The results of proximate and ultimate analyses of oleaster stones (a. on dry basis, %, b. on dry and ash free basis, %)
\\n\\n
These books synthesize perspectives of renowned scientists from the world’s most prestigious institutions - from Fukushima Renewable Energy Institute in Japan to Stanford University in the United States, including Columbia University (US), University of Sidney (AU), University of Miami (USA), Cardiff University (UK), and many others.
\\n\\nThis collaboration embodied the true essence of Open Access by simplifying the approach to OA publishing for Academic editors and authors who contributed their research and allowed the new research to be made available free and open to anyone anywhere in the world.
\\n\\nTo celebrate the 50 books published, we have gathered them at one location - just one click away, so that you can easily browse the subjects of your interest, download the content directly, share it or read online.
\\n\\n\\n\\n\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'
IntechOpen and Knowledge Unlatched formed a partnership to support researchers working in engineering sciences by enabling an easier approach to publishing Open Access content. Using the Knowledge Unlatched crowdfunding model to raise the publishing costs through libraries around the world, Open Access Publishing Fee (OAPF) was not required from the authors.
\n\nInitially, the partnership supported engineering research, but it soon grew to include physical and life sciences, attracting more researchers to the advantages of Open Access publishing.
\n\n\n\nThese books synthesize perspectives of renowned scientists from the world’s most prestigious institutions - from Fukushima Renewable Energy Institute in Japan to Stanford University in the United States, including Columbia University (US), University of Sidney (AU), University of Miami (USA), Cardiff University (UK), and many others.
\n\nThis collaboration embodied the true essence of Open Access by simplifying the approach to OA publishing for Academic editors and authors who contributed their research and allowed the new research to be made available free and open to anyone anywhere in the world.
\n\nTo celebrate the 50 books published, we have gathered them at one location - just one click away, so that you can easily browse the subjects of your interest, download the content directly, share it or read online.
\n\n\n\n\n'}],latestNews:[{slug:"webinar-introduction-to-open-science-wednesday-18-may-1-pm-cest-20220518",title:"Webinar: Introduction to Open Science | Wednesday 18 May, 1 PM CEST"},{slug:"step-in-the-right-direction-intechopen-launches-a-portfolio-of-open-science-journals-20220414",title:"Step in the Right Direction: IntechOpen Launches a Portfolio of Open Science Journals"},{slug:"let-s-meet-at-london-book-fair-5-7-april-2022-olympia-london-20220321",title:"Let’s meet at London Book Fair, 5-7 April 2022, Olympia London"},{slug:"50-books-published-as-part-of-intechopen-and-knowledge-unlatched-ku-collaboration-20220316",title:"50 Books published as part of IntechOpen and Knowledge Unlatched (KU) Collaboration"},{slug:"intechopen-joins-the-united-nations-sustainable-development-goals-publishers-compact-20221702",title:"IntechOpen joins the United Nations Sustainable Development Goals Publishers Compact"},{slug:"intechopen-signs-exclusive-representation-agreement-with-lsr-libros-servicios-y-representaciones-s-a-de-c-v-20211123",title:"IntechOpen Signs Exclusive Representation Agreement with LSR Libros Servicios y Representaciones S.A. de C.V"},{slug:"intechopen-expands-partnership-with-research4life-20211110",title:"IntechOpen Expands Partnership with Research4Life"},{slug:"introducing-intechopen-book-series-a-new-publishing-format-for-oa-books-20210915",title:"Introducing IntechOpen Book Series - A New Publishing Format for OA Books"}]},book:{item:{type:"book",id:"5418",leadTitle:null,fullTitle:"Bioethics - Medical, Ethical and Legal Perspectives",title:"Bioethics",subtitle:"Medical, Ethical and Legal Perspectives",reviewType:"peer-reviewed",abstract:"The main strength of this book is that it examines the challenges facing the field of Bioethics today from medical, ethical and legal perspectives. A critical exchange of ideas from professionals in interdisciplinary fields allows everyone to learn and benefit from the insights gained through others' experiences. Examining, analyzing and understanding these complex medical-ethical-legal issues and cases and how they are resolved will serve as a paradigm for all professionals who will be confronted with these complex bioethical issues now and in the future. The more we face these challenges directly, examine them critically and debate them enthusiastically the more knowledge will be gained and hopefully, we will gain more practical wisdom.",isbn:"978-953-51-2848-9",printIsbn:"978-953-51-2847-2",pdfIsbn:"978-953-51-4126-6",doi:"10.5772/62798",price:119,priceEur:129,priceUsd:155,slug:"bioethics-medical-ethical-and-legal-perspectives",numberOfPages:238,isOpenForSubmission:!1,isInWos:1,isInBkci:!0,hash:"767abdeb559d66387ad2a75b5d26e078",bookSignature:"Peter A. Clark",publishedDate:"December 29th 2016",coverURL:"https://cdn.intechopen.com/books/images_new/5418.jpg",numberOfDownloads:25942,numberOfWosCitations:14,numberOfCrossrefCitations:13,numberOfCrossrefCitationsByBook:0,numberOfDimensionsCitations:18,numberOfDimensionsCitationsByBook:0,hasAltmetrics:1,numberOfTotalCitations:45,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"March 31st 2016",dateEndSecondStepPublish:"April 21st 2016",dateEndThirdStepPublish:"July 26th 2016",dateEndFourthStepPublish:"October 24th 2016",dateEndFifthStepPublish:"November 23rd 2016",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6,8",editedByType:"Edited by",kuFlag:!1,featuredMarkup:null,editors:[{id:"58889",title:"Dr.",name:"Peter A.",middleName:null,surname:"Clark",slug:"peter-a.-clark",fullName:"Peter A. Clark",profilePictureURL:"https://mts.intechopen.com/storage/users/58889/images/system/58889.jpg",biography:"Peter A. Clark, S.J., Ph.D. is the John McShain Chair in Ethics and Director of the Institute of Clinical Bioethics at Saint Joseph’s University in Philadelphia, Pennsylvania. He is also the Bioethicist for over 20 health care facilities in the United States and Palestine. He is the author of To Treat or Not To Treat and Death With Dignity and has published numerous peer-reviewed articles in national and international medical and ethical journals.",institutionString:"Saint Joseph's University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"2",institution:{name:"Saint Joseph's University",institutionURL:null,country:{name:"United States of America"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"1320",title:"Bioethics",slug:"ethics-bioethics"}],chapters:[{id:"52301",title:"Pharmacy Ethics and the Spirit of Capitalism: A Review of the Literature",doi:"10.5772/65128",slug:"pharmacy-ethics-and-the-spirit-of-capitalism-a-review-of-the-literature",totalDownloads:2263,totalCrossrefCites:0,totalDimensionsCites:2,hasAltmetrics:0,abstract:"This chapter explores the issue of the conflict (real or potential) between the ethical imperatives that should guide the pharmacist in the typical practicing of the profession (i.e. within a pharmacy) and the economic constraints derived from the business dimension of the pharmacy. Marrying service and business in a single profession, pharmacy is supposed to balance harmoniously its two sides, if not to subject business demands to the higher societal, ethical requirements. However, such a balancing exercise is rather like dancing on a rope, and ethics may be trumped by economics, a phenomenon deplored sometimes by pharmacy academics or hospital pharmacists, and by a part of community pharmacists as well. Economics may prevail over ethics in rough forms such as selling health risk products (as it was in the past for tobacco or alcohol) or in more elusive ones, such as longer work hours and shorter counselling times, promoting or dispensing needless or ineffective products (food supplements, cosmetics, etc.), silently refusing to provide or recommend lower cost generics, etc. Ethical research in the field of pharmacy has generally been scarce, and numerous knowledge gaps remain to be filled by future investigations.",signatures:"Robert Ancuceanu and Ioana-Laura Bogdan",downloadPdfUrl:"/chapter/pdf-download/52301",previewPdfUrl:"/chapter/pdf-preview/52301",authors:[{id:"189717",title:"Associate Prof.",name:"Robert",surname:"Ancuceanu",slug:"robert-ancuceanu",fullName:"Robert Ancuceanu"}],corrections:null},{id:"53439",title:"Rethinking Autonomy and Consent in Healthcare Ethics",doi:"10.5772/65765",slug:"rethinking-autonomy-and-consent-in-healthcare-ethics",totalDownloads:2519,totalCrossrefCites:5,totalDimensionsCites:5,hasAltmetrics:0,abstract:"In healthcare ethics, autonomy has arguably become the ‘principal principle’. As a principle that can be readily turned into a process, the giving of ‘informed consent’ by a patient has become the surrogate measure of whether medical interventions are ethically acceptable. While ‘informed consent’ processes in medical care are presumed to be robust, research confirms that most patients do not adequately understand the medical purpose, limitations or potential ethical implications of the many medical procedures to which they consent. In this chapter, we argue that the founding tenets of autonomy and informed consent which presume people to be detached autonomous individuals who act rationally from self‐interest does not authentically capture the essence of human ‘being’. Furthermore, such assumptions do not acknowledge the deeply relational and embedded reality of the human condition which inevitably shape decision making. We contend that within healthcare organisations, the current processes of operationalising informed consent predominantly serve legal and administrative needs, while unwittingly disempowering patients, and silencing key aspects of their experience of illness. Rather than rational self‐interest, we argue that vulnerability, interdependence and trust lie at the core of ethical decision making in healthcare. Re‐framing autonomy in a way that deliberately considers the unique moral frameworks, relationships, and cultures of individuals can provide a more ethically sensitive and respectful basis for decision making in healthcare. As interdependence is an integral consideration in decision making, it must be deliberately acknowledged and incorporated into healthcare practices. Embracing a narrative approach within a shared decision making framework allows the vulnerabilities, fears and aspirations of stakeholders to be heard, creating a more effective and authentic way to meet the ethical goal of respecting those who seek care.",signatures:"Eleanor Milligan and Jennifer Jones",downloadPdfUrl:"/chapter/pdf-download/53439",previewPdfUrl:"/chapter/pdf-preview/53439",authors:[{id:"187831",title:"Prof.",name:"Eleanor",surname:"Milligan",slug:"eleanor-milligan",fullName:"Eleanor Milligan"}],corrections:null},{id:"52100",title:"Ethical Publications in Medical Research",doi:"10.5772/64947",slug:"ethical-publications-in-medical-research",totalDownloads:1877,totalCrossrefCites:2,totalDimensionsCites:2,hasAltmetrics:0,abstract:"Ethics in medical sciences research may not always translate into ethical publications. Unfortunately due to lack of regulatory bodies, publication misconduct is now a global menace for the scientific community. Publication misconducts are not only restricted to research fraud or data manipulations alone but also seriously include plagiarism, duplicate publications especially on figures and tables, authorship disputes and conflict of interests. As global scientific research is expanding particularly in the field of health sciences hence possibilities of more rise of unethical practices from research to publications are very high, authors suggest a strong peer-reviewing system, use latest technological support, strong publication ethics policies, active monitoring, protection of whistle blowers and more liaisons between journals and research institutions or universities possibly to prevent publication misconduct effectively. This chapter discusses how medical publications might have abused various ethical norms not only while conducting research but also during the publication process. The review also discusses the possible preventive measures against unethical practices of research publications.",signatures:"Kusal K. Das and Mallanagoud S. Biradar",downloadPdfUrl:"/chapter/pdf-download/52100",previewPdfUrl:"/chapter/pdf-preview/52100",authors:[{id:"187859",title:"Prof.",name:"Kusal",surname:"Das",slug:"kusal-das",fullName:"Kusal Das"},{id:"188854",title:"Prof.",name:"M.S.",surname:"Biradar",slug:"m.s.-biradar",fullName:"M.S. Biradar"}],corrections:null},{id:"52278",title:"Physicians and Pharmaceutical Industry: Need for Transparency by Conflict of Interest Declaration and Independent Ethical Oversight",doi:"10.5772/65104",slug:"physicians-and-pharmaceutical-industry-need-for-transparency-by-conflict-of-interest-declaration-and",totalDownloads:1513,totalCrossrefCites:1,totalDimensionsCites:1,hasAltmetrics:0,abstract:"Aim: The collaboration between physicians and pharmaceutical industry are based on financial interests on both sides. Transparency will bring the scientific as well as social public to a position from which they are able to judge whether the physician’s interest dominates over the patients’ benefit.",signatures:"Frieder Keller, Krzysztof Marczewski and Drasko Pavlovic",downloadPdfUrl:"/chapter/pdf-download/52278",previewPdfUrl:"/chapter/pdf-preview/52278",authors:[{id:"187868",title:"Emeritus Prof.",name:"Frieder",surname:"Keller",slug:"frieder-keller",fullName:"Frieder Keller"}],corrections:null},{id:"53154",title:"Bioethics and the Experiences of Hansen’s Disease Survivors",doi:"10.5772/65574",slug:"bioethics-and-the-experiences-of-hansen-s-disease-survivors",totalDownloads:1491,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:"Historically, Hansen’s disease patients suffered from discrimination because their physical features changed due to the bacterium Mycobacterium leprae (M. leprae) and made them “ugly” in the eyes of society. Former Japanese governments saw them as a national disgrace and forced them to reside in leprosaria. Since the law requiring isolation continued after the silver bullet was developed, survivors could not leave the leprosaria and return to society. Currently, survivors’ average age is 82 and they live in 13 national sanatoriums. When they pass away, the history of Hansen’s disease in Japan will end, so we must record their experiences. We conducted qualitative and inductive studies with survivors. In this chapter, we reconstruct them from the perspective of bioethics and propose several theories surrounding them: (1) How former leprosaria and medical administrations in Japan threatened bioethical principles; (2) the wisdom of aging survivors, who lived through extreme situations, and what real restoration of their rights might look like; and (3) the ethical dilemmas of how we will care for the survivors—who have multiple severe sequelae—until they all pass away. Finally, we will introduce our ethical nursing practices in relation to caring and understanding via holism.",signatures:"Makiko Kondo, Kazuo Mori, Hiroshi Nomura, Hanako Kadowaki,\nMakiko Watanabe, Akemi Doi and Sayaka Shima",downloadPdfUrl:"/chapter/pdf-download/53154",previewPdfUrl:"/chapter/pdf-preview/53154",authors:[{id:"188019",title:"Dr.",name:"Makiko",surname:"Kondo",slug:"makiko-kondo",fullName:"Makiko Kondo"}],corrections:null},{id:"53239",title:"Rethinking the Postwar Period in Relation to Lives Not Worth Living",doi:"10.5772/66394",slug:"rethinking-the-postwar-period-in-relation-to-lives-not-worth-living",totalDownloads:2155,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:1,abstract:"This research will focus on the postwar period in relation to lives not worth living. This chapter is divided into five sections. The first section is a short introduction to the overall topic. The second part discusses the legal and philosophical language, post-Second World War, in relation to the psychically and mentally ill. This raises the question of whether or not philosophy can be made after 1945 without looking at Auschwitz. Adorno’s categorical imperative: Auschwitz can never ever be repeated, gains prominence in the way of making and proceeding in philosophy and in law this does not include just the Holocaust but also one of the most forgotten groups: the severely mentally and/or physically disabled. The policy of oblivion was practised much quicker than with other human categories. The paradigm of human rights changes substantially immediately after the Second World War The establishment of individual responsibilities for the committed atrocities will be carried out by means of the Nuremberg’s Trials. The third section focuses on the Nuremberg War Crimes Trial, USA vs. Karl Brandt et al. The fourth section analyzes the concepts of post-Auschwitz memory and memory of oblivion. Recovering post-Auschwitz memory implies recreating to the thought process after 1945. Finally, the fifth section draws some conclusions and indicates some further areas for research.",signatures:"José-Antonio Santos",downloadPdfUrl:"/chapter/pdf-download/53239",previewPdfUrl:"/chapter/pdf-preview/53239",authors:[{id:"188020",title:"Dr.",name:"José-Antonio",surname:"Santos",slug:"jose-antonio-santos",fullName:"José-Antonio Santos"}],corrections:null},{id:"52101",title:"Ethical Issues in Organ Procurement and Transplantation",doi:"10.5772/64922",slug:"ethical-issues-in-organ-procurement-and-transplantation",totalDownloads:4757,totalCrossrefCites:1,totalDimensionsCites:1,hasAltmetrics:1,abstract:"The Ciba Foundation held the first international, interdisciplinary conference on ethical and legal issues in transplantation in March 1966. Many of the ethical issues discussed at that conference remain with us today. Organ procurement and transplantation have forced the medical community and society at large to ask such fundamental questions as when are we dead, how can death be declared so that any life‐support measures can be discontinued? Is it ethical to remove an organ or part of an organ from a living person? Since there is such a shortage of organ and people on transplant waiting lists die for lack of an organ, what types of incentives, if any, can be used to increase the organ supply? Transplant centers face additional ethical issues. How can a limited supply of organs be fairly allocated to a large number of patients on the waiting list? Are the methods of putting patients on the waiting list appropriate? Transplant centers are regulated by a variety of governmental organizations. These organizations may have performance criteria. Do these performance criteria lead transplant centers to modify which organs they will accept or which patients they will list? As long as a shortage of organs remains, these ethical issues are likely to persist.",signatures:"Richard J. Howard and Danielle L. Cornell",downloadPdfUrl:"/chapter/pdf-download/52101",previewPdfUrl:"/chapter/pdf-preview/52101",authors:[{id:"188201",title:"M.D.",name:"Richard",surname:"Howard",slug:"richard-howard",fullName:"Richard Howard"},{id:"194143",title:"Ms.",name:"Danielle",surname:"Cornell",slug:"danielle-cornell",fullName:"Danielle Cornell"}],corrections:null},{id:"53393",title:"In Whose Best Interests? Critiquing the “Family-as-Unit” Myth in Pediatric Ethics",doi:"10.5772/66715",slug:"in-whose-best-interests-critiquing-the-family-as-unit-myth-in-pediatric-ethics",totalDownloads:2165,totalCrossrefCites:1,totalDimensionsCites:1,hasAltmetrics:0,abstract:"In pediatrics, parents are the presumed surrogate decision-makers for their children. Parents are generally obligated to make decisions in the child’s best interest. When assessing what is in the child’s best interests, parents should consider the child’s experience of illness, potential for suffering (physical or psychological), and ability to understand and tolerate treatment. Yet, parents may consider a variety of factors other than best interest when making treatment decisions for their children. Moreover, parents may equate the child’s best interest with their own (or their family’s) and make decisions that, in some situations, will place children at significant risk of serious harm. Clinicians may be reluctant to challenge parents due to a perception that their obligations require treating the family “as a unit.” After detailing a case from the author’s own practice in clinical ethics, this essay will challenge the view that “family-centered” (as opposed to “patient-centered”) care is an appropriate ethical model for pediatric decision-making. Specifically, the physician-patient relationship—or, in this context, the pediatrician-child relationship—ought not to be reconceptualized into the pediatrician-parent-child relationship, since the latter perspective potentially misidentifies who the patient is and may inadvertently suggest there is warrant for “treating” the family’s suffering at the expense of the child’s welfare.",signatures:"Joseph A. Raho",downloadPdfUrl:"/chapter/pdf-download/53393",previewPdfUrl:"/chapter/pdf-preview/53393",authors:[{id:"188268",title:"Dr.",name:"Joseph",surname:"Raho",slug:"joseph-raho",fullName:"Joseph Raho"}],corrections:null},{id:"52218",title:"Medical Involvement in Acts of Torture or Degrading Treatment of Human Beings: Forensic and Medical Reflections",doi:"10.5772/65100",slug:"medical-involvement-in-acts-of-torture-or-degrading-treatment-of-human-beings-forensic-and-medical-r",totalDownloads:1758,totalCrossrefCites:1,totalDimensionsCites:1,hasAltmetrics:1,abstract:"The following chapter condenses the reflections about the legitimacy of torture, a theme that the authors hope to contribute to in the opening of a debate on this important issue for the future of medicine and for the goals that medicine sets for itself in our time. The topic of this article is relevant to the debate exacerbated by the tragic events of 2001. In the case of capture of terrorists in possession of information regarding imminent attacks, is it permissible to subject them to torture? In what situations and under what conditions is it possible? We will report on the requirements of the critics of the international ban and the justifications for their arguments. We will present the criticisms of those who defend the maintenance of the prohibition of torture. Similarly we will discuss the positions of doctors who are favorable and adverse to participation in procedures of torture.",signatures:"Mario Picozzi, Federico Nicoli and Omar Ferrario",downloadPdfUrl:"/chapter/pdf-download/52218",previewPdfUrl:"/chapter/pdf-preview/52218",authors:[{id:"188322",title:"Ph.D.",name:"Federico",surname:"Nicoli",slug:"federico-nicoli",fullName:"Federico Nicoli"},{id:"188325",title:"Dr.",name:"Omar",surname:"Ferrario",slug:"omar-ferrario",fullName:"Omar Ferrario"},{id:"189646",title:"Prof.",name:"Mario",surname:"Picozzi",slug:"mario-picozzi",fullName:"Mario Picozzi"}],corrections:null},{id:"53026",title:"Truncated Autonomy: Neocortical Selves, Reverse Reductionism and End-of-Life Care",doi:"10.5772/66044",slug:"truncated-autonomy-neocortical-selves-reverse-reductionism-and-end-of-life-care",totalDownloads:1656,totalCrossrefCites:2,totalDimensionsCites:2,hasAltmetrics:0,abstract:"In professional guidelines for palliative sedation in end-of life care, a particular notion of conscious life experience is associated with specific cognitivist notion of frontal lobe autonomy. Drawing on Turner and Fauconnier’s work in cognitive linguistics I argue in this chapter that even our most central notions like human subjectivity and autonomy are conceptual blends. This chapter explores the origins and emergence of these concepts and their entailments. It digs deep into the conceptual blending of the ontogenetic development of the individual with the phylogenetic history of life. This hyper-blend of the flesh is contrasted with the hyper-blend of an irreal, non-material deep, inner space that is co-extensive with consciousness and with the rational, operative agent constituting the human subject. The last part of the chapter explores the frictions and problematic entailments of these different hyper-blends for end-of-life care practices concerning brain death, persistent vegetative state and palliative sedation. Despite respect for a patient’s autonomy being first among the principles of medical ethics, cognitivist criteria used in the assessment of a patient’s decision-making competence reduce and constrain (truncate) the patient’s autonomy in a variety of ways in one of the situations in life where it should matter most, in dying.",signatures:"Ger Wackers",downloadPdfUrl:"/chapter/pdf-download/53026",previewPdfUrl:"/chapter/pdf-preview/53026",authors:[{id:"188468",title:"Associate Prof.",name:"Ger",surname:"Wackers",slug:"ger-wackers",fullName:"Ger Wackers"}],corrections:null},{id:"52563",title:"Medical Ethics and Bedside Rationing in Low‐Income Countries: Challenges and Opportunities",doi:"10.5772/65089",slug:"medical-ethics-and-bedside-rationing-in-low-income-countries-challenges-and-opportunities",totalDownloads:2110,totalCrossrefCites:0,totalDimensionsCites:3,hasAltmetrics:0,abstract:"There’s evidence that implementing the four medical ethics principles may be challenging especially in low income country contexts with extreme resource scarcity and limited capacity to facilitate deliberations on the different ethical dilemmas. These challenges can partly be explained by the social, economic, and political contexts in which the decisions are made, as well as the limited time, training and guidance to facilitate ethical decision making. Based on current literature, and using the example of bedside rationing; this chapter synthesizes the challenges clinicians face when operationalizing the four principle; identifying the opportunities to address them. We suggest that clinicians’ ability to implement the four principles are constrained by meso‐ and macro‐level decision making as well as their lack of training, explicit guidelines, and peer support. To ameliorate this situation, current efforts to strengthen the clinicians’ capacity to make ethical decisions should be complimented with developing of context relevant guidelines for ethical clinical decision making. The renewed global commitment to the sustainable development goals and universal healthcare coverage should be recognized as an opportunity to leverage resources and champion the integration of equity and justice as a core value in resource allocation at the bedside, meso-, macro- and global levels.",signatures:"Lydia Kapiriri",downloadPdfUrl:"/chapter/pdf-download/52563",previewPdfUrl:"/chapter/pdf-preview/52563",authors:[{id:"189068",title:"Associate Prof.",name:"Lydia",surname:"Kapiriri",slug:"lydia-kapiriri",fullName:"Lydia Kapiriri"}],corrections:null},{id:"53299",title:"‘Assisted Dying’: A View of the Legal, Social, Ethical and Clinical Perspectives",doi:"10.5772/65908",slug:"-assisted-dying-a-view-of-the-legal-social-ethical-and-clinical-perspectives",totalDownloads:1680,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:"Discussion of legislation of physician-assisted suicide and euthanasia, often euphemistically called ‘assisted dying’, frequently focuses on individual cases promoted by campaigners as the reason that the law to licence doctors to supply lethal drugs to patients requesting them should change under certain conditions. But such legislation has wider consequences that simply for a handful of cases, as the relentlessly increasing numbers of such deaths have shown.",signatures:"Ilora Gillian Finlay of Llandaff",downloadPdfUrl:"/chapter/pdf-download/53299",previewPdfUrl:"/chapter/pdf-preview/53299",authors:[{id:"191502",title:"Prof.",name:"Ilora Gillian",surname:"Finlay of Llandaff",slug:"ilora-gillian-finlay-of-llandaff",fullName:"Ilora Gillian Finlay of Llandaff"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},subseries:null,tags:null},relatedBooks:[{type:"book",id:"1743",title:"Contemporary Issues in Bioethics",subtitle:null,isOpenForSubmission:!1,hash:"978cee44b901ff59a20a088f7dcfdbc5",slug:"contemporary-issues-in-bioethics",bookSignature:"Peter A. Clark",coverURL:"https://cdn.intechopen.com/books/images_new/1743.jpg",editedByType:"Edited by",editors:[{id:"58889",title:"Dr.",name:"Peter A.",surname:"Clark",slug:"peter-a.-clark",fullName:"Peter A. Clark"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophile",surname:"Theophanides",slug:"theophile-theophanides",fullName:"Theophile Theophanides"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2270",title:"Fourier Transform",subtitle:"Materials Analysis",isOpenForSubmission:!1,hash:"5e094b066da527193e878e160b4772af",slug:"fourier-transform-materials-analysis",bookSignature:"Salih Mohammed Salih",coverURL:"https://cdn.intechopen.com/books/images_new/2270.jpg",editedByType:"Edited by",editors:[{id:"111691",title:"Dr.Ing.",name:"Salih",surname:"Salih",slug:"salih-salih",fullName:"Salih Salih"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"64554",slug:"erratum-treatment-of-resistant-hypertension-an-update-in-device-therapy",title:"Erratum - Treatment of Resistant Hypertension: An Update in Device Therapy",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/64554.pdf",downloadPdfUrl:"/chapter/pdf-download/64554",previewPdfUrl:"/chapter/pdf-preview/64554",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/64554",risUrl:"/chapter/ris/64554",chapter:{id:"59188",slug:"treatment-of-resistant-hypertension-an-update-in-device-therapy",signatures:"Ghazal Quinn, Phillip John Gary, Christopher Damiano and Geoffrey\nTeehan",dateSubmitted:"May 10th 2017",dateReviewed:"January 10th 2018",datePrePublished:"February 7th 2018",datePublished:"November 14th 2018",book:{id:"6311",title:"Blood Pressure",subtitle:"From Bench to Bed",fullTitle:"Blood Pressure - From Bench to Bed",slug:"blood-pressure-from-bench-to-bed",publishedDate:"November 14th 2018",bookSignature:"Aise Seda Artis",coverURL:"https://cdn.intechopen.com/books/images_new/6311.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"99453",title:"Dr.",name:"Aise Seda",middleName:null,surname:"Artis",slug:"aise-seda-artis",fullName:"Aise Seda Artis"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"210880",title:"Dr.",name:"Geoffrey",middleName:null,surname:"Teehan",fullName:"Geoffrey Teehan",slug:"geoffrey-teehan",email:"gteehan@comcast.net",position:null,institution:{name:"Lankenau Medical Center",institutionURL:null,country:{name:"United States of America"}}},{id:"221168",title:"Dr.",name:"Ghazal",middleName:null,surname:"Quinn",fullName:"Ghazal Quinn",slug:"ghazal-quinn",email:"quinng@mlhs.org",position:null,institution:null},{id:"221169",title:"Dr.",name:"Phillip John",middleName:null,surname:"Gary",fullName:"Phillip John Gary",slug:"phillip-john-gary",email:"garyp@mlhs.org",position:null,institution:null},{id:"221170",title:"Dr.",name:"Christopher",middleName:null,surname:"Damiano",fullName:"Christopher Damiano",slug:"christopher-damiano",email:"damianoc@mlhs.org",position:null,institution:null}]}},chapter:{id:"59188",slug:"treatment-of-resistant-hypertension-an-update-in-device-therapy",signatures:"Ghazal Quinn, Phillip John Gary, Christopher Damiano and Geoffrey\nTeehan",dateSubmitted:"May 10th 2017",dateReviewed:"January 10th 2018",datePrePublished:"February 7th 2018",datePublished:"November 14th 2018",book:{id:"6311",title:"Blood Pressure",subtitle:"From Bench to Bed",fullTitle:"Blood Pressure - From Bench to Bed",slug:"blood-pressure-from-bench-to-bed",publishedDate:"November 14th 2018",bookSignature:"Aise Seda Artis",coverURL:"https://cdn.intechopen.com/books/images_new/6311.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"99453",title:"Dr.",name:"Aise Seda",middleName:null,surname:"Artis",slug:"aise-seda-artis",fullName:"Aise Seda Artis"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"210880",title:"Dr.",name:"Geoffrey",middleName:null,surname:"Teehan",fullName:"Geoffrey Teehan",slug:"geoffrey-teehan",email:"gteehan@comcast.net",position:null,institution:{name:"Lankenau Medical Center",institutionURL:null,country:{name:"United States of America"}}},{id:"221168",title:"Dr.",name:"Ghazal",middleName:null,surname:"Quinn",fullName:"Ghazal Quinn",slug:"ghazal-quinn",email:"quinng@mlhs.org",position:null,institution:null},{id:"221169",title:"Dr.",name:"Phillip John",middleName:null,surname:"Gary",fullName:"Phillip John Gary",slug:"phillip-john-gary",email:"garyp@mlhs.org",position:null,institution:null},{id:"221170",title:"Dr.",name:"Christopher",middleName:null,surname:"Damiano",fullName:"Christopher Damiano",slug:"christopher-damiano",email:"damianoc@mlhs.org",position:null,institution:null}]},book:{id:"6311",title:"Blood Pressure",subtitle:"From Bench to Bed",fullTitle:"Blood Pressure - From Bench to Bed",slug:"blood-pressure-from-bench-to-bed",publishedDate:"November 14th 2018",bookSignature:"Aise Seda Artis",coverURL:"https://cdn.intechopen.com/books/images_new/6311.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"99453",title:"Dr.",name:"Aise Seda",middleName:null,surname:"Artis",slug:"aise-seda-artis",fullName:"Aise Seda Artis"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"11945",leadTitle:null,title:"Display Technologies",subtitle:null,reviewType:"peer-reviewed",abstract:"
\r\n\tDisplay technology is well known as an effective way of information communication. Nowadays, display technology is evolving at an exponential level. Consequently, an exciting future for generations of new displays can be guaranteed by the rapid-fire improvements in display technology. Major display technologies are well known as liquid crystal displays, organic light-emitting diodes, digital light processing technology, plasma displays, field emission displays, and electronic paper. Over the last decades, the human-machine interface (HMI) was improved by the achievement of display development. For example, it was demonstrated that OLED displays could replace LED-backlit displays in the not-too-distant future. The performance of this kind of display is equal to or better than LED or LCD screens. Or in the future, we expect new kinds of displays such as 3-D screens and holographic displays to be developed. In this book, we tried to review and introduce the received advances in display technology for readers.
",isbn:"978-1-83969-855-2",printIsbn:"978-1-83969-854-5",pdfIsbn:"978-1-83969-856-9",doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!0,isSalesforceBook:!1,isNomenclature:!1,hash:"6b51a957a839ed3350b0785031c6343a",bookSignature:"Prof. Morteza Sasani Ghamsari",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/11945.jpg",keywords:"Materials, Devices, Technology, Mini-LEDs, OLEDs, OD-OLEDs, Micro-LEDs, LCD, Passive and Active Technologies, Thin Film Transistor LCD, Phosphors, Large-Screen HDTV",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 29th 2022",dateEndSecondStepPublish:"May 27th 2022",dateEndThirdStepPublish:"July 26th 2022",dateEndFourthStepPublish:"October 14th 2022",dateEndFifthStepPublish:"December 13th 2022",dateConfirmationOfParticipation:null,remainingDaysToSecondStep:"6 hours",secondStepPassed:!1,areRegistrationsClosed:!1,currentStepOfPublishingProcess:2,editedByType:null,kuFlag:!1,biosketch:"A pioneering researcher in monophonic and quantum material, appointed head of the quantum technologies research group, and holder of two registered patents.",coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"64949",title:"Prof.",name:"Morteza",middleName:null,surname:"Sasani Ghamsari",slug:"morteza-sasani-ghamsari",fullName:"Morteza Sasani Ghamsari",profilePictureURL:"https://mts.intechopen.com/storage/users/64949/images/system/64949.jpg",biography:"Dr. Morteza Sasani Ghamsari is a senior researcher in the Photonics and Quantum Technologies Research School of Iranian Nuclear Science and Technology Research Institute. His research focuses on photonic materials including metamaterials, quantum\ndots, and plasmonic nanomaterials that can be used in a wide range of nanophotonics applications. His recent interests also include nano-bioimaging, 3D printing, nanostructures for tissue engineering (ZnO, TiO2, etc.) and biomaterials including carbon, graphene, and\ndiamond quantum dots. He is an editorial board member and reviewer for different\ninternational journals and has collaborated with local and international academics/\nresearchers on post-graduate research projects. He has edited four books and published four chapters and more than 105 articles in scientific journals and reviewed\nconference proceedings. His papers have been cited more than 2100 times with\nh-index 26 and i-10 index 46 (Google Scholar).",institutionString:"Photonics and Quantum Technologies Research School",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"4",institution:null}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"11",title:"Engineering",slug:"engineering"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"453623",firstName:"Silvia",lastName:"Sabo",middleName:null,title:"Mrs.",imageUrl:"https://mts.intechopen.com/storage/users/453623/images/20396_n.jpg",email:"silvia@intechopen.com",biography:null}},relatedBooks:[{type:"book",id:"10198",title:"Response Surface Methodology in Engineering Science",subtitle:null,isOpenForSubmission:!1,hash:"1942bec30d40572f519327ca7a6d7aae",slug:"response-surface-methodology-in-engineering-science",bookSignature:"Palanikumar Kayaroganam",coverURL:"https://cdn.intechopen.com/books/images_new/10198.jpg",editedByType:"Edited by",editors:[{id:"321730",title:"Prof.",name:"Palanikumar",surname:"Kayaroganam",slug:"palanikumar-kayaroganam",fullName:"Palanikumar Kayaroganam"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophile",surname:"Theophanides",slug:"theophile-theophanides",fullName:"Theophile Theophanides"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2270",title:"Fourier Transform",subtitle:"Materials Analysis",isOpenForSubmission:!1,hash:"5e094b066da527193e878e160b4772af",slug:"fourier-transform-materials-analysis",bookSignature:"Salih Mohammed Salih",coverURL:"https://cdn.intechopen.com/books/images_new/2270.jpg",editedByType:"Edited by",editors:[{id:"111691",title:"Dr.Ing.",name:"Salih",surname:"Salih",slug:"salih-salih",fullName:"Salih Salih"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"117",title:"Artificial Neural Networks",subtitle:"Methodological Advances and Biomedical Applications",isOpenForSubmission:!1,hash:null,slug:"artificial-neural-networks-methodological-advances-and-biomedical-applications",bookSignature:"Kenji Suzuki",coverURL:"https://cdn.intechopen.com/books/images_new/117.jpg",editedByType:"Edited by",editors:[{id:"3095",title:"Prof.",name:"Kenji",surname:"Suzuki",slug:"kenji-suzuki",fullName:"Kenji Suzuki"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3828",title:"Application of Nanotechnology in Drug Delivery",subtitle:null,isOpenForSubmission:!1,hash:"51a27e7adbfafcfedb6e9683f209cba4",slug:"application-of-nanotechnology-in-drug-delivery",bookSignature:"Ali Demir Sezer",coverURL:"https://cdn.intechopen.com/books/images_new/3828.jpg",editedByType:"Edited by",editors:[{id:"62389",title:"PhD.",name:"Ali Demir",surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"872",title:"Organic Pollutants Ten Years After the Stockholm Convention",subtitle:"Environmental and Analytical Update",isOpenForSubmission:!1,hash:"f01dc7077e1d23f3d8f5454985cafa0a",slug:"organic-pollutants-ten-years-after-the-stockholm-convention-environmental-and-analytical-update",bookSignature:"Tomasz Puzyn and Aleksandra Mostrag-Szlichtyng",coverURL:"https://cdn.intechopen.com/books/images_new/872.jpg",editedByType:"Edited by",editors:[{id:"84887",title:"Dr.",name:"Tomasz",surname:"Puzyn",slug:"tomasz-puzyn",fullName:"Tomasz Puzyn"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"16648",title:"Characterization of Activated Carbons Produced from Oleaster Stones",doi:"10.5772/19061",slug:"characterization-of-activated-carbons-produced-from-oleaster-stones",body:'Activated carbon has a porous structure surrounded by carbon atoms and therefore is a material with adsorbent capability. The most important parameter that is put into consideration to investigate its chemical characterization is porosity. Pore size determines how adsorption takes place in pores (Marsh & Reinoso, 2006). In accordance with IUPAC, pores are classified into three different sizes. Pores less than 2,0 nm are classified as micropores, those in the range of 2,0-50 nm mesopores and those greater than 50 nm macropores (IUPAC).
The selection of raw material for the production of activated carbon is made on the basis of carbon amount, mineral matter and sulfur content, availability, cost, and shelf life (Kroschwitz,1992). Raw material may be of vegetable, animal and mineral origin and the production can be carried out by means of physical and chemical activation depending on the type of raw material.
The physical activation method generally involves carbonization and activation stages (Singh, 2001). In the activation stage oxidizing agents are used such as carbondioxide and steam and thus form pores and canals (Jankowska et al., 1991).
Chemical activation involves a carbonization stage where a chemical activating agent that is in the form of a solution or dry is blended with the raw material. Chemicals employed in chemical activation (potassium hydroxide, phosphoric acid, zinc chloride etc.) are effective at decomposing the structure of the raw material and forming micropores (Marsh & Reinoso, 2006).
The literature has many articles dealing with activated carbons produced from raw material using both the chemical and physical activation methods. Materials frequently used as raw material of vegetable origin include corncobs (Sun et al., 2007; Aworn et al., 2009; Preethi et al., 2006), hazelnuts (Demiral et al., 2008; Soleimani & Kaghazchi, 2007), olives (Yavuz et al., 2010), nuts (Yeganeh et al., 2006; Aygun et al., 2003), peaches (Kim, 2004), loquat stones (Sütcü & Demiral, 2009), wood (Ould-Idriss et al., 2011; Sun & Jiang, 2010) and bamboo (Ip et al., 2008), those of animal origin bones (Moreno-Pirajan et al., 2010) and hide waste (Demiral & Demiral, 2008), and those of mineral origin coal (Alcaniz-Monge et al., 2010; Cuhadaroglu & Uygun, 2008; Liu et al., 2007; Sütcü & Dural, 2007), petroleum coke (Lu et al., 2010) and rubber (Gupta et al., 2011; Nabais et al., 2010).
In this study I produced activated carbons from chars obtained through the carbonization of oleaster stones by physical, chemical and chemical+physical activation, and performed their surface characterization.
The oleasters used in this study were obtained from a green grocer and their stones removed. The stones were washed clean and dried at 105ºC for 24 hours.
The structural analysis of the oleaster stones were carried out by proximate and ultimate analyses, thermogravimetric analysis (TG), fourier transform infrared spectroscopy (FTIR) and scanning electron microscopy (SEM). The results regarding the proximate and ultimate analyses are given in Table 1.
The TG analysis was performed using a PL 1500TGA apparatus from ambient to 800ºC at a heating rate of 10 ºC/min and a nitrogen flow rate of 100 ml/min.
The FTIR spectrum was taken by means of a Perkin Elmer Spectrum One apparatus at wavelengths ranging from 4000 to 650 cmˉ¹.
The SEM image was obtained using a JEOL JSM model 5410 LV scanning electron microscope.
Asha | Volatile Matter a | Fixed Carbon a | C b | H b | N b | S b |
0.57 | 74.27 | 25.16 | 48.16 | 0.66 | 3.44 | 0.29 |
The results of proximate and ultimate analyses of oleaster stones (a. on dry basis, %, b. on dry and ash free basis, %)
The stones were subjected to carbonization at a heating rate of 10 ºC/min, a carbonization temperature of 600 ºC and a nitrogen flow rate of 100 ml/min, and held at that temperature for 1 h. The carbonization was performed in a tube furnace of internal diameter 6 cm and length 110 cm. The chars were reduced to a size range of 0.5-1.0 mm to make them ready for the production of activated carbon.
The structural analysis of the chars were conducted by proximate and ultimate analyses, TG analysis, FTIR spectroscopy and SEM. Table 2 gives the results from the proximate and ultimate analyses undertaken.
The FTIR spectrum was taken using a Perkin Elmer Spectrum One apparatus within a wavelength range of 4000-650 cmˉ¹.
The SEM image was obtained using a JEOL JSM model 5410 LV scanning electron microscope.
Asha | Volatile Matter a | Fixed Carbon a | C b | H b | N b |
2.30 | 10.40 | 87.30 | 62.60 | 2.45 | 0.63 |
Results from analyses of chars (a. on dry basis, %, b. on dry and ash free basis, %)
The production of activated carbon from chars by physical activation was conducted in a tube furnace at carbonization temperatures of 650ºC, 750ºC and 850ºC. The chars were heated up to the above-mentioned temperatures at a nitrogen atmosphere in a flow rate of 100 ml/min and a heating rate of 10 ºC/min, and subjected to a CO2 atmosphere with a flow rate of 100 ml/min. The chars thus obtained were kept in an desiccator. The chars produced by means of this method were designated as PH650, PH750 and PH850, respectively.
The production of chemical activation from chars was carried out using the chemical KOH at carbonization temperatures of 650ºC, 750ºC and 850ºC. The mixture prepared in such a way that the char/KOH ratio would be 1/1 (mass ratio) was mixed with water of 10ml and held in a drying oven at 50 ºC for 24 hours. The mixture was then heated up to the aforementioned temperatures at a heating rate of 10 ºC/min and a nitrogen flow rate of 100 ml/min, and kept at that temperature for 1 hour. The activated carbons produced were boiled with 0.5 N HCI for 30 minutes and washed with distilled water until their pH was 6.5. Finally, they were dried in a vacuum drying oven and kept in an desiccator. The activated carbons thus obtained were designated as CH650, CH750 and CH850, respectively.
The chars were blended with 10ml of distilled water in such a way that the char/KOH ratio would be 1/1 (mass ratio) and held in a drying oven for 24 hours. After that, this mixture was heated up to 650 ºC, 750 ºC and 850 ºC at a nitrogen flow rate of 100 ml/min and a heating rate of 10 ºC/min and was held at these temperatures under CO2 with a flow rate of 100 ml/min. After the activated carbons produced were boiled with 0,5 N HCI for 30 minutes, they were washed with distilled water until a pH value of 6.5 was achieved, dried in a vacuum drying oven at 105 ºC for 24 hours and kept in an desiccator. The activated obtained through this method are denoted by CHPH650, CHPH750 and CHPH850, respectively.
Structural characterization of the activated carbons was carried out by FTIR spectroscopy, SEM and a Quantachrome Autosorb Automated Gas Sorption System.
The FTIR spectra of the activated carbons were taken by means of a Perkin Elmer Spectrum One apparatus at wavelengths in the range of 4000 to 650 cmˉ¹.
The SEM images were obtained using a JEOL JSM model 5410 LV scanning electron microscope.
The iodine number of the activated carbons was determined in accordance with ASTM D 4607-94.
Surface analyses were performed by nitrogen adsorption at -196ºC using a Quantachrome Autosorb Automated Gas Sorption System. Prior to adsorption, the activated carbons were outgassed under vacuum conditions at 250ºC for 3 hours. Adsorption isotherms were obtained at pressures in the range of 10ˉ5-1.0. The surface areas and pore volumes were determined by means of Brunauer-Emmett-Teller (BET) and t-pilot software and pore size distribution using density functional theory (DFT) software.
Figure 1 gives the results from TG analysis carried out on oleaster stones. The decomposition of oleaster stones takes place in three stages. The first stage, which occurs at temperatures ranging from 30 ºC to 140 ºC involves moisture loss (Popescu et al., 20111). The other stages are related to the release of volatiles resulting from the decomposition of hemicellulose, cellulose and lignin (Tongpoothorn et al., 2011; Luangkiattikhun et al., 2008; Antal, 1982). In the second stage occuring at 140 ºC-245 ºC, hemicellulose decomposes as well as cellulose which also starts to disintegrate. Within this temperature range, the maximum decomposition temperature and rate were established to be 222 ºC and 1,50%, respectively. The last stage, which takes place within a temperature range of 245 ºC and 600 ºC, is characterized by the decomposition of cellulose and lignin. The maximum decomposition temperature in this stage was found to be 333 ºC and the maximum decomposition rate 6.71%.
The amount of char remaining as a result of TG analysis of oleaster stones in nitrogen atmosphere is 25.57%.
Graph depicting the results from thermogravimetric and differential thermogravimetric analyses of oleaster stones.
Figure 2 gives the FTIR spectra of oleaster stones and chars obtained from them. An interpretation of the FTIR spectra reveals the existence of functional groups occurring in the structure.
The band observed at 3600-3200 cmˉ¹ is indicative of the –OH stretching peak and existence of phenol, alcohol and carboxylic containing hydroxyl groups. This band, which is present in oleaster stones, do not exist in chars. This can be attributed to the decomposition of the structure and removal of the groups containing hydroxyl groups.
The band at 3000-2800 cmˉ¹ indicates the presence of an aliphatic –CH stretching. This band is visible in oleaster stones but not in chars.
The band at around 1700 cmˉ¹ denotes the existence of carbonyl/carboxyl groups and can be observed in oleaster stones.
The 1600-1500 cmˉ¹ band, which is visible in both oleaster stones and chars, indicates the presence of an aromatic C=C ring stretching.
The bands at 1450-1300 cmˉ¹ denotes the existence of C-H vibrating alkene groups. This band which exist in oleaster stones occurs in chars more densely.
The bands observed at 1240-1000 cmˉ¹ indicates the existence of phenolic and alcoholic groups, and were identified in the FTIR spectra of oleaster stones and chars. The bands at 900-600 cmˉ¹ denotes the presence of aromatic ring structures and are visible in both oleaster stones and chars.
FTIR spectra of (a) oleaster stones and (b) chars produced from them
Figure 3 gives SEM micrographs of oleaster stones and chars obtained from them.
It is clear from the SEM micrograph of oleaster stones that they have a fibrous structure. Chars produced at a carbonization temperature of 600ºC were also determined to have a fibrous structure, a heterogeneous size and pores without any homogeneous distribution.
SEM micrographs of (a) oleaster stones and (b) chars produced from them
Figure 4 illustrates variations in the yield of activated carbon produced at varying temperatures and conditions. It is evident from the graph that activated carbon yields are affected by the activation method and carbonization temperature. With increasing temperature the yield of activated carbons produced by physical, chemical and sequential activation exhibits a downward trend. The yields obtained through sequential activation were found to be significantly low.
As the process of sequential activation involves the use of both potassium hydroxide and carbondioxide, there is an increase in the decomposition of the structure. In other words, with increasing decomposition more volatiles are released, which leads to a lower yield.
Variations in activated carbon yields in relation to conditions for the production of activated carbon
Figure 5 gives the nitrogen adsorption isotherms at 77K of activated carbons produced at three different temperatures by means of three different methods. An investigation of the adsorption isotherms found them to be isotherms (Type 1) in accordance with IUPAC classification except for activated carbon PH650. Based on this, we can speak of high microporosity (Sing et al., 1985-IUPAC Recommendations).
Adsorption of activated carbons produced at 650ºC, 750ºC and 850ºC displays an upward trend from the lowest to the highest depending on physical, chemical and sequential activation methods in their respective order. Moreover, for each activation method, as temperature increases, so does the adsorption of activated carbons.
The experiments carried out at 650ºC revealed that chemically produced activated carbons have a higher adsorption tendency compared to that of activated carbons produced by physical and sequential methods. There was an increase in the adsorption tendency of activated carbons obtained at 750ºC and 850ºC using all three methods. Activated carbons produced by sequential activation at both temperatures were established to have a comparatively higher adsorption tendency.
Nitrogen adsorption isotherms
Figure 6 illustrates variations in BET and micropore surface areas of activated carbons produced under three different activation conditions and at three different temperatures. The graph shows that BET and micropore surface areas exhibit variations depending on the activation method and temperature.
Variations in BET and micropore surface areas in relation to activation method and temperature
The highest BET and micropore surface area were achieved at a carbonization temperature of 650 C through the production of activated carbons by chemical activation. Activated carbons PH650, CH650 and CHPH650 were found to have BET values of 53 m²/g, 830 m²/g and 707 m²/g, respectively. The micropore surface areas of activated carbons PH650, CH650 and CHPH650 were established to be 0 m²/g, 765 m²/g and 650 m²/g, respectively. The BET surface area for PH650 obtained was found to be low and no pores were observed in the microstructure. It can be stated that physical activation is not effective at this carbonization temperature but chemical activation is suitable. The micropore percentage of activated carbons produced through chemical and sequential activation is 92%.
It was found that activated carbons obtained at 750 ºC have a comparatively higher surface area than those produced at 650 ºC. The BET values of activated carbons PH750, CH750 and CHPH750 were determined to be 447 m²/g, 1084 m²/g and 1733 m²/g, respectively. The same activated carbons were found to have micropore surface areas of 356 m²/g, 1008 m²/g and 1254 m²/g, respectively. The percentage of the micropore surface area for PH750, CH750 and CHPH750 were established to be 79%, 93% and 72%, respectively. It is clear |that the chemical and sequential methods at the same carbonization temperature are suitable for producing activated carbons with a high BET and microporosity. However, it was found that sequential activation is more effective at obtaining a higher BET surface area as compared to chemical activation, which is capable of producing structures with micropores.
As for activated carbons produced at a carbonization temperature of 850 ºC, their surface areas were found to be higher than those produced at the other two temperatures. Activated carbons produced at this temperature by physical activation, chemical activation and sequential activation were found to have BET values of 849 m²/g, 1387 m²/g and 1713 m²/g, respectively. The micropore surface areas of carbons produced by the same methods were established to be 721 m²/g, 1261 m²/g and 1094 m²/g, respectively. The percentage of micropore surface area of activated carbons produced by means of physical, chemical and sequential activation were determined to be 85%, 91% and 64%, respectively. The BET surface areas were observed to display an upward trend in the order of physical, chemical and sequential activation. In contrast, sequential activation yields a lower micropore surface area. This decrease is attributable to the fact that micropores decompose to become larger.
A comparison of each carbonization temperature reveals that activated carbons produced by chemical activation have higher BET values. BET values of activated carbons obtained through sequential activation are higher compared to those of activated carbons produced by means of both physical and chemical activation.
Figure 7 illustrates how total pore and micropore volumes vary depending on the carbonization temperature and activation method employed.
The highest total pore volume (0,4001 cm³/g) was achieved through chemical activation employed in experiments carried out at a carbonization temperature of 650 ºC. At the same carbonization temperature, physical activation and sequential activation yielded total pore volumes of 0,1014 cm³/g and 0,3273 cm³/g, respectively. Micropore volume displays variation similar to that observed in total pore volume. It was determined that physical activation does not lead to the formation of micropores. Total pore volume obtained through chemical activation and sequential activation were calculated to be 77% and 79%, respectively. Sequential activation at the same carbonization temperature results in micropore volume increasing.
At 750 ºC total pore volume was observed to increase during physical, chemical and sequential activation. For these activation methods, total pore volumes were found to be 0,2441 cm³/g, 0,4820 cm³/g and 0,9529 cm³/g, respectively. For the same activation methods, the micropore volume percentages have values of 59%, 84% and 55%, respectively. At this temperature, micropore volume obtained by means of chemical activation was determined to be higher compared to that achieved by means of the other methods.
Total pore volume achieved at 850 ºC was established to be higher than that obtained at the other carbonization temperatures. Physical, chemical and sequential activation at this temperature yielded total pore volumes of 0,4285 cm³/g, 0,6294 cm³/g and 0,9557 cm³/g, respectively. The micropore volume percentages were calculated to be, in the same order of activation methods employed, 68%, 80% and 49%, respectively. Chemical activation produced a higher micropore volume, whereas micropore volume obtained through sequential activation proved to be comparatively lower.
The densest micropore structure was achieved in activated carbons produced through chemical activation at carbonization temperatures of 750ºC and 850ºC. During chemical activation at three cabonization temperatures, KOH reacts with carbon to form an alkali metal carbonate. This, in turn, decomposes at high temperatures, and the resultant carbon dioxide leads to new pores being formed and the micropores becoming larger (Alcanz-Monge & Illan-Gomez, 2008; Nabais et al., 2008; Tseng et al., 2008). As the sequential activation method involved using both KOH and CO2, the micropores and new pores become larger. With the physical activation method, carbon dioxide proved to be ineffective at forming new pores.
Variations of total pore and micropore volumes in relation to carbonization temperature and activation method
Figure 8 gives variations of pore size distribution calculated based on the DFT method depending on carbonization temperature and the activation method employed.
Variations in pore size distribution in relation to carbonization temperature and activation method
The pore size of activated carbons produced by physical activation at a carbonization temperature of 650 ºC is in the range of 4-55 Aº. Moreover, this activated carbon has a very low BET surface area (53 m²/g) and its micropore surface area could not be determined. The pore size distribution of activated carbons produced through chemical and sequential activation methods is observed to be in the ranges of 2-20 Aº and 20-35 Aº, respectively. This indicates that activated carbons have, along with mesopores, a more dense micropore contents.
A carbonization temperature of 750ºC is observed to lead to both micro- and mesopores forming. Physical activation yielded a pore size distribution in the ranges of 4-20 Aº and 20-30 Aº, chemical activation a pore size distribution in the ranges 4-21 Aº and 21-34 Aº, and sequential activation led to a pore size distribution within the ranges of 4-20 Aº and 20-51 Aº. Chemical activation made it possible for micropores to become more dense at this temperature. As for sequential activation, it was observed to bring about an increase in mesopore density.
It was observed that micropores decrease and mesopores increase even more at a carbonization temperature of 850 ºC. At this temperature, the decomposition of the structure displays an upward trend. Physical activation produced pore size distribution in the ranges of 4-9 Aº and 9-19 Aº, chemical activation led to a pore size distribution ranging from 4 to 9 Aº and from 9 to 19 Aº, and the pore size distribution achieved through sequential activation was within the ranges of 4-9 Aº, 9-12 Aº and 9-19 Aº. At this temperature, new micropores are formed and the existing and new micropores decompose to form mesopores.
The densest micropore structure was achieved in activated carbons produced through chemical activation at carbonization temperatures of 750 ºC and 850 ºC.
Figure 9 gives FTIR spectra of activated carbons obtained at three different carbonization temperatures using three different activation methods.
The band observed at 3600-3200 cmˉ¹ is not present in chars but visible in the spectra of activated carbons produced using the three activation methods. This is because chemical activation and physical activation applied caused oxygen compounds to enter the structure.
The aliphatic groups in the structure of activated carbons are observed at 3000-2800 cmˉ¹.
Aromatic structures associated with the band observed 1600-1500 cmˉ¹ is not visible in the spectra of activated carbons produced by sequential activation.
FITR spectra of activated carbons
Alkene groups at 1450-1300 cmˉ¹ are observed as a multiple peak in activated carbons produced using the sequential activation method.
The bands (1240-1000 cmˉ¹) indicative of phenolic and alcoholic structures also occur in activated carbons.
It is evident from the FTIR spectra that functional groups present in oleaster stones decreased, disapeared or became smaller in their chars. Functional groups occurring in the structure of activated carbons produced by physical, chemical and sequential activation at 650ºC, 750ºC and 850ºC exhibited variations as opposed to functional groups in chars. It is evident from the FTIR spectra that the structure of activated carbons was found to contain aromatic, aliphatic and oxygen-containing functional groups.
Figure 10 depicts SEM micrographs of activated carbons obtained at three different carbonization temperatures by means of three activation methods.
It can be concluded from SEM micrographs taken during experiments performed at a carbonization temperature of 650ºC that the fibers disintegrated and no porous structure was formed. This proves that the value of surface area is low. It is observed that chemical and sequential activation lead to the formation of pores but, do not provide a homogenous distribution.
Physical activation at a carbonization temperature of 750ºC was observed to lead to the formation of pores. The chemical and activation methods not only maintained the fibrous structure, but made it possible for pore distribution to be homogenous as well.
Physical activation at a carbonization temperature of 850ºC made the porous structure of the activated carbon produced even clearer. In contrast, the chemical and sequential activation methods resulted in the pores decomposing.
SEM micrographs of activated carbons (150X and 750X)
The iodine number is a technique employed by producers, sellers, researchers etc. in order to determine the adsorption capacity of activated carbons. The iodine number is the amount of iodine adsorbed by 1g of carbon at the mg level. The iodine value is a measure of porosity for activated carbons. However, no relationship can be established between the iodine number and surface area (ASTM D4607, 2006; Qui&Guo, 2010). The iodine number displays variation depending on the raw material, production conditions and the distribution of the pore volume (ASTM D4607, 2006).
Variations in the iodine number in relation to the activation method employed and carbonization temperature
Variations in the iodine numbers of activated carbons are given in Table 11. The iodine number is affected by both carbonization temperature and the activation method applied.
In this study, I sought to produce activated carbons by physical, chemical and sequential (chemical+physical) activation at carbonizaton temperatures of 650 C, 750 ºC and 850 ºC.
It has been established that the porous structure parameters of the activated carbons produced are affected by both carbonization temperature and the activation method employed. The chemical and sequential activation methods led to the formation of activated carbons with a relatively higher BET and micropore surface starting from a carbonization temperature of 750 ºC in particular.
Activated carbon produced by means of the sequential activation method at a cabonization temperature of 750 ºC yielded the highest BET surface area of 1733 m²/g. The highest micropore surface area was achieved through chemical activation at a carbonization temperature of 850 ºC. By contrast, the highest percentage of micropore surface area with 93% was obtained by means of chemical activation at a carbonization temperature of 750 ºC.
The iodine number was also affected by both carbonization temperature and the activation methods employed. Activated carbon obtained at a carbonization temperature of 850 ºC using the sequential activation method yielded the highest iodine number.
Also, the FTIR spectra and SEM micrographs taken confirm that, due to their structural characterization, oleaster stones are a suitable material for activated carbon production, and accordingly, use as adsorbents.
The writer would like to express her gratitude to the Management Zonguldak Karaelmas University Scientific Resaerch Fund (Project No.2008-70-01-01) for their financial assistance at the project level.
Cloud computing is vastly increasing in demand for its popularity. Cloud services deliver up to its expectations if properly maintained. Users choose cloud because the cost is affordable, is easy to access, and has a positive uptime. Unfortunately, a high number of cloud users face difficulties when issues arise such as the frightening news about data confidentiality and integrity which gets posted online all the time, and they are in darkness when such situations occur [1]. In this modern age, cloud computing has been progressively popular within the IT organizations, and we notice many institutes are moving most of their IT services towards the cloud services here in Fiji to improve their information communication technology (ICT) service delivery to the clients or stakeholders. It is important for any organization to do an appropriate background research before making decisions of upgrading for which type of cloud services they are acquiring, depending on the organization’s requirements. Many organizations prefer a private cloud infrastructure which has many advantages compared to the public cloud and hybrid cloud services; however, administrators tend to overlook that private cloud infrastructure comes with an exceptional set of challenges and risks. Cloud computing security service categories are identified and illustrated as follows:
Identity access management
Data loss prevention
Web security
Email security
Network security
Encryption
Information security
Cloud computing security keeps on changing as new technologies emerge. Services provided by the three basic cloud service models, which are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), give more outbreak to exploit such state-of-the-art models. As the cloud expands, so does its vulnerabilities [2]. It is the hosting providers or administrators duty to ensure that these vulnerabilities are kept on patching up as new threats arise. One must always be on the look for any threats coming their way towards the cloud servers. If such threats enter the cloud, it could be devastating for the cloud hosting providers and even the cloud servers itself. We as human beings need to keep in mind that a person who wants to get the data for their benefit or even for fun purposes [3] creates those threats. There are certain software programmed and integrated to the cloud server to automatically mitigate a certain level of threat, and an example is a web application firewall (Barracuda).
\nStated in the research paper regarding a study on security model in cloud computing, we vastly agree to the statements stated such as the security being a real-time obstacle of the everlasting picture and foundation of cloud computing [4]. Furthermore, this research will now move towards focusing on the security aspect and its services shown by cloud computing itself as keeping in mind the increasing need for security in the cloud as we see a new day moving forward in our daily lives.
\nThis paper starts with cloud identity access management as the first level of cloud computing security service that we identified based on various researches conducted. Whenever a user has established the connection to the cloud, the user will need to login and access the cloud resources in order to drive forward the idea of hosting applications, websites or even doing online sales securely through a secure login tunnel. This has to be fully done by successful authentication and authorization to avoid loss of data and identity being manipulated which could lead to unwanted access to the cloud system [5].
\nThe need to have identified information in this case, which related to identity access management itself, first needs to be synchronized so that there are no conflicts when identifying the cloud user [6]. One needs to keep in mind there are many users who have the same name although their username can differentiate the users and their level of access. For user information to be synced properly, the old user data will need to be checked if there are any, which were used previously, and it should not match with the new data. Such scenarios occur when a user cancels their online subscription to a cloud host provider and comes back after a few years wanting to again host their applications on the cloud [7]. This reflects on mostly public clouds. This can also be hinted at a private cloud when the administrator permanently deletes the user’s data, which in this case is the user’s login and registration details to focus on. A hacker can pose as a new user and easily gain access to the cloud system if he/she is able to manipulate the registration and other details. This can happen when the administrator is adding a new identity to the system, and if the administrator is not careful, the system does not identify old data. This will lead to an identity within the cloud system that will gain access to certain module level-based information because the identity has not been synced and verified with real time updates [8]. Another issue could be confidentiality, which focuses only on authorized access to cloud data; an authentication that is related to checking of the received data to be from a legit source and integrity, which relates to only authorized party, should be allowed to modify data in the cloud [9].
\nBuilding trust in cloud computing services may help prevent data loss to some extent, but it does not guarantee it. The cloud server needs to be equipped with state-of-the-art hardware and software in order to prevent such issue. This service protects data from being lost based on the rules deployed on cloud servers. Data can be lost in various ways such as the hacker sends a malicious file, which infects the cloud server and deleting the files and folders [10].
\nData storage repository must be secured enough to handle such attacks although the level of attacks varies from high to low and each attack is to be considered no matter which level that threat is. Suppose a low level of threat occurs in the cloud server where that data is stored and the administrator does not take any action to fix the issue or just ignores it thinking that it is a small issue, it could multiply and do its job on the storage server leading to data loss [11].
\nSecuring the storage in the cloud is very important where the storage or based in geographical location or not, but at the end of the day, the storage repository is linked to a network and that is enough information for an advanced hacker to easily delete the data by entering into the system from just a small script which will eventually grow to a virus or Trojan to inflict the damage.
\nIf the administrators are not monitoring such scenarios, that virus can do the damage to the storage server. In such cases, it may send a lot of traffic request to the storage server, and this can result in overload. Such case is mostly described as denial of service attacks. With DoS attacks, the server will notice a change in traffic load coming in, and if there are no intelligent applications installed in the server to mitigate, there could be serious implications. These attacks can corrupt data, delete data, and data loss. This is a common issue faced by a lot of users, which ultimately will become the administrator’s responsibility.
\nWe noticed a virus spread across the globe called WannaCry, which is a ransomware virus where it locks down your computer system and asks for money in order to unlock the affected system. This type of attacks can lead to data loss as well. Supposedly, this threat can affect the data stored in the cloud server, which is definitely huge on a threat level. Microsoft had to realize patches for their operating systems in order to prevent such attacks. This results in a lot of distress around the globe and was one of most talked about attacks. It not only inflicts damage to the affected system, but it also has the ability to destroy the data itself, which is stored in any system [9]. One must be very careful of such attacks if not then data loss is inevitable. Such attacks are a wake-up call for cloud system, which does not have any type of data loss prevention techniques implemented, and if such techniques are implemented, then the administration must map out ways to block or to prevent data being lost. Therefore, security rules need to be in place to avoid customers from being frustrated with one of the major issues, which are data loss [4].
\nWeb security plays a vital role as well in clouds. While the servers are hosted in clouds, websites and applications are also hosted in it which combines the functionality to work with cloud resources and deliver as expected to customers. Protection against virus and malware nowadays is very common as new types of such threats emerge almost every day. In cloud, all folders are synchronized at all times as the user updates their data. What could happen is that if a malware enters the cloud and data sync is taking place, the malware gets synched together, spreading around with the configured account, which is the source in which the malware entered into the system [11].
\nHosting service providers for cloud-based will need to get a good web application firewall (WAF), which can prevent attacks to web servers and applications. Traffic going in and out of the web server needs to pass through WAF in order to check for malicious responses [12].
\nAs proposed in the paper by Fernandez et al [13], web application scanner and a cloud-based web application firewall can be used to identify vulnerabilities and scan for sensitive data [13]. This type of scanner is very useful in a cloud computing environment. The cloud-based web application firewall will also be integrated with the scanner. The first step will be the scanning process followed by filtering unwanted request, keeping in mind that these unwanted requests are the virus and attacks coming into the system. In their paper, they have also stated that the firewall can control the web application communication via HTTP based on the rules for authorizing and with the main purpose for it to stop SQL injection, XSS, and other types of similar attacks on the cloud servers [12]. What our research has looked into is one of the WAF available for purchase called Barracuda. This application is very useful as it generates a whole lot of data that is not required for processing based on the traffic flow in which the attackers can come in and out of the system. This application has the ability to scan, put cloud applications and websites behind a state-of-the-art firewall system, and monitor traffic to name some of its core functionalities. When we look at a WAF system for cloud, we must have reports generated in order to do research that is more thorough from where the particular attack is coming from and how these attacks can be mitigated. The WAF provides a solution to every attack or vulnerability that is present in the generated report as well. This firewall will be able to stop unwanted traffic into the system, keep the cloud servers safe, and transfer those IP addresses that are suspicious to the suspicious list from the whitelist causing it to be classified as a threat [14]. The users can do online banking securely and other tasks that they would prefer to be done under a secure application layer.
\nEmail security is being implemented in clouds as well. It has major advantages. Any inbound and outbound emails will need to go through email security protocols to ensure that the user sending and receiving the email does not contain any type of malicious data, which can affect the customers’ online activity in any way. This could also lead to having a bad impact on web servers as well if proper security protocols are not in place to filter malicious emails. Cases of security policies need to be implemented in order to run the workflow of emails and filtering unwanted emails [15].
\nAs outlined in the paper published as from Barracuda itself, using such application will not limit the functionalities of email security being deployed in the cloud servers. Some things to notice about the paper is that they have outlined the suit for the cloud services with the following combinations for the advanced package, multilayer security which extends the protection for the email also being integrated with Office 365 which is currently being well-known for its cooperative feature for an organization provided by Microsoft. Multilayer security is one of the core features that the email security giant company looks in depth, for the application itself is being a guard against threats arising from emails, data loss protection through spam emails, data being leaked with encryption, and all the email contents being inspected. Another advanced feature that they explained in their paper was cloud-based archiving. This feature is very important, and emails need to be archived frequently for an organization. Such feature in the cloud will enable users to retrieve any previous email at any time from any device, and this can be from any cloud environment whether it being the hybrid cloud-based environment, Microsoft 365, Microsoft Exchange, and even any other types of email service being used on-premise. They also mentioned retrieving emails such as cloud-based backup and recovery features. This feature will allow the administrators to retrieve any email from the frequent backup storage and send it to the live server so that the user requesting for the email can view and retrieve their contents for that particular email [16].
\nAccording to Rawezh Tara and Nashwans’ paper based on private cloud and implementation of software, routing in it identifies the use of virtual private network (VPN), which enables the ability to ensure that the user who is logged into the cloud service can do their online transactions without any issues. The attackers will not be able to judge where or how the data is being transferred to. This creates a secure environment for customers doing online shopping or banking. It is a good practice to provide VPN to users who are already logged into cloud service. Each user will have a VPN client profile. Using this they can establish the VPN connection, and a secure tunnel is enabled, and authentication is being done on the data center firewall end [17].
\nOnly two types of users use VPN tunnel, which will be the employees and the cloud administrator. The VPN tunnel works as the employee will establish a secure connection through a VPN tunnel; the employee will then login to the VPN client profile using username and password. The authentication is verified with the security policies and the data center. Once the connection is successful, the remote client is connected to the cloud and is ready to utilize the resources and services offered by the application itself. The login of the user will fail if the user is not a valid user, which is checked in the system mainly through the active directory [18]. This type of secure login is highly desirable and is present in the Barracuda application, which was also tested while carrying out this research. It not only protects the user’s data, but the users who login into the system through VPN tunnel can be rest assured that they can perform their task without anyone capturing their information.
\nEncryptions ensure that the data, which are available in the cloud, is secure. Although there are many types of encryption techniques available, attribute-based encryption will provide favorable results. This provides access control with a private key, master key, and ciphers text [19].
\nFurthermore, as proposed a clear explanation of encryption by Rohit, Rituparna, Nabendu, and Sugata research paper based on security issues in cloud computing, they outline the very important aspect of how the encryption can occur in a cloud-based environment. The argument raised is that that data that is stored in the cloud is secure enough towards any type of security breach. They come up with utilizing homomorphed token, which can help secure data through encrypting by private and public keys, respectively. The trust-based methods for the cloud environment are very valuable towards secure private and public key exchange over a secure seamless synchronized connection. Moving on to further discuss encryption supposedly if data is not encrypted, spoofing attacks can take place. Such attacks can be checked by performing user authentication based on key exchange and even encryption techniques [20]. By enabling encryption sessions with filtering at the entrance of traffic management, such attacks can be avoided. Encryption plays a very important part in securing the cloud services with its unique ability to transform the data into cipher which makes the attackers difficult or almost impossible to alter the data.
\nInformation security relates to gathering the alerts which come about the cloud service monitoring tools. Logs get created for the events. Being a central point, cloud computing is able to handle the information stored and how it gets altered by malicious activity which leads to a crisis situation. If an alert gets ignored, it becomes a golden opportunity for attackers to exploit the cloud services and can access the data of customers. If such a case does happen, the admin must take immediate actions and retrieve data backups. Cloud computing can aid in the seamless transfer of the information to a backup server which will store the information of all the customers. Cloud IaaS is a possible direction of data backup in which data needs to be firmly protected as it should be a specialized cloud-based backup server [21].
\nIntrusion management looks after the packets coming in and going out of the network. It has got a set of predefined rules which can handle a particular event. A cloud service provider needs to have an intrusion management tool such as anomaly detection. This type of detection system trains itself by observing network behaviors. It identifies the class level for the intrusion whether normal or intrusion, based on the network packets. If an intrusion is found, it should send a warning to the alert or information security system for further action [22]. Hadoop is an open source software, which is becoming popular with cloud administrators. Hadoop is used to distribute processing of big data using MapReduce. MapReduce is a model which can perform analysis very quickly to locate the malicious activity and the area in which the attack occurs [23].
\nDisaster management in collaboration with disaster recovery relates to cloud data storage in its servers. One must be prepared for it; thus, disaster rescue management can be put in place by the hosting providers in the cloud servers. Attackers can disrupt services by sending malicious requests to the server if there are no strong security policies placed, and they can create downtime of the server as the servers can get overloaded through it. For natural disasters, cloud hosting providers can place their data centers at geographical locations so that if one center gets affected, another will pick up and prevent downtime of services [24].
\nLooking at an infrastructure point of view, we picked Veeam, a software product developed by Veeam organization itself to replicate, backup, and restore data on virtual machines. It has a lot of capabilities as it pools together one of the leading backup services for a cloud infrastructure. Having the ability to replicate with advanced monitoring, reporting tools, and capacity planning functionality, Veeam is highly desirable to be used for a disaster management tool.
\nBased on the research ideas provided, we have used qualitative research method, and the theory we have decided to use is as follows. A local user agent is created by the user to establish a temporary security certificate for safe authentication over a given period of time. This certificate will contain the username, user id, security features, hostname, session times, and other relevant features. Once this is done, the authorization for the user is finalized. As the user will start to use the resources on the cloud, mutual authentication will initiate between the cloud application and user. The application will check if the certificate is valid for the user, a security policy is applied to it. As per the requirements stated by the user, the application will create a list of service resources which will send it to the user. Finally, through an application programming interface (API) security used by the application, the user’s session will be fully initiated and connect to cloud services [4, 13].
\n\nFigure 1 describes the method for secure connection with a trusted certificate in a cloud environment and describes its successful implementation as well as usage of cloud resources.
\nModel for secure connection with a trusted certificate in a cloud environment.
Some of the research questions we have identified are as follows:
Which security protocols you have placed in your cloud architecture to ensure a seamless connection between users does not result in online data theft?
In case an attack on the cloud service occurs, how will the server mitigate those attacks?
Is there a disaster recovery management tool in place for the cloud servers? If so then what procedures will be followed to ensure that there is little or no downtime?
Are the cloud services running behind a trusted firewall? If yes, then how does the firewall report incidents as logs to the administrators and is the firewall artificially intelligent enough to challenge such difficulties?
Our research came up with some cost analysis based on cloud infrastructure. The below details were developed for a cloud-based premise comparing both private and public cloud. Shown below is the cost for Azure sizing based on the requirements; the cost is higher than the private cloud infrastructure with much higher requirements (Figure 2).
\nCost analysis with Azure vs. private cloud infrastructure based on resource requirement.
Shown below is virtual storage area network for a hyper-converged solution which is the most popular infrastructure technology in the current market according to Gartner report. This is very helpful for cloud-based organization to grow as it exceedingly with a lot of resources available for use in the cloud deployment models itself (Figure 3).
\nVirtual storage area network for a hyper-converged solution.
The screenshot shown below shows the virtual machine on a cloud premise. When a user wants to purchase a virtual machine, the cost related to the resources requested will be shown on the cloud interface and can be upgraded as well when one wants to deploy a virtual machine in their cloud (Figures 4 and 5).
\nBilling and purchase interface when requesting a virtual machine in a cloud-based environment.
Costing for a cloud infrastructure with a disaster recovery package.
The focus of this research is on distributed denial of service (DDoS) attacks on the cloud. The authors researched on existing cloud security solutions and also present an implementable solution focusing on DDoS mitigation for IT infrastructure. The authors define the scope and recommend few focus areas:
Defending volumetric attacks is a need for cloud components.
Blocking application-level attacks without submitting SSL Key.
Deploying acceptable network infrastructure as per IT security policy.
DDoS attack mitigation solutions are discussed here based on design perspective:
Cannot discover and block application layer attacks and slow attack.
Unable to defend stateful infrastructure structures like firewalls or IPS.
Unable to deal with attacks like software layer attack, state exhaustion, and multi-vector attacks.
Widest security coverage that can simplest be finished by means of combining on-premise and cloud insurance.
Shortest reaction time by using an on-premise solution that begins right away and mechanically to mitigate the assault.
Single touch point during an attack both for on-premise and cloud mitigation.
Scalability—each tier is impartial of the other and can scale horizontally, in case there is a web application attack spike, adding extra WAF devices to ensure enough WAF capability may be done within the application defense tier without affecting the community tier.
Performance—on the grounds that requests come in tiers, network utilization is minimized, and load decreased overall.
Availability—with hybrid solutions, if the first or second tier is down, at least there is one tier left to serve consumer requests. This satisfies the BCP of the organisation.
Vendor independence—community and application protection infrastructure can setup the usage of hardware structures or even specific software program versions.
Policy independence—while new policies are implemented at the application defense tier, the opposite tier directs simplest that specific visitors in the direction of the rules until they are established and ready for production use.
Based on the developing threats and effect of attacks, company firms having their very own cloud services as well as cloud providers put into effect DDoS mitigation using hybrid cloud architecture. When there are multi-vector DDoS attacks targeted at layers 3, 4, and 7, mitigation strategies are essential. These mitigation strategies assist in detecting and preventing volumetric, software, and encrypted assault vectors. By making use of public cloud capabilities to cover for scalability taking on floods and appearing because the first point of defense with community and web application firewalls detecting assault visitors and mitigating the DDoS threats and the SaaS utility, web portals and backend database resides stable in the residence private statistics center. For this research, the experimental environment involved community infrastructure architectures being designed and setup to testing the proposed DDoS solution having the following hardware and software:
Cisco 4000 ISR Series Routers and Cisco Nexus 5000 Series Switch for routing and switching
Big IP LTM-4200 for high-performance application traffic load management
Cisco Firepower FPR-2110, Imperva Web Application Firewall Gateway with Manager Console
HP DL-360G8 1U-Rackmount with Intel E5, 128 GB DDR3, 32 TB SSD Servers
VMware NSX-T 3.0 virtualization software on bare-metal HP Server
SaaS Application running Windows Server 20012 64-bit OS
Front End Web Portal with .NET supporting 2-Factor authentication
Back End Database running Microsoft SLQ Datacenter license on Windows 2012 OS
DDoS Tools for attack simulation: LOIC or Low Orbit Ion Canon, HOIC or High Orbit Ion Canon, Packet Storm (HTTP Unbearable Load King), Are You Dead Yet (R.U.D.Y), Motoma IO’s PyLoris, Slowloris and TOR’s Hammer
The networks were tested by community and alertness layer attacks with the use of ICMP flooding with a thousand echo requests with increasing buffer size from 3700 to 3805 bytes. The use of DDoS attacks such as LOIC, R.U.D.Y, and slowloris that simulated attacks denied valid users to get admission to the web software portal. When performing the simulated DDoS assaults, the real user monitoring records are taken as the standards, and parameters have been amassed for the logs to assist generated graphs for DDoS attacks. These parameters had been chosen due to the fact that they decide what performance problems the real users are experiencing on the site for the time being in actual time during an assault.
\n\n
Average ICMP latency (milliseconds) before and during the course of DDoS attacks on the apps
Page load response that refers to time the app pages take to load and figuring out where exactly the time is spent from the time a user logs authenticates and logs in to until the page has loaded completely
App response relates to the percentage time for a page load process to complete
Status codes are gathered from the HTTP reputation codes the web server makes use of to communicate with the web browser or person agent
The first framework was structured and implemented in the form of a single inbound and exit gateway. This mimicked the single-tiered level system including standard system design, directing the interfacing with an online interface containing the front end and back end. This simulated the standard cloud-based condition having a basic standard system configuration actualized in a server farm with hardware devices mentioned in the setup environment above (Figure 6).
\nTraditional architecture design (single-tier).
Using the standard design, single-tiered architecture, multi-vector DDoS attacks were executed as network floods and volumetric and application layer 7 attacks. These critically overloaded and degraded the computing systems leading to access issues for legitimate users. Logs and data gathered for each attack are displayed below for reference (Figures 7–9).
\nSingle-tier DDoS attack logs.
Single-tier attack results.
Single-tier results (with and without network security).
The second infrastructure was designed as per the proposed design having three unique tiered designs. Each tier has different IP address schemes and communicates with others via site-to-site VPN. This design simulated public and private cloud integration. The first two tiers focused only on security protection against network and application layer attacks. The third tier only focused on access to the hosted SaaS application with database backend:
The first Tier is built around layers 3 and 4 network defense system for IP and TCP defense using hardware firewalls and load balancer. This tier mitigates ICMP (Ping), UDP, or SYN flood attacks.
The second Tier provides layer 7 application defense using web application firewalls and customized load balancing rules along with SSL termination. This tier mitigated ARP spoofing, POST Flood, and DNS poisoning and detected malwares from inbound user traffic.
Once both network and application attacks are cleaned from the traffic, only legitimate user traffic remained. This traffic is directed to access the private tier cloud (or the third tier), hosting only the SaaS Web portal. After processing and completing the work, user traffic is again reverted to tier 2 for exit instead of tier 1 and following the same traffic route back to the user. This form of asynchronous routing ensures the attackers are not able to execute denial of service attacks that always have the condition of user traffic having the same inbound and outbound gateway and traffic routes (Figure 10).
Proposed three-tier architecture.
DDoS assaults were performed at first on the single-level system plan and our proposed three-level system structure and assembled result that demonstrate our proposed half-breed cloud configuration having the main level for accepting inbound traffic from clients and aggressors with layers 3 and 4 gadgets and performing system assault alleviation, utilizing a system firewall blocking ICMP floods. The inbound traffic was then permitted to stream to the second level which alleviated application-level assaults utilizing a WAF. Here utilizing F5 and Cisco gadgets intelligently, we had the option to square 80% of the assaults. This was assembled subsequent to contrasting the assault information and single-level system arrangement. The three-level system configuration is executed in a test server farm with Cisco and F5 arrange gadgets for steering, VPN, and exchanging. We utilized VMware and Microsoft operating system servers with a SQL server as backend database to mimic cloud-based SaaS applications. DDoS assault reproductions were performed on the three-level engineering to check the patterns for system and application-level outcomes after the assaults. ICMP flooding was performed with 1000 reverberation demands each with expanding support size (3600–3800 bytes) with each assault. They made the objective server to react and process the ICMP demands, taking cost of CPU assets and at last square substantial solicitations. Application-level assaults were finished utilizing HTTP Flood GET assault with expanding string check and 1200 reverberation demands utilizing “GET/application/?id=479673msg=BOOM%2520HEADSHOT! HTTP/1.1Host: IP” and moderate attachment development mimicking moderate HTTP assault utilizing perl with logs taken from Wireshark.
\nDevice logs gathered for each attack are illustrated in Figure 11.
\nThree-tier logs (network attack).
DDoS attacks were performed on single-tier and the proposed three-tier infrastructure architecture and results gathered for real user monitoring parameters during the network attacks (Figure 12).
\nNetwork and web defense trends.
The below data and graphs illustrate the network firewall and application layer logs and graphs for the DDoS attack performed on single-tier data center architecture in order to determine the resilience for handling DDoS attacks. In Figure 13 network firewall defense is implemented after attack#2 with ICMP, page load, browser throughput, and application response as the key values.
\nSingle-tier attack parameters.
\nFigure 14 illustrates real user monitoring values obtained during an application layer attack on single-tier network infrastructure in which application firewall defense is implemented after attack#2 with ICMP, page load, browser throughput, and application response key values.
\nSingle-tier application attack logs.
Results of single-tier architecture attacks obtained before and during the DDoS attack are presented in Figure 15. This has the average ICMP, browser throughput, page load response, and application server response.
\nSingle-tier network attack parameters.
DDoS attacks are performed on the designed network architectures and network and application attack results obtained before and after attack scenarios. Network attacks like ICMP flood are done with 1000 ICMP echo requests with each increasing the attack buffer size from 3700 to 3805 bytes. Application attack like HTTP Flood attack is done by increasing the thread count by “
Three-tier attack logs.
Results of three-tier architecture attacks obtained before and during the DDoS attack are presented in Figure 17. This has the average ICMP, browser throughput, page load response, and application server response.
\nThree-tier architecture attack parameter results.
The graph in Figure 18 presents the results of three-tier architecture attacks obtained before and during DDoS attack for ICMP response.
\nReal user monitoring for ICMP (single- and three-tier).
Results of three-tier architecture attacks obtained before and during DDoS attack for page load response is presented in Figure 19.
\nReal user monitoring for page load response (single- and three-tier).
Results of three-tier architecture attacks obtained before and during DDoS attack for browser throughput are presented in Figure 20.
\nReal user monitoring for browser throughput (single- and three-tier).
Results of three-tier architecture attacks obtained before and during DDoS attack for application server response is presented in Figure 21.
\nReal user monitoring for application server responses.
The below graph displays the availability trend metrics obtained after performing the DoS attacks on the two architectures for network and application layer design (Figure 22).
\nSaaS availability monitor.
After analyzing the infrastructure, we now focus on what the cloud infrastructure has to offer for implementation (Figures 23–25).
Firewall → Prevent threats entering the network from outside.
Active directory → Authentication, authorization, and group policies for access management.
Web application firewall → Protects web servers and manages the incoming and outgoing requests.
Web Security Gateway → Web proxy filters manage and monitor websites visited by users in network.
Email security → Scans, monitors, and protects emails incoming and outgoing.
Populated report for file server access activity on cloud-based premises.
Threats blocked based on the requests coming into the cloud system.
Logs displaying the threat level with its warning on a cloud-based setup.
Web application firewall (WAF) prevents DDoS attack including SQL injection and XSS attacks to name a few. This is integrated with the implementation as shown in Figure 26.
\nShows how an attack gets categorized in the WAF.
According to our findings and our recommendations having a private cloud, setup is best suited for the larger organizations due to the limitations of going on public cloud infrastructure in terms of bandwidth, data confidentiality, cost of Internet, and cost of its recommended with requirements for infrastructure itself on a public cloud. Setting up a private cloud helps organizations to mitigate risk with confidence and keep 100% control changes to the platform. However, not forgetting the security risks associated with a private cloud infrastructure in areas such as web application firewalls, web security gateways, main gateway firewall, end point security protection, etc., it is essential to have these security appliances implemented with the infrastructure to maintain and protect the cloud environment from outside threats.
\nIntechOpen’s team of Scientific Advisors supports the publishing team by providing editorial and academic input and ensuring the highest quality output of free peer-reviewed articles. The Boards consist of independent external collaborators who assist us on a voluntary basis. Their input includes advising on new topics within their field, proposing potential expert collaborators and reviewing book publishing proposals if required. Board members are experts who cover major STEM and HSS fields. All are trusted IntechOpen collaborators and Academic Editors, ensuring that the needs of the scientific community are met.
",metaTitle:"STM Publishing and Free Peer Reviewed Articles | IntechOpen",metaDescription:"IntechOpen’s scientific advisors support the STM publishing team by offering their editorial input, ensuring a consistent output of free peer reviewed articles.",metaKeywords:null,canonicalURL:"scientific-advisors",contentRaw:'[{"type":"htmlEditorComponent","content":"\\n"}]'},components:[{type:"htmlEditorComponent",content:'
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRisIQAS/Profile_Picture_1626166543950",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:6630},{group:"region",caption:"Middle and South America",value:2,count:5913},{group:"region",caption:"Africa",value:3,count:2404},{group:"region",caption:"Asia",value:4,count:12563},{group:"region",caption:"Australia and Oceania",value:5,count:1009},{group:"region",caption:"Europe",value:6,count:17574}],offset:12,limit:12,total:132971},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{sort:"dateEndThirdStepPublish",topicId:"8,6"},books:[{type:"book",id:"11645",title:"Neural Tube Defects",subtitle:null,isOpenForSubmission:!0,hash:"08d6ba70d97767769a97cfeeb52dac78",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11645.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12073",title:"Solvents",subtitle:null,isOpenForSubmission:!0,hash:"d31c0b4deb8e2005ddefc42a4be8e451",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12073.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12074",title:"Updates on Titanium Dioxide",subtitle:null,isOpenForSubmission:!0,hash:"8642ed95890654474416a163e3236afb",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12074.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12075",title:"Arsenic",subtitle:null,isOpenForSubmission:!0,hash:"a1156f4143737baa68f568837f9edc94",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12075.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12076",title:"Ruthenium",subtitle:null,isOpenForSubmission:!0,hash:"08bd1ab70c296e319165eb763b112e00",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12076.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12077",title:"Heavy Metals",subtitle:null,isOpenForSubmission:!0,hash:"bcf87da8936c737e7fdd61cdc825128e",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12077.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12079",title:"Heterocycles",subtitle:null,isOpenForSubmission:!0,hash:"fcadb070d3dbdf21157b1290d9880c3e",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12079.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12080",title:"Density Functional Theory",subtitle:null,isOpenForSubmission:!0,hash:"fcd6287912c74f409babc8937c6d0fd1",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12080.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11561",title:"Zeolite From Wastes - New Perspectives on Innovative Resources and Their Valorization Process",subtitle:null,isOpenForSubmission:!0,hash:"3ed0dfd842de9cd1143212415903e6ad",slug:null,bookSignature:"Dr. Claudia Belviso",coverURL:"https://cdn.intechopen.com/books/images_new/11561.jpg",editedByType:null,editors:[{id:"61457",title:"Dr.",name:"Claudia",surname:"Belviso",slug:"claudia-belviso",fullName:"Claudia Belviso"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12174",title:"Genetic Polymorphisms",subtitle:null,isOpenForSubmission:!0,hash:"5922df051a2033c98d2edfb31dd84f8c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12174.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12177",title:"Epigenetics",subtitle:null,isOpenForSubmission:!0,hash:"185b00910074e8beeedd2276900a911a",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12177.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12214",title:"Phagocytosis",subtitle:null,isOpenForSubmission:!0,hash:"79d7747d6e3aa6a3623ab710a7634588",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12214.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:43},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:12},{group:"topic",caption:"Business, Management and Economics",value:7,count:4},{group:"topic",caption:"Chemistry",value:8,count:24},{group:"topic",caption:"Computer and Information Science",value:9,count:19},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:19},{group:"topic",caption:"Engineering",value:11,count:65},{group:"topic",caption:"Environmental Sciences",value:12,count:9},{group:"topic",caption:"Immunology and Microbiology",value:13,count:11},{group:"topic",caption:"Materials Science",value:14,count:29},{group:"topic",caption:"Mathematics",value:15,count:11},{group:"topic",caption:"Medicine",value:16,count:128},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:9},{group:"topic",caption:"Neuroscience",value:18,count:3},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:6},{group:"topic",caption:"Physics",value:20,count:12},{group:"topic",caption:"Psychology",value:21,count:9},{group:"topic",caption:"Robotics",value:22,count:3},{group:"topic",caption:"Social Sciences",value:23,count:9},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:3}],offset:12,limit:12,total:64},popularBooks:{featuredBooks:[{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11001",title:"Density Functional Theory",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"82d53383af78ab41eb982086c02fb2bb",slug:"density-functional-theory-recent-advances-new-perspectives-and-applications",bookSignature:"Daniel Glossman-Mitnik",coverURL:"https://cdn.intechopen.com/books/images_new/11001.jpg",editors:[{id:"198499",title:"Dr.",name:"Daniel",middleName:null,surname:"Glossman-Mitnik",slug:"daniel-glossman-mitnik",fullName:"Daniel Glossman-Mitnik"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10356",title:"Natural Medicinal Plants",subtitle:null,isOpenForSubmission:!1,hash:"943e56ccaaf19ff696d25aa638ae37d6",slug:"natural-medicinal-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/10356.jpg",editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11752",title:"Natural Drugs from Plants",subtitle:null,isOpenForSubmission:!1,hash:"a0a83c0822608ef7592bf16a5ed0ada4",slug:"natural-drugs-from-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/11752.jpg",editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10584",title:"Engineered Wood Products for Construction",subtitle:null,isOpenForSubmission:!1,hash:"421757c56a3735986055250821275a51",slug:"engineered-wood-products-for-construction",bookSignature:"Meng Gong",coverURL:"https://cdn.intechopen.com/books/images_new/10584.jpg",editors:[{id:"274242",title:"Dr.",name:"Meng",middleName:null,surname:"Gong",slug:"meng-gong",fullName:"Meng Gong"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9670",title:"Current Trends in Wheat Research",subtitle:null,isOpenForSubmission:!1,hash:"89d795987f1747a76eee532700d2093d",slug:"current-trends-in-wheat-research",bookSignature:"Mahmood-ur-Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9670.jpg",editors:[{id:"185476",title:"Dr.",name:"Mahmood-ur-Rahman",middleName:null,surname:"Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-ur-Rahman Ansari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9032",title:"Corporate Social Responsibility",subtitle:null,isOpenForSubmission:!1,hash:"f609bf3251d7cc7bae0099a4374adfc3",slug:"corporate-social-responsibility",bookSignature:"Beatrice Orlando",coverURL:"https://cdn.intechopen.com/books/images_new/9032.jpg",editors:[{id:"232969",title:"Prof.",name:"Beatrice",middleName:null,surname:"Orlando",slug:"beatrice-orlando",fullName:"Beatrice Orlando"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10681",title:"Biodegradation Technology of Organic and Inorganic Pollutants",subtitle:null,isOpenForSubmission:!1,hash:"9a6e10e02788092872fd249436898e97",slug:"biodegradation-technology-of-organic-and-inorganic-pollutants",bookSignature:"Kassio Ferreira Mendes, Rodrigo Nogueira de Sousa and Kamila Cabral Mielke",coverURL:"https://cdn.intechopen.com/books/images_new/10681.jpg",editors:[{id:"197720",title:"Ph.D.",name:"Kassio",middleName:null,surname:"Ferreira Mendes",slug:"kassio-ferreira-mendes",fullName:"Kassio Ferreira Mendes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9808",title:"Contemporary Topics in Patient Safety",subtitle:"Volume 1",isOpenForSubmission:!1,hash:"fb6371607c2c6c02c6a2af8892765aba",slug:"contemporary-topics-in-patient-safety-volume-1",bookSignature:"Stanislaw P. Stawicki and Michael S. Firstenberg",coverURL:"https://cdn.intechopen.com/books/images_new/9808.jpg",editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",middleName:null,surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9544",title:"Global Trade in the Emerging Business Environment",subtitle:null,isOpenForSubmission:!1,hash:"fb8cb09b9599246add78d508a98273d5",slug:"global-trade-in-the-emerging-business-environment",bookSignature:"Muhammad Mohiuddin, Jingbin Wang , Md. Samim Al Azad and Selim Ahmed",coverURL:"https://cdn.intechopen.com/books/images_new/9544.jpg",editors:[{id:"418514",title:"Dr.",name:"Muhammad",middleName:null,surname:"Mohiuddin",slug:"muhammad-mohiuddin",fullName:"Muhammad Mohiuddin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4387},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[],latestBooks:[]},subject:{topic:{id:"296",title:"Textile Engineering",slug:"textile-engineering",parent:{id:"24",title:"Technology",slug:"technology"},numberOfBooks:18,numberOfSeries:0,numberOfAuthorsAndEditors:311,numberOfWosCitations:1446,numberOfCrossrefCitations:676,numberOfDimensionsCitations:1738,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicId:"296",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"10410",title:"Textiles for Functional Applications",subtitle:null,isOpenForSubmission:!1,hash:"5be34ee24510dc6ac217b82f0ce41ab0",slug:"textiles-for-functional-applications",bookSignature:"Bipin Kumar",coverURL:"https://cdn.intechopen.com/books/images_new/10410.jpg",editedByType:"Edited by",editors:[{id:"177114",title:"Dr.",name:"Bipin",middleName:null,surname:"Kumar",slug:"bipin-kumar",fullName:"Bipin Kumar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10203",title:"Dyes and Pigments",subtitle:"Novel Applications and Waste Treatment",isOpenForSubmission:!1,hash:"624f533946a159bc8a03f109c2e1dc91",slug:"dyes-and-pigments-novel-applications-and-waste-treatment",bookSignature:"Raffaello Papadakis",coverURL:"https://cdn.intechopen.com/books/images_new/10203.jpg",editedByType:"Edited by",editors:[{id:"251885",title:"Dr.",name:"Raffaello",middleName:null,surname:"Papadakis",slug:"raffaello-papadakis",fullName:"Raffaello Papadakis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9203",title:"Chemistry and Technology of Natural and Synthetic Dyes and Pigments",subtitle:null,isOpenForSubmission:!1,hash:"126a19fe8435f744b10161895ed51116",slug:"chemistry-and-technology-of-natural-and-synthetic-dyes-and-pigments",bookSignature:"Ashis Kumar Samanta, Nasser S. Awwad and Hamed Majdooa Algarni",coverURL:"https://cdn.intechopen.com/books/images_new/9203.jpg",editedByType:"Edited by",editors:[{id:"42763",title:"Prof.",name:"Ashis Kumar",middleName:null,surname:"Samanta",slug:"ashis-kumar-samanta",fullName:"Ashis Kumar Samanta"}],equalEditorOne:{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad",profilePictureURL:"https://mts.intechopen.com/storage/users/145209/images/system/145209.jpg",biography:"Nasser Awwad received his Ph.D. in inorganic and radiochemistry in 2000 from Ain Shams University . Nasser Awwad was an Associate Professor of Radiochemistry in 2006 and Professor of Inorganic and Radiochemistry in 2011. He has been a Professor at King Khalid University, Abha, KSA, from 2011 until now. Prof Awwad has edited four books (Uranium, New trends in Nuclear Sciences, Lanthanides, and Nuclear Power Plants) and he has co-edited two books (Chemistry and Technology of Natural and Synthetic Dyes and Pigments and Biochemical Analysis Tools). He has also published 205 papers at ISI journals. He has supervised 4 Ph.D. and 18 MSc students in the field of radioactive and wastewater treatment. He has participated in 26 international conferences in South Korea, the USA, Lebanon, KSA, and Egypt. He has reviewed 2 Ph.D. and 15 MSc theses. He participated in 10 big projects with KACST at KSA and Sandia National Labs in the USA. He is a member of the Arab Society of Forensic Sciences and Forensic Medicine. He is a permanent member of the American Chemical Society, and a rapporteur of the Permanent Committee for Nuclear and Radiological Protection at KKU. He is Head of the Scientific Research and International Cooperation Unit, Faculty of Science, King Khalid University.",institutionString:"King Khalid University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"6",totalChapterViews:"0",totalEditedBooks:"4",institution:{name:"King Khalid University",institutionURL:null,country:{name:"Saudi Arabia"}}},equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10147",title:"Waste in Textile and Leather Sectors",subtitle:null,isOpenForSubmission:!1,hash:"36eb1ed7179e0790a029523c97f1df04",slug:"waste-in-textile-and-leather-sectors",bookSignature:"Ayşegül Körlü",coverURL:"https://cdn.intechopen.com/books/images_new/10147.jpg",editedByType:"Edited by",editors:[{id:"255885",title:"Dr.",name:"Ayşegül",middleName:null,surname:"Körlü",slug:"aysegul-korlu",fullName:"Ayşegül Körlü"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8542",title:"Fashion Industry",subtitle:"An Itinerary Between Feelings and Technology",isOpenForSubmission:!1,hash:"88f3d9a82a4972e4bf74cf48490eca31",slug:"fashion-industry-an-itinerary-between-feelings-and-technology",bookSignature:"Riccardo Beltramo, Annalisa Romani and Paolo Cantore",coverURL:"https://cdn.intechopen.com/books/images_new/8542.jpg",editedByType:"Edited by",editors:[{id:"257332",title:"Prof.",name:"Riccardo",middleName:null,surname:"Beltramo",slug:"riccardo-beltramo",fullName:"Riccardo Beltramo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8892",title:"Textile Manufacturing Processes",subtitle:null,isOpenForSubmission:!1,hash:"1437c101708777875352cbfd31f6241b",slug:"textile-manufacturing-processes",bookSignature:"Faheem Uddin",coverURL:"https://cdn.intechopen.com/books/images_new/8892.jpg",editedByType:"Edited by",editors:[{id:"228107",title:"Prof.",name:"Faheem",middleName:null,surname:"Uddin",slug:"faheem-uddin",fullName:"Faheem Uddin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7431",title:"Textile Industry and Environment",subtitle:null,isOpenForSubmission:!1,hash:"be9d70201ab46060419025deb99c16f3",slug:"textile-industry-and-environment",bookSignature:"Ayşegül Körlü",coverURL:"https://cdn.intechopen.com/books/images_new/7431.jpg",editedByType:"Edited by",editors:[{id:"255885",title:"Dr.",name:"Ayşegül",middleName:null,surname:"Körlü",slug:"aysegul-korlu",fullName:"Ayşegül Körlü"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7242",title:"Engineered Fabrics",subtitle:null,isOpenForSubmission:!1,hash:"757cc326df7bcca72c8c850d9f4f71d1",slug:"engineered-fabrics",bookSignature:"Mukesh Kumar Singh",coverURL:"https://cdn.intechopen.com/books/images_new/7242.jpg",editedByType:"Edited by",editors:[{id:"36895",title:"Dr.",name:"Mukesh Kumar",middleName:null,surname:"Singh",slug:"mukesh-kumar-singh",fullName:"Mukesh Kumar Singh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5921",title:"Textiles for Advanced Applications",subtitle:null,isOpenForSubmission:!1,hash:"4deef8de2e616f18c51985a3cafe9acb",slug:"textiles-for-advanced-applications",bookSignature:"Bipin Kumar and Suman Thakur",coverURL:"https://cdn.intechopen.com/books/images_new/5921.jpg",editedByType:"Edited by",editors:[{id:"177114",title:"Dr.",name:"Bipin",middleName:null,surname:"Kumar",slug:"bipin-kumar",fullName:"Bipin Kumar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5086",title:"Textile Wastewater Treatment",subtitle:null,isOpenForSubmission:!1,hash:"793e019e29b364d0daa8031b0800c3c3",slug:"textile-wastewater-treatment",bookSignature:"E. Perrin Akçakoca Kumbasar and Ayşegül Ekmekci Körlü",coverURL:"https://cdn.intechopen.com/books/images_new/5086.jpg",editedByType:"Edited by",editors:[{id:"10485",title:"Dr.",name:"Emriye",middleName:"Perrin",surname:"Akcakoca Kumbasar",slug:"emriye-akcakoca-kumbasar",fullName:"Emriye Akcakoca Kumbasar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5062",title:"Non-woven Fabrics",subtitle:null,isOpenForSubmission:!1,hash:"06787f40748e81d97fb3e8c5370b35a5",slug:"non-woven-fabrics",bookSignature:"Han-Yong Jeon",coverURL:"https://cdn.intechopen.com/books/images_new/5062.jpg",editedByType:"Edited by",editors:[{id:"114618",title:"Prof.",name:"Han-Yong",middleName:null,surname:"Jeon",slug:"han-yong-jeon",fullName:"Han-Yong Jeon"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3137",title:"Eco-Friendly Textile Dyeing and Finishing",subtitle:null,isOpenForSubmission:!1,hash:"78714c655bf80050e9713a50a0581ccb",slug:"eco-friendly-textile-dyeing-and-finishing",bookSignature:"Melih Günay",coverURL:"https://cdn.intechopen.com/books/images_new/3137.jpg",editedByType:"Edited by",editors:[{id:"33126",title:"Dr.",name:"Melih",middleName:null,surname:"Gunay",slug:"melih-gunay",fullName:"Melih Gunay"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:18,seriesByTopicCollection:[],seriesByTopicTotal:0,mostCitedChapters:[{id:"41411",doi:"10.5772/53659",title:"Textile Dyes: Dyeing Process and Environmental Impact",slug:"textile-dyes-dyeing-process-and-environmental-impact",totalDownloads:20534,totalCrossrefCites:92,totalDimensionsCites:299,abstract:null,book:{id:"3137",slug:"eco-friendly-textile-dyeing-and-finishing",title:"Eco-Friendly Textile Dyeing and Finishing",fullTitle:"Eco-Friendly Textile Dyeing and Finishing"},signatures:"Farah Maria Drumond Chequer, Gisele Augusto Rodrigues de Oliveira, Elisa Raquel Anastácio Ferraz, Juliano Carvalho Cardoso, Maria Valnice Boldrin Zanoni and Danielle Palma de Oliveira",authors:[{id:"49040",title:"Prof.",name:"Danielle",middleName:null,surname:"Palma De Oliveira",slug:"danielle-palma-de-oliveira",fullName:"Danielle Palma De Oliveira"},{id:"149074",title:"Prof.",name:"Maria Valnice",middleName:null,surname:"Zanoni",slug:"maria-valnice-zanoni",fullName:"Maria Valnice Zanoni"},{id:"153502",title:"Ph.D.",name:"Farah",middleName:null,surname:"Chequer",slug:"farah-chequer",fullName:"Farah Chequer"},{id:"153504",title:"MSc.",name:"Gisele",middleName:null,surname:"Oliveira",slug:"gisele-oliveira",fullName:"Gisele Oliveira"},{id:"163377",title:"Dr.",name:"Juliano",middleName:null,surname:"Cardoso",slug:"juliano-cardoso",fullName:"Juliano Cardoso"},{id:"163393",title:"Dr.",name:"Elisa",middleName:null,surname:"Ferraz",slug:"elisa-ferraz",fullName:"Elisa Ferraz"}]},{id:"22395",doi:"10.5772/22670",title:"Textile Dyeing Wastewater Treatment",slug:"textile-dyeing-wastewater-treatment",totalDownloads:61265,totalCrossrefCites:59,totalDimensionsCites:141,abstract:null,book:{id:"528",slug:"advances-in-treating-textile-effluent",title:"Advances in Treating Textile Effluent",fullTitle:"Advances in Treating Textile Effluent"},signatures:"Zongping Wang, Miaomiao Xue, Kai Huang and Zizheng Liu",authors:[{id:"48655",title:"Dr.",name:"Zongping",middleName:null,surname:"Wang",slug:"zongping-wang",fullName:"Zongping Wang"},{id:"137783",title:"Prof.",name:"Miaomiao",middleName:null,surname:"Xue",slug:"miaomiao-xue",fullName:"Miaomiao Xue"},{id:"137784",title:"Prof.",name:"Kai",middleName:null,surname:"Huang",slug:"kai-huang",fullName:"Kai Huang"},{id:"137785",title:"Prof.",name:"Zizheng",middleName:null,surname:"Liu",slug:"zizheng-liu",fullName:"Zizheng Liu"}]},{id:"23051",doi:"10.5772/21341",title:"Dyeing of Textiles with Natural Dyes",slug:"dyeing-of-textiles-with-natural-dyes",totalDownloads:48102,totalCrossrefCites:16,totalDimensionsCites:91,abstract:null,book:{id:"1351",slug:"natural-dyes",title:"Natural Dyes",fullTitle:"Natural Dyes"},signatures:"Ashis Kumar Samanta and Adwaita Konar",authors:[{id:"42763",title:"Prof.",name:"Ashis Kumar",middleName:null,surname:"Samanta",slug:"ashis-kumar-samanta",fullName:"Ashis Kumar Samanta"},{id:"50085",title:"Mr.",name:"Adwaita",middleName:null,surname:"Konar",slug:"adwaita-konar",fullName:"Adwaita Konar"}]},{id:"12253",doi:"10.5772/10465",title:"Composites Based on Natural Fibre Fabrics",slug:"composites-based-on-natural-fibre-fabrics",totalDownloads:27471,totalCrossrefCites:24,totalDimensionsCites:75,abstract:null,book:{id:"3682",slug:"woven-fabric-engineering",title:"Woven Fabric Engineering",fullTitle:"Woven Fabric Engineering"},signatures:"Gianluca Cicala, Giuseppe Cristaldi, Giuseppe Recca and Alberta Latteri",authors:null},{id:"22392",doi:"10.5772/19872",title:"Azo Dyes and Their Metabolites: Does the Discharge of the Azo Dye into Water Bodies Represent Human and Ecological Risks?",slug:"azo-dyes-and-their-metabolites-does-the-discharge-of-the-azo-dye-into-water-bodies-represent-human-a",totalDownloads:11690,totalCrossrefCites:17,totalDimensionsCites:66,abstract:null,book:{id:"528",slug:"advances-in-treating-textile-effluent",title:"Advances in Treating Textile Effluent",fullTitle:"Advances in Treating Textile Effluent"},signatures:"Farah Maria Drumond Chequer, Daniel Junqueira Dorta and Danielle Palma de Oliveira",authors:[{id:"49040",title:"Prof.",name:"Danielle",middleName:null,surname:"Palma De Oliveira",slug:"danielle-palma-de-oliveira",fullName:"Danielle Palma De Oliveira"},{id:"36612",title:"Dr.",name:"Farah",middleName:"Drumond",surname:"Chequer",slug:"farah-chequer",fullName:"Farah Chequer"},{id:"88318",title:"Prof.",name:"Daniel",middleName:null,surname:"Junqueira Dorta",slug:"daniel-junqueira-dorta",fullName:"Daniel Junqueira Dorta"}]}],mostDownloadedChaptersLast30Days:[{id:"68157",title:"Introductory Chapter: Textile Manufacturing Processes",slug:"introductory-chapter-textile-manufacturing-processes",totalDownloads:4361,totalCrossrefCites:13,totalDimensionsCites:23,abstract:null,book:{id:"8892",slug:"textile-manufacturing-processes",title:"Textile Manufacturing Processes",fullTitle:"Textile Manufacturing Processes"},signatures:"Faheem Uddin",authors:[{id:"228107",title:"Prof.",name:"Faheem",middleName:null,surname:"Uddin",slug:"faheem-uddin",fullName:"Faheem Uddin"}]},{id:"41411",title:"Textile Dyes: Dyeing Process and Environmental Impact",slug:"textile-dyes-dyeing-process-and-environmental-impact",totalDownloads:20541,totalCrossrefCites:92,totalDimensionsCites:299,abstract:null,book:{id:"3137",slug:"eco-friendly-textile-dyeing-and-finishing",title:"Eco-Friendly Textile Dyeing and Finishing",fullTitle:"Eco-Friendly Textile Dyeing and Finishing"},signatures:"Farah Maria Drumond Chequer, Gisele Augusto Rodrigues de Oliveira, Elisa Raquel Anastácio Ferraz, Juliano Carvalho Cardoso, Maria Valnice Boldrin Zanoni and Danielle Palma de Oliveira",authors:[{id:"49040",title:"Prof.",name:"Danielle",middleName:null,surname:"Palma De Oliveira",slug:"danielle-palma-de-oliveira",fullName:"Danielle Palma De Oliveira"},{id:"149074",title:"Prof.",name:"Maria Valnice",middleName:null,surname:"Zanoni",slug:"maria-valnice-zanoni",fullName:"Maria Valnice Zanoni"},{id:"153502",title:"Ph.D.",name:"Farah",middleName:null,surname:"Chequer",slug:"farah-chequer",fullName:"Farah Chequer"},{id:"153504",title:"MSc.",name:"Gisele",middleName:null,surname:"Oliveira",slug:"gisele-oliveira",fullName:"Gisele Oliveira"},{id:"163377",title:"Dr.",name:"Juliano",middleName:null,surname:"Cardoso",slug:"juliano-cardoso",fullName:"Juliano Cardoso"},{id:"163393",title:"Dr.",name:"Elisa",middleName:null,surname:"Ferraz",slug:"elisa-ferraz",fullName:"Elisa Ferraz"}]},{id:"70564",title:"Fundamentals of Natural Dyes and Its Application on Textile Substrates",slug:"fundamentals-of-natural-dyes-and-its-application-on-textile-substrates",totalDownloads:2875,totalCrossrefCites:9,totalDimensionsCites:20,abstract:"The meticulous environmental standards in textiles and garments imposed by countries cautious about nature and health protection are reviving interest in the application of natural dyes in dyeing of textile materials. The toxic and allergic reactions of synthetic dyes are compelling the people to think about natural dyes. Natural dyes are renewable source of colouring materials. Besides textiles it has application in colouration of foods, medicine and in handicraft items. Though natural dyes are ecofriendly, protective to skin and pleasing colour to eyes, they are having very poor bonding with textile fibre materials, which necessitate mordanting with metallic mordants, some of which are not eco friendly, for fixation of natural dyes on textile fibres. So the supremacy of natural dyes is somewhat subdued. This necessitates newer research on application of natural dyes on different natural fibres for completely eco friendly textiles. The fundamentals of natural dyes chemistry and some of the important research work are therefore discussed in this review article.",book:{id:"9203",slug:"chemistry-and-technology-of-natural-and-synthetic-dyes-and-pigments",title:"Chemistry and Technology of Natural and Synthetic Dyes and Pigments",fullTitle:"Chemistry and Technology of Natural and Synthetic Dyes and Pigments"},signatures:"Virendra Kumar Gupta",authors:[{id:"305259",title:"Dr.",name:"Virendra",middleName:null,surname:"Kumar Gupta",slug:"virendra-kumar-gupta",fullName:"Virendra Kumar Gupta"}]},{id:"49647",title:"Fiber Selection for the Production of Nonwovens",slug:"fiber-selection-for-the-production-of-nonwovens",totalDownloads:10453,totalCrossrefCites:9,totalDimensionsCites:17,abstract:"The most significant feature of nonwoven fabric is made directly from fibers in a continuous production line. While manufacturing nonwovens, some conventional textile operations, such as carding, drawing, roving, spinning, weaving or knitting, are partially or completely eliminated. For this reason the choice of fiber is very important for nonwoven manufacturers. The commonly used fibers include natural fibers (cotton, jute, flax, wool), synthetic fibers (polyester (PES), polypropylene (PP), polyamide, rayon), special fibers (glass, carbon, nanofiber, bi-component, superabsorbent fibers). Raw materials have not only delivered significant product improvements but also benefited people using these products by providing hygiene and comfort.",book:{id:"5062",slug:"non-woven-fabrics",title:"Non-woven Fabrics",fullTitle:"Non-woven Fabrics"},signatures:"Nazan Avcioglu Kalebek and Osman Babaarslan",authors:[{id:"119775",title:"Prof.",name:"Osman",middleName:null,surname:"Babaarslan",slug:"osman-babaarslan",fullName:"Osman Babaarslan"},{id:"175829",title:"Dr.",name:"Nazan",middleName:null,surname:"Kalebek",slug:"nazan-kalebek",fullName:"Nazan Kalebek"}]},{id:"41409",title:"Surface Modification Methods for Improving the Dyeability of Textile Fabrics",slug:"surface-modification-methods-for-improving-the-dyeability-of-textile-fabrics",totalDownloads:7016,totalCrossrefCites:13,totalDimensionsCites:36,abstract:null,book:{id:"3137",slug:"eco-friendly-textile-dyeing-and-finishing",title:"Eco-Friendly Textile Dyeing and Finishing",fullTitle:"Eco-Friendly Textile Dyeing and Finishing"},signatures:"Sheila Shahidi, Jakub Wiener and Mahmood Ghoranneviss",authors:[{id:"58854",title:"Dr.",name:null,middleName:null,surname:"Shahidi",slug:"shahidi",fullName:"Shahidi"}]}],onlineFirstChaptersFilter:{topicId:"296",limit:6,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},subscriptionForm:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[],offset:0,limit:8,total:null},allSeries:{pteSeriesList:[],lsSeriesList:[],hsSeriesList:[],sshSeriesList:[],testimonialsList:[]},series:{item:{id:"25",title:"Environmental Sciences",doi:"10.5772/intechopen.100362",issn:"2754-6713",scope:"
\r\n\tScientists have long researched to understand the environment and man’s place in it. The search for this knowledge grows in importance as rapid increases in population and economic development intensify humans’ stresses on ecosystems. Fortunately, rapid increases in multiple scientific areas are advancing our understanding of environmental sciences. Breakthroughs in computing, molecular biology, ecology, and sustainability science are enhancing our ability to utilize environmental sciences to address real-world problems.
\r\n\tThe four topics of this book series - Pollution; Environmental Resilience and Management; Ecosystems and Biodiversity; and Water Science - will address important areas of advancement in the environmental sciences. They will represent an excellent initial grouping of published works on these critical topics.