Comparison of different APT detection methods.
\\n\\n
More than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\\n\\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\\n\\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\\n\\nAdditionally, each book published by IntechOpen contains original content and research findings.
\\n\\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\\n\\n\\n\\n
\\n"}]',published:!0,mainMedia:{caption:"IntechOpen Maintains",originalUrl:"/media/original/113"}},components:[{type:"htmlEditorComponent",content:'
Simba Information has released its Open Access Book Publishing 2020 - 2024 report and has again identified IntechOpen as the world’s largest Open Access book publisher by title count.
\n\nSimba Information is a leading provider for market intelligence and forecasts in the media and publishing industry. The report, published every year, provides an overview and financial outlook for the global professional e-book publishing market.
\n\nIntechOpen, De Gruyter, and Frontiers are the largest OA book publishers by title count, with IntechOpen coming in at first place with 5,101 OA books published, a good 1,782 titles ahead of the nearest competitor.
\n\nSince the first Open Access Book Publishing report published in 2016, IntechOpen has held the top stop each year.
\n\n\n\nMore than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\n\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\n\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\n\nAdditionally, each book published by IntechOpen contains original content and research findings.
\n\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\n\n\n\n
\n'}],latestNews:[{slug:"webinar-introduction-to-open-science-wednesday-18-may-1-pm-cest-20220518",title:"Webinar: Introduction to Open Science | Wednesday 18 May, 1 PM CEST"},{slug:"step-in-the-right-direction-intechopen-launches-a-portfolio-of-open-science-journals-20220414",title:"Step in the Right Direction: IntechOpen Launches a Portfolio of Open Science Journals"},{slug:"let-s-meet-at-london-book-fair-5-7-april-2022-olympia-london-20220321",title:"Let’s meet at London Book Fair, 5-7 April 2022, Olympia London"},{slug:"50-books-published-as-part-of-intechopen-and-knowledge-unlatched-ku-collaboration-20220316",title:"50 Books published as part of IntechOpen and Knowledge Unlatched (KU) Collaboration"},{slug:"intechopen-joins-the-united-nations-sustainable-development-goals-publishers-compact-20221702",title:"IntechOpen joins the United Nations Sustainable Development Goals Publishers Compact"},{slug:"intechopen-signs-exclusive-representation-agreement-with-lsr-libros-servicios-y-representaciones-s-a-de-c-v-20211123",title:"IntechOpen Signs Exclusive Representation Agreement with LSR Libros Servicios y Representaciones S.A. de C.V"},{slug:"intechopen-expands-partnership-with-research4life-20211110",title:"IntechOpen Expands Partnership with Research4Life"},{slug:"introducing-intechopen-book-series-a-new-publishing-format-for-oa-books-20210915",title:"Introducing IntechOpen Book Series - A New Publishing Format for OA Books"}]},book:{item:{type:"book",id:"3262",leadTitle:null,fullTitle:"Endoscopy of GI Tract",title:"Endoscopy of GI Tract",subtitle:null,reviewType:"peer-reviewed",abstract:"Endoscopy has had a major impact in the development of modern gastroenterology and other medical specialties. The field of endoscopic procedure has developed over the last decade. By using different data it provided a better understanding of pathogenic mechanisms, described new entities and used for early detection, diagnostic procedures and therapeutic procedures. The advantages of many technical advances and modern-endoscopic equipments, endoscopy has had a developed spectacularly. Furthermore, endoscopy has surpassed its function as an examination tool and it became a rapid and efficient therapeutic tool of low invasiveness. The efficacy and usefulness of endoscopy has yet been established.",isbn:null,printIsbn:"978-953-51-1034-7",pdfIsbn:"978-953-51-7113-3",doi:"10.5772/45916",price:139,priceEur:155,priceUsd:179,slug:"endoscopy-of-gi-tract",numberOfPages:360,isOpenForSubmission:!1,isInWos:1,isInBkci:!1,hash:"50a33613548058320a9bca38faaaa206",bookSignature:"Somchai Amornyotin",publishedDate:"March 13th 2013",coverURL:"https://cdn.intechopen.com/books/images_new/3262.jpg",numberOfDownloads:48343,numberOfWosCitations:9,numberOfCrossrefCitations:3,numberOfCrossrefCitationsByBook:1,numberOfDimensionsCitations:12,numberOfDimensionsCitationsByBook:1,hasAltmetrics:1,numberOfTotalCitations:24,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 11th 2012",dateEndSecondStepPublish:"May 2nd 2012",dateEndThirdStepPublish:"August 6th 2012",dateEndFourthStepPublish:"November 4th 2012",dateEndFifthStepPublish:"December 4th 2012",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6",editedByType:"Edited by",kuFlag:!1,featuredMarkup:null,editors:[{id:"185484",title:"Prof.",name:"Somchai",middleName:null,surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin",profilePictureURL:"https://mts.intechopen.com/storage/users/185484/images/system/185484.png",biography:"Dr. Somchai Amornyotin graduated from the Faculty of Medicine Siriraj Hospital, Mahidol University, Bangkok, Thailand, in 1989. He joined the staff of the Department of Anesthesiology, Faculty of Medicine Siriraj Hospital, Mahidol University, in 1996. In 2020, he became a professor in the Department of Anesthesiology, Faculty of Medicine Siriraj Hospital, Mahidol University. His first scientific paper was published in Thailand in 1999. He has practiced anesthesia since 2002. More than eighty of his research articles have been published in Thai and international medical journals. Dr. Amornyotin is a member of the Royal College of Anesthesiologists of Thailand, the Gastroenterological Association of Thailand, and many scientific societies. He is also a reviewer and editor for many international journals.",institutionString:"Siriraj Hospital",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"5",totalChapterViews:"0",totalEditedBooks:"4",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"1021",title:"Hepatology",slug:"gastroenterology-hepatology"}],chapters:[{id:"43529",title:"Pediatric Sedation Related to Endoscopy",doi:"10.5772/52536",slug:"pediatric-sedation-related-to-endoscopy",totalDownloads:1925,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Ludwik Grzegorz Stołtny, Urszula Grzybowska–Chlebowczyk, Halina Woś and Anna Agata Stołtny",downloadPdfUrl:"/chapter/pdf-download/43529",previewPdfUrl:"/chapter/pdf-preview/43529",authors:[{id:"158511",title:"Prof.",name:"Urszula",surname:"Grzybowska-Chlebowczyk",slug:"urszula-grzybowska-chlebowczyk",fullName:"Urszula Grzybowska-Chlebowczyk"},{id:"158606",title:"Dr.",name:"Ludwik",surname:"Stołtny",slug:"ludwik-stoltny",fullName:"Ludwik Stołtny"},{id:"160123",title:"Prof.",name:"Halina",surname:"Woś",slug:"halina-wos",fullName:"Halina Woś"},{id:"160135",title:"Dr.",name:"Anna",surname:"Stołtny",slug:"anna-stoltny",fullName:"Anna Stołtny"}],corrections:null},{id:"43531",title:"Cardiorespiratory Complications During Moderate and Deep Sedation for Gastrointestinal Endoscopic Procedures",doi:"10.5772/52737",slug:"cardiorespiratory-complications-during-moderate-and-deep-sedation-for-gastrointestinal-endoscopic-pr",totalDownloads:2279,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:1,abstract:null,signatures:"Somchai Amornyotin",downloadPdfUrl:"/chapter/pdf-download/43531",previewPdfUrl:"/chapter/pdf-preview/43531",authors:[{id:"185484",title:"Prof.",name:"Somchai",surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin"}],corrections:null},{id:"43548",title:"Pre–Endoscopy Screening of Helicobacter pylori Infection: Implication and Advantages",doi:"10.5772/52734",slug:"pre-endoscopy-screening-of-helicobacter-pylori-infection-implication-and-advantages",totalDownloads:1682,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Maria Teresa Mascellino, Alessandra Oliva and Barbara Porowska",downloadPdfUrl:"/chapter/pdf-download/43548",previewPdfUrl:"/chapter/pdf-preview/43548",authors:[{id:"156556",title:"Prof.",name:"Maria Teresa",surname:"Mascellino",slug:"maria-teresa-mascellino",fullName:"Maria Teresa Mascellino"},{id:"163141",title:"Dr.",name:"Alessandra",surname:"Oliva",slug:"alessandra-oliva",fullName:"Alessandra Oliva"},{id:"163142",title:"Dr.",name:"Barbara",surname:"Porowska",slug:"barbara-porowska",fullName:"Barbara Porowska"}],corrections:null},{id:"43598",title:"Diagnostic Endoscopy",doi:"10.5772/52826",slug:"diagnostic-endoscopy",totalDownloads:15013,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Akash Nabh, Muhammed Sherid, Charles Spurr and Subbaramia Sridhar",downloadPdfUrl:"/chapter/pdf-download/43598",previewPdfUrl:"/chapter/pdf-preview/43598",authors:[{id:"44472",title:"Dr.",name:"Muhammed",surname:"Sherid",slug:"muhammed-sherid",fullName:"Muhammed Sherid"},{id:"98998",title:"Dr.",name:"Akash",surname:"Nabh",slug:"akash-nabh",fullName:"Akash Nabh"}],corrections:null},{id:"43554",title:"Capsule Endoscopy: A New Era of Gastrointestinal Endoscopy",doi:"10.5772/52732",slug:"capsule-endoscopy-a-new-era-of-gastrointestinal-endoscopy",totalDownloads:2972,totalCrossrefCites:0,totalDimensionsCites:3,hasAltmetrics:1,abstract:null,signatures:"Uday C Ghoshal",downloadPdfUrl:"/chapter/pdf-download/43554",previewPdfUrl:"/chapter/pdf-preview/43554",authors:[{id:"154977",title:"Dr.",name:"Uday C",surname:"Ghoshal",slug:"uday-c-ghoshal",fullName:"Uday C Ghoshal"}],corrections:null},{id:"41917",title:"Diagnostic Value of Upper Gastrointestinal Endoscopy Prior to Cholecystectomy",doi:"10.5772/52520",slug:"diagnostic-value-of-upper-gastrointestinal-endoscopy-prior-to-cholecystectomy",totalDownloads:2043,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Waleed Al-Khyatt, Farhan Rashid and S.Y. Iftikhar",downloadPdfUrl:"/chapter/pdf-download/41917",previewPdfUrl:"/chapter/pdf-preview/41917",authors:[{id:"155113",title:"Dr.",name:"Waleed",surname:"Al-Khyatt",slug:"waleed-al-khyatt",fullName:"Waleed Al-Khyatt"},{id:"157500",title:"Dr.",name:"Farhan",surname:"Rashid",slug:"farhan-rashid",fullName:"Farhan Rashid"},{id:"157501",title:"Dr.",name:"S Y",surname:"Iftikhar",slug:"s-y-iftikhar",fullName:"S Y Iftikhar"}],corrections:null},{id:"43557",title:"Endoscopic Management of Oesophageal and Gastric Varices",doi:"10.5772/52524",slug:"endoscopic-management-of-oesophageal-and-gastric-varices",totalDownloads:3723,totalCrossrefCites:1,totalDimensionsCites:1,hasAltmetrics:0,abstract:null,signatures:"Neil Rajoriya and David A. Gorard",downloadPdfUrl:"/chapter/pdf-download/43557",previewPdfUrl:"/chapter/pdf-preview/43557",authors:[{id:"157297",title:"Dr.",name:"David",surname:"Gorard",slug:"david-gorard",fullName:"David Gorard"},{id:"162422",title:"Dr.",name:"Neil",surname:"Rajoriya",slug:"neil-rajoriya",fullName:"Neil Rajoriya"}],corrections:null},{id:"43561",title:"Diagnosis and Management of Barrett’s Esophagus with and Without Dysplasia",doi:"10.5772/52735",slug:"diagnosis-and-management-of-barrett-s-esophagus-with-and-without-dysplasia",totalDownloads:2151,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Borislav Vladimirov, Radina Ivanova and Ivan Terziev",downloadPdfUrl:"/chapter/pdf-download/43561",previewPdfUrl:"/chapter/pdf-preview/43561",authors:[{id:"59632",title:"Prof.",name:"Borislav",surname:"Vladimirov",slug:"borislav-vladimirov",fullName:"Borislav Vladimirov"},{id:"59633",title:"Prof.",name:"Radina",surname:"Ivanova",slug:"radina-ivanova",fullName:"Radina Ivanova"},{id:"157398",title:"Dr.",name:"Ivan",surname:"Terziev",slug:"ivan-terziev",fullName:"Ivan Terziev"}],corrections:null},{id:"43562",title:"Clinical Outcome of Endoscopic Submucosal Dissection for 352 Lesions of Superficial Gastric Neoplasms in 284 Patients",doi:"10.5772/52521",slug:"clinical-outcome-of-endoscopic-submucosal-dissection-for-352-lesions-of-superficial-gastric-neoplasm",totalDownloads:2158,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Yasutoshi Ochiai, Shin Arai, Masamitsu Nakao, Makoto Nishimura, Takashi Shono, Kouichi Nonaka, Osamu Togawa, Keiko Ishikawa and Hiroto Kita",downloadPdfUrl:"/chapter/pdf-download/43562",previewPdfUrl:"/chapter/pdf-preview/43562",authors:[{id:"47003",title:"Prof.",name:"Hiroto",surname:"Kita",slug:"hiroto-kita",fullName:"Hiroto Kita"},{id:"47008",title:"Dr.",name:"Makoto",surname:"Nishimura",slug:"makoto-nishimura",fullName:"Makoto Nishimura"},{id:"155528",title:"Dr.",name:"Yasutoshi",surname:"Ochiai",slug:"yasutoshi-ochiai",fullName:"Yasutoshi Ochiai"},{id:"156700",title:"Dr.",name:"Shin",surname:"Arai",slug:"shin-arai",fullName:"Shin Arai"},{id:"156701",title:"Dr.",name:"Keiko",surname:"Ishikawa",slug:"keiko-ishikawa",fullName:"Keiko Ishikawa"},{id:"156703",title:"Dr.",name:"Masamitsu",surname:"Nakao",slug:"masamitsu-nakao",fullName:"Masamitsu Nakao"},{id:"156704",title:"Dr.",name:"Osamu",surname:"Togawa",slug:"osamu-togawa",fullName:"Osamu Togawa"},{id:"156705",title:"Dr.",name:"Takashi",surname:"Shono",slug:"takashi-shono",fullName:"Takashi Shono"},{id:"156706",title:"Dr.",name:"Kouichi",surname:"Nonaka",slug:"kouichi-nonaka",fullName:"Kouichi Nonaka"}],corrections:null},{id:"43563",title:"The Current Role of Endoscopic Stenting in Upper Gastrointestinal Surgery",doi:"10.5772/52631",slug:"the-current-role-of-endoscopic-stenting-in-upper-gastrointestinal-surgery",totalDownloads:4098,totalCrossrefCites:0,totalDimensionsCites:1,hasAltmetrics:1,abstract:null,signatures:"Pok Eng Hong and Chin Kin Fah",downloadPdfUrl:"/chapter/pdf-download/43563",previewPdfUrl:"/chapter/pdf-preview/43563",authors:[{id:"46822",title:"Prof.",name:"Kin Fah",surname:"Chin",slug:"kin-fah-chin",fullName:"Kin Fah Chin"},{id:"159754",title:"Dr.",name:"Eng Hong",surname:"Pok",slug:"eng-hong-pok",fullName:"Eng Hong Pok"}],corrections:null},{id:"43565",title:"Ileoscopy; How and Why to Do It",doi:"10.5772/52628",slug:"ileoscopy-how-and-why-to-do-it",totalDownloads:2188,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Arjuna P. De Silva",downloadPdfUrl:"/chapter/pdf-download/43565",previewPdfUrl:"/chapter/pdf-preview/43565",authors:[{id:"45365",title:"Prof.",name:"Arjuna",surname:"De Silva",slug:"arjuna-de-silva",fullName:"Arjuna De Silva"}],corrections:null},{id:"43568",title:"Therapeutic and Diagnostic Approaches in Colonoscopy",doi:"10.5772/52733",slug:"therapeutic-and-diagnostic-approaches-in-colonoscopy",totalDownloads:3735,totalCrossrefCites:1,totalDimensionsCites:5,hasAltmetrics:0,abstract:null,signatures:"Naohisa Yoshida, Nobuaki Yagi, Yutaka Inada, Munehiro Kugai, Akio Yanagisawa and Yuji Naito",downloadPdfUrl:"/chapter/pdf-download/43568",previewPdfUrl:"/chapter/pdf-preview/43568",authors:[{id:"155746",title:"Dr.",name:"Naohisa",surname:"Yoshida",slug:"naohisa-yoshida",fullName:"Naohisa Yoshida"},{id:"157629",title:"Dr.",name:"Yuji",surname:"Naito",slug:"yuji-naito",fullName:"Yuji Naito"}],corrections:null},{id:"43573",title:"Peculiarities of Paediatric Digestive Endoscopy",doi:"10.5772/52523",slug:"peculiarities-of-paediatric-digestive-endoscopy",totalDownloads:1935,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,abstract:null,signatures:"Marco Gasparetto and Graziella Guariso",downloadPdfUrl:"/chapter/pdf-download/43573",previewPdfUrl:"/chapter/pdf-preview/43573",authors:[{id:"56467",title:"Prof.",name:"Graziella",surname:"Guariso",slug:"graziella-guariso",fullName:"Graziella Guariso"},{id:"62259",title:"M.D.",name:"Marco",surname:"Gasparetto",slug:"marco-gasparetto",fullName:"Marco Gasparetto"}],corrections:null},{id:"43588",title:"Liver Transplantation and Endoscopic Management of Bile Duct Complications",doi:"10.5772/52630",slug:"liver-transplantation-and-endoscopic-management-of-bile-duct-complications",totalDownloads:2443,totalCrossrefCites:1,totalDimensionsCites:2,hasAltmetrics:0,abstract:null,signatures:"Bassam Abu-Wasel, Paul D. Renfrew and Michele Molinari",downloadPdfUrl:"/chapter/pdf-download/43588",previewPdfUrl:"/chapter/pdf-preview/43588",authors:[{id:"48463",title:"Dr.",name:"Michele",surname:"Molinari",slug:"michele-molinari",fullName:"Michele Molinari"},{id:"48519",title:"Dr.",name:"Karim",surname:"Eltawil",slug:"karim-eltawil",fullName:"Karim Eltawil"},{id:"159865",title:"Dr.",name:"Bassam Abu",surname:"Wasel",slug:"bassam-abu-wasel",fullName:"Bassam Abu Wasel"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},subseries:null,tags:null},relatedBooks:[{type:"book",id:"4589",title:"Endoscopy",subtitle:"Innovative Uses and Emerging Technologies",isOpenForSubmission:!1,hash:"e467c9d3b3eed077845b12b390abbe13",slug:"endoscopy-innovative-uses-and-emerging-technologies",bookSignature:"Somchai Amornyotin",coverURL:"https://cdn.intechopen.com/books/images_new/4589.jpg",editedByType:"Edited by",editors:[{id:"185484",title:"Prof.",name:"Somchai",surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3522",title:"Endoscopy",subtitle:null,isOpenForSubmission:!1,hash:"0bbad83d557e69bac054dd09f16f2c5c",slug:"endoscopy",bookSignature:"Somchai Amornyotin",coverURL:"https://cdn.intechopen.com/books/images_new/3522.jpg",editedByType:"Edited by",editors:[{id:"185484",title:"Prof.",name:"Somchai",surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9515",title:"Update in Geriatrics",subtitle:null,isOpenForSubmission:!1,hash:"913e16c0ae977474b283bbd4269564c8",slug:"update-in-geriatrics",bookSignature:"Somchai Amornyotin",coverURL:"https://cdn.intechopen.com/books/images_new/9515.jpg",editedByType:"Edited by",editors:[{id:"185484",title:"Prof.",name:"Somchai",surname:"Amornyotin",slug:"somchai-amornyotin",fullName:"Somchai Amornyotin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1807",title:"New Advances in the Basic and Clinical Gastroenterology",subtitle:null,isOpenForSubmission:!1,hash:"a7ec52cb83e9fc2064e573afcfc87a71",slug:"new-advances-in-the-basic-and-clinical-gastroenterology",bookSignature:"Thomas Brzozowski",coverURL:"https://cdn.intechopen.com/books/images_new/1807.jpg",editedByType:"Edited by",editors:[{id:"35854",title:"Prof.",name:"Tomasz",surname:"Brzozowski",slug:"tomasz-brzozowski",fullName:"Tomasz Brzozowski"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"225",title:"Peptic Ulcer Disease",subtitle:null,isOpenForSubmission:!1,hash:"d739f4ee9bd8e8521a50ab44d67dd160",slug:"peptic-ulcer-disease",bookSignature:"Jianyuan Chai",coverURL:"https://cdn.intechopen.com/books/images_new/225.jpg",editedByType:"Edited by",editors:[{id:"28281",title:"Dr.",name:"Jianyuan",surname:"Chai",slug:"jianyuan-chai",fullName:"Jianyuan Chai"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1304",title:"New Techniques in Gastrointestinal Endoscopy",subtitle:null,isOpenForSubmission:!1,hash:"e108f32556a501bd10550b95901980b2",slug:"new-techniques-in-gastrointestinal-endoscopy",bookSignature:"Oliviu Pascu and Andrada Seicean",coverURL:"https://cdn.intechopen.com/books/images_new/1304.jpg",editedByType:"Edited by",editors:[{id:"62220",title:"Prof.",name:"Oliviu",surname:"Pascu",slug:"oliviu-pascu",fullName:"Oliviu Pascu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"351",title:"Gastritis and Gastric Cancer",subtitle:"New Insights in Gastroprotection, Diagnosis and Treatments",isOpenForSubmission:!1,hash:"ecadad30b73c5ffe72063ea31898fb3e",slug:"gastritis-and-gastric-cancer-new-insights-in-gastroprotection-diagnosis-and-treatments",bookSignature:"Paola Tonino",coverURL:"https://cdn.intechopen.com/books/images_new/351.jpg",editedByType:"Edited by",editors:[{id:"53066",title:"Dr.",name:"Paola",surname:"Tonino",slug:"paola-tonino",fullName:"Paola Tonino"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3839",title:"Trends in Helicobacter pylori Infection",subtitle:null,isOpenForSubmission:!1,hash:"3dc63cbee177c36f568ff67aa6ec1413",slug:"trends-in-helicobacter-pylori-infection",bookSignature:"Bruna Maria Roesler",coverURL:"https://cdn.intechopen.com/books/images_new/3839.jpg",editedByType:"Edited by",editors:[{id:"54995",title:"Dr.",name:"Bruna Maria",surname:"Roesler",slug:"bruna-maria-roesler",fullName:"Bruna Maria Roesler"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"831",title:"Liver Biopsy in Modern Medicine",subtitle:null,isOpenForSubmission:!1,hash:"7b41e87c701a255c1a5ef8c5a15a3a56",slug:"liver-biopsy-in-modern-medicine",bookSignature:"Yoshiaki Mizuguchi",coverURL:"https://cdn.intechopen.com/books/images_new/831.jpg",editedByType:"Edited by",editors:[{id:"62797",title:"Dr.",name:"Yoshiaki",surname:"Mizuguchi",slug:"yoshiaki-mizuguchi",fullName:"Yoshiaki Mizuguchi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"362",title:"Gastrointestinal Endoscopy",subtitle:null,isOpenForSubmission:!1,hash:"4e6190f9e88860fc52141066280ed132",slug:"gastrointestinal-endoscopy",bookSignature:"Oliviu Pascu",coverURL:"https://cdn.intechopen.com/books/images_new/362.jpg",editedByType:"Edited by",editors:[{id:"62220",title:"Prof.",name:"Oliviu",surname:"Pascu",slug:"oliviu-pascu",fullName:"Oliviu Pascu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"60025",slug:"erratum-metallothioneins-saccharomyces-cerevisiae-and-heavy-metals-a-biotechnology-triad-",title:"Erratum - Metallothioneins, Saccharomyces cerevisiae, and Heavy Metals: A Biotechnology Triad?",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/60025.pdf",downloadPdfUrl:"/chapter/pdf-download/60025",previewPdfUrl:"/chapter/pdf-preview/60025",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/60025",risUrl:"/chapter/ris/60025",chapter:{id:"56597",slug:"metallothioneins-saccharomyces-cerevisiae-and-heavy-metals-a-biotechnology-triad-",signatures:"Ileana Cornelia Farcasanu and Lavinia Liliana Ruta",dateSubmitted:"December 11th 2016",dateReviewed:"July 7th 2017",datePrePublished:null,datePublished:"December 13th 2017",book:{id:"6007",title:"Old Yeasts",subtitle:"New Questions",fullTitle:"Old Yeasts - New Questions",slug:"old-yeasts-new-questions",publishedDate:"December 13th 2017",bookSignature:"Candida Lucas and Celia Pais",coverURL:"https://cdn.intechopen.com/books/images_new/6007.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"95655",title:"Prof.",name:"Cândida",middleName:null,surname:"Lucas",slug:"candida-lucas",fullName:"Cândida Lucas"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"203734",title:"Dr.",name:"Ileana",middleName:"Cornelia",surname:"Farcasanu",fullName:"Ileana Farcasanu",slug:"ileana-farcasanu",email:"ileana.farcasanu@chimie.unibuc.ro",position:null,institution:{name:"University of Bucharest",institutionURL:null,country:{name:"Romania"}}},{id:"203865",title:"Dr.",name:"Lavinia",middleName:null,surname:"Ruta",fullName:"Lavinia Ruta",slug:"lavinia-ruta",email:"lavinia.ruta@chimie.unibuc.ro",position:null,institution:null}]}},chapter:{id:"56597",slug:"metallothioneins-saccharomyces-cerevisiae-and-heavy-metals-a-biotechnology-triad-",signatures:"Ileana Cornelia Farcasanu and Lavinia Liliana Ruta",dateSubmitted:"December 11th 2016",dateReviewed:"July 7th 2017",datePrePublished:null,datePublished:"December 13th 2017",book:{id:"6007",title:"Old Yeasts",subtitle:"New Questions",fullTitle:"Old Yeasts - New Questions",slug:"old-yeasts-new-questions",publishedDate:"December 13th 2017",bookSignature:"Candida Lucas and Celia Pais",coverURL:"https://cdn.intechopen.com/books/images_new/6007.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"95655",title:"Prof.",name:"Cândida",middleName:null,surname:"Lucas",slug:"candida-lucas",fullName:"Cândida Lucas"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"203734",title:"Dr.",name:"Ileana",middleName:"Cornelia",surname:"Farcasanu",fullName:"Ileana Farcasanu",slug:"ileana-farcasanu",email:"ileana.farcasanu@chimie.unibuc.ro",position:null,institution:{name:"University of Bucharest",institutionURL:null,country:{name:"Romania"}}},{id:"203865",title:"Dr.",name:"Lavinia",middleName:null,surname:"Ruta",fullName:"Lavinia Ruta",slug:"lavinia-ruta",email:"lavinia.ruta@chimie.unibuc.ro",position:null,institution:null}]},book:{id:"6007",title:"Old Yeasts",subtitle:"New Questions",fullTitle:"Old Yeasts - New Questions",slug:"old-yeasts-new-questions",publishedDate:"December 13th 2017",bookSignature:"Candida Lucas and Celia Pais",coverURL:"https://cdn.intechopen.com/books/images_new/6007.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"95655",title:"Prof.",name:"Cândida",middleName:null,surname:"Lucas",slug:"candida-lucas",fullName:"Cândida Lucas"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"4607",leadTitle:null,title:"Optoelectronics",subtitle:"Materials and Devices",reviewType:"peer-reviewed",abstract:"Optoelectronics Materials and Devices follows the Optoelectronics Books II and III published in 2011 and 2013, as part of the InTech collection of international works on optoelectronics. Accordingly, as with the first two books of the collection, this book covers recent achievements by specialists around the world. The growing number of countries participating in this endeavor as well as joint participation of the US and Moldova scientists in this edition testifies to the unifying effect of science. An interested reader will find in the book the description of properties and applications employing organic and inorganic materials, as well as the methods of fabrication and analysis of operation and regions of application of modern optoelectronic devices.",isbn:null,printIsbn:"978-953-51-2174-9",pdfIsbn:"978-953-51-6389-3",doi:"10.5772/59334",price:139,priceEur:155,priceUsd:179,slug:"optoelectronics-materials-and-devices",numberOfPages:496,isOpenForSubmission:!1,isSalesforceBook:!1,hash:"0e72724ec0d3faf1ec705cb92fa03c32",bookSignature:"Sergei L. Pyshkin and John Ballato",publishedDate:"October 7th 2015",coverURL:"https://cdn.intechopen.com/books/images_new/4607.jpg",keywords:null,numberOfDownloads:33320,numberOfWosCitations:1,numberOfCrossrefCitations:21,numberOfDimensionsCitations:33,numberOfTotalCitations:55,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"September 30th 2014",dateEndSecondStepPublish:"October 21st 2014",dateEndThirdStepPublish:"January 25th 2015",dateEndFourthStepPublish:"April 25th 2015",dateEndFifthStepPublish:"May 25th 2015",remainingDaysToSecondStep:"8 years",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:"Edited by",kuFlag:!1,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"43016",title:"Prof.",name:"Sergei",middleName:"L.",surname:"Pyshkin",slug:"sergei-pyshkin",fullName:"Sergei Pyshkin",profilePictureURL:"https://mts.intechopen.com/storage/users/43016/images/system/43016.jpeg",biography:"Dr.Sc. Prof. Sergei L. Pyshkin is Scientific Advisor of the Institute of Applied Physics, Academy of Sciences of Moldova, Adjunct Professor and Senior Fellow of Clemson University, SC, USA, member of The US Minerals, Metals & Materials Society (TMS), awarded the State Prize of Republic of Moldova for investigations in solid-state physics and microelectronics.\r\n\r\nThe works deal with non-linear optics (multi -quantum absorption), electron and phonon transport phenomena, photoconductivity and light scattering, luminescence, crystal and thin film growth, molecular beam and laser assisted epitaxies, nanotechnology, lasers for medicine, scientific instrument making (boxcar-integrators and solid-state IR matrix photoreceivers). \r\n\r\nBiography of Prof. Pyshkin is included into the Marquis 'Who’s Who in America” (2008-2013) and 'Who’s Who in the World” (2009-Present).",institutionString:"Institute of Applied Physics, Academy of Sciences of Moldova",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"5",totalChapterViews:"0",totalEditedBooks:"5",institution:{name:"Academy of Sciences of Moldova",institutionURL:null,country:{name:"Moldova"}}}],coeditorOne:{id:"48955",title:"Prof.",name:"John",middleName:null,surname:"Ballato",slug:"john-ballato",fullName:"John Ballato",profilePictureURL:"https://mts.intechopen.com/storage/users/48955/images/5411_n.jpg",biography:"Dr. John Ballato is a professor of materials science and engineering \n(MSE) at Clemson University where he also directs the Center for Optical Materials Science and Engineering Technologies (COMSET). He earned a B.S. in Ceramic Science and Engineering (1993) and the Ph.D. in Ceramic and Materials Engineering (1997) from Rutgers, The State University of New Jersey. \nDr. Ballato has published more than 250 archival scientific papers, holds 25 U.S. and foreign patents, has given in excess of 140 invited lectures/colloquia, and has co-organized 25 national and international conferences and symposia. Among other honors, he is a Fellow of the Optical Society of America (OSA), the International Society of Optical Engineering (SPIE), and the American Ceramic Society (ACerS).",institutionString:null,position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Clemson University",institutionURL:null,country:{name:"United States of America"}}},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"754",title:"Optical Engineering",slug:"optical-engineering"}],chapters:[{id:"48541",title:"Excitonic Crystal and Perfect Semiconductors for Optoelectronics",slug:"excitonic-crystal-and-perfect-semiconductors-for-optoelectronics",totalDownloads:1729,totalCrossrefCites:2,authors:[{id:"43016",title:"Prof.",name:"Sergei",surname:"Pyshkin",slug:"sergei-pyshkin",fullName:"Sergei Pyshkin"}]},{id:"48592",title:"Efficiency Droop in III-nitride LEDs",slug:"efficiency-droop-in-iii-nitride-leds",totalDownloads:1763,totalCrossrefCites:0,authors:[{id:"31275",title:"Prof.",name:"Meichun",surname:"Huang",slug:"meichun-huang",fullName:"Meichun Huang"},{id:"174545",title:"Dr.",name:"Jie",surname:"Zhang",slug:"jie-zhang",fullName:"Jie Zhang"},{id:"174546",title:"Dr.",name:"Dongyan",surname:"Zhang",slug:"dongyan-zhang",fullName:"Dongyan Zhang"},{id:"174547",title:"Dr.",name:"Daqian",surname:"Ye",slug:"daqian-ye",fullName:"Daqian Ye"},{id:"174548",title:"Dr.",name:"Chenke",surname:"Xu",slug:"chenke-xu",fullName:"Chenke Xu"}]},{id:"48506",title:"Colorless and Transparent high – Temperature-Resistant Polymer Optical Films – Current Status and Potential Applications in Optoelectronic Fabrications",slug:"colorless-and-transparent-high-temperature-resistant-polymer-optical-films-current-status-and-potent",totalDownloads:5281,totalCrossrefCites:8,authors:[{id:"102312",title:"Prof.",name:"Shiyong",surname:"Yang",slug:"shiyong-yang",fullName:"Shiyong Yang"},{id:"153340",title:"Dr.",name:"Jin-Gang",surname:"Liu",slug:"jin-gang-liu",fullName:"Jin-Gang Liu"},{id:"173426",title:"Dr.",name:"Hong-Jiang",surname:"Ni",slug:"hong-jiang-ni",fullName:"Hong-Jiang Ni"},{id:"173427",title:"Dr.",name:"Wei-Feng",surname:"Zhou",slug:"wei-feng-zhou",fullName:"Wei-Feng Zhou"},{id:"175466",title:"MSc.",name:"Zhen-He",surname:"Wang",slug:"zhen-he-wang",fullName:"Zhen-He Wang"}]},{id:"48441",title:"InP-Based Antimony-Free MQW Lasers in 2-3 μm Band",slug:"inp-based-antimony-free-mqw-lasers-in-2-3-m-band",totalDownloads:1737,totalCrossrefCites:0,authors:[{id:"16260",title:"Prof.",name:"Yong-Gang",surname:"Zhang",slug:"yong-gang-zhang",fullName:"Yong-Gang Zhang"},{id:"16262",title:"Prof.",name:"Yi",surname:"Gu",slug:"yi-gu",fullName:"Yi Gu"}]},{id:"48769",title:"Dye-Sensitized Solar Cells with Graphene Electron Extraction Layer",slug:"dye-sensitized-solar-cells-with-graphene-electron-extraction-layer",totalDownloads:1938,totalCrossrefCites:1,authors:[{id:"151925",title:"Prof.",name:"Lung-Chien",surname:"Chen",slug:"lung-chien-chen",fullName:"Lung-Chien Chen"}]},{id:"48477",title:"Long Wavelength VCSELs and VCSEL-Based Processing of Microwave Signals",slug:"long-wavelength-vcsels-and-vcsel-based-processing-of-microwave-signals",totalDownloads:2318,totalCrossrefCites:6,authors:[{id:"101486",title:"Prof.",name:"Mikhail E.",surname:"Belkin",slug:"mikhail-e.-belkin",fullName:"Mikhail E. Belkin"},{id:"175835",title:"Prof.",name:"Alexander S.",surname:"Sigov",slug:"alexander-s.-sigov",fullName:"Alexander S. Sigov"},{id:"175836",title:"Dr.",name:"Leonid",surname:"Belkin",slug:"leonid-belkin",fullName:"Leonid Belkin"},{id:"175837",title:"Dr.",name:"Alexey",surname:"Loparev",slug:"alexey-loparev",fullName:"Alexey Loparev"},{id:"176235",title:"Dr.",name:"Vladimir",surname:"Iakovlev",slug:"vladimir-iakovlev",fullName:"Vladimir Iakovlev"}]},{id:"48925",title:"Determination of the Bulk and Local Diffusion-Length Values of Charge Carriers in MCT Films and in the Absorber Layers of MCT-Based Photovoltaic IR FPA Detectors",slug:"determination-of-the-bulk-and-local-diffusion-length-values-of-charge-carriers-in-mct-films-and-in-t",totalDownloads:1661,totalCrossrefCites:1,authors:[{id:"96745",title:"Dr.",name:"Vladimir",surname:"Vasilyev",slug:"vladimir-vasilyev",fullName:"Vladimir Vasilyev"},{id:"96746",title:"Dr.",name:"Sergey",surname:"Dvoretsky",slug:"sergey-dvoretsky",fullName:"Sergey Dvoretsky"},{id:"173797",title:"Mr.",name:"Aleksandr",surname:"Predein",slug:"aleksandr-predein",fullName:"Aleksandr Predein"},{id:"174253",title:"Dr.",name:"Victor",surname:"Stuchinsky",slug:"victor-stuchinsky",fullName:"Victor Stuchinsky"},{id:"174254",title:"Dr.",name:"Alexei",surname:"Vishnyakov",slug:"alexei-vishnyakov",fullName:"Alexei Vishnyakov"},{id:"174255",title:"Dr.",name:"Dmitry",surname:"Brunev",slug:"dmitry-brunev",fullName:"Dmitry Brunev"},{id:"174256",title:"Dr.",name:"Alexei",surname:"Zverev",slug:"alexei-zverev",fullName:"Alexei Zverev"}]},{id:"48504",title:"Polymer Micro/Nanofibre Waveguides for Optical Sensing Applications",slug:"polymer-micro-nanofibre-waveguides-for-optical-sensing-applications",totalDownloads:1588,totalCrossrefCites:0,authors:[{id:"173809",title:"Dr.",name:"Fuxing",surname:"Gu",slug:"fuxing-gu",fullName:"Fuxing Gu"}]},{id:"48885",title:"High-Speed Single-Photon Detection with Avalanche Photodiodes in the Near Infrared",slug:"high-speed-single-photon-detection-with-avalanche-photodiodes-in-the-near-infrared",totalDownloads:1911,totalCrossrefCites:2,authors:[{id:"14193",title:"Prof.",name:"Heping",surname:"Zeng",slug:"heping-zeng",fullName:"Heping Zeng"},{id:"173852",title:"Dr.",name:"Yan",surname:"Liang",slug:"yan-liang",fullName:"Yan Liang"}]},{id:"48862",title:"Organic Semiconductors for Non-Linear Optical Applications",slug:"organic-semiconductors-for-non-linear-optical-applications",totalDownloads:1576,totalCrossrefCites:1,authors:[{id:"21373",title:"Dr.",name:"Anca",surname:"Stanculescu",slug:"anca-stanculescu",fullName:"Anca Stanculescu"},{id:"21611",title:"Dr.",name:"Florin",surname:"Stanculescu",slug:"florin-stanculescu",fullName:"Florin Stanculescu"}]},{id:"48755",title:"Physical Characteristics, Sensors and Applications of 2D/3DIntegrated CMOS Photodiodes",slug:"physical-characteristics-sensors-and-applications-of-2d-3dintegrated-cmos-photodiodes",totalDownloads:1665,totalCrossrefCites:0,authors:[{id:"20047",title:"Dr.",name:"Oscal T.C.",surname:"Chen",slug:"oscal-t.c.-chen",fullName:"Oscal T.C. Chen"},{id:"173891",title:"Dr.",name:"Wei-Jean",surname:"Liu",slug:"wei-jean-liu",fullName:"Wei-Jean Liu"}]},{id:"49081",title:"The Theory of Giant Splash of Photoresponse in Semiconductors at Low-Level Illumination with Increasing Concentration of Deep Recombination Impurity",slug:"the-theory-of-giant-splash-of-photoresponse-in-semiconductors-at-low-level-illumination-with-increas",totalDownloads:1097,totalCrossrefCites:0,authors:[{id:"16374",title:"Dr.",name:"Mikhail",surname:"Nikitin",slug:"mikhail-nikitin",fullName:"Mikhail Nikitin"},{id:"151470",title:"Prof.",name:"Viacheslav",surname:"Kholodnov",slug:"viacheslav-kholodnov",fullName:"Viacheslav Kholodnov"}]},{id:"49049",title:"Optoelectronic Biomedical Systems for Noninvasive Treatment and Control with Informated Support in Solutions",slug:"optoelectronic-biomedical-systems-for-noninvasive-treatment-and-control-with-informated-support-in-s",totalDownloads:1491,totalCrossrefCites:0,authors:[{id:"173339",title:"Prof.",name:"Oleksandr",surname:"Kozhukhar",slug:"oleksandr-kozhukhar",fullName:"Oleksandr Kozhukhar"},{id:"175507",title:"Dr.",name:"Hryhoriy",surname:"Barylo",slug:"hryhoriy-barylo",fullName:"Hryhoriy Barylo"},{id:"175508",title:"Dr.",name:"Mariya",surname:"Ivakh",slug:"mariya-ivakh",fullName:"Mariya Ivakh"},{id:"175509",title:"Prof.",name:"Zenon",surname:"Gotra",slug:"zenon-gotra",fullName:"Zenon Gotra"},{id:"175510",title:"MSc.",name:"Ivanna",surname:"Makara",slug:"ivanna-makara",fullName:"Ivanna Makara"},{id:"175511",title:"BSc.",name:"Volodymyr",surname:"Virt",slug:"volodymyr-virt",fullName:"Volodymyr Virt"}]},{id:"48509",title:"A New FPN Cancellation Circuit for Time-Domain CMOS Image Sensors",slug:"a-new-fpn-cancellation-circuit-for-time-domain-cmos-image-sensors",totalDownloads:1417,totalCrossrefCites:0,authors:[{id:"39440",title:"Dr.",name:"Fernando",surname:"de Souza Campos",slug:"fernando-de-souza-campos",fullName:"Fernando de Souza Campos"},{id:"152326",title:"Dr.",name:"José Alfredo",surname:"Covolan Ulson",slug:"jose-alfredo-covolan-ulson",fullName:"José Alfredo Covolan Ulson"},{id:"152327",title:"Dr.",name:"José Eduardo",surname:"Cogo Castanho",slug:"jose-eduardo-cogo-castanho",fullName:"José Eduardo Cogo Castanho"},{id:"174758",title:"Prof.",name:"Rudolf",surname:"Riehl",slug:"rudolf-riehl",fullName:"Rudolf Riehl"},{id:"175721",title:"MSc.",name:"Bruno",surname:"Albuquerque De Castro",slug:"bruno-albuquerque-de-castro",fullName:"Bruno Albuquerque De Castro"}]},{id:"48740",title:"All-Optical Waveguide-Type Switch Using Saturable Absorption in Graphene",slug:"all-optical-waveguide-type-switch-using-saturable-absorption-in-graphene",totalDownloads:1431,totalCrossrefCites:0,authors:[{id:"173350",title:"Prof.",name:"Nobuo",surname:"Goto",slug:"nobuo-goto",fullName:"Nobuo Goto"},{id:"173351",title:"Ms.",name:"Misaki",surname:"Takahashi",slug:"misaki-takahashi",fullName:"Misaki Takahashi"},{id:"173352",title:"Dr.",name:"Hiroki",surname:"Kishikawa",slug:"hiroki-kishikawa",fullName:"Hiroki Kishikawa"},{id:"173353",title:"Dr.",name:"Shin-Ichiro",surname:"Yanagiya",slug:"shin-ichiro-yanagiya",fullName:"Shin-Ichiro Yanagiya"}]},{id:"48886",title:"Novel Floating and Auto-stereoscopic Display with IRLED Sensors Interactive Virtual Touch System",slug:"novel-floating-and-auto-stereoscopic-display-with-irled-sensors-interactive-virtual-touch-system",totalDownloads:1301,totalCrossrefCites:0,authors:[{id:"174400",title:"Prof.",name:"Jian-Chiun",surname:"Liou",slug:"jian-chiun-liou",fullName:"Jian-Chiun Liou"}]},{id:"49130",title:"OFDM and SC-FDMA over Fiber Using Directly Modulated VCSELs",slug:"ofdm-and-sc-fdma-over-fiber-using-directly-modulated-vcsels",totalDownloads:1593,totalCrossrefCites:0,authors:[{id:"50122",title:"Prof.",name:"Henrique",surname:"Salgado",slug:"henrique-salgado",fullName:"Henrique Salgado"},{id:"148907",title:"Dr.",name:"Luís",surname:"Pessoa",slug:"luis-pessoa",fullName:"Luís Pessoa"},{id:"173873",title:"M.Sc.",name:"Rúben",surname:"Neto",slug:"ruben-neto",fullName:"Rúben Neto"},{id:"174024",title:"MSc.",name:"Pedro",surname:"Batista",slug:"pedro-batista",fullName:"Pedro Batista"}]},{id:"49261",title:"The Digital Silicon Photomultiplier",slug:"the-digital-silicon-photomultiplier",totalDownloads:1824,totalCrossrefCites:0,authors:[{id:"4324",title:"Prof.",name:"Valeri",surname:"Saveliev",slug:"valeri-saveliev",fullName:"Valeri Saveliev"},{id:"150171",title:"Prof.",name:"Nicola",surname:"D'Ascenzo",slug:"nicola-d'ascenzo",fullName:"Nicola D'Ascenzo"},{id:"173909",title:"Dr.",name:"Qingguo",surname:"Xie",slug:"qingguo-xie",fullName:"Qingguo Xie"},{id:"173910",title:"Mr.",name:"Lin",surname:"Wang",slug:"lin-wang",fullName:"Lin Wang"}]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"9699",firstName:"Iva",lastName:"Lipović",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/9699/images/4740_n.png",email:"iva.l@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"3166",title:"Optoelectronics",subtitle:"Advanced Materials and Devices",isOpenForSubmission:!1,hash:"b7263978cf34e637a4b9592eb4975f3e",slug:"optoelectronics-advanced-materials-and-devices",bookSignature:"Sergei L. Pyshkin and John M. Ballato",coverURL:"https://cdn.intechopen.com/books/images_new/3166.jpg",editedByType:"Edited by",editors:[{id:"43016",title:"Prof.",name:"Sergei",surname:"Pyshkin",slug:"sergei-pyshkin",fullName:"Sergei Pyshkin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5709",title:"Optoelectronics",subtitle:"Advanced Device Structures",isOpenForSubmission:!1,hash:"8b81ee1079b92050f9664d3ee61dfa39",slug:"optoelectronics-advanced-device-structures",bookSignature:"Sergei L. Pyshkin and John Ballato",coverURL:"https://cdn.intechopen.com/books/images_new/5709.jpg",editedByType:"Edited by",editors:[{id:"43016",title:"Prof.",name:"Sergei",surname:"Pyshkin",slug:"sergei-pyshkin",fullName:"Sergei Pyshkin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5950",title:"Excitons",subtitle:null,isOpenForSubmission:!1,hash:"498d440aeb659aab54ba2c6ddd83b482",slug:"excitons",bookSignature:"Sergei L. Pyshkin",coverURL:"https://cdn.intechopen.com/books/images_new/5950.jpg",editedByType:"Edited by",editors:[{id:"43016",title:"Prof.",name:"Sergei",surname:"Pyshkin",slug:"sergei-pyshkin",fullName:"Sergei Pyshkin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8527",title:"Luminescence",subtitle:"OLED Technology and Applications",isOpenForSubmission:!1,hash:"dbdf51e72104f9e570cc0f1ea6c02a9e",slug:"luminescence-oled-technology-and-applications",bookSignature:"Sergei Pyshkin",coverURL:"https://cdn.intechopen.com/books/images_new/8527.jpg",editedByType:"Edited by",editors:[{id:"43016",title:"Prof.",name:"Sergei",surname:"Pyshkin",slug:"sergei-pyshkin",fullName:"Sergei Pyshkin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"55",title:"Advances in Photodiodes",subtitle:null,isOpenForSubmission:!1,hash:"6cdd5e9ee86489b07d6841bf4e4a2eb7",slug:"advances-in-photodiodes",bookSignature:"Gian Franco Dalla Betta",coverURL:"https://cdn.intechopen.com/books/images_new/55.jpg",editedByType:"Edited by",editors:[{id:"19896",title:"Dr.",name:"Gian-Franco",surname:"Dalla Betta",slug:"gian-franco-dalla-betta",fullName:"Gian-Franco Dalla Betta"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2019",title:"Selected Topics on Optical Fiber Technology",subtitle:null,isOpenForSubmission:!1,hash:"673335af161795cf490bbb2abc822f0e",slug:"selected-topics-on-optical-fiber-technology",bookSignature:"Moh. Yasin, Sulaiman W. Harun and Hamzah Arof",coverURL:"https://cdn.intechopen.com/books/images_new/2019.jpg",editedByType:"Edited by",editors:[{id:"294347",title:"Dr.",name:"Moh",surname:"Yasin",slug:"moh-yasin",fullName:"Moh Yasin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"870",title:"Fiber Optic Sensors",subtitle:null,isOpenForSubmission:!1,hash:"b41e258dba019293f00f1b15fcfa1725",slug:"fiber-optic-sensors",bookSignature:"Moh. Yasin, Sulaiman W. Harun and Hamzah Arof",coverURL:"https://cdn.intechopen.com/books/images_new/870.jpg",editedByType:"Edited by",editors:[{id:"294347",title:"Dr.",name:"Moh",surname:"Yasin",slug:"moh-yasin",fullName:"Moh Yasin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"101",title:"Laser Scanning",subtitle:"Theory and Applications",isOpenForSubmission:!1,hash:"0783fa6ba010daf9b1a6f056339f3588",slug:"laser-scanning-theory-and-applications",bookSignature:"Chau-Chang Wang",coverURL:"https://cdn.intechopen.com/books/images_new/101.jpg",editedByType:"Edited by",editors:[{id:"21919",title:"Prof.",name:"Chau-Chang",surname:"Wang",slug:"chau-chang-wang",fullName:"Chau-Chang Wang"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3360",title:"Current Developments in Optical Fiber Technology",subtitle:null,isOpenForSubmission:!1,hash:"834b9a9593a62b116d2101815fd94dd3",slug:"current-developments-in-optical-fiber-technology",bookSignature:"Sulaiman Wadi Harun and Hamzah Arof",coverURL:"https://cdn.intechopen.com/books/images_new/3360.jpg",editedByType:"Edited by",editors:[{id:"17617",title:"Dr.",name:"Sulaiman Wadi",surname:"Harun",slug:"sulaiman-wadi-harun",fullName:"Sulaiman Wadi Harun"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"77974",title:"DMAPT: Study of Data Mining and Machine Learning Techniques in Advanced Persistent Threat Attribution and Detection",doi:"10.5772/intechopen.99291",slug:"dmapt-study-of-data-mining-and-machine-learning-techniques-in-advanced-persistent-threat-attribution",body:'
Recent advances in the design of sophisticated malware tools are posing a significant challenge not only to the global IT industry but also to the banking and security organisations. Advanced Persistent Threat (APT) is a key player in highly targeted and sophisticated state-sponsored attacks [1]. These APT groups design and deploy malware in a unique way depending on the target. After selecting the targeted organisation, they come with different Tools, Techniques and Procedures (TTP) to bypass the traditional line of defences (intrusion detection systems or firewall). Once they get access, these APT groups stay inside targeted networks for a long time to observe the workflows. These APT groups use intelligent multi-stage malware deployment techniques to stay low under the radar for a long time [2]. Finally, gathered sensitive information is pushed in small chunks to its external control and command servers (C2C) using some clever exfiltration techniques.
The whole process of the APT life cycle is broadly divided into seven different phases as shown in Figure 1 [3]. In the Reconnaissance phase, the attacker chooses the target network and studies the internal network structure and comes up with the necessary strategy, TTP, to bypass the initial layer of defence. Reconnaissance is followed by the Initial compromise phase, where attackers exploit open vulnerabilities to get an initial foothold into the targeted network. After that, the attackers try to replicate and propagate into another machine and establishes backdoors to pull more sophisticated payloads in Establishing foothold phase. Later in the Lateral movement phase, attackers escalate various privileges to perform more sophisticated tasks to hide its traces. In this particular phase, attackers traverse from one network to another network in search of sensitive information. After collecting the necessary data, the attackers strategically centralises this collected data to staging servers. In the data exfiltration phase, attackers use different custom encoding and encryption mechanisms to push these collected data to external control and command servers. Finally, to preserve the anonymity of the process, attacker leaves no traces by clearing the tracks and creates a backdoor to revisit that particular organisation in the future.
APT life cycle phases.
APT has grown to become a global tool for cyber warfare between countries. Carbanak APT campaign infected thousands of people worldwide and caused nearly $1 billion damage across the globe [4]. APT actors carried out a variety of actions in this operation, including opening fraudulent accounts and employing bogus services to obtain funds, as well as sending money to cybercriminals via the SWIFT (Society for Worldwide Interbank Financial Telecommunication) network. Similarly, in 2018, Big Bang APT developed a much more robust and sophisticated multi-stage malware targeting the Palestinian Authority [5]. This APT malware includes several modules that perform tasks ranging from obtaining a file list, capturing screenshots, rebooting the machine, retrieving system information, and self-deletion. More recently, a supply chain attack on solar winds by the Russian APT group was considered one of the sophisticated attacks. RefreshInternals() method in solar winds attack depict the maturity of these state-sponsored APT groups in terms of malware design and payload delivery [6].
In order to deal with these kinds of state-sponsored targeted attacks, security experts consider APT attribution and detection as two key pillars. Attribution is an analysis process that explains about “who” is behind particular cyber espionage and “why” they have done it [7]. This process gives insights about particular APT threat actors and their targeted areas as well. Based on this preliminary information, the security community try to detect these attacks by fixing issues at different levels of an organisation. Since APT attribution and detection became crucial for many security firms/govt agencies, both these processes require massive data pre-processing and analysis. To address these issues, researchers propose different data mining and machine learning techniques in both attribution and detection as well. In this paper, we discuss various data mining and machine learning techniques in both detection and attribution of APT malware. In addition to this, we compare different detection techniques, and we highlight research gaps among those techniques which need to be addressed by the security community to combat this sophisticated APT malware.
This paper is organised as follows. Section 1. details APT overview and phases of APT, followed by the need for data mining and ML techniques in both attribution and detection of APT malware. Section 2. talks about the process of attribution and different techniques proposed to perform APT attribution. Section 3. discuss about various state of the art data mining and ML techniques proposed by the research community in APT detection. Section 4. details research gap analysis followed by conclusion and future scope.
APT attribution is an analysis process that reveals the identity of the threat actors and their motto through a series of steps [8]. First, security firms collect data from different victim organisations by performing forensic analysis on the respective networks and collect different Indicators of Compromise (IOC). In general, attackers repeat this pattern in several other organisations as well. Security firms observe and analyse these repeated patterns in IOC and TTP’s together, and cluster these combinations as intrusion sets. Performing data analytics on these intrusion sets over a period will eventually reveal the threat actor and motivation behind the attack as depicted in Figure 2, respectively.
Overview of APT attribution process.
APT attribution is quite a challenging task to the security community because of various reasons. Majorly, State-sponsored APTs are developed in the supervision of different units and equipped with default Anti-VM and Anti-Debugging techniques to obfuscate the payloads. This technique makes feature extraction extremely challenging to most security firms. In addition to this, APT malware samples are highly targeted so that very few samples will be available for analysis purposes. In order to address this issue, Rosenberg et al. proposed a technique for APT attribution by using a Deep Neural Network (DNN) classifier [9]. In this research work, the authors used 3200 malware samples for training DNN classifiers, 400 samples for validation and 1000 samples for testing the model. All the APT malware samples are executed in a cuckoo sandbox environment, and generated reports are used as raw input in training the classifier. DNN is effective in learning high-level features on its own from raw inputs. In order to train DNN models more effectively, in this work, the authors removed top 50,000 frequent words from input features of all cuckoo reports. So, DNN models take very uncommon words from all cuckoo reports and build a much more effective model to perform APT attribution. This DNN architecture is a 10-layer, fully connected network (50,0000 neurons at the input layer and 2,000 in the first hidden layer) with a ReLU activation function. The final trained APT attribution model did decent work on test data with 98.6% accuracy. Added to this, the authors also applied transfer learning on trained DNN models by removing and retraining top layer neurons. After applying transfer learning, the model still performs exceptionally well with 97.8% accuracy. From the t-distributed stochastic neighbour embedding algorithm (used to reduce from 500 dimension space to 2 dimension space), we can see that the trained model could separate different APT malware groups as shown in Figure 3, respectively.
2-dimensional visualisation of APT families using t-SNE algorithm [
Most APT attribution techniques heavily rely on performing analysis for malware samples used in that particular campaign. The key disadvantage of this strategy is that the same malware samples can be used in several operations. In some situations, APT groups specifically buy malware from the dark web based on their requirements. So, the ML models constructed by only considering malware samples may not give efficient results in terms of APT attribution. In order to address this issue, Lior Perry et al. proposed a method named NO-DOUBT, i.e. Novel Document Based Attribution, by constructing models on threat intelligence reports with the help of Natural Language Processing (NLP) techniques [10]. In this research, the authors collected 249 threat intelligence reports of 12 different APT actors and considered APT attack attribution as a multi-text classification problem. The proposed model consists of mainly two phases, as shown in Figure 4. In the training phase, labelled reports and word embeddings transform the input data to a vector representation. For generating this vector representation, authors propose SMOBI (Smoothed Binary Vector) algorithm, which will find cosine similarities between input words in labelled data sets and word embeddings to form a huge n
NO-DOUBT method for APT attribution [
Most of the APT attribution processes depend upon the manual analysis in victim networks and collecting low-level indicators of compromise (forensic analysis at firewalls, tracebacks, IDS and Honeypots). However, APT actors change this low-level IOC from one organisation to another organisation. ML models built based on this low-level IOC, results in inadequate cyber intelligence systems. On the other hand, collecting high-level IOC’s for each organisation is time-consuming. Such high-level IOC’s are published in the form of Cyber Threat Intelligence (CTI) reports across the organisations as a common practice. In 2019, Umara Noor et al. proposed a distributional semantic technique of NLP to build a cyber threat attribution framework by extracting patterns from CTI reports [11]. The proposed attribution framework is broadly divided into three phases, as depicted in Figure 5. In this experiment, authors used a customised search engine to collect 327 unstructured CTI documents corresponding to 36 APT actors as a part of data collection phase. The CTI documents do not contain the exact keyword described in the standard taxonomy due to varying textual definitions and choices for communicating a concept. Rather than using a simple keyword-based search, the authors developed a semantic search method based on the statistical distributional semantic relevance technique (LSA), to retrieve relevant documents. The input CTI records are indexed using LSA. The statistically derived conceptual indices (from LSA indexer) are searched for semantically relevant topics using the high-level IOC labels specified in MITRE ATT&CK [11]. Based on cosine similarity, the CTA-TTP correlation matrix is constructed in the CTI analytics phase. ML models are built on top of the CTA-TTP correlation matrix in the Cyber Threat Attribution phase. Among various classifiers, the Deep Neural Network turned out to be the best performer with 94% attribution accuracy on test data with high precision and recall values.
Cyber threat attribution framework [
Behavioural analysis of APT malware gives better insights on both APT attribution and detection. Based on this motivation, Weijie Han et al. proposed that, dynamic system call information reveals behavioural characteristics of APT malware [12]. Furthermore, the authors built an ontology model to understand in-depth relation between the maliciousness of APT malware to its families, as depicted in Figure 6, respectively. APTMalInsight framework mainly consists of two modules i.e. APT malware family classification module and detection module. The basic concept behind the APTMalInsight framework is to profile the behavioural characteristics of APT malware. It obtains dynamic system call information from the programs to reliably detect and attribute APT malware to their respective families. Primarily, APT malware samples are executed to extract dynamic API calls. After extracting API calls, authors calculated the feature importance of each API call and built a feature vector by selecting top N-API calls from the API call sequence. ML models built on top of that feature vector will output the APT attribution class for test data, as shown in Figure 7. For the experiment, authors considered a total of 864 APT malware samples belonging to five different families. As per the experimentation results, Random Forest turned out to be the best model in terms of Accuracy(98%), Precision and Recall for APT malware family attribution.
APT malware ontology model [
High-level overview of APTMalInsight framework [
Security firms like FireEye investigate many victim networks and collect IOC and group them together as uncategorised (“UNC”) intrusion sets. Over time, this type of UNC sets are increasing rapidly, and security firms need to either merge these other APT groups or assign a new group name based on manual analysis. FireEye security researchers proposed an automated framework with the help of ML models to perform investigation, analysis, and rationale for the whole APT attribution process [13]. In this framework, the researchers suggest a document clustering approach using term frequency and - inverse document frequency method (TF-IDF). The TF-IDF algorithm assigns more importance to a term if the word often appears in the document. Similarly, if the term appears common across all the documents, the algorithm decreases its importance. This method favours unique terms like custom malware families, which may appear in just a few classes, and downplays popular terms like ‘phishing’, which appear more often. After calculating scores using the TF-IDF algorithm, each UNC group is converted into a vector representation, and researchers calculate cosine similarity between these APT groups as shown in Figure 8, respectively. As angle between the two vectors decreases, they tend to become parallel. The decrease in the angle helps the researchers to determine the extent of similarity between two different APT groups. Based on this idea, FireEye automated the whole process of APT attribution and merging different uncategorised groups.
Cosine similarity between different un-attributed APT groups [
Most of the APT families stay undetected for a long period and use intelligent ways to damage the vulnerable hosts. When a traditional malware executes, most of the events occur sequentially and leave some traces behind. These traces help modern-day intelligent systems like SIEM, IDS, IPS to prevent these attacks. But, when it comes to the case of APTs, they clean the attack traces and also prevent sequence execution of events. Also, APT employs Anti-VM and Anti-debugging techniques for making things harder for the detection systems. The hardness in detecting the APT has made the cyber security enthusiasts draw their attention towards this domain. Some of the important contributions in the research area are mentioned below. A detailed comparison among different detection techniques are illustrated in Table 1, respectively.
Research item | DM/ML technique employed in APT detection | Input data | Novelty |
---|---|---|---|
[14] | RNN-LSTM and GHSOM | Network Traffic Flow | Deep learning stack with sequential neural networks to detect APT. |
[15] | Provenance Graph Mining | Host Audit Data (Linux audit or Windows ETW) | Suspicious information flows are identified using MITRE ATT&CK framework. |
[16] | Directed Graph Mining and One Class SVM | SIEM Event Logs | Extracting attack vectors from SIEM logs |
[17] | Continuous Association Rule Mining Algorithm (CRAMA) | IDS Logs | Identify correlation rules between various system events to develop an APT attack graph |
[18] | RNN-LSTM | SIEM Event Logs | Identify possible event codes and their sequence to detect an APT attack in realtime |
[19] | Ensemble Classifier | Network Traffic Flow | Separate threat detection sub-module for APT life cycle phases. |
[20] | Multi fractal based error minimization | Network Traffic Flow | Multi fractal analysis to extract the hidden information of TCP connections. |
[21] | Correlation Analysis | Multiple data sources | Construction of Attack Pyramid using multiple planes to detect APT |
[22] | J48 Classifier | API log data | API calls to track process injection and privilege escalation activities. |
[23] | Ensemble Classifier | Domain Names (Alexa and data.netlab.360) | Identify malicious C2C communication using lexical features of domain names |
[24] | Ensemble Classifier | Domain Names (Alexa and DGArchive) | Identify malicious C2C communication using lexical, network features of domain names |
Comparison of different APT detection methods.
Tero et al. [14] proposed a theoretical approach for detecting APT by developing a stack of Deep Learning methods where each layer has a particular task in handling APT events. The authors consider network payload and packet header information as features, and they streamlined the input to the detection stack without any data filtering mechanism. The detection stack is designed sequentially. The initial layers, i.e. layer-1 and layer-2, are used to detect the known attacks and legitimate network traffic from the data flow respectively. Layer-3 of the detection stack employs in identifying the outliers having historical presence. It uses Recurrent Neural Network-Long Short Term Memory (RNN-LSTM) units to confirm whether an outlier has historical occurrence. Layer-4 helps to classify the outliers into four categories, i.e. regular traffic, known attack, predicted attack and unknown outlier using an anomaly detection method named Growing Hierarchical Self-Organising Map (GHSOM). The stack’s final layer helps to map the anomalies (i.e. interconnections between the outlier events) using a Graph Database (GDB). The proposed stack model is highly modular and was designed to perform dynamic detection of APT events with a decent detection accuracy. However, this detection system is complex in design and result in higher time complexity when dealing with massive data inputs.
HOLMES model of APT detection is strongly based on the principles of the APT kill chain model. The cyber kill chain model gives a higher-level overview of the sequence of events in successful APT espionage, i.e. reconnaissance, command and control communication, privilege escalation, lateral movement, data exfiltration, and trace removal. Audit data from various operating systems are converted to a common data representation format and passed as input to the proposed model in the initial step. Lower-level information flows are extracted from the audit data such as process, files, memory objects and network information etc. The core part of the proposed model is to map the lower-level information data flows to the phases of the APT-kill chain by constructing an intermediate layer. The intermediate layer is responsible for identifying various TTP’s (Tools, Techniques, Procedures) from the low-level information data flow that correlates with respective phase of the APT life cycle. The authors considered around 200 TTP patterns based on MITRE ATT&CK framework [15]. The TTP patterns and noise filtering mechanism are employed in constructing a High-Level Scenario Graph (HSG) from which we can detect the APT attack with decent accuracy.
Schindler et al. proposed an APT detection engine based on the principles of APT kill chain phases [16]. In this work, SIEM logs were considered as data source. The correlation is identified between the event logs and the phases of APT kill chain. An adapted kill chain model is constructed to identify the possible attack vectors from the SIEM event logs. This model is implemented at two different levels.
Level-1 deals with graph-based forensic analysis where logs from different programs are aggregated based on timestamp to identify events with in the network. A directed graph is constructed from the multiple layers of event sequences. Each event sequence reveals whether the event flow matches with the partial/full phases of the APT kill chain.
Level-2 helps in identifying various anomalous activities using the Machine Learning approach. An ML classifier is constructed to make the model robust in detecting APT events along with the graph model. Authors considered “one-class SVM” as the classifier model and used windows logs, firewall logs, file audit logs of benign system programs as its data source. This model is expected to identify all the events that differ from the benign programs.
The proposed model achieved a decent accuracy score of 95.33% in detecting APT events. However, considering the case of smart malware where malicious programs mimic normal user behaviour, the proposed model tends to produce a relatively high false-positives.
Yong-Ho Kim et al. [17] proposed a theoretical model for APT detection that consider intrusion detection system logs as data source. From the IDS logs, correlation rules between various system events are identified to build an attack graph. Identifying the correlation between the intrusion detection logs helps in predicting the future attacks. In the initial phase, intrusion detection logs are collected and corresponding intrusion events were extracted. The extracted events are passed to different function blocks, each corresponding to a particular detection activity. One of the functional block identifies the single-directional i.e. (host to C2C interaction) and bi-directional (host to C2C, C2C to host) communication activities. Another block identifies the repetitive intrusion events and combines them as a single event to optimise the time and resource constraints. A correlation analysis block identifies the context of intrusion detection events and creates sequential rules based on the principles of 5 W and 1H (When, Where, Why, Who, What and How). Finally, the prediction engine consider the attack scenario and tries to predict one or more events that can occur after a single intrusion event. This module consider data mining principles such as support and confidence to produce the best possible result. The time constraint is one of the practical problems with this model, as some of the functional blocks take a longer time to process events. Another important aspect is that, rules of the intrusion detection systems will directly affect the outcome of this model.
Charan et al. [18] proposed an APT detection engine that takes SIEM event logs as input and use LSTM neural networks to detect the successful APT espionage. The author consider Splunk SIEM logs as a data source and streamline data to the Hadoop framework to process and obtain the event codes for every activity. Based on the APT life cycle phases, the author listed out the possible event codes and their sequence, leading to successful APT espionage. The core part of this work is to identify the event codes occurring in a sequence, and this process requires memorising the previous state event codes. So, in the proposed model, LSTM (a variant of RNN) is considered a classifier because it overcomes vanishing gradient problem by remembering the previous state event codes to confirm APT attack presence. However, this model may suffer from a high false-positive rate when smart malware techniques are employed in crafting the APT attack.
APT detection research mainly rely on the analysis of malware payload used in different phases of APT attack. This kind of approach result in high false positives in case of multi-stage malware deployment. In order to address this issue, Ghafir et al. proposed a model to detect multi-stage APT malware by using machine learning and correlation analysis (MLAPT) [19]. The MLAPT system is broadly divided into three modules, i.e. 1) Threat detection module, 2) Alert correlation module and 3) Prediction module. Initially, network traffic is passed to the Threat detection module in which authors built several submodules to detect multi-stage attacks. The Output alerts from the Threat detection module are passed to the Alert correlation module. Alert correlation module filters redundant alerts and clusters these alerts based on correlation time interval. The correlation indexing sub-module determines a given scenario is either a full APT scenario or sub-APT scenario based on alert correlation score. The prediction module consider sub APT scenarios and predict its probability of becoming a full APT scenario. Based on that prediction module, alerts are escalated to the network security team to stop this APT kill chain. The novelty of this research lies in the detection of APT across all life cycle phases. Added to this, the MLAPT system monitors and detects real-time APT attacks with a decent 81% Accuracy.
Detecting APT network patterns is a complex task as it tries to mimic the behaviour of regular TCP traffic. APT malware opens and closes TCP connections to its C2C servers like any other regular legitimate connection with a minimal data transfer to stay low under the radar. Single scale analysis does not extract the complexities of this kind of APT traffic and lowers the detection accuracy. Researchers found that current supervised ML models use euclidean based error minimization, which results in high false positives while detecting complex APT traffic. To address these issues, Sana Siddiqui et al. proposed an APT detection model using multi-fractal based analysis to extract the hidden information of TCP connections [20]. Initially, the authors considered 30% of labelled datasets and computed prior correlation fractal dimension values for normal and APT data points. Both these computed values are loaded into the memory before processing the remaining 70% unlabelled dataset. Each point in the remaining 70% dataset is added to both normal and APT labelled dataset, and posterior fractal dimension values are calculated in the next step. The absolute difference between prior and posterior values for both regular and APT samples are calculated to determine the closest cluster to the data point. If fd_anom (absolute difference between prior and posterior for APT sample)
Paul Guira et al. proposed a conceptual framework known as the Attack Pyramid for APT detection [21]. In this approach, the goal of the attack (data exfiltration in most of the cases) should be identified and placed on top of the pyramid. Further more, the model identifies various planes such as user plane, application plane, network plane and physical plane where the possibility of attacks are maximised. From the proposed approach, one can identify the correlation between various events across different planes. In general, an APT attack span multiple planes as the attack life cycle progresses. So, it is possible to identify the attack contexts that span through multiple attack planes. Events from different sources, i.e. VPN logs, firewall logs, IDS logs, authentication logs, system event logs are passed as data source to the detection engine. From these logs, the context of attack is identified using correlation rules. In the next step, the suspicious activities are identified by matching the attack contexts using a signature database. This model requires updating signatures at regular intervals to identify new attack contexts in real-time scenarios.
Chun-I Fan et al. [22] proposed a generalised way for APT detection using system calls log data. The model was built based on the principles of dynamic malware analysis where API call (system call) events were passed through a detection engine. The novelty of this work lies in the approach of handling the API calls. Modern APT malware is often used to create child processes or inject code into a new process to evade detection. Authors have created a program named “TraceHook” that monitors all the code injection activities. Tracehook outputs the API count for the executable samples (benign/malware), and a machine learning classifier model is constructed on top of the obtained API count values. The proposed model considers only six important DLLs to monitor and can be combined with other APT detection models to build a robust APT detection engine.
Identifying and stopping a particular life cycle event can break the full APT cycle and minimise damage to a considerable proportion. Based on this idea, researchers proposed various methods to stop malicious C2C communication. Modern-day malware employed a new way to communicate with their C2C server with the help of Domain Generation Algorithms (DGA). DGA creates a dynamic list of domain names in which a few domain names are active for a limited amount of time. So, the malware communicates to a different C2C domain name for every successful communication. This practice helps the smart malware to avoid detection from the traditional antivirus, firewalls, and other network scanning software. Anand et al. [23] proposed a classification technique to detect character-based DGA, i.e. domain names are constructed by concatenating characters in a pseudo-random manner, for example, wqzdsqtuxsbht.com. In this method, author extracted various lexical-based features such as n-grams, character frequencies, and statistical features to build an ensemble classifier. The proposed model can detect character-based DGA domain names with a decent accuracy score of 97%. Charan et al. [24] proposed a similar technique to detect word-based DGA domain names where domain names are constructed by concatenating two or three words from dictionaries, for example crossmentioncare.com. In their model, the author consider lexical, statistical, network-based features to build an ensemble classifier. A combination of the above two models can detect the C2C communication activity with a decent accuracy.
Although the security community propose different techniques to detect APT malware, there is a clear gap between current detection mechanisms and APT groups evolution. APT attack detection is extremely difficult due to an unavailability of benchmark datasets for training and evaluation. Added to this, constant change in TTP usage by APT groups result in high false positives in terms of detection. Due to the persistent nature of APT campaigns, it is cumbersome to capture the data over a long period of time. This raises the issue of storing and processing such large amounts of data so that real time detection is still a challenging task to the security community. Many state of the art APT detection models can be bypassed using modern Load Off Land Binaries (LolBins) and process injection through fileless malware. Lately, targeted APT malware evolved into a new variant named smart malware which is highly modular, robust and intelligent enough to evade detection from state of the art ML techniques. Along with these issues, adversarial machine learning is a potential threat to the existing detection mechanisms. Some of the APT groups also started using GAN to modify the payloads in such a way to evade detection and attribution as well. In order to address these serious security concerns in APT detection and attribution, there is a need for benchmark datasets and robust ML models working at different levels of the APT kill chain.
The authors declare no conflict of interest.
APT | Advanced Persistent Threat |
C2C | Control and Command Server |
LoLBin | Living Off Land Binaries |
TTP | Tools, Techniques and Procedures |
GAN | Generative Adversarial Networks |
DGA | Domain Generation Algorithms |
CTI | Cyber Threat Intelligence |
IOC | Indicators of Compromise |
SMOBI | Smoothed Binary vector |
GHSOM | Growing Hierarchical Self Organising Map |
RNN | Recurrent Neural Network |
LSTM | Long Short Term Memory Neural Networks |
SIEM | Security Information and Event Management |
IDS | Intrusion Detection System |
IPS | Intrusion Prevention System |
ETW | Event tracing for windows |
CTA | Cyber Threat Attribution |
DLL | Dynamic Link Library |
Recent advances in the design of sophisticated malware tools are posing a significant challenge not only to the global IT industry but also to the banking and security organisations. Advanced Persistent Threat (APT) is a key player in highly targeted and sophisticated state-sponsored attacks [1]. These APT groups design and deploy malware in a unique way depending on the target. After selecting the targeted organisation, they come with different Tools, Techniques and Procedures (TTP) to bypass the traditional line of defences (intrusion detection systems or firewall). Once they get access, these APT groups stay inside targeted networks for a long time to observe the workflows. These APT groups use intelligent multi-stage malware deployment techniques to stay low under the radar for a long time [2]. Finally, gathered sensitive information is pushed in small chunks to its external control and command servers (C2C) using some clever exfiltration techniques.
The whole process of the APT life cycle is broadly divided into seven different phases as shown in Figure 1 [3]. In the Reconnaissance phase, the attacker chooses the target network and studies the internal network structure and comes up with the necessary strategy, TTP, to bypass the initial layer of defence. Reconnaissance is followed by the Initial compromise phase, where attackers exploit open vulnerabilities to get an initial foothold into the targeted network. After that, the attackers try to replicate and propagate into another machine and establishes backdoors to pull more sophisticated payloads in Establishing foothold phase. Later in the Lateral movement phase, attackers escalate various privileges to perform more sophisticated tasks to hide its traces. In this particular phase, attackers traverse from one network to another network in search of sensitive information. After collecting the necessary data, the attackers strategically centralises this collected data to staging servers. In the data exfiltration phase, attackers use different custom encoding and encryption mechanisms to push these collected data to external control and command servers. Finally, to preserve the anonymity of the process, attacker leaves no traces by clearing the tracks and creates a backdoor to revisit that particular organisation in the future.
APT life cycle phases.
APT has grown to become a global tool for cyber warfare between countries. Carbanak APT campaign infected thousands of people worldwide and caused nearly $1 billion damage across the globe [4]. APT actors carried out a variety of actions in this operation, including opening fraudulent accounts and employing bogus services to obtain funds, as well as sending money to cybercriminals via the SWIFT (Society for Worldwide Interbank Financial Telecommunication) network. Similarly, in 2018, Big Bang APT developed a much more robust and sophisticated multi-stage malware targeting the Palestinian Authority [5]. This APT malware includes several modules that perform tasks ranging from obtaining a file list, capturing screenshots, rebooting the machine, retrieving system information, and self-deletion. More recently, a supply chain attack on solar winds by the Russian APT group was considered one of the sophisticated attacks. RefreshInternals() method in solar winds attack depict the maturity of these state-sponsored APT groups in terms of malware design and payload delivery [6].
In order to deal with these kinds of state-sponsored targeted attacks, security experts consider APT attribution and detection as two key pillars. Attribution is an analysis process that explains about “who” is behind particular cyber espionage and “why” they have done it [7]. This process gives insights about particular APT threat actors and their targeted areas as well. Based on this preliminary information, the security community try to detect these attacks by fixing issues at different levels of an organisation. Since APT attribution and detection became crucial for many security firms/govt agencies, both these processes require massive data pre-processing and analysis. To address these issues, researchers propose different data mining and machine learning techniques in both attribution and detection as well. In this paper, we discuss various data mining and machine learning techniques in both detection and attribution of APT malware. In addition to this, we compare different detection techniques, and we highlight research gaps among those techniques which need to be addressed by the security community to combat this sophisticated APT malware.
This paper is organised as follows. Section 1. details APT overview and phases of APT, followed by the need for data mining and ML techniques in both attribution and detection of APT malware. Section 2. talks about the process of attribution and different techniques proposed to perform APT attribution. Section 3. discuss about various state of the art data mining and ML techniques proposed by the research community in APT detection. Section 4. details research gap analysis followed by conclusion and future scope.
APT attribution is an analysis process that reveals the identity of the threat actors and their motto through a series of steps [8]. First, security firms collect data from different victim organisations by performing forensic analysis on the respective networks and collect different Indicators of Compromise (IOC). In general, attackers repeat this pattern in several other organisations as well. Security firms observe and analyse these repeated patterns in IOC and TTP’s together, and cluster these combinations as intrusion sets. Performing data analytics on these intrusion sets over a period will eventually reveal the threat actor and motivation behind the attack as depicted in Figure 2, respectively.
Overview of APT attribution process.
APT attribution is quite a challenging task to the security community because of various reasons. Majorly, State-sponsored APTs are developed in the supervision of different units and equipped with default Anti-VM and Anti-Debugging techniques to obfuscate the payloads. This technique makes feature extraction extremely challenging to most security firms. In addition to this, APT malware samples are highly targeted so that very few samples will be available for analysis purposes. In order to address this issue, Rosenberg et al. proposed a technique for APT attribution by using a Deep Neural Network (DNN) classifier [9]. In this research work, the authors used 3200 malware samples for training DNN classifiers, 400 samples for validation and 1000 samples for testing the model. All the APT malware samples are executed in a cuckoo sandbox environment, and generated reports are used as raw input in training the classifier. DNN is effective in learning high-level features on its own from raw inputs. In order to train DNN models more effectively, in this work, the authors removed top 50,000 frequent words from input features of all cuckoo reports. So, DNN models take very uncommon words from all cuckoo reports and build a much more effective model to perform APT attribution. This DNN architecture is a 10-layer, fully connected network (50,0000 neurons at the input layer and 2,000 in the first hidden layer) with a ReLU activation function. The final trained APT attribution model did decent work on test data with 98.6% accuracy. Added to this, the authors also applied transfer learning on trained DNN models by removing and retraining top layer neurons. After applying transfer learning, the model still performs exceptionally well with 97.8% accuracy. From the t-distributed stochastic neighbour embedding algorithm (used to reduce from 500 dimension space to 2 dimension space), we can see that the trained model could separate different APT malware groups as shown in Figure 3, respectively.
2-dimensional visualisation of APT families using t-SNE algorithm [
Most APT attribution techniques heavily rely on performing analysis for malware samples used in that particular campaign. The key disadvantage of this strategy is that the same malware samples can be used in several operations. In some situations, APT groups specifically buy malware from the dark web based on their requirements. So, the ML models constructed by only considering malware samples may not give efficient results in terms of APT attribution. In order to address this issue, Lior Perry et al. proposed a method named NO-DOUBT, i.e. Novel Document Based Attribution, by constructing models on threat intelligence reports with the help of Natural Language Processing (NLP) techniques [10]. In this research, the authors collected 249 threat intelligence reports of 12 different APT actors and considered APT attack attribution as a multi-text classification problem. The proposed model consists of mainly two phases, as shown in Figure 4. In the training phase, labelled reports and word embeddings transform the input data to a vector representation. For generating this vector representation, authors propose SMOBI (Smoothed Binary Vector) algorithm, which will find cosine similarities between input words in labelled data sets and word embeddings to form a huge n
NO-DOUBT method for APT attribution [
Most of the APT attribution processes depend upon the manual analysis in victim networks and collecting low-level indicators of compromise (forensic analysis at firewalls, tracebacks, IDS and Honeypots). However, APT actors change this low-level IOC from one organisation to another organisation. ML models built based on this low-level IOC, results in inadequate cyber intelligence systems. On the other hand, collecting high-level IOC’s for each organisation is time-consuming. Such high-level IOC’s are published in the form of Cyber Threat Intelligence (CTI) reports across the organisations as a common practice. In 2019, Umara Noor et al. proposed a distributional semantic technique of NLP to build a cyber threat attribution framework by extracting patterns from CTI reports [11]. The proposed attribution framework is broadly divided into three phases, as depicted in Figure 5. In this experiment, authors used a customised search engine to collect 327 unstructured CTI documents corresponding to 36 APT actors as a part of data collection phase. The CTI documents do not contain the exact keyword described in the standard taxonomy due to varying textual definitions and choices for communicating a concept. Rather than using a simple keyword-based search, the authors developed a semantic search method based on the statistical distributional semantic relevance technique (LSA), to retrieve relevant documents. The input CTI records are indexed using LSA. The statistically derived conceptual indices (from LSA indexer) are searched for semantically relevant topics using the high-level IOC labels specified in MITRE ATT&CK [11]. Based on cosine similarity, the CTA-TTP correlation matrix is constructed in the CTI analytics phase. ML models are built on top of the CTA-TTP correlation matrix in the Cyber Threat Attribution phase. Among various classifiers, the Deep Neural Network turned out to be the best performer with 94% attribution accuracy on test data with high precision and recall values.
Cyber threat attribution framework [
Behavioural analysis of APT malware gives better insights on both APT attribution and detection. Based on this motivation, Weijie Han et al. proposed that, dynamic system call information reveals behavioural characteristics of APT malware [12]. Furthermore, the authors built an ontology model to understand in-depth relation between the maliciousness of APT malware to its families, as depicted in Figure 6, respectively. APTMalInsight framework mainly consists of two modules i.e. APT malware family classification module and detection module. The basic concept behind the APTMalInsight framework is to profile the behavioural characteristics of APT malware. It obtains dynamic system call information from the programs to reliably detect and attribute APT malware to their respective families. Primarily, APT malware samples are executed to extract dynamic API calls. After extracting API calls, authors calculated the feature importance of each API call and built a feature vector by selecting top N-API calls from the API call sequence. ML models built on top of that feature vector will output the APT attribution class for test data, as shown in Figure 7. For the experiment, authors considered a total of 864 APT malware samples belonging to five different families. As per the experimentation results, Random Forest turned out to be the best model in terms of Accuracy(98%), Precision and Recall for APT malware family attribution.
APT malware ontology model [
High-level overview of APTMalInsight framework [
Security firms like FireEye investigate many victim networks and collect IOC and group them together as uncategorised (“UNC”) intrusion sets. Over time, this type of UNC sets are increasing rapidly, and security firms need to either merge these other APT groups or assign a new group name based on manual analysis. FireEye security researchers proposed an automated framework with the help of ML models to perform investigation, analysis, and rationale for the whole APT attribution process [13]. In this framework, the researchers suggest a document clustering approach using term frequency and - inverse document frequency method (TF-IDF). The TF-IDF algorithm assigns more importance to a term if the word often appears in the document. Similarly, if the term appears common across all the documents, the algorithm decreases its importance. This method favours unique terms like custom malware families, which may appear in just a few classes, and downplays popular terms like ‘phishing’, which appear more often. After calculating scores using the TF-IDF algorithm, each UNC group is converted into a vector representation, and researchers calculate cosine similarity between these APT groups as shown in Figure 8, respectively. As angle between the two vectors decreases, they tend to become parallel. The decrease in the angle helps the researchers to determine the extent of similarity between two different APT groups. Based on this idea, FireEye automated the whole process of APT attribution and merging different uncategorised groups.
Cosine similarity between different un-attributed APT groups [
Most of the APT families stay undetected for a long period and use intelligent ways to damage the vulnerable hosts. When a traditional malware executes, most of the events occur sequentially and leave some traces behind. These traces help modern-day intelligent systems like SIEM, IDS, IPS to prevent these attacks. But, when it comes to the case of APTs, they clean the attack traces and also prevent sequence execution of events. Also, APT employs Anti-VM and Anti-debugging techniques for making things harder for the detection systems. The hardness in detecting the APT has made the cyber security enthusiasts draw their attention towards this domain. Some of the important contributions in the research area are mentioned below. A detailed comparison among different detection techniques are illustrated in Table 1, respectively.
Research item | DM/ML technique employed in APT detection | Input data | Novelty |
---|---|---|---|
[14] | RNN-LSTM and GHSOM | Network Traffic Flow | Deep learning stack with sequential neural networks to detect APT. |
[15] | Provenance Graph Mining | Host Audit Data (Linux audit or Windows ETW) | Suspicious information flows are identified using MITRE ATT&CK framework. |
[16] | Directed Graph Mining and One Class SVM | SIEM Event Logs | Extracting attack vectors from SIEM logs |
[17] | Continuous Association Rule Mining Algorithm (CRAMA) | IDS Logs | Identify correlation rules between various system events to develop an APT attack graph |
[18] | RNN-LSTM | SIEM Event Logs | Identify possible event codes and their sequence to detect an APT attack in realtime |
[19] | Ensemble Classifier | Network Traffic Flow | Separate threat detection sub-module for APT life cycle phases. |
[20] | Multi fractal based error minimization | Network Traffic Flow | Multi fractal analysis to extract the hidden information of TCP connections. |
[21] | Correlation Analysis | Multiple data sources | Construction of Attack Pyramid using multiple planes to detect APT |
[22] | J48 Classifier | API log data | API calls to track process injection and privilege escalation activities. |
[23] | Ensemble Classifier | Domain Names (Alexa and data.netlab.360) | Identify malicious C2C communication using lexical features of domain names |
[24] | Ensemble Classifier | Domain Names (Alexa and DGArchive) | Identify malicious C2C communication using lexical, network features of domain names |
Comparison of different APT detection methods.
Tero et al. [14] proposed a theoretical approach for detecting APT by developing a stack of Deep Learning methods where each layer has a particular task in handling APT events. The authors consider network payload and packet header information as features, and they streamlined the input to the detection stack without any data filtering mechanism. The detection stack is designed sequentially. The initial layers, i.e. layer-1 and layer-2, are used to detect the known attacks and legitimate network traffic from the data flow respectively. Layer-3 of the detection stack employs in identifying the outliers having historical presence. It uses Recurrent Neural Network-Long Short Term Memory (RNN-LSTM) units to confirm whether an outlier has historical occurrence. Layer-4 helps to classify the outliers into four categories, i.e. regular traffic, known attack, predicted attack and unknown outlier using an anomaly detection method named Growing Hierarchical Self-Organising Map (GHSOM). The stack’s final layer helps to map the anomalies (i.e. interconnections between the outlier events) using a Graph Database (GDB). The proposed stack model is highly modular and was designed to perform dynamic detection of APT events with a decent detection accuracy. However, this detection system is complex in design and result in higher time complexity when dealing with massive data inputs.
HOLMES model of APT detection is strongly based on the principles of the APT kill chain model. The cyber kill chain model gives a higher-level overview of the sequence of events in successful APT espionage, i.e. reconnaissance, command and control communication, privilege escalation, lateral movement, data exfiltration, and trace removal. Audit data from various operating systems are converted to a common data representation format and passed as input to the proposed model in the initial step. Lower-level information flows are extracted from the audit data such as process, files, memory objects and network information etc. The core part of the proposed model is to map the lower-level information data flows to the phases of the APT-kill chain by constructing an intermediate layer. The intermediate layer is responsible for identifying various TTP’s (Tools, Techniques, Procedures) from the low-level information data flow that correlates with respective phase of the APT life cycle. The authors considered around 200 TTP patterns based on MITRE ATT&CK framework [15]. The TTP patterns and noise filtering mechanism are employed in constructing a High-Level Scenario Graph (HSG) from which we can detect the APT attack with decent accuracy.
Schindler et al. proposed an APT detection engine based on the principles of APT kill chain phases [16]. In this work, SIEM logs were considered as data source. The correlation is identified between the event logs and the phases of APT kill chain. An adapted kill chain model is constructed to identify the possible attack vectors from the SIEM event logs. This model is implemented at two different levels.
Level-1 deals with graph-based forensic analysis where logs from different programs are aggregated based on timestamp to identify events with in the network. A directed graph is constructed from the multiple layers of event sequences. Each event sequence reveals whether the event flow matches with the partial/full phases of the APT kill chain.
Level-2 helps in identifying various anomalous activities using the Machine Learning approach. An ML classifier is constructed to make the model robust in detecting APT events along with the graph model. Authors considered “one-class SVM” as the classifier model and used windows logs, firewall logs, file audit logs of benign system programs as its data source. This model is expected to identify all the events that differ from the benign programs.
The proposed model achieved a decent accuracy score of 95.33% in detecting APT events. However, considering the case of smart malware where malicious programs mimic normal user behaviour, the proposed model tends to produce a relatively high false-positives.
Yong-Ho Kim et al. [17] proposed a theoretical model for APT detection that consider intrusion detection system logs as data source. From the IDS logs, correlation rules between various system events are identified to build an attack graph. Identifying the correlation between the intrusion detection logs helps in predicting the future attacks. In the initial phase, intrusion detection logs are collected and corresponding intrusion events were extracted. The extracted events are passed to different function blocks, each corresponding to a particular detection activity. One of the functional block identifies the single-directional i.e. (host to C2C interaction) and bi-directional (host to C2C, C2C to host) communication activities. Another block identifies the repetitive intrusion events and combines them as a single event to optimise the time and resource constraints. A correlation analysis block identifies the context of intrusion detection events and creates sequential rules based on the principles of 5 W and 1H (When, Where, Why, Who, What and How). Finally, the prediction engine consider the attack scenario and tries to predict one or more events that can occur after a single intrusion event. This module consider data mining principles such as support and confidence to produce the best possible result. The time constraint is one of the practical problems with this model, as some of the functional blocks take a longer time to process events. Another important aspect is that, rules of the intrusion detection systems will directly affect the outcome of this model.
Charan et al. [18] proposed an APT detection engine that takes SIEM event logs as input and use LSTM neural networks to detect the successful APT espionage. The author consider Splunk SIEM logs as a data source and streamline data to the Hadoop framework to process and obtain the event codes for every activity. Based on the APT life cycle phases, the author listed out the possible event codes and their sequence, leading to successful APT espionage. The core part of this work is to identify the event codes occurring in a sequence, and this process requires memorising the previous state event codes. So, in the proposed model, LSTM (a variant of RNN) is considered a classifier because it overcomes vanishing gradient problem by remembering the previous state event codes to confirm APT attack presence. However, this model may suffer from a high false-positive rate when smart malware techniques are employed in crafting the APT attack.
APT detection research mainly rely on the analysis of malware payload used in different phases of APT attack. This kind of approach result in high false positives in case of multi-stage malware deployment. In order to address this issue, Ghafir et al. proposed a model to detect multi-stage APT malware by using machine learning and correlation analysis (MLAPT) [19]. The MLAPT system is broadly divided into three modules, i.e. 1) Threat detection module, 2) Alert correlation module and 3) Prediction module. Initially, network traffic is passed to the Threat detection module in which authors built several submodules to detect multi-stage attacks. The Output alerts from the Threat detection module are passed to the Alert correlation module. Alert correlation module filters redundant alerts and clusters these alerts based on correlation time interval. The correlation indexing sub-module determines a given scenario is either a full APT scenario or sub-APT scenario based on alert correlation score. The prediction module consider sub APT scenarios and predict its probability of becoming a full APT scenario. Based on that prediction module, alerts are escalated to the network security team to stop this APT kill chain. The novelty of this research lies in the detection of APT across all life cycle phases. Added to this, the MLAPT system monitors and detects real-time APT attacks with a decent 81% Accuracy.
Detecting APT network patterns is a complex task as it tries to mimic the behaviour of regular TCP traffic. APT malware opens and closes TCP connections to its C2C servers like any other regular legitimate connection with a minimal data transfer to stay low under the radar. Single scale analysis does not extract the complexities of this kind of APT traffic and lowers the detection accuracy. Researchers found that current supervised ML models use euclidean based error minimization, which results in high false positives while detecting complex APT traffic. To address these issues, Sana Siddiqui et al. proposed an APT detection model using multi-fractal based analysis to extract the hidden information of TCP connections [20]. Initially, the authors considered 30% of labelled datasets and computed prior correlation fractal dimension values for normal and APT data points. Both these computed values are loaded into the memory before processing the remaining 70% unlabelled dataset. Each point in the remaining 70% dataset is added to both normal and APT labelled dataset, and posterior fractal dimension values are calculated in the next step. The absolute difference between prior and posterior values for both regular and APT samples are calculated to determine the closest cluster to the data point. If fd_anom (absolute difference between prior and posterior for APT sample)
Paul Guira et al. proposed a conceptual framework known as the Attack Pyramid for APT detection [21]. In this approach, the goal of the attack (data exfiltration in most of the cases) should be identified and placed on top of the pyramid. Further more, the model identifies various planes such as user plane, application plane, network plane and physical plane where the possibility of attacks are maximised. From the proposed approach, one can identify the correlation between various events across different planes. In general, an APT attack span multiple planes as the attack life cycle progresses. So, it is possible to identify the attack contexts that span through multiple attack planes. Events from different sources, i.e. VPN logs, firewall logs, IDS logs, authentication logs, system event logs are passed as data source to the detection engine. From these logs, the context of attack is identified using correlation rules. In the next step, the suspicious activities are identified by matching the attack contexts using a signature database. This model requires updating signatures at regular intervals to identify new attack contexts in real-time scenarios.
Chun-I Fan et al. [22] proposed a generalised way for APT detection using system calls log data. The model was built based on the principles of dynamic malware analysis where API call (system call) events were passed through a detection engine. The novelty of this work lies in the approach of handling the API calls. Modern APT malware is often used to create child processes or inject code into a new process to evade detection. Authors have created a program named “TraceHook” that monitors all the code injection activities. Tracehook outputs the API count for the executable samples (benign/malware), and a machine learning classifier model is constructed on top of the obtained API count values. The proposed model considers only six important DLLs to monitor and can be combined with other APT detection models to build a robust APT detection engine.
Identifying and stopping a particular life cycle event can break the full APT cycle and minimise damage to a considerable proportion. Based on this idea, researchers proposed various methods to stop malicious C2C communication. Modern-day malware employed a new way to communicate with their C2C server with the help of Domain Generation Algorithms (DGA). DGA creates a dynamic list of domain names in which a few domain names are active for a limited amount of time. So, the malware communicates to a different C2C domain name for every successful communication. This practice helps the smart malware to avoid detection from the traditional antivirus, firewalls, and other network scanning software. Anand et al. [23] proposed a classification technique to detect character-based DGA, i.e. domain names are constructed by concatenating characters in a pseudo-random manner, for example, wqzdsqtuxsbht.com. In this method, author extracted various lexical-based features such as n-grams, character frequencies, and statistical features to build an ensemble classifier. The proposed model can detect character-based DGA domain names with a decent accuracy score of 97%. Charan et al. [24] proposed a similar technique to detect word-based DGA domain names where domain names are constructed by concatenating two or three words from dictionaries, for example crossmentioncare.com. In their model, the author consider lexical, statistical, network-based features to build an ensemble classifier. A combination of the above two models can detect the C2C communication activity with a decent accuracy.
Although the security community propose different techniques to detect APT malware, there is a clear gap between current detection mechanisms and APT groups evolution. APT attack detection is extremely difficult due to an unavailability of benchmark datasets for training and evaluation. Added to this, constant change in TTP usage by APT groups result in high false positives in terms of detection. Due to the persistent nature of APT campaigns, it is cumbersome to capture the data over a long period of time. This raises the issue of storing and processing such large amounts of data so that real time detection is still a challenging task to the security community. Many state of the art APT detection models can be bypassed using modern Load Off Land Binaries (LolBins) and process injection through fileless malware. Lately, targeted APT malware evolved into a new variant named smart malware which is highly modular, robust and intelligent enough to evade detection from state of the art ML techniques. Along with these issues, adversarial machine learning is a potential threat to the existing detection mechanisms. Some of the APT groups also started using GAN to modify the payloads in such a way to evade detection and attribution as well. In order to address these serious security concerns in APT detection and attribution, there is a need for benchmark datasets and robust ML models working at different levels of the APT kill chain.
The authors declare no conflict of interest.
APT | Advanced Persistent Threat |
C2C | Control and Command Server |
LoLBin | Living Off Land Binaries |
TTP | Tools, Techniques and Procedures |
GAN | Generative Adversarial Networks |
DGA | Domain Generation Algorithms |
CTI | Cyber Threat Intelligence |
IOC | Indicators of Compromise |
SMOBI | Smoothed Binary vector |
GHSOM | Growing Hierarchical Self Organising Map |
RNN | Recurrent Neural Network |
LSTM | Long Short Term Memory Neural Networks |
SIEM | Security Information and Event Management |
IDS | Intrusion Detection System |
IPS | Intrusion Prevention System |
ETW | Event tracing for windows |
CTA | Cyber Threat Attribution |
DLL | Dynamic Link Library |
As this section deals with legal issues pertaining to the rights of individual Authors and IntechOpen, for the avoidance of doubt, each category of publication is dealt with separately. Consequently, much of the information, for example definition of terms used, is repeated to ensure that there can be no misunderstanding of the policies that apply to each category.
",metaTitle:"Copyright Policy",metaDescription:"Copyright is the term used to describe the rights related to the publication and distribution of original works. Most importantly from a publisher's perspective, copyright governs how authors, publishers and the general public can use, publish and distribute publications.",metaKeywords:null,canonicalURL:"/page/copyright-policy",contentRaw:'[{"type":"htmlEditorComponent","content":"Copyright is the term used to describe the rights related to the publication and distribution of original Works. Most importantly from a publisher's perspective, copyright governs how Authors, publishers and the general public can use, publish, and distribute publications.
\\n\\nIntechOpen only publishes manuscripts for which it has publishing rights. This is governed by a publication agreement between the Author and IntechOpen. This agreement is accepted by the Author when the manuscript is submitted and deals with both the rights of the publisher and Author, as well as any obligations concerning a particular manuscript. However, in accepting this agreement, Authors continue to retain significant rights to use and share their publications.
\\n\\nHOW COPYRIGHT WORKS WITH OPEN ACCESS LICENSES?
\\n\\nAgreement samples are listed here for the convenience of prospective Authors:
\\n\\nDEFINITIONS
\\n\\nThe following definitions apply in this Copyright Policy:
\\n\\nAuthor - in order to be identified as an Author, three criteria must be met: (i) Substantial contribution to the conception or design of the Work, or the acquisition, analysis, or interpretation of data for the Work; (ii) Participation in drafting or revising the Work; (iii) Approval of the final version of the Work to be published.
\\n\\nWork - a Chapter, including Conference Papers, a Scientific Article and any and all text, graphics, images and/or other materials forming part of or accompanying the Chapter/Conference Paper.
\\n\\nMonograph/Compacts - a full manuscript usually written by a single Author, including any and all text, graphics, images and/or other materials.
\\n\\nCompilation - a collection of Works distributed in a Book that IntechOpen has selected, and for which the coordination of the preparation, arrangement and publication has been the responsibility of IntechOpen. Any Work included is accepted in its entirety in unmodified form and is published with one or more other contributions, each constituting a separate and independent Work, but which together are assembled into a collective whole.
\\n\\nScientific Journal – Periodical publication intended to further the progress of science.
\\n\\nJournal Article/Scientific Article – Publication based on empirical evidence. It can support a hypothesis with original research, describe existing research or comment on current trends in a specific field.
\\n\\nIntechOpen - Registered publisher with office at 5 Princes Gate Court, London, SW7 2QJ - UNITED KINGDOM
\\n\\nIntechOpen platform - IntechOpen website www.intechopen.com whose main purpose is to host Monographs in the format of Book Chapters, Long Form Monographs, Compacts, Conference Proceedings, Scientific Journals and Videos.
\\n\\nVideo Lecture – an audiovisual recording of a lecture or a speech given by a Lecturer, recorded, edited, owned and published by IntechOpen.
\\n\\nTERMS
\\n\\nAll Works published on the IntechOpen platform and in print are licensed under a Creative Commons Attribution 3.0 Unported and Creative Commons 4.0 International License, a license which allows for the broadest possible reuse of published material.
\\n\\nCopyright on the individual Works belongs to the specific Author, subject to an agreement with IntechOpen. The Creative Common license is granted to all others to:
\\n\\nAnd for any purpose, provided the following conditions are met:
\\n\\nAll Works are published under the CC BY 3.0 and CC BY 4.0 license. However, please note that book Chapters may fall under a different CC license, depending on their publication date as indicated in the table below:
\\n\\n\\n\\n
LICENSE | \\n\\t\\t\\tUSED FROM - | \\n\\t\\t\\tUP TO - | \\n\\t\\t
\\n\\t\\t\\t Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) \\n\\t\\t\\t | \\n\\t\\t\\t1 July 2005 (2005-07-01) | \\n\\t\\t\\t3 October 2011 (2011-10-03) | \\n\\t\\t
\\n\\t\\t\\t Creative Commons Attribution 3.0 Unported (CC BY 3.0) \\n\\t\\t\\t | \\n\\t\\t\\t5 October 2011 (2011-10-05) | \\n\\t\\t\\tCurrently | \\n\\t\\t
\\n\\t\\t\\t Creative Commons 4.0 International (CC BY 4.0) – for Journal Articles \\n\\t\\t\\t | \\n\\t\\t\\t15 March 2022 | \\n\\t\\t\\tCurrently | \\n\\t\\t
The CC BY 3.0 and CC BY 4.0 license permits Works to be freely shared in any medium or format, as well as the reuse and adaptation of the original contents of Works (e.g. figures and tables created by the Authors), as long as the source Work is cited and its Authors are acknowledged in the following manner:
\\n\\nContent reuse:
\\n\\n© {year} {authors' full names}. Originally published in {short citation} under {license version} license. Available from: {DOI}
\\n\\nContent adaptation & reuse:
\\n\\n© {year} {authors' full names}. Adapted from {short citation}; originally published under {license version} license. Available from: {DOI}
\\n\\nReposting & sharing:
\\n\\nOriginally published in {full citation}. Available from: {DOI}
\\n\\nRepublishing – More about Attribution Policy can be found here.
\\n\\nThe same principles apply to Works published under the CC BY-NC-SA 3.0 license, with the caveats that (1) the content may not be used for commercial purposes, and (2) derivative works building on this content must be distributed under the same license. The restrictions contained in these license terms may, however, be waived by the copyright holder(s). Users wishing to circumvent any of the license terms are required to obtain explicit permission to do so from the copyright holder(s).
\\n\\nDISCLAIMER: Neither the CC BY 3.0 license, CC BY 4.0, nor any other license IntechOpen currently uses or has used before, applies to figures and tables reproduced from other works, as they may be subject to different terms of reuse. In such cases, if the copyright holder is not noted in the source of a figure or table, it is the responsibility of the User to investigate and determine the exact copyright status of any information utilised. Users requiring assistance in that regard are welcome to send an inquiry to permissions@intechopen.com.
\\n\\nAll rights to Books and Journals and all other compilations published on the IntechOpen platform and in print are reserved by IntechOpen.
\\n\\nThe copyright to Books, Journals and other compilations is subject to separate copyright from those that exist in the included Works.
\\n\\nAll Long Form Monographs/Compacts are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license granted to all others.
\\n\\nCopyright to the individual Works (Chapters) belongs to their specific Authors, subject to an agreement with IntechOpen and the Creative Common license granted to all others to:
\\n\\nUnder the following terms:
\\n\\nThere must be an Attribution, giving appropriate credit, provision of a link to the license, and indication if any changes were made.
\\n\\nNonCommercial - The use of the material for commercial purposes is prohibited. Commercial rights are reserved to IntechOpen or its licensees.
\\n\\nNo additional restrictions that apply legal terms or technological measures that restrict others from doing anything the license permits are allowed.
\\n\\nThe CC BY-NC 4.0 license permits Works to be freely shared in any medium or format, as well as reuse and adaptation of the original contents of Works (e.g. figures and tables created by the Authors), as long as it is not used for commercial purposes. The source Work must be cited and its Authors acknowledged in the following manner:
\\n\\nContent reuse:
\\n\\n© {year} {authors' full names}. Originally published in {short citation} under {license version} license. Available from: {DOI}
\\n\\nContent adaptation & reuse:
\\n\\n© {year} {authors' full names}. Adapted from {short citation}; originally published under {license version} license. Available from: {DOI}
\\n\\nReposting & sharing:
\\n\\nOriginally published in {full citation}. Available from: {DOI}
\\n\\nAll Book cover design elements, as well as Video image graphics are subject to copyright by IntechOpen.
\\n\\nEvery reproduction of a front cover image must be accompanied by an appropriate Copyright Notice displayed adjacent to the image. The exact Copyright Notice depends on who the Author of a particular cover image is. Users wishing to reproduce cover images should contact permissions@intechopen.com.
\\n\\nAll Video Lectures under IntechOpen's production are subject to copyright and are property of IntechOpen, unless defined otherwise, and are licensed under the Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license. This grants all others the right to:
\\n\\nShare — copy and redistribute the material in any medium or format
\\n\\nUnder the following terms:
\\n\\nUsers wishing to repost and share the Video Lectures are welcome to do so as long as they acknowledge the source in the following manner:
\\n\\n© {year} IntechOpen. Published under CC BY-NC-ND 4.0 license. Available from: {DOI}
\\n\\nUsers wishing to reuse, modify, or adapt the Video Lectures in a way not permitted by the license are welcome to contact us at permissions@intechopen.com to discuss waiving particular license terms.
\\n\\nAll software used on the IntechOpen platform, any used during the publishing process, and the copyright in the code constituting such software, is the property of IntechOpen or its software suppliers. As such, it may not be downloaded or copied without permission.
\\n\\nUnless otherwise indicated, all IntechOpen websites are the property of IntechOpen.
\\n\\nAll content included on IntechOpen Websites not forming part of contributed materials (such as text, images, logos, graphics, design elements, videos, sounds, pictures, trademarks, etc.), are subject to copyright and are property of, or licensed to, IntechOpen. Any other use, including the reproduction, modification, distribution, transmission, republication, display, or performance of the content on this site is strictly prohibited.
\\n\\nPolicy last updated: 2016-06-08
\\n"}]'},components:[{type:"htmlEditorComponent",content:'Copyright is the term used to describe the rights related to the publication and distribution of original Works. Most importantly from a publisher's perspective, copyright governs how Authors, publishers and the general public can use, publish, and distribute publications.
\n\nIntechOpen only publishes manuscripts for which it has publishing rights. This is governed by a publication agreement between the Author and IntechOpen. This agreement is accepted by the Author when the manuscript is submitted and deals with both the rights of the publisher and Author, as well as any obligations concerning a particular manuscript. However, in accepting this agreement, Authors continue to retain significant rights to use and share their publications.
\n\nHOW COPYRIGHT WORKS WITH OPEN ACCESS LICENSES?
\n\nAgreement samples are listed here for the convenience of prospective Authors:
\n\nDEFINITIONS
\n\nThe following definitions apply in this Copyright Policy:
\n\nAuthor - in order to be identified as an Author, three criteria must be met: (i) Substantial contribution to the conception or design of the Work, or the acquisition, analysis, or interpretation of data for the Work; (ii) Participation in drafting or revising the Work; (iii) Approval of the final version of the Work to be published.
\n\nWork - a Chapter, including Conference Papers, a Scientific Article and any and all text, graphics, images and/or other materials forming part of or accompanying the Chapter/Conference Paper.
\n\nMonograph/Compacts - a full manuscript usually written by a single Author, including any and all text, graphics, images and/or other materials.
\n\nCompilation - a collection of Works distributed in a Book that IntechOpen has selected, and for which the coordination of the preparation, arrangement and publication has been the responsibility of IntechOpen. Any Work included is accepted in its entirety in unmodified form and is published with one or more other contributions, each constituting a separate and independent Work, but which together are assembled into a collective whole.
\n\nScientific Journal – Periodical publication intended to further the progress of science.
\n\nJournal Article/Scientific Article – Publication based on empirical evidence. It can support a hypothesis with original research, describe existing research or comment on current trends in a specific field.
\n\nIntechOpen - Registered publisher with office at 5 Princes Gate Court, London, SW7 2QJ - UNITED KINGDOM
\n\nIntechOpen platform - IntechOpen website www.intechopen.com whose main purpose is to host Monographs in the format of Book Chapters, Long Form Monographs, Compacts, Conference Proceedings, Scientific Journals and Videos.
\n\nVideo Lecture – an audiovisual recording of a lecture or a speech given by a Lecturer, recorded, edited, owned and published by IntechOpen.
\n\nTERMS
\n\nAll Works published on the IntechOpen platform and in print are licensed under a Creative Commons Attribution 3.0 Unported and Creative Commons 4.0 International License, a license which allows for the broadest possible reuse of published material.
\n\nCopyright on the individual Works belongs to the specific Author, subject to an agreement with IntechOpen. The Creative Common license is granted to all others to:
\n\nAnd for any purpose, provided the following conditions are met:
\n\nAll Works are published under the CC BY 3.0 and CC BY 4.0 license. However, please note that book Chapters may fall under a different CC license, depending on their publication date as indicated in the table below:
\n\n\n\n
LICENSE | \n\t\t\tUSED FROM - | \n\t\t\tUP TO - | \n\t\t
\n\t\t\t Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) \n\t\t\t | \n\t\t\t1 July 2005 (2005-07-01) | \n\t\t\t3 October 2011 (2011-10-03) | \n\t\t
\n\t\t\t Creative Commons Attribution 3.0 Unported (CC BY 3.0) \n\t\t\t | \n\t\t\t5 October 2011 (2011-10-05) | \n\t\t\tCurrently | \n\t\t
\n\t\t\t Creative Commons 4.0 International (CC BY 4.0) – for Journal Articles \n\t\t\t | \n\t\t\t15 March 2022 | \n\t\t\tCurrently | \n\t\t
The CC BY 3.0 and CC BY 4.0 license permits Works to be freely shared in any medium or format, as well as the reuse and adaptation of the original contents of Works (e.g. figures and tables created by the Authors), as long as the source Work is cited and its Authors are acknowledged in the following manner:
\n\nContent reuse:
\n\n© {year} {authors' full names}. Originally published in {short citation} under {license version} license. Available from: {DOI}
\n\nContent adaptation & reuse:
\n\n© {year} {authors' full names}. Adapted from {short citation}; originally published under {license version} license. Available from: {DOI}
\n\nReposting & sharing:
\n\nOriginally published in {full citation}. Available from: {DOI}
\n\nRepublishing – More about Attribution Policy can be found here.
\n\nThe same principles apply to Works published under the CC BY-NC-SA 3.0 license, with the caveats that (1) the content may not be used for commercial purposes, and (2) derivative works building on this content must be distributed under the same license. The restrictions contained in these license terms may, however, be waived by the copyright holder(s). Users wishing to circumvent any of the license terms are required to obtain explicit permission to do so from the copyright holder(s).
\n\nDISCLAIMER: Neither the CC BY 3.0 license, CC BY 4.0, nor any other license IntechOpen currently uses or has used before, applies to figures and tables reproduced from other works, as they may be subject to different terms of reuse. In such cases, if the copyright holder is not noted in the source of a figure or table, it is the responsibility of the User to investigate and determine the exact copyright status of any information utilised. Users requiring assistance in that regard are welcome to send an inquiry to permissions@intechopen.com.
\n\nAll rights to Books and Journals and all other compilations published on the IntechOpen platform and in print are reserved by IntechOpen.
\n\nThe copyright to Books, Journals and other compilations is subject to separate copyright from those that exist in the included Works.
\n\nAll Long Form Monographs/Compacts are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license granted to all others.
\n\nCopyright to the individual Works (Chapters) belongs to their specific Authors, subject to an agreement with IntechOpen and the Creative Common license granted to all others to:
\n\nUnder the following terms:
\n\nThere must be an Attribution, giving appropriate credit, provision of a link to the license, and indication if any changes were made.
\n\nNonCommercial - The use of the material for commercial purposes is prohibited. Commercial rights are reserved to IntechOpen or its licensees.
\n\nNo additional restrictions that apply legal terms or technological measures that restrict others from doing anything the license permits are allowed.
\n\nThe CC BY-NC 4.0 license permits Works to be freely shared in any medium or format, as well as reuse and adaptation of the original contents of Works (e.g. figures and tables created by the Authors), as long as it is not used for commercial purposes. The source Work must be cited and its Authors acknowledged in the following manner:
\n\nContent reuse:
\n\n© {year} {authors' full names}. Originally published in {short citation} under {license version} license. Available from: {DOI}
\n\nContent adaptation & reuse:
\n\n© {year} {authors' full names}. Adapted from {short citation}; originally published under {license version} license. Available from: {DOI}
\n\nReposting & sharing:
\n\nOriginally published in {full citation}. Available from: {DOI}
\n\nAll Book cover design elements, as well as Video image graphics are subject to copyright by IntechOpen.
\n\nEvery reproduction of a front cover image must be accompanied by an appropriate Copyright Notice displayed adjacent to the image. The exact Copyright Notice depends on who the Author of a particular cover image is. Users wishing to reproduce cover images should contact permissions@intechopen.com.
\n\nAll Video Lectures under IntechOpen's production are subject to copyright and are property of IntechOpen, unless defined otherwise, and are licensed under the Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license. This grants all others the right to:
\n\nShare — copy and redistribute the material in any medium or format
\n\nUnder the following terms:
\n\nUsers wishing to repost and share the Video Lectures are welcome to do so as long as they acknowledge the source in the following manner:
\n\n© {year} IntechOpen. Published under CC BY-NC-ND 4.0 license. Available from: {DOI}
\n\nUsers wishing to reuse, modify, or adapt the Video Lectures in a way not permitted by the license are welcome to contact us at permissions@intechopen.com to discuss waiving particular license terms.
\n\nAll software used on the IntechOpen platform, any used during the publishing process, and the copyright in the code constituting such software, is the property of IntechOpen or its software suppliers. As such, it may not be downloaded or copied without permission.
\n\nUnless otherwise indicated, all IntechOpen websites are the property of IntechOpen.
\n\nAll content included on IntechOpen Websites not forming part of contributed materials (such as text, images, logos, graphics, design elements, videos, sounds, pictures, trademarks, etc.), are subject to copyright and are property of, or licensed to, IntechOpen. Any other use, including the reproduction, modification, distribution, transmission, republication, display, or performance of the content on this site is strictly prohibited.
\n\nPolicy last updated: 2016-06-08
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{"933869@":null},profiles:[],filtersByRegion:[{group:"region",caption:"North America",value:1,count:6601},{group:"region",caption:"Middle and South America",value:2,count:5906},{group:"region",caption:"Africa",value:3,count:2400},{group:"region",caption:"Asia",value:4,count:12541},{group:"region",caption:"Australia and Oceania",value:5,count:1008},{group:"region",caption:"Europe",value:6,count:17561}],offset:0,limit:12,total:null},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{sort:"dateEndThirdStepPublish",topicId:"8,6"},books:[{type:"book",id:"11645",title:"Neural Tube Defects",subtitle:null,isOpenForSubmission:!0,hash:"08d6ba70d97767769a97cfeeb52dac78",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/11645.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12075",title:"Arsenic",subtitle:null,isOpenForSubmission:!0,hash:"a1156f4143737baa68f568837f9edc94",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12075.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12076",title:"Ruthenium",subtitle:null,isOpenForSubmission:!0,hash:"08bd1ab70c296e319165eb763b112e00",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12076.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12077",title:"Heavy Metals",subtitle:null,isOpenForSubmission:!0,hash:"bcf87da8936c737e7fdd61cdc825128e",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12077.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12079",title:"Heterocycles",subtitle:null,isOpenForSubmission:!0,hash:"fcadb070d3dbdf21157b1290d9880c3e",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12079.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12080",title:"Density Functional Theory",subtitle:null,isOpenForSubmission:!0,hash:"fcd6287912c74f409babc8937c6d0fd1",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12080.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12073",title:"Solvents",subtitle:null,isOpenForSubmission:!0,hash:"d31c0b4deb8e2005ddefc42a4be8e451",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12073.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12074",title:"Updates on Titanium Dioxide",subtitle:null,isOpenForSubmission:!0,hash:"8642ed95890654474416a163e3236afb",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12074.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11561",title:"Zeolite From Wastes - New Perspectives on Innovative Resources and Their Valorization Process",subtitle:null,isOpenForSubmission:!0,hash:"3ed0dfd842de9cd1143212415903e6ad",slug:null,bookSignature:"Dr. Claudia Belviso",coverURL:"https://cdn.intechopen.com/books/images_new/11561.jpg",editedByType:null,editors:[{id:"61457",title:"Dr.",name:"Claudia",surname:"Belviso",slug:"claudia-belviso",fullName:"Claudia Belviso"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12218",title:"Phytochemicals",subtitle:null,isOpenForSubmission:!0,hash:"8cb2e6bb3d9c717bb8dc44e35ed774c2",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12218.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12174",title:"Genetic Polymorphisms",subtitle:null,isOpenForSubmission:!0,hash:"5922df051a2033c98d2edfb31dd84f8c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12174.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"12177",title:"Epigenetics",subtitle:null,isOpenForSubmission:!0,hash:"185b00910074e8beeedd2276900a911a",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/12177.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:43},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:11},{group:"topic",caption:"Business, Management and Economics",value:7,count:5},{group:"topic",caption:"Chemistry",value:8,count:23},{group:"topic",caption:"Computer and Information Science",value:9,count:21},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:17},{group:"topic",caption:"Engineering",value:11,count:62},{group:"topic",caption:"Environmental Sciences",value:12,count:9},{group:"topic",caption:"Immunology and Microbiology",value:13,count:10},{group:"topic",caption:"Materials Science",value:14,count:29},{group:"topic",caption:"Mathematics",value:15,count:10},{group:"topic",caption:"Medicine",value:16,count:122},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:9},{group:"topic",caption:"Neuroscience",value:18,count:3},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:6},{group:"topic",caption:"Physics",value:20,count:12},{group:"topic",caption:"Psychology",value:21,count:9},{group:"topic",caption:"Robotics",value:22,count:4},{group:"topic",caption:"Social Sciences",value:23,count:8},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:4}],offset:12,limit:12,total:63},popularBooks:{featuredBooks:[{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11001",title:"Density Functional Theory",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"82d53383af78ab41eb982086c02fb2bb",slug:"density-functional-theory-recent-advances-new-perspectives-and-applications",bookSignature:"Daniel Glossman-Mitnik",coverURL:"https://cdn.intechopen.com/books/images_new/11001.jpg",editors:[{id:"198499",title:"Dr.",name:"Daniel",middleName:null,surname:"Glossman-Mitnik",slug:"daniel-glossman-mitnik",fullName:"Daniel Glossman-Mitnik"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10356",title:"Natural Medicinal Plants",subtitle:null,isOpenForSubmission:!1,hash:"943e56ccaaf19ff696d25aa638ae37d6",slug:"natural-medicinal-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/10356.jpg",editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11752",title:"Natural Drugs from Plants",subtitle:null,isOpenForSubmission:!1,hash:"a0a83c0822608ef7592bf16a5ed0ada4",slug:"natural-drugs-from-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/11752.jpg",editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10853",title:"Recent Advances in Polynomials",subtitle:null,isOpenForSubmission:!1,hash:"9e8671bae09ccaa8b8e276c639a737fc",slug:"recent-advances-in-polynomials",bookSignature:"Kamal Shah",coverURL:"https://cdn.intechopen.com/books/images_new/10853.jpg",editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10676",title:"Recent Applications in Graph Theory",subtitle:null,isOpenForSubmission:!1,hash:"900c60742d224080732bd16bd25ccba8",slug:"recent-applications-in-graph-theory",bookSignature:"Harun Pirim",coverURL:"https://cdn.intechopen.com/books/images_new/10676.jpg",editors:[{id:"146092",title:"Dr.",name:"Harun",middleName:null,surname:"Pirim",slug:"harun-pirim",fullName:"Harun Pirim"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10903",title:"Genetically Modified Plants and Beyond",subtitle:null,isOpenForSubmission:!1,hash:"4d7ed4faab99c92cd4d676dc86501df9",slug:"genetically-modified-plants-and-beyond",bookSignature:"Idah Sithole Niang",coverURL:"https://cdn.intechopen.com/books/images_new/10903.jpg",editors:[{id:"90172",title:"Prof.",name:"Idah",middleName:null,surname:"Sithole-Niang",slug:"idah-sithole-niang",fullName:"Idah Sithole-Niang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10904",title:"Fusarium",subtitle:"An Overview of the Genus",isOpenForSubmission:!1,hash:"49d9063e43f94bd1517d65fbc58b93c3",slug:"fusarium-an-overview-of-the-genus",bookSignature:"Seyed Mahyar Mirmajlessi",coverURL:"https://cdn.intechopen.com/books/images_new/10904.jpg",editors:[{id:"100573",title:"Dr.",name:"Seyed Mahyar",middleName:null,surname:"Mirmajlessi",slug:"seyed-mahyar-mirmajlessi",fullName:"Seyed Mahyar Mirmajlessi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10871",title:"Computed-Tomography (CT) Scan",subtitle:null,isOpenForSubmission:!1,hash:"966d8cf74fa27eea1b9cbc9a6ee94993",slug:"computed-tomography-ct-scan",bookSignature:"Reda R. Gharieb",coverURL:"https://cdn.intechopen.com/books/images_new/10871.jpg",editors:[{id:"225387",title:"Prof.",name:"Reda R.",middleName:"R.",surname:"Gharieb",slug:"reda-r.-gharieb",fullName:"Reda R. Gharieb"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11196",title:"New Updates in E-Learning",subtitle:null,isOpenForSubmission:!1,hash:"6afaadf68e2a0a4b370ac5ceb5ca89c6",slug:"new-updates-in-e-learning",bookSignature:"Eduard Babulak",coverURL:"https://cdn.intechopen.com/books/images_new/11196.jpg",editors:[{id:"10086",title:"Prof.",name:"Eduard",middleName:null,surname:"Babulak",slug:"eduard-babulak",fullName:"Eduard Babulak"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4387},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",publishedDate:"May 18th 2022",numberOfDownloads:3340,editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11001",title:"Density Functional Theory",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"82d53383af78ab41eb982086c02fb2bb",slug:"density-functional-theory-recent-advances-new-perspectives-and-applications",bookSignature:"Daniel Glossman-Mitnik",coverURL:"https://cdn.intechopen.com/books/images_new/11001.jpg",publishedDate:"May 18th 2022",numberOfDownloads:1845,editors:[{id:"198499",title:"Dr.",name:"Daniel",middleName:null,surname:"Glossman-Mitnik",slug:"daniel-glossman-mitnik",fullName:"Daniel Glossman-Mitnik"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",publishedDate:"May 18th 2022",numberOfDownloads:1096,editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",publishedDate:"May 18th 2022",numberOfDownloads:995,editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10356",title:"Natural Medicinal Plants",subtitle:null,isOpenForSubmission:!1,hash:"943e56ccaaf19ff696d25aa638ae37d6",slug:"natural-medicinal-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/10356.jpg",publishedDate:"May 11th 2022",numberOfDownloads:3791,editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"11752",title:"Natural Drugs from Plants",subtitle:null,isOpenForSubmission:!1,hash:"a0a83c0822608ef7592bf16a5ed0ada4",slug:"natural-drugs-from-plants",bookSignature:"Hany A. El-Shemy",coverURL:"https://cdn.intechopen.com/books/images_new/11752.jpg",publishedDate:"May 11th 2022",numberOfDownloads:2982,editors:[{id:"54719",title:"Prof.",name:"Hany",middleName:null,surname:"El-Shemy",slug:"hany-el-shemy",fullName:"Hany El-Shemy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10853",title:"Recent Advances in Polynomials",subtitle:null,isOpenForSubmission:!1,hash:"9e8671bae09ccaa8b8e276c639a737fc",slug:"recent-advances-in-polynomials",bookSignature:"Kamal Shah",coverURL:"https://cdn.intechopen.com/books/images_new/10853.jpg",publishedDate:"May 18th 2022",numberOfDownloads:559,editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10676",title:"Recent Applications in Graph Theory",subtitle:null,isOpenForSubmission:!1,hash:"900c60742d224080732bd16bd25ccba8",slug:"recent-applications-in-graph-theory",bookSignature:"Harun Pirim",coverURL:"https://cdn.intechopen.com/books/images_new/10676.jpg",publishedDate:"May 18th 2022",numberOfDownloads:546,editors:[{id:"146092",title:"Dr.",name:"Harun",middleName:null,surname:"Pirim",slug:"harun-pirim",fullName:"Harun Pirim"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10903",title:"Genetically Modified Plants and Beyond",subtitle:null,isOpenForSubmission:!1,hash:"4d7ed4faab99c92cd4d676dc86501df9",slug:"genetically-modified-plants-and-beyond",bookSignature:"Idah Sithole Niang",coverURL:"https://cdn.intechopen.com/books/images_new/10903.jpg",publishedDate:"May 18th 2022",numberOfDownloads:539,editors:[{id:"90172",title:"Prof.",name:"Idah",middleName:null,surname:"Sithole-Niang",slug:"idah-sithole-niang",fullName:"Idah Sithole-Niang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10904",title:"Fusarium",subtitle:"An Overview of the Genus",isOpenForSubmission:!1,hash:"49d9063e43f94bd1517d65fbc58b93c3",slug:"fusarium-an-overview-of-the-genus",bookSignature:"Seyed Mahyar Mirmajlessi",coverURL:"https://cdn.intechopen.com/books/images_new/10904.jpg",publishedDate:"May 18th 2022",numberOfDownloads:535,editors:[{id:"100573",title:"Dr.",name:"Seyed Mahyar",middleName:null,surname:"Mirmajlessi",slug:"seyed-mahyar-mirmajlessi",fullName:"Seyed Mahyar Mirmajlessi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"10251",title:"Plankton Communities",subtitle:null,isOpenForSubmission:!1,hash:"e11e441ca2d2d5f631b1b4704505cfb6",slug:"plankton-communities",bookSignature:"Leonel Pereira and Ana Marta Gonçalves",coverURL:"https://cdn.intechopen.com/books/images_new/10251.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"279788",title:"Dr.",name:"Leonel",middleName:null,surname:"Pereira",slug:"leonel-pereira",fullName:"Leonel Pereira"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10830",title:"Animal Feed Science and Nutrition",subtitle:"Production, Health and Environment",isOpenForSubmission:!1,hash:"79944fc8fbbaa329aed6fde388154832",slug:"animal-feed-science-and-nutrition-production-health-and-environment",bookSignature:"Amlan Kumar Patra",coverURL:"https://cdn.intechopen.com/books/images_new/10830.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"310962",title:"Dr.",name:"Amlan",middleName:"Kumar",surname:"Patra",slug:"amlan-patra",fullName:"Amlan Patra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10853",title:"Recent Advances in Polynomials",subtitle:null,isOpenForSubmission:!1,hash:"9e8671bae09ccaa8b8e276c639a737fc",slug:"recent-advances-in-polynomials",bookSignature:"Kamal Shah",coverURL:"https://cdn.intechopen.com/books/images_new/10853.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10871",title:"Computed-Tomography (CT) Scan",subtitle:null,isOpenForSubmission:!1,hash:"966d8cf74fa27eea1b9cbc9a6ee94993",slug:"computed-tomography-ct-scan",bookSignature:"Reda R. Gharieb",coverURL:"https://cdn.intechopen.com/books/images_new/10871.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"225387",title:"Prof.",name:"Reda R.",middleName:"R.",surname:"Gharieb",slug:"reda-r.-gharieb",fullName:"Reda R. Gharieb"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10903",title:"Genetically Modified Plants and Beyond",subtitle:null,isOpenForSubmission:!1,hash:"4d7ed4faab99c92cd4d676dc86501df9",slug:"genetically-modified-plants-and-beyond",bookSignature:"Idah Sithole Niang",coverURL:"https://cdn.intechopen.com/books/images_new/10903.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"90172",title:"Prof.",name:"Idah",middleName:null,surname:"Sithole-Niang",slug:"idah-sithole-niang",fullName:"Idah Sithole-Niang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10904",title:"Fusarium",subtitle:"An Overview of the Genus",isOpenForSubmission:!1,hash:"49d9063e43f94bd1517d65fbc58b93c3",slug:"fusarium-an-overview-of-the-genus",bookSignature:"Seyed Mahyar Mirmajlessi",coverURL:"https://cdn.intechopen.com/books/images_new/10904.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"100573",title:"Dr.",name:"Seyed Mahyar",middleName:null,surname:"Mirmajlessi",slug:"seyed-mahyar-mirmajlessi",fullName:"Seyed Mahyar Mirmajlessi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10654",title:"Brain-Computer Interface",subtitle:null,isOpenForSubmission:!1,hash:"a5308884068cc53ed31c6baba756857f",slug:"brain-computer-interface",bookSignature:"Vahid Asadpour",coverURL:"https://cdn.intechopen.com/books/images_new/10654.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"165328",title:"Dr.",name:"Vahid",middleName:null,surname:"Asadpour",slug:"vahid-asadpour",fullName:"Vahid Asadpour"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10676",title:"Recent Applications in Graph Theory",subtitle:null,isOpenForSubmission:!1,hash:"900c60742d224080732bd16bd25ccba8",slug:"recent-applications-in-graph-theory",bookSignature:"Harun Pirim",coverURL:"https://cdn.intechopen.com/books/images_new/10676.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"146092",title:"Dr.",name:"Harun",middleName:null,surname:"Pirim",slug:"harun-pirim",fullName:"Harun Pirim"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"11196",title:"New Updates in E-Learning",subtitle:null,isOpenForSubmission:!1,hash:"6afaadf68e2a0a4b370ac5ceb5ca89c6",slug:"new-updates-in-e-learning",bookSignature:"Eduard Babulak",coverURL:"https://cdn.intechopen.com/books/images_new/11196.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"10086",title:"Prof.",name:"Eduard",middleName:null,surname:"Babulak",slug:"eduard-babulak",fullName:"Eduard Babulak"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9974",title:"E-Learning and Digital Education in the Twenty-First Century",subtitle:null,isOpenForSubmission:!1,hash:"88b58d66e975df20425fc1dfd22d53aa",slug:"e-learning-and-digital-education-in-the-twenty-first-century",bookSignature:"M. Mahruf C. Shohel",coverURL:"https://cdn.intechopen.com/books/images_new/9974.jpg",editedByType:"Edited by",publishedDate:"May 18th 2022",editors:[{id:"94099",title:"Dr.",name:"M. Mahruf C.",middleName:null,surname:"Shohel",slug:"m.-mahruf-c.-shohel",fullName:"M. Mahruf C. Shohel"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"263",title:"Archaeology",slug:"archaeology",parent:{id:"23",title:"Social Sciences",slug:"social-sciences"},numberOfBooks:3,numberOfSeries:0,numberOfAuthorsAndEditors:62,numberOfWosCitations:40,numberOfCrossrefCitations:30,numberOfDimensionsCitations:69,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicId:"263",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"9251",title:"Pleistocene Archaeology",subtitle:"Migration, Technology, and Adaptation",isOpenForSubmission:!1,hash:"65e1040ad23f0385a56f2d0472b4aee5",slug:"pleistocene-archaeology-migration-technology-and-adaptation",bookSignature:"Rintaro Ono and Alfred Pawlik",coverURL:"https://cdn.intechopen.com/books/images_new/9251.jpg",editedByType:"Edited by",editors:[{id:"177123",title:"Dr.",name:"Rintaro",middleName:null,surname:"Ono",slug:"rintaro-ono",fullName:"Rintaro Ono"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7699",title:"Advanced Methods and New Materials for Cultural Heritage Preservation",subtitle:null,isOpenForSubmission:!1,hash:"4e4bd9a9b8cef15b9739f45ef05927c8",slug:"advanced-methods-and-new-materials-for-cultural-heritage-preservation",bookSignature:"Daniela Turcanu-Carutiu and Rodica-Mariana Ion",coverURL:"https://cdn.intechopen.com/books/images_new/7699.jpg",editedByType:"Edited by",editors:[{id:"176482",title:"Prof.",name:"Daniela",middleName:null,surname:"Turcanu-Carutiu",slug:"daniela-turcanu-carutiu",fullName:"Daniela Turcanu-Carutiu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1999",title:"Archaeology",subtitle:"New Approaches in Theory and Techniques",isOpenForSubmission:!1,hash:"ec63f4de8c846ec578d2bca6cbf35ac2",slug:"archaeology-new-approaches-in-theory-and-techniques",bookSignature:"Imma Ollich-Castanyer",coverURL:"https://cdn.intechopen.com/books/images_new/1999.jpg",editedByType:"Edited by",editors:[{id:"118972",title:"Dr.",name:"Imma",middleName:null,surname:"Ollich-Castanyer",slug:"imma-ollich-castanyer",fullName:"Imma Ollich-Castanyer"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:3,seriesByTopicCollection:[],seriesByTopicTotal:0,mostCitedChapters:[{id:"36571",doi:"10.5772/38066",title:"Archaeometallurgical Investigation of Iron Artifacts from Shipwrecks - A Review",slug:"archaeometallurgical-investigation-of-iron-artifacts-from-shipwrecks-a-review",totalDownloads:5219,totalCrossrefCites:3,totalDimensionsCites:13,abstract:null,book:{id:"1999",slug:"archaeology-new-approaches-in-theory-and-techniques",title:"Archaeology",fullTitle:"Archaeology, New Approaches in Theory and Techniques"},signatures:"D. Ashkenazi, E. Mentovich, D. Cvikel, O. Barkai, A. Aronson and Y. Kahanov",authors:[{id:"115412",title:"Dr.",name:"Dana",middleName:null,surname:"Ashkenazi",slug:"dana-ashkenazi",fullName:"Dana Ashkenazi"},{id:"115414",title:"Dr.",name:"Elad",middleName:null,surname:"Mentovich",slug:"elad-mentovich",fullName:"Elad Mentovich"},{id:"115415",title:"Dr.",name:"Yaacov",middleName:null,surname:"Kahanov",slug:"yaacov-kahanov",fullName:"Yaacov Kahanov"},{id:"115416",title:"Dr.",name:"Deborah",middleName:null,surname:"Cvikel",slug:"deborah-cvikel",fullName:"Deborah Cvikel"},{id:"115419",title:"MSc.",name:"Ofra",middleName:null,surname:"Barkai",slug:"ofra-barkai",fullName:"Ofra Barkai"},{id:"115420",title:"BSc.",name:"Ayal",middleName:null,surname:"Aronson",slug:"ayal-aronson",fullName:"Ayal Aronson"}]},{id:"63772",doi:"10.5772/intechopen.80975",title:"Cultural Heritage in Marker-Less Augmented Reality: A Survey",slug:"cultural-heritage-in-marker-less-augmented-reality-a-survey",totalDownloads:1631,totalCrossrefCites:6,totalDimensionsCites:9,abstract:"Augmented reality (AR) is considered as one of the most significant technologies in the field of computer graphics and is utilised in many applications. In this chapter, we have presented a brief comprehensive survey of cultural heritage using augmented reality systems. This survey describes the main objectives and characteristics of marker-less augmented reality systems through presenting up-to-date research results in this area. We describe the marker-less technologies in the area of AR, indoor marker-less AR, outdoor marker-less AR, real-time solutions to the tracking problem, real-time registration, cultural heritage in AR, 3D remonstration techniques, as well as presenting the problems in each research.",book:{id:"7699",slug:"advanced-methods-and-new-materials-for-cultural-heritage-preservation",title:"Advanced Methods and New Materials for Cultural Heritage Preservation",fullTitle:"Advanced Methods and New Materials for Cultural Heritage Preservation"},signatures:"Hoshang Kolivand, Abdennour El Rhalibi, Mostafa Tajdini, Sarmad Abdulazeez\nand Pisit Praiwattana",authors:[{id:"151219",title:"Prof.",name:"Abdennour",middleName:null,surname:"El Rhalibi",slug:"abdennour-el-rhalibi",fullName:"Abdennour El Rhalibi"},{id:"225824",title:"Dr.",name:"Hoshang",middleName:null,surname:"Kolivand",slug:"hoshang-kolivand",fullName:"Hoshang Kolivand"},{id:"256916",title:"Dr.",name:"Sarmad",middleName:null,surname:"Abdulazeez",slug:"sarmad-abdulazeez",fullName:"Sarmad Abdulazeez"},{id:"256917",title:"Dr.",name:"Pisit",middleName:null,surname:"Praiwattana",slug:"pisit-praiwattana",fullName:"Pisit Praiwattana"},{id:"289071",title:"Dr.",name:"Mostafa",middleName:null,surname:"Tajdini",slug:"mostafa-tajdini",fullName:"Mostafa Tajdini"}]},{id:"36570",doi:"10.5772/45619",title:"Archaeological Geophysics - From Basics to New Perspectives",slug:"archaeological-geophysics-from-basics-to-new-perspectives",totalDownloads:6563,totalCrossrefCites:4,totalDimensionsCites:8,abstract:null,book:{id:"1999",slug:"archaeology-new-approaches-in-theory-and-techniques",title:"Archaeology",fullTitle:"Archaeology, New Approaches in Theory and Techniques"},signatures:"Roger Sala, Ekhine Garcia and Robert Tamba",authors:[{id:"131865",title:"Dr.",name:"Roger",middleName:null,surname:"Sala",slug:"roger-sala",fullName:"Roger Sala"}]},{id:"36574",doi:"10.5772/37679",title:"The Study of Shell Object Manufacturing Techniques from the Perspective of Experimental Archaeology and Work Traces",slug:"the-study-of-shell-object-manufacturing-techniques-from-the-perspective-of-experimental-archaeology-",totalDownloads:3119,totalCrossrefCites:1,totalDimensionsCites:5,abstract:null,book:{id:"1999",slug:"archaeology-new-approaches-in-theory-and-techniques",title:"Archaeology",fullTitle:"Archaeology, New Approaches in Theory and Techniques"},signatures:"Adrián Velázquez-Castro",authors:[{id:"113840",title:"Dr.",name:"Adrian",middleName:null,surname:"Velazquez",slug:"adrian-velazquez",fullName:"Adrian Velazquez"}]},{id:"70612",doi:"10.5772/intechopen.89154",title:"The Technological Diversity of Lithic Industries in Eastern South America during the Late Pleistocene-Holocene Transition",slug:"the-technological-diversity-of-lithic-industries-in-eastern-south-america-during-the-late-pleistocen",totalDownloads:684,totalCrossrefCites:1,totalDimensionsCites:4,abstract:"Brazilian archaeological literature has insisted for decades upon associating hunter-gatherer sites dated to the Pleistocene–Holocene transition either to the Itaparica tradition, if located in central or northeastern Brazil, or to the Umbu tradition and Humaitá tradition, if located in southern Brazil, Uruguay, or any other adjacent part of Paraguay and Argentina. These associations have been based almost entirely on the presence or absence of lesmas and “projectile points,” regardless of their morphological and technological features. In the Uruguayan archaeological literature, three other cultures are recognised: Fell industry, Catalanense industry, and Tigre tradition, all in the Uruguayan region. However, the last 10 years of systematic studies on the lithic assemblages from these sites have shown that Paleoindian societies from Eastern South America are more culturally diverse than expected and that previously defined archaeological cultures present several issues in their definition, suggesting that many of these “traditions” are not valid and should no longer be used. Instead, new lithic industries and archaeological cultures should be defined only when cultural patterns are observable through systematic analyses.",book:{id:"9251",slug:"pleistocene-archaeology-migration-technology-and-adaptation",title:"Pleistocene Archaeology",fullTitle:"Pleistocene Archaeology - Migration, Technology, and Adaptation"},signatures:"João Carlos Moreno De Sousa",authors:[{id:"303361",title:"Dr.",name:"João Carlos",middleName:null,surname:"Moreno De Sousa",slug:"joao-carlos-moreno-de-sousa",fullName:"João Carlos Moreno De Sousa"}]}],mostDownloadedChaptersLast30Days:[{id:"36570",title:"Archaeological Geophysics - From Basics to New Perspectives",slug:"archaeological-geophysics-from-basics-to-new-perspectives",totalDownloads:6552,totalCrossrefCites:4,totalDimensionsCites:8,abstract:null,book:{id:"1999",slug:"archaeology-new-approaches-in-theory-and-techniques",title:"Archaeology",fullTitle:"Archaeology, New Approaches in Theory and Techniques"},signatures:"Roger Sala, Ekhine Garcia and Robert Tamba",authors:[{id:"131865",title:"Dr.",name:"Roger",middleName:null,surname:"Sala",slug:"roger-sala",fullName:"Roger Sala"}]},{id:"36576",title:"Homage to Marcel Proust - Aspects of Dissemination and Didactic in a Museum and a Science Centre: Science Communication Visions for the Third Generation Museums",slug:"generations-of-ancient-history-dissemination-towards-the-public-at-the-university-museum-in-trondhei",totalDownloads:2644,totalCrossrefCites:1,totalDimensionsCites:1,abstract:null,book:{id:"1999",slug:"archaeology-new-approaches-in-theory-and-techniques",title:"Archaeology",fullTitle:"Archaeology, New Approaches in Theory and Techniques"},signatures:"Kistian Overskaug",authors:[{id:"117119",title:"Dr.",name:"Kristian",middleName:null,surname:"Overskaug",slug:"kristian-overskaug",fullName:"Kristian Overskaug"}]},{id:"63772",title:"Cultural Heritage in Marker-Less Augmented Reality: A Survey",slug:"cultural-heritage-in-marker-less-augmented-reality-a-survey",totalDownloads:1628,totalCrossrefCites:6,totalDimensionsCites:9,abstract:"Augmented reality (AR) is considered as one of the most significant technologies in the field of computer graphics and is utilised in many applications. In this chapter, we have presented a brief comprehensive survey of cultural heritage using augmented reality systems. This survey describes the main objectives and characteristics of marker-less augmented reality systems through presenting up-to-date research results in this area. We describe the marker-less technologies in the area of AR, indoor marker-less AR, outdoor marker-less AR, real-time solutions to the tracking problem, real-time registration, cultural heritage in AR, 3D remonstration techniques, as well as presenting the problems in each research.",book:{id:"7699",slug:"advanced-methods-and-new-materials-for-cultural-heritage-preservation",title:"Advanced Methods and New Materials for Cultural Heritage Preservation",fullTitle:"Advanced Methods and New Materials for Cultural Heritage Preservation"},signatures:"Hoshang Kolivand, Abdennour El Rhalibi, Mostafa Tajdini, Sarmad Abdulazeez\nand Pisit Praiwattana",authors:[{id:"151219",title:"Prof.",name:"Abdennour",middleName:null,surname:"El Rhalibi",slug:"abdennour-el-rhalibi",fullName:"Abdennour El Rhalibi"},{id:"225824",title:"Dr.",name:"Hoshang",middleName:null,surname:"Kolivand",slug:"hoshang-kolivand",fullName:"Hoshang Kolivand"},{id:"256916",title:"Dr.",name:"Sarmad",middleName:null,surname:"Abdulazeez",slug:"sarmad-abdulazeez",fullName:"Sarmad Abdulazeez"},{id:"256917",title:"Dr.",name:"Pisit",middleName:null,surname:"Praiwattana",slug:"pisit-praiwattana",fullName:"Pisit Praiwattana"},{id:"289071",title:"Dr.",name:"Mostafa",middleName:null,surname:"Tajdini",slug:"mostafa-tajdini",fullName:"Mostafa Tajdini"}]},{id:"73769",title:"Human Evolution in the Center of the Old World: An Updated Review of the South Asian Paleolithic",slug:"human-evolution-in-the-center-of-the-old-world-an-updated-review-of-the-south-asian-paleolithic",totalDownloads:847,totalCrossrefCites:0,totalDimensionsCites:1,abstract:"The Indian Subcontinent was an important geographic region for faunal and hominin evolution in Asia. While the Oldowan as the earliest technocomplex continues to be elusive, the oldest Acheulean is dated to ~1.5 Ma and the early Middle Paleolithic is ~385 ka (from the same site). New Late Pleistocene dates have been reported for the Middle Paleolithic which continues up to 38 Ka in southern India. The Upper Paleolithic remains ambiguous and requires critically multidisciplinary investigations. The microlithic evidence appears to spread rapidly across the subcontinent soon after its emergence at ~48 Ka (though its origin is debated) and continues into the Iron Age. The timeline of the initial arrival of Homo sapiens continues to be debated based on the archaeology (advanced Middle Paleolithic vs. microlithic) and genetic studies on indigenous groups. Other issues that need consideration are: interactions between archaics and arriving moderns, the marginal occurrence of symbolic behavior, the absolute dating of rock art and the potential role of hominins in specific animal extinctions and ecological marginalization. The region does not appear to have been a corridor for dispersals towards Southeast Asia (although gene flow may have occurred). Instead, once various prehistoric technologies appeared in the Subcontinent, they possibly followed complex trajectories within relative isolation.",book:{id:"9251",slug:"pleistocene-archaeology-migration-technology-and-adaptation",title:"Pleistocene Archaeology",fullTitle:"Pleistocene Archaeology - Migration, Technology, and Adaptation"},signatures:"Parth R. Chauhan",authors:[{id:"307040",title:"Dr.",name:"Parth",middleName:null,surname:"Chauhan",slug:"parth-chauhan",fullName:"Parth Chauhan"}]},{id:"73386",title:"Island Migration, Resource Use, and Lithic Technology by Anatomically Modern Humans in Wallacea",slug:"island-migration-resource-use-and-lithic-technology-by-anatomically-modern-humans-in-wallacea",totalDownloads:725,totalCrossrefCites:1,totalDimensionsCites:3,abstract:"Island migration and adaptation including both marine and terrestrial resource use and technological development by anatomically modern humans (AMH) are among the most significant issues for Pleistocene archaeology in Southeast Asia and Oceania, and directly related to the behavioral and technological advancements by AMH. This paper discusses such cases in the Wallacean islands, located between the past Sundaland and the Sahul continent during the Pleistocene. The Pleistocene open sea gaps between the Wallacean islands and both landmasses are very likely the major factor for the relative scarcity of animal species originating from Asia and Oceania and the high diversity of endemic species in Wallacea. They were also a barrier for hominin migration into the Wallacean islands and Sahul continent. We summarize three recent excavation results on the Talaud Islands, Sulawesi Island and Mindoro Island in Wallacea region and discuss the evidence and timeline for migrations of early modern humans into the Wallacean islands and their adaptation to island environments during the Pleistocene.",book:{id:"9251",slug:"pleistocene-archaeology-migration-technology-and-adaptation",title:"Pleistocene Archaeology",fullTitle:"Pleistocene Archaeology - Migration, Technology, and Adaptation"},signatures:"Rintaro Ono, Alfred Pawlik and Riczar Fuentes",authors:[{id:"177123",title:"Dr.",name:"Rintaro",middleName:null,surname:"Ono",slug:"rintaro-ono",fullName:"Rintaro Ono"},{id:"300616",title:"Dr.",name:"Alfred",middleName:null,surname:"Pawlik",slug:"alfred-pawlik",fullName:"Alfred Pawlik"},{id:"330591",title:"Dr.",name:"Riczar",middleName:null,surname:"Fuentes",slug:"riczar-fuentes",fullName:"Riczar Fuentes"}]}],onlineFirstChaptersFilter:{topicId:"263",limit:6,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},subscriptionForm:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[],offset:8,limit:8,total:0},allSeries:{pteSeriesList:[{id:"14",title:"Artificial Intelligence",numberOfPublishedBooks:9,numberOfPublishedChapters:87,numberOfOpenTopics:6,numberOfUpcomingTopics:0,issn:"2633-1403",doi:"10.5772/intechopen.79920",isOpenForSubmission:!0},{id:"7",title:"Biomedical Engineering",numberOfPublishedBooks:12,numberOfPublishedChapters:98,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2631-5343",doi:"10.5772/intechopen.71985",isOpenForSubmission:!0}],lsSeriesList:[{id:"11",title:"Biochemistry",numberOfPublishedBooks:27,numberOfPublishedChapters:287,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2632-0983",doi:"10.5772/intechopen.72877",isOpenForSubmission:!0},{id:"25",title:"Environmental Sciences",numberOfPublishedBooks:1,numberOfPublishedChapters:9,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2754-6713",doi:"10.5772/intechopen.100362",isOpenForSubmission:!0},{id:"10",title:"Physiology",numberOfPublishedBooks:11,numberOfPublishedChapters:139,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-8261",doi:"10.5772/intechopen.72796",isOpenForSubmission:!0}],hsSeriesList:[{id:"3",title:"Dentistry",numberOfPublishedBooks:8,numberOfPublishedChapters:129,numberOfOpenTopics:0,numberOfUpcomingTopics:2,issn:"2631-6218",doi:"10.5772/intechopen.71199",isOpenForSubmission:!1},{id:"6",title:"Infectious Diseases",numberOfPublishedBooks:13,numberOfPublishedChapters:107,numberOfOpenTopics:3,numberOfUpcomingTopics:1,issn:"2631-6188",doi:"10.5772/intechopen.71852",isOpenForSubmission:!0},{id:"13",title:"Veterinary Medicine and Science",numberOfPublishedBooks:10,numberOfPublishedChapters:103,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2632-0517",doi:"10.5772/intechopen.73681",isOpenForSubmission:!0}],sshSeriesList:[{id:"22",title:"Business, Management and Economics",numberOfPublishedBooks:1,numberOfPublishedChapters:12,numberOfOpenTopics:2,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100359",isOpenForSubmission:!0},{id:"23",title:"Education and Human Development",numberOfPublishedBooks:0,numberOfPublishedChapters:0,numberOfOpenTopics:2,numberOfUpcomingTopics:0,issn:null,doi:"10.5772/intechopen.100360",isOpenForSubmission:!1},{id:"24",title:"Sustainable Development",numberOfPublishedBooks:0,numberOfPublishedChapters:10,numberOfOpenTopics:4,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100361",isOpenForSubmission:!0}],testimonialsList:[{id:"6",text:"It is great to work with the IntechOpen to produce a worthwhile collection of research that also becomes a great educational resource and guide for future research endeavors.",author:{id:"259298",name:"Edward",surname:"Narayan",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/259298/images/system/259298.jpeg",slug:"edward-narayan",institution:{id:"3",name:"University of Queensland",country:{id:null,name:"Australia"}}}},{id:"13",text:"The collaboration with and support of the technical staff of IntechOpen is fantastic. The whole process of submitting an article and editing of the submitted article goes extremely smooth and fast, the number of reads and downloads of chapters is high, and the contributions are also frequently cited.",author:{id:"55578",name:"Antonio",surname:"Jurado-Navas",institutionString:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRisIQAS/Profile_Picture_1626166543950",slug:"antonio-jurado-navas",institution:{id:"720",name:"University of Malaga",country:{id:null,name:"Spain"}}}}]},series:{item:{id:"13",title:"Veterinary Medicine and Science",doi:"10.5772/intechopen.73681",issn:"2632-0517",scope:"Paralleling similar advances in the medical field, astounding advances occurred in Veterinary Medicine and Science in recent decades. These advances have helped foster better support for animal health, more humane animal production, and a better understanding of the physiology of endangered species to improve the assisted reproductive technologies or the pathogenesis of certain diseases, where animals can be used as models for human diseases (like cancer, degenerative diseases or fertility), and even as a guarantee of public health. Bridging Human, Animal, and Environmental health, the holistic and integrative “One Health” concept intimately associates the developments within those fields, projecting its advancements into practice. This book series aims to tackle various animal-related medicine and sciences fields, providing thematic volumes consisting of high-quality significant research directed to researchers and postgraduates. It aims to give us a glimpse into the new accomplishments in the Veterinary Medicine and Science field. By addressing hot topics in veterinary sciences, we aim to gather authoritative texts within each issue of this series, providing in-depth overviews and analysis for graduates, academics, and practitioners and foreseeing a deeper understanding of the subject. Forthcoming texts, written and edited by experienced researchers from both industry and academia, will also discuss scientific challenges faced today in Veterinary Medicine and Science. In brief, we hope that books in this series will provide accessible references for those interested or working in this field and encourage learning in a range of different topics.",coverUrl:"https://cdn.intechopen.com/series/covers/13.jpg",latestPublicationDate:"May 18th, 2022",hasOnlineFirst:!0,numberOfPublishedBooks:10,editor:{id:"38652",title:"Dr.",name:"Rita",middleName:null,surname:"Payan-Carreira",slug:"rita-payan-carreira",fullName:"Rita Payan-Carreira",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRiFPQA0/Profile_Picture_1614601496313",biography:"Rita Payan Carreira earned her Veterinary Degree from the Faculty of Veterinary Medicine in Lisbon, Portugal, in 1985. She obtained her Ph.D. in Veterinary Sciences from the University of Trás-os-Montes e Alto Douro, Portugal. After almost 32 years of teaching at the University of Trás-os-Montes and Alto Douro, she recently moved to the University of Évora, Department of Veterinary Medicine, where she teaches in the field of Animal Reproduction and Clinics. Her primary research areas include the molecular markers of the endometrial cycle and the embryo–maternal interaction, including oxidative stress and the reproductive physiology and disorders of sexual development, besides the molecular determinants of male and female fertility. She often supervises students preparing their master's or doctoral theses. She is also a frequent referee for various journals.",institutionString:null,institution:{name:"University of Évora",institutionURL:null,country:{name:"Portugal"}}},editorTwo:null,editorThree:null},subseries:{paginationCount:3,paginationItems:[{id:"19",title:"Animal Science",coverUrl:"https://cdn.intechopen.com/series_topics/covers/19.jpg",isOpenForSubmission:!0,editor:{id:"259298",title:"Dr.",name:"Edward",middleName:null,surname:"Narayan",slug:"edward-narayan",fullName:"Edward Narayan",profilePictureURL:"https://mts.intechopen.com/storage/users/259298/images/system/259298.jpeg",biography:"Dr. Edward Narayan graduated with Ph.D. degree in Biology from the University of the South Pacific and pioneered non-invasive reproductive and stress endocrinology tools for amphibians - the novel development and validation of non-invasive enzyme immunoassays for the evaluation of reproductive hormonal cycle and stress hormone responses to environmental stressors. \nDr. Narayan leads the Stress Lab (Comparative Physiology and Endocrinology) at the University of Queensland. A dynamic career research platform which is based on the thematic areas of comparative vertebrate physiology, stress endocrinology, reproductive endocrinology, animal health and welfare, and conservation biology. \nEdward has supervised 40 research students and published over 60 peer reviewed research.",institutionString:null,institution:{name:"University of Queensland",institutionURL:null,country:{name:"Australia"}}},editorTwo:null,editorThree:null},{id:"20",title:"Animal Nutrition",coverUrl:"https://cdn.intechopen.com/series_topics/covers/20.jpg",isOpenForSubmission:!0,editor:{id:"175967",title:"Dr.",name:"Manuel",middleName:null,surname:"Gonzalez Ronquillo",slug:"manuel-gonzalez-ronquillo",fullName:"Manuel Gonzalez Ronquillo",profilePictureURL:"https://mts.intechopen.com/storage/users/175967/images/system/175967.png",biography:"Dr. Manuel González Ronquillo obtained his doctorate degree from the University of Zaragoza, Spain, in 2001. He is a research professor at the Faculty of Veterinary Medicine and Animal Husbandry, Autonomous University of the State of Mexico. He is also a level-2 researcher. He received a Fulbright-Garcia Robles fellowship for a postdoctoral stay at the US Dairy Forage Research Center, Madison, Wisconsin, USA in 2008–2009. He received grants from Alianza del Pacifico for a stay at the University of Magallanes, Chile, in 2014, and from Consejo Nacional de Ciencia y Tecnología (CONACyT) to work in the Food and Agriculture Organization’s Animal Production and Health Division (AGA), Rome, Italy, in 2014–2015. He has collaborated with researchers from different countries and published ninety-eight journal articles. He teaches various degree courses in zootechnics, sheep production, and agricultural sciences and natural resources.\n\nDr. Ronquillo’s research focuses on the evaluation of sustainable animal diets (StAnD), using native resources of the region, decreasing carbon footprint, and applying meta-analysis and mathematical models for a better understanding of animal production.",institutionString:null,institution:{name:"Universidad Autónoma del Estado de México",institutionURL:null,country:{name:"Mexico"}}},editorTwo:null,editorThree:null},{id:"28",title:"Animal Reproductive Biology and Technology",coverUrl:"https://cdn.intechopen.com/series_topics/covers/28.jpg",isOpenForSubmission:!0,editor:{id:"177225",title:"Prof.",name:"Rosa Maria Lino Neto",middleName:null,surname:"Pereira",slug:"rosa-maria-lino-neto-pereira",fullName:"Rosa Maria Lino Neto Pereira",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bS9wkQAC/Profile_Picture_1624519982291",biography:"Rosa Maria Lino Neto Pereira (DVM, MsC, PhD and) is currently a researcher at the Genetic Resources and Biotechnology Unit of the National Institute of Agrarian and Veterinarian Research (INIAV, Portugal). She is the head of the Reproduction and Embryology Laboratories and was lecturer of Reproduction and Reproductive Biotechnologies at Veterinary Medicine Faculty. She has over 25 years of experience working in reproductive biology and biotechnology areas with a special emphasis on embryo and gamete cryopreservation, for research and animal genetic resources conservation, leading research projects with several peer-reviewed papers. Rosa Pereira is member of the ERFP-FAO Ex situ Working Group and of the Management Commission of the Portuguese Animal Germplasm Bank.",institutionString:"The National Institute for Agricultural and Veterinary Research. Portugal",institution:null},editorTwo:null,editorThree:null}]},overviewPageOFChapters:{paginationCount:19,paginationItems:[{id:"81793",title:"Canine parvovirus-2: An Emerging Threat to Young Pets",doi:"10.5772/intechopen.104846",signatures:"Mithilesh Singh, Rajendran Manikandan, Ujjwal Kumar De, Vishal Chander, Babul Rudra Paul, Saravanan Ramakrishnan and Darshini Maramreddy",slug:"canine-parvovirus-2-an-emerging-threat-to-young-pets",totalDownloads:6,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Recent Advances in Canine Medicine",coverURL:"https://cdn.intechopen.com/books/images_new/11580.jpg",subseries:{id:"19",title:"Animal Science"}}},{id:"81271",title:"The Diversity of Parvovirus Telomeres",doi:"10.5772/intechopen.102684",signatures:"Marianne Laugel, Emilie Lecomte, Eduard Ayuso, Oumeya Adjali, Mathieu Mével and Magalie Penaud-Budloo",slug:"the-diversity-of-parvovirus-telomeres",totalDownloads:23,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Recent Advances in Canine Medicine",coverURL:"https://cdn.intechopen.com/books/images_new/11580.jpg",subseries:{id:"19",title:"Animal Science"}}},{id:"79909",title:"Cryopreservation Methods and Frontiers in the Art of Freezing Life in Animal Models",doi:"10.5772/intechopen.101750",signatures:"Feda S. Aljaser",slug:"cryopreservation-methods-and-frontiers-in-the-art-of-freezing-life-in-animal-models",totalDownloads:170,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Animal Reproduction",coverURL:"https://cdn.intechopen.com/books/images_new/10664.jpg",subseries:{id:"28",title:"Animal Reproductive Biology and Technology"}}},{id:"79782",title:"Avian Reproduction",doi:"10.5772/intechopen.101185",signatures:"Kingsley Omogiade Idahor",slug:"avian-reproduction",totalDownloads:151,totalCrossrefCites:0,totalDimensionsCites:0,authors:[{name:"Kingsley O.",surname:"Idahor"}],book:{title:"Animal Reproduction",coverURL:"https://cdn.intechopen.com/books/images_new/10664.jpg",subseries:{id:"28",title:"Animal Reproductive Biology and Technology"}}}]},overviewPagePublishedBooks:{paginationCount:10,paginationItems:[{type:"book",id:"7233",title:"New Insights into Theriogenology",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7233.jpg",slug:"new-insights-into-theriogenology",publishedDate:"December 5th 2018",editedByType:"Edited by",bookSignature:"Rita Payan-Carreira",hash:"74f4147e3fb214dd050e5edd3aaf53bc",volumeInSeries:1,fullTitle:"New Insights into Theriogenology",editors:[{id:"38652",title:"Dr.",name:"Rita",middleName:null,surname:"Payan-Carreira",slug:"rita-payan-carreira",fullName:"Rita Payan-Carreira",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRiFPQA0/Profile_Picture_1614601496313",biography:"Rita Payan Carreira earned her Veterinary Degree from the Faculty of Veterinary Medicine in Lisbon, Portugal, in 1985. She obtained her Ph.D. in Veterinary Sciences from the University of Trás-os-Montes e Alto Douro, Portugal. After almost 32 years of teaching at the University of Trás-os-Montes and Alto Douro, she recently moved to the University of Évora, Department of Veterinary Medicine, where she teaches in the field of Animal Reproduction and Clinics. Her primary research areas include the molecular markers of the endometrial cycle and the embryo–maternal interaction, including oxidative stress and the reproductive physiology and disorders of sexual development, besides the molecular determinants of male and female fertility. She often supervises students preparing their master's or doctoral theses. She is also a frequent referee for various journals.",institutionString:null,institution:{name:"University of Évora",institutionURL:null,country:{name:"Portugal"}}}]},{type:"book",id:"7144",title:"Veterinary Anatomy and Physiology",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/7144.jpg",slug:"veterinary-anatomy-and-physiology",publishedDate:"March 13th 2019",editedByType:"Edited by",bookSignature:"Catrin Sian Rutland and Valentina Kubale",hash:"75cdacb570e0e6d15a5f6e69640d87c9",volumeInSeries:2,fullTitle:"Veterinary Anatomy and Physiology",editors:[{id:"202192",title:"Dr.",name:"Catrin",middleName:null,surname:"Rutland",slug:"catrin-rutland",fullName:"Catrin Rutland",profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",biography:"Catrin Rutland is an Associate Professor of Anatomy and Developmental Genetics at the University of Nottingham, UK. She obtained a BSc from the University of Derby, England, a master’s degree from Technische Universität München, Germany, and a Ph.D. from the University of Nottingham. She undertook a post-doctoral research fellowship in the School of Medicine before accepting tenure in Veterinary Medicine and Science. Dr. Rutland also obtained an MMedSci (Medical Education) and a Postgraduate Certificate in Higher Education (PGCHE). She is the author of more than sixty peer-reviewed journal articles, twelve books/book chapters, and more than 100 research abstracts in cardiovascular biology and oncology. She is a board member of the European Association of Veterinary Anatomists, Fellow of the Anatomical Society, and Senior Fellow of the Higher Education Academy. Dr. Rutland has also written popular science books for the public. https://orcid.org/0000-0002-2009-4898. www.nottingham.ac.uk/vet/people/catrin.rutland",institutionString:null,institution:{name:"University of Nottingham",institutionURL:null,country:{name:"United Kingdom"}}}]},{type:"book",id:"8524",title:"Lactation in Farm Animals",subtitle:"Biology, Physiological Basis, Nutritional Requirements, and Modelization",coverURL:"https://cdn.intechopen.com/books/images_new/8524.jpg",slug:"lactation-in-farm-animals-biology-physiological-basis-nutritional-requirements-and-modelization",publishedDate:"January 22nd 2020",editedByType:"Edited by",bookSignature:"Naceur M'Hamdi",hash:"2aa2a9a0ec13040bbf0455e34625504e",volumeInSeries:3,fullTitle:"Lactation in Farm Animals - Biology, Physiological Basis, Nutritional Requirements, and Modelization",editors:[{id:"73376",title:"Dr.",name:"Naceur",middleName:null,surname:"M'Hamdi",slug:"naceur-m'hamdi",fullName:"Naceur M'Hamdi",profilePictureURL:"https://mts.intechopen.com/storage/users/73376/images/system/73376.jpg",biography:"Naceur M’HAMDI is Associate Professor at the National Agronomic Institute of Tunisia, University of Carthage. He is also Member of the Laboratory of genetic, animal and feed resource and member of Animal science Department of INAT. He graduated from Higher School of Agriculture of Mateur, University of Carthage, in 2002 and completed his masters in 2006. Dr. M’HAMDI completed his PhD thesis in Genetic welfare indicators of dairy cattle at Higher Institute of Agronomy of Chott-Meriem, University of Sousse, in 2011. He worked as assistant Professor of Genetic, biostatistics and animal biotechnology at INAT since 2013.",institutionString:null,institution:null}]},{type:"book",id:"8460",title:"Reproductive Biology and Technology in Animals",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/8460.jpg",slug:"reproductive-biology-and-technology-in-animals",publishedDate:"April 15th 2020",editedByType:"Edited by",bookSignature:"Juan Carlos Gardón Poggi and Katy Satué Ambrojo",hash:"32ef5fe73998dd723d308225d756fa1e",volumeInSeries:4,fullTitle:"Reproductive Biology and Technology in Animals",editors:[{id:"251314",title:"Dr.",name:"Juan Carlos",middleName:null,surname:"Gardón",slug:"juan-carlos-gardon",fullName:"Juan Carlos Gardón",profilePictureURL:"https://mts.intechopen.com/storage/users/251314/images/system/251314.jpeg",biography:"Juan Carlos Gardón Poggi received University degree from the Faculty of Agrarian Science in Argentina, in 1983. Also he received Masters Degree and PhD from Córdoba University, Spain. He is currently a Professor at the Catholic University of Valencia San Vicente Mártir, at the Department of Medicine and Animal Surgery. He teaches diverse courses in the field of Animal Reproduction and he is the Director of the Veterinary Farm. He also participates in academic postgraduate activities at the Veterinary Faculty of Murcia University, Spain. His research areas include animal physiology, physiology and biotechnology of reproduction either in males or females, the study of gametes under in vitro conditions and the use of ultrasound as a complement to physiological studies and development of applied biotechnologies. Routinely, he supervises students preparing their doctoral, master thesis or final degree projects.",institutionString:"Catholic University of Valencia San Vicente Mártir, Spain",institution:null}]}]},openForSubmissionBooks:{paginationCount:1,paginationItems:[{id:"11601",title:"Econometrics - Recent Advances and Applications",coverURL:"https://cdn.intechopen.com/books/images_new/11601.jpg",hash:"bc8ab49e2cf436c217a49ca8c12a22eb",secondStepPassed:!0,currentStepOfPublishingProcess:3,submissionDeadline:"May 13th 2022",isOpenForSubmission:!0,editors:[{id:"452331",title:"Dr.",name:"Brian",surname:"Sloboda",slug:"brian-sloboda",fullName:"Brian Sloboda"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},onlineFirstChapters:{paginationCount:0,paginationItems:[]},subseriesFiltersForOFChapters:[],publishedBooks:{paginationCount:1,paginationItems:[{type:"book",id:"11392",title:"Leadership in a Changing World",subtitle:"A Multidimensional Perspective",coverURL:"https://cdn.intechopen.com/books/images_new/11392.jpg",slug:"leadership-in-a-changing-world-a-multidimensional-perspective",publishedDate:"May 11th 2022",editedByType:"Edited by",bookSignature:"Muhammad Mohiuddin, Bilal Khalid, Md. Samim Al Azad and Slimane Ed-dafali",hash:"86a6d33cf601587e591064ce92effc02",volumeInSeries:1,fullTitle:"Leadership in a Changing World - A Multidimensional Perspective",editors:[{id:"418514",title:"Dr.",name:"Muhammad",middleName:null,surname:"Mohiuddin",slug:"muhammad-mohiuddin",fullName:"Muhammad Mohiuddin",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y000038UqSfQAK/Profile_Picture_2022-05-13T10:39:03.jpg",institutionString:null,institution:{name:"Université Laval",institutionURL:null,country:{name:"Canada"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},subseriesFiltersForPublishedBooks:[{group:"subseries",caption:"Business and Management",value:86,count:1}],publicationYearFilters:[{group:"publicationYear",caption:"2022",value:2022,count:1}],authors:{paginationCount:148,paginationItems:[{id:"165328",title:"Dr.",name:"Vahid",middleName:null,surname:"Asadpour",slug:"vahid-asadpour",fullName:"Vahid Asadpour",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/165328/images/system/165328.jpg",biography:"Vahid Asadpour, MS, Ph.D., is currently with the Department of Research and Evaluation, Kaiser Permanente Southern California. He has both an MS and Ph.D. in Biomedical Engineering. He was previously a research scientist at the University of California Los Angeles (UCLA) and visiting professor and researcher at the University of North Dakota. He is currently working in artificial intelligence and its applications in medical signal processing. In addition, he is using digital signal processing in medical imaging and speech processing. Dr. Asadpour has developed brain-computer interfacing algorithms and has published books, book chapters, and several journal and conference papers in this field and other areas of intelligent signal processing. He has also designed medical devices, including a laser Doppler monitoring system.",institutionString:"Kaiser Permanente Southern California",institution:null},{id:"169608",title:"Prof.",name:"Marian",middleName:null,surname:"Găiceanu",slug:"marian-gaiceanu",fullName:"Marian Găiceanu",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/169608/images/system/169608.png",biography:"Prof. Dr. Marian Gaiceanu graduated from the Naval and Electrical Engineering Faculty, Dunarea de Jos University of Galati, Romania, in 1997. He received a Ph.D. (Magna Cum Laude) in Electrical Engineering in 2002. Since 2017, Dr. Gaiceanu has been a Ph.D. supervisor for students in Electrical Engineering. He has been employed at Dunarea de Jos University of Galati since 1996, where he is currently a professor. Dr. Gaiceanu is a member of the National Council for Attesting Titles, Diplomas and Certificates, an expert of the Executive Agency for Higher Education, Research Funding, and a member of the Senate of the Dunarea de Jos University of Galati. He has been the head of the Integrated Energy Conversion Systems and Advanced Control of Complex Processes Research Center, Romania, since 2016. He has conducted several projects in power converter systems for electrical drives, power quality, PEM and SOFC fuel cell power converters for utilities, electric vehicles, and marine applications with the Department of Regulation and Control, SIEI S.pA. (2002–2004) and the Polytechnic University of Turin, Italy (2002–2004, 2006–2007). He is a member of the Institute of Electrical and Electronics Engineers (IEEE) and cofounder-member of the IEEE Power Electronics Romanian Chapter. He is a guest editor at Energies and an academic book editor for IntechOpen. He is also a member of the editorial boards of the Journal of Electrical Engineering, Electronics, Control and Computer Science and Sustainability. Dr. Gaiceanu has been General Chairman of the IEEE International Symposium on Electrical and Electronics Engineering in the last six editions.",institutionString:'"Dunarea de Jos" University of Galati',institution:{name:'"Dunarea de Jos" University of Galati',country:{name:"Romania"}}},{id:"4519",title:"Prof.",name:"Jaydip",middleName:null,surname:"Sen",slug:"jaydip-sen",fullName:"Jaydip Sen",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/4519/images/system/4519.jpeg",biography:"Jaydip Sen is associated with Praxis Business School, Kolkata, India, as a professor in the Department of Data Science. His research areas include security and privacy issues in computing and communication, intrusion detection systems, machine learning, deep learning, and artificial intelligence in the financial domain. He has more than 200 publications in reputed international journals, refereed conference proceedings, and 20 book chapters in books published by internationally renowned publishing houses, such as Springer, CRC press, IGI Global, etc. Currently, he is serving on the editorial board of the prestigious journal Frontiers in Communications and Networks and in the technical program committees of a number of high-ranked international conferences organized by the IEEE, USA, and the ACM, USA. He has been listed among the top 2% of scientists in the world for the last three consecutive years, 2019 to 2021 as per studies conducted by the Stanford University, USA.",institutionString:"Praxis Business School",institution:null},{id:"320071",title:"Dr.",name:"Sidra",middleName:null,surname:"Mehtab",slug:"sidra-mehtab",fullName:"Sidra Mehtab",position:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y00002v6KHoQAM/Profile_Picture_1584512086360",biography:"Sidra Mehtab has completed her BS with honors in Physics from Calcutta University, India in 2018. She has done MS in Data Science and Analytics from Maulana Abul Kalam Azad University of Technology (MAKAUT), Kolkata, India in 2020. Her research areas include Econometrics, Time Series Analysis, Machine Learning, Deep Learning, Artificial Intelligence, and Computer and Network Security with a particular focus on Cyber Security Analytics. Ms. Mehtab has published seven papers in international conferences and one of her papers has been accepted for publication in a reputable international journal. She has won the best paper awards in two prestigious international conferences – BAICONF 2019, and ICADCML 2021, organized in the Indian Institute of Management, Bangalore, India in December 2019, and SOA University, Bhubaneswar, India in January 2021. Besides, Ms. Mehtab has also published two book chapters in two books. Seven of her book chapters will be published in a volume shortly in 2021 by Cambridge Scholars’ Press, UK. Currently, she is working as the joint editor of two edited volumes on Time Series Analysis and Forecasting to be published in the first half of 2021 by an international house. Currently, she is working as a Data Scientist with an MNC in Delhi, India.",institutionString:"NSHM College of Management and Technology",institution:null},{id:"226240",title:"Dr.",name:"Andri Irfan",middleName:null,surname:"Rifai",slug:"andri-irfan-rifai",fullName:"Andri Irfan Rifai",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/226240/images/7412_n.jpg",biography:"Andri IRFAN is a Senior Lecturer of Civil Engineering and Planning. He completed the PhD at the Universitas Indonesia & Universidade do Minho with Sandwich Program Scholarship from the Directorate General of Higher Education and LPDP scholarship. He has been teaching for more than 19 years and much active to applied his knowledge in the project construction in Indonesia. His research interest ranges from pavement management system to advanced data mining techniques for transportation engineering. He has published more than 50 papers in journals and 2 books.",institutionString:null,institution:{name:"Universitas Internasional Batam",country:{name:"Indonesia"}}},{id:"314576",title:"Dr.",name:"Ibai",middleName:null,surname:"Laña",slug:"ibai-lana",fullName:"Ibai Laña",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/314576/images/system/314576.jpg",biography:"Dr. Ibai Laña works at TECNALIA as a data analyst. He received his Ph.D. in Artificial Intelligence from the University of the Basque Country (UPV/EHU), Spain, in 2018. He is currently a senior researcher at TECNALIA. His research interests fall within the intersection of intelligent transportation systems, machine learning, traffic data analysis, and data science. He has dealt with urban traffic forecasting problems, applying machine learning models and evolutionary algorithms. He has experience in origin-destination matrix estimation or point of interest and trajectory detection. Working with large volumes of data has given him a good command of big data processing tools and NoSQL databases. He has also been a visiting scholar at the Knowledge Engineering and Discovery Research Institute, Auckland University of Technology.",institutionString:"TECNALIA Research & Innovation",institution:{name:"Tecnalia",country:{name:"Spain"}}},{id:"314575",title:"Dr.",name:"Jesus",middleName:null,surname:"L. Lobo",slug:"jesus-l.-lobo",fullName:"Jesus L. Lobo",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/314575/images/system/314575.png",biography:"Dr. Jesús López is currently based in Bilbao (Spain) working at TECNALIA as Artificial Intelligence Research Scientist. In most cases, a project idea or a new research line needs to be investigated to see if it is good enough to take into production or to focus on it. That is exactly what he does, diving into Machine Learning algorithms and technologies to help TECNALIA to decide whether something is great in theory or will actually impact on the product or processes of its projects. So, he is expert at framing experiments, developing hypotheses, and proving whether they’re true or not, in order to investigate fundamental problems with a longer time horizon. He is also able to design and develop PoCs and system prototypes in simulation. He has participated in several national and internacional R&D projects.\n\nAs another relevant part of his everyday research work, he usually publishes his findings in reputed scientific refereed journals and international conferences, occasionally acting as reviewer and Programme Commitee member. Concretely, since 2018 he has published 9 JCR (8 Q1) journal papers, 9 conference papers (e.g. ECML PKDD 2021), and he has co-edited a book. He is also active in popular science writing data science stories for reputed blogs (KDNuggets, TowardsDataScience, Naukas). Besides, he has recently embarked on mentoring programmes as mentor, and has also worked as data science trainer.",institutionString:"TECNALIA Research & Innovation",institution:{name:"Tecnalia",country:{name:"Spain"}}},{id:"103779",title:"Prof.",name:"Yalcin",middleName:null,surname:"Isler",slug:"yalcin-isler",fullName:"Yalcin Isler",position:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRyQ8QAK/Profile_Picture_1628834958734",biography:"Yalcin Isler (1971 - Burdur / Turkey) received the B.Sc. degree in the Department of Electrical and Electronics Engineering from Anadolu University, Eskisehir, Turkey, in 1993, the M.Sc. degree from the Department of Electronics and Communication Engineering, Suleyman Demirel University, Isparta, Turkey, in 1996, the Ph.D. degree from the Department of Electrical and Electronics Engineering, Dokuz Eylul University, Izmir, Turkey, in 2009, and the Competence of Associate Professorship from the Turkish Interuniversity Council in 2019.\n\nHe was Lecturer at Burdur Vocational School in Suleyman Demirel University (1993-2000, Burdur / Turkey), Software Engineer (2000-2002, Izmir / Turkey), Research Assistant in Bulent Ecevit University (2002-2003, Zonguldak / Turkey), Research Assistant in Dokuz Eylul University (2003-2010, Izmir / Turkey), Assistant Professor at the Department of Electrical and Electronics Engineering in Bulent Ecevit University (2010-2012, Zonguldak / Turkey), Assistant Professor at the Department of Biomedical Engineering in Izmir Katip Celebi University (2012-2019, Izmir / Turkey). He is an Associate Professor at the Department of Biomedical Engineering at Izmir Katip Celebi University, Izmir / Turkey, since 2019. In addition to academics, he has also founded Islerya Medical and Information Technologies Company, Izmir / Turkey, since 2017.\n\nHis main research interests cover biomedical signal processing, pattern recognition, medical device design, programming, and embedded systems. He has many scientific papers and participated in several projects in these study fields. He was an IEEE Student Member (2009-2011) and IEEE Member (2011-2014) and has been IEEE Senior Member since 2014.",institutionString:null,institution:{name:"Izmir Kâtip Çelebi University",country:{name:"Turkey"}}},{id:"339677",title:"Dr.",name:"Mrinmoy",middleName:null,surname:"Roy",slug:"mrinmoy-roy",fullName:"Mrinmoy Roy",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/339677/images/16768_n.jpg",biography:"An accomplished Sales & Marketing professional with 12 years of cross-functional experience in well-known organisations such as CIPLA, LUPIN, GLENMARK, ASTRAZENECA across different segment of Sales & Marketing, International Business, Institutional Business, Product Management, Strategic Marketing of HIV, Oncology, Derma, Respiratory, Anti-Diabetic, Nutraceutical & Stomatological Product Portfolio and Generic as well as Chronic Critical Care Portfolio. A First Class MBA in International Business & Strategic Marketing, B.Pharm, D.Pharm, Google Certified Digital Marketing Professional. Qualified PhD Candidate in Operations and Management with special focus on Artificial Intelligence and Machine Learning adoption, analysis and use in Healthcare, Hospital & Pharma Domain. Seasoned with diverse therapy area of Pharmaceutical Sales & Marketing ranging from generating revenue through generating prescriptions, launching new products, and making them big brands with continuous strategy execution at the Physician and Patients level. Moved from Sales to Marketing and Business Development for 3.5 years in South East Asian Market operating from Manila, Philippines. Came back to India and handled and developed Brands such as Gluconorm, Lupisulin, Supracal, Absolut Woman, Hemozink, Fabiflu (For COVID 19), and many more. In my previous assignment I used to develop and execute strategies on Sales & Marketing, Commercialization & Business Development for Institution and Corporate Hospital Business portfolio of Oncology Therapy Area for AstraZeneca Pharma India Ltd. Being a Research Scholar and Student of ‘Operations Research & Management: Artificial Intelligence’ I published several pioneer research papers and book chapters on the same in Internationally reputed journals and Books indexed in Scopus, Springer and Ei Compendex, Google Scholar etc. Currently, I am launching PGDM Pharmaceutical Management Program in IIHMR Bangalore and spearheading the course curriculum and structure of the same. I am interested in Collaboration for Healthcare Innovation, Pharma AI Innovation, Future trend in Marketing and Management with incubation on Healthcare, Healthcare IT startups, AI-ML Modelling and Healthcare Algorithm based training module development. I am also an affiliated member of the Institute of Management Consultant of India, looking forward to Healthcare, Healthcare IT and Innovation, Pharma and Hospital Management Consulting works.",institutionString:null,institution:{name:"Lovely Professional University",country:{name:"India"}}},{id:"1063",title:"Prof.",name:"Constantin",middleName:null,surname:"Volosencu",slug:"constantin-volosencu",fullName:"Constantin Volosencu",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/1063/images/system/1063.png",biography:"Prof. Dr. Constantin Voloşencu graduated as an engineer from\nPolitehnica University of Timișoara, Romania, where he also\nobtained a doctorate degree. He is currently a full professor in\nthe Department of Automation and Applied Informatics at the\nsame university. Dr. Voloşencu is the author of ten books, seven\nbook chapters, and more than 160 papers published in journals\nand conference proceedings. He has also edited twelve books and\nhas twenty-seven patents to his name. He is a manager of research grants, editor in\nchief and member of international journal editorial boards, a former plenary speaker, a member of scientific committees, and chair at international conferences. His\nresearch is in the fields of control systems, control of electric drives, fuzzy control\nsystems, neural network applications, fault detection and diagnosis, sensor network\napplications, monitoring of distributed parameter systems, and power ultrasound\napplications. He has developed automation equipment for machine tools, spooling\nmachines, high-power ultrasound processes, and more.",institutionString:"Polytechnic University of Timişoara",institution:{name:"Polytechnic University of Timişoara",country:{name:"Romania"}}},{id:"221364",title:"Dr.",name:"Eneko",middleName:null,surname:"Osaba",slug:"eneko-osaba",fullName:"Eneko Osaba",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/221364/images/system/221364.jpg",biography:"Dr. Eneko Osaba works at TECNALIA as a senior researcher. He obtained his Ph.D. in Artificial Intelligence in 2015. He has participated in more than twenty-five local and European research projects, and in the publication of more than 130 papers. He has performed several stays at universities in the United Kingdom, Italy, and Malta. Dr. Osaba has served as a program committee member in more than forty international conferences and participated in organizing activities in more than ten international conferences. He is a member of the editorial board of the International Journal of Artificial Intelligence, Data in Brief, and Journal of Advanced Transportation. He is also a guest editor for the Journal of Computational Science, Neurocomputing, Swarm, and Evolutionary Computation and IEEE ITS Magazine.",institutionString:"TECNALIA Research & Innovation",institution:{name:"Tecnalia",country:{name:"Spain"}}},{id:"275829",title:"Dr.",name:"Esther",middleName:null,surname:"Villar-Rodriguez",slug:"esther-villar-rodriguez",fullName:"Esther Villar-Rodriguez",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/275829/images/system/275829.jpg",biography:"Dr. Esther Villar obtained a Ph.D. in Information and Communication Technologies from the University of Alcalá, Spain, in 2015. She obtained a degree in Computer Science from the University of Deusto, Spain, in 2010, and an MSc in Computer Languages and Systems from the National University of Distance Education, Spain, in 2012. Her areas of interest and knowledge include natural language processing (NLP), detection of impersonation in social networks, semantic web, and machine learning. Dr. Esther Villar made several contributions at conferences and publishing in various journals in those fields. Currently, she is working within the OPTIMA (Optimization Modeling & Analytics) business of TECNALIA’s ICT Division as a data scientist in projects related to the prediction and optimization of management and industrial processes (resource planning, energy efficiency, etc).",institutionString:"TECNALIA Research & Innovation",institution:{name:"Tecnalia",country:{name:"Spain"}}},{id:"49813",title:"Dr.",name:"Javier",middleName:null,surname:"Del Ser",slug:"javier-del-ser",fullName:"Javier Del Ser",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/49813/images/system/49813.png",biography:"Prof. Dr. Javier Del Ser received his first PhD in Telecommunication Engineering (Cum Laude) from the University of Navarra, Spain, in 2006, and a second PhD in Computational Intelligence (Summa Cum Laude) from the University of Alcala, Spain, in 2013. He is currently a principal researcher in data analytics and optimisation at TECNALIA (Spain), a visiting fellow at the Basque Center for Applied Mathematics (BCAM) and a part-time lecturer at the University of the Basque Country (UPV/EHU). His research interests gravitate on the use of descriptive, prescriptive and predictive algorithms for data mining and optimization in a diverse range of application fields such as Energy, Transport, Telecommunications, Health and Industry, among others. In these fields he has published more than 240 articles, co-supervised 8 Ph.D. theses, edited 6 books, coauthored 7 patents and participated/led more than 40 research projects. He is a Senior Member of the IEEE, and a recipient of the Biscay Talent prize for his academic career.",institutionString:"Tecnalia Research & Innovation",institution:null},{id:"278948",title:"Dr.",name:"Carlos Pedro",middleName:null,surname:"Gonçalves",slug:"carlos-pedro-goncalves",fullName:"Carlos Pedro Gonçalves",position:null,profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRcmyQAC/Profile_Picture_1564224512145",biography:'Carlos Pedro Gonçalves (PhD) is an Associate Professor at Lusophone University of Humanities and Technologies and a researcher on Complexity Sciences, Quantum Technologies, Artificial Intelligence, Strategic Studies, Studies in Intelligence and Security, FinTech and Financial Risk Modeling. He is also a progammer with programming experience in:\n\nA) Quantum Computing using Qiskit Python module and IBM Quantum Experience Platform, with software developed on the simulation of Quantum Artificial Neural Networks and Quantum Cybersecurity;\n\nB) Artificial Intelligence and Machine learning programming in Python;\n\nC) Artificial Intelligence, Multiagent Systems Modeling and System Dynamics Modeling in Netlogo, with models developed in the areas of Chaos Theory, Econophysics, Artificial Intelligence, Classical and Quantum Complex Systems Science, with the Econophysics models having been cited worldwide and incorporated in PhD programs by different Universities.\n\nReceived an Arctic Code Vault Contributor status by GitHub, due to having developed open source software preserved in the \\"Arctic Code Vault\\" for future generations (https://archiveprogram.github.com/arctic-vault/), with the Strategy Analyzer A.I. module for decision making support (based on his PhD thesis, used in his Classes on Decision Making and in Strategic Intelligence Consulting Activities) and QNeural Python Quantum Neural Network simulator also preserved in the \\"Arctic Code Vault\\", for access to these software modules see: https://github.com/cpgoncalves. He is also a peer reviewer with outsanding review status from Elsevier journals, including Physica A, Neurocomputing and Engineering Applications of Artificial Intelligence. Science CV available at: https://www.cienciavitae.pt//pt/8E1C-A8B3-78C5 and ORCID: https://orcid.org/0000-0002-0298-3974',institutionString:"University of Lisbon",institution:{name:"Universidade Lusófona",country:{name:"Portugal"}}},{id:"241400",title:"Prof.",name:"Mohammed",middleName:null,surname:"Bsiss",slug:"mohammed-bsiss",fullName:"Mohammed Bsiss",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/241400/images/8062_n.jpg",biography:null,institutionString:null,institution:null},{id:"276128",title:"Dr.",name:"Hira",middleName:null,surname:"Fatima",slug:"hira-fatima",fullName:"Hira Fatima",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/276128/images/14420_n.jpg",biography:"Dr. Hira Fatima\nAssistant Professor\nDepartment of Mathematics\nInstitute of Applied Science\nMangalayatan University, Aligarh\nMobile: no : 8532041179\nhirafatima2014@gmal.com\n\nDr. Hira Fatima has received his Ph.D. degree in pure Mathematics from Aligarh Muslim University, Aligarh India. Currently working as an Assistant Professor in the Department of Mathematics, Institute of Applied Science, Mangalayatan University, Aligarh. She taught so many courses of Mathematics of UG and PG level. Her research Area of Expertise is Functional Analysis & Sequence Spaces. She has been working on Ideal Convergence of double sequence. She has published 17 research papers in National and International Journals including Cogent Mathematics, Filomat, Journal of Intelligent and Fuzzy Systems, Advances in Difference Equations, Journal of Mathematical Analysis, Journal of Mathematical & Computer Science etc. She has also reviewed few research papers for the and international journals. She is a member of Indian Mathematical Society.",institutionString:null,institution:null},{id:"414880",title:"Dr.",name:"Maryam",middleName:null,surname:"Vatankhah",slug:"maryam-vatankhah",fullName:"Maryam Vatankhah",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Borough of Manhattan Community College",country:{name:"United States of America"}}},{id:"414879",title:"Prof.",name:"Mohammad-Reza",middleName:null,surname:"Akbarzadeh-Totonchi",slug:"mohammad-reza-akbarzadeh-totonchi",fullName:"Mohammad-Reza Akbarzadeh-Totonchi",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Ferdowsi University of Mashhad",country:{name:"Iran"}}},{id:"414878",title:"Prof.",name:"Reza",middleName:null,surname:"Fazel-Rezai",slug:"reza-fazel-rezai",fullName:"Reza Fazel-Rezai",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"American Public University System",country:{name:"United States of America"}}},{id:"302698",title:"Dr.",name:"Yao",middleName:null,surname:"Shan",slug:"yao-shan",fullName:"Yao Shan",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Dalian University of Technology",country:{name:"China"}}},{id:"125911",title:"Prof.",name:"Jia-Ching",middleName:null,surname:"Wang",slug:"jia-ching-wang",fullName:"Jia-Ching Wang",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"National Central University",country:{name:"Taiwan"}}},{id:"357085",title:"Mr.",name:"P. Mohan",middleName:null,surname:"Anand",slug:"p.-mohan-anand",fullName:"P. Mohan Anand",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Indian Institute of Technology Kanpur",country:{name:"India"}}},{id:"356696",title:"Ph.D. Student",name:"P.V.",middleName:null,surname:"Sai Charan",slug:"p.v.-sai-charan",fullName:"P.V. Sai Charan",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Indian Institute of Technology Kanpur",country:{name:"India"}}},{id:"357086",title:"Prof.",name:"Sandeep K.",middleName:null,surname:"Shukla",slug:"sandeep-k.-shukla",fullName:"Sandeep K. Shukla",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Indian Institute of Technology Kanpur",country:{name:"India"}}},{id:"356823",title:"MSc.",name:"Seonghee",middleName:null,surname:"Min",slug:"seonghee-min",fullName:"Seonghee Min",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Daegu University",country:{name:"Korea, South"}}},{id:"353307",title:"Prof.",name:"Yoosoo",middleName:null,surname:"Oh",slug:"yoosoo-oh",fullName:"Yoosoo Oh",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:"Yoosoo Oh received his Bachelor's degree in the Department of Electronics and Engineering from Kyungpook National University in 2002. He obtained his Master’s degree in the Department of Information and Communications from Gwangju Institute of Science and Technology (GIST) in 2003. In 2010, he received his Ph.D. degree in the School of Information and Mechatronics from GIST. In the meantime, he was an executed team leader at Culture Technology Institute, GIST, 2010-2012. In 2011, he worked at Lancaster University, the UK as a visiting scholar. In September 2012, he joined Daegu University, where he is currently an associate professor in the School of ICT Conver, Daegu University. Also, he served as the Board of Directors of KSIIS since 2019, and HCI Korea since 2016. From 2017~2019, he worked as a center director of the Mixed Reality Convergence Research Center at Daegu University. From 2015-2017, He worked as a director in the Enterprise Supporting Office of LINC Project Group, Daegu University. His research interests include Activity Fusion & Reasoning, Machine Learning, Context-aware Middleware, Human-Computer Interaction, etc.",institutionString:null,institution:{name:"Daegu Gyeongbuk Institute of Science and Technology",country:{name:"Korea, South"}}},{id:"262719",title:"Dr.",name:"Esma",middleName:null,surname:"Ergüner Özkoç",slug:"esma-erguner-ozkoc",fullName:"Esma Ergüner Özkoç",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Başkent University",country:{name:"Turkey"}}},{id:"346530",title:"Dr.",name:"Ibrahim",middleName:null,surname:"Kaya",slug:"ibrahim-kaya",fullName:"Ibrahim Kaya",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Izmir Kâtip Çelebi University",country:{name:"Turkey"}}},{id:"419199",title:"Dr.",name:"Qun",middleName:null,surname:"Yang",slug:"qun-yang",fullName:"Qun Yang",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Auckland",country:{name:"New Zealand"}}},{id:"351158",title:"Prof.",name:"David W.",middleName:null,surname:"Anderson",slug:"david-w.-anderson",fullName:"David W. Anderson",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Calgary",country:{name:"Canada"}}}]}},subseries:{item:{id:"92",type:"subseries",title:"Health and Wellbeing",keywords:"Ecology, Ecological, Nature, Health, Wellbeing, Health production",scope:"\r\n\tSustainable approaches to health and wellbeing in our COVID 19 recovery needs to focus on ecological approaches that prioritize our relationships with each other, and include engagement with nature, the arts and our heritage. This will ensure that we discover ways to live in our world that allows us and other beings to flourish. We can no longer rely on medicalized approaches to health that wait for people to become ill before attempting to treat them. We need to live in harmony with nature and rediscover the beauty and balance in our everyday lives and surroundings, which contribute to our well-being and that of all other creatures on the planet. This topic will provide insights and knowledge into how to achieve this change in health care that is based on ecologically sustainable practices.
",coverUrl:"https://cdn.intechopen.com/series_topics/covers/92.jpg",hasOnlineFirst:!1,hasPublishedBooks:!1,annualVolume:11976,editor:{id:"348225",title:"Prof.",name:"Ann",middleName:null,surname:"Hemingway",slug:"ann-hemingway",fullName:"Ann Hemingway",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y000035LZFoQAO/Profile_Picture_2022-04-11T14:55:40.jpg",biography:"Professor Hemingway is a public health researcher, Bournemouth University, undertaking international and UK research focused on reducing inequalities in health outcomes for marginalised and excluded populations and more recently focused on equine assisted interventions.",institutionString:null,institution:{name:"Bournemouth University",institutionURL:null,country:{name:"United Kingdom"}}},editorTwo:null,editorThree:null,series:{id:"24",title:"Sustainable Development",doi:"10.5772/intechopen.100361",issn:null},editorialBoard:[{id:"169536",title:"Dr.",name:"David",middleName:null,surname:"Claborn",slug:"david-claborn",fullName:"David Claborn",profilePictureURL:"https://mts.intechopen.com/storage/users/169536/images/system/169536.jpeg",institutionString:null,institution:{name:"Missouri State University",institutionURL:null,country:{name:"United States of America"}}},{id:"248594",title:"Ph.D.",name:"Jasneth",middleName:null,surname:"Mullings",slug:"jasneth-mullings",fullName:"Jasneth Mullings",profilePictureURL:"https://mts.intechopen.com/storage/users/248594/images/system/248594.jpeg",institutionString:"The University Of The West Indies - Mona Campus, Jamaica",institution:null},{id:"331299",title:"Prof.",name:"Pei-Shan",middleName:null,surname:"Liao",slug:"pei-shan-liao",fullName:"Pei-Shan Liao",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0033Y000032Fh2FQAS/Profile_Picture_2022-03-18T09:39:41.jpg",institutionString:"Research Center for Humanities and Social Sciences, Academia Sinica, Taiwan",institution:null}]},onlineFirstChapters:{paginationCount:1,paginationItems:[{id:"81831",title:"Deep Network Model and Regression Analysis using OLS Method for Predicting Lung Vital Capacity",doi:"10.5772/intechopen.104737",signatures:"Harun Sümbül",slug:"deep-network-model-and-regression-analysis-using-ols-method-for-predicting-lung-vital-capacity",totalDownloads:2,totalCrossrefCites:0,totalDimensionsCites:0,authors:null,book:{title:"Decision Science - Recent Advances and Applications",coverURL:"https://cdn.intechopen.com/books/images_new/11604.jpg",subseries:{id:"86",title:"Business and Management"}}}]},publishedBooks:{paginationCount:2,paginationItems:[{type:"book",id:"9883",title:"Biosensors",subtitle:"Current and Novel Strategies for Biosensing",coverURL:"https://cdn.intechopen.com/books/images_new/9883.jpg",slug:"biosensors-current-and-novel-strategies-for-biosensing",publishedDate:"May 5th 2021",editedByType:"Edited by",bookSignature:"Luis Jesús Villarreal-Gómez and Ana Leticia Iglesias",hash:"028f3e5dbf9c32590183ac4b4f0a2825",volumeInSeries:11,fullTitle:"Biosensors - Current and Novel Strategies for Biosensing",editors:[{id:"126286",title:"Dr.",name:"Luis",middleName:"Jesús",surname:"Villarreal-Gómez",slug:"luis-villarreal-gomez",fullName:"Luis Villarreal-Gómez",profilePictureURL:"https://mts.intechopen.com/storage/users/126286/images/system/126286.jpg",institutionString:null,institution:{name:"Autonomous University of Baja California",institutionURL:null,country:{name:"Mexico"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null},{type:"book",id:"6843",title:"Biomechanics",subtitle:null,coverURL:"https://cdn.intechopen.com/books/images_new/6843.jpg",slug:"biomechanics",publishedDate:"January 30th 2019",editedByType:"Edited by",bookSignature:"Hadi Mohammadi",hash:"85132976010be1d7f3dbd88662b785e5",volumeInSeries:4,fullTitle:"Biomechanics",editors:[{id:"212432",title:"Prof.",name:"Hadi",middleName:null,surname:"Mohammadi",slug:"hadi-mohammadi",fullName:"Hadi Mohammadi",profilePictureURL:"https://mts.intechopen.com/storage/users/212432/images/system/212432.jpeg",institutionString:"University of British Columbia",institution:{name:"University of British Columbia",institutionURL:null,country:{name:"Canada"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null}]},testimonialsList:[{id:"8",text:"I work with IntechOpen for a number of reasons: their professionalism, their mission in support of Open Access publishing, and the quality of their peer-reviewed publications, but also because they believe in equality.",author:{id:"202192",name:"Catrin",surname:"Rutland",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/202192/images/system/202192.png",slug:"catrin-rutland",institution:{id:"134",name:"University of Nottingham",country:{id:null,name:"United Kingdom"}}}},{id:"27",text:"The opportunity to work with a prestigious publisher allows for the possibility to collaborate with more research groups interested in animal nutrition, leading to the development of new feeding strategies and food valuation while being more sustainable with the environment, allowing more readers to learn about the subject.",author:{id:"175967",name:"Manuel",surname:"Gonzalez Ronquillo",institutionString:null,profilePictureURL:"https://mts.intechopen.com/storage/users/175967/images/system/175967.png",slug:"manuel-gonzalez-ronquillo",institution:{id:"6221",name:"Universidad Autónoma del Estado de México",country:{id:null,name:"Mexico"}}}},{id:"18",text:"It was great publishing with IntechOpen, the process was straightforward and I had support all along.",author:{id:"71579",name:"Berend",surname:"Olivier",institutionString:"Utrecht University",profilePictureURL:"https://mts.intechopen.com/storage/users/71579/images/system/71579.png",slug:"berend-olivier",institution:{id:"253",name:"Utrecht University",country:{id:null,name:"Netherlands"}}}}]},submityourwork:{pteSeriesList:[{id:"14",title:"Artificial Intelligence",numberOfPublishedBooks:9,numberOfPublishedChapters:87,numberOfOpenTopics:6,numberOfUpcomingTopics:0,issn:"2633-1403",doi:"10.5772/intechopen.79920",isOpenForSubmission:!0},{id:"7",title:"Biomedical Engineering",numberOfPublishedBooks:12,numberOfPublishedChapters:98,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2631-5343",doi:"10.5772/intechopen.71985",isOpenForSubmission:!0}],lsSeriesList:[{id:"11",title:"Biochemistry",numberOfPublishedBooks:27,numberOfPublishedChapters:287,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2632-0983",doi:"10.5772/intechopen.72877",isOpenForSubmission:!0},{id:"25",title:"Environmental Sciences",numberOfPublishedBooks:1,numberOfPublishedChapters:9,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2754-6713",doi:"10.5772/intechopen.100362",isOpenForSubmission:!0},{id:"10",title:"Physiology",numberOfPublishedBooks:11,numberOfPublishedChapters:139,numberOfOpenTopics:4,numberOfUpcomingTopics:0,issn:"2631-8261",doi:"10.5772/intechopen.72796",isOpenForSubmission:!0}],hsSeriesList:[{id:"3",title:"Dentistry",numberOfPublishedBooks:8,numberOfPublishedChapters:129,numberOfOpenTopics:0,numberOfUpcomingTopics:2,issn:"2631-6218",doi:"10.5772/intechopen.71199",isOpenForSubmission:!1},{id:"6",title:"Infectious Diseases",numberOfPublishedBooks:13,numberOfPublishedChapters:107,numberOfOpenTopics:3,numberOfUpcomingTopics:1,issn:"2631-6188",doi:"10.5772/intechopen.71852",isOpenForSubmission:!0},{id:"13",title:"Veterinary Medicine and Science",numberOfPublishedBooks:10,numberOfPublishedChapters:103,numberOfOpenTopics:3,numberOfUpcomingTopics:0,issn:"2632-0517",doi:"10.5772/intechopen.73681",isOpenForSubmission:!0}],sshSeriesList:[{id:"22",title:"Business, Management and Economics",numberOfPublishedBooks:1,numberOfPublishedChapters:12,numberOfOpenTopics:2,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100359",isOpenForSubmission:!0},{id:"23",title:"Education and Human Development",numberOfPublishedBooks:0,numberOfPublishedChapters:0,numberOfOpenTopics:2,numberOfUpcomingTopics:0,issn:null,doi:"10.5772/intechopen.100360",isOpenForSubmission:!1},{id:"24",title:"Sustainable Development",numberOfPublishedBooks:0,numberOfPublishedChapters:10,numberOfOpenTopics:4,numberOfUpcomingTopics:1,issn:null,doi:"10.5772/intechopen.100361",isOpenForSubmission:!0}],subseriesList:[{id:"4",title:"Fungal Infectious Diseases",scope:"Fungi are ubiquitous and there are almost no non-pathogenic fungi. Fungal infectious illness prevalence and prognosis are determined by the exposure between fungi and host, host immunological state, fungal virulence, and early and accurate diagnosis and treatment. \r\nPatients with both congenital and acquired immunodeficiency are more likely to be infected with opportunistic mycosis. Fungal infectious disease outbreaks are common during the post- disaster rebuilding era, which is characterised by high population density, migration, and poor health and medical conditions.\r\nSystemic or local fungal infection is mainly associated with the fungi directly inhaled or inoculated in the environment during the disaster. The most common fungal infection pathways are human to human (anthropophilic), animal to human (zoophilic), and environment to human (soilophile). Diseases are common as a result of widespread exposure to pathogenic fungus dispersed into the environment. \r\nFungi that are both common and emerging are intertwined. In Southeast Asia, for example, Talaromyces marneffei is an important pathogenic thermally dimorphic fungus that causes systemic mycosis. Widespread fungal infections with complicated and variable clinical manifestations, such as Candida auris infection resistant to several antifungal medicines, Covid-19 associated with Trichoderma, and terbinafine resistant dermatophytosis in India, are among the most serious disorders. \r\nInappropriate local or systemic use of glucocorticoids, as well as their immunosuppressive effects, may lead to changes in fungal infection spectrum and clinical characteristics. Hematogenous candidiasis is a worrisome issue that affects people all over the world, particularly ICU patients. CARD9 deficiency and fungal infection have been major issues in recent years. Invasive aspergillosis is associated with a significant death rate. Special attention should be given to endemic fungal infections, identification of important clinical fungal infections advanced in yeasts, filamentous fungal infections, skin mycobiome and fungal genomes, and immunity to fungal infections.\r\nIn addition, endemic fungal diseases or uncommon fungal infections caused by Mucor irregularis, dermatophytosis, Malassezia, cryptococcosis, chromoblastomycosis, coccidiosis, blastomycosis, histoplasmosis, sporotrichosis, and other fungi, should be monitored. \r\nThis topic includes the research progress on the etiology and pathogenesis of fungal infections, new methods of isolation and identification, rapid detection, drug sensitivity testing, new antifungal drugs, schemes and case series reports. It will provide significant opportunities and support for scientists, clinical doctors, mycologists, antifungal drug researchers, public health practitioners, and epidemiologists from all over the world to share new research, ideas and solutions to promote the development and progress of medical mycology.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/4.jpg",keywords:"Emerging Fungal Pathogens, Invasive Infections, Epidemiology, Cell Membrane, Fungal Virulence, Diagnosis, Treatment"},{id:"5",title:"Parasitic Infectious Diseases",scope:"Parasitic diseases have evolved alongside their human hosts. In many cases, these diseases have adapted so well that they have developed efficient resilience methods in the human host and can live in the host for years. Others, particularly some blood parasites, can cause very acute diseases and are responsible for millions of deaths yearly. Many parasitic diseases are classified as neglected tropical diseases because they have received minimal funding over recent years and, in many cases, are under-reported despite the critical role they play in morbidity and mortality among human and animal hosts. The current topic, Parasitic Infectious Diseases, in the Infectious Diseases Series aims to publish studies on the systematics, epidemiology, molecular biology, genomics, pathogenesis, genetics, and clinical significance of parasitic diseases from blood borne to intestinal parasites as well as zoonotic parasites. We hope to cover all aspects of parasitic diseases to provide current and relevant research data on these very important diseases. In the current atmosphere of the Coronavirus pandemic, communities around the world, particularly those in different underdeveloped areas, are faced with the growing challenges of the high burden of parasitic diseases. At the same time, they are faced with the Covid-19 pandemic leading to what some authors have called potential syndemics that might worsen the outcome of such infections. Therefore, it is important to conduct studies that examine parasitic infections in the context of the coronavirus pandemic for the benefit of all communities to help foster more informed decisions for the betterment of human and animal health.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/5.jpg",keywords:"Blood Borne Parasites, Intestinal Parasites, Protozoa, Helminths, Arthropods, Water Born Parasites, Epidemiology, Molecular Biology, Systematics, Genomics, Proteomics, Ecology"},{id:"6",title:"Viral Infectious Diseases",scope:"The Viral Infectious Diseases Book Series aims to provide a comprehensive overview of recent research trends and discoveries in various viral infectious diseases emerging around the globe. The emergence of any viral disease is hard to anticipate, which often contributes to death. A viral disease can be defined as an infectious disease that has recently appeared within a population or exists in nature with the rapid expansion of incident or geographic range. This series will focus on various crucial factors related to emerging viral infectious diseases, including epidemiology, pathogenesis, host immune response, clinical manifestations, diagnosis, treatment, and clinical recommendations for managing viral infectious diseases, highlighting the recent issues with future directions for effective therapeutic strategies.",coverUrl:"https://cdn.intechopen.com/series_topics/covers/6.jpg",keywords:"Novel Viruses, Virus Transmission, Virus Evolution, Molecular Virology, Control and Prevention, Virus-host Interaction"}],annualVolumeBook:{},thematicCollection:[],selectedSeries:null,selectedSubseries:null},seriesLanding:{item:null},libraryRecommendation:{success:null,errors:{},institutions:[]},route:{name:"chapter.detail",path:"/chapters/77974",hash:"",query:{},params:{id:"77974"},fullPath:"/chapters/77974",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()