Values of the recruited evaluation measures.
\\n\\n
Released this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\\n\\nWe wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'IntechOpen is proud to announce that 179 of our authors have made the Clarivate™ Highly Cited Researchers List for 2020, ranking them among the top 1% most-cited.
\n\nThroughout the years, the list has named a total of 252 IntechOpen authors as Highly Cited. Of those researchers, 69 have been featured on the list multiple times.
\n\n\n\nReleased this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\n\nWe wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
\n'}],latestNews:[{slug:"stanford-university-identifies-top-2-scientists-over-1-000-are-intechopen-authors-and-editors-20210122",title:"Stanford University Identifies Top 2% Scientists, Over 1,000 are IntechOpen Authors and Editors"},{slug:"intechopen-authors-included-in-the-highly-cited-researchers-list-for-2020-20210121",title:"IntechOpen Authors Included in the Highly Cited Researchers List for 2020"},{slug:"intechopen-maintains-position-as-the-world-s-largest-oa-book-publisher-20201218",title:"IntechOpen Maintains Position as the World’s Largest OA Book Publisher"},{slug:"all-intechopen-books-available-on-perlego-20201215",title:"All IntechOpen Books Available on Perlego"},{slug:"oiv-awards-recognizes-intechopen-s-editors-20201127",title:"OIV Awards Recognizes IntechOpen's Editors"},{slug:"intechopen-joins-crossref-s-initiative-for-open-abstracts-i4oa-to-boost-the-discovery-of-research-20201005",title:"IntechOpen joins Crossref's Initiative for Open Abstracts (I4OA) to Boost the Discovery of Research"},{slug:"intechopen-hits-milestone-5-000-open-access-books-published-20200908",title:"IntechOpen hits milestone: 5,000 Open Access books published!"},{slug:"intechopen-books-hosted-on-the-mathworks-book-program-20200819",title:"IntechOpen Books Hosted on the MathWorks Book Program"}]},book:{item:{type:"book",id:"3295",leadTitle:null,fullTitle:"New Insights into Anxiety Disorders",title:"New Insights into Anxiety Disorders",subtitle:null,reviewType:"peer-reviewed",abstract:"This book collects the contributions of a number of clinical psychiatrists all over the world, interested in developing basic research about anxiety and in applying it in clinical contexts. It is divided into four sections, covering general issues about anxiety (ethological and developmental ones), basic research issues on specific aspects of anxiety (bioanatomical ones, correlation with personality structure and so on), and new clinical and therapeutical proposals and hypothesis. Each author summarized the clinical importance of his work, underlining the clinical pitfalls of this publication.",isbn:null,printIsbn:"978-953-51-1053-8",pdfIsbn:"978-953-51-7118-8",doi:"10.5772/46003",price:139,priceEur:155,priceUsd:179,slug:"new-insights-into-anxiety-disorders",numberOfPages:458,isOpenForSubmission:!1,isInWos:1,hash:"013c40f1052a8d6b3ab2d6bb6f797921",bookSignature:"Federico Durbano",publishedDate:"March 20th 2013",coverURL:"https://cdn.intechopen.com/books/images_new/3295.jpg",numberOfDownloads:76832,numberOfWosCitations:45,numberOfCrossrefCitations:19,numberOfDimensionsCitations:66,hasAltmetrics:1,numberOfTotalCitations:130,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 17th 2012",dateEndSecondStepPublish:"May 8th 2012",dateEndThirdStepPublish:"August 12th 2012",dateEndFourthStepPublish:"November 10th 2012",dateEndFifthStepPublish:"December 10th 2012",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6",editedByType:"Edited by",kuFlag:!1,editors:[{id:"157077",title:"Dr.",name:"Federico",middleName:null,surname:"Durbano",slug:"federico-durbano",fullName:"Federico Durbano",profilePictureURL:"https://mts.intechopen.com/storage/users/157077/images/system/157077.jpeg",biography:"Dr. Federico Durbano was born in Genoa, Italy, in 1963, and is now living near Milan, where he received a degree in Medicine and specialized in Psychiatry. He has had different work experiences in a number of hospitals (e.g. Milan 'Ospedale Maggiore Policlinico,” Treviglio, Melegnano, Fatebenefratelli), where he achieved significant career milestones. He is now Director of the Psychiatric Unit in Melzo Hospital—ASST Melegnano e della Martesana and Director of the Mental Health and Substance Dependence Department in the same ASST. He has had teaching assignments from the University of Milan (Nursing School), University of Castellanza, University of San Marino, Sassari University, and the Business School of Il Sole 24 Ore (Masters in Criminology). He has also attended more than 90 local and national congress and courses as an invited speaker, and has published more than 170 papers in national and international journals and books. He also works as a technical advisor to the court in the field of forensic psychiatry.",institutionString:"Mental Health and Addictions Department,",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"4",totalChapterViews:"0",totalEditedBooks:"5",institution:{name:"ASST Melegnano e della Martesana",institutionURL:null,country:{name:"Italy"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"1057",title:"Neuropsychiatry",slug:"neuropsychiatry"}],chapters:[{id:"43757",title:"An Evolutionary Perspective on Anxiety and Anxiety Disorders",doi:"10.5772/52902",slug:"an-evolutionary-perspective-on-anxiety-and-anxiety-disorders",totalDownloads:3659,totalCrossrefCites:1,totalDimensionsCites:3,signatures:"John Scott Price",downloadPdfUrl:"/chapter/pdf-download/43757",previewPdfUrl:"/chapter/pdf-preview/43757",authors:[{id:"156695",title:"Dr.",name:"John",surname:"Price",slug:"john-price",fullName:"John Price"}],corrections:null},{id:"43733",title:"Anxiety: An Adaptive Emotion",doi:"10.5772/53223",slug:"anxiety-an-adaptive-emotion",totalDownloads:3001,totalCrossrefCites:1,totalDimensionsCites:6,signatures:"Ana G. Gutiérrez-García and Carlos M. Contreras",downloadPdfUrl:"/chapter/pdf-download/43733",previewPdfUrl:"/chapter/pdf-preview/43733",authors:[{id:"158560",title:"Dr.",name:"Carlos M.",surname:"Contreras",slug:"carlos-m.-contreras",fullName:"Carlos M. Contreras"}],corrections:null},{id:"41031",title:"Focusing on the Possible Role of the Cerebellum in Anxiety Disorders",doi:"10.5772/52954",slug:"focusing-on-the-possible-role-of-the-cerebellum-in-anxiety-disorders",totalDownloads:2360,totalCrossrefCites:1,totalDimensionsCites:14,signatures:"Meghan D. Caulfield and Richard J. Servatius",downloadPdfUrl:"/chapter/pdf-download/41031",previewPdfUrl:"/chapter/pdf-preview/41031",authors:[{id:"31564",title:"Prof.",name:"Richard",surname:"Servatius",slug:"richard-servatius",fullName:"Richard Servatius"},{id:"158609",title:"MSc.",name:"Meghan",surname:"Caulfield",slug:"meghan-caulfield",fullName:"Meghan Caulfield"}],corrections:null},{id:"43756",title:"Searching for Biological Markers of Personality: Are There Neuroendocrine Markers of Anxiety?",doi:"10.5772/53925",slug:"searching-for-biological-markers-of-personality-are-there-neuroendocrine-markers-of-anxiety-",totalDownloads:1294,totalCrossrefCites:0,totalDimensionsCites:2,signatures:"Antonio Armario and Roser Nadal",downloadPdfUrl:"/chapter/pdf-download/43756",previewPdfUrl:"/chapter/pdf-preview/43756",authors:[{id:"157506",title:"Prof.",name:"Antonio",surname:"Armario",slug:"antonio-armario",fullName:"Antonio Armario"}],corrections:null},{id:"43780",title:"Alterations in the Immune Response, Apoptosis and Synaptic Plasticity in Posttraumatic Stress Disorder: Molecular Indicators and Relation to Clinical Symptoms",doi:"10.5772/52693",slug:"alterations-in-the-immune-response-apoptosis-and-synaptic-plasticity-in-posttraumatic-stress-disorde",totalDownloads:1745,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Anna Boyajyan, Gohar Mkrtchyan, Lilit Hovhannisyan and Diana Avetyan",downloadPdfUrl:"/chapter/pdf-download/43780",previewPdfUrl:"/chapter/pdf-preview/43780",authors:[{id:"157186",title:"Prof.",name:"Anna",surname:"Boyajyan",slug:"anna-boyajyan",fullName:"Anna Boyajyan"},{id:"157188",title:"Dr.",name:"Gohar",surname:"Mkrtchyan",slug:"gohar-mkrtchyan",fullName:"Gohar Mkrtchyan"},{id:"157189",title:"MSc.",name:"Lilit",surname:"Hovhannisyan",slug:"lilit-hovhannisyan",fullName:"Lilit Hovhannisyan"},{id:"158690",title:"MSc.",name:"Diana",surname:"Avetyan",slug:"diana-avetyan",fullName:"Diana Avetyan"}],corrections:null},{id:"43745",title:"Understanding the Causes of Reduced Startle Reactivity in Stress-Related Mental Disorders",doi:"10.5772/53066",slug:"understanding-the-causes-of-reduced-startle-reactivity-in-stress-related-mental-disorders",totalDownloads:2009,totalCrossrefCites:0,totalDimensionsCites:2,signatures:"Kevin D. Beck and Jennifer E. Catuzzi",downloadPdfUrl:"/chapter/pdf-download/43745",previewPdfUrl:"/chapter/pdf-preview/43745",authors:[{id:"71254",title:"Dr.",name:"Kevin",surname:"Beck",slug:"kevin-beck",fullName:"Kevin Beck"},{id:"166022",title:"Ms.",name:"Jennifer",surname:"Catuzzi",slug:"jennifer-catuzzi",fullName:"Jennifer Catuzzi"}],corrections:null},{id:"42942",title:"Social Anxiety Disorder in Psychosis: A Critical Review",doi:"10.5772/53053",slug:"social-anxiety-disorder-in-psychosis-a-critical-review",totalDownloads:1973,totalCrossrefCites:1,totalDimensionsCites:3,signatures:"Maria Michail",downloadPdfUrl:"/chapter/pdf-download/42942",previewPdfUrl:"/chapter/pdf-preview/42942",authors:[{id:"160823",title:"Dr.",name:"Maria",surname:"Michail",slug:"maria-michail",fullName:"Maria Michail"}],corrections:null},{id:"43754",title:"Social Anxiety, Beliefs About Expressing Emotions and Experiencing Positive Emotions",doi:"10.5772/55110",slug:"social-anxiety-beliefs-about-expressing-emotions-and-experiencing-positive-emotions",totalDownloads:1971,totalCrossrefCites:0,totalDimensionsCites:2,signatures:"Jasminka Juretić and Ivanka Živčić-Bećirevic",downloadPdfUrl:"/chapter/pdf-download/43754",previewPdfUrl:"/chapter/pdf-preview/43754",authors:[{id:"165197",title:"Dr.",name:"Jasminka",surname:"Juretić",slug:"jasminka-juretic",fullName:"Jasminka Juretić"},{id:"165201",title:"Prof.",name:"Ivanka",surname:"Zivcic",slug:"ivanka-zivcic",fullName:"Ivanka Zivcic"}],corrections:null},{id:"43755",title:"Co-Morbid Anxiety and Physical Disorders: A Possible Common Link with Joint Hypermobility Syndrome",doi:"10.5772/51892",slug:"co-morbid-anxiety-and-physical-disorders-a-possible-common-link-with-joint-hypermobility-syndrome",totalDownloads:1507,totalCrossrefCites:0,totalDimensionsCites:2,signatures:"Guillem Pailhez and Antonio Bulbena",downloadPdfUrl:"/chapter/pdf-download/43755",previewPdfUrl:"/chapter/pdf-preview/43755",authors:[{id:"33604",title:"Prof.",name:"Antonio",surname:"Bulbena",slug:"antonio-bulbena",fullName:"Antonio Bulbena"},{id:"53824",title:"Prof.",name:"Guillem",surname:"Pailhez",slug:"guillem-pailhez",fullName:"Guillem Pailhez"}],corrections:null},{id:"43770",title:"Anxiety Syndromes and Their Correlates in Children and Adolescents: A Two-Year- Follow-Up Study at Primary Health Care in Mexico City",doi:"10.5772/53767",slug:"anxiety-syndromes-and-their-correlates-in-children-and-adolescents-a-two-year-follow-up-study-at-pri",totalDownloads:1521,totalCrossrefCites:0,totalDimensionsCites:3,signatures:"Jorge Javier Caraveo-Anduaga, Alejandra Soriano Rodríguez and Jose Erazo Pérez",downloadPdfUrl:"/chapter/pdf-download/43770",previewPdfUrl:"/chapter/pdf-preview/43770",authors:[{id:"35024",title:"Dr.",name:"Jorge Javier",surname:"Caraveo-Anduaga",slug:"jorge-javier-caraveo-anduaga",fullName:"Jorge Javier Caraveo-Anduaga"}],corrections:null},{id:"43758",title:"Anxiety Disorders in Pregnancy and the Postpartum Period",doi:"10.5772/52786",slug:"anxiety-disorders-in-pregnancy-and-the-postpartum-period",totalDownloads:39761,totalCrossrefCites:11,totalDimensionsCites:20,signatures:"Roberta Anniverno, Alessandra Bramante, Claudio Mencacci and Federico Durbano",downloadPdfUrl:"/chapter/pdf-download/43758",previewPdfUrl:"/chapter/pdf-preview/43758",authors:[{id:"157077",title:"Dr.",name:"Federico",surname:"Durbano",slug:"federico-durbano",fullName:"Federico Durbano"},{id:"166382",title:"Dr.",name:"Roberta",surname:"Anniverno",slug:"roberta-anniverno",fullName:"Roberta Anniverno"}],corrections:null},{id:"41831",title:"Understanding and Treating Anxiety Disorders in Presence of Personality Disorder Diagnosis",doi:"10.5772/53554",slug:"understanding-and-treating-anxiety-disorders-in-presence-of-personality-disorder-diagnosis",totalDownloads:1635,totalCrossrefCites:0,totalDimensionsCites:1,signatures:"Véronique Palardy, Ghassan El-Baalbaki, Claude Bélanger and Catherine Fredette",downloadPdfUrl:"/chapter/pdf-download/41831",previewPdfUrl:"/chapter/pdf-preview/41831",authors:[{id:"57536",title:"Prof.",name:"Claude",surname:"Belanger",slug:"claude-belanger",fullName:"Claude Belanger"},{id:"157412",title:"Prof.",name:"Ghassan",surname:"El-Baalbaki",slug:"ghassan-el-baalbaki",fullName:"Ghassan El-Baalbaki"},{id:"157420",title:"BSc.",name:"Veronique",surname:"Palardy",slug:"veronique-palardy",fullName:"Veronique Palardy"},{id:"157422",title:"BSc.",name:"Catherine",surname:"Fredette",slug:"catherine-fredette",fullName:"Catherine Fredette"}],corrections:null},{id:"43776",title:"Treatment of Generalized Anxiety Disorders: Unmet Needs",doi:"10.5772/53453",slug:"treatment-of-generalized-anxiety-disorders-unmet-needs",totalDownloads:1990,totalCrossrefCites:0,totalDimensionsCites:1,signatures:"Nesrin Dilbaz and Aslı Enez Darcin",downloadPdfUrl:"/chapter/pdf-download/43776",previewPdfUrl:"/chapter/pdf-preview/43776",authors:[{id:"34728",title:"Dr.",name:"Aslı",surname:"Enez Darcin",slug:"asli-enez-darcin",fullName:"Aslı Enez Darcin"},{id:"159433",title:"Prof.",name:"Nesrin",surname:"Dilbaz",slug:"nesrin-dilbaz",fullName:"Nesrin Dilbaz"}],corrections:null},{id:"43777",title:"Using Hypnosis in the Treatment of Anxiety Disorders: Pros and Cons",doi:"10.5772/53768",slug:"using-hypnosis-in-the-treatment-of-anxiety-disorders-pros-and-cons",totalDownloads:6642,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Catherine Fredette, Ghassan El-Baalbaki, Sylvain Neron and Veronique Palardy",downloadPdfUrl:"/chapter/pdf-download/43777",previewPdfUrl:"/chapter/pdf-preview/43777",authors:[{id:"157412",title:"Prof.",name:"Ghassan",surname:"El-Baalbaki",slug:"ghassan-el-baalbaki",fullName:"Ghassan El-Baalbaki"},{id:"157420",title:"BSc.",name:"Veronique",surname:"Palardy",slug:"veronique-palardy",fullName:"Veronique Palardy"},{id:"157422",title:"BSc.",name:"Catherine",surname:"Fredette",slug:"catherine-fredette",fullName:"Catherine Fredette"},{id:"157546",title:"Prof.",name:"Sylvain",surname:"Neron",slug:"sylvain-neron",fullName:"Sylvain Neron"}],corrections:null},{id:"42069",title:"Current State of the Art in Treatment of Posttraumatic Stress Disorder",doi:"10.5772/54197",slug:"current-state-of-the-art-in-treatment-of-posttraumatic-stress-disorder",totalDownloads:1710,totalCrossrefCites:1,totalDimensionsCites:1,signatures:"Ebru Şalcıoğlu and Metin Başoğlu",downloadPdfUrl:"/chapter/pdf-download/42069",previewPdfUrl:"/chapter/pdf-preview/42069",authors:[{id:"163659",title:"Associate Prof.",name:"Ebru",surname:"Salcioglu",slug:"ebru-salcioglu",fullName:"Ebru Salcioglu"},{id:"166662",title:"Prof.",name:"Metin",surname:"Basoglu",slug:"metin-basoglu",fullName:"Metin Basoglu"}],corrections:null},{id:"43796",title:"PTSD and the Attenuating Effects of Fish Oils: Results of Supplementation After the 2011 Great East Japan Earthquake",doi:"10.5772/52134",slug:"ptsd-and-the-attenuating-effects-of-fish-oils-results-of-supplementation-after-the-2011-great-east-j",totalDownloads:1791,totalCrossrefCites:1,totalDimensionsCites:3,signatures:"Daisuke Nishi, Yuichi Koido, Naoki Nakaya, Toshimasa Sone, Hiroko Noguchi, Kei Hamazaki, Tomohito Hamazaki and Yutaka Matsuoka",downloadPdfUrl:"/chapter/pdf-download/43796",previewPdfUrl:"/chapter/pdf-preview/43796",authors:[{id:"71361",title:"Dr.",name:"Yutaka",surname:"Matsuoka",slug:"yutaka-matsuoka",fullName:"Yutaka Matsuoka"},{id:"119095",title:"Dr.",name:"Daisuke",surname:"Nishi",slug:"daisuke-nishi",fullName:"Daisuke Nishi"}],corrections:null},{id:"41089",title:"New Approaches to the Psychological Treatment of Obsessive- Compulsive Disorder in Adults",doi:"10.5772/53070",slug:"new-approaches-to-the-psychological-treatment-of-obsessive-compulsive-disorder-in-adults",totalDownloads:2266,totalCrossrefCites:2,totalDimensionsCites:3,signatures:"Clare Rees and Rebecca Anderson",downloadPdfUrl:"/chapter/pdf-download/41089",previewPdfUrl:"/chapter/pdf-preview/41089",authors:[{id:"155658",title:"Associate Prof.",name:"Clare",surname:"Rees",slug:"clare-rees",fullName:"Clare Rees"},{id:"159182",title:"Dr.",name:"Rebecca",surname:"Anderson",slug:"rebecca-anderson",fullName:"Rebecca Anderson"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},relatedBooks:[{type:"book",id:"5795",title:"Psychopathy",subtitle:"New Updates on an Old Phenomenon",isOpenForSubmission:!1,hash:"2e33769ff3c930094c4e350ec6a2b6b5",slug:"psychopathy-new-updates-on-an-old-phenomenon",bookSignature:"Federico Durbano",coverURL:"https://cdn.intechopen.com/books/images_new/5795.jpg",editedByType:"Edited by",editors:[{id:"157077",title:"Dr.",name:"Federico",surname:"Durbano",slug:"federico-durbano",fullName:"Federico Durbano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4651",title:"A Fresh Look at Anxiety Disorders",subtitle:null,isOpenForSubmission:!1,hash:"8f18ff3698fbd7584a3da8a3e4916fba",slug:"a-fresh-look-at-anxiety-disorders",bookSignature:"Federico Durbano",coverURL:"https://cdn.intechopen.com/books/images_new/4651.jpg",editedByType:"Edited by",editors:[{id:"157077",title:"Dr.",name:"Federico",surname:"Durbano",slug:"federico-durbano",fullName:"Federico Durbano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5384",title:"New Developments in Anxiety Disorders",subtitle:null,isOpenForSubmission:!1,hash:"c355c8b1bce4b291f916878f12e0ab8a",slug:"new-developments-in-anxiety-disorders",bookSignature:"Federico Durbano and Barbara Marchesi",coverURL:"https://cdn.intechopen.com/books/images_new/5384.jpg",editedByType:"Edited by",editors:[{id:"157077",title:"Dr.",name:"Federico",surname:"Durbano",slug:"federico-durbano",fullName:"Federico Durbano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6493",title:"Psychotic Disorders",subtitle:"An Update",isOpenForSubmission:!1,hash:"10c61c9adb13a7f0780176f556353b2e",slug:"psychotic-disorders-an-update",bookSignature:"Federico Durbano",coverURL:"https://cdn.intechopen.com/books/images_new/6493.jpg",editedByType:"Edited by",editors:[{id:"157077",title:"Dr.",name:"Federico",surname:"Durbano",slug:"federico-durbano",fullName:"Federico Durbano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"727",title:"Mental Illnesses",subtitle:"Understanding, Prediction and Control",isOpenForSubmission:!1,hash:"98d4d0b301f03fef5ef7f830d4afd794",slug:"mental-illnesses-understanding-prediction-and-control",bookSignature:"Luciano L'Abate",coverURL:"https://cdn.intechopen.com/books/images_new/727.jpg",editedByType:"Edited by",editors:[{id:"77359",title:"Prof.",name:"Luciano",surname:"LAbate",slug:"luciano-labate",fullName:"Luciano LAbate"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1928",title:"Psychiatric Disorders",subtitle:"Trends and Developments",isOpenForSubmission:!1,hash:"58065e65714e62f0014093f7bd9f7780",slug:"psychiatric-disorders-trends-and-developments",bookSignature:"Toru Uehara",coverURL:"https://cdn.intechopen.com/books/images_new/1928.jpg",editedByType:"Edited by",editors:[{id:"66206",title:"Dr.",name:"Toru",surname:"Uehara",slug:"toru-uehara",fullName:"Toru Uehara"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2067",title:"Mental Illnesses",subtitle:"Evaluation, Treatments and Implications",isOpenForSubmission:!1,hash:"48554a60d68c6f4ec6cf7b7683a76532",slug:"mental-illnesses-evaluation-treatments-and-implications",bookSignature:"Luciano L'Abate",coverURL:"https://cdn.intechopen.com/books/images_new/2067.jpg",editedByType:"Edited by",editors:[{id:"77359",title:"Prof.",name:"Luciano",surname:"LAbate",slug:"luciano-labate",fullName:"Luciano LAbate"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2707",title:"Diagnostics and Rehabilitation of Parkinson's Disease",subtitle:null,isOpenForSubmission:!1,hash:"d7d5ca2ac3aefd92ecf0c6b9f8dee752",slug:"diagnostics-and-rehabilitation-of-parkinson-s-disease",bookSignature:"Juliana Dushanova",coverURL:"https://cdn.intechopen.com/books/images_new/2707.jpg",editedByType:"Edited by",editors:[{id:"36845",title:"Dr.",name:"Juliana",surname:"Dushanova",slug:"juliana-dushanova",fullName:"Juliana Dushanova"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"438",title:"Etiology and Pathophysiology of Parkinson's Disease",subtitle:null,isOpenForSubmission:!1,hash:"baad4bf7bcb36df5620d9fea1b92bf07",slug:"etiology-and-pathophysiology-of-parkinson-s-disease",bookSignature:"Abdul Qayyum Rana",coverURL:"https://cdn.intechopen.com/books/images_new/438.jpg",editedByType:"Edited by",editors:[{id:"32584",title:"Dr.",name:"Abdul Qayyum",surname:"Rana, Md, Frcpc, Frcp (hon)",slug:"abdul-qayyum-rana-md-frcpc-frcp-(hon)",fullName:"Abdul Qayyum Rana, Md, Frcpc, Frcp (hon)"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"781",title:"Psychiatric Disorders",subtitle:"Worldwide Advances",isOpenForSubmission:!1,hash:"af2ebbd7c226f5779de41f0eab0bc060",slug:"psychiatric-disorders-worldwide-advances",bookSignature:"Toru Uehara",coverURL:"https://cdn.intechopen.com/books/images_new/781.jpg",editedByType:"Edited by",editors:[{id:"66206",title:"Dr.",name:"Toru",surname:"Uehara",slug:"toru-uehara",fullName:"Toru Uehara"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"47331",slug:"correction-to-the-cultural-reinforcers-of-child-abuse",title:"Correction to: The Cultural Reinforcers of Child Abuse",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/47331.pdf",downloadPdfUrl:"/chapter/pdf-download/47331",previewPdfUrl:"/chapter/pdf-preview/47331",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/47331",risUrl:"/chapter/ris/47331",chapter:{id:"37763",slug:"the-cultural-reinforcers-of-child-abuse",signatures:"Essam Al-Shail, Ahmed Hassan, Abdullah Aldowaish and Hoda Kattan",dateSubmitted:"November 8th 2011",dateReviewed:"June 14th 2012",datePrePublished:null,datePublished:"July 11th 2012",book:{id:"2663",title:"Child Abuse and Neglect",subtitle:"A Multidimensional Approach",fullTitle:"Child Abuse and Neglect - A Multidimensional Approach",slug:"child-abuse-and-neglect-a-multidimensional-approach",publishedDate:"July 11th 2012",bookSignature:"Alexander Muela",coverURL:"https://cdn.intechopen.com/books/images_new/2663.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"138437",title:"Dr.",name:"Alexander",middleName:null,surname:"Muela Aparicio",slug:"alexander-muela-aparicio",fullName:"Alexander Muela Aparicio"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"85712",title:"Dr.",name:"Ahmed",middleName:"M.",surname:"Hassan",fullName:"Ahmed Hassan",slug:"ahmed-hassan",email:"amh_64@hotmail.com",position:null,institution:{name:"King Faisal Specialist Hospital & Research Centre",institutionURL:null,country:{name:"Saudi Arabia"}}},{id:"139594",title:"Prof.",name:"Essam",middleName:null,surname:"Al-Shail",fullName:"Essam Al-Shail",slug:"essam-al-shail",email:"shail@kfshrc.edu.sa",position:null,institution:{name:"Alfaisal University",institutionURL:null,country:{name:"Saudi Arabia"}}},{id:"149745",title:"Dr.",name:"Hoda",middleName:null,surname:"Kattan",fullName:"Hoda Kattan",slug:"hoda-kattan",email:"hoda@kfshrc.edu.sa",position:null,institution:null},{id:"149746",title:"Dr.",name:"Abdullah",middleName:null,surname:"Aldowaish",fullName:"Abdullah Aldowaish",slug:"abdullah-aldowaish",email:"dowaish@kfshrc.edu.sa",position:null,institution:null}]}},chapter:{id:"37763",slug:"the-cultural-reinforcers-of-child-abuse",signatures:"Essam Al-Shail, Ahmed Hassan, Abdullah Aldowaish and Hoda Kattan",dateSubmitted:"November 8th 2011",dateReviewed:"June 14th 2012",datePrePublished:null,datePublished:"July 11th 2012",book:{id:"2663",title:"Child Abuse and Neglect",subtitle:"A Multidimensional Approach",fullTitle:"Child Abuse and Neglect - A Multidimensional Approach",slug:"child-abuse-and-neglect-a-multidimensional-approach",publishedDate:"July 11th 2012",bookSignature:"Alexander Muela",coverURL:"https://cdn.intechopen.com/books/images_new/2663.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"138437",title:"Dr.",name:"Alexander",middleName:null,surname:"Muela Aparicio",slug:"alexander-muela-aparicio",fullName:"Alexander Muela Aparicio"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"85712",title:"Dr.",name:"Ahmed",middleName:"M.",surname:"Hassan",fullName:"Ahmed Hassan",slug:"ahmed-hassan",email:"amh_64@hotmail.com",position:null,institution:{name:"King Faisal Specialist Hospital & Research Centre",institutionURL:null,country:{name:"Saudi Arabia"}}},{id:"139594",title:"Prof.",name:"Essam",middleName:null,surname:"Al-Shail",fullName:"Essam Al-Shail",slug:"essam-al-shail",email:"shail@kfshrc.edu.sa",position:null,institution:{name:"Alfaisal University",institutionURL:null,country:{name:"Saudi Arabia"}}},{id:"149745",title:"Dr.",name:"Hoda",middleName:null,surname:"Kattan",fullName:"Hoda Kattan",slug:"hoda-kattan",email:"hoda@kfshrc.edu.sa",position:null,institution:null},{id:"149746",title:"Dr.",name:"Abdullah",middleName:null,surname:"Aldowaish",fullName:"Abdullah Aldowaish",slug:"abdullah-aldowaish",email:"dowaish@kfshrc.edu.sa",position:null,institution:null}]},book:{id:"2663",title:"Child Abuse and Neglect",subtitle:"A Multidimensional Approach",fullTitle:"Child Abuse and Neglect - A Multidimensional Approach",slug:"child-abuse-and-neglect-a-multidimensional-approach",publishedDate:"July 11th 2012",bookSignature:"Alexander Muela",coverURL:"https://cdn.intechopen.com/books/images_new/2663.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"138437",title:"Dr.",name:"Alexander",middleName:null,surname:"Muela Aparicio",slug:"alexander-muela-aparicio",fullName:"Alexander Muela Aparicio"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"10446",leadTitle:null,title:"Water Quality",subtitle:null,reviewType:"peer-reviewed",abstract:"\r\n\tThe search for more modern models and techniques to monitor water quality and improve water treatment techniques is a challenging mission for scientists in the field. This book will present trends and advances in the area of water quality.
\r\n\r\n\tThe areas that this book will integrate are: pollution by metals in water, pollution by hydrocarbons in water, pollution by pesticides in water, pollution by emerging micro-pollutants in water, pollution by microorganisms in water, advances in analytical chemistry in assessing water quality, advances in microbiology in water quality, sediment-water interaction, particulate material and water interaction, effluent water, water biomonitoring, statistical treatment of water quality data, human water supply, wastewater treatment plants, bioremediation, physical-chemical treatments, groundwater pollution, urban river pollution, water and circular economy.
\r\n\r\n\tWith the themes presented, this book aims to provide the reader with a comprehensive overview of the current state of the art in water quality, presenting an adequate and viable path to follow.
",isbn:"978-1-83969-072-3",printIsbn:"978-1-83969-071-6",pdfIsbn:"978-1-83969-073-0",doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!1,hash:"add02f40c29f68a0848e95f7256aa648",bookSignature:"Dr. J. Kevin Summers",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/10446.jpg",keywords:"Metals, Hydrocarbons, Microorganisms, Aquatic Flora and Fauna, Analytical Chemistry, Innovative Methods, Wastewater Treatment Plants, Bioremediation, Mangrove, Saline Water, Groundwater Pollution, Urban River Pollution",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"October 12th 2020",dateEndSecondStepPublish:"November 9th 2020",dateEndThirdStepPublish:"January 8th 2021",dateEndFourthStepPublish:"March 29th 2021",dateEndFifthStepPublish:"May 28th 2021",remainingDaysToSecondStep:"4 months",secondStepPassed:!0,currentStepOfPublishingProcess:4,editedByType:null,kuFlag:!1,biosketch:"Dr. Kevin Summers is a Senior Research Ecologist at the Environmental Protection Agency’s (EPA) Gulf Ecosystem Measurement and Modeling Division. He has authored approximately 150 peer-reviewed journal articles, book chapters, and reports and has received many awards for technical accomplishments from the EPA and outside the agency.",coeditorOneBiosketch:"Doctor in analytical chemistry with practical experience in laboratory work, currently on a position of a coordinator.",coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"197485",title:"Dr.",name:"J. Kevin",middleName:null,surname:"Summers",slug:"j.-kevin-summers",fullName:"J. Kevin Summers",profilePictureURL:"https://mts.intechopen.com/storage/users/197485/images/system/197485.jpg",biography:"Dr. Kevin Summers is a Senior Research Ecologist at the Environmental Protection Agency’s (EPA) Gulf Ecosystem Measurement and Modeling Division. At present, he is working with colleagues in the Sustainable and Healthy Communities Program to develop an index of community resilience to natural hazards, an index of human well-being that can be related to changes in ecosystem, social and economic services, and a community sustainability tool for communities with populations less than 40,000. He leads research efforts for indicator and indices development. Dr. Summers is a systems ecologist and began his career at the EPA in 1989 and has worked in various programs and capacities. This includes leading the National Coastal Assessment in collaboration with the Office of Water culminating in the award-winning National Coastal Condition Report series (four volumes between 2001 and 2012), which integrates water quality, sediment quality, habitat and biological data to assess the ecosystem condition of the estuaries of the United States. He was the acting National Program Director for Ecology for the EPA between 2004 and 2006. He has authored approximately 150 peer-reviewed journal articles, book chapters, and reports and has received many awards for technical accomplishments from the EPA and outside the agency. Dr. Summers holds a BA in Zoology and Psychology, an MA in Ecology and PhD in Systems Ecology/Biology.",institutionString:"U.S. Environmental Protection Agency",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Environmental Protection Agency",institutionURL:null,country:{name:"United States of America"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"11",title:"Engineering",slug:"engineering"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"252211",firstName:"Sara",lastName:"Debeuc",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/252211/images/7239_n.png",email:"sara.d@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"7718",title:"Water Quality",subtitle:"Science, Assessments and Policy",isOpenForSubmission:!1,hash:"c7433952368240a0d55bfdcb148ff89e",slug:"water-quality-science-assessments-and-policy",bookSignature:"Kevin Summers",coverURL:"https://cdn.intechopen.com/books/images_new/7718.jpg",editedByType:"Edited by",editors:[{id:"197485",title:"Dr.",name:"J. Kevin",surname:"Summers",slug:"j.-kevin-summers",fullName:"J. Kevin Summers"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"878",title:"Phytochemicals",subtitle:"A Global Perspective of Their Role in Nutrition and Health",isOpenForSubmission:!1,hash:"ec77671f63975ef2d16192897deb6835",slug:"phytochemicals-a-global-perspective-of-their-role-in-nutrition-and-health",bookSignature:"Venketeshwer Rao",coverURL:"https://cdn.intechopen.com/books/images_new/878.jpg",editedByType:"Edited by",editors:[{id:"82663",title:"Dr.",name:"Venketeshwer",surname:"Rao",slug:"venketeshwer-rao",fullName:"Venketeshwer Rao"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4816",title:"Face Recognition",subtitle:null,isOpenForSubmission:!1,hash:"146063b5359146b7718ea86bad47c8eb",slug:"face_recognition",bookSignature:"Kresimir Delac and Mislav Grgic",coverURL:"https://cdn.intechopen.com/books/images_new/4816.jpg",editedByType:"Edited by",editors:[{id:"528",title:"Dr.",name:"Kresimir",surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"8436",title:"Resonantly Induced Refractive Index Changes in Yb-doped Fibers: the Origin, Properties and Application for All-Fiber Coherent Beam Combining",doi:"10.5772/39553",slug:"resonantly-induced-refractive-index-changes-in-yb-doped-fibers-the-origin-properties-and-application",body:null,keywords:null,chapterPDFUrl:"https://cdn.intechopen.com/pdfs/8436.pdf",chapterXML:null,downloadPdfUrl:"/chapter/pdf-download/8436",previewPdfUrl:"/chapter/pdf-preview/8436",totalDownloads:3092,totalViews:167,totalCrossrefCites:0,totalDimensionsCites:11,hasAltmetrics:0,dateSubmitted:null,dateReviewed:null,datePrePublished:null,datePublished:"February 1st 2010",dateFinished:null,readingETA:"0",abstract:null,reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/8436",risUrl:"/chapter/ris/8436",book:{slug:"frontiers-in-guided-wave-optics-and-optoelectronics"},signatures:"Andrei A. Fotiadi, Oleg L. Antipov and Patrice Mégret",authors:[{id:"4725",title:"Dr.",name:"Andrei",middleName:null,surname:"Fotiadi",fullName:"Andrei Fotiadi",slug:"andrei-fotiadi",email:"Andrei.Fotiadi@fpms.ac.be",position:null,institution:null},{id:"107849",title:"Prof.",name:"Patrice",middleName:null,surname:"Mégret",fullName:"Patrice Mégret",slug:"patrice-megret",email:"patrice.megret@umons.ac.be",position:null,institution:{name:"University of Mons",institutionURL:null,country:{name:"Belgium"}}},{id:"133847",title:"Prof.",name:"Oleg",middleName:null,surname:"Antipov",fullName:"Oleg Antipov",slug:"oleg-antipov",email:"antipov@appl.sci-nnov.ru",position:null,institution:null}],sections:null,chapterReferences:null,footnotes:null,contributors:null,corrections:null},book:{id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,fullTitle:"Frontiers in Guided Wave Optics and Optoelectronics",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",publishedDate:"February 1st 2010",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",licenceType:"CC BY-NC-SA 3.0",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",middleName:"P",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"8425",title:"Frontiers in Guided Wave Optics and Optoelectronics",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",totalDownloads:4536,totalCrossrefCites:2,signatures:"Bishnu Pal",authors:[{id:"4782",title:"Prof.",name:"Bishnu",middleName:"P",surname:"Pal",fullName:"Bishnu Pal",slug:"bishnu-pal"}]},{id:"8426",title:"Application Specific Optical Fibers",slug:"application-specific-optical-fibers",totalDownloads:9629,totalCrossrefCites:0,signatures:"Bishnu P. Pal",authors:[{id:"4782",title:"Prof.",name:"Bishnu",middleName:"P",surname:"Pal",fullName:"Bishnu Pal",slug:"bishnu-pal"}]},{id:"8427",title:"Nonlinear Properties of Chalcogenide Glass Fibers",slug:"nonlinear-properties-of-chalcogenide-glass-fibers",totalDownloads:5001,totalCrossrefCites:3,signatures:"Jas S. Sanghera, L. Brandon Shaw, C. M. Florea, P. Pureza, V. Q. Nguyen, F. Kung, Dan Gibson and I. D. Aggarwal",authors:[{id:"5111",title:"Dr.",name:"Jasbinder",middleName:null,surname:"Sanghera",fullName:"Jasbinder Sanghera",slug:"jasbinder-sanghera"},{id:"133867",title:"Dr.",name:"Brandon",middleName:null,surname:"Shaw",fullName:"Brandon Shaw",slug:"brandon-shaw"},{id:"133868",title:"Dr.",name:"Catalin",middleName:null,surname:"Florea",fullName:"Catalin Florea",slug:"catalin-florea"},{id:"133872",title:"Prof.",name:"Gam",middleName:null,surname:"Nguyen",fullName:"Gam Nguyen",slug:"gam-nguyen"},{id:"133876",title:"Dr.",name:"Ishwar",middleName:null,surname:"Aggarwal",fullName:"Ishwar Aggarwal",slug:"ishwar-aggarwal"}]},{id:"8428",title:"Irradiation Effects in Optical Fibers",slug:"irradiation-effects-in-optical-fibers",totalDownloads:4669,totalCrossrefCites:2,signatures:"Sporea Dan, Agnello Simonpietro and Gelardi Franco Mario",authors:[{id:"5392",title:"Dr.",name:"Dan",middleName:null,surname:"Sporea",fullName:"Dan Sporea",slug:"dan-sporea"},{id:"133835",title:"Prof.",name:"Simonpietro",middleName:null,surname:"Agnello",fullName:"Simonpietro Agnello",slug:"simonpietro-agnello"},{id:"133836",title:"Prof.",name:"Franco Mario",middleName:null,surname:"Gelardi",fullName:"Franco Mario Gelardi",slug:"franco-mario-gelardi"}]},{id:"8429",title:"Programmable All-Fiber Optical Pulse Shaping",slug:"programmable-all-fiber-optical-pulse-shaping",totalDownloads:2744,totalCrossrefCites:0,signatures:"Antonio Malacarne, Saju Thomas, Francesco Fresi, Luca Potì, Antonella Bogoni and Josè Azaña",authors:[{id:"2707",title:"Dr.",name:"Luca",middleName:null,surname:"Poti",fullName:"Luca Poti",slug:"luca-poti"},{id:"4930",title:"Dr.",name:"Antonio",middleName:null,surname:"Malacarne",fullName:"Antonio Malacarne",slug:"antonio-malacarne"},{id:"5391",title:"Dr.",name:"Francesco",middleName:null,surname:"Fresi",fullName:"Francesco Fresi",slug:"francesco-fresi"},{id:"109285",title:"Dr.",name:"Antonella",middleName:null,surname:"Bogoni",fullName:"Antonella Bogoni",slug:"antonella-bogoni"},{id:"133856",title:"Prof.",name:"Thomas",middleName:null,surname:"Saju",fullName:"Thomas Saju",slug:"thomas-saju"},{id:"133858",title:"Prof.",name:"Jose",middleName:null,surname:"Azana",fullName:"Jose Azana",slug:"jose-azana"}]},{id:"8430",title:"Physical Nature of “Slow Light” in Stimulated Brillouin Scattering",slug:"physical-nature-of-slow-light-in-stimulated-brillouin-scattering",totalDownloads:2634,totalCrossrefCites:0,signatures:"Valeri I. Kovalev, Robert G. Harrison and Nadezhda E. Kotova",authors:[{id:"4873",title:"Dr.",name:"Valeri",middleName:null,surname:"Kovalev",fullName:"Valeri Kovalev",slug:"valeri-kovalev"},{id:"133838",title:"Prof.",name:"Robert",middleName:null,surname:"Harrison",fullName:"Robert Harrison",slug:"robert-harrison"}]},{id:"8431",title:"Bismuth-doped Silica Fiber Amplifier",slug:"bismuth-doped-silica-fiber-amplifier",totalDownloads:3329,totalCrossrefCites:1,signatures:"Young-Seok Seo and Yasushi Fujimoto",authors:[{id:"4778",title:"Researcher",name:"Young-Seok",middleName:null,surname:"Seo",fullName:"Young-Seok Seo",slug:"young-seok-seo"},{id:"4885",title:"Dr.",name:"Yasushi",middleName:null,surname:"Fujimoto",fullName:"Yasushi Fujimoto",slug:"yasushi-fujimoto"}]},{id:"8432",title:"Radio-over-Fibre Techniques and Performance",slug:"radio-over-fibre-techniques-and-performance",totalDownloads:6969,totalCrossrefCites:4,signatures:"Roberto Llorente and Marta Beltrán",authors:[{id:"4404",title:"Ms.",name:"Marta",middleName:null,surname:"Beltran",fullName:"Marta Beltran",slug:"marta-beltran"},{id:"16540",title:"Dr.",name:"Roberto",middleName:null,surname:"Llorente",fullName:"Roberto Llorente",slug:"roberto-llorente"}]},{id:"8433",title:"Time-Spectral Visualization of Fundamental Ultrafast Nonlinear-Optical Interactions in Photonic Fibers",slug:"time-spectral-visualization-of-fundamental-ultrafast-nonlinear-optical-interactions-in-photonic-fibe",totalDownloads:2609,totalCrossrefCites:0,signatures:"Anatoly Efimov",authors:[{id:"4545",title:"Dr.",name:"Anatoly",middleName:null,surname:"Efimov",fullName:"Anatoly Efimov",slug:"anatoly-efimov"}]},{id:"8434",title:"Dispersion Compensation Devices",slug:"dispersion-compensation-devices",totalDownloads:8007,totalCrossrefCites:0,signatures:"Lingling Chen, Meng Zhang and Zhigang Zhang",authors:[{id:"4565",title:"Ms.",name:"Lingling",middleName:null,surname:"Chen",fullName:"Lingling Chen",slug:"lingling-chen"},{id:"4773",title:"Professor",name:"Zhigang",middleName:null,surname:"Zhang",fullName:"Zhigang Zhang",slug:"zhigang-zhang"}]},{id:"8435",title:"Photonic Crystal Fibre for Dispersion Controll",slug:"photonic-crystal-fibre-for-dispersion-controll",totalDownloads:4524,totalCrossrefCites:5,signatures:"Zoltán Várallyay and Kunimasa Saitoh",authors:[{id:"4607",title:"Dr.",name:"Zoltan Krisztian",middleName:null,surname:"Varallyay",fullName:"Zoltan Krisztian Varallyay",slug:"zoltan-krisztian-varallyay"},{id:"133834",title:"Prof.",name:"Kunimasa",middleName:null,surname:"Saitoh",fullName:"Kunimasa Saitoh",slug:"kunimasa-saitoh"}]},{id:"8436",title:"Resonantly Induced Refractive Index Changes in Yb-doped Fibers: the Origin, Properties and Application for All-Fiber Coherent Beam Combining",slug:"resonantly-induced-refractive-index-changes-in-yb-doped-fibers-the-origin-properties-and-application",totalDownloads:3092,totalCrossrefCites:0,signatures:"Andrei A. Fotiadi, Oleg L. Antipov and Patrice Mégret",authors:[{id:"4725",title:"Dr.",name:"Andrei",middleName:null,surname:"Fotiadi",fullName:"Andrei Fotiadi",slug:"andrei-fotiadi"},{id:"107849",title:"Prof.",name:"Patrice",middleName:null,surname:"Mégret",fullName:"Patrice Mégret",slug:"patrice-megret"},{id:"133847",title:"Prof.",name:"Oleg",middleName:null,surname:"Antipov",fullName:"Oleg Antipov",slug:"oleg-antipov"}]},{id:"8437",title:"Polarization Coupling of Light and Optoelectronics Devices Based on Periodically Poled Lithium Niobate",slug:"polarization-coupling-of-light-and-optoelectronics-devices-based-on-periodically-poled-lithium-nioba",totalDownloads:2900,totalCrossrefCites:0,signatures:"Xianfeng Chen, Kun Liu, and Jianhong Shi",authors:[{id:"4180",title:"Professor",name:"Xianfeng",middleName:null,surname:"Chen",fullName:"Xianfeng Chen",slug:"xianfeng-chen"},{id:"133851",title:"Prof.",name:"Kun",middleName:null,surname:"Liu",fullName:"Kun Liu",slug:"kun-liu"},{id:"133853",title:"Prof.",name:"Jianhong",middleName:null,surname:"Shi",fullName:"Jianhong Shi",slug:"jianhong-shi"}]},{id:"8438",title:"All-Optical Wavelength-Selective Switch by Intensity Control in Cascaded Interferometers",slug:"all-optical-wavelength-selective-switch-by-intensity-control-in-cascaded-interferometers",totalDownloads:3058,totalCrossrefCites:0,signatures:"Hiroki Kishikawa, Nobuo Goto and Kenta Kimiya",authors:[{id:"4400",title:"Professor",name:"Nobuo",middleName:null,surname:"Goto",fullName:"Nobuo Goto",slug:"nobuo-goto"},{id:"133356",title:"Prof.",name:"Hiroki",middleName:null,surname:"Kishikawa",fullName:"Hiroki Kishikawa",slug:"hiroki-kishikawa"},{id:"133358",title:"Prof.",name:"Kenta",middleName:null,surname:"Kimiya",fullName:"Kenta Kimiya",slug:"kenta-kimiya"}]},{id:"8439",title:"Nonlinear Optics in Doped Silica Glass Integrated Waveguide Structures",slug:"nonlinear-optics-in-doped-silica-glass-integrated-waveguide-structures",totalDownloads:3330,totalCrossrefCites:0,signatures:"David Duchesne, Marcello Ferrera, Luca Razzari, Roberto Morandotti, Brent Little, Sai T. Chu and David J. Moss",authors:[{id:"4405",title:"Dr.",name:"David",middleName:null,surname:"Moss",fullName:"David Moss",slug:"david-moss"},{id:"4783",title:"Dr.",name:"David",middleName:null,surname:"Duchesne",fullName:"David Duchesne",slug:"david-duchesne"},{id:"95840",title:"Dr.",name:"Luca",middleName:null,surname:"Razzari",fullName:"Luca Razzari",slug:"luca-razzari"},{id:"135390",title:"Prof.",name:"Marcello",middleName:null,surname:"Ferrera",fullName:"Marcello Ferrera",slug:"marcello-ferrera"},{id:"135391",title:"Prof.",name:"Roberto",middleName:null,surname:"Morandotti",fullName:"Roberto Morandotti",slug:"roberto-morandotti"},{id:"135392",title:"Prof.",name:"Brent",middleName:null,surname:"Little",fullName:"Brent Little",slug:"brent-little"},{id:"135393",title:"Prof.",name:"Sai",middleName:null,surname:"Chu",fullName:"Sai Chu",slug:"sai-chu"}]},{id:"8440",title:"Advances in Femtosecond Micromachining and Inscription of Micro and Nano Photonic Devices",slug:"advances-in-femtosecond-micromachining-and-inscription-of-micro-and-nano-photonic-devices",totalDownloads:5258,totalCrossrefCites:1,signatures:"Graham N. Smith, Kyriacos Kalli and Kate Sugden",authors:[{id:"4668",title:"Dr.",name:"Graham",middleName:"N",surname:"Smith",fullName:"Graham Smith",slug:"graham-smith"},{id:"133360",title:"Prof.",name:"Kyriacos",middleName:null,surname:"Kalli",fullName:"Kyriacos Kalli",slug:"kyriacos-kalli"},{id:"133361",title:"Prof.",name:"Kate",middleName:null,surname:"Sugden",fullName:"Kate Sugden",slug:"kate-sugden"}]},{id:"8441",title:"Magneto-Optical Devices for Optical Integrated Circuits",slug:"magneto-optical-devices-for-optical-integrated-circuits",totalDownloads:5863,totalCrossrefCites:0,signatures:"Vadym Zayets and Koji Ando",authors:[{id:"4688",title:"Dr.",name:"Vadym",middleName:null,surname:"Zayets",fullName:"Vadym Zayets",slug:"vadym-zayets"},{id:"133363",title:"Prof.",name:"Koji",middleName:null,surname:"Ando",fullName:"Koji Ando",slug:"koji-ando"}]},{id:"8442",title:"Tunable Hollow Optical Waveguide and Its Applications",slug:"tunable-hollow-optical-waveguide-and-its-applications",totalDownloads:3787,totalCrossrefCites:1,signatures:"Mukesh Kumar, Toru Miura, Yasuki Sakurai and Fumio Koyama",authors:[{id:"63461",title:"Dr.",name:"Mukesh",middleName:null,surname:"Kumar",fullName:"Mukesh Kumar",slug:"mukesh-kumar"},{id:"133388",title:"Prof.",name:"Toru",middleName:null,surname:"Miura",fullName:"Toru Miura",slug:"toru-miura"},{id:"133402",title:"Prof.",name:"Yasuki",middleName:null,surname:"Sakurai",fullName:"Yasuki Sakurai",slug:"yasuki-sakurai"},{id:"133404",title:"Prof.",name:"Fumio",middleName:null,surname:"Koyama",fullName:"Fumio Koyama",slug:"fumio-koyama"}]},{id:"8443",title:"Regenerated Fibre Bragg Gratings",slug:"regenerated-fibre-bragg-gratings",totalDownloads:3953,totalCrossrefCites:16,signatures:"John Canning, Somnath Bandyopadhyay, Palas Biswas, Mattias Aslund, Michael Stevenson and Kevin Cook",authors:[{id:"5461",title:"Professor",name:"John",middleName:null,surname:"Canning",fullName:"John Canning",slug:"john-canning"},{id:"133394",title:"Dr.",name:"Somnath",middleName:null,surname:"Bandyopadhyay",fullName:"Somnath Bandyopadhyay",slug:"somnath-bandyopadhyay"},{id:"133395",title:"Prof.",name:"Palas",middleName:null,surname:"Biswas",fullName:"Palas Biswas",slug:"palas-biswas"},{id:"133396",title:"Prof.",name:"Mattias",middleName:null,surname:"Aslund",fullName:"Mattias Aslund",slug:"mattias-aslund"},{id:"133397",title:"Prof.",name:"Michael",middleName:null,surname:"Stevenson",fullName:"Michael Stevenson",slug:"michael-stevenson"},{id:"133400",title:"Prof.",name:"Kevin",middleName:null,surname:"Cook",fullName:"Kevin Cook",slug:"kevin-cook"}]},{id:"8444",title:"Optical Deposition of Carbon Nanotubes for Fiber-based Device Fabrication",slug:"optical-deposition-of-carbon-nanotubes-for-fiber-based-device-fabrication",totalDownloads:3517,totalCrossrefCites:7,signatures:"Ken Kashiwagi and Shinji Yamashita",authors:[{id:"5133",title:"Dr.",name:"Ken",middleName:null,surname:"Kashiwagi",fullName:"Ken Kashiwagi",slug:"ken-kashiwagi"},{id:"38416",title:"Mr.",name:"Shinji",middleName:null,surname:"Yamashita",fullName:"Shinji Yamashita",slug:"shinji-yamashita"}]},{id:"8445",title:"High Power Tunable Tm3+-fiber Lasers and Its Application in Pumping Cr2+:ZnSe Lasers",slug:"high-power-tunable-tm3-fiber-lasers-and-its-application-in-pumping-cr2-znse-lasers",totalDownloads:10121,totalCrossrefCites:0,signatures:"Yulong Tang and Jianqiu Xu",authors:[{id:"5449",title:"Prof.",name:"Jianqiu",middleName:null,surname:"Xu",fullName:"Jianqiu Xu",slug:"jianqiu-xu"},{id:"110808",title:"Dr.",name:"Yulong",middleName:null,surname:"Tang",fullName:"Yulong Tang",slug:"yulong-tang"}]},{id:"8446",title:"2 µm Laser Sources and Their Possible Applications",slug:"2-m-laser-sources-and-their-possible-applications",totalDownloads:11382,totalCrossrefCites:97,signatures:"Karsten Scholle, Samir Lamrini, Philipp Koopmann and Peter Fuhrberg",authors:[{id:"4951",title:"Dr.",name:"Karsten",middleName:null,surname:"Scholle",fullName:"Karsten Scholle",slug:"karsten-scholle"},{id:"133366",title:"Prof.",name:"Samir",middleName:null,surname:"Lamrini",fullName:"Samir Lamrini",slug:"samir-lamrini"},{id:"133370",title:"Prof.",name:"Philipp",middleName:null,surname:"Koopmann",fullName:"Philipp Koopmann",slug:"philipp-koopmann"},{id:"133371",title:"Mr.",name:"Peter",middleName:null,surname:"Fuhrberg",fullName:"Peter Fuhrberg",slug:"peter-fuhrberg"}]},{id:"8447",title:"Designer Laser Resonators based on Amplifying Photonic Crystals",slug:"designer-laser-resonators-based-on-amplifying-photonic-crystals",totalDownloads:3104,totalCrossrefCites:1,signatures:"Alexander Benz, Christoph Deutsch, Gernot Fasching, Karl Unterrainer, Aaron M. Maxwell, Pavel Klang, Werner Schrenk and Gottfried Strasser",authors:[{id:"4537",title:"DI",name:"Alexander",middleName:null,surname:"Benz",fullName:"Alexander Benz",slug:"alexander-benz"},{id:"135394",title:"Prof.",name:"Christoph",middleName:null,surname:"Deutsch",fullName:"Christoph Deutsch",slug:"christoph-deutsch"},{id:"135395",title:"Prof.",name:"Gernot",middleName:null,surname:"Fasching",fullName:"Gernot Fasching",slug:"gernot-fasching"},{id:"135396",title:"Prof.",name:"Karl",middleName:null,surname:"Unterrainer",fullName:"Karl Unterrainer",slug:"karl-unterrainer"},{id:"135397",title:"Prof.",name:"Aaron",middleName:null,surname:"Maxwell",fullName:"Aaron Maxwell",slug:"aaron-maxwell"},{id:"135398",title:"Prof.",name:"Pavel",middleName:null,surname:"Klang",fullName:"Pavel Klang",slug:"pavel-klang"},{id:"135399",title:"Prof.",name:"Werner",middleName:null,surname:"Schrenk",fullName:"Werner Schrenk",slug:"werner-schrenk"},{id:"135400",title:"Prof.",name:"Gottfried",middleName:null,surname:"Strasser",fullName:"Gottfried Strasser",slug:"gottfried-strasser"}]},{id:"8448",title:"High-Power and High Efficiency Yb:YAG Ceramic Laser at Room Temperature",slug:"high-power-and-high-efficiency-yb-yag-ceramic-laser-at-room-temperature",totalDownloads:4151,totalCrossrefCites:1,signatures:"Shinki Nakamura",authors:[{id:"4143",title:"Dr.",name:"Shinki",middleName:null,surname:"Nakamura",fullName:"Shinki Nakamura",slug:"shinki-nakamura"}]},{id:"8449",title:"Polarization Properties of Laser-Diode-Pumped Microchip Nd:YAG Ceramic Lasers",slug:"polarization-properties-of-laser-diode-pumped-microchip-nd-yag-ceramic-lasers",totalDownloads:3140,totalCrossrefCites:0,signatures:"Kenju Otsuka",authors:[{id:"4259",title:"Professor",name:"Kenju",middleName:null,surname:"Otsuka",fullName:"Kenju Otsuka",slug:"kenju-otsuka"}]},{id:"8450",title:"Surface-Emitting Circular Bragg Lasers – A Promising Next-Generation On-Chip Light Source for Optical Communications",slug:"surface-emitting-circular-bragg-lasers-a-promising-next-generation-on-chip-light-source-for-optical-",totalDownloads:2608,totalCrossrefCites:0,signatures:"Xiankai Sun and Amnon Yariv",authors:[{id:"4201",title:"Prof.",name:"Xiankai",middleName:null,surname:"Sun",fullName:"Xiankai Sun",slug:"xiankai-sun"},{id:"122981",title:"Dr.",name:"Amnon",middleName:null,surname:"Yariv",fullName:"Amnon Yariv",slug:"amnon-yariv"}]},{id:"8451",title:"Novel Enabling Technologies for Convergence of Optical and Wireless Access Networks",slug:"novel-enabling-technologies-for-convergence-of-optical-and-wireless-access-networks",totalDownloads:3755,totalCrossrefCites:2,signatures:"Jianjun Yu, Gee-Kung Chang, Zhensheng Jia and Lin Chen",authors:[{id:"8503",title:"Dr.",name:"Jianjun",middleName:null,surname:"Yu",fullName:"Jianjun Yu",slug:"jianjun-yu"},{id:"133376",title:"Prof.",name:"Gee-Kung",middleName:null,surname:"Chang",fullName:"Gee-Kung Chang",slug:"gee-kung-chang"},{id:"133378",title:"Prof.",name:"Zhensheng",middleName:null,surname:"Jia",fullName:"Zhensheng Jia",slug:"zhensheng-jia"},{id:"139599",title:"Prof.",name:"Lin",middleName:null,surname:"Chen",fullName:"Lin Chen",slug:"lin-chen"}]},{id:"8452",title:"Photonic Crystal Multiplexer/Demultiplexer Device for Optical Communications",slug:"photonic-crystal-multiplexer-demultiplexer-device-for-optical-communications",totalDownloads:4744,totalCrossrefCites:3,signatures:"Sahbuddin Shaari and Azliza J. M. Adnan",authors:[{id:"19951",title:"Dr.",name:"Sahbudin",middleName:null,surname:"Shaari",fullName:"Sahbudin Shaari",slug:"sahbudin-shaari"}]},{id:"8453",title:"Improvement Scheme for Directly Modulated Fiber Optical CATV System Performances",slug:"improvement-scheme-for-directly-modulated-fiber-optical-catv-system-performances",totalDownloads:3421,totalCrossrefCites:0,signatures:"Hai-Han Lu, Ching-Hung Chang and Peng-Chun Peng",authors:[{id:"4684",title:"Professor",name:"Hai-Han",middleName:null,surname:"Lu",fullName:"Hai-Han Lu",slug:"hai-han-lu"},{id:"62688",title:"Prof.",name:"Peng-Chun",middleName:null,surname:"Peng",fullName:"Peng-Chun Peng",slug:"peng-chun-peng"}]},{id:"8454",title:"Optical Beam Steering Using a 2D MEMS Scanner",slug:"optical-beam-steering-using-a-2d-mems-scanner",totalDownloads:3561,totalCrossrefCites:0,signatures:"Yves Pétremand, Pierre-André Clerc, Marc Epitaux, Ralf Hauffe, Wilfried Noell and N.F. de Rooij",authors:[{id:"5054",title:"Dr.",name:"Yves",middleName:null,surname:"Petremand",fullName:"Yves Petremand",slug:"yves-petremand"},{id:"135512",title:"Prof.",name:"Pierre-Andre",middleName:null,surname:"Clerc",fullName:"Pierre-Andre Clerc",slug:"pierre-andre-clerc"},{id:"135514",title:"Prof.",name:"Marc",middleName:null,surname:"Epitaux",fullName:"Marc Epitaux",slug:"marc-epitaux"},{id:"135516",title:"Prof.",name:"Ralf",middleName:null,surname:"Hauffe",fullName:"Ralf Hauffe",slug:"ralf-hauffe"},{id:"135518",title:"Prof.",name:"Wilfried",middleName:null,surname:"Noell",fullName:"Wilfried Noell",slug:"wilfried-noell"},{id:"135519",title:"Prof.",name:"N.F.",middleName:null,surname:"De Rooij",fullName:"N.F. De Rooij",slug:"n.f.-de-rooij"}]}]},relatedBooks:[{type:"book",id:"55",title:"Advances in Photodiodes",subtitle:null,isOpenForSubmission:!1,hash:"6cdd5e9ee86489b07d6841bf4e4a2eb7",slug:"advances-in-photodiodes",bookSignature:"Gian Franco Dalla Betta",coverURL:"https://cdn.intechopen.com/books/images_new/55.jpg",editedByType:"Edited by",editors:[{id:"19896",title:"Dr.",name:"Gian-Franco",surname:"Dalla Betta",slug:"gian-franco-dalla-betta",fullName:"Gian-Franco Dalla Betta"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"14333",title:"Spectral Properties of Semiconductor Photodiodes",slug:"spectral-properties-of-semiconductor-photodiodes",signatures:"Terubumi Saito",authors:[{id:"20250",title:"Dr.",name:"Terubumi",middleName:null,surname:"Saito",fullName:"Terubumi Saito",slug:"terubumi-saito"}]},{id:"14334",title:"Noise in Electronic and Photonic Devices",slug:"noise-in-electronic-and-photonic-devices",signatures:"K. K. Ghosh",authors:[{id:"18769",title:"Dr.",name:"K. K.",middleName:null,surname:"Ghosh",fullName:"K. K. Ghosh",slug:"k.-k.-ghosh"}]},{id:"14335",title:"Design of Thin-Film Lateral SOI PIN Photodiodes with up to Tens of GHz Bandwidth",slug:"design-of-thin-film-lateral-soi-pin-photodiodes-with-up-to-tens-of-ghz-bandwidth",signatures:"Aryan Afzalian and Denis Flandre",authors:[{id:"14846",title:"Prof.",name:"Denis",middleName:null,surname:"Flandre",fullName:"Denis Flandre",slug:"denis-flandre"},{id:"16742",title:"Dr.",name:"Aryan",middleName:null,surname:"Afzalian",fullName:"Aryan Afzalian",slug:"aryan-afzalian"}]},{id:"14336",title:"Modeling and Optimization of Three-Dimensional Interdigitated Lateral p-i-n Photodiodes Based on In0.53Ga0.47As Absorbers for Optical Communications",slug:"modeling-and-optimization-of-three-dimensional-interdigitated-lateral-p-i-n-photodiodes-based-on-in0",signatures:"P Susthitha Menon, Abang Annuar Ehsan and Sahbudin Shaari",authors:[{id:"17385",title:"Dr.",name:"P. Susthitha",middleName:null,surname:"Menon",fullName:"P. Susthitha Menon",slug:"p.-susthitha-menon"},{id:"19951",title:"Dr.",name:"Sahbudin",middleName:null,surname:"Shaari",fullName:"Sahbudin Shaari",slug:"sahbudin-shaari"},{id:"19958",title:"Mr.",name:"Abang Annuar",middleName:null,surname:"Ehsan",fullName:"Abang Annuar Ehsan",slug:"abang-annuar-ehsan"}]},{id:"14337",title:"Simulation of Small-pitch High-density Photovoltaic Infrared Focal Plane Arrays",slug:"simulation-of-small-pitch-high-density-photovoltaic-infrared-focal-plane-arrays",signatures:"Mikhail Nikitin, Albina Drugova, Viacheslav Kholodnov and Galina Chekanova",authors:[{id:"16374",title:"Dr.",name:"Mikhail",middleName:null,surname:"Nikitin",fullName:"Mikhail Nikitin",slug:"mikhail-nikitin"},{id:"20223",title:"Dr.",name:"Albina",middleName:null,surname:"Drugova",fullName:"Albina Drugova",slug:"albina-drugova"},{id:"20224",title:"Dr.",name:"Viacheslav",middleName:null,surname:"Kholodnov",fullName:"Viacheslav Kholodnov",slug:"viacheslav-kholodnov"},{id:"20225",title:"Dr.",name:"Galina",middleName:null,surname:"Chekanova",fullName:"Galina Chekanova",slug:"galina-chekanova"}]},{id:"14338",title:"Methodology for Design, Measurements and Characterization of Optical Devices on Integrated Circuits",slug:"methodology-for-design-measurements-and-characterization-of-optical-devices-on-integrated-circuits",signatures:"G. Castillo-Cabrera, J. García-Lamont and M. A. Reyes-Barranca",authors:[null]},{id:"14339",title:"Performance Improvement of CMOS APS Pixels using Photodiode Peripheral Utilization Method",slug:"performance-improvement-of-cmos-aps-pixels-using-photodiode-peripheral-utilization-method",signatures:"Suat U. Ay",authors:[{id:"15982",title:"Dr.",name:"Suat Utku",middleName:null,surname:"Ay",fullName:"Suat Utku Ay",slug:"suat-utku-ay"}]},{id:"14340",title:"Color-Selective CMOS Photodiodes Based on Junction Structures and Process Recipes",slug:"color-selective-cmos-photodiodes-based-on-junction-structures-and-process-recipes",signatures:"Oscal T.-C. Chen and Wei-Jean Liu",authors:[{id:"20047",title:"Dr.",name:"Oscal T.C.",middleName:null,surname:"Chen",fullName:"Oscal T.C. Chen",slug:"oscal-t.c.-chen"},{id:"20597",title:"Dr.",name:"Wei-Jean",middleName:null,surname:"Liu",fullName:"Wei-Jean Liu",slug:"wei-jean-liu"}]},{id:"14341",title:"Extrinsic Evolution of the Stacked Gradient Poly-Homojunction Photodiode Genre",slug:"extrinsic-evolution-of-the-stacked-gradient-poly-homojunction-photodiode-genre",signatures:"Paul V. Jansz and Steven Hinckley",authors:[{id:"15691",title:"Prof.",name:"Steven",middleName:null,surname:"Hinckley",fullName:"Steven Hinckley",slug:"steven-hinckley"},{id:"20757",title:"Mr.",name:"Paul Vernon",middleName:null,surname:"Jansz",fullName:"Paul Vernon Jansz",slug:"paul-vernon-jansz"}]},{id:"14342",title:"Silicon Photodiodes for Low Penetration Depth Beams such as DUV/VUV/EUV Light and Low-Energy Electrons",slug:"silicon-photodiodes-for-low-penetration-depth-beams-such-as-duv-vuv-euv-light-and-low-energy-electro",signatures:"Lis K. Nanver",authors:[{id:"20678",title:"Dr.",name:"Lis K.",middleName:null,surname:"Nanver",fullName:"Lis K. Nanver",slug:"lis-k.-nanver"}]},{id:"14343",title:"Avalanche Photodiodes in Submicron CMOS Technologies for High-Sensitivity Imaging",slug:"avalanche-photodiodes-in-submicron-cmos-technologies-for-high-sensitivity-imaging",signatures:"Gian-Franco Dalla Betta, Lucio Pancheri, David Stoppa, Robert Henderson and Justin Richardson",authors:[{id:"19896",title:"Dr.",name:"Gian-Franco",middleName:null,surname:"Dalla Betta",fullName:"Gian-Franco Dalla Betta",slug:"gian-franco-dalla-betta"},{id:"20288",title:"Dr.",name:"Robert",middleName:null,surname:"Henderson",fullName:"Robert Henderson",slug:"robert-henderson"},{id:"20289",title:"Dr.",name:"Lucio",middleName:null,surname:"Pancheri",fullName:"Lucio Pancheri",slug:"lucio-pancheri"},{id:"20290",title:"Dr.",name:"Justin",middleName:null,surname:"Richardson",fullName:"Justin Richardson",slug:"justin-richardson"},{id:"20291",title:"Dr.",name:"David",middleName:null,surname:"Stoppa",fullName:"David Stoppa",slug:"david-stoppa"}]},{id:"14344",title:"The Use of Avalanche Photodiodes in High Energy Electromagnetic Calorimetry",slug:"the-use-of-avalanche-photodiodes-in-high-energy-electromagnetic-calorimetry",signatures:"Paola La Rocca and Francesco Riggi",authors:[{id:"18197",title:"Dr.",name:"Francesco",middleName:null,surname:"Riggi",fullName:"Francesco Riggi",slug:"francesco-riggi"},{id:"18200",title:"Dr.",name:"Paola",middleName:null,surname:"La Rocca",fullName:"Paola La Rocca",slug:"paola-la-rocca"}]},{id:"14345",title:"Low-Energy Photon Detection with PWO-II Scintillators and Avalanche Photodiodes in Application to High-Energy Gamma-Ray Calorimetry",slug:"low-energy-photon-detection-with-pwo-ii-scintillators-and-avalanche-photodiodes-in-application-to-hi",signatures:"Dmytro Melnychuk and Boguslaw Zwieglinski",authors:[{id:"16818",title:"Dr.",name:"Boguslaw",middleName:null,surname:"Zwieglinski",fullName:"Boguslaw Zwieglinski",slug:"boguslaw-zwieglinski"},{id:"20186",title:"Dr.",name:"Dmytro",middleName:null,surname:"Melnychuk",fullName:"Dmytro Melnychuk",slug:"dmytro-melnychuk"}]},{id:"14346",title:"High-Power RF Uni-Traveling-Carrier Photodiodes (UTC-PDs) and Their Applications",slug:"high-power-rf-uni-traveling-carrier-photodiodes-utc-pds-and-their-applications",signatures:"Tadao Nagatsuma and Hiroshi Ito",authors:[{id:"17943",title:"Dr.",name:"Tadao",middleName:null,surname:"Nagatsuma",fullName:"Tadao Nagatsuma",slug:"tadao-nagatsuma"},{id:"17947",title:"Dr.",name:"Hiroshi",middleName:null,surname:"Ito",fullName:"Hiroshi Ito",slug:"hiroshi-ito"}]},{id:"14347",title:"n-Type β-FeSi2/p-type Si Near-infrared Photodiodes Prepared by Facing-targets Direct-current Sputtering",slug:"n-type-fesi2-p-type-si-near-infrared-photodiodes-prepared-by-facing-targets-direct-current-sputterin",signatures:"Mahmoud Shaban and Tsuyoshi Yoshitake",authors:[{id:"18722",title:"Dr.",name:"Shaban",middleName:null,surname:"Mahmoud",fullName:"Shaban Mahmoud",slug:"shaban-mahmoud"},{id:"18723",title:"Prof.",name:"Tsuyoshi",middleName:null,surname:"Yoshitake",fullName:"Tsuyoshi Yoshitake",slug:"tsuyoshi-yoshitake"}]},{id:"14348",title:"GaN-based Photodiodes on Silicon Substrates",slug:"gan-based-photodiodes-on-silicon-substrates",signatures:"L.S. Chuah and Z. Hassan",authors:[{id:"20352",title:"Dr.",name:"Zainuriah",middleName:null,surname:"Hassan",fullName:"Zainuriah Hassan",slug:"zainuriah-hassan"},{id:"23959",title:"Dr.",name:"Lee Siang",middleName:null,surname:"Chuah",fullName:"Lee Siang Chuah",slug:"lee-siang-chuah"}]},{id:"14349",title:"Gas Source MBE Grown Wavelength Extending InGaAs Photodetectors",slug:"gas-source-mbe-grown-wavelength-extending-ingaas-photodetectors",signatures:"Yong-gang Zhang and Yi Gu",authors:[{id:"16260",title:"Prof.",name:"Yong-Gang",middleName:null,surname:"Zhang",fullName:"Yong-Gang Zhang",slug:"yong-gang-zhang"},{id:"16262",title:"Prof.",name:"Yi",middleName:null,surname:"Gu",fullName:"Yi Gu",slug:"yi-gu"}]},{id:"14350",title:"Use of a-SiC:H Photodiodes in Optical Communications Applications",slug:"use-of-a-sic-h-photodiodes-in-optical-communications-applications",signatures:"P. Louro, M. Vieira, M. A. Vieira, M. Fernandes and J. Costa",authors:[{id:"16640",title:"Prof.",name:"Paula Louro",middleName:null,surname:"Antunes",fullName:"Paula Louro Antunes",slug:"paula-louro-antunes"},{id:"19056",title:"Prof.",name:"Miguel",middleName:null,surname:"Fernandes",fullName:"Miguel Fernandes",slug:"miguel-fernandes"},{id:"19057",title:"Prof.",name:"Manuel",middleName:null,surname:"Vieira",fullName:"Manuel Vieira",slug:"manuel-vieira"},{id:"19058",title:"Prof.",name:"Alessandro",middleName:null,surname:"Fantoni",fullName:"Alessandro Fantoni",slug:"alessandro-fantoni"},{id:"19107",title:"Prof",name:"Manuela",middleName:null,surname:"Vieira",fullName:"Manuela Vieira",slug:"manuela-vieira"},{id:"19108",title:"Prof.",name:"João",middleName:null,surname:"Costa",fullName:"João Costa",slug:"joao-costa"}]},{id:"14351",title:"Three Transducers Embedded into One Single SiC Photodetector: LSP Direct Image Sensor, Optical Amplifier and Demux Device",slug:"three-transducers-embedded-into-one-single-sic-photodetector-lsp-direct-image-sensor-optical-amplifi",signatures:"M. Vieira, P. Louro, M. Fernandes, M. A. Vieira, A. Fantoni and J. Costa",authors:[{id:"16640",title:"Prof.",name:"Paula Louro",middleName:null,surname:"Antunes",fullName:"Paula Louro Antunes",slug:"paula-louro-antunes"},{id:"19056",title:"Prof.",name:"Miguel",middleName:null,surname:"Fernandes",fullName:"Miguel Fernandes",slug:"miguel-fernandes"},{id:"19057",title:"Prof.",name:"Manuel",middleName:null,surname:"Vieira",fullName:"Manuel Vieira",slug:"manuel-vieira"},{id:"19058",title:"Prof.",name:"Alessandro",middleName:null,surname:"Fantoni",fullName:"Alessandro Fantoni",slug:"alessandro-fantoni"},{id:"16788",title:"Prof.",name:"Manuela",middleName:null,surname:"Vieira",fullName:"Manuela Vieira",slug:"manuela-vieira"}]},{id:"14352",title:"InAs Infrared Photodiodes",slug:"inas-infrared-photodiodes",signatures:"Volodymyr Tetyorkin, Andriy Sukach and Andriy Tkachuk",authors:[{id:"16739",title:"Prof.",name:"Volodymyr",middleName:null,surname:"Tetyorkin",fullName:"Volodymyr Tetyorkin",slug:"volodymyr-tetyorkin"},{id:"27482",title:"Prof.",name:"Andriy",middleName:null,surname:"Sukach",fullName:"Andriy Sukach",slug:"andriy-sukach"},{id:"63987",title:"Mr.",name:"Andriy",middleName:null,surname:"Tkachuk",fullName:"Andriy Tkachuk",slug:"andriy-tkachuk"}]},{id:"14353",title:"The InAs Electron Avalanche Photodiode",slug:"the-inas-electron-avalanche-photodiode",signatures:"Andrew R. J. Marshall",authors:[{id:"17149",title:"Dr.",name:"Andrew R.J.",middleName:null,surname:"Marshall",fullName:"Andrew R.J. Marshall",slug:"andrew-r.j.-marshall"}]}]}]},onlineFirst:{chapter:{type:"chapter",id:"75329",title:"Risk Assessment and Automated Anomaly Detection Using a Deep Learning Architecture",doi:"10.5772/intechopen.96209",slug:"risk-assessment-and-automated-anomaly-detection-using-a-deep-learning-architecture",body:'\nRisk-based security is built around the premise that information obtained from observable aspects of human identity and possession and knowledge acquired about hidden aspects of human capability and intent can be intelligently combined to assess to some great extent of accuracy the threat a given individual poses to a security system, be it an airport or a border crossing point (BCP). Then, in turn, associating the estimated level of threat with a measure of risk by factoring in the cost that the assessed threat can represent to the system that is being secured by taking into account the impact and cost a given threat can have on a security system, a risk-based security approach can be designed and implemented, whereby security checks are tailored to be commensurate to the estimated risk each individual may pose, instead of being uniform irrespectively of the risk posed by each individual, as is the case today. Taking into account that less than 5% of all individuals can be a potential security risk, the savings in terms of time required to go through risk-based security systems with speedier tests for the 95% of low to no risk individuals can be significant, waiting times in security lines can be reduced and thus the level of comfort and customer satisfaction be drastically improved.
\nThe concept of risk-based security is founded on the premise that less than 5% of travelers represent a threat to the security of a border crossing point (BCP), it is conceivable that by somehow identifying the risk-free travelers, the security checks for those “trusted” travelers can be relaxed and sped up, leading into lower delays in the security screening systems. By easing off the security checks on the “trusted” 95% of travelers, the security screening process can focus on the potentially “suspicious” 5% of travelers, thus increasing the odds of identifying them more efficiently.
\nThe concept of risk-based security is indeed promising in terms of improving travelers’ experience by easing off security screening and reducing the overall time required to spend at a security check-point. However, the difficulty in implementing a risk-based security systems lies on: (a) developing and implementing non-intrusive, GDPR1 compliant technology and systems that can estimate the risk level of each traveler without inducing additional and cumulative delays; (b) testing such systems before rolling them out in operational environments; and (c) estimate their performance and efficacy under ideal conditions for obtaining performance bounds, calculating the cost of the required investment for implementing risk-based technologies; and (d) calculate the degradation in performance when moving away from the “ideal” operational conditions into realistic operational conditions.
\nThe European Union (EU) and other international organizations promote this approach through various initiatives. The European Commission (EC) issued the “Smart Borders package” which aims to modernize the Schengen area’s external border management by improving the quality and efficiency of border crossing processes through the establishment of ‘Stronger and Smarter Information Systems for Borders and Security’ [1]. The International Air Transport Association (IATA) proposed a Checkpoint of the Future, designed to enhance security while reducing queues and intrusive searches at airports by using intelligence-driven risk-based measures [2]. Along these lines the EC funded the Research and Innovation project FLYSEC [3] has developed and demonstrated an innovative, integrated, and end-to-end airport security system facilitating risk-based screening with the introduction of novel intelligent technologies.
\nThis chapter discusses a model of risk-based security developed over a number of EU funded projects, highlights the need to using simulation in assessing the efficacy of risk-based security technologies and protocols, and elaborates on the use of AI and deep learning algorithms for assessing the perceived risk for each traveler based on observable behavioral indicators (parameters), while factoring in information acquired from various sources about hidden behavioral parameters.
\n\nFigure 1 shows a today’s conventional security check point whereby we distinguish two types of checks: (a) the “normal” check where all individuals in the security check area are treated uniformly by applying the same level of security for all; and (b) the “increased” security check point where travelers are channeled if they fail at normal security check point. It should be pointed out that in this security system of check points, currently implemented almost worldwide, the “increase inspection” is usually the outcome of randomized selection of travelers to be subjected to an increased level of inspection and is usually based on the principle of “importance sampling2” methods. These methods try to detect a probabilistic event, such as the existence of a suspect among travelers, with a certain degree of confidence by taking into account the probability of existence of such an event and possibly the range of values the event can assume. These methods are “blind,” that it they draw samples from the distribution indiscriminately and without takin into account any specific attributes of the samples, and thus, they are also GDPR compliant. As it will be pointed out further down in the chapter, risk-based methods need to pay special attention to comply with GDPR as they gather and use information and knowledge about individuals’ private data such as identity, possession, capability, and intent.
\nToday’s security check-point concept (curtesy of TRESSPASS).
Risk-based security associates the estimated risk for each traveler with a commensurate level of security scrutiny. Using prior information about each traveler and sensory data obtained while the traveler is within the security perimeter of a monitored area, a risk-based security system assigns a risk factor to each traveler and depending on the value of the risk factor, the traveler is mapped to a level of security scrutiny commensurate with the perceived risk. Although different number of levels can be associated with the estimated risk, for practical reasons, it is sufficient to associate the entire range of risk values into three different levels of security, Trusted/Registered (Green), Casual (Yellow) and Enhanced Security (Red), as shown in Figure 2 [5].
\nAssociation of three security scrutiny levels, namely “enhanced security,” “casual traveler,” and “trusted/registered” with the estimated level of risk for each traveler. These three levels have been introduced in the FLYSEC project [3] and carried over to the TRESSPASS project [4].
In Figure 2,3\n,\n4 a number of GDPR-compliant technologies that can be used for and contribute to the risk assessment are shown in and include: mobile app way finding; dynamic travelers flow management; intelligent visual surveillance; Wi-Fi/Bluetooth localization; RFID mobile tracking; and behavioral analysis & risk-based security personnel mobile app.
\n\nFigure 3 represents a risk-based security check point that results from combining the three-level risk-based security screening of Figure 2 with the conventional security screening of Figure 1. As it can been seen from Figure 3, the need for assessing each traveler’s risk factor from various observable parameters requires measuring somehow these parameters, of course in a GDPR compliant way, and thus additional processing steps and capabilities that may induce additional delays in screening process. Thus, the fundamental premise of risk-based security as a means of providing the same, at least, level of security as conventional check points without inducing additional delays, seems to be in conflict with the additional delay induced by additional screening tests required for estimating each traveler’ risk index, unless the risk assessment process is done transparently while the travelers move from the entry to exit points in a BCP (Border Crossing Point).
\nRisk-based security check point: The standard (randomized scrutiny checks) security check point of Figure 2, has been modified by introducing a three-level risk assessment process prior to the security scrutiny resulting in three different security scrutiny levels at the security screening check point (reference).
\nFigures 4 and 5 depict two block diagrams implementing the conventional security screening process of Figure 1 and the risk-based security screening process of Figure 3 respectively. From the two diagrams it is clear that additional screening stages are required for assessing the risk for each traveler in risk-based security. Each one of these additional risk assessing stages induce additional delays in the security screening process, that add up to an overall additional time required for risk-based security screening compared to the time required for security screening through a conventional security check point.
\nConfiguration 1 (current BCP implementation).
Configuration 2 (risk-based BCP implementation).
Thus, it appears that risk-based security may require additional processing time for estimating risk that may offset the benefits from faster security screening for those travelers whose estimated risk classifies them in either the “trusted/registered traveler” or “casual travelers” categories for whom security screening is relaxed and thus faster than the time would be required to screen them in today’s conventional check points of Figure 1. Granted that over 90% of travelers fall within these two categories and will experience reduced delays at security screening, it remains to determine if the aggregate benefits from the reduced security screening at check points will trade off positively against the additional delays induced by the additional screening points for determining each traveler’s risk as in Figure 5.
\nIn order to quantify the cost–benefit trade-offs between the efficiency of a risk-based security BCP and the delay induced by additional checks required for assessing risk, the following experiment was conducted using Fraunhofer’s FhG BCP Monte-Carlo agent-based simulator of a BCP configuration (curtesy of Fraunhofer Institute) [4].
\nFor the simulation, we assumed a BCP with 1000 travelers, some exhibiting normal (no risky) behavior, whereas the rest exhibit suspicious behavior, with the following parameters:
Distribution of traveler types: [Normal, Suspicious]: [0.9,0.1]
Alarm threshold for each component: 0.5
Risk calculation: According to the script below:
Effectiveness calculation:
\n
Ran over 10000 iteration with 100 travelers each time for both the configurations.
Using the above script for generating travelers with the above choice of parameters, 10.000 iterations with 100 travelers each time were run for each one of the two configurations of Figures 4 and 5, and the effectiveness (as defined above) of each configuration was calculated. The results regarding the effectiveness (as defined above) of each configuration are qualitatively summarized schematically in the graph of Figure 6.
\nEffectiveness calculation of a conventional BCP with random security checks determined by importance sampling versus risk-based BCP configuration: Effectiveness increases with the use of risk-based security in a BCP.
Figure 6 demonstrates the increase in effectiveness achieved by risk-based security in a BCP using the FhG simulator. The effectiveness of the BCR risk-based configuration 2 clearly surpasses that of the conventional BCT configuration 1. However, the diagram in Figures 6 and 7 does not include the delays induced by the additional security check stages of the risk-based BSP configuration in Figure 5. If we consider these delays, then the operating point of the risk-based BCP not only does it move to higher efficiency but also to higher delays, as Figure 7 clearly demonstrates.
\nFrom Figure 7 it is clear that there is a competing mechanism between effectiveness (another way of stating “comfort”) and delay induced by a risk-based security BCP versus a conventional BCP with randomized tests based on the theory of importance sampling5. The aim of the two EU-funded projects FLYSEC and TRESSPASS, coordinated by the author, is for FLYSEC to: (a) demonstrate that there is technology available or can be developed to implement risk-based security in a GDPR compliant way; (b) provide solid evidence of the risk-based security screening as an effective and non-instructive means of providing security with convenience to travelers; and for TRESSPASS to: (c) provide a comprehensive risk-assessment framework for calculating risk systematically in accordance with the TRESSPASS multi threat, multimodal that includes all four tiers of the access model, i.e.
measures undertaken with third countries or service providers;
cooperation with neighboring countries;
border control and counter-smuggling measures;
control measures within the area of free move,
Effectiveness calculation of a conventional BCP with random security checks determined by importance sampling versus risk-based BCP configuration taking into consideration the additional delays induced by the additional risk assessment stages in configuration 2: Effectiveness increases with the use of risk-based security in a BCP, while induced delays increase as well.
by taking into account estimates and information about.
\n\nObservable aspects of travelers’ behaviors, i.e.:\n
\nIdentity: specific people of which we know that they cause, or will not cause, a threat;
\nPossession: assets that we know that can be used to generate a threat, e.g. explosives; and.
\n\nHidden aspects of travelers’ behaviors, such as:
\nCapability: people with specific skills with which they can, generate a threat;
\nIntent: people that have an intent from which a threat can be derived as depicted in Figures 8 and 9.
\nMulti-modal, multi-tier TRESSPASS risk-assessment model.
Observable and hidden risk factors.
Thus, the aim of the two funded projects, namely FLYSEC and TRESSPASS, is to provide solid evidence and the means for moving the operating point (OP) of a risk-based BCP from the delay induced OP to the no-delay induced OP, or as close to it as possible without inconveniencing travelers and in a GDPR compliant way, as shown in Figure 10.
\nMoving the operating point of a risk-based BCP to minimizing security check delays is the objective of both FLYSEC and TRESSPASS EU-funded projects.
The greatest challenge in risk-based border management is the estimation of the risk for each individual traveler. In TRESSPASS, a framework for modeling risk and a systematic approach of quantifying risk are proposed as follows:
Risk indicators are accurately estimated from available data collected from background information.
The risk for each traveler is calculated.
Based on risk, the system adjusts the number and types of security checks required for each traveler, in order to maintain a desired security level while optimizing the security system performance in terms of efficiency, traveler satisfaction and operational cost reduction.
\nFigure 11 summarizes in a comprehensive visual depiction the risk-based framework used in TRESSPASS [4], and previously introduced in FLYSEC [3]. The framework for risk-based security consists of an extensive use of technologies to estimate risk from both Observable and Hidden risk indicators across all four security tiers and heavily tested, both in vivo and in vitro through simulation, in carefully designed pilots across all three BCP modalities: air, land and sea.
\nTRESSPASS comprehensive risk-based security framework.
Use of simulation in designing, testing, and assessing risk-based security
\nParamount to the design and testing alternative designs of risk-based security concepts, technologies and protocols, in order to achieve the increase in effectiveness of BCPs with the parallel reduction of delays, is the use of simulation. iCrowd is an agent-based simulator that can be used to implement and test different risk-based concepts and technologies in a flexible and realistic simulation environment [6]. Figures 12 and 13 show a photo-realistic virtual reconstruction of an airport used extensively in simulating security scenarios and policies for a variety of projects and pilot use-cases.
\nPhoto-realistic, agent-based simulation using iCrowd.
Queue lanes in a risk-based security checking system: Photo-realistic simulation provided by iCrowd.
The iCrowd Simulator is an agent-based simulation platform capable of handling small-scale to large-scale crowds and calculating the change of the status of each participating component depending on dynamic interactions with other entities or the environment during simulation time [7, 8]. It can be utilized in any bounded area, i.e. building interiors and exteriors, stadiums, or any exterior area e.g. public places like squares, open-air festival etc. Currently, it is being used to simulate crowd movement and crowd interactions in general, with the graphical display being optional. As an agent-based simulation platform, different parameters for each agent can be considered, such as physical, emotional, vital characteristics regarding the crowd that will be observed (i.e. stress levels, health status), object/obstacle parameters and also environmental parameters that can affect the final solution of each simulated scenario performed.
\niCrowd offers a fully operational flow simulation for travelers and personnel inside an airport, as displayed in Figures 12 and 13. It enables the user to define simulation scenarios, it is implementing a sophisticated crowd engine with collision avoidance6 with multiple, different behaviors that can co-exist inside the same simulation. It also supports distributed simulations, operating as an orchestrator. It has been integrated with the C2 Web Portal OCULUS Air to communicate data, such as displaying the position and the movement of simulated entities in real time, and the Fusion and Ingestion Server to update travelers’ status accordingly depending on their interactions with the airport’s hardware and other security technologies (i.e. Beacons, RFID scanners and RFID tags for carry-on luggage tracking), Figure 14(a)–(d).
\n(a): Aspect of third-person camera. (b): Path planning example: The green line indicates the path the selected agent (displayed are red) is following (c): Travelers enter the airport. The display of hold and hand luggage is turned on. (d): Travelers go through the check-ins. The display of hold and hand luggage is turned on.
This section of the chapter presents and discusses implementable means for assessing risk without inducing additional delays beyond what passengers experience with today’s screening process, but instead reduce the time it takes to go through the security screening process by adjusting the level scrutiny in accordance to the perceived risk.
\nIf passenger trajectories at an airport, or any BCP by the same token, could be tracked from the moment they enter the airport or the BCP in general, one could conceivably be able to differentiate suspicious looking trajectories from trajectories that would be expected for a passenger and thus classified as normal. Differentiating, however, between normal and abnormal behaviors may be a difficult proposition by itself, let alone that it should be done in accordance with privacy and GDPR regulations.
\nIn the work presented in [9, 10], those two issues were addressed as follows. To develop a privacy and GDPR compliant tracking method, we assumed that passengers are tracked using overhead cameras that identify passengers as point targets from their top-down footprints (silhouettes); the footprints are reduced to a point for each passenger and are tracked across the entire airport area or BCP. In the initial phase of the study in [9, 10], it was assumed that passengers tracking was perfect, i.e. that all passengers’ traces as they moved around the airport or BCP area are (anonymously) identifiable and traceable. i.e. that the tracking system has perfect knowledge of the position of each passenger at any time. Although the assumption of perfect knowledge is idealistic, it allows us to get upper bounds on the performance of the tracking system that can be used to make trade off calculations between cost of investment on cameras infrastructure versus the (theoretically) achievable accuracy of the risk calculation.
\nThe difficulty in risk assessment based on trajectories stems from the difficulty in defining what constitutes an abnormal behavior and how it can analytically be described. In the approach in [9, 10] this has been overcome by defining what constitutes a normal (expected) behavior, training the AI (Artificial Intelligence) system to recognize normal behavior and test it with abnormal behaviors to reflect loitering, jittering, and other deviations from expected “normal” behaviors.
\n\nFigure 14(a) through (d) are snap shots from the native visualizer of the iCrowd simulator simulating an anomaly detection mechanism based on travelers’ tracking AI algorithm based on a Recursive Neural Network (RNN) [9, 10]. As discussed above, we assumed that travelers can be tracked anonymously using top-down view cameras in compliance with GDPR and ethics regulations. Based on a model of what constitutes a normal traveler route (trajectory) in an airport (or similarly any other BCP), a convolutional recursive neural network was trained with “normal trajectories” generated by the iCrowd simulator. Once the RNN is trained with “normal trajectories,” travelers with “suspicious behaviors” are generated among travelers with “normal behaviors” and the algorithm is tested if it could detect the “suspicious trajectories.” In Figure 14(b), the traveler with suspicious behavior is color-coded red. The risk assessment algorithm detects and identifies the suspicious traveler in Figure 14(d).
\nA complete technical description of the anomaly detection algorithm is given in the references [9, 10]. Next, we summarize the results in [9, 10] in order to demonstrate the possibility of implementing a risk-based security system that monitors traveler risk continually without additional delays that can offset the benefits of the risk-based approach.
\nThe evaluation of the risk assessment system of [9, 10] is done using the Precision-Recall (PR) diagram, the Receiver Operating Characteristic (ROC) curve, the Confusion Matrix, the F1-score and the Total Accuracy, as defined next:
Precision = (# of true suspicious behaviors detected)/(# of total labeled suspicious behaviors)
Recall = (# of true suspicious behaviors detected)/(# of total suspicious behaviors)
Receiver Operating Characteristic (ROC) curve = Probability of detection versus false alarm probability diagram
Confusion Matrix = Normal versus abnormal confusion matrix
F1-score = 2*[(Precision * Recall)/[Precision + Recall] which is the harmonic average of Precision and Recall.
Total Accuracy = (# of Total Assessments)/(# of Total Cases)
\nFigures 15–17 illustrate the PR diagram, the ROC curve and the Confusion Matrix respectively. Eqs. 6 and 7 calculate F1-score and Total Accuracy respectively. It should be reminded that the values of all evaluation metrics are defined within the interval [0, 1]. The closer to 1 a value lies, the better the achieved performance. Table 1 summarizes the values of the recruited evaluation measures. The threshold score derived by the RNN architecture, by maximizing F1-score, is 3.7.
\nPrecision-recall diagram.
ROC curve.
Confusion matrix.
Measure | \nValue | \n
---|---|
Average PR score | \n0.66 | \n
ROC AUC (Area Under Curve) | \n0.97 | \n
F1-Score | \n0.78 | \n
Total Accuracy | \n0.99 | \n
Values of the recruited evaluation measures.
Furthermore, the F1 score (i.e. the harmonic average between Precision and Recall, Eq. (1)), along with the Total Accuracy, Eq. (2), the ROC AUC (Area Under Curve), and Average PR score, are calculated in Table 1,
\nMost of the false negatives are abnormal trajectories that cannot easily be discriminated from the normal even by a human operator. Soft thresholding could be used in order to raise alerts for a human supervisor. On the other hand, the main reason for the false positives is the fact that airport travelers chose to move in ways that may not necessarily be similar to the normal trajectories. Large airport congestions make the aforementioned phenomenon even more intense.
\nAlthough the conditions the risk assessment algorithm was evaluated under assumed perfect knowledge of the traveler trajectories, relaxation of the assumption of perfect knowledge of the traveler trajectories by injecting noise in the position accuracy and/or assuming missing position data, did not have a considerable negative effect on the detection of abnormal trajectories as discussed next.
\nIn order to assess the performance of the anomaly detection algorithm in realistic conditions we introduce noise in the data to emulate the uncertainty in passengers’ positions reports. The “noisy data” emulate the inaccuracy in the reports of the positions of the people in the space. Under realistic conditions, the tracking and risk assessment system will receive data from inaccurate sources, such as cameras, sensors, etc. used to estimate distances, mobile signal strength, etc.
\nIn stark contrast, the iCrowd emulator produces people and their movements, and periodically reports the exact ones (so without noise) their positions in the risk assessment system. During the preprocessing of this data the possibility of the system to add Gaussian noise, the “volume” of which (parameter σ2 of Gaussian noise) is given by the user. This is obviously not intended to never be used in real application, and exists only for experimentation. For examining the behavior of the system under realistic conditions is required noisily data of different intensity.
\nNoise can enter the system in 2 cases: during training and during testing or actual application. It is known that when training any neural network, it is good to have variety in the data in which the network is exposed so that it is not over-trained. So, it is expected that training with Noisy data can improve the overall performance of the system. During testing or the actual implementation of the system would definitely be better to have perfect data, but unfortunately this is often impossible. In the context of the internship training and validation data were performed with Gaussian noise with σ2 from 0 to 1.9 with step 0.1, testing data with corresponding noise levels, and for each combination they were trained and evaluation of the neural network, and metrics were calculated for each of them. The metrics used were the Receiver Operating Characteristic curve (ROC curve), the Precision-Recall curve (PR curve), and the corresponding Area Under Curve (AUC) scores. These metrics give similar results, in the sense that they are defined in [0,1] with value range [0,1], so the minimum AUC value is 0 and the maximum is 1. Higher value means better true positive and true negative to false positive and false negative ratio. The two metrics generally return similar results, but in our case more weight is given in metric PR, as it offers a better estimate in cases that interest us more the positive class of results, or the results consist of significantly more elements of one of the two classes. Both features apply in the case of this risk assessment system.
\nDuring the experiment, networks emerged that failed to find an acceptable solution to why either they were trapped in a local minimum or they encountered the phenomenon of exploding gradient. These cases appeared to be random and independent of the parameters noise, so the network was initialized differently and the training started from the beginning. The experiments were performed using 3 levels of congestion in space, low, moderate, and high, and for each of them 40 neural networks were created, one for each training/testing noise combination mentioned above. For every desired network, 4 independent trainings were conducted and the averages of metrics of interest were kept. The same test data, corresponding to low-to-medium congestion, were used for testing all tested models. The final results are presented below (Figures 18–20):
\nTraining with low congestions data with different noise levels. Testing with low-to-medium congestion data.
Training with medium congestions data with different noise levels. Testing with low-to-medium congestion data.
Training with high congestions data with different noise levels. Testing with low-to-medium congestion data.
From the ROC AUC score graphs above, it is seen that the models that result in the highest performance correspond to the following noise level in the training data:
\nFor low noise data, the best performing data with AUC = 0.91 corresponds to noise level σ2 = 0.8 in the training data.
\nFor medium noise data, the best performing data with AUC = 0.96 corresponds to noise level σ2 = 1.6 in the training data.
\nFor high noise data, the best performing data with AUC = 0.95 corresponds to noise level σ2 = 1.4 in the training data.
\nFrom the above results it is clear that the performance of the networks remains constant when we apply noise to the test data. This implies that, since training completed, the network remains robust and is not affected by data noise, so it can to be used in a real application. Of particular interest are variations that occur when present noise in education data. As mentioned above, training a neuron network usually benefits from the difference in training data, as it helps learn the patterns that appear in the data instead of the data itself. This obviously does not mean that the more noise the better. In every network and for every application there is some optimal noise level that offers the best performance. At cases with low and moderate congestion it seems that the Gaussian noise with σ2 ∼ 0.5–0.8 has the best performance, while for high congestion the training with noise performs better with σ2 ∼ 1.4. The variance has not yet been attributed to any of its specific features network, model, training method, or data.
\nThe evaluation results from the performance of the risk assessment algorithm with the iCrowd simulator demonstrates that risk assessment can be done accurately and without necessarily inducing additional delays in the security screening process since the trajectory classification in normal or suspicious is done by overhead cameras while the travelers go about their normal check-in routine at the airport. To that extent, the proposed risk assessment method based on anomaly detection on traveler trajectories can be used to improve the security screening effectiveness while keeping the delay low (or moving the operating point in Figure 10 from high delay to low.).
\nFurthermore, the proposed method can be used as a financial investment tool for estimating the cost of acquiring the necessary equipment (in this case overhead cameras) for a certain level (probability of accuracy) before purchasing it, and for performing a trade-off analysis between the cost of acquisition of the necessary equipment and the expected performance improvement in risk assessment. This way, the risk assessment simulator allows to be used as a cost–benefit tool for the analysis of performance of a risk-based security system.
\nIn its current form, the work in [9, 10] uses the time series of the coordinates of the trajectories of airport travelers for deep learning. In the future, additional features could be exploited. Such features are the velocity, acceleration and heading of the traveler. Moreover, alternative deep learning architectures could be tested such as the ones that account for contextual anomalies [11]. Furthermore, experiments on real-world data of human trajectories should be conducted. Such data are expected to contain more subtle and sophisticated anomalies. Finally, procedures that degrade data quality and emulate more realistic operational conditions are being implemented in order to test our system in the artificial presence of missing data, noisy data, data association issues, as is the case with data capturing devices operating under realistic operational condtions. Nevertheless, the present work and framework allow security investment decisions on tracking devices and infrastructure to be made by assessing the effectiveness of such an investment through the proposed risk assessment method that envelops the performance of any such system from above by considering ideal tracking conditions through perfect knowledge of all agents’ location. The proposed method and framework is currently being extended to cover other border security modalities, such as sea, land as well as multimodal crossing points in the context of the EU-funded TRESSPASS project [4].
\nIn conclusion, a deep learning architecture for real-time risk assessment based on the trajectories of airport travelers as proposed in [9, 10] can be used for assessing risk without interrupting or delaying the flow of passengers at an airport or BCP at large. The architecture implements a deep RNN network and is fully automated. Thus, it is expected to be of great use to the human operators monitoring airport surveillance footages, reducing the potential errors and misjudges. The proposed risk assessment system is tested on a realistic, synthetic data set generated with the iCrowd simulator tailored to data sets representing traveler movements at the Luxembourg airport; however, any airport or BCP could have been modeled and used instead. The experimental results are very promising and they indicate that further security improvements at airport control points are achievable through risk assessment without inducing additional delays. This is due to the fact that the suspicious behavior threshold, derived by the deep learning procedure in [9, 10], lies at such a level so as to capture the malicious behavior while, at the same time, reducing false-positive alerts.
\nIn [3] a GDPR compliant, mobile application was developed to allow security personnel on the floor of an airport, or any BCP, report in real time and with full respect to passengers’ anonymity, suspicious behaviors, such as nervousness, unjustifiable sweating, etc., while passengers stand in security check lines. The mobile app works in conjunction with Smart Queue, another enabler of risk-based security [5]. Smart Queue is system that works in conjunction with passengers’ ID documents; the system scans the passengers’ ID document upon their arrival at the airport, or entry in the BCP, and in any subsequent security queue. This way, Smart Queue not only does it count the number of passengers at a queue waiting to go through security screening, but knows in which position in the queue each passenger stands. This way, the security personnel that uses the security mobile app, needs to identify passengers only by their indexing number in the line they stand when reporting to the risk assessment back office system any suspicious behaviors about them. This way, anonymity of passengers and their personal data protection are maintained by the security mobile app. The information sent this way by the security personnel on the floor is then fused along with all other risk assessment reports about each passenger and the risk estimate is updated. The risk is reported to the security screening system and the passenger is classified in one of the three risk categories, namely green, yellow or red, as mentioned earlier.
\nIn FLYSEC [3], a novel system architecture for Security and Safety surveillance systems that aims to identify adverse events or behaviors which may endanger the safety of people or their well-being has been introduced [12]. Through proper adaptations the system is applicable to a variety of monitoring systems for various critical infrastructures, border crossing points, and other places of interest (e.g., malls, mass transport systems). The proposed architecture depicts an Internet of Things (IoT) platform which comprises a sensing tier, a back – end processing and intelligence tier and a front end for visualization and user feedback tier. In further monitor and surveillance is performed mainly on the back – end intelligence component which consists of two modules: (a) the event detection module combined with a data fusion component responsible for the fusion of the sensors inputs along with relevant high level metadata, which are pre-defined features that are correlated with a suspicious event, (b) an adaptive learning module which takes inputs from security personnel about the correctness of the detected events, and uses it in order to properly parameterize the event detection algorithm. Moreover, a statistical and stochastic analysis component is incorporated which is responsible for specifying the appropriate features to be used by the event detection module. Statistical analysis estimates the correlations between the features employed in the study, while stochastic analysis is used for the estimation of dependencies between the features and the achieved system performance.
\nThe system architecture is organized basically in three tiers: Sensing components, back–end components, and front – end devices. The sensing components are responsible for acquiring input which is either high or low level heterogeneous data coming from visual sensors (CCD, IR, etc.), biometric sensors (fingerprints, other), audio sensors (microphones), indoor localization equipment (Wi-Fi, beacons, RFID scanners, etc.), document scanners which provide information about visitors (for example travel documents in an airport, or purchase information recorded on personal discount electronic cards), or human reports via terminal devices (e.g. PDAs, mobile phones, tablets, etc.).
\nFront–end devices are responsible for visualizing information to end–users and assisting their operations (for example official authorities receiving information about detected incidents of great interest, or visitors getting navigation information inside an infrastructure, etc.). Front–end devices consist of official management terminal tools which manage the information collected and processed by the back–end and sensing components and assist personnel operations by providing alerts and notifications about significant events (Figure 21), visualizations of infrastructure’s layout along with real – time updates about essential points of interest (for example size of queues, sensors viability, crowd distribution, etc.) (Figure 22). Moreover, front – end devices include also mobile user devices which operate as a personal assistant to passengers at an airport or a BCP. These mobile devices may provide online and offline services regarding indoor navigation, recommendation services (for products, point of interests, etc.), notifications and alerts. Finally, via these devices each user may provide a feedback to the system about requests or reports, about incidents that may concern their safety, or public security, or interactions with the system in the context of system automatic personal servicing.
\n\nFlySec portal: - intelligent services visualization (upper); − automatic passenger classification (lower).
FlySec portal - layout visualization.
Reference architecture of the FLYSEC security and safety risk-assessment surveillance system.
Back-end intelligence system architecture.
Flow of data from sensors to the cloud or terminal devices.
The adaptive learning management system architecture.
Online ALMS.
The back–end component contains the intelligence modules which process the input coming from sensing devices and produce high level intelligence and metadata which assist operational personnel, enhance end–users’ experience and content management services. These metadata are used either for further processing by fusion algorithms, or presented to end – devices via visualization methods on each end–device. Such metadata concerns directed paths for navigation services, fused high level visual information, or information regarding recommendations, detected incidents or notifications and alerts. Finally, the content management services enable efficient data storing and retrieving operations in a scalable way. The back – end component comprises a Message-oriented middleware in order to interconnect all the sensing and processing component, provides a REST API to front–end devices, supports web platforms interfaces (web – portal) and orchestrates the accurate functionality of the whole system, Figure 23.
\nThe core intelligence residing in the “Analytics, Data Fusion and Risk-based Security Server” is presented in Section 3.3. The Data protection, Legal Compliance and Ethics are important aspects that should be taken into consideration in the system architecting process and are analyzed in Section 3.4.
\nBack–end Intelligence component
\nThe proposed system is designed with the aim of enabling automated surveillance of large infrastructures such as airport, shopping malls, other. Such tasks incorporate massive monitoring of infrastructure visitors in real – time. Monitoring operation is based on an Internet of Things (IoT) installation architecture consisting of: (a) various types of sensing devices such as CCD surveillance cameras, QR/barcode scanners, localization equipment (NFC tags, WiFi beacons, etc), RFID scanners, etc., (b) processing units, both centralized and/or distributed, and (c) terminal devices such as mobile phones/tablets, computers, screens, electric signs, etc. (Figure 24).
\nEach sensor device may pre-process the acquired raw data (distributed processing) and the results are gathered on a central cloud-computing infrastructure consisting of independent but co-operative intelligent component each one dedicated for processing data and producing a specific intelligent response for the system. Moreover, the output is transferred to terminal devices. This processing procedure consists of the following steps (Figure 25).
\nThe intelligent services are also responsible for automating the monitoring procedure and enhancing visitors’ experience. Therefore, we propose two types of services: (a) Assistance services and (b) Surveillance services.\n
\nAssistance services
\nThese services aim at monitoring visitors’ behavior, profile, and interactions and provide information that could facilitate their purpose of visit and indicate services that act as added value to visitors and simultaneously promote each infrastructure expectations. Indicatively two representative use cases are Navigation services and Recommendation engine.
Navigation service corresponds to indoor localization and navigation of infrastructure visitors in order to assist them in reaching their desired points of interest (POI) not only as quickly as possible but also as efficient and desirable as possible by taking into account user requirements (e.g. disabilities, specific demands) and user location. Moreover, the service provide directions to each visitor via their mobile device to various POIs and informs the user in order to assist them reaching their goal of visit (for example provide information about location of various products in a supermarket, or shops in a mall, or provide information about flight departures or gates status in an airport)
Recommendation engine aims at providing suggestion of POIs or services that take place inside the infrastructure. The engine takes into account the user profile (information that each user provides optionally during account registration), user feedback (comments, rates), user location and contextual information (time, season, POI status) and create recommendations that are estimated to be assistive to user visiting experience but also promoting infrastructure and POIs expectations and benefits.
Surveillance services
\nThese services aim at monitoring visitors’ position and behavior and automatically detect incidents of significant interest such as malicious behavior, anomalous crowd trajectory flow etc. This solution is expected to enhance surveillance procedure for large-scale circumstances where it is demanded in real time, the accurate surveillance of a massive crowd. Indicatively we suggest two surveillance services: Suspicious unattended luggage incidents detection and suspicious visitor loitering detection.
Unattended luggage incidents detection aims at monitoring in parallel both visitors and the luggage they carry. Such monitoring could be approached either using CCD cameras and approximately detect abandoned luggage for a long period of time, or by tagging luggage (for example using RFID tags) where using RFID scanners in co-operation with visual sensors (CCD cameras) and human reports (official surveillance personnel), estimate potential unattended luggage incidents. Moreover, in order to monitor visitors’ position, we propose the use of indoor localization techniques using mobile devices in order to have an approximation of visitors’ location that willingly allow it, and in addition visual sensors and human reports as well, in order to increase system’s awareness of crowd location. Fusion of such information shall be exploited by machine learning algorithms, which result to a coarse grain estimation of visitors’ luggage abandonment.
Suspicious loitering detection aims at monitoring visitors’ location and in real–time detect anomalous visitors’ trajectories or positions that could be suspicious for malicious purposes. Such components may incorporate visual sensors (CCD cameras), human reports and mobile devices localization techniques (Wi-Fi beacons, NFC tags).
Data fusion and Risk-based assessment
\nThe Data Fusion unit inside the Analytics, Data Fusion and Risk-based Security Server aims to perform Hard and Soft fusion of heterogeneous data [13, 14, 15] available from disparate sources of information such as physical sensors (“hard” data) and human resources (“soft” data). Hard data fusion refers to the combination of raw information from multiple sources so as to achieve more accurate estimations of the desired parameters (position, speed, other). To this end, a variety of theoretical tools, such as Signal processing techniques, Kalman filters, Sequential Monte Carlo methods, etc., can be used. On the other hand, soft data fusion usually applies on textual information (e.g., from humans’ reports, social networks, Internet, other) which has to be further processed using methods such as Information retrieval, Natural Language processing, and Semantic knowledge representation. Moreover, in this unit, Decision level fusion techniques could be applied using Evidence theory [14, 15, 16], Fuzzy Logic [17], 2-tuple Linguistic representation models [18, 19], and reinforcement learning methods [20, 21].
\nThe Risk-based assessment unit is responsible for the classification of events and individuals into security classes according to their risk severity level. The unit exploits behavior and event indicators and their corresponding weights estimated in the ALMS system, intelligence generated in the Back–end Intelligence component, and any useful information from the system’s data sources in order to generate alerts and notifications to the Command-and-Control (C2) center if the risk severity level exceeds predefined thresholds.
\nAdaptive learning management system
\nA security and safety monitoring system has to detect, evaluate, and classify, in an efficient and timely manner, behaviors and events of interest. To achieve this critical need, the algorithmic parameters used in the “Analytics, Data Fusion and Risk-based Security Server” have to be initialized and adaptively adjusted to handle changes in the monitoring environment. To this end, the use of an Adaptive Learning Management System (ALMS) which will exploit new and accumulated information is essential. An ALMS system can be applied for instance to iteratively adjust the Risk Assessment classification thresholds and the weights of the behavioral and event indicators or to recognize correlations between indicators, events, and behaviors in order to optimize the classification process and improve the efficiency of the system. An example of such an optimization approach could be the selection of a reduced number of indicators for event identification.
\nFor the development of automated procedures able to estimate correlations, optimize selected parameters under certain criteria, and extract reduced dimensional feature vectors for Behavior and event detection the ALMS system demands efficient methodologies and algorithms. These methodologies and techniques can cover a wide area of theoretical tools including Machine Learning, Factor Component Analysis, Statistical methods, Time series analysis, Optimization theory, Sparse clustering, Fuzzy Logic, and other [18, 19, 20, 21].
\nAs shown in Figures 23 and 26, the ALMS unit receives input from i) the system’s database which includes data from system’s data sources, outputs of Data Fusion, Analytics, and Risk assessment unit, and optimization criteria and constraints and ii) the Security personnel Mobile App which is then used for the training of the applied algorithms. The ALMS stores its output in the system database, making it accessible to other units, and creating a continuous feedback loop of information gathering, learning, and adapting to security threats as they evolve.
\nThe Factor Component Analysis component performs Factor Analysis on features/indicators denoting individual characteristics which affect the categorization of individuals in security-threat levels. Factor analysis is used to reduce the dimensionality of a correlation matrix that contains features/indicators describing a specific event or behavior. Factor Analysis does that by producing new general variables, called “factors”, incorporating inside them, the initial features/indicators according to a condition of high inter-correlation between the newly emerged general variables (“factors”) and the initially presented specific variables [19, 22].
\nThe system needs to analyze the input feed and result to its outcome, taking into account however, environmental factors regarding system’s efficiency, explicit policies that should by adopted or exceptions that should be applied, that are related to specific locations (e.g., restricted areas) or specific human profiles. Such information usually is returned to the system in the form of a generic asynchronous qualitative feedback (for example insisting user discards of system’s outcomes, or exception to system’s rules) that should be assimilated in real – time.
\nThe system should be able to receive environmental feedback and adapt its operation to the current circumstances and requirements. Therefore, we propose a two-mode adaptation, an offline and an online. The offline adaptation regards a system initialization, responsible for translating human – understandable requirements to algorithms’ parameterization. The online adaptation should track environmental feedback for each action of set of actions (policies) produced by the system and adapt algorithms’ behavior in order to fulfill system’s requirements.
\nIn this case we propose the implementation of reinforcement learning techniques where environmental feedback should be encoded to quantitative measures of rewards, Figure 27.
\nSecurity and safety management systems and their data fusion and intelligent analytics capabilities require substantial data collection and processing in order to offer the best possible awareness and decision support to C&C operators, field personnel and first responders. Especially in the context of homeland security, privacy and data protection is often seen through the typical trade-off model perspective, requesting the public to give up –in the best case knowingly- on particular rights over the control of their personal data. However, such systems should not be based and developed on exceptions or operate only in extraordinary circumstances, the latter being very inefficient. With the latest guidelines of EU General Data Protection Regulation (GDPR), principles of data minimization and privacy by design will shift from best practices into a much more regulated form.
\nThe proposed system is in line with these principles, following a “by design approach” in terms of data protection and ethics. Data collected are structurally separated from identifiable information, and identification occurs only upon the logged and explicit intervention of a human operator when truly needed. By assessing risks on real time, the system itself has the advantage of performing data minimization through early elimination of lower risk cases. On the front end and field, privacy enhancing technologies and smart sensors are also preferred and selected. E.g. smart visual sensors with on-board processing capabilities can filter out data before sending it over the wire and to the server for processing. Moreover, the system has been designed to include specific safeguards to protect individuals against discrimination, stigmatization and unduly prohibition of access to goods and services. Defined in [23], the system adopts these definitions and extends them to all protected grounds as defined in the Charter and the Treaty of Amsterdam, taking also into account the proposal for the horizontal directive that extends the context of EU non-discrimination law and prohibits discrimination “on grounds of sex, racial or ethnic origin, age, disability, sexual orientation, religion or belief”. In this context, Fairness and bias detection algorithms are applied to the adaptive learning management system while the human operator remains in control of the final enforcement following any automated decision making process. Intelligent behavior analytics can further support the case where security risks are based and calculated on how a person acts on the scene and not any discriminatory background information.
\nA subject of past and current research, assessing the societal acceptance of surveillance and security solutions comes with its own challenges. Acceptance is based on multiple parameters, individual perceptions and sometimes misconceptions and individual practices which may not be in line with the expressed concerns [24]. The proposed system and the overall risk-based security paradigm, is based on the positive fact that the vast majority of people have no malicious intent. The system focuses on the unknown and high-risk cases, intending to shift the current practices from annoying horizontal and disruptive processes to seamless and unobtrusive security. The combination of privacy and ethics by design along with the ethical and unobtrusive treatment set the parameters for a system with high acceptance, positive public perception and trust.
\nIn this chapter we discussed the concept of risk-based security, the possible trade-off between increased convenience for passengers from risk-based security and the delays induced by additional checks needed for establishing each passenger’s risk. We also presented a number of technologies, systems and applications that can be used for assessing risk at an airport or BCP without inducing additional delay as the discussed approaches estimate risk on-the-fly while passengers either walk around the airport or BCP from entrance to security check points or BCPs, or queue up in a security line awaiting to go through security checks. All methods discussed are GDPR and ethics compliant, thus they can be implemented in accordance to privacy and ethics regulations. Furthermore, the novel system architecture for Security and Safety monitoring systems introduced in [3] has been presented. The proposed system aims to identify adverse events or behaviors which may endanger the safety of people or their well-being having the ability to adapt in the surveillance environment changes. The dynamic adjustment of the algorithmic parameters adopted in various units of the system such as intelligence, and Risk assessment, makes it possible to monitor security threats as they evolve. Thus, the proposed scheme provides the potential of a high-performance system both in terms of the detection interval as well as in terms of the performance accuracy offering the capability of a timely and efficient response to abnormal events and behaviors.
\nThe research described in this paper has been supported by the following research contracts:
\n“FLYSEC: Optimizing time-to-FLY and enhancing airport SECurity,” Programme: Horizon 2020, European Union Grant Agreement No. 653879, Duration: 01/05/2015 - 31/07/2018,
“TRESSPASS: Robust Risk Based Screening and Alert System for Travelers and luggage,” Grant Agreement No. 787120, Call: H2020-SEC-2016-2017-2,
The author would also like to acknowledge the use of some material from the Refs. [5, 6, 7, 8, 9, 10, 12, 14]. He co-authored in collaboration with his colleagues whose names appear in these references.
\nAt IntechOpen, we not only specialize in the publication of Book Chapters as part of our Edited Volumes, but also the publication and dissemination of longer manuscripts, known as Long Form Monographs. Monographs allow Authors to focus on presenting a single subject or a specific aspect of that subject and publish their research in detail.
\n\nEven if you have an area of research that does not at first sight fit within a previously defined IntechOpen project, we can still offer support and help you in publishing your individual research. Publishing your IntechOpen book in the form of a Long Form Monograph is a viable alternative.
",metaTitle:"Publish a Whole Book",metaDescription:"At IntechOpen, we not only specialize in the publication of book chapters as part of our Edited Volumes, but also the publication and dissemination of long form manuscripts, known as monographs. Monographs allow authors to focus on presenting a single subject or a specific aspect of that subject and publish their research at length.\n\nPerhaps you have an area of research that does not fit within a previously defined IntechOpen project, but rather need help in publishing your individual research? Publishing your IntechOpen book in the form of a long form monograph is a great alternative.",metaKeywords:null,canonicalURL:"/page/publish-a-whole-book",contentRaw:'[{"type":"htmlEditorComponent","content":"MONOGRAPH - LONG FORM MANUSCRIPT
\\n\\nFORMATS
\\n\\nCOST
\\n\\n10,000 GBP Monograph - Long Form
\\n\\nThe final price includes project management, editorial and peer-review services, technical editing, language copyediting, cover design, book layout, book promotion and ISBN assignment.
\\n\\n*The price does not include Value-Added Tax (VAT). Residents of European Union countries need to add VAT based on the specific rate applied in their country of residence. Institutions and companies registered as VAT taxable entities in their own EU member state will not pay VAT by providing us with their VAT registration number. This is made possible by the EU reverse charge method.
\\n\\nOptional Services
\\n\\nIntechOpen has collaborated with Enago, through its sister brand, Ulatus, which is one of the world’s leading providers of book translation services. The services are designed to convey the essence of your work to readers from across the globe in a language they understand. Enago’s expert translators incorporate cultural nuances in translations to make the content relevant for local audiences while retaining the original meaning and style. Enago translators are equipped to handle all complex and multiple overlapping themes encompassed in a single book and their high degree of linguistic and subject expertise enables them to deliver a superior quality output.
\\n\\nIntechOpen Authors that wish to use this service will receive a 20% discount on all translation services. To find out more information or obtain a quote, please visit: https://www.enago.com/intech.
\\n\\nFUNDING
\\n\\nWe feel that financial barriers should never prevent researchers from publishing their work. Please consult our Open Access Funding page to explore funding opportunities and learn more about how you can finance your IntechOpen publication.
\\n\\nBENEFITS
\\n\\nPUBLISHING PROCESS STEPS
\\n\\nFor a complete overview of all publishing process steps and descriptions, go to How Open Access Publishing Works.
\\n\\nSEND YOUR PROPOSAL
\\n\\nIf you are interested in publishing your book with IntechOpen, please submit your book proposal by completing the Publishing Proposal Form.
\\n\\nNot sure if this is the right option for you? Please refer back to the main Publish with IntechOpen page or feel free to contact us directly at book.department@intechopen.com.
\\n"}]'},components:[{type:"htmlEditorComponent",content:'MONOGRAPH - LONG FORM MANUSCRIPT
\n\nFORMATS
\n\nCOST
\n\n10,000 GBP Monograph - Long Form
\n\nThe final price includes project management, editorial and peer-review services, technical editing, language copyediting, cover design, book layout, book promotion and ISBN assignment.
\n\n*The price does not include Value-Added Tax (VAT). Residents of European Union countries need to add VAT based on the specific rate applied in their country of residence. Institutions and companies registered as VAT taxable entities in their own EU member state will not pay VAT by providing us with their VAT registration number. This is made possible by the EU reverse charge method.
\n\nOptional Services
\n\nIntechOpen has collaborated with Enago, through its sister brand, Ulatus, which is one of the world’s leading providers of book translation services. The services are designed to convey the essence of your work to readers from across the globe in a language they understand. Enago’s expert translators incorporate cultural nuances in translations to make the content relevant for local audiences while retaining the original meaning and style. Enago translators are equipped to handle all complex and multiple overlapping themes encompassed in a single book and their high degree of linguistic and subject expertise enables them to deliver a superior quality output.
\n\nIntechOpen Authors that wish to use this service will receive a 20% discount on all translation services. To find out more information or obtain a quote, please visit: https://www.enago.com/intech.
\n\nFUNDING
\n\nWe feel that financial barriers should never prevent researchers from publishing their work. Please consult our Open Access Funding page to explore funding opportunities and learn more about how you can finance your IntechOpen publication.
\n\nBENEFITS
\n\nPUBLISHING PROCESS STEPS
\n\nFor a complete overview of all publishing process steps and descriptions, go to How Open Access Publishing Works.
\n\nSEND YOUR PROPOSAL
\n\nIf you are interested in publishing your book with IntechOpen, please submit your book proposal by completing the Publishing Proposal Form.
\n\nNot sure if this is the right option for you? Please refer back to the main Publish with IntechOpen page or feel free to contact us directly at book.department@intechopen.com.
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5775},{group:"region",caption:"Middle and South America",value:2,count:5238},{group:"region",caption:"Africa",value:3,count:1721},{group:"region",caption:"Asia",value:4,count:10409},{group:"region",caption:"Australia and Oceania",value:5,count:897},{group:"region",caption:"Europe",value:6,count:15805}],offset:12,limit:12,total:118373},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{topicId:"18"},books:[{type:"book",id:"9667",title:"Neuroimmunology",subtitle:null,isOpenForSubmission:!0,hash:"9cf0e8203ce088c0b84add014fd8d382",slug:null,bookSignature:"Prof. Robert Weissert",coverURL:"https://cdn.intechopen.com/books/images_new/9667.jpg",editedByType:null,editors:[{id:"79343",title:"Prof.",name:"Robert",surname:"Weissert",slug:"robert-weissert",fullName:"Robert Weissert"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10744",title:"Astrocyte",subtitle:null,isOpenForSubmission:!0,hash:"b770f09e3f87daa5d8525fa78f771405",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10744.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10922",title:"Music in Health and Diseases",subtitle:null,isOpenForSubmission:!0,hash:"6a079df045b086b404399c5ed4ac049a",slug:null,bookSignature:"Prof. Amit Agrawal, Dr. Roshan Sutar and Dr. Anvesh Jallapally",coverURL:"https://cdn.intechopen.com/books/images_new/10922.jpg",editedByType:null,editors:[{id:"100142",title:"Prof.",name:"Amit",surname:"Agrawal",slug:"amit-agrawal",fullName:"Amit Agrawal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:18},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:5},{group:"topic",caption:"Business, Management and Economics",value:7,count:2},{group:"topic",caption:"Chemistry",value:8,count:8},{group:"topic",caption:"Computer and Information Science",value:9,count:6},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:7},{group:"topic",caption:"Engineering",value:11,count:19},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:3},{group:"topic",caption:"Materials Science",value:14,count:5},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:24},{group:"topic",caption:"Neuroscience",value:18,count:2},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:3},{group:"topic",caption:"Physics",value:20,count:3},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Robotics",value:22,count:1},{group:"topic",caption:"Social Sciences",value:23,count:3},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:1}],offset:12,limit:12,total:3},popularBooks:{featuredBooks:[{type:"book",id:"9521",title:"Antimicrobial Resistance",subtitle:"A One Health Perspective",isOpenForSubmission:!1,hash:"30949e78832e1afba5606634b52056ab",slug:"antimicrobial-resistance-a-one-health-perspective",bookSignature:"Mihai Mareș, Swee Hua Erin Lim, Kok-Song Lai and Romeo-Teodor Cristina",coverURL:"https://cdn.intechopen.com/books/images_new/9521.jpg",editors:[{id:"88785",title:"Prof.",name:"Mihai",middleName:null,surname:"Mares",slug:"mihai-mares",fullName:"Mihai Mares"}],equalEditorOne:{id:"190224",title:"Dr.",name:"Swee Hua Erin",middleName:null,surname:"Lim",slug:"swee-hua-erin-lim",fullName:"Swee Hua Erin Lim",profilePictureURL:"https://mts.intechopen.com/storage/users/190224/images/system/190224.png",biography:"Dr. Erin Lim is presently working as an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates and is affiliated as an Associate Professor to Perdana University-Royal College of Surgeons in Ireland, Selangor, Malaysia. She obtained her Ph.D. from Universiti Putra Malaysia in 2010 with a National Science Fellowship awarded from the Ministry of Science, Technology and Innovation Malaysia and has been actively involved in research ever since. Her main research interests include analysis of carriage and transmission of multidrug resistant bacteria in non-conventional settings, besides an interest in natural products for antimicrobial testing. She is heavily involved in the elucidation of mechanisms of reversal of resistance in bacteria in addition to investigating the immunological analyses of diseases, development of vaccination and treatment models in animals. She hopes her work will support the discovery of therapeutics in the clinical setting and assist in the combat against the burden of antibiotic resistance.",institutionString:"Abu Dhabi Women’s College",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Perdana University",institutionURL:null,country:{name:"Malaysia"}}},equalEditorTwo:{id:"221544",title:"Dr.",name:"Kok-Song",middleName:null,surname:"Lai",slug:"kok-song-lai",fullName:"Kok-Song Lai",profilePictureURL:"https://mts.intechopen.com/storage/users/221544/images/system/221544.jpeg",biography:"Dr. Lai Kok Song is an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates. He obtained his Ph.D. in Biological Sciences from Nara Institute of Science and Technology, Japan in 2012. Prior to his academic appointment, Dr. Lai worked as a Senior Scientist at the Ministry of Science, Technology and Innovation, Malaysia. His current research areas include antimicrobial resistance and plant-pathogen interaction. His particular interest lies in the study of the antimicrobial mechanism via membrane disruption of essential oils against multi-drug resistance bacteria through various biochemical, molecular and proteomic approaches. Ultimately, he hopes to uncover and determine novel biomarkers related to antibiotic resistance that can be developed into new therapeutic strategies.",institutionString:"Higher Colleges of Technology",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"8",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Higher Colleges of Technology",institutionURL:null,country:{name:"United Arab Emirates"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10020",title:"Operations Management",subtitle:"Emerging Trend in the Digital Era",isOpenForSubmission:!1,hash:"526f0dbdc7e4d85b82ce8383ab894b4c",slug:"operations-management-emerging-trend-in-the-digital-era",bookSignature:"Antonella Petrillo, Fabio De Felice, Germano Lambert-Torres and Erik Bonaldi",coverURL:"https://cdn.intechopen.com/books/images_new/10020.jpg",editors:[{id:"181603",title:"Dr.",name:"Antonella",middleName:null,surname:"Petrillo",slug:"antonella-petrillo",fullName:"Antonella Petrillo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9560",title:"Creativity",subtitle:"A Force to Innovation",isOpenForSubmission:!1,hash:"58f740bc17807d5d88d647c525857b11",slug:"creativity-a-force-to-innovation",bookSignature:"Pooja Jain",coverURL:"https://cdn.intechopen.com/books/images_new/9560.jpg",editors:[{id:"316765",title:"Dr.",name:"Pooja",middleName:null,surname:"Jain",slug:"pooja-jain",fullName:"Pooja Jain"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10192",title:"Background and Management of Muscular Atrophy",subtitle:null,isOpenForSubmission:!1,hash:"eca24028d89912b5efea56e179dff089",slug:"background-and-management-of-muscular-atrophy",bookSignature:"Julianna Cseri",coverURL:"https://cdn.intechopen.com/books/images_new/10192.jpg",editors:[{id:"135579",title:"Dr.",name:"Julianna",middleName:null,surname:"Cseri",slug:"julianna-cseri",fullName:"Julianna Cseri"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9243",title:"Coastal Environments",subtitle:null,isOpenForSubmission:!1,hash:"8e05e5f631e935eef366980f2e28295d",slug:"coastal-environments",bookSignature:"Yuanzhi Zhang and X. San Liang",coverURL:"https://cdn.intechopen.com/books/images_new/9243.jpg",editors:[{id:"77597",title:"Prof.",name:"Yuanzhi",middleName:null,surname:"Zhang",slug:"yuanzhi-zhang",fullName:"Yuanzhi Zhang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8558",title:"Aerodynamics",subtitle:null,isOpenForSubmission:!1,hash:"db7263fc198dfb539073ba0260a7f1aa",slug:"aerodynamics",bookSignature:"Mofid Gorji-Bandpy and Aly-Mousaad Aly",coverURL:"https://cdn.intechopen.com/books/images_new/8558.jpg",editors:[{id:"35542",title:"Prof.",name:"Mofid",middleName:null,surname:"Gorji-Bandpy",slug:"mofid-gorji-bandpy",fullName:"Mofid Gorji-Bandpy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:5244},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"9521",title:"Antimicrobial Resistance",subtitle:"A One Health Perspective",isOpenForSubmission:!1,hash:"30949e78832e1afba5606634b52056ab",slug:"antimicrobial-resistance-a-one-health-perspective",bookSignature:"Mihai Mareș, Swee Hua Erin Lim, Kok-Song Lai and Romeo-Teodor Cristina",coverURL:"https://cdn.intechopen.com/books/images_new/9521.jpg",editors:[{id:"88785",title:"Prof.",name:"Mihai",middleName:null,surname:"Mares",slug:"mihai-mares",fullName:"Mihai Mares"}],equalEditorOne:{id:"190224",title:"Dr.",name:"Swee Hua Erin",middleName:null,surname:"Lim",slug:"swee-hua-erin-lim",fullName:"Swee Hua Erin Lim",profilePictureURL:"https://mts.intechopen.com/storage/users/190224/images/system/190224.png",biography:"Dr. Erin Lim is presently working as an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates and is affiliated as an Associate Professor to Perdana University-Royal College of Surgeons in Ireland, Selangor, Malaysia. She obtained her Ph.D. from Universiti Putra Malaysia in 2010 with a National Science Fellowship awarded from the Ministry of Science, Technology and Innovation Malaysia and has been actively involved in research ever since. Her main research interests include analysis of carriage and transmission of multidrug resistant bacteria in non-conventional settings, besides an interest in natural products for antimicrobial testing. She is heavily involved in the elucidation of mechanisms of reversal of resistance in bacteria in addition to investigating the immunological analyses of diseases, development of vaccination and treatment models in animals. She hopes her work will support the discovery of therapeutics in the clinical setting and assist in the combat against the burden of antibiotic resistance.",institutionString:"Abu Dhabi Women’s College",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Perdana University",institutionURL:null,country:{name:"Malaysia"}}},equalEditorTwo:{id:"221544",title:"Dr.",name:"Kok-Song",middleName:null,surname:"Lai",slug:"kok-song-lai",fullName:"Kok-Song Lai",profilePictureURL:"https://mts.intechopen.com/storage/users/221544/images/system/221544.jpeg",biography:"Dr. Lai Kok Song is an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates. He obtained his Ph.D. in Biological Sciences from Nara Institute of Science and Technology, Japan in 2012. Prior to his academic appointment, Dr. Lai worked as a Senior Scientist at the Ministry of Science, Technology and Innovation, Malaysia. His current research areas include antimicrobial resistance and plant-pathogen interaction. His particular interest lies in the study of the antimicrobial mechanism via membrane disruption of essential oils against multi-drug resistance bacteria through various biochemical, molecular and proteomic approaches. Ultimately, he hopes to uncover and determine novel biomarkers related to antibiotic resistance that can be developed into new therapeutic strategies.",institutionString:"Higher Colleges of Technology",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"8",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Higher Colleges of Technology",institutionURL:null,country:{name:"United Arab Emirates"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10020",title:"Operations Management",subtitle:"Emerging Trend in the Digital Era",isOpenForSubmission:!1,hash:"526f0dbdc7e4d85b82ce8383ab894b4c",slug:"operations-management-emerging-trend-in-the-digital-era",bookSignature:"Antonella Petrillo, Fabio De Felice, Germano Lambert-Torres and Erik Bonaldi",coverURL:"https://cdn.intechopen.com/books/images_new/10020.jpg",editors:[{id:"181603",title:"Dr.",name:"Antonella",middleName:null,surname:"Petrillo",slug:"antonella-petrillo",fullName:"Antonella Petrillo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9560",title:"Creativity",subtitle:"A Force to Innovation",isOpenForSubmission:!1,hash:"58f740bc17807d5d88d647c525857b11",slug:"creativity-a-force-to-innovation",bookSignature:"Pooja Jain",coverURL:"https://cdn.intechopen.com/books/images_new/9560.jpg",editors:[{id:"316765",title:"Dr.",name:"Pooja",middleName:null,surname:"Jain",slug:"pooja-jain",fullName:"Pooja Jain"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10192",title:"Background and Management of Muscular Atrophy",subtitle:null,isOpenForSubmission:!1,hash:"eca24028d89912b5efea56e179dff089",slug:"background-and-management-of-muscular-atrophy",bookSignature:"Julianna Cseri",coverURL:"https://cdn.intechopen.com/books/images_new/10192.jpg",editors:[{id:"135579",title:"Dr.",name:"Julianna",middleName:null,surname:"Cseri",slug:"julianna-cseri",fullName:"Julianna Cseri"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9243",title:"Coastal Environments",subtitle:null,isOpenForSubmission:!1,hash:"8e05e5f631e935eef366980f2e28295d",slug:"coastal-environments",bookSignature:"Yuanzhi Zhang and X. San Liang",coverURL:"https://cdn.intechopen.com/books/images_new/9243.jpg",editors:[{id:"77597",title:"Prof.",name:"Yuanzhi",middleName:null,surname:"Zhang",slug:"yuanzhi-zhang",fullName:"Yuanzhi Zhang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"9243",title:"Coastal Environments",subtitle:null,isOpenForSubmission:!1,hash:"8e05e5f631e935eef366980f2e28295d",slug:"coastal-environments",bookSignature:"Yuanzhi Zhang and X. San Liang",coverURL:"https://cdn.intechopen.com/books/images_new/9243.jpg",editedByType:"Edited by",editors:[{id:"77597",title:"Prof.",name:"Yuanzhi",middleName:null,surname:"Zhang",slug:"yuanzhi-zhang",fullName:"Yuanzhi Zhang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10020",title:"Operations Management",subtitle:"Emerging Trend in the Digital Era",isOpenForSubmission:!1,hash:"526f0dbdc7e4d85b82ce8383ab894b4c",slug:"operations-management-emerging-trend-in-the-digital-era",bookSignature:"Antonella Petrillo, Fabio De Felice, Germano Lambert-Torres and Erik Bonaldi",coverURL:"https://cdn.intechopen.com/books/images_new/10020.jpg",editedByType:"Edited by",editors:[{id:"181603",title:"Dr.",name:"Antonella",middleName:null,surname:"Petrillo",slug:"antonella-petrillo",fullName:"Antonella Petrillo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9521",title:"Antimicrobial Resistance",subtitle:"A One Health Perspective",isOpenForSubmission:!1,hash:"30949e78832e1afba5606634b52056ab",slug:"antimicrobial-resistance-a-one-health-perspective",bookSignature:"Mihai Mareș, Swee Hua Erin Lim, Kok-Song Lai and Romeo-Teodor Cristina",coverURL:"https://cdn.intechopen.com/books/images_new/9521.jpg",editedByType:"Edited by",editors:[{id:"88785",title:"Prof.",name:"Mihai",middleName:null,surname:"Mares",slug:"mihai-mares",fullName:"Mihai Mares"}],equalEditorOne:{id:"190224",title:"Dr.",name:"Swee Hua Erin",middleName:null,surname:"Lim",slug:"swee-hua-erin-lim",fullName:"Swee Hua Erin Lim",profilePictureURL:"https://mts.intechopen.com/storage/users/190224/images/system/190224.png",biography:"Dr. Erin Lim is presently working as an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates and is affiliated as an Associate Professor to Perdana University-Royal College of Surgeons in Ireland, Selangor, Malaysia. She obtained her Ph.D. from Universiti Putra Malaysia in 2010 with a National Science Fellowship awarded from the Ministry of Science, Technology and Innovation Malaysia and has been actively involved in research ever since. Her main research interests include analysis of carriage and transmission of multidrug resistant bacteria in non-conventional settings, besides an interest in natural products for antimicrobial testing. She is heavily involved in the elucidation of mechanisms of reversal of resistance in bacteria in addition to investigating the immunological analyses of diseases, development of vaccination and treatment models in animals. She hopes her work will support the discovery of therapeutics in the clinical setting and assist in the combat against the burden of antibiotic resistance.",institutionString:"Abu Dhabi Women’s College",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Perdana University",institutionURL:null,country:{name:"Malaysia"}}},equalEditorTwo:{id:"221544",title:"Dr.",name:"Kok-Song",middleName:null,surname:"Lai",slug:"kok-song-lai",fullName:"Kok-Song Lai",profilePictureURL:"https://mts.intechopen.com/storage/users/221544/images/system/221544.jpeg",biography:"Dr. Lai Kok Song is an Assistant Professor in the Division of Health Sciences, Abu Dhabi Women\\'s College, Higher Colleges of Technology in Abu Dhabi, United Arab Emirates. He obtained his Ph.D. in Biological Sciences from Nara Institute of Science and Technology, Japan in 2012. Prior to his academic appointment, Dr. Lai worked as a Senior Scientist at the Ministry of Science, Technology and Innovation, Malaysia. His current research areas include antimicrobial resistance and plant-pathogen interaction. His particular interest lies in the study of the antimicrobial mechanism via membrane disruption of essential oils against multi-drug resistance bacteria through various biochemical, molecular and proteomic approaches. Ultimately, he hopes to uncover and determine novel biomarkers related to antibiotic resistance that can be developed into new therapeutic strategies.",institutionString:"Higher Colleges of Technology",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"8",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Higher Colleges of Technology",institutionURL:null,country:{name:"United Arab Emirates"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9560",title:"Creativity",subtitle:"A Force to Innovation",isOpenForSubmission:!1,hash:"58f740bc17807d5d88d647c525857b11",slug:"creativity-a-force-to-innovation",bookSignature:"Pooja Jain",coverURL:"https://cdn.intechopen.com/books/images_new/9560.jpg",editedByType:"Edited by",editors:[{id:"316765",title:"Dr.",name:"Pooja",middleName:null,surname:"Jain",slug:"pooja-jain",fullName:"Pooja Jain"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9669",title:"Recent Advances in Rice Research",subtitle:null,isOpenForSubmission:!1,hash:"12b06cc73e89af1e104399321cc16a75",slug:"recent-advances-in-rice-research",bookSignature:"Mahmood-ur- Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9669.jpg",editedByType:"Edited by",editors:[{id:"185476",title:"Dr.",name:"Mahmood-Ur-",middleName:null,surname:"Rahman Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-Ur- Rahman Ansari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10192",title:"Background and Management of Muscular Atrophy",subtitle:null,isOpenForSubmission:!1,hash:"eca24028d89912b5efea56e179dff089",slug:"background-and-management-of-muscular-atrophy",bookSignature:"Julianna Cseri",coverURL:"https://cdn.intechopen.com/books/images_new/10192.jpg",editedByType:"Edited by",editors:[{id:"135579",title:"Dr.",name:"Julianna",middleName:null,surname:"Cseri",slug:"julianna-cseri",fullName:"Julianna Cseri"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editedByType:"Edited by",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editedByType:"Edited by",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editedByType:"Edited by",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editedByType:"Edited by",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"716",title:"Computer-Aided Technologies",slug:"computer-aided-technologies",parent:{title:"Control Engineering",slug:"engineering-control-engineering"},numberOfBooks:2,numberOfAuthorsAndEditors:39,numberOfWosCitations:24,numberOfCrossrefCitations:18,numberOfDimensionsCitations:29,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"computer-aided-technologies",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"8347",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",subtitle:null,isOpenForSubmission:!1,hash:"3d7024a8d7d8afed093c9c79ec31f15a",slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",bookSignature:"Lulu Wang and Liandong Yu",coverURL:"https://cdn.intechopen.com/books/images_new/8347.jpg",editedByType:"Edited by",editors:[{id:"257388",title:"Distinguished Prof.",name:"Lulu",middleName:null,surname:"Wang",slug:"lulu-wang",fullName:"Lulu Wang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5379",title:"Computer-aided Technologies",subtitle:"Applications in Engineering and Medicine",isOpenForSubmission:!1,hash:"f33a3bdb537f32114b4c1ca6ed3be8dd",slug:"computer-aided-technologies-applications-in-engineering-and-medicine",bookSignature:"Razvan Udroiu",coverURL:"https://cdn.intechopen.com/books/images_new/5379.jpg",editedByType:"Edited by",editors:[{id:"13146",title:"Prof.",name:"Razvan",middleName:null,surname:"Udroiu",slug:"razvan-udroiu",fullName:"Razvan Udroiu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:2,mostCitedChapters:[{id:"52774",doi:"10.5772/65851",title:"Joining in Nonrigid Variation Simulation",slug:"joining-in-nonrigid-variation-simulation",totalDownloads:959,totalCrossrefCites:7,totalDimensionsCites:15,book:{slug:"computer-aided-technologies-applications-in-engineering-and-medicine",title:"Computer-aided Technologies",fullTitle:"Computer-aided Technologies - Applications in Engineering and Medicine"},signatures:"Kristina Wärmefjord, Rikard Söderberg, Björn Lindau, Lars Lindkvist\nand Samuel Lorin",authors:[{id:"52913",title:"Prof.",name:"Rikard",middleName:null,surname:"Soderberg",slug:"rikard-soderberg",fullName:"Rikard Soderberg"},{id:"190535",title:"Associate Prof.",name:"Kristina",middleName:null,surname:"Wärmefjord",slug:"kristina-warmefjord",fullName:"Kristina Wärmefjord"},{id:"194323",title:"MSc.",name:"Björn",middleName:null,surname:"Lindau",slug:"bjorn-lindau",fullName:"Björn Lindau"},{id:"194324",title:"Dr.",name:"Lars",middleName:null,surname:"Lindkvist",slug:"lars-lindkvist",fullName:"Lars Lindkvist"},{id:"194325",title:"Dr.",name:"Samuel",middleName:null,surname:"Lorin",slug:"samuel-lorin",fullName:"Samuel Lorin"}]},{id:"52202",doi:"10.5772/64980",title:"Computer-Aided Diagnosis in Neuroimaging",slug:"computer-aided-diagnosis-in-neuroimaging",totalDownloads:1360,totalCrossrefCites:2,totalDimensionsCites:4,book:{slug:"computer-aided-technologies-applications-in-engineering-and-medicine",title:"Computer-aided Technologies",fullTitle:"Computer-aided Technologies - Applications in Engineering and Medicine"},signatures:"Francisco J. Martínez-Murcia, Juan Manuel Górriz and Javier\nRamírez",authors:[{id:"17445",title:"Dr.",name:"Javier",middleName:null,surname:"Ramírez",slug:"javier-ramirez",fullName:"Javier Ramírez"},{id:"187376",title:"M.Sc.",name:"Francisco J.",middleName:null,surname:"Martínez-Murcia",slug:"francisco-j.-martinez-murcia",fullName:"Francisco J. Martínez-Murcia"},{id:"187381",title:"Prof.",name:"Juan Manuel",middleName:null,surname:"Górriz",slug:"juan-manuel-gorriz",fullName:"Juan Manuel Górriz"}]},{id:"66967",doi:"10.5772/intechopen.82011",title:"Decision-Making in Real-Life Industrial Environment through Graph Theory Approach",slug:"decision-making-in-real-life-industrial-environment-through-graph-theory-approach",totalDownloads:331,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Ravi Pratap Singh, Ravinder Kataria and Sandeep Singhal",authors:[{id:"265010",title:"Dr.",name:"Ravi Pratap",middleName:null,surname:"Singh",slug:"ravi-pratap-singh",fullName:"Ravi Pratap Singh"},{id:"265017",title:"Dr.",name:"Ravinder",middleName:null,surname:"Kataria",slug:"ravinder-kataria",fullName:"Ravinder Kataria"},{id:"271624",title:"Dr.",name:"Sandeep",middleName:null,surname:"Singhal",slug:"sandeep-singhal",fullName:"Sandeep Singhal"}]}],mostDownloadedChaptersLast30Days:[{id:"52192",title:"Computer-Aided Biosensor Design",slug:"computer-aided-biosensor-design",totalDownloads:945,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"computer-aided-technologies-applications-in-engineering-and-medicine",title:"Computer-aided Technologies",fullTitle:"Computer-aided Technologies - Applications in Engineering and Medicine"},signatures:"Yu-Chen Lo, Ren Gui, Hiroshi Honda and Jorge Z. Torres",authors:[{id:"186645",title:"Dr.",name:"Jorge",middleName:null,surname:"Torres",slug:"jorge-torres",fullName:"Jorge Torres"},{id:"187584",title:"Dr.",name:"Yu-Chen",middleName:null,surname:"Lo",slug:"yu-chen-lo",fullName:"Yu-Chen Lo"},{id:"188117",title:"Prof.",name:"Hiroshi",middleName:null,surname:"Honda",slug:"hiroshi-honda",fullName:"Hiroshi Honda"},{id:"188357",title:"Ms.",name:"Ren",middleName:null,surname:"Gui",slug:"ren-gui",fullName:"Ren Gui"}]},{id:"53083",title:"Introductory Chapter: Integration of Computer-Aided Technologies in Product Lifecycle Management (PLM) and Human Lifecycle Management (HUM)",slug:"introductory-chapter-integration-of-computer-aided-technologies-in-product-lifecycle-management-plm-",totalDownloads:1524,totalCrossrefCites:4,totalDimensionsCites:3,book:{slug:"computer-aided-technologies-applications-in-engineering-and-medicine",title:"Computer-aided Technologies",fullTitle:"Computer-aided Technologies - Applications in Engineering and Medicine"},signatures:"Razvan Udroiu",authors:[{id:"13146",title:"Prof.",name:"Razvan",middleName:null,surname:"Udroiu",slug:"razvan-udroiu",fullName:"Razvan Udroiu"}]},{id:"67425",title:"Impact of Medical Advancement: Prostheses",slug:"impact-of-medical-advancement-prostheses",totalDownloads:531,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Samreen Hussain, Sarmad Shams and Saad Jawaid Khan",authors:[{id:"281496",title:"Prof.",name:"Samreen",middleName:null,surname:"Hussain",slug:"samreen-hussain",fullName:"Samreen Hussain"},{id:"281500",title:"Dr.",name:"Sarmad",middleName:null,surname:"Shams",slug:"sarmad-shams",fullName:"Sarmad Shams"},{id:"298862",title:"Dr.",name:"Saad",middleName:null,surname:"Jawaid Khan",slug:"saad-jawaid-khan",fullName:"Saad Jawaid Khan"}]},{id:"52202",title:"Computer-Aided Diagnosis in Neuroimaging",slug:"computer-aided-diagnosis-in-neuroimaging",totalDownloads:1360,totalCrossrefCites:2,totalDimensionsCites:4,book:{slug:"computer-aided-technologies-applications-in-engineering-and-medicine",title:"Computer-aided Technologies",fullTitle:"Computer-aided Technologies - Applications in Engineering and Medicine"},signatures:"Francisco J. Martínez-Murcia, Juan Manuel Górriz and Javier\nRamírez",authors:[{id:"17445",title:"Dr.",name:"Javier",middleName:null,surname:"Ramírez",slug:"javier-ramirez",fullName:"Javier Ramírez"},{id:"187376",title:"M.Sc.",name:"Francisco J.",middleName:null,surname:"Martínez-Murcia",slug:"francisco-j.-martinez-murcia",fullName:"Francisco J. Martínez-Murcia"},{id:"187381",title:"Prof.",name:"Juan Manuel",middleName:null,surname:"Górriz",slug:"juan-manuel-gorriz",fullName:"Juan Manuel Górriz"}]},{id:"68178",title:"Artificial Intelligence in Light-Source Design",slug:"artificial-intelligence-in-light-source-design",totalDownloads:290,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Snjezana Soltic and Andrew N. Chalmers",authors:[{id:"211512",title:"Dr.",name:"Andrew",middleName:null,surname:"Chalmers",slug:"andrew-chalmers",fullName:"Andrew Chalmers"},{id:"303396",title:"Dr.",name:"Snjezana",middleName:null,surname:"Soltic",slug:"snjezana-soltic",fullName:"Snjezana Soltic"}]},{id:"52774",title:"Joining in Nonrigid Variation Simulation",slug:"joining-in-nonrigid-variation-simulation",totalDownloads:958,totalCrossrefCites:6,totalDimensionsCites:15,book:{slug:"computer-aided-technologies-applications-in-engineering-and-medicine",title:"Computer-aided Technologies",fullTitle:"Computer-aided Technologies - Applications in Engineering and Medicine"},signatures:"Kristina Wärmefjord, Rikard Söderberg, Björn Lindau, Lars Lindkvist\nand Samuel Lorin",authors:[{id:"52913",title:"Prof.",name:"Rikard",middleName:null,surname:"Soderberg",slug:"rikard-soderberg",fullName:"Rikard Soderberg"},{id:"190535",title:"Associate Prof.",name:"Kristina",middleName:null,surname:"Wärmefjord",slug:"kristina-warmefjord",fullName:"Kristina Wärmefjord"},{id:"194323",title:"MSc.",name:"Björn",middleName:null,surname:"Lindau",slug:"bjorn-lindau",fullName:"Björn Lindau"},{id:"194324",title:"Dr.",name:"Lars",middleName:null,surname:"Lindkvist",slug:"lars-lindkvist",fullName:"Lars Lindkvist"},{id:"194325",title:"Dr.",name:"Samuel",middleName:null,surname:"Lorin",slug:"samuel-lorin",fullName:"Samuel Lorin"}]},{id:"67484",title:"Human Behavior Modeling: The Necessity of Narrative",slug:"human-behavior-modeling-the-necessity-of-narrative",totalDownloads:429,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Roger Parker",authors:[{id:"284043",title:"Ph.D.",name:"Roger",middleName:null,surname:"Parker",slug:"roger-parker",fullName:"Roger Parker"}]},{id:"66967",title:"Decision-Making in Real-Life Industrial Environment through Graph Theory Approach",slug:"decision-making-in-real-life-industrial-environment-through-graph-theory-approach",totalDownloads:329,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Ravi Pratap Singh, Ravinder Kataria and Sandeep Singhal",authors:[{id:"265010",title:"Dr.",name:"Ravi Pratap",middleName:null,surname:"Singh",slug:"ravi-pratap-singh",fullName:"Ravi Pratap Singh"},{id:"265017",title:"Dr.",name:"Ravinder",middleName:null,surname:"Kataria",slug:"ravinder-kataria",fullName:"Ravinder Kataria"},{id:"271624",title:"Dr.",name:"Sandeep",middleName:null,surname:"Singhal",slug:"sandeep-singhal",fullName:"Sandeep Singhal"}]},{id:"68675",title:"Introductory Chapter: Computer-Aided Diagnosis for Biomedical Applications",slug:"introductory-chapter-computer-aided-diagnosis-for-biomedical-applications",totalDownloads:207,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Lulu Wang and Liandong Yu",authors:[{id:"257388",title:"Distinguished Prof.",name:"Lulu",middleName:null,surname:"Wang",slug:"lulu-wang",fullName:"Lulu Wang"},{id:"271596",title:"Dr.",name:"Liandong",middleName:null,surname:"Yu",slug:"liandong-yu",fullName:"Liandong Yu"}]},{id:"66925",title:"Interpreting Analysis on Rhetorical Strategies Modeling in Computer Science Research Articles",slug:"interpreting-analysis-on-rhetorical-strategies-modeling-in-computer-science-research-articles",totalDownloads:230,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"computer-architecture-in-industrial-biomechanical-and-biomedical-engineering",title:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering",fullTitle:"Computer Architecture in Industrial, Biomechanical and Biomedical Engineering"},signatures:"Ina Suryani, Mohd Mustafa Al Bakri Abdullah and Hazry Desa",authors:[{id:"25183",title:"Dr.",name:"hazry",middleName:null,surname:"desa",slug:"hazry-desa",fullName:"hazry desa"},{id:"224049",title:"Prof.",name:"Mohd Mustafa Al Bakri",middleName:null,surname:"Abdullah",slug:"mohd-mustafa-al-bakri-abdullah",fullName:"Mohd Mustafa Al Bakri Abdullah"},{id:"281421",title:"Dr.",name:"Ina",middleName:null,surname:"Suryani",slug:"ina-suryani",fullName:"Ina Suryani"}]}],onlineFirstChaptersFilter:{topicSlug:"computer-aided-technologies",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"profile.detail",path:"/profiles/184379/lilit-nersisyan",hash:"",query:{},params:{id:"184379",slug:"lilit-nersisyan"},fullPath:"/profiles/184379/lilit-nersisyan",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()