albert S.",middleName:null,surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7839",title:"Malaria",subtitle:null,isOpenForSubmission:!1,hash:"91cde4582ead884cb0f355a19b67cd56",slug:"malaria",bookSignature:"Fyson H. Kasenga",coverURL:"https://cdn.intechopen.com/books/images_new/7839.jpg",editors:[{id:"86725",title:"Dr.",name:"Fyson",middleName:"Hanania",surname:"Kasenga",slug:"fyson-kasenga",fullName:"Fyson Kasenga"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7698",title:"Educational Psychology",subtitle:"Between Certitudes and Uncertainties",isOpenForSubmission:!1,hash:"740943e2d029253e777150e98ebe2f0d",slug:"educational-psychology-between-certitudes-and-uncertainties",bookSignature:"Victori?a Trif",coverURL:"https://cdn.intechopen.com/books/images_new/7698.jpg",editors:[{id:"201656",title:"Ph.D.",name:"Victorița",middleName:null,surname:"Trif",slug:"victorita-trif",fullName:"Victorița Trif"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7000",title:"Legume Crops",subtitle:"Characterization and Breeding for Improved Food Security",isOpenForSubmission:!1,hash:"4d0f73bf883bbb984cc2feef1259a9a7",slug:"legume-crops-characterization-and-breeding-for-improved-food-security",bookSignature:"Mohamed Ahmed El-Esawi",coverURL:"https://cdn.intechopen.com/books/images_new/7000.jpg",editors:[{id:"191770",title:"Dr.",name:"Mohamed A.",middleName:null,surname:"El-Esawi",slug:"mohamed-a.-el-esawi",fullName:"Mohamed A. El-Esawi"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7093",title:"Pneumothorax",subtitle:null,isOpenForSubmission:!1,hash:"0b1fdb8bb0448f48c2f234753898f3f8",slug:"pneumothorax",bookSignature:"Khalid Amer",coverURL:"https://cdn.intechopen.com/books/images_new/7093.jpg",editors:[{id:"63412",title:"Dr.",name:"Khalid",middleName:null,surname:"Amer",slug:"khalid-amer",fullName:"Khalid Amer"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7612",title:"Electrospinning and Electrospraying",subtitle:"Techniques and Applications",isOpenForSubmission:!1,hash:"77e9708250507395a4bea2c17d012982",slug:"electrospinning-and-electrospraying-techniques-and-applications",bookSignature:"Sajjad Haider and Adnan Haider",coverURL:"https://cdn.intechopen.com/books/images_new/7612.jpg",editors:[{id:"110708",title:"Dr.",name:"Sajjad",middleName:null,surname:"Haider",slug:"sajjad-haider",fullName:"Sajjad Haider"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8323",title:"Traditional and Complementary Medicine",subtitle:null,isOpenForSubmission:!1,hash:"60eadb1783d9bba245687adf284d4871",slug:"traditional-and-complementary-medicine",bookSignature:"Cengiz Mordeniz",coverURL:"https://cdn.intechopen.com/books/images_new/8323.jpg",editors:[{id:"214664",title:"Associate Prof.",name:"Cengiz",middleName:null,surname:"Mordeniz",slug:"cengiz-mordeniz",fullName:"Cengiz Mordeniz"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7646",title:"Scientometrics Recent Advances",subtitle:null,isOpenForSubmission:!1,hash:"86bbdd04d7e80be14283d44969d1cc32",slug:"scientometrics-recent-advances",bookSignature:"Suad Kunosic and Enver Zerem",coverURL:"https://cdn.intechopen.com/books/images_new/7646.jpg",editors:[{id:"88678",title:"Prof.",name:"Suad",middleName:null,surname:"Kunosic",slug:"suad-kunosic",fullName:"Suad Kunosic"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8516",title:"Metacognition in Learning",subtitle:null,isOpenForSubmission:!1,hash:"5fa6eaad7b509b8b7ec5124d79e5f605",slug:"metacognition-in-learning",bookSignature:"Nosisi Feza",coverURL:"https://cdn.intechopen.com/books/images_new/8516.jpg",editors:[{id:"261665",title:"Prof.",name:"Nosisi",middleName:"N.",surname:"Feza",slug:"nosisi-feza",fullName:"Nosisi Feza"}],productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"7698",title:"Educational Psychology",subtitle:"Between Certitudes and Uncertainties",isOpenForSubmission:!1,hash:"740943e2d029253e777150e98ebe2f0d",slug:"educational-psychology-between-certitudes-and-uncertainties",bookSignature:"Victori?a Trif",coverURL:"https://cdn.intechopen.com/books/images_new/7698.jpg",editedByType:"Edited by",editors:[{id:"201656",title:"Ph.D.",name:"Victorița",middleName:null,surname:"Trif",slug:"victorita-trif",fullName:"Victorița Trif"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8747",title:"Asphalt and Asphalt Mixtures",subtitle:null,isOpenForSubmission:!1,hash:"6083f7c9881029f1e033a1e512af7e20",slug:"asphalt-and-asphalt-mixtures",bookSignature:"Haitao Zhang",coverURL:"https://cdn.intechopen.com/books/images_new/8747.jpg",editedByType:"Edited by",editors:[{id:"260604",title:"Prof.",name:"Haitao",middleName:null,surname:"Zhang",slug:"haitao-zhang",fullName:"Haitao Zhang"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8516",title:"Metacognition in Learning",subtitle:null,isOpenForSubmission:!1,hash:"5fa6eaad7b509b8b7ec5124d79e5f605",slug:"metacognition-in-learning",bookSignature:"Nosisi Feza",coverURL:"https://cdn.intechopen.com/books/images_new/8516.jpg",editedByType:"Edited by",editors:[{id:"261665",title:"Prof.",name:"Nosisi",middleName:"N.",surname:"Feza",slug:"nosisi-feza",fullName:"Nosisi Feza"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7000",title:"Legume Crops",subtitle:"Characterization and Breeding for Improved Food Security",isOpenForSubmission:!1,hash:"4d0f73bf883bbb984cc2feef1259a9a7",slug:"legume-crops-characterization-and-breeding-for-improved-food-security",bookSignature:"Mohamed Ahmed El-Esawi",coverURL:"https://cdn.intechopen.com/books/images_new/7000.jpg",editedByType:"Edited by",editors:[{id:"191770",title:"Dr.",name:"Mohamed A.",middleName:null,surname:"El-Esawi",slug:"mohamed-a.-el-esawi",fullName:"Mohamed A. El-Esawi"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8292",title:"Oral Health by Using Probiotic Products",subtitle:null,isOpenForSubmission:!1,hash:"327e750e83634800ace02fe62607c21e",slug:"oral-health-by-using-probiotic-products",bookSignature:"Razzagh Mahmoudi",coverURL:"https://cdn.intechopen.com/books/images_new/8292.jpg",editedByType:"Edited by",editors:[{id:"245925",title:"Dr.",name:"Razzagh",middleName:null,surname:"Mahmoudi",slug:"razzagh-mahmoudi",fullName:"Razzagh Mahmoudi"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8323",title:"Traditional and Complementary Medicine",subtitle:null,isOpenForSubmission:!1,hash:"60eadb1783d9bba245687adf284d4871",slug:"traditional-and-complementary-medicine",bookSignature:"Cengiz Mordeniz",coverURL:"https://cdn.intechopen.com/books/images_new/8323.jpg",editedByType:"Edited by",editors:[{id:"214664",title:"Associate Prof.",name:"Cengiz",middleName:null,surname:"Mordeniz",slug:"cengiz-mordeniz",fullName:"Cengiz Mordeniz"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8347",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",subtitle:null,isOpenForSubmission:!1,hash:"3d7024a8d7d8afed093c9c79ec31f15a",slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",bookSignature:"Lulu Wang and Liandong Yu",coverURL:"https://cdn.intechopen.com/books/images_new/8347.jpg",editedByType:"Edited by",editors:[{id:"257388",title:"Dr.",name:"Lulu",middleName:null,surname:"Wang",slug:"lulu-wang",fullName:"Lulu Wang"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7583",title:"Advanced Computational Fluid Dynamics for Emerging Engineering Processes",subtitle:"Eulerian vs. Lagrangian",isOpenForSubmission:!1,hash:"896509fa2e7e659811bffd0f9779ca9d",slug:"advanced-computational-fluid-dynamics-for-emerging-engineering-processes-eulerian-vs-lagrangian",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/7583.jpg",editedByType:"Edited by",editors:[{id:"21045",title:"Prof.",name:"Albert S.",middleName:null,surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7839",title:"Malaria",subtitle:null,isOpenForSubmission:!1,hash:"91cde4582ead884cb0f355a19b67cd56",slug:"malaria",bookSignature:"Fyson H. Kasenga",coverURL:"https://cdn.intechopen.com/books/images_new/7839.jpg",editedByType:"Edited by",editors:[{id:"86725",title:"Dr.",name:"Fyson",middleName:"Hanania",surname:"Kasenga",slug:"fyson-kasenga",fullName:"Fyson Kasenga"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7093",title:"Pneumothorax",subtitle:null,isOpenForSubmission:!1,hash:"0b1fdb8bb0448f48c2f234753898f3f8",slug:"pneumothorax",bookSignature:"Khalid Amer",coverURL:"https://cdn.intechopen.com/books/images_new/7093.jpg",editedByType:"Edited by",editors:[{id:"63412",title:"Dr.",name:"Khalid",middleName:null,surname:"Amer",slug:"khalid-amer",fullName:"Khalid Amer"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"277",title:"Social Policy",slug:"social-policy",parent:{title:"Social Sciences",slug:"social-sciences"},numberOfBooks:3,numberOfAuthorsAndEditors:35,numberOfWosCitations:0,numberOfCrossrefCitations:1,numberOfDimensionsCitations:1,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"social-policy",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"6682",title:"The Relevance of Hygiene to Health in Developing Countries",subtitle:null,isOpenForSubmission:!1,hash:"c6bce9af9756cd41e5d336fa8945b2ea",slug:"the-relevance-of-hygiene-to-health-in-developing-countries",bookSignature:"Natasha Potgieter and Afsatou Ndama Traore Hoffman",coverURL:"https://cdn.intechopen.com/books/images_new/6682.jpg",editedByType:"Edited by",editors:[{id:"55305",title:"Prof.",name:"Natasha",middleName:null,surname:"Potgieter",slug:"natasha-potgieter",fullName:"Natasha Potgieter"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6938",title:"Elections",subtitle:"A Global Perspective",isOpenForSubmission:!1,hash:"4a122ebf3b961d2c46bbfc8def2916fe",slug:"elections-a-global-perspective",bookSignature:"Ryan M. Yonk",coverURL:"https://cdn.intechopen.com/books/images_new/6938.jpg",editedByType:"Edited by",editors:[{id:"196259",title:"Dr.",name:"Ryan Merlin",middleName:null,surname:"Yonk",slug:"ryan-merlin-yonk",fullName:"Ryan Merlin Yonk"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5392",title:"An Analysis of Contemporary Social Welfare Issues",subtitle:null,isOpenForSubmission:!1,hash:"4a9795772c4001a5a648421ebf11cee7",slug:"an-analysis-of-contemporary-social-welfare-issues",bookSignature:"Rosario Laratta",coverURL:"https://cdn.intechopen.com/books/images_new/5392.jpg",editedByType:"Edited by",editors:[{id:"118227",title:"Dr.",name:"Rosario",middleName:null,surname:"Laratta",slug:"rosario-laratta",fullName:"Rosario Laratta"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:3,mostCitedChapters:[{id:"63322",doi:"10.5772/intechopen.80355",title:"Challenges to Hygiene Improvement in Developing Countries",slug:"challenges-to-hygiene-improvement-in-developing-countries",totalDownloads:786,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:"the-relevance-of-hygiene-to-health-in-developing-countries",title:"The Relevance of Hygiene to Health in Developing Countries",fullTitle:"The Relevance of Hygiene to Health in Developing Countries"},signatures:"Save Kumwenda",authors:[{id:"233913",title:"Mr.",name:"Save",middleName:null,surname:"Kumwenda",slug:"save-kumwenda",fullName:"Save Kumwenda"}]},{id:"63851",doi:"10.5772/intechopen.81387",title:"Electoral Behavior and Politics of Stomach Infrastructure in Ekiti State (Nigeria)",slug:"electoral-behavior-and-politics-of-stomach-infrastructure-in-ekiti-state-nigeria-",totalDownloads:275,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"elections-a-global-perspective",title:"Elections",fullTitle:"Elections - A Global Perspective"},signatures:"Mike Omilusi",authors:[{id:"256067",title:"Dr.",name:"Mike",middleName:null,surname:"Omilusi",slug:"mike-omilusi",fullName:"Mike Omilusi"}]},{id:"52475",doi:"10.5772/65462",title:"Teenage Pregnancies: A Worldwide Social and Medical Problem",slug:"teenage-pregnancies-a-worldwide-social-and-medical-problem",totalDownloads:3464,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"an-analysis-of-contemporary-social-welfare-issues",title:"An Analysis of Contemporary Social Welfare Issues",fullTitle:"An Analysis of Contemporary Social Welfare Issues"},signatures:"Sylvia Kirchengast",authors:[{id:"188289",title:"Prof.",name:"Sylvia",middleName:null,surname:"Kirchengast",slug:"sylvia-kirchengast",fullName:"Sylvia Kirchengast"}]}],mostDownloadedChaptersLast30Days:[{id:"52475",title:"Teenage Pregnancies: A Worldwide Social and Medical Problem",slug:"teenage-pregnancies-a-worldwide-social-and-medical-problem",totalDownloads:3464,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"an-analysis-of-contemporary-social-welfare-issues",title:"An Analysis of Contemporary Social Welfare Issues",fullTitle:"An Analysis of Contemporary Social Welfare Issues"},signatures:"Sylvia Kirchengast",authors:[{id:"188289",title:"Prof.",name:"Sylvia",middleName:null,surname:"Kirchengast",slug:"sylvia-kirchengast",fullName:"Sylvia Kirchengast"}]},{id:"63707",title:"Drinking Water Treatment and Challenges in Developing Countries",slug:"drinking-water-treatment-and-challenges-in-developing-countries",totalDownloads:879,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"the-relevance-of-hygiene-to-health-in-developing-countries",title:"The Relevance of Hygiene to Health in Developing Countries",fullTitle:"The Relevance of Hygiene to Health in Developing Countries"},signatures:"Josephine Treacy",authors:[{id:"238173",title:"Dr.",name:"Josephine",middleName:null,surname:"Treacy",slug:"josephine-treacy",fullName:"Josephine Treacy"}]},{id:"63322",title:"Challenges to Hygiene Improvement in Developing Countries",slug:"challenges-to-hygiene-improvement-in-developing-countries",totalDownloads:786,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:"the-relevance-of-hygiene-to-health-in-developing-countries",title:"The Relevance of Hygiene to Health in Developing Countries",fullTitle:"The Relevance of Hygiene to Health in Developing Countries"},signatures:"Save Kumwenda",authors:[{id:"233913",title:"Mr.",name:"Save",middleName:null,surname:"Kumwenda",slug:"save-kumwenda",fullName:"Save Kumwenda"}]},{id:"63783",title:"Estimating the Effect of Voters’ Media Awareness on the 2016 US Presidential Election",slug:"estimating-the-effect-of-voters-media-awareness-on-the-2016-us-presidential-election",totalDownloads:1684,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"elections-a-global-perspective",title:"Elections",fullTitle:"Elections - A Global Perspective"},signatures:"Lauren Dique and Maria Gallego",authors:[{id:"258400",title:"Prof.",name:"Maria",middleName:null,surname:"Gallego",slug:"maria-gallego",fullName:"Maria Gallego"},{id:"262143",title:"Ms.",name:"Lauren",middleName:null,surname:"Dique",slug:"lauren-dique",fullName:"Lauren Dique"}]},{id:"61814",title:"Inequalities in Households’ Environmental Sanitation Practices in a Developing Nation’s City: The Example of Ile-Ife, Nigeria",slug:"inequalities-in-households-environmental-sanitation-practices-in-a-developing-nation-s-city-the-exam",totalDownloads:179,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"the-relevance-of-hygiene-to-health-in-developing-countries",title:"The Relevance of Hygiene to Health in Developing Countries",fullTitle:"The Relevance of Hygiene to Health in Developing Countries"},signatures:"Faniran Gbemiga and Ojo Deborah",authors:[{id:"232193",title:"Dr.",name:"Gbemiga",middleName:null,surname:"Faniran",slug:"gbemiga-faniran",fullName:"Gbemiga Faniran"},{id:"233650",title:"Mrs.",name:"Deborah",middleName:null,surname:"Ojo",slug:"deborah-ojo",fullName:"Deborah Ojo"}]},{id:"63563",title:"Electoral Legitimacy, Preventive Representation, and Regularization of Authoritarian Democracy in Bangladesh",slug:"electoral-legitimacy-preventive-representation-and-regularization-of-authoritarian-democracy-in-bang",totalDownloads:245,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"elections-a-global-perspective",title:"Elections",fullTitle:"Elections - A Global Perspective"},signatures:"Moniruzzaman M.",authors:[{id:"256037",title:"Associate Prof.",name:"Moniruzzaman",middleName:null,surname:"M.",slug:"moniruzzaman-m.",fullName:"Moniruzzaman M."}]},{id:"64192",title:"Who Does Not Vote and Why? Implication for New Democracies",slug:"who-does-not-vote-and-why-implication-for-new-democracies",totalDownloads:246,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"elections-a-global-perspective",title:"Elections",fullTitle:"Elections - A Global Perspective"},signatures:"Elvis Bisong Tambe",authors:[{id:"255692",title:"Dr.",name:"Elvis Bisong",middleName:null,surname:"Tambe",slug:"elvis-bisong-tambe",fullName:"Elvis Bisong Tambe"}]},{id:"63191",title:"Household Water Handling Practices in the Arid and Semi-Arid Lands in Kenya",slug:"household-water-handling-practices-in-the-arid-and-semi-arid-lands-in-kenya",totalDownloads:176,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"the-relevance-of-hygiene-to-health-in-developing-countries",title:"The Relevance of Hygiene to Health in Developing Countries",fullTitle:"The Relevance of Hygiene to Health in Developing Countries"},signatures:"Edith J. Kurui, George M. Ogendi, Wilkister N. Moturi\nand Dishon O. Nyawanga",authors:[{id:"78236",title:"Dr.",name:"Wilkister",middleName:null,surname:"Moturi",slug:"wilkister-moturi",fullName:"Wilkister Moturi"},{id:"234029",title:"M.Sc.",name:"Edith",middleName:null,surname:"Kurui",slug:"edith-kurui",fullName:"Edith Kurui"},{id:"247927",title:"Dr.",name:"George",middleName:null,surname:"Ogendi",slug:"george-ogendi",fullName:"George Ogendi"},{id:"247930",title:"Mr.",name:"Dishon",middleName:null,surname:"Nyawanga",slug:"dishon-nyawanga",fullName:"Dishon Nyawanga"}]},{id:"63851",title:"Electoral Behavior and Politics of Stomach Infrastructure in Ekiti State (Nigeria)",slug:"electoral-behavior-and-politics-of-stomach-infrastructure-in-ekiti-state-nigeria-",totalDownloads:275,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"elections-a-global-perspective",title:"Elections",fullTitle:"Elections - A Global Perspective"},signatures:"Mike Omilusi",authors:[{id:"256067",title:"Dr.",name:"Mike",middleName:null,surname:"Omilusi",slug:"mike-omilusi",fullName:"Mike Omilusi"}]},{id:"52455",title:"Introductory Chapter: An Overview of the Book",slug:"introductory-chapter-an-overview-of-the-book",totalDownloads:781,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"an-analysis-of-contemporary-social-welfare-issues",title:"An Analysis of Contemporary Social Welfare Issues",fullTitle:"An Analysis of Contemporary Social Welfare Issues"},signatures:"Rosario Laratta",authors:[{id:"118227",title:"Dr.",name:"Rosario",middleName:null,surname:"Laratta",slug:"rosario-laratta",fullName:"Rosario Laratta"}]}],onlineFirstChaptersFilter:{topicSlug:"social-policy",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10080",title:"Vortex Dynamics",subtitle:null,isOpenForSubmission:!0,hash:"ea97962e99b3e0ebc9b46b48ba5bea14",slug:null,bookSignature:"Dr. Zambri Harun",coverURL:"https://cdn.intechopen.com/books/images_new/10080.jpg",editedByType:null,editors:[{id:"243152",title:"Dr.",name:"Zambri",middleName:null,surname:"Harun",slug:"zambri-harun",fullName:"Zambri Harun"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8903",title:"Carbon Based Material for Environmental Protection and Remediation",subtitle:null,isOpenForSubmission:!0,hash:"19da699b370f320eca63ef2ba02f745d",slug:null,bookSignature:"Dr. Mattia Bartoli and Dr. Marco Frediani",coverURL:"https://cdn.intechopen.com/books/images_new/8903.jpg",editedByType:null,editors:[{id:"188999",title:"Dr.",name:"Mattia",middleName:null,surname:"Bartoli",slug:"mattia-bartoli",fullName:"Mattia Bartoli"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8771",title:"Raman Scattering",subtitle:null,isOpenForSubmission:!0,hash:"1354b3097eaa5b27d9d4bd29d3150b27",slug:null,bookSignature:"Dr. Samir Kumar and Dr. Prabhat Kumar",coverURL:"https://cdn.intechopen.com/books/images_new/8771.jpg",editedByType:null,editors:[{id:"296661",title:"Dr.",name:"Samir",middleName:null,surname:"Kumar",slug:"samir-kumar",fullName:"Samir Kumar"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10073",title:"Recent Advances in Nanophotonics-Fundamentals and Applications",subtitle:null,isOpenForSubmission:!0,hash:"aceca7dfc807140870a89d42c5537d7c",slug:null,bookSignature:"Dr. Mojtaba Kahrizi and Ms. Parsoua Abedini Sohi",coverURL:"https://cdn.intechopen.com/books/images_new/10073.jpg",editedByType:null,editors:[{id:"113045",title:"Dr.",name:"Mojtaba",middleName:null,surname:"Kahrizi",slug:"mojtaba-kahrizi",fullName:"Mojtaba Kahrizi"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10132",title:"Applied Computational Near-surface Geophysics - From Integral and Derivative Formulas to MATLAB Codes",subtitle:null,isOpenForSubmission:!0,hash:"38cdbbb671df620b36ee96af1d9a3a90",slug:null,bookSignature:"Dr. Afshin Aghayan",coverURL:"https://cdn.intechopen.com/books/images_new/10132.jpg",editedByType:null,editors:[{id:"311030",title:"Dr.",name:"Afshin",middleName:null,surname:"Aghayan",slug:"afshin-aghayan",fullName:"Afshin Aghayan"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10110",title:"Advances and Technologies in Building Construction and Structural Analysis",subtitle:null,isOpenForSubmission:!0,hash:"df2ad14bc5588577e8bf0b7ebcdafd9d",slug:null,bookSignature:"Dr. Ali Kaboli and Dr. Sara Shirowzhan",coverURL:"https://cdn.intechopen.com/books/images_new/10110.jpg",editedByType:null,editors:[{id:"309192",title:"Dr.",name:"Ali",middleName:null,surname:"Kaboli",slug:"ali-kaboli",fullName:"Ali Kaboli"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10175",title:"Ethics in Emerging Technologies",subtitle:null,isOpenForSubmission:!0,hash:"9c92da249676e35e2f7476182aa94e84",slug:null,bookSignature:"Prof. Ali Hessami",coverURL:"https://cdn.intechopen.com/books/images_new/10175.jpg",editedByType:null,editors:[{id:"108303",title:"Prof.",name:"Ali",middleName:null,surname:"Hessami",slug:"ali-hessami",fullName:"Ali Hessami"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9284",title:"Computational Aeroacoustics",subtitle:null,isOpenForSubmission:!0,hash:"7019c5e5985faef7dc384c87dca5c8ef",slug:null,bookSignature:"Prof. Ramesh K. Agarwal",coverURL:"https://cdn.intechopen.com/books/images_new/9284.jpg",editedByType:null,editors:[{id:"38519",title:"Prof.",name:"Ramesh K.",middleName:null,surname:"Agarwal",slug:"ramesh-k.-agarwal",fullName:"Ramesh K. Agarwal"}],productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:16},humansInSpaceProgram:{},teamHumansInSpaceProgram:{},route:{name:"chapter.detail",path:"/books/nonmagnetic-and-magnetic-quantum-dots/a-quantum-trajectory-interpretation-of-magnetic-resistance-in-quantum-dots",hash:"",query:{},params:{book:"nonmagnetic-and-magnetic-quantum-dots",chapter:"a-quantum-trajectory-interpretation-of-magnetic-resistance-in-quantum-dots"},fullPath:"/books/nonmagnetic-and-magnetic-quantum-dots/a-quantum-trajectory-interpretation-of-magnetic-resistance-in-quantum-dots",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var m;(m=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(m)}()