Code book.
\r\n\t
",isbn:"978-1-83969-558-2",printIsbn:"978-1-83969-557-5",pdfIsbn:"978-1-83969-559-9",doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!0,isSalesforceBook:!1,isNomenclature:!1,hash:"97b6de623f15598880112f6bafedc3e1",bookSignature:"Dr. Robert M.X. Wu",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/11916.jpg",keywords:"Business Models, E-commerce Marketing Strategy, E-commerce Business Models, Digital Transformation, Business Intelligence, E-business Applications, Research, Information System Management, Marketing Management, Electronic Commerce, Internet Marketing, Information Systems",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 26th 2022",dateEndSecondStepPublish:"June 30th 2022",dateEndThirdStepPublish:"August 29th 2022",dateEndFourthStepPublish:"November 17th 2022",dateEndFifthStepPublish:"January 16th 2023",dateConfirmationOfParticipation:null,remainingDaysToSecondStep:"a month",secondStepPassed:!0,areRegistrationsClosed:!1,currentStepOfPublishingProcess:3,editedByType:null,kuFlag:!1,biosketch:'Dr. Wu holds a Ph.D. in e-Commerce, lectures at the School of Engineering and Technology in Australia, and is a Distinguished Professor at Shanxi Normal University, China. In 2011, Dr. Wu was recognized as a ‘Top 100 Outstanding Academic Leader for China’s Informatics’ by the China Informatics Society. He was awarded "Outstanding Contribution in Reviewing" by Q1 Journals such as Electronic Commerce Research and Applications (Elsevier).',coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"190913",title:"Dr.",name:"Robert M.X.",middleName:null,surname:"Wu",slug:"robert-m.x.-wu",fullName:"Robert M.X. Wu",profilePictureURL:"https://mts.intechopen.com/storage/users/190913/images/system/190913.jpg",biography:"Robert M.X. Wu has a diploma in Computer Science, a bachelor’s degree in Economics, and master’s and doctorate degrees in e-Commerce. He is currently lecturing e-commerce / Information Systems at Central Queensland University Australia (CQU). He has led more than ten industry-based research projects since 2012 and contributes to reviewing five A-level Australian Business Deans Council (ABDC) journals and Q1 journals.\r\nIn July 2011, Dr. Wu was recognized as a ‘Top 100 Outstanding Academic Leader for China’s Informatics’ by the China Informatics Society. In 2017 he was appointed Distinguished Professor at Shanxi Normal University, China. He was also awarded ‘Outstanding Contribution in Reviewing’ in 2016 and 2018 by the Electronic Commerce Research and Applications journal (Elsevier) and ‘Student Voice Commendation – EDUCATORS of THE YEAR 2020’ for Emerging Technologies in E-Business, CQU.",institutionString:"Central Queensland University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Central Queensland University",institutionURL:null,country:{name:"Australia"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"9",title:"Computer and Information Science",slug:"computer-and-information-science"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"440204",firstName:"Ana",lastName:"Cink",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/440204/images/20006_n.jpg",email:"ana.c@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"9546",title:"E-Business",subtitle:"Higher Education and Intelligence Applications",isOpenForSubmission:!1,hash:"f36f73e0d1eee6ab21c285209ba01734",slug:"e-business-higher-education-and-intelligence-applications",bookSignature:"Robert M.X. Wu and Marinela Mircea",coverURL:"https://cdn.intechopen.com/books/images_new/9546.jpg",editedByType:"Edited by",editors:[{id:"190913",title:"Dr.",name:"Robert M.X.",surname:"Wu",slug:"robert-m.x.-wu",fullName:"Robert M.X. Wu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophile",surname:"Theophanides",slug:"theophile-theophanides",fullName:"Theophile Theophanides"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2270",title:"Fourier Transform",subtitle:"Materials Analysis",isOpenForSubmission:!1,hash:"5e094b066da527193e878e160b4772af",slug:"fourier-transform-materials-analysis",bookSignature:"Salih Mohammed Salih",coverURL:"https://cdn.intechopen.com/books/images_new/2270.jpg",editedByType:"Edited by",editors:[{id:"111691",title:"Dr.Ing.",name:"Salih",surname:"Salih",slug:"salih-salih",fullName:"Salih Salih"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"117",title:"Artificial Neural Networks",subtitle:"Methodological Advances and Biomedical Applications",isOpenForSubmission:!1,hash:null,slug:"artificial-neural-networks-methodological-advances-and-biomedical-applications",bookSignature:"Kenji Suzuki",coverURL:"https://cdn.intechopen.com/books/images_new/117.jpg",editedByType:"Edited by",editors:[{id:"3095",title:"Prof.",name:"Kenji",surname:"Suzuki",slug:"kenji-suzuki",fullName:"Kenji Suzuki"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3828",title:"Application of Nanotechnology in Drug Delivery",subtitle:null,isOpenForSubmission:!1,hash:"51a27e7adbfafcfedb6e9683f209cba4",slug:"application-of-nanotechnology-in-drug-delivery",bookSignature:"Ali Demir Sezer",coverURL:"https://cdn.intechopen.com/books/images_new/3828.jpg",editedByType:"Edited by",editors:[{id:"62389",title:"PhD.",name:"Ali Demir",surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"872",title:"Organic Pollutants Ten Years After the Stockholm Convention",subtitle:"Environmental and Analytical Update",isOpenForSubmission:!1,hash:"f01dc7077e1d23f3d8f5454985cafa0a",slug:"organic-pollutants-ten-years-after-the-stockholm-convention-environmental-and-analytical-update",bookSignature:"Tomasz Puzyn and Aleksandra Mostrag-Szlichtyng",coverURL:"https://cdn.intechopen.com/books/images_new/872.jpg",editedByType:"Edited by",editors:[{id:"84887",title:"Dr.",name:"Tomasz",surname:"Puzyn",slug:"tomasz-puzyn",fullName:"Tomasz Puzyn"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"42376",title:"Monte-Carlo Simulation of Particle Diffusion in Various Geometries and Application to Chemistry and Biology",doi:"10.5772/53203",slug:"monte-carlo-simulation-of-particle-diffusion-in-various-geometries-and-application-to-chemistry-and-",body:'The simulation of systems comprising different types of molecules is of great interest in several fields, notably in chemistry and biological sciences. The conventional approach to simulate biological networks is to write down macroscopic rate equations and solve the corresponding differential equations numerically to obtain the time evolution of molecules concentrations [1-3]. In this method, the system evolution is deterministic, and it is implicitly assumed that the concentrations are large. However, in most biological systems, the concentrations of molecules usually range from nanomolar to micromolar; therefore, the interactions of these molecules are highly stochastic. Recently, various techniques have been developed to take into account the spatial distribution of individual molecules and the stochastic character of reactions between them. Several of these techniques are based on the Green\'s functions of the Diffusion Equation (DE), and they offer the advantage of being able to follow all the particles in time and space. In this book chapter, this method is applied to simple systems in one, two, and three dimensions. Two applications are discussed. The first is the simulation of ligands molecules near a plane membrane comprising receptors with the possibility of dissociation and initiation of signal transduction. The second application of this theory is the simulation of partially diffusion-controlled chemical reactions.
The Green\'s functions of the DE in simple systems under different boundary conditions are known from the theory of heat propagation in solids [4], since the DE and the equation for the propagation of heat are the same. With few assumptions, these Green\'s functions can be used to model particle systems in specific environments.
The DE can be written
where Through the book chapter, variables written in bold are vectors.
where
The limit
To simulate the state of a particle system after one time step, the positions of each particle are calculated by sampling the Green\'s function for the position
where
That is, the probability of a particle to be found at
As seen in a previous paper [5], Equations (4) and (5) have to modified in systems where there is a possibility of binding of particles at the boundaries.
One dimensional (1D) systems are simpler to study than those which are multi-dimensional. They are also of interest since several multi-dimensional systems can be approached as independent 1D systems [6]. In 1D, the DE is:
The initial condition is
The Green\'s function of the DE in 1D for a free particle, noted
This is a Gaussian distribution, with variance
GENERATE | \n\t\t
RETURN | \n\t
The sampling algorithm is used to generate the positions of 1,000,000 particles after one time step. The results are stored in histograms and normalized. The Green\'s functions and the results of sampling are illustrated Through this book chapter, the diffusion coefficient is set to
Green\'s functions
Because the sampling algorithms use random numbers, the simulation results vary from one simulation to another. Usually, the larger the number of histories, the smaller the statistical fluctuation of the results. The algorithms presented in this book chapter are exact, i.e. the simulation results are expected to converge to the analytical Green\'s function at the limit of an infinite number of histories. In practice, 1,000,000 particle histories are usually sufficient to converge to the analytical Green\'s function and to confirm the validity of the algorithm. The time discretization property of the Green\'s function can also be used to validate the algorithm: since a simulation can be done in several time steps, the positions of the particles obtained after the first time step are used as the initial positions for the next step.
As it will be seen in the applications, this system may be used to represent the motion of particles near a membrane. The reflective boundary condition at
The solution of the DE in 1D for this system, noted
This Green\'s function is the sum of two Gaussian distributions. It can be sampled by the method described in Algorithm 2 (given in ref. [8]):
SET | \n\t|
GENERATE uniform [0,1] random variates | \n\t|
IF (U<N0) | \n\t\t|
ELSE | \n\t\t|
RETURN | \n\t
where
Green\'s functions
This system is used to simulate the motion of particles in a confined space. In this case, the reflective boundary conditions at
The Green\'s function of the DE in 1D for a particle between the boundaries, noted
This function is complicated by an infinite sum. However, it is possible to use the following algorithm to generate trajectories of particles in this environment [10]. The algorithm is based on a series method, as described in [11]. For this section the functions
The algorithm is:
DEFINE | \n\t|
REPEAT | \n\t|
{ | \n\t|
\n\t\t | GENERATE | \n\t
\n\t\t | SET Y ← VH | \n\t
} | \n\t|
UNTIL | \n\t|
RETURN | \n\t
The verification of
SET | \n\t\t|
REPEAT FOREVER | \n\t\t|
{ | \n\t\t|
\n\t\t\t | \n\t\t\t\t | \n\t\t
\n\t\t\t | IF ( | \n\t\t
\n\t\t\t | IF ( | \n\t\t
\n\t\t\t | \n\t\t\t\t | \n\t\t
\n\t\t\t | \n\t\t\t\t | \n\t\t
} | \n\t\t
The Green\'s function and the result of sampling for 1,000,000 histories of particles initially located at
Green\'s functions
When time evolves, as illustrated in Figure 3, the particles become uniformly distributed between
Two dimensional (2D) systems are interesting, because the particles trajectories can be visualized in a plane. The DE in 2D can be written:
The initial condition is
This property of the Green’s function allows the simulation of the motion of particles in the direction x and y independently.
The solution of the DE is the product of two Gaussian functions:
Therefore, sampling of this Green\'s function can be done by sampling two Gaussian functions:
GENERATE | \n\t\t
RETURN ( | \n\t
Plotting the Green\'s functions in X and Y would give figures identical to Figure 1. However, in 2D, it is useful to use polar coordinates. That is, the following transformation is used:
The same transformation is done with
This form yields an alternate method to sample the Green\'s function in polar coordinates:
CALCULATE | \n\t||
REPEAT | \n\t||
\n\t\t | GENERATE | \n\t|
\n\t\t | SET | \n\t|
\n\t\t | IF | \n\t|
\n\t\t | ELSE SET R ←ρ+N, where N is standard normal | \n\t|
UNTIL | \n\t||
RETURN ( | \n\t
Algorithm 5 generates variates
It is possible to obtain related distributions such as
where
The factor
where
Distributions
Similar results are found using either algorithm 4 or 5. In 2D, it is possible to represent the time evolution of the particle system (Figure 5).
Positions of 1,000,000 particles initially located at
As in section 4.1, the solution of the DE is the product of two independent 1D reflective Green\'s functions:
The positions of the particles can be sampled by using two applications of Algorithm 2 (for X and Y). An example of the time evolution of 1,000,000 particles is illustrated in Figure 6.
Positions of 1,000,000 particles initially located at
The solution of the DE is also the product of two independent 1D Green\'s functions:
Therefore the positions of the particles can be sampled by using Algorithm 3 for the coordinates x and y.
Positions of 1,000,000 particles initially located at
The particle system depicted in Figure 7 illustrates how particles initially located in a given position will diffuse and eventually become uniformly distributed in the rectangular area.
This problem is of interest to simulate how particles move and/or bind to curved cell membranes comprising receptors. In this section, only the case of the reflective boundary condition is discussed. In polar coordinates, the DE can be written
The reflective boundary condition at
The Green\'s function for a particle initially located at (
where
The normalization of this function is:
We have not been able so far to develop a sampling algorithm for the distribution function
Positions of 1,000,000 particles initially located at
In this example, since an approximate method is used to simulate the motion of particles, the distributions of
It is interesting to note that for
The series which is obtained can be evaluated (http://functions.wolfram.com/ 03.02.23.0007.01):
Thus, for
Three dimensional systems are more complex and harder to visualize. In 3D, the DE can be written in cartesian coordinates as:
The initial condition is
The solution of the DE for free particles is the product of three Gaussian functions:
Since the Gaussian functions are independent, the positions
GENERATE N1, N2, N3 as a standard Normals | \n\t\t
RETURN ( | \n\t
In 3D, it is useful to use spherical coordinates ( The following notation is used: (radial, azimutal, polar). r: [0,∞),θ: [0,π],ϕ: [0,2π).
The differential volume element is given by
The DE can be written in spherical coordinates as:
Using the transformation to spherical coordinates, the Green\'s function of the DE for free particles can be rewritten as:
The angle between the vectors (
Therefore, Eq. (36) can be written in the compact form:
In spherical coordinates, as in 2D, it is possible to obtain related distributions such as
The Green\'s function is the product of three independent 1D Green\'s functions:
As it is the case in 2D, the coordinates
The Green\'s function is also the product of three independent 1D Green\'s functions:
Therefore, the positions of particles can be generated by using Algorithm 3 for each of the coordinates. This sampling algorithm can be used to simulate the trajectories of particles confined into a box of sides
Two applications of the approach described in the previous sections are presented. The first is the simulation of particles near a membrane comprising receptors. The second one is the simulation of chemical reactions. These applications will eventually be used to study the evolution of the chemical species created by ionizing radiations in biological media [14].
To apply the theory described in the chapter to cell culture simulations, it is necessary to make some assumptions. The details of the model presented here and more results are given in ref. [5]. Similar models have been used to study autocrine and paracrine signals in cell culture assays [15], ligand accumulation in autocrine cell cultures [16] and the spatial range of autocrine signaling [17].
A particle is assumed to be located in the proximity of a plane membrane comprising receptors, corresponding to the plane
Ligands near a surface comprising receptors. The rate constants for association, dissociation and initiation of signal transduction are
The binding rate constant (
Since the particles are moving freely in the Y and Z direction, the Green\'s function can be written as the product of the independent functions
A particle can be free at position
where
Similarly, the time evolution of
This problem can be solved analytically by using Laplace Transforms [18]. The solutions are expressed using three coefficients At least one of the roots of a third-order polynomial is real, the two other roots being either real or complex conjugates.
The mathematical expressions of the Green\'s function for a particle in this system are quite long. To simplify the following expressions, the variables
where
It is possible for two of the roots to be complex conjugates. Nevertheless, it is still possible to use the Green\'s function given in Equation (47) by implementing the numerical evaluation of W(x,y) for complex numbers [19].
The probability of survival for a free particle is obtained by integrating
The probability of a particle initially at
A particle initially at
To obtain the Green\'s function of a particle in a reversibly bound state, the material balance condition
The probability of dissociation of a particle that was initially in a reversibly bound state
The probability of a particle initially in a reversibly bound state to stay in this state is given by (ref. [18]):
Finally, the probability of a particle initially in a reversibly bound state to activate signal transduction is:
For some particular values of
A simulation is usually done by dividing the final simulation time in a finite number of time steps. If the simulation can be done in two time steps such as
go to position
go to position
go to position
reversibly bind to the membrane during
reversibly bind to the membrane during
reversibly bind to the membrane during
or
activate signal transduction during
From this the following time discretization equations are obtained:
The first of these equations is similar to the Chapman-Kolmogorov equation, to which a term has been added to account for the possibility of dissociation. Each term of these equations can be associated with the possibilities i-vii. Similarly, a particle initially in a reversibly bound state can:
dissociate to position
dissociate to position
dissociate to position
stay reversibly bound during
stay reversibly bound during
stay reversibly bound during
initiate signal transduction during
This yields the time discretization equations for the bound particle:
These equations are proven in the supplemental material of ref. [5].
Using the Green\'s functions, it is possible to construct a Brownian Dynamics algorithm to simulate the motion and binding of the ligand and the possible initiation of signal transduction. First, it should be noted that A sub-density means that
REPEAT | \n\t\t|
{ | \n\t\t|
\n\t\t\t | GENERATE | \n\t\t
} | \n\t\t|
UNTIL | \n\t\t|
RETURN | \n\t\t
There are also particles which are bound to the membrane. These particles may dissociate with probability
This form is convenient because it is the product of a Gaussian function by a function
CALCULATE H = |α/(γ-α)(α-β)|+|β/(α-β)(β-γ)|+|γ/(β-γ)(γ-α)| | \n\t\t|
REPEAT | \n\t\t|
{ | \n\t\t|
\n\t\t\t | GENERATE U uniform on [0,1], | \n\t
} | \n\t|
UNTIL UH≤g(X) | \n\t|
RETURN X | \n\t
A simulation has been done by using
Left) Probability distribution of a particle near a partially absorbing and reflecting boundary with back reaction for
Bimolecular reactions are an important application of the theory described in the book chapter. Let the particles A and B initially at the positions
The probability distribution is solution of the following equation [2]:
It is convenient at this point to use a transformation of coordinates, similar to a center of mass transformation:
The same transformation is done to
where
Using this factorization, two DE are obtained in
This equation describes two independent random processes - diffusion in the coordinates
This function can be sampled for
where
The exact solution for this problem is given in ref. [4]:
where
and
where
The integral can be evaluated using Weber\'s formula (ref. [13], section 6.633, eq 2):
This equation can be further simplified by using
(ref. [12], p. 368; ref. [13], section 8.511). This yields the following equation:
Therefore,
We were not able to develop a sampling algorithm for
with the boundary condition given by Equation 66. The solution is much simpler in this case:
where
For this system, the time discretization equations takes the form:
where p(*,t|r0)=1-Q(t|r0).
The objective is to generate random variates from
Since
where 1[condition] takes the value 1 when the condition is true, and 0 when it is false. A related function is also defined:
Thus,
where
From this algorithm 8a is obtained:
CALCULATE | \n\t\t
GENERATE a uniform [0,1] random variate | \n\t\t
IF | \n\t
IF | \n\t
IF | \n\t
RETURN | \n\t
The second part is given by Algorithm 8b:
REPEAT | \n\t\t
GENERATE | \n\t\t
Set | \n\t
UNTIL | \n\t
In the former case, RETURN | \n\t
In the latter case, RETURN | \n\t
Algorithm 8 generates numbers with density probability proportional to
a) Green\'s function
The time discretization property of the Green’s functions (Equations 77) are also used to validate the simulation results and the sampling algorithm.
This algorithm is used to sample the length of the separation vector r. To fully caracterize the vector its direction should be specified by the angles
After sampling of the vectors
Ionizing radiation interacts with water molecules and creates radiolytic species, which react with cellular components and eventually lead to biological effects [14]. The precise location of the created radiolytic species are highly dependent of the type and energy of ionizing radiation. Therefore, considerable effort has been devoted to the Monte-Carlo simulation of ionizing radiation tracks, which provides such information [25]. After their formation, the radiolytic species react with each other and with other cellular molecules. Hence, radiation chemistry is a very important link between the radiation track structure and cellular damage and biological effects [26].
The simulation of radiation chemistry is difficult for several reasons. One important problem is the calculation time. Since the number of interactions between
We conclude this section by showing a simulation result of water radiolysis by a 12C6+ ion of 25 MeV/amu [28] in Figure 12. Briefly, the track structure and the position of all the radiolytic species (.OH, H., e-aq, H2, H2O2,..) at ~10-13 s are calculated by the code RITRACKS, described in [25] and references therein. The time evolution of the radiolytic species are calculated by using a step-by-step Monte-Carlo simulation code of radiation chemistry [28-30]. Each dot in Figure 12 represents a radiolytic species. The changes in the colors of the dots indicates that chemical reaction occurs. The number of chemical reactions (the radiolytic yields) which are calculated by the program have been validated with experimental data [30].
Time evolution of the radiolytic species created by a 12C6+ ion track, 25 MeV/amu (LET~75 keV/μm) at 10-13, 10-9, 10-7 and 10-6 s.
The simulations based on the Green\'s function of the DE are able to accurately describe the evolution of particles in time and space in various geometries, even if the number of particles is small. In fact, this approach is now used in several fields. Of particular interest in radiobiology is the study of radiation chemistry, biochemical networks and bimolecular reactions.
The Green\'s functions and their respective sampling algorithms have been presented for simple systems in one, two and three dimensions. Obviously, it is difficult to develop sampling algorithm even for simple systems because of the complex mathematical form of the Green’s functions. However, it is very useful to develop sampling algorithms for systems for which analytical solutions are known, because they can be used to validate future models which will be based on numerical solutions of the DE. The DE can be solved easily by numerical methods such as finite-difference schemes, but these techniques may have restrictions for computational stability and the boundary conditions are often difficult to implement [31]. The systems with complex boundary conditions are particularly relevant to study biological networks. However, as seen in the applications, since the Green\'s functions of systems with complex boundary conditions are often subdensities of the Green\'s functions for the corresponding system with reflective boundary conditions, the rejection method can be used.
The algorithms developed in this chapter are already used to simulate the radiation chemistyoccuring in liquid water [28-30]. In the future, they will allow the validation and verification of future calculations, which will use the numerical solution of the diffusion equation. Eventually, the approach depicted in this book chapter will be used to simulate the time evolution of radiolytic species created by ionizing radiation and their reactions with molecules in biological media [23].
The Nigerian rumour mill is usually on overdrive. It is an industry that is resilient and immune from the vagaries of the Nigerian political and economic climate (Odunfa [1]). The affordances of digital technology have, in no small measure, contributed in weaponizing the Nigerian rumour mill. Now, rumours, misinformation, disinformation and half-truths travel at the speed of light and reach a wider audience. This is the case of xenophobic attacks against Nigerians living in South Africa in 2017 and 2019 in which rumours, mis-and disinformation resulted in reprisal attacks on South African businesses in Nigeria. A typical example of how the Nigerian rumour mill works is the story of a Nigerian, who was among those that attacked South African-owned Shoprite at The Palms Mall in Lagos, Nigeria. When the young man was asked why he joined others to attack Shoprite and other South African businesses in Nigeria, he responded that xenophobia, a Nigerian living in South Africa had been killed by South Africans. Hence, attacking South African businesses was the only way he could get even with the death of xenophobia in South Africa. Even though this story has not been verified, it goes to show the potency of mis-and disinformation and how it could have adverse impact on the government-to-government as well as people-to-people relations between two countries. For instance, mis-and disinformation has been identified as factors responsible for reprisals attacks against South African businesses in other African countries (Osuagwu & Elebeke [2]; Somdyala [3]). Chenzi [4], p. 3 explained that “foreign nationals residing in South Africa share content with their relations who reside outside South Africa about their xenophobic experiences.” He emphasised that the social media content these foreigners often share about xenophobic violence in South Africa at times, turn out to be misinformation, leading to reprisal attacks [4]. However, there is limited academic investigation into the motivation for sharing mis-and disinformation concerning xenophobic attacks against Nigerians living in South Africa on social media. This chapter provides an insight into factor (s) influencing Nigerians to share mis-and disinformation concerning xenophobic attacks on Nigerians living in South. The finding has both academic and policy relevance for the literature on mis-and disinformation as well as South Africa-Nigerian relations.
Xenophobia has attracted widespread attention within and without the academic community. The reason is obvious; it is considered an anomaly that foreigners, particularly Africans, would face the magnitude of hatred that Xenophobia spews. The first major xenophobic outbreak in post-1994 South Africa happened on 11 May 2008 and there have several other outbreaks of violence against foreigners in South Africa. While recent incidents may not be of the same magnitude as the incident of 11 May 2008, its recurrence points to a troubling relationship between locals and foreigners. For instance, on 30 May 2013, 25-year-old Abdi Nasir Mahmoud Good, was stoned to death in Port Elizabeth, Eastern Cape, South Africa. The violence was captured on a mobile phone and shared on the Internet.1 Again, on 7 June 2014, a Somali national was stoned to death and two others were seriously injured when an angry mob of locals attacked their shops in Mamelodi, South Africa. Three more Somalis were wounded by gunshots and their shops were looted.2 In April 2015, there was an upsurge in xenophobic attacks throughout the country. The attacks started in Durban and spread to Johannesburg. Zulu King Goodwill Zwelithini was accused of igniting the attacks with his remarks that foreigners’ resident in the country “should go back to their countries.”3 In October 2015 the serene town of Grahamstown in the Eastern Cape recorded an outbreak of xenophobic attacks on foreigners. According to the news report, more than 500 people were displaced and more than 300 shops and homes looted. Muslims were identified as the target of the attacks.4 While South Africa witnessed a modicum of peace after the Grahamstown xenophobia outbreak, it ruptured in February 2017 when another xenophobia outbreak was recorded in Pretoria, South Africa. The incident took a new turn on 24 February 2017 when a large-scale anti-immigration protest suspected to have official approval, according to the Nelson Mandela Foundation, erupted in the capital city of Pretoria.5 The Protesters marched to the Foreign Ministry and handed a petition to government representatives. Protesters accused immigrants of taking jobs from South Africans, causing crime and complained that “they are arrogant and they don’t know how to talk to people, especially Nigerians.” The February xenophobia outbreak affected many Nigerians resident in Pretoria, who the locals accused of being “arrogant and don’t know how to talk to people.”6 However, xenophobic attacks on Nigerians in South Africa escalated in 2019 resulting in the repatriation of more than 600 Nigerians, who were flown home aboard Nigeria’s Air Peace.7 Both incidents resulted in reprisal attacks in Nigeria but it was more fatal in 2019 resulting in the closure of the South African High Commission, South African-owned Telco, MTN, Shoprite and other South African businesses in Nigeria.8 Even though the repatriation of Nigerians from South Africa incited reprisal attacks, it was mis-and disinformation on social media that worsened it and stoked tensions between South Africa and Nigerian relations. Hassan and Hitchen [5], p. 3 show that in Nigeria, disinformation is most effective when it draws on existing narratives and contexts to sharpen existing social divides and aimed at “delegitimising institutions, groups or personalities, glorifying a leader or, during elections, confusing voters, instigating apathy or marginalising women and other vulnerable groups.”
The occurrence of xenophobic violence has become a feature of the lived realities of foreigners who reside in South Africa. Xenophobia has been defined as a hatred for foreigners (Steenkamp [6]; Williams [7]). However, Harris [8], p. 2, contends that Xenophobia extends beyond hatred; rather, it should be redefined to “incorporate practice” because it is not just a “dislike or fear of foreigners but a violent practice that results in bodily harm and damage” [8].
The South African Migration Project (SAMP) identified several factors responsible for the outbreak of xenophobic violence. Some of these include isolation, relative deprivation, Nation Building, Public and official discourse, Legislative and policy Frameworks, Human Rights Education, Data and Information, Public and Officials Discourse, Opportunities for Interaction, Going beyond the Debate(s), Peer Education, and Establishing a Network (Crush et al. [9]). For his part, Harris [8] identified three hypotheses responsible for the occurrence of xenophobia in South Africa including the Scapegoating hypothesis; the isolation hypothesis and the biocultural hypothesis. However, the perception of African migrants as the economic threats has been identified as a major causative factor in the occurrence of xenophobic violence [9]. This was highlighted in the SAMP survey of 2006, which noted that attitudes towards foreigners as a national threat to the economic well-being of South Africans have hardened. For instance, the survey result showed that “the proportion of South Africans arguing that foreign nationals use up resources grew by 8% from 59% in 1999 to 67% in 2006. Furthermore, the survey also highlighted that migrants are being increasingly associated with crime rising from 45% in 1 1999 to 67% in 2006 as did the idea that migrants bring disease 24% in 1 1999 to 49% in 2006” [9], p. 3.
On the other hand, xenophobia does not apply to all categories of foreigners in South Africa. Black Africans bear the brunt of xenophobic violence outbreak in South Africa. Steenkamp [6], p. 442 explains that xenophobia is carried out along certain categories. The major targets of xenophobic attacks in South Africa are black migrants, who are perceived as economic threat to black South Africans. Therefore, the incidences of xenophobia in South Africa could be majorly considered as “Afrophobia” because it is majorly targeted at African migrants’ resident in the country.
Unfortunately, this contradicts the role of other Africans nations during the apartheid era when South African exiles were accommodated and educated in other African countries [6]. During this period, several high profile South African political leaders took shelter in other African countries, where they were accommodated, supported and encouraged to sustain the struggle against the Apartheid government in South Africa. For instance, Thambo Mbeki was posted to Nigeria as Deputy head of the ANC’s Department of Information and Propaganda. Additionally, many Nigerians were taxed to provide assistance to the ANC-led struggle against apartheid. In fact, it is estimated that the Nigerian government provided an annual subvention of $5million to the ANC and the Pan Africanist Congress (PAC) to aid the struggle against the Apartheid regime at the time.
Prinsloo [10], p. 130, explains that narrative is universal because it is “recognised as crossing all social and cultural divides.” Narrative is, therefore, a sense-making mechanism for understanding the real world (Fiske [11]; Wigston [12]). This study draws on structuralist approach to narrative analysis, which combines the syntagmatic and paradigmatic. Prinsloo [10], p. 133, explains that “the syntagmatic type of analysis identifies and describes the structure of formal organisation of the text following the chronological order or the linear sequence of the narrative while a paradigmatic type of analysis seeks to identify the deeper latent patterns or organisations which underpin the story.” Hence, a combination of syntagmatic and paradigmatic “approaches enable questions of positioning and power to be posed” (Prinsloo [10], p. 157). Also, structuralism “relies on binary opposition in order to transfer meanings in the easiest way because we make sense of concepts and ideas by contrasting them with their opposites [12], p. 142. Levi-Strauss explains that when “two characters are opposed in binary structure, their symbolic meaning is virtually forced to be both general and easily accessible because of the simplicity of the difference between them” [12], p. 152. Explaining further, Wigston [12], p. 154, pointed out that Levi-Strauss is not “interested in the sequential development of the narrative, but rather in the relationships between the various characters and their settings and hence, binary opposition then provide us with a means of undertaking a paradigmatic analysis of a text where we can determine these relationships.” Therefore, by analysing the binary oppositions in a text we can “uncover the ideological and manipulative structure of the values embodied in that message” as well as “reveal deep structures below the surface of the message that are not immediately clear but are implied in every opposition” [12], p. 172.
This study draws on Propp and Todorov narratives theories. Propp’s model like Todorov’s provides a means of identifying the conventional narrative structure in a text. While Propp and Todorov models are useful for comparing text, other analytical devices such as Levi-Strauss binary opposition is needed to gain deeper insight into the structure of a text [13]. Hence, this study combines Propp and Todorov narrative theories to analyse the framing of the February 2017 and August 2019 xenophobic attacks on Nigerians living in South Africa on social media. This chapter is concerned with the narrative of xenophobia on social media and how it influences emotion, rational and sentiments among Nigerians [10], p. 130.
The affordances of digital technology have resulted in the rise of mis-and disinformation with dire consequences for truth and credibility of the media (Wasserman [13]; Schifferes et al., [14]). Wasserman and Benequista [15], p. 35, explain that the “ease with which media can be produced online has made it possible for rumours, untruths, and disinformation to spread and threaten the credibility of the news media.” The use of social media to manipulate public opinion has become a global challenge and sub-Saharan Africa is not an exemption. The role of Cambridge Analytica in election manipulation in Kenya and Nigeria is a pointer to this reality (Granville [16]). For instance, it is estimated that “organized social media manipulation has more than doubled since 2017, with 70 countries using computational propaganda to manipulate public opinion” (Howard and Bradshaw [17]). This has adversely impacted the average level of trust in the news across all countries (Nielsen et al. [18]). Even leading religious leaders such as Pope Francis of the Catholic Church has acknowledged fake news is a “very serious sin.”9 Chenzi [4] explained that “fake social media content about the xenophobic violence in South Africa is one of the triggers of reprisal attacks against South African businesses and nationals in other parts of Africa [4]. This is because most the content they share with their loved ones back in their home countries are likely to be “fake news leading to reprisal attacks” (Chenzi, [4], p. 3). This study examines the motivations for sharing mis-and disinformation concerning Xenophobic attacks against Nigerians living in South Africa on social media.
This study is a netnograhpy involving a thematic analysis and focus group discussions. It uses narrative theories, thematic content analysis and focus group discussions with undergraduates and postgraduate students, adults under 40 and adults above 40. The two complementary methodologies enabled the author to collect comprehensive information on the motivation for sharing mis-and disinformation concerning xenophobic attacks on Nigerians living in South Africa (Sade-Beck [19], p. 49). In a netnograhpy three categories of data are recognised including archival data, elicited data, and fieldnote data (Kozinets [20], p. 4). This study uses archival data from messages posted on xenophobic attacks against Nigerians living in South Africa on Twitter and Facebook. First, the study developed a codebook for categorising Propp’s seven characters (see Table 1). Second, a total of 581 Facebook posts were harvested manually in relation the xenophobia outbreak of February 2017. Furthermore, the study focused on Facebook accounts with more than 2000 followers. This reduced the number of Facebook accounts to 100. These accounts were further coded using Google form. The Twitter analysis focused on the tweets of
Entries | Categorisation |
---|---|
South Africans are evil, south Africans are jealous of Nigerians, South Africans are lazy, they are ungrateful for the role Nigerians played in ending apartheid | Villain |
Nigerians are victims of South African wickedness, jealousy | Princess |
Seeks peace and reconciliation between Nigeria and South Africa | Hero |
Portrays themselves as the hero seeking for the betterment of Nigerians but they are fuelling the conflicts by posting fake news | False hero |
Calls on the Nigerian government to rescue Nigerian citizens leaving in South Africa | Dispatcher |
Code book.
Second, A total of eight focus group discussions were held across the three dominant regions of Nigeria. Each of the focus group discussions lasted between 50 and 90 minutes and were conducted in English. In instances where the Nigerian colloquial English was used it was translated to English language. A total of 68 participants joined the discussion in groups ranging from 8 to 10. The discussion guide was structured around five sections, each containing a list of key questions to be asked in all focus groups, and a set of additional questions to be asked at the discretion of discussion facilitator.
An analysis of the Facebook posts and tweets suggest there are five broad themes that dominated social media framing of xenophobic attacks on Nigerians living in South Africa. The themes are:
The thematic analysis focused on a few accounts on Facebook and Twitter. The accounts were selected for relevance and reach. Three accounts were selected purposively including @Engr.Chris Moore, AY COMEDIA, and YAW on Facebook and @JJ Omojuwa on Twitter.
This post was accompanied by five gory pictures. Four of the pictures were from the 2008 xenophobic violence in South Africa. The fifth picture was from a scene of
The post by
Geographic location of social media handles.
On Twitter, the analysis is focused on @JJ
The responses in this category urge Nigerians to retaliate against South Africans by either attacking their businesses in Nigeria such as MTN, Shoprite or attacking South Africans that are resident in Nigeria. A Facebook post by
Words used to describe south Africans.
Messages in this category suggest that South Africans are ungrateful for the help rendered to them by the Nigerian government during apartheid, when some of their citizens were sheltered in Nigeria. For instance, @
In this category, South Africans are framed as being jealous of Nigerians because they are hardworking and attract the attention of South African women. A Facebook post by
The responses in this category frame the South African government as is responsible and doing nothing to arrest the attacks on foreigners living in the country. For instance,
In this category, South Africans are framed as barbaric and wicked. For instance,
The majority of participants in this category are likely to share misinformation on social media platforms if it involves the mistreatment of Nigerians in the diaspora as a means of group solidarity. This is evinced in the xenophobia outbreak in South Africa in 2019 when videos from the 2008 xenophobia attacks in South Africa were shared as that of 2019. This resulted in reprisal attacks on South African business interests in Nigeria. One participant in Lagos, Nigeria mentioned that she felt that sharing misinformation about xenophobic attacks on Nigerians living in South Africa amounted to doing good. This suggests that Nigerian youths are likely to share mis-and disinformation about xenophobic attacks on Nigerians living in South Africa is a way of expression national solidarity with Nigerian victims.
In the northern part of Nigeria, Participants under the age of forty are also likely to share fake news to show solidarity with Nigerians being maltreated in the Diaspora. One participant said he shared fake videos on the 2019 xenophobic attacks against Nigerians living in South Africa to make Nigerians know what was happening to fellow Nigerians in South Africa.
Also, for participants above 40 years of age in the northeast of Nigeria did not share misinformation on Xenophobic attacks against Nigerians because they felt it could result in reprisal attacks. So, most of the people in the age bracket of 40 years and above in the northern part of Nigeria are not likely to share such videos.,
In the southeast, the view that Nigerians are likely to share mis-and disinformation concerning xenophobic attacks on Nigerians living in South Africa as a form of national solidarity is valid. Some participants said they shared videos from the xenophobia outbreak of 2008 when it reoccurred in 2019 leading to reprisal attacks in parts of Nigeria. One participant mentioned that he shared misinformation concerning Xenophobic attacks on Nigerians living in South Africa but pulled it when he found out it was false:
Nigerian undergraduate students are also likely to share trending misinformation that has elements of patriotism and emotions. For example, participants shared fake news on the July 2019 xenophobic attacks on Nigerians resident in South Africa without verifying it. This is because the xenophobia outbreak in South Africa was the trending news on social media especially Twitter at the time. So, for undergraduate students sharing videos of xenophobic attacks from 2008 as that of 2019 was part of trending on Twitter and garnering more followers. One participant said he did not care to verify the videos he shared on social media when he saw someone that someone was being burnt alive; it angered him and he shared it on social media but he later realised that it was from the 2008 xenophobic attacks in South Africa:
This student was one out of many undergraduate students who found it responsible to delete a misinformation posted on social media and also put up link showing it was fake news. This could be considered an isolated instance not the norm among undergraduate students in Nigeria. Another undergraduate student regurgitated a Nigerian stereotyping of South Africans of being lazy people who are jealous of hardworking Nigerians. This stereotyping happens on both sides of the divide. While South Africans tar Nigerians with the label of drug peddlers, Nigerians retort that South African men are lazy and jealous of Nigerian men, who are winning over their women:
This view correlates with one of the themes identified in the framing of xenophobic attacks on Nigerians living in South Africa on social media, Lazy and ungrateful. There is a perception among Nigerians that South Africans are lazy ad ungrateful for the role Nigeria played in bringing an end to apartheid in South Africa.
On the other hand, for postgraduate students, most of them said that they only share contents that are verified. Hence, they did not share fake videos on xenophobic attacks on Nigerians because they were unable to verify the authenticity of such content. The findings in this segment suggest that Nigeria youths are more likely to share mis-and disinformation concerning xenophobia as a form of national solidarity especially when it involves the ‘mistreatment’ of Nigerians in the diaspora such as the incident of Xenophobic attacks on Nigerians living in South Africa in 2017 and 2019.
This chapter answers the research question: What is the motivation for sharing mis-and disinformation on xenophobic attacks on Nigerians living in South Africa on social media? The chapter answered this question through an analysis of social media-Facebook, Twitter framing of both incidents as well through focus group discussions across the three dominant regions of Nigeria. The findings suggest that the framing of the February 2017 xenophobic outbreak in South Africa was based mis-and disinformation and reproduction of stereotypes on social media platforms (see Figure 3). Alternative facts accounted for 65% of the framing while 35% was based on fact. For instance, 80% of the posts on social media-Facebook and Twitter- framed South Africans as villains while 16% were framed as the false hero (see Figure 4). An analysis of the geographic location of the social media accounts-Facebook and Twitter-suggests that majority of them are domiciled in Nigeria (see Figure 1). For instance, 75% of the social media accounts are resident in Nigeria and relied on secondary sources, to frame xenophobic attacks on Nigerians living in South Africa; 13% are resident in South Africa and 7% are resident in America (see Figure 1). Consequently, the framing of the xenophobic attacks on Nigerians living in South Africa in 2017 and 2019 were based on rumours, untruths, mis-and disinformation emanating from the Nigerian rumour mill. Also, analysis of interview suggests that there is a general consensus among Nigerians that sharing mis-and disinformation about xenophobic attacks on Nigerians living in South Africa amount to some form of national solidarity; a show of patriotism to save Nigerians from the dangers of living in South Africa. This point is validated across the three dominant regions of Nigeria as well as among undergraduate students. Consequently, this results in reprisal attacks and diplomatic tension between the Nigerian and South African governments. For instance, the Senior Special Adviser to the President on International Affairs, Honourable Abike Dabiri rebuked South Africa’s Minister of Home Affairs, Malusi Gigaba’s that “it appears that Mr. Gigaba would rather dwell on and entertain himself with diplomatic niceties when the welfare of Nigerians resident in South Africa are at stake now more than any time in recent history. His response to the xenophobic attacks, which has now become a recurring decimal on Africans, most especially Nigerians living peacefully in their host country of South Africa was, indeed, unfortunate.”12 Additionally, the Nigerian Ministry of Foreign Affairs followed up with a summon on the South African High Commissioner to Nigeria: “The High Commissioner of South Africa to Nigeria is being summoned to the Ministry of Foreign Affairs during which government’s concerns on this matter will be brought to his attention.”13 The findings correlate with Chenzi’s [4] that mis-and disinformation about xenophobia on social media is a leading factor for reprisal attacks on South African businesses in Nigeria and diplomatic tension between Nigeria and South Africa.
Category of social media posts.
Categorisation of social posts.
These Terms and Conditions outline the rules and regulations pertaining to the use of IntechOpen’s website www.intechopen.com and all the subdomains owned by IntechOpen located at 5 Princes Gate Court, London, SW7 2QJ, United Kingdom.
',metaTitle:"Terms and Conditions",metaDescription:"These terms and conditions outline the rules and regulations for the use of IntechOpen Website at https://intechopen.com and all its subdomains owned by Intech Limited located at 7th floor, 10 Lower Thames Street, London, EC3R 6AF, UK.",metaKeywords:null,canonicalURL:"/page/terms-and-conditions",contentRaw:'[{"type":"htmlEditorComponent","content":"By accessing the website at www.intechopen.com you are agreeing to be bound by these Terms of Service, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. Use and/or access to this site is based on full agreement and compliance of these Terms. All materials contained on this website are protected by applicable copyright and trademark laws.
\\n\\nThe following terminology applies to these Terms and Conditions, Privacy Statement, Disclaimer Notice, and any or all Agreements:
\\n\\n“Client”, “Customer”, “You” and “Your” refers to you, the person accessing this website and accepting the Company’s Terms and Conditions;
\\n\\n“The Company”, “Ourselves”, “We”, “Our” and “Us”, refers to our Company, IntechOpen;
\\n\\n“Party”, “Parties”, or “Us”, refers to both the Client and ourselves, or either the Client or ourselves.
\\n\\nAll Terms refer to the offer, acceptance, and consideration of payment necessary to provide assistance to the Client in the most appropriate manner, whether by formal meetings of a fixed duration, or by any other agreed means, for the express purpose of meeting the Client’s needs in respect of provision of the Company’s stated services/products, and in accordance with, and subject to, the prevailing laws of the United Kingdom.
\\n\\nAny use of the above terminology, or other words in the singular, plural, capitalization and/or he/she or they, are taken as interchangeable.
\\n\\nUnless otherwise stated, IntechOpen and/or its licensors own the intellectual property rights for all materials on www.intechopen.com. All intellectual property rights are reserved. You may view, download, share, link and print pages from www.intechopen.com for your own personal use, subject to the restrictions set out in these Terms and Conditions.
\\n\\nWe employ the use of cookies. By using the IntechOpen website you consent to the use of cookies in accordance with IntechOpen’s Privacy Policy. Most modern day interactive websites use cookies to enable the retrieval of user details for each visit. On our site, cookies are predominantly used to enable functionality and ease of use for those visiting the site.
\\n\\nIn no circumstances shall IntechOpen or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption) arising out of the use, or inability to use, the materials on IntechOpen's websites, even if IntechOpen or an IntechOpen authorized representative has been notified orally or in writing of the possibility of such damage. Some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages; consequently, these limitations may not apply to you.
\\n\\nIntechopen.com website content and services are provided on an "AS IS" and an "AS AVAILABLE" basis. Material appearing on www.intechopen.com could include minor technical, typographical, or photographic errors. IntechOpen may make changes to any material contained on its website at any time without notice.
\\n\\nIntechOpen has no formal affiliation to any external sites that link to www.intechopen.com, unless otherwise specifically stated. As such, it is not responsible for content that appears on any such sites. The inclusion of any link to IntechOpen does not imply endorsement by IntechOpen. Use of any such linked website is done solely at the user's own discretion.
\\n\\nWe reserve the right of ownership over our entire website www.intechopen.com, and all contents. By using our services, you agree to remove all links to our website immediately upon request. We also reserve the right to amend these Terms and Conditions and our linking policy at any time. By continuing to link to our website, you agree to be bound to, and abide by, these linking Terms and Conditions.
\\n\\nIf you find any link on our website, or any linked website, objectionable for any reason, please Contact Us. We will consider all requests to remove links but will have no obligation to do so.
\\n\\nWithout prior approval and express written permission, you may not create frames around our web pages or use other techniques that alter in any way the visual presentation or appearance of our website.
\\n\\nIntechOpen may revise its Terms of Service for its website at any time without notice. By using this website, you are agreeing to be bound by the current version of all Terms at the time of use.
\\n\\nThese Terms and Conditions are governed by and construed in accordance with the laws of the United Kingdom and you irrevocably submit to the exclusive jurisdiction of the courts in London, United Kingdom.
\\n\\nCroatian version of Terms and Conditions available here
\\n"}]'},components:[{type:"htmlEditorComponent",content:'By accessing the website at www.intechopen.com you are agreeing to be bound by these Terms of Service, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. Use and/or access to this site is based on full agreement and compliance of these Terms. All materials contained on this website are protected by applicable copyright and trademark laws.
\n\nThe following terminology applies to these Terms and Conditions, Privacy Statement, Disclaimer Notice, and any or all Agreements:
\n\n“Client”, “Customer”, “You” and “Your” refers to you, the person accessing this website and accepting the Company’s Terms and Conditions;
\n\n“The Company”, “Ourselves”, “We”, “Our” and “Us”, refers to our Company, IntechOpen;
\n\n“Party”, “Parties”, or “Us”, refers to both the Client and ourselves, or either the Client or ourselves.
\n\nAll Terms refer to the offer, acceptance, and consideration of payment necessary to provide assistance to the Client in the most appropriate manner, whether by formal meetings of a fixed duration, or by any other agreed means, for the express purpose of meeting the Client’s needs in respect of provision of the Company’s stated services/products, and in accordance with, and subject to, the prevailing laws of the United Kingdom.
\n\nAny use of the above terminology, or other words in the singular, plural, capitalization and/or he/she or they, are taken as interchangeable.
\n\nUnless otherwise stated, IntechOpen and/or its licensors own the intellectual property rights for all materials on www.intechopen.com. All intellectual property rights are reserved. You may view, download, share, link and print pages from www.intechopen.com for your own personal use, subject to the restrictions set out in these Terms and Conditions.
\n\nWe employ the use of cookies. By using the IntechOpen website you consent to the use of cookies in accordance with IntechOpen’s Privacy Policy. Most modern day interactive websites use cookies to enable the retrieval of user details for each visit. On our site, cookies are predominantly used to enable functionality and ease of use for those visiting the site.
\n\nIn no circumstances shall IntechOpen or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption) arising out of the use, or inability to use, the materials on IntechOpen's websites, even if IntechOpen or an IntechOpen authorized representative has been notified orally or in writing of the possibility of such damage. Some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages; consequently, these limitations may not apply to you.
\n\nIntechopen.com website content and services are provided on an "AS IS" and an "AS AVAILABLE" basis. Material appearing on www.intechopen.com could include minor technical, typographical, or photographic errors. IntechOpen may make changes to any material contained on its website at any time without notice.
\n\nIntechOpen has no formal affiliation to any external sites that link to www.intechopen.com, unless otherwise specifically stated. As such, it is not responsible for content that appears on any such sites. The inclusion of any link to IntechOpen does not imply endorsement by IntechOpen. Use of any such linked website is done solely at the user's own discretion.
\n\nWe reserve the right of ownership over our entire website www.intechopen.com, and all contents. By using our services, you agree to remove all links to our website immediately upon request. We also reserve the right to amend these Terms and Conditions and our linking policy at any time. By continuing to link to our website, you agree to be bound to, and abide by, these linking Terms and Conditions.
\n\nIf you find any link on our website, or any linked website, objectionable for any reason, please Contact Us. We will consider all requests to remove links but will have no obligation to do so.
\n\nWithout prior approval and express written permission, you may not create frames around our web pages or use other techniques that alter in any way the visual presentation or appearance of our website.
\n\nIntechOpen may revise its Terms of Service for its website at any time without notice. By using this website, you are agreeing to be bound by the current version of all Terms at the time of use.
\n\nThese Terms and Conditions are governed by and construed in accordance with the laws of the United Kingdom and you irrevocably submit to the exclusive jurisdiction of the courts in London, United Kingdom.
\n\nCroatian version of Terms and Conditions available here
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{},profiles:[{id:"396",title:"Dr.",name:"Vedran",middleName:null,surname:"Kordic",slug:"vedran-kordic",fullName:"Vedran Kordic",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/396/images/7281_n.png",biography:"After obtaining his Master's degree in Mechanical Engineering he continued his education at the Vienna University of Technology where he obtained his PhD degree in 2004. He worked as a researcher at the Automation and Control Institute, Faculty of Electrical Engineering, Vienna University of Technology until 2008. His studies in robotics lead him not only to a PhD degree but also inspired him to co-found and build the International Journal of Advanced Robotic Systems - world's first Open Access journal in the field of robotics.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"441",title:"Ph.D.",name:"Jaekyu",middleName:null,surname:"Park",slug:"jaekyu-park",fullName:"Jaekyu Park",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/441/images/1881_n.jpg",biography:null,institutionString:null,institution:{name:"LG Corporation (South Korea)",country:{name:"Korea, South"}}},{id:"465",title:"Dr.",name:"Christian",middleName:null,surname:"Martens",slug:"christian-martens",fullName:"Christian Martens",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Rheinmetall (Germany)",country:{name:"Germany"}}},{id:"479",title:"Dr.",name:"Valentina",middleName:null,surname:"Colla",slug:"valentina-colla",fullName:"Valentina Colla",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/479/images/358_n.jpg",biography:null,institutionString:null,institution:{name:"Sant'Anna School of Advanced Studies",country:{name:"Italy"}}},{id:"494",title:"PhD",name:"Loris",middleName:null,surname:"Nanni",slug:"loris-nanni",fullName:"Loris Nanni",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/494/images/system/494.jpg",biography:"Loris Nanni received his Master Degree cum laude on June-2002 from the University of Bologna, and the April 26th 2006 he received his Ph.D. in Computer Engineering at DEIS, University of Bologna. On September, 29th 2006 he has won a post PhD fellowship from the university of Bologna (from October 2006 to October 2008), at the competitive examination he was ranked first in the industrial engineering area. He extensively served as referee for several international journals. He is author/coauthor of more than 100 research papers. He has been involved in some projects supported by MURST and European Community. His research interests include pattern recognition, bioinformatics, and biometric systems (fingerprint classification and recognition, signature verification, face recognition).",institutionString:null,institution:null},{id:"496",title:"Dr.",name:"Carlos",middleName:null,surname:"Leon",slug:"carlos-leon",fullName:"Carlos Leon",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Seville",country:{name:"Spain"}}},{id:"512",title:"Dr.",name:"Dayang",middleName:null,surname:"Jawawi",slug:"dayang-jawawi",fullName:"Dayang Jawawi",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Technology Malaysia",country:{name:"Malaysia"}}},{id:"528",title:"Dr.",name:"Kresimir",middleName:null,surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/528/images/system/528.jpg",biography:"K. Delac received his B.Sc.E.E. degree in 2003 and is currentlypursuing a Ph.D. degree at the University of Zagreb, Faculty of Electrical Engineering andComputing. His current research interests are digital image analysis, pattern recognition andbiometrics.",institutionString:null,institution:{name:"University of Zagreb",country:{name:"Croatia"}}},{id:"557",title:"Dr.",name:"Andon",middleName:"Venelinov",surname:"Topalov",slug:"andon-topalov",fullName:"Andon Topalov",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/557/images/1927_n.jpg",biography:"Dr. Andon V. Topalov received the MSc degree in Control Engineering from the Faculty of Information Systems, Technologies, and Automation at Moscow State University of Civil Engineering (MGGU) in 1979. He then received his PhD degree in Control Engineering from the Department of Automation and Remote Control at Moscow State Mining University (MGSU), Moscow, in 1984. From 1985 to 1986, he was a Research Fellow in the Research Institute for Electronic Equipment, ZZU AD, Plovdiv, Bulgaria. In 1986, he joined the Department of Control Systems, Technical University of Sofia at the Plovdiv campus, where he is presently a Full Professor. He has held long-term visiting Professor/Scholar positions at various institutions in South Korea, Turkey, Mexico, Greece, Belgium, UK, and Germany. And he has coauthored one book and authored or coauthored more than 80 research papers in conference proceedings and journals. His current research interests are in the fields of intelligent control and robotics.",institutionString:null,institution:{name:"Technical University of Sofia",country:{name:"Bulgaria"}}},{id:"585",title:"Prof.",name:"Munir",middleName:null,surname:"Merdan",slug:"munir-merdan",fullName:"Munir Merdan",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/585/images/system/585.jpg",biography:"Munir Merdan received the M.Sc. degree in mechanical engineering from the Technical University of Sarajevo, Bosnia and Herzegovina, in 2001, and the Ph.D. degree in electrical engineering from the Vienna University of Technology, Vienna, Austria, in 2009.Since 2005, he has been at the Automation and Control Institute, Vienna University of Technology, where he is currently a Senior Researcher. His research interests include the application of agent technology for achieving agile control in the manufacturing environment.",institutionString:null,institution:null},{id:"605",title:"Prof",name:"Dil",middleName:null,surname:"Hussain",slug:"dil-hussain",fullName:"Dil Hussain",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/605/images/system/605.jpg",biography:"Dr. Dil Muhammad Akbar Hussain is a professor of Electronics Engineering & Computer Science at the Department of Energy Technology, Aalborg University Denmark. Professor Akbar has a Master degree in Digital Electronics from Govt. College University, Lahore Pakistan and a P-hD degree in Control Engineering from the School of Engineering and Applied Sciences, University of Sussex United Kingdom. Aalborg University has Two Satellite Campuses, one in Copenhagen (Aalborg University Copenhagen) and the other in Esbjerg (Aalborg University Esbjerg).\n· He is a member of prestigious IEEE (Institute of Electrical and Electronics Engineers), and IAENG (International Association of Engineers) organizations. \n· He is the chief Editor of the Journal of Software Engineering.\n· He is the member of the Editorial Board of International Journal of Computer Science and Software Technology (IJCSST) and International Journal of Computer Engineering and Information Technology. \n· He is also the Editor of Communication in Computer and Information Science CCIS-20 by Springer.\n· Reviewer For Many Conferences\nHe is the lead person in making collaboration agreements between Aalborg University and many universities of Pakistan, for which the MOU’s (Memorandum of Understanding) have been signed.\nProfessor Akbar is working in Academia since 1990, he started his career as a Lab demonstrator/TA at the University of Sussex. After finishing his P. hD degree in 1992, he served in the Industry as a Scientific Officer and continued his academic career as a visiting scholar for a number of educational institutions. In 1996 he joined National University of Science & Technology Pakistan (NUST) as an Associate Professor; NUST is one of the top few universities in Pakistan. In 1999 he joined an International Company Lineo Inc, Canada as Manager Compiler Group, where he headed the group for developing Compiler Tool Chain and Porting of Operating Systems for the BLACKfin processor. The processor development was a joint venture by Intel and Analog Devices. In 2002 Lineo Inc., was taken over by another company, so he joined Aalborg University Denmark as an Assistant Professor.\nProfessor Akbar has truly a multi-disciplined career and he continued his legacy and making progress in many areas of his interests both in teaching and research. He has contributed in stochastic estimation of control area especially, in the Multiple Target Tracking and Interactive Multiple Model (IMM) research, Ball & Beam Control Problem, Robotics, Levitation Control. He has contributed in developing Algorithms for Fingerprint Matching, Computer Vision and Face Recognition. He has been supervising Pattern Recognition, Formal Languages and Distributed Processing projects for several years. He has reviewed many books on Management, Computer Science. Currently, he is an active and permanent reviewer for many international conferences and symposia and the program committee member for many international conferences.\nIn teaching he has taught the core computer science subjects like, Digital Design, Real Time Embedded System Programming, Operating Systems, Software Engineering, Data Structures, Databases, Compiler Construction. In the Engineering side, Digital Signal Processing, Computer Architecture, Electronics Devices, Digital Filtering and Engineering Management.\nApart from his Academic Interest and activities he loves sport especially, Cricket, Football, Snooker and Squash. He plays cricket for Esbjerg city in the second division team as an opener wicket keeper batsman. He is a very good player of squash but has not played squash since his arrival in Denmark.",institutionString:null,institution:null},{id:"611",title:"Prof.",name:"T",middleName:null,surname:"Nagarajan",slug:"t-nagarajan",fullName:"T Nagarajan",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universiti Teknologi Petronas",country:{name:"Malaysia"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:13389},{group:"region",caption:"Middle and South America",value:2,count:11661},{group:"region",caption:"Africa",value:3,count:4168},{group:"region",caption:"Asia",value:4,count:22334},{group:"region",caption:"Australia and Oceania",value:5,count:2019},{group:"region",caption:"Europe",value:6,count:33642}],offset:12,limit:12,total:135275},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{hasNoEditors:"0",sort:"-dateEndThirdStepPublish"},books:[{type:"book",id:"9985",title:"Geostatistics",subtitle:null,isOpenForSubmission:!0,hash:"423cb3896195a618c4acb493ce4fd23d",slug:null,bookSignature:"Prof. Jeffrey M. Yarus, Dr. Marko Maucec, Dr. Timothy C. Coburn and Associate Prof. Michael Pyrcz",coverURL:"https://cdn.intechopen.com/books/images_new/9985.jpg",editedByType:null,editors:[{id:"78011",title:"Prof.",name:"Jeffrey M.",surname:"Yarus",slug:"jeffrey-m.-yarus",fullName:"Jeffrey M. Yarus"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12215",title:"Cell Death and Disease",subtitle:null,isOpenForSubmission:!0,hash:"dfd456a29478fccf4ebd3294137eb1e3",slug:null,bookSignature:"Dr. Ke Xu",coverURL:"https://cdn.intechopen.com/books/images_new/12215.jpg",editedByType:null,editors:[{id:"59529",title:"Dr.",name:"Ke",surname:"Xu",slug:"ke-xu",fullName:"Ke Xu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12112",title:"The Colorectal Surgery",subtitle:null,isOpenForSubmission:!0,hash:"21c65e742d31d5b69fb681ef78cfa0be",slug:null,bookSignature:"Dr. Muhammad Shamim",coverURL:"https://cdn.intechopen.com/books/images_new/12112.jpg",editedByType:null,editors:[{id:"235128",title:"Dr.",name:"Muhammad",surname:"Shamim",slug:"muhammad-shamim",fullName:"Muhammad Shamim"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12079",title:"Strategies Towards the Synthesis of Heterocycles and Their Applications",subtitle:null,isOpenForSubmission:!0,hash:"bc4022af925c0883636e0819008971ee",slug:null,bookSignature:"Dr. Premlata Kumari and Dr. Amit B Patel",coverURL:"https://cdn.intechopen.com/books/images_new/12079.jpg",editedByType:null,editors:[{id:"177041",title:"Dr.",name:"Premlata",surname:"Kumari",slug:"premlata-kumari",fullName:"Premlata Kumari"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11998",title:"Biocomposites - Recent Advances",subtitle:null,isOpenForSubmission:!0,hash:"8bc7ffd7544fff1901301c787e64fada",slug:null,bookSignature:"Prof. Magdy Elnashar",coverURL:"https://cdn.intechopen.com/books/images_new/11998.jpg",editedByType:null,editors:[{id:"12075",title:"Prof.",name:"Magdy",surname:"Elnashar",slug:"magdy-elnashar",fullName:"Magdy Elnashar"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11999",title:"Earthquakes - Recent Advances, New Perspectives and Applications",subtitle:null,isOpenForSubmission:!0,hash:"b2af07109b13b76e5af9583532ab5bee",slug:null,bookSignature:"Dr. Walter Salazar",coverURL:"https://cdn.intechopen.com/books/images_new/11999.jpg",editedByType:null,editors:[{id:"236461",title:"Dr.",name:"Walter",surname:"Salazar",slug:"walter-salazar",fullName:"Walter Salazar"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12058",title:"Future Housing",subtitle:null,isOpenForSubmission:!0,hash:"e7f4a1e57fab392b61156956c1247b9e",slug:null,bookSignature:"Dr. Ivan Oropeza-Perez and Dr. Astrid Helena Petzold-Rodríguez",coverURL:"https://cdn.intechopen.com/books/images_new/12058.jpg",editedByType:null,editors:[{id:"282172",title:"Dr.",name:"Ivan",surname:"Oropeza-Perez",slug:"ivan-oropeza-perez",fullName:"Ivan Oropeza-Perez"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12172",title:"Health Risks of Food Additives - Recent Developments and Trends in Food Sector",subtitle:null,isOpenForSubmission:!0,hash:"f6aa23b1045d266d0928fcef04fa3417",slug:null,bookSignature:"Dr. Muhammad Sajid Arshad and Mr. Waseem Khalid",coverURL:"https://cdn.intechopen.com/books/images_new/12172.jpg",editedByType:null,editors:[{id:"192998",title:"Dr.",name:"Muhammad Sajid",surname:"Arshad",slug:"muhammad-sajid-arshad",fullName:"Muhammad Sajid Arshad"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12113",title:"Tendons - Trauma, Inflammation, Degeneration, and Treatment",subtitle:null,isOpenForSubmission:!0,hash:"2387a4e0d2a76883b16dcccd452281ab",slug:null,bookSignature:"Dr. Nahum Rosenberg",coverURL:"https://cdn.intechopen.com/books/images_new/12113.jpg",editedByType:null,editors:[{id:"68911",title:"Dr.",name:"Nahum",surname:"Rosenberg",slug:"nahum-rosenberg",fullName:"Nahum Rosenberg"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12196",title:"Sepsis - New Perspectives",subtitle:null,isOpenForSubmission:!0,hash:"3590e6f6047122bd96d1d57da29c4054",slug:null,bookSignature:"Dr. Lixing Huang, Dr. Youyu Zhang and Dr. Lingbin Sun",coverURL:"https://cdn.intechopen.com/books/images_new/12196.jpg",editedByType:null,editors:[{id:"333148",title:"Dr.",name:"Lixing",surname:"Huang",slug:"lixing-huang",fullName:"Lixing Huang"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11500",title:"Multi-Objective Optimization - Recent Advances, New Perspectives and Applications",subtitle:null,isOpenForSubmission:!0,hash:"842f84f308439c0a55c4e8e6a8fd9c01",slug:null,bookSignature:"Dr. Adel El-Shahat",coverURL:"https://cdn.intechopen.com/books/images_new/11500.jpg",editedByType:null,editors:[{id:"193331",title:"Dr.",name:"Adel",surname:"El-Shahat",slug:"adel-el-shahat",fullName:"Adel El-Shahat"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12102",title:"Current Trends in Ambulatory Care",subtitle:null,isOpenForSubmission:!0,hash:"fa37d79f81893fd0a9ab346ae1c3e4a9",slug:null,bookSignature:"Dr. Xin-Nong Li",coverURL:"https://cdn.intechopen.com/books/images_new/12102.jpg",editedByType:null,editors:[{id:"345917",title:"Dr.",name:"Xin-Nong",surname:"Li",slug:"xin-nong-li",fullName:"Xin-Nong Li"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:27},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:7},{group:"topic",caption:"Business, Management and Economics",value:7,count:4},{group:"topic",caption:"Chemistry",value:8,count:16},{group:"topic",caption:"Computer and Information Science",value:9,count:18},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:8},{group:"topic",caption:"Engineering",value:11,count:42},{group:"topic",caption:"Environmental Sciences",value:12,count:5},{group:"topic",caption:"Immunology and Microbiology",value:13,count:8},{group:"topic",caption:"Materials Science",value:14,count:17},{group:"topic",caption:"Mathematics",value:15,count:9},{group:"topic",caption:"Medicine",value:16,count:68},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:3},{group:"topic",caption:"Neuroscience",value:18,count:3},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:7},{group:"topic",caption:"Physics",value:20,count:6},{group:"topic",caption:"Psychology",value:21,count:5},{group:"topic",caption:"Robotics",value:22,count:2},{group:"topic",caption:"Social Sciences",value:23,count:7},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:2}],offset:12,limit:12,total:264},popularBooks:{featuredBooks:[{type:"book",id:"7827",title:"Interpersonal Relationships",subtitle:null,isOpenForSubmission:!1,hash:"ebf41f4d17c75010eb3294cc8cac3d47",slug:"interpersonal-relationships",bookSignature:"Martha Peaslee Levine",coverURL:"https://cdn.intechopen.com/books/images_new/7827.jpg",editors:[{id:"186919",title:"Dr.",name:"Martha",middleName:null,surname:"Peaslee Levine",slug:"martha-peaslee-levine",fullName:"Martha Peaslee Levine"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10808",title:"Current Concepts in Dental Implantology",subtitle:"From Science to Clinical Research",isOpenForSubmission:!1,hash:"4af8830e463f89c57515c2da2b9777b0",slug:"current-concepts-in-dental-implantology-from-science-to-clinical-research",bookSignature:"Dragana Gabrić and Marko Vuletić",coverURL:"https://cdn.intechopen.com/books/images_new/10808.jpg",editors:[{id:"26946",title:"Prof.",name:"Dragana",middleName:null,surname:"Gabrić",slug:"dragana-gabric",fullName:"Dragana Gabrić"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10796",title:"Extracellular Vesicles",subtitle:"Role in Diseases, Pathogenesis and Therapy",isOpenForSubmission:!1,hash:"eb5407fcf93baff7bca3fae5640153a2",slug:"extracellular-vesicles-role-in-diseases-pathogenesis-and-therapy",bookSignature:"Manash K. Paul",coverURL:"https://cdn.intechopen.com/books/images_new/10796.jpg",editors:[{id:"319365",title:"Assistant Prof.",name:"Manash K.",middleName:null,surname:"Paul",slug:"manash-k.-paul",fullName:"Manash K. Paul"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10908",title:"Advances in Decision Making",subtitle:null,isOpenForSubmission:!1,hash:"126486f7f91e18e2e3539a32c38be7b1",slug:"advances-in-decision-making",bookSignature:"Fausto Pedro García Márquez",coverURL:"https://cdn.intechopen.com/books/images_new/10908.jpg",editors:[{id:"22844",title:"Prof.",name:"Fausto Pedro",middleName:null,surname:"García Márquez",slug:"fausto-pedro-garcia-marquez",fullName:"Fausto Pedro García Márquez"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"95",title:"Applications and Experiences of Quality Control",subtitle:null,isOpenForSubmission:!1,hash:"4bcb22b1eee68210a977a97d5a0f363a",slug:"applications-and-experiences-of-quality-control",bookSignature:"Ognyan Ivanov",coverURL:"https://cdn.intechopen.com/books/images_new/95.jpg",editors:[{id:"22230",title:"Prof.",name:"Ognyan",middleName:null,surname:"Ivanov",slug:"ognyan-ivanov",fullName:"Ognyan Ivanov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3560",title:"Advances in Landscape Architecture",subtitle:null,isOpenForSubmission:!1,hash:"a20614517ec5f7e91188fe8e42832138",slug:"advances-in-landscape-architecture",bookSignature:"Murat Özyavuz",coverURL:"https://cdn.intechopen.com/books/images_new/3560.jpg",editors:[{id:"93073",title:"Dr.",name:"Murat",middleName:null,surname:"Ozyavuz",slug:"murat-ozyavuz",fullName:"Murat Ozyavuz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10739",title:"Global Decline of Insects",subtitle:null,isOpenForSubmission:!1,hash:"543783652b9092962a8fa4bed38eeb17",slug:"global-decline-of-insects",bookSignature:"Hamadttu Abdel Farag El-Shafie",coverURL:"https://cdn.intechopen.com/books/images_new/10739.jpg",editors:[{id:"192142",title:"Dr.",name:"Hamadttu",middleName:null,surname:"Abdel Farag El-Shafie",slug:"hamadttu-abdel-farag-el-shafie",fullName:"Hamadttu Abdel Farag El-Shafie"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10911",title:"Higher Education",subtitle:"New Approaches to Accreditation, Digitalization, and Globalization in the Age of Covid",isOpenForSubmission:!1,hash:"223a02337498e535e967174c1f648fbc",slug:"higher-education-new-approaches-to-accreditation-digitalization-and-globalization-in-the-age-of-covid",bookSignature:"Lee Waller and Sharon Waller",coverURL:"https://cdn.intechopen.com/books/images_new/10911.jpg",editors:[{id:"263301",title:"Dr.",name:"Lee",middleName:null,surname:"Waller",slug:"lee-waller",fullName:"Lee Waller"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3568",title:"Recent Advances in Plant in vitro Culture",subtitle:null,isOpenForSubmission:!1,hash:"830bbb601742c85a3fb0eeafe1454c43",slug:"recent-advances-in-plant-in-vitro-culture",bookSignature:"Annarita Leva and Laura M. R. Rinaldi",coverURL:"https://cdn.intechopen.com/books/images_new/3568.jpg",editors:[{id:"142145",title:"Dr.",name:"Annarita",middleName:null,surname:"Leva",slug:"annarita-leva",fullName:"Annarita Leva"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3737",title:"MATLAB",subtitle:"Modelling, Programming and Simulations",isOpenForSubmission:!1,hash:null,slug:"matlab-modelling-programming-and-simulations",bookSignature:"Emilson Pereira Leite",coverURL:"https://cdn.intechopen.com/books/images_new/3737.jpg",editors:[{id:"12051",title:"Prof.",name:"Emilson",middleName:null,surname:"Pereira Leite",slug:"emilson-pereira-leite",fullName:"Emilson Pereira Leite"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"1770",title:"Gel Electrophoresis",subtitle:"Principles and Basics",isOpenForSubmission:!1,hash:"279701f6c802cf02deef45103e0611ff",slug:"gel-electrophoresis-principles-and-basics",bookSignature:"Sameh Magdeldin",coverURL:"https://cdn.intechopen.com/books/images_new/1770.jpg",editors:[{id:"123648",title:"Dr.",name:"Sameh",middleName:null,surname:"Magdeldin",slug:"sameh-magdeldin",fullName:"Sameh Magdeldin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4797},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"7827",title:"Interpersonal Relationships",subtitle:null,isOpenForSubmission:!1,hash:"ebf41f4d17c75010eb3294cc8cac3d47",slug:"interpersonal-relationships",bookSignature:"Martha Peaslee Levine",coverURL:"https://cdn.intechopen.com/books/images_new/7827.jpg",publishedDate:"July 27th 2022",numberOfDownloads:7175,editors:[{id:"186919",title:"Dr.",name:"Martha",middleName:null,surname:"Peaslee Levine",slug:"martha-peaslee-levine",fullName:"Martha Peaslee Levine"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"c