\\n\\n
More than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\\n\\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\\n\\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\\n\\nAdditionally, each book published by IntechOpen contains original content and research findings.
\\n\\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\\n\\n\\n\\n
\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'
Simba Information has released its Open Access Book Publishing 2020 - 2024 report and has again identified IntechOpen as the world’s largest Open Access book publisher by title count.
\n\nSimba Information is a leading provider for market intelligence and forecasts in the media and publishing industry. The report, published every year, provides an overview and financial outlook for the global professional e-book publishing market.
\n\nIntechOpen, De Gruyter, and Frontiers are the largest OA book publishers by title count, with IntechOpen coming in at first place with 5,101 OA books published, a good 1,782 titles ahead of the nearest competitor.
\n\nSince the first Open Access Book Publishing report published in 2016, IntechOpen has held the top stop each year.
\n\n\n\nMore than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\n\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\n\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\n\nAdditionally, each book published by IntechOpen contains original content and research findings.
\n\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\n\n\n\n
\n'}],latestNews:[{slug:"stanford-university-identifies-top-2-scientists-over-1-000-are-intechopen-authors-and-editors-20210122",title:"Stanford University Identifies Top 2% Scientists, Over 1,000 are IntechOpen Authors and Editors"},{slug:"intechopen-authors-included-in-the-highly-cited-researchers-list-for-2020-20210121",title:"IntechOpen Authors Included in the Highly Cited Researchers List for 2020"},{slug:"intechopen-maintains-position-as-the-world-s-largest-oa-book-publisher-20201218",title:"IntechOpen Maintains Position as the World’s Largest OA Book Publisher"},{slug:"all-intechopen-books-available-on-perlego-20201215",title:"All IntechOpen Books Available on Perlego"},{slug:"oiv-awards-recognizes-intechopen-s-editors-20201127",title:"OIV Awards Recognizes IntechOpen's Editors"},{slug:"intechopen-joins-crossref-s-initiative-for-open-abstracts-i4oa-to-boost-the-discovery-of-research-20201005",title:"IntechOpen joins Crossref's Initiative for Open Abstracts (I4OA) to Boost the Discovery of Research"},{slug:"intechopen-hits-milestone-5-000-open-access-books-published-20200908",title:"IntechOpen hits milestone: 5,000 Open Access books published!"},{slug:"intechopen-books-hosted-on-the-mathworks-book-program-20200819",title:"IntechOpen Books Hosted on the MathWorks Book Program"}]},book:{item:{type:"book",id:"9424",leadTitle:null,fullTitle:"Energy Efficiency and Sustainable Lighting - a Bet for the Future",title:"Energy Efficiency and Sustainable Lighting",subtitle:"a Bet for the Future",reviewType:"peer-reviewed",abstract:"The lighting of both exteriors and interiors is a field within electrical and lighting engineering, where important technological changes have been taking place oriented towards environmental sustainability and energy efficiency. LED technology has been gradually gaining ground in the world of lighting over other technologies due to its high lighting and energy efficiency and savings. However, some problems related to overheating or associated regulation are emerging. This has prompted the search for new, more efficient, and sustainable forms of lighting. This book presents successful cases related to energy efficiency and lighting that may be of great interest to those trying to enter the world of scientific research.",isbn:"978-1-78985-960-7",printIsbn:"978-1-78985-959-1",pdfIsbn:"978-1-83880-186-1",doi:"10.5772/intechopen.85907",price:119,priceEur:129,priceUsd:155,slug:"energy-efficiency-and-sustainable-lighting-a-bet-for-the-future",numberOfPages:274,isOpenForSubmission:!1,isInWos:1,hash:"e6152671787768a1fd14ed0afac0e18e",bookSignature:"Manuel Jesús Hermoso-Orzáez and Alfonso Gago-Calderón",publishedDate:"March 25th 2020",coverURL:"https://cdn.intechopen.com/books/images_new/9424.jpg",numberOfDownloads:2535,numberOfWosCitations:1,numberOfCrossrefCitations:2,numberOfDimensionsCitations:3,hasAltmetrics:0,numberOfTotalCitations:6,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"March 20th 2019",dateEndSecondStepPublish:"June 4th 2019",dateEndThirdStepPublish:"July 30th 2019",dateEndFourthStepPublish:"October 15th 2019",dateEndFifthStepPublish:"December 14th 2019",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6",editedByType:"Edited by",kuFlag:!0,editors:[{id:"241453",title:"Prof.",name:"Manuel J.",middleName:null,surname:"Hermoso-Orzáez",slug:"manuel-j.-hermoso-orzaez",fullName:"Manuel J. Hermoso-Orzáez",profilePictureURL:"https://mts.intechopen.com/storage/users/241453/images/system/241453.jpeg",biography:"I am Assistant Professor Doctor hired full time by the University of Jaén since November 2017. I have developed my professional activity in the world of engineering and projects, with a 20-year experience in Public Administration (Municipal Public Lighting Technician) and a private company.\nI have significant experience as a researcher with more than twenty of 30 published articles JCR-Scopus, (15) ten of them very relevant in high impact journals Q1-Q2, as well as presence in International Congresses where I have presented various oral communications (25), written (10), poster (15) and lectures (10). I also participate as a Publons Journal Reviewer (more than 50) and a member of several scientific committees. My field of research is iMy specialties as a researcher are Energy Efficiency Public Lighting, LED lighting, Project Management and Management, Alternative Energies, Gasification, Hydrogen, BIM (Building Information Modeling), Economic and Financial Analysis. Industrial Maintenance and Storage",institutionString:"University of Jaén",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:null}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:{id:"222219",title:"Prof.",name:"Alfonso",middleName:null,surname:"Gago-Calderón",slug:"alfonso-gago-calderon",fullName:"Alfonso Gago-Calderón",profilePictureURL:"https://mts.intechopen.com/storage/users/222219/images/system/222219.jpeg",biography:'Industrial Engineer (2002 - Best academic record award), Master in Audiovisual Information Systems (2010) and Doctor in Industrial Engineering (2010) by the Universidad de Málaga (UMA). Assistant Professor Doctor of the Higher School of Industrial Engineers. Collaborator of the Institute of Solar Energy (Polytechnic University of Madrid). Professor of the Master\\\'s Degree in Project Preparation BIM and Project Management of the Universidad de Jaén. \\"López Peñalver\\" Prize: Best young researcher in engineering and architecture UMA (2013). Special Mention in the II Innovation Awards of the Alberto Elzaburu Foundation (2015). Author of 7 books/chapters, 7 patents, 12 scientific articles in indexed journals (JCR & SCOPUS) and an extensive participation in international conferences. Fields of study: Applications of LED technology, electronic control for opto-electronic and development of light electric vehicles (LEVs)',institutionString:"University of Málaga",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"University of Malaga",institutionURL:null,country:{name:"Spain"}}},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"144",title:"Sustainable Energy",slug:"sustainable-energy"}],chapters:[{id:"68724",title:"The Improved Model of the Method, Rights, and Resources (MRR) for the Evaluation of the EIA System: Revising the Sustainability Indicators",doi:"10.5772/intechopen.88747",slug:"the-improved-model-of-the-method-rights-and-resources-mrr-for-the-evaluation-of-the-eia-system-revis",totalDownloads:224,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Rowan Kushinga Machaka",downloadPdfUrl:"/chapter/pdf-download/68724",previewPdfUrl:"/chapter/pdf-preview/68724",authors:[{id:"289346",title:"Dr.",name:"Rowan",surname:"Machaka",slug:"rowan-machaka",fullName:"Rowan Machaka"}],corrections:null},{id:"68988",title:"Eco-Material Selection for Lightweight Vehicle Design",doi:"10.5772/intechopen.88372",slug:"eco-material-selection-for-lightweight-vehicle-design",totalDownloads:241,totalCrossrefCites:1,totalDimensionsCites:1,signatures:"Ahmad T. Mayyas and Mohammed Omar",downloadPdfUrl:"/chapter/pdf-download/68988",previewPdfUrl:"/chapter/pdf-preview/68988",authors:[{id:"292675",title:"Prof.",name:"Mohammad",surname:"Omar",slug:"mohammad-omar",fullName:"Mohammad Omar"},{id:"292681",title:"Dr.",name:"Ahmad",surname:"Mayyas",slug:"ahmad-mayyas",fullName:"Ahmad Mayyas"}],corrections:null},{id:"68501",title:"Plantation Forests: A Guarantee of Sustainable Management of Abandoned and Marginal Farmlands",doi:"10.5772/intechopen.88373",slug:"plantation-forests-a-guarantee-of-sustainable-management-of-abandoned-and-marginal-farmlands",totalDownloads:205,totalCrossrefCites:1,totalDimensionsCites:1,signatures:"Mudrite Daugaviete, Dagnija Lazdina, Baiba Bambe, Andis Lazdins, Kristaps Makovskis and Uldis Daugavietis",downloadPdfUrl:"/chapter/pdf-download/68501",previewPdfUrl:"/chapter/pdf-preview/68501",authors:[{id:"294306",title:"Dr.",name:"Mudrite",surname:"Daugaviete",slug:"mudrite-daugaviete",fullName:"Mudrite Daugaviete"},{id:"294307",title:"Dr.",name:"Baiba",surname:"Bambe",slug:"baiba-bambe",fullName:"Baiba Bambe"},{id:"295016",title:"Dr.",name:"Dagnija",surname:"Lazdina",slug:"dagnija-lazdina",fullName:"Dagnija Lazdina"},{id:"295017",title:"Dr.",name:"Andis",surname:"Lazdins",slug:"andis-lazdins",fullName:"Andis Lazdins"}],corrections:null},{id:"69542",title:"Explorative Analysis of Household Energy Consumption in Bauchi State, Nigeria",doi:"10.5772/intechopen.89597",slug:"explorative-analysis-of-household-energy-consumption-in-bauchi-state-nigeria",totalDownloads:234,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Abubakar Hamid Danlami and Rabi’ul Islam",downloadPdfUrl:"/chapter/pdf-download/69542",previewPdfUrl:"/chapter/pdf-preview/69542",authors:[{id:"242850",title:"Dr.",name:"Abubakar",surname:"Danlami",slug:"abubakar-danlami",fullName:"Abubakar Danlami"},{id:"311469",title:"Dr.",name:"Rabiul",surname:"Islam",slug:"rabiul-islam",fullName:"Rabiul Islam"}],corrections:null},{id:"68794",title:"Roof Lighting with Recycled Plastic Bottles",doi:"10.5772/intechopen.88917",slug:"roof-lighting-with-recycled-plastic-bottles",totalDownloads:177,totalCrossrefCites:0,totalDimensionsCites:1,signatures:"Nancy Varela Terreros and Daniel Espinoza Díaz",downloadPdfUrl:"/chapter/pdf-download/68794",previewPdfUrl:"/chapter/pdf-preview/68794",authors:[{id:"307298",title:"Ph.D. Student",name:"Nancy",surname:"Varela",slug:"nancy-varela",fullName:"Nancy Varela"},{id:"310019",title:"Dr.",name:"Daniel",surname:"Espinoza Díaz",slug:"daniel-espinoza-diaz",fullName:"Daniel Espinoza Díaz"}],corrections:null},{id:"68852",title:"Dimensioning of an Autonomous Photovoltaic Installation: Case Study in Msaken, Sousse (Tunisia)",doi:"10.5772/intechopen.88771",slug:"dimensioning-of-an-autonomous-photovoltaic-installation-case-study-in-msaken-sousse-tunisia-",totalDownloads:222,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Olfa Bel Hadj Brahim Kechiche, Marwa Hamza and Habib Sammouda",downloadPdfUrl:"/chapter/pdf-download/68852",previewPdfUrl:"/chapter/pdf-preview/68852",authors:[{id:"305713",title:"Dr.",name:"Olfa",surname:"Bel Hadj Brahim Kechiche",slug:"olfa-bel-hadj-brahim-kechiche",fullName:"Olfa Bel Hadj Brahim Kechiche"},{id:"309479",title:"Mrs.",name:"Marwa",surname:"Hamza",slug:"marwa-hamza",fullName:"Marwa Hamza"},{id:"309480",title:"Prof.",name:"Habib",surname:"Sammouda",slug:"habib-sammouda",fullName:"Habib Sammouda"}],corrections:null},{id:"69549",title:"Energy Efficiency and Sustainability in Outdoor Lighting - A Bet for the Future",doi:"10.5772/intechopen.89413",slug:"energy-efficiency-and-sustainability-in-outdoor-lighting-a-bet-for-the-future",totalDownloads:195,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Kamrul Alam Khan, Salman Rahman Rasel, S.M. Zian Reza and Farhana Yesmin",downloadPdfUrl:"/chapter/pdf-download/69549",previewPdfUrl:"/chapter/pdf-preview/69549",authors:[{id:"278969",title:"Dr.",name:"Md.Kamrul Alam",surname:"Khan",slug:"md.kamrul-alam-khan",fullName:"Md.Kamrul Alam Khan"}],corrections:null},{id:"70293",title:"Analysis of Outdoor Lighting Control Systems Applied to the New Smart City Models",doi:"10.5772/intechopen.88834",slug:"analysis-of-outdoor-lighting-control-systems-applied-to-the-new-smart-city-models",totalDownloads:195,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Eduardo Ruiz Vela, Blas Ogáyar Fernandez, Andrés López Valdivia and Hermoso-Orzáez Manuel Jesús",downloadPdfUrl:"/chapter/pdf-download/70293",previewPdfUrl:"/chapter/pdf-preview/70293",authors:[{id:"241453",title:"Prof.",name:"Manuel J.",surname:"Hermoso-Orzáez",slug:"manuel-j.-hermoso-orzaez",fullName:"Manuel J. Hermoso-Orzáez"},{id:"304966",title:"Prof.",name:"Blas",surname:"Ogayar",slug:"blas-ogayar",fullName:"Blas Ogayar"},{id:"304967",title:"Prof.",name:"Eduardo",surname:"Ruiz Vela",slug:"eduardo-ruiz-vela",fullName:"Eduardo Ruiz Vela"},{id:"304968",title:"Prof.",name:"Andres",surname:"López",slug:"andres-lopez",fullName:"Andres López"}],corrections:null},{id:"68914",title:"Improvement the Efficiency of Distribution Network Using an Efficient Lighting System of Streets",doi:"10.5772/intechopen.88959",slug:"improvement-the-efficiency-of-distribution-network-using-an-efficient-lighting-system-of-streets",totalDownloads:195,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Nassim Iqteit and Khalid Yahya",downloadPdfUrl:"/chapter/pdf-download/68914",previewPdfUrl:"/chapter/pdf-preview/68914",authors:[{id:"270815",title:"Dr.",name:"Khalid",surname:"Yahya",slug:"khalid-yahya",fullName:"Khalid Yahya"},{id:"306578",title:"Dr.",name:"Nassim",surname:"Iqteit",slug:"nassim-iqteit",fullName:"Nassim Iqteit"}],corrections:null},{id:"68855",title:"Energy Efficiency of the Road Lighting: The Impact of Active Power Losses on Energy Performance Indicators and Electricity Costs",doi:"10.5772/intechopen.88833",slug:"energy-efficiency-of-the-road-lighting-the-impact-of-active-power-losses-on-energy-performance-indic",totalDownloads:184,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Roman Sikora and Przemysław Markiewicz",downloadPdfUrl:"/chapter/pdf-download/68855",previewPdfUrl:"/chapter/pdf-preview/68855",authors:[{id:"304945",title:"Ph.D.",name:"Roman",surname:"Sikora",slug:"roman-sikora",fullName:"Roman Sikora"},{id:"305264",title:"Dr.",name:"Przemysław",surname:"Markiewicz",slug:"przemyslaw-markiewicz",fullName:"Przemysław Markiewicz"}],corrections:null},{id:"71195",title:"The Thermal Dissipation of LED Outdoor Lighting Luminaires: Comparative Analysis for a Real Case of Study",doi:"10.5772/intechopen.91400",slug:"the-thermal-dissipation-of-led-outdoor-lighting-luminaires-comparative-analysis-for-a-real-case-of-s",totalDownloads:255,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Hermoso-Orzáez Manuel Jesús, Hervás-Pulido Manuel Jesús, Unión-Sánchez Juan de Dios, Ogáyar-Fernández Blas and Gago-Calderon Alfonso",downloadPdfUrl:"/chapter/pdf-download/71195",previewPdfUrl:"/chapter/pdf-preview/71195",authors:[{id:"241453",title:"Prof.",name:"Manuel J.",surname:"Hermoso-Orzáez",slug:"manuel-j.-hermoso-orzaez",fullName:"Manuel J. Hermoso-Orzáez"},{id:"222219",title:"Prof.",name:"Alfonso",surname:"Gago-Calderón",slug:"alfonso-gago-calderon",fullName:"Alfonso Gago-Calderón"},{id:"307250",title:"Prof.",name:"Manuel Jesús",surname:"Hervas-Pulido",slug:"manuel-jesus-hervas-pulido",fullName:"Manuel Jesús Hervas-Pulido"}],corrections:null},{id:"68853",title:"Control Systems and Ornamental Lighting. A Case Study: Illumination of the Facade of Santiago Hospital in Úbeda (Jaén)",doi:"10.5772/intechopen.88815",slug:"control-systems-and-ornamental-lighting-a-case-study-illumination-of-the-facade-of-santiago-hospital",totalDownloads:210,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Juan Cantizani Oliva, Eduardo Ruiz Vela and José Zamora Salido",downloadPdfUrl:"/chapter/pdf-download/68853",previewPdfUrl:"/chapter/pdf-preview/68853",authors:[{id:"309595",title:"Prof.",name:"Juan",surname:"Cantizani Oliva",slug:"juan-cantizani-oliva",fullName:"Juan Cantizani Oliva"},{id:"309714",title:"Prof.",name:"Eduardo",surname:"Ruíz Vela",slug:"eduardo-ruiz-vela",fullName:"Eduardo Ruíz Vela"},{id:"309715",title:"Prof.",name:"José",surname:"Zamora Salido",slug:"jose-zamora-salido",fullName:"José Zamora Salido"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},relatedBooks:[{type:"book",id:"6490",title:"Energy Management for Sustainable Development",subtitle:null,isOpenForSubmission:!1,hash:"a5e77ab7a4bfed7a2a1d524b8a3d6a90",slug:"energy-management-for-sustainable-development",bookSignature:"Soner Gokten and Guray Kucukkocaoglu",coverURL:"https://cdn.intechopen.com/books/images_new/6490.jpg",editedByType:"Edited by",editors:[{id:"70354",title:"Ph.D.",name:"Soner",surname:"Gokten",slug:"soner-gokten",fullName:"Soner Gokten"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"878",title:"Phytochemicals",subtitle:"A Global Perspective of Their Role in Nutrition and Health",isOpenForSubmission:!1,hash:"ec77671f63975ef2d16192897deb6835",slug:"phytochemicals-a-global-perspective-of-their-role-in-nutrition-and-health",bookSignature:"Venketeshwer Rao",coverURL:"https://cdn.intechopen.com/books/images_new/878.jpg",editedByType:"Edited by",editors:[{id:"82663",title:"Dr.",name:"Venketeshwer",surname:"Rao",slug:"venketeshwer-rao",fullName:"Venketeshwer Rao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4816",title:"Face Recognition",subtitle:null,isOpenForSubmission:!1,hash:"146063b5359146b7718ea86bad47c8eb",slug:"face_recognition",bookSignature:"Kresimir Delac and Mislav Grgic",coverURL:"https://cdn.intechopen.com/books/images_new/4816.jpg",editedByType:"Edited by",editors:[{id:"528",title:"Dr.",name:"Kresimir",surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"74026",slug:"corrigendum-to-calf-sex-influence-in-bovine-milk-production",title:"Corrigendum to: Calf-Sex Influence in Bovine Milk Production",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/74026.pdf",downloadPdfUrl:"/chapter/pdf-download/74026",previewPdfUrl:"/chapter/pdf-preview/74026",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/74026",risUrl:"/chapter/ris/74026",chapter:{id:"73504",slug:"calf-sex-influence-in-bovine-milk-production",signatures:"Miguel Quaresma and R. Payan-Carreira",dateSubmitted:"April 21st 2020",dateReviewed:"September 10th 2020",datePrePublished:"October 8th 2020",datePublished:"January 20th 2021",book:{id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,fullTitle:"Animal Reproduction in Veterinary Medicine",slug:"animal-reproduction-in-veterinary-medicine",publishedDate:"January 20th 2021",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"38652",title:"Dr.",name:"Rita",middleName:null,surname:"Payan-Carreira",fullName:"Rita Payan-Carreira",slug:"rita-payan-carreira",email:"rtpayan@gmail.com",position:null,institution:{name:"University of Évora",institutionURL:null,country:{name:"Portugal"}}},{id:"309250",title:"Dr.",name:"Miguel",middleName:null,surname:"Quaresma",fullName:"Miguel Quaresma",slug:"miguel-quaresma",email:"miguelq@utad.pt",position:null,institution:{name:"University of Trás-os-Montes and Alto Douro",institutionURL:null,country:{name:"Portugal"}}}]}},chapter:{id:"73504",slug:"calf-sex-influence-in-bovine-milk-production",signatures:"Miguel Quaresma and R. Payan-Carreira",dateSubmitted:"April 21st 2020",dateReviewed:"September 10th 2020",datePrePublished:"October 8th 2020",datePublished:"January 20th 2021",book:{id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,fullTitle:"Animal Reproduction in Veterinary Medicine",slug:"animal-reproduction-in-veterinary-medicine",publishedDate:"January 20th 2021",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"38652",title:"Dr.",name:"Rita",middleName:null,surname:"Payan-Carreira",fullName:"Rita Payan-Carreira",slug:"rita-payan-carreira",email:"rtpayan@gmail.com",position:null,institution:{name:"University of Évora",institutionURL:null,country:{name:"Portugal"}}},{id:"309250",title:"Dr.",name:"Miguel",middleName:null,surname:"Quaresma",fullName:"Miguel Quaresma",slug:"miguel-quaresma",email:"miguelq@utad.pt",position:null,institution:{name:"University of Trás-os-Montes and Alto Douro",institutionURL:null,country:{name:"Portugal"}}}]},book:{id:"8545",title:"Animal Reproduction in Veterinary Medicine",subtitle:null,fullTitle:"Animal Reproduction in Veterinary Medicine",slug:"animal-reproduction-in-veterinary-medicine",publishedDate:"January 20th 2021",bookSignature:"Faruk Aral, Rita Payan-Carreira and Miguel Quaresma",coverURL:"https://cdn.intechopen.com/books/images_new/8545.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"25600",title:"Prof.",name:"Faruk",middleName:null,surname:"Aral",slug:"faruk-aral",fullName:"Faruk Aral"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"9344",leadTitle:null,title:"Challenges in the Food, Dairy and Beverage Industry",subtitle:null,reviewType:"peer-reviewed",abstract:"
\r\n\tThe book "Challenges in the Food, Dairy and Beverage Industry" provides information on different aspects of food beverages. The book is divided into 4 major topics: Topic 1 covers type of beverages which also include herbs and vegetable juices, caffeinated beverages of different tea, coffee, cocoa and other functional beverages type. Topic 2 covers beverage food plant sanitation and food and beverage processing conditions. This section will also cover applications of nanotechnology in beverage industry. Topic 3 covers nutritional quality of beverages and their impact on human health. This also includes other functional drinks. Lastly, Topic 4, the largest part of the book, will cover regulations and policies related to beverage production including safety regulations, information regulation, and regulations covering other aspects and their potential impacts on consumer beverage choices. This section will cover the criteria established by FDA that describe the basic steps manufacturers and distributors must follow to make sure these drinks are safe. In addition, this section will cover rules and regulations related to the use of additives, food contact substances (materials), and the information on nutritional facts.
",isbn:null,printIsbn:"979-953-307-X-X",pdfIsbn:null,doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!1,hash:"b50226e723bb724f0c86c4cb1dbb880b",bookSignature:"Prof. Salam Ibrahim and Dr. Rabin Gyawali",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/9344.jpg",keywords:"Fermentation, Yeast, Probiotic, Sanitation, Processing, Technology, Nutrition, Quality, Functional Drink, Regulations, Challenges, Safety",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"September 11th 2019",dateEndSecondStepPublish:"October 2nd 2019",dateEndThirdStepPublish:"December 1st 2019",dateEndFourthStepPublish:"February 19th 2020",dateEndFifthStepPublish:"April 19th 2020",remainingDaysToSecondStep:"a year",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:null,kuFlag:!1,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"107905",title:"Prof.",name:"Salam",middleName:null,surname:"Ibrahim",slug:"salam-ibrahim",fullName:"Salam Ibrahim",profilePictureURL:"https://mts.intechopen.com/storage/users/107905/images/system/107905.jfif",biography:"Dr. Salam A. Ibrahim is a food science research professor in the food and nutritional sciences program at North Carolina A&T State University. Dr. Ibrahim established a research program in dairy starter cultures, food safety, and probiotics. He has successfully conducted projects that were funded by the NIFA-USDA, DHS, other funding agencies, and the private sector. Many of his funded projects have focused on the isolation of beneficial strains and the functional characterization of related health benefits. Dr. Ibrahim became specifically interested in the characteristics of Lactobacillus bulgaricus and the effects it has on the quality of yogurt. Currently, he is interested in isolating novel bacterial strains of L. bulgaricus and other lactic acid bacteria, as well as novel delivery systems and new food applications.",institutionString:"North Carolina Agricultural and Technical State University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"5",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"North Carolina Agricultural and Technical State University",institutionURL:null,country:{name:"United States of America"}}}],coeditorOne:{id:"280615",title:"Dr.",name:"Rabin",middleName:null,surname:"Gyawali",slug:"rabin-gyawali",fullName:"Rabin Gyawali",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRdDQQA0/Profile_Picture_1587473278436",biography:"Dr. Rabin Gyawali is a research scientist (microbiologist) of food science. His research focuses on various aspects of food microbiology and safety. In particular, his research interests relate to dairy science, food fermentation, probiotics and prebiotics, natural antimicrobials, food safety, and human health. To date, he has published more than twenty peer-reviewed articles and six book chapters dealing with these topics.",institutionString:"North Carolina Agricultural and Technical State University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"North Carolina Agricultural and Technical State University",institutionURL:null,country:{name:"United States of America"}}},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"13",title:"Immunology and Microbiology",slug:"immunology-and-microbiology"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"304286",firstName:"Vice",lastName:"Matušan",middleName:null,title:"Mr.",imageUrl:"https://mts.intechopen.com/storage/users/304286/images/9084_n.jpg",email:"vice@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"8174",title:"Current Issues and Challenges in the Dairy Industry",subtitle:null,isOpenForSubmission:!1,hash:"65801e53dbd318f8f50a65e32f6ffcb0",slug:"current-issues-and-challenges-in-the-dairy-industry",bookSignature:"Salam A. Ibrahim, Tahl Zimmerman and Rabin Gyawali",coverURL:"https://cdn.intechopen.com/books/images_new/8174.jpg",editedByType:"Edited by",editors:[{id:"107905",title:"Prof.",name:"Salam",surname:"Ibrahim",slug:"salam-ibrahim",fullName:"Salam Ibrahim"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2270",title:"Fourier Transform",subtitle:"Materials Analysis",isOpenForSubmission:!1,hash:"5e094b066da527193e878e160b4772af",slug:"fourier-transform-materials-analysis",bookSignature:"Salih Mohammed Salih",coverURL:"https://cdn.intechopen.com/books/images_new/2270.jpg",editedByType:"Edited by",editors:[{id:"111691",title:"Dr.Ing.",name:"Salih",surname:"Salih",slug:"salih-salih",fullName:"Salih Salih"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"62002",title:"New Flower Bed Design and Verification Supporting Horticultural Therapy Classes Based on Behavioral Observation",doi:"10.5772/intechopen.78311",slug:"new-flower-bed-design-and-verification-supporting-horticultural-therapy-classes-based-on-behavioral-",body:'\nTaiwan has become an aging society. Even though many assisted living facilities are providing care services for the elderly, most of them do not want to move into nursing homes because the perceived lifestyle at these facilities is foreign to them. “Aging in place” is a concept that first originated from Northern Europe during the 1960s. The goal at the time was to care for the elderly with resources that are native to them so they could age in an environment that is familiar to their culture, which would give them the holistic care and independence that they deserve. On the contrary, some nursing homes limit the elderly’s lifestyle choices and social functions, which may damage their mental health and self-respect resulting in deterioration of their body and mind [1]. The goal of “Aging in place” was to fulfill the native’s needs with domestic goods and services, which would require community-like facilities to build a long-term care system. Most of the assisted living facilities today in Taiwan are based on community activities to promote interaction among the elderly. Healthcare-oriented facilities should be considered more when daily activities and movements become less convenient for the elders. Japanese welfare economist [2] proposed five basic measures to ensure that the elderly live a normal life: avoid taking quarantine measures; allow them to live in an environment with which they are familiar as much as possible; facilitate their social exchanges and mutual assistance; provide facilities and services to maintain quality of life when institutionalized care becomes necessary; and integrate social welfare, medical and health, and environmental maintenance policies to create a suitable living environment.
\nSandberg indicated that 95% of the elderly in Hong Kong have one or more chronic diseases; however, only 5.5% require institutionalized care [3]. Although nursing homes can help the elderly who cannot live independently [1], institutionalized care entails a change in living environment, and consequently, disconnection from family and society as well as a reduction in physical activities and enhanced loneliness [4]. Another study found that the physical activity level of the nursing home-dwelling elderly is considerably lower than that of the community-dwelling elderly [5]. In addition to facing changes to their environment and mobility, the elderly who move into nursing homes must deal with changes in daily life routine, social network, and social support [6]. Moving into a nursing home means the discontinuation of a person’s traditional lifestyle with which they are familiar. In addition, the elderly can sustain an enormous sense of loss caused by separation from families, neighbors, and friends [1, 7]. When the elderly face gradual decline in physical and mental status, what can be done to ensure they age stably is a question that requires an answer. The American Horticultural Therapy Association (AHTA) maintained that horticultural therapy can be applied to people of various ages, backgrounds, and abilities. It defined horticultural therapy as “engaging in gardening-related activities through the assistance of a trained therapist to complete a specific therapeutic goal.” Horticultural therapy has four major types of benefits: intellectual, social, emotional, and physical [8, 9, 10, 11].
\nIntellectual benefits: Through horticultural therapy, participants can acquire new skills and knowledge, increase their vocabulary and communication skills, have their curiosity aroused, improve observation, receive occupational and pre-occupational training, receive stimulation to their sensory organs [11, 12, 13, 14], and obtain new learning opportunities [15].
\nSocial benefits: A successful treatment should involve three types of interaction: between the therapist and the client, between clients, and between the client and nonclient [16]. Generally, these interactions mainly are aimed at socializing and collaborating; specifically, sharing gardening experiences facilitates creating meaningful interactions. Because group members have a common goal, interactions among them can be increased on the basis of mutual respect and support, as well as duty sharing. During the process of gardening, patients have the opportunity to connect with people other than their group members and share their own gardening results with external parties, thereby gaining the benefit of an enlarged interpersonal network [4, 11, 17].
\nEmotional benefits: Lewis and Mattson maintained that through gardening activities, people can experience serene satisfaction in the world of plants where no threats or discriminations exist, thereby alleviating their mental stress and fear [2]. Furthermore, when patients discern that they can work independently and have their own gardens, a sense of identification and belonging to the gardens emerge in them, and their self-respect is enhanced. When patients’ confidence is elevated, their belligerent tendencies can be tempered and adjusted to socially acceptable behavioral models; in addition, their interests and passion for future life are triggered to satisfy their creative instinct [11]. Moreover, gardening activities can help patients develop an ideal self-image and continually develop work skills [12]. Because numerous factors in the living environment can affect people’s emotions, a designed and selected environment can indeed quicken patients’ emotional recovery [18, 19, 20, 21]. For example, a successful therapeutic garden can reduce people’s stress, even generating a sense of encouragement [22].
\nPhysical benefits: In addition to mental benefits, gardening activities help wounded or physically disabled individuals to improve their coordination and effectively control their motor neurons through tasks such as carrying plants, sowing seeds, applying fertilizer, and watering plants [11].
\nFor the elderly, gardening enables them to improve physical and mental health through a leisure activity. Therefore, an increasing number of the retired elderly have devoted themselves to gardening activities, and numerous elderly nursing and home care centers have introduced horticultural therapy. Research has shown that horticultural therapy can improve the elderly’s arthritis symptoms, and it exerts positive effects on blood pressure and diet control [2]. Furthermore, gardening activities can increase regular physical activities that require physical and mental stability as well as high-level functional activities [23]. Gardening practices have the clear effects of enhancing muscle strength, fine motor skills, and balance; in particular, transplanting requires grasping and releasing with the thumb and index finger as well as muscle flexibility [23, 24]. Gardening activities boost enthusiasm and senses of responsibility and achievement. From selecting plants to their growth and eventual flowering, plants continually create hope for people. Furthermore, learning gardening skills enhances the elderly’s curiosity. Therapeutic use of activity can help the geriatric individuals to improve their independence in daily life, and cognitive and motor skills [13, 21, 23]. The activity that will be used as a therapeutic agent can be determined according to the interests, activity preference, and the skills of the geriatrics [19, 25, 26]. Gardening can expand people’s social networks by providing opportunities to socialize [27]; thus, gardening activities have positive effects on the community-dwelling elderly.
\nBrown administered a 5-week horticultural therapy course to 66 older residents in nursing homes [28], and found that compared with the control group, residents in the test group exhibited significantly greater improvements before and after receiving the horticultural therapy in several items on the activities of daily living (ADL) scale, namely physical ambulation, feeding, and toilet. Austin applied a 5-week horticultural therapy course to eight elderly people who lived by themselves, the results of which revealed that their fitness, ADL scores, and 6-min walk test results all improved significantly after the intervention [29]. In addition, Son administered a 5-week horticultural therapy to five community-dwelling elderly people, and found that during vegetable-planting activities, they could use adapted tools and aids to teach the elderly to adjust to appropriate joint movement angles, balance using suitable postures, and train gross and fine motor skills, eventually improving their physical activity and self-maintenance abilities [30]. Thelander introduced a 6-week outdoor gardening intervention to eight older residents with dementia at a frequency of three times a week, for 40–70 minutes per session [31]. The results indicated that landscape maintenance tasks such as watering, weeding, and fallen leaf picking significantly improved the residents’ balance. Gigliotti and Jarrott compared the elderly participating in gardening activities with counterparts receiving conventional treatment, and found that those in the horticultural therapy group exhibited significantly higher levels of activity involvement and positive emotions [32]. Lee and Kim implemented a 4-week gardening intervention comprising selecting bean cultivars, sowing seeds, watering plants, touching the plants they had planted, cleaning and maintaining the planting environment, and harvesting, cutting, and washing the plants; their results indicated that these indoor gardening activities significantly reduced anxiety [33]. Austin determined that after receiving horticultural therapy, the elderly exhibited significantly lower levels of anxiety [29]. By touching the plants they had planted, cleaning and maintaining the planting environment, and harvesting, cutting, and cleaning the plants, the elderly were engaged in higher levels of physical activity, which in turn improved their cognitive functions [33]. In addition, Sempik, Aldridge, and Becker noted that gardening activities strengthened the elderly’s sense of responsibility and increased the opportunities for decision-making, through which their degradation could be slowed and the group became consolidated because of sharpened social skills [34]. However, gardening activities remain inadequate in the elderly’s nursing homes. Although lawns and gardens are common in nursing institutions, they are rarely designed according to user needs. SCUs in France conducted a survey from 1992 to 2007, determining that less than 82% of medical institutions had freely accessible outdoor space, and only 43% provided patients with access to this outdoor space; thus, gardens were not regarded as a part of health management. Nevertheless, compared with conventional treatments that require hospitalization, horticultural therapy is generally more accessible to patients and easier to adapt to; furthermore, the costs are cheaper than other types of therapy. Despite gardening activities being widely recognized as a positive therapy, substantial efforts are still required to popularize this therapy in public care systems. Engaging in gardening activities typically requires the elderly to bend or squat. When planting is conducted in a standing posture, people in a wheelchair have difficulty participating because square tables have limited availability. Therefore, defining design conditions that support the elderly’s participation in gardening activities is paramount. Research has shown that the first condition to be considered in horticultural equipment design is to lower the participants’ physical burden. When the elderly are allowed to engage in the activities by themselves, their opportunities for mutual communication increased; however, their exchanges and communications reduced when a facilitator joined [35]. Circle theory in the field of environmental psychology maintains that using a round table enables people to see each other. However, results of one experiment revealed that simple concentric tables could not satisfy the requirements of wheelchair users and others with diversified physical conditions [36]. Even so, designers may still experiment with other shapes that have the effect of a circle to determine which table shape facilitates the interaction of people with varying physical conditions in a variety of venues. Horticultural therapy courses stimulate emotions, boost activity levels, reduce stress and fear through human-to-plant interactions, increase muscle relaxation, and promote confidence and knowledge. These courses promote user’s sense of responsibility and self-fulfillment through plant care, which also enhances cognitive capabilities. Group activities in planting and sharing experiences create community opportunities and respect among each other. There is a connection between social participation and environment recognition of the elderly [37, 38]. Besides, there is also a strong correlation between the elderly’s ability to successfully interact with society and the quality of their facilities and surroundings. Their comfort with the surrounding environment and perception of the social interactions significantly aid their social ability [39]. Horticulture courses are crucial in planning regarding retirement and assisted-living facilities. Many studies showed mind-body health improvements among the elderly who partake in horticulture classes. However, implementing horticulture courses through assisted care and planning in these facilities are not enough. We need to consider an elder’s activity level, physical ability, and health condition in gardening classes to implement communication and activity in their curriculum.
\nThis study investigates facilities that have implemented horticulture classes in their treatment. Through interviews and behavioral observation to find out the problems and conditions associated with horticulture classes, also understand the different types of gardening, facility deployment, and gardening treatment details and execution. This study also focuses on the duration of these classes to understand the effectiveness of horticulture classes that will be helpful for future class design and planning.
\n“House of Love” is a private nursing home and a research base established in 1923, for the elderly, people with no assistance, the sick, and the homeless. “House of Love” is also awarded for excellence by the Ministry of Home Affairs and Taipei City Hall. “House of Love” is the best long-term care center in Taipei that focuses on treatment of the body and mind (Figure 1). This study implemented records of long-term behavioral observation in “House of Love” with a focus on cases who participated in these horticulture classes, the interaction between them, their problems in grading, and studies of these classes. Behavioral observation and post-occupancy evaluation were used in this study. Behavioral observation is referred to as sequential action marking; this method is a type of continuous observation-recording, and its objective is to record the relationship between time and actions. This study adopted behavioral observation to record the process of the elderly’s engagement in gardening activities. Post-occupancy evaluation was adopted to evaluate user evaluations after experiencing the design. Weaknesses in the proposed design could be determined from users’ behaviors and reactions, and corresponding design strategies could be developed.
\nPrivate nursing home “House of Love”.
This study was carried out in three sections. The first section focuses on observation of elders who participated in horticulture classes. We implemented behavioral observations in the three classes as below:
Observation of class one (control group) (Figure 2)
Class location: flower beds with sitting areas.
Elder group: the elderly with dementia and ambulatory.
Class participation: nine elders, one teacher, one social worker, and three volunteers
Observation one, class two (control group) (Figure 3)
Class location: operating area.
Elder group: the elderly in wheelchair and ambulatory.
Class participation: total of 13 elders. Nine in wheelchair and four ambulatory, one teacher, one social worker, and seven volunteers
Observation one, class three (control group) (Figure 4)
Class location: low floral display area in the back of the garden.
Elder group: the elderly on lower treatment.
Class participation: total of eight elders, one teacher, one social worker, and 10 volunteers.
Observation one, class one (control group).
Observation one, class two (control group).
Observation one, class three (control group).
The investigation was conducted using behavioral observation. The gardening course was implemented in the Garden of Fragrance in the House of Love. Classes for the control group were documented faithfully in their entirety with videos and photographs. The collected files were coded and divided into four categories: class-related objects, classroom interactions, the elderly’s upper extremity activities, and the elderly’s lower extremity activities.
\nSection 2 focuses on how we make a design proposal of gardening tools and then new design proposal will put into section three which uses behavioral observation again in another horticultural therapy class to see its effect.
\nObservation of new class (test group)
\nClass location: side exit of the main building in the plaza.
\nElder group: currently in wheelchair.
\nClass participation: five elders, one teacher, no social workers, and no volunteer.
\nThis study is based on behavioral observation and post-occupancy evaluation. We hope the result would combine gardening therapy and class design in an amicable environment for elders.
\nThe observation results indicated that classes two and three involved longer durations of activities conducted in a sitting posture. Compared with a standing posture, engaging the elderly during the classes in a sitting posture led to more satisfactory evaluations from the teacher in the postclass interviews. Both the teacher and social workers expressed that adopting a sitting posture effectively prevented the elderly from developing exhaustion or muscle pain, whereas adopting a standing posture could result in these symptoms. In addition, Figure 5 reveals considerable difference between the dominant and nondominant hand in the rate of tool use, indicating that the elderly did not use their two hands in turn for equal lengths of time. Even when engaged in bare hand operations, the elderly spent significantly longer on average operating with their dominant hand than with their nondominant hand or both hands.
\nBehavior of tool use.
There are more elders staring into space and resting behavior in class two. Even though class two has a longer duration, there is no increase in time between the interaction of plants and elders. Furthermore, elders in class two have at the highest, a 39.47% increase in time duration to observe others (Figure 6). The observation reveals that the unequal attention from instructors causes the unattended elders to look around at other elders in boredom.
\nIntensity of elder interaction in horticulture class.
The instructor in three horticulture classes pointed out that sedentary positions are more suitable for elders in gardening activities that prevent fatigue from stooping or repetitive movements. Only class two has three gardening platforms, providing more assistance during gardening. The operating platforms make it easier for elders to reach, which makes it a more suitable platform for elders to use. On the contrary, there is a high discrepancy between dominant and nondominant hand users in gardening work in class two. Moreover, observations of the three classes reveal that elders who use tools use their dominant hand 32.62% of the time more than their nondominant hand. Elders who use their bare hands use their dominant hand 17.31% of the time more than their nondominant hand. It is one point where the platform design can improve. We also know that elders more frequently use tools than bare hands to work with soil and plants based on observation. This study also focuses on the design proposals of how users place gardening tools, to give an effect of horticulture activities.
\nMoreover, staring into space and resting behavior are the highest in class two. When instructors are unavailable to attend to an elder, this elder ends up staring into space because he/she is confused about next steps. Observations in class two also reveal that instructors, volunteers, and social workers on average spend the most time assisting elders. The purpose of these horticulture classes is for elders to achieve therapeutic effect through finishing class experiments on their own. Over-guidance from instructors or volunteers could decrease the opportunity for elders to work on their own. One of the 13 elders in class two had less attendance. Finally, the flower platform from class two with nine elders in the wheelchair, compared to the fixed flower beds at the center of the plaza, is associated with higher mobility which can easily accompany with other classes. Therefore, we should consider the different physical condition of elders and use the mobile floral platform as a base, as a template for future gardening design.
\nThree most common problems occurred in gardening work among the elders during the first observation:
Bad posture: inadequate tools encourage poor posture in elders, which offsets the therapeutic benefits of the classes. The tools they used affected many postures in classes.
Lack of interaction of classes: horticulture classes stimulate interactions between the elderly and also reduce the aging of body function. Staring-into-space and resting behaviors take up a large percentage of class interaction based on our observations. Sharing and helping interactions among elders should be a critical design criterion for a flower bed.
Uneven care among elders: many staff, other than the instructor, need to focus on the situation of all elders also, which increases the burden on them. Therefore, most of these horticultural classes arrange volunteers to help. However, an oversupply of volunteers will cause uneven care among the elders, and reduce their independence to work in gardening activities. A goal of flower bed design should be taken into account the volunteer-to-elder ratio and save manpower.
Horticultural therapy courses were conducted in groups. Most flower beds available on the market could be used by multiple users. However, this study aimed to develop a flower bed featuring sufficient personal space and the ability to support multiple users, thereby enhancing a sense of exclusiveness in the users. From the starting point of user space, modularized separable designs were developed to meet the aforementioned requirements (Figure 7).
\nDevelopment of design concepts.
Eventually, a hexagonal design was adopted. A set of flower beds comprising six pieces was created and modularized. The advantage of hexagon-based modularization was that the comprising pieces could be assembled into various shapes in response to varying class requirements. During the design process, the researchers considered the possibility of future production and designed the flower beds to be self-assembly pieces for the convenience of those purchasing and using the products. Hence, all components were made from planks and tubes. To meet the requirements of various older users, the use of height of an ordinary elderly in the sitting and standing postures as well as that of the elderly in wheelchairs were considered. A 1:1 model was produced by measuring available wheelchairs on the market to obtain the most appropriate dimensions (Figure 8): 104 cm (l) × 45 cm (w) × 81 cm (h). Furthermore, the height under the table was set to 62 cm, to be compatible with the knee height of most the elderly in a sitting posture, and to allow wheelchairs to enter and exit easily.
\nFlower bed dimensions.
In a satisfactory drainage system, flower bed design should be considered. The drainage system was first placed at the center of the table; however, experimental results indicated that the drainage effect was poor. Subsequently, a pipeless drainage system was designed, in which table beams were used as water channels to guide water to be discharged through table legs. With a pipeless design, water pipes or water pot damage caused by prolonged use could be prevented, and the space under the table could be effectively minimized to allow the elderly to enter and exit more easily. The soil pot that was readily available was Model-600 sealed pot, which could be used once it was pierced along the directions of the water channels, and furthermore, it could be replaced conveniently. Previous observations have suggested that approximately 15 items should be used in each gardening course session, including hoes, shovels, potted plants, and the elderly’s personal belongings. Considering users’ need for storage, operating platforms and drawers were added to both sides of the newly designed flower bed. The operating platforms were designed to be inclined surfaces with water drainage holes to facilitate water discharge. In addition, a round hole was designed on the top to place 5–7″ potted plants or hoes and shovels. Moreover, most of the elderly would hold on to the chair or the flower bed when standing or sitting. Therefore, iron bars were installed to surround the operating platform with raised edges for the elderly to hold on to. Multiple methods of flower bed arrangement were simulated to ensure the design was compatible with multiple course requirements. In addition to facilitating teaching, the operating platform served as a display platform after class to enhance the elderly’s sense of connection with the plants they had planted. We have designed a new wooden flower bed based on all of the conditions and concerns on the sizing and interaction design factors. The flower bed is a trapezoidal desk, which allows everyone to gather around in a circle. We hope it is more convenient for the instructor to communicate with the elderly than before.
\nIn addition, top pulleys were adopted for the casters, which featured a stamp-and-press switch to stop slippage, enable the flower beds to be arranged in class, and prevent flower bed movement when the elderly hold them for support. Because horticultural therapy classes are often implemented outdoors, all flower beds were finished with wood oils that were extracted from plants and exhibited UV-resistant and water-proof features. Subsequently, simple loading and drainage tests were conducted. A sealed pot containing approximately 30 liters of water was used in the loading test, and the results indicated that the flower bed remains stable both under normal use conditions and violent shaking. Furthermore, the drainage system was proved to be effective in leading the water to drain through the framework-turned-channels under the sealed pot to the sides of table legs to be discharged.
\nThis discussion takes the new design of the flower desk into the curriculum. The test group has a total of five participants, including four women, one man, where three of them are in wheelchairs. They sit equidistant from the teacher in a circle. The five new flower desks are arranged radially, with an opening for the instructor to freely walk in and out of it.
\nIn the test group during the horticulture class, the elderly used the dominant hand 26.30% of the time, nondominant hand 17.58% and both hands 12.32% of the time (Figure 9). The test group has a much higher usage of hands in all three categories compared to the control group, especially in the nondominant hand category. The test group uses bare hands 56.21% of the class, which is much higher than the control group of 25.28%. Previous observations revealed that inappropriate flower bed dimensions can lead to a forward-leaning sitting posture. When the table top was too low, or when the elderly could not approach the flower bed with ease from their chair, they could not make effective use of the work table. However, the newly designed flower bed “Elder Green” may effectively prevent bad posture in its users. As a result, this new flower bed design stimulates both hand usage and balance in the elderly. From flipping soil to digging a hole to placing a seed to burying soil, all elders fulfilled the hand movement goals. It could be the design of “Elder Green” that allow elders to feel more intimate toward the product.
\nAverage percentage of time working with bare hands.
The total time that the test group spent using their dominant hands was 26.32% for tool use and 26.30% for bare hand operations. In contrast, time spent in the control group was 34.60% for tool use and 17.89% for bare hand operations (Figure 10). The results indicated that the elderly in the test group were involved in tool-assisted and bare hand operations more evenly. In addition, compared with the control group, the elderly in the test group had considerably higher percentages of dominant hand use and both hand use in terms of total time. Therefore, the newly designed flower bed was proved effective at enhancing the elderly’s willingness to use the nondominant hand and both hands, thereby encouraging balanced exercise in both hands and enhancing the positive effects of horticultural therapy.
\nAverage percentage of time working with tool-assisted and bare hands.
The percentage of time in the test group where the elderly spent staring into space or resting is 18.22%. It is significantly lower than that of the control group at 35.96% (Figure 11). The elders in the test group spent a lot more time on planting activities and less time being idle. We also observed that the elderly immersed in their tasks that were under only one instructor’s supervision. This means that “Elder Green” causes participants to be more interested in the whole class.
\nInteraction of the elders in class in percentage.
The control group of class two has a total of 13 participants, accompanied by nine volunteers and one teacher (Figure 12). Based on the new and unique design function of the flower bed with professional garden therapist advisory, the user base of “Elder Green” is set at five, accompanied by one instructor.
\nThe relationship between the number of instructors and elders.
The percentage of time where an elder gets verbal instruction in class is 7.19%, physical instruction is 6.46%, and the average time where instructor demonstrates for an elder is 57.4 s, 1.97% of class time (Figure 13). Compared to class two, volunteer demonstrations have decreased. Also, the elderly in the test group are much more enthusiastic about the curriculum, which reduces any distraction from other volunteers. The new design makes the elderly to get the therapeutic effect when working independently as same as the goal of horticultural classes. Implementation of “Elder Green” in the new curriculum will have positive effect on horticultural activities.
\nThe percentage of time when an elder receives care.
The attention on all the elderly residents was unequal even though there were 13 elders and 9 volunteers in the control group of class two (Figure 14). On the contrary, there is only one instructor for every five elders, the elders of test group have more even guidance and care from one instructor (Figure 15). The test group had a much better experience than the control group in increased mental stimulation and physical exercise. This reveals how the instructor-centric class mode of “Elder Green” works. “Elder Green” helps the elders with fewer instructors and volunteers, conducting a quality fulfilling class more than creating a balance of instruction to each student.
\nRelationship of class two (control group) between workers and elders.
Relationship of the test group between workers and elders.
In the test group, the elderly achieved higher amounts of exercise in a more balanced manner. The percentage of time involved in bare hand operations was higher than that spent on tool use. During the classes, the horticultural therapist encouraged the elderly to touch the soil often with their hands, and even smell the soil to increase tactile and olfactory sensory stimulation. Because the dimensions of Elder Green were more suitable for the elderly, and because it featured individual operating platforms, the elderly could engage in planting more easily, which enhanced their willingness to use bare hands. In addition to encouraging the elderly to use both hands evenly, Elder Green enabled the horticultural therapist to provide equal attention to each older adult because of its radial arrangement when in teaching mode. Moreover, the arrangement elevated the elderly’s perceived respect from others during the activities. The results indicated that idle time for the elderly in the test group decreased and mutual assistance increased. Again, this showed that higher enthusiasm in the elderly promotes the effects of horticultural therapy. Overall, this teaching style can enable institutions to provide quality gardening courses with less manpower.
\nThe horticultural therapist can stand at the center of the radial flower beds to interact with the elderly during gardening courses. This study adopted universal design; both the elderly who were wheelchair users and nonwheelchair users could sit by the side of the flower bed. The flower bed was primarily made of wood, the pattern and color of which conveyed comfort and warmth to the elderly. After completing the gardening course, the flower bed naturally became a display shelf showcasing the planting results (Figure 16). The Elder Green flower bed helped every older adult focus on the course contents. It mitigated the problem of forward-leaning sitting postures commonly observed in users of existing products by improving flower bed dimensions; moreover, even the elderly in wheelchairs could approach the flower bed at a proper distance to effectively use the work table and reach the depth of the flower bed at ease, rendering gardening activities easier. In previous observations, marked differences were observed between the percentage of time the elderly spent using their dominant hand and using their nondominant hand. However, with the Elder Green flower bed, the elderly’ physical activity conducted with both hands holding objects was substantially elevated, and they used their nondominant hand more frequently to accomplish the movements required in the class instead of simply using the same hand repetitively. Therefore, the Elder Green flower bed created more opportunities for physical activity among the elderly by effectively guiding them in spreading their strength to both hands (Figure 17).
\nDifferent type of “Elder Green” arrangements.
Actual situations of the elderly holding objects, using tools, and interactions between them and the teacher.
Observations on the bare hand operations of the elderly using Elder Green revealed notable increases in the average time of dominant hand, nondominant hand, and both hand usage compared with those observed with conventional methods. This finding indicated that the elderly became more active in bare hand operations, which enabled them to receive more comprehensive hand motor training. The individual seat attached to each Elder Green flower bed provided each participating older adult with an exclusive operating platform, enhancing their subsequent willingness to care for the plant and generating a sense of connection with the plant. In addition, this study noted that after Elder Green was introduced, the elderly were more enthusiastically involved in the tasks assigned by the teacher in class, which reduced distraction caused by boredom. Overall, the combination of a tight class tempo and concentrated movements rendered the gardening course fruitful; moreover, after Elder Green was adopted, the elderly spent more time helping each other. This indicated that the new teaching method inspired by Elder Green encourages mutual assistance and collaboration in a group of the elderly, and can adequately achieve the effects that horticultural therapy is expected to exert on the elderly. Using this method, the elderly have greater opportunities to complete gardening operations independently during horticultural therapy. Although the five elderly participants in the test group were only cared for by a horticulture teacher, the course proceeded successfully and they received relatively equal attention. This method allows organizing a quality horticultural therapy course with less manpower, and is likely to promote the willingness of related institutions to organize such courses. The flower bed of “Elder Green” allows soil depth of at least 15 cm. The height of the space under the desk is set at 62 cm which is a one-size-fits-all for elders of different heights and wheelchair users. The specification for the different basin choices are available in the market which makes future replacements easier (Figure 13). Users can arrange “Elder Green” in different forms according to the number of participants and the purpose of the horticulture class. Users also arrange flower beds in different shapes as the number of desks increase. “Elder Green” desks are mostly made out of wood. The protective wooden oil creates a warm and moist feeling when touching the wooden desk. Users can place the tools such as a hoe, shovel, plant, etc. on top of the desk or in the built-in drawer, which allows an elder to work seamlessly. Besides, an elder can use the desk of “Elder Green” as a hand-holder when sitting down or standing up for class. The installed wheel can make moving arrangements easier on the desk, and wheel lock also prevents the flower basin from shifting around.
\nThe “Elder Green” flower beds have the potential to improve in many aspects. Studies support that individuals with cancer and chronic disease also benefit from therapeutic use of activities such as gardening, which helps the individual in terms of strengthening his/her bonds with life [19, 21]. Thus, different types of wooden patterns and the color of the flower basin are examples of customization which can meet the different requirements by design. Also, how different horticultural class curriculums combined with different medical aids are worthy of investigation for the future.
\nCloud computing is vastly increasing in demand for its popularity. Cloud services deliver up to its expectations if properly maintained. Users choose cloud because the cost is affordable, is easy to access, and has a positive uptime. Unfortunately, a high number of cloud users face difficulties when issues arise such as the frightening news about data confidentiality and integrity which gets posted online all the time, and they are in darkness when such situations occur [1]. In this modern age, cloud computing has been progressively popular within the IT organizations, and we notice many institutes are moving most of their IT services towards the cloud services here in Fiji to improve their information communication technology (ICT) service delivery to the clients or stakeholders. It is important for any organization to do an appropriate background research before making decisions of upgrading for which type of cloud services they are acquiring, depending on the organization’s requirements. Many organizations prefer a private cloud infrastructure which has many advantages compared to the public cloud and hybrid cloud services; however, administrators tend to overlook that private cloud infrastructure comes with an exceptional set of challenges and risks. Cloud computing security service categories are identified and illustrated as follows:
Identity access management
Data loss prevention
Web security
Email security
Network security
Encryption
Information security
Cloud computing security keeps on changing as new technologies emerge. Services provided by the three basic cloud service models, which are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), give more outbreak to exploit such state-of-the-art models. As the cloud expands, so does its vulnerabilities [2]. It is the hosting providers or administrators duty to ensure that these vulnerabilities are kept on patching up as new threats arise. One must always be on the look for any threats coming their way towards the cloud servers. If such threats enter the cloud, it could be devastating for the cloud hosting providers and even the cloud servers itself. We as human beings need to keep in mind that a person who wants to get the data for their benefit or even for fun purposes [3] creates those threats. There are certain software programmed and integrated to the cloud server to automatically mitigate a certain level of threat, and an example is a web application firewall (Barracuda).
\nStated in the research paper regarding a study on security model in cloud computing, we vastly agree to the statements stated such as the security being a real-time obstacle of the everlasting picture and foundation of cloud computing [4]. Furthermore, this research will now move towards focusing on the security aspect and its services shown by cloud computing itself as keeping in mind the increasing need for security in the cloud as we see a new day moving forward in our daily lives.
\nThis paper starts with cloud identity access management as the first level of cloud computing security service that we identified based on various researches conducted. Whenever a user has established the connection to the cloud, the user will need to login and access the cloud resources in order to drive forward the idea of hosting applications, websites or even doing online sales securely through a secure login tunnel. This has to be fully done by successful authentication and authorization to avoid loss of data and identity being manipulated which could lead to unwanted access to the cloud system [5].
\nThe need to have identified information in this case, which related to identity access management itself, first needs to be synchronized so that there are no conflicts when identifying the cloud user [6]. One needs to keep in mind there are many users who have the same name although their username can differentiate the users and their level of access. For user information to be synced properly, the old user data will need to be checked if there are any, which were used previously, and it should not match with the new data. Such scenarios occur when a user cancels their online subscription to a cloud host provider and comes back after a few years wanting to again host their applications on the cloud [7]. This reflects on mostly public clouds. This can also be hinted at a private cloud when the administrator permanently deletes the user’s data, which in this case is the user’s login and registration details to focus on. A hacker can pose as a new user and easily gain access to the cloud system if he/she is able to manipulate the registration and other details. This can happen when the administrator is adding a new identity to the system, and if the administrator is not careful, the system does not identify old data. This will lead to an identity within the cloud system that will gain access to certain module level-based information because the identity has not been synced and verified with real time updates [8]. Another issue could be confidentiality, which focuses only on authorized access to cloud data; an authentication that is related to checking of the received data to be from a legit source and integrity, which relates to only authorized party, should be allowed to modify data in the cloud [9].
\nBuilding trust in cloud computing services may help prevent data loss to some extent, but it does not guarantee it. The cloud server needs to be equipped with state-of-the-art hardware and software in order to prevent such issue. This service protects data from being lost based on the rules deployed on cloud servers. Data can be lost in various ways such as the hacker sends a malicious file, which infects the cloud server and deleting the files and folders [10].
\nData storage repository must be secured enough to handle such attacks although the level of attacks varies from high to low and each attack is to be considered no matter which level that threat is. Suppose a low level of threat occurs in the cloud server where that data is stored and the administrator does not take any action to fix the issue or just ignores it thinking that it is a small issue, it could multiply and do its job on the storage server leading to data loss [11].
\nSecuring the storage in the cloud is very important where the storage or based in geographical location or not, but at the end of the day, the storage repository is linked to a network and that is enough information for an advanced hacker to easily delete the data by entering into the system from just a small script which will eventually grow to a virus or Trojan to inflict the damage.
\nIf the administrators are not monitoring such scenarios, that virus can do the damage to the storage server. In such cases, it may send a lot of traffic request to the storage server, and this can result in overload. Such case is mostly described as denial of service attacks. With DoS attacks, the server will notice a change in traffic load coming in, and if there are no intelligent applications installed in the server to mitigate, there could be serious implications. These attacks can corrupt data, delete data, and data loss. This is a common issue faced by a lot of users, which ultimately will become the administrator’s responsibility.
\nWe noticed a virus spread across the globe called WannaCry, which is a ransomware virus where it locks down your computer system and asks for money in order to unlock the affected system. This type of attacks can lead to data loss as well. Supposedly, this threat can affect the data stored in the cloud server, which is definitely huge on a threat level. Microsoft had to realize patches for their operating systems in order to prevent such attacks. This results in a lot of distress around the globe and was one of most talked about attacks. It not only inflicts damage to the affected system, but it also has the ability to destroy the data itself, which is stored in any system [9]. One must be very careful of such attacks if not then data loss is inevitable. Such attacks are a wake-up call for cloud system, which does not have any type of data loss prevention techniques implemented, and if such techniques are implemented, then the administration must map out ways to block or to prevent data being lost. Therefore, security rules need to be in place to avoid customers from being frustrated with one of the major issues, which are data loss [4].
\nWeb security plays a vital role as well in clouds. While the servers are hosted in clouds, websites and applications are also hosted in it which combines the functionality to work with cloud resources and deliver as expected to customers. Protection against virus and malware nowadays is very common as new types of such threats emerge almost every day. In cloud, all folders are synchronized at all times as the user updates their data. What could happen is that if a malware enters the cloud and data sync is taking place, the malware gets synched together, spreading around with the configured account, which is the source in which the malware entered into the system [11].
\nHosting service providers for cloud-based will need to get a good web application firewall (WAF), which can prevent attacks to web servers and applications. Traffic going in and out of the web server needs to pass through WAF in order to check for malicious responses [12].
\nAs proposed in the paper by Fernandez et al [13], web application scanner and a cloud-based web application firewall can be used to identify vulnerabilities and scan for sensitive data [13]. This type of scanner is very useful in a cloud computing environment. The cloud-based web application firewall will also be integrated with the scanner. The first step will be the scanning process followed by filtering unwanted request, keeping in mind that these unwanted requests are the virus and attacks coming into the system. In their paper, they have also stated that the firewall can control the web application communication via HTTP based on the rules for authorizing and with the main purpose for it to stop SQL injection, XSS, and other types of similar attacks on the cloud servers [12]. What our research has looked into is one of the WAF available for purchase called Barracuda. This application is very useful as it generates a whole lot of data that is not required for processing based on the traffic flow in which the attackers can come in and out of the system. This application has the ability to scan, put cloud applications and websites behind a state-of-the-art firewall system, and monitor traffic to name some of its core functionalities. When we look at a WAF system for cloud, we must have reports generated in order to do research that is more thorough from where the particular attack is coming from and how these attacks can be mitigated. The WAF provides a solution to every attack or vulnerability that is present in the generated report as well. This firewall will be able to stop unwanted traffic into the system, keep the cloud servers safe, and transfer those IP addresses that are suspicious to the suspicious list from the whitelist causing it to be classified as a threat [14]. The users can do online banking securely and other tasks that they would prefer to be done under a secure application layer.
\nEmail security is being implemented in clouds as well. It has major advantages. Any inbound and outbound emails will need to go through email security protocols to ensure that the user sending and receiving the email does not contain any type of malicious data, which can affect the customers’ online activity in any way. This could also lead to having a bad impact on web servers as well if proper security protocols are not in place to filter malicious emails. Cases of security policies need to be implemented in order to run the workflow of emails and filtering unwanted emails [15].
\nAs outlined in the paper published as from Barracuda itself, using such application will not limit the functionalities of email security being deployed in the cloud servers. Some things to notice about the paper is that they have outlined the suit for the cloud services with the following combinations for the advanced package, multilayer security which extends the protection for the email also being integrated with Office 365 which is currently being well-known for its cooperative feature for an organization provided by Microsoft. Multilayer security is one of the core features that the email security giant company looks in depth, for the application itself is being a guard against threats arising from emails, data loss protection through spam emails, data being leaked with encryption, and all the email contents being inspected. Another advanced feature that they explained in their paper was cloud-based archiving. This feature is very important, and emails need to be archived frequently for an organization. Such feature in the cloud will enable users to retrieve any previous email at any time from any device, and this can be from any cloud environment whether it being the hybrid cloud-based environment, Microsoft 365, Microsoft Exchange, and even any other types of email service being used on-premise. They also mentioned retrieving emails such as cloud-based backup and recovery features. This feature will allow the administrators to retrieve any email from the frequent backup storage and send it to the live server so that the user requesting for the email can view and retrieve their contents for that particular email [16].
\nAccording to Rawezh Tara and Nashwans’ paper based on private cloud and implementation of software, routing in it identifies the use of virtual private network (VPN), which enables the ability to ensure that the user who is logged into the cloud service can do their online transactions without any issues. The attackers will not be able to judge where or how the data is being transferred to. This creates a secure environment for customers doing online shopping or banking. It is a good practice to provide VPN to users who are already logged into cloud service. Each user will have a VPN client profile. Using this they can establish the VPN connection, and a secure tunnel is enabled, and authentication is being done on the data center firewall end [17].
\nOnly two types of users use VPN tunnel, which will be the employees and the cloud administrator. The VPN tunnel works as the employee will establish a secure connection through a VPN tunnel; the employee will then login to the VPN client profile using username and password. The authentication is verified with the security policies and the data center. Once the connection is successful, the remote client is connected to the cloud and is ready to utilize the resources and services offered by the application itself. The login of the user will fail if the user is not a valid user, which is checked in the system mainly through the active directory [18]. This type of secure login is highly desirable and is present in the Barracuda application, which was also tested while carrying out this research. It not only protects the user’s data, but the users who login into the system through VPN tunnel can be rest assured that they can perform their task without anyone capturing their information.
\nEncryptions ensure that the data, which are available in the cloud, is secure. Although there are many types of encryption techniques available, attribute-based encryption will provide favorable results. This provides access control with a private key, master key, and ciphers text [19].
\nFurthermore, as proposed a clear explanation of encryption by Rohit, Rituparna, Nabendu, and Sugata research paper based on security issues in cloud computing, they outline the very important aspect of how the encryption can occur in a cloud-based environment. The argument raised is that that data that is stored in the cloud is secure enough towards any type of security breach. They come up with utilizing homomorphed token, which can help secure data through encrypting by private and public keys, respectively. The trust-based methods for the cloud environment are very valuable towards secure private and public key exchange over a secure seamless synchronized connection. Moving on to further discuss encryption supposedly if data is not encrypted, spoofing attacks can take place. Such attacks can be checked by performing user authentication based on key exchange and even encryption techniques [20]. By enabling encryption sessions with filtering at the entrance of traffic management, such attacks can be avoided. Encryption plays a very important part in securing the cloud services with its unique ability to transform the data into cipher which makes the attackers difficult or almost impossible to alter the data.
\nInformation security relates to gathering the alerts which come about the cloud service monitoring tools. Logs get created for the events. Being a central point, cloud computing is able to handle the information stored and how it gets altered by malicious activity which leads to a crisis situation. If an alert gets ignored, it becomes a golden opportunity for attackers to exploit the cloud services and can access the data of customers. If such a case does happen, the admin must take immediate actions and retrieve data backups. Cloud computing can aid in the seamless transfer of the information to a backup server which will store the information of all the customers. Cloud IaaS is a possible direction of data backup in which data needs to be firmly protected as it should be a specialized cloud-based backup server [21].
\nIntrusion management looks after the packets coming in and going out of the network. It has got a set of predefined rules which can handle a particular event. A cloud service provider needs to have an intrusion management tool such as anomaly detection. This type of detection system trains itself by observing network behaviors. It identifies the class level for the intrusion whether normal or intrusion, based on the network packets. If an intrusion is found, it should send a warning to the alert or information security system for further action [22]. Hadoop is an open source software, which is becoming popular with cloud administrators. Hadoop is used to distribute processing of big data using MapReduce. MapReduce is a model which can perform analysis very quickly to locate the malicious activity and the area in which the attack occurs [23].
\nDisaster management in collaboration with disaster recovery relates to cloud data storage in its servers. One must be prepared for it; thus, disaster rescue management can be put in place by the hosting providers in the cloud servers. Attackers can disrupt services by sending malicious requests to the server if there are no strong security policies placed, and they can create downtime of the server as the servers can get overloaded through it. For natural disasters, cloud hosting providers can place their data centers at geographical locations so that if one center gets affected, another will pick up and prevent downtime of services [24].
\nLooking at an infrastructure point of view, we picked Veeam, a software product developed by Veeam organization itself to replicate, backup, and restore data on virtual machines. It has a lot of capabilities as it pools together one of the leading backup services for a cloud infrastructure. Having the ability to replicate with advanced monitoring, reporting tools, and capacity planning functionality, Veeam is highly desirable to be used for a disaster management tool.
\nBased on the research ideas provided, we have used qualitative research method, and the theory we have decided to use is as follows. A local user agent is created by the user to establish a temporary security certificate for safe authentication over a given period of time. This certificate will contain the username, user id, security features, hostname, session times, and other relevant features. Once this is done, the authorization for the user is finalized. As the user will start to use the resources on the cloud, mutual authentication will initiate between the cloud application and user. The application will check if the certificate is valid for the user, a security policy is applied to it. As per the requirements stated by the user, the application will create a list of service resources which will send it to the user. Finally, through an application programming interface (API) security used by the application, the user’s session will be fully initiated and connect to cloud services [4, 13].
\n\nFigure 1 describes the method for secure connection with a trusted certificate in a cloud environment and describes its successful implementation as well as usage of cloud resources.
\nModel for secure connection with a trusted certificate in a cloud environment.
Some of the research questions we have identified are as follows:
Which security protocols you have placed in your cloud architecture to ensure a seamless connection between users does not result in online data theft?
In case an attack on the cloud service occurs, how will the server mitigate those attacks?
Is there a disaster recovery management tool in place for the cloud servers? If so then what procedures will be followed to ensure that there is little or no downtime?
Are the cloud services running behind a trusted firewall? If yes, then how does the firewall report incidents as logs to the administrators and is the firewall artificially intelligent enough to challenge such difficulties?
Our research came up with some cost analysis based on cloud infrastructure. The below details were developed for a cloud-based premise comparing both private and public cloud. Shown below is the cost for Azure sizing based on the requirements; the cost is higher than the private cloud infrastructure with much higher requirements (Figure 2).
\nCost analysis with Azure vs. private cloud infrastructure based on resource requirement.
Shown below is virtual storage area network for a hyper-converged solution which is the most popular infrastructure technology in the current market according to Gartner report. This is very helpful for cloud-based organization to grow as it exceedingly with a lot of resources available for use in the cloud deployment models itself (Figure 3).
\nVirtual storage area network for a hyper-converged solution.
The screenshot shown below shows the virtual machine on a cloud premise. When a user wants to purchase a virtual machine, the cost related to the resources requested will be shown on the cloud interface and can be upgraded as well when one wants to deploy a virtual machine in their cloud (Figures 4 and 5).
\nBilling and purchase interface when requesting a virtual machine in a cloud-based environment.
Costing for a cloud infrastructure with a disaster recovery package.
The focus of this research is on distributed denial of service (DDoS) attacks on the cloud. The authors researched on existing cloud security solutions and also present an implementable solution focusing on DDoS mitigation for IT infrastructure. The authors define the scope and recommend few focus areas:
Defending volumetric attacks is a need for cloud components.
Blocking application-level attacks without submitting SSL Key.
Deploying acceptable network infrastructure as per IT security policy.
DDoS attack mitigation solutions are discussed here based on design perspective:
a. On-premise based: Having a devoted on-premise DDoS attack mitigation answer are first-rate desirable for government entities, financial establishments, and healthcare but not beneficial for all. When the highest stage of safety is mandatory and organizations opt to give as little visibility into their customer facts or approximately their encryption certificate to as few third birthday celebration providers, this could be regarded as a limited scope option. On-premise DDoS devices might store encryption certificates and inspect visitors regionally without any scrubbing, redirection, or inspection. The mitigation device would be required to guard against numerous DDoS vectors like flooding (UDP/ICMP, SYN), SSL based, application layer (HTTP GET/POST), or low and slow attacks. With mitigation structures in house, the proximity to facts center sources is useful, and the systems may be fine-tuned at once by the in-residence IT teams. They have a tendency to have a miles more cognizance to their setup for any adjustments in site visitor flows or from the application servers. Thus, they might have a tendency to have a higher chance of detecting any suspicious traits or visitors requests.
b. Cloud-based security services: In providing anti-DDoS and superior mitigation protection in shape of managed security services, many cloud carrier companies offer protection from community floods with the aid of deploying mitigation system on the ISP network edge stage or with scrubbing centers. This involves traffic diversion from the corporation network to detection or scrubbing center. When a DDoS attack starts, human intervention is needed and takes as a minimum of 15–30 minutes all through which the online services are left unprotected and exposed. The cloud-based totally DDoS mitigation service guarantees quantity blocking off of community flood assaults from accomplishing the corporation edge devices or flooding the WAN circuit which is free of volumetric community flood attack. However, there exist glaring problems with a cloud primarily based on DDoS mitigation offerings.
Cannot discover and block application layer attacks and slow attack.
Unable to defend stateful infrastructure structures like firewalls or IPS.
Unable to deal with attacks like software layer attack, state exhaustion, and multi-vector attacks.
c. Hybrid cloud-based security: Using hybrid cloud functions gives the best-of-breed mitigation option, where the hybrid infrastructure combines the on-premise in-house setup with DDoS mitigation carriers to act as an included mitigation solution. In hybrid solutions, another option is to use a devoted DDoS mitigation provider’s capability in order to detect and block a couple of DDoS vectors. Having public cloud issuer dynamically booms the community pipe bandwidth for the duration of a DDoS attack; takes off a while after being detected, till the time mitigation begins; and saves the on-premise infrastructure from the attack and affecting the provision of its online services. Typical answer is in the course of DDoS attack; the entire site visitors are diverted to a DDoS mitigation issuer’s cloud, where it is scanned, scrubbed with the attack visitors getting diagnosed, and removed before being re-routed lower back to the in-residence information middle of the enterprise. Hybrid solutions permits organizations to gain from the following:
Widest security coverage that can simplest be finished by means of combining on-premise and cloud insurance.
Shortest reaction time by using an on-premise solution that begins right away and mechanically to mitigate the assault.
Single touch point during an attack both for on-premise and cloud mitigation.
Scalability—each tier is impartial of the other and can scale horizontally, in case there is a web application attack spike, adding extra WAF devices to ensure enough WAF capability may be done within the application defense tier without affecting the community tier.
Performance—on the grounds that requests come in tiers, network utilization is minimized, and load decreased overall.
Availability—with hybrid solutions, if the first or second tier is down, at least there is one tier left to serve consumer requests. This satisfies the BCP of the organisation.
Vendor independence—community and application protection infrastructure can setup the usage of hardware structures or even specific software program versions.
Policy independence—while new policies are implemented at the application defense tier, the opposite tier directs simplest that specific visitors in the direction of the rules until they are established and ready for production use.
Based on the developing threats and effect of attacks, company firms having their very own cloud services as well as cloud providers put into effect DDoS mitigation using hybrid cloud architecture. When there are multi-vector DDoS attacks targeted at layers 3, 4, and 7, mitigation strategies are essential. These mitigation strategies assist in detecting and preventing volumetric, software, and encrypted assault vectors. By making use of public cloud capabilities to cover for scalability taking on floods and appearing because the first point of defense with community and web application firewalls detecting assault visitors and mitigating the DDoS threats and the SaaS utility, web portals and backend database resides stable in the residence private statistics center. For this research, the experimental environment involved community infrastructure architectures being designed and setup to testing the proposed DDoS solution having the following hardware and software:
Cisco 4000 ISR Series Routers and Cisco Nexus 5000 Series Switch for routing and switching
Big IP LTM-4200 for high-performance application traffic load management
Cisco Firepower FPR-2110, Imperva Web Application Firewall Gateway with Manager Console
HP DL-360G8 1U-Rackmount with Intel E5, 128 GB DDR3, 32 TB SSD Servers
VMware NSX-T 3.0 virtualization software on bare-metal HP Server
SaaS Application running Windows Server 20012 64-bit OS
Front End Web Portal with .NET supporting 2-Factor authentication
Back End Database running Microsoft SLQ Datacenter license on Windows 2012 OS
DDoS Tools for attack simulation: LOIC or Low Orbit Ion Canon, HOIC or High Orbit Ion Canon, Packet Storm (HTTP Unbearable Load King), Are You Dead Yet (R.U.D.Y), Motoma IO’s PyLoris, Slowloris and TOR’s Hammer
The networks were tested by community and alertness layer attacks with the use of ICMP flooding with a thousand echo requests with increasing buffer size from 3700 to 3805 bytes. The use of DDoS attacks such as LOIC, R.U.D.Y, and slowloris that simulated attacks denied valid users to get admission to the web software portal. When performing the simulated DDoS assaults, the real user monitoring records are taken as the standards, and parameters have been amassed for the logs to assist generated graphs for DDoS attacks. These parameters had been chosen due to the fact that they decide what performance problems the real users are experiencing on the site for the time being in actual time during an assault.
\n\n
Average ICMP latency (milliseconds) before and during the course of DDoS attacks on the apps
Page load response that refers to time the app pages take to load and figuring out where exactly the time is spent from the time a user logs authenticates and logs in to until the page has loaded completely
App response relates to the percentage time for a page load process to complete
Status codes are gathered from the HTTP reputation codes the web server makes use of to communicate with the web browser or person agent
The first framework was structured and implemented in the form of a single inbound and exit gateway. This mimicked the single-tiered level system including standard system design, directing the interfacing with an online interface containing the front end and back end. This simulated the standard cloud-based condition having a basic standard system configuration actualized in a server farm with hardware devices mentioned in the setup environment above (Figure 6).
\nTraditional architecture design (single-tier).
Using the standard design, single-tiered architecture, multi-vector DDoS attacks were executed as network floods and volumetric and application layer 7 attacks. These critically overloaded and degraded the computing systems leading to access issues for legitimate users. Logs and data gathered for each attack are displayed below for reference (Figures 7–9).
\nSingle-tier DDoS attack logs.
Single-tier attack results.
Single-tier results (with and without network security).
The second infrastructure was designed as per the proposed design having three unique tiered designs. Each tier has different IP address schemes and communicates with others via site-to-site VPN. This design simulated public and private cloud integration. The first two tiers focused only on security protection against network and application layer attacks. The third tier only focused on access to the hosted SaaS application with database backend:
The first Tier is built around layers 3 and 4 network defense system for IP and TCP defense using hardware firewalls and load balancer. This tier mitigates ICMP (Ping), UDP, or SYN flood attacks.
The second Tier provides layer 7 application defense using web application firewalls and customized load balancing rules along with SSL termination. This tier mitigated ARP spoofing, POST Flood, and DNS poisoning and detected malwares from inbound user traffic.
Once both network and application attacks are cleaned from the traffic, only legitimate user traffic remained. This traffic is directed to access the private tier cloud (or the third tier), hosting only the SaaS Web portal. After processing and completing the work, user traffic is again reverted to tier 2 for exit instead of tier 1 and following the same traffic route back to the user. This form of asynchronous routing ensures the attackers are not able to execute denial of service attacks that always have the condition of user traffic having the same inbound and outbound gateway and traffic routes (Figure 10).
Proposed three-tier architecture.
DDoS assaults were performed at first on the single-level system plan and our proposed three-level system structure and assembled result that demonstrate our proposed half-breed cloud configuration having the main level for accepting inbound traffic from clients and aggressors with layers 3 and 4 gadgets and performing system assault alleviation, utilizing a system firewall blocking ICMP floods. The inbound traffic was then permitted to stream to the second level which alleviated application-level assaults utilizing a WAF. Here utilizing F5 and Cisco gadgets intelligently, we had the option to square 80% of the assaults. This was assembled subsequent to contrasting the assault information and single-level system arrangement. The three-level system configuration is executed in a test server farm with Cisco and F5 arrange gadgets for steering, VPN, and exchanging. We utilized VMware and Microsoft operating system servers with a SQL server as backend database to mimic cloud-based SaaS applications. DDoS assault reproductions were performed on the three-level engineering to check the patterns for system and application-level outcomes after the assaults. ICMP flooding was performed with 1000 reverberation demands each with expanding support size (3600–3800 bytes) with each assault. They made the objective server to react and process the ICMP demands, taking cost of CPU assets and at last square substantial solicitations. Application-level assaults were finished utilizing HTTP Flood GET assault with expanding string check and 1200 reverberation demands utilizing “GET/application/?id=479673msg=BOOM%2520HEADSHOT! HTTP/1.1Host: IP” and moderate attachment development mimicking moderate HTTP assault utilizing perl with logs taken from Wireshark.
\nDevice logs gathered for each attack are illustrated in Figure 11.
\nThree-tier logs (network attack).
DDoS attacks were performed on single-tier and the proposed three-tier infrastructure architecture and results gathered for real user monitoring parameters during the network attacks (Figure 12).
\nNetwork and web defense trends.
The below data and graphs illustrate the network firewall and application layer logs and graphs for the DDoS attack performed on single-tier data center architecture in order to determine the resilience for handling DDoS attacks. In Figure 13 network firewall defense is implemented after attack#2 with ICMP, page load, browser throughput, and application response as the key values.
\nSingle-tier attack parameters.
\nFigure 14 illustrates real user monitoring values obtained during an application layer attack on single-tier network infrastructure in which application firewall defense is implemented after attack#2 with ICMP, page load, browser throughput, and application response key values.
\nSingle-tier application attack logs.
Results of single-tier architecture attacks obtained before and during the DDoS attack are presented in Figure 15. This has the average ICMP, browser throughput, page load response, and application server response.
\nSingle-tier network attack parameters.
DDoS attacks are performed on the designed network architectures and network and application attack results obtained before and after attack scenarios. Network attacks like ICMP flood are done with 1000 ICMP echo requests with each increasing the attack buffer size from 3700 to 3805 bytes. Application attack like HTTP Flood attack is done by increasing the thread count by “GET /app/?id = 437793 msg = BOOM%2520HEADSHOT! HTTP/1.1 Host: IP” and slow socket buildup simulating slow web attacks by the use of perl. The logs and Data gathered are gathered from the network firewall; for each attack is displayed in Figure 16.
\nThree-tier attack logs.
Results of three-tier architecture attacks obtained before and during the DDoS attack are presented in Figure 17. This has the average ICMP, browser throughput, page load response, and application server response.
\nThree-tier architecture attack parameter results.
The graph in Figure 18 presents the results of three-tier architecture attacks obtained before and during DDoS attack for ICMP response.
\nReal user monitoring for ICMP (single- and three-tier).
Results of three-tier architecture attacks obtained before and during DDoS attack for page load response is presented in Figure 19.
\nReal user monitoring for page load response (single- and three-tier).
Results of three-tier architecture attacks obtained before and during DDoS attack for browser throughput are presented in Figure 20.
\nReal user monitoring for browser throughput (single- and three-tier).
Results of three-tier architecture attacks obtained before and during DDoS attack for application server response is presented in Figure 21.
\nReal user monitoring for application server responses.
The below graph displays the availability trend metrics obtained after performing the DoS attacks on the two architectures for network and application layer design (Figure 22).
\nSaaS availability monitor.
After analyzing the infrastructure, we now focus on what the cloud infrastructure has to offer for implementation (Figures 23–25).
Firewall → Prevent threats entering the network from outside.
Active directory → Authentication, authorization, and group policies for access management.
Web application firewall → Protects web servers and manages the incoming and outgoing requests.
Web Security Gateway → Web proxy filters manage and monitor websites visited by users in network.
Email security → Scans, monitors, and protects emails incoming and outgoing.
Populated report for file server access activity on cloud-based premises.
Threats blocked based on the requests coming into the cloud system.
Logs displaying the threat level with its warning on a cloud-based setup.
Web application firewall (WAF) prevents DDoS attack including SQL injection and XSS attacks to name a few. This is integrated with the implementation as shown in Figure 26.
\nShows how an attack gets categorized in the WAF.
According to our findings and our recommendations having a private cloud, setup is best suited for the larger organizations due to the limitations of going on public cloud infrastructure in terms of bandwidth, data confidentiality, cost of Internet, and cost of its recommended with requirements for infrastructure itself on a public cloud. Setting up a private cloud helps organizations to mitigate risk with confidence and keep 100% control changes to the platform. However, not forgetting the security risks associated with a private cloud infrastructure in areas such as web application firewalls, web security gateways, main gateway firewall, end point security protection, etc., it is essential to have these security appliances implemented with the infrastructure to maintain and protect the cloud environment from outside threats.
\nGeneral requirements for Open Access to Horizon 2020 research project outputs are found within Guidelines on Open Access to Scientific Publication and Research Data in Horizon 2020. The guidelines, in their simplest form, state that if you are a Horizon 2020 recipient, you must ensure open access to your scientific publications by enabling them to be downloaded, printed and read online. Additionally, said publications must be peer reviewed.
',metaTitle:"Horizon 2020 Compliance",metaDescription:"General requirements for Open Access to Horizon 2020 research project outputs are found within Guidelines on Open Access to Scientific Publication and Research Data in Horizon 2020. The guidelines, in their simplest form, state that if you are a Horizon 2020 recipient, you must ensure open access to your scientific publications by enabling them to be downloaded, printed and read online. Additionally, said publications must be peer reviewed. ",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"Publishing with IntechOpen means that your scientific publications already meet these basic requirements. It also means that through our utilization of open licensing, our publications are also able to be copied, shared, searched, linked, crawled, and mined for text and data, optimizing our authors' compliance as suggested by the European Commission.
\\n\\nMetadata for all publications is also automatically deposited in IntechOpen's OAI repository, making them available through the Open Access Infrastructure for Research in Europe's (OpenAIRE) search interface further establishing our compliance.
\\n\\nIn other words, publishing with IntechOpen guarantees compliance.
\\n\\nRead more about Open Access in Horizon 2020 here.
\\n\\nWhich scientific publication to choose?
\\n\\nWhen choosing a publication, Horizon 2020 grant recipients are encouraged to provide open access to various types of scientific publications including monographs, edited books and conference proceedings.
\\n\\nIntechOpen publishes all of the aforementioned formats in compliance with the requirements and criteria established by the European Commission for the Horizon 2020 Program.
\\n\\nAuthors requiring additional information are welcome to send their inquiries to funders@intechopen.com
\\n"}]'},components:[{type:"htmlEditorComponent",content:'Publishing with IntechOpen means that your scientific publications already meet these basic requirements. It also means that through our utilization of open licensing, our publications are also able to be copied, shared, searched, linked, crawled, and mined for text and data, optimizing our authors' compliance as suggested by the European Commission.
\n\nMetadata for all publications is also automatically deposited in IntechOpen's OAI repository, making them available through the Open Access Infrastructure for Research in Europe's (OpenAIRE) search interface further establishing our compliance.
\n\nIn other words, publishing with IntechOpen guarantees compliance.
\n\nRead more about Open Access in Horizon 2020 here.
\n\nWhich scientific publication to choose?
\n\nWhen choosing a publication, Horizon 2020 grant recipients are encouraged to provide open access to various types of scientific publications including monographs, edited books and conference proceedings.
\n\nIntechOpen publishes all of the aforementioned formats in compliance with the requirements and criteria established by the European Commission for the Horizon 2020 Program.
\n\nAuthors requiring additional information are welcome to send their inquiries to funders@intechopen.com
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5766},{group:"region",caption:"Middle and South America",value:2,count:5228},{group:"region",caption:"Africa",value:3,count:1717},{group:"region",caption:"Asia",value:4,count:10370},{group:"region",caption:"Australia and Oceania",value:5,count:897},{group:"region",caption:"Europe",value:6,count:15791}],offset:12,limit:12,total:118192},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{hasNoEditors:"0",sort:"ebgfFaeGuveeFgfcChcyvfu"},books:[],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:16},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:4},{group:"topic",caption:"Business, Management and Economics",value:7,count:2},{group:"topic",caption:"Chemistry",value:8,count:8},{group:"topic",caption:"Computer and Information Science",value:9,count:6},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:7},{group:"topic",caption:"Engineering",value:11,count:19},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:3},{group:"topic",caption:"Materials Science",value:14,count:5},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:24},{group:"topic",caption:"Neuroscience",value:18,count:2},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:3},{group:"topic",caption:"Physics",value:20,count:3},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Robotics",value:22,count:1},{group:"topic",caption:"Social Sciences",value:23,count:3},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:1}],offset:0,limit:12,total:null},popularBooks:{featuredBooks:[{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8558",title:"Aerodynamics",subtitle:null,isOpenForSubmission:!1,hash:"db7263fc198dfb539073ba0260a7f1aa",slug:"aerodynamics",bookSignature:"Mofid Gorji-Bandpy and Aly-Mousaad Aly",coverURL:"https://cdn.intechopen.com/books/images_new/8558.jpg",editors:[{id:"35542",title:"Prof.",name:"Mofid",middleName:null,surname:"Gorji-Bandpy",slug:"mofid-gorji-bandpy",fullName:"Mofid Gorji-Bandpy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7847",title:"Medical Toxicology",subtitle:null,isOpenForSubmission:!1,hash:"db9b65bea093de17a0855a1b27046247",slug:"medical-toxicology",bookSignature:"Pınar Erkekoglu and Tomohisa Ogawa",coverURL:"https://cdn.intechopen.com/books/images_new/7847.jpg",editors:[{id:"109978",title:"Prof.",name:"Pınar",middleName:null,surname:"Erkekoglu",slug:"pinar-erkekoglu",fullName:"Pınar Erkekoglu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:5240},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"9243",title:"Coastal Environments",subtitle:null,isOpenForSubmission:!1,hash:"8e05e5f631e935eef366980f2e28295d",slug:"coastal-environments",bookSignature:"Yuanzhi Zhang and X. San Liang",coverURL:"https://cdn.intechopen.com/books/images_new/9243.jpg",editedByType:"Edited by",editors:[{id:"77597",title:"Prof.",name:"Yuanzhi",middleName:null,surname:"Zhang",slug:"yuanzhi-zhang",fullName:"Yuanzhi Zhang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10020",title:"Operations Management",subtitle:"Emerging Trend in the Digital Era",isOpenForSubmission:!1,hash:"526f0dbdc7e4d85b82ce8383ab894b4c",slug:"operations-management-emerging-trend-in-the-digital-era",bookSignature:"Antonella Petrillo, Fabio De Felice, Germano Lambert-Torres and Erik Bonaldi",coverURL:"https://cdn.intechopen.com/books/images_new/10020.jpg",editedByType:"Edited by",editors:[{id:"181603",title:"Dr.",name:"Antonella",middleName:null,surname:"Petrillo",slug:"antonella-petrillo",fullName:"Antonella Petrillo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9521",title:"Antimicrobial Resistance",subtitle:"A One Health Perspective",isOpenForSubmission:!1,hash:"30949e78832e1afba5606634b52056ab",slug:"antimicrobial-resistance-a-one-health-perspective",bookSignature:"Mihai Mareș, Swee Hua Erin Lim, Kok-Song Lai and Romeo-Teodor Cristina",coverURL:"https://cdn.intechopen.com/books/images_new/9521.jpg",editedByType:"Edited by",editors:[{id:"88785",title:"Prof.",name:"Mihai",middleName:null,surname:"Mares",slug:"mihai-mares",fullName:"Mihai Mares"}],equalEditorOne:{id:"190224",title:"Dr.",name:"Swee Hua Erin",middleName:null,surname:"Lim",slug:"swee-hua-erin-lim",fullName:"Swee Hua Erin Lim",profilePictureURL:"https://mts.intechopen.com/storage/users/190224/images/system/190224.png",biography:"Dr. Erin Lim is presently working as an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates and is affiliated as an Associate Professor to Perdana University-Royal College of Surgeons in Ireland, Selangor, Malaysia. She obtained her Ph.D. from Universiti Putra Malaysia in 2010 with a National Science Fellowship awarded from the Ministry of Science, Technology and Innovation Malaysia and has been actively involved in research ever since. Her main research interests include analysis of carriage and transmission of multidrug resistant bacteria in non-conventional settings, besides an interest in natural products for antimicrobial testing. She is heavily involved in the elucidation of mechanisms of reversal of resistance in bacteria in addition to investigating the immunological analyses of diseases, development of vaccination and treatment models in animals. She hopes her work will support the discovery of therapeutics in the clinical setting and assist in the combat against the burden of antibiotic resistance.",institutionString:"Abu Dhabi Women’s College",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Perdana University",institutionURL:null,country:{name:"Malaysia"}}},equalEditorTwo:{id:"221544",title:"Dr.",name:"Kok-Song",middleName:null,surname:"Lai",slug:"kok-song-lai",fullName:"Kok-Song Lai",profilePictureURL:"https://mts.intechopen.com/storage/users/221544/images/system/221544.jpeg",biography:"Dr. Lai Kok Song is an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates. He obtained his Ph.D. in Biological Sciences from Nara Institute of Science and Technology, Japan in 2012. Prior to his academic appointment, Dr. Lai worked as a Senior Scientist at the Ministry of Science, Technology and Innovation, Malaysia. His current research areas include antimicrobial resistance and plant-pathogen interaction. His particular interest lies in the study of the antimicrobial mechanism via membrane disruption of essential oils against multi-drug resistance bacteria through various biochemical, molecular and proteomic approaches. Ultimately, he hopes to uncover and determine novel biomarkers related to antibiotic resistance that can be developed into new therapeutic strategies.",institutionString:"Higher Colleges of Technology",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"8",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Higher Colleges of Technology",institutionURL:null,country:{name:"United Arab Emirates"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9560",title:"Creativity",subtitle:"A Force to Innovation",isOpenForSubmission:!1,hash:"58f740bc17807d5d88d647c525857b11",slug:"creativity-a-force-to-innovation",bookSignature:"Pooja Jain",coverURL:"https://cdn.intechopen.com/books/images_new/9560.jpg",editedByType:"Edited by",editors:[{id:"316765",title:"Dr.",name:"Pooja",middleName:null,surname:"Jain",slug:"pooja-jain",fullName:"Pooja Jain"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9669",title:"Recent Advances in Rice Research",subtitle:null,isOpenForSubmission:!1,hash:"12b06cc73e89af1e104399321cc16a75",slug:"recent-advances-in-rice-research",bookSignature:"Mahmood-ur- Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9669.jpg",editedByType:"Edited by",editors:[{id:"185476",title:"Dr.",name:"Mahmood-Ur-",middleName:null,surname:"Rahman Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-Ur- Rahman Ansari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10192",title:"Background and Management of Muscular Atrophy",subtitle:null,isOpenForSubmission:!1,hash:"eca24028d89912b5efea56e179dff089",slug:"background-and-management-of-muscular-atrophy",bookSignature:"Julianna Cseri",coverURL:"https://cdn.intechopen.com/books/images_new/10192.jpg",editedByType:"Edited by",editors:[{id:"135579",title:"Dr.",name:"Julianna",middleName:null,surname:"Cseri",slug:"julianna-cseri",fullName:"Julianna Cseri"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editedByType:"Edited by",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editedByType:"Edited by",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editedByType:"Edited by",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editedByType:"Edited by",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"150",title:"Pure Immunology",slug:"pure-immunology",parent:{title:"Immunology and Microbiology",slug:"immunology-and-microbiology"},numberOfBooks:20,numberOfAuthorsAndEditors:422,numberOfWosCitations:304,numberOfCrossrefCitations:195,numberOfDimensionsCitations:423,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"pure-immunology",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editedByType:"Edited by",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8590",title:"Macrophage Activation",subtitle:"Biology and Disease",isOpenForSubmission:!1,hash:"e15abd1b0e08f1b67d33592999c52c32",slug:"macrophage-activation-biology-and-disease",bookSignature:"Khalid Hussain Bhat",coverURL:"https://cdn.intechopen.com/books/images_new/8590.jpg",editedByType:"Edited by",editors:[{id:"162478",title:"Dr.",name:"Khalid Hussain",middleName:null,surname:"Bhat",slug:"khalid-hussain-bhat",fullName:"Khalid Hussain Bhat"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6963",title:"Immune Response Activation and Immunomodulation",subtitle:null,isOpenForSubmission:!1,hash:"ac7ce04a130a57849a8d3adb55d688ed",slug:"immune-response-activation-and-immunomodulation",bookSignature:"Rajeev K. Tyagi and Prakash S. Bisen",coverURL:"https://cdn.intechopen.com/books/images_new/6963.jpg",editedByType:"Edited by",editors:[{id:"201069",title:"Dr.",name:"Rajeev",middleName:"K.",surname:"Tyagi",slug:"rajeev-tyagi",fullName:"Rajeev Tyagi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7129",title:"Neutrophils",subtitle:null,isOpenForSubmission:!1,hash:"4f71e75cb45249658d48e765d179ce9f",slug:"neutrophils",bookSignature:"Maitham Khajah",coverURL:"https://cdn.intechopen.com/books/images_new/7129.jpg",editedByType:"Edited by",editors:[{id:"173123",title:"Dr.",name:"Maitham",middleName:null,surname:"Khajah",slug:"maitham-khajah",fullName:"Maitham Khajah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7077",title:"Celiac Disease",subtitle:"From the Bench to the Clinic",isOpenForSubmission:!1,hash:"9effb55d4ab18dca9bcb8d40e34930f8",slug:"celiac-disease-from-the-bench-to-the-clinic",bookSignature:"Luis Rodrigo and Carlos Hernández-Lahoz",coverURL:"https://cdn.intechopen.com/books/images_new/7077.jpg",editedByType:"Edited by",editors:[{id:"73208",title:"Prof.",name:"Luis",middleName:null,surname:"Rodrigo",slug:"luis-rodrigo",fullName:"Luis Rodrigo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6470",title:"Rapid Test",subtitle:"Advances in Design, Format and Diagnostic Applications",isOpenForSubmission:!1,hash:"4511f4aaf7e54a38e8519d210290e032",slug:"rapid-test-advances-in-design-format-and-diagnostic-applications",bookSignature:"Laura Anfossi",coverURL:"https://cdn.intechopen.com/books/images_new/6470.jpg",editedByType:"Edited by",editors:[{id:"48947",title:"Dr.",name:"Laura",middleName:null,surname:"Anfossi",slug:"laura-anfossi",fullName:"Laura Anfossi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6617",title:"Immunoregulatory Aspects of Immunotherapy",subtitle:null,isOpenForSubmission:!1,hash:"a2f42aa78dd846d4a1679066e72a7285",slug:"immunoregulatory-aspects-of-immunotherapy",bookSignature:"Seyyed Shamsadin Athari",coverURL:"https://cdn.intechopen.com/books/images_new/6617.jpg",editedByType:"Edited by",editors:[{id:"139889",title:"Dr.",name:"Seyyed Shamsadin",middleName:null,surname:"Athari",slug:"seyyed-shamsadin-athari",fullName:"Seyyed Shamsadin Athari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5854",title:"Germ Cell",subtitle:null,isOpenForSubmission:!1,hash:"e63c03c8b93ebc004eef632ab84d62ea",slug:"germ-cell",bookSignature:"Ahmed RG",coverURL:"https://cdn.intechopen.com/books/images_new/5854.jpg",editedByType:"Edited by",editors:[{id:"138555",title:"Prof.",name:"Ahmed",middleName:null,surname:"R.G.",slug:"ahmed-r.g.",fullName:"Ahmed R.G."}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5975",title:"Physiology and Pathology of Immunology",subtitle:null,isOpenForSubmission:!1,hash:"b31eea21dfa90b753604f34bf1c0b8a5",slug:"physiology-and-pathology-of-immunology",bookSignature:"Nima Rezaei",coverURL:"https://cdn.intechopen.com/books/images_new/5975.jpg",editedByType:"Edited by",editors:[{id:"116250",title:"Dr.",name:"Nima",middleName:null,surname:"Rezaei",slug:"nima-rezaei",fullName:"Nima Rezaei"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5991",title:"Natural Killer Cells",subtitle:null,isOpenForSubmission:!1,hash:"ea5a1d2f5030a6af3f29cc75fdb9f559",slug:"natural-killer-cells",bookSignature:"Mourad Aribi",coverURL:"https://cdn.intechopen.com/books/images_new/5991.jpg",editedByType:"Edited by",editors:[{id:"40046",title:"Prof.",name:"Mourad",middleName:null,surname:"Aribi",slug:"mourad-aribi",fullName:"Mourad Aribi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6004",title:"Lymphocyte Updates",subtitle:"Cancer, Autoimmunity and Infection",isOpenForSubmission:!1,hash:"2a9634b93e9b1d409b3b47d472960c55",slug:"lymphocyte-updates-cancer-autoimmunity-and-infection",bookSignature:"Gheorghita Isvoranu",coverURL:"https://cdn.intechopen.com/books/images_new/6004.jpg",editedByType:"Edited by",editors:[{id:"193129",title:"Ph.D.",name:"Gheorghita",middleName:null,surname:"Isvoranu",slug:"gheorghita-isvoranu",fullName:"Gheorghita Isvoranu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5484",title:"Biology of Myelomonocytic Cells",subtitle:null,isOpenForSubmission:!1,hash:"861561e42fe02bd42af3082330cecf99",slug:"biology-of-myelomonocytic-cells",bookSignature:"Anirban Ghosh",coverURL:"https://cdn.intechopen.com/books/images_new/5484.jpg",editedByType:"Edited by",editors:[{id:"46516",title:"Dr.",name:"Anirban",middleName:null,surname:"Ghosh",slug:"anirban-ghosh",fullName:"Anirban Ghosh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:20,mostCitedChapters:[{id:"33740",doi:"10.5772/35797",title:"Interferences in Immunoassays",slug:"interference-in-immunoassays",totalDownloads:17002,totalCrossrefCites:13,totalDimensionsCites:42,book:{slug:"advances-in-immunoassay-technology",title:"Advances in Immunoassay Technology",fullTitle:"Advances in Immunoassay Technology"},signatures:"Johan Schiettecatte, Ellen Anckaert and Johan Smitz",authors:[{id:"105883",title:"Mr.",name:"Johan",middleName:null,surname:"Schiettecatte",slug:"johan-schiettecatte",fullName:"Johan Schiettecatte"},{id:"113099",title:"Dr.",name:"Ellen",middleName:null,surname:"Anckaert",slug:"ellen-anckaert",fullName:"Ellen Anckaert"},{id:"113100",title:"Prof.",name:"Johan",middleName:null,surname:"Smitz",slug:"johan-smitz",fullName:"Johan Smitz"}]},{id:"33741",doi:"10.5772/36947",title:"Fundamentals and Applications of Immunosensors",slug:"fundamentals-and-applications-of-immunosensors",totalDownloads:4625,totalCrossrefCites:14,totalDimensionsCites:29,book:{slug:"advances-in-immunoassay-technology",title:"Advances in Immunoassay Technology",fullTitle:"Advances in Immunoassay Technology"},signatures:"Carlos Moina and Gabriel Ybarra",authors:[{id:"110541",title:"Dr.",name:"Carlos",middleName:null,surname:"Moina",slug:"carlos-moina",fullName:"Carlos Moina"},{id:"110556",title:"Dr.",name:"Gabriel",middleName:null,surname:"Ybarra",slug:"gabriel-ybarra",fullName:"Gabriel Ybarra"}]},{id:"63913",doi:"10.5772/intechopen.80843",title:"Cytokine Profiling Plays a Crucial Role in Activating Immune System to Clear Infectious Pathogens",slug:"cytokine-profiling-plays-a-crucial-role-in-activating-immune-system-to-clear-infectious-pathogens",totalDownloads:2437,totalCrossrefCites:6,totalDimensionsCites:20,book:{slug:"immune-response-activation-and-immunomodulation",title:"Immune Response Activation and Immunomodulation",fullTitle:"Immune Response Activation and Immunomodulation"},signatures:"José Luis Muñoz-Carrillo, Juan Francisco Contreras-Cordero,\nOscar Gutiérrez-Coronado, Paola Trinidad Villalobos-Gutiérrez,\nLuis Guillermo Ramos-Gracia and Viridiana Elizabeth Hernández-Reyes",authors:[{id:"214236",title:"Dr.",name:"Jose Luis",middleName:null,surname:"Muñoz-Carrillo",slug:"jose-luis-munoz-carrillo",fullName:"Jose Luis Muñoz-Carrillo"},{id:"216081",title:"Dr.",name:"Oscar",middleName:null,surname:"Gutiérrez-Coronado",slug:"oscar-gutierrez-coronado",fullName:"Oscar Gutiérrez-Coronado"},{id:"220717",title:"Dr.",name:"Juan Francisco",middleName:null,surname:"Contreras Cordero",slug:"juan-francisco-contreras-cordero",fullName:"Juan Francisco Contreras Cordero"},{id:"233193",title:"Dr.",name:"Paola Trinidad",middleName:null,surname:"Villalobos-Gutiérrez",slug:"paola-trinidad-villalobos-gutierrez",fullName:"Paola Trinidad Villalobos-Gutiérrez"},{id:"254015",title:"Dr.",name:"Viridiana Elizabeth",middleName:null,surname:"Hernández-Reyes",slug:"viridiana-elizabeth-hernandez-reyes",fullName:"Viridiana Elizabeth Hernández-Reyes"},{id:"257472",title:"Dr.",name:"Luis Guillermo",middleName:null,surname:"Ramos-Gracia",slug:"luis-guillermo-ramos-gracia",fullName:"Luis Guillermo Ramos-Gracia"}]}],mostDownloadedChaptersLast30Days:[{id:"56849",title:"Physiology and Pathology of Innate Immune Response Against Pathogens",slug:"physiology-and-pathology-of-innate-immune-response-against-pathogens",totalDownloads:4980,totalCrossrefCites:10,totalDimensionsCites:15,book:{slug:"physiology-and-pathology-of-immunology",title:"Physiology and Pathology of Immunology",fullTitle:"Physiology and Pathology of Immunology"},signatures:"José Luis Muñoz Carrillo, Flor Pamela Castro García, Oscar\nGutiérrez Coronado, María Alejandra Moreno García and Juan\nFrancisco Contreras Cordero",authors:[{id:"214236",title:"Dr.",name:"Jose Luis",middleName:null,surname:"Muñoz-Carrillo",slug:"jose-luis-munoz-carrillo",fullName:"Jose Luis Muñoz-Carrillo"},{id:"216080",title:"Dr.",name:"Alejandra",middleName:null,surname:"Moreno-García",slug:"alejandra-moreno-garcia",fullName:"Alejandra Moreno-García"},{id:"216081",title:"Dr.",name:"Oscar",middleName:null,surname:"Gutiérrez-Coronado",slug:"oscar-gutierrez-coronado",fullName:"Oscar Gutiérrez-Coronado"},{id:"216082",title:"Dr.",name:"Pamela",middleName:null,surname:"Castro-García",slug:"pamela-castro-garcia",fullName:"Pamela Castro-García"},{id:"220717",title:"Dr.",name:"Juan Francisco",middleName:null,surname:"Contreras Cordero",slug:"juan-francisco-contreras-cordero",fullName:"Juan Francisco Contreras Cordero"}]},{id:"60540",title:"Immune System Disorders: Hypersensitivity and Autoimmunity",slug:"immune-system-disorders-hypersensitivity-and-autoimmunity",totalDownloads:1341,totalCrossrefCites:3,totalDimensionsCites:4,book:{slug:"immunoregulatory-aspects-of-immunotherapy",title:"Immunoregulatory Aspects of Immunotherapy",fullTitle:"Immunoregulatory Aspects of Immunotherapy"},signatures:"José Luis Muñoz-Carrillo, Flor Pamela Castro-García, Francisca\nChávez-Rubalcaba, Isabel Chávez-Rubalcaba, José Luis Martínez-\nRodríguez and Marcela Elizabeth Hernández-Ruiz",authors:null},{id:"54824",title:"Dendritic Cells: Location, Function, and Clinical Implications",slug:"dendritic-cells-location-function-and-clinical-implications",totalDownloads:3435,totalCrossrefCites:3,totalDimensionsCites:7,book:{slug:"biology-of-myelomonocytic-cells",title:"Biology of Myelomonocytic Cells",fullTitle:"Biology of Myelomonocytic Cells"},signatures:"Andrés Castell-Rodríguez, Gabriela Piñón-Zárate, Miguel Herrera-\nEnríquez, Katia Jarquín-Yáñez and Iliana Medina-Solares",authors:[{id:"190753",title:"Dr.",name:"Andrés",middleName:"Eliú",surname:"Castell-Rodríguez",slug:"andres-castell-rodriguez",fullName:"Andrés Castell-Rodríguez"},{id:"191880",title:"Dr.",name:"Gabriela",middleName:null,surname:"Piñón-Zárate",slug:"gabriela-pinon-zarate",fullName:"Gabriela Piñón-Zárate"},{id:"191881",title:"Dr.",name:"Miguel",middleName:null,surname:"Herrera-Enríquez",slug:"miguel-herrera-enriquez",fullName:"Miguel Herrera-Enríquez"},{id:"191882",title:"Dr.",name:"Katia",middleName:null,surname:"Jarquín-Yáñez",slug:"katia-jarquin-yanez",fullName:"Katia Jarquín-Yáñez"},{id:"204502",title:"BSc.",name:"Iliana",middleName:null,surname:"Medina-Solares",slug:"iliana-medina-solares",fullName:"Iliana Medina-Solares"}]},{id:"63913",title:"Cytokine Profiling Plays a Crucial Role in Activating Immune System to Clear Infectious Pathogens",slug:"cytokine-profiling-plays-a-crucial-role-in-activating-immune-system-to-clear-infectious-pathogens",totalDownloads:2442,totalCrossrefCites:7,totalDimensionsCites:20,book:{slug:"immune-response-activation-and-immunomodulation",title:"Immune Response Activation and Immunomodulation",fullTitle:"Immune Response Activation and Immunomodulation"},signatures:"José Luis Muñoz-Carrillo, Juan Francisco Contreras-Cordero,\nOscar Gutiérrez-Coronado, Paola Trinidad Villalobos-Gutiérrez,\nLuis Guillermo Ramos-Gracia and Viridiana Elizabeth Hernández-Reyes",authors:[{id:"214236",title:"Dr.",name:"Jose Luis",middleName:null,surname:"Muñoz-Carrillo",slug:"jose-luis-munoz-carrillo",fullName:"Jose Luis Muñoz-Carrillo"},{id:"216081",title:"Dr.",name:"Oscar",middleName:null,surname:"Gutiérrez-Coronado",slug:"oscar-gutierrez-coronado",fullName:"Oscar Gutiérrez-Coronado"},{id:"220717",title:"Dr.",name:"Juan Francisco",middleName:null,surname:"Contreras Cordero",slug:"juan-francisco-contreras-cordero",fullName:"Juan Francisco Contreras Cordero"},{id:"233193",title:"Dr.",name:"Paola Trinidad",middleName:null,surname:"Villalobos-Gutiérrez",slug:"paola-trinidad-villalobos-gutierrez",fullName:"Paola Trinidad Villalobos-Gutiérrez"},{id:"254015",title:"Dr.",name:"Viridiana Elizabeth",middleName:null,surname:"Hernández-Reyes",slug:"viridiana-elizabeth-hernandez-reyes",fullName:"Viridiana Elizabeth Hernández-Reyes"},{id:"257472",title:"Dr.",name:"Luis Guillermo",middleName:null,surname:"Ramos-Gracia",slug:"luis-guillermo-ramos-gracia",fullName:"Luis Guillermo Ramos-Gracia"}]},{id:"68185",title:"Macrophages: The Potent Immunoregulatory Innate Immune Cells",slug:"macrophages-the-potent-immunoregulatory-innate-immune-cells",totalDownloads:1360,totalCrossrefCites:7,totalDimensionsCites:12,book:{slug:"macrophage-activation-biology-and-disease",title:"Macrophage Activation",fullTitle:"Macrophage Activation - Biology and Disease"},signatures:"Vijay Kumar",authors:[{id:"63844",title:"Dr.",name:"Vijay",middleName:null,surname:"Kumar",slug:"vijay-kumar",fullName:"Vijay Kumar"}]},{id:"57230",title:"NK Cells in Cancer Immunotherapy",slug:"nk-cells-in-cancer-immunotherapy",totalDownloads:1270,totalCrossrefCites:0,totalDimensionsCites:1,book:{slug:"natural-killer-cells",title:"Natural Killer Cells",fullTitle:"Natural Killer Cells"},signatures:"Lynda Addou-Klouche",authors:[{id:"203178",title:"Dr.",name:"Lynda",middleName:null,surname:"Addou-Klouche",slug:"lynda-addou-klouche",fullName:"Lynda Addou-Klouche"}]},{id:"53117",title:"Vitamin B12: Could It Be a Promising Immunotherapy?",slug:"vitamin-b12-could-it-be-a-promising-immunotherapy-",totalDownloads:1557,totalCrossrefCites:0,totalDimensionsCites:2,book:{slug:"immunotherapy-myths-reality-ideas-future",title:"Immunotherapy",fullTitle:"Immunotherapy - Myths, Reality, Ideas, Future"},signatures:"Tatina T. Todorova, Neli Ermenlieva and Gabriela Tsankova",authors:[{id:"175504",title:"Dr.",name:"Tatina",middleName:null,surname:"Todorova",slug:"tatina-todorova",fullName:"Tatina Todorova"},{id:"176473",title:"Dr.",name:"Gabriela",middleName:null,surname:"Tsankova",slug:"gabriela-tsankova",fullName:"Gabriela Tsankova"},{id:"176474",title:"Dr.",name:"Neli",middleName:"Mitkova",surname:"Ermenlieva",slug:"neli-ermenlieva",fullName:"Neli Ermenlieva"}]},{id:"65510",title:"Current State of the Art in DNA Vaccine Delivery and Molecular Adjuvants: Bcl-xL Anti-Apoptotic Protein as a Molecular Adjuvant",slug:"current-state-of-the-art-in-dna-vaccine-delivery-and-molecular-adjuvants-bcl-xl-anti-apoptotic-prote",totalDownloads:849,totalCrossrefCites:3,totalDimensionsCites:4,book:{slug:"immune-response-activation-and-immunomodulation",title:"Immune Response Activation and Immunomodulation",fullTitle:"Immune Response Activation and Immunomodulation"},signatures:"Sultan Gulce-Iz and Pelin Saglam-Metiner",authors:[{id:"254386",title:"Prof.",name:"Sultan",middleName:null,surname:"Gulce Iz",slug:"sultan-gulce-iz",fullName:"Sultan Gulce Iz"},{id:"264934",title:"MSc.",name:"Pelin",middleName:null,surname:"Saglam Metiner",slug:"pelin-saglam-metiner",fullName:"Pelin Saglam Metiner"}]},{id:"52471",title:"MRSA and MSSA: The Mechanism of Methicillin Resistance and the Influence of Methicillin Resistance on Biofilm Phenotype of Staphylococcus aureus",slug:"mrsa-and-mssa-the-mechanism-of-methicillin-resistance-and-the-influence-of-methicillin-resistance-on",totalDownloads:2403,totalCrossrefCites:4,totalDimensionsCites:7,book:{slug:"the-rise-of-virulence-and-antibiotic-resistance-in-staphylococcus-aureus",title:"The Rise of Virulence and Antibiotic Resistance in Staphylococcus aureus",fullTitle:"The Rise of Virulence and Antibiotic Resistance in Staphylococcus aureus"},signatures:"Sahra Kırmusaoğlu",authors:[{id:"179460",title:"Dr.",name:"Sahra",middleName:null,surname:"Kırmusaoğlu",slug:"sahra-kirmusaoglu",fullName:"Sahra Kırmusaoğlu"}]},{id:"53240",title:"Staphylococcus aureus Biofilms and their Impact on the Medical Field",slug:"staphylococcus-aureus-biofilms-and-their-impact-on-the-medical-field",totalDownloads:2885,totalCrossrefCites:8,totalDimensionsCites:14,book:{slug:"the-rise-of-virulence-and-antibiotic-resistance-in-staphylococcus-aureus",title:"The Rise of Virulence and Antibiotic Resistance in Staphylococcus aureus",fullTitle:"The Rise of Virulence and Antibiotic Resistance in Staphylococcus aureus"},signatures:"Fany Reffuveille, Jérôme Josse, Quentin Vallé, Céline Mongaret and\nSophie C. Gangloff",authors:[{id:"54351",title:"Prof.",name:"Sophie C.",middleName:null,surname:"Gangloff",slug:"sophie-c.-gangloff",fullName:"Sophie C. Gangloff"},{id:"190356",title:"Ph.D.",name:"Fany",middleName:null,surname:"Reffuveille",slug:"fany-reffuveille",fullName:"Fany Reffuveille"},{id:"191408",title:"Dr.",name:"Jérome",middleName:null,surname:"Josse",slug:"jerome-josse",fullName:"Jérome Josse"},{id:"203850",title:"Dr.",name:"Quentin",middleName:null,surname:"Vallé",slug:"quentin-valle",fullName:"Quentin Vallé"},{id:"203852",title:"Dr.",name:"Céline",middleName:null,surname:"Mongaret",slug:"celine-mongaret",fullName:"Céline Mongaret"}]}],onlineFirstChaptersFilter:{topicSlug:"pure-immunology",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"profile.detail",path:"/profiles/178768/kaida-xiao",hash:"",query:{},params:{id:"178768",slug:"kaida-xiao"},fullPath:"/profiles/178768/kaida-xiao",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()