Mexico rules and regulation.
\r\n\tIt is a relatively simple process and a standard tool in any industry. Because of the versatility of the titration techniques, nearly all aspects of society depend on various forms of titration to analyze key chemical compounds.
\r\n\tThe aims of this book is to provide the reader with an up-to-date coverage of experimental and theoretical aspects related to titration techniques used in environmental, pharmaceutical, biomedical and food sciences.
In this research, it is revealed how algorithms are integrated into different representations of the data, information seen as signals, images, video and text.
Alan Turing’s test, proposed in 1950, was designed to provide an operational and satisfactory definition of intelligence.
He suggested a test based on the inability to differentiate between indisputable intelligent entities and human beings.
The computer should have the following capabilities
Natural language processing, which allows you to communicate in English.
Representation of knowledge, to store what is known or felt.
Automatic reasoning, to use stored information to answer questions and draw new conclusions.
Machine learning, to adapt to new circumstances and to detect and extrapolate patterns.
Computational vision, to perceive objects.
Robotics, to manipulate and move objects.
These six disciplines cover most of the Artificial Intelligence (AI), in reference [1, 2].
The Artificial Intelligence is the study of how to make computer do things which, at the moment, people do better, in Ref. [2].
It considers high order constraints which can be represented as a collection dev binary options F <> T, in Ref. [3].
An automaton is a graphic representation of a process, which simulates a sequential process, by means of a deterministic finite automaton, the use of a regular expression can be modeled, and this, in turn, can be evaluated by algorithmic complexity.
There is a counterpart which obeys different inputs at the beginning and consequently can represent several outputs, so we proceed by means of a mechanism to migrate them as a finite deterministic automaton, similarities with neural networks in terms of structure, but not functioning because they pursue different aspect.
Regarding its sequential form, it can be simulated by means of a flow diagram as a graphic form, however, in its parallel form, it must be used either an activity diagram or a Petri net, which can model the concurrent behavior, in reference [4].
Because the keys are usually registered by characters of the ASCII code, they can be validated by regular expressions and this in turn then recreating validation controls by deterministic finite automata.
When a possible entry is described under this form, then we are in the presence of an entry control but not access.
For access, we search for a match of a stored key to managing access to the data, if the password is treated by a cryptographic system then the entry and access controls do not change their form, but the time of computation to corroborate its degree of efficiency.
By having access control list (ACL), the restrictions are carried out through the management of routing tables and entry rules.
The use of ACL increases the level of security in information systems.
The use of Firewalls allows having an accurate strategy as if it were a blog.
Cryptographic systems have been implemented to treat various types of data and signals such as multimedia so that not only text can be treated.
In this way its study is of interest because in applications oriented to the control and automation of signals in greenhouses, home automation, automation, automation and control, information security in closed or public environments, the integration of microcontrollers is intended which can supply to a large extent, restrictive measures which make their assurance slow.
In this research, it is revealed how algorithms are integrated into the different representations of the data, information seen as signals, images, video, and text.
The signals are presented in the form of a 1D dimension, two 2D dimensions, and three 3D dimensions. It is important to understand that as the degree of complexity is advanced, it increases as the subject deserves or intends for an even more exhaustive study.
This research does not intend to venture to deny or violate systems, but as a form of prevention, to continue with research studies, still need to specify the cryptanalysis for each system, only the studies discussed so far are presented.
The use of technology in today’s world is inevitable. Whether it is making reservations on our smartphones, or checking emails, or checking in for flights, usage of technology is present. Whilst its benefits cannot be questioned, unfortunately, the increase of our reliance on technology implies that we are at higher risk of attack and breaches – cyber-attacks. Responding to this current scenario, current trends of governments protecting their critical infrastructures is the implementation of cybersecurity standards to their critical sectors, in reference [5]. The Global Risk 2014 by World Economic Forum (WEF) shows the ‘cyber-attacks’ listed in the top 5 global risks, highlighting that the dependency on technology by economies and societies is inevitable, in reference [6].
The implementation of cybersecurity standards is by no means a silver bullet in critical infrastructure protection. However, its implementation can establish a set of controls that contribute and build better resiliency. The cybersecurity standards may support the capabilities of preparing, protecting, responding and recovering from cyber-attacks. Some of the common cybersecurity-related standards being implemented globally include the following (not exhaustive): ISO/IEC 27032:2012. Information technology – Security techniques – Guidelines for cybersecurity. ISO/IEC 27001 Information technology – Security techniques – Information security management systems-Requirements. ISO 22301 Societal security – Business continuity management systems-Requirements. ISO/IEC 15408 Information technology – Security techniques – Evaluation criteria for IT security. ISO/IEC 27035 Information technology – Security techniques – Information security incident management. ISO/IEC 27005 Information technology – Security techniques – Information security risk management. FIPS 140-1: Security Requirements for Cryptographic Modules. FIPS 186-3: Digital Signature Standard, in reference [5].
Countries take different approaches towards implementing cybersecurity standards in the efforts of protecting their critical infrastructures. Some countries implement cybersecurity standards through mandatory requirements, whilst others provide guidelines and frameworks, in reference [5].
The United Kingdom’s priorities for action is to model the best practice on cyber security in the government systems which will set the standard for suppliers to government to raise the bar on cybersecurity requirement.
Due to this:
UK has enforced compliance to the Network Interoperability Consultative Committee (NICC) Minimum Security Standards (ND 1643) through the Communications Act 2003 to the Communications Sector,
UK has developed the cyber security and information assurance standards – Information Assurance Maturity Model (IAMM) incorporating the requirements from the Security Policy Framework (SPF),
SPF recognizes and has aligned its principles to the ISO/IEC 27001 and the Business Continuity Management (BCM) standards (BS 25999/ISO 22301), and.
The application of standards is promoted through the establishment of national-level certification schemes for the following standards such as the ISO/IEC 15408, ISO/IEC 27001, ISO/IEC 20000, BS 25999 and ISO 22301, in Ref. [5].
Australia’s cybersecurity standards compliance implementation is supported by the country’s Cybersecurity Strategy 2009 highlighting the need for a consistent and integrated framework of policies, procedures and standards to protect its government’s systems, as well as the other interconnected systems. Australia’s security measures are: (1) the development and enforcement of the Protective Security Policy Framework (PSPF) to the government agencies through a Directive by the Attorney-General Department (AGD), (2) Australian government has enforced the ISO/IEC 15408 for procurement of products with security functions in the Government Sector, and (3) standards implemented voluntarily and adopted by critical infrastructure organizations are the American National Standard Institute/International Society of Automation (ANSI/ISA)-99, Industrial Automation and Control Systems Security and ISO27799 Health Informatics – Information security management in health using ISO/IEC 27002.
United States of America (USA) has developed various national strategies on cyber security: (1) The Comprehensive National Cybersecurity Initiative (CNCI) will evolve to become the key element of a broader updated national USA cyber security strategy, (2) standards mandated to the Energy and Dams sectors are the Reliability Standards Critical Infrastructure Protection (CIP) 002-009 through the Code of Laws of the United States of America (U.S.C)Title 16 – Conservation, Section 824o – Electric Reliability (16 U.S.C 824o), (3) the standards mandated for the Government Sector is the Federal Information Processing Standards (FIPS) through Federal Information Security Management Act 2002 (FISMA), (4) other standards in the critical sectors are ISO 27799, ISO/IEC 27010 Information technology – Security techniques – Information security management for inter-sector and inter-organizational communications as well as ISO/IEC 27011 Information technology – Security techniques – Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 for Telecommunications and ISO/ IECTR 27015 Information technology – Security techniques – Information security management guidelines for financial services for Financial Services, and (5) the government promotes the application of cyber security standards via establishment of national-level certification schemes for the following standards such as ISO/IEC 27001, ISO/IEC 27005, ISO/IEC 27006, ISO/IEC 20000, and ISO 22301, in reference [5].
The different approaches that countries take to cybersecurity standard compliance show that cybersecurity standards whether implemented mandatorily or voluntarily is a measure to enhance the protection of the critical infrastructure. Enforcing cybersecurity standards compliance may bring about a positive outcome to the overall cybersecurity management of a country, and not just the organizations implementing them, in reference [5].
In Mexico, computer legislation is distributed in different rules and laws because the way in which it is pursued depends on the nature of the crime, then a list of some of the most common: show in Table 1.
1. E-commerce | Procurement Law, leases and public sector services (Ley de adquisiciones, arrendamientos y servicios del sector público) |
Commercial code (Código de comercio) | |
Federal civil code (Código civil federal) | |
Federal Law for Protection of the Consumer (Ley federal de protección al consumidor) | |
Federal Law of Administrative Procedure (Ley Federal de Procedimiento Administrativo) | |
Law of Investment Funds (Ley de Fondos de Inversión) | |
Federation fiscal Code (Código Fiscal de la Federación) | |
Social Security Law (Ley del Seguro Social) | |
2. Electronic signature | Advanced Electronic Signature Law (Ley de Firma Electrónica Avanzada) |
Law of the Tax Administration Service (Ley del Servicio de Administración Tributaria) | |
3. Personal data protection | Law of Investment Funds (Ley de Fondos de Inversión) |
Federal Law on Protection of Personal Data in Possession of Individuals (Ley Federal de Protección de Datos Personales en Posesión de los Particulares) | |
4. Right to the information | Article 6 Constitutional (Artículo 6° Constitucional) |
General Law of Transparency (Ley General de Transparencia) | |
Access to public information (Acceso a la Información Pública) | |
Federal Transparency Law (Ley Federal de Transparencia) | |
Access to public information (Acceso a la Información Pública) | |
5. Violation of correspondence | Article 173 to 177 of the Federal Criminal Code (Artículo 173 al 177 del Código Penal Federal) |
6. Revelation of secrets | Article 210 to 211 Bis of the Federal Penal Code (Artículo 210 al 211 Bis del Código Penal Federal) |
7. Illicit access to computer systems and equipment | Articles from 211 bis 1 to 211 bis 7 of the Federal Criminal Code. (Artículos del 211 bis 1 al 211 bis 7 del Código Penal Federal). |
8. Copyright | Articles from 424 to 429 of the Federal Penal Code (Artículos del 424 al 429 del Código Penal Federal). |
9. Industrial property | Industrial property law (Ley de la propiedad industrial). |
10. Stock market | Law of the marketc of values (Ley del mercado de valores). |
11. Telecommunication | Federal Law on Telecommunications and Broadcasting (Ley Federal de Telecomunicaciones y Radiodifusión) |
Federal Criminal Code and Political Constitution of the United Mexican States (Código Penal Federal y Constitución Política de los Estados Unidos Mexicanos) |
The year 2015 marked a milestone in efforts to eradicate poverty and promote prosperity for all people on a safe planet. With the adoption of the 2030 Agenda for Sustainable Development and other major international commitments. The 2030 Agenda is centered on a set of far-reaching and people-centered universal Sustainable Development Goals (SDGs). Reaching these goals in all countries and creating peaceful, just and inclusive societies will be extremely difficult in the absence of effective, accountable and inclusive institutions. Institutions need to be capable and equipped to adapt the Agenda to the national situation.
They need to be able to mobilize the society and the private sector in implementing the SDGs. Capacities and innovation will be required to promote policy integration, enhance public accountability, promote participation for more inclusive societies as well as ensure equitable and effective public services for all, particularly for the poorest and most vulnerable groups. Information and Communication Technology (ICT) and e-government are important tools to realize these objectives, in reference [8].
The 2030 Agenda itself recognized that “the spread of information and communications technology and global interconnectedness has great potential to accelerate human progress, to bridge the digital divide and to develop knowledge societies, as does scientific and technological innovation across areas as diverse as medicine and energy”, in reference [8].
The General Assembly has recognized on several occasions the role of information and communications technology in promoting sustainable development and supporting public policies and service delivery. It has underscored that ICT have enabled breakthroughs “in Government and the provision of public services, education, healthcare and employment, as well as in business, agriculture and science, with greater numbers of people having access to services and data that might previously been out of reach or unaffordable”. The General Assembly has also specifically affirmed the “potential of e-government in promoting transparency, accountability, efficiency and citizen engagement in public service delivery”, in reference [8].
There are several definitions in circulation which differ as to the meaning or scope of the term “eGov”. Next definitions illustrate different scope or stress in the understanding of what eGov is: (A) United Nations: the employment of the Internet and the world-wide-web for delivering government information and services to the citizens, (B) The World Wide Web Consortium says that is the use of the Web and other information technologies by governments to interact with the citizenry, between departments and divisions, and with other governments. (C) The Organization for Economic Co-operation and Development focuses on the use of new information and communication technologies (ICTs) by governments as applied to the full range of government functions. In particular, the networking potential offered by the Internet and related technologies has the potential to transform the structures and operation of government, in reference [9].
From the business perspective, eGov is a way of introducing new channels of interaction between government and consumers of its services, in order to make this interaction more convenient to the consumers and cheaper for the provider of the services, these business benefits, including the following
Facilitating access to government data and processes to all types of consumers of these services, be it general public, business, government agencies or their employees, or other governments.
Improving operational characteristics of government, including: (1) decreasing the cost to government of providing quality services to their consumers, (2) decreasing the load on the office workers by making at least some types of data or some of business processes directly available to service consumers.
The reach of eGov services can be widened from initialized specialized groups to all consumers that have a need and a right for using the service without incurring substantial additional costs, in reference [9].
The International Organization for Standardization (ISO) has the ISO/IEC 27000 family of standards, which aims to help in the management of asset security such as financial information, intellectual property and confidential information of employees or third parties.
Both ISO (the International Organization for Standardization) and IEC (International Electrotechnical Commission) make up the specialized system for global standardization, in Ref. [10].
The implementation of this system aims to preserve the confidentiality, integrity and availability of the information, through the application of a risk management process, which gives certainty to the interested parties that the risk has been adequately managed. They are considered best practices and are not considered mandatory as mentioned on their website, in Ref. [11].
In North America, there is NIST (National Institute of Standard Technology) of the United States Department of Commerce. This Institute handles issues of cybersecurity and privacy through the application of standards and best practices, including the ISO/IEC 27000 standards, in order to help organizations, manage the risk of cybersecurity within of a framework, in Ref. [12]. This framework includes physical, cybernetic and people security, applicable to organizations dependent on technology, such as industrial control systems, Information Technologies, cyber-physical systems, or connected devices, this includes the IoT (Internet of Things), in Ref. [13].
NIST has the National Cybersecurity Improvement Commission that is looking for:
Awareness and protection at all levels of government, business and society to protect privacy,
Guarantee public security and national economic security.
Empower the Americans to have better control of their digital security.
Within NIST is the NC Coe (National Cybersecurity Center of Excellence), which are agreements with industry and institutions that participate in projects related to the topic of cybersecurity, in Ref. [14]. When information security is implemented, and the rules related to the country and form of government are respected, then its regulation must be followed to concretize the integration of the strategies involved. Such as applicable international norms and standards for their protection. Within the IT Audit is made aware of the use of controls for each aspect that involves the transfer of information, such as access control, entry control, communication control, etc.
A control is a procedure that verifies another procedure.
Therefore, control must be implemented that has not been violated, so its internal study is important.
The use of aspects such as high computing performance, infrastructure characteristics, is an important reason. Because there is no supercomputer, we opt for the design of a group of nodes that allows its gradual growth until it arrives as an operation to count on the performance of the supercomputers.
A network of computers has precisely the vision of the distributed and parallel system, however, care must be taken in the construction and operation thereof.
There is an international body that measures the capacity in supercomputing performance, within its schemes contemplated for most of its platforms the use of Linux, within the architecture is appreciated the use of MPP and the cluster, where you can appreciate the acceptable capabilities both work and performance. With this, it is possible to detect the speeds that are presented internationally. (e.g. Table 2, Figure 1).
Architecture.
The TOP500 project ranks and details the 500 most powerful don’t distribute computer systems in the world, in reference [15].
The following graphs are presented in terms of performance and shared systems on an international scale, information retrieved from
Performance.
Mexico only occupies 0.2% of System share, it is for this reason that it is necessary to learn from the superpowers because it seems that the power of the supercomputing is wasted. (e.g. Table 4, Figure 3).
System share.
In which of the registered systems it can be noticed that Asia occupies the first place in the use of shared systems in High performance in computing.
One of the first programs to verify the performance of the processes and programs was the task manager because it allows us to measure the performance by means of metrics to support the resources of a computer system such as our computer.
HPC stands for High-performance computing
By computation is processing, which has been attributed to thinking carefully about the hardware or a physical infrastructure, however, it should be distinguished in that the computation is also given by logic. It continued with the Table 5. Performance metric.
Architecture | System share (%) |
---|---|
Cluster | 87.4 |
MPP | 12.6 |
Architecture.
Continents | Performance |
---|---|
Other | 0.70 |
Americas | 30.20 |
Asia | 48.70 |
Europe | 20.40 |
Continents.
Continents | System share (%) |
---|---|
Africa | 0.2 |
Americas | 29.8 |
Asia | 50.4 |
Europe | 18.6 |
Oceania | 1 |
Continents.
Metric | Load balance |
Runtime | |
Communication volume | |
Computing time | |
Metrics for multidimensional optimization | Cluster vs. Supercomputer |
Fiedler vector or spectral clustering | |
Minimum normalized cut | |
Connectors to eigenvectors | |
Clustering by k means | |
Restrictions in two dimensions | |
Fourier modal analysis |
Performance metric.
The use of cluster implies simultaneously using concurrent technology, in the concurrent model contains the following components
Structure (static/dynamic)
Granularity (nested/plane)
Initialization (Thick/Fine Ending)
Representation (parent/child or guardian/dependent)
This systematic develop; consist in the use of the concurrent engineering by the design of components assembler. As show at the Figure 4.
Petri net, model of concurrent active object.
By the moment these techniques have been studied at the final of Computer Sciences: the development of Systems in Real Time, the Recognition of Patterns, Semi-Intelligent Agents, the Computer Security as Cryptography and Crypto Analysis, the Information Systems based in knowledge, and Signs processing, are some cases for we appreciate this trouble, in reference [16].
Performance tests applied to cryptographic algorithms are abduction (statistics) and stress-based.
It can be implemented at any time, its operation involves calculating the key from the calculation of two keys that are presented with prime numbers.
The microchip company announced a microcontroller that has the ability to operate with most of the cryptographic algorithms, however, now it is worth thinking, what is it that is intended to ensure?
Operating system being responsible for the management and control of all computer hardware resources, the security involves a multi-user and multi-programming environment where the primary goals include the prevention of any unauthorized access to data stored within the system, the safeguarding of users from undesirable results triggered by their own actions, the assurance that various user programs will not interfere with one another, and the ability of different users to have different rights and abilities to cooperate with each other. The issues which deal with him are critical and far reaching, for this reason, they are of vital importance for both its own and its applications’ sakes, in reference [17].
Achieving security in operating systems depends on the security goals one has. These goals will typically include goals related to confidentiality, integrity, and availability. In any given system, the more detailed particulars of these security goals vary, which implies that different systems will have different security policies intended to help them meet their specific security goals, in reference [18].
Network security threats are also an operating system responsibility since a computer network is usually a rather large, single system which has been created from numerous individual computer systems. The data processing functions must now be distributed among a set of distinct systems thus decentralizing the control of data storage and processing. In addition, information which must be transmitted between the various computers within the network is subject to exposure. Forged user identification and unauthorized access to stored data by legitimate users are also problems which plague a multi-user, multi-resource environment. Consequently, these factors combine to complicate the problem of ensuring a high degree of security within the network and may present formidable pitfalls, in Ref. [17].
A good cryptographic system must have several characteristics: Small variations of plain texts: large variations of encrypted texts, the sizes of the flat texts must be comparable with the ciphers, the ciphered texts must be calculated efficiently from the planes, and the relationship between plain and ciphered texts should be unpredictable. A bad cryptographic system is characterized because: It appears a random relationship between planes and ciphers, but in reality, it is not, it is susceptible to elementary cryptanalysis, the calculation of ciphers is inefficient in time and space, and is vulnerable to its own manufacturers, in Ref. [19].
In the past, protection against the monitoring of communication lines was guaranteed by the use of physically secure lines. This technique, however, proved to be extremely expensive and, often times, impractical. Since that time, it has been discovered that data encryption may be used as a viable alternative to secure lines, in Ref. [17]. Cryptographic technology is, therefore, a relatively inexpensive and highly effective process by which sensitive data may be protected against disclosure, in reference [17].
Android includes cryptography to protect their information, many of the applications that are installed in a cell phone with an operating system have already cryptographic features to protect the information that the cell phone itself has. Each of the applications that have a cell phone, both those that have the factory and those that are installed after having purchased the cell phone, are handled in layers, where each of them uses services offered by the previous ones and offers the same to layers superiors All applications use the services, application interfaces and libraries of the previous layers. This structure facilitates the development of cryptographic applications in this operating system, but there is the disadvantage that the execution of cryptographic algorithms becomes more expensive as their complexity and strength increase, in Ref. [20]. Linux has a kernel crypto API that offers a rich set of cryptographic ciphers as well as other data transformation mechanisms and methods to invoke these. The kernel crypto API serves the following entity types: (a) consumers requesting cryptographic services and (b) data transformation implementations (typically ciphers) that can be called by consumers using the kernel crypto API, in Ref. [21].
Apple Inc. has a variety of cryptographic technologies around of all their products.
App Transport Security (ATS) ATS establishes best-practice policies for secure network communications using Apple platforms, employing Transport Layer Security (TLS) version.
Secure Transport API. Use Apple’s secure transport API to employ current versions of the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram Transport Layer Security (DTLS) cryptographic protocols for network communications.
Supported Algorithms. With iOS 10 and macOS v10. 12, the RC4 cipher suite is now disabled by default. In addition, Apple recommends that you upgrade your servers to use certificates signed with the SHA-2 cryptographic function.
Cryptographic Signing. If distributing your Mac app outside of the Mac App Store, use cryptographic signing with Developer ID to certify that your app is genuine.
CryptoTokenKit for Smart Card Support. The CryptoTokenKit framework provides first-class access for working with smart cards and other cryptographic devices in macOS, in reference [22].
Microsoft shows in its web site the Cryptography API: Next Generation (CNG) that is the long-term replacement for the CryptoAPI. CNG is designed to be extensible at many levels and cryptography agnostic in behavior. Some of its features are listed next: Cryptographic Agility, Certification and Compliance, Suite B Support, Legacy Support, Kernel Mode Support, Auditing and Replaceable Random Number Generators, in reference [23].
According to the list dictated by
Histogram of platforms.
The data that has been monitored by telepathic systems arises from information related to greenhouses, they are perhaps only data that support a part of a process in agronomy, however, they are important for their better interpretation.
JFLAP is software for experimenting with formal languages topics including nondeterministic finite automata, nondeterministic pushdown automata, multi-tape Turing machines, several types of grammars, parsing, and L-systems, by the University Duke, in Ref. [24] (e.g. Figure 6).
JFlap.
The type of applications that generally work with sophisticated equipment such as the supercomputer or cluster, is one that presents complexity in it is development, development, those that consume more massive storage capacity and require speeds appropriate to their way of being. While social networks currently involve more data consumption, it is important to recognize that so are the applications that generate scientific researchers by searching for new solutions to real-world problems or that are analogous to their area of expertise. The aim of the following scheme is precise to make known part of the advances that we as a research team have. We do not express all theories or investigations, it’s just a preamble of what these systems can be capable of doing in relation to what they are capable of doing. The use of state machines is important in the design of logical machines because they allow deducing the logic of their operation. That is to say, the following is the use of a simple machine that allows to deduce chains of 0 and 1, in such a way accept words of 0 and 1s, like prime numbers.
For the generation of keys, it is necessary to design an algorithm that allows the generation of random numbers, below is an algorithm that supports the generation of pseudorandom numbers, in reference [25].
Show in notation with Henon Map, this is a method chaotic map, and it is employed in dynamic systems to discrete process (e.g. Figure 7).
Pseudorandom by Henon map.
Used the RSA Algorithm to prove of text [26] (e.g. Figure 8).
Algorithm by RSA.
The tent map, like various chaotic maps, as pseudorandom sequence generator, in Ref. [27] (e.g. Figures 9 and 10).
Algorithm by tent map.
Algorithm by tent map.
These algorithms applied to images allow to know the range of operations necessary to work together, however, it is important to emphasize the moment in which the integration of the cryptographic algorithms must be perfected to the process involved.
The reading of information generated by the stereo vision allow to get hard acquisition data, as the focal lens adjust. It proposes the tracking of systems at real time uses with the transformation Census. it is left for future work.
Real Time Stereo Vision with a modified Census transform and fast tracking in FPGA, in Ref. [28].
Security is a priority since the operative systems are responsible to manage a multi-user and multi-programing environment. Complexity around these tasks involve goals for preventing unauthorized access, safeguarding users from undesirable results by their own actions, managing rights and abilities to cooperate, they also implies confidentiality, integrity and availability. Another thing to take on account is the network security which is responsible to protect the information that is exposed when it is transmitted between various computers. A solution for these problems have been tackled through hardware solutions however these solutions have proved to be expensive and, often times, impractical. Data encryption is a viable alternative solution to secure the information because cryptographic technology is, a relatively inexpensive and highly effective process to protect sensitive data against disclosure. By default, popular operative systems like Android, Linux, Mac OS and Microsoft Windows have cryptography technologies for enhancing their security systems in the way to protect sensible data, even some of the share their APIs with the objective to give tools for reducing risks related with data security.
Countries around the world like United Kingdom, Australia and United States of America are making respectable efforts directed specifically in the cyber security infrastructures. Most of them adopted international security standards of which stand out ISO/IEC 27032:2012, ISO/IEC 27001, ISO 22301, ISO/IEC 15408, ISO27799, ISO/IEC 27010 and they also have its own intern standards and specialized organizations as is the case of United Kingdom with the Network Interoperability Consultative Committee (NICC) and the Information Assurance Maturity Model (IAMM).
In the case of Mexico, the government has not adopted international standards yet and the legislation is distributed in different laws and norms because the way in which it is pursued depends on the nature of the crime. Regulations consider crimes like: separated into different laws like electronic commerce, electronic signature, personal data protection, right to the information, revelation of secrets, industrial property among others. This weakens people, companies and the government itself when they are the victims of an attack which has as a target the security of their data.
It is necessary to prepare the relevant technology for the cryptographic algorithms that work with Linux, in the Cluster infrastructure, to make the most of the benefits related to a complete information processing. While it is necessary to have logical security, you only need to work on the integration of technologies in schemes at the level nodes of the net, as is the case with the Internet of things (IoT) thus ensuring all kinds of information such as multimedia can be operated.
Sport for Development and Peace (SDP) is an international movement that began in the 2000s to meet the Millennium Development Goals (2000–2015). Several local, regional, national and international organizations are currently continuing to implement sports projects in an international development context to reach the United Nations’ sustainable development goals (2015–2030).
\nThis chapter aims to present the various origins and objectives that are being used around the SDP. It then focuses on current research on SDP, providing illustrations of research projects conducted in the field. Finally, this chapter offers perspectives for future research in this domain.
\nSport for Development and Peace (SDP) is not a new phenomenon contrary to what one might think. In 1894, Pierre de Coubertin had already considered the reconstruction of the modern Olympic Games to bring nations closer together around sports disciplines. He said “I remained convinced that sport is one of the most forceful elements of peace and I am confident in its future action” [1]. But the use of sport to serve development, peace, or diplomatic interests in the contemporary world is more due to the work of Mandela, who said “Sport has the power to change the world. It has the power to inspire, it has the power to unite people in a way that little else does” [2]. Indeed, the South African leader decided to use the power of sport during the 1995 Rugby World Cup to fight apartheid and unite the South African people. According to him, “Sport can create hope, where once there was only despair. It is more powerful than governments in breaking down racial barriers” [2].
\nThe United Nations (UN) took a step further toward the recognition of sport and its diplomatic, integrative, educational, or peace-building potential by signing a resolution in favor of the use of sport as a tool for development and peace-building among peoples, which was adopted by the UN General Assembly in 2003. This vote also led to the reaffirmation in 2015 of the 1978 UNESCO International Charter for Physical Education and Sport. The prevalence of SDP projects was so high that the UN has recognized its potential by setting up a specific instance between 2008 and 2017 (United Nations Office for Sport and Development and Peace; UNOSDP) through which it has initiated a large number of projects, particularly in Central America and West Africa [3]. This office had three main roles: to encourage dialogue, to establish SDP collaborations and partnerships, and to support international sports organizations, civil society, private sector, and media.
\nSDP projects have been developing in recent years around the world. They have been defined as “the intentional use of sport, physical activity and play to achieve specific development objectives in low- and middle-income countries and disadvantaged communities in high-income areas” [4], which includes “all forms of physical activity that contribute to physical fitness, mental well-being and social interaction, such as play, recreation, organized or competitive sport, indigenous sports and games” [4, 5]. These definitions have since been widely used by many SDP actors and several researchers [5, 6, 7].
\nIn these initiatives, sport is presented as a lever for integration or social reintegration in developing countries or in conflict-affected areas [7, 8]. For example, soccer matches are used between two enemy sides to help rebuild relationships. In addition to its positive impact on health, sport is now recognized for having a number of other benefits such as the prevention of violence or doping, awareness of diseases such as HIV/AIDS, and also as a medium for instilling respect for opponents and rules, teamwork, sportsmanship, determination, and discipline, in youth [7, 8]. These fundamental principles could also be transferred to the social life of person according to some organizations that value them [9]. The UNOSDP [10] indicates other elements related to the use of sport as a lever for development and peace, among others:
Sport is a powerful tool with unique power to attract, mobilize, and inspire;
Sport embodies issues of participation, inclusion, and citizenship by its very own nature;
It represents human values such as respect for the opponent, acceptance of restrictive rules, teamwork, and equity;
Sport is used in a very wide range of situations to serve development and peace-building as an integrated instrument in short-term emergency humanitarian aid activities or in long-term development cooperation projects [11, 12].
Finally, sport has benefits such as individual development, health promotion and disease prevention, gender equality, social integration, peace-building or conflict prevention/resolution and post-disaster/trauma assistance [13, 14]. UNESCO published a report in 2016 on the power of the values of sport that reinforces this vision, and then UNOSDP published a document that shows the articulation of using sport to support each of the new Sustainable Development Goals 2015–2030 [10]. From a development perspective, the focus is most of the time on mass sport and not elite sport [15, 16]. In a development context, sport generally includes a wide range of activities adapted to people of all ages and abilities, with an emphasis on the positive values of sport [10]. Sport is used to reach the most needy, including refugees; child soldiers; victims of conflict and natural disasters; poor people; people with disabilities; and victims of racism, stigma, and discrimination [14, 17, 18].
\nBeyond descriptions of SDP programs and contributions from international organizations, researchers examined the SDP field and analyze the benefits of these programs on individual development, health promotion and disease prevention, gender equality promotion, social integration, peace-building or conflict prevention and resolution, and assistance after a disaster or trauma, among others [13, 14]. At the moment, four main types of research that have been conducted around SDP can be identified: (1) macrosociological studies on the positive attributes of SDP; (2) exploratory field and case studies; (3) studies on the management and evaluation of SDP programs; and (4) literature reviews on SDP.
\nFirst, researchers are conducting a large number of macrosociological studies to question the so-called positive attributes of sport by raising its potential abuses [11, 12, 19, 20, 21]. For example, Kidd [14, 22] conducted extensive literature reviews describing the landscape of the SDP movement. According to the author, SDP initiatives were motivated by athlete activism, the reaction to the fall of apartheid and made openings possible by the end of the Cold War, the neoliberal emphasis on entrepreneurship and mass mobilizations for “Make Poverty History,” as part of a major focus of UN political development and the SDP International Working Group [14, 22]. The current results of these global studies show that despite the potential benefits of sport, these positive social impacts do not automatically accumulate. Achieving positive impacts require professional and socially responsible interventions that are adapted to the social and cultural context, prioritize development objectives, and are carefully designed to be inclusive [10, 17, 23]. Nevertheless, some authors note the lack of scientific literature regarding the understanding of the specific mechanisms by which sport can foster development and peace among participants [9, 24, 25].
\nSecond, some researchers have used several exploratory methodologies to conduct field case studies [26, 27, 28]. For example, Oxford [27] focused on the social inclusion of young Colombian women through football, a traditionally very male sport. The researcher conducted a 6-month ethnographic study in Colombian neighborhoods of the SDP organization to explore the social, cultural, and historical complexities surrounding the safe practice of girls’ sports. Whitley et al. [28] attempted to question key players in SDP about their experiences and expertise in the field. The study provided a better understanding of the limit, the lack of efficiency and equity in practices as well as a concrete impact that they felt was unclear. The study concludes with a list of recommendations to improve SDP field work, research partnerships, and evaluation collaborations in a more rigorous way. Finally, some authors such as Gadais et al. also aim to develop research methods adapted to the SDP field, which is often unstable, complex, or unsafe [26]. The authors intended to implement analyses and methods from a distance and on the field to better understand SDP organizations and their needs in order to better support them in their work.
\nThird, researchers are also interested in questions of program evaluation and management of SDP activities. On the one hand, SDP organizations are frequently approached by the funding agencies to conduct SDP program evaluation studies. This is a classic way of observing the impact of sport on social change [29, 30, 31]. The evaluation studies examined various aspects of the missions and paradigms of SDP projects [30, 32, 33]. A literature review conducted by Levermore [30] revealed three major limitations to SDP evaluation studies: (a) monitoring and evaluation are insufficient; (b) they are conducted with acclaimed programs; and (c) they tend to use a positivist logical framework (Levermore [30]). Levermore concluded his analysis by stressing the need for evaluations that can take into account the diversity of SDP projects, some of which have unclear objectives or missing justifications. Indeed, their objectives and strategies remain unclear and questionable in relation to fully implemented program evaluation protocols [30, 34]. Programs should be evaluated using solid methodological documentation on logical frameworks and critical participatory approaches to try to apply these approaches to specific case studies or to consider their use in the context of a particular sporting event [30]. On the other hand, some researchers aim to strengthen the managerial aspects of SDP projects to improve their functioning, management, or implementation mechanisms [34, 35, 36, 37]. Often, the overall idea is to build connections between the theory generated by macrosociological studies and field case studies. Sport management specialists have begun to critically review and evaluate SDP initiatives, and they are now more strategically planned and pedagogically solid than before. For example, Schulenkorf [37] reviewed the main achievements of sport management research and classifies current research under four headings: (a) SDP programming and design; (b) sustainable management and capacity-building; (c) creation and optimization of impacts and outcomes; and (d) conceptual/theoretical advances. Finally, he suggested that future research could focus on the managerial concepts of leadership, entrepreneurship, and design thinking to maximize the potential of sport (management) to contribute to desired, innovative, and sustainable outcomes for community development.
\nFourth, three literature reviews have been conducted on SDP. Until 2016, there was little research to synthesize research on SDP. There was no mapping to know what projects existed and to have an overview of the situation at the global level. In 2017, the review conducted by Svensson and Woods [38] addressed this gap by providing a systematic overview of SDP organizations. While the precise locations of action of SDP organizations remain largely unknown, this review has focused these efforts and on the physical and sporting activities used in the programs. It provided an opportunity to review the practice of SDPs in order to provide an overview of the current state of the field: 955 entities involved in SDP practices were identified based on a systematic review of 3138 organizational entries in the SDP databases. The majority of organizations operate programs in Africa, but many are present in Europe, North America, Asia, and Latin America, with more than 80% of them having their headquarters in the same region. Education, livelihoods, and health emerged as the most common themes, while disability and gender were less represented. A total of 32 types of sports have been identified, one-third is only based on football (soccer). In relation to positive youth development (PYD) through sport, Jones et al. [39] conducted an analysis of how sport is a mechanism for achieving various development objectives. The review shows that this link between sport and development is not inherent and depends not only on a variety of programs and activities but also on contextual factors. The positive potential of sport does not develop automatically; it requires a professional and socially responsible intervention, adapted to the social and cultural context [17, 23, 30]. Finally, Schulenkorf et al. [8] conducted an integrated analysis of the literature on sport for development to provide a comprehensive and holistic picture of the sector. Despite the significant increase in published research in the field of sport for development, there has been no attempt to rigorously review and synthesize scientific contributions in this field so far. The paper shows an upward trend in scientific publications since 2000, with an emphasis on social and educational outcomes related to youth sport, with football (soccer) being the most common activity. The vast majority of SDP research has been conducted at the community level, where qualitative approaches dominate (70% of conceptual and qualitative methods). The authors also noted an interesting paradox regarding the geographical contexts of the studies: a majority of the projects are carried out in Africa, Asia, and Latin America, but 74% of the study fields and 90% of the SDP authors are based in North America, Europe, and Australia.
\nAccording to the Journal of Sport for Development, several research themes have been identified in relation to SDP (Table 1).
\nThematics | \nDescriptions | \n
---|---|
Sport and disability | \nSport and disability focuses on research related to sport as a vehicle for the development, access, inclusion, and human rights of people with disabilities. This section encourages critical thinking and diversity of perspectives, welcoming research at the intersection of theory and practice. | \n
Sport and education | \nSport and education presents research and case studies related to interventions that use sport to advance education, youth development, and life skills. Rather than focusing on sport education, this section discusses the role of sport in achieving the academic and social outcomes of youth. | \n
Sport and gender | \nThe theme on sport and gender presents research and case studies related to interventions using sport to promote gender equality, challenge gender norms, and empower girls and women in disadvantaged environments. | \n
Sport and health | \nSport and health presents a wide range of outcomes associated with physical, mental, and social well-being. This is the effect of SDP programs on the risk factors for communicable and non-communicable diseases, including the direct effect of sports programs on physical activity. It also examines the role that sport can play in preventive education and health promotion interventions. | \n
Sport and livelihoods | \nThe theme on sport and livelihoods presents research and case studies on interventions using sport to improve the livelihoods of disadvantaged people, from programs focusing on vocational skills training to rehabilitation and social enterprise. | \n
Sport and peace | \nSport and peace focuses on projects that use sport as a vehicle for reconciliation and peace-building. The concept of peace is broadly defined to include connotations of personal, community, and social well-being, as well as the absence of conflict and tension between groups. In particular, this section examines the possibilities of creating peace between individuals and groups in socially, culturally, or ethnically divided societies. | \n
Sport and social cohesion | \nThe sport and social cohesion theme includes projects in the areas of community empowerment, social inclusion/integration, and diversity management. It focuses on social impact assessments and capacity-building initiatives that can lead to social cohesion, skills enhancement, and overall community development. | \n
Research themes related to the SDP field.
Bel Avenir (BA) is a Malagasy NGO working in the southern region of Madagascar, through social projects, focusing on “education as a vehicle of development.” BA carries out activities in various fields of education for young disadvantaged populations in Madagascar, particularly in Toliara and Fianarantsoa. The field of education includes: (a) formal education in two schools, (b) non-formal education including a school of sports and a music and arts center, among others, (c) awareness-raising projects, such as international inter-school exchanges, or publications of Malagasy stories. Thus, the organization offers a holistic approach to education for development and the SDP proposed by its school of sports, which is only one of its various services. The country is severely affected by extreme poverty, malnutrition, severe hygiene and health problems, child labor problems (mining or prostitution), corruption in society, and frequent political crises. In this sense, BA works in a complex context, most often difficult, unstable, and sometimes insecure, where reality could be ephemeral. BA is finally a member of the international network Agua de Coco, based in eight countries, and mobilized around children’s rights.
\nTwo research projects are currently running to support and strengthen BA’s projects. The first study attempts to develop a methodology that uses the Actantial Model [40] and the Snakes and Ladders [7] to analyze and understand the NGO’s situation from a distance [41]. By using the NGO’s annual reports and comparing them to reality, the researchers are developing a methodology to verify whether a research can be successfully conducted in collaboration with the local organization. A second study, focusing on the needs of the NGO, aims to measure the effects of sports (school of sports) and artistic activities (arts and music center) [42] in order to understand their consequences on the psychological and social well-being of disadvantaged youth. This research also aims to strengthen monitoring and evaluation tools for young people and to set up a psychological unit to monitor young people in their development.
\nThe non-profit organization Pour 3 points (P3P), established in Montreal, Canada, since 2013, uses sport as a tool to promote the development of youth in socio-economically disadvantaged neighborhoods. More specifically, P3P offers a 2-year life coaching training program for young Canadians who are interested in coaching and are willing to make a long-term commitment to the program and to disadvantaged communities. Their role is to learn how to support young people in their lives and to help them to avoid dropping out of primary or secondary school, and to support those who experience learning problems or have serious behavioral problems. By being well trained, coaches can help young people develop the skills they need to succeed in school and in their life. After parents, coaches are the most influential adults in the lives of young athletes according to P3P. This influence is felt not only in the teaching of the game but also in the teaching of life.
\nCoaches are recruited at the time of enrolment in the training program, based on the skills required to become life coaches while becoming sport coach in one of the organization’s partner schools. Each year, the program recruits approximately 15 coaches who participate in a 4-day training retreat, five peer discussion circles, five formal training sessions, and three personal evaluations each year, all under the supervision of a development consultant.
\nSeveral research projects have been conducted with P3P. A first study conducted on the P3P training program [43], examined coaches’ perceptions based on a humanist coaching workshop they received in their training. The results revealed that coaches perceive positive results in autonomy, communication, skills, motivation, and willingness to help their athletes’ teammates. A second study was conducted to strengthen the organization’s logic model to identify indicators for subsequent program evaluation. The results showed differences in the understanding of the program between key stakeholders. Recommendations from research allowed P3P administrators to reframe their theory of change [44]. This study was designed in collaboration with P3P administrators to help them improve their logic model and prepare their program evaluation. The idea for this research came directly from the P3P administrators and the researchers acted as facilitators.
\nSeveral tensions can be noted between the needs of practitioners and their realities on the field with the possibilities of SDP research. The aim is to identify them and then propose a plan for action and research (Table 2).
\nSDP practice | \nAxis of tensions | \nSDP theory or research | \n
---|---|---|
Practical needs of SDP | \nNeeds for research | \n|
Evaluate effects or impacts of the SDP projects | \n\nProgram evaluation\n | \nNeed for indicators/criteria to conduct evaluation | \n
Projects are imperfect and need be improve | \n\nCritic/support\n | \nNeed to critic projects but also support actors and organizations | \n
Reinforce administration team and management work | \n\nManagement\n | \nNeed to reinforce management elements of projects | \n
What is the finality/use/form of SDP? | \n\nFinality/use\n | \nNeed to identify the types of SDP and needs about thematics | \n
What is the qualification/training of SDP personal/staff | \n\nTraining/workshop\n | \nNeed for research on training | \n
Reality field could be unsecure, unstable, complex, dangerous | \n\nMethod/tools\n | \nNeed to improve quality of research and have adapted tools for investigation | \n
Tensions between practice and theory on SDP.
First, we can observe a first axis of tension around program evaluation. On the one hand, SDP organizations are often asked by their donors to conduct program evaluations. This allows them to justify the rationale for their projects and to demonstrate the effectiveness of their actions. However, if these evaluations are not well planned, negative results can be found that compromise projects. SDP organizations often call on researchers to help them conduct their program evaluation because it is a time-consuming process. On the other hand, researchers need precise and specific criteria to conduct a relevant program evaluation. Unfortunately, few projects are able to provide evaluators with these very important indicators to conduct a fair and meaningful evaluation.
\nSecond, SDP projects are rarely perfect in their planning and implementation because they face limited resources and highly changing contexts. As well, it is necessary for administrators to make constant adjustments to improve the implementation and realization of their projects. While SDP projects are criticized by researchers in demonstrating several nonsense between the aims and actions of the project, it remains true that researchers would also benefit from offering a support and collaboration service to try to solve the field difficulties encountered by the actors.
\nThirdly, another axis of tension can be detected on the managerial aspects of SDP projects. On the one hand, the administrations of organizations are increasingly developing with their projects. As they do so, they must strengthen their structure and organization, which is often dependent on the financial and human resources at their disposal. On the other hand, researchers have started to conduct several studies to better understand the managerial aspects of SDP organizations, and it would be relevant if these studies could strengthen the organizational aspects of SDP projects which often do not have much support.
\nFourthly and for the time being, few differences have been made in SDP projects between those aimed at elite sport, competition, physical education, physical activity for leisure, or another theme such as health education through SDP. In our opinion, there is a very important tension about the purpose, use, and form that the SDP can represent and be truly in field projects. While several texts have been written to attempt to highlight these elements, few studies have attempted to go further in understanding what the SDP really is. This research seems essential to us to make the difference between the various forms of SDP and their multiple uses. This will eventually make it possible to identify new themes to investigate around the SDP.
\nFifth, there are currently many questions around who are the people who work with the populations in SDP, what are their training or qualifications? While the research strongly recommends the use of sport supervised by qualified and trained personnel, few studies have focused on the profiles and the training of those people who work in the field every day. On this axis of tension, research must propose areas of response to strengthen field actions. And on this point, it is therefore necessary for researchers to go down to the field to see and understand the reality of the projects.
\nFinally, SDP fields are often dangerous and unsafe as they are located in humanitarian crisis or international development situations. These situations can change in a few minutes and working in this environment is therefore extremely unstable. They also face very complex realities in which it is necessary to take into account as many elements as possible in order to operate. Faced with the reality of this type of terrain, researchers must adapt their work. In particular, research methods and tools must evolve to adapt to a changing reality and to conditions that are sometimes very inappropriate for conducting a traditional research project. These adaptations are necessary to improve the quality of research in SDP’s fields.
\nSDP research now offers a better understanding of the movement and allows practitioners to better orient themselves in their use of sport for development. However, the research also raised a set of concrete issues for field projects and some questions remain unanswered at this time. Following the results of the latest studies, six main areas of work should be considered to guide further research on SDP.
Provide a space for reflection (criticize vs. support): current research is often critical of SDP projects and too rarely supports or improves the action of actors in the field. However, it seems important to strengthen the work of the actors while continuing to question their actions and achievements. In this sense, the researcher must offer a space for joint reflection with the actors in the field;
Use a collaborative or partnership approach to conduct research (be a facilitator): one of the roles of research is to help solve practitioners’ problems. Specifically in the domain of SDP, field actors express difficulties and needs that must be listened in order to co-construct research projects. In this sense, the researcher should act as a facilitator to support the projects and the work of the actors while continuing to criticize them in his/her support;
Starting from the concrete angle of the field: to be able to fully understand the nuances of the context and/or the environment of the SDP actors, researchers are invited to be as close as possible to reality, and to step into the field as possible. This element is essential to build a relationship of trust with the actors to help them by understanding their background and endings as much as possible;
Seek interdisciplinary research: SDP themes are complex and often overlap with scientific knowledge from several research fields (e.g., sociology, psychology, and education). Researchers from several scientific disciplines must be open and work together as much as possible, in order to have the most precise and complex understanding of the phenomena that are difficult to capture from a single angle. Research must provide a better understanding of the multiple issues and the complexity of the issues, problems, and realities;
Propose better quality of research: it also seems relevant to us to question how to carry out better quality research on ephemeral or unstable fields, when access is considered complex and dangerous. This requires, among other things, the development of methods able to adapt and respond to the requirements of the domain as well as to the various fields of investigation;
Clarify the uses of SDP: finally, it seems essential to us to question the type of sport for development and peace that is used in the various contexts of SDP. More specifically, is it competitive sport, physical education, physical activity, health education, or any other form? On this subject, Hills et al. [45] had opened up interesting avenues for reflection by mentioning sport + and + sport [46], sport for social inclusion [24], sport as a universal language [1, 24], sport as a diversion [47], as a replacement or alternative [48], as a hook [49, 50] or for life skills [51, 52], among others.
This chapter aimed to present the field of SDP, its origins, its evolution, the research that has been carried out so far, as well as illustrations to give the reader a better idea of what “Sport for Development and Peace” is. However, answering the question “what is the SDP?” is not easy given that this field is vast, complex, and constantly changing in practice.
\nIn conclusion, three main elements can be remembered: (1) a large number of projects and programs have been developed since the 2000s, mainly in Africa, Latin America, and Asia, with football being the main sport [8, 38]. Other various forms of physical activity and sports (e.g., physical education, competitive sport, and leisure activities) have also been used in order to achieve development or peace and related topics; (2) research on SDP has intensified since 2010 [8]; and it can be grouped into four main categories of studies: macrosociological, exploratory field studies, managerial and program evaluation, and literature reviews; (3) several challenges and tensions remain to be resolved in order to accomplish quality research that will truly help and support actors from the field who use SDP.
\nWe can finally return to the proposals of Baron de Coubertin and Mandela, who were very visionary in using sport as a vehicle for development and as a means of establishing peace. Because today, many organizations such as the United Nations prefers to rely on the universal potential of sport or other non-formal recreation to resolve conflicts and educate future generations, rather than traditional institutions such as schools or governments.
\nThe author would like to acknowledge all research collaborators (Arvisais, O., Ayoub, M-B., Bardocz-Bencsik M., Belanger, C., Charland, P., Caicedo, J-C., Dalcourt-Malenfant, S., Decarpentrie, L., Falcão W. Parlavecchio, L., Rouzaut, M., Varela, N., and Webb, A.) and also send a special thanks to all field partners of SDP researches (Bel Avenir, Escuela de communidad—Cuidad Bolivar, P3P, Conseil de Bande des Premieres Nations d’Opitciwan).
\nThe author declares no conflict of interest.
IntechOpen aims to ensure that original material is published while at the same time giving significant freedom to our Authors. To that end we maintain a flexible Copyright Policy guaranteeing that there is no transfer of copyright to the publisher and Authors retain exclusive copyright to their Work.
',metaTitle:"Publication Agreement - Chapters",metaDescription:"IN TECH aims to guarantee that original material is published while at the same time giving significant freedom to our authors. For that matter, we uphold a flexible copyright policy meaning that there is no transfer of copyright to the publisher and authors retain exclusive copyright to their work.\n\nWhen submitting a manuscript the Corresponding Author is required to accept the terms and conditions set forth in our Publication Agreement as follows:",metaKeywords:null,canonicalURL:"/page/publication-agreement-chapters",contentRaw:'[{"type":"htmlEditorComponent","content":"The Corresponding Author (acting on behalf of all Authors) and INTECHOPEN LIMITED, incorporated and registered in England and Wales with company number 11086078 and a registered office at 5 Princes Gate Court, London, United Kingdom, SW7 2QJ conclude the following Agreement regarding the publication of a Book Chapter:
\\n\\n1. DEFINITIONS
\\n\\nCorresponding Author: The Author of the Chapter who serves as a Signatory to this Agreement. The Corresponding Author acts on behalf of any other Co-Author.
\\n\\nCo-Author: All other Authors of the Chapter besides the Corresponding Author.
\\n\\nIntechOpen: IntechOpen Ltd., the Publisher of the Book.
\\n\\nBook: The publication as a collection of chapters compiled by IntechOpen including the Chapter. Chapter: The original literary work created by Corresponding Author and any Co-Author that is the subject of this Agreement.
\\n\\n2. CORRESPONDING AUTHOR'S GRANT OF RIGHTS
\\n\\n2.1 Subject to the following Article, the Corresponding Author grants and shall ensure that each Co-Author grants, to IntechOpen, during the full term of copyright and any extensions or renewals of that term the following:
\\n\\nThe aforementioned licenses shall survive the expiry or termination of this Agreement for any reason.
\\n\\n2.2 The Corresponding Author (on their own behalf and on behalf of any Co-Author) reserves the following rights to the Chapter but agrees not to exercise them in such a way as to adversely affect IntechOpen's ability to utilize the full benefit of this Publication Agreement: (i) reprographic rights worldwide, other than those which subsist in the typographical arrangement of the Chapter as published by IntechOpen; and (ii) public lending rights arising under the Public Lending Right Act 1979, as amended from time to time, and any similar rights arising in any part of the world.
\\n\\nThe Corresponding Author confirms that they (and any Co-Author) are and will remain a member of any applicable licensing and collecting society and any successor to that body responsible for administering royalties for the reprographic reproduction of copyright works.
\\n\\nSubject to the license granted above, copyright in the Chapter and all versions of it created during IntechOpen's editing process (including the published version) is retained by the Corresponding Author and any Co-Author.
\\n\\nSubject to the license granted above, the Corresponding Author and any Co-Author retains patent, trademark and other intellectual property rights to the Chapter.
\\n\\n2.3 All rights granted to IntechOpen in this Article are assignable, sublicensable or otherwise transferrable to third parties without the Corresponding Author's or any Co-Author’s specific approval.
\\n\\n2.4 The Corresponding Author (on their own behalf and on behalf of each Co-Author) will not assert any rights under the Copyright, Designs and Patents Act 1988 to object to derogatory treatment of the Chapter as a consequence of IntechOpen's changes to the Chapter arising from translation of it, corrections and edits for house style, removal of problematic material and other reasonable edits.
\\n\\n3. CORRESPONDING AUTHOR'S DUTIES
\\n\\n3.1 When distributing or re-publishing the Chapter, the Corresponding Author agrees to credit the Book in which the Chapter has been published as the source of first publication, as well as IntechOpen. The Corresponding Author warrants that each Co-Author will also credit the Book in which the Chapter has been published as the source of first publication, as well as IntechOpen, when they are distributing or re-publishing the Chapter.
\\n\\n3.2 When submitting the Chapter, the Corresponding Author agrees to:
\\n\\nThe Corresponding Author will be held responsible for the payment of the Open Access Publishing Fees.
\\n\\nAll payments shall be due 30 days from the date of the issued invoice. The Corresponding Author or the payer on the Corresponding Author's and Co-Authors' behalf will bear all banking and similar charges incurred.
\\n\\n3.3 The Corresponding Author shall obtain in writing all consents necessary for the reproduction of any material in which a third-party right exists, including quotations, photographs and illustrations, in all editions of the Chapter worldwide for the full term of the above licenses, and shall provide to IntechOpen upon request the original copies of such consents for inspection (at IntechOpen's option) or photocopies of such consents.
\\n\\nThe Corresponding Author shall obtain written informed consent for publication from people who might recognize themselves or be identified by others (e.g. from case reports or photographs).
\\n\\n3.4 The Corresponding Author and any Co-Author shall respect confidentiality rights during and after the termination of this Agreement. The information contained in all correspondence and documents as part of the publishing activity between IntechOpen and the Corresponding Author and any Co-Author are confidential and are intended only for the recipient. The contents may not be disclosed publicly and are not intended for unauthorized use or distribution. Any use, disclosure, copying, or distribution is prohibited and may be unlawful.
\\n\\n4. CORRESPONDING AUTHOR'S WARRANTY
\\n\\n4.1 The Corresponding Author represents and warrants that the Chapter does not and will not breach any applicable law or the rights of any third party and, specifically, that the Chapter contains no matter that is defamatory or that infringes any literary or proprietary rights, intellectual property rights, or any rights of privacy. The Corresponding Author warrants and represents that: (i) the Chapter is the original work of themselves and any Co-Author and is not copied wholly or substantially from any other work or material or any other source; (ii) the Chapter has not been formally published in any other peer-reviewed journal or in a book or edited collection, and is not under consideration for any such publication; (iii) they themselves and any Co-Author are qualifying persons under section 154 of the Copyright, Designs and Patents Act 1988; (iv) they themselves and any Co-Author have not assigned and will not during the term of this Publication Agreement purport to assign any of the rights granted to IntechOpen under this Publication Agreement; and (v) the rights granted by this Publication Agreement are free from any security interest, option, mortgage, charge or lien.
\\n\\nThe Corresponding Author also warrants and represents that: (i) they have the full power to enter into this Publication Agreement on their own behalf and on behalf of each Co-Author; and (ii) they have the necessary rights and/or title in and to the Chapter to grant IntechOpen, on behalf of themselves and any Co-Author, the rights and licenses expressed to be granted in this Publication Agreement. If the Chapter was prepared jointly by the Corresponding Author and any Co-Author, the Corresponding Author warrants and represents that: (i) each Co-Author agrees to the submission, license and publication of the Chapter on the terms of this Publication Agreement; and (ii) they have the authority to enter into this Publication Agreement on behalf of and bind each Co-Author. The Corresponding Author shall: (i) ensure each Co-Author complies with all relevant provisions of this Publication Agreement, including those relating to confidentiality, performance and standards, as if a party to this Publication Agreement; and (ii) remain primarily liable for all acts and/or omissions of each such Co-Author.
\\n\\nThe Corresponding Author agrees to indemnify and hold IntechOpen harmless against all liabilities, costs, expenses, damages and losses and all reasonable legal costs and expenses suffered or incurred by IntechOpen arising out of or in connection with any breach of the aforementioned representations and warranties. This indemnity shall not cover IntechOpen to the extent that a claim under it results from IntechOpen's negligence or willful misconduct.
\\n\\n4.2 Nothing in this Publication Agreement shall have the effect of excluding or limiting any liability for death or personal injury caused by negligence or any other liability that cannot be excluded or limited by applicable law.
\\n\\n5. TERMINATION
\\n\\n5.1 IntechOpen has a right to terminate this Publication Agreement for quality, program, technical or other reasons with immediate effect, including without limitation (i) if the Corresponding Author or any Co-Author commits a material breach of this Publication Agreement; (ii) if the Corresponding Author or any Co-Author (being an individual) is the subject of a bankruptcy petition, application or order; or (iii) if the Corresponding Author or any Co-Author (being a company) commences negotiations with all or any class of its creditors with a view to rescheduling any of its debts, or makes a proposal for or enters into any compromise or arrangement with any of its creditors.
\\n\\nIn case of termination, IntechOpen will notify the Corresponding Author, in writing, of the decision.
\\n\\n6. INTECHOPEN’S DUTIES AND RIGHTS
\\n\\n6.1 Unless prevented from doing so by events outside its reasonable control, IntechOpen, in its discretion, agrees to publish the Chapter attributing it to the Corresponding Author and any Co-Author.
\\n\\n6.2 IntechOpen has the right to use the Corresponding Author’s and any Co-Author’s names and likeness in connection with scientific dissemination, retrieval, archiving, web hosting and promotion and marketing of the Chapter and has the right to contact the Corresponding Author and any Co-Author until the Chapter is publicly available on any platform owned and/or operated by IntechOpen.
\\n\\n6.3 IntechOpen is granted the authority to enforce the rights from this Publication Agreement, on behalf of the Corresponding Author and any Co-Author, against third parties (for example in cases of plagiarism or copyright infringements). In respect of any such infringement or suspected infringement of the copyright in the Chapter, IntechOpen shall have absolute discretion in addressing any such infringement which is likely to affect IntechOpen's rights under this Publication Agreement, including issuing and conducting proceedings against the suspected infringer.
\\n\\n7. MISCELLANEOUS
\\n\\n7.1 Further Assurance: The Corresponding Author shall and will ensure that any relevant third party (including any Co-Author) shall, execute and deliver whatever further documents or deeds and perform such acts as IntechOpen reasonably requires from time to time for the purpose of giving IntechOpen the full benefit of the provisions of this Publication Agreement.
\\n\\n7.2 Third Party Rights: A person who is not a party to this Publication Agreement may not enforce any of its provisions under the Contracts (Rights of Third Parties) Act 1999.
\\n\\n7.3 Entire Agreement: This Publication Agreement constitutes the entire agreement between the parties in relation to its subject matter. It replaces and extinguishes all prior agreements, draft agreements, arrangements, collateral warranties, collateral contracts, statements, assurances, representations and undertakings of any nature made by or on behalf of the parties, whether oral or written, in relation to that subject matter. Each party acknowledges that in entering into this Publication Agreement it has not relied upon any oral or written statements, collateral or other warranties, assurances, representations or undertakings which were made by or on behalf of the other party in relation to the subject matter of this Publication Agreement at any time before its signature (together "Pre-Contractual Statements"), other than those which are set out in this Publication Agreement. Each party hereby waives all rights and remedies which might otherwise be available to it in relation to such Pre-Contractual Statements. Nothing in this clause shall exclude or restrict the liability of either party arising out of its pre-contract fraudulent misrepresentation or fraudulent concealment.
\\n\\n7.4 Waiver: No failure or delay by a party to exercise any right or remedy provided under this Publication Agreement or by law shall constitute a waiver of that or any other right or remedy, nor shall it preclude or restrict the further exercise of that or any other right or remedy. No single or partial exercise of such right or remedy shall preclude or restrict the further exercise of that or any other right or remedy.
\\n\\n7.5 Variation: No variation of this Publication Agreement shall be effective unless it is in writing and signed by the parties (or their duly authorized representatives).
\\n\\n7.6 Severance: If any provision or part-provision of this Publication Agreement is or becomes invalid, illegal or unenforceable, it shall be deemed modified to the minimum extent necessary to make it valid, legal and enforceable. If such modification is not possible, the relevant provision or part-provision shall be deemed deleted.
\\n\\nAny modification to or deletion of a provision or part-provision under this clause shall not affect the validity and enforceability of the rest of this Publication Agreement.
\\n\\n7.7 No partnership: Nothing in this Publication Agreement is intended to, or shall be deemed to, establish or create any partnership or joint venture or the relationship of principal and agent or employer and employee between IntechOpen and the Corresponding Author or any Co-Author, nor authorize any party to make or enter into any commitments for or on behalf of any other party.
\\n\\n7.8 Governing law: This Publication Agreement and any dispute or claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the law of England and Wales. The parties submit to the exclusive jurisdiction of the English courts to settle any dispute or claim arising out of or in connection with this Publication Agreement (including any non-contractual disputes or claims).
\\n\\nLast updated: 2020-11-27
\\n\\n\\n\\n
\\n"}]'},components:[{type:"htmlEditorComponent",content:"
The Corresponding Author (acting on behalf of all Authors) and INTECHOPEN LIMITED, incorporated and registered in England and Wales with company number 11086078 and a registered office at 5 Princes Gate Court, London, United Kingdom, SW7 2QJ conclude the following Agreement regarding the publication of a Book Chapter:
\n\n1. DEFINITIONS
\n\nCorresponding Author: The Author of the Chapter who serves as a Signatory to this Agreement. The Corresponding Author acts on behalf of any other Co-Author.
\n\nCo-Author: All other Authors of the Chapter besides the Corresponding Author.
\n\nIntechOpen: IntechOpen Ltd., the Publisher of the Book.
\n\nBook: The publication as a collection of chapters compiled by IntechOpen including the Chapter. Chapter: The original literary work created by Corresponding Author and any Co-Author that is the subject of this Agreement.
\n\n2. CORRESPONDING AUTHOR'S GRANT OF RIGHTS
\n\n2.1 Subject to the following Article, the Corresponding Author grants and shall ensure that each Co-Author grants, to IntechOpen, during the full term of copyright and any extensions or renewals of that term the following:
\n\nThe aforementioned licenses shall survive the expiry or termination of this Agreement for any reason.
\n\n2.2 The Corresponding Author (on their own behalf and on behalf of any Co-Author) reserves the following rights to the Chapter but agrees not to exercise them in such a way as to adversely affect IntechOpen's ability to utilize the full benefit of this Publication Agreement: (i) reprographic rights worldwide, other than those which subsist in the typographical arrangement of the Chapter as published by IntechOpen; and (ii) public lending rights arising under the Public Lending Right Act 1979, as amended from time to time, and any similar rights arising in any part of the world.
\n\nThe Corresponding Author confirms that they (and any Co-Author) are and will remain a member of any applicable licensing and collecting society and any successor to that body responsible for administering royalties for the reprographic reproduction of copyright works.
\n\nSubject to the license granted above, copyright in the Chapter and all versions of it created during IntechOpen's editing process (including the published version) is retained by the Corresponding Author and any Co-Author.
\n\nSubject to the license granted above, the Corresponding Author and any Co-Author retains patent, trademark and other intellectual property rights to the Chapter.
\n\n2.3 All rights granted to IntechOpen in this Article are assignable, sublicensable or otherwise transferrable to third parties without the Corresponding Author's or any Co-Author’s specific approval.
\n\n2.4 The Corresponding Author (on their own behalf and on behalf of each Co-Author) will not assert any rights under the Copyright, Designs and Patents Act 1988 to object to derogatory treatment of the Chapter as a consequence of IntechOpen's changes to the Chapter arising from translation of it, corrections and edits for house style, removal of problematic material and other reasonable edits.
\n\n3. CORRESPONDING AUTHOR'S DUTIES
\n\n3.1 When distributing or re-publishing the Chapter, the Corresponding Author agrees to credit the Book in which the Chapter has been published as the source of first publication, as well as IntechOpen. The Corresponding Author warrants that each Co-Author will also credit the Book in which the Chapter has been published as the source of first publication, as well as IntechOpen, when they are distributing or re-publishing the Chapter.
\n\n3.2 When submitting the Chapter, the Corresponding Author agrees to:
\n\nThe Corresponding Author will be held responsible for the payment of the Open Access Publishing Fees.
\n\nAll payments shall be due 30 days from the date of the issued invoice. The Corresponding Author or the payer on the Corresponding Author's and Co-Authors' behalf will bear all banking and similar charges incurred.
\n\n3.3 The Corresponding Author shall obtain in writing all consents necessary for the reproduction of any material in which a third-party right exists, including quotations, photographs and illustrations, in all editions of the Chapter worldwide for the full term of the above licenses, and shall provide to IntechOpen upon request the original copies of such consents for inspection (at IntechOpen's option) or photocopies of such consents.
\n\nThe Corresponding Author shall obtain written informed consent for publication from people who might recognize themselves or be identified by others (e.g. from case reports or photographs).
\n\n3.4 The Corresponding Author and any Co-Author shall respect confidentiality rights during and after the termination of this Agreement. The information contained in all correspondence and documents as part of the publishing activity between IntechOpen and the Corresponding Author and any Co-Author are confidential and are intended only for the recipient. The contents may not be disclosed publicly and are not intended for unauthorized use or distribution. Any use, disclosure, copying, or distribution is prohibited and may be unlawful.
\n\n4. CORRESPONDING AUTHOR'S WARRANTY
\n\n4.1 The Corresponding Author represents and warrants that the Chapter does not and will not breach any applicable law or the rights of any third party and, specifically, that the Chapter contains no matter that is defamatory or that infringes any literary or proprietary rights, intellectual property rights, or any rights of privacy. The Corresponding Author warrants and represents that: (i) the Chapter is the original work of themselves and any Co-Author and is not copied wholly or substantially from any other work or material or any other source; (ii) the Chapter has not been formally published in any other peer-reviewed journal or in a book or edited collection, and is not under consideration for any such publication; (iii) they themselves and any Co-Author are qualifying persons under section 154 of the Copyright, Designs and Patents Act 1988; (iv) they themselves and any Co-Author have not assigned and will not during the term of this Publication Agreement purport to assign any of the rights granted to IntechOpen under this Publication Agreement; and (v) the rights granted by this Publication Agreement are free from any security interest, option, mortgage, charge or lien.
\n\nThe Corresponding Author also warrants and represents that: (i) they have the full power to enter into this Publication Agreement on their own behalf and on behalf of each Co-Author; and (ii) they have the necessary rights and/or title in and to the Chapter to grant IntechOpen, on behalf of themselves and any Co-Author, the rights and licenses expressed to be granted in this Publication Agreement. If the Chapter was prepared jointly by the Corresponding Author and any Co-Author, the Corresponding Author warrants and represents that: (i) each Co-Author agrees to the submission, license and publication of the Chapter on the terms of this Publication Agreement; and (ii) they have the authority to enter into this Publication Agreement on behalf of and bind each Co-Author. The Corresponding Author shall: (i) ensure each Co-Author complies with all relevant provisions of this Publication Agreement, including those relating to confidentiality, performance and standards, as if a party to this Publication Agreement; and (ii) remain primarily liable for all acts and/or omissions of each such Co-Author.
\n\nThe Corresponding Author agrees to indemnify and hold IntechOpen harmless against all liabilities, costs, expenses, damages and losses and all reasonable legal costs and expenses suffered or incurred by IntechOpen arising out of or in connection with any breach of the aforementioned representations and warranties. This indemnity shall not cover IntechOpen to the extent that a claim under it results from IntechOpen's negligence or willful misconduct.
\n\n4.2 Nothing in this Publication Agreement shall have the effect of excluding or limiting any liability for death or personal injury caused by negligence or any other liability that cannot be excluded or limited by applicable law.
\n\n5. TERMINATION
\n\n5.1 IntechOpen has a right to terminate this Publication Agreement for quality, program, technical or other reasons with immediate effect, including without limitation (i) if the Corresponding Author or any Co-Author commits a material breach of this Publication Agreement; (ii) if the Corresponding Author or any Co-Author (being an individual) is the subject of a bankruptcy petition, application or order; or (iii) if the Corresponding Author or any Co-Author (being a company) commences negotiations with all or any class of its creditors with a view to rescheduling any of its debts, or makes a proposal for or enters into any compromise or arrangement with any of its creditors.
\n\nIn case of termination, IntechOpen will notify the Corresponding Author, in writing, of the decision.
\n\n6. INTECHOPEN’S DUTIES AND RIGHTS
\n\n6.1 Unless prevented from doing so by events outside its reasonable control, IntechOpen, in its discretion, agrees to publish the Chapter attributing it to the Corresponding Author and any Co-Author.
\n\n6.2 IntechOpen has the right to use the Corresponding Author’s and any Co-Author’s names and likeness in connection with scientific dissemination, retrieval, archiving, web hosting and promotion and marketing of the Chapter and has the right to contact the Corresponding Author and any Co-Author until the Chapter is publicly available on any platform owned and/or operated by IntechOpen.
\n\n6.3 IntechOpen is granted the authority to enforce the rights from this Publication Agreement, on behalf of the Corresponding Author and any Co-Author, against third parties (for example in cases of plagiarism or copyright infringements). In respect of any such infringement or suspected infringement of the copyright in the Chapter, IntechOpen shall have absolute discretion in addressing any such infringement which is likely to affect IntechOpen's rights under this Publication Agreement, including issuing and conducting proceedings against the suspected infringer.
\n\n7. MISCELLANEOUS
\n\n7.1 Further Assurance: The Corresponding Author shall and will ensure that any relevant third party (including any Co-Author) shall, execute and deliver whatever further documents or deeds and perform such acts as IntechOpen reasonably requires from time to time for the purpose of giving IntechOpen the full benefit of the provisions of this Publication Agreement.
\n\n7.2 Third Party Rights: A person who is not a party to this Publication Agreement may not enforce any of its provisions under the Contracts (Rights of Third Parties) Act 1999.
\n\n7.3 Entire Agreement: This Publication Agreement constitutes the entire agreement between the parties in relation to its subject matter. It replaces and extinguishes all prior agreements, draft agreements, arrangements, collateral warranties, collateral contracts, statements, assurances, representations and undertakings of any nature made by or on behalf of the parties, whether oral or written, in relation to that subject matter. Each party acknowledges that in entering into this Publication Agreement it has not relied upon any oral or written statements, collateral or other warranties, assurances, representations or undertakings which were made by or on behalf of the other party in relation to the subject matter of this Publication Agreement at any time before its signature (together "Pre-Contractual Statements"), other than those which are set out in this Publication Agreement. Each party hereby waives all rights and remedies which might otherwise be available to it in relation to such Pre-Contractual Statements. Nothing in this clause shall exclude or restrict the liability of either party arising out of its pre-contract fraudulent misrepresentation or fraudulent concealment.
\n\n7.4 Waiver: No failure or delay by a party to exercise any right or remedy provided under this Publication Agreement or by law shall constitute a waiver of that or any other right or remedy, nor shall it preclude or restrict the further exercise of that or any other right or remedy. No single or partial exercise of such right or remedy shall preclude or restrict the further exercise of that or any other right or remedy.
\n\n7.5 Variation: No variation of this Publication Agreement shall be effective unless it is in writing and signed by the parties (or their duly authorized representatives).
\n\n7.6 Severance: If any provision or part-provision of this Publication Agreement is or becomes invalid, illegal or unenforceable, it shall be deemed modified to the minimum extent necessary to make it valid, legal and enforceable. If such modification is not possible, the relevant provision or part-provision shall be deemed deleted.
\n\nAny modification to or deletion of a provision or part-provision under this clause shall not affect the validity and enforceability of the rest of this Publication Agreement.
\n\n7.7 No partnership: Nothing in this Publication Agreement is intended to, or shall be deemed to, establish or create any partnership or joint venture or the relationship of principal and agent or employer and employee between IntechOpen and the Corresponding Author or any Co-Author, nor authorize any party to make or enter into any commitments for or on behalf of any other party.
\n\n7.8 Governing law: This Publication Agreement and any dispute or claim (including non-contractual disputes or claims) arising out of or in connection with it or its subject matter or formation shall be governed by and construed in accordance with the law of England and Wales. The parties submit to the exclusive jurisdiction of the English courts to settle any dispute or claim arising out of or in connection with this Publication Agreement (including any non-contractual disputes or claims).
\n\nLast updated: 2020-11-27
\n\n\n\n
\n"}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5681},{group:"region",caption:"Middle and South America",value:2,count:5161},{group:"region",caption:"Africa",value:3,count:1683},{group:"region",caption:"Asia",value:4,count:10200},{group:"region",caption:"Australia and Oceania",value:5,count:886},{group:"region",caption:"Europe",value:6,count:15610}],offset:12,limit:12,total:117096},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{sort:"dateendthirdsteppublish"},books:[],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:9},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:18},{group:"topic",caption:"Business, Management and Economics",value:7,count:2},{group:"topic",caption:"Chemistry",value:8,count:7},{group:"topic",caption:"Computer and Information Science",value:9,count:10},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:5},{group:"topic",caption:"Engineering",value:11,count:14},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:5},{group:"topic",caption:"Materials Science",value:14,count:4},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:63},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:1},{group:"topic",caption:"Neuroscience",value:18,count:1},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:6},{group:"topic",caption:"Physics",value:20,count:2},{group:"topic",caption:"Psychology",value:21,count:3},{group:"topic",caption:"Robotics",value:22,count:1},{group:"topic",caption:"Social Sciences",value:23,count:3},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:2}],offset:0,limit:12,total:null},popularBooks:{featuredBooks:[{type:"book",id:"9208",title:"Welding",subtitle:"Modern Topics",isOpenForSubmission:!1,hash:"7d6be076ccf3a3f8bd2ca52d86d4506b",slug:"welding-modern-topics",bookSignature:"Sadek Crisóstomo Absi Alfaro, Wojciech Borek and Błażej Tomiczek",coverURL:"https://cdn.intechopen.com/books/images_new/9208.jpg",editors:[{id:"65292",title:"Prof.",name:"Sadek Crisostomo Absi",middleName:"C. Absi",surname:"Alfaro",slug:"sadek-crisostomo-absi-alfaro",fullName:"Sadek Crisostomo Absi Alfaro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9139",title:"Topics in Primary Care Medicine",subtitle:null,isOpenForSubmission:!1,hash:"ea774a4d4c1179da92a782e0ae9cde92",slug:"topics-in-primary-care-medicine",bookSignature:"Thomas F. Heston",coverURL:"https://cdn.intechopen.com/books/images_new/9139.jpg",editors:[{id:"217926",title:"Dr.",name:"Thomas F.",middleName:null,surname:"Heston",slug:"thomas-f.-heston",fullName:"Thomas F. Heston"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8697",title:"Virtual Reality and Its Application in Education",subtitle:null,isOpenForSubmission:!1,hash:"ee01b5e387ba0062c6b0d1e9227bda05",slug:"virtual-reality-and-its-application-in-education",bookSignature:"Dragan Cvetković",coverURL:"https://cdn.intechopen.com/books/images_new/8697.jpg",editors:[{id:"101330",title:"Dr.",name:"Dragan",middleName:"Mladen",surname:"Cvetković",slug:"dragan-cvetkovic",fullName:"Dragan Cvetković"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9785",title:"Endometriosis",subtitle:null,isOpenForSubmission:!1,hash:"f457ca61f29cf7e8bc191732c50bb0ce",slug:"endometriosis",bookSignature:"Courtney Marsh",coverURL:"https://cdn.intechopen.com/books/images_new/9785.jpg",editors:[{id:"255491",title:"Dr.",name:"Courtney",middleName:null,surname:"Marsh",slug:"courtney-marsh",fullName:"Courtney Marsh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9343",title:"Trace Metals in the Environment",subtitle:"New Approaches and Recent Advances",isOpenForSubmission:!1,hash:"ae07e345bc2ce1ebbda9f70c5cd12141",slug:"trace-metals-in-the-environment-new-approaches-and-recent-advances",bookSignature:"Mario Alfonso Murillo-Tovar, Hugo Saldarriaga-Noreña and Agnieszka Saeid",coverURL:"https://cdn.intechopen.com/books/images_new/9343.jpg",editors:[{id:"255959",title:"Dr.",name:"Mario Alfonso",middleName:null,surname:"Murillo-Tovar",slug:"mario-alfonso-murillo-tovar",fullName:"Mario Alfonso Murillo-Tovar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7831",title:"Sustainability in Urban Planning and Design",subtitle:null,isOpenForSubmission:!1,hash:"c924420492c8c2c9751e178d025f4066",slug:"sustainability-in-urban-planning-and-design",bookSignature:"Amjad Almusaed, Asaad Almssad and Linh Truong - Hong",coverURL:"https://cdn.intechopen.com/books/images_new/7831.jpg",editors:[{id:"110471",title:"Dr.",name:"Amjad",middleName:"Zaki",surname:"Almusaed",slug:"amjad-almusaed",fullName:"Amjad Almusaed"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8468",title:"Sheep Farming",subtitle:"An Approach to Feed, Growth and Sanity",isOpenForSubmission:!1,hash:"838f08594850bc04aa14ec873ed1b96f",slug:"sheep-farming-an-approach-to-feed-growth-and-sanity",bookSignature:"António Monteiro",coverURL:"https://cdn.intechopen.com/books/images_new/8468.jpg",editors:[{id:"190314",title:"Prof.",name:"António",middleName:"Cardoso",surname:"Monteiro",slug:"antonio-monteiro",fullName:"António Monteiro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8816",title:"Financial Crises",subtitle:"A Selection of Readings",isOpenForSubmission:!1,hash:"6f2f49fb903656e4e54280c79fabd10c",slug:"financial-crises-a-selection-of-readings",bookSignature:"Stelios Markoulis",coverURL:"https://cdn.intechopen.com/books/images_new/8816.jpg",editors:[{id:"237863",title:"Dr.",name:"Stelios",middleName:null,surname:"Markoulis",slug:"stelios-markoulis",fullName:"Stelios Markoulis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9376",title:"Contemporary Developments and Perspectives in International Health Security",subtitle:"Volume 1",isOpenForSubmission:!1,hash:"b9a00b84cd04aae458fb1d6c65795601",slug:"contemporary-developments-and-perspectives-in-international-health-security-volume-1",bookSignature:"Stanislaw P. Stawicki, Michael S. Firstenberg, Sagar C. Galwankar, Ricardo Izurieta and Thomas Papadimos",coverURL:"https://cdn.intechopen.com/books/images_new/9376.jpg",editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",middleName:null,surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7769",title:"Medical Isotopes",subtitle:null,isOpenForSubmission:!1,hash:"f8d3c5a6c9a42398e56b4e82264753f7",slug:"medical-isotopes",bookSignature:"Syed Ali Raza Naqvi and Muhammad Babar Imrani",coverURL:"https://cdn.intechopen.com/books/images_new/7769.jpg",editors:[{id:"259190",title:"Dr.",name:"Syed Ali Raza",middleName:null,surname:"Naqvi",slug:"syed-ali-raza-naqvi",fullName:"Syed Ali Raza Naqvi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9279",title:"Concepts, Applications and Emerging Opportunities in Industrial Engineering",subtitle:null,isOpenForSubmission:!1,hash:"9bfa87f9b627a5468b7c1e30b0eea07a",slug:"concepts-applications-and-emerging-opportunities-in-industrial-engineering",bookSignature:"Gary Moynihan",coverURL:"https://cdn.intechopen.com/books/images_new/9279.jpg",editors:[{id:"16974",title:"Dr.",name:"Gary",middleName:null,surname:"Moynihan",slug:"gary-moynihan",fullName:"Gary Moynihan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7807",title:"A Closer Look at Organizational Culture in Action",subtitle:null,isOpenForSubmission:!1,hash:"05c608b9271cc2bc711f4b28748b247b",slug:"a-closer-look-at-organizational-culture-in-action",bookSignature:"Süleyman Davut Göker",coverURL:"https://cdn.intechopen.com/books/images_new/7807.jpg",editors:[{id:"190035",title:"Associate Prof.",name:"Süleyman Davut",middleName:null,surname:"Göker",slug:"suleyman-davut-goker",fullName:"Süleyman Davut Göker"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:5126},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"9208",title:"Welding",subtitle:"Modern Topics",isOpenForSubmission:!1,hash:"7d6be076ccf3a3f8bd2ca52d86d4506b",slug:"welding-modern-topics",bookSignature:"Sadek Crisóstomo Absi Alfaro, Wojciech Borek and Błażej Tomiczek",coverURL:"https://cdn.intechopen.com/books/images_new/9208.jpg",editors:[{id:"65292",title:"Prof.",name:"Sadek Crisostomo Absi",middleName:"C. Absi",surname:"Alfaro",slug:"sadek-crisostomo-absi-alfaro",fullName:"Sadek Crisostomo Absi Alfaro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9139",title:"Topics in Primary Care Medicine",subtitle:null,isOpenForSubmission:!1,hash:"ea774a4d4c1179da92a782e0ae9cde92",slug:"topics-in-primary-care-medicine",bookSignature:"Thomas F. Heston",coverURL:"https://cdn.intechopen.com/books/images_new/9139.jpg",editors:[{id:"217926",title:"Dr.",name:"Thomas F.",middleName:null,surname:"Heston",slug:"thomas-f.-heston",fullName:"Thomas F. Heston"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8697",title:"Virtual Reality and Its Application in Education",subtitle:null,isOpenForSubmission:!1,hash:"ee01b5e387ba0062c6b0d1e9227bda05",slug:"virtual-reality-and-its-application-in-education",bookSignature:"Dragan Cvetković",coverURL:"https://cdn.intechopen.com/books/images_new/8697.jpg",editors:[{id:"101330",title:"Dr.",name:"Dragan",middleName:"Mladen",surname:"Cvetković",slug:"dragan-cvetkovic",fullName:"Dragan Cvetković"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9785",title:"Endometriosis",subtitle:null,isOpenForSubmission:!1,hash:"f457ca61f29cf7e8bc191732c50bb0ce",slug:"endometriosis",bookSignature:"Courtney Marsh",coverURL:"https://cdn.intechopen.com/books/images_new/9785.jpg",editors:[{id:"255491",title:"Dr.",name:"Courtney",middleName:null,surname:"Marsh",slug:"courtney-marsh",fullName:"Courtney Marsh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9343",title:"Trace Metals in the Environment",subtitle:"New Approaches and Recent Advances",isOpenForSubmission:!1,hash:"ae07e345bc2ce1ebbda9f70c5cd12141",slug:"trace-metals-in-the-environment-new-approaches-and-recent-advances",bookSignature:"Mario Alfonso Murillo-Tovar, Hugo Saldarriaga-Noreña and Agnieszka Saeid",coverURL:"https://cdn.intechopen.com/books/images_new/9343.jpg",editors:[{id:"255959",title:"Dr.",name:"Mario Alfonso",middleName:null,surname:"Murillo-Tovar",slug:"mario-alfonso-murillo-tovar",fullName:"Mario Alfonso Murillo-Tovar"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8468",title:"Sheep Farming",subtitle:"An Approach to Feed, Growth and Sanity",isOpenForSubmission:!1,hash:"838f08594850bc04aa14ec873ed1b96f",slug:"sheep-farming-an-approach-to-feed-growth-and-sanity",bookSignature:"António Monteiro",coverURL:"https://cdn.intechopen.com/books/images_new/8468.jpg",editors:[{id:"190314",title:"Prof.",name:"António",middleName:"Cardoso",surname:"Monteiro",slug:"antonio-monteiro",fullName:"António Monteiro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8816",title:"Financial Crises",subtitle:"A Selection of Readings",isOpenForSubmission:!1,hash:"6f2f49fb903656e4e54280c79fabd10c",slug:"financial-crises-a-selection-of-readings",bookSignature:"Stelios Markoulis",coverURL:"https://cdn.intechopen.com/books/images_new/8816.jpg",editors:[{id:"237863",title:"Dr.",name:"Stelios",middleName:null,surname:"Markoulis",slug:"stelios-markoulis",fullName:"Stelios Markoulis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7831",title:"Sustainability in Urban Planning and Design",subtitle:null,isOpenForSubmission:!1,hash:"c924420492c8c2c9751e178d025f4066",slug:"sustainability-in-urban-planning-and-design",bookSignature:"Amjad Almusaed, Asaad Almssad and Linh Truong - Hong",coverURL:"https://cdn.intechopen.com/books/images_new/7831.jpg",editors:[{id:"110471",title:"Dr.",name:"Amjad",middleName:"Zaki",surname:"Almusaed",slug:"amjad-almusaed",fullName:"Amjad Almusaed"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9376",title:"Contemporary Developments and Perspectives in International Health Security",subtitle:"Volume 1",isOpenForSubmission:!1,hash:"b9a00b84cd04aae458fb1d6c65795601",slug:"contemporary-developments-and-perspectives-in-international-health-security-volume-1",bookSignature:"Stanislaw P. Stawicki, Michael S. Firstenberg, Sagar C. Galwankar, Ricardo Izurieta and Thomas Papadimos",coverURL:"https://cdn.intechopen.com/books/images_new/9376.jpg",editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",middleName:null,surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7769",title:"Medical Isotopes",subtitle:null,isOpenForSubmission:!1,hash:"f8d3c5a6c9a42398e56b4e82264753f7",slug:"medical-isotopes",bookSignature:"Syed Ali Raza Naqvi and Muhammad Babar Imrani",coverURL:"https://cdn.intechopen.com/books/images_new/7769.jpg",editors:[{id:"259190",title:"Dr.",name:"Syed Ali Raza",middleName:null,surname:"Naqvi",slug:"syed-ali-raza-naqvi",fullName:"Syed Ali Raza Naqvi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"8468",title:"Sheep Farming",subtitle:"An Approach to Feed, Growth and Health",isOpenForSubmission:!1,hash:"838f08594850bc04aa14ec873ed1b96f",slug:"sheep-farming-an-approach-to-feed-growth-and-health",bookSignature:"António Monteiro",coverURL:"https://cdn.intechopen.com/books/images_new/8468.jpg",editedByType:"Edited by",editors:[{id:"190314",title:"Prof.",name:"António",middleName:"Cardoso",surname:"Monteiro",slug:"antonio-monteiro",fullName:"António Monteiro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9523",title:"Oral and Maxillofacial Surgery",subtitle:null,isOpenForSubmission:!1,hash:"5eb6ec2db961a6c8965d11180a58d5c1",slug:"oral-and-maxillofacial-surgery",bookSignature:"Gokul Sridharan",coverURL:"https://cdn.intechopen.com/books/images_new/9523.jpg",editedByType:"Edited by",editors:[{id:"82453",title:"Dr.",name:"Gokul",middleName:null,surname:"Sridharan",slug:"gokul-sridharan",fullName:"Gokul Sridharan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9785",title:"Endometriosis",subtitle:null,isOpenForSubmission:!1,hash:"f457ca61f29cf7e8bc191732c50bb0ce",slug:"endometriosis",bookSignature:"Courtney Marsh",coverURL:"https://cdn.intechopen.com/books/images_new/9785.jpg",editedByType:"Edited by",editors:[{id:"255491",title:"Dr.",name:"Courtney",middleName:null,surname:"Marsh",slug:"courtney-marsh",fullName:"Courtney Marsh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9018",title:"Some RNA Viruses",subtitle:null,isOpenForSubmission:!1,hash:"a5cae846dbe3692495fc4add2f60fd84",slug:"some-rna-viruses",bookSignature:"Yogendra Shah and Eltayb Abuelzein",coverURL:"https://cdn.intechopen.com/books/images_new/9018.jpg",editedByType:"Edited by",editors:[{id:"278914",title:"Ph.D.",name:"Yogendra",middleName:null,surname:"Shah",slug:"yogendra-shah",fullName:"Yogendra Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8816",title:"Financial Crises",subtitle:"A Selection of Readings",isOpenForSubmission:!1,hash:"6f2f49fb903656e4e54280c79fabd10c",slug:"financial-crises-a-selection-of-readings",bookSignature:"Stelios Markoulis",coverURL:"https://cdn.intechopen.com/books/images_new/8816.jpg",editedByType:"Edited by",editors:[{id:"237863",title:"Dr.",name:"Stelios",middleName:null,surname:"Markoulis",slug:"stelios-markoulis",fullName:"Stelios Markoulis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9585",title:"Advances in Complex Valvular Disease",subtitle:null,isOpenForSubmission:!1,hash:"ef64f11e211621ecfe69c46e60e7ca3d",slug:"advances-in-complex-valvular-disease",bookSignature:"Michael S. Firstenberg and Imran Khan",coverURL:"https://cdn.intechopen.com/books/images_new/9585.jpg",editedByType:"Edited by",editors:[{id:"64343",title:null,name:"Michael S.",middleName:"S",surname:"Firstenberg",slug:"michael-s.-firstenberg",fullName:"Michael S. Firstenberg"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10150",title:"Smart Manufacturing",subtitle:"When Artificial Intelligence Meets the Internet of Things",isOpenForSubmission:!1,hash:"87004a19de13702d042f8ff96d454698",slug:"smart-manufacturing-when-artificial-intelligence-meets-the-internet-of-things",bookSignature:"Tan Yen Kheng",coverURL:"https://cdn.intechopen.com/books/images_new/10150.jpg",editedByType:"Edited by",editors:[{id:"78857",title:"Dr.",name:"Tan Yen",middleName:null,surname:"Kheng",slug:"tan-yen-kheng",fullName:"Tan Yen Kheng"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9386",title:"Direct Numerical Simulations",subtitle:"An Introduction and Applications",isOpenForSubmission:!1,hash:"158a3a0fdba295d21ff23326f5a072d5",slug:"direct-numerical-simulations-an-introduction-and-applications",bookSignature:"Srinivasa Rao",coverURL:"https://cdn.intechopen.com/books/images_new/9386.jpg",editedByType:"Edited by",editors:[{id:"6897",title:"Dr.",name:"Srinivasa",middleName:"P",surname:"Rao",slug:"srinivasa-rao",fullName:"Srinivasa Rao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9139",title:"Topics in Primary Care Medicine",subtitle:null,isOpenForSubmission:!1,hash:"ea774a4d4c1179da92a782e0ae9cde92",slug:"topics-in-primary-care-medicine",bookSignature:"Thomas F. Heston",coverURL:"https://cdn.intechopen.com/books/images_new/9139.jpg",editedByType:"Edited by",editors:[{id:"217926",title:"Dr.",name:"Thomas F.",middleName:null,surname:"Heston",slug:"thomas-f.-heston",fullName:"Thomas F. Heston"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9208",title:"Welding",subtitle:"Modern Topics",isOpenForSubmission:!1,hash:"7d6be076ccf3a3f8bd2ca52d86d4506b",slug:"welding-modern-topics",bookSignature:"Sadek Crisóstomo Absi Alfaro, Wojciech Borek and Błażej Tomiczek",coverURL:"https://cdn.intechopen.com/books/images_new/9208.jpg",editedByType:"Edited by",editors:[{id:"65292",title:"Prof.",name:"Sadek Crisostomo Absi",middleName:"C. Absi",surname:"Alfaro",slug:"sadek-crisostomo-absi-alfaro",fullName:"Sadek Crisostomo Absi Alfaro"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"595",title:"Communication System",slug:"numerical-analysis-and-scientific-computing-communication-system",parent:{title:"Numerical Analysis and Scientific Computing",slug:"numerical-analysis-and-scientific-computing"},numberOfBooks:1,numberOfAuthorsAndEditors:1,numberOfWosCitations:7,numberOfCrossrefCitations:10,numberOfDimensionsCitations:10,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"numerical-analysis-and-scientific-computing-communication-system",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"6116",title:"Modelling, Simulation and Identification",subtitle:null,isOpenForSubmission:!1,hash:"5858c96a84d8903c0069d660d2792973",slug:"modelling--simulation-and-identification",bookSignature:"Azah Mohamed",coverURL:"https://cdn.intechopen.com/books/images_new/6116.jpg",editedByType:"Edited by",editors:[{id:"10453",title:"Dr.",name:"Azah",middleName:null,surname:"Mohamed",slug:"azah-mohamed",fullName:"Azah Mohamed"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:1,mostCitedChapters:[{id:"11739",doi:"10.5772/10019",title:"Nonlinear System Identification through Local Model Approaches: Partitioning Strategies and Parameter Estimation",slug:"nonlinear-system-identification-through-local-model-approaches-partitioning-strategies-and-parameter",totalDownloads:1932,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Christoph Hametner and Stefan Jakubek",authors:null},{id:"11741",doi:"10.5772/10021",title:"Crowdmags: Multi-Agent Geo-Simulation of Crowd and Control Forces Interactions",slug:"title-crowdmags-multi-agent-geo-simulation-of-crowd-and-control-forces-interactions-",totalDownloads:1406,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Bernard Moulin and Benoit Larochelle",authors:null},{id:"11745",doi:"10.5772/10025",title:"Assessment of Seismic Risk and Reliability of Road Network",slug:"seismic-risk-assessment-of-road-network",totalDownloads:1869,totalCrossrefCites:2,totalDimensionsCites:2,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Salvatore Cafiso",authors:null}],mostDownloadedChaptersLast30Days:[{id:"11737",title:"Order Statistics - Fuzzy Approach in Processing of Multichannel Images and Video Sequences",slug:"order-statistics-fuzzy-approach-in-processing-of-multichannel-images-and-video-sequences",totalDownloads:1339,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Francisco Gallegos, Volodymyr Ponomaryov and Alberto Rosales",authors:null},{id:"11732",title:"Voltage Sags and Equipment Sensitivity: a Practical Investigation",slug:"voltage-sags-and-equipment-sensitivity-a-practical-investigation",totalDownloads:4964,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Hussain Shareef, Azah Mohamed and Nazri Marzuki",authors:null},{id:"11735",title:"Network and System Simulation Tools for Next Generation Networks: a Case Study",slug:"network-and-system-simulation-tools-for-wireless-networks-a-case-study",totalDownloads:3780,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"S. Mehta, Najnin Sulatan and K.S. Kwak",authors:null},{id:"11744",title:"Modelling of Transient Ground Surface Displacements Due to a Point Heat Source",slug:"modelling-of-transient-ground-surface-displacements-due-to-a-point-heat-source",totalDownloads:1133,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Feng-Tsai Lin and John C.-C. Lu",authors:null},{id:"11736",title:"Super-Resplution Procedures in Images and Video Sequences Based on Wavelet Atomic Functions",slug:"super-resolution-procedures-in-images-and-video-sequences-based-on-wavelet-atomic-functions",totalDownloads:1654,totalCrossrefCites:0,totalDimensionsCites:1,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Volodymyr Ponomaryov and Francisco Gomeztagle",authors:null},{id:"11739",title:"Nonlinear System Identification through Local Model Approaches: Partitioning Strategies and Parameter Estimation",slug:"nonlinear-system-identification-through-local-model-approaches-partitioning-strategies-and-parameter",totalDownloads:1932,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Christoph Hametner and Stefan Jakubek",authors:null},{id:"11741",title:"Crowdmags: Multi-Agent Geo-Simulation of Crowd and Control Forces Interactions",slug:"title-crowdmags-multi-agent-geo-simulation-of-crowd-and-control-forces-interactions-",totalDownloads:1406,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Bernard Moulin and Benoit Larochelle",authors:null},{id:"11740",title:"Utilising Virtual Environments To Research Ways To Improve Manipulation Task",slug:"utilising-virtual-environments-to-research-ways-to-improve-manipulation-task-",totalDownloads:1995,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Faieza Abdul Aziz, On Chee Leong and Lai Jian Ming",authors:null},{id:"11743",title:"Closed-Form Solutions of the Cross-Anisotropic Stratum Due to a Point Heat Source",slug:"closed-form-solutions-of-the-cross-anisotropic-stratum-due-to-a-point-heat-source",totalDownloads:1400,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Feng-Tsai Lin and John C.-C. Lu",authors:null},{id:"11738",title:"A New Implicit Adaptive Zero Pole-Placement PID Controller",slug:"a-new-implicit-multivariable-pole-placement-pid-controller",totalDownloads:2001,totalCrossrefCites:1,totalDimensionsCites:0,book:{slug:"modelling--simulation-and-identification",title:"Modelling, Simulation and Identification",fullTitle:"Modelling, Simulation and Identification"},signatures:"Ali Zayed and Mahmoud Elfandi",authors:null}],onlineFirstChaptersFilter:{topicSlug:"numerical-analysis-and-scientific-computing-communication-system",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"profile.detail",path:"/profiles/137332/jesus-de-los-santos-reno",hash:"",query:{},params:{id:"137332",slug:"jesus-de-los-santos-reno"},fullPath:"/profiles/137332/jesus-de-los-santos-reno",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()