Released this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\\n\\n
We wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
IntechOpen is proud to announce that 179 of our authors have made the Clarivate™ Highly Cited Researchers List for 2020, ranking them among the top 1% most-cited.
\n\n
Throughout the years, the list has named a total of 252 IntechOpen authors as Highly Cited. Of those researchers, 69 have been featured on the list multiple times.
\n\n\n\n
Released this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\n\n
We wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
IEEE 802.16 (WiMAX—Worldwide Interoperability for Microwave Access) (Andrews, 2007; Nuaymi, 2007) is a broadband wireless technology that allows rapid deployment of video streaming services, including Video-on-Demand (VoD), multicast varieties of IPTV (TV over the Internet Protocol) and broadcast, digital TV (Meloni. 2008). Streaming assumes limited buffering of data for video-rate display, rather than video file download, video messaging services, or hybrids for video clip download in which display is overlapped with download of video chunks. In these services, delay is important but not as important as in interactive, conversational services such as video-phoning and video conferencing (Wenger, 2006), in which one-way delay should ideally approach (but not reach in practice) 100 ms. To illustrate the issues, the Chapter considers the possibility of a simple but effective adaptive modulation scheme for WiMAX offering unequal error protection (UEP) of video according to frame type (Ghanbari, 2003). To allow channel swapping when broadcasting TV channels in a multiplexed stream and to emulate VCR functionality in VoD, spatially-coded (Intra-frame) I-frames are often inserted around every half-second of video. I-frames also act to anchor the decoder in case of loss of synchronisation and consequent propagation of distortion. Other frame types include Predicted (P-) frames, which are backwardsly predicted from I- or other P-frames, and Bi-predicted (B-) frames, which as the name suggests can be predicted from I- and P-frames in either temporal direction. B-frames are not employed in the Baseline profile of the state-of-the-art H.264 codec (Richardson, 2003) in order to reduce computation levels on mobile devices but can be employed in streaming,when latency is less of an issue.
\n\t\t\t
In the UEP scheme, by monitoring the input video bitrate, a burst profile is selected that offers a lower rate than the arrival rate to more important anchor frames. If I-frame data is protected then the less important P-and B-frame data rates must compensate, which occurs in the scheme through selection of one or more WiMAX burst profiles offering higher data rates. Allocation depends on the congestion level indicated by transmit buffer fullness. For example, low buffer fullness may allow some P-frame data to be protected while high buffer fullness requires some P-frame data to be allocated to a still higher data rate.
\n\t\t\t
An important consideration for WiMAX is the effect of propagation conditions in the outdoor environment. The Stanford University Interim (SUI) channel model adopted in the IEEE 802.16 standardisation is an extensive and complete channel model, implemented by the authors within the well-known ns-2 simulator, and used along with the NIST WiMAX simulation module. The behavior of the WiMAX modulation modes along with physical layer characteristics under the SUI model will be discussed herein. An effective UEP scheme is one that combines simplicity of implementation with compelling gains in video quality. One such algorithm is proposed in the Chapter. Applying an additive-increase and multiplicative-decrease algorithm to the choice of burst profile, results in many decibels gain in delivered video quality and significant gains in delay/jitter reduction over a non-adaptive modulation scheme.
\n\t\t\t
Considerable research has taken place into bandwidth allocation, packet scheduling and queuing management for WiMAX service classes. The Chapter evaluates Active Queuing Management techniques for uplink scheduling, as this topic has received comparatively limited attention in the research community. In the WiMAX standard, queuing discipline and queue scheduling are left open to the developer for reasons of commercial differentiation. Unlike work conserving queuing mechanisms, AQM drops packets in anticipation of growing congestion. The Chapter will examine the most effective strategy for WiMAX uplink management.
\n\t\t\t
The current H.264 codec outputs compressed data encapsulated as Network Adaptation Layer Units (NALUs) which are mapped onto MAC Packet Data Units (MPDU), before transmission over the WiMAX link. However, there are different ways to aggregate or segment the H.264 NALUs according to the MPDU size, which may be fixed or variable. As an alternative, UEP can also be based upon H.264 data partitioning or differential error concealment can be applied. In data partitioning, the more important parts of the compressed bitstream are collected in separate NALUs, so that in H.264 up to three different types of NALU can be generated and the more important partition protected with increased application layer Forward Error Correction (FEC). Our research is at an exploratory stage for this topic, and Section 5 in conjunction with Section 2 introduces the topic. Section 3 reports research on the UEP scheme, whereas Section 4 reports investigations into WiMAX queue management with video transport in mind. Section 6 concludes this Chapter.
\n\t\t
\n\t\t
\n\t\t\t
2. WiMAX background
\n\t\t\t
This Section briefly introduces WiMAX in preparation for descriptions of recent developments in video streaming in later Sections. It is assumed that general descriptions of WiMAX and its applications will be available to the reader from other sources, some of which appear in the references to this Chapter (Andrews et al. 2007, Nuaymi, 2007). For coverage of standard video codecs in general, we can but recommend one of the contributors to this Chapter’s textbook (Ghanbari, 2003), while for H.264 in particular (Richardson, 2003) is helpful. For video transport over wireless (Sadka, 2002; Schaar & Chou, 2007 ) are recommended.
\n\t\t\t
WiMAX is a competitive solution for `last-mile’ broadband access compared to cable, digital subscriber line (DSL) or fiber, because of the low cost of deploying WiMAX over a wide area. As such WiMAX may be suitable for depolyment in rural areas (Hillestad et al., 2006) in which there is limited previous communication infrastructure, particularly within the developing world. Moreover, rural areas do not present the same problems of wireless propagation as exist in urban areas. There are two main standards for WiMAX: the first one is IEEE 802.16-2004 for fixed wireless connections and the second one is IEEE 802.16-2005 for mobile wireless connections (Yan & Kavehard, 2006). WiMAX operates within two licensed spectrum ranges: 1) from 2.5 to 2.7 GHz in the USA and 2) a range from 3.4 to 3.7 GHz in Europe and the rest of the world. Fixed WiMAX (IEEE 802.16-2004) is suitable for the frequency band 2-11 GHz and the theoretical range is up to 30 miles for line-of-sight (LOS) communication with data rates up to 75 Mbps and for non-line-of-sight (NLOS) the theoretical range is 5 miles with data rates up to 5 Mbps. WiMAX supports different duplex modes (Tariq et al., 2007): 1) time division duplex (TDD), and 2) frequency division duplex (FDD) and 3) half-frequency division duplex (H-FDD). For TDD, the system employs the same frequency to transmit over the downlink (DL) and uplink (UL) but within different time slots. Projections normally assume (Yun & Kavehard 2006) that the DL will have the predominance of the time slots (see Section 2.1 for sub-frame structure), though the allocation could vary dynamically. In FDD, the system requires two different frequencies, while for H-FDD the system uses two different frequencies with different time slots. FDD is most suitable for symmetric loads such as voice channels, while TDD is more suitable for asymmetric loads such as video streaming.
\n\t\t\t
WiMAX has two main components, Base Stations (BSs) and Subscriber Stations (SSs), BSs uses downlink to transmit while the SSs use the UL to transmit. The 802.16 standard can work in a point–to-point (PTP), point-to-multipoint (PMP), and mesh topology modes. By using omni-directional or directional antenna (Andrews et al., 2007) the effective range of the system can be increased.
\n\t\t\t
\n\t\t\t\t
2.1. WiMAX frame structure
\n\t\t\t\t
The key to understanding how video streams may map onto the WiMAX frame structure is knowledge of the WiMAX frame structure. However, those readers familiar with this background material may wish to proceed to Section 3.
\n\t\t\t\t
The structure takes different forms across the protocol stack layers. The physical layer of WiMAX is based on the physical layer of Orthogonal Frequency Division Multiplexing (OFDM), which gives WiMAX immunity to frequency selective fading and intersymbol interference. Assuming the more spectrally efficient TDD mode, for the fixed standard (IEEE 802.16-2004) the size of FFT is limited to 256 subcarriers, 192 of the being subcarriers used for data carrying, with 8 subcarriers used as pilot subcarriers for synchronization and channel estimation, while the rest of the subcarriers are used as guard subcarriers.
\n\t\t\t\t
\n\t\t\t\t\tFigure 1 shows the TDD frame of fixed WiMAX (Andrews, 2007). This frame is divided into a DL sub-frame and UL sub-frame. The frames are separated by a receive-transmit transition gap (RTG) and the sub-frames are separated by transmit-receive transition gap. The DL sub-frame starts with a preamble and then a Frame Control Header (FCH). The FCH contains the DL- Mobile Application Part (MAP), UL- MAP, downlink channel descriptor (DCD), uplink channel descriptor (UCD) and one or more DL-bursts. The other DL-bursts are used for data.The UL sub-frame starts with ranging slots, Contention for Bandwidth Request (CBR) and UL-bursts.
\n\t\t\t\t
One of the attractive features of the Medium Access Control (MAC) layer of WiMAX that it is able to construct and transmit fixed and variable-sized frames. The MAC layer has three sublayers; these sublayers interact with each other via service access point (SAPs). The service-specific convergence sublayer achieves the mapping or transformation of external network data by the help of the SAP. The common part of the SAP receives information from the MAC Service data units (MSDUs), which are packed into the payload field to form MAC protocol data units (MPDUs).
\n\t\t\t\t
Figure 1.
Fixed WiMAX OFDM-TDD frame stucture.
\n\t\t\t\t
The common part sub-layer is able to pack MSDU into MPDU in different ways (more than one complete or partial). This ability is called aggregation. Figure 2 shows the ability of the MPDU to accommodate more than two MSDUs but not three. As a result, the remaining part of a third MSDU is packed with the previous two MSDUs to fill the remaining payload field to prevent wastage of resources. Feedback from an SS and on-air timing slots decide the payload size. Aggregation in the payload of MPDU is indicated by ‘type’ bit in the generic MAC frame header (GMH). Subheaders (Ahson & Ilyas, 2008) consist of two bits of fragment control (FC), three bits of fragment sequence number (FSN) when the MSDU is fragmented and three bits of length field. To indicate the start of the next subheader in the payload. FC is set to 00 when the MSDU is not fragmented and if the MSDU is fragmented, FC is set to 10, 01 or 11.
\n\t\t\t\t
The common part sublayer also has the ability (Ahson & Ilyas, 2008) to fragment an MSDU across multiple MPDUs. Figure 3 shows how a portion of a single MSDU taking up the entire payload of an MPDU. When the size of the transmitted packet of MAC payload is too small to accommodate a complete MSDU, the MSDU is fragemented and a fragment is placed in another MPDU. Here, the FC bit is set to 01 if it is the last fragment of the MSDU; 10 if it is the first fragment of the MSDU; and if it is the MSDU is fragmented, FC is set to 10, 01 or 11.
\n\t\t\t\t
Figure 2.
Multiple MSDUs forming one MPDU.
\n\t\t\t
\n\t\t
\n\t\t
\n\t\t\t
3. Unequal Error Protection
\n\t\t\t
\n\t\t\t\t
3.1. WiMAX modulation
\n\t\t\t\t
Fixed WiMAX (IEEE 802.16d) employs OFDM to counter the effect of inter-symbol interference (ISS) when channel delay spread, τ, is large relative to symbol time Ts\n\t\t\t\t\t, due to high data rates and multipath fading. OFDM achieves this by dividing the input into n sub-carriers such that that\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\tn\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tT\n\t\t\t\t\t\t\t\t\t\ts\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\tτ\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t. To avoid any ISI through sub-carrier roll-off a cyclic prefix (CP) acts as a guard interval between bursts greater than τ. In fact, addition of a CP allows the application of an Inverse Fast Fourier Transform (IFFT) to act upon the data stream as if performing a cyclic convolution to form the n sub-carriers.
\n\t\t\t\t
As described in Section 2, through OFDM, IEEE 802.16d NLOS supports 256 sub-carriers in a TDMA/TDD system, with scheduling of the sub-carriers at a BS, with notification of scheduling to SSs in the frame control header. Appropriate symbol mapping to the complex frequency domain allows selection of the modulation mode prior to IFFT. Within a DL sub-frame, data bursts are ordered according to the robustness of the burst profile. Therefore, depending on the adaptive modulation mode chosen, data can be mapped onto one or more DL-bursts, as detailed in Section 2.1. Table 1 shows the 7 burst profiles, with change of Forward Error Coding (FEC) rate achieved by puncturing upon an inner non-recursive convolution code (CC) (with symbol-level protection from a fixed outer Reed-Solomon code).
\n\t\t\t\t
Figure 3.
Single MSDU fragmented across more than one MPDU.
\n\t\t\t\t
Selection of the appropriate WiMAX modulation mode in practice very much depends on channel estimation. WiMAX provides sub-carrier pilot tones for this purpose, as well as optional data burst preamables and/or midambles. Various schemes exist in WiMAX for placement of pilot tones, but other than noting this is important for channel estimation (Negi & Cioffi, 1998), the topic is beyond the scope of this Chapter. It is also possible (Juan et al., 2007) to monitor the downlink channel at the receiver and return the results in the UL sub-frame.
Broadband wireless propagation in general is introduced in (Anderson, 2003). There are a number of empirical models such as IEEE 802.16 (SUI), COST-231 Hata model, MMDS Band Empirical Path Loss. The channel model set selected by us were the IEEE 802.16 Stanford University Interim (SUI) models (Ercge et al., 2001; Hoymann, 2005). From these, channel two out of six empirical channels designed to cover terrain in the US. SUI-2 models a flat terrain with light tree density and low Doppler spread. The cell radius is assumed to be 6.4 km. Antenna height at the BS is 15.24 m, beamwidth 120o and at the SS is 3.048 m, beamwidth 50o, with vertical polarization only. The SUI models provide generic system development modelling, as does COST-231. Studies such as (Milanovic, 2007) have concluded that the SUI model provides good accuracy for NLOS propagation but should not be relied upon for LOS propagation, when other models may be preferable.
\n\t\t\t\t
\n\t\t\t\t\tTable 2 summarizes settings in the Standard for a 7 MHz licensed bandwidth, for which we chose to simulate the 5 ms frame duration. Notice that profile 1 is reserved for burst mapping data. The SSTTG/SSRTG are Subscriber Station Transmit (Receive) Transition Gaps. The achievable throughputs, with hard CC decoding, according to burst profile are shown in Figure 4. For SUI-2, a WiMAX CP of 1/32 is most appropriate, yielding a relatively limited delay spread of 0.2 μs. Figure 5 shows the bit error rate (BER) response of the differing burst profiles for SUI-2. For a given burst profile, there is a rapid fall-off in acceptable BER, once outside a narrow Signal-to-Noise (SNR) range. There are also uneven jumps in SNR and, thus, selecting a burst profile to achieve a target BER is difficult.
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Parameter
\n\t\t\t\t\t\t\t
Value(s)
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
OFDM symbol duration
\n\t\t\t\t\t\t\t
34 μs
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Channel bandwidth
\n\t\t\t\t\t\t\t
7.0 MHz
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Frame duration
\n\t\t\t\t\t\t\t
5 ms, 10 ms, or 20 ms
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Maps modulation
\n\t\t\t\t\t\t\t
BPSK
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
FEC code
\n\t\t\t\t\t\t\t
RS-CC
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
SSTTG/SSRTG duration
\n\t\t\t\t\t\t\t
1 OFDM symbol
\n\t\t\t\t\t\t
\n\t\t\t\t\t
Table 2.
Standardized system parameters.
\n\t\t\t\t
Figure 4.
Throughput for various CP, with 7 MHz bandwidth and 7:3 ratio of DL:UL.
\n\t\t\t\t
Figure 5.
BER over an SUI-2 channel for CP = 1/32 with 7 MHz bandwidth and various burst profiles.
\n\t\t\t
\n\t\t\t
\n\t\t\t\t
3.3. Adaptive modulation
\n\t\t\t\t
Adaptive modulation schemes for video UEP purposes have been considered in general (Wenger, 2003) or for particular wireless technologies (Razavi, 2008). Frequently, video UEP is combined with cross-layer techniques to vary error protection, for example in (Chen et al., 2001)). However, WiMAX already supports variable error protection through changes in the coding rate at the data-link layer. Examples of video UEP for WiMAX are apparently few. In (Juan et al., 2007) for a scalable video stream, the stream was partitioned between different connections to the same station, using the mobile version of WiMAX, IEEE 802.16e. This method did employ different burst profiles within the same UL sub-frame. However, the wireless channel model was the well-known Gilbert-Elliott, two-state Markovian model, which though suitable for modelling ‘bursty’ errors in indoor environments, fails to take into account the impact of terrain, precipitation, or attenuation in outdoor environments. For data transport in general, adaptive modulation is an important technique with recent attention (Hanzo & Choi, 2007) concentrated on adaptive OFDM to support constant error rates.
\n\t\t\t
\n\t\t\t
\n\t\t\t\t
3.4. Unequal error protection with adaptive modulation
\n\t\t\t\t
The general adaptive modulation procedure that we employ, which is repeated over time, is summarized in Figure 6. Arriving compressed video data is monitored to form a time-averaged estimate of the arrival rate. By means of this estimate the lowest modulation profile that can satisfy the rate at that time is determined. The protection policy across the video packet frame types is updated according to send buffer fullness at the WiMAX BS. All I-frame packets are protected with a robust profile but, to compensate, other packets are accorded less protection according to a policy, which evolves with buffer fullness.
\n\t\t\t\t
The first step in our UEP algorithm is to apply a moving average filter to the arriving video data in order to form an estimate of the required WiMAX burst profile, M, that fulfils the input data rate. The input video rate is monitored through a linear predictive filter (LPF) (Honig & Messerschmitt, 1990) over 50 Group of Pictures [1] - (GOPs). For example from Figure 1, for an average 2.5 Mbps input rate, M would be set to profile three, as this most closely meets the data rate requirements. Notice that in this instance it is possible to choose the profile without additional channel estimation, avoiding inaccuracies in estimation.
\n\t\t\t\t
Upon determination of M, the profile M-1 is invariably selected for all arriving IP packets bearing I-frame data. Relative allocation of P- and B-frame packets to the different burst profiles is now decided by the normalized buffer fullness, B. The fullness is updated after an interval, empirically determined to avoid excessive fluctuations in burst profile selection policy. Assume an available capacity index (ACI) initially set at 1 within a range [0, 1], where 1 signifies an empty buffer. Changes to the ACI are only made if buffer fullness either exceeds a high threshold or drops below a low threshold. If B falls below the low threshold ACI is additively increased by α, which has the effect of increasing the number of packets sent at a lower data rate. If B rises above the high threshold then ACI is multiplicatively reduced by factor β which correspondingly backs off the sending rate to avoid packet loss. This is achieved by favoring higher data rates through higher burst profiles.
\n\t\t\t\t
Transmit buffer fullness is a general indicator of congestion from input traffic arriving at the BS and of channel conditions. As such the algorithm can be applied across the burst profiles and according to traffic sharing the TDMA frame.
\n\t\t\t
\n\t\t\t
\n\t\t\t\t
3.5. Experimental verification of UEP adaptive modulation
\n\t\t\t\t
The well-known ns-2 network simulator augmented with the NIST WiMAX module was employed to model the system. The simulations were repeated and averaged over fifty runs to ensure convergence in the face of a high channel error rate. WiMAX’s frame duration was set to 5 ms. The video-bearing DL sub-frame was allocated 70% of the frame duration. In order to isolate the impact of the video stream upon buffer fullness, the arriving video stream was the sole input into the BS send buffer. Thus, the DL sub-frame was occupied by a set of bursts according to the allocation by frame type packet in the UEP algorithm. Data is always assumed to be available to fill the remaining duration of the DL sub-frame as well as the UL sub-frame, though as mentioned, it does not occupy the send buffer. Table 3 reports other settings for the UEP algorithm during simulations. Buffer size was set to 50 packets as also used in (Li & Schaar, 2004) for video streaming over wireless.
\n\t\t\t\t
Figure 6.
Overview of the UEP scheme.
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Parameter
\n\t\t\t\t\t\t\t
Setting
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Buffer capacity
\n\t\t\t\t\t\t\t
50 IP packets
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Update interval
\n\t\t\t\t\t\t\t
Every 50 IP packets
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Low threshold
\n\t\t\t\t\t\t\t
0.20
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
High threshold
\n\t\t\t\t\t\t\t
0.80
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
α, β
\n\t\t\t\t\t\t\t
0.05, 1.25
\n\t\t\t\t\t\t
\n\t\t\t\t\t
Table 3.
Parameter settings for the UEP algorithm.
\n\t\t\t\t
To establish the efficiency of the algorithm, a non-adaptive scheme was compared with the UEP scheme. The LPF was again used to select the appropriate profile from Table 1. However, unlike in the UEP algorithm, the same profile was selected for all arriving video-bearing IP packets.
\n\t\t\t\t
Three MPEG-2 video clips appear in the experiments. All were encoded at a variable bit-rate (VBR) with a target rate of 2.5 Mbps for 40 s. Clip 1, ‘News’, contains some motion, showing a newsreader and changing backdrop. Clip 2, ‘Friends’, an excerpt from the well-known situational comedy, is more complex, with scene cuts and moderate motion. Finally, clip 3, ‘Football’, contains considerable motion and is of higher complexity. Most legacy video is encoded in MPEG-2 and it remains widely used in the broadcasting industry. Peak Signal-to-Noise Ration (PSNR) [1] - was found by reconstructing with a reference MPEG-2 decoder. The display rate was 25 Hz, resulting in 1000 frames in each simulation run (averaged over fifteen runs). The source video format was European Source Input Format (SIF) \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t352\n\t\t\t\t\t\t\t\t\t×\n\t\t\t\t\t\t\t\t\t288\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\tpixel/frame, with a GOP structure of N = 12, and M = 3, i.e. an IBBPBBP…structure. Error concealment was by previous frame replacement, which is a simple but standard scheme. The scenario modelled assumed arriving video-bearing IP packets at the BS containing, for error resilience purposes, one slice per packet. A slice in MPEG-2 takes-up a row of macroblocks.
\n\t\t\t\t
\n\t\t\t\t\tFigure 7 shows packet loss rates for the ‘News’ clip under the SUI-2 channel model at several different average SNR settings [1] -. Due to the adaptive modulation scheme, not only does the total packet loss rate considerably reduce but the proportion of lost B-frame packets increases, resulting in preservation of the vital I-frame packets. The loss rate of I- frames is always less than 1% with the adaptive scheme. As an example, at 17 dB SNR, the loss rate of B- and P-frames combined is 24.68% without adaptation and 15.76% with. Because the adaptive scheme allocates I-frame packets to a more robust profile, the result is a general reduction in the number of lost packets. The presumably increased loss rate of packets allocated to a less robust profile does not match the gain from allocation to the more robust profile.
\n\t\t\t\t
Figure 7.
Comparison of IP packet loss rates for (lefthand) non-adaptive modulation; and (righthand) adaptive modulation for the ‘News’ clip under the SUI-2 channel model.
\n\t\t\t\t
\n\t\t\t\t\tFigure 8 compares the resulting video quality (luminance PSNR) between non-adaptive and adaptive modulation with UEP. The effect of UEP is to accentuate the gain from the reduction in packet losses from adaptive modulation. At 16 dB, with non-adaptation all clips would be unwatchable, while the UEP scheme quality verges on the acceptable by virtue of an almost 10 dB improvement. At SNR of 17 dB, the video quality is good when UEP is applied but is poor otherwise. When SNR improves, as might be expected the relative advantage of UEP declines. However, UEP at 19 dB SNR still contributes to several dBs improvement in video quality, which is now excellent at 40 dB.
\n\t\t\t\t
Figure 8.
Comparison of video quality for three video clips of increasing complexity using adaptive and non-adaptive modulation under the SUI-2 channel model.
\n\t\t\t\t
\n\t\t\t\t\tFigure 9 shows that delivered video quality is somewhat sensitive to selection of α and β in the adaptive algorithm. The Figure shows variation of the chosen parameters with a drop in PSNR if these parameters are not chosen well. Because the additional plots in Figure 7 occur with larger values for α and β then the changes in rate would tend to be more dramatic, with more of a risk from packet loss or under- utilisation of the available bandwidth. However, no dramatic variation in quality occurs, indicating the robustness of the algorithm.
\n\t\t\t\t
The impact of the adaptation technique on the delay and delay jitter experienced by the application is now considered. If not probably addressed, the delay and delay jitter (variance of delay) could degrade the performance of an application. Click-on-Web-clip users are especially delay intolerant, as are interactive applications, when the delay should be no more than 100 ms in total (Wenger, 2003). Longer start-up delay requires larger playout buffers and possible overflow if not provided or underflow if excessive jitter occurs. Unfortunately, adaptive buffers sensitive to changes in network traffic can result in disconcerting playout discontinuities. By utilizing WiMAX’s ARQ provision, IP packets contained in a burst received in error after application of WiMAX FEC are retransmitted in subsequent DL sub-frames up to a pre-determined retransmission limit (RL), after which the data is discarded if not successfully received.
\n\t\t\t\t
Figure 9.
Comparison of video quality for two video clips of increasing complexity using adaptive modulation under the SUI-2 channel model with variation of α and β parameters.
\n\t\t\t\t
In Figure 10 (for the ‘News’ clip) the RL is varied and a comparison is made of the resulting delay, with and without the presence of UEP. In all cases, delay is significantly greater without adaptive modulation than it is with. Particularly for RL = 1, average SNR, though the delay of all schemes significantly improves for SNRs over 18 dB. From Figure 7, it was observed that the packet loss figures were generally reduced for the adaptive modulation scheme, irrespective of the impact of UEP. Though throughput is reduced for those packets transmitted under a robust profile, this delay is more than compensated by the reduction in packet loss, which also reduces the need to retransmit.
\n\t\t\t\t
As will be noticed from Figure 11, the levels of delay are quite significant for all schemes at lower SNR, especially when it is considered that there will be additional delay across the core network prior to final hop WiMAX delivery, as well as any delay at the codec for real-time applications. Again adaptive modulation always alleviates jitter, Figure 11, and this is as well because levels of jitter are relatively high.
\n\t\t\t\t
Figure 10.
Comparison of IP packet delay for adaptive and non-adaptive schemes across a WiMAX link.
\n\t\t\t\t
Figure 11.
Comparison of IP packet jitter for adaptive and non-adaptive schemes across a WiMAX link.
\n\t\t\t
\n\t\t
\n\t\t
\n\t\t\t
4. Queue management for video streaming
\n\t\t\t
\n\t\t\t\t
4.1. WiMAX uplink scheduling and management
\n\t\t\t\t
WiMAX in all its versions (IEEE 802.16 parts a–e) does not specify queue management algorithms at the BS or SS, allowing these, along with bandwidth allocation at the BS and packet scheduling at the SS, to be designed by vendors as a means of commercial differentiation. Choice of queuing discipline is sensitive to application type and service class whether it is implemented on the BS or the SS. WiMAX networks support multiple service classes to accommodate heterogeneous traffic with varying requirements. In particular, these are Unsolicited Grant Service (UGS), extended real-time Polling Service (ertPS), real-time Polling Service (rtPS), non-real-time Polling Service (nrtPS), and Best effort (BE). UGS is designed for synchronous services such as legacy voice without silence suppression. The ertPS class (Zhang et al., 2006) is intended for voice with silence suppression, when a SS may not have data available upon polling by the BS. The rtPS class is most suitable for real-time video services, particularly for Variable Bitrate Video (VBR), which is employed to maintain delivered video quality but may lead to ‘bursty’ arrival rates.
\n\t\t\t\t
\n\t\t\t\t\tFigure 12 shows how an SS communicates with a BS and how the UL packet scheduling works across different service classes. An initial request by the SS results in a bandwidth allocation by the BS to that SS. The SS packet scheduler is able dynamically to request a modification to its bandwidth allocation in a piggybacked requested to the BS. However, for simplicity of analysis in this paper it is assumed that the allocation remains static. As an SS may not have data available, it is polled by the BS. Polling may be on a group basis or in unicast fashion. As group polling may result in access delay at the SS, this paper assumes unicast polling, though there are UL sub-frame utilisation implications (Chang, 2008). The BS passes video and other data to the SS over the DL sub-frame whereas the UL sub-frame accommodates its traffic according to service class and burst slot availability.
\n\t\t\t\t
Figure 12.
IEEE 802.16 uplink scheduling system.
\n\t\t\t\t
The UGS is allocated bandwidth as of priority, while by default SS servicing of polled queues takes place in round-robin fashion (though many other possibilities exist [16]). In Figure 12 the queues are serviced by the packet scheduler in the order indicated with BE traffic considered last. In this Chapter, we assume an exhaustive service with the default simple round-robin access by the SS packet scheduler.
\n\t\t\t\t
This Chapter concentrates on a particular class of SS UL queue discipline, Active Queue Management (AQM), as these have at least the potential to benefit real-time services by favoring traffic with urgent deadlines or with differing packet priorities (Orlov & Necker, 2007). Within the fixed Internet, AQM techniques (Koo et al., 2004) are intended to achieve high link utilisation without introducing delays. The most well-known AQM technique is Random Early Detection (RED) (Floyd & Jacobsen, 1993) in which packets in the queue are intentionally dropped or explicitly marked as a signal to the source to reduce its rate. For compliant sources, notably TCP, a dropped packet prompts the congestion control mechanism to reduce its sending rate. For a non-compliant source, one that does not reduce its rate, RED (Floyd & Jacobsen, 1993) also keeps the queue size low but does not discriminate against ‘bursty’ traffic sources. Dropping occurs in a probabilistic fashion according to the time-wise, exponentially-averaged queue size and no record is kept of the state of each connection to avoid unreasonable overhead. By random dropping, rate synchronization amongst compliant sources is avoided.
\n\t\t\t\t
RED has a number of helpful features but it is known (Rahmani et al., 2008) to underperform when there are few co-existing flows in a queue because buffer occupancy fluctuates rapidly. In an SS, the number of coexisting flows could well be limited. RED maintains two thresholds: a low threshold in which all arriving packets are accepted and a high threshold when all arriving packets are rejected. When buffer fullness is between the thresholds, RED is in the congested state in which packets are randomly dropped. However, RED may not be able to react quickly enough to ‘bursty’ traffic operating within this region. Unfortunately, if buffer size is increased to compensate, apart from the drain on energy at any mobile device arising from the increased buffer size, interactive multimedia applications may suffer from a large buffer as a result of increased waiting times.
\n\t\t\t\t
Random Exponential Marking (REM)’s packet marking probability (Athuraliya, 2001) grows considerably more aggressively than RED’s. Its congestion measure is based on any mismatch between input rate and link capacity and between queue length and target length, though in practice rate change is measured by the rate of change of the queue length. The aim of REM is to stabilize the queue length to a target which is independent of traffic arrival intensity and of RED’s queue thresholds. Like REM the BLUE algorithm (Feng, et al., 2002) also decouples queue length from congestion management. Rather than queue occupancy, BLUE employs a history of the current buffer packet overflow rate and link utilization to form the packet dropping (marking) probability. By updating its estimates over time, BLUE is able to learn the correct form of queue regulation. BLUE can also randomize times between marking probability updates to avoid source synchronization.
\n\t\t\t\t
Drop-tail (FIFO) queue management (Clark et al., 1992), though not a form of AQM is ubiquitous across Internet routers and has the advantage that it scales well and shares delay between different connections. However, drop-tail may lock-out some connections to the advantage of others occupying the buffer. It also may maintain buffer fullness for longer periods of time, as it only signals congestion when the buffer is full.
\n\t\t\t
\n\t\t\t
\n\t\t\t\t
4.2. Video streaming from an SS
\n\t\t\t\t
In this Chapter, we consider two alternative ways of transporting video across an UL, the first through a basic UDP stream, representing a non-compliant source and the second through the TCP-Friendly Rate Control (TFRC) (Handley et al., 2003), representing a compliant source. TFRC is intended to provide a less aggressive congestion control than TCP’s ‘sawtooth’ response to network congestion, resulting in a smoother sending rate more suitable for video streams. As a TFRC responds to packet loss, as well as round-trip time and packet size, it will change its rate if packets are actively dropped from an SS queue. TFRC has been widely studied in the fixed Internet and there is some interest in its use within wireless networks (Chen & Zakhor, 2006). Because our interest is in queue management issues, the wireless channel is assumed to be error-free, while a detraction of TFRC for wireless networks is that it will also change its sending rate in response to packet losses on the channel, not just those resulting from congestion. However, in the event of channel loss, packet retransmission without acknowledgment to the TFRC application can avoid this problem, as it has for TCP in the SNOOP approach (Balkrishnan et al., 1997). Alternatively, in (Chen & Zakhor, 2006) multiple TFRC connections are employed to dissipate channel packet loss on any one of the wireless connections.
\n\t\t\t\t
In the simulations reported in Section 4.3, the reference ‘Paris’ clip was H.264 VBR-encoded at Common Intermediate Format (CIF) (352\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t×\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t288 pixel/frame) with 4:2:0 sampling and target bit-rate of 1.5 Mbps. The display rate was 30 Hz. Paris consists of two figures seated around a table in TV studio format, with high spatial coding complexity. The Baseline profile was selected, as this is more easily supported by mobile devices because of reduced computational overhead. The Intra-refresh rate was every 15 frames with IPPP… structure. 1000 frames were transmitted.
\n\t\t\t
\n\t\t\t
\n\t\t\t\t
4.3. Assessing uplink queuing disciplines
\n\t\t\t\t
WiMAX operating in point-to-multipoint mode was again simulated using the ns-2 simulator but this time through a WiMAX module from a Taiwanese research group (Tsai, 2006) that has proved an effective way of modeling WiMAX’s behavior. The PHY settings selected for WiMAX simulation are given in Table 4, with the MAC settings defaulted from (Tsai et al., 2006). The DL/UL ratio is not intended to be realistic but to aid in testing the AQM algorithms, as in practice the DL would be allocated the majority of the bandwidth. The simulated configuration is shown in Figure 13. There were three SS communicating to the BS, with one of the SS sending VBR video encoded with the H.264/Advanced Video Codec (AVC). A trace file is input to ns-2 and packet losses recorded in the output. The output is employed to form the PSNR as a measure of video quality. Video quality comparisons were made under the EvalVid environment (Klaue et al., 2004).
\n\t\t\t\t\tTable 5 records the simulated traffic characteristics. As mentioned in Section 4.2, the video source was transported in two different ways: with simple UDP packetization and using TFRC. Network Adaptation Layer Units (NALUs) from H.264 were encapsulated with Real Time Protocol (RTP) headers on a single slice per frame basis. RTP includes a frame creation time-stamp allowing end-to-end delay to be estimated (see Section 5). However, the packet trace created by EvalVid (Klaue et al., 2003) from the H.264 output ensured packets did not exceed 1000 B. This implies that there is some risk of decoder de-synchronization if a slice is split into several packets, causing slice de-synchronization markers to be missing from some packets. Under UDP transport, packets were transmitted with an inter-packet gap of 0.03 s. For TFRC, the H.264 packet sizes were the same as for UDP but the inter-packet gap was varied according to the TFRC equation. As described in (Handley et al., 2003), TFRC is a receiver-based system in which the packet loss rate is found at the receiver and fed-back to the sender in acknowledgment messages. The sender calculates the round-trip delay from the acknowledgment messages and updates the packet sending rate. An equation that models TCP New Reno’s sending rate is employed to find the sending rate. In a variant to standard TFRC, the packet size in the TFRC equation was dynamically altered according to the EvalVid-created trace file sizes. The underlying TFRC protocol is also UDP.
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
SS-UL
\n\t\t\t\t\t\t\t
Service type
\n\t\t\t\t\t\t\t
Traffic type
\n\t\t\t\t\t\t\t
Protocol
\n\t\t\t\t\t\t\t
Packet size (B)
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
1
\n\t\t\t\t\t\t\t
rtPS
\n\t\t\t\t\t\t\t
VBR (video)
\n\t\t\t\t\t\t\t
UDP/ TFRC
\n\t\t\t\t\t\t\t
Variable
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
CBR
\n\t\t\t\t\t\t\t
UDP
\n\t\t\t\t\t\t\t
1000
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
nrtPS
\n\t\t\t\t\t\t\t
FTP
\n\t\t\t\t\t\t\t
TCP
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
2
\n\t\t\t\t\t\t\t
rtPS
\n\t\t\t\t\t\t\t
CBR
\n\t\t\t\t\t\t\t
UDP
\n\t\t\t\t\t\t\t
1000
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
nrtPS
\n\t\t\t\t\t\t\t
FTP
\n\t\t\t\t\t\t\t
TCP
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
3
\n\t\t\t\t\t\t\t
rtPS
\n\t\t\t\t\t\t\t
CBR
\n\t\t\t\t\t\t\t
UDP
\n\t\t\t\t\t\t\t
1000
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
nrtPS
\n\t\t\t\t\t\t\t
FTP
\n\t\t\t\t\t\t\t
TCP
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
SS-DL
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
1,2, 3
\n\t\t\t\t\t\t\t
rtPS
\n\t\t\t\t\t\t\t
CBR
\n\t\t\t\t\t\t\t
UDP
\n\t\t\t\t\t\t\t
1000
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
nrtPS
\n\t\t\t\t\t\t\t
FTP
\n\t\t\t\t\t\t\t
TCP
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
Table 5.
Simulated traffic characteristics.
\n\t\t\t\t
Coexisting rtPS queue CBR sources were all sent at 1500 kbps, i.e. the same target rate as the video source. The inter-packet gap was also 0.03 s for the CBR traffic. The FTP applications were set up out of convenience as a way of occupying the nrtPS queues; otherwise a BE queue might be more appropriate. Likewise, the DL traffic is simply selected to fully occupy the DL link capacity.
\n\t\t\t\t
The buffer size was set to fifty packets. This is not so large as to cause long queuing delays. Packets were dropped rather than explicitly marked at the queues, which will affect non-compliant applications, i.e. UDP, as well as compliant ones, i.e. TFRC. For RED, the dropping thresholds were set to 20% and 80% of the buffer size.
\n\t\t\t\t
\n\t\t\t\t\tTables 6 and 7 present mean video quality and end-to-end delay for UDP and TFRC transport. PSNR and delay were recorded on a per frame basis. From these Tables, it is apparent that TFRC definitely responds to packet drops at the rtPS queue and consequently improves the overall video quality. The mean delay for TFRC is also a little reduced compared to UDP transport, though the maximum delay is higher, due no doubt to TFRC managing its rate. REM’s mean delay is less than the other queuing disciples suggesting a more aggressive regime which is confirmed by the lower video quality whether under UDP or TFRC transport, implying more packet drops. For TFRC, drop-tail queuing is actually preferable to the AQM queuing, while there is some advantage if UDP transport were to be used. From the Tables it is apparent that there is considerable variation in video quality on a frame-by-frame basis. The standard deviation (s.d.) is highest for TFRC under REM. The minimum per-frame PSNR values are unacceptable for viewing but the mean quality can be described as good, especially if received on a mobile station. However, our results do not take account of channel error, which would certainly reduce quality or delay (if some form of error control were applied).
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Queue discipline
\n\t\t\t\t\t\t\t
PSNR (dB)
\n\t\t\t\t\t\t\t
End-to-end delay (s)
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Mean
\n\t\t\t\t\t\t\t
s.d.
\n\t\t\t\t\t\t\t
Min.
\n\t\t\t\t\t\t\t
Mean
\n\t\t\t\t\t\t\t
Max.
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Drop Tail
\n\t\t\t\t\t\t\t
26.7
\n\t\t\t\t\t\t\t
8.2
\n\t\t\t\t\t\t\t
9.8
\n\t\t\t\t\t\t\t
0.035
\n\t\t\t\t\t\t\t
0.17
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
RED
\n\t\t\t\t\t\t\t
29.8
\n\t\t\t\t\t\t\t
9.1
\n\t\t\t\t\t\t\t
10.7
\n\t\t\t\t\t\t\t
0.035
\n\t\t\t\t\t\t\t
0.17
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
REM
\n\t\t\t\t\t\t\t
24.2
\n\t\t\t\t\t\t\t
8.9
\n\t\t\t\t\t\t\t
101
\n\t\t\t\t\t\t\t
0.032
\n\t\t\t\t\t\t\t
0.16
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
BLUE
\n\t\t\t\t\t\t\t
29.8
\n\t\t\t\t\t\t\t
9.1
\n\t\t\t\t\t\t\t
10.7
\n\t\t\t\t\t\t\t
0.036
\n\t\t\t\t\t\t\t
0.16
\n\t\t\t\t\t\t
\n\t\t\t\t\t
Table 6.
Overall video quality and latency for UDP.
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Queue discipline
\n\t\t\t\t\t\t\t
PSNR (dB)
\n\t\t\t\t\t\t\t
End-to-end delay (s)
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Mean
\n\t\t\t\t\t\t\t
s.d.
\n\t\t\t\t\t\t\t
Min.
\n\t\t\t\t\t\t\t
Mean
\n\t\t\t\t\t\t\t
Max.
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
Drop Tail
\n\t\t\t\t\t\t\t
31.6
\n\t\t\t\t\t\t\t
8.6
\n\t\t\t\t\t\t\t
12.1
\n\t\t\t\t\t\t\t
0.032
\n\t\t\t\t\t\t\t
0.23
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
RED
\n\t\t\t\t\t\t\t
31.4
\n\t\t\t\t\t\t\t
8.8
\n\t\t\t\t\t\t\t
12.2
\n\t\t\t\t\t\t\t
0.033
\n\t\t\t\t\t\t\t
0.24
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
REM
\n\t\t\t\t\t\t\t
29.7
\n\t\t\t\t\t\t\t
10.6
\n\t\t\t\t\t\t\t
11.5
\n\t\t\t\t\t\t\t
0.023
\n\t\t\t\t\t\t\t
0.19
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
BLUE
\n\t\t\t\t\t\t\t
31.4
\n\t\t\t\t\t\t\t
8.8
\n\t\t\t\t\t\t\t
12.2
\n\t\t\t\t\t\t\t
0.033
\n\t\t\t\t\t\t\t
0.24
\n\t\t\t\t\t\t
\n\t\t\t\t\t
Table 7.
Overall video quality and latency for TFRC.
\n\t\t\t\t
The packet drop figures were also compared, refer to Figure 14. As the total number of video packets sent was 4530, the dropped video packet numbers are around 10% of the whole. 10% packet loss is normally taken as recoverable from in video streaming (Agnoma & Liotta, 2008). The number of packets lost by the UDP stream was found to be greater than UDP for all queuing disciplines except REM. REM also balances its dropping rate between CBR sharing the rtPS queue and the video sources. However, REM’s packet losses are relatively high. Other queuing disciplines have similar behaviors to each other, whether AQM or drop-tail.
\n\t\t\t\t
Because encoded I-frames tend to be larger than encoded P-frames, after packetization to restrict the maximum packet size to 1000 B, I-frames tend to form longer bursts of packets. From Figure 15, the percentage of I-frame packets dropped is larger than the percentage of P-frame packets (though the total of these is larger because there are more P-frames). Clearly this is a problem for REM and employing TFRC tends to result in a greater percentage of I-frame packet drops. This suggests that a drop policy based on preserving I-frame packets would benefit TFRC transport and could be applied using either RED or BLUE.
\n\t\t\t\t
Figure 14.
Percentage packet drops according to traffic type and transport for differing queuing disciplines.
\n\t\t\t\t
Figure 15.
Percentage of I- and P-frame packets dropped relative to numbers of I- and P-frame packets respectively.
\n\t\t\t\t
Apart from REM, drop-tail queuing and AQM for TFRC transport are equivalent in terms of the resulting mean video quality. Despite the detractions of using congestion controllers originally designed for the wired Internet, some form of congestion control is needed for WiMAX queues. REM is too aggressive, resulting in too many packet drops for ‘bursty’ traffic during periods of congestion. Because I-frame packets tend to arrive in bursts, there is a benefit from a dropping policy that favors I-frame packets. However, dropping predictive P-frame packets also has an enduring impact and given that B-frame packets are not available for this purpose in the low-complexity Baseline profile, some other content dependent queue management is required.
\n\t\t\t
\n\t\t
\n\t\t
\n\t\t\t
5. H. 264 Packetization Issues
\n\t\t\t
H.264/Advanced Video Codec (AVC) (Richardson, 2003) is a compression tool that is able to offer better compression ratios for low-bit rate video than prior codecs. The reader is referred to (Wiegand et al, 2003), and other papers in the Special Issue on H.264 in which that paper appears for further information about H.264 itself, while in this Section we consider issues connected with packetisation.
\n\t\t\t
Standardisation of H.264 was initiated by the Video Coding Experts Group (VCEG) which is a working group of the International Telecommunication Union (ITU-T). The Joint Video Team carried out the final work of developing the H.264, a co-operative effort between the Moving Picture Experts Group (MPEG) and VCEG in 2003. H.264 is divided into two parts: between a Video Coding Layer (VCL) and a Network Abstraction Layer (NAL). This allows VCL and NAL to be separately processed both when initially constructed and also when transported across a heterogeneous network. In the latter, the NAL could be reformed without any processing of the VCL content. For example, in wireline networks an Ethernet frame size of around 1500 B is typical of the Maximum Transport Unit (MTU) size, though this my vary across the public Internet but not within managed all-IP networks, whereas frame sizes nearer to 100 B are more typical of the MTU in wireless networks.
\n\t\t\t
Briefly, the VCL represents the signal-processing functionality of the codec, with mechanisms motion compensation, frequency transform, loop filter and quantization. It is a macroblock-based coder that uses motion prediction between frames, with transform coding and motion compensation of the residual signal. Encoded macroblocks are collected into error resilience units called slices. A slice contains decoder resynchronisation markers and also indicates which control information is relevant to decoding the slice (parameter set). The output of the VCL consists of a bit-stream that containss the slice header (containing the spatial address of the first macroblock in the slice, the initial quantization parameter and similar information) and the macroblock data of an integer number of macroblocks. In H.264/AVC there are two types of slices: intra-frame coded and inter-frame coded. In the case of intra-frame coding, no previous or later frames are needed for encoding the present one, while in inter-frame coding previous and/or later frames are needed. Because H.264 allows prediction reference outside the boundary of a GOP, an Instantaneous Decoder Refresh (IDR) slice fulfills the role of an I-slice in previous codecs, in terms of a random access point for decoding, whereas an I-slice does not force the removal of prior references from the codecs’ buffers.
\n\t\t\t
VLC slices are encapsulated (Wenger et al., 2005) into Network Abstraction Layer Units (NALUs). Each NALU consists of a one-byte header and the payload bit string. The header refers to the type of the NAL unit, the (potential) appearance of bit errors or syntax violations in the NALU payload and other information related to the relative importance of the NALU for the decoding process. By identifying the importance of a NAL to error propagation avoidance, transmission software could judge the level of application-layer FEC to include. If transmission errors are possible (in a wireless network) then a `forbidden’ bit within the NAL to indicate to a decoder to apply error correction procedures (as most decoders contain some error detection and/or correction capability). An additional Real-Time Protocol (RTP) (Schulzrinne et al., 1996) header is assumed, which is why the NALU is referred to as the RTP-payload.
\n\t\t\t
The RTP header is 12 B long and conatins a sequence number, an application-specific timestamp such as the sampling instance, application-specific payload type, a marker bit for signalling the end of related packets such as those emitted at the same time. The interpretation of application-specific data may be negotiated through contraol data at the start of a streaming session. FEC data can additionally be sent in media-unaware RTP packets. Though consideration is beyond the scope of this Chapter, there will normally also be an outer transport-layer UDP packet of 8 B, containing sequence number and a simple checksum. Congestion control for video streams is normally managed by an application-layer congestion controller, such as (refer to Section 4.2) TCP-Friendly Rate Control (TFRC) (Handley et al, 2003; Chen & Zakhor, 2006). TFRC controls the rate at which UDP packets are emitted through a feedback mechanism form the receiver. Increasingly, and certainly for all-IP managed networks, a 20 B IP header is also included to bring the total non-video header overhead to 40 B.
\n\t\t\t
In the default case, one NALU contains a single coded slice. However, for very large slices such as might occur in high definition digital cinema, there is an option to sequence NAL fragments eah within its own RTP packet. Conversely, some NALUs are only a few bytes in size and may be aggregated within a single RTP packet, either all with the same timestamp or with differing timestamps, which must be coded relative to the RTP header’s timestamp.
\n\t\t\t
Addtionally it is possible to partition a slice. When using partitioning of data, a single slice of coded data can be divided in up to three parts, with each part put in a separate NALU. The encoder can be set so that each partiction does not exceed the MTU. The definition of the partitioning for a P- slice is as follows:
\n\t\t\t
\n\t\t\t\t\t\tA partition has a slice header, quantization parameter, macroblock type, mode of prediction and motion vectors.
\n\t\t\t\t\t\tB partition contains the intra-coded macroblocks residual information.
\n\t\t\t\t\t\tC partition has the inter-frame coded macroblocks residual information.
\n\t\t\t
Notice that some macroblocks in a pre-dominantly inter-coded slice may be predicted in an intra-coded (spatially predicted) manner in order to correct error propagation but as these are usually few it may be preferable to merge B- and C-partitions to avoid small NALUs. However, if a encoder is designed for wireless channels then more intra-coded macroblocks may be inserted and in which case separate B and C NALUs may be more appropriate (Stockhammer & Bystrom, 2004). The 3 partition arrangement differs from MPEG-4 and H-263, which only support two partitions. As I-slices in H.264 do not contain inter-frame coded blocks, C partitions do not occur, while B-slices have only partition.
\n\t\t\t
The ability to use information from a correctly received partition when one of the other partitions is lost is the main idea of data partitioning. To be capable of doing this, it is important to be aware of the differing dependencies between the partitions. Each of partitions B and C cannot be decoded when partition A is lost, because without the motion vectors and prediction mode, the decoder cannot decode macroblocks. On the other hand, partition A information, especially the motion vectors, could be helpful to the decoder to compensate for the loss of either or both of the corresponding B and C partitions. We can conclude that partition A is independent of both partitions B and C, while the reverse is not correct. Therefore, the best achievable quality of decoded video arises if the proabability of losing partition A is smaller than the probability of losing both partitions B and C. This is can be effected (Wenger, 2003; Stockhammer & Bystrom, 2004) by either using UEP or by sending partition A by a side channel.
\n\t\t\t
In (Ferre et al., 2008), a packetization method was presented for robust H.264 video transmission over IEEE 802.11 wireless local area network (WLAN) configured as a home network. This research, though not applied to WiMAX does illustrate how careful handling of H.264’s NALUs can improve video quality. Video robustness was enhanced by using small NALUs each of which was encapsulated (after addition of RTP header) into an IP packet. Then several NALU-bearing IP packets were mapped into a larger MAC frame. By retrieving error-free IP packets from within the received MAC frame greater robustness to error was achieved. The NAL aggregation mechanism with packet recovery was evaluated via simulation. The system provided a 2.5-dB gain in video quality for similar throughput and an 80% improvement in throughput efficiency was achieved for a similar video quality (PSNR) video performance. However, this method seems less efficient than the NAL aggregation method which requires a single IP header.
\n\t\t\t
The research reported in (Chatterjee, 2007) used FEC and ARQ techniques to support streaming over WiMAX without violating the standard. The channel state information was employed to dynamically construct the MPDU. The sizes of these units were determined such that the packet dropping probability was minimized without compromising the goodput. Simulation results showed the performance enhancements achieved by the proposed ARQ-enabled adaptive algorithm for streaming data.
\n\t\t\t
A Digital Cinema video distribution architecture with the motion JPEG codec is discussed in (Micanti et al., 2008). Though the issue of the need to avoid retransmission in the packetization strategy is discussed, this is on a general level and tests appear to only be for 802.11 rather than 802.16 as the title suggests. The scheme suggests careful mapping of the codestream structure onto the underlying transport packets.
\n\t\t\t
Finally in (Stockhammer & Baystrom, 2004), the researchers applied data partitioning under H.264/AVC for conversational applications (e.g. videophone, videoconferencing) over mobile wireless channels. The experimental results showed that the probability of entirely lost frames was lowered and the probability of poor quality decoded video was reduced by the data-partitioning scheme. In this scheme, if FEC fails to protect an A partition then previous frame replacement is applied, while if a B- but not an A-partition is lost temporal error concealment is employed.
\n\t\t
\n\t\t
\n\t\t\t
6. Conclusion
\n\t\t\t
This Chapter has presented techniques to achieve successful video streaming over WiMAX networks. Because WiMAX queue management and scheduling are in the gift of the developer, it is possible to devise schemes that are either multimedia-friendly or do not discriminate against the requirements for video streaming. Because WiMAX supports OFDM, UEP through adaptive modulation is possible and, because there are many flexibilities in the WiMAX frame and MPDU, it is possible to may the video stream output onto these structures. The Chapter described research in adaptive modulation based on prioritising between frame types and uplink SS queue management. The necessary background for manipulation of H.264 NALUs, especially through data-partitioning was presented, though investigations are at an early stage. It is possible that all these techniques can be combined and there are other possibilities supported by H.264 such as smooth switching between streams of different quality according to channel conditions. As in all applications of video streaming over wireless, WiMAX technology represents a rich field of investigation.
\n\t\t
\n\t
Acknowledgments
\n\t\t\t
We gratefully thank B. Tanoh for conducting simulations for R. Razavi to verify the results in Section 3 of this Chapter.
\n\t\t
\n',keywords:null,chapterPDFUrl:"https://cdn.intechopen.com/pdfs/9473.pdf",chapterXML:"https://mts.intechopen.com/source/xml/9473.xml",downloadPdfUrl:"/chapter/pdf-download/9473",previewPdfUrl:"/chapter/pdf-preview/9473",totalDownloads:2811,totalViews:228,totalCrossrefCites:3,totalDimensionsCites:2,hasAltmetrics:0,dateSubmitted:null,dateReviewed:null,datePrePublished:null,datePublished:"December 1st 2009",dateFinished:null,readingETA:"0",abstract:null,reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/9473",risUrl:"/chapter/ris/9473",book:{slug:"wimax-new-developments"},signatures:"M. Fleury, R. Razavi, S. Saleh, L. Al-Jobouri and M. Ghanbari",authors:null,sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_2",title:"2. WiMAX background",level:"1"},{id:"sec_2_2",title:"2.1. WiMAX frame structure",level:"2"},{id:"sec_4",title:"3. Unequal Error Protection",level:"1"},{id:"sec_4_2",title:"3.1. WiMAX modulation",level:"2"},{id:"sec_5_2",title:"3.2. WiMAX propagation model",level:"2"},{id:"sec_6_2",title:"3.3. Adaptive modulation",level:"2"},{id:"sec_7_2",title:"3.4. Unequal error protection with adaptive modulation",level:"2"},{id:"sec_8_2",title:"3.5. Experimental verification of UEP adaptive modulation",level:"2"},{id:"sec_10",title:"4. Queue management for video streaming",level:"1"},{id:"sec_10_2",title:"4.1. WiMAX uplink scheduling and management",level:"2"},{id:"sec_11_2",title:"4.2. Video streaming from an SS",level:"2"},{id:"sec_12_2",title:"4.3. Assessing uplink queuing disciplines",level:"2"},{id:"sec_14",title:"5. H. 264 Packetization Issues",level:"1"},{id:"sec_15",title:"6. Conclusion",level:"1"},{id:"sec_16",title:"Acknowledgments",level:"1"}],chapterReferences:[{id:"B1",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAgnoma\n\t\t\t\t\t\t\tF.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLiotta\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008 QoE Analysis of a Peer-to-Peer Television System. In Proceedings of IADIS Int. Conf. on Telecomms, Networks and Systems\n\t\t\t'},{id:"B2",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAhson\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tIlyas\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t(eds.) 2008\n\t\t\t\t\tWiMAX Applications, Taylor & Francis Group, 978-1-42004-547-5 Boca Raton, FL\n\t\t\t'},{id:"B3",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAli\n\t\t\t\t\t\t\tN. A.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tDhrona\n\t\t\t\t\t\t\tP.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHassanein\n\t\t\t\t\t\t\tH.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2009\n\t\t\t\t\tA Performance Study of Uplink Scheduling Algorithms in Point-to-Multipoint WiMAX Networks, Computer Comms., 32\n\t\t\t\t\t3\n\t\t\t\t\t511\n\t\t\t\t\t521\n\t\t\t\t\n\t\t\t'},{id:"B4",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAnderson\n\t\t\t\t\t\t\tH. R.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003\n\t\t\t\t\tFixed Broadband Wireless System Design, Wiley & Sons, 0-47084-438-8 UK\n\t\t\t'},{id:"B5",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAndrews\n\t\t\t\t\t\t\tJ. G.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tGhosh\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMuhamed\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007\n\t\t\t\t\tFundamentals of WiMAX: Understanding Broadband Wireless Networking, Prentice Hall, 0-13222-552-2 Saddle River, NJ\n\t\t\t'},{id:"B6",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAthuraliya\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLi\n\t\t\t\t\t\t\tV. H.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLow\n\t\t\t\t\t\t\tS. H.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tYin\n\t\t\t\t\t\t\tQ.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2001\n\t\t\t\t\tREM: Active Queue Management. IEEE Network, 15\n\t\t\t\t\t2 (48-53)\n\t\t\t'},{id:"B7",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tBalkrishnan\n\t\t\t\t\t\t\tH.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tPadmanabhan\n\t\t\t\t\t\t\tV.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSeshan\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tKatz\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t1997 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links, IEEE/ACM Trans. On Networking, 5\n\t\t\t\t\t6\n\t\t\t\t\t756\n\t\t\t\t\t769\n\t\t\t\t\n\t\t\t'},{id:"B8",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChang\n\t\t\t\t\t\t\tB. J.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChou\n\t\t\t\t\t\t\tC. M.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLiang\n\t\t\t\t\t\t\tY. H.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008\n\t\t\t\t\tMarkov Chain Analysis of Uplink Subframe in Polling-based WiMAX Networks, Computer Comms., 31\n\t\t\t\t\t10\n\t\t\t\t\t2381\n\t\t\t\t\t2390\n\t\t\t\t.'},{id:"B9",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChatterjee\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSengupta\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tGanauly\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007\n\t\t\t\t\tFeedback-Based Real-Time Streaming over WiMAX, IEEE Wireless Commun., 14\n\t\t\t\t\t1\n\t\t\t\t\t64\n\t\t\t\t\t71\n\t\t\t\t\n\t\t\t'},{id:"B10",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChen\n\t\t\t\t\t\t\tC. M.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLin\n\t\t\t\t\t\t\tC. W.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChen\n\t\t\t\t\t\t\tY. C.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2006 Unequal Error Protection for Video Streaming Over Wireless LANs using Content-Aware Packet Retry Limit, In Proceedings of IEEE Int. Conf. on Multimedia and Expo, 1961\n\t\t\t\t\t1964\n\t\t\t\t\n\t\t\t'},{id:"B11",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChen\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tZakhor\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2006\n\t\t\t\t\tMultiple TFRC Connections Based Rate Control for Wireless Networks. IEEE Trans. On Multimedia, 8\n\t\t\t\t\t5\n\t\t\t\t\t1045\n\t\t\t\t\t1061\n\t\t\t\t\n\t\t\t'},{id:"B12",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tClark\n\t\t\t\t\t\t\tD. D.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tShenker\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tZhang\n\t\t\t\t\t\t\tL.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t1992\n\t\t\t\t\tSupporting Real-time Applications in an Integrated Services Packet Network: Architecture and Mechanism, SIGCOMM’92, 14\n\t\t\t\t\t26\n\t\t\t\t\n\t\t\t'},{id:"B13",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tErcge\n\t\t\t\t\t\t\tV.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHari\n\t\t\t\t\t\t\tK. V. S.\n\t\t\t\t\t\t\n\t\t\t\t\t\tet al.\n\t\t\t\t\t\n\t\t\t\t\t2001 Channel Models for Fixed Wireless Applications, Contribution IEEE 802.16.3c-01/29rl Feb. 2001\n\t\t\t'},{id:"B14",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFeng\n\t\t\t\t\t\t\tW. C.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tShin\n\t\t\t\t\t\t\tK. G.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tDilip\n\t\t\t\t\t\t\tD. K.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSaha\n\t\t\t\t\t\t\tD.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2002 Active Queue Management Algorithms, IEEE/ACM Trans. on Networking, 10\n\t\t\t\t\t4\n\t\t\t\t\t513\n\t\t\t\t\t528\n\t\t\t\t\n\t\t\t'},{id:"B15",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFerre\n\t\t\t\t\t\t\tP.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tDoufexi\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChung-How\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tNix\n\t\t\t\t\t\t\tA. R.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tBull\n\t\t\t\t\t\t\tD. R.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008\n\t\t\t\t\tRobust Video Transmission over Wireless LANs, IEEE Trans. on Vehicular Technol., 57\n\t\t\t\t\t4\n\t\t\t\t\t2596\n\t\t\t\t\t2602\n\t\t\t\t\n\t\t\t'},{id:"B16",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFloyd\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tJacobson\n\t\t\t\t\t\t\tV.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t1993\n\t\t\t\t\tRandom Early Detection Gateways for Congestion Avoidance, IEEE/ACM Trans. on Networking, 1\n\t\t\t\t\t4\n\t\t\t\t\t397\n\t\t\t\t\t413\n\t\t\t\t\n\t\t\t'},{id:"B17",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tGhanbari\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003\n\t\t\t\t\tStandard Codecs: Image Compression to Advanced Video Coding, IET Press, Stevenage, 0-85296-710-1\n\t\t\t\t\n\t\t\t'},{id:"B18",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHandley\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tPahdye\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFloyd\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWidmer\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003 TCP-Friendly Rate Control (TFRC): Protocol Specification. RFC 3448.\n\t\t\t'},{id:"B19",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHanzo\n\t\t\t\t\t\t\tL.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChoi\n\t\t\t\t\t\t\tB. J.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007 Near-Instantaneously Adaptive HSDPA-Style OFDM Versus MC-CDMA Transceivers of WiFI, WiMAX, and Next-Generation Cellular Systems, Proceedings of the IEEE, 95\n\t\t\t\t\t12\n\t\t\t\t\t2368\n\t\t\t\t\t2392\n\t\t\t\t\n\t\t\t'},{id:"B20",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHillestad\n\t\t\t\t\t\t\tO. J.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tPerkis\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tGenc\n\t\t\t\t\t\t\tV.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMurphy\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMurphy\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2006 Delivery of On-Demand Video Services in Rural Areas via IEEE 802.16 Broadband Wireless Access Networks, In Proceedings of 2nd ACM Workshop on Wireless Multimedia Networking and Performance Modeling, 43\n\t\t\t\t\t51\n\t\t\t\t\n\t\t\t'},{id:"B21",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHonig\n\t\t\t\t\t\t\tM. K.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMesserschmitt\n\t\t\t\t\t\t\tD. G.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t1990 Adaptive Filters Structures, Algorithms, and Applications, Kluwer, 978-0-89838-163-4 Boston, MA\n\t\t\t'},{id:"B22",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHoymann\n\t\t\t\t\t\t\tC.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2005\n\t\t\t\t\tAnalysis and Performance Evaluation of the OFDM-based Metropolitan Area Network IEEE 802.16, Computer Networks, 49\n\t\t\t\t\t341\n\t\t\t\t\t363\n\t\t\t\t\n\t\t\t'},{id:"B23",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tJuan\n\t\t\t\t\t\t\tH. H.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHuang\n\t\t\t\t\t\t\tH. C.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHuang\n\t\t\t\t\t\t\tC. Y.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChiang\n\t\t\t\t\t\t\tT.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007 Scalable Video Streaming over Mobile WiMAX, IEEE Int. Symposium on Circuits and Systems, 3463\n\t\t\t\t\t3466 .\n\t\t\t'},{id:"B24",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tKlaue\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tRathke\n\t\t\t\t\t\t\tB.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWolisz\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003 EvalVid- A Framework for Video Transmission and Quality Evaluation, In Proceedings of Int. Conf. on Modeling Techniques and Tools for Computer Performance, 255\n\t\t\t\t\t272\n\t\t\t\t\n\t\t\t'},{id:"B25",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tKoo\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAhn\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChung\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2004\n\t\t\t\t\tPerformance Analysis of Active Queue Management Schemes for IP Network, In Proceedings of Int. Conf. on Computational Science, 349\n\t\t\t\t\t356\n\t\t\t\t\n\t\t\t'},{id:"B26",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLi\n\t\t\t\t\t\t\tQ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tvan der Schaar\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2004 Providing QoS to Layered Video Over Wireless Local Area Networks Through Real-Time Retry Limit Adaptation, IEEE Trans. on Multimedia, 6\n\t\t\t\t\t2\n\t\t\t\t\t278\n\t\t\t\t\t290\n\t\t\t\t\n\t\t\t'},{id:"B27",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMeloni\n\t\t\t\t\t\t\tL. G. P.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008 A New WiMAX profile for DTV Return Channel and Wireless Access., 291\n\t\t\t\t\t392 , In Mobile WiMAX, Chen, K.-C. and de Marca, J. R. B. (eds.), Wiley & Sons, 978-0-47051-941-7 Chichester, UK\n\t\t\t'},{id:"B28",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMicanti\n\t\t\t\t\t\t\tP.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tBaruffa\n\t\t\t\t\t\t\tG.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFabrizio Frescura\n\t\t\t\t\t\t\tF.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008 A Packetization Technique for D-Cinema Contents Multicasting over Metropolitan Wireless Networks, 313\n\t\t\t\t\t328 , In Mobile WiMAX, Chen, K.-C. and de Marca, J. R. B. (eds.), Wiley & Sons, 978-0-47051-941-7 Chichester, UK\n\t\t\t'},{id:"B29",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tMilanovic\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tRimac-Drlje\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tBejuk\n\t\t\t\t\t\t\tK.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007 Comparison of Propagation Models Accuracy for WiMAX on 3.5 GHz, In Proceedings of IEEE Int. Conf. on Electronics, Circuits and Systems, 1111\n\t\t\t\t\t1114\n\t\t\t\t\n\t\t\t'},{id:"B30",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tNegi\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tCioffi\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t1998\n\t\t\t\t\tPilot Tone Selection for Channel Estimation in a Mobile OFDM System, IEEE Trans. On Consumer Electron., 44\n\t\t\t\t\t3\n\t\t\t\t\t1122\n\t\t\t\t\t1128\n\t\t\t\t\n\t\t\t'},{id:"B31",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tNuaymi\n\t\t\t\t\t\t\tL.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007 WiMAX: Technology fo Broadband Wireless Access, Wiley & Sons, 978-0-47002-808-7 Chichester, UK\n\t\t\t'},{id:"B32",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tOrlov\n\t\t\t\t\t\t\tZ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tNecker\n\t\t\t\t\t\t\tM. C.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007 Enhancement of video streaming QoS with Active Buffer Management in Wireless Environments, In Proceedings of 13th European Wireless Conf.\n\t\t\t'},{id:"B33",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tRahmani\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHjelm\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAklund\n\t\t\t\t\t\t\tC.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008 Active Queue Management for TCP Friendly Rate Control Traffic in Heterogeneous Networks, In Proceedings of Int. Conf. on Telecoms., 1\n\t\t\t\t\t7\n\t\t\t\t\n\t\t\t'},{id:"B34",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tRichardson\n\t\t\t\t\t\t\tI. E.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003\n\t\t\t\t\tH.264 and MPEG-4 Video Compression, Wiley & Sons, 0-47084-837-5 UK\n\t\t\t'},{id:"B35",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tRazavi\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFleury\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tGhanbari\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2008 Unequal Protection of Video Streaming through Adaptive Modulation with a Tri-Zone Buffer over Bluetooth EDR, EURASIP J. on Wireless Comms. And Networking, 16 pages, online vol.\n\t\t\t'},{id:"B36",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSadka\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2002\n\t\t\t\t\tCompressed Video Communications, Wiley & Sons, 0-47084-312-8 UK\n\t\t\t'},{id:"B37",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tvan der Schaar\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tChou\n\t\t\t\t\t\t\tP. A.\n\t\t\t\t\t\t\n\t\t\t\t\t(eds.) 2007\n\t\t\t\t\tMultimedia over IP and Wireless Networks, Academic Press, 139780120884803, Burlington, MA\n\t\t\t'},{id:"B38",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSchulzrinne\n\t\t\t\t\t\t\tH.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tCasner\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFrederick\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tJacobson\n\t\t\t\t\t\t\tV.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t1996 RTP: A Transport Protocol for Real-Time Applications, RFC 1889, 1996\n\t\t\t'},{id:"B39",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tStockhammer\n\t\t\t\t\t\t\tT.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tBaystrom\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2004 H.264/AVC Data Partitioning for Mobile Video Communication, In Proceedings of Int. Conf. on Image Processing, 545\n\t\t\t\t\t548\n\t\t\t\t\n\t\t\t'},{id:"B40",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tTariq\n\t\t\t\t\t\t\tU.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tJilani\n\t\t\t\t\t\t\tU. N.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSiddiqui\n\t\t\t\t\t\t\tT. A.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2007\n\t\t\t\t\tAnalysis on Fixed and Mobile WiMAX, MSc Thesis Report, Blekinge Institute of Technology, Sweden\n\t\t\t'},{id:"B41",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tTsai\n\t\t\t\t\t\t\tF. C. D.\n\t\t\t\t\t\t\n\t\t\t\t\t\tet al.\n\t\t\t\t\t\n\t\t\t\t\t2006 The Design and Implementation of WiMAX Module for ns-2 Simulator. Workshop on ns2, article 5\n\t\t\t\t\n\t\t\t'},{id:"B42",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWenger\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003 H.264/AVC Over IP, IEEE Trans. on Circuits and Syst. for Video Technol., 13\n\t\t\t\t\t7\n\t\t\t\t\t645\n\t\t\t\t\t656\n\t\t\t\t\n\t\t\t'},{id:"B43",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWenger\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tHannuksela\n\t\t\t\t\t\t\tH. H.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tStockhammer\n\t\t\t\t\t\t\tT.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWesterlund\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSinger\n\t\t\t\t\t\t\tR.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2005 RTP Payload Format for H.264 Video, RFC 3984\n\t\t\t'},{id:"B44",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWiegand\n\t\t\t\t\t\t\tT.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tSullivan\n\t\t\t\t\t\t\tG. J.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tBjontegaard\n\t\t\t\t\t\t\tG.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLuthra\n\t\t\t\t\t\t\tA.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2003 Overview of the H.264/AVC Video Coding Standard, IEEE Trans. on Circuits and Syst. for Video Technol., 13\n\t\t\t\t\t7\n\t\t\t\t\t560\n\t\t\t\t\t576\n\t\t\t\t\n\t\t\t'},{id:"B45",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tYun\n\t\t\t\t\t\t\tJ.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tKavehard\n\t\t\t\t\t\t\tM.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2006 PHY/MAC Cross- Layer Issues in Mobile WiMAX, Bechtel Telecomm. Techn. Journal, 4\n\t\t\t\t\t1\n\t\t\t\t\t45\n\t\t\t\t\t56\n\t\t\t\t\n\t\t\t'},{id:"B46",body:'\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tZhang\n\t\t\t\t\t\t\tH.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLi\n\t\t\t\t\t\t\tY.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tFeng\n\t\t\t\t\t\t\tS.\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tWu\n\t\t\t\t\t\t\tW.\n\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t2006 A New Extended rtPS Scheduling Mechanism Based on Multi-polling for VoIP Service in IEEE 802.16e System, In Proceedings of Int. Conf. on Communication Technol., 1\n\t\t\t\t\t4\n\t\t\t\t\n\t\t\t'}],footnotes:[{id:"fn1",explanation:"In this Chapter, the terms ‘picture’ and ‘frame’ are employed interchangeably as we assume."},{id:"fn2",explanation:"PSNR = 10 log (MAX/MSE), where MAX is the maximum intensity value possible for a pixel, and ME is the pixel-wise mean square error between a reference frame and the frame under test."},{id:"fn3",explanation:"Lower SNRs result under this model result in unacceptable video quality and are not presented."}],contributors:[{corresp:null,contributorFullName:"M. Fleury",address:null,affiliation:'
'}],corrections:null},book:{id:"3575",title:"WIMAX",subtitle:"New Developments",fullTitle:"WIMAX New Developments",slug:"wimax-new-developments",publishedDate:"December 1st 2009",bookSignature:"Upena D Dalal and Y P Kosta",coverURL:"https://cdn.intechopen.com/books/images_new/3575.jpg",licenceType:"CC BY-NC-SA 3.0",editedByType:"Edited by",editors:[{id:"2097",title:"Dr.",name:"Upena",middleName:null,surname:"Dalal",slug:"upena-dalal",fullName:"Upena Dalal"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"9464",title:"WiMAX: Appropriate Technology to Provide Last Mile Access to ICTs Infrastructure and Services in Rural Areas",slug:"wimax-appropriate-technology-to-provide-last-mile-access-to-icts-infrastructure-and-services-in-rura",totalDownloads:2375,totalCrossrefCites:0,signatures:"Frank Ibikunle",authors:[null]},{id:"9465",title:"The Role of WiMAX Technology on Broadband Access Networks: Economic Model",slug:"the-role-of-wimax-technology-on-broadband-access-networks-economic-model",totalDownloads:2403,totalCrossrefCites:0,signatures:"Joao Paulo Ribeiro Pereira",authors:[null]},{id:"9466",title:"Mobile WiMAX Handset Front-End: Design Aspects and Challenges",slug:"mobile-wimax-handset-front-end-design-aspects-and-challenges",totalDownloads:2399,totalCrossrefCites:0,signatures:"Vaclav Valenta, Genevieve Baudoin, Antoine Diet, Roman Marsalek, Fabien Robert, Martha Suarez and Martine Villegas",authors:[null]},{id:"9467",title:"The Application of -Law Companding to Mobile WiMax",slug:"the-application-of-law-companding-to-mobile-wimax",totalDownloads:2069,totalCrossrefCites:0,signatures:"Brian G Stewart and Athinarayanan Vallavaraj",authors:[null]},{id:"9485",title:"VLSI Architectures for WIMAX Channel Decoders",slug:"vlsi-architectures-for-wimax-channel-decoders",totalDownloads:1759,totalCrossrefCites:0,signatures:"Maurizio Martina and Guido Masera",authors:[null]},{id:"9468",title:"LDPC Decoders for the WiMAX (IEEE 802.16e) Based on Multicore Architectures",slug:"ldpc-decoders-for-the-wimax-ieee-802-16e-based-on-multicore-architectures",totalDownloads:4181,totalCrossrefCites:3,signatures:"Gabriel Falcao, Vitor Silva, Jose Marinho and Leonel Sousa",authors:[null]},{id:"9469",title:"Design and Implementation WiMAX Transceiver on Multicore Platform",slug:"design-and-implementation-wimax-transceiver-on-multicore-platform",totalDownloads:2603,totalCrossrefCites:0,signatures:"Qing Wang, Yonghua Lin, Jianwen Chen, Da Fan and Ling Shao",authors:[null]},{id:"9470",title:"Advanced Filter Development for WiMAX Applications",slug:"advanced-filter-development-for-wimax-applications",totalDownloads:2995,totalCrossrefCites:0,signatures:"Kaixue Ma, Leyu Zhang and Kiat Seng Yeo",authors:[null]},{id:"9471",title:"Adaptive Parameters Based Transmission Control and Optimization in Mobile WiMAX at Physical Layer",slug:"adaptive-parameters-based-transmission-control-and-optimization-in-mobile-wimax-at-physical-layer",totalDownloads:1980,totalCrossrefCites:0,signatures:"U. D. Dalal and Y. P. Kosta",authors:[null]},{id:"9472",title:"Smart Antenna Systems for WiMAX Radio Technology",slug:"smart-antenna-systems-for-wimax-radio-technology",totalDownloads:3202,totalCrossrefCites:1,signatures:"Yikun Huang",authors:[null]},{id:"9473",title:"Enabling WiMAX Video Streaming",slug:"enabling-wimax-video-streaming",totalDownloads:2811,totalCrossrefCites:3,signatures:"M. Fleury, R. Razavi, S. Saleh, L. Al-Jobouri and M. Ghanbari",authors:[null]},{id:"9474",title:"Achieving Frequency Reuse 1 in WiMAX Networks with Beamforming",slug:"achieving-frequency-reuse-1-in-wimax-networks-with-beamforming",totalDownloads:2793,totalCrossrefCites:0,signatures:"Masood Maqbool, Marceau Coupechoux, Veronique Capdevielle and Philippe Godlewski",authors:[null]},{id:"9475",title:"WiMax Interference and Coexistence Studies with Other Radio Systems",slug:"wimax-interference-and-coexistence-studies-with-other-radio-systems",totalDownloads:2971,totalCrossrefCites:0,signatures:"A. Rahim Biswas and A. Finger",authors:[null]},{id:"9476",title:"Resource Management Framework for QoS Scheduling in IEEE 802.16 WiMAX Networks",slug:"resource-management-framework-for-qos-scheduling-in-ieee-802-16-wimax-networks",totalDownloads:1713,totalCrossrefCites:0,signatures:"HuaWang and Lars Dittmann",authors:[null]},{id:"9477",title:"Analyzing the Throughput and QoS Performance of WiMAX Link in an Urban Environment",slug:"analyzing-the-throughput-and-qos-performance-of-wimax-link-in-an-urban-environment",totalDownloads:2621,totalCrossrefCites:3,signatures:"Faqir Zarrar Yousaf, Kai Daniel and Christian Wietfeld",authors:[null]},{id:"9478",title:"WiMAX-WiFi Synergy for Next Generation Heterogynous Network",slug:"wimax-wifi-synergy-for-next-generation-heterogynous-network",totalDownloads:3573,totalCrossrefCites:0,signatures:"Rashid A. Saeed, Amran Naemat, Azrin Aris and Mat Kamil Awang",authors:[null]},{id:"9479",title:"System-Level Modelling of Heterogeneous System-on-Chip Architectures Targeting Multi-Standard Wireless Applications",slug:"system-level-modelling-of-heterogeneous-system-on-chip-architectures-targeting-multi-standard-wirele",totalDownloads:1713,totalCrossrefCites:0,signatures:"Ali Ahmadinia, Balal Ahmad and Tughrul Arslan",authors:[null]},{id:"9480",title:"WiMAX Cross-Layer System for Next Generation Heterogeneous Environments",slug:"wimax-cross-layer-system-for-next-generation-heterogeneous-environments",totalDownloads:1813,totalCrossrefCites:2,signatures:"Pedro Neves, Susana Sargento, Kostas Pentikousis and Francisco Fontes",authors:[null]},{id:"9481",title:"Intelligent WiMax Vertical Handovers",slug:"intelligent-wimax-vertical-handovers",totalDownloads:1927,totalCrossrefCites:0,signatures:"Nadine Akkari Adra",authors:[null]},{id:"9482",title:"Signal Metrics for Vertical Handoff Towards (Cognitive) WiMAX",slug:"signal-metrics-for-vertical-handoff-towards-cognitive-wimax",totalDownloads:1514,totalCrossrefCites:1,signatures:"Francois-Xavier Socheleau, Sebastien Houcke, Philippe Ciblat and Abdeldjalil Aissa-El-Bey",authors:[null]},{id:"9483",title:"Multi-Hop Relay Networks",slug:"multi-hop-relay-networks",totalDownloads:2884,totalCrossrefCites:1,signatures:"David Soldani",authors:[null]},{id:"9484",title:"Broadband Communication in the High Mobility Scenario: the WiMAX Opportunity",slug:"broadband-communication-in-the-high-mobility-scenario-the-wimax-opportunity",totalDownloads:2719,totalCrossrefCites:1,signatures:"M. Aguado, E. Jacob, M.V. Higuero, Marion Berbineau and P. Saiz",authors:[null]}]},relatedBooks:[{type:"book",id:"77",title:"Microstrip Antennas",subtitle:null,isOpenForSubmission:!1,hash:"30737e416619b464551517345a275f6b",slug:"microstrip-antennas",bookSignature:"Nasimuddin Nasimuddin",coverURL:"https://cdn.intechopen.com/books/images_new/77.jpg",editedByType:"Edited by",editors:[{id:"21459",title:"Dr.",name:"N",surname:"Nasimuddin",slug:"n-nasimuddin",fullName:"N Nasimuddin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"14706",title:"Design of Low-Cost Probe-Fed Microstrip Antennas",slug:"design-of-low-cost-probe-fed-microstrip-antennas",signatures:"D. C. Nascimento and J. C. da S. Lacava",authors:[{id:"17182",title:"Dr.",name:"José Carlos",middleName:"Da Silva",surname:"Lacava",fullName:"José Carlos Lacava",slug:"jose-carlos-lacava"},{id:"21173",title:"PhD.",name:"Daniel",middleName:null,surname:"Nascimento",fullName:"Daniel Nascimento",slug:"daniel-nascimento"}]},{id:"14707",title:"Analysis of a Rectangular Microstrip Antenna on a Uniaxial Substrate",slug:"analysis-of-a-rectangular-microstrip-antenna-on-a-uniaxial-substrate",signatures:"Amel Boufrioua",authors:[{id:"18041",title:"Prof.",name:"Amel",middleName:null,surname:"Boufrioua",fullName:"Amel Boufrioua",slug:"amel-boufrioua"}]},{id:"14708",title:"Artificial Materials based Microstrip Antenna Design",slug:"artificial-materials-based-microstrip-antenna-design",signatures:"Merih Palandöken",authors:[{id:"19051",title:"Dr.Ing.",name:"Merih",middleName:null,surname:"Palandöken",fullName:"Merih Palandöken",slug:"merih-palandoken"}]},{id:"14709",title:"Particle-Swarm-Optimization-Based Selective Neural Network Ensemble and Its Application to Modeling Resonant Frequency of Microstrip Antenna",slug:"particle-swarm-optimization-based-selective-neural-network-ensemble-and-its-application-to-modeling-",signatures:"Tian Yu-Bo and Xie Zhi-Bin",authors:[{id:"21523",title:"Dr.",name:"Yu-Bo",middleName:null,surname:"Tian",fullName:"Yu-Bo Tian",slug:"yu-bo-tian"}]},{id:"14710",title:"Microstrip Antennas Conformed onto Spherical Surfaces",slug:"microstrip-antennas-conformed-onto-spherical-surfaces",signatures:"Daniel B. Ferreira and J. C. da S. Lacava",authors:[{id:"17182",title:"Dr.",name:"José Carlos",middleName:"Da Silva",surname:"Lacava",fullName:"José Carlos Lacava",slug:"jose-carlos-lacava"},{id:"21171",title:"Dr.",name:"Daniel",middleName:null,surname:"Ferreira",fullName:"Daniel Ferreira",slug:"daniel-ferreira"}]},{id:"14711",title:"Mathematical Modeling of Spherical Microstrip Antennas and Applications",slug:"mathematical-modeling-of-spherical-microstrip-antennas-and-applications",signatures:"Nikolaos L. Tsitsas and Constantinos A. Valagiannopoulos",authors:[{id:"20921",title:"Dr.",name:"Nikolaos L.",middleName:null,surname:"Tsitsas",fullName:"Nikolaos L. Tsitsas",slug:"nikolaos-l.-tsitsas"},{id:"20922",title:"PhD.",name:"Constantinos A.",middleName:null,surname:"Valagiannopoulos",fullName:"Constantinos A. Valagiannopoulos",slug:"constantinos-a.-valagiannopoulos"}]},{id:"14712",title:"Cavity-Backed Cylindrical Wraparound Antennas",slug:"cavity-backed-cylindrical-wraparound-antennas",signatures:"O. M. C. Pereira-Filho, T. B. Ventura, C. G. Rego, A. F. Tinoco-S., and J. C. da S. Lacava",authors:[{id:"17182",title:"Dr.",name:"José Carlos",middleName:"Da Silva",surname:"Lacava",fullName:"José Carlos Lacava",slug:"jose-carlos-lacava"},{id:"19227",title:"PhD.",name:"Odilon",middleName:null,surname:"Pereira Filho",fullName:"Odilon Pereira Filho",slug:"odilon-pereira-filho"},{id:"19450",title:"Mr.",name:"Thiago",middleName:null,surname:"Ventura",fullName:"Thiago Ventura",slug:"thiago-ventura"},{id:"19451",title:"PhD.",name:"Cassio",middleName:null,surname:"Rego",fullName:"Cassio Rego",slug:"cassio-rego"},{id:"19452",title:"Prof.",name:"Alexis F.",middleName:null,surname:"Tinoco Salazar",fullName:"Alexis F. Tinoco Salazar",slug:"alexis-f.-tinoco-salazar"}]},{id:"14713",title:"Analysis into Proximity-Coupled Microstrip Antenna on Dielectric Lens",slug:"analysis-into-proximity-coupled-microstrip-antenna-on-dielectric-lens",signatures:"Lawrence Mall",authors:[{id:"18397",title:"Dr.",name:"Lawrence",middleName:null,surname:"Mall",fullName:"Lawrence Mall",slug:"lawrence-mall"}]},{id:"14714",title:"Methods to Design Microstrip Antennas for Modern Applications",slug:"methods-to-design-microstrip-antennas-for-modern-applications",signatures:"K. Siakavara",authors:[{id:"18497",title:"PhD.",name:"Katherine",middleName:null,surname:"Siakavara",fullName:"Katherine Siakavara",slug:"katherine-siakavara"}]},{id:"14715",title:"Fractal-Shaped Reconfigurable Antennas",slug:"fractal-shaped-reconfigurable-antennas",signatures:"Ali Ramadan, Mohammed Al-Husseini, Karim Y. Kabalan and Ali El-Hajj",authors:[{id:"17558",title:"Dr.",name:"Mohammed",middleName:null,surname:"Al-Husseini",fullName:"Mohammed Al-Husseini",slug:"mohammed-al-husseini"},{id:"21637",title:"Mr.",name:"Ali",middleName:null,surname:"Ramadan",fullName:"Ali Ramadan",slug:"ali-ramadan"},{id:"21638",title:"Prof.",name:"Karim",middleName:null,surname:"Kabalan",fullName:"Karim Kabalan",slug:"karim-kabalan"},{id:"21639",title:"Prof.",name:"Ali",middleName:null,surname:"El-Hajj",fullName:"Ali El-Hajj",slug:"ali-el-hajj"}]},{id:"14716",title:"A Microstrip Antenna Shape Grammar",slug:"a-microstrip-antenna-shape-grammar",signatures:"Adrian Muscat and Joseph A. Zammit",authors:[{id:"19668",title:"Dr.",name:"Adrian",middleName:null,surname:"Muscat",fullName:"Adrian Muscat",slug:"adrian-muscat"},{id:"19669",title:"Dr.",name:"Joseph A.",middleName:null,surname:"Zammit",fullName:"Joseph A. Zammit",slug:"joseph-a.-zammit"}]},{id:"14717",title:"Electrically Small Microstrip Antennas Targeting Miniaturized Satellites: the CubeSat Paradigm",slug:"electrically-small-microstrip-antennas-targeting-miniaturized-satellites-the-cubesat-paradigm",signatures:"Constantine Kakoyiannis and Philip Constantinou",authors:[{id:"19252",title:"Dr.Ing.",name:"Constantine",middleName:"G.",surname:"Kakoyiannis",fullName:"Constantine Kakoyiannis",slug:"constantine-kakoyiannis"},{id:"21863",title:"Prof.",name:"Philip",middleName:null,surname:"Constantinou",fullName:"Philip Constantinou",slug:"philip-constantinou"}]},{id:"14718",title:"Circularly Polarized Microstrip Antennas with Proximity Coupled Feed for Circularly Polarized Synthetic Aperture Radar",slug:"circularly-polarized-microstrip-antennas-with-proximity-coupled-feed-for-circularly-polarized-synthe",signatures:"Merna Baharuddin and Josaphat Tetuko Sri Sumantyo",authors:[{id:"18521",title:"PhD.",name:"Merna",middleName:null,surname:"Baharuddin",fullName:"Merna Baharuddin",slug:"merna-baharuddin"},{id:"21582",title:"Prof.",name:"Josaphat",middleName:null,surname:"Tetuko Sri Sumantyo",fullName:"Josaphat Tetuko Sri Sumantyo",slug:"josaphat-tetuko-sri-sumantyo"}]},{id:"14719",title:"Circularly Polarized Slotted/Slit-Microstrip Patch Antennas",slug:"circularly-polarized-slotted-slit-microstrip-patch-antennas",signatures:"Nasimuddin, Zhi-Ning Chen and Xianming Qing",authors:[{id:"21459",title:"Dr.",name:"N",middleName:null,surname:"Nasimuddin",fullName:"N Nasimuddin",slug:"n-nasimuddin"}]},{id:"14720",title:"Microstrip Antenna Arrays",slug:"microstrip-antenna-arrays",signatures:"Albert Sabban",authors:[{id:"16889",title:"Dr.",name:"Albert",middleName:null,surname:"Sabban",fullName:"Albert Sabban",slug:"albert-sabban"}]},{id:"14721",title:"Microstrip Antennas for Indoor Wireless Dynamic Environments",slug:"microstrip-antennas-for-indoor-wireless-dynamic-environments",signatures:"Mohamed Elhefnawy and Widad Ismail",authors:[{id:"17004",title:"Dr.",name:"Widad",middleName:null,surname:"Ismail",fullName:"Widad Ismail",slug:"widad-ismail"},{id:"17005",title:"Dr.",name:"Mohamed",middleName:null,surname:"Elhefnawy",fullName:"Mohamed Elhefnawy",slug:"mohamed-elhefnawy"}]},{id:"14722",title:"DBDP SAR Microstrip Array Technology",slug:"dbdp-sar-microstrip-array-technology",signatures:"Shun-Shi Zhong",authors:[{id:"4123",title:"Prof.",name:"Shun-Shi",middleName:null,surname:"Zhong",fullName:"Shun-Shi Zhong",slug:"shun-shi-zhong"}]},{id:"14723",title:"Microwave Properties of Dielectric Materials",slug:"microwave-properties-of-dielectric-materials",signatures:"JS Mandeep and Loke Ngai Kin",authors:[{id:"21035",title:"Prof.",name:"Mandeep",middleName:null,surname:"Singh Jit",fullName:"Mandeep Singh Jit",slug:"mandeep-singh-jit"},{id:"135784",title:"Prof.",name:"Ngai Kin",middleName:null,surname:"Loke",fullName:"Ngai Kin Loke",slug:"ngai-kin-loke"}]},{id:"14724",title:"Hybrid Microstrip Antennas",slug:"hybrid-microstrip-antennas",signatures:"Alexandre Perron, Tayeb A. Denidni and Abdel R. Sebak",authors:[{id:"11473",title:"Prof.",name:"Tayeb A.",middleName:null,surname:"Denidni",fullName:"Tayeb A. Denidni",slug:"tayeb-a.-denidni"},{id:"21901",title:"Prof.",name:"Alexandre",middleName:null,surname:"Perron",fullName:"Alexandre Perron",slug:"alexandre-perron"},{id:"21902",title:"Prof.",name:"Abdel R.",middleName:null,surname:"Sebak",fullName:"Abdel R. Sebak",slug:"abdel-r.-sebak"}]},{id:"14725",title:"Integration of 60-GHz Microstrip Antennas with CMOS Chip",slug:"integration-of-60-ghz-microstrip-antennas-with-cmos-chip",signatures:"Gordana Klaric Felic and Efstratios Skafidas",authors:[{id:"18389",title:"Prof.",name:"Gordana Klaric",middleName:null,surname:"Felic",fullName:"Gordana Klaric Felic",slug:"gordana-klaric-felic"},{id:"21215",title:"PhD.",name:"Efstratios",middleName:null,surname:"Skafidas",fullName:"Efstratios Skafidas",slug:"efstratios-skafidas"}]},{id:"14726",title:"A Practical Guide to 3D Electromagnetic Software Tools",slug:"a-practical-guide-to-3d-electromagnetic-software-tools",signatures:"Guy A. E. Vandenbosch and Alexander Vasylchenko",authors:[{id:"18667",title:"PhD.",name:"Alexander",middleName:null,surname:"Vasylchenko",fullName:"Alexander Vasylchenko",slug:"alexander-vasylchenko"},{id:"20908",title:"Prof.",name:"Guy A. E.",middleName:null,surname:"Vandenbosch",fullName:"Guy A. E. Vandenbosch",slug:"guy-a.-e.-vandenbosch"}]}]}]},onlineFirst:{chapter:{type:"chapter",id:"73865",title:"Pathogens Transmitted through Contaminated Rice",doi:"10.5772/intechopen.93757",slug:"pathogens-transmitted-through-contaminated-rice",body:'
1. Introduction
Most of the world’s population, especially Asia, use rice as the primary source of carbohydrates in their daily menu. Rice, as a staple food, is usually served with side dishes to complement the taste and also complement one’s nutritional needs. Rice can process with other food ingredients into new dishes, such as fried rice, yellow rice, or uduk rice.
Rice can be a source of food poisoning because it contaminated with dangerous pathogens. In general, food poisoning can cause by contaminant bacteria such as Bacillus cereus, Staphylococcus aureus, Salmonella group (except Salmonella typhi), Shigella, Vibrio, Escherichia coli, Campylobacter, Yersinia enterocolitis, Clostridium [1]. Rice-based food poisoning more often caused by Bacillus cereus and Staphylococcus aureus based on several cases in the world [2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15]. Besides, Bacillus cereus and Staphylococcus aureus are significant sources of microbiological harm from cereal grains and related products [16].
Bacillus cereus can found in soil, plants, and the intestinal tract of insects and mammals. In poor environmental conditions, bacteria can turn into spore forms. Bacillus cereus in spore form can found hiding in raw rice. The bacteria move from the soil to the paddy fields, their spores persist for years, even surviving during cooking due to their resistance to extreme temperatures. However, if rice left at room temperature, in warm and humid conditions, the spores can turn into bacteria and produce toxins that can cause vomiting and diarrhea [17].
Staphylococcus aureus is naturally present in the human body, so these bacteria are one of the essential agents causing food poisoning that often occurs in society. The most significant cause of Staphylococcus aureus entry into the food chain (which then causes staphylococcal poisoning) is the low sanitation of workers handling food [18].
According to the Food Standards Agency (FSA), there are nearly 900,000 food poisoning cases each year. The lifestyle that has changed in recent years has resulted in an increasing dependence on ready-to-eat food, eating out more than cooking, busyness results in having less time to prepare and cook food. This habit is the reason that increases the number of cases of food poisoning [19]. Apart from that, environmental factors also influence the level of contamination. Food prepared under unfavorable conditions and environment implies a higher incidence of food poisoning than others [18]. Food poisoning occurs more frequently in developing countries than in developed countries. This situation is due to differences in the level of sanitation between developed and developing countries [18].
2. Pathogenic Bacillus cereus transmitted through rice
2.1 Characteristics and diseases caused by Bacillus cereus
Bacillus cereus is a spore-forming bacteria that produces a toxin that causes vomiting or diarrhea. Symptoms are generally mild and short-lived (up to 24 h). Bacillus cereus commonly found in the environment (e.g., soil) and various foods. Spores are able to withstand harsh environments, including average cooking temperatures. Bacillus cereus is a Gram-positive, motile (flagellated), spore-forming, rod-shaped bacterium belonging to the genus Bacillus. Species in this genus include Bacillus anthracis, Bacillus cereus, Bacillus mycoides, Bacillus thuringiensis, Bacillus pseudomycoides, and Bacillus weihenstephanensis [17, 20].
Bacillus cereus is widespread and easy to find in the soil, where it adopts a saprophytic life cycle, germinate, grow, and sporulate in this environment [21]. Spores are more resistant to environmental stress than vegetative cells because of their metabolic dormancy and hard physical properties [22].
Bacillus cereus causes two types of diseases, namely emetic syndrome and diarrhea syndrome. Emetic syndrome causes by emetic toxins produced by bacteria during the growth phase in food, a diarrheal syndrome caused by diarrheal toxins produced during bacterial growth in the small intestine [23].
Bacillus cereus has a mesophilic or psychrotrophic strain. Mesophilic strains grow well at 37°C but do not grow below 10°C, whereas psychrotrophic strains grow well at cold temperatures but grow poorly at 37°C [24]. All Bacillus cereus isolates associated with emetic toxin production have found to be mesophilic [25]. Bacillus cereus growth is optimal in the presence of oxygen, although it continues to grow under anaerobic conditions. Bacillus cereus cells grown in aerobic conditions were less resistant to heat and acid than Bacillus cereus cells that grew anaerobically or microaerobically [26]. Bacillus cereus’ mesophilic strains have shown to have higher acid resistance than psychotropic strains [25].
Spores are more resistant to dry heat than humid heat, with heat resistance usually higher in foods with lower water activity. Spores are also more resistant to radiation than vegetative cells [22]. Nisin is a preservative that used to inhibit germination and spore growth. Antimicrobials that inhibit the growth of Bacillus cereus include benzoic, sorbic, and ethylenediaminetetraacetic acids [22].
Symptoms of Bacillus cereus disease cause two types of foodborne illness, namely emetic syndrome (vomiting) and diarrhea. Vomiting syndrome is poisoning caused by the ingestion of a cyclic peptide toxin called cereulide that has been pre-formed in food during growth by Bacillus cereus. This syndrome has a short incubation period and recovery time. Symptoms of nausea, vomiting, and stomach cramps occur within 1–5 h after ingestion, with recovery usually within 6–24 h [27].
The diarrheal syndrome caused by enterotoxins produced by Bacillus cereus in the host body, the incubation period before the onset of the disease is 8–16 h, and infection usually lasts 12–14 h. However, it can continue for several days. Symptoms are generally mild, with stomach cramps, watery diarrhea, and nausea [28]. In a small number of cases, both toxins produced, and vomiting and diarrhea develop [17].
No form of the disease is considered life-threatening for normal healthy individuals, with few fatal cases reported [22]. Bacillus cereus has been associated with the non-food-related illness, although this is rare. These bacteria have been found in postoperative and traumatic wounds and can cause opportunistic infections, especially in individuals with immune system disorders, such as septicemia, meningitis, and pneumonia. Bacillus cereus has also known to occasionally cause localized eye infections in humans [29].
The pathogenic mechanisms for Bacillus cereus emetic disease are well known. Emetic toxins (cereulide) cause vacuole formation in HEp-2 cells in the laboratory [29]. Cereulide in experimental animals caused vomiting, potentially by binding to 5-HT3 receptors in the stomach/small intestine to stimulate the vagus nerve and brain [30]. Cereulide produced by the Non-Ribosomal Peptide Synthetase Complex (NRPS) [31]. All NRPS clusters have characterized [23], resulting in a precise method for detecting cereulide-producing Bacillus cereus strains [32]. Emetic toxin production has shown to occur in skim milk in the temperature range of 12–37°C, with more toxins produced at 12 and 15°C than at higher temperatures [33]. Emetic toxins are highly resistant to environmental factors, exhibiting stability from a pH of 2–11 and heating to 100°C for 150 min (pH 8.7–10.6) [22].
Three types of enterotoxins are associated with a form of diarrhea syndrome, namely three components of the enterotoxin Hemolysin BL (HBL), three parts of Non-Hemolytic Enterotoxin (NHE) and one element of cytotoxin K. Enterotoxins are released into the small intestine by the surviving vegetative cells of Bacillus cereus [34]. Diarrheal enterotoxins are stable at pH 4–11 and deactivated by heating to 56°C for 5 min [22].
Up to 26% of the vegetative cells of Bacillus cereus can survive as they travel through the stomach. Diarrheal enterotoxins are unstable at low pH in the stomach and degraded by digestive enzymes. Any previously formed enterotoxins in food are destroyed during passage through the stomach so that they do not cause disease if ingested [22]. In contrast, Bacillus cereus spores can pass unaffected by the gastric barrier. Spores need to be triggered by nutrients and intestinal epithelial cells to initiate germination. In the small intestine, spores germinate, grow and produce enterotoxins [35].
A vital virulence factor required to cause diarrhea symptoms is the ability of vegetative cells and Bacillus cereus spores to adhere to the small intestine’s epithelial cell walls. Spore and cell adhesion efficiency show to be low, around 1% [35]. Enterotoxins’ ability to damage tissue and damage the plasma membrane of small intestinal epithelial cells plays a role in causing diarrhea [27].
2.2 Mode of transmission Bacillus cereus food poisoning
The pattern of transmission Bacillus cereus food poisoning can be caused by ingesting large numbers of bacterial cells and spores in contaminated food (diarrhea type) or by ingesting food contaminated with pre-formed toxins (emetic type). Transmission of this disease caused by the consumption of contaminated food, improper handling/storage of food, and inadequate cooling of cooked food [36].
2.3 Case contamination and precautions for Bacillus cereus in rice
Cases of contamination of Staphylococcus aureus on rice, either in the form of raw rice or cooked rice and other processed rice products, are found in several countries. Further explanations can see in Table 1.
Year
Food
Country
Findings
Article title
2009
Brown rice and glutinous rice
Korea
15 (37%) of 83 samples of brown rice, 23 (37%) of 63 samples of glutinous rice
Prevalence, Genetic diversity, and Antibiotic Susceptibility of Bacillus cereus Strains Isolated from Rice and Cereals Collected in Korea [2]
2009
Raw rice
Amerika
Bacillus species spores found in 94 (52.8%) rice samples with an average concentration of 32.6 CFU/g
Detection of Toxigenic Bacillus cereus and Bacillus thuringiensis in US Rice [3]
2012
Cooked rice (white rice, fried rice)
Belgia
The concentration of cereulide found in rice dishes is around four ng/g
Prevalence and Levels of Bacillus cereus Emetic Toxin in Rice Dishes Randomly Collected from Restaurants and Comparison with the Levels Measured in a Recent Foodborne Outbreak [4]
2012
Cooked and raw rice
Pakistan
All rice samples showed the presence of Bacillus cereus, the highest number: 3.34 × 101 CFU/ml
Microbial Assessment of Uncooked and Cooked Rice Samples Available in Local Markets of Lahore [5]
2013
Baby food (made from rice)
Iran
Bacillus cereus and its enterotoxigenic genes have found in infant diets in Iran
Bacillus cereus in Infant Foods: Prevalence Study and Distribution of Enterotoxigenic Virulence Factors in Isfahan Province, Iran [6]
2018
Local unhulled (coarse) rice
Malaysia
The number of Bacillus cereus bacteria in all samples found to be more than 1100 MPN/g
Presence of Bacillus cereus from Local Unhusked (Rough) Rice Samples in Sarawak, Malaysia [7]
2019
Cooked rice (yellow rice)
Indonesia
21% of yellow rice contaminated with Bacillus cereus
Staphylococcus aureus and Bacillus cereus in Yellow Rice [8]
2020
Rice/noodles
China
59 out of 119 rice/noodle samples (50%) were positive for Bacillus cereus
A Study on Prevalence and Characterization of Bacillus cereus in Ready-to-Eat Foods in China [9]
Table 1.
Cases of Bacillus cereus contamination in rice (rice-based food).
Precautions for contamination of Bacillus cereus in rice:
Processing (thoroughly cooked and quickly cooled) is one of the easiest ways to prevent foodborne illness associated with Bacillus spp. [37].
Hot foods should store at 140°F/60°C or higher [37].
Reheating cooked food should be stored at 165°F/74°C [37].
If frozen food is allowed to thaw, it must remain at 41°F/5°C or lower [37].
Steaming under pressure, roasting, frying, and grilling foods will destroy the vegetative cells and spores if temperatures within foods are ≥ 145ºF/63ºC [38].
Foods that contain emetic toxins need to be heated to 259°F/126°C for more than 90 min—reheating food until steaming is not sufficient to kill emetic toxins [38].
3. Pathogenic Staphylococcus aureus transmitted through rice
3.1 Characteristics and diseases caused by Staphylococcus aureus
Staphylococcus aureus is one of the bacteria that cause food poisoning. Staphylococcus aureus is commonly found in the environment (soil, water, and air) and located on humans’ nose and skin. Staphylococcus aureus is a spherical, Gram-positive, non-spore bacteria. The genus Staphylococcus divided into 32 species and subspecies. Staphylococcus aureus causes food poisoning by producing Staphylococcal Enterotoxin (SE) [39, 40].
Staphylococcus aureus’s growth and survival depend on several environmental factors such as temperature, water activity (aw), pH, presence of oxygen, and food composition. These physical growth parameters varied for different strains of Staphylococcus aureus [41]. The temperature range for Staphylococcus aureus growth is 7–48°C, with an optimum temperature of 37°C. Staphylococcus aureus is resistant to freezing and does well in foods stored below −20°C; however, viability is reduced at −10 to 0°C. Staphylococcus aureus easily killed during pasteurization or cooking. Staphylococcus aureus growth occurs in the pH range 4.0–10.0, with an optimum of 6–7 [41].
Staphylococcus aureus is a facultative anaerobe so it can grow in both aerobic and anaerobic conditions. However, growth occurs at a much slower rate under anaerobic conditions [41]. For non-sporing mesophilic bacteria, Staphylococcus aureus has relatively high heat resistance [41]. A highly heat resistant Staphylococcus aureus strain (D-value at 60°C > 15 min in broth) has identified from foodborne outbreaks in India [42].
Several chemical preservatives, including sorbate and benzoate, inhibit the growth of Staphylococcus aureus. The effectiveness of this preservative increases as the pH decreases. Methyl and propyl parabens are also useful [41, 43].
Symptoms of staphylococcal food poisoning generally have a rapid onset, appearing approximately 3 h after ingestion (range 1–6 h). Common symptoms include nausea, vomiting, stomach cramps, and diarrhea. The individual may not show all the signs associated with the disease. In severe cases, headaches, muscle cramps, and temporary changes in blood pressure and pulse may occur. Recovery is usually between 1 and 3 days [39, 41]. Death is rare (0.03% for the general population) but occasionally reported in children and the elderly (death rate 4.4%) [40]. Staphylococcus aureus can cause various health problems not related to food such as skin inflammation (e.g., ulcers and style), mastitis, respiratory tract infections, wound sepsis, and toxic shock syndrome [40, 41].
Staphylococcal food poisoning caused by the ingestion of foods containing pre-formed SE [44], there are several types of SE; enterotoxin A is most commonly associated with staphylococcal food poisoning. Enterotoxins D, E, and H, and to a lesser extent B, G, and I have also associated with staphylococcal food poisoning [45, 46].
SE produced during the exponential phase of Staphylococcus aureus growth in a strain-dependent quantity. Typically, the disease-inducing dose of SE occurs when at least 105–108 CFU/g of Staphylococcus aureus are present [45, 40]. Most of the genes for SE located in plasmid or prophage elements. Thus, transfer between strains can occur, modifying the ability of Staphylococcus aureus strains to cause disease and contributing to pathogen evolution [44, 46].
As the temperature decreases, the SE production rate also decreases. However, SE remained stable under frozen storage. SE is highly resistant to heating and can withstand the processes used to sterilize low-acid canned foods. SE production can occur in the pH range 4.5–9.6, with an optimum of 7–8. SE production can occur in anaerobic and aerobic environments; however, toxin production is optimal under aerobic conditions [41].
3.2 Mode of transmission. Staphylococcus aureus food poisoning
Staphylococcal food poisoning occurs when the food consumed contains SE produced by Staphylococcus aureus. Food handlers carrying enterotoxin-producing Staphylococcus aureus in their nose or hands are considered a significant source of food contamination through direct contact or respiratory secretions [44].
It estimated that in the US, Staphylococcus aureus accounts for 2.6% of foodborne diseases caused by 31 significant pathogens [47]. The incidence of staphylococcal food poisoning is seasonal. Most cases occur in late summer when temperatures are warm, and food is stored incorrectly [40].
Foods associated with the staphylococcal food poisoning outbreak include meat and meat products, poultry and egg products, milk and dairy products, salads, cream sandwich products, and sandwich stuffing. Foods that require extensive handling during preparation and stored above refrigeration temperature (4°C) for a long time after development frequently implicated in staphylococcal food poisoning [39]. Foods high in starch (such as rice) and protein believed to support SE production [41].
3.3 Case contamination and precautions for Staphylococcus aureus in rice
Cases of contamination of Staphylococcus aureus on rice, either in the form of raw rice or cooked rice and other processed rice products, are found in several countries in the world. Further explanation can see in Table 2.
Year
Food
Country
Findings
Article title
2001
Rames rice
Indonesia
The number of Staphylococcus aureus in the rice sample: 3.21 Log CFU/g
Study of Microbiological Safety of Snack Food at the FATETA-IPB Canteen, Bogor [10]
2003
Rice at the restaurant
Brazil
Rice containing Staphylococcus aureus: 100 CFU/g
An outbreak of staphylococcal food poisoning in the Municipality of Passos, MG, Brazil [11]
2004
Rice cake
Korea
19.3% of rice cakes were contaminated with Staphylococcus aureus
Occurrence of Toxigenic Staphylococcus aureus in Ready-to-Eat Food in Korea [12]
2010
Uduk rice
Indonesia
The frequency of isolation of coagulase-positive Staphylococcus aureus in uduk rice samples was 6.67%, and not all were found in sufficient amounts to form enterotoxins.
Risks of Staphylococcus aureus in Traditional Ready-to-Eat Food and Evaluation of Its Presence in uduk Rice [13]
2014
Kerala matta rice
India
Kerala matta rice samples contained coagulase-positive Staphylococcus aureus.
7% of yellow rice contaminated with Staphylococcus aureus
Staphylococcus aureus and Bacillus cereus in yellow rice [8]
2019
Jollof rice
Nigeria
Staphylococcus aureus found in jollof rice samples at the campus cafeteria.
Identification and anti-bacterial Testing of Staphylococcus aureus Isolated from Jollof Rice sold at selected Cafeterias in Federal University [15]
Table 2.
Cases of Staphylococcus aureus contamination in rice (rice-based food).
Precautions for contamination of Staphylococcus aureus in rice:
The permissive temperature for growth and toxin production by Staphylococcus aureus is between 6 and 46°C. Thus, the ideal cooking and cooling temperatures should be above 60°C and below 5°C, respectively, is below the recommended temperature [48].
Serving food quickly when stored at room temperature, wearing gloves, masks, hairpins during food handling and processing, washing hands frequently, maintaining personal hygiene for food handlers can help prevent Staphylococcus aureus contamination [49].
Other precautions such as raw material control, proper handling and processing, adequate cleaning, and disinfection of equipment used in food processing and preparation must take [50].
Environmental factors that can play an essential role in the proliferation of bacteria and the production of Staphylococcus aureus enterotoxins are the storage of rice at room temperature for an extended period between preparation and consumption [14].
4. Conclusions
It knows that pathogens transmitted through contaminated rice can cause food poisoning, which occurs due to consuming rice containing pathogenic bacteria. Several cases of contamination of Bacillus cereus and Staphylococcus aureus in rice occurred in Indonesia, Pakistan, India, Malaysia, Belgium, America, Australia, Korea, Iran, China, Nigeria. In general, prevention by proper handling of raw materials, controlling the temperature of cooking and storing rice, and personal hygiene of food handlers.
Acknowledgments
Thanks go to students and lecturers of the Medical Laboratory Technology Poltekkes Kemenkes Banjarmasin, Indonesia who have supported the writing of this manuscript and to all parties who did not directly play a role in the writing process.
Conflict of interest
The authors declare no conflict of interest.
Acronyms and abbreviations
HBL
hemolysin BL
NHE
non-hemolytic enterotoxin
SE
staphylococcal enterotoxin
\n',keywords:"rice, pathogens transmitted, food poisoning, Bacillus cereus, Staphylococcus aureus",chapterPDFUrl:"https://cdn.intechopen.com/pdfs/73865.pdf",chapterXML:"https://mts.intechopen.com/source/xml/73865.xml",downloadPdfUrl:"/chapter/pdf-download/73865",previewPdfUrl:"/chapter/pdf-preview/73865",totalDownloads:121,totalViews:0,totalCrossrefCites:0,dateSubmitted:"May 30th 2020",dateReviewed:"August 27th 2020",datePrePublished:"November 2nd 2020",datePublished:null,dateFinished:"November 2nd 2020",readingETA:"0",abstract:"Rice can be a source of food poisoning because it can be contaminated with dangerous pathogens. Pathogens that often transmitted through rice are Bacillus cereus and Staphylococcus aureus. This chapter aims to explain the dangers of pathogens transmitted through contaminated rice, modes of transmission, contamination cases, and precautions. The method used in writing is to review articles. It is known that pathogens transmitted through contaminated rice can cause food poisoning, which occurs due to consuming rice containing pathogenic bacteria. Several cases of contamination of Bacillus cereus and Staphylococcus aureus in rice occurred in Indonesia, Pakistan, India, Malaysia, Belgium, America, Australia, Korea, Iran, China, and Nigeria. In general, prevention is by proper handling of raw materials, controlling the temperature of cooking and storing rice, and personal hygiene of food handlers.",reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/73865",risUrl:"/chapter/ris/73865",signatures:"Leka Lutpiatina",book:{id:"9669",title:"Recent Advances in Rice Research",subtitle:null,fullTitle:"Recent Advances in Rice Research",slug:null,publishedDate:null,bookSignature:"Dr. Mahmood-Ur- Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9669.jpg",licenceType:"CC BY 3.0",editedByType:null,editors:[{id:"185476",title:"Dr.",name:"Mahmood-Ur-",middleName:null,surname:"Rahman Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-Ur- Rahman Ansari"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:null,sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_2",title:"2. Pathogenic Bacillus cereus transmitted through rice",level:"1"},{id:"sec_2_2",title:"2.1 Characteristics and diseases caused by Bacillus cereus",level:"2"},{id:"sec_3_2",title:"2.2 Mode of transmission Bacillus cereus food poisoning",level:"2"},{id:"sec_4_2",title:"2.3 Case contamination and precautions for Bacillus cereus in rice",level:"2"},{id:"sec_6",title:"3. Pathogenic Staphylococcus aureus transmitted through rice",level:"1"},{id:"sec_6_2",title:"3.1 Characteristics and diseases caused by Staphylococcus aureus",level:"2"},{id:"sec_7_2",title:"3.2 Mode of transmission. Staphylococcus aureus food poisoning",level:"2"},{id:"sec_8_2",title:"3.3 Case contamination and precautions for Staphylococcus aureus in rice",level:"2"},{id:"sec_10",title:"4. Conclusions",level:"1"},{id:"sec_11",title:"Acknowledgments",level:"1"},{id:"sec_14",title:"Conflict of interest",level:"1"},{id:"sec_11",title:"Acronyms and abbreviations",level:"1"}],chapterReferences:[{id:"B1",body:'Bardale R. Principles of Forensic Medicine & Toxicology. 2nd ed. New Delhi-110002: Jaypee Brothers Medical Publishers Ltd; 2017. p. 606'},{id:"B2",body:'Park Y-B, Kim J-B, Shin S-W, Kim J-C, Cho S-H, Lee B-K, et al. Prevalence, genetic diversity, and antibiotic susceptibility of Bacillus cereus strains Isolated from rice and cereals collected in Korea. Journal of Food Protection. 2009;72(3):612-617. DOI: 10.4315/0362-028x-72.3.612'},{id:"B3",body:'Ankolekar C, Rahmati T, Lebbe RG. Detection of toxigenic Bacillus cereus and Bacillus thuringiensis in US rice. International Journal of Food Microbiology. 2009;128:460-466'},{id:"B4",body:'Delbrassinne L, Andjelkovic M, Dierick K, Denayer S, Mahillon J, Van Loco J. Prevalence and levels of Bacillus cereus emetic toxin in rice dishes randomly collected from restaurants and comparison with the levels measured in a recent foodborne outbreak. Foodborne Pathogens and Disease. 2012;9(9):809-814'},{id:"B5",body:'Tahir A, Hameed I, Aftab M, Mateen A. Microbial assessment of uncooked and cooked rice samples available in local markets of Lahore. Pakistan Journal of Botany. 2012;44:267-270'},{id:"B6",body:'Rahimi E, Abdos F, Momtaz H, Torki Baghbadorani Z, Jalali M. Bacillus cereus in infant foods: Prevalence study and distribution of enterotoxigenic virulence factors in Isfahan Province, Iran. The Scientific World Journal. 2013;2013:1-6'},{id:"B7",body:'Bilung LM, Tesfamariam F, Andriesse R, San FYK, Ling CY, Tahar AS. Presence of Bacillus cereus from local Unhusked (rough) rice samples in Sarawak, Malaysia. Journal of Sustainability Science and Management. 2018;13(1):181-187'},{id:"B8",body:'Leka L, Nudia K, Dewi DR, Wahdah N. Staphylococcus aureus and Bacillus cereus in yellow rice. Indian Journal of Public Health Research & Development. 2019;10(8):2104-2108. DOI: 10.5958/0976-5506.2019.02166.1'},{id:"B9",body:'Yu S, Yu P, Wang J, et al. A study on prevalence and characterization of Bacillus cereus in ready-to-eat foods in China. Frontiers in Microbiology. 2020;10:1-11. DOI: 10.3389/fmicb.2019.03043'},{id:"B10",body:'Hartini PB. Study of microbiological safety of snack food at the FATETA-IPB Canteen, Bogor [thesis]. Bogor: Institut Pertanian Bogor; 2001'},{id:"B11",body:'do Carmo LS, Dias RS, Linardi VR, de Sena MJ, dos Santos DA. An outbreak of staphylococcal food poisoning in the municipality of Passos, MG, Brazil. Brazilian Archives of Biology and Technology. 2003;46(4):581-586. DOI: 10.1590/S1516-89132003000400012'},{id:"B12",body:'Su Kyung O, Lee N, Cho YS, Shin D-B, Choi SY, Koo M. Occurrence of toxigenic Staphylococcus aureus in ready-to-eat food in Korea. Journal of Food Protection. 2007;70(5):1153-1158. DOI: 10.4315/0362-028X-70.5.1153'},{id:"B13",body:'Erza Apriyadi T. Risks of Staphylococcus aureus in traditional ready-to-eat food and evaluation of its presence in uduk rice [thesis]. Bogor: Fakultas Teknologi Pertanian Institut Pertanian Bogor; 2010'},{id:"B14",body:'Basavegowda M, Rajegowda RM, Bettappa P, Shivanna UR, Channabasappa AN, Vijaykumar GS. Outbreak of staphylococcal food poisoning. International Journal of Medicine and Public Health. 2014;4(3):257-259'},{id:"B15",body:'Radji M, Adeleye A, Amoo A, Barde G, Mohammed S. Identification and anti-bacterial testing of Staphylococcus aureus isolated from jollof rice sold at selected cafeterias in Federal University. UJMR. 2019;4(1):104-109'},{id:"B16",body:'FDA. Analysis of microbial hazards related to time/temperature control of foods for safety. Comprehensive Reviews in Food Science and Food Safety. 2003;2:33-41. DOI: 10.1111/j.1541-4337.2003.tb00049.x'},{id:"B17",body:'Montville TJ, Matthews KR. Food Microbiology: An Introduction. Washington D.C: ASM Press; 2005'},{id:"B18",body:'Ray B. Fundamental Food Microbiology Second Edition. Boca Raton/London/New York, Washington D.C: CRC Press; 2001'},{id:"B19",body:'Parashnath M, Indranil C, Food Poisoning: Illness ranges from relatively mild through to life threatening. Journal of Medical and Health Sciences. 2016;5(4):1-19'},{id:"B20",body:'Rajkowski KT, Bennett RW. Bacillus cereus. Ch 3. In: Miliotis MD, Bier JW, editors. International Handbook of Foodborne Pathogens. New York: Marcel Dekker; 2003. pp. 27-39'},{id:"B21",body:'Vilain S, Luo Y, Hildreth M, Brözel V. Analysis of the life cycle of the soil saprophyte Bacillus cereus in liquid soil extract and in soil. Applied and Environmental Microbiology. 2006;72:4970-4977'},{id:"B22",body:'Jenson I, Moir CJ. Bacillus cereus and other Bacillus species. Ch 14. In: Hocking AD, editor. Foodborne Microorganisms of Public Health Significance. 6th ed. Sydney: Australian Institute of Food Science and Technology (NSW Branch); 2003. pp. 445-478'},{id:"B23",body:'Ehling-Schulz M, Guinebretière M, Monthan A, Berge O, Fricker M, Svensson B. Toxin gene profiling of enterotoxic and emetic Bacillus cereus. FEMS Microbiology Letters. 2006;260(2):232-240'},{id:"B24",body:'Wijnands LM, Dufrenne JB, Zwietering MH, van Leusden FM. Spores from mesophilic Bacillus cereus strains germinate better and grow faster in simulated gastrointestinal conditions than spores from psychrotrophic strains. International Journal of Food Microbiology. 2006a;112(2):120-128'},{id:"B25",body:'Wijnands LM, Dufrenne JB, Rombouts FM, in ‘t Veld PH, van Leusden FM. Prevalence of potentially pathogenic Bacillus cereus in food commodities in the Netherlands. Journal of Food Protection. 2006;69(11):2587-2594'},{id:"B26",body:'Mols M, Pier I, Zwietering MH,Abee TJ. The impact of oxygen availability on stress survival and radical formation of Bacillus cereus. International Journal of Food Microbiology. 2009;135(3):303-311'},{id:"B27",body:'Senesi S, Ghelardi E. Production, secretion and biological activity of Bacillus cereus enterotoxins. Toxins. 2010;2:1690-1703'},{id:"B28",body:'Granum PE. Bacillus cereus. Ch 20. In: Doyle MP, Beuchat LR, editors. Food Microbiology: Fundamentals and Frontiers. 3rd ed. Washington D.C: ASM Press; 2007. pp. 445-455'},{id:"B29",body:'Schoeni JL, Wong ACL. Bacillus cereus food poisoning and its toxins. Journal of Food Protection. 2005;68(3):636-648'},{id:"B30",body:'Agata N, Ohta M, Mori M, Isobe M. A novel dodecadepsipeptide, cereulide, is an emetic toxin of Bacillus cereus. FEMS Microbiology Letters. 1995;129:17-20'},{id:"B31",body:'Horwood PF, Burgess GW, Oakey HJ. Evidence for non-ribosomal peptide synthetase production of cereulide (the emetic toxin) in Bacillus cereus. FEMS Microbiology Letters. 2004;236(2):319-324'},{id:"B32",body:'Fricker M, Misselhausser U, Busch U, Scheres S, Ehling-Schulz M. Diagostic real time PCR assays for the detection of emetic food-borne Bacillus cereus in foods and recent food-borne outbeaks. Applied and Environmental Microbiology. 2007;73:1892-1898'},{id:"B33",body:'Finlay WJJ, Logan NA, Sutherland AD. Bacillus cereus produces most emetic toxin at lower temperatures. Letters in Applied Microbiology. 2000;31:385-389'},{id:"B34",body:'Wijnands LM, Pielaat A, Dufrenne JB, Zwietering MH, van Leusden FM. Modelling the number of viable vegetative cells of Bacillus cereus passing through the stomach. Journal of Applied Microbiology. 2009;106:258-267'},{id:"B35",body:'Wijnands LM. Bacillus cereus associated food borne disease: Quantitative aspects of exposure assessment and hazard characterization [thesis]. The Netherlands: Wageningen University; 2008'},{id:"B36",body:'Schneider KR, Parish ME, Goodrich RM, Cookingham T. Preventing Foodborne Illness: Bacillus cereus and Bacillus anthracis. Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida: 2004. pp. 1-5'},{id:"B37",body:'Nazrul Islam M. Fried Rice syndrome, a disease of fast world: Scientific analysis. American Journal of Biomedical Science & Research. 2019;5(6):512-514. DOI: 10.34297/AJBSR.2019.05.000979'},{id:"B38",body:'Keith RS, Renée GS, Rachael S, Ploy K, Bruna B. Preventing Foodborne Illness: Bacillus cereus. Florida Cooperative Extension Service. University of Florida: Institute of Food and Agricultural Sciences; 2015. pp. 1-5'},{id:"B39",body:'FDA. Bad Bug Book: Foodborne Pathogenic Microorganisms and Natural Toxins Handbook. 2nd ed. Silver Spring: US Food and Drug Administration; 2012. pp. 87-92'},{id:"B40",body:'Montville TJ, Matthews KR. Food Microbiology: An Introduction. 2nd ed. Washington D.C: ASM Press; 2008'},{id:"B41",body:'Stewart CM. Staphylococcus aureus and staphylococcal enterotoxins. Ch 12. In: Hocking AD, editor. Foodborne Microorganisms of Public Health Significance. 6th ed. Sydney: Australian Institute of Food Science and Technology (NSW Branch); 2003. pp. 359-380'},{id:"B42",body:'Nema V, Agrawal R, Kamboj DV, Goel AK, Singh L. Isolation and characterization of heat resistant entertoxigenic Staphylococcus aureus from a food poisoning outbreak in Indian subcontinent. International Journal of Food Microbiology. 2007;117:29-35'},{id:"B43",body:'Davidson PM, Taylor TM. Chemical preservatives and natural antimicrobial compounds. Ch 33. In: Doyle MP, Beuchat LR, editors. Food Microbiology: Fundamentals and Frontiers. 3rd ed. Washington D.C: ASM Press; 2007. pp. 713-745'},{id:"B44",body:'Argudin MA, Mendoza MC, Rodicio MR. Food poisoning and Staphylococcus aureus enterotoxins. Toxins. 2010;2(7):1751-1773'},{id:"B45",body:'Seo KS, Bohach GA. Staphylococcus aureus. Ch 22. In: Doyle MP, Beuchat LR, editors. Food Microbiology: Fundamentals and Frontiers. 3rd ed. Washington D.C: ASM Press; 2007. pp. 493-518'},{id:"B46",body:'Pinchuk IV, Beswick EJ, Reyes VE. Staphylococcal enterotoxins. Toxins. 2010;2:2177-2197'},{id:"B47",body:'Scallan E, Hoekstra RM, Angulo FJ, Tauxe RV, Widdowson M, Roy SL, et al. Foodborne illness acquired in the United States—Major pathogens. Emerging Infectious Diseases. 2011;17(1):7-11'},{id:"B48",body:'James SJ, Evans J, James C. A review of the performance of domestic refrigerators. Journal of Food Engineering. 2008;87(1):2-10'},{id:"B49",body:'Aycicek H, Cakiroglu S, Stevenson TH. Incidence of Staphylococcus aureus in ready-to-eat meals from military cafeterias in Ankara, Turkey. Food Control. 2005;16(6):531-534'},{id:"B50",body:'Hennekinne J-A, de Buyser M-L, Dragacci S. Staphylococcus aureus and its food poisoning toxins: Characterization and outbreak investigation. FEMS Microbiology Reviews. 2012;36:815-836'}],footnotes:[],contributors:[{corresp:"yes",contributorFullName:"Leka Lutpiatina",address:"leka.zns@gmail.com",affiliation:'
Medical Laboratory Technology, Poltekkes Kemenkes Banjarmasin, Indonesia
'}],corrections:null},book:{id:"9669",title:"Recent Advances in Rice Research",subtitle:null,fullTitle:"Recent Advances in Rice Research",slug:null,publishedDate:null,bookSignature:"Dr. Mahmood-Ur- Rahman Ansari",coverURL:"https://cdn.intechopen.com/books/images_new/9669.jpg",licenceType:"CC BY 3.0",editedByType:null,editors:[{id:"185476",title:"Dr.",name:"Mahmood-Ur-",middleName:null,surname:"Rahman Ansari",slug:"mahmood-ur-rahman-ansari",fullName:"Mahmood-Ur- Rahman Ansari"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},profile:{item:{id:"299654",title:"Dr.",name:"Lamine",middleName:null,surname:"Koivogui",email:"koivogui@biasy.net",fullName:"Lamine Koivogui",slug:"lamine-koivogui",position:null,biography:null,institutionString:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",totalCites:0,totalChapterViews:"0",outsideEditionCount:0,totalAuthoredChapters:"1",totalEditedBooks:"0",personalWebsiteURL:null,twitterURL:null,linkedinURL:null,institution:null},booksEdited:[],chaptersAuthored:[{title:"Molecular Diagnostics of Ebola Patient Samples by Institut Pasteur de Dakar Mobile Laboratory in Guinea 2014–2016",slug:"molecular-diagnostics-of-ebola-patient-samples-by-institut-pasteur-de-dakar-mobile-laboratory-in-gui",abstract:"As part of the laboratory response to the Ebola virus outbreak in Guinea, the Institut Pasteur de Dakar mobile laboratory (IPD-ML) was set up in Donka hospital from 2014 to 2016. EBOV suspected samples collected at Ebola Treatment Centers (ETC) and from community deaths were sent daily to IPD-ML. Analysis was performed using dried oligonucleotide mixes for real-time RT-PCR designed for field diagnostic. From March 2014 to May 2015, a total of 6055 patient samples suspected for EBOV collected from seven regions of Guinea were tested by real-time RT-PCR. These patients’ clinical included serum samples (n = 2537 samples) and swabs (n = 3518 samples) with positivity rates of 36.74 and 6.88% respectively. Females were significantly more affected than males with positivity rates of 22.39 and 17.22% respectively (p-value = 5.721e-7). All age groups were exposed to the virus with significant difference (p-value <= 2.2e-16). The IPD-ML contributed significantly to the surveillance and patient management during the EBOV outbreak in Guinea. Furthermore, dried reagents adapted for field diagnostic of EVD suspect cases could be useful for future outbreak preparedness and response.",signatures:"Oumar Faye, Cheikh Tidiane Diagne, Amadou Diallo, Emily Meyer, Barre Soropogui, Gamou Fall, Cheikh Fall, N’Faly Magassouba, Lamine Koivogui, Sakoba Keita, Cheikh Loucoubar, Mamadou Diop, Manfred Weidmann, Ousmane Faye and Amadou Alpha Sall",authors:[{id:"299647",title:"Dr.",name:"Manfred",surname:"Weidmann",fullName:"Manfred Weidmann",slug:"manfred-weidmann",email:"m.w.weidmann@stir.ac.uk"},{id:"299648",title:"Dr.",name:"Oumar",surname:"Faye",fullName:"Oumar Faye",slug:"oumar-faye",email:"Oumar.Faye@pasteur.sn"},{id:"299650",title:"Dr.",name:"Cheikh Tidiane",surname:"Diagne",fullName:"Cheikh Tidiane Diagne",slug:"cheikh-tidiane-diagne",email:"CheikhTidiane.DIAGNE@pasteur.sn"},{id:"299651",title:"Dr.",name:"Barre",surname:"Soropogui",fullName:"Barre Soropogui",slug:"barre-soropogui",email:"barresoropogui@gmail.com"},{id:"299652",title:"Dr.",name:"Gamou",surname:"Fall",fullName:"Gamou Fall",slug:"gamou-fall",email:"gamou.fall@pasteur.sn"},{id:"299653",title:"Dr.",name:"N",surname:"Magassouba",fullName:"N Magassouba",slug:"n-magassouba",email:"nmagassouba01@yahoo.fr"},{id:"299654",title:"Dr.",name:"Lamine",surname:"Koivogui",fullName:"Lamine Koivogui",slug:"lamine-koivogui",email:"koivogui@biasy.net"},{id:"299679",title:"Dr.",name:"Amadou",surname:"Diallo",fullName:"Amadou Diallo",slug:"amadou-diallo",email:"Amadou.DIALLO@pasteur.sn"},{id:"299682",title:"Dr.",name:"Sakoba",surname:"Keita",fullName:"Sakoba Keita",slug:"sakoba-keita",email:"keita_sakoba@yahoo.fr"},{id:"299683",title:"Dr.",name:"Cheikh",surname:"Loucoubar",fullName:"Cheikh Loucoubar",slug:"cheikh-loucoubar",email:"Cheikh.LOUCOUBAR@pasteur.sn"},{id:"299685",title:"Dr.",name:"Mamadou",surname:"Diop",fullName:"Mamadou Diop",slug:"mamadou-diop",email:"Mamadou.Diop@pasteur.sn"},{id:"299686",title:"Dr.",name:"Amadou Alpha",surname:"Sall",fullName:"Amadou Alpha Sall",slug:"amadou-alpha-sall",email:"Amadou.SALL@pasteur.sn"},{id:"299688",title:"Dr.",name:"Ousmane",surname:"Faye",fullName:"Ousmane Faye",slug:"ousmane-faye",email:"Ousmane.FAYE@pasteur.sn"},{id:"308657",title:"Dr.",name:"Emily",surname:"Meyer",fullName:"Emily Meyer",slug:"emily-meyer",email:"emily.meyer@mercator-fellows.org"},{id:"308658",title:"Dr.",name:"Cheikh",surname:"Fall",fullName:"Cheikh Fall",slug:"cheikh-fall",email:"Cheikh.Fall@pasteur.sn"}],book:{title:"Emerging Challenges in Filovirus Infections",slug:"emerging-challenges-in-filovirus-infections",productType:{id:"1",title:"Edited Volume"}}}],collaborators:[{id:"297044",title:"Prof.",name:"Ilkka",surname:"Julkunen",slug:"ilkka-julkunen",fullName:"Ilkka Julkunen",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"297045",title:"Dr.",name:"Laura",surname:"Kakkola",slug:"laura-kakkola",fullName:"Laura Kakkola",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"297046",title:"Dr.",name:"Felix B.",surname:"He",slug:"felix-b.-he",fullName:"Felix B. He",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"297047",title:"Dr.",name:"Krister",surname:"Melen",slug:"krister-melen",fullName:"Krister Melen",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"299647",title:"Dr.",name:"Manfred",surname:"Weidmann",slug:"manfred-weidmann",fullName:"Manfred Weidmann",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"299648",title:"Dr.",name:"Oumar",surname:"Faye",slug:"oumar-faye",fullName:"Oumar Faye",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"299650",title:"Dr.",name:"Cheikh Tidiane",surname:"Diagne",slug:"cheikh-tidiane-diagne",fullName:"Cheikh Tidiane Diagne",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"299651",title:"Dr.",name:"Barre",surname:"Soropogui",slug:"barre-soropogui",fullName:"Barre Soropogui",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"299652",title:"Dr.",name:"Gamou",surname:"Fall",slug:"gamou-fall",fullName:"Gamou Fall",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"299653",title:"Dr.",name:"N",surname:"Magassouba",slug:"n-magassouba",fullName:"N Magassouba",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null}]},generic:{page:{slug:"open-access-funding-funders-list",title:"List of Funders by Country",intro:"
If your research is financed through any of the below-mentioned funders, please consult their Open Access policies or grant ‘terms and conditions’ to explore ways to cover your publication costs (also accessible by clicking on the link in their title).
\n\n
IMPORTANT: You must be a member or grantee of the listed funders in order to apply for their Open Access publication funds. Do not attempt to contact the funders if this is not the case.
",metaTitle:"List of Funders by Country",metaDescription:"If your research is financed through any of the below-mentioned funders, please consult their Open Access policies or grant ‘terms and conditions’ to explore ways to cover your publication costs (also accessible by clicking on the link in their title).",metaKeywords:null,canonicalURL:"/page/open-access-funding-funders-list",contentRaw:'[{"type":"htmlEditorComponent","content":"
UK Research and Innovation (former Research Councils UK (RCUK) - including AHRC, BBSRC, ESRC, EPSRC, MRC, NERC, STFC.) Processing charges for books/book chapters can be covered through RCUK block grants which are allocated to most universities in the UK, which then handle the OA publication funding requests. It is at the discretion of the university whether it will approve the request.)
UK Research and Innovation (former Research Councils UK (RCUK) - including AHRC, BBSRC, ESRC, EPSRC, MRC, NERC, STFC.) Processing charges for books/book chapters can be covered through RCUK block grants which are allocated to most universities in the UK, which then handle the OA publication funding requests. It is at the discretion of the university whether it will approve the request.)
Wellcome Trust (Funding available only to Wellcome-funded researchers/grantees)
\n
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5766},{group:"region",caption:"Middle and South America",value:2,count:5228},{group:"region",caption:"Africa",value:3,count:1717},{group:"region",caption:"Asia",value:4,count:10370},{group:"region",caption:"Australia and Oceania",value:5,count:897},{group:"region",caption:"Europe",value:6,count:15790}],offset:12,limit:12,total:118192},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{topicId:"23"},books:[{type:"book",id:"10656",title:"Intellectual Property",subtitle:null,isOpenForSubmission:!0,hash:"135df9b403b125a6458eba971faab3f6",slug:null,bookSignature:"Dr. Sakthivel Lakshmana Prabu and Dr. Suriyaprakash TNK",coverURL:"https://cdn.intechopen.com/books/images_new/10656.jpg",editedByType:null,editors:[{id:"91590",title:"Dr.",name:"Sakthivel",surname:"Lakshmana Prabu",slug:"sakthivel-lakshmana-prabu",fullName:"Sakthivel Lakshmana Prabu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10658",title:"Multilingualism",subtitle:null,isOpenForSubmission:!0,hash:"a6bf171e05831c00f8687891ab1b10b5",slug:null,bookSignature:"Prof. Xiaoming Jiang",coverURL:"https://cdn.intechopen.com/books/images_new/10658.jpg",editedByType:null,editors:[{id:"189844",title:"Prof.",name:"Xiaoming",surname:"Jiang",slug:"xiaoming-jiang",fullName:"Xiaoming Jiang"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10660",title:"Heritage - New Paradigm",subtitle:null,isOpenForSubmission:!0,hash:"d0b747909f95bd54d009ed0838c38f84",slug:null,bookSignature:"Prof. Daniela Turcanu-Carutiu",coverURL:"https://cdn.intechopen.com/books/images_new/10660.jpg",editedByType:null,editors:[{id:"176482",title:"Prof.",name:"Daniela",surname:"Turcanu-Carutiu",slug:"daniela-turcanu-carutiu",fullName:"Daniela Turcanu-Carutiu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10662",title:"Pedagogy",subtitle:null,isOpenForSubmission:!0,hash:"c858e1c6fb878d3b895acbacec624576",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10662.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10913",title:"Indigenous Populations",subtitle:null,isOpenForSubmission:!0,hash:"c5e8cd4e3ec004d0479494ca190db4cb",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10913.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10914",title:"Racism",subtitle:null,isOpenForSubmission:!0,hash:"0737383fcc202641f59e4a5df02eb509",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/10914.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:16},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:4},{group:"topic",caption:"Business, Management and Economics",value:7,count:1},{group:"topic",caption:"Chemistry",value:8,count:8},{group:"topic",caption:"Computer and Information Science",value:9,count:6},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:7},{group:"topic",caption:"Engineering",value:11,count:16},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:3},{group:"topic",caption:"Materials Science",value:14,count:5},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:25},{group:"topic",caption:"Neuroscience",value:18,count:1},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:3},{group:"topic",caption:"Physics",value:20,count:3},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Robotics",value:22,count:1},{group:"topic",caption:"Social Sciences",value:23,count:3},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:1}],offset:12,limit:12,total:6},popularBooks:{featuredBooks:[{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8558",title:"Aerodynamics",subtitle:null,isOpenForSubmission:!1,hash:"db7263fc198dfb539073ba0260a7f1aa",slug:"aerodynamics",bookSignature:"Mofid Gorji-Bandpy and Aly-Mousaad Aly",coverURL:"https://cdn.intechopen.com/books/images_new/8558.jpg",editors:[{id:"35542",title:"Prof.",name:"Mofid",middleName:null,surname:"Gorji-Bandpy",slug:"mofid-gorji-bandpy",fullName:"Mofid Gorji-Bandpy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7847",title:"Medical Toxicology",subtitle:null,isOpenForSubmission:!1,hash:"db9b65bea093de17a0855a1b27046247",slug:"medical-toxicology",bookSignature:"Pınar Erkekoglu and Tomohisa Ogawa",coverURL:"https://cdn.intechopen.com/books/images_new/7847.jpg",editors:[{id:"109978",title:"Prof.",name:"Pınar",middleName:null,surname:"Erkekoglu",slug:"pinar-erkekoglu",fullName:"Pınar Erkekoglu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:5238},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editedByType:"Edited by",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editedByType:"Edited by",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editedByType:"Edited by",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editedByType:"Edited by",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8098",title:"Resources of Water",subtitle:null,isOpenForSubmission:!1,hash:"d251652996624d932ef7b8ed62cf7cfc",slug:"resources-of-water",bookSignature:"Prathna Thanjavur Chandrasekaran, Muhammad Salik Javaid, Aftab Sadiq",coverURL:"https://cdn.intechopen.com/books/images_new/8098.jpg",editedByType:"Edited by",editors:[{id:"167917",title:"Dr.",name:"Prathna",middleName:null,surname:"Thanjavur Chandrasekaran",slug:"prathna-thanjavur-chandrasekaran",fullName:"Prathna Thanjavur Chandrasekaran"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editedByType:"Edited by",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editedByType:"Edited by",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editedByType:"Edited by",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8415",title:"Extremophilic Microbes and Metabolites",subtitle:"Diversity, Bioprospecting and Biotechnological Applications",isOpenForSubmission:!1,hash:"93e0321bc93b89ff73730157738f8f97",slug:"extremophilic-microbes-and-metabolites-diversity-bioprospecting-and-biotechnological-applications",bookSignature:"Afef Najjari, Ameur Cherif, Haïtham Sghaier and Hadda Imene Ouzari",coverURL:"https://cdn.intechopen.com/books/images_new/8415.jpg",editedByType:"Edited by",editors:[{id:"196823",title:"Dr.",name:"Afef",middleName:null,surname:"Najjari",slug:"afef-najjari",fullName:"Afef Najjari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9731",title:"Oxidoreductase",subtitle:null,isOpenForSubmission:!1,hash:"852e6f862c85fc3adecdbaf822e64e6e",slug:"oxidoreductase",bookSignature:"Mahmoud Ahmed Mansour",coverURL:"https://cdn.intechopen.com/books/images_new/9731.jpg",editedByType:"Edited by",editors:[{id:"224662",title:"Prof.",name:"Mahmoud Ahmed",middleName:null,surname:"Mansour",slug:"mahmoud-ahmed-mansour",fullName:"Mahmoud Ahmed Mansour"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"610",title:"Numerical Computing",slug:"numerical-computing",parent:{title:"Numerical Analysis and Scientific Computing",slug:"numerical-analysis-and-scientific-computing"},numberOfBooks:14,numberOfAuthorsAndEditors:553,numberOfWosCitations:511,numberOfCrossrefCitations:268,numberOfDimensionsCitations:623,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"numerical-computing",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"6281",title:"Finite Element Method",subtitle:"Simulation, Numerical Analysis and Solution Techniques",isOpenForSubmission:!1,hash:"9dde55be38d54e4593f142a4a5642f58",slug:"finite-element-method-simulation-numerical-analysis-and-solution-techniques",bookSignature:"Răzvan Păcurar",coverURL:"https://cdn.intechopen.com/books/images_new/6281.jpg",editedByType:"Edited by",editors:[{id:"179623",title:"Dr.",name:"Păcurar",middleName:null,surname:"Răzvan",slug:"pacurar-razvan",fullName:"Păcurar Răzvan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4538",title:"Fourier Transform",subtitle:"Signal Processing and Physical Sciences",isOpenForSubmission:!1,hash:"4dfc78ab6a3abc41b6136a4a9e2b8afa",slug:"fourier-transform-signal-processing-and-physical-sciences",bookSignature:"Salih Mohammed Salih",coverURL:"https://cdn.intechopen.com/books/images_new/4538.jpg",editedByType:"Edited by",editors:[{id:"111691",title:"Dr.Ing.",name:"Salih",middleName:"Mohammed",surname:"Salih",slug:"salih-salih",fullName:"Salih Salih"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3832",title:"Computational and Numerical Simulations",subtitle:null,isOpenForSubmission:!1,hash:"44c51ee67bb45c4a080ece19bd0f6a08",slug:"computational-and-numerical-simulations",bookSignature:"Jan Awrejcewicz",coverURL:"https://cdn.intechopen.com/books/images_new/3832.jpg",editedByType:"Edited by",editors:[{id:"68338",title:"Prof.",name:"Jan",middleName:null,surname:"Awrejcewicz",slug:"jan-awrejcewicz",fullName:"Jan Awrejcewicz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2207",title:"Numerical Simulation",subtitle:"From Theory to Industry",isOpenForSubmission:!1,hash:"1a2002ed6e06f8cb36ad55b57aab57e5",slug:"numerical-simulation-from-theory-to-industry",bookSignature:"Mykhaylo Andriychuk",coverURL:"https://cdn.intechopen.com/books/images_new/2207.jpg",editedByType:"Edited by",editors:[{id:"57755",title:"Dr.",name:"Mykhaylo",middleName:"I.",surname:"Andriychuk",slug:"mykhaylo-andriychuk",fullName:"Mykhaylo Andriychuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2274",title:"Fuzzy Logic",subtitle:"Algorithms, Techniques and Implementations",isOpenForSubmission:!1,hash:"116c1be2754eb60e90b4ad3642546291",slug:"fuzzy-logic-algorithms-techniques-and-implementations",bookSignature:"Elmer P. Dadios",coverURL:"https://cdn.intechopen.com/books/images_new/2274.jpg",editedByType:"Edited by",editors:[{id:"111683",title:"Prof.",name:"Elmer",middleName:null,surname:"Dadios",slug:"elmer-dadios",fullName:"Elmer Dadios"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2141",title:"Finite Volume Method",subtitle:"Powerful Means of Engineering Design",isOpenForSubmission:!1,hash:"0664f831a342fdbcf1fe496e9885f161",slug:"finite-volume-method-powerful-means-of-engineering-design",bookSignature:"Radostina Petrova",coverURL:"https://cdn.intechopen.com/books/images_new/2141.jpg",editedByType:"Edited by",editors:[{id:"118470",title:"PhD.",name:"Radostina",middleName:"Vasileva",surname:"Petrova",slug:"radostina-petrova",fullName:"Radostina Petrova"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1988",title:"Applied Computational Fluid Dynamics",subtitle:null,isOpenForSubmission:!1,hash:"31dcd7458d945041cbdfec7adbc2fa11",slug:"applied-computational-fluid-dynamics",bookSignature:"Hyoung Woo Oh",coverURL:"https://cdn.intechopen.com/books/images_new/1988.jpg",editedByType:"Edited by",editors:[{id:"63199",title:"Prof.",name:"Hyoung Woo",middleName:null,surname:"Oh",slug:"hyoung-woo-oh",fullName:"Hyoung Woo Oh"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1989",title:"Fluid Dynamics, Computational Modeling and Applications",subtitle:null,isOpenForSubmission:!1,hash:"e7f43d55285a6a3447c62c066f072e8b",slug:"fluid-dynamics-computational-modeling-and-applications",bookSignature:"L. Hector Juarez",coverURL:"https://cdn.intechopen.com/books/images_new/1989.jpg",editedByType:"Edited by",editors:[{id:"65861",title:"Dr.",name:"L. Hector",middleName:null,surname:"Juarez",slug:"l.-hector-juarez",fullName:"L. Hector Juarez"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"2855",title:"Computational Modelling of Multi-scale Solute Dispersion in Porous Media",subtitle:"An Approach Based on Stochastic Calculus",isOpenForSubmission:!1,hash:"cda3a5c9b15c12fa429485993422ef66",slug:"computational-modelling-of-multi-scale-solute-dispersion-in-porous-media-an-approach-based-on-stochastic-calculus",bookSignature:"Don Kulasiri",coverURL:"https://cdn.intechopen.com/books/images_new/2855.jpg",editedByType:"Authored by",editors:[{id:"28400",title:"Prof.",name:"Don",middleName:null,surname:"Kulasiri",slug:"don-kulasiri",fullName:"Don Kulasiri"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"3",chapterContentType:"chapter",authoredCaption:"Authored by"}},{type:"book",id:"532",title:"Two Phase Flow, Phase Change and Numerical Modeling",subtitle:null,isOpenForSubmission:!1,hash:"331fe87b8edf0e8adf7e6086e4eea81c",slug:"two-phase-flow-phase-change-and-numerical-modeling",bookSignature:"Amimul Ahsan",coverURL:"https://cdn.intechopen.com/books/images_new/532.jpg",editedByType:"Edited by",editors:[{id:"36782",title:"Associate Prof.",name:"Amimul",middleName:null,surname:"Ahsan",slug:"amimul-ahsan",fullName:"Amimul Ahsan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1363",title:"Numerical Analysis",subtitle:"Theory and Application",isOpenForSubmission:!1,hash:"509ce23e2dae5d72c14be89bd9b75004",slug:"numerical-analysis-theory-and-application",bookSignature:"Jan Awrejcewicz",coverURL:"https://cdn.intechopen.com/books/images_new/1363.jpg",editedByType:"Edited by",editors:[{id:"68338",title:"Prof.",name:"Jan",middleName:null,surname:"Awrejcewicz",slug:"jan-awrejcewicz",fullName:"Jan Awrejcewicz"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"161",title:"Computational Fluid Dynamics",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"d636946634ddf4e48b6e9bc6a0cd615a",slug:"computational-fluid-dynamics-technologies-and-applications",bookSignature:"Igor V. Minin and Oleg V. Minin",coverURL:"https://cdn.intechopen.com/books/images_new/161.jpg",editedByType:"Edited by",editors:[{id:"3712",title:"Prof.",name:"Oleg",middleName:null,surname:"Minin",slug:"oleg-minin",fullName:"Oleg Minin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:14,mostCitedChapters:[{id:"19443",doi:"10.5772/25128",title:"Modelling Friction Contacts in Structural Dynamics and its Application to Turbine Bladed Disks",slug:"modelling-friction-contacts-in-structural-dynamics-and-its-application-to-turbine-bladed-disks",totalDownloads:3210,totalCrossrefCites:3,totalDimensionsCites:32,book:{slug:"numerical-analysis-theory-and-application",title:"Numerical Analysis",fullTitle:"Numerical Analysis - Theory and Application"},signatures:"Christian Maria Firrone and Stefano Zucca",authors:[{id:"62033",title:"Dr.",name:"Christian Maria",middleName:null,surname:"Firrone",slug:"christian-maria-firrone",fullName:"Christian Maria Firrone"},{id:"62043",title:"Dr.",name:"Stefano",middleName:null,surname:"Zucca",slug:"stefano-zucca",fullName:"Stefano Zucca"}]},{id:"19452",doi:"10.5772/24111",title:"Numerical Simulation for Vehicle Powertrain Development",slug:"numerical-simulation-for-vehicle-powertrain-development",totalDownloads:5682,totalCrossrefCites:16,totalDimensionsCites:29,book:{slug:"numerical-analysis-theory-and-application",title:"Numerical Analysis",fullTitle:"Numerical Analysis - Theory and Application"},signatures:"Federico Millo, Luciano Rolando and Maurizio Andreata",authors:[{id:"55553",title:"Prof.",name:"Federico",middleName:null,surname:"Millo",slug:"federico-millo",fullName:"Federico Millo"},{id:"119742",title:"Dr.",name:"Luciano",middleName:null,surname:"Rolando",slug:"luciano-rolando",fullName:"Luciano Rolando"},{id:"119743",title:"MSc.",name:"Maurizio",middleName:null,surname:"Andreata",slug:"maurizio-andreata",fullName:"Maurizio Andreata"}]},{id:"16384",doi:"10.5772/23496",title:"CFD for Characterizing Standard and Single-use Stirred Cell Culture Bioreactors",slug:"cfd-for-characterizing-standard-and-single-use-stirred-cell-culture-bioreactors",totalDownloads:6640,totalCrossrefCites:3,totalDimensionsCites:28,book:{slug:"computational-fluid-dynamics-technologies-and-applications",title:"Computational Fluid Dynamics",fullTitle:"Computational Fluid Dynamics Technologies and Applications"},signatures:"Stephan C. Kaiser, Christian Löffelholz, Sören Werner and Dieter Eibl",authors:[{id:"52219",title:"MSc",name:"Stephan C.",middleName:null,surname:"Kaiser",slug:"stephan-c.-kaiser",fullName:"Stephan C. Kaiser"},{id:"52439",title:"MSc.",name:"Sören",middleName:null,surname:"Werner",slug:"soren-werner",fullName:"Sören Werner"},{id:"52440",title:"MSc.",name:"Christian",middleName:null,surname:"Löffelholz",slug:"christian-loffelholz",fullName:"Christian Löffelholz"},{id:"52441",title:"Prof.",name:"Dieter",middleName:null,surname:"Eibl",slug:"dieter-eibl",fullName:"Dieter Eibl"}]}],mostDownloadedChaptersLast30Days:[{id:"39222",title:"Synthesis of Antenna Systems According to the Desired Amplitude Radiation Characteristics",slug:"synthesis-of-antenna-systems-according-to-the-desired-amplitude-radiation-characteristics",totalDownloads:1333,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"numerical-simulation-from-theory-to-industry",title:"Numerical Simulation",fullTitle:"Numerical Simulation - From Theory to Industry"},signatures:"Mykhaylo Andriychuk",authors:[{id:"57755",title:"Dr.",name:"Mykhaylo",middleName:"I.",surname:"Andriychuk",slug:"mykhaylo-andriychuk",fullName:"Mykhaylo Andriychuk"}]},{id:"19452",title:"Numerical Simulation for Vehicle Powertrain Development",slug:"numerical-simulation-for-vehicle-powertrain-development",totalDownloads:5690,totalCrossrefCites:16,totalDimensionsCites:29,book:{slug:"numerical-analysis-theory-and-application",title:"Numerical Analysis",fullTitle:"Numerical Analysis - Theory and Application"},signatures:"Federico Millo, Luciano Rolando and Maurizio Andreata",authors:[{id:"55553",title:"Prof.",name:"Federico",middleName:null,surname:"Millo",slug:"federico-millo",fullName:"Federico Millo"},{id:"119742",title:"Dr.",name:"Luciano",middleName:null,surname:"Rolando",slug:"luciano-rolando",fullName:"Luciano Rolando"},{id:"119743",title:"MSc.",name:"Maurizio",middleName:null,surname:"Andreata",slug:"maurizio-andreata",fullName:"Maurizio Andreata"}]},{id:"31925",title:"Computational Fluid Dynamics",slug:"computational-fluid-dynamics",totalDownloads:5261,totalCrossrefCites:1,totalDimensionsCites:3,book:{slug:"applied-computational-fluid-dynamics",title:"Applied Computational Fluid Dynamics",fullTitle:"Applied Computational Fluid Dynamics"},signatures:"Victor Udoewa and Vinod Kumar",authors:[{id:"74201",title:"Prof.",name:"Victor",middleName:null,surname:"Udoewa",slug:"victor-udoewa",fullName:"Victor Udoewa"}]},{id:"39240",title:"3D Finite Element Simulation of T-Joint Fillet Weld: Effect of Various Welding Sequences on the Residual Stresses and Distortions",slug:"3d-finite-element-simulation-of-t-joint-fillet-weld-effect-of-various-welding-sequences-on-the-resid",totalDownloads:8456,totalCrossrefCites:2,totalDimensionsCites:7,book:{slug:"numerical-simulation-from-theory-to-industry",title:"Numerical Simulation",fullTitle:"Numerical Simulation - From Theory to Industry"},signatures:"Nur Syahroni and Mas Irfan Purbawanto Hidayat",authors:[{id:"145703",title:"Dr.",name:"Nur",middleName:null,surname:"Syahroni",slug:"nur-syahroni",fullName:"Nur Syahroni"},{id:"146260",title:"Ph.D.",name:"Mas Irfan Purbawanto",middleName:null,surname:"Hidayat",slug:"mas-irfan-purbawanto-hidayat",fullName:"Mas Irfan Purbawanto Hidayat"}]},{id:"6734",title:"Numerical Simulation of Flow in Erlenmeyer Shaken Flask",slug:"numerical-simulation-of-flow-in-erlenmeyer-shaken-flask",totalDownloads:4365,totalCrossrefCites:0,totalDimensionsCites:1,book:{slug:"computational-fluid-dynamics",title:"Computational Fluid Dynamics",fullTitle:"Computational Fluid Dynamics"},signatures:"Liu Tianzhong, Su Ge, Li Jing, Qi Xiangming and Zhan Xiaobei",authors:[{id:"7272",title:"Dr.",name:"Tianzhong",middleName:null,surname:"Liu",slug:"tianzhong-liu",fullName:"Tianzhong Liu"}]},{id:"19453",title:"Crash FE Simulation in the Design Process - Theory and Application",slug:"crash-fe-simulation-in-the-design-process-theory-and-application",totalDownloads:5449,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"numerical-analysis-theory-and-application",title:"Numerical Analysis",fullTitle:"Numerical Analysis - Theory and Application"},signatures:"S. Roth, D. Chamoret, J. Badin, JR. Imbert and S. Gomes",authors:[{id:"53859",title:"Dr.",name:"Sebastien",middleName:null,surname:"Roth",slug:"sebastien-roth",fullName:"Sebastien Roth"},{id:"60592",title:"Dr.",name:"Dominique",middleName:null,surname:"Chamoret",slug:"dominique-chamoret",fullName:"Dominique Chamoret"},{id:"60593",title:"Mr",name:"Julien",middleName:null,surname:"Badin",slug:"julien-badin",fullName:"Julien Badin"},{id:"60594",title:"Prof.",name:"Samuel",middleName:null,surname:"Gomes",slug:"samuel-gomes",fullName:"Samuel Gomes"}]},{id:"19455",title:"Obstacle Avoidance for Autonomous Mobile Robots Based on Position Prediction Using Fuzzy Inference",slug:"obstacle-avoidance-for-autonomous-mobile-robots-based-on-position-prediction-using-fuzzy-inference",totalDownloads:2607,totalCrossrefCites:2,totalDimensionsCites:4,book:{slug:"numerical-analysis-theory-and-application",title:"Numerical Analysis",fullTitle:"Numerical Analysis - Theory and Application"},signatures:"Takafumi Suzuki and Masaki Takahashi",authors:[{id:"6184",title:"Prof.",name:"Masaki",middleName:null,surname:"Takahashi",slug:"masaki-takahashi",fullName:"Masaki Takahashi"},{id:"57754",title:"Dr.",name:"Takafumi",middleName:null,surname:"Suzuki",slug:"takafumi-suzuki",fullName:"Takafumi Suzuki"}]},{id:"6731",title:"Investigation of Mixing in Shear Thinning Fluids Using Computational Fluid Dynamics",slug:"investigation-of-mixing-in-shear-thinning-fluids-using-computational-fluid-dynamics",totalDownloads:5310,totalCrossrefCites:1,totalDimensionsCites:6,book:{slug:"computational-fluid-dynamics",title:"Computational Fluid Dynamics",fullTitle:"Computational Fluid Dynamics"},signatures:"Farhad Ein-Mozaffari and Simant R. Upreti",authors:[{id:"7619",title:"Dr.",name:"Farhad",middleName:null,surname:"Ein-Mozaffari",slug:"farhad-ein-mozaffari",fullName:"Farhad Ein-Mozaffari"},{id:"135082",title:"Dr.",name:"Simant",middleName:null,surname:"Upreti",slug:"simant-upreti",fullName:"Simant Upreti"}]},{id:"19444",title:"Modeling and Simulation of Biomechanical Systems - An Orbital Cavity, a Pelvic Bone and Coupled DNA Bases",slug:"modeling-and-simulation-of-biomechanical-systems-an-orbital-cavity-a-pelvic-bone-and-coupled-dna-bas",totalDownloads:2791,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"numerical-analysis-theory-and-application",title:"Numerical Analysis",fullTitle:"Numerical Analysis - Theory and Application"},signatures:"J. Awrejcewicz, J. Mrozowski, S. Młynarska, A. Dąbrowska-Wosiak, B. Zagrodny, S. Banasiak and L.V. Yakushevich",authors:[{id:"68338",title:"Prof.",name:"Jan",middleName:null,surname:"Awrejcewicz",slug:"jan-awrejcewicz",fullName:"Jan Awrejcewicz"},{id:"78812",title:"Dr.",name:"Jerzy",middleName:null,surname:"Mrozowski",slug:"jerzy-mrozowski",fullName:"Jerzy Mrozowski"},{id:"78818",title:"MSc",name:"Sylwia",middleName:null,surname:"Młynarska",slug:"sylwia-mlynarska",fullName:"Sylwia Młynarska"},{id:"78822",title:"MSc",name:"Anna",middleName:null,surname:"Dabrowska-Wosiak",slug:"anna-dabrowska-wosiak",fullName:"Anna Dabrowska-Wosiak"},{id:"78824",title:"MSc",name:"Bartlomiej",middleName:null,surname:"Zagrodny",slug:"bartlomiej-zagrodny",fullName:"Bartlomiej Zagrodny"},{id:"78838",title:"MSc",name:"Szymon",middleName:null,surname:"Banasiak",slug:"szymon-banasiak",fullName:"Szymon Banasiak"},{id:"78841",title:"Prof.",name:"Ludmila",middleName:null,surname:"Yakushevich",slug:"ludmila-yakushevich",fullName:"Ludmila Yakushevich"}]},{id:"58066",title:"FEM Analysis of Mechanical and Structural Properties of Long Fiber-Reinforced Composites",slug:"fem-analysis-of-mechanical-and-structural-properties-of-long-fiber-reinforced-composites",totalDownloads:1062,totalCrossrefCites:0,totalDimensionsCites:2,book:{slug:"finite-element-method-simulation-numerical-analysis-and-solution-techniques",title:"Finite Element Method",fullTitle:"Finite Element Method - Simulation, Numerical Analysis and Solution Techniques"},signatures:"Michal Petrů and Ondřej Novák",authors:[{id:"199749",title:"Associate Prof.",name:"Michal",middleName:null,surname:"Petrů",slug:"michal-petru",fullName:"Michal Petrů"},{id:"206374",title:"Dr.",name:"Ondřej",middleName:null,surname:"Novák",slug:"ondrej-novak",fullName:"Ondřej Novák"}]}],onlineFirstChaptersFilter:{topicSlug:"numerical-computing",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"profile.detail",path:"/profiles/299654/lamine-koivogui",hash:"",query:{},params:{id:"299654",slug:"lamine-koivogui"},fullPath:"/profiles/299654/lamine-koivogui",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var t;(t=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(t)}()