Means, standard deviations and reliability coefficients of the measures for the Brazilian migrants (
\\n\\n
More than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\\n\\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\\n\\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\\n\\nAdditionally, each book published by IntechOpen contains original content and research findings.
\\n\\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\\n\\n\\n\\n
\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'
Simba Information has released its Open Access Book Publishing 2020 - 2024 report and has again identified IntechOpen as the world’s largest Open Access book publisher by title count.
\n\nSimba Information is a leading provider for market intelligence and forecasts in the media and publishing industry. The report, published every year, provides an overview and financial outlook for the global professional e-book publishing market.
\n\nIntechOpen, De Gruyter, and Frontiers are the largest OA book publishers by title count, with IntechOpen coming in at first place with 5,101 OA books published, a good 1,782 titles ahead of the nearest competitor.
\n\nSince the first Open Access Book Publishing report published in 2016, IntechOpen has held the top stop each year.
\n\n\n\nMore than half of the publishers listed alongside IntechOpen (18 out of 30) are Social Science and Humanities publishers. IntechOpen is an exception to this as a leader in not only Open Access content but Open Access content across all scientific disciplines, including Physical Sciences, Engineering and Technology, Health Sciences, Life Science, and Social Sciences and Humanities.
\n\nOur breakdown of titles published demonstrates this with 47% PET, 31% HS, 18% LS, and 4% SSH books published.
\n\n“Even though ItechOpen has shown the potential of sci-tech books using an OA approach,” other publishers “have shown little interest in OA books.”
\n\nAdditionally, each book published by IntechOpen contains original content and research findings.
\n\nWe are honored to be among such prestigious publishers and we hope to continue to spearhead that growth in our quest to promote Open Access as a true pioneer in OA book publishing.
\n\n\n\n
\n'}],latestNews:[{slug:"intechopen-signs-new-contract-with-cepiec-china-for-distribution-of-open-access-books-20210319",title:"IntechOpen Signs New Contract with CEPIEC, China for Distribution of Open Access Books"},{slug:"150-million-downloads-and-counting-20210316",title:"150 Million Downloads and Counting"},{slug:"intechopen-secures-indefinite-content-preservation-with-clockss-20210309",title:"IntechOpen Secures Indefinite Content Preservation with CLOCKSS"},{slug:"intechopen-expands-to-all-global-amazon-channels-with-full-catalog-of-books-20210308",title:"IntechOpen Expands to All Global Amazon Channels with Full Catalog of Books"},{slug:"stanford-university-identifies-top-2-scientists-over-1-000-are-intechopen-authors-and-editors-20210122",title:"Stanford University Identifies Top 2% Scientists, Over 1,000 are IntechOpen Authors and Editors"},{slug:"intechopen-authors-included-in-the-highly-cited-researchers-list-for-2020-20210121",title:"IntechOpen Authors Included in the Highly Cited Researchers List for 2020"},{slug:"intechopen-maintains-position-as-the-world-s-largest-oa-book-publisher-20201218",title:"IntechOpen Maintains Position as the World’s Largest OA Book Publisher"},{slug:"all-intechopen-books-available-on-perlego-20201215",title:"All IntechOpen Books Available on Perlego"}]},book:{item:{type:"book",id:"6203",leadTitle:null,fullTitle:"Potassium - Improvement of Quality in Fruits and Vegetables Through Hydroponic Nutrient Management",title:"Potassium",subtitle:"Improvement of Quality in Fruits and Vegetables Through Hydroponic Nutrient Management",reviewType:"peer-reviewed",abstract:"The book Potassium - Improvement of Quality in Fruits and Vegetables Through Hydroponic Nutrient Management provides useful information regarding potassium nutrition management in hydroponic cultivation, which will help in producing quality horticultural crops. The first few chapters describe the role of potassium nutrition in plants, its interaction with other nutrients, its source fertilizers, the role in postharvest produce qualities, and human nutrition. Potassium fertilizer management, its metabolism in plants, and cultivation techniques of fruits and leafy vegetables are also included in the middle section. The final chapter illustrates the software development for the calculation of hydroponic nutrients including potassium for easy management of cultural solution. As a whole, this book covers several major aspects on the topic for making it a complete and useful resource.",isbn:"978-1-78923-127-4",printIsbn:"978-1-78923-126-7",pdfIsbn:"978-1-83881-334-5",doi:"10.5772/intechopen.68611",price:119,priceEur:129,priceUsd:155,slug:"potassium-improvement-of-quality-in-fruits-and-vegetables-through-hydroponic-nutrient-management",numberOfPages:118,isOpenForSubmission:!1,isInWos:1,hash:"b4208bd87e8d6c2569ebdda0e4868ad2",bookSignature:"Md Asaduzzaman and Toshiki Asao",publishedDate:"May 23rd 2018",coverURL:"https://cdn.intechopen.com/books/images_new/6203.jpg",numberOfDownloads:8624,numberOfWosCitations:2,numberOfCrossrefCitations:3,numberOfDimensionsCitations:7,hasAltmetrics:1,numberOfTotalCitations:12,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 18th 2017",dateEndSecondStepPublish:"May 9th 2017",dateEndThirdStepPublish:"August 5th 2017",dateEndFourthStepPublish:"November 3rd 2017",dateEndFifthStepPublish:"January 2nd 2018",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6",editedByType:"Edited by",kuFlag:!1,editors:[{id:"171564",title:"Dr.",name:"Md",middleName:null,surname:"Asaduzzaman",slug:"md-asaduzzaman",fullName:"Md Asaduzzaman",profilePictureURL:"https://mts.intechopen.com/storage/users/171564/images/system/171564.jpeg",biography:"Dr. Asaduzzaman is a native of Bangladesh and received Ph.D. majoring Bioproduction Science from Tottori University, Japan. He has expertise in hydroponic crop production and currently working at Horticulture Research Centre, Bangladesh Agricultural Research Institute, Bangladesh. His main research focuses on the development of hydroponic techniques for fruits, vegetables and ornamentals in greenhouse, production of specialty crops under controlled environment agriculture and development of specialty dietary components through hydroponic production of vegetables providing human health benefits beyond basic nutrition. His other research project includes studying the autotoxicity, a phenomenon of intraspecific allelopathy in vegetables and ornamentals through hydroponics, and developing suitable control measures to overcome. He has published 24 journal articles and 4 book chapters in international SCI-indexed journals and books. He has been awarded Gold Medal from Bangladesh Agricultural University in 2011 and BAS-TWAS 2016 Prizes for the Young Scientists from Bangladesh.",institutionString:"Bangladesh Agricultural Research Institute",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"4",totalChapterViews:"0",totalEditedBooks:"3",institution:{name:"Bangladesh Agricultural Research Institute",institutionURL:null,country:{name:"Bangladesh"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:{id:"106510",title:"Dr.",name:"Toshiki",middleName:null,surname:"Asao",slug:"toshiki-asao",fullName:"Toshiki Asao",profilePictureURL:"https://mts.intechopen.com/storage/users/106510/images/system/106510.jpeg",biography:"Dr. Toshiki Asao is a specialist in hydroponic crop production and Professor at Department of Agriculture, Faculty of Life and Environmental Science, Shimane University, Japan. Dr. Asao is a native of Kyoto, Japan and received Ph.D. majoring Agriculture from Kyoto University. His main research focus is the development of hydroponic techniques for vegetables and ornamentals in greenhouses and also the development of specialty vegetables through hydroponics under controlled environment agriculture providing human health benefits beyond basic nutrition. His other research project is the studying autotoxicity in vegetables and ornamentals in hydroponics and developing possible control measures. He has published a number of scientific articles, book chapters, and edited books.",institutionString:"Shimane University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"5",totalChapterViews:"0",totalEditedBooks:"4",institution:{name:"Shimane University",institutionURL:null,country:{name:"Japan"}}},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"340",title:"Hydroponics",slug:"hydroponics"}],chapters:[{id:"60314",title:"Introductory Chapter: Potassium in Quality Improvement of Fruits and Vegetables",doi:"10.5772/intechopen.75654",slug:"introductory-chapter-potassium-in-quality-improvement-of-fruits-and-vegetables",totalDownloads:843,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Md Asaduzzaman and Toshiki Asao",downloadPdfUrl:"/chapter/pdf-download/60314",previewPdfUrl:"/chapter/pdf-preview/60314",authors:[{id:"171564",title:"Dr.",name:"Md",surname:"Asaduzzaman",slug:"md-asaduzzaman",fullName:"Md Asaduzzaman"},{id:"106510",title:"Dr.",name:"Toshiki",surname:"Asao",slug:"toshiki-asao",fullName:"Toshiki Asao"}],corrections:null},{id:"57874",title:"Potassium Nutrition in Plants and Its Interactions with Other Nutrients in Hydroponic Culture",doi:"10.5772/intechopen.71951",slug:"potassium-nutrition-in-plants-and-its-interactions-with-other-nutrients-in-hydroponic-culture",totalDownloads:940,totalCrossrefCites:2,totalDimensionsCites:3,signatures:"Betül Çalişkan and Ali Cengiz Çalişkan",downloadPdfUrl:"/chapter/pdf-download/57874",previewPdfUrl:"/chapter/pdf-preview/57874",authors:[{id:"199110",title:"Dr.",name:"Betül",surname:"Çalişkan",slug:"betul-caliskan",fullName:"Betül Çalişkan"},{id:"208732",title:"Dr.",name:"Ali Cengiz",surname:"Çalişkan",slug:"ali-cengiz-caliskan",fullName:"Ali Cengiz Çalişkan"}],corrections:null},{id:"58340",title:"Potassium Nutrition in Fruits and Vegetables and Food Safety through Hydroponic System",doi:"10.5772/intechopen.71742",slug:"potassium-nutrition-in-fruits-and-vegetables-and-food-safety-through-hydroponic-system",totalDownloads:971,totalCrossrefCites:0,totalDimensionsCites:2,signatures:"Flávio José Rodrigues Cruz, Renato de Mello Prado, Guilherme\nFelisberto, Águila Silva Santos and Rafael Ferreira Barreto",downloadPdfUrl:"/chapter/pdf-download/58340",previewPdfUrl:"/chapter/pdf-preview/58340",authors:[{id:"158043",title:"Dr.",name:"Renato",surname:"de Mello Prado",slug:"renato-de-mello-prado",fullName:"Renato de Mello Prado"},{id:"190961",title:"Dr.",name:"Flávio José Rodrigues",surname:"Cruz",slug:"flavio-jose-rodrigues-cruz",fullName:"Flávio José Rodrigues Cruz"},{id:"209518",title:"MSc.",name:"Rafael Ferreira",surname:"Barreto",slug:"rafael-ferreira-barreto",fullName:"Rafael Ferreira Barreto"},{id:"209520",title:"BSc.",name:"Águila Silva",surname:"Santos",slug:"aguila-silva-santos",fullName:"Águila Silva Santos"},{id:"213635",title:"M.Sc.",name:"Guilherme",surname:"Felisberto",slug:"guilherme-felisberto",fullName:"Guilherme Felisberto"}],corrections:null},{id:"59252",title:"Potassium Fertilization in the Production of Vegetables and Fruits",doi:"10.5772/intechopen.72854",slug:"potassium-fertilization-in-the-production-of-vegetables-and-fruits",totalDownloads:866,totalCrossrefCites:0,totalDimensionsCites:1,signatures:"Douglas José Marques, Hudson Carvalho Bianchini, Allan Klynger\nda Silva Lobato and Wellington Ferrari da Silva",downloadPdfUrl:"/chapter/pdf-download/59252",previewPdfUrl:"/chapter/pdf-preview/59252",authors:[{id:"79200",title:"Prof.",name:"Allan",surname:"Klynger da Silva Lobato",slug:"allan-klynger-da-silva-lobato",fullName:"Allan Klynger da Silva Lobato"},{id:"103257",title:"Dr.",name:"Douglas",surname:"Marques",slug:"douglas-marques",fullName:"Douglas Marques"},{id:"208047",title:"Prof.",name:"Hudson Carvalho",surname:"Bianchini",slug:"hudson-carvalho-bianchini",fullName:"Hudson Carvalho Bianchini"},{id:"220292",title:"MSc.",name:"Wellington",surname:"Ferrari Da Silva",slug:"wellington-ferrari-da-silva",fullName:"Wellington Ferrari Da Silva"}],corrections:null},{id:"57467",title:"Cultivation Methods for Leafy Vegetables and Tomatoes with Low Potassium Content for Dialysis Patients and the Change of those Qualities",doi:"10.5772/intechopen.71306",slug:"cultivation-methods-for-leafy-vegetables-and-tomatoes-with-low-potassium-content-for-dialysis-patien",totalDownloads:678,totalCrossrefCites:1,totalDimensionsCites:1,signatures:"Ogawa Atsushi",downloadPdfUrl:"/chapter/pdf-download/57467",previewPdfUrl:"/chapter/pdf-preview/57467",authors:[{id:"209796",title:"Prof.",name:"Atsushi",surname:"Ogawa",slug:"atsushi-ogawa",fullName:"Atsushi Ogawa"}],corrections:null},{id:"58261",title:"Software for Calculation of Nutrient Solution for Fruits and Leafy Vegetables in NFT Hydroponic System",doi:"10.5772/intechopen.72243",slug:"software-for-calculation-of-nutrient-solution-for-fruits-and-leafy-vegetables-in-nft-hydroponic-syst",totalDownloads:4329,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Douglas José Marques, Francisco Donizeti Vieira Luz, Rogério\nWilliam Fernandes Barroso and Hudson Carvalho Bianchini",downloadPdfUrl:"/chapter/pdf-download/58261",previewPdfUrl:"/chapter/pdf-preview/58261",authors:[{id:"208047",title:"Prof.",name:"Hudson Carvalho",surname:"Bianchini",slug:"hudson-carvalho-bianchini",fullName:"Hudson Carvalho Bianchini"},{id:"215944",title:"Dr.",name:"Douglas José",surname:"Marques",slug:"douglas-jose-marques",fullName:"Douglas José Marques"},{id:"215945",title:"MSc.",name:"Francisco Donizete Vieira",surname:"Luz",slug:"francisco-donizete-vieira-luz",fullName:"Francisco Donizete Vieira Luz"},{id:"215946",title:"MSc.",name:"Rogério William Fernandes",surname:"Barroso",slug:"rogerio-william-fernandes-barroso",fullName:"Rogério William Fernandes Barroso"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},relatedBooks:[{type:"book",id:"4552",title:"Soilless Culture",subtitle:"Use of Substrates for the Production of Quality Horticultural Crops",isOpenForSubmission:!1,hash:"0db90197795ffda070bec7ed97064c74",slug:"soilless-culture-use-of-substrates-for-the-production-of-quality-horticultural-crops",bookSignature:"Md. Asaduzzaman",coverURL:"https://cdn.intechopen.com/books/images_new/4552.jpg",editedByType:"Edited by",editors:[{id:"171564",title:"Dr.",name:"Md",surname:"Asaduzzaman",slug:"md-asaduzzaman",fullName:"Md Asaduzzaman"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6492",title:"Vegetables",subtitle:"Importance of Quality Vegetables to Human Health",isOpenForSubmission:!1,hash:"c9b3988b64bc40ab0eb650fe8a2b2493",slug:"vegetables-importance-of-quality-vegetables-to-human-health",bookSignature:"Md. Asaduzzaman and Toshiki Asao",coverURL:"https://cdn.intechopen.com/books/images_new/6492.jpg",editedByType:"Edited by",editors:[{id:"171564",title:"Dr.",name:"Md",surname:"Asaduzzaman",slug:"md-asaduzzaman",fullName:"Md Asaduzzaman"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"66684",slug:"corrigendum-to-therapeutic-use-of-some-romanian-medicinal-plants",title:"Corrigendum to: Therapeutic Use of Some Romanian Medicinal Plants",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/66684.pdf",downloadPdfUrl:"/chapter/pdf-download/66684",previewPdfUrl:"/chapter/pdf-preview/66684",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/66684",risUrl:"/chapter/ris/66684",chapter:{id:"64833",slug:"therapeutic-use-of-some-romanian-medicinal-plants",signatures:"Adina-Elena Segneanu, Claudiu Cepan, Ioan Grozescu, Florentina Cziple, Sorin Olariu, Sonia Ratiu, Viorica Lazar, Sorin Marius Murariu, Silvia Maria Velciov and Teodora Daniela Marti",dateSubmitted:"July 23rd 2018",dateReviewed:"November 11th 2018",datePrePublished:"January 9th 2019",datePublished:"June 19th 2019",book:{id:"8290",title:"Pharmacognosy",subtitle:"Medicinal Plants",fullTitle:"Pharmacognosy - Medicinal Plants",slug:"pharmacognosy-medicinal-plants",publishedDate:"June 19th 2019",bookSignature:"Shagufta Perveen and Areej Al-Taweel",coverURL:"https://cdn.intechopen.com/books/images_new/8290.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"192992",title:"Prof.",name:"Shagufta",middleName:null,surname:"Perveen",slug:"shagufta-perveen",fullName:"Shagufta Perveen"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"25269",title:"Dr.",name:"Adina-Elena",middleName:null,surname:"Segneanu",fullName:"Adina-Elena Segneanu",slug:"adina-elena-segneanu",email:"s_adinaelena@yahoo.com",position:null,institution:null},{id:"156334",title:"Prof.",name:"Ioan",middleName:null,surname:"Grozescu",fullName:"Ioan Grozescu",slug:"ioan-grozescu",email:"ioangrozescu@gmail.com",position:null,institution:null},{id:"205722",title:"Dr.",name:"Silvia",middleName:null,surname:"Velciov",fullName:"Silvia Velciov",slug:"silvia-velciov",email:"s_velciov@yahoo.com",position:null,institution:null},{id:"205723",title:"Prof.",name:"Sorin",middleName:null,surname:"Olariu",fullName:"Sorin Olariu",slug:"sorin-olariu",email:"srolariu@yahoo.com",position:null,institution:null},{id:"205724",title:"Dr.",name:"Florentina",middleName:null,surname:"Cziple",fullName:"Florentina Cziple",slug:"florentina-cziple",email:"cflorentina@yahoo.com",position:null,institution:null},{id:"282836",title:"MSc.",name:"Claudiu",middleName:null,surname:"Cepan",fullName:"Claudiu Cepan",slug:"claudiu-cepan",email:"cepancaludiu@gmail.com",position:null,institution:null},{id:"282837",title:"Dr.",name:"Sonia",middleName:null,surname:"Ratiu",fullName:"Sonia Ratiu",slug:"sonia-ratiu",email:"srnolariu@yahoo.com",position:null,institution:null},{id:"282839",title:"Dr.",name:"Viorica",middleName:null,surname:"Lazar",fullName:"Viorica Lazar",slug:"viorica-lazar",email:"v.lazar@gmail.com",position:null,institution:null},{id:"287216",title:"Dr.",name:"Teodora Daniela",middleName:null,surname:"Marti",fullName:"Teodora Daniela Marti",slug:"teodora-daniela-marti",email:"dana_m73@yahoo.com",position:null,institution:null}]}},chapter:{id:"64833",slug:"therapeutic-use-of-some-romanian-medicinal-plants",signatures:"Adina-Elena Segneanu, Claudiu Cepan, Ioan Grozescu, Florentina Cziple, Sorin Olariu, Sonia Ratiu, Viorica Lazar, Sorin Marius Murariu, Silvia Maria Velciov and Teodora Daniela Marti",dateSubmitted:"July 23rd 2018",dateReviewed:"November 11th 2018",datePrePublished:"January 9th 2019",datePublished:"June 19th 2019",book:{id:"8290",title:"Pharmacognosy",subtitle:"Medicinal Plants",fullTitle:"Pharmacognosy - Medicinal Plants",slug:"pharmacognosy-medicinal-plants",publishedDate:"June 19th 2019",bookSignature:"Shagufta Perveen and Areej Al-Taweel",coverURL:"https://cdn.intechopen.com/books/images_new/8290.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"192992",title:"Prof.",name:"Shagufta",middleName:null,surname:"Perveen",slug:"shagufta-perveen",fullName:"Shagufta Perveen"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"25269",title:"Dr.",name:"Adina-Elena",middleName:null,surname:"Segneanu",fullName:"Adina-Elena Segneanu",slug:"adina-elena-segneanu",email:"s_adinaelena@yahoo.com",position:null,institution:null},{id:"156334",title:"Prof.",name:"Ioan",middleName:null,surname:"Grozescu",fullName:"Ioan Grozescu",slug:"ioan-grozescu",email:"ioangrozescu@gmail.com",position:null,institution:null},{id:"205722",title:"Dr.",name:"Silvia",middleName:null,surname:"Velciov",fullName:"Silvia Velciov",slug:"silvia-velciov",email:"s_velciov@yahoo.com",position:null,institution:null},{id:"205723",title:"Prof.",name:"Sorin",middleName:null,surname:"Olariu",fullName:"Sorin Olariu",slug:"sorin-olariu",email:"srolariu@yahoo.com",position:null,institution:null},{id:"205724",title:"Dr.",name:"Florentina",middleName:null,surname:"Cziple",fullName:"Florentina Cziple",slug:"florentina-cziple",email:"cflorentina@yahoo.com",position:null,institution:null},{id:"282836",title:"MSc.",name:"Claudiu",middleName:null,surname:"Cepan",fullName:"Claudiu Cepan",slug:"claudiu-cepan",email:"cepancaludiu@gmail.com",position:null,institution:null},{id:"282837",title:"Dr.",name:"Sonia",middleName:null,surname:"Ratiu",fullName:"Sonia Ratiu",slug:"sonia-ratiu",email:"srnolariu@yahoo.com",position:null,institution:null},{id:"282839",title:"Dr.",name:"Viorica",middleName:null,surname:"Lazar",fullName:"Viorica Lazar",slug:"viorica-lazar",email:"v.lazar@gmail.com",position:null,institution:null},{id:"287216",title:"Dr.",name:"Teodora Daniela",middleName:null,surname:"Marti",fullName:"Teodora Daniela Marti",slug:"teodora-daniela-marti",email:"dana_m73@yahoo.com",position:null,institution:null}]},book:{id:"8290",title:"Pharmacognosy",subtitle:"Medicinal Plants",fullTitle:"Pharmacognosy - Medicinal Plants",slug:"pharmacognosy-medicinal-plants",publishedDate:"June 19th 2019",bookSignature:"Shagufta Perveen and Areej Al-Taweel",coverURL:"https://cdn.intechopen.com/books/images_new/8290.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"192992",title:"Prof.",name:"Shagufta",middleName:null,surname:"Perveen",slug:"shagufta-perveen",fullName:"Shagufta Perveen"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"9214",leadTitle:null,title:"Intrusion Detection Systems",subtitle:null,reviewType:"peer-reviewed",abstract:"This book will be a self-contained collection of scholarly papers targeting an audience of practicing researchers, academics, PhD students and other scientists. The contents of the book will be written by multiple authors and edited by experts in the field.",isbn:null,printIsbn:"979-953-307-X-X",pdfIsbn:null,doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!1,hash:"3abf93cb54e148ec75f128a69c9812d9",bookSignature:"Dr. Khattab M Ali Aheeti",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/9214.jpg",keywords:"Intrusion Detection Systems, Security, Robotics Cars, Online Detection, Underwater, Dynamic Identification System, Drones, Protection, Artificial Intelligent, Sensors, Autonomous, Detection",numberOfDownloads:null,numberOfWosCitations:0,numberOfCrossrefCitations:null,numberOfDimensionsCitations:null,numberOfTotalCitations:null,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"May 6th 2019",dateEndSecondStepPublish:"November 5th 2019",dateEndThirdStepPublish:"January 4th 2020",dateEndFourthStepPublish:"March 24th 2020",dateEndFifthStepPublish:"May 23rd 2020",remainingDaysToSecondStep:"a year",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:null,kuFlag:!1,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"259265",title:"Dr.",name:"Khattab M",middleName:null,surname:"Ali Aheeti",slug:"khattab-m-ali-aheeti",fullName:"Khattab M Ali Aheeti",profilePictureURL:"https://mts.intechopen.com/storage/users/259265/images/system/259265.jpeg",biography:"Education Postdoc and Ph.D. in Computer Science – Essex University – United Kingdom.\r\n\r\nLecture - School of Computer Science and Electronic Engineering, Introduction Python\r\n\r\n2015-2018 - Lecture - School of Computer Science and Electronic Engineering, Embedded Linux\r\n\r\n2015-2016 - Lecture - College of computer, Information Systems Dept.\r\n\r\n2009 - Present - Lecture - Almaref College, University, Computer Sciences Dept.\r\n\r\n2008-2009 - Postgraduate Student - MSC. Degree at Al al-Bayt University",institutionString:"University of Anbar",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"University of Anbar",institutionURL:null,country:{name:"Iraq"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"535",title:"Intelligent System",slug:"communications-and-security-intelligent-system"}],chapters:null,productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"247865",firstName:"Jasna",lastName:"Bozic",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/247865/images/7225_n.jpg",email:"jasna.b@intechopen.com",biography:"As an Author Service Manager, my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"94",title:"Video Surveillance",subtitle:null,isOpenForSubmission:!1,hash:null,slug:"video-surveillance",bookSignature:"Weiyao Lin",coverURL:"https://cdn.intechopen.com/books/images_new/94.jpg",editedByType:"Edited by",editors:[{id:"20855",title:"Prof.",name:"Weiyao",surname:"Lin",slug:"weiyao-lin",fullName:"Weiyao Lin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"906",title:"Recent Developments in Video Surveillance",subtitle:null,isOpenForSubmission:!1,hash:"2fd7f4d1bbaba71e64432c7ae933a03a",slug:"recent-developments-in-video-surveillance",bookSignature:"Hazem El-Alfy",coverURL:"https://cdn.intechopen.com/books/images_new/906.jpg",editedByType:"Edited by",editors:[{id:"99579",title:"Dr.",name:"Hazem",surname:"El-Alfy",slug:"hazem-el-alfy",fullName:"Hazem El-Alfy"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9384",title:"Intelligent System and Computing",subtitle:null,isOpenForSubmission:!1,hash:"c4e591c1ee57d5c0bf5306010747e952",slug:"intelligent-system-and-computing",bookSignature:"Yang (Cindy) Yi",coverURL:"https://cdn.intechopen.com/books/images_new/9384.jpg",editedByType:"Edited by",editors:[{id:"239041",title:"Prof.",name:"Yang",surname:"Yi",slug:"yang-yi",fullName:"Yang Yi"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"52690",title:"Acculturation, Adaptation and Loneliness among Brazilian Migrants Living in Portugal",doi:"10.5772/65693",slug:"acculturation-adaptation-and-loneliness-among-brazilian-migrants-living-in-portugal",body:'
Thomas Wolfe
Social scientists have conceptualized the phenomena arising from intercultural contacts under the field of acculturation [1]. Acculturation represents one of the main topics of research in cross‐cultural psychology [2]. Adaptation is the long‐term outcome of the process of acculturation, and it is highly variable, ranging from well‐ to poorly‐adapted. Adaptation can assume two forms: psychological adaptation and sociocultural adaptation [2]. The former is sometimes referred as ‘feeling well’; the latter refers to ‘doing well’ in activities of daily intercultural living. Loneliness can be considered as an indicator of negative psychological adaptation [3].
\nAristotle\'s remark about the significance of positive interpersonal relations holds in the era of globalization as well as in the ancient Greece. Loneliness is experienced in every culture, as displayed by researchers with various cultural samples including Canadians and Portuguese [4], Chinese Canadians [5], Angolans [6], British [7] and Turks [8]. Loneliness is experienced in every stage of the lifespan, even in 5‐year‐old children [9]. Loneliness affects both young people (e.g., [8, 10, 11]) and older migrants (e.g., [12, 13]). For individuals in Western societies, loneliness seems to follow a U‐shaped distribution, whereby adolescents/young adults (<25 years old) and older adults (>65 years old) have higher rates of loneliness than adults in the middle‐age spectrum [7].
\nExtant literature calls our attention to the diffuse and adverse outcomes of loneliness [14]. In particular, immigration provides a unique opportunity to study loneliness. According to Ponizovski and Ritsner [15] ‘newly immigrated persons find themselves in a drastically different network of social relationships and experience multiple stressors, including losses’ (p. 408). However, contrary to what might be expected, the research of loneliness among migrants is scarce [3]. The main purpose of this research is to provide some insights into the experiences of loneliness among Brazilian migrants living in Portugal.
\nCurrently, migration from Brazil is one of the largest immigration flows to Portugal. In 2014, this flow represented 22% of the foreign population resident in the country [16]. Although relations between these two countries are not a new phenomenon, the patterns of migration have changed over time. Despite the fact that Portugal used to be traditionally an emigration country, from the last quarter of the twentieth century, Portugal has become a mixed migratory pattern country. Presently, there are numerous Portuguese‐speaking migrants, who are mostly from Brazil and Cape Verde, but other population groups became also numerous, such as Eastern European and China migrants [16].
\nThe immigration from Brazil to Portugal started to rise in mid‐1990. According to foreign registration statistics, only 7470 Brazilian immigrants resided in Portugal in 1989. However, in 2008, this foreign population exceeded 100,000 migrants and augmented to 119,363 in 2010. This period of time was clearly characterized by the labour migration caused by the progressive opening of the economy and the perception of imbalances in the structure of the Portuguese labour market. Many Brazilian immigrants work in low‐skilled jobs, in sectors such as industry, construction, agriculture, services and tourism. When the financial and economic recession struck Portugal, many Brazilian workers, who had been employed in these sectors, lost their jobs. The precarious work has made Brazilian migrants extremely vulnerable to economic fluctuations and susceptible to unemployment. Despite the economic crisis creating a decrease of the foreign‐resident population comparatively to previous years, in 2014, 87,493 Brazilians lived in Portugal [16].
\nAccording to official statistics [16], concerning the gender, there is a female predominance, with a percentage difference of 22.4%. Regarding the age, there is a concentration in the economically active age groups. And, concerning the geographic distribution, most of the immigrants are located above all along the coast line.
\nIn order to deal with this new Portuguese migratory reality, the government\'s policies on immigration have undergone serious changes in terms of integration\'s policies, access to citizenship and regulation of flows. The pro‐assimilationist discourse remains in the past and the new migration\'s political agenda is based on multiculturalism. According to the Migrant Integration Policy Index (MIPEX IV), Portugal has the second‐most favourable integration policies in the developed world.
‘Social transitions are a basic fact of modern life, and so is loneliness’ ([17], p. 1). Diverse definitions of this phenomenon have been advanced and most definitions of loneliness emphasize perceived deficits in relationships. For instance, Ascher and Paquette [18] define loneliness as ‘the cognitive awareness of a deficiency in one\'s social and personal relationships, and ensuring affective reactions of sadness, emptiness, or longing’ (p. 75).
\nLoneliness is a psychological state, constituted by a set of cognitions and discomfort emotions which appear in reaction to the threatened loss of a person\'s social and affective bonds [19]. In fact, the scientific literature identifies two components related to loneliness: (a) a cognitive component, which compares the desired and the real social and affective relations quantitatively and qualitatively, and (b) an affective component involving negative emotional experiences such as sadness, emptiness, longing, disorientation or feeling lost among others.
\nLoneliness is not synonymous with being alone [20]. Loneliness is a state of mind rather than an objective condition. As observed by Peplau and Perlman [17] ‘Loneliness is a subjective experience, it is not synonymous with objective social isolation. People can be alone without being lonely or lonely in the crowd’ (p. 3). For example, it is possible to have many friends or an amorous relationship, and still feel lonely. Therefore, research on loneliness has mainly been evaluated through self‐report measures that approach people\'s perceptions of their feelings [21].
\nThe identification of the factors, which contribute to loneliness, is relevant for diverse motives, such as its relationship with low physical activity [22], poor academic competence and performance [23], unmet intimacy needs [24], health outcomes such as increment in hypertension [25], sleep disturbance [26] and mental health problems [26]. For instance, a relation between loneliness, depressive symptoms, anxiety and suicidal ideation was found [27, 28]. Literature indicates that loneliness provides an increased risk of not only morbidity but also mortality later in life [29].
\nMany changes may occur as a result of migration [1] and these changes may impact on experienced loneliness by migrants. Some literature points out that migrants may be prone to loneliness as they are a target of discrimination [30]. However, there are studies that do not report differences in loneliness between migrants and native people from the societies of origin and of residence. For example, Portuguese youths living in France and Portuguese youths without migratory experience revealed no differences in loneliness [31]. Similar findings were shown among Portuguese migrants living in Switzerland [32], and among Angolan, Cape Verdean and Indian youths of immigrant backgrounds residing in Portugal [33]. A recent study even found that Portuguese youths returned with their migrant families from France displayed lower loneliness than native Portuguese who have never migrated [3]. In this vein, Fuligni [34] has reported: ‘Some immigrant children show similar or better development outcomes than their American‐born counterparts than would be expected because of their socioeconomic background and status as newcomers in American society’ (pp. 299–300). Thus, several researches showed that not all migrants do evidence psychological disadvantages due to the intercultural contact.
The purpose of this study is to examine the relationship between loneliness and acculturation strategies, cultural identity, perceived discrimination, self‐worth and social perceptions.
\nIn the\x3c!-- References were renumbered because they are out of sequence. Please check if changes have been carried out accurately.
According to Berry et al. [1, 33, 35], assimilation refers to a migrant\'s low interest in maintaining his/her own cultural identity and being interested in having daily interaction with other cultures. Separation refers to an individual\'s interest in maintaining his/her own cultural identity and a low interest in having interaction with other cultures. Marginalization refers to little interest in one\'s own cultural maintenance and in establishing interaction with others. Finally, most of the research suggests that integration is the most adaptive, whereas marginalization is associated with poor psychological adaptation; the two other acculturation strategies, assimilation and separation, are intermediate [33, 35, 37]. In Portugal, Neto [38] found that the integration strategy had a significant and positive link to psychological adaptation and sociocultural adaptation among young immigrants from Angola, Cape Verde, Guinea‐Bissau, India, Mozambique, São‐Tomé and East Timor. Nguyen and Benet‐Martinez [39] performed a meta‐analytic study. They reported that integration (‘biculturalism’ in their terms) was significantly related to both psychological adaptation and sociocultural adaptation.
\nIn the current research, we explore whether the preference of the integration strategy by Brazilian migrants has greater benefits for their adaptation than their preferences for other acculturation strategies.
\nCultural identity represents one domain of acculturation that focus on migrants’ sense of self, including both ethnic identity and national identity. Ethnic identity concerns their sense of belonging to the migrant ethnic group and national identity refers to their sense of belonging to the new society of settlement [35]. The great majority of studies about migration have approached only the ethnic identity; however, for migrants both ethnic identity and national identity are relevant [36]. A strong ethnic identity and national identity provides a sense of emotional stability, personal security and a good self‐concept for migrants [36].
\nCultural identity may have an important impact on loneliness. Investigation has evidenced a positive relation between cultural identity and adaptation. For example, both ethnic identity and national identity were positively associated with psychological adaptation in a large international study from 13 countries, including Portugal [35].
\nBesides acculturation strategies and cultural identity, we also analyse whether perceived discrimination exerts an influence on loneliness. Past research has examined whether perceived discrimination was related to psychological ill health [40]. The subjective interpretation of events as discriminatory may be positively related to loneliness [33, 39, 41].
\nLiterature shows a consistent relation between loneliness and negative self‐regard [42, 43]. Feeling lonely and experiencing low self‐esteem are a common problem [44], especially in migrants [38]. Self‐esteem includes feelings of personal worth [45]. Several theories (e.g., evolutionary theory and the cognitive discrepancy model) have acknowledged a relationship with self‐esteem [44].
\nThe feelings of loneliness tend to be linked not only to poor self‐regard but also to negative social perceptions. For instance, lonely persons assessed interaction partners more negatively than non‐lonely persons [46]. Similar findings for lonely persons’ negative views of others have also been shown outside the laboratory setting. For example, loneliness was related to negative views of others in classrooms [47], and in college students’ judgements of their roommates [48].
\nIn the current research, we analyse the relation between loneliness and self‐esteem, and how the migrants rate members of their own national group (in‐group evaluation), members of other national groups, that is, individuals of the host society (Portuguese), and individuals of other national groups of migrants (out‐group evaluations).
\nIn summary, we tested five hypotheses derived from the aforementioned research:\n
The participants were 258 Brazilian migrants (121 men and 137 women). The migrants ranged in age from 18 to 60 years (
For this study, we used the following measures:
\nAssimilation: ‘I feel Brazilian should adapt to mainstream Portuguese society and not maintain their own traditions’;
\nSeparation: ‘I prefer to have only Brazilian friends’;
\nIntegration: ‘Brazilians should have both Brazilian and Portuguese friends’;
\nMarginalization: ‘I don\'t want to attend either Portuguese or Brazilian social activities’.
\nEach item was assessed on a five‐point scale from 1 (
The recruitment of the participants was carried out in Lisbon Metropolitan area. The questionnaire was administered by two trained research assistants. The participation rate was high (about 75%). The respondents were informed about the goals and procedures of the study and they gave informed consent. The participants’ responses were anonymous. All questionnaires were administered in Portuguese. The questionnaire took approximately 25 min to complete. There were no rewards given for completing the questionnaire. All aspects of the research were in line with American Psychological Association (APA) ethical guidelines [56].
Before testing our hypotheses, descriptive statistics for the study variables are presented (see Table 1), and a series of analyses were performed to explore potential relations between socio‐demographic variables and loneliness. One‐sample
\n | SD | \nNumber of items | \nCronbach\'s | \n|
---|---|---|---|---|
Assimilation | \n2.61 | \n0.71 | \n4 | \n0.63 | \n
Integration | \n3.68 | \n0.73 | \n4 | \n0.66 | \n
Separation | \n2.68 | \n0.76 | \n4 | \n0.66 | \n
Marginalization | \n2.40 | \n0.79 | \n4 | \n0.75 | \n
Ethnic identity | \n4.47 | \n0.93 | \n4 | \n0.94 | \n
National identity | \n2.27 | \n1.28 | \n4 | \n0.94 | \n
Perceived discrimination | \n2.15 | \n1.09 | \n5 | \n0.90 | \n
Self‐esteem | \n3.83 | \n0.72 | \n10 | \n0.72 | \n
Attitudes towards Brazilians | \n9.71 | \n1.06 | \n1 | \n– | \n
Attitudes towards Portuguese | \n7.69 | \n3.03 | \n1 | \n– | \n
Attitudes towards other migrants | \n3.91 | \n2.34 | \n16 | \n0.96 | \n
Loneliness | \n2.03 | \n0.74 | \n6 | \n0.82 | \n
Means, standard deviations and reliability coefficients of the measures for the Brazilian migrants (
Now, we are going to present the relationships of loneliness in relation to socio‐demographic variables such as age, gender, level of education and length of residence.
\nConcerning the
Pearson product‐moment correlations between loneliness and intercultural strategies were performed in order to test hypothesis 1 (see Table 2). As expected, integration was negatively correlated with loneliness (
\n | Loneliness | \n
---|---|
Integration | \n-0.16* | \n
Assimilation | \n0.42*** | \n
Separation | \n0.22** | \n
Marginalization | \n0.48*** | \n
Correlations between intercultural strategies of Brazilian migrants and loneliness.
*
**
***
In order to test whether cultural identity predicts loneliness, we performed a hierarchical multiple regression. Prior to performing the regression analysis, collinearity diagnostics were analysed to ensure that variance inflation factor did not exceed 10. To control for the possible confounding effects of gender, age, level of education and length of residence, they were entered in the first block. Ethnic identity and national identity were entered in the second block. In the first block, no significant socio‐demographic predictor emerged. In the second block, the regression showed that 36% of the total variance in loneliness could be explained by the independent variables,
Variables | \nBlock 1, | \nBlock 2, | \n
---|---|---|
Age | \n0.13 | \n0.02 | \n
Gender | \n0.03 | \n-0.01 | \n
Level of education | \n0.02 | \n-0.11* | \n
Length of residence | \n0.10 | \n-0.02 | \n
Ethnic identity | \n\n | -0.11* | \n
National identity | \n\n | 0.56*** | \n
0.04 | \n0.36 | \n|
Adjusted | \n0.04 | \n0.34 | \n
2.57* | \n60.29*** | \n
Hierarchical regression models of socio‐demographic variables and cultural identity predicting loneliness among migrants.
*
**
***
To analyse the relationship between perceived discrimination and loneliness, we performed also a hierarchical multiple regression. Prior to performing the regression analysis, collinearity diagnostics were analysed to ensure that variance inflation factor did not exceed 10. To control for the possible confounding effects of gender, age, level of education and length of residence, they were entered in the first block. Perceived discrimination was entered in the second block. In the first block, no significant socio‐demographic predictor emerged. In the second block, the regression showed that 41% of the total variance in loneliness could be explained by the independent variables,
Variables | \nBlock 1, | \nBlock 2, | \n
---|---|---|
Age | \n0.13 | \n0.06 | \n
Gender | \n0.03 | \n-0.02 | \n
Level of education | \n0.02 | \n0.04 | \n
Length of residence | \n0.10 | \n0.10 | \n
Perceived discrimination | \n\n | 0.62*** | \n
0.04 | \n0.41 | \n|
Adjusted | \n0.04 | \n0.40 | \n
2.57* | \n152.46*** | \n
Hierarchical regression models of socio‐demographic variables and perceived discrimination predicting loneliness among migrants.
*
**
***
Finally, to test the relationships between loneliness and self‐worth and social perceptions, hierarchical multiple regression was used. Prior to performing the regression analysis, collinearity diagnostics were analysed to ensure that variance inflation factor did not exceed 10. To control for the possible confounding effects of gender, age, level of education and length of residence, they were entered in the first block. Self‐esteem was entered in the second block. The final block included attitudes towards Brazilians, attitudes towards Portuguese and attitudes towards other ethnocultural groups. No significant predictors emerged in the first block. In the second block, self‐esteem ( Please check the introduced in-text citation for Table 5.
Variables | \nBlock 1, | \nBlock 2, | \nBlock 3, | \n
---|---|---|---|
Age | \n0.13 | \n0.02 | \n0.05 | \n
Gender | \n0.03 | \n0.03 | \n0.05 | \n
Level of education | \n0.02 | \n-0.06 | \n-0.03 | \n
Length of residence | \n0.10 | \n0.03 | \n0.02 | \n
Self‐esteem | \n\n | -0.46*** | \n-0.43*** | \n
Attitudes towards Brazilians | \n\n | \n | -0.22*** | \n
Attitudes towards Portuguese | \n\n | \n | 0.01 | \n
Attitudes towards other ethnocultural groups | \n\n | \n | 0.14*** | \n
0.04 | \n0.22 | \n0.27 | \n|
Adjusted | \n0.04 | \n0.20 | \n0.24 | \n
2.57* | \n55.39*** | \n5.75** | \n
Hierarchical regression models of socio‐demographic variables, self‐esteem and social perceptions predicting loneliness among migrants.
*
**
***
This study tested five hypotheses among Brazilian migrants living in Portugal. The data supported three hypotheses; however, two hypotheses were only partially supported. The results showed that Brazilians prefer integration, that is, the maintenance of their own cultural heritage and also the development of close ties with the host society. The first hypothesis was supported as integration was associated negatively with loneliness and positively with the other three acculturation strategies. Thus, the present results match with those reporting a positive correlation between a favourable attitude towards integration and migrants’ psychological adaptation [39]. The more opportunities to both, maintaining the heritage culture and identity and seeking relationships among groups in the society of settlement, the more migrants tend to display lower loneliness.
\nThe second hypothesis was partially supported. As expected, ethnic identity predicted negatively loneliness in agreement with past research that supports the view that a strong ethnic identity contributes positively to psychological well‐being [35, 36]. However, contrary to our expectation national identity predicted positively loneliness. This finding does not support the view that positive psychological outcomes for migrants tend to be related to a strong identification with the society of settlement.
\nPerceived discrimination predicted loneliness in accordance with previous research [41]. The relationship between perceived discrimination and loneliness was also in agreement with past research that showed links between experiences of ethnic discrimination and poor psychological well‐being [38, 40, 57]. When a migrant recognizes unequal treatment because of his/her membership in a group, he or she will tend to experience loneliness. This result supports hypothesis 3.
\nA strong relationship between self‐esteem and loneliness was found, denoting that lonely migrants had less favourable views of themselves than non‐lonely migrants, which is in consonance with previous research on adolescents [26, 44] and among adults [41]. This finding supports our fourth hypothesis. This cross‐sectional study does not allow us to explore the direction of the effect between self‐esteem and loneliness. However, previous research indicates that self‐esteem and loneliness reciprocally affect one another [17, 44]. According to this view, both constructs exacerbate one another over time.
\nIn this study, we have tested the negativity of social perceptions, in particular, how migrants rate members of three national groups. Findings showed that the negativity of the perceiver effect cannot be generalized to all national groups. So hypothesis 5 was only partially supported. A negative evaluation of the Brazilians was related to higher loneliness, a finding in agreement with our fifth hypothesis. However, no relationship was found between loneliness and the evaluation of members of the host society, but a positive association was found between loneliness and attitudes towards other migrant groups. How can this lack of generalizability of the negative perceiver effect be explained?
\nThe negativity of lonely persons’ social perceptions has been consistently documented [39, 43, 58]. However, Christensen and Kashy [59] found the opposite using unacquainted persons as participants. Lonely people showed a positivity bias in perceiving others. This result suggests that lonely persons’ negativity might target close friends more than new contacts. However, [43] have observed that ‘Christensen and Kashy\'s study left ambiguity to the use of participants who were previously unacquainted with each other or to the sophisticated SRM analyses’ (p. 224). Tsai and Reis [43] shed light on this aspect. They showed that ‘rather than being universally negative about others, lonely people appear to be negative primarily in their ratings of close acquaintances’ (p. 236). If it would be possible to translate those findings at the level of close acquaintances to the level of close nationalities, our findings make sense. Lonely migrants target more negatively members of their national group (Brazilians) than members of the society of settlement or of other migrant groups. To lonely migrants, novel contacts with members of other nationalities may constitute new opportunities for meeting intimacy needs. It is worthwhile to research if the pattern of results found in the present study is also present in other migrants groups or in other cultural contexts.
\nIn conclusion, this study followed Berry\'s [1] strategies of acculturation to determine different degrees of loneliness among Brazilian migrants in Portugal and to recommend ways of counteracting the consequences of this condition. Our research displayed that lonely migrants tended to have negative views towards themselves, but in terms of perceiving others, these pessimistic views cannot be generalized to all national groups. They were more salient in relation to their own national group than towards other national groups.
\nThis study has several limitations that should be noted. Firstly, participants were recruited through the snowball technique which limits their representativeness. Secondly, all the data were self‐reported. Thirdly, the findings of this research are cross‐sectional and correlational and therefore the causal relations between variables cannot be determined. Finally, given the uniqueness of the immigrant population studied we are uncertain whether current findings can be generalized to other immigrant groups and worldwide.
\nDespite these limitations, the current study suggests implications for interventions aimed at alleviating loneliness. The consistent relationship between loneliness and a large array of relevant health problems (e.g., depression, anxiety, suicidal ideation and substance abuse) highlights the need to develop interventions in order to alleviate loneliness. For example, findings from the current work stress the relevance of enhancing self‐esteem, positive attitudes towards the Brazilians and ethnic identity. A meta‐analysis on loneliness interventions showed that social skills training was less effective comparatively with interventions addressing maladaptive social cognitions [14]. Thus, our results are in agreement with ([44], p. 1078) suggesting that ‘clinical work could significantly benefit from extending current social skills trainings with interventions aimed at improving social cognitions and self‐perceptions’.
\nAs psychologists, we have emphasized individuals and individual differences. Experts using other approaches might reach different explanations. For example, anthropologists might have found a larger role for culture; sociologists, a larger role for power relations and established institutions; and political scientists, a higher relevance for national policies. We argue that using the psychological strategies of acculturation, as developed by Berry [1], provided this study with some important findings which could be integrated into the education of health‐care professionals to combat loneliness among migrants.
Please replace the other language title by English title in Refs. [38, 49].
\nIn the past few years, machine learning and blockchain have been known as two of the most emerging research areas. Machine learning is the practice of building learning models on the computers to parse data, and provide human-like predictions or decisions for some real-world problems. Blockchain, on the other hand, has the capability to store and process data, preserve data integrity, and govern peers accessibility without needing any centralized administration. Those two research areas are heavily data driven and each of those technologies has its own advantages and bottlenecks. In this chapter, we review some novel research on combining blockchain and machine learning, and identify how their short-comings can be addressed by merging these different ecosystems. Several machine learning techniques such as supervised machine learning, deep reinforcement learning and federated learning are considered as good alternative solutions to the Blockchain related research. We also discuss how the researchers make these two technologies work collaboratively to solve some real-world problems.
The Internet of things (IoT) is a well-known technology for research and industry. Devices in this network can still sense and respond to the environment without users’ intervention. Enabling artificial intelligence (AI) in IoT has emerged as a hot research topic [1]. However, machine learning is a kind of computational task which is a heavy workload for the IoT devices (IoTDs). Usually, these low-cost IoT devices are battery-powered devices. On the one hand, computational tasks execution (e.g., training machine learning models) consumes considerable energy. On the other hand, the required powerful microchips are not suitable for IoTDs with compact physical size.
Mobile edge computing (MEC) is a solution to the above challenges. By offloading complex learning tasks to the edge of Internet, IoTDs could perform machine learning algorithms to realize AI. The original MEC was proposed by ETSI in 2014. The description of MEC was “A new platform provides IT and cloud computing capabilities within the Radio Access Network (RAN) in close proximity to mobile subscribers” [2]. We focus on the edge computing within the RAN in this chapter because it has been a standard across different industries. It will help readers to learn blockchain-enabled mobile edge intelligence in the most practical scenario. However, security and privacy issues must still be considered [3]. The IoT data leakage may lead to malicious attacks on individuals. Fortunately, blockchain has potential and is suitable for MEC [4]. The integration of MEC and blockchain is a win-win solution. For one thing, blockchain provides MEC with data security and privacy. For another, MEC can improve blockchain’s scalability and effectiveness.
The main contributions of this chapter are listed as follows:
We first focus on the security and privacy-preserving features of blockchain. The consensus mechanisms, permissioned blockchain and zero-knowledge proof are jointly introduced to give a general understanding for readers;
We describe the blockchain-enabled mobile edge intelligence in the scenario of IoT systems. The potential of blockchain in edge intelligence is included;
The combination of blockchain and AI is further given in a two-way manner. Real world applications of blockchain in AI are summarized;
Discussions of blockchain’s threat are illustrated for future research. For example, the threat of quantum computing and its related research is surveyed in this chapter.
The rest of this chapter is organized as follows. In Section 2, we introduce the security and privacy-preserving features of blockchain. Next, the blockchain-enabled edge intelligence is discussed in Section 3. Then, some blockchain and machine learning combined research is summarized in Section 4. Finally, we discuss some threats for blockchain-enabled systems and conclude this chapter.
Blockchain is famous for its security, and the most well-known social experiment of blockchain today is Bitcoin. As a revolutionary invention, Bitcoin certainly caught many investor’s attention. One index that can be used to determine the popularity of Bitcoin is the total number of wallets created on the Bitcoin networks2. This index is currently at record high (around 65.015 million). Unlike traditional banking systems where a person can only have a limited number of bank accounts, Bitcoin allows users to create accounts with just a few commands/clicks without the involvement of any government issued identity verification process. Therefore, we would not be able to find out how many people tried Bitcoins or engaged in the Bitcoin network service. There is another number that can show the impact of Bitcoin, which is the total hashrate (TH/s) of the Bitcoin network3, this number is also at its record high, about 153.019 million (TH/s) now. Mining hashrate is one of the key security metrics of the Bitcoin network. The bigger the hashrate number or hash power in a network, the greater its security and its overall resistance to attacks. There is no way for us to calculate the actual hashrate on the network. However, from the block difficulty, we can give an estimate of its total hash power [5]. Hash power is delivered by Bitcoin miners, whose computers join the blockchain network to compute the problems together. This mechanism is often called proof-of-work (PoW) and it costs a lot of power and electricity. A study published on Nature Climate Change in 2018 estimated that Bitcoin mining alone could push up global warming by 2 degrees Celsius [6].
At this moment, a single Bitcoin is worth around 40,000 US dollars. The questions are, what are people buying it for? Are there any reasons why mining mechanisms are so energy hungry? Are there any alternative ways to design systems? In the following paragraphs, we will explain to you how Bitcoin achieves its state-of-the-art secure distributed ledger and how it allows people on the boundary of trust to work together. Next, we will introduce you to another concept and discuss how 5G edge devices could benefit from blockchain security.
PoW is the underlying consensus algorithm of Bitcoin [7]. A consensus algorithm in computer science is a process used to achieve agreement on a single data value among distributed processes or systems [8]. This term is commonly used by distributed systems. It explains that in the modern computing era, how multiple servers could work together with high levels of security and fewer errors. In more detail, some servers (or nodes) may fail or may be unreliable in other ways (e.g., being hacked, losing data, running in idle). Therefore, consensus algorithms must be fault tolerant and resilient. Consensus mechanisms function a bit like constitutions in the human world - guiding decisions about what’s acceptable among interacting parties. This is the core of a blockchain system. PoW is commonly recognized as a secure consensus algorithm [7]. It’s a consensus mechanism that heavily relies on computing power and cryptographic hash function (also known as CHF, a mathematical algorithm that maps data of arbitrary size to a bit array of a fixed size). Before diving into this consensus model, one needs to be familiar with the following two concepts, the Crash-Fault Tolerance (CFT) and the Byzantine-Fault Tolerance (BFT).
The Crash-Fault Tolerance (CFT). Just as it states in its name, it can be resilient toward crash/halt events. Suppose that your system has been damaged or lost connection, the CFT based system will still function and give the result that you expect [9]. The CFT fault model has been discussed by academics for a number of years long time and is mature in industrial use cases. Most cloud based companies implemented different CFT methods to prevent the critical problems. We still occasionally hear news about collapse/maintenance of servers of Amazon, Alibaba or Microsoft and developers make some open source or free projects to show you the real-time status of their servers (e.g., the downdetector4).
Byzantine-Fault Tolerance (BFT) is more complicated than CFT. The name Byzantine-Fault Tolerance is derived from a paper published by Leslie Lamport, Robert Shostak and Marshall Pease on SRI International called The Byzantine Generals Problems [10].
Converting the story above into a computer system use case, a distributed system should be resilient to the case when a small portion of the computers in the network are malicious. Every non-malicious entity has the same status (including action). Companies’ server systems are mostly CFT because they set up each node/server in the network and they are very confident that the chances of having malicious nodes are low. Furthermore, they have backup systems that can recover from the previous loss. However for Bitcoin, everyone can hop-on and hop-off the Bitcoin chain. So how do we protect the network and the ledger system’s integrity, making sure no one is taking extra money that does not belong to them or preventing one’s money from being stolen [7]. This is a typical BFT question.
The PoW solves the problem of determining representation in majority decision making. It’s a one-CPU-one-vote proposed by Satoshi Nakamoto [7], the pseudonymous founder of Bitcoin. Around every 10 minutes, the network will wrap around all transactions that happened within the 10 minutes. As illustrated in Figure 1, it uses a cryptographic hash function to hash previous block’s hash, Nonce and transactions together to form a new hash block. Each node will try different nonces (numbers) to find a certain number of zeros in front of the hash result (mining difficulty). This process is called mining, it is power consuming and no less energy consuming, mathematically proven secure short cut has been found yet.
Blockchain Structure [
The beauty of PoW is that the result can be instantly verified but it will be very difficult to tamper with unless the malicious nodes occupy 51 percent of the total computing power of the network [11]. With increasing numbers of miners joining the mining and significant numbers of investments in this area, the difficulty of tampering with the Bitcoin network becomes harder and harder. However, a lot of criticisms about blockchain also arose in the past decades, especially about its efficiency, energy consumption and its economic model. Environmentalists disagree with this mechanism due to the fact that the annual electricity consumption of the Bitcoin network is nearly 120 gigawatts (GW) per second. Equivalent to 49.440 wind turbines (412 turbines per GW) when generating power at peak production per second [12]. There is another focus on Bitcoin PoW mechanisms which is about the ASIC miners. Since the Bitcoin mining mechanism is like solving a math puzzle, developers moved from using CPU to using Application-Specific Integrated Circuit (ASIC) machines to mine Bitcoin. This shift significantly increased the Bitcoin mining difficulty since ASIC is a dedicated computing circuit that is purely designed for mining purposes [13]. Therefore, the ASIC’s performance is much better than the General Purposes Computing Unit (CPU). This brings a huge barrier for beginners to join the mining, and it will further enhance the Bitcoin mining centralization, not to mention that the Bitcoin miner market is in a relatively monopoly situation, as 66% of market share of miners are occupied by Bitmain5.
Due to the above drawbacks and concerns over PoW mechanisms, designers have developed a new consensus mechanism called Proof-of-Stake (PoS) where miners have been incentivized based on how much “work (hash power)” they have contributed. In contrast, the PoS mechanism asks miners to bet tokens in order to participate in the new block generation. This concept was first discussed in 2012 by Peercoin [14, 15], and had later become a popular discussion and experiment among many cryptocurrencies.
Compared with the PoW mechanism, PoS is simpler. The more you stake, the higher the influence you have on determining the next block [14]. The assumption is based on the premise that high staking nodes are less likely to lie because of high losses for them if they tried to tamper with the chain. Under this scenario, nodes are no longer needed to solve cryptographic puzzles. Apparently, compared with PoW, PoS is more environmentally friendly. Besides, less computation will further enhance the network transaction speed as well as the throughput [16]. There are currently two types of PoS consensus models: Chain-based Proof-of-Stake and Consortium Consensus model [14]. Chain-based Proof-of-Stake chooses availability over consistency [17]. The algorithm pseudo-randomly selects a validator during each time slot. Validators will then have the right to create a single block and point it back to the previous longest chain. Consortium Consensus Model chooses consistency over availability. During each voting procedure, every node counts proportionally to the stake it bets.
Apparently, the richer nodes have higher chances of getting the reward. In order to avoid the monopoly situation, a random selection model is required for most PoS algorithms. Each token has their own token economy and some of them include token age design, where tokens being staked for a longer time will be more likely to be selected. In general, the network wants holders to stake validation tokens as long as possible and act as hosts.
With rapid adoption of 5G networks by different countries and regions, edge computing and edge devices will play an important role in the network. Blockchain is currently the state-of-the-art secure network system and has many use cases in edge computing [18]. In the upcoming 5G era, more and more devices will have access to the network, since one of the main goals of 5G is to support the IoT [19, 20]. As predicted, data transmission rate and volume will exponentially grow and thus to have a secure communication channel and a consensus algorithm for edge devices have been identified in recent research papers. Edge devices for 5G network are often not designed for doing heavy computation. Thus, a new consensus model is needed for the 5G era. PoS as one of the successful consensus models has potential in the IoT era due to its simpler structure, high security feature and completely decentralized characteristics. Besides PoS, Delegated Proof-of-Stake (DPoS) is another possible consensus algorithm for 5G use cases with greater scalability and faster transactions. However, DPoS is not completely decentralized; it is an intermediate solution finding the balance between centralization and decentralization [21].
In 2020, a Netfliex documentary called The Social Dilemma raised awareness about risks to our personal privacy. The Social Dilemma exposes audiences to shocking facts about how social media apps are currently using intelligence algorithms to control user’s behaviours, as a result, making users addicted to their own content, and gathering user’s data to target users with ads without any regulatory supervision [22].
Traditional banking systems often require many documents to set up one account. However, registering a public blockchain network normally does not require any identity verification and there is no limitation on how many accounts that you can build and there is no cost associated with making an account. Bitcoin (BTC) and Ethereum (ETH) are currently the most popular public blockchain networks6. When you send Ether (the cryptocurrency in Ethereum) on Ethereum platform, the sender and receiver are both just wallet addresses, hashes of a public key. Each transaction will be broadcasted on the mainnet.
Blockchain has many user scenarios. As for Bitcoin, it brings people to work together even if they are all on the boundary of trust. Users in the Bitcoin network have no need to trust each other at the beginning and anyone can hop-on and hop-off the network. Public blockchain networks are mostly targeting monetary systems and have their own token economics. However, public blockchain networks are often very slow and cannot be used in specific scenarios due to complex consensus algorithms to prevent malicious attacks. To make blockchain networks be more useful and specific to each use case, developers proposed permissioned blockchain network ideas. Permissioned blockchains usually involve a consortium of organizations who are in charge of verifying the transition history instead of asking pseudonymous miners to participate in the mining process [23]. Permissioned blockchains are often popular in the industries that rely on digital data, for example, supply chain management, liquidation in the financial industry, manufacturing industry. These industries take data security, data privacy and role definition seriously and are keen on pursuing higher efficiency. The operation of these industries is often similar to a chain reaction; one mistake in one process will cause sequential reaction in the following processes.
Public blockchain networks are open to anyone, where permissioned blockchains require identity verification as an extra security layer. In a nutshell, nodes on permissioned blockchains are verified and their roles in the network are predefined.
Permissioned networks can be used to protect sensitive data. Public blockchain networks set all users/nodes with equal amounts of power. In contrast, a permissioned blockchain network can have a more complicated internal structure to ensure data security, and access controls to specify that only nodes with permission can retrieve.
People may wonder whether there are mechanisms that can be used by a public blockchain network to hide some transactions or protect one’s address from being traced. Zero-knowledge proof (ZKP) is a proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. The verifier should receive no knowledge before verification and after the verification [24]. This sounds unreal because in the real world, we gain trust in third parties through revealing our private messages or information such as date of birth, secret key or password. There is a famous story on ZKP. It was about two mathematicians who both claimed that they found the solution equation of a formula. However, Neither of them wanted to reveal it to the public. They later conducted a competition in which both drafted a question for their competitor and they would solve the question from each other by using their own method and to show their solutions. Verifiers only needed to check whether their solutions were correct to determine who actually found the solution equation of that formula. As a result, neither party revealed any information to the verifier, but the verifier still had sufficient evidence to determine who actually knew the solution.
Generally speaking, ZKP has two categories, the interactive and non-interactive ZKPs. Interactive ZKP is more intuitive. It requires intervention between individuals (or computer systems) to prove their knowledge and the individual validating the proof. For example, the method used by the mathematician competition is based on interactive ZKP. Interactive ZKP already has many applications in the communication industry, and such a system requires a stable and continuous communication channel. Non-interactive proof requires none of that, it takes less time and only one message is enough [25]. It’s more efficient and can be optimized for IoT systems. Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) is a type of non-interactive ZKP and has been used by cryptocurrency Zcash as its core privacy-preserving mechanism. In a nutshell, Zcash can hide some transactions to make the blockchain more privacy focused, and external parties will not be able to trace many accounts’ transaction history. However, researchers from Carnegie Mellon University found that 99.9% of Zcash and 30% of Monero (another privacy-preserving token) transactions were traceable because users may not use them properly [26, 27].
In this section, we introduce the potential and applications of blockchain in edge intelligence. To be specific, we aim at describing how AI could be implemented on the edge of the Internet and how blockchain could improve the mobile edge intelligence. We first introduce offloading strategies and the MEC architecture for readers. Then, we list how blockchain can improve mobile edge intelligence in terms of data security. Finally, we describe the blockchain-enabled resources allocation and market trading in the mobile edge intelligence systems with the constrains of energy supply, computational power, and the size of training data.
Although the PoW can secure transaction records in Bitcoin and similar blockchain networks, it is still very challenging to implement this kind of consensus mechanism for securing AI applications because it is a computational intensive task. To be specific, realizing blockchain-enabled AI for edge devices (i.e., edge intelligence) requires two kinds of tasks to be executed. On one hand, mining process is necessary for establishing consensus among distributed IoTDs. On the other hand, data training will be performed at each IoTD in a decentralized manner.
However, IoTDs are energy-constrained and unable to process complex computational tasks. Fortunately, edge computing is capable of handling this issue. The main idea of realizing blockchain-enabled AI on the edge network is to use different offloading strategies for IoTDs. As illustrated in Figure 2, one can see that computing tasks can be offloaded from IoTDs to MEC servers located in different places, including small-cell base stations, cellular base stations, and the cloud data center [28]. As the distance between IoTD and MEC server becomes shorter, the computing capability decreases.
MEC architecture for IoT devices.
However, data leakage and other security issues impose great challenges to MEC, especially for MEC-enabled blockchain and AI applications. In [3], authors discussed the privacy issues in MEC-enabled blockchain networks. Data processing and mining tasks were offloaded to nearby servers. Moreover, the privacy level was modeled in this paper. The trade-off and optimization among energy consumption, privacy, and latency were jointly considered. Furthermore, [29] investigated the trust mechanism for edge network by using blockchain technology. Selfish edge attacks were discussed in this paper. The selfish attack means MEC servers provided the IoTDs with fake service and less computational resources. To deal with this attack, the authors explored the blockchain-based reputation record system, wherein selection of the miner relies upon the reputation of the MEC servers.
As the growth of IoTDs and AI applications becomes explosive, it becomes challenging to coordinate tasks offloading in wireless networks, especially for the ultra-dense wireless network [30]. To deal with this problem, authors in [30] proposed a decentralized platform based on blockchain. Computational tasks were first published and recorded in this platform, then user matching was evaluated and conducted based on the tradeoff between service latency and energy consumption. Moreover, offloading mode selection was discussed in [31], including offload tasks to a nearby server or a group of users. The content caching strategy was studied to handle the traffic issue in blockchain wireless networks. Furthermore, content caching could be used to extend the block capability of a blockchain platform. To be specific, hashed blocks were cached in MEC servers [32]. Then, images and even videos could be stored into the block for AI applications. Authors in [33] further optimized and proposed a block size adaptation scheme for video transcoding.
Another issue is cooperation incentive. As mentioned above, nearby MEC servers have limited resources to share. The cooperation computation offloading research was discussed in [34]. To incentivize and establish this kind cooperation, a coin loaning strategy was given for IoTDs in [35]. Besides, most related research ignored the real need of IoTDs and blockchain-enabled AI applications. For example, fast transaction writing and uploading are critical for low-latency applications [36]. In another scenario, the revenue (e.g., tokens) may be treated as the first priority in the computing cooperation. Moreover, the scalability and efficiency should be considered in offloading strategies. To solve this issue, blockchain technology and the directed acyclic graph were explored in [37].
IoT data contains sensitive information related to individuals. Therefore, IoT data security is critical in establishing AI applications based on IoTDs. As described in the previous part, blockchain-based MEC is a key solution to enable AI for IoTDs. To secure IoT data and MEC, blockchain is a promising strategy. To be specific, authentication, secure communication, data privacy, and data integrity are four main strategies to enable IoT securtiy in the scenario of MEC.
Although blockchain-enabled edge intelligence is a cutting-edge technology to enable AI applications for IoT systems, it is vulnerable when facing malicious attacks. Authentication of identities in blockchain-enabled MEC system was discussed in [38]. The authors proposed a digital validation strategy based on group signature scheme. In this way, the identities of block creators were verified and authenticated to prevent edge intelligence from false records. Moreover, to manage privacy and data leakage issues, authors in [39] discussed the authentication for federated learning (FL) peers in the edge computing context. By exploring blockchain technology and smart contract, the FL and differential privacy technique were proposed in this article.
Secure data sharing is another aspect of data security for edge intelligence. The basic idea of secure data sharing is that data should be stored and shared in a trusted way. Consortium blockchain was discussed in [40] for the secure and efficient data sharing. Different from a public blockchain network, the consensus process is performed on a group of pre-determined edge nodes in consortium blockchain. The proposed model contained two kinds of smart contracts, including data storage smart contract and information sharing smart contract, allowing the auditing and governance of data sharing. Besides, the data sharing problem was transformed into a machine learning problem in [41]. FL was explored in this article to share the learning model rather than raw data.
The integrity of data should be considered in edge intelligence. As illustrated in Figure 3, any false information may do harm to the global ML model. For example, poisoning attack and input attack are two major types of issues in data integrity in AI application. The first one normally occurs in the initial stage of AI model training. By manipulating training data, the AI model would be ineffective. The latter one tends to use manipulated data to shape and affect the AI model output in a way desired by attackers. The design of blockchains naturally protects data integrity because any tampering of previous data recorded are not permissioned. MEC servers were used to validate and store blockchain data in [42] for data integrity. The data acquisition process for IoT system was discussed in this article. To be specific, the identity of a data sender was verified in this process. IoT data were recorded and stored in blockchain only if the validation was successful. Additionally, verifiable integrity of IoT data could be realized by blockchain [43].
Poisoning attack on blockchain-enable edge intelligence.
As we have discussed in the previous part, protection of privacy presents great challenges for mobile edge computing. Sensitive data should not be shared to any trustless third parties. The decentralization of privacy was discussed in [44]. The off-chain storage technique was used in the blockchain for privacy-preserving purposes. Furthermore, the topology of the edge intelligence network is another kind of sensitive information. A heterogeneous MEC system was proposed in [45] to provide MEC network topology with protections. FL was used in [41] to solve the privacy issue in data sharing. Differential strategy was further integrated into FL to prevent the leakage of sensitive IoT information. In terms of industrial IoT systems, authors in [46] explored the privacy issue in industry 4.0. ML models were trained on the sensitive data in industrial IoT systems. Therefore, the establishment of trustworthiness and privacy-preservation was a critical aspect in designing AI applications for industry 4.0 aspect. By jointly exploring the Ethereum blockchain, smart contracts, differential privacy, and FL, the authors proposed a novel blockchain named PriModChain to handle the privacy and security issues in industrial IoT systems.
In the social layer, blockchain is a promising technology for peer-to-peer resources trading. As is shown in Figure 4, energy, information, and computing power are three major resources in blockchain-enabled markets. As we have discussed, MEC servers are more powerful than the IoTDs in terms of storage and computing power. However, IoTDs are far more than MEC servers. That means resources are still very limited on the edge of Internet. Therefore, resources allocation is critical for blockchain-enabled edge intelligence. Fortunately, blockchain can establish an open market among IoTDs and MEC serves, enabling resources trading according to the need in system level.
Blockchain-enabled resources market for edge intelligence.
Energy trading is important and useful in IoT systems. This is because IoTDs are energy-constrained. Different from the MEC servers with the constant power supply, IoTDs are battery-powered and not very convenient to recharge. Energy-knowledge trading was discussed in [47]. On-device Al applications would be useless when IoTDs’ battery is exhausted. Therefore, authors in this paper proposed a wireless way to power IoTDs. A permissioned blockchain was used for peer-to-peer (P2P) resources trading between energy power and training data sets.
Marketing is not only a platform to trade resources but also an effective solution to incentivize IoTDs and MEC servers into this blockchain-enabled platform. FL training market was studied in [48]. The idea of using blockchain is to establish a decentralized and fair market among MEC servers groups. A smart contract based resources trading market was further proposed in this article to ensure automatic transactions.
Content market is another topic for blockchain-enabled edge intelligence. To be specific, video transcoding and content delivery were investigated in [49]. A decentralized market was established by blockchain among trustless entities in a content delivery network. Content price, offloading cost, and content quality were jointly considered in this article. Furthermore, the willingness of MEC caching was discussed in [50]. In general, blockchain incited MEC servers by satisfying their expected rewards.
Last but not least, data is another type of digital asset, especially for AI applications. To be specific, data ownership is critical in the performance evaluation of AI training. Authors in [51] investigated the data ownership in AI training. Transactions among data owners, AI developers, and service providers were recorded in the proposed blockchain system. In this way, trading and data usage actions became traceable and verifiable. Thus, the ownership of training data sets was well-preserved. Nevertheless, for some types of sensitive transactions, where the existence of a transnational relationship between two parties may need to remain private, residual privacy concerns remain when all intervention is recorded on the ledger.
One thing the public are concerned with respect to blockchain is its security performance. Although blockchain utilizes cryptography and consensus to enforce network security and privacy, it is still not immune to potential attacks. In 2017, the Bitcoin researchers [5] found out that the Bitcoin network is vulnerable to some state of the art attacks, even though it has been successfully running for 8 years. In 2019, some vulnerabilities in the Ethereum network were exposed and it was reported that the network has experienced several attacks such as 51% attacks and data breaching attacks [52].
Machine learning has been considered as one of the tools to improve the blockchain security. Scicchitano
Somdip Dey [54] was interested in improving the blockchain consensus mechanism. By utilizing game theory and supervised machine learning algorithm, an improved Proof-of-Work consensus is introduced to prevent any quantifiable attacks. By analyzing the attacker’s activities and rewards, a utility/payoff function can be derived and fed into a supervised machine learning model. This machine learning model has the ability to detect whether an attack is bound to happen or not - based on the value of the commodity/service. If the attack is likely to happen, the machine learning agent has the ability to prevent the blockchain confirmation until a new block of fair transactions is generated again.
Hou
Thanks to the blockchain and cryptography, the emergence of cryptocurrency has drawn a lot of attention. Unlike fiat money and stocks, the cryptocurrencies have shown significantly unstable fluctuations and have disrupted the investment industries. Researchers have made steady progress on how to improve the profit in the cryptocurrency by applying machine learning models to analyze market performance or network data.
One main direction in this research area is to utilize the machine learning models to predict the prices of cryptocurrencies. However, the data source and the detail techniques may vary. Kim
Another direction in this research area is to improve the mining strategies and power efficiencies using machine learning approaches. Wang
The Bitcoin has become an alternative medium of value exchange. Behind the screens, some users have taken advantage of the Bitcoin network for their illegal purposes. With the CoinJoin mixing service, Bitcoin has been recognized as a safe currency in the dark net markets and it can also be used for money laundering. In this case, there is an urgent need to develop transaction and address tracing systems. Machine learning has been considered as a powerful tool to perform cryptocurrency address clustering and labeling for detecting illegal activities.
In 2017, Yin and Vatrapu [65] built several different classifiers using supervised machine learning models, to identify the Bitcoin addresses that are related to criminal activities. The next year, Harlev
While machine learning systems have become powerful tools to solve real-world problems, people started to question its trustworthiness. First of all, machine learning systems might be susceptible to data poisoning attacks. The hackers might try to manipulate the system performance by altering the collected data or inserting constructed poison instances. Secondly, it is difficult for humans to understand decisions made by the machine learning systems if there is no traceable logs or training histories. Thirdly, centralized servers are still heavily required for completing the model training processes. Finally, the model construction stages are not automated and the human involvement may bring biases into the final system. Blockchains and smart contracts have shown great potential to solve those challenges.
Blockchain is known for keeping data secure and safe. With reliable and traceable data stored on the blockchain, the researchers can ensure that machine learning algorithms will produce the most trusted and credible results. Muhammad
Mugunthan
In 2018, Chen
Blockchains and smart contracts can also be utilized to improve the machine learning processes and eliminate human involvements. Ouyang
Kim
Muhammad
Besides that, some researchers in this subsection work on designing new blockchain mechanisms for the distributed machine learning tasks. Felipe
Instead of proposing innovative and theoretical designs, some researchers intend to figure out how this combined research can be applied on some real-world problems. Their contribution establishes a bridge between this new research area and the traditional industries such as transportation, hospital management, supply chain, etc.
Pokhrel and Choi [79] developed a mathematical framework that adapts the blockchain-based federated learning design into the autonomous vehicle industry. They utilize the consensus mechanism and a renewal reward approach to enable on-vehicle machine learning training in the distributed network. The on-vehicle updates and global models are maintained in the blockchain, which are visible to and verifiable by every vehicle. Rewards are distributed to the vehicle owners based on the size of their updates accepted into the global model. They also discussed the limitations of this design and the performance of the system based on the simulations and numerical analysis.
Hua
The healthcare industry has long been an early adopter of and benefited greatly from technological advances. Chen et al. in [81] proposed a blockchain based disease-classification framework called Health-Chain. In the Health-Chain system, multiple institutes can train the model with their patient records, collaborate asynchronously in the blockchain network and contribute to the global model with privacy preserved. The researchers implement the system in two disease recognition tasks, breast cancer diagnosis and ECG arrhythmia classification, and both simulations demonstrate promising results.
Kumar
Rahman
Kamble
Mao
Yong
Blockchain systems are designed to be distributed. Ironically, most blockchain networks are facing problems on centralization. For example, PoW mechanism relies on the success of mining mechanism. The higher the hashrate is, the more resilient the Bitcoin is against attacks. However, on the market side, mining a Bitcoin becomes increasingly harder. In order to gain more reward, miners share their hash power under a common mining pool. As shown in Figure 5, the top 4 mining pools currently contribute to more than 50% of the entire hash power.
Bitcoin Main Network Hashrate Distribution [
In other words, if a hacker controls or manipulates the top4 mining pools, they might be able to perform 51% of the attacks. This is known as mining pool attacks. Besides directly controlling the mining pool, multiple variations of mining pool attacks have also been proposed. Selfish mining, for instance, refers to when miners who find the next block withhold the information and then release multiple valid blocks at once, resulting in other miners losing their block rewards and blocks. Many upgraded versions of mining pool attacks have been brought forth, such as Fork-after-Withhold (FAW) [88].
Ideally speaking, blockchain is resilient to Denial-of-Service Attack (DDoS) due to its distributed characteristics. However, the network layer is not completely decentralized. It includes routers, Internet Service Provider (ISP) for mining pools and cloud services. More than 60% of the Bitcoin nodes are hosted in less than 100 IP prefixes [89]. Such attacks on network layers are easier to perform and could have a larger impact on the entire blockchain network.
The existence and advancement of quantum computers will bring a massive change to our current technology industry, from cryptography [90], artificial intelligence [91] to computer architecture [92]. Nowadays, small to intermediate-scale quantum computers already exist in universities and industry laboratories (Noisy intermediate Scale quantum devices, often called NISQ [93]). Such noisy devices with about 50 qubits are promising to demonstrate quantum supremacy in the following years [94]. Quantum computers are devices using quantum phenomena such as superposition and entanglement to perform calculation. Quantum computers are believed to solve certain computational problems, such as integer factorization, substantially faster than traditional computers [94].
Blockchain security heavily relies on asymmetric encryption [90]. Besides, hash functions are commonly used by most blockchain networks in order to compress the content of all information. Both hash functions and asymmetric encryption are threatened by the evolution of quantum computers due to shor’s algorithm [90], a polynomial-time solution to integer factorization problems invented by Peter Shor in 1994 [95]. Asymmetric encryption or public key encryption was designed based on elliptic curve cryptography (ECC) [90]. Quantum computers dominate ECDSA (Elliptic Curve Digital Signature Algorithm), a secure and efficient tool used in Bitcoin systems [7]. Hence, a quantum resilient and high efficiency algorithm is needed for future Bitcoin/blockchain development [90].
Another algorithm that will bring a huge impact on blockchain is called Grover’s algorithm. Grover’s algorithm is a quantum computing algorithm that can quadratically speed up the unstructured search problem [96]. Furthermore, this algorithm has been used as a general trick or subroutine to obtain quadratic run time improvements for many other algorithms [97]. Firstly, grover’s algorithm can be used to find collisions in hash functions, causing hash function to lose security. Secondly, Grover’s algorithm can be used to accelerate mining because of its efficiency in searching for nonces, resulting in biasing in computational power and further recreating entire blockchains to manipulate the historical transactions [90].
Last but not least, to successfully implement Shor’s algorithm, it will require more than 5,000 qubits to factor cryptographically significant numbers [98]. That is only without considering the error correction properties of quantum mechanisms. With error correction, the requirement may go up to as high as a million. In addition to the large number of qubits, it also requires hundreds of millions of gate operations [98]. This requirement is nearly impossible to achieve today, as Google’s best quantum computer can only reach 54 qubits in 2019. Note that there are many approaches to build quantum computers; the qubits numbers referred to here is based on digitized adiabatic quantum computers with a superconducting circuit [99]. Another famous approach is using quantum annealing [100], led by D-Wave.
In this part, we reviewed and summarized the state-of-the-art research papers related to combining blockchain and AI in different scenarios. We provided a survey about how blockchain network could be integrated into the MEC technology. With security and privacy-preserving features, blockchain could be an effective solution to secure the aspects of data sharing and resources allocation in AI applications, especially for mobile edge intelligence. Besides, we introduced multiple research papers with respect to how machine learning and blockchain collaborate with each other. While machine learning can be utilized to improve network security and stability of blockchain, blockchain can also automate the model learning process and protect sensitive training data. We further discussed some threats that would challenge blockchain systems, including malicious attacks and quantum computing. Overall, this chapter demonstrates that Blockchain and AI researches are still at an early stage. Once all the bottlenecks and challenges in this combined research area are addressed, blockchain network could become a necessary and important platform to enable and improve AI applications across different industries.
This work was supported by Blockchain@UBC and Natural Sciences and Engineering Research Council of Canada (CREATE Program grant 528125).
"I work with IntechOpen for a number of reasons: their professionalism, their mission in support of Open Access publishing, and the quality of their peer-reviewed publications, but also because they believe in equality. Throughout the world, we are seeing progress in attracting, retaining, and promoting women in STEMM. IntechOpen are certainly supporting this work globally by empowering all scientists and ensuring that women are encouraged and enabled to publish and take leading roles within the scientific community." Dr. Catrin Rutland, University of Nottingham, UK
",metaTitle:"Advantages of Publishing with IntechOpen",metaDescription:"We have more than a decade of experience in Open Access publishing. \n\n ",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"We have more than a decade of experience in Open Access publishing. The advantages of publishing with IntechOpen include:
\\n\\nOur platform – IntechOpen is the world’s leading publisher of OA books, built by scientists, for scientists.
\\n\\nOur reputation – Everything we publish goes through a two-stage peer review process. We’re proud to count Nobel laureates among our esteemed authors. We meet European Commission standards for funding, and the research we’ve published has been funded by the Bill and Melinda Gates Foundation and the Wellcome Trust, among others. IntechOpen is a member of all relevant trade associations (including the STM Association and the Association of Learned and Professional Society Publishers) and has a selection of books indexed in Web of Science's Book Citation Index.
\\n\\nOur expertise – We’ve published more than 4,500 books by more than 118,000 authors and editors.
\\n\\nOur reach – Our books have more than 130 million downloads and more than 146,150 Web of Science citations. We increase citations via indexing in all the major databases, including the Book Citation Index at Web of Science and Google Scholar.
\\n\\nOur services – The support we offer our authors and editors is second to none. Each book in our program receives the following:
\\n\\nOur end-to-end publishing service frees our authors and editors to focus on what matters: research. We empower them to shape their fields and connect with the global scientific community.
\\n\\n"In developing countries until now, advancement in science has been very limited, because insufficient economic resources are dedicated to science and education. These limitations are more marked when the scientists are women. In order to develop science in the poorest countries and decrease the gender gap that exists in scientific fields, Open Access networks like IntechOpen are essential. Free access to scientific research could contribute to ameliorating difficult life conditions and breaking down barriers." Marquidia Pacheco, National Institute for Nuclear Research (ININ), Mexico
\\n\\nInterested? Contact Ana Pantar (book.idea@intechopen.com) for more information.
\\n"}]'},components:[{type:"htmlEditorComponent",content:'We have more than a decade of experience in Open Access publishing. The advantages of publishing with IntechOpen include:
\n\nOur platform – IntechOpen is the world’s leading publisher of OA books, built by scientists, for scientists.
\n\nOur reputation – Everything we publish goes through a two-stage peer review process. We’re proud to count Nobel laureates among our esteemed authors. We meet European Commission standards for funding, and the research we’ve published has been funded by the Bill and Melinda Gates Foundation and the Wellcome Trust, among others. IntechOpen is a member of all relevant trade associations (including the STM Association and the Association of Learned and Professional Society Publishers) and has a selection of books indexed in Web of Science's Book Citation Index.
\n\nOur expertise – We’ve published more than 4,500 books by more than 118,000 authors and editors.
\n\nOur reach – Our books have more than 130 million downloads and more than 146,150 Web of Science citations. We increase citations via indexing in all the major databases, including the Book Citation Index at Web of Science and Google Scholar.
\n\nOur services – The support we offer our authors and editors is second to none. Each book in our program receives the following:
\n\nOur end-to-end publishing service frees our authors and editors to focus on what matters: research. We empower them to shape their fields and connect with the global scientific community.
\n\n"In developing countries until now, advancement in science has been very limited, because insufficient economic resources are dedicated to science and education. These limitations are more marked when the scientists are women. In order to develop science in the poorest countries and decrease the gender gap that exists in scientific fields, Open Access networks like IntechOpen are essential. Free access to scientific research could contribute to ameliorating difficult life conditions and breaking down barriers." Marquidia Pacheco, National Institute for Nuclear Research (ININ), Mexico
\n\nInterested? Contact Ana Pantar (book.idea@intechopen.com) for more information.
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5816},{group:"region",caption:"Middle and South America",value:2,count:5281},{group:"region",caption:"Africa",value:3,count:1754},{group:"region",caption:"Asia",value:4,count:10511},{group:"region",caption:"Australia and Oceania",value:5,count:906},{group:"region",caption:"Europe",value:6,count:15913}],offset:12,limit:12,total:119061},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{hasNoEditors:"0",sort:"dateEndThirdStepPublish",topicId:"20"},books:[{type:"book",id:"10672",title:"Nonlinear Optics",subtitle:null,isOpenForSubmission:!0,hash:"cfe87b713a8bee22c19361b86b03d506",slug:null,bookSignature:"Dr. Boris I. Lembrikov",coverURL:"https://cdn.intechopen.com/books/images_new/10672.jpg",editedByType:null,editors:[{id:"2359",title:"Dr.",name:"Boris",surname:"Lembrikov",slug:"boris-lembrikov",fullName:"Boris Lembrikov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10674",title:"Topics on Quantum Information Science",subtitle:null,isOpenForSubmission:!0,hash:"d7481712cff0157cd8f849cba865727d",slug:null,bookSignature:"Prof. Sergio Curilef and Dr. Angel Ricardo Plastino",coverURL:"https://cdn.intechopen.com/books/images_new/10674.jpg",editedByType:null,editors:[{id:"125424",title:"Prof.",name:"Sergio",surname:"Curilef",slug:"sergio-curilef",fullName:"Sergio Curilef"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10921",title:"Plasma Science and Technology",subtitle:null,isOpenForSubmission:!0,hash:"c45670ef4b081fd9eebaf911b2b4627b",slug:null,bookSignature:"Dr. Aamir Shahzad",coverURL:"https://cdn.intechopen.com/books/images_new/10921.jpg",editedByType:null,editors:[{id:"288354",title:"Dr.",name:"Aamir",surname:"Shahzad",slug:"aamir-shahzad",fullName:"Aamir Shahzad"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10852",title:"Electromagnetic Compatibility",subtitle:null,isOpenForSubmission:!0,hash:"f5d2cce3a2adbd5d108d3301ee97025b",slug:null,bookSignature:"Dr. Ahmed Kishk",coverURL:"https://cdn.intechopen.com/books/images_new/10852.jpg",editedByType:null,editors:[{id:"150146",title:"Dr.",name:"Ahmed",surname:"Kishk",slug:"ahmed-kishk",fullName:"Ahmed Kishk"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:26},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:8},{group:"topic",caption:"Business, Management and Economics",value:7,count:3},{group:"topic",caption:"Chemistry",value:8,count:11},{group:"topic",caption:"Computer and Information Science",value:9,count:9},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:9},{group:"topic",caption:"Engineering",value:11,count:25},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:4},{group:"topic",caption:"Materials Science",value:14,count:7},{group:"topic",caption:"Mathematics",value:15,count:2},{group:"topic",caption:"Medicine",value:16,count:45},{group:"topic",caption:"Neuroscience",value:18,count:3},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:3},{group:"topic",caption:"Physics",value:20,count:4},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Robotics",value:22,count:1},{group:"topic",caption:"Social Sciences",value:23,count:3},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:2}],offset:12,limit:12,total:4},popularBooks:{featuredBooks:[{type:"book",id:"8472",title:"Bioactive Compounds in Nutraceutical and Functional Food for Good Human Health",subtitle:null,isOpenForSubmission:!1,hash:"8855452919b8495810ef8e88641feb20",slug:"bioactive-compounds-in-nutraceutical-and-functional-food-for-good-human-health",bookSignature:"Kavita Sharma, Kanchan Mishra, Kula Kamal Senapati and Corina Danciu",coverURL:"https://cdn.intechopen.com/books/images_new/8472.jpg",editors:[{id:"197731",title:"Dr.",name:"Kavita",middleName:null,surname:"Sharma",slug:"kavita-sharma",fullName:"Kavita Sharma"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9685",title:"Agroecosystems",subtitle:"Very Complex Environmental Systems",isOpenForSubmission:!1,hash:"c44f7b43a9f9610c243dc32300d37df6",slug:"agroecosystems-very-complex-environmental-systems",bookSignature:"Marcelo L. Larramendy and Sonia Soloneski",coverURL:"https://cdn.intechopen.com/books/images_new/9685.jpg",editors:[{id:"14764",title:"Dr.",name:"Marcelo L.",middleName:null,surname:"Larramendy",slug:"marcelo-l.-larramendy",fullName:"Marcelo L. Larramendy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8564",title:"Cell Interaction",subtitle:"Molecular and Immunological Basis for Disease Management",isOpenForSubmission:!1,hash:"98d7f080d80524285f091e72a8e92a6d",slug:"cell-interaction-molecular-and-immunological-basis-for-disease-management",bookSignature:"Bhawana Singh",coverURL:"https://cdn.intechopen.com/books/images_new/8564.jpg",editors:[{id:"315192",title:"Dr.",name:"Bhawana",middleName:null,surname:"Singh",slug:"bhawana-singh",fullName:"Bhawana Singh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9629",title:"Electroencephalography",subtitle:"From Basic Research to Clinical Applications",isOpenForSubmission:!1,hash:"8147834b6c6deeeec40f407c71ad60b4",slug:"electroencephalography-from-basic-research-to-clinical-applications",bookSignature:"Hideki Nakano",coverURL:"https://cdn.intechopen.com/books/images_new/9629.jpg",editors:[{id:"196461",title:"Prof.",name:"Hideki",middleName:null,surname:"Nakano",slug:"hideki-nakano",fullName:"Hideki Nakano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8760",title:"Structure Topology and Symplectic Geometry",subtitle:null,isOpenForSubmission:!1,hash:"8974840985ec3652492c83e20233bf02",slug:"structure-topology-and-symplectic-geometry",bookSignature:"Kamal Shah and Min Lei",coverURL:"https://cdn.intechopen.com/books/images_new/8760.jpg",editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9161",title:"Frailty in the Elderly",subtitle:"Understanding and Managing Complexity",isOpenForSubmission:!1,hash:"a4f0f2fade8fb8ba35c405f5ad31a823",slug:"frailty-in-the-elderly-understanding-and-managing-complexity",bookSignature:"Sara Palermo",coverURL:"https://cdn.intechopen.com/books/images_new/9161.jpg",editors:[{id:"233998",title:"Ph.D.",name:"Sara",middleName:null,surname:"Palermo",slug:"sara-palermo",fullName:"Sara Palermo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8445",title:"Dam Engineering",subtitle:"Recent Advances in Design and Analysis",isOpenForSubmission:!1,hash:"a7e4d2ecbc65d78fa7582e0d2e143906",slug:"dam-engineering-recent-advances-in-design-and-analysis",bookSignature:"Zhongzhi Fu and Erich Bauer",coverURL:"https://cdn.intechopen.com/books/images_new/8445.jpg",editors:[{id:"249577",title:"Dr.",name:"Zhongzhi",middleName:null,surname:"Fu",slug:"zhongzhi-fu",fullName:"Zhongzhi Fu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8937",title:"Soil Moisture Importance",subtitle:null,isOpenForSubmission:!1,hash:"3951728ace7f135451d66b72e9908b47",slug:"soil-moisture-importance",bookSignature:"Ram Swaroop Meena and Rahul Datta",coverURL:"https://cdn.intechopen.com/books/images_new/8937.jpg",editors:[{id:"313528",title:"Associate Prof.",name:"Ram Swaroop",middleName:null,surname:"Meena",slug:"ram-swaroop-meena",fullName:"Ram Swaroop Meena"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7031",title:"Liver Pathology",subtitle:null,isOpenForSubmission:!1,hash:"631321b0565459ed0175917f1c8c727f",slug:"liver-pathology",bookSignature:"Vijay Gayam and Omer Engin",coverURL:"https://cdn.intechopen.com/books/images_new/7031.jpg",editors:[{id:"273100",title:"Dr.",name:"Vijay",middleName:null,surname:"Gayam",slug:"vijay-gayam",fullName:"Vijay Gayam"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8158",title:"Veganism",subtitle:"a Fashion Trend or Food as a Medicine",isOpenForSubmission:!1,hash:"d8e51fc25a379e5b92a270addbb4351d",slug:"veganism-a-fashion-trend-or-food-as-a-medicine",bookSignature:"Miljana Z. Jovandaric",coverURL:"https://cdn.intechopen.com/books/images_new/8158.jpg",editors:[{id:"268043",title:"Dr.",name:"Miljana Z.",middleName:"Z",surname:"Jovandaric",slug:"miljana-z.-jovandaric",fullName:"Miljana Z. Jovandaric"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:5315},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"8472",title:"Bioactive Compounds in Nutraceutical and Functional Food for Good Human Health",subtitle:null,isOpenForSubmission:!1,hash:"8855452919b8495810ef8e88641feb20",slug:"bioactive-compounds-in-nutraceutical-and-functional-food-for-good-human-health",bookSignature:"Kavita Sharma, Kanchan Mishra, Kula Kamal Senapati and Corina Danciu",coverURL:"https://cdn.intechopen.com/books/images_new/8472.jpg",editors:[{id:"197731",title:"Dr.",name:"Kavita",middleName:null,surname:"Sharma",slug:"kavita-sharma",fullName:"Kavita Sharma"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9685",title:"Agroecosystems",subtitle:"Very Complex Environmental Systems",isOpenForSubmission:!1,hash:"c44f7b43a9f9610c243dc32300d37df6",slug:"agroecosystems-very-complex-environmental-systems",bookSignature:"Marcelo L. Larramendy and Sonia Soloneski",coverURL:"https://cdn.intechopen.com/books/images_new/9685.jpg",editors:[{id:"14764",title:"Dr.",name:"Marcelo L.",middleName:null,surname:"Larramendy",slug:"marcelo-l.-larramendy",fullName:"Marcelo L. Larramendy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8564",title:"Cell Interaction",subtitle:"Molecular and Immunological Basis for Disease Management",isOpenForSubmission:!1,hash:"98d7f080d80524285f091e72a8e92a6d",slug:"cell-interaction-molecular-and-immunological-basis-for-disease-management",bookSignature:"Bhawana Singh",coverURL:"https://cdn.intechopen.com/books/images_new/8564.jpg",editors:[{id:"315192",title:"Dr.",name:"Bhawana",middleName:null,surname:"Singh",slug:"bhawana-singh",fullName:"Bhawana Singh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9629",title:"Electroencephalography",subtitle:"From Basic Research to Clinical Applications",isOpenForSubmission:!1,hash:"8147834b6c6deeeec40f407c71ad60b4",slug:"electroencephalography-from-basic-research-to-clinical-applications",bookSignature:"Hideki Nakano",coverURL:"https://cdn.intechopen.com/books/images_new/9629.jpg",editors:[{id:"196461",title:"Prof.",name:"Hideki",middleName:null,surname:"Nakano",slug:"hideki-nakano",fullName:"Hideki Nakano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8760",title:"Structure Topology and Symplectic Geometry",subtitle:null,isOpenForSubmission:!1,hash:"8974840985ec3652492c83e20233bf02",slug:"structure-topology-and-symplectic-geometry",bookSignature:"Kamal Shah and Min Lei",coverURL:"https://cdn.intechopen.com/books/images_new/8760.jpg",editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9161",title:"Frailty in the Elderly",subtitle:"Understanding and Managing Complexity",isOpenForSubmission:!1,hash:"a4f0f2fade8fb8ba35c405f5ad31a823",slug:"frailty-in-the-elderly-understanding-and-managing-complexity",bookSignature:"Sara Palermo",coverURL:"https://cdn.intechopen.com/books/images_new/9161.jpg",editors:[{id:"233998",title:"Ph.D.",name:"Sara",middleName:null,surname:"Palermo",slug:"sara-palermo",fullName:"Sara Palermo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8445",title:"Dam Engineering",subtitle:"Recent Advances in Design and Analysis",isOpenForSubmission:!1,hash:"a7e4d2ecbc65d78fa7582e0d2e143906",slug:"dam-engineering-recent-advances-in-design-and-analysis",bookSignature:"Zhongzhi Fu and Erich Bauer",coverURL:"https://cdn.intechopen.com/books/images_new/8445.jpg",editors:[{id:"249577",title:"Dr.",name:"Zhongzhi",middleName:null,surname:"Fu",slug:"zhongzhi-fu",fullName:"Zhongzhi Fu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8937",title:"Soil Moisture Importance",subtitle:null,isOpenForSubmission:!1,hash:"3951728ace7f135451d66b72e9908b47",slug:"soil-moisture-importance",bookSignature:"Ram Swaroop Meena and Rahul Datta",coverURL:"https://cdn.intechopen.com/books/images_new/8937.jpg",editors:[{id:"313528",title:"Associate Prof.",name:"Ram Swaroop",middleName:null,surname:"Meena",slug:"ram-swaroop-meena",fullName:"Ram Swaroop Meena"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7031",title:"Liver Pathology",subtitle:null,isOpenForSubmission:!1,hash:"631321b0565459ed0175917f1c8c727f",slug:"liver-pathology",bookSignature:"Vijay Gayam and Omer Engin",coverURL:"https://cdn.intechopen.com/books/images_new/7031.jpg",editors:[{id:"273100",title:"Dr.",name:"Vijay",middleName:null,surname:"Gayam",slug:"vijay-gayam",fullName:"Vijay Gayam"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"8472",title:"Bioactive Compounds in Nutraceutical and Functional Food for Good Human Health",subtitle:null,isOpenForSubmission:!1,hash:"8855452919b8495810ef8e88641feb20",slug:"bioactive-compounds-in-nutraceutical-and-functional-food-for-good-human-health",bookSignature:"Kavita Sharma, Kanchan Mishra, Kula Kamal Senapati and Corina Danciu",coverURL:"https://cdn.intechopen.com/books/images_new/8472.jpg",editedByType:"Edited by",editors:[{id:"197731",title:"Dr.",name:"Kavita",middleName:null,surname:"Sharma",slug:"kavita-sharma",fullName:"Kavita Sharma"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8760",title:"Structure Topology and Symplectic Geometry",subtitle:null,isOpenForSubmission:!1,hash:"8974840985ec3652492c83e20233bf02",slug:"structure-topology-and-symplectic-geometry",bookSignature:"Kamal Shah and Min Lei",coverURL:"https://cdn.intechopen.com/books/images_new/8760.jpg",editedByType:"Edited by",editors:[{id:"231748",title:"Dr.",name:"Kamal",middleName:null,surname:"Shah",slug:"kamal-shah",fullName:"Kamal Shah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9536",title:"Education at the Intersection of Globalization and Technology",subtitle:null,isOpenForSubmission:!1,hash:"0cf6891060eb438d975d250e8b127ed6",slug:"education-at-the-intersection-of-globalization-and-technology",bookSignature:"Sharon Waller, Lee Waller, Vongai Mpofu and Mercy Kurebwa",coverURL:"https://cdn.intechopen.com/books/images_new/9536.jpg",editedByType:"Edited by",editors:[{id:"263302",title:"Dr.",name:"Sharon",middleName:null,surname:"Waller",slug:"sharon-waller",fullName:"Sharon Waller"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8564",title:"Cell Interaction",subtitle:"Molecular and Immunological Basis for Disease Management",isOpenForSubmission:!1,hash:"98d7f080d80524285f091e72a8e92a6d",slug:"cell-interaction-molecular-and-immunological-basis-for-disease-management",bookSignature:"Bhawana Singh",coverURL:"https://cdn.intechopen.com/books/images_new/8564.jpg",editedByType:"Edited by",editors:[{id:"315192",title:"Dr.",name:"Bhawana",middleName:null,surname:"Singh",slug:"bhawana-singh",fullName:"Bhawana Singh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9629",title:"Electroencephalography",subtitle:"From Basic Research to Clinical Applications",isOpenForSubmission:!1,hash:"8147834b6c6deeeec40f407c71ad60b4",slug:"electroencephalography-from-basic-research-to-clinical-applications",bookSignature:"Hideki Nakano",coverURL:"https://cdn.intechopen.com/books/images_new/9629.jpg",editedByType:"Edited by",editors:[{id:"196461",title:"Prof.",name:"Hideki",middleName:null,surname:"Nakano",slug:"hideki-nakano",fullName:"Hideki Nakano"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9685",title:"Agroecosystems",subtitle:"Very Complex Environmental Systems",isOpenForSubmission:!1,hash:"c44f7b43a9f9610c243dc32300d37df6",slug:"agroecosystems-very-complex-environmental-systems",bookSignature:"Marcelo L. Larramendy and Sonia Soloneski",coverURL:"https://cdn.intechopen.com/books/images_new/9685.jpg",editedByType:"Edited by",editors:[{id:"14764",title:"Dr.",name:"Marcelo L.",middleName:null,surname:"Larramendy",slug:"marcelo-l.-larramendy",fullName:"Marcelo L. Larramendy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9524",title:"Organ Donation and Transplantation",subtitle:null,isOpenForSubmission:!1,hash:"6ef47e03cd4e6476946fc28ca51de825",slug:"organ-donation-and-transplantation",bookSignature:"Vassil Mihaylov",coverURL:"https://cdn.intechopen.com/books/images_new/9524.jpg",editedByType:"Edited by",editors:[{id:"313113",title:"Associate Prof.",name:"Vassil",middleName:null,surname:"Mihaylov",slug:"vassil-mihaylov",fullName:"Vassil Mihaylov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9280",title:"Underwater Work",subtitle:null,isOpenForSubmission:!1,hash:"647b4270d937deae4a82f5702d1959ec",slug:"underwater-work",bookSignature:"Sérgio António Neves Lousada",coverURL:"https://cdn.intechopen.com/books/images_new/9280.jpg",editedByType:"Edited by",editors:[{id:"248645",title:"Dr.",name:"Sérgio António",middleName:null,surname:"Neves Lousada",slug:"sergio-antonio-neves-lousada",fullName:"Sérgio António Neves Lousada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9161",title:"Frailty in the Elderly",subtitle:"Understanding and Managing Complexity",isOpenForSubmission:!1,hash:"a4f0f2fade8fb8ba35c405f5ad31a823",slug:"frailty-in-the-elderly-understanding-and-managing-complexity",bookSignature:"Sara Palermo",coverURL:"https://cdn.intechopen.com/books/images_new/9161.jpg",editedByType:"Edited by",editors:[{id:"233998",title:"Ph.D.",name:"Sara",middleName:null,surname:"Palermo",slug:"sara-palermo",fullName:"Sara Palermo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8158",title:"Veganism",subtitle:"a Fashion Trend or Food as a Medicine",isOpenForSubmission:!1,hash:"d8e51fc25a379e5b92a270addbb4351d",slug:"veganism-a-fashion-trend-or-food-as-a-medicine",bookSignature:"Miljana Z. Jovandaric",coverURL:"https://cdn.intechopen.com/books/images_new/8158.jpg",editedByType:"Edited by",editors:[{id:"268043",title:"Dr.",name:"Miljana Z.",middleName:"Z",surname:"Jovandaric",slug:"miljana-z.-jovandaric",fullName:"Miljana Z. Jovandaric"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"161",title:"Algebra",slug:"algebra",parent:{title:"Mathematics",slug:"mathematics"},numberOfBooks:4,numberOfAuthorsAndEditors:37,numberOfWosCitations:16,numberOfCrossrefCitations:5,numberOfDimensionsCitations:21,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"algebra",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"8599",title:"Polynomials",subtitle:"Theory and Application",isOpenForSubmission:!1,hash:"1c36cace7f309250a777c0f404a2d79f",slug:"polynomials-theory-and-application",bookSignature:"Cheon Seoung Ryoo",coverURL:"https://cdn.intechopen.com/books/images_new/8599.jpg",editedByType:"Edited by",editors:[{id:"230100",title:"Prof.",name:"Cheon Seoung",middleName:null,surname:"Ryoo",slug:"cheon-seoung-ryoo",fullName:"Cheon Seoung Ryoo"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6526",title:"Matrix Theory",subtitle:"Applications and Theorems",isOpenForSubmission:!1,hash:"007221e88f11abf3c1bee9ba865c51b3",slug:"matrix-theory-applications-and-theorems",bookSignature:"Hassan A. Yasser",coverURL:"https://cdn.intechopen.com/books/images_new/6526.jpg",editedByType:"Edited by",editors:[{id:"68107",title:"Prof.",name:"Hassan",middleName:"Abid",surname:"Yasser",slug:"hassan-yasser",fullName:"Hassan Yasser"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5134",title:"Applied Linear Algebra in Action",subtitle:null,isOpenForSubmission:!1,hash:"2aeb0040a0135ad33564d0f5f19d6103",slug:"applied-linear-algebra-in-action",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/5134.jpg",editedByType:"Edited by",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2738",title:"Linear Algebra",subtitle:"Theorems and Applications",isOpenForSubmission:!1,hash:"7d4a676338d6da7a444a01743804f93a",slug:"linear-algebra-theorems-and-applications",bookSignature:"Hassan Abid Yasser",coverURL:"https://cdn.intechopen.com/books/images_new/2738.jpg",editedByType:"Edited by",editors:[{id:"68107",title:"Prof.",name:"Hassan",middleName:"Abid",surname:"Yasser",slug:"hassan-yasser",fullName:"Hassan Yasser"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:4,mostCitedChapters:[{id:"37780",doi:"10.5772/46482",title:"Algebraic Theory of Appell Polynomials with Application to General Linear Interpolation Problem",slug:"algebraic-theory-of-appell-polynomials-with-application-to-general-linear-interpolation-problem",totalDownloads:2619,totalCrossrefCites:1,totalDimensionsCites:4,book:{slug:"linear-algebra-theorems-and-applications",title:"Linear Algebra",fullTitle:"Linear Algebra - Theorems and Applications"},signatures:"Francesco Aldo Costabile and Elisabetta Longo",authors:[{id:"143684",title:"Prof.",name:"Francesco A.",middleName:null,surname:"Costabile",slug:"francesco-a.-costabile",fullName:"Francesco A. Costabile"},{id:"145195",title:"Dr.",name:"Elisabetta",middleName:null,surname:"Longo",slug:"elisabetta-longo",fullName:"Elisabetta Longo"}]},{id:"37785",doi:"10.5772/48198",title:"Partition-Matrix Theory Applied to the Computation of Generalized-Inverses for MIMO Systems in Rayleigh Fading Channels",slug:"partition-matrix-theory-applied-to-the-computation-of-generalized-inverses-for-mimo-systems-in-rayle",totalDownloads:2896,totalCrossrefCites:1,totalDimensionsCites:3,book:{slug:"linear-algebra-theorems-and-applications",title:"Linear Algebra",fullTitle:"Linear Algebra - Theorems and Applications"},signatures:"P. Cervantes, L.F. González, F.J. Ortiz and A.D. García",authors:[{id:"140284",title:"Mr.",name:"Pedro C.",middleName:null,surname:"Lozano",slug:"pedro-c.-lozano",fullName:"Pedro C. Lozano"},{id:"154942",title:"Dr.",name:"Luis",middleName:null,surname:"Gonzalez",slug:"luis-gonzalez",fullName:"Luis Gonzalez"}]},{id:"37787",doi:"10.5772/48279",title:"Nonnegative Inverse Eigenvalue Problem",slug:"nonnegative-inverse-eigenvalue-problem",totalDownloads:2792,totalCrossrefCites:0,totalDimensionsCites:3,book:{slug:"linear-algebra-theorems-and-applications",title:"Linear Algebra",fullTitle:"Linear Algebra - Theorems and Applications"},signatures:"Ricardo L. Soto",authors:[{id:"141560",title:"PhD.",name:"Ricardo",middleName:null,surname:"Soto",slug:"ricardo-soto",fullName:"Ricardo Soto"}]}],mostDownloadedChaptersLast30Days:[{id:"50675",title:"Eigenvalue Problems",slug:"eigenvalue-problems",totalDownloads:1745,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"applied-linear-algebra-in-action",title:"Applied Linear Algebra in Action",fullTitle:"Applied Linear Algebra in Action"},signatures:"Aleksandra Kostić",authors:[{id:"178893",title:"Associate Prof.",name:"Aleksandra",middleName:null,surname:"Kostić",slug:"aleksandra-kostic",fullName:"Aleksandra Kostić"}]},{id:"50312",title:"Nonnegative Inverse Elementary Divisors Problem",slug:"nonnegative-inverse-elementary-divisors-problem",totalDownloads:1159,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"applied-linear-algebra-in-action",title:"Applied Linear Algebra in Action",fullTitle:"Applied Linear Algebra in Action"},signatures:"Ricardo L. Soto",authors:[{id:"141560",title:"PhD.",name:"Ricardo",middleName:null,surname:"Soto",slug:"ricardo-soto",fullName:"Ricardo Soto"}]},{id:"37780",title:"Algebraic Theory of Appell Polynomials with Application to General Linear Interpolation Problem",slug:"algebraic-theory-of-appell-polynomials-with-application-to-general-linear-interpolation-problem",totalDownloads:2620,totalCrossrefCites:1,totalDimensionsCites:4,book:{slug:"linear-algebra-theorems-and-applications",title:"Linear Algebra",fullTitle:"Linear Algebra - Theorems and Applications"},signatures:"Francesco Aldo Costabile and Elisabetta Longo",authors:[{id:"143684",title:"Prof.",name:"Francesco A.",middleName:null,surname:"Costabile",slug:"francesco-a.-costabile",fullName:"Francesco A. Costabile"},{id:"145195",title:"Dr.",name:"Elisabetta",middleName:null,surname:"Longo",slug:"elisabetta-longo",fullName:"Elisabetta Longo"}]},{id:"50239",title:"Matrices, Moments and Quadrature: Applications to Time- Dependent Partial Differential Equations",slug:"matrices-moments-and-quadrature-applications-to-time-dependent-partial-differential-equations",totalDownloads:2224,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"applied-linear-algebra-in-action",title:"Applied Linear Algebra in Action",fullTitle:"Applied Linear Algebra in Action"},signatures:"James V. Lambers, Alexandru Cibotarica and Elisabeth M. Palchak",authors:[{id:"178867",title:"Associate Prof.",name:"James",middleName:null,surname:"Lambers",slug:"james-lambers",fullName:"James Lambers"},{id:"184082",title:"Dr.",name:"Alexandru",middleName:null,surname:"Cibotarica",slug:"alexandru-cibotarica",fullName:"Alexandru Cibotarica"},{id:"184083",title:"MSc.",name:"Elisabeth",middleName:null,surname:"Palchak",slug:"elisabeth-palchak",fullName:"Elisabeth Palchak"}]},{id:"50709",title:"Likelihood Ratio Tests in Multivariate Linear Model",slug:"likelihood-ratio-tests-in-multivariate-linear-model",totalDownloads:1451,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"applied-linear-algebra-in-action",title:"Applied Linear Algebra in Action",fullTitle:"Applied Linear Algebra in Action"},signatures:"Yasunori Fujikoshi",authors:[{id:"178988",title:"Dr.",name:"Yasunori",middleName:null,surname:"Fujikoshi",slug:"yasunori-fujikoshi",fullName:"Yasunori Fujikoshi"}]},{id:"65970",title:"Investigation and Synthesis of Robust Polynomials in Uncertainty on the Basis of the Root Locus Theory",slug:"investigation-and-synthesis-of-robust-polynomials-in-uncertainty-on-the-basis-of-the-root-locus-theo",totalDownloads:514,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"polynomials-theory-and-application",title:"Polynomials",fullTitle:"Polynomials - Theory and Application"},signatures:"Nesenchuk Alla",authors:null},{id:"66597",title:"Cyclotomic and Littlewood Polynomials Associated to Algebras",slug:"cyclotomic-and-littlewood-polynomials-associated-to-algebras",totalDownloads:480,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"polynomials-theory-and-application",title:"Polynomials",fullTitle:"Polynomials - Theory and Application"},signatures:"José-Antonio de la Peña",authors:null},{id:"37786",title:"A Linear System of Both Equations and Inequalities in Max-Algebra",slug:"a-linear-system-of-both-equations-and-inequalities-in-max-algebra",totalDownloads:2261,totalCrossrefCites:0,totalDimensionsCites:1,book:{slug:"linear-algebra-theorems-and-applications",title:"Linear Algebra",fullTitle:"Linear Algebra - Theorems and Applications"},signatures:"Abdulhadi Aminu",authors:[{id:"140280",title:"Dr.",name:"Abdulhadi",middleName:null,surname:"Aminu",slug:"abdulhadi-aminu",fullName:"Abdulhadi Aminu"}]},{id:"59479",title:"Matrices Which are Discrete Versions of Linear Operations",slug:"matrices-which-are-discrete-versions-of-linear-operations",totalDownloads:558,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"matrix-theory-applications-and-theorems",title:"Matrix Theory",fullTitle:"Matrix Theory - Applications and Theorems"},signatures:"Armando Martínez Pérez and Gabino Torres Vega",authors:[{id:"93519",title:"Dr.",name:"Gabino",middleName:null,surname:"Torres-Vega",slug:"gabino-torres-vega",fullName:"Gabino Torres-Vega"},{id:"219225",title:"MSc.",name:"Armando",middleName:null,surname:"Martínez-Pérez",slug:"armando-martinez-perez",fullName:"Armando Martínez-Pérez"}]},{id:"60350",title:"Cramer’s Rules for the System of Two-Sided Matrix Equations and of Its Special Cases",slug:"cramer-s-rules-for-the-system-of-two-sided-matrix-equations-and-of-its-special-cases",totalDownloads:615,totalCrossrefCites:0,totalDimensionsCites:2,book:{slug:"matrix-theory-applications-and-theorems",title:"Matrix Theory",fullTitle:"Matrix Theory - Applications and Theorems"},signatures:"Ivan I. Kyrchei",authors:[{id:"226980",title:"Dr.",name:"Ivan",middleName:null,surname:"Kyrchei",slug:"ivan-kyrchei",fullName:"Ivan Kyrchei"}]}],onlineFirstChaptersFilter:{topicSlug:"algebra",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[],offset:0,limit:8,total:null},route:{name:"profile.detail",path:"/profiles/235996/punit-suthar",hash:"",query:{},params:{id:"235996",slug:"punit-suthar"},fullPath:"/profiles/235996/punit-suthar",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()