Measurement scales.
\r\n\tWe are living in a particularly challenging historical moment. People have learned that no matter how much they control their lives, their environment, and their relationships, everything can be changed instantly, at the fancy of a virus that does not respect age, nationality, ancestry, intelligence, or skills. People learned that the limitless power of science and technology was purely illusory, in the face of an absolute and overwhelming force of nature that was almost no longer recognized. After all, the balance of forces between Nature and science and technology was inevitably shaken and the certainties with which people built their lives were jeopardized by an unpredictable and constantly changing reality. Uncertainty is one of the biggest challenges we face today. Never, as today, people management can make such a difference in their future, both personally and professionally.
\r\n\r\n\t
\r\n\tCHROs need to decide where to focus their resources and attention, select their action priorities. This book will aim to provide the reader with a comprehensive overview of the new challenges of people management and provide keys to (re)think about the new/renewed challenges that the new times, the new “normals” place on those who manage people. From the strategic management of HR to people analytics and HR IT architecture and operation, through the new practices of remote work, this book aims to reflect on the future(s) of people management, illuminating trends and reflecting on potential risks or promising achievements.
Tourist satisfaction is one of the most widely studied factors in literature on tourism and hospitality [1]. From this perspective, specialized literature reveals the key role of tourist satisfaction at the time of choosing a tourist destination [2]. In this regard, achieving customer satisfaction could lead to a successful tourism industry [3]. As a matter of fact, considering the key role of satisfaction in a tourist destination, it has been argued repeatedly that, on one hand, the feeling of satisfaction experienced by the tourist in a destination will be a valuable antecedent to recommend or return to a place [4, 5]. In other words, satisfaction will be an explicit antecedent to tourist loyalty to a place. From this perspective, the findings show that such loyalty could be affective, cognitive or conative in nature [6]. It has been revealed that different factors can create optimum levels of satisfaction; in a sense, they are directly linked to the tourist [7] and on the other hand, to the environment of the destination [8]. It has been argued as well in literature on tourism that satisfaction can be the result of the value perceived by the tourist in the place [4]. Similarly, it can be achieved as a consequence of emotional enjoyment [9], the perception of the destination’s image [10, 11] or the perception of the quality of the services provided in the place [4]. Overall, satisfaction can be the result of the connection among various qualities of the tourist destination, coupled with positive perceptions by the tourist [12]. In this regard, the benefits perceived in the place will be the principal components to determine tourist satisfaction [13]. Nevertheless, even though there is extensive literature that analyses satisfaction, there is no final consensus regarding which factors determine tourist satisfaction in a destination. From this perspective, this study suggests that satisfaction is determined by the functional [14]; hedonic [15, 16] and symbolic benefits [17] perceived by the tourist. Emphasis is placed on the fact that the hedonic benefit, being considered a multidimensional factor, will have a fundamental role as antecedent to tourist satisfaction. Similarly, it is suggested that the functional, hedonic and symbolic benefits perceived by the tourist will be a consequence of the cognitive perception [18, 19] and affective evaluation of the place [20, 21].
\nSpecialized literature has revealed that satisfaction is a subjective opinion based on the assessment by the tourist after living different experiences in a place [22]. In this regard, tourist satisfaction with a destination is essentially what the tourist expects. In other words, it is the fulfillment of an expectation [23], which can be expressed as an affective state [24] a cognitive state [9] or a combination of both [25], after living experiences in the place. From this perspective, it is a positive assessment by the tourist of the benefits obtained in the place [26], or a sum of judgments regarding the quality perceived by the tourist [27].
\nIt has been argued that a solution-oriented person tends to choose the alternative that best fulfills their needs [28]. In this regard, facing different alternatives, the functional benefit perceived by the tourist is very important in the process of selecting a destination. Such benefit is created by fulfilling an individual’s cognitive need, as a consequence of their adaptation to the environment; it can be defined as the utility achieved through functional value [28]. Therefore, the tourist achieves this by experiencing the qualities of the place [29]. The more a destination fulfills the practical needs of tourists, the better the perceived functional benefit will be. The better the ability to fulfill the multiple needs expressed while visiting, the greater the effect on the tourist will be [30]. Consequently, the functional qualities of the tourist destination will make it more likely to be chosen and visited [31].
\nThe hedonic benefit perceived by the tourist can be defined as the enjoyment of the experience in terms of service, associated to their fantasies and feelings [32]. From this perspective, the hedonic benefit perceived by the tourist is relevant in the process of selecting a destination. The enjoyment derived from a place will be assessed through it. This is a result of psycho-sensory experiences, arising from the need of stimulation and sensation-seeking [33]. This is a way to represent multisensory experiences, activated through sensorial stimulation. In this regard, tourist destinations consist of a mix of products and services [34], which are stimulating for the visitor, since they offer pleasurable sensory experiences. The better the multisensory experiences for the tourist, the greater the enjoyment of the visit [35]. As a matter of fact, since tourist destinations are essentially aesthetic, visual contact with the landscape will be an important factor.
\nThe symbolic benefit perceived by the tourist can be defined as the benefit received through the multiple elements of self-concept which, to a large extent, results from the assessment of others, whether real or imagined [36] and consists of various representations by each person, linked to a particular set of social conditions [30]. From this perspective, self-concept has tour different aspects: actual, ideal, social and ideal social [37]. “Actual” refers to an individual’s self-image, “ideal” is what the individual would like to be, “social” is the way the individual thinks they are perceived by other important people, and “ideal social” is the way the individual would like to be perceived by other important people [38]. So, tourists could adapt their behavior in a destination, either to reinforce or improve their self-concept. However, they could also visit places that convey a symbolic meaning to themselves and/or others [31]. That way, through the symbolic benefit perceived, the tourist will be able to appreciate the sense of belonging provided by the place visited.
\nIn specialized literature on tourism, it has been argued that, on the one hand, cognition can be defined as objective knowledge of a place or the quality of the physical characteristics of the environment [39], and on the other hand as the set of people’s beliefs, ideas and impressions about a particular place [40]. In the same vein, reviewing the literature on tourism reveals the wide range of studies related to tourist cognition in terms of defining a place, as well as an image [41, 42]. From this perspective, cognitive perception is relevant for tourist behavior, since tourism is a discretionary activity, with a higher level of choice and less limitations than most other human endeavors. Specifically, cognitive perception includes processes related to attention to stimuli and events, their understanding, remembering past events, assessments, and buying choices [43].
\nIn terms of tourism, the affective evaluation of a place by a tourist can be defined as the way they feel about the place [44, 45] or the assessment of the affective quality of the place [39]. That way, visitors will be motivated by the appearance of destinations and their attractions, and also their emotional qualities, which will be helpful in terms of fulfilling their psychological needs [46]. A destination is linked to its visitors and accounts for affective links, which can be positive, neutral or negative [47]. From this perspective, such link between products and emotions evokes an image of the product in the consumer’s mind [44]. Consequently, an affective evaluation can emerge from two different paths; one of them is innate and includes sensory/motor processes that generate primitive or partially formed affective assessments, while the other entails a conceptual outline and transformation [48].
\nIn terms of tourism, the functional benefit perceived has a positive effect on tourist satisfaction [2]. Similarly, literature on consumer behavior notes that qualities that become functional benefits provide a greater level of consumer satisfaction [49, 50] and can be part of a product’s design and aesthetic. Likewise, the functional benefit attained by the tourist through the qualities of a place could improve tourist satisfaction [5]. From this perspective, the following hypothesis is presented within the context of tourist destinations:
\n\n
In terms of tourism, the hedonic benefit perceived has a positive effect on tourist satisfaction [2]. From a consumer’s perspective, hedonic experiences can increase the level of satisfaction [49]. Hedonic consumers tend to look for pleasurable experiences that increase satisfaction [51]. The enjoyment of leisure experiences influences tourist satisfaction [9]. Similarly, the enjoyment derived from a place\'s visual attractions [33], could influence the level of tourist satisfaction. From this perspective, the following hypothesis is presented within the context of tourist destinations:
\n\n
In terms of tourism, the symbolic benefit perceived has a positive effect on tourist satisfaction [2]. The symbolic benefit attained by the tourist while visiting a destination is related to the level of satisfaction in a direct and positive manner [52]. This positive effect, consequently, has an effect on positive behavior in connection to a place [53]. According to literature on tourism, the symbolic benefit for the tourist could improve significantly the level of satisfaction derived from the destination [54]. So, the link between the symbolic benefit and satisfaction can help improve the perception of hospitality services [55]. In the same vein, the following hypothesis is suggested within the context of tourist destinations:
\n\n
Good cognitive perception of the place is very important for the tourist to attain the expected functional benefit. From a marketing perspective, it has been pointed out that the functional benefit is primarily instrumental and cognitive in nature for the customer [18, 56]. Similarly, literature on consumer behavior has revealed that the functional benefit can be obtained as a response to a cognitive need [28]. In this regard, a good cognitive perception of the qualities and features of the place could improve the attainment of functional benefits by the tourist. From this perspective, the following hypothesis is suggested within the context of tourist destinations:
\n\n
It has been argued that, when it comes to consumers who look for an experience (high levels of stimulation), there is a close link between cognitive perception and hedonic benefit [57]. As a matter of fact, even though the hedonic benefit is attained through the consumer’s experience of the most intangible features of the product and/or service, it is a consequence of the cognitive perception of the most tangible elements associated to the experience [58]. From this perspective, good cognitive perception will stimulate the hedonic benefit of the consumer in a positive manner [59]. In this regard, the following hypothesis is presented within the context of tourist destinations:
\n\n
Based on the assessment of its qualities, a good cognitive perception of the destination is very important to have a positive effect on the symbolic benefit for the tourist. Literature shows that the symbolic benefit perceived by the customer can be cognitive in nature [19]. In this regard, each representation of self-concept will depend on the tourist’s cognitive perception of the place [60], in order to be able to recreate such self-concept through what is already known, and also what is not yet known [61]. So, good cognitive perception of the place by the tourist will stimulate the symbolic benefit expected. From this perspective, the following hypothesis is formulated within the context of tourist destinations:
\n\n
The affective evaluation can be expressed tangibly through the functional benefit perceived by the consumer [62]. The emotional characteristics created around a product have a positive effect on the functional benefit perceived by the consumer [63]. A product that is attractive in emotional terms increases the functional benefit perceived by the customer [20]. In the same vein, the following hypothesis is presented within the context of tourist destinations:
\n\n
A good affective evaluation of the place will be an antecedent that will allow the tourist to attain the hedonic benefit expected. It has been argued that the affective evaluation has a direct influence on the possible hedonic benefit attained by the consumer in the process of choosing a product or service [64]. In this regard, emotions are the main mechanisms through which hedonic value for the customer is created [65]. The affective origin of consumption experiences is key in order to attain the hedonic benefit [32] expected by the tourist when visiting a destination. So, a positive affective evaluation of a place will be helpful in order to attain the hedonic benefit desired by the tourist. From this perspective, the following hypothesis is suggested within the context of tourist destinations:
\n\n
According to literature, the affective evaluation is quite relevant, being an antecedent to the symbolic benefit [66]. It has been argued that a close link exists with the affective evaluation as antecedent to the symbolic benefit perceived by the individual [61]. The affective evaluation is key for the consumer to attain the symbolic benefit perceived [67]. From this perspective, the following hypothesis is presented within the context of tourist destinations:
\n\n
This can be depicted schematically (\nFigure 1\n).
\nHypothesis.
In order to identify the most appropriate scales to measure relationships in which satisfaction is a consequence of the functional, hedonic and symbolic benefits perceived by the tourist and this triad of benefits is a consequence of the cognitive and affective evaluation of the place by the tourist, with an appropriate level of reliability, validity and dimensionality, a process with different stages was developed [68].
\nThe first stage consisted in creating scales with a level of validity in terms of content. With this in mind, a deep analysis of literature was conducted, considering the scales created in many previous studies; regarding satisfaction, for instance, [69, 70] were used as reference, [56, 71] were used for the functional benefit, [56, 72–74] for the hedonic benefit, [75, 76] for the symbolic benefit, [42, 44] for cognitive perception and [65, 77] for affective evaluation. Consecutively, a critical incident analysis was conducted, in which people had to describe the factors that were part of the constructs analyzed. 40 people from a non-probability sample (for convenience) took part in the study, and the previous scales of satisfaction, functional benefit, hedonic benefit, symbolic benefit, cognitive perception and affective evaluation were obtained. Then a second clearing process of this scales recommended by [78] took place. Immediately after, a series of focus groups were conducted, with regular tourists from different parts of Chile, as well as several interviews with experts on tourism and sales executives from travel agencies. These analyses added indicators that reflected each dimension more accurately within the context of the study, and allowed to adjust and/or eliminate those found to be conflicting or redundant. A variation of [79] was applied to do this. Each expert had to rate each item in terms of its dimension, considering three choices: clearly, partially or not representative. Conclusively, items with a high level of consensus were kept [80]. Through these analyses, the scales were obtained, which were used to write the draft questionnaire. In the second stage, the final questionnaire was created. The draft questionnaire was used for a quantitative pre-test applied to a random sample of 40 people; then the data was used for an exploratory factor analysis and a Cronbach’s alpha was estimated for each resulting dimension. This preliminary analysis confirmed the existence of each of the dimensions from previous analyses. The items were written as assertions that were answered through a 7-point Likert scale (see \nTable 1\n). All of them were written so they could be understood and answered by every respondent.
\n\n | \n||
Satisfaction | \nSat 1 | \nThis is the best place I have visited | \n
Sat 2 | \nThis place is what I expected | \n|
Sat 3 | \nThis place fulfills my expectations | \n|
Sat 4 | \nThis place is exactly what I imagined | \n|
Sat 5 | \nThis place was my best choice | \n|
\n | \n||
Functional benefit | \nFube 1 | \nVacationing in this place was just what I needed | \n
Fube 2 | \nIn this place, I found the vacation I was looking for | \n|
Fube 3 | \nVacationing in this place is always convenient | \n|
Fube 4 | \nCompared to similar places, this is the best vacation spot | \n|
\n | \n||
Hedonic benefit visual attractions | \nHbviat 1 | \nI love the appearance of this place | \n
Hbviat 2 | \nI love the aesthetics of this place | \n|
Hbviat 3 | \nThis place is a pleasure for my senses | \n|
\n | \n||
Hedonic benefit escape from routine | \nHbero 1 | \nThis place is an escape from routine | \n
Hbero 2 | \nThis place makes me feel I’m in a different world | \n|
\n | \n||
Hedonic benefit recreation | \nHbere 1 | \nThis is a great place to have fun | \n
Hbere 2 | \nThis place is very exciting, which is contagious | \n|
Hbere 3 | \nThis is a place to enjoy life | \n|
\n | \n||
Hedonic benefit intrinsic pleasure | \nHbinple 1 | \nThis place is fascinating to visit, compared to other possible activities | \n
Hbinple 2 | \nI wish I could be in this place all the time | \n|
\n | \n||
Symbolic benefit | \nSben 1 | \nThis place reflects who I am | \n
Sben 2 | \nThis place is in tune with the way I see myself | \n|
Sben 3 | \nI identify with the people who choose this place | \n|
Sben 4 | \nThis place is visited by people like me | \n|
\n | \n||
Cognitive perception environment | \nCopen 1 | \nThis place is known to be very safe | \n
Copen 2 | \nThis place is known to be clean | \n|
Copen 3 | \nThis place is known for its good transport system | \n|
Copen 4 | \nThis place is known to have adequate signage | \n|
\n | \n||
Affective evaluation | \nAffev 1 | \nThis place is a lot of fun | \n
Affev 2 | \nThis place is very lively | \n|
Affev 3 | \nThis place is very cheerful | \n
Measurement scales.
A non-probability sample was used, based on quotas, proportional to the tourist destinations visited in Chile according to the National Tourism Service [81], divided into beaches (36%), lakes (25%) and other attractions (39%). The surveys were conducted in the main capital cities of Chile. Data were collected in the third and last stage. The survey was conducted on a total sample of 750 people, using the last tourist destination where they stayed as reference. A psychometric analysis of the data was conducted in order to obtain scales with a good level of reliability, validity and dimensionality. At the same time, a separate analysis of the multidimensionality of the hedonic benefit scale was conducted (see \nTable 2\n). The results of the partial analysis and the global model were both satisfactory.
\nIndicators | \nRecommended value | \nFirst order | \nSecond order | \n|
---|---|---|---|---|
Hedonic benefit | \n||||
Absolute | \nNCP | \nMinimum | \n1028.941 | \n117.175 | \n
ECVI | \nMinimum | \n1.521 | \n0.290 | \n|
RMSEA | \n<0.08 | \n0.177 | \n0.07 | \n|
Incremental | \nNFI | \nHigh (close to 1) | \n0.79 | \n0.97 | \n
IFI | \nHigh (close to 1) | \n0.80 | \n0.97 | \n|
CFI | \nHigh (close to 1) | \n0.80 | \n0.97 | \n|
Parsimony | \nAIC | \nMinimum | \n1138.94 | \n217.175 | \n
Normed | \n[1; 5] | \n24.38 | \n4.90 | \n
Multidimensional analysis of hedonic benefit.
Then, an exploratory factor analysis and a confirmatory factor analysis (SEM) were conducted, along with different reliability analyses applying Cronbach’s alpha, construct reliability and variance extracted (AVE). In order to identify items unattached to their dimension, principal component factor analyses were conducted with varimax rotation [82]. Following this procedure, there was no need to eliminate indicators from the scales analyzed (see \nTable 3\n). In fact, they all featured a good level of unidimensionality, with factor loadings well over 0.4 [83]. Considering the different scales, through structural equations, a confirmatory factor analysis was developed in order to confirm if the indicators or variables were adequate for an appropriate adjustment of the model. The requirements considered were the three criteria proposed by [84]. The first is to eliminate the indicators with a weak condition of convergence with their corresponding latent variable. A Student’s
Scales | \nVariable | \nFactorial load | \nVariance explained % | \nOwn value | \n
---|---|---|---|---|
Satisfaction | \nSat 1 | \n0.82 | \n73.76 | \n3.68 | \n
Sat 2 | \n0.87 | \n|||
Sat 3 | \n0.88 | \n|||
Sat 4 | \n0.83 | \n|||
Sat 5 | \n0.88 | \n|||
Functional benefit | \nFube 1 | \n0.86 | \n73.54 | \n2.94 | \n
Fube 2 | \n0.90 | \n|||
Fube 3 | \n0.86 | \n|||
Fube 4 | \n0.80 | \n|||
Hedonic benefit visual attractions | \nHbviat 1 | \n0.91 | \n80.09 | \n2.40 | \n
Hbviat 2 | \n0.91 | \n|||
Hbviat 3 | \n0.85 | \n|||
Hedonic benefit escape from routine | \nHbero 1 | \n0.93 | \n86.99 | \n1.74 | \n
Hbero 2 | \n0.93 | \n|||
Hedonic benefit recreation | \nHbere 1 | \n0.85 | \n74.51 | \n2.93 | \n
Hbere 2 | \n0.88 | \n|||
Hbere 3 | \n0.87 | \n|||
Hedonic benefit intrinsic pleasure | \nHbinple 1 | \n0.89 | \n70.54 | \n1.59 | \n
Hbinple 2 | \n0.89 | \n|||
Symbolic benefit | \nSben 1 | \n0.89 | \n76.4 | \n3.0 | \n
Sben 2 | \n0.91 | \n|||
Sben 3 | \n0.88 | \n|||
Sben 4 | \n0.82 | \n|||
Cognitive perception environment | \nCopen 1 | \n0.83 | \n69.34 | \n2.77 | \n
Copen 2 | \n0.79 | \n|||
Copen 3 | \n0.85 | \n|||
Copen 4 | \n0.86 | \n|||
Affective evaluation | \nAffev 1 | \n0.90 | \n80.89 | \n2.43 | \n
Affev 2 | \n0.91 | \n|||
Affev 3 | \n0.89 | \n
Exploratory factor analysis.
Once the optimal model was verified, the reliability of each scale was confirmed. Three tests were applied for this: Cronbach’s alpha (limit 0.7), composite construct reliability (limit 0.7) [85] and analysis of variance extracted (limit 0.5) [86]. Results show that, in all cases, the minimum values defined (see \nTable 4\n) by these parameters of reliability are met.
\nScales | \nVariable | \nAlpha by Cronbach | \nConstruct reliability | \nVariance extracted | \n
---|---|---|---|---|
Satisfaction | \nSat 1 | \n0.91 | \n0.93 | \n0.73 | \n
Sat 2 | \n||||
Sat 3 | \n||||
Sat 4 | \n||||
Sat 5 | \n||||
Functional benefit | \nFube 1 | \n0.88 | \n0.92 | \n0.73 | \n
Fube 2 | \n||||
Fube 3 | \n||||
Fube 4 | \n||||
Hedonic benefit visual attractions | \nHbviat 1 | \n0.87 | \n0.84 | \n0.64 | \n
Hbviat 2 | \n||||
Hbviat 3 | \n||||
Hedonic benefit escape from routine | \nHbero 1 | \n0.85 | \n0.93 | \n0.86 | \n
Hbero 2 | \n||||
Hedonic benefit recreation | \nHbere 1 | \n0.82 | \n0.90 | \n0.75 | \n
Hbere 2 | \n||||
Hbere 3 | \n||||
Hedonic benefit intrinsic pleasure | \nHbinple 1 | \n0.74 | \n0.88 | \n0.79 | \n
Hbinple 2 | \n||||
Symbolic benefit | \nSben 1 | \n0.90 | \n0.93 | \n0.77 | \n
Sben 2 | \n||||
Sben 3 | \n||||
Sben 4 | \n||||
Cognitive perception environment | \nCopen 1 | \n0.85 | \n0.90 | \n0.69 | \n
Copen 2 | \n||||
Copen 3 | \n||||
Copen 4 | \n||||
Affective evaluation | \nAffev 1 | \n0.88 | \n0.93 | \n0.81 | \n
Affev 2 | \n||||
Affev 3 | \n
Reliability of scales.
Source: Self-made.
Validity was confirmed in terms of content and construct. The scales show an adequate level of validity in terms in content, due to the deep analysis of the literature, a critical incident study with tourists and then a clearing process of this scale through different focus groups with tourists and interviews with experts and sales executives from travel agencies. In order to meet the construct validity, it was determined if the scales proposed, already cleared, meet the convergent and discriminant validity. Convergent validity was confirmed by observing that all the standardized coefficients of the confirmatory factor analysis (AFC) were statistically significant to 0.01 and higher than 0.5 [87]. In order to verify the existence of discriminant validity, a confidence interval test was used [88]. It consists in building the confidence intervals resulting from the correlations among the different latent variables that make up the confirmatory factor model (AFC) (see \nTable 5\n). According to this test, the model has discriminant validity since no confidence interval contained the value 1 [89]. The methodological process developed makes it possible to conclude that the proposed model shows a good level of overall validity.
\nConfidence interval test | \n|||
---|---|---|---|
Bi-variate relationship | \nConfidence intervals | \nDifference | \n|
\n | \n|||
Hedonic benefit—functional benefit | \n0.84–0.86 | \n1957.7 (1) | \n1955.9 (385) | \n
Cognitive perception—functional benefit | \n0.47–0.50 | \n1961.6 (1) | \n|
Cognitive perception—affective evaluation | \n0.41–0.42 | \n1988.7 (1) | \n|
Symbolic benefit—affective evaluation | \n0.47–0.48 | \n1992.7 (1) | \n|
Symbolic benefit—satisfaction | \n0.61–0.64 | \n1956.2(1) | \n|
Hedonic benefit—cognitive perception | \n0.51–0.53 | \n1971.0 (1) | \n|
Satisfaction—affective evaluation | \n0.53–0.55 | \n1972.6 (1) | \n|
Hedonic benefit—satisfaction | \n0.82–0.85 | \n1956.4 (1) | \n|
Satisfaction—functional benefit | \n0.81–0.85 | \n1966.3 (1) | \n|
Satisfaction—cognitive perception | \n0.50–0.54 | \n1955.9 (1) | \n|
Symbolic benefit—hedonic benefit | \n0.72–0.75 | \n1959.8 (1) | \n|
Hedonic benefit—affective evaluation | \n0.66–0.67 | \n1996.4 (1) | \n|
Symbolic benefit—functional benefit | \n0.60–0.63 | \n1958.4 (1) | \n|
Affective evaluation—functional benefit | \n0.61–0.62 | \n1979.3 (1) | \n|
Symbolic benefit—cognitive perception | \n0.42–0.45 | \n1962.0 (1) | \n|
\n | \n|||
Hedonic benefit visual attractions—hedonic benefit escape from routine | \n0.65–0.67 | \n139.8 (1) | \n139.3 (29) | \n
Hedonic benefit visual attractions—hedonic benefit intrinsic pleasure | \n0.70–0.72 | \n142.0 (1) | \n|
Hedonic benefit visual attractions—hedonic benefit recreation | \n0.71–0.73 | \n157.7 (1) | \n|
Hedonic benefit recreation—hedonic benefit escape from routine | \n0.85–0.88 | \n162.7 (1) | \n|
Hedonic benefit recreation—hedonic benefit intrinsic pleasure | \n0.78–0.79 | \n160.7 (1) | \n|
Hedonic benefit intrinsic pleasure—hedonic benefit escape from routine | \n0.60–0.61 | \n142.6 (1) | \n
Discriminant validity.
Note: All coefficients significant at a level of 0.01.
The hypotheses presented were confirmed through a SEM model, for which the software AMOS version 23 was used. The values obtained for the indicators of adjustment of the model were within acceptable levels: IFI 0.910, CFI 0.910, RMSEA 0.072, Normed
The estimated structural model.
\n
\n
\n
\n
\n
\n
\n
\n
\n
This study includes an analysis of certain factors as antecedents to tourist satisfaction. Specifically, the functional, hedonic and symbolic benefits the visitor perceives. The findings provide a basis for concluding that the functional and hedonic benefits play a key role in creating tourist satisfaction. On the other hand, the symbolic benefit has been found not to be a fundamental factor in order to achieve tourist satisfaction. The hedonic benefit has been confirmed to be a multidimensional factor, based upon the perception of the tourist destination in terms of: (1) visual attractions; (2) escape from routine (3) leisure; (4) intrinsic pleasure. At the same time, the functional, hedonic and symbolic benefits perceived have been determined to be a consequence of cognitive perception and the affective evaluation of the tourist destination by the tourist. Considering the strong link between tourist satisfaction and their likelihood to recommend or return to a place [5], the different stakeholders involved in the industry must create activities and spaces aimed to fulfill the basic needs of tourists. Cancun, Mexico could be a good example; a place that offers a variety of good restaurants and accommodations. Undoubtedly, this could help a tourist destination to establish a link to the functional benefit perceived by the tourist. On the other hand, it is imperative to stage a comprehensive, consistent setting in the destination, with an emphasis on providing an enjoyable visit. “Torres del Paine” national park in the south of Chile could be taken as an example. The tourist chooses to visit this place for the majesty of its beautiful visual attractions, as a great chance to escape routine, have fun and derive intrinsic pleasure from contact with nature. Evidently, this virtuous cycle will be the best way to link the place to the hedonic benefit perceived by the tourist. Even though the symbolic benefit perceived by the tourist is not a fundamental factor as antecedent to satisfaction, it is still important. Therefore, it becomes necessary to take care of the environment for the place to fit the sense of social belonging expected by visitors. Punta Cana, in the Dominican Republic, could be an example of this. Visitors expect to find first-class resorts and hotels and are not willing to stay in a place which does not fit their social standing. Taking care of this concept will be helpful to establish a better link between the place and the symbolic benefit perceived by the tourist. Linking a destination to the benefits perceived by the tourist will be pointless if such a place cannot offer a high level of public safety, cleanliness, an adequate transport system and adequate signage. The Riviera Maya in Mexico is a good example. Here the tourist can move around safely, knowing the police are constantly patrolling and seeing the clear signage indicating the different places of interest, in a clean, quiet setting. Attention to detail is the best way to link the cognitive perception by the tourist to the triad of benefits perceived. Similarly, the place should strive to offer positive emotional experiences for the tourist. This requires recreational activities that offer a fun, lively and cheerful atmosphere. Rio de Janeiro, in Brazil, could be an example of this. Here the tourist expects to find events and activities that showcase the cheerful nature of Brazilian culture. This is a way for the destination to establish a closer link to the affective evaluation by the tourist.
\nThis work is mostly a cross-sectional study, so bias in terms of common variance could be significant. Therefore, it would be advisable to conduct it again as a longitudinal study in order to confirm if the results derived from the proposed model can be extrapolated to other tourist and geographical contexts.
\nCyber Security protect Information Technology (IT) assets, devices, data, programs, and networks from digital attacks or damage using processes, technologies, and practices to mitigate unauthorized access [1, 2]. Cyber security employs a variety of security concepts such as threat modeling to safeguard user’s asset, environment and organization from being attacked. Threat modeling attempts to enhance cyber security by hypothetically analyzing, itemizing, and prioritizing the potential threats using the attacker’s point of view [3]; with an accurate and deep understanding of threats to enable risk evaluation, and subsequently prioritize mitigation against an attack. Neglecting the security designers in cyber security and focusing only on human factors in cyber attacks [4] give room for wide penetration to sensitive systems through social engineering. Consequently, this could pose threats to physical machines and human manipulation via social engineering which is the most important aspect of information security. This ascertains the fact that the issue of cyber attack is progressively becoming a threat that militarizes information technology assets.
Cyber security cuts across technical and social matters and this need to be given priority as there have been a paradigm shift in the movement of businesses and government activities to the online platforms [2]. The complexities and interdependency on the technological system, poses a daunting threat to security engineers as devices and infrastructure are networked in socio-technical environment in which they operate. Therefore, the use of Application Program Interface (API) without the system engineer’s control greatly undermines the system properties [5]. This gives rise to the creation of different laws with various provision of Cyber Security data protection, and privacy laws that operates from the inception with over 142 countries [6]. The provision of data protection laws and various security concepts such as threat modeling will be efficiently and effectively put into use if priority is also given to User Experience (UX) through the integration of intelligence in User Interface (UI) design. If UX is seen as having a huge effect on UI design, it could assist security experts in the development of intelligent threat modeling tools that can detect anomalies and make users understand the associated threats in every Human Computer Interaction (HCI).
Threat Modeling (TM) is the basic building block for the establishment of secure systems. Threat modeling is a proactive move towards recognizing potential security concerns and an approach to risk assessment [7]. The success of any cyber security threat model is hinged on the development of an Intelligence System using Artificial Intelligence (AI) paradigms with keen attention on User Interface (UI) that takes into cognizance user interaction. According to [8], particular attention must be paid on what to offer to users as being regarded as a system/tool or an agent/assistant while considering Intelligent User Interface (IUI). IUI must be an Interactive System. Threat modeling must incorporate AI for efficient Human Computer Interaction (HCI) by leveraging on Machine Learning (ML) algorithms to develop a UI with automated capability and improved usability that guarantees high performance. Machine learning algorithm selection for model building can be subjective [9]. Hence, the need for a Multi-Criteria Decision Making (MCDM) approach for optimal algorithm selection [10] is desirable. The threat modeling tools must include components that perceive, learn, interpret, reason and decide; with emphasis on the decision about what is constituted as a threat or not.
Cyber threats lead to risks. Risks in cyber security are as a result of technical vulnerabilities and degradation of fundamental operational practices over time. These practices change organization from safe and sound practices region to a state where an attack will be successful with a greater organizational adverse effect [11]. The security teams investigate threat modeling to assign priority to threats to ensure that attention and resources are spread efficiently. The different levels of priority ensure correct threat mapping resulting from efficient mitigation. Threat modeling often assist security teams in maintaining safety against possible emerging threats as it is conducted frequently [7]. This frequency can be improved by applying intelligence in the User Interface (UI) design so that the cyber threats can be appropriately modeled using machine learning algorithms. Areas where there is a lack of protection in the adopted tools can also be clarified by modeling threats and facilitating team decision making where the component is appropriate. Krishnan [12] suggested that Intelligent User Interface (IUI) will also be helpful in the prioritization of current applications based on the predicted threat effects and magnitude.
Human Machine Interfaces (HMI) deals with the study of two-way transmission of records among users and machines, which establishes a relationship with the user and create user experience [13]. It is natural for individuals to be proud of whatever they produce, no matter how simple it is or complicated as an HMI. Poor HMI designs have been seen as variables contributing to anomalous circumstances and thus exposing the design to cyber security threats. If the principles and practices of HMI are followed, the following are expected to be achieved for the design to be user-centered design:
Need to consider the user’s aim, obligations with competence
Need to consider the mode of processing information by the users and making of decisions.
Need to keep the user on top of things and awareness of system condition.
If all these principles and practices are followed, they will improve the cyber security process, but regrettably, various HMIs designs were created with little human input, hence they are technology-centered and are not achieving the desired results. If the aim and the responsibilities of the users are considered with competence, attack threats will reduce. Also, consideration of the user’s mode of processing information and decision making must be built into interface design. The successful application of baseline principles leads to trust and the level of trust the users have in a design will govern how they use it. For instance, if a user does not trust a site, he/she will not supply credit card details. If these principles are violated it can lead to credit card hacking. Table 1 shows the relationship between poor HMI and effective HMI.
Piping and Instrumentation Drawing (PID) representation | Layout consistent with operators’ model of the process (not a PID) |
Presentation of raw data as numbers (temperatures, pressures, etc.) | Depiction of process status and values as information, not numbers |
No trends | Key Performance Indicators (KPI) as trends |
Bright colors, 3-D shadows | Gray backgrounds, low contrast |
Color coding of piping and vessel contents | Consistent visual and color coding |
Measurement units in large, bright text | Measurement units in low contrast lettering, if used at all |
Characteristics of poor and effective HMI.
Intelligent HMI or HCI can help reduce security problem. A typical example of a security threat in the cyber space is phishing. Many phishing web pages are merely clones of actual sites with minor skewed or masqueraded elements in certain instances. These phishing sites’ properties have made Intelligent HMI or HCI problematic for system users as well as several anti-phishing strategies to spot them. Attackers have been able to respond rapidly to anti-phishing initiatives that limits the efficacy of phishing attempts and defend unsuspecting users. Despite the impressive strides made by anti-phishing systems, in recent years, this assault remains one of the most successful. An IUI can be used to reduce the efficacy of phishing attacks and improve consumer understanding of associated threats. Using AI, the interface not only informs the user that there is a phishing attack but also discuss reasons why the website is a phishing site. Such a system is proposed in [14].
User Interface (UI) allows the user to control software applications or hardware devices thus allowing the user have an interaction with the software or hardware of any device especially computing devices. User interfaces are available for both hardware and software devices. A typical example of a hardware device with user interface is the remote control; it has several buttons and sometimes screen to display some basic information. However, the buttons can be used by the user to tell the hardware what to do or what operations to perform. For instance, the use of a keyboard and mouse, each of which has its own user interface, to run a software program. Similarly, through the on-screen menus, a program graphical user interface, can be used to operate a digital camera. According to [15] the aim of a successful user interface, regardless of the program, is to be user-friendly.
UI focus on the looks and styles and it serves as the access point where the user interacts with the designs and system functionalities. UI comes in three forms such as Graphical User Interfaces (GUI), Voice-Controlled User Interfaces (VUI) and Gesture- Based User Interfaces (GbUI) [16]. The GUI allow users to interact with the visual representations of a digital control panel or system. Typical examples are the computer desktops and mobile phone screens. Unlike the GUI, the VUI allow users to interact with the systems and components via voices and speeches. Typical examples are the Google Assistant on Google devices, Siri on IoS devices and Alexa on Amazon devices. The VUI are rampant with more intelligent systems as there is need for a high level of voice recognition and speech processing. For Gesture- Based User Interfaces, the user gets more engaged in the three-dimensional (3-D) space and uses gestures, most especially hand gestures, in interacting with the system. These types of interfaces are mostly used in virtual reality spaces. Three key elements in UI include input control, navigational control and the informational component. Integration of cyber threat related feedback to UI for automated sentiment analysis of the system will aid qualifying potentially new type of attacks or threats.
Unlike the UI, that focuses on interfaces, the User Experience (UX) describes and centers on the user’s experience of an interaction with the system. Interaction tends to be broader than interfaces as it facilitates dialog and communication between the user and the computing device. The Interfaces are used to experience interactions. Three major dimensions in UX are the users, products and interactions. UX helps to provide a simple way to analyze user product interactions and what influences them. The experience derived from the user product interaction at a given time and in particular conditions is regarded as UX [17]. It is the individual perception that results from the use or anticipated use of a product/service or system.
UX deals with analysis, experimentation, creation, content, and prototyping, whereas UI is a method of visually leading the consumer through all devices via the interface of a product utilizing interactive elements including cyber threat modeling. To solve a dilemma, UX focuses on all that concerns the user’s path during and after the modeling process. UI, on the other hand, is a method that focuses specifically on how the interface of the product look and work. UX is a whole environment that cannot be confined to the screen. On the contrary, UI is typically visual and screen-related content [18]. A deep learning or ML that has the ability to continuously re-train itself based on user activities can be applied to increasing UX in making decision automatically. Example of such is the fake news/hate posts detection model used by some social media platforms.
Design focus with Artificial Intelligence paradigms in User Interface is referred to as Intelligent User Interface (IUI) design. AI is revolutionizing industries and changing the status quo, and the design of UI is not left out in its disruption. AI is being used to design tools for providing details to UI designers to aid their designs. AI tools for User Interface (UI) with focus on User Experience (UX) like Uizard and Airbnb’s Design AI can turn design sketches into product prototypes [19]. The interfaces must be intelligent enough for adequate detection of cyber threats. An AI-based User Interface threat model will assure reduction in cyber risks. A mainstream example of IUI is the GMail Smart Compose that offers predictive text to complete sentences thus aiding in writing emails faster [20]. An Intelligent Virtual Assistants (IVA) or AI assistant is another example of AI in UI design generally called IUI. Some notable IVA are Amazon Alexa, Microsoft Cortana and ChatBots. Generally, AI can be applied to UI designs on various interfacing channels between human and machines especially when modeling cyber security threats. Channels like search engines (Yahoo search, Google search, Bing, etc) and content recommendation systems (Netflix, Youtube, Spotify, etc) are also significant examples of IUI. Data privacy and considerate integrations, among others are challenges encountered with AI in UI designs, and they must be factored in during the design process for cyber security treat modeling [21]. IUI is aimed at incorporating intelligent automated capabilities and Artificial Intelligence (AI) into Human Computer Interaction. They are human machine interfaces that aims at improving effectiveness and efficiency of Human Computer Interaction (HCI) through the use of reasoning, user models, domains and media such as GUI, VUI and Gesture-Based User Interfaces [22]. IUI sits between AI and HCI. Figure 1 depicts the relationship between AI and HCI with consideration to IUI.
Relationship between AI, HCI and IUI [
HCI provides design techniques for user interfaces that are efficient and the AI components are used to embed intelligence into those interfaces. Basically, IUI is used to depict interfaces that generates some sort of output or exhibits some behavior in which the user interacting with the system considers the system intelligent [25]. A typical example is when a user clicks a wrong button and the interface is able to guide the user on the right button to click. Also, assistance to the user must be readily available through IUI.
Due to diverse models from differing fields that greatly influence user interfaces, the development of IUI is no different, as there are disciplines such as AI which contributes the intelligence in simulation approach to improve responsiveness; software engineering which allows for formal language definition, unified modeling approach, development life cycle; and the Human computer interaction that evaluates the user experience and avails techniques that can be used to create usable user interfaces [26]. In addition to these, there are other fields that still significantly contribute to the development of IUI which is depicted in Figure 2.
Research fields of the intelligent user Interface [
IUI tends to enhance the interaction between computer and human by bringing about novel approaches of communication and adapting the interface to the user using techniques of AI [27]. The concepts of IUI tend to the intersection of the area of AI and HCI in the field of IUI [28]. This is with a view to automate users’ task while engaging in the threat assessment on cyber security [7]. Therefore, the application of intelligence in UI design will in no small measure bringing about better monitoring and controlling of activities that enhance better cyber security measures and threats modeling applications.
The advent of computers which primarily uses a mouse and keyboard as a medium of HCI has brought about a new dimension in the design of UI. This gives rise to the creative and innovative way of UI design for cyber security tools smartly through the use of AI. A new generation of UI which is called IUI keeps rising day by day and improving UX in HCI. IUI attempts the integration of intelligence in HCI that enables the automated capability of UI with the view to improve usability that enables high performance of HCI in cyber security software. It employs design and implementations of AI components that perceive, learn, interpret, reason, and decide with a view to enhancing the capabilities of cyber security experts effectively [24] in decision-making. A different approach and tools can be employed in the implementation of IUI design. The choice of tools and approach is however depending on the goal and the area of application in the cyber security modeling tool. The strong effect of AI on UI/UX is that it helps fix challenges and avails insights and discoveries, however, humans have to recognize the challenges first. AI is therefore less likely to be pre-programmed and more likely to be built with technology so that it can fix the challenges by sustained learning and based on this learning, decisions can be more customized and user-centric. Data can be analyzed and reported in real time with AI.
Applications of machine learning (ML) that communicate directly with daily users are now progressively diverse and ubiquitous. ML is designed to allow a computer to learn about the past or the present and to forecast or predict the knowledge for unknown events in future [29]. The technology’s sophistication and prevalence facilitates the belief that AI is the new UX; that is, AI would be the most effective way to boost the user experience [30]. This is because AI will permit UX designers to personalize contents through the application of machine learning algorithms to build intelligent models to mitigate cyber threats.
Typically, the development and design of UI occurs over the following phases as shown in Figure 3,
On a whiteboard or graphic tablet or even a sheet of tissue paper, designers of the program want to sketch their UI concepts by hand.
The designer uses a computer’s wireframing method to build the same template again. This is a step that is repetitive.
The wireframes are converted into a functioning UI code by UI developers. Before the intended UI is designed, the developers and designers go through an iterative phase. This step is a procedure that is time consuming and tedious.
UI development phases [
However, using AI, a handwritten design can be translated to a working UI as shown in Figure 4. This code generation usually go through a training phase and a sampling phase. The training phase is where the model is trained to identify images and state the relationships between them using algorithms like the Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) and the sampling phase is more like the prediction phase where samples of UI to be translated will be supplied to the model so as to evaluate and fine tune it’s performance.
Translating handwritten design into working UI [
The benefits of using AI in the design of UI include but are not limited to:
Rapid prototyping, improving iteration cycles, and ultimately better app development for both designers and developers. Critical project time will be saved on design projects when AI-based approach is adopted.
It would encourage designers and developers to concentrate on what matters most, adding value to end-users.
There will be very little or no barrier in application development as time to learn the use of UI design methods and time to code can be eliminated since everyone can draw UI on paper [31].
There is an elaborate interpretation and analysis of data for user-based customizations as vast amount of data can be collected. With AI, on the basis of data interpretation, you get the capacity to configure the interface according to consumer requirements.
Real-time learning and seamless adaptation can be achieved using AI in the design on UI. By combining deep learning that uses immense datasets to help draw a conclusion and this helps UI programmers easily build adaptable and improved interfaces.
It empowers the interface user. As AI continues to grow, consumers may have the ability to obtain more power over programs, eventually growing confidence and contributing to more usage.
It is possible to establish a deep bond with humans as AI systems gather and evaluate a large volume of data, resulting in better relationships.
AI systems can establish a deep bond with humans by creating relationships. Relationships foster where trust grows and this relationship could either be human to human or human to machine. One of the major reasons for the wide adoption of technology (especially AI) is the growing trusts in these systems. This reliance is strengthened by a repeated show of ability in achieving purpose, speed, accuracy, usability, security and privacy amidst other things [32]. By mining enormous data, through the use of deep learning, the trust between AI and humans can be strengthened by the continual generation of useful insights that fits into diverse purposes and ensure goals are achieved with speed, accuracy and security thereby increasing the usability of such systems. Considering the example of phishing site, the user’s trust in the system is bound to increase because the system has protected the user from the phishing attack. Therefore, the user could rely on the AI system to detect phishing sites and help mitigate cyber threats. The more we interact with AI systems, the deeper the connection. For every interaction, data is generated and added to an individual’s digital footprint on a system which AI feeds to improve its intellect with humans. AI technologies are also evolving rapidly and currently can analyze human emotions, sparking wild discussions into its unforeseeable future [33].
The complexity and the number of cyber attacks is increasing [34] on a daily basis which poses a lot of threat to both public and private technological assets. Cyber security employ threat modeling techniques in mitigating attacks against technological asset by hackers. Threat modeling allows proactiveness and provides insight to risk evaluation and prioritize mitigation [35]. Formal methods have been found to be profound for performance evaluation compared to traditional methods [36]. As the cyber threat is becoming prominent, application of Artificial Intelligence (AI) in cyber security is another advancement in the technology employed by the experts in the field [34]. The manifestation of AI - enabled UI are Jarvis, Amazon Alexa, Neflix, IBM Watson, Nest Thermostat, Spotify and iRobot Roomba [37]. While advancement in technology to enhance security measure against cyber threat is expedient and important, User Experience (EU) also need to be given a high priority in the User Interface (UI) design to enable high usability and hassle-free workflow. As better security of system should not be tantamount to worse UX, the important factors for enhanced UX and UI in cyber security are balancing the security of system/software with UX, designing of UI based on human perception and minimizing the complexity of software integration into the existing network infrastructure [38]. A poorly designed UI reduces UX which leads to a user performing desired actions with difficulty [39]. An application of AI plays a key role in the IUI to mitigate problems that may arise from human interactions with machine. IUI is regarded as a subset of Human-Computer Interaction (HCI) research with a goal to use smart and current technology to improve HCI.
Applications of AI on UI can drastically improve the interaction between humans and computers. This makes it possible for computers to understand more human communication channels like body gestures, hand gestures, sounds, eye movements, lip-sync and other body motions [40]. This advanced communication with humans via AI has led to innovative solutions addressing human-computer communication barriers. An example is Conversational AI, which is an advanced platform for the widely used online service helpdesk. Conversational AI can analyze an individual’s emotion and manage frustrations on the system by routing to different channels for better customer service [41]. With IUI, adaptive, personalized and responsive services can be provided to ensure the specific need of the user is met even when they are yet to realize it. With big data, data mining and deep learning algorithms, technologies that can drive these personalized services could be developed to work in synergy with intelligent environments to mitigate environmental challenges that may arise as a result of human computer interaction.
As the important features of IUI is to enhance the HCI, the following are current techniques used in IUI [27]:
The application of intelligence in UI design is to improving users’ experience that enables efficiency, effectiveness and user satisfaction using different approaches. This is achieved through the representation of reasoning or acting in accordance to a set of models such as user, dialog, domain, tasks, or speech. As shown in Figure 5, different models from different disciplines constitute the development of IUI. AI contributes the simulation of intelligent techniques to enhance the communication, software engineering- enabled notations, unified processes and formal languages while HCI deals on consideration pertaining to users. These combinations of models allow the creation of techniques that allow usable user interface.
Disciplines involved In the development of IUI [
IUI applies AI techniques to different input and output with a view to improving UX intelligently. This is achieved through reasoning, representation of knowledge, machine learning, adaptation, and adaptivity as exemplified in various applications such as email filter system, dialog system, email response system and so on [43]. As threat modeling provides answer to questions, “where, what, and how” [3], so also the metrics derive from these questions serve as input and output in AI to improve UX and integrate intelligence in UI designs.
There are two different methods of a user interface that can effectively be applied to intelligence user interfaces in cyber security threat modeling namely direct manipulation and indirect manipulation [7] as depicted in Table 2. Also, IUI have been anticipated as a way to overcome a number of the issues that direct manipulation interfaces cannot deal with and further highlighted three principles that can be applicable to threat modeling in cyber security, namely (i) control transparency and predictability (ii) Privacy and trust (iii) treating systems as fellow beings [47].
Supports the users to understand the interface action | High | Low |
Accuracy of algorithm | Low | High |
For evaluating intelligence | High | High |
Provision of intelligence in an interface | High | Low |
Ehlert [27] also highlighted a number of issues that recent direct manipulations interfaces will not be able to handle for instance creation of tailored systems, filtering problems, provision of assistance on the use of complex and new programs, taking up the responsibilities from the users with other forms of interaction. The characteristics for developing intelligence in user interfaces designs that enhance the development of a threat model in cyber security are:
Lieberman [49] highlighted the following challenges about IUI for threat modeling in cyber security:
failure to give exceptional consideration to transparency and explanation.
evaluation of AI interfaces is challenging.
invest more in long-term interactions than the predictable interfaces.
self-mindfulness and appearance in projects have been a challenge
that predictability is not the solitary determinant of usability
Adaption of UI is a challenge for imparting intelligence which comprises the interpretation of user’s events and correct prediction of the objectives. In addition, it is a common trade-off, deciding whether to use an easy approach so as to assist functionality. Finally, listed are the three major challenges:
Presentation (Human Computer Interaction stage of IUI),
Competence (focuses on Artificial Intelligence approaches or procedures)
Trust (on the IUI)
Intelligibility, predictability, usability and adaptation are four characteristics that must be consider while considering User Experience in the design of IUI as shown in Table 2.
The Intelligibility of IUI as it relates to how the users understand the interface actions was high when it comes to direct manipulation and low in indirect manipulation. This gives a better understanding of how and when intelligence can substantially improve the design practice (interaction) in the application of cyber security for threat model [47]. On the accuracy of algorithm which explain the predictability, there are many algorithms such as Dynamic Bayesian Network and Naïve Bayes can be used for user’s prediction and techniques such as adaptation techniques that provide intelligence for enhancing the predictability of the UI and creating a lasting UX. The performance of these techniques decrease when the accuracy of algorithm by the system becomes low [44]. The usability principles for evaluating Intelligent User Interfaces (rather than direct manipulation systems) ensures that it does not mislead the user’s expectation [48]. The provision of intelligence in a UI is highly reliable and cost efficient in direct manipulation than indirect manipulation as the authoring tool enable easy development and maintenance of the intelligent parts of the system [50] especially when it concerns threat modeling due to consideration for various risk metrics.
A poorly designed interface can bring about inconvenience to its users. Just like every other product, IUIs need to be built carefully. The need for an IUI should be obvious from the analysis of the issue, instead of making an IUI simply because it is good. First of all, it should be determined whether a device needs an IUI or not because IUIs are typically more computer-intensive than conventional user interfaces. With a user interface, if the same performance can be achieved, why bother making a more complicated and expensive IUI? The final decision whether to build an adaptive process in interfaces or not lies in weighing the expense of deployment against the enhancement of user engagement [51]. If adaptive functionality is introduced in IUIs, the cognitive processing expected by the user will be reduced whereas, installation and management of an IUI would take time and computing resources. In designing IUIs, the following iterative refining steps below are used.
The following are some of the design approaches to the application of IUI for better user experience. Table 3 shows the descriptions of various IUI design methods [53].
Probability-driven State-charts | It uses state-charts to analysis users flow through different states. It creates a probability metrics of users expected actions with various features or events on an interface. This metrics then feed decisions on how the UI is personalized. |
Decision Trees | This method utilizes contextual data to determine the choices of user groups. This analysis helps to make intelligent decisions on how different users interacts with a UI. |
Prediction via shortest path algorithms | This approach uses weights to determine paths users will frequently take. Its process involves tracking the previous or source state, the next or target state, current event and time of the event to determine user’s shortest paths. |
Higher-order Markov model | This approach analysis multiple user transitions to predict user’s decision on the next path to take. This analysis is focused on users previous or source paths and goes beyond the user’s last path to its extended source paths to a destination. |
Deep Reinforcement Learning (DRL) | This design approach does an extended prediction into expected user activities. DRL analysis itself towards the predictions of user’s behaviors and it either regards itself if the predictions are correct or get punished if otherwise. This learning is done over-time to improve itself towards becoming a perfect user prototype with knowledge of expected actions. |
IUI design methods.
The distinguishing factor between the traditional UI design and IUI design is the application of AI for better User Experience (UX). AI introduces a raw ability towards creating individualized interfaces through insights and discovery from understanding users’ actions [54]. The user’s expectations or intended activity on an interface is what AI feeds on to present a better user experience. The traditional UI is still relative to the design, but AI factors the user’s interest to give them lasting User Experience (UX). With the traditional search engines, algorithms are rigid and yield similar search results for the same search input from different users, but AI evolves the search engines to generate smarter results tailored to a specific user. Keyboards is another rigid interface being gradually replaced by sensor-based interactions like body gestures, touchless hand gestures and sounds. Affective computing is another AI intervention, it factors human emotions, moods and expressions [55]. It’s an emerging technology that enables a UI to understand and respond to human emotions in hopes of changing the rigid form of human interactions with computers.
Pertinent question must be asked when it comes to AI and UI design. What is the importance of AI to the design of User Interface? This question can only be answered with recourse to HCI. Every process in industrial design field of HCI and AI are intertwined from earliest stage in computer development with core relationship as intelligence even as at today [49]. The intelligence ushers in knowledge representation and interaction management with the application of machine learning algorithms in the design of IUI. The emergence of HCI has brought about a lot of innovations which led to technological development propelled by ubiquitous computing [56]. The idea behind HCI is making computers very easy to use and more helpful while AI is modeling human idea and exemplify those ideas into computer. These relationships bring about the creation of IUI with a high degree of usability. Therefore, AI unravels many difficulties being confronted with in User Interface design and answers many questions relating to User Experience. Table 4 depicts HCI goals in relation to User Interface design and AI.
It gives attention on collaboration among remotely-located users | It unites the imagined joint effort between the user and the computer, as the computer takes a more lively function | |
It is more flexible as users can uninhibitedly blend significant level communication and give definite and explicit directions. | It can give a more flexibility to computer systems input. | |
It studies users and transfer the results at design time to designers and implementors. | It offers the capacity to move part of the loop comments from design time to run time. | |
It describes the real-world work practices and assure the systems is constant with these practices. | It represents the work practices as workflow descriptions and document content (both procedural and declarative) | |
It helps users to achieve their personal and work tasks and goals. | It gives opportunity to concretely implement the user’s ideas directly in working systems. |
AI versus UI design.
The application of AI in UI design is mainly a digital practice and will visually guide the user over the product’s interface. There is a brighter future for integration of AI into UI, even though there are several AI algorithms with heuristic nature but these solutions (predefined model, making more established communication as less significant than current ones and excessive accuracy) can assist in the threat modeling for cyber security [44].
IUI design model depicts the representation of the UI and how the UX will be. The selection of design model is very important because this determines what features and services will be available in the user interface. Using a blueprint may be a major boost in the design process [57]. Some models have an overall architectural model that focuses on user modeling, whilst others propose a multi-modal input architectural model. Input is captured and later pre-processed from the keyboard, mouse, microphone, video, or probably some other input unit. Production entails case marking and other input elements that are interesting. The different modalities are fused and measured after each input modality has been evaluated.
Once all the knowledge required is accessible and revised, the framework must settle on the best choice for intervention. This is called adaptation in Figure 6, as some types of interface adaptation are typically selected. Assessment and adaptation sometimes take place concurrently using one inference engine for both, rendering the difference between the process of assessment and adaptation not very obvious. It is also important to produce the selected operation, which is achieved in the segment of performance production. Most IUI can be produced with this model or equipped with it. A general IUI model is shown in Figure 6.
Intelligent user Interface model [
AI is driving simplicity in UI and UX design, and the following are some of the top use cases.
Learning Curve | Minimal | Minimal | Minimal | Minimal | Minimal |
Simplicity | High | High | High | Medium | High |
Offline capabilities | No | No | No | Yes | Yes |
Free to use (No trial) | Yes | No | Yes | Yes | No |
Collaboration | No | No | Yes | Yes | Yes |
Community Support | Low | Low | Medium | High | Medium |
Supported Platforms | Web | Web | Mac / Win | Web | Mac / Win /Web |
Code Generation | Yes | Yes | Yes | No | No |
In Production | No | No | Yes | Yes | Yes |
Developer Specs | Yes | No | No | Yes | No |
Screen Transitions | Yes | Yes | Yes | Yes | No |
Designs from Scratch | Yes | Yes | Yes | No | Yes |
Active Usage | Low | Low | Low | Medium | Low |
Comparative analysis of commonly used IUI design tools.
The method of threat modeling is a collection of techniques used to construct a system abstraction, profile possible attacks, goals and procedures, including potential threats index that may occur [62]. A typical threat modeling process includes five components which are threat intelligence, asset identification, mitigation capability, risk assessment and threat mapping. Threat models require the application of Artificial Intelligence for prompt risk reporting. In the second quarter of 2018, the cost of cyber crime damage is projected to hit $6 trillions annually by 2021 and the vulnerabilities of the malware that target machine have been up to 151%. Therefore, Intelligence User Interface (IUI) is desirous for threat modeling. There can be external or internal threats, with catastrophic consequences. Attacks may completely bypass programs or leak confidential information that reduces the customer interest in the system’s provider.
There are over a dozen mainstream threat models applied to Cyber Security. Threat models have been in existence since the late 1990s to help fortify cyber security. Meanwhile, [63] noted that irrespective of the availability of various threat models, they all follow five steps. First is a granular breakdown of infrastructure or application, then determining the threats, followed by its preventive measures, next is severity reduction (mitigations) and lastly, ranking of threats [35]. The predictability capacity of the machine learning algorithms is a major factor in threat modeling. There are twelve threat models, but the pioneering model is Microsoft’s STRIDE that sprung-off in 1999 and gave rise to subsequent models. STRIDE results in a few false positives and is ideal for teams with little security expertise [64]. Other top models include DREAD, PASTA, LINDDUN, Trike, OCTAVE, CVSS, hTMM, Attack Trees, Persona Non-Grata (PnG), Security Cards, Quantitative TMM and VAST Modeling [65]. An analysis of threat models discovered that hybrid threat models handle more potential attacks than single models [62]. This analysis also recommended the PASTA model because it has a well-structured layout, and its implementation is attributed to sub-systems rather than the whole system. Another threat model worthy of note is the Persona Non-Grata (PnG), tailored to UX design, where users’ behaviors and interactions with UIs are analyzed. It outputs a few false positives and it is ideal when the system’s weakness is known else it becomes difficult to pinpoint likely threats. The Security Cards model is another endorsement ideal for unusual or advanced attacks and is dependent on brainstorming about possible intrusions. The major drawback of Security Cards is its high false positives [64]. Table 6 shows the comparative analysis of the features of the most common threat modeling methods that are widely in use.
Documentation | Extremely High Documentation | High Documentation | Less Documentation | Less Documentation | Less Documentation | Extremely High Documentation |
Technical Threat Identification | Highly Suitable | Highly Suitable | Highly Suitable | Highly Suitable | Highly Suitable | Highly Suitable |
Non-Technical Threat Identification | Highly Suitable | Suitable | Suitable | Highly Suitable | Highly Suitable | Highly Suitable |
General Threat Identification | Very Efficient | Very Efficient | Efficient | Moderately efficient | Very Efficient | Very Efficient |
Time Consumption | High Time consuming | Extremely time consuming | Moderately time consuming | Moderately time consuming | Moderately time consuming | Moderately time consuming |
Usage | Very Easy to Use | Difficult to use | Moderately easy to use | Easy to use | Easy to use | Easy to Use |
Model Maturity | High Maturity | Medium Maturity | Low Maturity | Medium Maturity | Medium Maturity | High Maturity |
Area of focus | Developer | Attacker / Application | Enterprise | Acceptable Risk | Attacker / Application | All Encompassing |
Training / Usage Requirements | Required Less Training | Required More Training | Require Moderate Training | Require Moderate Training | Require Moderate Training | Require Moderate Training |
Business Impact | Low | Extremely High | Low | Low | Medium | Medium |
Threat Output | Threats properties, system entities, incidents and system limits | Threat management, enumeration, and scoring. | Target out-of-the ordinary threat (sophisticated threats) | System direction and Attack Targets | Scoring System and Severity Ranking | Threats properties, system entities, Scoring System and Severity Ranking |
Security Properties | Extremely High | Very High | High | Very High | High | Extremely High |
Areas of application | Software Industry and Engineering | Software Industry, Engineering and Banking | Production | Construction and Production | Software Industry and Banking | Software Industry and Project Management |
Threat Classification | Very Efficient | Efficient | Moderately Efficient | Efficient | Highly Efficient | Highly Efficient |
Stakeholders Input / collaboration | Very High Collaboration | Extremely High Collaboration | Extremely High Collaboration | No Collaboration | No Collaboration | Very High Collaboration |
Threat Prioritization | Medium Prioritization and Moderately Efficient | Extremely High Prioritization and Highly Efficient | High Prioritization and More Efficient | Medium Prioritization and Moderately Efficient | Extremely High Prioritization and Highly Efficient | Extremely High Prioritization and Highly Efficient |
Reliability | Highly Reliable | Highly Reliable | Extremely Low Reliability | Moderately Reliable | Highly Reliable | Highly Reliable |
Comparative analysis of threat modeling methods.
Threat modeling involve a number of processes and aspects for efficient mitigation. Failure to include these set of components might lead to incompletion in modeling thereby preventing proper threats prevention. The list of those components is as follows:
This is called threat intelligence. This has to do with the granular breakdown of infrastructure or application. The section contains information on threat types, affected devices, monitoring mechanism, vulnerability exploitation tools and processes and attackers’ motivations. Security analysts also gather and use online sources, proprietary solutions or security communications channels to access information on threat intelligence. This is used to improve the awareness and knowledge on emerging risks to determine the right course of action. Most importantly, it tries to understand the data flow across the system.
This is called threat determination. Security teams need an in-house inventory of the components and data used, the location of those assets and the security procedures used. This inventory allows security teams to monitor identified vulnerabilities for their assets. It helps to gain insight for asset modifications from an inventory in real-time. For instance, warnings to the possibilities of attacks if assets are introduced, with or without allowed approval. This involves identifying all potential and current threats to the applications/systems.
This is called countermeasures. The capability of mitigation (that is, capacity of mitigation) usually apply to technologies for securing, identifying and responding to a particular form of threat but also could mean the security skills, know-how and processes of an enterprise. Assessing the current expertise will help decide whether additional resources are required to minimize a threat. For instance, there could be an initial degree of security against typical malware attacks if there is company-grade Anti-Viruses (AV). To compare the current AV signals with other detection capacities, for example, the security expert can decide if there is a need to invest more. This is centered on preventive measures. This involves analysis of current application cyber attacks, managing the damages done, and fortifying system security.
This is called mitigation or risk assessment. This step addresses identified threats with a focus on high-risk threats. Risk evaluations are related to asset inventories through threat intelligence. These resources are required to help security teams think about their systems’ current state and develop vulnerability management strategies. Active device and solution monitoring can also provide risk evaluations. Penetration testing are, for example, effective in checking protection measures. This is to reduce severity.
Threat mapping is a method that traces the system’s likely path to threats. It seeks to model how assailants can switch from resource to resource and help security teams predict where protections can be implemented or enforced more efficiently. It deals with ranking of threats according to their severity and potential damages to the application.
Machine Learning (ML) assist in the mathematical models construction which has the ability to explain and showcase complicated behavior without the need for programming [50]. These techniques have a way of improving the HMI in the interface design and further improve the intelligence of the design. The usage of ML in Human Machine Interface/Interaction (HMI) design is not very trivial. Moustakis and Herrmann [66] affirmed that the misperceptions about ML, inadequate familiarity with ML’s latent capacity and research shortage are the main sources for declined utilization of ML in HMI design. Though, as of today ML has gained recognitions and advance applications can enhance user capability in UI design which helps in mitigating against cyber security threats. Integration of models that use logs to reactively discriminate transactions based on user’ history is essential for cyber security threat modeling.
The challenge usually face during threat analysis is now being fazed away by applying AI coupled with machine learning algorithms, which feeds on data to detect abnormalities in systems. Predictive analysis is AI-driven by data and uses large data to understand malicious activities, identify patterns, and provide insights into potential attacks much quicker [67]. Standardization does not exist, and thus the choice of threat models is deterministic of the project needs like targeted risk area, allocated time, expertise, and stakeholder’s involvement [68]. Furthermore, it is advantageous to apply threat models at the requirement and design stage of the project life-cycle [65] and the use of a well-formulated model for Software Development Life Cycle (SDLC) [69] for efficient threat modeling is desirous. Though AI sheds a positive light on cyber security, it also presents alarming intrusion possibilities for cyber criminals. This ordeal does not limit the impact of AI but rather re-enforces its significance, especially in cyber security threat modeling.
There are four baseline principles that are essential for designing an AI-enabled User Interface [70].
User expectation is very critical in the design of Intelligent User Interface so that false expectation can be avoided. Thus, the users will know the capability of the tools and its limitation as well as benefits expected with minimal input.
The AI is going to make errors. The user interface should be design so that users want to forgive any mistake they encounter from the tools. There should be capacity to understand response from natural language.
There should be transparency in data collection and allow users to customize with vivid dashboard for efficient monitoring. There should be provision for input from the users to alter what AI has learned apart from what has been programmed from the business logic.
Security must not be compromised in the design of IUI. Users confidence must be gained by ensuring privacy, security, and the ability for AI control. The user should trust the IUI with their personal data.
Threat Modeling in cyber security assists in examining current and potential vulnerabilities within a system, and has been an instrumental process against security threats [71]. Though favorable, this process has hardly warded off looming security threats that have kept a constant necessity for cyber security improvement, leading to conventional approaches on Threat Modeling. The introduction of AI into UI results in behavioral analysis, which can be applied to the second step of threat modeling called threat determination for forestalling cyber attacks. An effective AI approach tailored to vulnerability management has been on behavioral analysis on an attacker [72].
Threat Modeling incorporates AI to analyze various user interactions with interfaces and detect anomalies for potential attacks. Some software solutions or applications designed to detect cyber threats are Darkrace Immune System, a cyber security platform that uses AI to learn human interaction patterns on system interface for anomaly detection, Vectors’ Cognito and Paladion [73]. Codesealer is another software application that provides UI security [74]. Another application is Automated Virtual Agent for Truth Assessment in Real-Time (AVATAR), a United State government security screening tool designed to detect false information during user interaction with the system and is used for automated interviews at Airport checkpoints [75]. Some of the other applications of AI in cyber security are in the areas of spam filtering and malicious traffic detection. These are cyber threats which requires intelligent models to mitigate the attacks.
It is vital to note that AI has become a valuable tool for cyber criminals, thus reinforcing the significant practice of AI in UI designs [73]. AI application in UI is not left without drawbacks which are generally centred on the lack of pattern-driven dataset, computing and data resources. In addition, the introduction of AI attracts AI-modeled attacks like model evasion, data poisoning and data-stealing, though they can be managed by AI domain expertise with good security practices and safeguards.
Cyber security should employ a variety of security concepts such as threat modeling techniques to safeguard asset, environment and organization from being attacked. Five essential components of threat modeling process which are threat intelligence, asset identification, mitigation capability, risk assessment, and threat mapping are pivotal to mitigating security threat that are based on IUI design while taking into cognizance the baseline design principles. There must be proper application of different threat model methods at the requirement and design stages of the project life-cycle using a well-formulated Software Development Life Cycle (SDLC) model. The design of Intelligent User Interfaces requires incorporation of Artificial Intelligence (AI) to analyze various user interactions to detect anomalies such as phishing, spamming, fake news/hate posts, among others. To achieve this, predicative analytics must be institutionalized to further improve the intelligence of the design. Deep leaning can be used for sentimental analysis to determine expressions that can aid in qualifying potentially new type of attacks or threats. AI-driven User Interface (UI) design must be user-centered instead of technology-centered to give lasting UX which cannot be derived or experienced with the traditional UI Design. HCI provides design techniques for User Interfaces that are efficient and the AI components are used to embed intelligence into those interfaces. Therefore, appropriate IUI Design Methods, models coupled with AI-Based UI and UX Prototyping Tools are crucial for developing efficient cyber security threat modeling applications. This is highly essential because in the IUI design, direct manipulation method of design has low predictability which does not guarantee effective cyber threat mitigation.
Customer Satisfaction is of paramount importance at IntechOpen and we take all complaints very seriously. Our Authors, their institutions, and other purchasers, if dissatisfied with the service provided, or the product purchased, can file a written complaint to IntechOpen, 5 Princes Gate Court, London, SW7 2QJ, UK or via the following e-mail address: info@intechopen.com.
',metaTitle:"Customer Complaints",metaDescription:"Our authors, their institutions and other purchasers, if unsatisfied with the service provided or the product purchased, can file a written complaint at IN TECH d.o.o offices at Janeza Trdine 9, 51000 Rijeka, Croatia, or via the following e-mail address: info@intechopen.com.",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"Receipt of complaints will be acknowledged in writing and Intech Limited will respond fully to concerns within 15 business days.
\\n\\nCustomers have the right to terminate the contract without giving any reason (written notice of termination). The deadline for said termination is fourteen (14) days from the date of receipt of goods. Returns are at the expense of the Customer and must be made within the fourteen (14) days from the date of the written notice of termination. Intech Limited will process refunds to the Customer without undue delay.
\\n\\nIn the event that the Publisher ships damaged or misbound copies of products, or duplicate or incorrect copies of the products are received by the Customer, the Publisher will accept returns at the Publisher's expense, provided notice of such damaged or incorrect shipment is given to the Publisher within fourteen (14) working days from the date of receipt.
\\n\\nPublishing errors, including but not limited to typographical errors, having no significant effect on the editorial content or design characteristics of the products, cannot be considered a reason for rejecting payment or, as the case may be, modifying the agreed price.
\\n\\nAt the Publisher's request, the customer should provide evidence of the damaged or incorrect shipment. The Publisher will refund or ship the ordered products without delays.
\\n"}]'},components:[{type:"htmlEditorComponent",content:"Receipt of complaints will be acknowledged in writing and Intech Limited will respond fully to concerns within 15 business days.
\n\nCustomers have the right to terminate the contract without giving any reason (written notice of termination). The deadline for said termination is fourteen (14) days from the date of receipt of goods. Returns are at the expense of the Customer and must be made within the fourteen (14) days from the date of the written notice of termination. Intech Limited will process refunds to the Customer without undue delay.
\n\nIn the event that the Publisher ships damaged or misbound copies of products, or duplicate or incorrect copies of the products are received by the Customer, the Publisher will accept returns at the Publisher's expense, provided notice of such damaged or incorrect shipment is given to the Publisher within fourteen (14) working days from the date of receipt.
\n\nPublishing errors, including but not limited to typographical errors, having no significant effect on the editorial content or design characteristics of the products, cannot be considered a reason for rejecting payment or, as the case may be, modifying the agreed price.
\n\nAt the Publisher's request, the customer should provide evidence of the damaged or incorrect shipment. The Publisher will refund or ship the ordered products without delays.
\n"}]},successStories:{items:[]},authorsAndEditors:{filterParams:{},profiles:[{id:"396",title:"Dr.",name:"Vedran",middleName:null,surname:"Kordic",slug:"vedran-kordic",fullName:"Vedran Kordic",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/396/images/7281_n.png",biography:"After obtaining his Master's degree in Mechanical Engineering he continued his education at the Vienna University of Technology where he obtained his PhD degree in 2004. He worked as a researcher at the Automation and Control Institute, Faculty of Electrical Engineering, Vienna University of Technology until 2008. His studies in robotics lead him not only to a PhD degree but also inspired him to co-found and build the International Journal of Advanced Robotic Systems - world's first Open Access journal in the field of robotics.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"441",title:"Ph.D.",name:"Jaekyu",middleName:null,surname:"Park",slug:"jaekyu-park",fullName:"Jaekyu Park",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/441/images/1881_n.jpg",biography:null,institutionString:null,institution:{name:"LG Corporation (South Korea)",country:{name:"Korea, South"}}},{id:"465",title:"Dr.",name:"Christian",middleName:null,surname:"Martens",slug:"christian-martens",fullName:"Christian Martens",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Rheinmetall (Germany)",country:{name:"Germany"}}},{id:"479",title:"Dr.",name:"Valentina",middleName:null,surname:"Colla",slug:"valentina-colla",fullName:"Valentina Colla",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/479/images/358_n.jpg",biography:null,institutionString:null,institution:{name:"Sant'Anna School of Advanced Studies",country:{name:"Italy"}}},{id:"494",title:"PhD",name:"Loris",middleName:null,surname:"Nanni",slug:"loris-nanni",fullName:"Loris Nanni",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/494/images/system/494.jpg",biography:"Loris Nanni received his Master Degree cum laude on June-2002 from the University of Bologna, and the April 26th 2006 he received his Ph.D. in Computer Engineering at DEIS, University of Bologna. On September, 29th 2006 he has won a post PhD fellowship from the university of Bologna (from October 2006 to October 2008), at the competitive examination he was ranked first in the industrial engineering area. He extensively served as referee for several international journals. He is author/coauthor of more than 100 research papers. He has been involved in some projects supported by MURST and European Community. His research interests include pattern recognition, bioinformatics, and biometric systems (fingerprint classification and recognition, signature verification, face recognition).",institutionString:null,institution:null},{id:"496",title:"Dr.",name:"Carlos",middleName:null,surname:"Leon",slug:"carlos-leon",fullName:"Carlos Leon",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Seville",country:{name:"Spain"}}},{id:"512",title:"Dr.",name:"Dayang",middleName:null,surname:"Jawawi",slug:"dayang-jawawi",fullName:"Dayang Jawawi",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Technology Malaysia",country:{name:"Malaysia"}}},{id:"528",title:"Dr.",name:"Kresimir",middleName:null,surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/528/images/system/528.jpg",biography:"K. Delac received his B.Sc.E.E. degree in 2003 and is currentlypursuing a Ph.D. degree at the University of Zagreb, Faculty of Electrical Engineering andComputing. His current research interests are digital image analysis, pattern recognition andbiometrics.",institutionString:null,institution:{name:"University of Zagreb",country:{name:"Croatia"}}},{id:"557",title:"Dr.",name:"Andon",middleName:"Venelinov",surname:"Topalov",slug:"andon-topalov",fullName:"Andon Topalov",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/557/images/1927_n.jpg",biography:"Dr. Andon V. Topalov received the MSc degree in Control Engineering from the Faculty of Information Systems, Technologies, and Automation at Moscow State University of Civil Engineering (MGGU) in 1979. He then received his PhD degree in Control Engineering from the Department of Automation and Remote Control at Moscow State Mining University (MGSU), Moscow, in 1984. From 1985 to 1986, he was a Research Fellow in the Research Institute for Electronic Equipment, ZZU AD, Plovdiv, Bulgaria. In 1986, he joined the Department of Control Systems, Technical University of Sofia at the Plovdiv campus, where he is presently a Full Professor. He has held long-term visiting Professor/Scholar positions at various institutions in South Korea, Turkey, Mexico, Greece, Belgium, UK, and Germany. And he has coauthored one book and authored or coauthored more than 80 research papers in conference proceedings and journals. His current research interests are in the fields of intelligent control and robotics.",institutionString:null,institution:{name:"Technical University of Sofia",country:{name:"Bulgaria"}}},{id:"585",title:"Prof.",name:"Munir",middleName:null,surname:"Merdan",slug:"munir-merdan",fullName:"Munir Merdan",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/585/images/system/585.jpg",biography:"Munir Merdan received the M.Sc. degree in mechanical engineering from the Technical University of Sarajevo, Bosnia and Herzegovina, in 2001, and the Ph.D. degree in electrical engineering from the Vienna University of Technology, Vienna, Austria, in 2009.Since 2005, he has been at the Automation and Control Institute, Vienna University of Technology, where he is currently a Senior Researcher. His research interests include the application of agent technology for achieving agile control in the manufacturing environment.",institutionString:null,institution:null},{id:"605",title:"Prof",name:"Dil",middleName:null,surname:"Hussain",slug:"dil-hussain",fullName:"Dil Hussain",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/605/images/system/605.jpg",biography:"Dr. Dil Muhammad Akbar Hussain is a professor of Electronics Engineering & Computer Science at the Department of Energy Technology, Aalborg University Denmark. Professor Akbar has a Master degree in Digital Electronics from Govt. College University, Lahore Pakistan and a P-hD degree in Control Engineering from the School of Engineering and Applied Sciences, University of Sussex United Kingdom. Aalborg University has Two Satellite Campuses, one in Copenhagen (Aalborg University Copenhagen) and the other in Esbjerg (Aalborg University Esbjerg).\n· He is a member of prestigious IEEE (Institute of Electrical and Electronics Engineers), and IAENG (International Association of Engineers) organizations. \n· He is the chief Editor of the Journal of Software Engineering.\n· He is the member of the Editorial Board of International Journal of Computer Science and Software Technology (IJCSST) and International Journal of Computer Engineering and Information Technology. \n· He is also the Editor of Communication in Computer and Information Science CCIS-20 by Springer.\n· Reviewer For Many Conferences\nHe is the lead person in making collaboration agreements between Aalborg University and many universities of Pakistan, for which the MOU’s (Memorandum of Understanding) have been signed.\nProfessor Akbar is working in Academia since 1990, he started his career as a Lab demonstrator/TA at the University of Sussex. After finishing his P. hD degree in 1992, he served in the Industry as a Scientific Officer and continued his academic career as a visiting scholar for a number of educational institutions. In 1996 he joined National University of Science & Technology Pakistan (NUST) as an Associate Professor; NUST is one of the top few universities in Pakistan. In 1999 he joined an International Company Lineo Inc, Canada as Manager Compiler Group, where he headed the group for developing Compiler Tool Chain and Porting of Operating Systems for the BLACKfin processor. The processor development was a joint venture by Intel and Analog Devices. In 2002 Lineo Inc., was taken over by another company, so he joined Aalborg University Denmark as an Assistant Professor.\nProfessor Akbar has truly a multi-disciplined career and he continued his legacy and making progress in many areas of his interests both in teaching and research. He has contributed in stochastic estimation of control area especially, in the Multiple Target Tracking and Interactive Multiple Model (IMM) research, Ball & Beam Control Problem, Robotics, Levitation Control. He has contributed in developing Algorithms for Fingerprint Matching, Computer Vision and Face Recognition. He has been supervising Pattern Recognition, Formal Languages and Distributed Processing projects for several years. He has reviewed many books on Management, Computer Science. Currently, he is an active and permanent reviewer for many international conferences and symposia and the program committee member for many international conferences.\nIn teaching he has taught the core computer science subjects like, Digital Design, Real Time Embedded System Programming, Operating Systems, Software Engineering, Data Structures, Databases, Compiler Construction. In the Engineering side, Digital Signal Processing, Computer Architecture, Electronics Devices, Digital Filtering and Engineering Management.\nApart from his Academic Interest and activities he loves sport especially, Cricket, Football, Snooker and Squash. He plays cricket for Esbjerg city in the second division team as an opener wicket keeper batsman. He is a very good player of squash but has not played squash since his arrival in Denmark.",institutionString:null,institution:null},{id:"611",title:"Prof.",name:"T",middleName:null,surname:"Nagarajan",slug:"t-nagarajan",fullName:"T Nagarajan",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universiti Teknologi Petronas",country:{name:"Malaysia"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:13389},{group:"region",caption:"Middle and South America",value:2,count:11661},{group:"region",caption:"Africa",value:3,count:4168},{group:"region",caption:"Asia",value:4,count:22334},{group:"region",caption:"Australia and Oceania",value:5,count:2019},{group:"region",caption:"Europe",value:6,count:33642}],offset:12,limit:12,total:135275},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{topicId:"9"},books:[{type:"book",id:"11447",title:"Swarm Intelligence - Recent Advances and Current Applications",subtitle:null,isOpenForSubmission:!0,hash:"f68e3c3430a74fc7a7eb97f6ea2bb42e",slug:null,bookSignature:"Dr. Marco Antonio Aceves Fernandez",coverURL:"https://cdn.intechopen.com/books/images_new/11447.jpg",editedByType:null,editors:[{id:"24555",title:"Dr.",name:"Marco Antonio",surname:"Aceves Fernandez",slug:"marco-antonio-aceves-fernandez",fullName:"Marco Antonio Aceves Fernandez"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11547",title:"Information Security and Privacy in the Digital World - Some Selected Topics",subtitle:null,isOpenForSubmission:!0,hash:"b268e581d5e458cb91b82c518f2717eb",slug:null,bookSignature:"Prof. Jaydip Sen",coverURL:"https://cdn.intechopen.com/books/images_new/11547.jpg",editedByType:null,editors:[{id:"4519",title:"Prof.",name:"Jaydip",surname:"Sen",slug:"jaydip-sen",fullName:"Jaydip Sen"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11549",title:"Data Integrity and Data Governance",subtitle:null,isOpenForSubmission:!0,hash:"97a93f73a55957a70eb2a40de891b344",slug:null,bookSignature:"Dr. B. Santhosh Kumar",coverURL:"https://cdn.intechopen.com/books/images_new/11549.jpg",editedByType:null,editors:[{id:"330426",title:"Dr.",name:"B. Santhosh",surname:"Kumar",slug:"b.-santhosh-kumar",fullName:"B. Santhosh Kumar"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11554",title:"Information Systems Management",subtitle:null,isOpenForSubmission:!0,hash:"f9b559ad26f909f0423ba9d111663218",slug:null,bookSignature:"Dr. Rohit Raja",coverURL:"https://cdn.intechopen.com/books/images_new/11554.jpg",editedByType:null,editors:[{id:"267434",title:"Dr.",name:"Rohit",surname:"Raja",slug:"rohit-raja",fullName:"Rohit Raja"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11556",title:"Numerical Simulation",subtitle:null,isOpenForSubmission:!0,hash:"0a68fbeb303684344bda285aa06769af",slug:null,bookSignature:"Dr. Ali Soofastaei",coverURL:"https://cdn.intechopen.com/books/images_new/11556.jpg",editedByType:null,editors:[{id:"257455",title:"Dr.",name:"Ali",surname:"Soofastaei",slug:"ali-soofastaei",fullName:"Ali Soofastaei"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11911",title:"Scientometrics - Evolution, Methods, and Applications in Research",subtitle:null,isOpenForSubmission:!0,hash:"21cabdc221ee3c4ce67965075c22211f",slug:null,bookSignature:"Dr. Mohan Bairwa, Dr. M. Mahbub Hossain, Dr. Neeraj Sharma and Dr. Manju Pilania",coverURL:"https://cdn.intechopen.com/books/images_new/11911.jpg",editedByType:null,editors:[{id:"181864",title:"Dr.",name:"Mohan",surname:"Bairwa",slug:"mohan-bairwa",fullName:"Mohan Bairwa"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11912",title:"Expert Systems With Recent Applications",subtitle:null,isOpenForSubmission:!0,hash:"514907388f7a2b291f71f9b93b58b795",slug:null,bookSignature:"Prof. Ercan Oztemel",coverURL:"https://cdn.intechopen.com/books/images_new/11912.jpg",editedByType:null,editors:[{id:"306974",title:"Prof.",name:"Ercan",surname:"Oztemel",slug:"ercan-oztemel",fullName:"Ercan Oztemel"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11913",title:"Scheduling Algorithms for Information and Communication Systems",subtitle:null,isOpenForSubmission:!0,hash:"51b9b6eb5e1f6fd01c84879bc8182486",slug:null,bookSignature:"Dr. Yann H. Chemin",coverURL:"https://cdn.intechopen.com/books/images_new/11913.jpg",editedByType:null,editors:[{id:"270578",title:"Dr.",name:"Yann",surname:"Chemin",slug:"yann-chemin",fullName:"Yann Chemin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11915",title:"Ontology in Information Science",subtitle:null,isOpenForSubmission:!0,hash:"b52397215f6b5e05a22368f629695704",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11915.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11916",title:"The E-commerce Era",subtitle:null,isOpenForSubmission:!0,hash:"97b6de623f15598880112f6bafedc3e1",slug:null,bookSignature:"Dr. Robert M.X. Wu",coverURL:"https://cdn.intechopen.com/books/images_new/11916.jpg",editedByType:null,editors:[{id:"190913",title:"Dr.",name:"Robert M.X.",surname:"Wu",slug:"robert-m.x.-wu",fullName:"Robert M.X. Wu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11917",title:"Computational Semantics",subtitle:null,isOpenForSubmission:!0,hash:"eaaeec44e8fe5d1c9237fef5e0df8931",slug:null,bookSignature:"Prof. George Dekoulis",coverURL:"https://cdn.intechopen.com/books/images_new/11917.jpg",editedByType:null,editors:[{id:"9833",title:"Prof.",name:"George",surname:"Dekoulis",slug:"george-dekoulis",fullName:"George Dekoulis"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11918",title:"LabVIEW - Virtual Instrumentation in Education and Industry",subtitle:null,isOpenForSubmission:!0,hash:"789e06b22e11ce2be68ba43311d46abd",slug:null,bookSignature:"Dr. Petru Adrian Cotfas, Dr. Daniel Tudor Cotfas and Dr. Horia Hedesiu",coverURL:"https://cdn.intechopen.com/books/images_new/11918.jpg",editedByType:null,editors:[{id:"460635",title:"Dr.",name:"Petru Adrian",surname:"Cotfas",slug:"petru-adrian-cotfas",fullName:"Petru Adrian Cotfas"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:27},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:7},{group:"topic",caption:"Business, Management and Economics",value:7,count:4},{group:"topic",caption:"Chemistry",value:8,count:16},{group:"topic",caption:"Computer and Information Science",value:9,count:18},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:8},{group:"topic",caption:"Engineering",value:11,count:42},{group:"topic",caption:"Environmental Sciences",value:12,count:5},{group:"topic",caption:"Immunology and Microbiology",value:13,count:8},{group:"topic",caption:"Materials Science",value:14,count:17},{group:"topic",caption:"Mathematics",value:15,count:9},{group:"topic",caption:"Medicine",value:16,count:68},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:3},{group:"topic",caption:"Neuroscience",value:18,count:3},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:7},{group:"topic",caption:"Physics",value:20,count:6},{group:"topic",caption:"Psychology",value:21,count:5},{group:"topic",caption:"Robotics",value:22,count:2},{group:"topic",caption:"Social Sciences",value:23,count:7},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:2}],offset:12,limit:12,total:25},popularBooks:{featuredBooks:[{type:"book",id:"7827",title:"Interpersonal Relationships",subtitle:null,isOpenForSubmission:!1,hash:"ebf41f4d17c75010eb3294cc8cac3d47",slug:"interpersonal-relationships",bookSignature:"Martha Peaslee Levine",coverURL:"https://cdn.intechopen.com/books/images_new/7827.jpg",editors:[{id:"186919",title:"Dr.",name:"Martha",middleName:null,surname:"Peaslee Levine",slug:"martha-peaslee-levine",fullName:"Martha Peaslee Levine"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10808",title:"Current Concepts in Dental Implantology",subtitle:"From Science to Clinical Research",isOpenForSubmission:!1,hash:"4af8830e463f89c57515c2da2b9777b0",slug:"current-concepts-in-dental-implantology-from-science-to-clinical-research",bookSignature:"Dragana Gabrić and Marko Vuletić",coverURL:"https://cdn.intechopen.com/books/images_new/10808.jpg",editors:[{id:"26946",title:"Prof.",name:"Dragana",middleName:null,surname:"Gabrić",slug:"dragana-gabric",fullName:"Dragana Gabrić"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10796",title:"Extracellular Vesicles",subtitle:"Role in Diseases, Pathogenesis and Therapy",isOpenForSubmission:!1,hash:"eb5407fcf93baff7bca3fae5640153a2",slug:"extracellular-vesicles-role-in-diseases-pathogenesis-and-therapy",bookSignature:"Manash K. Paul",coverURL:"https://cdn.intechopen.com/books/images_new/10796.jpg",editors:[{id:"319365",title:"Assistant Prof.",name:"Manash K.",middleName:null,surname:"Paul",slug:"manash-k.-paul",fullName:"Manash K. Paul"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10908",title:"Advances in Decision Making",subtitle:null,isOpenForSubmission:!1,hash:"126486f7f91e18e2e3539a32c38be7b1",slug:"advances-in-decision-making",bookSignature:"Fausto Pedro García Márquez",coverURL:"https://cdn.intechopen.com/books/images_new/10908.jpg",editors:[{id:"22844",title:"Prof.",name:"Fausto Pedro",middleName:null,surname:"García Márquez",slug:"fausto-pedro-garcia-marquez",fullName:"Fausto Pedro García Márquez"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"95",title:"Applications and Experiences of Quality Control",subtitle:null,isOpenForSubmission:!1,hash:"4bcb22b1eee68210a977a97d5a0f363a",slug:"applications-and-experiences-of-quality-control",bookSignature:"Ognyan Ivanov",coverURL:"https://cdn.intechopen.com/books/images_new/95.jpg",editors:[{id:"22230",title:"Prof.",name:"Ognyan",middleName:null,surname:"Ivanov",slug:"ognyan-ivanov",fullName:"Ognyan Ivanov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3560",title:"Advances in Landscape Architecture",subtitle:null,isOpenForSubmission:!1,hash:"a20614517ec5f7e91188fe8e42832138",slug:"advances-in-landscape-architecture",bookSignature:"Murat Özyavuz",coverURL:"https://cdn.intechopen.com/books/images_new/3560.jpg",editors:[{id:"93073",title:"Dr.",name:"Murat",middleName:null,surname:"Ozyavuz",slug:"murat-ozyavuz",fullName:"Murat Ozyavuz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10739",title:"Global Decline of Insects",subtitle:null,isOpenForSubmission:!1,hash:"543783652b9092962a8fa4bed38eeb17",slug:"global-decline-of-insects",bookSignature:"Hamadttu Abdel Farag El-Shafie",coverURL:"https://cdn.intechopen.com/books/images_new/10739.jpg",editors:[{id:"192142",title:"Dr.",name:"Hamadttu",middleName:null,surname:"Abdel Farag El-Shafie",slug:"hamadttu-abdel-farag-el-shafie",fullName:"Hamadttu Abdel Farag El-Shafie"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10911",title:"Higher Education",subtitle:"New Approaches to Accreditation, Digitalization, and Globalization in the Age of Covid",isOpenForSubmission:!1,hash:"223a02337498e535e967174c1f648fbc",slug:"higher-education-new-approaches-to-accreditation-digitalization-and-globalization-in-the-age-of-covid",bookSignature:"Lee Waller and Sharon Waller",coverURL:"https://cdn.intechopen.com/books/images_new/10911.jpg",editors:[{id:"263301",title:"Dr.",name:"Lee",middleName:null,surname:"Waller",slug:"lee-waller",fullName:"Lee Waller"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3568",title:"Recent Advances in Plant in vitro Culture",subtitle:null,isOpenForSubmission:!1,hash:"830bbb601742c85a3fb0eeafe1454c43",slug:"recent-advances-in-plant-in-vitro-culture",bookSignature:"Annarita Leva and Laura M. R. Rinaldi",coverURL:"https://cdn.intechopen.com/books/images_new/3568.jpg",editors:[{id:"142145",title:"Dr.",name:"Annarita",middleName:null,surname:"Leva",slug:"annarita-leva",fullName:"Annarita Leva"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3737",title:"MATLAB",subtitle:"Modelling, Programming and Simulations",isOpenForSubmission:!1,hash:null,slug:"matlab-modelling-programming-and-simulations",bookSignature:"Emilson Pereira Leite",coverURL:"https://cdn.intechopen.com/books/images_new/3737.jpg",editors:[{id:"12051",title:"Prof.",name:"Emilson",middleName:null,surname:"Pereira Leite",slug:"emilson-pereira-leite",fullName:"Emilson Pereira Leite"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"1770",title:"Gel Electrophoresis",subtitle:"Principles and Basics",isOpenForSubmission:!1,hash:"279701f6c802cf02deef45103e0611ff",slug:"gel-electrophoresis-principles-and-basics",bookSignature:"Sameh Magdeldin",coverURL:"https://cdn.intechopen.com/books/images_new/1770.jpg",editors:[{id:"123648",title:"Dr.",name:"Sameh",middleName:null,surname:"Magdeldin",slug:"sameh-magdeldin",fullName:"Sameh Magdeldin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4797},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"7827",title:"Interpersonal Relationships",subtitle:null,isOpenForSubmission:!1,hash:"ebf41f4d17c75010eb3294cc8cac3d47",slug:"interpersonal-relationships",bookSignature:"Martha Peaslee Levine",coverURL:"https://cdn.intechopen.com/books/images_new/7827.jpg",publishedDate:"July 27th 2022",numberOfDownloads:7175,editors:[{id:"186919",title:"Dr.",name:"Martha",middleName:null,surname:"Peaslee Levine",slug:"martha-peaslee-levine",fullName:"Martha Peaslee Levine"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10808",title:"Current Concepts in Dental Implantology",subtitle:"From Science to Clinical Research",isOpenForSubmission:!1,hash:"4af8830e463f89c57515c2da2b9777b0",slug:"current-concepts-in-dental-implantology-from-science-to-clinical-research",bookSignature:"Dragana Gabrić and Marko Vuletić",coverURL:"https://cdn.intechopen.com/books/images_new/10808.jpg",publishedDate:"July 27th 2022",numberOfDownloads:1981,editors:[{id:"26946",title:"Prof.",name:"Dragana",middleName:null,surname:"Gabrić",slug:"dragana-gabric",fullName:"Dragana Gabrić"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10796",title:"Extracellular Vesicles",subtitle:"Role in Diseases, Pathogenesis and Therapy",isOpenForSubmission:!1,hash:"eb5407fcf93baff7bca3fae5640153a2",slug:"extracellular-vesicles-role-in-diseases-pathogenesis-and-therapy",bookSignature:"Manash K. Paul",coverURL:"https://cdn.intechopen.com/books/images_new/10796.jpg",publishedDate:"July 20th 2022",numberOfDownloads:2308,editors:[{id:"319365",title:"Assistant Prof.",name:"Manash K.",middleName:null,surname:"Paul",slug:"manash-k.-paul",fullName:"Manash K. Paul"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10908",title:"Advances in Decision Making",subtitle:null,isOpenForSubmission:!1,hash:"126486f7f91e18e2e3539a32c38be7b1",slug:"advances-in-decision-making",bookSignature:"Fausto Pedro García Márquez",coverURL:"https://cdn.intechopen.com/books/images_new/10908.jpg",publishedDate:"July 27th 2022",numberOfDownloads:1473,editors:[{id:"22844",title:"Prof.",name:"Fausto Pedro",middleName:null,surname:"García Márquez",slug:"fausto-pedro-garcia-marquez",fullName:"Fausto Pedro García Márquez"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"95",title:"Applications and Experiences of Quality Control",subtitle:null,isOpenForSubmission:!1,hash:"4bcb22b1eee68210a977a97d5a0f363a",slug:"applications-and-experiences-of-quality-control",bookSignature:"Ognyan Ivanov",coverURL:"https://cdn.intechopen.com/books/images_new/95.jpg",publishedDate:"April 26th 2011",numberOfDownloads:318571,editors:[{id:"22230",title:"Prof.",name:"Ognyan",middleName:null,surname:"Ivanov",slug:"ognyan-ivanov",fullName:"Ognyan Ivanov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",publishedDate:"September 26th 2012",numberOfDownloads:271836,editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3560",title:"Advances in Landscape Architecture",subtitle:null,isOpenForSubmission:!1,hash:"a20614517ec5f7e91188fe8e42832138",slug:"advances-in-landscape-architecture",bookSignature:"Murat Özyavuz",coverURL:"https://cdn.intechopen.com/books/images_new/3560.jpg",publishedDate:"July 1st 2013",numberOfDownloads:243450,editors:[{id:"93073",title:"Dr.",name:"Murat",middleName:null,surname:"Ozyavuz",slug:"murat-ozyavuz",fullName:"Murat Ozyavuz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10739",title:"Global Decline of Insects",subtitle:null,isOpenForSubmission:!1,hash:"543783652b9092962a8fa4bed38eeb17",slug:"global-decline-of-insects",bookSignature:"Hamadttu Abdel Farag El-Shafie",coverURL:"https://cdn.intechopen.com/books/images_new/10739.jpg",publishedDate:"July 20th 2022",numberOfDownloads:1582,editors:[{id:"192142",title:"Dr.",name:"Hamadttu",middleName:null,surname:"Abdel Farag El-Shafie",slug:"hamadttu-abdel-farag-el-shafie",fullName:"Hamadttu Abdel Farag El-Shafie"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10911",title:"Higher Education",subtitle:"New Approaches to Accreditation, Digitalization, and Globalization in the Age of Covid",isOpenForSubmission:!1,hash:"223a02337498e535e967174c1f648fbc",slug:"higher-education-new-approaches-to-accreditation-digitalization-and-globalization-in-the-age-of-covid",bookSignature:"Lee Waller and Sharon Waller",coverURL:"https://cdn.intechopen.com/books/images_new/10911.jpg",publishedDate:"July 13th 2022",numberOfDownloads:2082,editors:[{id:"263301",title:"Dr.",name:"Lee",middleName:null,surname:"Waller",slug:"lee-waller",fullName:"Lee Waller"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3568",title:"Recent Advances in Plant in vitro Culture",subtitle:null,isOpenForSubmission:!1,hash:"830bbb601742c85a3fb0eeafe1454c43",slug:"recent-advances-in-plant-in-vitro-culture",bookSignature:"Annarita Leva and Laura M. R. Rinaldi",coverURL:"https://cdn.intechopen.com/books/images_new/3568.jpg",publishedDate:"October 17th 2012",numberOfDownloads:256294,editors:[{id:"142145",title:"Dr.",name:"Annarita",middleName:null,surname:"Leva",slug:"annarita-leva",fullName:"Annarita Leva"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"10808",title:"Current Concepts in Dental Implantology",subtitle:"From Science to Clinical Research",isOpenForSubmission:!1,hash:"4af8830e463f89c57515c2da2b9777b0",slug:"current-concepts-in-dental-implantology-from-science-to-clinical-research",bookSignature:"Dragana Gabrić and Marko Vuletić",coverURL:"https://cdn.intechopen.com/books/images_new/10808.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"26946",title:"Prof.",name:"Dragana",middleName:null,surname:"Gabrić",slug:"dragana-gabric",fullName:"Dragana Gabrić"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11328",title:"Botulinum Toxin",subtitle:"Recent Topics and Applications",isOpenForSubmission:!1,hash:"7dd05a316001cef143e209eda51387a7",slug:"botulinum-toxin-recent-topics-and-applications",bookSignature:"Suna Sabuncuoglu",coverURL:"https://cdn.intechopen.com/books/images_new/11328.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"270856",title:"Associate Prof.",name:"Suna",middleName:null,surname:"Sabuncuoglu",slug:"suna-sabuncuoglu",fullName:"Suna Sabuncuoglu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11085",title:"Polycystic Ovary Syndrome",subtitle:"Functional Investigation and Clinical Application",isOpenForSubmission:!1,hash:"3066dd3ff29e1fac072fd60b08d4d3e7",slug:"polycystic-ovary-syndrome-functional-investigation-and-clinical-application",bookSignature:"Zhengchao Wang",coverURL:"https://cdn.intechopen.com/books/images_new/11085.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"204883",title:"Dr.",name:"Zhengchao",middleName:null,surname:"Wang",slug:"zhengchao-wang",fullName:"Zhengchao Wang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10833",title:"Tumor Angiogenesis and Modulators",subtitle:null,isOpenForSubmission:!1,hash:"f29b575c46128b2da061ef7f9bd1070b",slug:"tumor-angiogenesis-and-modulators",bookSignature:"Ke Xu",coverURL:"https://cdn.intechopen.com/books/images_new/10833.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"59529",title:"Dr.",name:"Ke",middleName:null,surname:"Xu",slug:"ke-xu",fullName:"Ke Xu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11356",title:"Molecular Cloning",subtitle:null,isOpenForSubmission:!1,hash:"671c629dd86e97f0fb467b9e70e92296",slug:"molecular-cloning",bookSignature:"Sadık Dincer, Hatice Aysun Mercimek Takcı and Melis Sumengen Ozdenef",coverURL:"https://cdn.intechopen.com/books/images_new/11356.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"188141",title:"Prof.",name:"Sadik",middleName:null,surname:"Dincer",slug:"sadik-dincer",fullName:"Sadik Dincer"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7827",title:"Interpersonal Relationships",subtitle:null,isOpenForSubmission:!1,hash:"ebf41f4d17c75010eb3294cc8cac3d47",slug:"interpersonal-relationships",bookSignature:"Martha Peaslee Levine",coverURL:"https://cdn.intechopen.com/books/images_new/7827.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"186919",title:"Dr.",name:"Martha",middleName:null,surname:"Peaslee Levine",slug:"martha-peaslee-levine",fullName:"Martha Peaslee Levine"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10908",title:"Advances in Decision Making",subtitle:null,isOpenForSubmission:!1,hash:"126486f7f91e18e2e3539a32c38be7b1",slug:"advances-in-decision-making",bookSignature:"Fausto Pedro García Márquez",coverURL:"https://cdn.intechopen.com/books/images_new/10908.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"22844",title:"Prof.",name:"Fausto Pedro",middleName:null,surname:"García Márquez",slug:"fausto-pedro-garcia-marquez",fullName:"Fausto Pedro García Márquez"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10669",title:"Corrosion",subtitle:"Fundamentals and Protection Mechanisms",isOpenForSubmission:!1,hash:"4a76d54f8a40fc2e7002a8d13fd617c1",slug:"corrosion-fundamentals-and-protection-mechanisms",bookSignature:"Fahmina Zafar, Anujit Ghosal and Eram Sharmin",coverURL:"https://cdn.intechopen.com/books/images_new/10669.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"89672",title:"Dr.",name:"Fahmina",middleName:null,surname:"Zafar",slug:"fahmina-zafar",fullName:"Fahmina Zafar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10677",title:"Advanced Topics of Topology",subtitle:null,isOpenForSubmission:!1,hash:"bf964c52f9e653fac20a7fcab58070e5",slug:"advanced-topics-of-topology",bookSignature:"Francisco Bulnes",coverURL:"https://cdn.intechopen.com/books/images_new/10677.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"92918",title:"Dr.",name:"Francisco",middleName:null,surname:"Bulnes",slug:"francisco-bulnes",fullName:"Francisco Bulnes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11195",title:"Recent Advances in Biometrics",subtitle:null,isOpenForSubmission:!1,hash:"2d32e33e0f499cb5241734bb75dd2a83",slug:"recent-advances-in-biometrics",bookSignature:"Muhammad Sarfraz",coverURL:"https://cdn.intechopen.com/books/images_new/11195.jpg",editedByType:"Edited by",publishedDate:"July 27th 2022",editors:[{id:"215610",title:"Prof.",name:"Muhammad",middleName:null,surname:"Sarfraz",slug:"muhammad-sarfraz",fullName:"Muhammad Sarfraz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"191",title:"Ophthalmology",slug:"medicine-ophthalmology",parent:{id:"16",title:"Medicine",slug:"medicine"},numberOfBooks:41,numberOfSeries:0,numberOfAuthorsAndEditors:1044,numberOfWosCitations:414,numberOfCrossrefCitations:288,numberOfDimensionsCitations:669,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicId:"191",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"10879",title:"Vision Correction and Eye Surgery",subtitle:null,isOpenForSubmission:!1,hash:"4cead9a92f73922e325d7d2a3a94e321",slug:"vision-correction-and-eye-surgery",bookSignature:"Giuseppe Lo Giudice",coverURL:"https://cdn.intechopen.com/books/images_new/10879.jpg",editedByType:"Edited by",editors:[{id:"87607",title:"M.D.",name:"Giuseppe",middleName:null,surname:"Lo Giudice",slug:"giuseppe-lo-giudice",fullName:"Giuseppe Lo Giudice"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11039",title:"Diabetic Eye Disease",subtitle:"From Therapeutic Pipeline to the Real World",isOpenForSubmission:!1,hash:"22986eb45c0b2692661bc8f8804045d0",slug:"diabetic-eye-disease-from-therapeutic-pipeline-to-the-real-world",bookSignature:"Giuseppe Lo Giudice",coverURL:"https://cdn.intechopen.com/books/images_new/11039.jpg",editedByType:"Edited by",editors:[{id:"87607",title:"M.D.",name:"Giuseppe",middleName:null,surname:"Lo Giudice",slug:"giuseppe-lo-giudice",fullName:"Giuseppe Lo Giudice"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10732",title:"Dry Eye Syndrome",subtitle:"Modern Diagnostic Techniques and Advanced Treatments",isOpenForSubmission:!1,hash:"44a1939cac17b7cfebbef5e156af0b2a",slug:"dry-eye-syndrome-modern-diagnostic-techniques-and-advanced-treatments",bookSignature:"Felicia M. Ferreri",coverURL:"https://cdn.intechopen.com/books/images_new/10732.jpg",editedByType:"Edited by",editors:[{id:"32442",title:"Prof.",name:"Felicia M.",middleName:null,surname:"Ferreri",slug:"felicia-m.-ferreri",fullName:"Felicia M. Ferreri"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10345",title:"Infectious Eye Diseases",subtitle:"Recent Advances in Diagnosis and Treatment",isOpenForSubmission:!1,hash:"1d2abb832f0773c90fc9a12d1a41194c",slug:"infectious-eye-diseases-recent-advances-in-diagnosis-and-treatment",bookSignature:"Alejandro Rodriguez-Garcia and Julio C. Hernandez-Camarena",coverURL:"https://cdn.intechopen.com/books/images_new/10345.jpg",editedByType:"Edited by",editors:[{id:"209514",title:"Dr.",name:"Alejandro",middleName:null,surname:"Rodriguez-Garcia",slug:"alejandro-rodriguez-garcia",fullName:"Alejandro Rodriguez-Garcia"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10343",title:"Ocular Hypertension",subtitle:"The Knowns and Unknowns",isOpenForSubmission:!1,hash:"0ff71cc7e0d9f394f41162c0c825588a",slug:"ocular-hypertension-the-knowns-and-unknowns",bookSignature:"Michele Lanza",coverURL:"https://cdn.intechopen.com/books/images_new/10343.jpg",editedByType:"Edited by",editors:[{id:"240088",title:"Prof.",name:"Michele",middleName:null,surname:"Lanza",slug:"michele-lanza",fullName:"Michele Lanza"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10293",title:"Eyesight and Imaging",subtitle:"Advances and New Perspectives",isOpenForSubmission:!1,hash:"2c4e3e515bebe6053f3f1f57e4854462",slug:"eyesight-and-imaging-advances-and-new-perspectives",bookSignature:"Alireza Ziaei and Michele Lanza",coverURL:"https://cdn.intechopen.com/books/images_new/10293.jpg",editedByType:"Edited by",editors:[{id:"271630",title:"Dr.",name:"Alireza",middleName:null,surname:"Ziaei",slug:"alireza-ziaei",fullName:"Alireza Ziaei"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10534",title:"Current Cataract Surgical Techniques",subtitle:null,isOpenForSubmission:!1,hash:"7b3bfcd2c690d037d693f31545a36fda",slug:"current-cataract-surgical-techniques",bookSignature:"Xiaogang Wang",coverURL:"https://cdn.intechopen.com/books/images_new/10534.jpg",editedByType:"Edited by",editors:[{id:"243698",title:"Dr.",name:"Xiaogang",middleName:null,surname:"Wang",slug:"xiaogang-wang",fullName:"Xiaogang Wang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7703",title:"Ocular Surface Diseases",subtitle:"Some Current Date on Tear Film Problem and Keratoconic Diagnosis",isOpenForSubmission:!1,hash:"3dcf967eb2f185930ce7fb7ae462d4e0",slug:"ocular-surface-diseases-some-current-date-on-tear-film-problem-and-keratoconic-diagnosis",bookSignature:"Dorota Kopacz",coverURL:"https://cdn.intechopen.com/books/images_new/7703.jpg",editedByType:"Edited by",editors:[{id:"271261",title:"Dr.",name:"Dorota",middleName:null,surname:"Kopacz",slug:"dorota-kopacz",fullName:"Dorota Kopacz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7176",title:"Visual Impairment and Blindness",subtitle:"What We Know and What We Have to Know",isOpenForSubmission:!1,hash:"6b1848a23af744fba1f0eef95fb4b2d1",slug:"visual-impairment-and-blindness-what-we-know-and-what-we-have-to-know",bookSignature:"Giuseppe Lo Giudice and Angel Catalá",coverURL:"https://cdn.intechopen.com/books/images_new/7176.jpg",editedByType:"Edited by",editors:[{id:"87607",title:"M.D.",name:"Giuseppe",middleName:null,surname:"Lo Giudice",slug:"giuseppe-lo-giudice",fullName:"Giuseppe Lo Giudice"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8855",title:"Retinoblastoma",subtitle:"Past, Present and Future",isOpenForSubmission:!1,hash:"1686b2f1d697de9d4bc2005a5fa9b998",slug:"retinoblastoma-past-present-and-future",bookSignature:"Hind Manaa Alkatan",coverURL:"https://cdn.intechopen.com/books/images_new/8855.jpg",editedByType:"Edited by",editors:[{id:"223782",title:"Dr.",name:"Hind",middleName:"Manaa",surname:"Alkatan",slug:"hind-alkatan",fullName:"Hind Alkatan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7858",title:"A Practical Guide to Clinical Application of OCT in Ophthalmology",subtitle:null,isOpenForSubmission:!1,hash:"8e2d479cc9258dee430f8ba4c353c468",slug:"a-practical-guide-to-clinical-application-of-oct-in-ophthalmology",bookSignature:"Michele Lanza",coverURL:"https://cdn.intechopen.com/books/images_new/7858.jpg",editedByType:"Edited by",editors:[{id:"240088",title:"Prof.",name:"Michele",middleName:null,surname:"Lanza",slug:"michele-lanza",fullName:"Michele Lanza"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8633",title:"Novel Diagnostic Methods in Ophthalmology",subtitle:null,isOpenForSubmission:!1,hash:"da2c90e8db647ead30504defce3fb5d3",slug:"novel-diagnostic-methods-in-ophthalmology",bookSignature:"Anna Nowinska",coverURL:"https://cdn.intechopen.com/books/images_new/8633.jpg",editedByType:"Edited by",editors:[{id:"261466",title:"Dr.",name:"Anna",middleName:"Karolina",surname:"Nowińska",slug:"anna-nowinska",fullName:"Anna Nowińska"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:41,seriesByTopicCollection:[],seriesByTopicTotal:0,mostCitedChapters:[{id:"23828",doi:"10.5772/18498",title:"Glaucoma Animal Models",slug:"glaucoma-animal-models",totalDownloads:2914,totalCrossrefCites:10,totalDimensionsCites:18,abstract:null,book:{id:"268",slug:"glaucoma-basic-and-clinical-concepts",title:"Glaucoma",fullTitle:"Glaucoma - Basic and Clinical Concepts"},signatures:"Elena Vecino and Sansar C. Sharma",authors:[{id:"31685",title:"Prof.",name:"Elena",middleName:null,surname:"Vecino",slug:"elena-vecino",fullName:"Elena Vecino"},{id:"36188",title:"Prof.",name:"Sansar",middleName:null,surname:"Sharma",slug:"sansar-sharma",fullName:"Sansar Sharma"}]},{id:"29195",doi:"10.5772/30302",title:"Optical Coherence Tomography Findings in Diabetic Macular Edema",slug:"optical-coherence-tomography-findings-in-diabetic-macular-edema",totalDownloads:7272,totalCrossrefCites:7,totalDimensionsCites:13,abstract:null,book:{id:"666",slug:"diabetic-retinopathy",title:"Diabetic Retinopathy",fullTitle:"Diabetic Retinopathy"},signatures:"Desislava Koleva-Georgieva",authors:[{id:"81842",title:"Dr.",name:"Desislava",middleName:null,surname:"Koleva-Georgieva",slug:"desislava-koleva-georgieva",fullName:"Desislava Koleva-Georgieva"}]},{id:"23814",doi:"10.5772/26559",title:"Mechanism of Aqueous Humor Secretion, Its Regulation and Relevance to Glaucoma",slug:"mechanism-of-aqueous-humor-secretion-its-regulation-and-relevance-to-glaucoma",totalDownloads:13552,totalCrossrefCites:9,totalDimensionsCites:13,abstract:null,book:{id:"268",slug:"glaucoma-basic-and-clinical-concepts",title:"Glaucoma",fullTitle:"Glaucoma - Basic and Clinical Concepts"},signatures:"Mohammad Shahidullah, Waleed Hassan Al-Malki and Nicholas A. Delamere",authors:[{id:"67082",title:"Dr.",name:"Mohammad",middleName:null,surname:"Shahidullah",slug:"mohammad-shahidullah",fullName:"Mohammad Shahidullah"},{id:"140321",title:"Prof.",name:"Waleed Hassan",middleName:null,surname:"Al-Malki",slug:"waleed-hassan-al-malki",fullName:"Waleed Hassan Al-Malki"},{id:"140322",title:"Prof.",name:"Nicholas",middleName:null,surname:"Delamere",slug:"nicholas-delamere",fullName:"Nicholas Delamere"}]},{id:"39271",doi:"10.5772/48436",title:"Hydrogel Contact Lenses Surface Roughness and Bacterial Adhesion",slug:"hydrogel-contact-lenses-surface-roughness-and-bacterial-adhesion",totalDownloads:3923,totalCrossrefCites:2,totalDimensionsCites:13,abstract:null,book:{id:"1203",slug:"ocular-diseases",title:"Ocular Diseases",fullTitle:"Ocular Diseases"},signatures:"Maria Jesus Giraldez and Eva Yebra-Pimentel",authors:[{id:"143929",title:"PhD.",name:"Maria Jesus",middleName:null,surname:"Giraldez",slug:"maria-jesus-giraldez",fullName:"Maria Jesus Giraldez"},{id:"145699",title:"Prof.",name:"Eva",middleName:null,surname:"Yebra-Pimentel",slug:"eva-yebra-pimentel",fullName:"Eva Yebra-Pimentel"}]},{id:"17273",doi:"10.5772/21747",title:"ERG in Drosophila",slug:"erg-in-drosophila",totalDownloads:4947,totalCrossrefCites:8,totalDimensionsCites:13,abstract:null,book:{id:"360",slug:"electroretinograms",title:"Electroretinograms",fullTitle:"Electroretinograms"},signatures:"Gregor Belusic",authors:[{id:"44595",title:"Dr.",name:"Gregor",middleName:null,surname:"Belusic",slug:"gregor-belusic",fullName:"Gregor Belusic"}]}],mostDownloadedChaptersLast30Days:[{id:"18955",title:"The Optic Nerve in Glaucoma",slug:"the-optic-nerve-in-glaucoma",totalDownloads:17833,totalCrossrefCites:1,totalDimensionsCites:4,abstract:null,book:{id:"517",slug:"the-mystery-of-glaucoma",title:"The Mystery of Glaucoma",fullTitle:"The Mystery of Glaucoma"},signatures:"Ivan Marjanovic",authors:[{id:"36284",title:"Ph.D.",name:"Ivan",middleName:null,surname:"Marjanovic",slug:"ivan-marjanovic",fullName:"Ivan Marjanovic"}]},{id:"66120",title:"Binocular Functions",slug:"binocular-functions",totalDownloads:1886,totalCrossrefCites:0,totalDimensionsCites:0,abstract:"Binocular single vision is the ability to use both eyes simultaneously so that each eye contributes to a common single perception. Normal binocular single vision occurs with bifoveal fixation and normal retinal correspondence in everyday sight. There are various anatomical and physiological factors concerned in the development of Binocular vision. The development of binocular function starts at 6 weeks and is completed by 6 months. Any obstacles, sensory, motor, or central, in the flex pathway is likely to hamper the development of binocular vision. The presence of these obstacles gives rise to various sensory adaptations to binocular dysfunction. Clinically the tests used can be based on either of the two principles: (A) assessment of relationship between the fovea of the fixing eye and the retinal area stimulated in the squinting eye, viz. Bagolini striated glasses test, red filter test, synoptophore using SMP slides for measuring the objective and subjective angles, and Worth 4-dot test; and (B) Assessment of the visual directions of the two foveae, viz. after image test (Hering Bielschowsky); and Cuppers binocular visuoscopy test (foveo-foveal test of Cuppers). Anomalies of binocular vision results in confusion, diplopia, which leads to suppression, eccentric fixation, anomalous retinal correspondence, and amblyopia.",book:{id:"8418",slug:"eye-motility",title:"Eye Motility",fullTitle:"Eye Motility"},signatures:"Arvind Kumar Morya, Kanchan Solanki, Sahil Bhandari and Anushree Naidu",authors:[{id:"270083",title:"Prof.",name:"Arvind",middleName:null,surname:"Morya",slug:"arvind-morya",fullName:"Arvind Morya"},{id:"273705",title:"Dr.",name:"Kalpit",middleName:null,surname:"Jangid",slug:"kalpit-jangid",fullName:"Kalpit Jangid"},{id:"279906",title:"Dr.",name:"Kanchan",middleName:null,surname:"Solanki",slug:"kanchan-solanki",fullName:"Kanchan Solanki"},{id:"279907",title:"Dr.",name:"Sahil",middleName:null,surname:"Bhandari",slug:"sahil-bhandari",fullName:"Sahil Bhandari"},{id:"290171",title:"Dr.",name:"Anushree",middleName:null,surname:"Naidu",slug:"anushree-naidu",fullName:"Anushree Naidu"},{id:"290172",title:"Dr.",name:"Priyanka",middleName:null,surname:"Rathore",slug:"priyanka-rathore",fullName:"Priyanka Rathore"},{id:"290173",title:"Dr.",name:"Sujeet",middleName:null,surname:"Prakash",slug:"sujeet-prakash",fullName:"Sujeet Prakash"},{id:"290174",title:"Dr.",name:"Sonalika",middleName:null,surname:"Gogia",slug:"sonalika-gogia",fullName:"Sonalika Gogia"},{id:"290176",title:"Dr.",name:"Sulabh",middleName:null,surname:"Sahu",slug:"sulabh-sahu",fullName:"Sulabh Sahu"}]},{id:"46503",title:"Disorders of Optic Nerve and Visual Pathways",slug:"disorders-of-optic-nerve-and-visual-pathways",totalDownloads:3930,totalCrossrefCites:1,totalDimensionsCites:1,abstract:null,book:{id:"3848",slug:"ophthalmology-current-clinical-and-research-updates",title:"Ophthalmology",fullTitle:"Ophthalmology - Current Clinical and Research Updates"},signatures:"Ipek Midi",authors:[{id:"169657",title:"Dr.",name:"Ipek",middleName:null,surname:"Midi",slug:"ipek-midi",fullName:"Ipek Midi"}]},{id:"18960",title:"Measurement of Anterior Chamber Angle with Optical Coherence Tomography",slug:"measurement-of-anterior-chamber-angle-with-optical-coherence-tomography",totalDownloads:6215,totalCrossrefCites:0,totalDimensionsCites:1,abstract:null,book:{id:"517",slug:"the-mystery-of-glaucoma",title:"The Mystery of Glaucoma",fullTitle:"The Mystery of Glaucoma"},signatures:"De Orta-Arellano F, Muñoz-Rodriguez P and Salinas-Gallegos JL",authors:[{id:"31619",title:"Dr.",name:"Fabiola",middleName:null,surname:"de Orta Arellano",slug:"fabiola-de-orta-arellano",fullName:"Fabiola de Orta Arellano"},{id:"35207",title:"Dr.",name:"Pablo",middleName:null,surname:"Muñoz Rodriguez",slug:"pablo-munoz-rodriguez",fullName:"Pablo Muñoz Rodriguez"},{id:"35208",title:"Dr.",name:"José Luis",middleName:null,surname:"Salinas Gallegos",slug:"jose-luis-salinas-gallegos",fullName:"José Luis Salinas Gallegos"}]},{id:"42721",title:"Intracameral Mydriatics in Cataract Surgery",slug:"intracameral-mydriatics-in-cataract-surgery",totalDownloads:8517,totalCrossrefCites:0,totalDimensionsCites:3,abstract:null,book:{id:"239",slug:"cataract-surgery",title:"Cataract Surgery",fullTitle:"Cataract Surgery"},signatures:"Anders Behndig, Björn Lundberg and Gunnie Bäckström",authors:[{id:"47264",title:"Prof.",name:"Anders",middleName:null,surname:"Behndig",slug:"anders-behndig",fullName:"Anders Behndig"},{id:"53862",title:"Mr.",name:"Björn",middleName:null,surname:"Lundberg",slug:"bjorn-lundberg",fullName:"Björn Lundberg"},{id:"53863",title:"Mrs.",name:"Gunni",middleName:null,surname:"Bäckström",slug:"gunni-backstrom",fullName:"Gunni Bäckström"}]}],onlineFirstChaptersFilter:{topicId:"191",limit:6,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},subscriptionForm:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[],offset:8,limit:8,total:0},allSeries:{pteSeriesList:[{id:"14",title:"Artificial Intelligence",numberOfPublishedBooks:9,numberOfPublishedChapters:90,numberOfOpenTopics:6,numberOfUpcomingTopics:0,issn:"2633-1403",doi:"10.5772/intechopen.79920",isOpenForSubmission:!0},{id:"7",title:"Biomedical Engineering",numberOfPublishedBooks:12,numberOfPublishedChapters:107,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2631-5343",doi:"10.5772/intechopen.71985",isOpenForSubmission:!0}],lsSeriesList:[{id:"11",title:"Biochemistry",numberOfPublishedBooks:33,numberOfPublishedChapters:330,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2632-0983",doi:"10.5772/intechopen.72877",isOpenForSubmission:!0},{id:"25",title:"Environmental Sciences",numberOfPublishedBooks:1,numberOfPublishedChapters:19,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2754-6713",doi:"10.5772/intechopen.100362",isOpenForSubmission:!0},{id:"10",title:"Physiology",numberOfPublishedBooks:14,numberOfPublishedChapters:145,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-8261",doi:"10.5772/intechopen.72796",isOpenForSubmission:!0}],hsSeriesList:[{id:"3",title:"Dentistry",numberOfPublishedBooks:9,numberOfPublishedChapters:140,numberOfOpenTopics:2,numberOfUpcomingTopics:0,issn:"2631-6218",doi:"10.5772/intechopen.71199",isOpenForSubmission:!0},{id:"6",title:"Infectious Diseases",numberOfPublishedBooks:13,numberOfPublishedChapters:123,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-6188",doi:"10.5772/intechopen.71852",isOpenForSubmission:!0},{id:"13",title:"Veterinary Medicine and Science",numberOfPublishedBooks:11,numberOfPublishedChapters:112,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2632-0517",doi:"10.5772/intechopen.73681",isOpenForSubmission:!0}],sshSeriesList:[{id:"22",title:"Business, Management and Economics",numberOfPublishedBooks:1,numberOfPublishedChapters:22,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2753-894X",doi:"10.5772/intechopen.100359",isOpenForSubmission:!0},{id:"23",title:"Education and Human Development",numberOfPublishedBooks:0,numberOfPublishedChapters:11,numberOfOpenTopics:1,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100360",isOpenForSubmission:!0},{id:"24",title:"Sustainable Development",numberOfPublishedBooks:1,numberOfPublishedChapters:19,numberOfOpenTopics:5,numberOfUpcomingTopics:0,issn:"2753-6580",doi:"10.5772/intechopen.100361",isOpenForSubmission:!0}],testimonialsList:[{id:"13",text:"The collaboration with and support of the technical staff of IntechOpen is fantastic. The whole process of submitting an article and editing of the submitted article goes extremely smooth and fast, the number of reads and downloads of chapters is high, and the contributions are also frequently cited.",author:{id:"55578",name:"Antonio",surname:"Jurado-Navas",institutionString:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRisIQAS/Profile_Picture_1626166543950",slug:"antonio-jurado-navas",institution:{id:"720",name:"University of Malaga",country:{id:null,name:"Spain"}}}},{id:"6",text:"It is great to work with the IntechOpen to produce a worthwhile collection of research that also becomes a great educational resource and guide for future research endeavors.",author:{id:"259298",name:"Edward",surname:"Narayan",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/259298/images/system/259298.jpeg",slug:"edward-narayan",institution:{id:"3",name:"University of Queensland",country:{id:null,name:"Australia"}}}}]},series:{item:{id:"14",title:"Artificial Intelligence",doi:"10.5772/intechopen.79920",issn:"2633-1403",scope:"Artificial Intelligence (AI) is a rapidly developing multidisciplinary research area that aims to solve increasingly complex problems. In today's highly integrated world, AI promises to become a robust and powerful means for obtaining solutions to previously unsolvable problems. This Series is intended for researchers and students alike interested in this fascinating field and its many applications.",coverUrl:"https://cdn.intechopen.com/series/covers/14.jpg",latestPublicationDate:"July 5th, 2022",hasOnlineFirst:!0,numberOfPublishedBooks:9,editor:{id:"218714",title:"Prof.",name:"Andries",middleName:null,surname:"Engelbrecht",slug:"andries-engelbrecht",fullName:"Andries Engelbrecht",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRNR8QAO/Profile_Picture_1622640468300",biography:"Andries Engelbrecht received the Masters and PhD degrees in Computer Science from the University of Stellenbosch, South Africa, in 1994 and 1999 respectively. He is currently appointed as the Voigt Chair in Data Science in the Department of Industrial Engineering, with a joint appointment as Professor in the Computer Science Division, Stellenbosch University. Prior to his appointment at Stellenbosch University, he has been at the University of Pretoria, Department of Computer Science (1998-2018), where he was appointed as South Africa Research Chair in Artifical Intelligence (2007-2018), the head of the Department of Computer Science (2008-2017), and Director of the Institute for Big Data and Data Science (2017-2018). In addition to a number of research articles, he has written two books, Computational Intelligence: An Introduction and Fundamentals of Computational Swarm Intelligence.",institutionString:null,institution:{name:"Stellenbosch University",institutionURL:null,country:{name:"South Africa"}}},editorTwo:null,editorThree:null},subseries:{paginationCount:4,paginationItems:[{id:"14",title:"Cell and Molecular Biology",coverUrl:"https://cdn.intechopen.com/series_topics/covers/14.jpg",isOpenForSubmission:!0,editor:{id:"165627",title:"Dr.",name:"Rosa María",middleName:null,surname:"Martínez-Espinosa",slug:"rosa-maria-martinez-espinosa",fullName:"Rosa María Martínez-Espinosa",profilePictureURL:"https://mts.intechopen.com/storage/users/165627/images/system/165627.jpeg",biography:"Dr. Rosa María Martínez-Espinosa has been a Spanish Full Professor since 2020 (Biochemistry and Molecular Biology) and is currently Vice-President of International Relations and Cooperation development and leader of the research group 'Applied Biochemistry” (University of Alicante, Spain). Other positions she has held at the university include Vice-Dean of Master Programs, Vice-Dean of the Degree in Biology and Vice-Dean for Mobility and Enterprise and Engagement at the Faculty of Science (University of Alicante). She received her Bachelor in Biology in 1998 (University of Alicante) and her PhD in 2003 (Biochemistry, University of Alicante). She undertook post-doctoral research at the University of East Anglia (Norwich, U.K. 2004-2005; 2007-2008).\nHer multidisciplinary research focuses on investigating archaea and their potential applications in biotechnology. She has an H-index of 21. She has authored one patent and has published more than 70 indexed papers and around 60 book chapters.\nShe has contributed to more than 150 national and international meetings during the last 15 years. Her research interests include archaea metabolism, enzymes purification and characterization, gene regulation, carotenoids and bioplastics production, antioxidant\ncompounds, waste water treatments, and brines bioremediation.\nRosa María’s other roles include editorial board member for several journals related\nto biochemistry, reviewer for more than 60 journals (biochemistry, molecular biology, biotechnology, chemistry and microbiology) and president of several organizing committees in international meetings related to the N-cycle or respiratory processes.",institutionString:null,institution:{name:"University of Alicante",institutionURL:null,country:{name:"Spain"}}},editorTwo:null,editorThree:null},{id:"15",title:"Chemical Biology",coverUrl:"https://cdn.intechopen.com/series_topics/covers/15.jpg",isOpenForSubmission:!0,editor:{id:"441442",title:"Dr.",name:"Şükrü",middleName:null,surname:"Beydemir",slug:"sukru-beydemir",fullName:"Şükrü Beydemir",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y00003GsUoIQAV/Profile_Picture_1634557147521",biography:"Dr. Şükrü Beydemir obtained a BSc in Chemistry in 1995 from Yüzüncü Yıl University, MSc in Biochemistry in 1998, and PhD in Biochemistry in 2002 from Atatürk University, Turkey. He performed post-doctoral studies at Max-Planck Institute, Germany, and University of Florence, Italy in addition to making several scientific visits abroad. He currently works as a Full Professor of Biochemistry in the Faculty of Pharmacy, Anadolu University, Turkey. Dr. Beydemir has published over a hundred scientific papers spanning protein biochemistry, enzymology and medicinal chemistry, reviews, book chapters and presented several conferences to scientists worldwide. He has received numerous publication awards from various international scientific councils. He serves in the Editorial Board of several international journals. Dr. Beydemir is also Rector of Bilecik Şeyh Edebali University, Turkey.",institutionString:null,institution:{name:"Anadolu University",institutionURL:null,country:{name:"Turkey"}}},editorTwo:{id:"13652",title:"Prof.",name:"Deniz",middleName:null,surname:"Ekinci",slug:"deniz-ekinci",fullName:"Deniz Ekinci",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002aYLT1QAO/Profile_Picture_1634557223079",biography:"Dr. Deniz Ekinci obtained a BSc in Chemistry in 2004, MSc in Biochemistry in 2006, and PhD in Biochemistry in 2009 from Atatürk University, Turkey. He studied at Stetson University, USA, in 2007-2008 and at the Max Planck Institute of Molecular Cell Biology and Genetics, Germany, in 2009-2010. Dr. Ekinci currently works as a Full Professor of Biochemistry in the Faculty of Agriculture and is the Head of the Enzyme and Microbial Biotechnology Division, Ondokuz Mayıs University, Turkey. He is a member of the Turkish Biochemical Society, American Chemical Society, and German Genetics society. Dr. Ekinci published around ninety scientific papers, reviews and book chapters, and presented several conferences to scientists. He has received numerous publication awards from several scientific councils. Dr. Ekinci serves as the Editor in Chief of four international books and is involved in the Editorial Board of several international journals.",institutionString:null,institution:{name:"Ondokuz Mayıs University",institutionURL:null,country:{name:"Turkey"}}},editorThree:null},{id:"17",title:"Metabolism",coverUrl:"https://cdn.intechopen.com/series_topics/covers/17.jpg",isOpenForSubmission:!0,editor:{id:"138626",title:"Dr.",name:"Yannis",middleName:null,surname:"Karamanos",slug:"yannis-karamanos",fullName:"Yannis Karamanos",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002g6Jv2QAE/Profile_Picture_1629356660984",biography:"Yannis Karamanos, born in Greece in 1953, completed his pre-graduate studies at the Université Pierre et Marie Curie, Paris, then his Masters and Doctoral degree at the Université de Lille (1983). He was associate professor at the University of Limoges (1987) before becoming full professor of biochemistry at the Université d’Artois (1996). He worked on the structure-function relationships of glycoconjugates and his main project was the investigations on the biological roles of the de-N-glycosylation enzymes (Endo-N-acetyl-β-D-glucosaminidase and peptide-N4-(N-acetyl-β-glucosaminyl) asparagine amidase). From 2002 he contributes to the understanding of the Blood-brain barrier functioning using proteomics approaches. He has published more than 70 papers. His teaching areas are energy metabolism and regulation, integration and organ specialization and metabolic adaptation.",institutionString:null,institution:{name:"Artois University",institutionURL:null,country:{name:"France"}}},editorTwo:null,editorThree:null},{id:"18",title:"Proteomics",coverUrl:"https://cdn.intechopen.com/series_topics/covers/18.jpg",isOpenForSubmission:!0,editor:{id:"200689",title:"Prof.",name:"Paolo",middleName:null,surname:"Iadarola",slug:"paolo-iadarola",fullName:"Paolo Iadarola",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSCl8QAG/Profile_Picture_1623568118342",biography:"Paolo Iadarola graduated with a degree in Chemistry from the University of Pavia (Italy) in July 1972. He then worked as an Assistant Professor at the Faculty of Science of the same University until 1984. In 1985, Prof. Iadarola became Associate Professor at the Department of Biology and Biotechnologies of the University of Pavia and retired in October 2017. Since then, he has been working as an Adjunct Professor in the same Department at the University of Pavia. His research activity during the first years was primarily focused on the purification and structural characterization of enzymes from animal and plant sources. During this period, Prof. Iadarola familiarized himself with the conventional techniques used in column chromatography, spectrophotometry, manual Edman degradation, and electrophoresis). Since 1995, he has been working on: i) the determination in biological fluids (serum, urine, bronchoalveolar lavage, sputum) of proteolytic activities involved in the degradation processes of connective tissue matrix, and ii) on the identification of biological markers of lung diseases. In this context, he has developed and validated new methodologies (e.g., Capillary Electrophoresis coupled to Laser-Induced Fluorescence, CE-LIF) whose application enabled him to determine both the amounts of biochemical markers (Desmosines) in urine/serum of patients affected by Chronic Obstructive Pulmonary Disease (COPD) and the activity of proteolytic enzymes (Human Neutrophil Elastase, Cathepsin G, Pseudomonas aeruginosa elastase) in sputa of these patients. More recently, Prof. Iadarola was involved in developing techniques such as two-dimensional electrophoresis coupled to liquid chromatography/mass spectrometry (2DE-LC/MS) for the proteomic analysis of biological fluids aimed at the identification of potential biomarkers of different lung diseases. He is the author of about 150 publications (According to Scopus: H-Index: 23; Total citations: 1568- According to WOS: H-Index: 20; Total Citations: 1296) of peer-reviewed international journals. He is a Consultant Reviewer for several journals, including the Journal of Chromatography A, Journal of Chromatography B, Plos ONE, Proteomes, International Journal of Molecular Science, Biotech, Electrophoresis, and others. He is also Associate Editor of Biotech.",institutionString:null,institution:{name:"University of Pavia",institutionURL:null,country:{name:"Italy"}}},editorTwo:{id:"201414",title:"Dr.",name:"Simona",middleName:null,surname:"Viglio",slug:"simona-viglio",fullName:"Simona Viglio",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRKDHQA4/Profile_Picture_1630402531487",biography:"Simona Viglio is an Associate Professor of Biochemistry at the Department of Molecular Medicine at the University of Pavia. She has been working since 1995 on the determination of proteolytic enzymes involved in the degradation process of connective tissue matrix and on the identification of biological markers of lung diseases. She gained considerable experience in developing and validating new methodologies whose applications allowed her to determine both the amount of biomarkers (Desmosine and Isodesmosine) in the urine of patients affected by COPD, and the activity of proteolytic enzymes (HNE, Cathepsin G, Pseudomonas aeruginosa elastase) in the sputa of these patients. Simona Viglio was also involved in research dealing with the supplementation of amino acids in patients with brain injury and chronic heart failure. She is presently engaged in the development of 2-DE and LC-MS techniques for the study of proteomics in biological fluids. The aim of this research is the identification of potential biomarkers of lung diseases. She is an author of about 90 publications (According to Scopus: H-Index: 23; According to WOS: H-Index: 20) on peer-reviewed journals, a member of the “Società Italiana di Biochimica e Biologia Molecolare,“ and a Consultant Reviewer for International Journal of Molecular Science, Journal of Chromatography A, COPD, Plos ONE and Nutritional Neuroscience.",institutionString:null,institution:{name:"University of Pavia",institutionURL:null,country:{name:"Italy"}}},editorThree:null}]},overviewPageOFChapters:{paginationCount:42,paginationItems:[{id:"82914",title:"Glance on the Critical Role of IL-23 Receptor Gene Variations in Inflammation-Induced Carcinogenesis",doi:"10.5772/intechopen.105049",signatures:"Mohammed El-Gedamy",slug:"glance-on-the-critical-role-of-il-23-receptor-gene-variations-in-inflammation-induced-carcinogenesis",totalDownloads:12,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Chemokines Updates",coverURL:"https://cdn.intechopen.com/books/images_new/11672.jpg",subseries:{id:"18",title:"Proteomics"}}},{id:"82875",title:"Lipidomics as a Tool in the Diagnosis and Clinical Therapy",doi:"10.5772/intechopen.105857",signatures:"María Elizbeth Alvarez Sánchez, Erick Nolasco Ontiveros, Rodrigo Arreola, Adriana Montserrat Espinosa González, Ana María García Bores, Roberto Eduardo López Urrutia, Ignacio Peñalosa Castro, María del Socorro Sánchez Correa and Edgar Antonio Estrella Parra",slug:"lipidomics-as-a-tool-in-the-diagnosis-and-clinical-therapy",totalDownloads:7,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Fatty Acids - Recent Advances",coverURL:"https://cdn.intechopen.com/books/images_new/11669.jpg",subseries:{id:"17",title:"Metabolism"}}},{id:"82440",title:"Lipid Metabolism and Associated Molecular Signaling Events in Autoimmune Disease",doi:"10.5772/intechopen.105746",signatures:"Mohan Vanditha, Sonu Das and Mathew John",slug:"lipid-metabolism-and-associated-molecular-signaling-events-in-autoimmune-disease",totalDownloads:17,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Fatty Acids - Recent Advances",coverURL:"https://cdn.intechopen.com/books/images_new/11669.jpg",subseries:{id:"17",title:"Metabolism"}}},{id:"82483",title:"Oxidative Stress in Cardiovascular Diseases",doi:"10.5772/intechopen.105891",signatures:"Laura Mourino-Alvarez, Tamara Sastre-Oliva, Nerea Corbacho-Alonso and Maria G. Barderas",slug:"oxidative-stress-in-cardiovascular-diseases",totalDownloads:10,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Importance of Oxidative Stress and Antioxidant System in Health and Disease",coverURL:"https://cdn.intechopen.com/books/images_new/11671.jpg",subseries:{id:"15",title:"Chemical Biology"}}}]},overviewPagePublishedBooks:{paginationCount:33,paginationItems:[{type:"book",id:"7006",title:"Biochemistry and Health Benefits of Fatty Acids",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7006.jpg",slug:"biochemistry-and-health-benefits-of-fatty-acids",publishedDate:"December 19th 2018",editedByType:"Edited by",bookSignature:"Viduranga Waisundara",hash:"c93a00abd68b5eba67e5e719f67fd20b",volumeInSeries:1,fullTitle:"Biochemistry and Health Benefits of Fatty Acids",editors:[{id:"194281",title:"Dr.",name:"Viduranga Y.",middleName:null,surname:"Waisundara",slug:"viduranga-y.-waisundara",fullName:"Viduranga Y. Waisundara",profilePictureURL:"https://mts.intechopen.com/storage/users/194281/images/system/194281.jpg",biography:"Dr. Viduranga Waisundara obtained her Ph.D. in Food Science\nand Technology from the Department of Chemistry, National\nUniversity of Singapore, in 2010. She was a lecturer at Temasek Polytechnic, Singapore from July 2009 to March 2013.\nShe relocated to her motherland of Sri Lanka and spearheaded the Functional Food Product Development Project at the\nNational Institute of Fundamental Studies from April 2013 to\nOctober 2016. She was a senior lecturer on a temporary basis at the Department of\nFood Technology, Faculty of Technology, Rajarata University of Sri Lanka. She is\ncurrently Deputy Principal of the Australian College of Business and Technology –\nKandy Campus, Sri Lanka. She is also the Global Harmonization Initiative (GHI)",institutionString:"Australian College of Business & Technology",institution:{name:"Kobe College",institutionURL:null,country:{name:"Japan"}}}]},{type:"book",id:"6820",title:"Keratin",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/6820.jpg",slug:"keratin",publishedDate:"December 19th 2018",editedByType:"Edited by",bookSignature:"Miroslav Blumenberg",hash:"6def75cd4b6b5324a02b6dc0359896d0",volumeInSeries:2,fullTitle:"Keratin",editors:[{id:"31610",title:"Dr.",name:"Miroslav",middleName:null,surname:"Blumenberg",slug:"miroslav-blumenberg",fullName:"Miroslav Blumenberg",profilePictureURL:"https://mts.intechopen.com/storage/users/31610/images/system/31610.jpg",biography:"Miroslav Blumenberg, Ph.D., was born in Subotica and received his BSc in Belgrade, Yugoslavia. He completed his Ph.D. at MIT in Organic Chemistry; he followed up his Ph.D. with two postdoctoral study periods at Stanford University. Since 1983, he has been a faculty member of the RO Perelman Department of Dermatology, NYU School of Medicine, where he is codirector of a training grant in cutaneous biology. Dr. Blumenberg’s research is focused on the epidermis, expression of keratin genes, transcription profiling, keratinocyte differentiation, inflammatory diseases and cancers, and most recently the effects of the microbiome on the skin. He has published more than 100 peer-reviewed research articles and graduated numerous Ph.D. and postdoctoral students.",institutionString:null,institution:{name:"New York University Langone Medical Center",institutionURL:null,country:{name:"United States of America"}}}]},{type:"book",id:"7978",title:"Vitamin A",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7978.jpg",slug:"vitamin-a",publishedDate:"May 15th 2019",editedByType:"Edited by",bookSignature:"Leila Queiroz Zepka, Veridiana Vera de Rosso and Eduardo Jacob-Lopes",hash:"dad04a658ab9e3d851d23705980a688b",volumeInSeries:3,fullTitle:"Vitamin A",editors:[{id:"261969",title:"Dr.",name:"Leila",middleName:null,surname:"Queiroz Zepka",slug:"leila-queiroz-zepka",fullName:"Leila Queiroz Zepka",profilePictureURL:"https://mts.intechopen.com/storage/users/261969/images/system/261969.png",biography:"Prof. Dr. Leila Queiroz Zepka is currently an associate professor in the Department of Food Technology and Science, Federal University of Santa Maria, Brazil. She has more than fifteen years of teaching and research experience. She has published more than 550 scientific publications/communications, including 15 books, 50 book chapters, 100 original research papers, 380 research communications in national and international conferences, and 12 patents. She is a member of the editorial board of five journals and acts as a reviewer for several national and international journals. Her research interests include microalgal biotechnology with an emphasis on microalgae-based products.",institutionString:"Universidade Federal de Santa Maria",institution:{name:"Universidade Federal de Santa Maria",institutionURL:null,country:{name:"Brazil"}}}]},{type:"book",id:"7953",title:"Bioluminescence",subtitle:"Analytical Applications and Basic Biology",coverURL:"https://cdn.intechopen.com/books/images_new/7953.jpg",slug:"bioluminescence-analytical-applications-and-basic-biology",publishedDate:"September 25th 2019",editedByType:"Edited by",bookSignature:"Hirobumi Suzuki",hash:"3a8efa00b71abea11bf01973dc589979",volumeInSeries:4,fullTitle:"Bioluminescence - Analytical Applications and Basic Biology",editors:[{id:"185746",title:"Dr.",name:"Hirobumi",middleName:null,surname:"Suzuki",slug:"hirobumi-suzuki",fullName:"Hirobumi Suzuki",profilePictureURL:"https://mts.intechopen.com/storage/users/185746/images/system/185746.png",biography:"Dr. Hirobumi Suzuki received his Ph.D. in 1997 from Tokyo Metropolitan University, Japan, where he studied firefly phylogeny and the evolution of mating systems. He is especially interested in the genetic differentiation pattern and speciation process that correlate to the flashing pattern and mating behavior of some fireflies in Japan. He then worked for Olympus Corporation, a Japanese manufacturer of optics and imaging products, where he was involved in the development of luminescence technology and produced a bioluminescence microscope that is currently being used for gene expression analysis in chronobiology, neurobiology, and developmental biology. Dr. Suzuki currently serves as a visiting researcher at Kogakuin University, Japan, and also a vice president of the Japan Firefly Society.",institutionString:"Kogakuin University",institution:null}]}]},openForSubmissionBooks:{paginationCount:1,paginationItems:[{id:"11568",title:"Staphylococcal Infections - Recent Advances and Perspectives",coverURL:"https://cdn.intechopen.com/books/images_new/11568.jpg",hash:"92c881664d1921c7f2d0fee34b78cd08",secondStepPassed:!0,currentStepOfPublishingProcess:3,submissionDeadline:"July 8th 2022",isOpenForSubmission:!0,editors:[{id:"59719",title:"Dr.",name:"Jaime",surname:"Bustos-Martínez",slug:"jaime-bustos-martinez",fullName:"Jaime Bustos-Martínez"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},onlineFirstChapters:{paginationCount:26,paginationItems:[{id:"82800",title:"Repurposing Drugs as Potential Therapeutics for the SARS-Cov-2 Viral Infection: Automatizing a Blind Molecular Docking High-throughput Pipeline",doi:"10.5772/intechopen.105792",signatures:"Aldo Herrera-Rodulfo, Mariana Andrade-Medina and Mauricio Carrillo-Tripp",slug:"repurposing-drugs-as-potential-therapeutics-for-the-sars-cov-2-viral-infection-automatizing-a-blind-",totalDownloads:6,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Molecular Docking - Recent Advances",coverURL:"https://cdn.intechopen.com/books/images_new/11451.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"82582",title:"Protecting Bioelectric Signals from Electromagnetic Interference in a Wireless World",doi:"10.5772/intechopen.105951",signatures:"David Marcarian",slug:"protecting-bioelectric-signals-from-electromagnetic-interference-in-a-wireless-world",totalDownloads:4,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Biosignal Processing",coverURL:"https://cdn.intechopen.com/books/images_new/11153.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"82586",title:"Fundamentals of Molecular Docking and Comparative Analysis of Protein–Small-Molecule Docking Approaches",doi:"10.5772/intechopen.105815",signatures:"Maden Sefika Feyza, Sezer Selin and Acuner Saliha Ece",slug:"fundamentals-of-molecular-docking-and-comparative-analysis-of-protein-small-molecule-docking-approac",totalDownloads:27,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Molecular Docking - Recent Advances",coverURL:"https://cdn.intechopen.com/books/images_new/11451.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"82392",title:"Nanomaterials as Novel Biomarkers for Cancer Nanotheranostics: State of the Art",doi:"10.5772/intechopen.105700",signatures:"Hao Yu, Zhihai Han, Cunrong Chen and Leisheng Zhang",slug:"nanomaterials-as-novel-biomarkers-for-cancer-nanotheranostics-state-of-the-art",totalDownloads:23,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering - Annual Volume 2022",coverURL:"https://cdn.intechopen.com/books/images_new/11405.jpg",subseries:{id:"9",title:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering"}}},{id:"82184",title:"Biological Sensing Using Infrared SPR Devices Based on ZnO",doi:"10.5772/intechopen.104562",signatures:"Hiroaki Matsui",slug:"biological-sensing-using-infrared-spr-devices-based-on-zno",totalDownloads:10,totalCrossrefCites:0,totalDimensionsCites:0,authors:[{name:"Hiroaki",surname:"Matsui"}],book:{title:"Biosignal Processing",coverURL:"https://cdn.intechopen.com/books/images_new/11153.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"82122",title:"Recent Advances in Biosensing in Tissue Engineering and Regenerative Medicine",doi:"10.5772/intechopen.104922",signatures:"Alma T. Banigo, Chigozie A. Nnadiekwe and Emmanuel M. Beasi",slug:"recent-advances-in-biosensing-in-tissue-engineering-and-regenerative-medicine",totalDownloads:22,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Biosignal Processing",coverURL:"https://cdn.intechopen.com/books/images_new/11153.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"82080",title:"The Clinical Usefulness of Prostate Cancer Biomarkers: Current and Future Directions",doi:"10.5772/intechopen.103172",signatures:"Donovan McGrowder, Lennox Anderson-Jackson, Lowell Dilworth, Shada Mohansingh, Melisa Anderson Cross, Sophia Bryan, Fabian Miller, Cameil Wilson-Clarke, Chukwuemeka Nwokocha, Ruby Alexander-Lindo and Shelly McFarlane",slug:"the-clinical-usefulness-of-prostate-cancer-biomarkers-current-and-future-directions",totalDownloads:16,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Cancer Bioinformatics",coverURL:"https://cdn.intechopen.com/books/images_new/10661.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"82005",title:"Non-Invasive Approach for Glucose Detection in Urine Quality using Its Image Analysis",doi:"10.5772/intechopen.104791",signatures:"Anton Yudhana, Liya Yusrina Sabila, Arsyad Cahya Subrata, Hendriana Helda Pratama and Muhammad Syahrul Akbar",slug:"non-invasive-approach-for-glucose-detection-in-urine-quality-using-its-image-analysis",totalDownloads:8,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Biosignal Processing",coverURL:"https://cdn.intechopen.com/books/images_new/11153.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}},{id:"81778",title:"Influence of Mechanical Properties of Biomaterials on the Reconstruction of Biomedical Parts via Additive Manufacturing Techniques: An Overview",doi:"10.5772/intechopen.104465",signatures:"Babatunde Olamide Omiyale, Akeem Abiodun Rasheed, Robinson Omoboyode Akinnusi and Temitope Olumide Olugbade",slug:"influence-of-mechanical-properties-of-biomaterials-on-the-reconstruction-of-biomedical-parts-via-add",totalDownloads:11,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering - Annual Volume 2022",coverURL:"https://cdn.intechopen.com/books/images_new/11405.jpg",subseries:{id:"9",title:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering"}}},{id:"81751",title:"NanoBioSensors: From Electrochemical Sensors Improvement to Theranostic Applications",doi:"10.5772/intechopen.102552",signatures:"Anielle C.A. Silva, Eliete A. Alvin, Lais S. de Jesus, Caio C.L. de França, Marílya P.G. da Silva, Samaysa L. Lins, Diógenes Meneses, Marcela R. Lemes, Rhanoica O. Guerra, Marcos V. da Silva, Carlo J.F. de Oliveira, Virmondes Rodrigues Junior, Renata M. Etchebehere, Fabiane C. de Abreu, Bruno G. Lucca, Sanívia A.L. Pereira, Rodrigo C. Rosa and Noelio O. Dantas",slug:"nanobiosensors-from-electrochemical-sensors-improvement-to-theranostic-applications",totalDownloads:14,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Biosignal Processing",coverURL:"https://cdn.intechopen.com/books/images_new/11153.jpg",subseries:{id:"7",title:"Bioinformatics and Medical Informatics"}}}]},subseriesFiltersForOFChapters:[{caption:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering",value:9,count:2,group:"subseries"},{caption:"Bioinformatics and Medical Informatics",value:7,count:20,group:"subseries"}],publishedBooks:{paginationCount:14,paginationItems:[{type:"book",id:"10794",title:"Potassium in Human Health",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/10794.jpg",slug:"potassium-in-human-health",publishedDate:"July 20th 2022",editedByType:"Edited by",bookSignature:"Jie Tang",hash:"0fbab5c7b5baa903a6426e7bbd9f99ab",volumeInSeries:12,fullTitle:"Potassium in Human Health",editors:[{id:"181267",title:"Dr.",name:"Jie",middleName:null,surname:"Tang",slug:"jie-tang",fullName:"Jie Tang",profilePictureURL:"https://mts.intechopen.com/storage/users/181267/images/system/181267.png",institutionString:"Brown University",institution:{name:"Brown University",institutionURL:null,country:{name:"United States of America"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"10796",title:"Extracellular Vesicles",subtitle:"Role in Diseases, Pathogenesis and Therapy",coverURL:"https://cdn.intechopen.com/books/images_new/10796.jpg",slug:"extracellular-vesicles-role-in-diseases-pathogenesis-and-therapy",publishedDate:"July 20th 2022",editedByType:"Edited by",bookSignature:"Manash K. Paul",hash:"eb5407fcf93baff7bca3fae5640153a2",volumeInSeries:13,fullTitle:"Extracellular Vesicles - Role in Diseases, Pathogenesis and Therapy",editors:[{id:"319365",title:"Assistant Prof.",name:"Manash K.",middleName:null,surname:"Paul",slug:"manash-k.-paul",fullName:"Manash K. Paul",profilePictureURL:"https://mts.intechopen.com/storage/users/319365/images/system/319365.png",institutionString:"University of California Los Angeles",institution:{name:"University of California Los Angeles",institutionURL:null,country:{name:"United States of America"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"10835",title:"Autonomic Nervous System",subtitle:"Special Interest Topics",coverURL:"https://cdn.intechopen.com/books/images_new/10835.jpg",slug:"autonomic-nervous-system-special-interest-topics",publishedDate:"July 20th 2022",editedByType:"Edited by",bookSignature:"Theodoros Aslanidis and Christos Nouris",hash:"48ac242dc6c5073b2590a509c44628e2",volumeInSeries:14,fullTitle:"Autonomic Nervous System - Special Interest Topics",editors:[{id:"200252",title:"Dr.",name:"Theodoros",middleName:null,surname:"Aslanidis",slug:"theodoros-aslanidis",fullName:"Theodoros Aslanidis",profilePictureURL:"https://mts.intechopen.com/storage/users/200252/images/system/200252.png",institutionString:"Saint Paul General Hospital of Thessaloniki",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"10795",title:"Plant Stress Physiology",subtitle:"Perspectives in Agriculture",coverURL:"https://cdn.intechopen.com/books/images_new/10795.jpg",slug:"plant-stress-physiology-perspectives-in-agriculture",publishedDate:"April 28th 2022",editedByType:"Edited by",bookSignature:"Mirza Hasanuzzaman and Kamran Nahar",hash:"c5a7932b74fe612b256bf95d0709756e",volumeInSeries:11,fullTitle:"Plant Stress Physiology - Perspectives in Agriculture",editors:[{id:"76477",title:"Prof.",name:"Mirza",middleName:null,surname:"Hasanuzzaman",slug:"mirza-hasanuzzaman",fullName:"Mirza Hasanuzzaman",profilePictureURL:"https://mts.intechopen.com/storage/users/76477/images/system/76477.png",institutionString:"Sher-e-Bangla Agricultural University",institution:{name:"Sher-e-Bangla Agricultural University",institutionURL:null,country:{name:"Bangladesh"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"7999",title:"Free Radical Medicine and Biology",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7999.jpg",slug:"free-radical-medicine-and-biology",publishedDate:"July 15th 2020",editedByType:"Edited by",bookSignature:"Kusal Das, Swastika Das, Mallanagouda Shivanagouda Biradar, Varaprasad Bobbarala and S. Subba Tata",hash:"083e5d427097d368a3f8a02bd6c76bf8",volumeInSeries:10,fullTitle:"Free Radical Medicine and Biology",editors:[{id:"187859",title:"Prof.",name:"Kusal",middleName:"K.",surname:"Das",slug:"kusal-das",fullName:"Kusal Das",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSBDeQAO/Profile_Picture_1623411145568",institutionString:"BLDE (Deemed to be University), India",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8762",title:"Melatonin",subtitle:"The Hormone of Darkness and its Therapeutic Potential and Perspectives",coverURL:"https://cdn.intechopen.com/books/images_new/8762.jpg",slug:"melatonin-the-hormone-of-darkness-and-its-therapeutic-potential-and-perspectives",publishedDate:"June 24th 2020",editedByType:"Edited by",bookSignature:"Marilena Vlachou",hash:"bfbc5538173f11acb0f9549a85b70489",volumeInSeries:9,fullTitle:"Melatonin - The Hormone of Darkness and its Therapeutic Potential and Perspectives",editors:[{id:"246279",title:"Associate Prof.",name:"Marilena",middleName:null,surname:"Vlachou",slug:"marilena-vlachou",fullName:"Marilena Vlachou",profilePictureURL:"https://mts.intechopen.com/storage/users/246279/images/system/246279.jpg",institutionString:"National and Kapodistrian University of Athens",institution:{name:"National and Kapodistrian University of Athens",institutionURL:null,country:{name:"Greece"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8002",title:"Tumor Progression and Metastasis",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8002.jpg",slug:"tumor-progression-and-metastasis",publishedDate:"April 8th 2020",editedByType:"Edited by",bookSignature:"Ahmed Lasfar and Karine Cohen-Solal",hash:"db17b0fe0a9b6e80ff02b81a93bafa4e",volumeInSeries:8,fullTitle:"Tumor Progression and Metastasis",editors:[{id:"32546",title:"Dr.",name:"Ahmed",middleName:null,surname:"Lasfar",slug:"ahmed-lasfar",fullName:"Ahmed Lasfar",profilePictureURL:"https://mts.intechopen.com/storage/users/32546/images/system/32546.png",institutionString:"Rutgers, The State University of New Jersey",institution:{name:"Rutgers, The State University of New Jersey",institutionURL:null,country:{name:"United States of America"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"6897",title:"Biophysical Chemistry",subtitle:"Advance Applications",coverURL:"https://cdn.intechopen.com/books/images_new/6897.jpg",slug:"biophysical-chemistry-advance-applications",publishedDate:"February 19th 2020",editedByType:"Edited by",bookSignature:"Mohammed A. A. Khalid",hash:"0ad18ab382e2ffb9ff202d15282297eb",volumeInSeries:7,fullTitle:"Biophysical Chemistry - Advance Applications",editors:[{id:"137240",title:"Prof.",name:"Mohammed",middleName:null,surname:"Khalid",slug:"mohammed-khalid",fullName:"Mohammed Khalid",profilePictureURL:"https://mts.intechopen.com/storage/users/137240/images/system/137240.png",institutionString:"Taif University",institution:{name:"Taif University",institutionURL:null,country:{name:"Saudi Arabia"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8430",title:"Neurodevelopment and Neurodevelopmental Disorder",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8430.jpg",slug:"neurodevelopment-and-neurodevelopmental-disorder",publishedDate:"November 27th 2019",editedByType:"Edited by",bookSignature:"Michael Fitzgerald",hash:"696c96d038de473216e48b199613c111",volumeInSeries:6,fullTitle:"Neurodevelopment and Neurodevelopmental Disorder",editors:[{id:"205005",title:"Dr.",name:"Michael",middleName:null,surname:"Fitzgerald",slug:"michael-fitzgerald",fullName:"Michael Fitzgerald",profilePictureURL:"https://mts.intechopen.com/storage/users/205005/images/system/205005.jpg",institutionString:"Independant Researcher",institution:{name:"Trinity College Dublin",institutionURL:null,country:{name:"Ireland"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8008",title:"Antioxidants",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8008.jpg",slug:"antioxidants",publishedDate:"November 6th 2019",editedByType:"Edited by",bookSignature:"Emad Shalaby",hash:"76361b4061e830906267933c1c670027",volumeInSeries:5,fullTitle:"Antioxidants",editors:[{id:"63600",title:"Prof.",name:"Emad",middleName:null,surname:"Shalaby",slug:"emad-shalaby",fullName:"Emad Shalaby",profilePictureURL:"https://mts.intechopen.com/storage/users/63600/images/system/63600.png",institutionString:"Cairo University",institution:{name:"Cairo University",institutionURL:null,country:{name:"Egypt"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8797",title:"Adipose Tissue",subtitle:"An Update",coverURL:"https://cdn.intechopen.com/books/images_new/8797.jpg",slug:"adipose-tissue-an-update",publishedDate:"November 6th 2019",editedByType:"Edited by",bookSignature:"Leszek Szablewski",hash:"34880b7b450ef96fa5063c867c028b02",volumeInSeries:4,fullTitle:"Adipose Tissue - An Update",editors:[{id:"49739",title:"Dr.",name:"Leszek",middleName:null,surname:"Szablewski",slug:"leszek-szablewski",fullName:"Leszek Szablewski",profilePictureURL:"https://mts.intechopen.com/storage/users/49739/images/system/49739.jpg",institutionString:"Medical University of Warsaw",institution:{name:"Medical University of Warsaw",institutionURL:null,country:{name:"Poland"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"6924",title:"Adenosine Triphosphate in Health and Disease",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/6924.jpg",slug:"adenosine-triphosphate-in-health-and-disease",publishedDate:"April 24th 2019",editedByType:"Edited by",bookSignature:"Gyula Mozsik",hash:"04106c232a3c68fec07ba7cf00d2522d",volumeInSeries:3,fullTitle:"Adenosine Triphosphate in Health and Disease",editors:[{id:"58390",title:"Dr.",name:"Gyula",middleName:null,surname:"Mozsik",slug:"gyula-mozsik",fullName:"Gyula Mozsik",profilePictureURL:"https://mts.intechopen.com/storage/users/58390/images/system/58390.png",institutionString:"University of Pécs",institution:{name:"University of Pecs",institutionURL:null,country:{name:"Hungary"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},subseriesFiltersForPublishedBooks:[{group:"subseries",caption:"Plant Physiology",value:13,count:1},{group:"subseries",caption:"Human Physiology",value:12,count:4},{group:"subseries",caption:"Cell Physiology",value:11,count:9}],publicationYearFilters:[{group:"publicationYear",caption:"2022",value:2022,count:4},{group:"publicationYear",caption:"2020",value:2020,count:4},{group:"publicationYear",caption:"2019",value:2019,count:5},{group:"publicationYear",caption:"2018",value:2018,count:1}],authors:{paginationCount:30,paginationItems:[{id:"425474",title:"Mr.",name:"Jasper",middleName:"Okoro Godwin",surname:"Okoro Godwin Elechi",slug:"jasper-okoro-godwin-elechi",fullName:"Jasper Okoro Godwin Elechi",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/425474/images/19990_n.jpg",biography:"Mr. Elechi is an innovative and passionate food professional and educator who can collaborate across boundaries with an integrated aspiration of innovation to provide good, sustainable, and healthy food solutions that promote human health and conserve planetary health. He has a special interest in innovative food product development, nutrition, indigenous food products, biotechnology, bioeconmy, sustainable global food systems transformation, food safety Nanotechnology, and Nanomaterials. He has carried out independent research and publications in these areas. He possesses comprehensive knowledge and technical know-how on nutritional formulation and production of healthy and sustainable foods from locally available underutilized Cereal-Legume crops for combating food security and malnutrition in developing communities.",institutionString:null,institution:null},{id:"307387",title:"Dr.",name:"Cecilia",middleName:null,surname:"Camporeale",slug:"cecilia-camporeale",fullName:"Cecilia Camporeale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"National Agency For New Technologies, Energy and Sustainable Economic Development",country:{name:"Italy"}}},{id:"296882",title:"Dr.",name:"Mario",middleName:null,surname:"Jorizzo",slug:"mario-jorizzo",fullName:"Mario Jorizzo",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"National Agency For New Technologies, Energy and Sustainable Economic Development",country:{name:"Italy"}}},{id:"307388",title:"Dr.",name:"ROBERTO",middleName:null,surname:"DEL CIELLO",slug:"roberto-del-ciello",fullName:"ROBERTO DEL CIELLO",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"National Agency For New Technologies, Energy and Sustainable Economic Development",country:{name:"Italy"}}},{id:"437647",title:"M.Sc.",name:"Fernando",middleName:null,surname:"Teixeira",slug:"fernando-teixeira",fullName:"Fernando Teixeira",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Évora",country:{name:"Portugal"}}},{id:"423338",title:"Dr.",name:"Harjeet",middleName:null,surname:"Singh",slug:"harjeet-singh",fullName:"Harjeet Singh",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Chitkara University",country:{name:"India"}}},{id:"443635",title:"Dr.",name:"Suruchi",middleName:null,surname:"Jindal",slug:"suruchi-jindal",fullName:"Suruchi Jindal",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Punjab Agricultural University",country:{name:"India"}}},{id:"426265",title:"Mrs.",name:"Inonge",middleName:null,surname:"Chibua",slug:"inonge-chibua",fullName:"Inonge Chibua",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Botswana",country:{name:"Botswana"}}},{id:"426266",title:"Ms.",name:"Mesha",middleName:null,surname:"Mbisana",slug:"mesha-mbisana",fullName:"Mesha Mbisana",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Botswana",country:{name:"Botswana"}}},{id:"426264",title:"Mr.",name:"Samuel",middleName:null,surname:"Raditloko",slug:"samuel-raditloko",fullName:"Samuel Raditloko",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Botswana",country:{name:"Botswana"}}},{id:"426394",title:"Dr.",name:"Mags",middleName:null,surname:"Adams",slug:"mags-adams",fullName:"Mags Adams",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Central Lancashire",country:{name:"United Kingdom"}}},{id:"441182",title:"Dr.",name:"Neil",middleName:null,surname:"Wilson",slug:"neil-wilson",fullName:"Neil Wilson",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Central Lancashire",country:{name:"United Kingdom"}}},{id:"425171",title:"Ph.D. Student",name:"Tanya",middleName:null,surname:"Zerbian",slug:"tanya-zerbian",fullName:"Tanya Zerbian",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Central Lancashire",country:{name:"Cyprus"}}},{id:"424714",title:"Prof.",name:"Elke",middleName:null,surname:"Stedefeldt",slug:"elke-stedefeldt",fullName:"Elke Stedefeldt",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Federal University of Sao Paulo",country:{name:"Brazil"}}},{id:"425244",title:"Dr.",name:"Rayane",middleName:"Stephanie Gomes",surname:"Stephanie Gomes De Freitas",slug:"rayane-stephanie-gomes-de-freitas",fullName:"Rayane Stephanie Gomes De Freitas",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Federal University of Sao Paulo",country:{name:"Brazil"}}},{id:"424688",title:"Dr.",name:"Bart",middleName:null,surname:"de Steenhuijsen Piters",slug:"bart-de-steenhuijsen-piters",fullName:"Bart de Steenhuijsen Piters",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Wageningen University & Research",country:{name:"Netherlands"}}},{id:"429404",title:"Dr.",name:"Emma",middleName:null,surname:"Termeer",slug:"emma-termeer",fullName:"Emma Termeer",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Wageningen University & Research",country:{name:"Netherlands"}}},{id:"429407",title:"Dr.",name:"Herman",middleName:null,surname:"Brouwer",slug:"herman-brouwer",fullName:"Herman Brouwer",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Wageningen University & Research",country:{name:"Netherlands"}}},{id:"429406",title:"Dr.",name:"Hubert",middleName:null,surname:"Fonteijn",slug:"hubert-fonteijn",fullName:"Hubert Fonteijn",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Wageningen University & Research",country:{name:"Netherlands"}}},{id:"427504",title:"Dr.",name:"Kriengsak",middleName:null,surname:"Chareonwongsak",slug:"kriengsak-chareonwongsak",fullName:"Kriengsak Chareonwongsak",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"423333",title:"Ph.D. Student",name:"Shivani",middleName:null,surname:"Sood",slug:"shivani-sood",fullName:"Shivani Sood",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"452297",title:"Mr.",name:"Cornelius",middleName:null,surname:"Smah Adamu",slug:"cornelius-smah-adamu",fullName:"Cornelius Smah Adamu",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"452296",title:"Mr.",name:"Ikechukwu",middleName:null,surname:"U. Nwiyi",slug:"ikechukwu-u.-nwiyi",fullName:"Ikechukwu U. Nwiyi",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"423395",title:"Assistant Prof.",name:"Adane",middleName:null,surname:"Atara Debessa",slug:"adane-atara-debessa",fullName:"Adane Atara Debessa",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"426267",title:"Mr.",name:"Banyaladzi",middleName:null,surname:"Paphane",slug:"banyaladzi-paphane",fullName:"Banyaladzi Paphane",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"483388",title:"Dr.",name:"Berhanu",middleName:null,surname:"Denu",slug:"berhanu-denu",fullName:"Berhanu Denu",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"483387",title:"Dr.",name:"Degefa",middleName:null,surname:"Tolossa",slug:"degefa-tolossa",fullName:"Degefa Tolossa",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"426059",title:"Dr.",name:"Dikabo",middleName:null,surname:"Mogopodi",slug:"dikabo-mogopodi",fullName:"Dikabo Mogopodi",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"422909",title:"Dr.",name:"Dorcas Stella",middleName:null,surname:"Shumba",slug:"dorcas-stella-shumba",fullName:"Dorcas Stella Shumba",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"429405",title:"Dr.",name:"Deborah",middleName:null,surname:"Bakker",slug:"deborah-bakker",fullName:"Deborah Bakker",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null}]}},subseries:{item:{id:"26",type:"subseries",title:"Machine Learning and Data Mining",keywords:"Intelligent Systems, Machine Learning, Data Science, Data Mining, Artificial Intelligence",scope:"The scope of machine learning and data mining is immense and is growing every day. It has become a massive part of our daily lives, making predictions based on experience, making this a fascinating area that solves problems that otherwise would not be possible or easy to solve. This topic aims to encompass algorithms that learn from experience (supervised and unsupervised), improve their performance over time and enable machines to make data-driven decisions. It is not limited to any particular applications, but contributions are encouraged from all disciplines.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/26.jpg",hasOnlineFirst:!0,hasPublishedBooks:!0,annualVolume:11422,editor:{id:"24555",title:"Dr.",name:"Marco Antonio",middleName:null,surname:"Aceves Fernandez",slug:"marco-antonio-aceves-fernandez",fullName:"Marco Antonio Aceves Fernandez",profilePictureURL:"https://mts.intechopen.com/storage/users/24555/images/system/24555.jpg",biography:"Dr. Marco Antonio Aceves Fernandez obtained his B.Sc. (Eng.) in Telematics from the Universidad de Colima, Mexico. He obtained both his M.Sc. and Ph.D. from the University of Liverpool, England, in the field of Intelligent Systems. He is a full professor at the Universidad Autonoma de Queretaro, Mexico, and a member of the National System of Researchers (SNI) since 2009. Dr. Aceves Fernandez has published more than 80 research papers as well as a number of book chapters and congress papers. He has contributed in more than 20 funded research projects, both academic and industrial, in the area of artificial intelligence, ranging from environmental, biomedical, automotive, aviation, consumer, and robotics to other applications. He is also a honorary president at the National Association of Embedded Systems (AMESE), a senior member of the IEEE, and a board member of many institutions. His research interests include intelligent and embedded systems.",institutionString:"Universidad Autonoma de Queretaro",institution:{name:"Autonomous University of Queretaro",institutionURL:null,country:{name:"Mexico"}}},editorTwo:null,editorThree:null,series:{id:"14",title:"Artificial Intelligence",doi:"10.5772/intechopen.79920",issn:"2633-1403"},editorialBoard:[{id:"43680",title:"Prof.",name:"Ciza",middleName:null,surname:"Thomas",slug:"ciza-thomas",fullName:"Ciza Thomas",profilePictureURL:"https://mts.intechopen.com/storage/users/43680/images/system/43680.jpeg",institutionString:null,institution:{name:"Government of Kerala",institutionURL:null,country:{name:"India"}}},{id:"16614",title:"Prof.",name:"Juan Ignacio",middleName:null,surname:"Guerrero Alonso",slug:"juan-ignacio-guerrero-alonso",fullName:"Juan Ignacio Guerrero Alonso",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002g6HB8QAM/Profile_Picture_1627901127555",institutionString:null,institution:{name:"University of Seville",institutionURL:null,country:{name:"Spain"}}},{id:"3095",title:"Prof.",name:"Kenji",middleName:null,surname:"Suzuki",slug:"kenji-suzuki",fullName:"Kenji Suzuki",profilePictureURL:"https://mts.intechopen.com/storage/users/3095/images/1592_n.jpg",institutionString:null,institution:{name:"University of Chicago",institutionURL:null,country:{name:"United States of America"}}},{id:"214067",title:"Dr.",name:"W. David",middleName:null,surname:"Pan",slug:"w.-david-pan",fullName:"W. David Pan",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSEI9QAO/Profile_Picture_1623656213532",institutionString:null,institution:{name:"University of Alabama in Huntsville",institutionURL:null,country:{name:"United States of America"}}},{id:"72920",title:"Prof.",name:"Yves",middleName:"Philippe",surname:"Rybarczyk",slug:"yves-rybarczyk",fullName:"Yves Rybarczyk",profilePictureURL:"https://mts.intechopen.com/storage/users/72920/images/system/72920.jpeg",institutionString:"Dalarna University, Faculty of Data and Information Sciences",institution:{name:"Dalarna University",institutionURL:null,country:{name:"Sweden"}}}]},onlineFirstChapters:{paginationCount:9,paginationItems:[{id:"83075",title:"Practices and Challenges of Community Services at Debre Markos University, Ethiopia: A Case Study",doi:"10.5772/intechopen.105896",signatures:"Adane Mengist",slug:"practices-and-challenges-of-community-services-at-debre-markos-university-ethiopia-a-case-study",totalDownloads:1,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82858",title:"Corporate Social Responsibility a Case of the Provision of Recreational Facilities",doi:"10.5772/intechopen.105608",signatures:"Peter Musa Wash, Shida Irwana Omar, Badaruddin Mohamed and Mohd Ismail Isa",slug:"corporate-social-responsibility-a-case-of-the-provision-of-recreational-facilities",totalDownloads:5,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82405",title:"Does Board Structure Matter in CSR Spending of Commercial Banks? Empirical Evidence from an Emerging Economy",doi:"10.5772/intechopen.105589",signatures:"Bishnu Kumar Adhikary and Ranjan Kumar Mitra",slug:"does-board-structure-matter-in-csr-spending-of-commercial-banks-empirical-evidence-from-an-emerging-",totalDownloads:18,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82395",title:"Toward a Better Understanding of Green Human Resource Management’s Impact on Green Competitive Advantage: A Conceptual Model",doi:"10.5772/intechopen.105528",signatures:"Hosna Hossari and Kaoutar Elfahli",slug:"toward-a-better-understanding-of-green-human-resource-management-s-impact-on-green-competitive-advan",totalDownloads:27,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82269",title:"CSR Reporting and Blockchain Technology",doi:"10.5772/intechopen.105512",signatures:"Pattarake Sarajoti, Pattanaporn Chatjuthamard, Suwongrat Papangkorn and Piyachart Phiromswad",slug:"csr-reporting-and-blockchain-technology",totalDownloads:31,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82270",title:"From Corporate Social Opportunity to Corporate Social Responsibility",doi:"10.5772/intechopen.105445",signatures:"Brian Bolton",slug:"from-corporate-social-opportunity-to-corporate-social-responsibility",totalDownloads:15,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82339",title:"Green Human Resource Management: An Exploratory Study from Moroccan ISO 14001 Certified Companies",doi:"10.5772/intechopen.105565",signatures:"Hosna Hossari and Kaoutar Elfahli",slug:"green-human-resource-management-an-exploratory-study-from-moroccan-iso-14001-certified-companies",totalDownloads:15,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"82194",title:"CSR and Female Directors: A Review and Future Research Agenda",doi:"10.5772/intechopen.105112",signatures:"Pattarake Sarajoti, Pattanaporn Chatjuthamard, Suwongrat Papangkorn and Sirimon Treepongkaruna",slug:"csr-and-female-directors-a-review-and-future-research-agenda",totalDownloads:18,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Corporate Social Responsibility",coverURL:"https://cdn.intechopen.com/books/images_new/11602.jpg",subseries:{id:"86",title:"Business and Management"}}},{id:"81831",title:"Deep Network Model and Regression Analysis using OLS Method for Predicting Lung Vital Capacity",doi:"10.5772/intechopen.104737",signatures:"Harun Sümbül",slug:"deep-network-model-and-regression-analysis-using-ols-method-for-predicting-lung-vital-capacity",totalDownloads:18,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Decision Science - Recent Advances and Applications",coverURL:"https://cdn.intechopen.com/books/images_new/11604.jpg",subseries:{id:"86",title:"Business and Management"}}}]},publishedBooks:{paginationCount:6,paginationItems:[{type:"book",id:"9493",title:"Periodontology",subtitle:"Fundamentals and Clinical Features",coverURL:"https://cdn.intechopen.com/books/images_new/9493.jpg",slug:"periodontology-fundamentals-and-clinical-features",publishedDate:"February 16th 2022",editedByType:"Edited by",bookSignature:"Petra Surlin",hash:"dfe986c764d6c82ae820c2df5843a866",volumeInSeries:8,fullTitle:"Periodontology - Fundamentals and Clinical Features",editors:[{id:"171921",title:"Prof.",name:"Petra",middleName:null,surname:"Surlin",slug:"petra-surlin",fullName:"Petra Surlin",profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",institutionString:"University of Medicine and Pharmacy of Craiova",institution:{name:"University of Medicine and Pharmacy of Craiova",institutionURL:null,country:{name:"Romania"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"9588",title:"Clinical Concepts and Practical Management Techniques in Dentistry",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/9588.jpg",slug:"clinical-concepts-and-practical-management-techniques-in-dentistry",publishedDate:"February 9th 2022",editedByType:"Edited by",bookSignature:"Aneesa Moolla",hash:"42deab8d3bcf3edf64d1d9028d42efd1",volumeInSeries:7,fullTitle:"Clinical Concepts and Practical Management Techniques in Dentistry",editors:[{id:"318170",title:"Dr.",name:"Aneesa",middleName:null,surname:"Moolla",slug:"aneesa-moolla",fullName:"Aneesa Moolla",profilePictureURL:"https://mts.intechopen.com/storage/users/318170/images/system/318170.png",institutionString:"University of the Witwatersrand",institution:{name:"University of the Witwatersrand",institutionURL:null,country:{name:"South Africa"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8202",title:"Periodontal Disease",subtitle:"Diagnostic and Adjunctive Non-surgical Considerations",coverURL:"https://cdn.intechopen.com/books/images_new/8202.jpg",slug:"periodontal-disease-diagnostic-and-adjunctive-non-surgical-considerations",publishedDate:"February 5th 2020",editedByType:"Edited by",bookSignature:"Nermin Mohammed Ahmed Yussif",hash:"0aee9799da7db2c732be44dd8fed16d8",volumeInSeries:6,fullTitle:"Periodontal Disease - Diagnostic and Adjunctive Non-surgical Considerations",editors:[{id:"210472",title:"Dr.",name:"Nermin",middleName:"Mohammed Ahmed",surname:"Yussif",slug:"nermin-yussif",fullName:"Nermin Yussif",profilePictureURL:"https://mts.intechopen.com/storage/users/210472/images/system/210472.jpg",institutionString:"MSA University",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"8837",title:"Human Teeth",subtitle:"Key Skills and Clinical Illustrations",coverURL:"https://cdn.intechopen.com/books/images_new/8837.jpg",slug:"human-teeth-key-skills-and-clinical-illustrations",publishedDate:"January 22nd 2020",editedByType:"Edited by",bookSignature:"Zühre Akarslan and Farid Bourzgui",hash:"ac055c5801032970123e0a196c2e1d32",volumeInSeries:5,fullTitle:"Human Teeth - Key Skills and Clinical Illustrations",editors:[{id:"171887",title:"Prof.",name:"Zühre",middleName:null,surname:"Akarslan",slug:"zuhre-akarslan",fullName:"Zühre Akarslan",profilePictureURL:"https://mts.intechopen.com/storage/users/171887/images/system/171887.jpg",institutionString:"Gazi University",institution:{name:"Gazi University",institutionURL:null,country:{name:"Turkey"}}}],equalEditorOne:{id:"52177",title:"Prof.",name:"Farid",middleName:null,surname:"Bourzgui",slug:"farid-bourzgui",fullName:"Farid Bourzgui",profilePictureURL:"https://mts.intechopen.com/storage/users/52177/images/system/52177.png",biography:"Prof. Farid Bourzgui obtained his DMD and his DNSO option in Orthodontics at the School of Dental Medicine, Casablanca Hassan II University, Morocco, in 1995 and 2000, respectively. Currently, he is a professor of Orthodontics. He holds a Certificate of Advanced Study type A in Technology of Biomaterials used in Dentistry (1995); Certificate of Advanced Study type B in Dento-Facial Orthopaedics (1997) from the Faculty of Dental Surgery, University Denis Diderot-Paris VII, France; Diploma of Advanced Study (DESA) in Biocompatibility of Biomaterials from the Faculty of Medicine and Pharmacy of Casablanca (2002); Certificate of Clinical Occlusodontics from the Faculty of Dentistry of Casablanca (2004); University Diploma of Biostatistics and Perceptual Health Measurement from the Faculty of Medicine and Pharmacy of Casablanca (2011); and a University Diploma of Pedagogy of Odontological Sciences from the Faculty of Dentistry of Casablanca (2013). He is the author of several scientific articles, book chapters, and books.",institutionString:"University of Hassan II Casablanca",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"7",totalChapterViews:"0",totalEditedBooks:"2",institution:{name:"University of Hassan II Casablanca",institutionURL:null,country:{name:"Morocco"}}},equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"7060",title:"Gingival Disease",subtitle:"A Professional Approach for Treatment and Prevention",coverURL:"https://cdn.intechopen.com/books/images_new/7060.jpg",slug:"gingival-disease-a-professional-approach-for-treatment-and-prevention",publishedDate:"October 23rd 2019",editedByType:"Edited by",bookSignature:"Alaa Eddin Omar Al Ostwani",hash:"b81d39988cba3a3cf746c1616912cf41",volumeInSeries:4,fullTitle:"Gingival Disease - A Professional Approach for Treatment and Prevention",editors:[{id:"240870",title:"Ph.D.",name:"Alaa Eddin Omar",middleName:null,surname:"Al Ostwani",slug:"alaa-eddin-omar-al-ostwani",fullName:"Alaa Eddin Omar Al Ostwani",profilePictureURL:"https://mts.intechopen.com/storage/users/240870/images/system/240870.jpeg",institutionString:"International University for Science and Technology.",institution:{name:"Islamic University of Science and Technology",institutionURL:null,country:{name:"India"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"6668",title:"Dental Caries",subtitle:"Diagnosis, Prevention and Management",coverURL:"https://cdn.intechopen.com/books/images_new/6668.jpg",slug:"dental-caries-diagnosis-prevention-and-management",publishedDate:"September 19th 2018",editedByType:"Edited by",bookSignature:"Zühre Akarslan",hash:"b0f7667770a391f772726c3013c1b9ba",volumeInSeries:1,fullTitle:"Dental Caries - Diagnosis, Prevention and Management",editors:[{id:"171887",title:"Prof.",name:"Zühre",middleName:null,surname:"Akarslan",slug:"zuhre-akarslan",fullName:"Zühre Akarslan",profilePictureURL:"https://mts.intechopen.com/storage/users/171887/images/system/171887.jpg",institutionString:"Gazi University",institution:{name:"Gazi University",institutionURL:null,country:{name:"Turkey"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},testimonialsList:[{id:"8",text:"I work with IntechOpen for a number of reasons: their professionalism, their mission in support of Open Access publishing, and the quality of their peer-reviewed publications, but also because they believe in equality.",author:{id:"202192",name:"Catrin",surname:"Rutland",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",slug:"catrin-rutland",institution:{id:"134",name:"University of Nottingham",country:{id:null,name:"United Kingdom"}}}},{id:"18",text:"It was great publishing with IntechOpen, the process was straightforward and I had support all along.",author:{id:"71579",name:"Berend",surname:"Olivier",institutionString:"Utrecht University",profilePictureURL:"https://mts.intechopen.com/storage/users/71579/images/system/71579.png",slug:"berend-olivier",institution:{id:"253",name:"Utrecht University",country:{id:null,name:"Netherlands"}}}},{id:"27",text:"The opportunity to work with a prestigious publisher allows for the possibility to collaborate with more research groups interested in animal nutrition, leading to the development of new feeding strategies and food valuation while being more sustainable with the environment, allowing more readers to learn about the subject.",author:{id:"175967",name:"Manuel",surname:"Gonzalez Ronquillo",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/175967/images/system/175967.png",slug:"manuel-gonzalez-ronquillo",institution:{id:"6221",name:"Universidad Autónoma del Estado de México",country:{id:null,name:"Mexico"}}}}]},submityourwork:{pteSeriesList:[{id:"14",title:"Artificial Intelligence",numberOfPublishedBooks:9,numberOfPublishedChapters:90,numberOfOpenTopics:6,numberOfUpcomingTopics:0,issn:"2633-1403",doi:"10.5772/intechopen.79920",isOpenForSubmission:!0},{id:"7",title:"Biomedical Engineering",numberOfPublishedBooks:12,numberOfPublishedChapters:107,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2631-5343",doi:"10.5772/intechopen.71985",isOpenForSubmission:!0}],lsSeriesList:[{id:"11",title:"Biochemistry",numberOfPublishedBooks:33,numberOfPublishedChapters:330,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2632-0983",doi:"10.5772/intechopen.72877",isOpenForSubmission:!0},{id:"25",title:"Environmental Sciences",numberOfPublishedBooks:1,numberOfPublishedChapters:19,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2754-6713",doi:"10.5772/intechopen.100362",isOpenForSubmission:!0},{id:"10",title:"Physiology",numberOfPublishedBooks:14,numberOfPublishedChapters:145,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-8261",doi:"10.5772/intechopen.72796",isOpenForSubmission:!0}],hsSeriesList:[{id:"3",title:"Dentistry",numberOfPublishedBooks:9,numberOfPublishedChapters:140,numberOfOpenTopics:2,numberOfUpcomingTopics:0,issn:"2631-6218",doi:"10.5772/intechopen.71199",isOpenForSubmission:!0},{id:"6",title:"Infectious Diseases",numberOfPublishedBooks:13,numberOfPublishedChapters:123,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-6188",doi:"10.5772/intechopen.71852",isOpenForSubmission:!0},{id:"13",title:"Veterinary Medicine and Science",numberOfPublishedBooks:11,numberOfPublishedChapters:112,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2632-0517",doi:"10.5772/intechopen.73681",isOpenForSubmission:!0}],sshSeriesList:[{id:"22",title:"Business, Management and Economics",numberOfPublishedBooks:1,numberOfPublishedChapters:22,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2753-894X",doi:"10.5772/intechopen.100359",isOpenForSubmission:!0},{id:"23",title:"Education and Human Development",numberOfPublishedBooks:0,numberOfPublishedChapters:11,numberOfOpenTopics:1,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100360",isOpenForSubmission:!0},{id:"24",title:"Sustainable Development",numberOfPublishedBooks:1,numberOfPublishedChapters:19,numberOfOpenTopics:5,numberOfUpcomingTopics:0,issn:"2753-6580",doi:"10.5772/intechopen.100361",isOpenForSubmission:!0}],subseriesList:[{id:"7",title:"Bioinformatics and Medical Informatics",scope:"Bioinformatics aims to help understand the functioning of the mechanisms of living organisms through the construction and use of quantitative tools. The applications of this research cover many related fields, such as biotechnology and medicine, where, for example, Bioinformatics contributes to faster drug design, DNA analysis in forensics, and DNA sequence analysis in the field of personalized medicine. Personalized medicine is a type of medical care in which treatment is customized individually for each patient. Personalized medicine enables more effective therapy, reduces the costs of therapy and clinical trials, and also minimizes the risk of side effects. Nevertheless, advances in personalized medicine would not have been possible without bioinformatics, which can analyze the human genome and other vast amounts of biomedical data, especially in genetics. The rapid growth of information technology enabled the development of new tools to decode human genomes, large-scale studies of genetic variations and medical informatics. The considerable development of technology, including the computing power of computers, is also conducive to the development of bioinformatics, including personalized medicine. In an era of rapidly growing data volumes and ever lower costs of generating, storing and computing data, personalized medicine holds great promises. Modern computational methods used as bioinformatics tools can integrate multi-scale, multi-modal and longitudinal patient data to create even more effective and safer therapy and disease prevention methods. Main aspects of the topic are: Applying bioinformatics in drug discovery and development; Bioinformatics in clinical diagnostics (genetic variants that act as markers for a condition or a disease); Blockchain and Artificial Intelligence/Machine Learning in personalized medicine; Customize disease-prevention strategies in personalized medicine; Big data analysis in personalized medicine; Translating stratification algorithms into clinical practice of personalized medicine.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/7.jpg",keywords:"Biomedical Data, Drug Discovery, Clinical Diagnostics, Decoding Human Genome, AI in Personalized Medicine, Disease-prevention Strategies, Big Data Analysis in Medicine"},{id:"8",title:"Bioinspired Technology and Biomechanics",scope:'Bioinspired technologies take advantage of understanding the actual biological system to provide solutions to problems in several areas. Recently, bioinspired systems have been successfully employing biomechanics to develop and improve assistive technology and rehabilitation devices. The research topic "Bioinspired Technology and Biomechanics" welcomes studies reporting recent advances in bioinspired technologies that contribute to individuals\' health, inclusion, and rehabilitation. Possible contributions can address (but are not limited to) the following research topics: Bioinspired design and control of exoskeletons, orthoses, and prostheses; Experimental evaluation of the effect of assistive devices (e.g., influence on gait, balance, and neuromuscular system); Bioinspired technologies for rehabilitation, including clinical studies reporting evaluations; Application of neuromuscular and biomechanical models to the development of bioinspired technology.',coverUrl:"https://cdn.intechopen.com/series_topics/covers/8.jpg",keywords:"Bioinspired Systems, Biomechanics, Assistive Technology, Rehabilitation"},{id:"9",title:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering",scope:"The Biotechnology - Biosensors, Biomaterials and Tissue Engineering topic within the Biomedical Engineering Series aims to rapidly publish contributions on all aspects of biotechnology, biosensors, biomaterial and tissue engineering. We encourage the submission of manuscripts that provide novel and mechanistic insights that report significant advances in the fields. Topics can include but are not limited to: Biotechnology such as biotechnological products and process engineering; Biotechnologically relevant enzymes and proteins; Bioenergy and biofuels; Applied genetics and molecular biotechnology; Genomics, transcriptomics, proteomics; Applied microbial and cell physiology; Environmental biotechnology; Methods and protocols. Moreover, topics in biosensor technology, like sensors that incorporate enzymes, antibodies, nucleic acids, whole cells, tissues and organelles, and other biological or biologically inspired components will be considered, and topics exploring transducers, including those based on electrochemical and optical piezoelectric, thermal, magnetic, and micromechanical elements. Chapters exploring biomaterial approaches such as polymer synthesis and characterization, drug and gene vector design, biocompatibility, immunology and toxicology, and self-assembly at the nanoscale, are welcome. Finally, the tissue engineering subcategory will support topics such as the fundamentals of stem cells and progenitor cells and their proliferation, differentiation, bioreactors for three-dimensional culture and studies of phenotypic changes, stem and progenitor cells, both short and long term, ex vivo and in vivo implantation both in preclinical models and also in clinical trials.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/9.jpg",keywords:"Biotechnology, Biosensors, Biomaterials, Tissue Engineering"}],annualVolumeBook:{},thematicCollection:[],selectedSeries:null,selectedSubseries:null},seriesLanding:{item:{id:"7",title:"Biomedical Engineering",doi:"10.5772/intechopen.71985",issn:"2631-5343",scope:"Biomedical Engineering is one of the fastest-growing interdisciplinary branches of science and industry. The combination of electronics and computer science with biology and medicine has improved patient diagnosis, reduced rehabilitation time, and helped to facilitate a better quality of life. Nowadays, all medical imaging devices, medical instruments, or new laboratory techniques result from the cooperation of specialists in various fields. The series of Biomedical Engineering books covers such areas of knowledge as chemistry, physics, electronics, medicine, and biology. This series is intended for doctors, engineers, and scientists involved in biomedical engineering or those wanting to start working in this field.",coverUrl:"https://cdn.intechopen.com/series/covers/7.jpg",latestPublicationDate:"August 3rd, 2022",hasOnlineFirst:!0,numberOfOpenTopics:3,numberOfPublishedChapters:107,numberOfPublishedBooks:12,editor:{id:"50150",title:"Prof.",name:"Robert",middleName:null,surname:"Koprowski",fullName:"Robert Koprowski",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002aYTYNQA4/Profile_Picture_1630478535317",biography:"Robert Koprowski, MD (1997), PhD (2003), Habilitation (2015), is an employee of the University of Silesia, Poland, Institute of Computer Science, Department of Biomedical Computer Systems. For 20 years, he has studied the analysis and processing of biomedical images, emphasizing the full automation of measurement for a large inter-individual variability of patients. Dr. Koprowski has authored more than a hundred research papers with dozens in impact factor (IF) journals and has authored or co-authored six books. Additionally, he is the author of several national and international patents in the field of biomedical devices and imaging. Since 2011, he has been a reviewer of grants and projects (including EU projects) in biomedical engineering.",institutionString:null,institution:{name:"University of Silesia",institutionURL:null,country:{name:"Poland"}}},subseries:[{id:"7",title:"Bioinformatics and Medical Informatics",keywords:"Biomedical Data, Drug Discovery, Clinical Diagnostics, Decoding Human Genome, AI in Personalized Medicine, Disease-prevention Strategies, Big Data Analysis in Medicine",scope:"Bioinformatics aims to help understand the functioning of the mechanisms of living organisms through the construction and use of quantitative tools. The applications of this research cover many related fields, such as biotechnology and medicine, where, for example, Bioinformatics contributes to faster drug design, DNA analysis in forensics, and DNA sequence analysis in the field of personalized medicine. Personalized medicine is a type of medical care in which treatment is customized individually for each patient. Personalized medicine enables more effective therapy, reduces the costs of therapy and clinical trials, and also minimizes the risk of side effects. Nevertheless, advances in personalized medicine would not have been possible without bioinformatics, which can analyze the human genome and other vast amounts of biomedical data, especially in genetics. The rapid growth of information technology enabled the development of new tools to decode human genomes, large-scale studies of genetic variations and medical informatics. The considerable development of technology, including the computing power of computers, is also conducive to the development of bioinformatics, including personalized medicine. In an era of rapidly growing data volumes and ever lower costs of generating, storing and computing data, personalized medicine holds great promises. Modern computational methods used as bioinformatics tools can integrate multi-scale, multi-modal and longitudinal patient data to create even more effective and safer therapy and disease prevention methods. Main aspects of the topic are: Applying bioinformatics in drug discovery and development; Bioinformatics in clinical diagnostics (genetic variants that act as markers for a condition or a disease); Blockchain and Artificial Intelligence/Machine Learning in personalized medicine; Customize disease-prevention strategies in personalized medicine; Big data analysis in personalized medicine; Translating stratification algorithms into clinical practice of personalized medicine.",annualVolume:11403,isOpenForSubmission:!0,coverUrl:"https://cdn.intechopen.com/series_topics/covers/7.jpg",editor:{id:"351533",title:"Dr.",name:"Slawomir",middleName:null,surname:"Wilczynski",fullName:"Slawomir Wilczynski",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y000035U1loQAC/Profile_Picture_1630074514792",institutionString:null,institution:{name:"Medical University of Silesia",institutionURL:null,country:{name:"Poland"}}},editorTwo:null,editorThree:null,editorialBoard:[{id:"5886",title:"Dr.",name:"Alexandros",middleName:"T.",surname:"Tzallas",fullName:"Alexandros Tzallas",profilePictureURL:"https://mts.intechopen.com/storage/users/5886/images/system/5886.png",institutionString:"University of Ioannina, Greece & Imperial College London",institution:{name:"University of Ioannina",institutionURL:null,country:{name:"Greece"}}},{id:"257388",title:"Distinguished Prof.",name:"Lulu",middleName:null,surname:"Wang",fullName:"Lulu Wang",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRX6kQAG/Profile_Picture_1630329584194",institutionString:"Shenzhen Technology University",institution:{name:"Shenzhen Technology University",institutionURL:null,country:{name:"China"}}},{id:"225387",title:"Prof.",name:"Reda R.",middleName:"R.",surname:"Gharieb",fullName:"Reda R. Gharieb",profilePictureURL:"https://mts.intechopen.com/storage/users/225387/images/system/225387.jpg",institutionString:"Assiut University",institution:{name:"Assiut University",institutionURL:null,country:{name:"Egypt"}}}]},{id:"8",title:"Bioinspired Technology and Biomechanics",keywords:"Bioinspired Systems, Biomechanics, Assistive Technology, Rehabilitation",scope:'Bioinspired technologies take advantage of understanding the actual biological system to provide solutions to problems in several areas. Recently, bioinspired systems have been successfully employing biomechanics to develop and improve assistive technology and rehabilitation devices. The research topic "Bioinspired Technology and Biomechanics" welcomes studies reporting recent advances in bioinspired technologies that contribute to individuals\' health, inclusion, and rehabilitation. Possible contributions can address (but are not limited to) the following research topics: Bioinspired design and control of exoskeletons, orthoses, and prostheses; Experimental evaluation of the effect of assistive devices (e.g., influence on gait, balance, and neuromuscular system); Bioinspired technologies for rehabilitation, including clinical studies reporting evaluations; Application of neuromuscular and biomechanical models to the development of bioinspired technology.',annualVolume:11404,isOpenForSubmission:!0,coverUrl:"https://cdn.intechopen.com/series_topics/covers/8.jpg",editor:{id:"144937",title:"Prof.",name:"Adriano",middleName:"De Oliveira",surname:"Andrade",fullName:"Adriano Andrade",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRC8QQAW/Profile_Picture_1625219101815",institutionString:null,institution:{name:"Federal University of Uberlândia",institutionURL:null,country:{name:"Brazil"}}},editorTwo:null,editorThree:null,editorialBoard:[{id:"49517",title:"Prof.",name:"Hitoshi",middleName:null,surname:"Tsunashima",fullName:"Hitoshi Tsunashima",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002aYTP4QAO/Profile_Picture_1625819726528",institutionString:null,institution:{name:"Nihon University",institutionURL:null,country:{name:"Japan"}}},{id:"425354",title:"Dr.",name:"Marcus",middleName:"Fraga",surname:"Vieira",fullName:"Marcus Vieira",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y00003BJSgIQAX/Profile_Picture_1627904687309",institutionString:null,institution:{name:"Universidade Federal de Goiás",institutionURL:null,country:{name:"Brazil"}}},{id:"196746",title:"Dr.",name:"Ramana",middleName:null,surname:"Vinjamuri",fullName:"Ramana Vinjamuri",profilePictureURL:"https://mts.intechopen.com/storage/users/196746/images/system/196746.jpeg",institutionString:"University of Maryland, Baltimore County",institution:{name:"University of Maryland, Baltimore County",institutionURL:null,country:{name:"United States of America"}}}]},{id:"9",title:"Biotechnology - Biosensors, Biomaterials and Tissue Engineering",keywords:"Biotechnology, Biosensors, Biomaterials, Tissue Engineering",scope:"The Biotechnology - Biosensors, Biomaterials and Tissue Engineering topic within the Biomedical Engineering Series aims to rapidly publish contributions on all aspects of biotechnology, biosensors, biomaterial and tissue engineering. We encourage the submission of manuscripts that provide novel and mechanistic insights that report significant advances in the fields. Topics can include but are not limited to: Biotechnology such as biotechnological products and process engineering; Biotechnologically relevant enzymes and proteins; Bioenergy and biofuels; Applied genetics and molecular biotechnology; Genomics, transcriptomics, proteomics; Applied microbial and cell physiology; Environmental biotechnology; Methods and protocols. Moreover, topics in biosensor technology, like sensors that incorporate enzymes, antibodies, nucleic acids, whole cells, tissues and organelles, and other biological or biologically inspired components will be considered, and topics exploring transducers, including those based on electrochemical and optical piezoelectric, thermal, magnetic, and micromechanical elements. Chapters exploring biomaterial approaches such as polymer synthesis and characterization, drug and gene vector design, biocompatibility, immunology and toxicology, and self-assembly at the nanoscale, are welcome. Finally, the tissue engineering subcategory will support topics such as the fundamentals of stem cells and progenitor cells and their proliferation, differentiation, bioreactors for three-dimensional culture and studies of phenotypic changes, stem and progenitor cells, both short and long term, ex vivo and in vivo implantation both in preclinical models and also in clinical trials.",annualVolume:11405,isOpenForSubmission:!0,coverUrl:"https://cdn.intechopen.com/series_topics/covers/9.jpg",editor:{id:"126286",title:"Dr.",name:"Luis",middleName:"Jesús",surname:"Villarreal-Gómez",fullName:"Luis Villarreal-Gómez",profilePictureURL:"https://mts.intechopen.com/storage/users/126286/images/system/126286.jpg",institutionString:null,institution:{name:"Autonomous University of Baja California",institutionURL:null,country:{name:"Mexico"}}},editorTwo:null,editorThree:null,editorialBoard:[{id:"35539",title:"Dr.",name:"Cecilia",middleName:null,surname:"Cristea",fullName:"Cecilia Cristea",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002aYQ65QAG/Profile_Picture_1621007741527",institutionString:null,institution:{name:"Iuliu Hațieganu University of Medicine and Pharmacy",institutionURL:null,country:{name:"Romania"}}},{id:"40735",title:"Dr.",name:"Gil",middleName:"Alberto Batista",surname:"Gonçalves",fullName:"Gil Gonçalves",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002aYRLGQA4/Profile_Picture_1628492612759",institutionString:null,institution:{name:"University of Aveiro",institutionURL:null,country:{name:"Portugal"}}},{id:"211725",title:"Associate Prof.",name:"Johann F.",middleName:null,surname:"Osma",fullName:"Johann F. Osma",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSDv7QAG/Profile_Picture_1626602531691",institutionString:null,institution:{name:"Universidad de Los Andes",institutionURL:null,country:{name:"Colombia"}}},{id:"69697",title:"Dr.",name:"Mani T.",middleName:null,surname:"Valarmathi",fullName:"Mani T. Valarmathi",profilePictureURL:"https://mts.intechopen.com/storage/users/69697/images/system/69697.jpg",institutionString:"Religen Inc. | A Life Science Company, United States of America",institution:null},{id:"205081",title:"Dr.",name:"Marco",middleName:"Vinícius",surname:"Chaud",fullName:"Marco Chaud",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bSDGeQAO/Profile_Picture_1622624307737",institutionString:null,institution:{name:"Universidade de Sorocaba",institutionURL:null,country:{name:"Brazil"}}}]}]}},libraryRecommendation:{success:null,errors:{},institutions:[]},route:{name:"chapter.detail",path:"/chapters/56679",hash:"",query:{},params:{id:"56679"},fullPath:"/chapters/56679",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()