Comparison between standard and proposed cryptography algorithms.
\\n\\n
More than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\\n\\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\\n\\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\\n\\nAdditionally, each book published by IntechOpen contains original content and research findings.
\\n\\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\\n\\n\\n\\n
\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'
Simba Information has released its Open Access Book Publishing 2020 - 2024 report and has again identified IntechOpen as the world’s largest Open Access book publisher by title count.
\n\nSimba Information is a leading provider for market intelligence and forecasts in the media and publishing industry. The report, published every year, provides an overview and financial outlook for the global professional e-book publishing market.
\n\nIntechOpen, De Gruyter, and Frontiers are the largest OA book publishers by title count, with IntechOpen coming in at first place with 5,101 OA books published, a good 1,782 titles ahead of the nearest competitor.
\n\nSince the first Open Access Book Publishing report published in 2016, IntechOpen has held the top stop each year.
\n\n\n\nMore than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\n\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\n\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\n\nAdditionally, each book published by IntechOpen contains original content and research findings.
\n\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\n\n\n\n
\n'}],latestNews:[{slug:"stanford-university-identifies-top-2-scientists-over-1-000-are-intechopen-authors-and-editors-20210122",title:"Stanford University Identifies Top 2% Scientists, Over 1,000 are IntechOpen Authors and Editors"},{slug:"intechopen-authors-included-in-the-highly-cited-researchers-list-for-2020-20210121",title:"IntechOpen Authors Included in the Highly Cited Researchers List for 2020"},{slug:"intechopen-maintains-position-as-the-world-s-largest-oa-book-publisher-20201218",title:"IntechOpen Maintains Position as the World’s Largest OA Book Publisher"},{slug:"all-intechopen-books-available-on-perlego-20201215",title:"All IntechOpen Books Available on Perlego"},{slug:"oiv-awards-recognizes-intechopen-s-editors-20201127",title:"OIV Awards Recognizes IntechOpen's Editors"},{slug:"intechopen-joins-crossref-s-initiative-for-open-abstracts-i4oa-to-boost-the-discovery-of-research-20201005",title:"IntechOpen joins Crossref's Initiative for Open Abstracts (I4OA) to Boost the Discovery of Research"},{slug:"intechopen-hits-milestone-5-000-open-access-books-published-20200908",title:"IntechOpen hits milestone: 5,000 Open Access books published!"},{slug:"intechopen-books-hosted-on-the-mathworks-book-program-20200819",title:"IntechOpen Books Hosted on the MathWorks Book Program"}]},book:{item:{type:"book",id:"9441",leadTitle:null,fullTitle:"Ocean Thermal Energy Conversion (OTEC) - Past, Present, and Progress",title:"Ocean Thermal Energy Conversion (OTEC)",subtitle:"Past, Present, and Progress",reviewType:"peer-reviewed",abstract:"The 21st century is characterized as an era of natural resource depletion, and humanity is faced with several threats due to the lack of food, energy, and water. Climate change and sea-level rise are at unprecedented levels, being phenomena that make predicting the future of ocean resources more complicated. Oceans contain a limitless amount of water with small (but finite) temperature differences from their surfaces to their floors. To advance the utilization of ocean resources, this book readdresses the past achievements, present developments, and future progress of ocean thermal energy, from basic sciences to sociology and cultural aspects.",isbn:"978-1-78985-572-2",printIsbn:"978-1-78985-571-5",pdfIsbn:"978-1-83880-521-0",doi:"10.5772/intechopen.86591",price:119,priceEur:129,priceUsd:155,slug:"ocean-thermal-energy-conversion-otec-past-present-and-progress",numberOfPages:184,isOpenForSubmission:!1,isInWos:null,hash:"b0f6032c45ead7f1cb11bb488bfcd48d",bookSignature:"Albert S. Kim and Hyeon-Ju Kim",publishedDate:"May 13th 2020",coverURL:"https://cdn.intechopen.com/books/images_new/9441.jpg",numberOfDownloads:2195,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:1,hasAltmetrics:1,numberOfTotalCitations:1,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"May 1st 2019",dateEndSecondStepPublish:"May 30th 2019",dateEndThirdStepPublish:"August 31st 2019",dateEndFourthStepPublish:"November 9th 2019",dateEndFifthStepPublish:"January 8th 2020",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6,7",editedByType:"Edited by",kuFlag:!0,editors:[{id:"21045",title:"Prof.",name:"Albert S.",middleName:null,surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim",profilePictureURL:"https://mts.intechopen.com/storage/users/21045/images/system/21045.jpeg",biography:"Dr. Albert S. Kim earned his physics degree of BS from Kyung Hee University and MS from Yonsei University, South Korea. He received his MS (1997) and Ph.D. (2000) in Civil and Environmental Engineering from the University of California at Los Angeles, USA. He joined the Department of Civil and Environmental Engineering at the University of Hawaii at Manoa in 2001. \r\nDr. Kim’s scientific accomplishments include the US National Science Foundation Faculty Early Career (CAREER) Award (2005), the University of Hawaii Regents’ Medal for Excellence in Research (2006) and the Medal for Excellence in Teaching (2017). Professor Kim has published almost 60 peer-reviewed journal papers and four book chapters. He researches on computational environmental physics for engineering purposes.",institutionString:"University of Hawaii at Manoa",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"6",totalChapterViews:"0",totalEditedBooks:"3",institution:{name:"University of Hawaii at Manoa",institutionURL:null,country:{name:"United States of America"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:{id:"204519",title:"Dr.",name:"Hyeon-Ju",middleName:null,surname:"Kim",slug:"hyeon-ju-kim",fullName:"Hyeon-Ju Kim",profilePictureURL:"https://mts.intechopen.com/storage/users/204519/images/system/204519.jpeg",biography:"Dr. Kim is the Principal Researcher, Offshore Plant, and Marine Energy Research Division, Korea Research Institute of Ships and Ocean Engineering (KRISO) and Project Manager of the Korean OTEC program. He received his Ph.D. at the Dept. of Ocean Engineering, Pukyong National University. His fields of specialization are Ocean Thermal Energy Conversion system technology, Seawater Desalination, and Mineral Extraction system technology, Deep Ocean Water Application technology for Food, Energy and Water. He is Vice Chairman of the Korean Society for Power System Engineering and a Member of the board of directors of the Korean Society for Marine Environment and Energy, The Korean Society of Ocean Engineering, etc.",institutionString:"Korea Research Institute of Ships and Ocean Engineering",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"0",institution:null},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"770",title:"Renewable Energy",slug:"engineering-energy-engineering-renewable-energy"}],chapters:[{id:"71764",title:"Can Ocean Thermal Energy Conversion and Seawater Utilisation Assist Small Island Developing States? A Case Study of Kiribati, Pacific Islands Region",doi:"10.5772/intechopen.91945",slug:"can-ocean-thermal-energy-conversion-and-seawater-utilisation-assist-small-island-developing-states-a",totalDownloads:310,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Michael G. Petterson and Hyeon Ju Kim",downloadPdfUrl:"/chapter/pdf-download/71764",previewPdfUrl:"/chapter/pdf-preview/71764",authors:[{id:"204519",title:"Dr.",name:"Hyeon-Ju",surname:"Kim",slug:"hyeon-ju-kim",fullName:"Hyeon-Ju Kim"},{id:"304123",title:"Prof.",name:"Michael",surname:"Petterson",slug:"michael-petterson",fullName:"Michael Petterson"}],corrections:null},{id:"71102",title:"The Social Energy: Contexts for Its Assessment",doi:"10.5772/intechopen.91168",slug:"the-social-energy-contexts-for-its-assessment",totalDownloads:299,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Alonso Pérez Pérez, Mauricio Latapí Agudelo and Graciela Rivera Camacho",downloadPdfUrl:"/chapter/pdf-download/71102",previewPdfUrl:"/chapter/pdf-preview/71102",authors:[{id:"306562",title:"Dr.",name:"Alonso",surname:"Pérez Pérez",slug:"alonso-perez-perez",fullName:"Alonso Pérez Pérez"},{id:"306856",title:"MSc.",name:"Mauricio Andres",surname:"Latapi Agudelo",slug:"mauricio-andres-latapi-agudelo",fullName:"Mauricio Andres Latapi Agudelo"},{id:"307095",title:"B.Sc.",name:"Graciela",surname:"Rivera Camacho",slug:"graciela-rivera-camacho",fullName:"Graciela Rivera Camacho"}],corrections:null},{id:"70647",title:"Current Development and Prospect of Turbine in OTEC",doi:"10.5772/intechopen.90608",slug:"current-development-and-prospect-of-turbine-in-otec",totalDownloads:286,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Weimin Liu, Yunzheng Ge, Lei Liu and Yun Chen",downloadPdfUrl:"/chapter/pdf-download/70647",previewPdfUrl:"/chapter/pdf-preview/70647",authors:[{id:"304136",title:"Dr.",name:"Weimin",surname:"Liu",slug:"weimin-liu",fullName:"Weimin Liu"},{id:"304138",title:"M.Sc.",name:"Yunzheng",surname:"Ge",slug:"yunzheng-ge",fullName:"Yunzheng Ge"},{id:"304139",title:"Dr.",name:"Yun",surname:"Chen",slug:"yun-chen",fullName:"Yun Chen"},{id:"306181",title:"MSc.",name:"Lei",surname:"Liu",slug:"lei-liu",fullName:"Lei Liu"}],corrections:null},{id:"70689",title:"Novel OTEC Cycle Using Efficiency Enhancer",doi:"10.5772/intechopen.90791",slug:"novel-otec-cycle-using-efficiency-enhancer",totalDownloads:350,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Hosaeng Lee, Seungtaek Lim, Jungin Yoon and Hyeonju Kim",downloadPdfUrl:"/chapter/pdf-download/70689",previewPdfUrl:"/chapter/pdf-preview/70689",authors:[{id:"204519",title:"Dr.",name:"Hyeon-Ju",surname:"Kim",slug:"hyeon-ju-kim",fullName:"Hyeon-Ju Kim"},{id:"309185",title:"Dr.",name:"Ho-Saeng",surname:"Lee",slug:"ho-saeng-lee",fullName:"Ho-Saeng Lee"},{id:"309188",title:"Mr.",name:"Seung-Taek",surname:"Kim",slug:"seung-taek-kim",fullName:"Seung-Taek Kim"},{id:"309189",title:"Prof.",name:"Jung-In",surname:"Yoon",slug:"jung-in-yoon",fullName:"Jung-In Yoon"}],corrections:null},{id:"70632",title:"Analysis and Development of Closed Cycle OTEC System",doi:"10.5772/intechopen.90609",slug:"analysis-and-development-of-closed-cycle-otec-system",totalDownloads:199,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Estela Cerezo Acevedo, Jessica G. Tobal Cupul, Victor M. Romero Medina, Elda Gomez Barragan and Miguel Angel Alatorre Mendieta",downloadPdfUrl:"/chapter/pdf-download/70632",previewPdfUrl:"/chapter/pdf-preview/70632",authors:[{id:"306709",title:"Dr.",name:"Estela",surname:"Cerezo-Acevedo",slug:"estela-cerezo-acevedo",fullName:"Estela Cerezo-Acevedo"},{id:"306711",title:"Dr.",name:"Victor Manuel",surname:"Romero Medina",slug:"victor-manuel-romero-medina",fullName:"Victor Manuel Romero Medina"},{id:"306712",title:"Dr.",name:"Miguel",surname:"Alatorre Mendieta",slug:"miguel-alatorre-mendieta",fullName:"Miguel Alatorre Mendieta"},{id:"309398",title:"Dr.",name:"Jessica Guadalupe",surname:"Tobal Cupul",slug:"jessica-guadalupe-tobal-cupul",fullName:"Jessica Guadalupe Tobal Cupul"},{id:"309399",title:"Dr.",name:"Elda",surname:"Gomez Barragan",slug:"elda-gomez-barragan",fullName:"Elda Gomez Barragan"}],corrections:null},{id:"70537",title:"Research and Development Activities of Ocean Thermal Energy-Driven Development in Malaysia",doi:"10.5772/intechopen.90610",slug:"research-and-development-activities-of-ocean-thermal-energy-driven-development-in-malaysia",totalDownloads:277,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"A. Bakar Jaafar, Mohd Khairi Abu Husain and Azrin Ariffin",downloadPdfUrl:"/chapter/pdf-download/70537",previewPdfUrl:"/chapter/pdf-preview/70537",authors:[{id:"193214",title:"Dr.",name:"Abu Bakar",surname:"Jaafar",slug:"abu-bakar-jaafar",fullName:"Abu Bakar Jaafar"},{id:"311007",title:"Dr.",name:"Mohd Khairi",surname:"Abu Husain",slug:"mohd-khairi-abu-husain",fullName:"Mohd Khairi Abu Husain"},{id:"311008",title:"Mr.",name:"Azrin",surname:"Ariffin",slug:"azrin-ariffin",fullName:"Azrin Ariffin"}],corrections:null},{id:"70334",title:"General Criteria for Optimal Site Selection for the Installation of Ocean Thermal Energy Conversion (OTEC) Plants in the Mexican Pacific",doi:"10.5772/intechopen.90280",slug:"general-criteria-for-optimal-site-selection-for-the-installation-of-ocean-thermal-energy-conversion-",totalDownloads:235,totalCrossrefCites:0,totalDimensionsCites:1,signatures:"Alejandro García Huante, Yandy Rodríguez Cueto, Erika Paola Garduño Ruiz and Ricardo Efraín Hernández Contreras",downloadPdfUrl:"/chapter/pdf-download/70334",previewPdfUrl:"/chapter/pdf-preview/70334",authors:[{id:"306425",title:"M.Sc.",name:"Alejandro",surname:"García Huante",slug:"alejandro-garcia-huante",fullName:"Alejandro García Huante"},{id:"306426",title:"MSc.",name:"Yandy",surname:"Rodríguez Cueto",slug:"yandy-rodriguez-cueto",fullName:"Yandy Rodríguez Cueto"},{id:"306427",title:"MSc.",name:"Erika Paola",surname:"Garduño Ruíz",slug:"erika-paola-garduno-ruiz",fullName:"Erika Paola Garduño Ruíz"},{id:"306428",title:"MSc.",name:"Ricardo Efraín",surname:"Hernández Contreras",slug:"ricardo-efrain-hernandez-contreras",fullName:"Ricardo Efraín Hernández Contreras"}],corrections:null},{id:"71144",title:"Environmental Impact Assessment of the Operation of an Open Cycle OTEC 1MWe Power Plant in the Cozumel Island, Mexico",doi:"10.5772/intechopen.91179",slug:"environmental-impact-assessment-of-the-operation-of-an-open-cycle-otec-1mwe-power-plant-in-the-cozum",totalDownloads:250,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Enrique Celestino Carrera Chan, María Fernanda Sabido Tun, Juan Francisco Bárcenas Graniel and Estela Cerezo Acevedo",downloadPdfUrl:"/chapter/pdf-download/71144",previewPdfUrl:"/chapter/pdf-preview/71144",authors:[{id:"306709",title:"Dr.",name:"Estela",surname:"Cerezo-Acevedo",slug:"estela-cerezo-acevedo",fullName:"Estela Cerezo-Acevedo"},{id:"306847",title:"MSc.",name:"Juan Francisco",surname:"Bárcenas Graniel",slug:"juan-francisco-barcenas-graniel",fullName:"Juan Francisco Bárcenas Graniel"},{id:"306868",title:"BSc.",name:"Enrique Celestino",surname:"Carrera Chan",slug:"enrique-celestino-carrera-chan",fullName:"Enrique Celestino Carrera Chan"},{id:"306869",title:"BSc.",name:"María Fernanda",surname:"Sabido Tun",slug:"maria-fernanda-sabido-tun",fullName:"María Fernanda Sabido Tun"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},relatedBooks:[{type:"book",id:"7583",title:"Advanced Computational Fluid Dynamics for Emerging Engineering Processes",subtitle:"Eulerian vs. Lagrangian",isOpenForSubmission:!1,hash:"896509fa2e7e659811bffd0f9779ca9d",slug:"advanced-computational-fluid-dynamics-for-emerging-engineering-processes-eulerian-vs-lagrangian",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/7583.jpg",editedByType:"Edited by",editors:[{id:"21045",title:"Prof.",name:"Albert S.",surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8416",title:"Non-Equilibrium Particle Dynamics",subtitle:null,isOpenForSubmission:!1,hash:"2c3add7639dcd1cb442cb4313ea64e3a",slug:"non-equilibrium-particle-dynamics",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/8416.jpg",editedByType:"Edited by",editors:[{id:"21045",title:"Prof.",name:"Albert S.",surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3633",title:"Solar Energy",subtitle:null,isOpenForSubmission:!1,hash:null,slug:"solar-energy",bookSignature:"Radu D Rugescu",coverURL:"https://cdn.intechopen.com/books/images_new/3633.jpg",editedByType:"Edited by",editors:[{id:"8615",title:"Prof.",name:"Radu",surname:"Rugescu",slug:"radu-rugescu",fullName:"Radu Rugescu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1288",title:"Solar Cells",subtitle:"Dye-Sensitized Devices",isOpenForSubmission:!1,hash:"05a255471069664ecf5fbf8778b92076",slug:"solar-cells-dye-sensitized-devices",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/1288.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3118",title:"Solar Cells",subtitle:"Research and Application Perspectives",isOpenForSubmission:!1,hash:"5502d7fd7559d60419f2615615ae4cf5",slug:"solar-cells-research-and-application-perspectives",bookSignature:"Arturo Morales-Acevedo",coverURL:"https://cdn.intechopen.com/books/images_new/3118.jpg",editedByType:"Edited by",editors:[{id:"90486",title:"Prof.",name:"Arturo",surname:"Morales-Acevedo",slug:"arturo-morales-acevedo",fullName:"Arturo Morales-Acevedo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"877",title:"Third Generation Photovoltaics",subtitle:null,isOpenForSubmission:!1,hash:"c3bdfaebac38dab83a69c488bcda219d",slug:"third-generation-photovoltaics",bookSignature:"Vasilis Fthenakis",coverURL:"https://cdn.intechopen.com/books/images_new/877.jpg",editedByType:"Edited by",editors:[{id:"68723",title:"Dr.",name:"Vasilis",surname:"Fthenakis",slug:"vasilis-fthenakis",fullName:"Vasilis Fthenakis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4479",title:"Solar Cells",subtitle:"New Approaches and Reviews",isOpenForSubmission:!1,hash:"f6907a79a7d35f34d0c719d6297a2667",slug:"solar-cells-new-approaches-and-reviews",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/4479.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1290",title:"Solar Cells",subtitle:"New Aspects and Solutions",isOpenForSubmission:!1,hash:"52415367e48e5b68d47325bdfc81cdce",slug:"solar-cells-new-aspects-and-solutions",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/1290.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3676",title:"Solar Collectors and Panels",subtitle:"Theory and Applications",isOpenForSubmission:!1,hash:null,slug:"solar-collectors-and-panels--theory-and-applications",bookSignature:"Reccab Manyala",coverURL:"https://cdn.intechopen.com/books/images_new/3676.jpg",editedByType:"Edited by",editors:[{id:"12002",title:"Associate Prof.",name:"Reccab",surname:"Manyala",slug:"reccab-manyala",fullName:"Reccab Manyala"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1289",title:"Solar Cells",subtitle:"Silicon Wafer-Based Technologies",isOpenForSubmission:!1,hash:"76fb5123cd9acbf3c37678c5e9bd056a",slug:"solar-cells-silicon-wafer-based-technologies",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/1289.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{},chapter:{},book:{}},ofsBook:{item:{type:"book",id:"9441",leadTitle:null,title:"Ocean Thermal Energy Conversion (OTEC)",subtitle:"Past, Present, and Progress",reviewType:"peer-reviewed",abstract:"The 21st century is characterized as an era of natural resource depletion, and humanity is faced with several threats due to the lack of food, energy, and water. Climate change and sea-level rise are at unprecedented levels, being phenomena that make predicting the future of ocean resources more complicated. Oceans contain a limitless amount of water with small (but finite) temperature differences from their surfaces to their floors. To advance the utilization of ocean resources, this book readdresses the past achievements, present developments, and future progress of ocean thermal energy, from basic sciences to sociology and cultural aspects.",isbn:"978-1-78985-572-2",printIsbn:"978-1-78985-571-5",pdfIsbn:"978-1-83880-521-0",doi:"10.5772/intechopen.86591",price:119,priceEur:129,priceUsd:155,slug:"ocean-thermal-energy-conversion-otec-past-present-and-progress",numberOfPages:184,isOpenForSubmission:!1,hash:"b0f6032c45ead7f1cb11bb488bfcd48d",bookSignature:"Albert S. Kim and Hyeon-Ju Kim",publishedDate:"May 13th 2020",coverURL:"https://cdn.intechopen.com/books/images_new/9441.jpg",keywords:null,numberOfDownloads:2195,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:1,numberOfTotalCitations:1,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"May 1st 2019",dateEndSecondStepPublish:"May 30th 2019",dateEndThirdStepPublish:"August 31st 2019",dateEndFourthStepPublish:"November 9th 2019",dateEndFifthStepPublish:"January 8th 2020",remainingDaysToSecondStep:"2 years",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:"Edited by",kuFlag:!0,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"21045",title:"Prof.",name:"Albert S.",middleName:null,surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim",profilePictureURL:"https://mts.intechopen.com/storage/users/21045/images/system/21045.jpeg",biography:"Dr. Albert S. Kim earned his physics degree of BS from Kyung Hee University and MS from Yonsei University, South Korea. He received his MS (1997) and Ph.D. (2000) in Civil and Environmental Engineering from the University of California at Los Angeles, USA. He joined the Department of Civil and Environmental Engineering at the University of Hawaii at Manoa in 2001. \r\nDr. Kim’s scientific accomplishments include the US National Science Foundation Faculty Early Career (CAREER) Award (2005), the University of Hawaii Regents’ Medal for Excellence in Research (2006) and the Medal for Excellence in Teaching (2017). Professor Kim has published almost 60 peer-reviewed journal papers and four book chapters. He researches on computational environmental physics for engineering purposes.",institutionString:"University of Hawaii at Manoa",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"6",totalChapterViews:"0",totalEditedBooks:"3",institution:{name:"University of Hawaii at Manoa",institutionURL:null,country:{name:"United States of America"}}}],coeditorOne:{id:"204519",title:"Dr.",name:"Hyeon-Ju",middleName:null,surname:"Kim",slug:"hyeon-ju-kim",fullName:"Hyeon-Ju Kim",profilePictureURL:"https://mts.intechopen.com/storage/users/204519/images/system/204519.jpeg",biography:"Dr. Kim is the Principal Researcher, Offshore Plant, and Marine Energy Research Division, Korea Research Institute of Ships and Ocean Engineering (KRISO) and Project Manager of the Korean OTEC program. He received his Ph.D. at the Dept. of Ocean Engineering, Pukyong National University. His fields of specialization are Ocean Thermal Energy Conversion system technology, Seawater Desalination, and Mineral Extraction system technology, Deep Ocean Water Application technology for Food, Energy and Water. He is Vice Chairman of the Korean Society for Power System Engineering and a Member of the board of directors of the Korean Society for Marine Environment and Energy, The Korean Society of Ocean Engineering, etc.",institutionString:"Korea Research Institute of Ships and Ocean Engineering",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"0",institution:null},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"770",title:"Renewable Energy",slug:"engineering-energy-engineering-renewable-energy"}],chapters:[{id:"71764",title:"Can Ocean Thermal Energy Conversion and Seawater Utilisation Assist Small Island Developing States? A Case Study of Kiribati, Pacific Islands Region",slug:"can-ocean-thermal-energy-conversion-and-seawater-utilisation-assist-small-island-developing-states-a",totalDownloads:310,totalCrossrefCites:0,authors:[{id:"204519",title:"Dr.",name:"Hyeon-Ju",surname:"Kim",slug:"hyeon-ju-kim",fullName:"Hyeon-Ju Kim"},{id:"304123",title:"Prof.",name:"Michael",surname:"Petterson",slug:"michael-petterson",fullName:"Michael Petterson"}]},{id:"71102",title:"The Social Energy: Contexts for Its Assessment",slug:"the-social-energy-contexts-for-its-assessment",totalDownloads:299,totalCrossrefCites:0,authors:[{id:"306562",title:"Dr.",name:"Alonso",surname:"Pérez Pérez",slug:"alonso-perez-perez",fullName:"Alonso Pérez Pérez"},{id:"306856",title:"MSc.",name:"Mauricio Andres",surname:"Latapi Agudelo",slug:"mauricio-andres-latapi-agudelo",fullName:"Mauricio Andres Latapi Agudelo"},{id:"307095",title:"B.Sc.",name:"Graciela",surname:"Rivera Camacho",slug:"graciela-rivera-camacho",fullName:"Graciela Rivera Camacho"}]},{id:"70647",title:"Current Development and Prospect of Turbine in OTEC",slug:"current-development-and-prospect-of-turbine-in-otec",totalDownloads:286,totalCrossrefCites:0,authors:[{id:"304136",title:"Dr.",name:"Weimin",surname:"Liu",slug:"weimin-liu",fullName:"Weimin Liu"},{id:"304138",title:"M.Sc.",name:"Yunzheng",surname:"Ge",slug:"yunzheng-ge",fullName:"Yunzheng Ge"},{id:"304139",title:"Dr.",name:"Yun",surname:"Chen",slug:"yun-chen",fullName:"Yun Chen"},{id:"306181",title:"MSc.",name:"Lei",surname:"Liu",slug:"lei-liu",fullName:"Lei Liu"}]},{id:"70689",title:"Novel OTEC Cycle Using Efficiency Enhancer",slug:"novel-otec-cycle-using-efficiency-enhancer",totalDownloads:350,totalCrossrefCites:0,authors:[{id:"204519",title:"Dr.",name:"Hyeon-Ju",surname:"Kim",slug:"hyeon-ju-kim",fullName:"Hyeon-Ju Kim"},{id:"309185",title:"Dr.",name:"Ho-Saeng",surname:"Lee",slug:"ho-saeng-lee",fullName:"Ho-Saeng Lee"},{id:"309188",title:"Mr.",name:"Seung-Taek",surname:"Kim",slug:"seung-taek-kim",fullName:"Seung-Taek Kim"},{id:"309189",title:"Prof.",name:"Jung-In",surname:"Yoon",slug:"jung-in-yoon",fullName:"Jung-In Yoon"}]},{id:"70632",title:"Analysis and Development of Closed Cycle OTEC System",slug:"analysis-and-development-of-closed-cycle-otec-system",totalDownloads:199,totalCrossrefCites:0,authors:[{id:"306709",title:"Dr.",name:"Estela",surname:"Cerezo-Acevedo",slug:"estela-cerezo-acevedo",fullName:"Estela Cerezo-Acevedo"},{id:"306711",title:"Dr.",name:"Victor Manuel",surname:"Romero Medina",slug:"victor-manuel-romero-medina",fullName:"Victor Manuel Romero Medina"},{id:"306712",title:"Dr.",name:"Miguel",surname:"Alatorre Mendieta",slug:"miguel-alatorre-mendieta",fullName:"Miguel Alatorre Mendieta"},{id:"309398",title:"Dr.",name:"Jessica Guadalupe",surname:"Tobal Cupul",slug:"jessica-guadalupe-tobal-cupul",fullName:"Jessica Guadalupe Tobal Cupul"},{id:"309399",title:"Dr.",name:"Elda",surname:"Gomez Barragan",slug:"elda-gomez-barragan",fullName:"Elda Gomez Barragan"}]},{id:"70537",title:"Research and Development Activities of Ocean Thermal Energy-Driven Development in Malaysia",slug:"research-and-development-activities-of-ocean-thermal-energy-driven-development-in-malaysia",totalDownloads:277,totalCrossrefCites:0,authors:[{id:"193214",title:"Dr.",name:"Abu Bakar",surname:"Jaafar",slug:"abu-bakar-jaafar",fullName:"Abu Bakar Jaafar"},{id:"311007",title:"Dr.",name:"Mohd Khairi",surname:"Abu Husain",slug:"mohd-khairi-abu-husain",fullName:"Mohd Khairi Abu Husain"},{id:"311008",title:"Mr.",name:"Azrin",surname:"Ariffin",slug:"azrin-ariffin",fullName:"Azrin Ariffin"}]},{id:"70334",title:"General Criteria for Optimal Site Selection for the Installation of Ocean Thermal Energy Conversion (OTEC) Plants in the Mexican Pacific",slug:"general-criteria-for-optimal-site-selection-for-the-installation-of-ocean-thermal-energy-conversion-",totalDownloads:235,totalCrossrefCites:0,authors:[{id:"306425",title:"M.Sc.",name:"Alejandro",surname:"García Huante",slug:"alejandro-garcia-huante",fullName:"Alejandro García Huante"},{id:"306426",title:"MSc.",name:"Yandy",surname:"Rodríguez Cueto",slug:"yandy-rodriguez-cueto",fullName:"Yandy Rodríguez Cueto"},{id:"306427",title:"MSc.",name:"Erika Paola",surname:"Garduño Ruíz",slug:"erika-paola-garduno-ruiz",fullName:"Erika Paola Garduño Ruíz"},{id:"306428",title:"MSc.",name:"Ricardo Efraín",surname:"Hernández Contreras",slug:"ricardo-efrain-hernandez-contreras",fullName:"Ricardo Efraín Hernández Contreras"}]},{id:"71144",title:"Environmental Impact Assessment of the Operation of an Open Cycle OTEC 1MWe Power Plant in the Cozumel Island, Mexico",slug:"environmental-impact-assessment-of-the-operation-of-an-open-cycle-otec-1mwe-power-plant-in-the-cozum",totalDownloads:250,totalCrossrefCites:0,authors:[{id:"306709",title:"Dr.",name:"Estela",surname:"Cerezo-Acevedo",slug:"estela-cerezo-acevedo",fullName:"Estela Cerezo-Acevedo"},{id:"306847",title:"MSc.",name:"Juan Francisco",surname:"Bárcenas Graniel",slug:"juan-francisco-barcenas-graniel",fullName:"Juan Francisco Bárcenas Graniel"},{id:"306868",title:"BSc.",name:"Enrique Celestino",surname:"Carrera Chan",slug:"enrique-celestino-carrera-chan",fullName:"Enrique Celestino Carrera Chan"},{id:"306869",title:"BSc.",name:"María Fernanda",surname:"Sabido Tun",slug:"maria-fernanda-sabido-tun",fullName:"María Fernanda Sabido Tun"}]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"194667",firstName:"Marijana",lastName:"Francetic",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/194667/images/4752_n.jpg",email:"marijana@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"7583",title:"Advanced Computational Fluid Dynamics for Emerging Engineering Processes",subtitle:"Eulerian vs. Lagrangian",isOpenForSubmission:!1,hash:"896509fa2e7e659811bffd0f9779ca9d",slug:"advanced-computational-fluid-dynamics-for-emerging-engineering-processes-eulerian-vs-lagrangian",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/7583.jpg",editedByType:"Edited by",editors:[{id:"21045",title:"Prof.",name:"Albert S.",surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8416",title:"Non-Equilibrium Particle Dynamics",subtitle:null,isOpenForSubmission:!1,hash:"2c3add7639dcd1cb442cb4313ea64e3a",slug:"non-equilibrium-particle-dynamics",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/8416.jpg",editedByType:"Edited by",editors:[{id:"21045",title:"Prof.",name:"Albert S.",surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3633",title:"Solar Energy",subtitle:null,isOpenForSubmission:!1,hash:null,slug:"solar-energy",bookSignature:"Radu D Rugescu",coverURL:"https://cdn.intechopen.com/books/images_new/3633.jpg",editedByType:"Edited by",editors:[{id:"8615",title:"Prof.",name:"Radu",surname:"Rugescu",slug:"radu-rugescu",fullName:"Radu Rugescu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1288",title:"Solar Cells",subtitle:"Dye-Sensitized Devices",isOpenForSubmission:!1,hash:"05a255471069664ecf5fbf8778b92076",slug:"solar-cells-dye-sensitized-devices",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/1288.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3118",title:"Solar Cells",subtitle:"Research and Application Perspectives",isOpenForSubmission:!1,hash:"5502d7fd7559d60419f2615615ae4cf5",slug:"solar-cells-research-and-application-perspectives",bookSignature:"Arturo Morales-Acevedo",coverURL:"https://cdn.intechopen.com/books/images_new/3118.jpg",editedByType:"Edited by",editors:[{id:"90486",title:"Prof.",name:"Arturo",surname:"Morales-Acevedo",slug:"arturo-morales-acevedo",fullName:"Arturo Morales-Acevedo"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"877",title:"Third Generation Photovoltaics",subtitle:null,isOpenForSubmission:!1,hash:"c3bdfaebac38dab83a69c488bcda219d",slug:"third-generation-photovoltaics",bookSignature:"Vasilis Fthenakis",coverURL:"https://cdn.intechopen.com/books/images_new/877.jpg",editedByType:"Edited by",editors:[{id:"68723",title:"Dr.",name:"Vasilis",surname:"Fthenakis",slug:"vasilis-fthenakis",fullName:"Vasilis Fthenakis"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4479",title:"Solar Cells",subtitle:"New Approaches and Reviews",isOpenForSubmission:!1,hash:"f6907a79a7d35f34d0c719d6297a2667",slug:"solar-cells-new-approaches-and-reviews",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/4479.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1290",title:"Solar Cells",subtitle:"New Aspects and Solutions",isOpenForSubmission:!1,hash:"52415367e48e5b68d47325bdfc81cdce",slug:"solar-cells-new-aspects-and-solutions",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/1290.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3676",title:"Solar Collectors and Panels",subtitle:"Theory and Applications",isOpenForSubmission:!1,hash:null,slug:"solar-collectors-and-panels--theory-and-applications",bookSignature:"Reccab Manyala",coverURL:"https://cdn.intechopen.com/books/images_new/3676.jpg",editedByType:"Edited by",editors:[{id:"12002",title:"Associate Prof.",name:"Reccab",surname:"Manyala",slug:"reccab-manyala",fullName:"Reccab Manyala"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1289",title:"Solar Cells",subtitle:"Silicon Wafer-Based Technologies",isOpenForSubmission:!1,hash:"76fb5123cd9acbf3c37678c5e9bd056a",slug:"solar-cells-silicon-wafer-based-technologies",bookSignature:"Leonid A. Kosyachenko",coverURL:"https://cdn.intechopen.com/books/images_new/1289.jpg",editedByType:"Edited by",editors:[{id:"6262",title:"Prof.",name:"Leonid A.",surname:"Kosyachenko",slug:"leonid-a.-kosyachenko",fullName:"Leonid A. Kosyachenko"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"39967",title:"Ribosomes from Trypanosomatids: Unique Structural and Functional Properties",doi:"10.5772/48336",slug:"ribosomes-from-trypanosomatids-unique-structural-and-functional-properties",body:null,keywords:null,chapterPDFUrl:"https://cdn.intechopen.com/pdfs/39967.pdf",chapterXML:null,downloadPdfUrl:"/chapter/pdf-download/39967",previewPdfUrl:"/chapter/pdf-preview/39967",totalDownloads:1657,totalViews:134,totalCrossrefCites:0,totalDimensionsCites:1,hasAltmetrics:0,dateSubmitted:"November 22nd 2011",dateReviewed:"May 8th 2012",datePrePublished:null,datePublished:"October 10th 2012",dateFinished:null,readingETA:"0",abstract:null,reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/39967",risUrl:"/chapter/ris/39967",book:{slug:"cell-free-protein-synthesis"},signatures:"Maximiliano Juri Ayub, Walter J. Lapadula, Johan Hoebeke and Cristian R. Smulski",authors:[{id:"142454",title:"Dr",name:null,middleName:null,surname:"Hoebeke",fullName:"Hoebeke",slug:"hoebeke",email:"J.Hoebeke@skynet.be",position:null,institution:null},{id:"142455",title:"Dr.",name:"Cristian",middleName:"Roberto",surname:"Smulski",fullName:"Cristian Smulski",slug:"cristian-smulski",email:"cristian.smulski@gmail.com",position:null,institution:null},{id:"146139",title:"Dr.",name:"Maximiliano",middleName:null,surname:"Juri Ayub",fullName:"Maximiliano Juri Ayub",slug:"maximiliano-juri-ayub",email:"mayub@unsl.edu.ar",position:null,institution:null}],sections:null,chapterReferences:null,footnotes:null,contributors:null,corrections:null},book:{id:"2580",title:"Cell-Free Protein Synthesis",subtitle:null,fullTitle:"Cell-Free Protein Synthesis",slug:"cell-free-protein-synthesis",publishedDate:"October 10th 2012",bookSignature:"Manish Biyani",coverURL:"https://cdn.intechopen.com/books/images_new/2580.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"143485",title:"Prof.",name:"Manish",middleName:null,surname:"Biyani",slug:"manish-biyani",fullName:"Manish Biyani"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"39967",title:"Ribosomes from Trypanosomatids: Unique Structural and Functional Properties",slug:"ribosomes-from-trypanosomatids-unique-structural-and-functional-properties",totalDownloads:1657,totalCrossrefCites:0,signatures:"Maximiliano Juri Ayub, Walter J. Lapadula, Johan Hoebeke and Cristian R. Smulski",authors:[{id:"142454",title:"Dr",name:null,middleName:null,surname:"Hoebeke",fullName:"Hoebeke",slug:"hoebeke"},{id:"142455",title:"Dr.",name:"Cristian",middleName:"Roberto",surname:"Smulski",fullName:"Cristian Smulski",slug:"cristian-smulski"},{id:"146139",title:"Dr.",name:"Maximiliano",middleName:null,surname:"Juri Ayub",fullName:"Maximiliano Juri Ayub",slug:"maximiliano-juri-ayub"}]},{id:"39965",title:"On the Emergence and Evolution of the Eukaryotic Translation Apparatus",slug:"on-the-emergence-and-evolution-of-the-eukaryotic-translation-apparatus",totalDownloads:1313,totalCrossrefCites:0,signatures:"Greco Hernández",authors:[{id:"145994",title:"Dr.",name:"Greco",middleName:null,surname:"Hernández",fullName:"Greco Hernández",slug:"greco-hernandez"}]},{id:"39969",title:"Evolutionary Molecular Engineering to Efficiently Direct in vitro Protein Synthesis",slug:"evolutionary-molecular-engineering-to-efficiently-direct-in-vitro-protein-synthesis",totalDownloads:1488,totalCrossrefCites:1,signatures:"Manish Biyani, Madhu Biyani, Naoto Nemoto and Yuzuru Husimi",authors:[{id:"143485",title:"Prof.",name:"Manish",middleName:null,surname:"Biyani",fullName:"Manish Biyani",slug:"manish-biyani"}]},{id:"39964",title:"Protein Synthesis in vitro: Cell-Free Systems Derived from Human Cells",slug:"protein-synthesis-in-vitro-cell-free-systems-derived-from-human-cells",totalDownloads:2584,totalCrossrefCites:0,signatures:"Kodai Machida, Mamiko Masutan and Hiroaki Imataka",authors:[{id:"145934",title:"Prof.",name:"Hiroaki",middleName:null,surname:"Imataka",fullName:"Hiroaki Imataka",slug:"hiroaki-imataka"},{id:"145948",title:"Dr.",name:"Kodai",middleName:null,surname:"Machida",fullName:"Kodai Machida",slug:"kodai-machida"},{id:"155369",title:"Ms.",name:"Mamiko",middleName:null,surname:"Masutani",fullName:"Mamiko Masutani",slug:"mamiko-masutani"}]},{id:"39970",title:"Solid-Phase Cell-Free Protein Synthesis to Improve Protein Foldability",slug:"solid-phase-cell-free-protein-synthesis-to-improve-protein-foldability",totalDownloads:1703,totalCrossrefCites:0,signatures:"Manish Biyani and Takanori Ichiki",authors:[{id:"143485",title:"Prof.",name:"Manish",middleName:null,surname:"Biyani",fullName:"Manish Biyani",slug:"manish-biyani"}]},{id:"39968",title:"Cumulative Specificity: A Universal Mechanism for the Initiation of Protein Synthesis",slug:"cumulative-specificity-a-universal-mechanism-for-the-initiation-of-protein-synthesis",totalDownloads:1452,totalCrossrefCites:0,signatures:"Tokumasa Nakamoto and Ferenc J. Kezdy",authors:[{id:"150144",title:"Prof.",name:"Tokumasa",middleName:null,surname:"Nakamoto",fullName:"Tokumasa Nakamoto",slug:"tokumasa-nakamoto"},{id:"155371",title:"Dr.",name:"Ferenc J.",middleName:null,surname:"Kezdy",fullName:"Ferenc J. Kezdy",slug:"ferenc-j.-kezdy"}]},{id:"39966",title:"Protein Synthesis and the Stress Response",slug:"protein-synthesis-and-the-stress-response",totalDownloads:2899,totalCrossrefCites:7,signatures:"Assaf Katz and Omar Orellana",authors:[{id:"149776",title:"Dr.",name:"Omar",middleName:null,surname:"Orellana",fullName:"Omar Orellana",slug:"omar-orellana"}]}]},relatedBooks:[{type:"book",id:"2617",title:"Molecular Regulation of Endocytosis",subtitle:null,isOpenForSubmission:!1,hash:"dfd1b4de49c737272c722b73a0d7facb",slug:"molecular-regulation-of-endocytosis",bookSignature:"Brian Ceresa",coverURL:"https://cdn.intechopen.com/books/images_new/2617.jpg",editedByType:"Edited by",editors:[{id:"48114",title:"Dr.",name:"Brian",surname:"Ceresa",slug:"brian-ceresa",fullName:"Brian Ceresa"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"37703",title:"Key Events in Synaptic Vesicle Endocytosis",slug:"key-events-in-synaptic-vesicle-endocytosis",signatures:"Frauke Ackermann, Joshua A. Gregory and Lennart Brodin",authors:[{id:"147621",title:"Prof.",name:"Lennart",middleName:null,surname:"Brodin",fullName:"Lennart Brodin",slug:"lennart-brodin"},{id:"148775",title:"Dr.",name:"Frauke",middleName:null,surname:"Ackermann",fullName:"Frauke Ackermann",slug:"frauke-ackermann"},{id:"148776",title:"Dr.",name:"Joshua",middleName:null,surname:"Gregory",fullName:"Joshua Gregory",slug:"joshua-gregory"}]},{id:"37709",title:"The Vacuole Import and Degradation Pathway Converges with the Endocytic Pathway to Transport Cargo to the Vacuole for Degradation",slug:"the-vacuole-import-and-degradation-pathway-converges-with-the-endocytic-pathway-to-transport-cargo-t",signatures:"Abbas A. Alibhoy and Hui-Ling Chiang",authors:[{id:"147077",title:"Dr.",name:"Hui-Ling",middleName:null,surname:"Chiang",fullName:"Hui-Ling Chiang",slug:"hui-ling-chiang"},{id:"151519",title:"Mr.",name:"Abbas",middleName:null,surname:"Alibhoy",fullName:"Abbas Alibhoy",slug:"abbas-alibhoy"}]},{id:"37710",title:"The Role of Endocytosis in the Creation of the Cortical Division Zone in Plants",slug:"the-role-of-endocytosis-in-the-creation-of-the-cortical-division-zone-in-plants",signatures:"Ichirou Karahara, L. Andrew Staehelin and Yoshinobu Mineyuki",authors:[{id:"146804",title:"Dr.",name:"Yoshinobu",middleName:null,surname:"Mineyuki",fullName:"Yoshinobu Mineyuki",slug:"yoshinobu-mineyuki"},{id:"148613",title:"Dr.",name:"Ichirou",middleName:null,surname:"Karahara",fullName:"Ichirou Karahara",slug:"ichirou-karahara"},{id:"148615",title:"Prof.",name:"Andrew",middleName:null,surname:"Staehelin",fullName:"Andrew Staehelin",slug:"andrew-staehelin"}]},{id:"37711",title:"Roles of Cellular Redox Factors in Pathogen and Toxin Entry in the Endocytic Pathways",slug:"roles-of-cellular-redox-factors-in-pathogen-and-toxin-entry-in-the-endocytic-pathways",signatures:"Jianjun Sun",authors:[{id:"142839",title:"Dr.",name:"Jianjun",middleName:null,surname:"Sun",fullName:"Jianjun Sun",slug:"jianjun-sun"}]},{id:"37712",title:"Advanced Optical Imaging of Endocytosis",slug:"advanced-optical-imaging-of-endocytosis",signatures:"Jesse S. Aaron and Jerilyn A. Timlin",authors:[{id:"145101",title:"Dr.",name:"Jerilyn",middleName:null,surname:"Timlin",fullName:"Jerilyn Timlin",slug:"jerilyn-timlin"},{id:"149098",title:"Dr.",name:"Jesse",middleName:null,surname:"Aaron",fullName:"Jesse Aaron",slug:"jesse-aaron"}]},{id:"37713",title:"Imaging of Endocytosis in Paramecium by Confocal Microscopy",slug:"imaging-of-endocytosis-in-paramecium-by-confocal-microscopy",signatures:"Paola Ramoino, Alberto Diaspro, Marco Fato and Cesare Usai",authors:[{id:"145158",title:"Dr.",name:"Paola",middleName:null,surname:"Ramoino",fullName:"Paola Ramoino",slug:"paola-ramoino"},{id:"148812",title:"Prof.",name:"Alberto",middleName:null,surname:"Diaspro",fullName:"Alberto Diaspro",slug:"alberto-diaspro"},{id:"148814",title:"Prof.",name:"Marco",middleName:null,surname:"Fato",fullName:"Marco Fato",slug:"marco-fato"},{id:"148816",title:"Dr.",name:"Cesare",middleName:null,surname:"Usai",fullName:"Cesare Usai",slug:"cesare-usai"}]},{id:"37720",title:"Caveolae-Dependent Endocytosis in Viral Infection",slug:"caveolae-dependent-endocytosis-in-viral-infection",signatures:"Norica Branza-Nichita, Alina Macovei and Catalin Lazar",authors:[{id:"145513",title:"Dr.",name:"Norica",middleName:null,surname:"Branza Nichita",fullName:"Norica Branza Nichita",slug:"norica-branza-nichita"}]},{id:"37721",title:"Clathrin-Associated Endocytosis as a Route of Entry into Cells for Parvoviruses",slug:"clathrin-associated-endocytosis-as-a-route-of-entry-into-cells-for-parvoviruses",signatures:"F. Brent Johnson and Enkhmart Dudleenamjil",authors:[{id:"145118",title:"Dr.",name:"F. Brent",middleName:null,surname:"Johnson",fullName:"F. Brent Johnson",slug:"f.-brent-johnson"}]},{id:"37737",title:"Endocytosis of Non-Enveloped DNA Viruses",slug:"endocytosis-of-non-enveloped-dna-viruses",signatures:"Maude Boisvert and Peter Tijssen",authors:[{id:"144619",title:"Prof.",name:"Peter",middleName:null,surname:"Tijssen",fullName:"Peter Tijssen",slug:"peter-tijssen"},{id:"149965",title:"BSc.",name:"Maude",middleName:null,surname:"Boisvert",fullName:"Maude Boisvert",slug:"maude-boisvert"}]},{id:"37724",title:"Pathogen and Toxin Entry - How Pathogens and Toxins Induce and Harness Endocytotic Mechanisms",slug:"pathogen-and-toxin-entry-how-pathogens-and-toxins-induce-and-harness-endocytotic-mechanisms",signatures:"Thorsten Eierhoff, Bahne Stechmann and Winfried Römer",authors:[{id:"145373",title:"Prof.",name:"Winfried",middleName:null,surname:"Römer",fullName:"Winfried Römer",slug:"winfried-romer"},{id:"145376",title:"Dr.",name:"Thorsten",middleName:null,surname:"Eierhoff",fullName:"Thorsten Eierhoff",slug:"thorsten-eierhoff"},{id:"145613",title:"Dr.",name:"Bahne",middleName:null,surname:"Stechmann",fullName:"Bahne Stechmann",slug:"bahne-stechmann"}]},{id:"37725",title:"The Unique Endosomal/Lysosomal System of Giardia lamblia",slug:"the-unique-endosomal-lysosomal-system-of-giardia-lamblia",signatures:"Maria C. Touz",authors:[{id:"142741",title:"Dr.",name:"Maria",middleName:"Carolina",surname:"Touz",fullName:"Maria Touz",slug:"maria-touz"}]},{id:"37727",title:"Mutual Regulation of Receptor-Mediated Cell Signalling and Endocytosis: EGF Receptor System as an Example",slug:"mutual-regulation-of-receptor-mediated-cell-signalling-and-endocytosis-egf-receptor-system-as-an-exa",signatures:"Zhixiang Wang",authors:[{id:"146796",title:"Dr.",name:"Zhixiang",middleName:null,surname:"Wang",fullName:"Zhixiang Wang",slug:"zhixiang-wang"}]},{id:"37728",title:"Endocytosis in Notch Signaling Activation",slug:"endocytosis-in-notch-signaling-activation",signatures:"Elisa Sala, Luca Ruggiero, Giuseppina Di Giacomo and Ottavio Cremona",authors:[{id:"149522",title:"Prof.",name:"Ottavio",middleName:null,surname:"Cremona",fullName:"Ottavio Cremona",slug:"ottavio-cremona"},{id:"149524",title:"Dr.",name:"Giuseppina",middleName:null,surname:"Di Giacomo",fullName:"Giuseppina Di Giacomo",slug:"giuseppina-di-giacomo"},{id:"149526",title:"Dr.",name:"Elisa",middleName:null,surname:"Sala",fullName:"Elisa Sala",slug:"elisa-sala"},{id:"155377",title:"Dr.",name:"Luca",middleName:null,surname:"Ruggiero",fullName:"Luca Ruggiero",slug:"luca-ruggiero"}]},{id:"37731",title:"Hyaluronan Endocytosis: Mechanisms of Uptake and Biological Functions",slug:"hyaluronan-endocytosis-mechanisms-of-uptake-and-biological-functions",signatures:"Ronny Racine and Mark E. Mummert",authors:[{id:"147098",title:"PhD.",name:"Mark",middleName:null,surname:"Mummert",fullName:"Mark Mummert",slug:"mark-mummert"},{id:"147100",title:"Mr.",name:"Ronny",middleName:null,surname:"Racine",fullName:"Ronny Racine",slug:"ronny-racine"}]},{id:"37732",title:"Identification of Ubiquitin System Factors in Growth Hormone Receptor Transport",slug:"identification-of-ubiquitin-system-factors-in-growth-hormone-receptor-transport",signatures:"Johan A. Slotman, Peter van Kerkhof, Gerco Hassink, Hendrik J. Kuiken and Ger J. Strous",authors:[{id:"144795",title:"Prof.",name:"Ger",middleName:null,surname:"Strous",fullName:"Ger Strous",slug:"ger-strous"}]},{id:"37733",title:"Endocytosis of Particle Formulations by Macrophages and Its Application to Clinical Treatment",slug:"endocytosis-of-particle-formulations-by-macrophages-and-its-application-to-clinical-treatment",signatures:"Keiji Hirota and Hiroshi Terada",authors:[{id:"147552",title:"Prof.",name:"Hiroshi",middleName:null,surname:"Terada",fullName:"Hiroshi Terada",slug:"hiroshi-terada"}]},{id:"37734",title:"Endosomal Escape Pathways for Non-Viral Nucleic Acid Delivery Systems",slug:"endosomal-escape-pathways-for-non-viral-nucleic-acid-delivery-systems",signatures:"Wanling Liang and Jenny K. W. Lam",authors:[{id:"143095",title:"Dr.",name:"Jenny Ka Wing",middleName:null,surname:"Lam",fullName:"Jenny Ka Wing Lam",slug:"jenny-ka-wing-lam"},{id:"146268",title:"MSc.",name:"Wanling",middleName:null,surname:"Liang",fullName:"Wanling Liang",slug:"wanling-liang"}]}]}]},onlineFirst:{chapter:{type:"chapter",id:"75061",title:"Compound Cryptography for Internet of Things Based Industrial Automation",doi:"10.5772/intechopen.95845",slug:"compound-cryptography-for-internet-of-things-based-industrial-automation",body:'
Industrial automation plays a major role in real-time data acquisition and control applications. Modern industries depend on vastly more automation and intercommunication. Industrial process equipment is automated to do periodic data collection, event detection, control operation, real-time data acquisition, real-time inventory management, alarming etc. Industrial automation system makes installation flexibility, reduces the repairs costs, disintegration of machine control functions, monitoring the mechanical equipment parameters, error detection and improves the overall efficiency of plant operations. An industrial automation system is a computer system which monitors and controls the various industrial processes such as petrochemical plants, power plants, water treatment plant, oil and gas, food production etc. The behavior of the process changes due to the attack during data communication between devices. Automation devices such as SCADA and Programmable Logic Controller (PLC) does not have inbuilt security mechanisms. The suitable security algorithm is essential to protect the process equipment and its information from unauthorized access.
The SCADA system is widely used in industrial automation for monitoring and controls the process parameters. It is used for data gathering in a variety of applications such as power generation, petrochemical, sewage and water treatment systems, food and pharmaceutical industry. The monitoring and control of process parameters takes place in remote areas to keep up the steady state of process. SCADA systems include Master Terminal Unit (MTU), Remote Terminal Unit (RTU), network devices and SCADA software. SCADA alerts operators by alarm when conditions become hazardous. The SCADA system includes RTU, and Programmable Logic Controllers (PLC) which collect data from end-point devices like actuators, pumps, or other sensors and control ongoing processes in a plant. The plant sensitive information is transmitted between MTU and RTU that is unsecure and unsafe plant operations. The process data can be accessed and modified by the attackers. The security mechanisms are essential to protect the SCADA system from unauthorized access and to give safety for plant operators.
PLCs are used to control the process parameters and to ensure smooth plant operation. PLC and SCADA system is used together in automation and management of processes in real-time. PLCs are connected to a Human-Machine Interface (HMI) which presents current input and output values to the operators and accepts commands from the user. In SCADA system, RTU provide high processing power, communication capabilities and flexibility as compared to PLCs. The data transmitted from the PLC need to be protected from the attackers. The process data must be encrypted using suitable cryptography and the cipher text is to be transmitted over the internet to ensure confidentiality. The decryption algorithm is to be used at the receiver to get the process data in original plain text. The security policies and security mechanisms are essential for internet enabled industrial automation system.
The industrial data gathering and monitoring has greatly improved by the wireless standards and internet. The real-time process information can be transmitted through wireless medium and monitored through the internet anywhere in the world. The plant information can be monitored and controlled with the SCADA system through the internet. The control operations and management of sensitive process information are carried out in the master station. Human Machine Interface (HMI) allows operators to read various physical parameters and status of alarm. The general monitoring and supervisory functions are carried out in the corporate networks. The functions of Remote Terminal Unit (RTU) are to monitor the field analog and digital parameters and transmit data to the central control room. RTUs are connected through the remote networks.
The need for security increases due to the integration of industrial networks with Information Technology (IT) networks. Wireless and Internet technologies are essential to monitor and control the process data efficiently. The benefit of wireless technologies in industrial networks provides mobility, to manage substations, and it requires little installation and preservation cost. The control and automation functions can be performed in real-time over the internet by the use of TCP/IP standard in SCADA transmissions. The technological advancement in industrial network operations gives rise to various security risks and challenges in managing IT networks while integrating with both SCADA and corporate networks. The use of Internet in industrial networks creates additional security hazards and safety issues in the automation system. The major intrusion takes place in communication medium and data modification. The existing industrial automation equipments were not built with security mechanisms. Attackers may create new process information, can alter the process data and capture the physical channels. This leads to failure of process equipments and heavy loss to industries. It is essential to propose the novel security mechanism for secure operation in web-based industrial networks.
The major technological, operational and organizational changes increase the security problems. Most of the industries focus on improving the security in data communication, safety standards and cost reduction by applying innovative technology design. The standards and regulations of data security have to be applied during design, implementation and execution of the industrial process to ensure adequate safety, consistency and lifecycle effectiveness for all parties involved in the plant operations. Industrial Control System security requires secure management of work flow and policies. The security management involves physical access control, physical intrusion detection etc. It also requires the device security where the hardware, software and firmware need to be protected. The security in communication is another aspect where the message or data need to be protected. The supervisory and control operations are carried out by integrating the SCADA devices with remote web-based networks. Due to the web-based operation, SCADA devices become more vulnerable to various attacks.
Intrusion detection system is one of the software applications which monitors the network activities for violations and produces reports to the management. The status of security is to be monitored and tested by the continuous security assessment in the security management system. Cryptography is used to address important aspects of communication security, such as, message authentication and integrity as well as confidentiality. The hybrid cryptography algorithm is proposed which combines the asymmetric, symmetric and hash algorithms along with the dedicated hardware key all together strengthens the plant information security [1]. This hybrid algorithm provides confidentiality, integrity and ensures privacy in accessing the sensitive process data. It is essential to propose strong security mechanisms for accessing the process information through internet. The highly secure encryption decryption algorithm is proposed which is simple and it can be used for cloud computing-based applications [2]. This algorithm is based on efficient logical operations, such as XORing, addition, and subtraction as well as byte shifting. It allows selecting the secret key length and the number of rounds to generate the cipher text. Key management is the most dynamic field of research in cryptography and there are challenges in the area of industrial plant key management. The critical information such as passwords and encryption keys should be kept confidential due to security concerns in industries.
The industrial process parameters should be protected from unauthorized access during transmission. The security mechanisms are essential for data monitoring, storage and control. An enhanced data security algorithm is proposed to ensure security in the cloud [3]. The SHA-256 hashing and AES encryption algorithms are used to maintain integrity and confidentiality in the cloud. A novel parallel cryptographic algorithm is proposed which overcomes the drawback of symmetric security algorithm and hash algorithm [4]. The analysis was done with respect to computation time. The run time is less as compared to the RSA-MD5 algorithm. The additional layers of hybrid function can be performed to enhance the data integrity and security. A peculiar security protocol is formed to increase the level of security [5]. It increases the level of security by incorporating MD5 algorithm and combining the AES with RSA algorithms. The encryption and decryption of image files can be performed using the hybrid algorithm. A hybrid cryptographic algorithm is proposed which combine the Blowfish and MD5 hashing algorithm to increase data security in the cloud [6]. The various parameters include file size and execution time is evaluated. It takes less time for encryption and decryption and it occupies less storage space. An innovative identity based hybrid encryption is proposed to increase the security of outsourced data [7]. The encryption is performed using RSA and Elliptic Curve Cryptography (ECC). The data is encoded along with receiver identification. The identity and the keyword are encrypted using Proxy Re Encryption. It achieves efficiency and assures the security of user message. The hybrid cryptography algorithm is proposed which includes symmetric and hash algorithms that ensure confidentiality and integrity of process parameters [8]. It is implemented with the embedded system which enables secure monitoring of plant information over internet.
The Intrusion Detection System (IDS) is essential to preserve the SCADA system from internet attacks. IDS monitor the network activities and host to detect the security threats. The clustering based IDS are proposed to detect the attacks on SCADA systems [9]. SCADA attacks were detected by normal and critical states of process parameters of target system. When the process parameter reaches the critical state, alarms are raised. The criticality scoring algorithm is proposed to determine the state of the target system. The distributed and networked approach of SCADA system increases the cyber-attacks. The major threats are unauthorized access to the control software and network intrusion. The various possibilities of cyber-attacks on SCADA system is evaluated by using two Bayesian attack graph models [10]. The probabilities of the intruder influence the destination is determined by the Bayesian attack graph model. The evaluation results infer that the reliability of the power system becomes less due to the increase in attacks against cyber components and skill levels of attackers. The energy efficient security architecture is proposed for wireless based industrial automation systems [11]. The packet protection based on encryption consumes energy in the case of battery powered devices. The packet based selective encryption is also proposed which reduces energy consumption and detection of attacks. The results infer that the intrusion is difficult to distinguish from normal disruption at industrial operations. A Dynamic Security management mechanism is proposed which reduces security hazard, deadline miss ration and process elimination ratio of discontinuous actual process compiling on server systems [12]. The time and power utilization of extensively used security mechanisms are measured. A security hazard measures is introduced which quantifies the strength of security in real-time operations. A dual-level feedback control scheme is designed to notify the task scheduling issues. The future work includes proposal of security assessment for shared control in enterprise networks and integrity protection. A multilayer cyber-security scheme is proposed which is based on Intrusion Detection System (IDS) for safeguarding SCADA in smart grids [13]. In this work, external malicious attack is identified by a SCADA-specific IDS technique. A cyber security test-bed used to investigate vulnerabilities and hybrid intrusion detection approach is implemented in a SCADA system. The test-bed is the setup of grid connected solar panel based SCADA system in real-time. This proposed multi-attribute SCADA-IDS provides early alert, intrusion detection and prevention and abnormal behaviors in SCADA based automation system. A key management scheme is evaluated which includes session and master key updates [14]. The master station is responsible for producing the session keys. The Elliptic Curve Diffie-Hellman protocol is used in the master key update phase. This scheme of key management supports the MODBUS implementation with the required speed, greater efficiency and achieves high degree of security in SCADA communication.
The cryptography is essential for secure communication of plant information through SCADA networks. The characteristics of cryptographic algorithms are analyzed in terms of energy and time related for embedded real-time systems [15]. The analysis indicates that energy consumptions of security algorithms are non-linear to the size of the plain text. The energy cost is proportional to the run time of security algorithm with variable data size. Based on this analysis, the application of cryptographic algorithms can be extended in embedded real-time applications. The security issues in Industrial Automation and Control System (IACS) are analyzed which includes risk assessment, countermeasures, validation and monitoring of results [16]. The analysis ensures the satisfied security level can be achieved for a distributed industrial system. The efficient security management solutions will become tough due to the complexity and size of IACS. It is essential to propose advanced mechanisms to support IACS security.
A network filtering approach is proposed for the detection and mitigation of cyber-attacks [17]. It is based on the packets analysis of communication between master and slaves of SCADA system and monitoring the state of the protected system. The benefit of this proposed work is that it provides less number of negative results. A Critical State Analysis and State Proximity for detection of intrusion are proposed for SCADA systems [18]. A multidimensional metric approach is introduced which provides the measurement related to the length between a critical state and the given states. The unique security issues in electric power system are addressed which is based on SCADA Networks [19]. The SCADA system is secured by using symmetric encryption. The master station takes the Key Distribution Center (KDC) and it initiates the communication. The slave station includes security devices which generate the session key, perform the key encryption with the master key and transmit it to the equipment on the master station.
The trust system is proposed which perform active security analysis and response in order to increase the security of SCADA systems [20]. The status information delivery, issue of network node commands, packet delivery analysis in various protocols and arrangements are performed by the trust system.
The key management architecture is proposed for SCADA System that requires less number of keys stored in a RTU [21]. It reduces the operational cost for group communication. Group link is attained by using the key hierarchy configuration. The Master Terminal Unit (MTU) is able to send the information between a Sub-Master Terminal Unit and Remote Terminal Unit. In this proposed key structure, two classes of communication which includes communication between MTU and Sub-MTUs and between Sub-MTUs and RTUs. The impact of traditional Information and Communications Technologies (ICT) malware is focused on SCADA systems [22]. The experimental test-bed which includes software toolkit called MAlSim (Mobile Agent Malware Simulator). MAlSim agent class is used for simulation of malware. The vulnerabilities exist in the SCADA systems due to network connections, access control, protocols and software. A vulnerability estimation scheme is proposed to estimate the susceptibility of SCADA systems in terms of access points [23]. This work quantifies the potential impact on causes of attack. The method used in this work is to assess the losses in power system and computer networks susceptibility due to cyber-attack.
The security is a major concern for industrial operations and the process plant information should be protected from unauthorized access. The existing security mechanisms are adopted for intrusion detection, cyber-attacks, risk management, data protection by cryptography, network firewall etc. The security threats increase due to process monitoring and control through internet. It is essential to ensure process data security and privacy in accessing the plant information in the automation system.
Table 1 shows the existing security mechanisms, its advantage and disadvantage. It is identified that there is a large number security issues arises due to the integration of SCADA Network with the Information Technology Networks. Traditional ICT countermeasures cannot provide complete protection to SCADA systems. Conventional Security mechanisms are not suitable to handle the new security problems. Even though the varieties of security mechanisms are proposed, still there is a lack of security in the modern industrial automation systems. It is essential to propose efficient and less complex security algorithm to secure the data communication takes place between SCADA Networks.
Algorithm | Key size | Block size | Rounds | Encryption Speed | Security |
---|---|---|---|---|---|
AES | 128, 192, 256 bits | 128 bits | 10, 12, 14 | Fast | Considerably Secure |
DES | 56-bits | 64 bits | 16 | Very Slow | Inadequate Security |
3 DES | 112-bits | 64 bits | 48 | Very Slow | Adequate Security |
RC2 | 8–128 bits | 64 bits | 18 | Fast | Vulnerable |
RC5 | 2040 bits | 128 bits | 255 | Fast | Considerably Secure |
Blowfish | 32–448 bits | 64 bits | 16 | Fast | Vulnerable |
Proposed Algorithm (RSA and SHA) | 4096-bits and 512-bits | 470 bytes, 1024 bits | 80 | Fast | Highly Secure |
Comparison between standard and proposed cryptography algorithms.
The existing security mechanism for SCADA networks are related to hybrid encryption, intrusion detection, key management, and packet based encryption etc. The lack of strong dynamic security management mechanisms exists related to cryptography for securing SCADA systems. The SCADA system deals with remote monitoring and control of sensitive process parameters. The strong cryptographic algorithm is essential to protect the process information and equipment from unauthorized access. The existing security mechanisms and algorithms are inadequate to achieve strong security. The attackers can easily capture the process data, modifies it and retransmit to the destination. The security attack leads to failure of process instruments, major losses to the management and unsafe working condition to operators. The hybrid security algorithm is proposed to secure the plant parameters in wastewater treatment process across the internet [24]. It includes symmetric and secure hash algorithm to protect the wastewater parameters from unauthorized access and modification. It is essential to implement the protocols for secure data transmission in embedded system with wireless networks.
This proposed work focuses on securing the process information by incorporating modified asymmetric and hash algorithms. It ensures secure monitoring of plant information in real-time applications. It combines the asymmetric encryption and hash algorithm which provides data confidentiality and integrity. The large key size of 4096-bits is generated using asymmetric encryption which is not exists in the previous work and it enables secure transmission and monitoring of process information through the internet.
The temperature and gas process data is secured by performing hybrid cryptographic algorithm which includes modified asymmetric encryption and hash algorithm. The public and private keys are generated in the asymmetric algorithm to perform data encryption and decryption in order to ensure data confidentiality.
Asymmetric algorithm involves usage of public key and private key. The public key is used for encryption of process data and the private key is used for decryption of process data. It enhances the security level of sensitive plant information due to the usage of two keys.
The various steps involved in asymmetric algorithm are given below. These include
Generation of public and private keys
Encryption
Decryption
Select two different prime numbers: i and j
Calculate s = i*j
Calculate g (s) = (i-1) (j-1)
Select integer ‘d’ such that gcd(g(s)) = 1; 1 < d < g(s)
Calculate e, e = d−1(mod(g(s))
Public key, PU = (d,s)
Private key, PR = (e,s)
After generation of public and private keys, encryption is performed to convert the raw input data into cipher text that is., unreadable format. The encryption of plant information is performed at the transmitter. The encrypted data is transmitted across internet.
Assume that the original input is denoted by ‘T’. The cipher text is obtained by the formula given below.
Original text: T
Cipher text: C = Td mod s
where d – Public key.
The cipher text is obtained at the receiver and performs decryption. It converts process data in unreadable format to original plain text. The original plain text is obtained by the formula given below.
Original text: T = Ce mod s
where e – Private key.
The large key size of 4096-bit is generated in this proposed modified asymmetric algorithm. The hash algorithm is proposed which generates different hash value in order to ensure data integrity. The SHA (Secure Hash Algorithm)-512 generates intermediate hash value using the message block as key. The block size is 1024-bits, the word size is 64-bits and the number of rounds is 80. The SHA-512 algorithm is highly secured as compared to the MD5 (Message Digest) algorithm.
The SHA hash function converts input value of approximate to a constant length. The hash is smaller than the input data and it is a tiny representation of a big data which is referred to as digest. The hashing algorithm involves processing of hash function and each block size varies depending on the algorithm. The capacity of the block varies from 128-bits to 512-bits. It involves round function in which each round takes an input of a uniform size, typically merging of the latest information block and the result of the last round. The modified SHA1 algorithm is developed which expands the hash value from 160-bits to 1280-bits [25]. It is achieved by allocating four buffer registers in each round inside the compression function for eight times. This hash value was not hacked against brute force attack. The hash algorithm protects the password storage and it is used to check the data integrity.
The input message is padded first to obtain the block size of 1024-bits. The message schedule is generated to process the 1024-bit block size of the input message. It consists of eighty 64-bit words. The first 16 words are directly obtained from the 1024-bit message block. The remaining words are generated by performing permutation and mixing functions to the previously generated words. The modified asymmetric and hash algorithm is proposed that generates large key size of 4096-bit and 512-bit respectively [26]. It provides authentication and integrity of process information across internet. Authentication is essential to ensure the plant information is accessed and controlled by the authorized users.
The message block consists of two inputs which are 512-bit hash buffer and the 1024-bit message block. The hash buffer contents are processed along with the input which is called round function. The round function is to be performed for each block of 1024-bit input message. The eighty rounds are to be carried out for each message block. The eightieth round output is added to the hash buffer contents at the starting of the round process. This addition is performed for each 64-bit word of the output. The message digest is obtained from the content of hash buffer which is the processing of all N-message blocks. The key generation and encryption algorithm is proposed for ensuring privacy in Mobile Ad-Hoc Networks [27]. This key generation algorithm adds scrambling factors to generate random key sequences with essential length but incurred low execution overhead, whereas the encryption/decryption algorithm utilizes the One Time Pad (OTP) system by adding scrambling factors for data confidentiality which satisfies the randomness, diffusion, and confusion tests.
Figure 1 shows the generation of message digests of SHA 512 algorithm. The input message is first divided into block of 1024-bits long. The messages of each 1024-bit block are denoted by M (1), M (2)…M (N). The message blocks are processed one at a time, starting with a fixed initial value H(0), sequentially compute
SHA-512 for generation of message digest.
where C – Compression function.
Figure 2 shows the processing of single 1024-bit block. The message schedule array has eighty 64-bit words. Each 1024-bit block is performed with 80 rounds to generate hash value.
Processing of SHA-512 single 1024-bit block.
Figure 3 shows round function of SHA-512 hash algorithm. The intermediate output is generated which is equivalent to the addition of modulo 2^32 sum of.
SHA-512 round function.
The following quantities are performed logical XOR operation.
Rotation of block towards right by 14 places
Rotation of word towards right by 18 places
Rotation of word towards right by 41 places
The additional quantities are also appended with the eighth word in the block modulo 2^64:
The following quantities are performed with logical XOR operation.
Rotation of the first word in the block towards right by 28 bits
Rotation of word towards right by 34 bits
Rotation of word towards right by 39 bits
Finally, each of the eight words of the block that will ultimately become the hash is moved to the position of the next word in the block, with the first word in the block being replaced by the modified eighth word in the block.
The first step is to perform modified asymmetric encryption using public key. The SHA-512-bit block cipher algorithm is performed to generate hash value. The hash algorithm ensures IP security and data integrity. The process data in cipher text is transmitted across the internet.
This proposed work uses large key size of 4096-bit in the modified asymmetric algorithm and the number of rounds can be varied. It performs data encryption at very high speed. This proposed hybrid cryptographic algorithm achieves higher level of data security. It can be applicable for securing the sensitive plant information in industrial applications. The cipher text is received through the internet. The modified asymmetric decryption is performed using 4096-bits private key at the receiver. The key length is a major factor in securing the sensitive process data. The larger key size ensures that the brute force attack is infeasible. The process data in original numerical form is monitored through the SCADA system.
Table 1 shows the comparison between standard and proposed cryptographic algorithms. As compared to standard algorithms, the large key size as well as block size is generated in the proposed security algorithm. The proposed asymmetric algorithm produces the large key size of 4096-bits that strengthens the security to higher level. The number of rounds used in SHA-512 is 80 for each message block. The size of each message block is 1024-bits long. It achieves high speed of encryption. This proposed algorithm strengthens the level of security. It is suitable for securing highly sensitive plant information in industrial operations.
Table 2 shows the comparison between existing and proposed cryptographic algorithms. The asymmetric algorithm used in the proposed work generates large key size and provides authentication. The hash algorithm is also used which ensures data integrity. The key size of the existing security algorithms is low and the key size is increased in this work. The number of rounds also increased during the process of encryption. This proposed work uses one key for encryption and another key for decryption.
Authors | Algorithm | Key size | Block size | Rounds | Security |
---|---|---|---|---|---|
Vikas K.Soman [2017] | AES, ECDSA, SHA-256 | 128, 256 bits | 128 bits | 10, 12, 14 | Medium Security |
Adviti Chauhan [2017] | Blowfish, MD5 | 32–448 bits | 64 bits | 16 | Medium Security |
M. Harini [2017] | AES, RSA, MD5 | 128, 1024 bits | 128 bits | 10 | Medium Security |
Anushka Gaur [2017] | Blowfish, MD5 | 332–448 bits | 64 bits | 16 | Medium Security |
Prabukanna [2016] | RSA, ECC | 1024 bits, 256 bits | 128 bits | — | Highly Secure |
Proposed Modified Compound Cryptography algorithm | RSA and SHA | 4096-bits and 512-bits | 470 bytes, 1024 bits | 80 | Highly Secure |
Comparison between existing and proposed cryptography algorithms.
Figure 4 shows the transmission of temperature and gas process data in cipher text. The temperature and gas process data is sensed by the sensor and it is transmitted to the embedded system. This process data is encrypted using the embedded system. The hybrid encryption algorithm is proposed which combines the asymmetric encryption and hash algorithm. The encrypted data is transmitted over the internet.
Transmission of process data using embedded system with internet.
Figure 5 shows the reception of process data in cipher text through internet. The decryption is performed using embedded system and the original data in numerical form is monitored through SCADA master terminal unit.
Reception of process data using SCADA system with internet.
This proposed modified compound cryptography algorithm is performed using python. This modified asymmetric algorithm generates large key size of 4096-bit and the modified hash function of 512-bitmessage digest is generated which ensures data integrity over wireless networks. The private key is used only by the receiver to decrypt the process data. The public key is used by the sender to encrypt the process information.
The large key size of 4096-bit private key is generated from the modified asymmetric encryption which strengthens the security of sensitive process data. The private key and public key generated from the proposed modified asymmetric algorithm is given below.
-----BEGIN RSA PRIVATE KEY-----.
MIIEpAIBAAKCAQEAms7TPybmkXuzbEGcfQsBuHu2SigegjXbzlrS94ktXNevH40cpjEGEfUYxX3qoUwJXhTSNb9TnoTRNdL6cgwhdByly07dEM7 + sfK1Jw/lvLjsZQmYuoIWfJJAmNey55rD/oqkFV6wnpG5O97JJEHjCEDqpqbcUoqmbPBBAUsP5yZcvAhKJorhicPajBnN8ZOoYm6pv/1KmVBtNxY/edSKQFUsekbbMvjgkpWcqaBbGsR62NWPErK58jUReJrPYI39u + 97yGEEu3Wm2zOXjAqmTX2 + 6Jb1cXC7lMzdZ/UOQRz9Fw + BdHCIeJRMUktdjdQD4BNq5kub4tTAcqU2h6AyUQIDAQABAoIBAGPd5P0qdTeJG3hM40zvWs7OUAyK0ROi9weqI8q4XeE06q5p8/9qRMY03SQaVNB1It3khK9Tm/f5KpWUYyhLlxE2oeYEHCyJvFjDgAWRBd23VhjgFfzLiwIVv0Jac/lhJ + r/OVbn3PyOeXacBBo1vuZGKpoTrrI465//ZZAWAk5Uukb9h9CzHCiSQofbx68qXMK/bXuiWFFGRWSdOSN53eX3j/gm8 + wvWRwYBnahIhgoLIQd8mVwzSoimg4sQnAenep7y6a + 0znATQNU1boANn2vDyUHtKLIbLBI9fHAycWg3 + nKQAUBTFsxvPSBulAFalfHbSqLGGsuUW+pk1HiCKECgYEAxcXyor8Flys1Gd/lOGJPdsOitnlvecQgTZjKks+Hqfferxketdvb0mG7Hiimmz75QN + 8D6yHR/rl4rlKERTGMqm/5K6C + HQ5qUOHmneyWefRV + gKu1Zt1YcLSSY0Dpbn2LUqW6YHueBjJLPkBM7IyZGNtcn9niQPjda8MvcP32UCgYEAyGKbNrdrP4U8RlJIz6vbyo4F0viQh1ydNY6PgX/038y19dey + mPk8MQh3nZFwvN0rpsSgcOqjSj/1avXETmlGNMhFM2IfR5jnGW0oQMD8nRXfe0qheB2sEeVxlQlITIhP2WAxDOelKff0iq4yJlC5Y0utpzIC5Xq8Rq8RcA4xn0CgYEAiFggHzyr4PyjnhPx1b5I5CqZOU1cocipMHW + ahnygCXm+jXKKzvIPzCrLG5/9ZUjhyr3XqLlnKUG6RguTLpSrUjDhyccGacevWdVzBLq/PpJI15QT7iU/dkc2bAhwVEdwxOagRZkSyu7jekKsJnSaMwUsxfu5aAcrP82Pbh/09UCgYEAtyAGILb2uBIWx10jVUYFktK/19F4o3ur3 + nsk7hQHMaD86uv0MvByZY0LY2Aq2y50We + PgCGuIIjay2jWgaILmuj69L5TP6coa0AqbSLwuM3ock/9yDu1qJU6e60D + Y0JC + qwaM65TeVgAey3v/Q9t9TNWeKGaxkDPsV29iTCjECgYA0cNjdb/ifHRL0QMy3oJJjn3HAFDwbpO1UN0CQ2SoVfob1Cy7byq2NTnfPjHjheeVmLW6e3zMxHfezAJ42y3SNLHH5vVJkauecorZZMnVC8iVla8v0D/Yvti8bkigt4YcQGWSpTE8Trdjfdr6gNOgrvVJrVHWvD4R78ftZS7O + 5A==7fEnw52DyQMSF4U35duRJfs/g3HsNGDyhLlxE2oeBRDGrtKWdgDVR5ghes4xf63jkhueijvzdfhuucTG8jtjdihdbnhnxndflklddVhjgFfzLiwIVv0Jac/lhJ + r/OVbn3PyOeXacBBo1vuZGKpoTrrI465//ZZAWAk5Uukb9h9CzHCiSQofbx68qXMK/bXuiWFFGRWSdOSN53eX3j/gm8 + wvWRwYBnahIhgoLIQd8mVwzSoimg4sQnAenep7y6a + 0znATQNU1boANn2vDyUHtKLIbLBI9fHAycWg3 + nKQAUBTFsxvPSBulAFalfHbSqLGGsuUW+pk1HiCKECgYEAxcXyor8Flys1Gd/lOGJPdsOitnlvecQgTZjKks+Hqfferxketdvb0mG7Hiimmz75QN + 8D6yHR/rl4rlKERTGMqm/5K6C + HQ5qUOHmneyWefRV + gKu1Zt1YcLSSY0Dpbn2LUqW6YHueBjJLPkB7IyZGNtcn9niQPjda8MvcP32UCgYEAyGKbNrdrP4U8RlJIz6vbyo4F0vih1.
ydNY6PgX/038y19dey + mk8MQh3nZFwvN0rpsSgcOqjSj/1avXETmlGDZiAy5w7cvgjhhRTdxujNhj2gbdrrbcsxgnhhsvdDVGgtsrWAxDOelKff0iq4yJlC5Y0utpzIC5Xq8Kvdyij8dpsufjk3etundfDGTyhu4HYVsuiv7MRC4JTNEVthr6JFB8xnfmshJRMC7fklnuihvduhsuihHBGdbvhdn4hjbh9hjbhBVH3Jbvkj4shrh/rTNKJnbuir4bhjsbvBGHH9uhuiHgfsdv/gubSJ5ohybvj8afhvuIBJKugibv.
-----END RSA PRIVATE KEY-----.
-----BEGIN PUBLIC KEY-----.
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAms7TPybmkXuzbEGcfQsBuHu2SigegjXbzlrS94ktXNevH40cpjEGEfUYxX3qoUwJXhTSNb9TnoTRNdL6cgwhdByly07dEM7 + sfK1Jw/lvLjsZQmYuoIWfJJAmNey55rD/oqkFV6wnpG5O97JJEHjCEDqpqbcUoqmbPBBAUsP5yZcvAhKJorhicPajBnN8ZOoYm6pv/1KmVBtNxY/edSKQFUsekbbMvjgkpWcqaBbGsR62NWPErK58jUReJrPYI39u + 97yGEEu3Wm2zOXjAqmTX2 + 6Jb1cXC7lMzdZ/UOQRz9Fw + BdHCIeJRMUktdjdQD4BNq5kub4tTAcqU2h6AyUQIDAQAB.
-----END PUBLIC KEY-----.
The modified hash algorithm of 512-bit message digest is proposed which operates on eight 64-bit words. Each block is considered as sixteen 64-bit words, eighty 64-bit words are produced.
The initial input value to SHA-512 is hexadecimal and is given below.
7D03A66713842D93 1F83D9ABFB41BD6.
3C6EF372FE94F82B A54FF53A5F1D36F1.
5BE0CD19137E2179B05688C2B3E6C1F.
2BF549C5158E2A72510E527FADE682D1.
Each of the eight words in a block becomes the hash which is shifted to the position of the next word in the block. The first word in the block is being replaced by the modified eighth word in the block. The constant words of length 80 used in SHA-512, obtained from the fraction of cube roots of the first eighty primes, which are:
766A0ABB3C77B2A8A831C66D2DB43210240CA1CC77AC9C6E2748774CDF8E5D353380D139D95B3DF4CC5D4BECB3E42B6923F82A4AF194F9B CA273ECEEA26619391C0CB3C5C95A63243185BE4EE4B28C550C7DC3D5FFB4E2983E5152EE66DFAB72BE5D74F27B896F80DEB1FE3B1696B19BDC06A725C71235 C19BF174CF692694C 92722C851482353B6EFBE4786384.
F25E3AB5C0FBCFEC4D3B2 A0FC19DC68B8CD5B00327C898FB213FEAD.
A7DD6CDE0EB165CB0A9DCBD41FB D876F988DA83115312835B01457.
06FBE2DE92C6F592B0275BF597FC7BEEF0EE47137449123EF65CD2J L7C6E00BF33DA88FC2D5A79147930AA72559F111F1B605D019142929670A0E6E703GU281C2C92E47EDAEE62E1B21385C26C92619 A4C116B8D 2D0C8 4D2C6DFC5AC42AE50A73548BAF63DE428A2F98D728AE22E49 B69C19EF14AD227B70A8546D22FFCN6KVC24B8B70D0F89791A4506CEB DE82BDE9C76C51A30654BE308CC702081A6439EC4A7484AA6EA6 E483 5FCB6FAB3AD6FAECA2BFE8A14CF1036 CF40E35855771202E9B5DBA581.
89DBBC3956C25BF348B538F57D4F7FEE6ED178 4B0BCB5E19B48AD807.
AA98A30302426C44198C4A4758174C9EBE0A15C9BEBC90BEFFFA23631 E2597F299CFC657E2AC67178F2E372532B106AA07032BBD1B884C87814.
A1F0AB72C28DB77F523047D841B710B35131C471B78A5636F43172F604 2CAAB7B40C72493D7AB1C5ED5DA6D81181E376C085141AB5D186B8C.
721C0C207 6D192E819D6EF521806F067AA72176FBA0A637DC5A2C898.
A6113F9804BEF90DAE A81A664BBC423001682E6FF3D6B2B8A3BEF9A3.
F7B2C67915431D67C49C100D4C5B9CCA4F7763E373Y4N06CA6351E003.
826F748F82EE5DEFB2FC4ED8AA4AE3418ACB D69906245565A910.
The above hash value changes when the input value applied to the modified hash algorithm is changed. It ensures data integrity during transmission over wireless networks. The combination of modified asymmetric and hash algorithms ensures secure monitoring of plant information and protects the sensitive process data from unauthorized access. It also ensures smooth functioning of plant equipments which deals with data monitoring and control applications. Asymmetric algorithm is complex and it achieves higher level of security than the symmetric algorithm. Hash function provides protection of password and ensures data integrity. It is necessary to propose the security algorithm that ensures end-to-end secure plant operations, low latency and high speed.
This proposed work is the implementation of modified asymmetric and hash algorithms using embedded system with process monitoring through internet. The temperature and gas process data is read through the sensor and encrypted using the embedded system. The strength of the proposed modified asymmetric encryption is it generates large key size of 4096-bit and the 512-bit message digest to ensure confidentiality and integrity. This proposed modified asymmetric algorithm provides authentication and modified hash algorithm provides data integrity as well as Internet Protocol (IP) security. This encrypted data is transmitted across the internet. The cipher text is received through the internet by providing the correct IP address. The decryption algorithm is executed at the embedded system to obtain the plain text. The original process data is monitored through the SCADA master terminal. This proposed work achieves data integrity as well as data confidentiality. It offers low latency and achieves higher efficiency of more than 95 percent in securing the sensitive plant information. It allows secure monitoring of plant information through the SCADA system. This proposed work can be applicable for securing sensitive process information in any industrial applications. It provides the cost-effective solutions in protecting the expensive industrial devices from unauthorized attacks and ensures workers safety.
As a company committed to the wider dissemination of knowledge, IntechOpen supports the OAI Metadata Harvesting Protocol (OAI-PMH Version 2.0).
',metaTitle:"OAI-PMH",metaDescription:"As a firm believer in the wider dissemination of knowledge, IntechOpen supports the OAI Metadata Harvesting Protocol (OAI-PMH Version 2.0).",metaKeywords:null,canonicalURL:"/page/oai-pmh",contentRaw:'[{"type":"htmlEditorComponent","content":"The OAI-PMH (Open Archives Initiative Protocol for Metadata Harvesting) is used to govern the collection of metadata descriptions and enables other archives to access our database. The Protocol has been developed by the Open Archives Initiative, based on ensuring interoperability standards in order to ease and promote broader and more efficient dissemination of information within the scientific community.
\\n\\nWe have adopted the Protocol to increase the number of readers of our publications. All our Works are more widely accessible, with resulting benefits for scholars, researchers, students, libraries, universities and other academic institutions. Through this method of exposing metadata, IntechOpen enables citation indexes, scientific search engines, scholarly databases, and scientific literature collections to gather metadata from our repository and make our publications available to a broader academic audience.
\\n\\nAs a Data Provider, metadata for published Chapters and Journal Articles are available via our interface at the base URL:http://www.intechopen.com/oai/?.
\\n\\nREQUESTS
\\n\\nYou can find out more about the Protocol by visiting the Open Archives website. For additional questions please contact us at info@intechopen.com.
\\n\\nDATABASES
\\n\\nDatabases, repositories and search engines that provide services based on metadata harvested using the OAI metadata harvesting protocol include:
\\n\\nBASE - Bielefeld Academic Search Engine
\\n\\nOne of the world's most powerful search engines, used primarily for academic Open Access web resources.
\\n\\n\\n\\nA search engine for online catalogues of publications from all over the world.
\\n"}]'},components:[{type:"htmlEditorComponent",content:'The OAI-PMH (Open Archives Initiative Protocol for Metadata Harvesting) is used to govern the collection of metadata descriptions and enables other archives to access our database. The Protocol has been developed by the Open Archives Initiative, based on ensuring interoperability standards in order to ease and promote broader and more efficient dissemination of information within the scientific community.
\n\nWe have adopted the Protocol to increase the number of readers of our publications. All our Works are more widely accessible, with resulting benefits for scholars, researchers, students, libraries, universities and other academic institutions. Through this method of exposing metadata, IntechOpen enables citation indexes, scientific search engines, scholarly databases, and scientific literature collections to gather metadata from our repository and make our publications available to a broader academic audience.
\n\nAs a Data Provider, metadata for published Chapters and Journal Articles are available via our interface at the base URL:http://www.intechopen.com/oai/?.
\n\nREQUESTS
\n\nYou can find out more about the Protocol by visiting the Open Archives website. For additional questions please contact us at info@intechopen.com.
\n\nDATABASES
\n\nDatabases, repositories and search engines that provide services based on metadata harvested using the OAI metadata harvesting protocol include:
\n\nBASE - Bielefeld Academic Search Engine
\n\nOne of the world's most powerful search engines, used primarily for academic Open Access web resources.
\n\n\n\nA search engine for online catalogues of publications from all over the world.
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5766},{group:"region",caption:"Middle and South America",value:2,count:5227},{group:"region",caption:"Africa",value:3,count:1717},{group:"region",caption:"Asia",value:4,count:10367},{group:"region",caption:"Australia and Oceania",value:5,count:897},{group:"region",caption:"Europe",value:6,count:15789}],offset:12,limit:12,total:118188},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{sort:"dateEndThirdStepPublish"},books:[{type:"book",id:"10231",title:"Proton Therapy",subtitle:null,isOpenForSubmission:!0,hash:"f4a9009287953c8d1d89f0fa9b7597b0",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10231.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10652",title:"Visual Object Tracking",subtitle:null,isOpenForSubmission:!0,hash:"96f3ee634a7ba49fa195e50475412af4",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10652.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10653",title:"Optimization Algorithms",subtitle:null,isOpenForSubmission:!0,hash:"753812dbb9a6f6b57645431063114f6c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10653.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10655",title:"Motion Planning",subtitle:null,isOpenForSubmission:!0,hash:"809b5e290cf2dade9e7e0a5ae0ef3df0",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10655.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10657",title:"Service Robots",subtitle:null,isOpenForSubmission:!0,hash:"5f81b9eea6eb3f9af984031b7af35588",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10657.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10662",title:"Pedagogy",subtitle:null,isOpenForSubmission:!0,hash:"c858e1c6fb878d3b895acbacec624576",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10662.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10673",title:"The Psychology of Trust",subtitle:null,isOpenForSubmission:!0,hash:"1f6cac41fd145f718ac0866264499cc8",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10673.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10675",title:"Hydrostatics",subtitle:null,isOpenForSubmission:!0,hash:"c86c2fa9f835d4ad5e7efd8b01921866",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10675.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10677",title:"Topology",subtitle:null,isOpenForSubmission:!0,hash:"85eac84b173d785f989522397616124e",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10677.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10678",title:"Biostatistics",subtitle:null,isOpenForSubmission:!0,hash:"f63db439474a574454a66894db8b394c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10678.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10679",title:"Mass Production",subtitle:null,isOpenForSubmission:!0,hash:"2dae91102099b1a07be1a36a68852829",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10679.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10684",title:"Biorefineries",subtitle:null,isOpenForSubmission:!0,hash:"23962c6b77348bcbf247c673d34562f6",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10684.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:14},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:3},{group:"topic",caption:"Business, Management and Economics",value:7,count:1},{group:"topic",caption:"Chemistry",value:8,count:7},{group:"topic",caption:"Computer and Information Science",value:9,count:6},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:7},{group:"topic",caption:"Engineering",value:11,count:15},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:3},{group:"topic",caption:"Materials Science",value:14,count:5},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:24},{group:"topic",caption:"Neuroscience",value:18,count:1},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:2},{group:"topic",caption:"Physics",value:20,count:2},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Social Sciences",value:23,count:2},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:1}],offset:12,limit:12,total:187},popularBooks:{featuredBooks:[],offset:0,limit:12,total:null},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editedByType:"Edited by",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editedByType:"Edited by",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editedByType:"Edited by",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editedByType:"Edited by",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8098",title:"Resources of Water",subtitle:null,isOpenForSubmission:!1,hash:"d251652996624d932ef7b8ed62cf7cfc",slug:"resources-of-water",bookSignature:"Prathna Thanjavur Chandrasekaran, Muhammad Salik Javaid, Aftab Sadiq",coverURL:"https://cdn.intechopen.com/books/images_new/8098.jpg",editedByType:"Edited by",editors:[{id:"167917",title:"Dr.",name:"Prathna",middleName:null,surname:"Thanjavur Chandrasekaran",slug:"prathna-thanjavur-chandrasekaran",fullName:"Prathna Thanjavur Chandrasekaran"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editedByType:"Edited by",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editedByType:"Edited by",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editedByType:"Edited by",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8415",title:"Extremophilic Microbes and Metabolites",subtitle:"Diversity, Bioprospecting and Biotechnological Applications",isOpenForSubmission:!1,hash:"93e0321bc93b89ff73730157738f8f97",slug:"extremophilic-microbes-and-metabolites-diversity-bioprospecting-and-biotechnological-applications",bookSignature:"Afef Najjari, Ameur Cherif, Haïtham Sghaier and Hadda Imene Ouzari",coverURL:"https://cdn.intechopen.com/books/images_new/8415.jpg",editedByType:"Edited by",editors:[{id:"196823",title:"Dr.",name:"Afef",middleName:null,surname:"Najjari",slug:"afef-najjari",fullName:"Afef Najjari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9731",title:"Oxidoreductase",subtitle:null,isOpenForSubmission:!1,hash:"852e6f862c85fc3adecdbaf822e64e6e",slug:"oxidoreductase",bookSignature:"Mahmoud Ahmed Mansour",coverURL:"https://cdn.intechopen.com/books/images_new/9731.jpg",editedByType:"Edited by",editors:[{id:"224662",title:"Prof.",name:"Mahmoud Ahmed",middleName:null,surname:"Mansour",slug:"mahmoud-ahmed-mansour",fullName:"Mahmoud Ahmed Mansour"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"59",title:"Microbiology",slug:"biochemistry-genetics-and-molecular-biology-microbiology",parent:{title:"Biochemistry, Genetics and Molecular Biology",slug:"biochemistry-genetics-and-molecular-biology"},numberOfBooks:99,numberOfAuthorsAndEditors:2923,numberOfWosCitations:3879,numberOfCrossrefCitations:1830,numberOfDimensionsCitations:4784,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"biochemistry-genetics-and-molecular-biology-microbiology",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"8990",title:"Current Concepts in Zika Research",subtitle:null,isOpenForSubmission:!1,hash:"f410c024dd429d6eb0e6abc8973ecc14",slug:"current-concepts-in-zika-research",bookSignature:"Alfonso J. Rodriguez-Morales",coverURL:"https://cdn.intechopen.com/books/images_new/8990.jpg",editedByType:"Edited by",editors:[{id:"131400",title:"Dr.",name:"Alfonso J.",middleName:null,surname:"Rodriguez-Morales",slug:"alfonso-j.-rodriguez-morales",fullName:"Alfonso J. Rodriguez-Morales"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8133",title:"Pathogenic Bacteria",subtitle:null,isOpenForSubmission:!1,hash:"b26e69f94525a38ead8ac88e3c68631a",slug:"pathogenic-bacteria",bookSignature:"Sahra Kırmusaoğlu and Sonia Bhonchal Bhardwaj",coverURL:"https://cdn.intechopen.com/books/images_new/8133.jpg",editedByType:"Edited by",editors:[{id:"179460",title:"Dr.",name:"Sahra",middleName:null,surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7011",title:"Viruses and Viral Infections in Developing Countries",subtitle:null,isOpenForSubmission:!1,hash:"e62364f82e1b5737c8cd1b90a88c5f53",slug:"viruses-and-viral-infections-in-developing-countries",bookSignature:"Snežana Jovanović-Ćupić, Muhammad Abubakar, Ayşe Emel Önal, Muhammad Kashif Saleemi, Ana Božović and Milena Krajnovic",coverURL:"https://cdn.intechopen.com/books/images_new/7011.jpg",editedByType:"Edited by",editors:[{id:"288767",title:"Dr.",name:"Snežana",middleName:null,surname:"Jovanović-Ćupić",slug:"snezana-jovanovic-cupic",fullName:"Snežana Jovanović-Ćupić"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8032",title:"Staphylococcus and Streptococcus",subtitle:null,isOpenForSubmission:!1,hash:"b9ddbf132ac8ea9d2a7613836e5a27ca",slug:"staphylococcus-and-streptococcus",bookSignature:"Sahra Kırmusaoğlu",coverURL:"https://cdn.intechopen.com/books/images_new/8032.jpg",editedByType:"Edited by",editors:[{id:"179460",title:"Dr.",name:"Sahra",middleName:null,surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6910",title:"Bacteriophages",subtitle:"Perspectives and Future",isOpenForSubmission:!1,hash:"7f28b4e1886882252219cac01e75b69c",slug:"bacteriophages-perspectives-and-future",bookSignature:"Renos Savva",coverURL:"https://cdn.intechopen.com/books/images_new/6910.jpg",editedByType:"Edited by",editors:[{id:"252160",title:"Dr.",name:"Renos",middleName:null,surname:"Savva",slug:"renos-savva",fullName:"Renos Savva"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9354",title:"Microalgae",subtitle:"From Physiology to Application",isOpenForSubmission:!1,hash:"affa344272fbd8d5cd80cab53f814303",slug:"microalgae-from-physiology-to-application",bookSignature:"Milada Vítová",coverURL:"https://cdn.intechopen.com/books/images_new/9354.jpg",editedByType:"Edited by",editors:[{id:"253951",title:"Dr.",name:"Milada",middleName:null,surname:"Vítová",slug:"milada-vitova",fullName:"Milada Vítová"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7240",title:"Growing and Handling of Bacterial Cultures",subtitle:null,isOpenForSubmission:!1,hash:"a76c3ef7718c0b72d0128817cdcbe6e3",slug:"growing-and-handling-of-bacterial-cultures",bookSignature:"Madhusmita Mishra",coverURL:"https://cdn.intechopen.com/books/images_new/7240.jpg",editedByType:"Edited by",editors:[{id:"204267",title:"Dr.",name:"Madhusmita",middleName:null,surname:"Mishra",slug:"madhusmita-mishra",fullName:"Madhusmita Mishra"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8038",title:"Pseudomonas Aeruginosa",subtitle:"An Armory Within",isOpenForSubmission:!1,hash:"308d6be5ffbb4b2caa0a7c4146a7737d",slug:"pseudomonas-aeruginosa-an-armory-within",bookSignature:"Dinesh Sriramulu",coverURL:"https://cdn.intechopen.com/books/images_new/8038.jpg",editedByType:"Edited by",editors:[{id:"91317",title:"Dr.",name:"Dinesh",middleName:null,surname:"Sriramulu",slug:"dinesh-sriramulu",fullName:"Dinesh Sriramulu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7953",title:"Bioluminescence",subtitle:"Analytical Applications and Basic Biology",isOpenForSubmission:!1,hash:"3a8efa00b71abea11bf01973dc589979",slug:"bioluminescence-analytical-applications-and-basic-biology",bookSignature:"Hirobumi Suzuki",coverURL:"https://cdn.intechopen.com/books/images_new/7953.jpg",editedByType:"Edited by",editors:[{id:"185746",title:"Dr.",name:"Hirobumi",middleName:null,surname:"Suzuki",slug:"hirobumi-suzuki",fullName:"Hirobumi Suzuki"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6965",title:"Helicobacter Pylori",subtitle:"New Approaches of an Old Human Microorganism",isOpenForSubmission:!1,hash:"acf3954c4d9d440038f3074fb81d7411",slug:"helicobacter-pylori-new-approaches-of-an-old-human-microorganism",bookSignature:"Bruna Maria Roesler",coverURL:"https://cdn.intechopen.com/books/images_new/6965.jpg",editedByType:"Edited by",editors:[{id:"54995",title:"Dr.",name:"Bruna Maria",middleName:null,surname:"Roesler",slug:"bruna-maria-roesler",fullName:"Bruna Maria Roesler"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6970",title:"The Universe of Escherichia coli",subtitle:null,isOpenForSubmission:!1,hash:"92027ca0bca1f8ae2971739a4ae6af84",slug:"the-universe-of-escherichia-coli",bookSignature:"Marjanca Starčič Erjavec",coverURL:"https://cdn.intechopen.com/books/images_new/6970.jpg",editedByType:"Edited by",editors:[{id:"58980",title:"Dr.",name:"Marjanca",middleName:null,surname:"Starčič Erjavec",slug:"marjanca-starcic-erjavec",fullName:"Marjanca Starčič Erjavec"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6588",title:"Plasmid",subtitle:null,isOpenForSubmission:!1,hash:"7411c33be05d3ce296d294c3c01af404",slug:"plasmid",bookSignature:"Munazza Gull",coverURL:"https://cdn.intechopen.com/books/images_new/6588.jpg",editedByType:"Edited by",editors:[{id:"186160",title:"Prof.",name:"Munazza",middleName:null,surname:"Gull",slug:"munazza-gull",fullName:"Munazza Gull"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:99,mostCitedChapters:[{id:"18396",doi:"10.5772/22331",title:"Salinity Stress and Salt Tolerance",slug:"salinity-stress-and-salt-tolerance",totalDownloads:21123,totalCrossrefCites:43,totalDimensionsCites:112,book:{slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",title:"Abiotic Stress in Plants",fullTitle:"Abiotic Stress in Plants - Mechanisms and Adaptations"},signatures:"Petronia Carillo, Maria Grazia Annunziata, Giovanni Pontecorvo, Amodio Fuggi and Pasqualina Woodrow",authors:[{id:"47290",title:"Prof.",name:"Giovanni",middleName:null,surname:"Pontecorvo",slug:"giovanni-pontecorvo",fullName:"Giovanni Pontecorvo"},{id:"47803",title:"Dr.",name:"Pasqualina",middleName:null,surname:"Woodrow",slug:"pasqualina-woodrow",fullName:"Pasqualina Woodrow"},{id:"47804",title:"Prof.",name:"Petronia",middleName:null,surname:"Carillo",slug:"petronia-carillo",fullName:"Petronia Carillo"},{id:"47808",title:"Prof.",name:"Amodio",middleName:null,surname:"Fuggi",slug:"amodio-fuggi",fullName:"Amodio Fuggi"},{id:"47809",title:"Dr.",name:"Maria Grazia",middleName:null,surname:"Annunziata",slug:"maria-grazia-annunziata",fullName:"Maria Grazia Annunziata"}]},{id:"25750",doi:"10.5772/32009",title:"Gateway Vectors for Plant Genetic Engineering: Overview of Plant Vectors, Application for Bimolecular Fluorescence Complementation (BiFC) and Multigene Construction",slug:"gateway-vectors-for-plant-genetic-engineering-overview-of-plant-vectors-application-for-bimolecular-",totalDownloads:11432,totalCrossrefCites:34,totalDimensionsCites:77,book:{slug:"genetic-engineering-basics-new-applications-and-responsibilities",title:"Genetic Engineering",fullTitle:"Genetic Engineering - Basics, New Applications and Responsibilities"},signatures:"Yuji Tanaka, Tetsuya Kimura, Kazumi Hikino, Shino Goto,\nMikio Nishimura, Shoji Mano and Tsuyoshi Nakagawa",authors:[{id:"89749",title:"Prof.",name:"Tsuyoshi",middleName:null,surname:"Nakagawa",slug:"tsuyoshi-nakagawa",fullName:"Tsuyoshi Nakagawa"},{id:"124398",title:"MSc.",name:"Yuji",middleName:null,surname:"Tanaka",slug:"yuji-tanaka",fullName:"Yuji Tanaka"},{id:"124404",title:"Dr.",name:"Tetsuya",middleName:null,surname:"Kimura",slug:"tetsuya-kimura",fullName:"Tetsuya Kimura"},{id:"124405",title:"Ms.",name:"Kazumi",middleName:null,surname:"Hikino",slug:"kazumi-hikino",fullName:"Kazumi Hikino"},{id:"124406",title:"Dr.",name:"Shino",middleName:null,surname:"Goto",slug:"shino-goto",fullName:"Shino Goto"},{id:"124407",title:"Dr.",name:"Shoji",middleName:null,surname:"Mano",slug:"shoji-mano",fullName:"Shoji Mano"},{id:"124408",title:"Prof.",name:"Mikio",middleName:null,surname:"Nishimura",slug:"mikio-nishimura",fullName:"Mikio Nishimura"}]},{id:"37734",doi:"10.5772/46006",title:"Endosomal Escape Pathways for Non-Viral Nucleic Acid Delivery Systems",slug:"endosomal-escape-pathways-for-non-viral-nucleic-acid-delivery-systems",totalDownloads:6988,totalCrossrefCites:24,totalDimensionsCites:66,book:{slug:"molecular-regulation-of-endocytosis",title:"Molecular Regulation of Endocytosis",fullTitle:"Molecular Regulation of Endocytosis"},signatures:"Wanling Liang and Jenny K. W. Lam",authors:[{id:"143095",title:"Dr.",name:"Jenny Ka Wing",middleName:null,surname:"Lam",slug:"jenny-ka-wing-lam",fullName:"Jenny Ka Wing Lam"},{id:"146268",title:"MSc.",name:"Wanling",middleName:null,surname:"Liang",slug:"wanling-liang",fullName:"Wanling Liang"}]}],mostDownloadedChaptersLast30Days:[{id:"62883",title:"Adenoviral Vector-Based Vaccines and Gene Therapies: Current Status and Future Prospects",slug:"adenoviral-vector-based-vaccines-and-gene-therapies-current-status-and-future-prospects",totalDownloads:3222,totalCrossrefCites:4,totalDimensionsCites:10,book:{slug:"adenoviruses",title:"Adenoviruses",fullTitle:"Adenoviruses"},signatures:"Shakti Singh, Rakesh Kumar and Babita Agrawal",authors:null},{id:"62731",title:"An Introductory Chapter: Secondary Metabolites",slug:"an-introductory-chapter-secondary-metabolites",totalDownloads:7600,totalCrossrefCites:7,totalDimensionsCites:16,book:{slug:"secondary-metabolites-sources-and-applications",title:"Secondary Metabolites",fullTitle:"Secondary Metabolites - Sources and Applications"},signatures:"Durairaj Thirumurugan, Alagappan Cholarajan, Suresh S.S. Raja and\nRamasamy Vijayakumar",authors:[{id:"176044",title:"Dr.",name:"Ramasamy",middleName:null,surname:"Vijayakumar",slug:"ramasamy-vijayakumar",fullName:"Ramasamy Vijayakumar"}]},{id:"55303",title:"Classification of Anti‐Bacterial Agents and Their Functions",slug:"classification-of-anti-bacterial-agents-and-their-functions",totalDownloads:7443,totalCrossrefCites:5,totalDimensionsCites:8,book:{slug:"antibacterial-agents",title:"Antibacterial Agents",fullTitle:"Antibacterial Agents"},signatures:"Hamid Ullah and Saqib Ali",authors:[{id:"201024",title:"Dr.",name:"Hamid",middleName:null,surname:"Ullah",slug:"hamid-ullah",fullName:"Hamid Ullah"},{id:"202624",title:"Dr.",name:"Saqib",middleName:null,surname:"Ali",slug:"saqib-ali",fullName:"Saqib Ali"}]},{id:"49873",title:"An Introduction to Actinobacteria",slug:"an-introduction-to-actinobacteria",totalDownloads:6213,totalCrossrefCites:12,totalDimensionsCites:53,book:{slug:"actinobacteria-basics-and-biotechnological-applications",title:"Actinobacteria",fullTitle:"Actinobacteria - Basics and Biotechnological Applications"},signatures:"Ranjani Anandan, Dhanasekaran Dharumadurai and Gopinath\nPonnusamy Manogaran",authors:[{id:"48914",title:"Dr.",name:"Dharumadurai",middleName:null,surname:"Dhanasekaran",slug:"dharumadurai-dhanasekaran",fullName:"Dharumadurai Dhanasekaran"}]},{id:"60723",title:"Production of Plant Secondary Metabolites by Using Biotechnological Tools",slug:"production-of-plant-secondary-metabolites-by-using-biotechnological-tools",totalDownloads:3315,totalCrossrefCites:12,totalDimensionsCites:23,book:{slug:"secondary-metabolites-sources-and-applications",title:"Secondary Metabolites",fullTitle:"Secondary Metabolites - Sources and Applications"},signatures:"Sandra Gonçalves and Anabela Romano",authors:[{id:"193464",title:"Prof.",name:"Anabela",middleName:null,surname:"Romano",slug:"anabela-romano",fullName:"Anabela Romano"},{id:"193968",title:"Dr.",name:"Sandra",middleName:null,surname:"Gonçalves",slug:"sandra-goncalves",fullName:"Sandra Gonçalves"}]},{id:"49285",title:"Morphological Identification of Actinobacteria",slug:"morphological-identification-of-actinobacteria",totalDownloads:7408,totalCrossrefCites:12,totalDimensionsCites:27,book:{slug:"actinobacteria-basics-and-biotechnological-applications",title:"Actinobacteria",fullTitle:"Actinobacteria - Basics and Biotechnological Applications"},signatures:"Qinyuan Li, Xiu Chen, Yi Jiang and Chenglin Jiang",authors:[{id:"175852",title:"Dr.",name:"Chen",middleName:null,surname:"Jiang",slug:"chen-jiang",fullName:"Chen Jiang"}]},{id:"12955",title:"Organochlorine Pesticides in Human Serum",slug:"organochlorine-pesticides-in-human-serum",totalDownloads:6725,totalCrossrefCites:5,totalDimensionsCites:8,book:{slug:"pesticides-strategies-for-pesticides-analysis",title:"Pesticides",fullTitle:"Pesticides - Strategies for Pesticides Analysis"},signatures:"Jung-Ho Kang and Yoon-Seok Chang",authors:[{id:"15477",title:"Dr.",name:"Yoon-Seok",middleName:null,surname:"Chang",slug:"yoon-seok-chang",fullName:"Yoon-Seok Chang"},{id:"16817",title:"Dr.",name:"Jung-Ho",middleName:null,surname:"Kang",slug:"jung-ho-kang",fullName:"Jung-Ho Kang"}]},{id:"59952",title:"Probiotics and Its Relationship with the Cardiovascular System",slug:"probiotics-and-its-relationship-with-the-cardiovascular-system",totalDownloads:1330,totalCrossrefCites:2,totalDimensionsCites:3,book:{slug:"probiotics-current-knowledge-and-future-prospects",title:"Probiotics",fullTitle:"Probiotics - Current Knowledge and Future Prospects"},signatures:"Suresh Antony and Marlina Ponce de Leon",authors:[{id:"45333",title:"Dr.",name:"Suresh",middleName:"Jude",surname:"Antony",slug:"suresh-antony",fullName:"Suresh Antony"}]},{id:"53566",title:"History of Cell Culture",slug:"history-of-cell-culture",totalDownloads:4855,totalCrossrefCites:12,totalDimensionsCites:14,book:{slug:"new-insights-into-cell-culture-technology",title:"New Insights into Cell Culture Technology",fullTitle:"New Insights into Cell Culture Technology"},signatures:"Magdalena Jedrzejczak-Silicka",authors:[{id:"186478",title:"Dr.",name:"Magdalena",middleName:null,surname:"Jedrzejczak-Silicka",slug:"magdalena-jedrzejczak-silicka",fullName:"Magdalena Jedrzejczak-Silicka"}]},{id:"66740",title:"Bacteriophages: Their Structural Organisation and Function",slug:"bacteriophages-their-structural-organisation-and-function",totalDownloads:973,totalCrossrefCites:1,totalDimensionsCites:5,book:{slug:"bacteriophages-perspectives-and-future",title:"Bacteriophages",fullTitle:"Bacteriophages - Perspectives and Future"},signatures:"Helen E. White and Elena V. Orlova",authors:[{id:"101052",title:"Prof.",name:"Elena",middleName:null,surname:"Orlova",slug:"elena-orlova",fullName:"Elena Orlova"},{id:"262804",title:"Dr.",name:"Helen",middleName:null,surname:"White",slug:"helen-white",fullName:"Helen White"}]}],onlineFirstChaptersFilter:{topicSlug:"biochemistry-genetics-and-molecular-biology-microbiology",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"onlineFirst.detail",path:"/online-first/compound-cryptography-for-internet-of-things-based-industrial-automation",hash:"",query:{},params:{chapter:"compound-cryptography-for-internet-of-things-based-industrial-automation"},fullPath:"/online-first/compound-cryptography-for-internet-of-things-based-industrial-automation",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()