Characteristics of child by Freud, Erikson, and Piaget
\r\n\tWater occupies about 71% of the surface and 93% of the planet's volume.
\r\n\tSince the beginning of its formation, about three billion years ago, the hydrosphere - as envelope of the terrestrial ellipsoid - has remained constant from a quantitative point of view, modifying only the ratio of the stretches of the planetary ocean and land and the proportion of the states of the water aggregation: gaseous, liquid and solid.
\r\n\tThe hydrological cycle trains only a portion of the hydrosphere repeats itself annually and presents itself as a huge planetary plant that for billions of years operating uninterruptedly on the basis of solar energy and gravity, providing freshwater resources for the maintenance and perpetuation of life beyond the planetary ocean.
\r\n\tLately, water resources, highly influenced by the hydrologic cycle, play a role in the agriculture economic development. As it is shown by the intergovernmental panel on climate change report, the phenomenon of changing the climate and land use is set way to exacerbate an already serious situation of water supply for various users. In this context, the scientific investigations on the issue of sustainable use of water are timely and important. Improvement of water management involves the accurate estimation of consumptive uses. Consequently, the purpose of this book is to know the achievements of scientists and academicians all over the world to promote and share new issues on various topics related to evapotranspiration.
The chapter aims to share various approaches to prevent crimes against children with students and professionals interested in developing and designing interactions. Accordingly, it is focused on discussing various examples and features of current interaction designs based on a diversified examination of designed products, services, and social systems. It also aims to understand and analyze characteristics of crimes against children from a designer’s perspective and suggest a new direction for design while discussing basic suggestions on crimes against children and examining design methods with regard to crimes against children.
Firstly, what are the characteristics of children? Secondly, what are the characteristics of crimes against children? Thirdly, what is the current prevention system for against crimes and the advantages and disadvantages of such as system? Fourthly, what technologies could complement the disadvantages? The current study discusses interaction designs aimed to prevent crimes against children based on service designs through resolutions to suggested problems.
Researchers have revealed that more practical preventive measures can be taken when a protector – the government (the police) or private companies (security providers) – communicate with children to prevent crimes. The protector must immediately estimate the situation on behalf of children and a government agency or a private security service provider serves as a linking device and intervenes to protect children.
From examining the current products on the market as available devices, smart phones have been deemed appropriate; however separate development guidelines are needed given that users are children.
This chapter analyzes children’s performances and circumstantial judgments through literature and studies on preventing methods through understanding the procedure and characteristics of precedents of crimes against child over the past seven years.
A child refers to the ages between 6 and 12. During this period, a child learns similar tasks that he or she must perform once they become an adult[1] -. Child development is often discussed from the perspective of developmental psychology and paediatrics and is defined from biological and psychological perspectives. Child development is believed to have characteristics of dependency, continuous development, susceptibleness, demand, and adaptability[1] -. Table 1 summarizes research conducted Sigmund Freud, Erick Erikson and Jean Piaget with regard to the psychological cognitive development of children.
Psychologists | Development | Stages | Characteristics |
Freud | Psychosexual Development | Latency Stage 6-11 year old | Libido is repressed and the child develops superego.the child acquires social value through playing with same age group with same sex and adults other than family members. |
Erikson | Psychosocial Development | Industry vs. Inferiority Latency Stage 6-11 year old | Children develop competence and cooperation skills in school. Complex develop through negative experiences in the family or when experiencing incompetence in school or among same age group. |
Piaget | Stages of Development | Concrete Operations Stage 7-11 year old | A child can conduct logical reasoning what regard to specific cases and is able to divide objects into different categories (i.e., children can conduct operation). In this stage, the child which performs concrete operational reasoning, but cannot perform reasoning that requires algebraic equations because it require advanced abstract thinking. |
Characteristics of child by Freud, Erikson, and Piaget
Jean Piaget’s “concrete operations stage,” which is third of four stages of development applies to 7-11-year-old children. Children in this stage can perform simple operations and logical reasoning replaces intuitive thinking, which means that children can operate a mobile phone. However, how well a child can operate a mobile phone in case of an emergency must be carefully examined.
Therefore, the following needs to be considered when designing a device for kids. Although child in the concrete operations stage can perform operations that requires quite complicated and logical thinking, it must be designed so a child can operate quickly in case of emergency. Table 2 shows a list to consider in accordance with the characteristics of children.
Items | Contents |
General Characteristics | should be able to get attention from same age group should seek for a way to educate children about utilization in case of emergency through game should prepare for malfunction caused by shock should educate children to avoid unintended operation out of curiosity child should be familiarized with operation |
Physical Characteristics | design should consider physical development of childhood design should consider safety of a child so he/she does not get injured from unintended operation due to physical development |
Cognitive Characteristics | cognition of age of 6, 9, and 12 is different and should have flexible structure or icon design for respective ages. not only a button but also a variety of methods need to be considered to respond in case of emergency circumstantial judgment and discernment may insufficient compare to an adult |
List of considered device designs in accordance with the characteristics of a child
Based on the analysis of precedents, what marks the child abuse is that most crimes involve sexual motivation, although some lead to the murder of a child. For the crime from occuring, there must be three prerequisites: (1) crime will, (2) victim, and (3) crime scene.
Once these are satisfied, there are five phases to commit a crime; crime prerequisite → approaching → luring and kidnapping → movement → committing the crime.
Step 1 | Step 2 | Step 3 | Step 4 | |
Crime prerequisite | Approaching | Luring and Kidnapping | Movement | Committing the crime |
Process of Crime
The intention of classification of a crime is to extract the Design Specification of the device for children to respond to each phase of the crime and prevent it the crime from occuring.
First the prevention of the first phase, crime prerequisite, has been conducted in the West in various ways.
Nevertheless, criminals continue to approach victims, wearing electronic Tagging. Criminals lure victims using feigned identity or by asking for directions. Criminals may also capture victims by force and move to a certain spot to commit the crime.
In the Kim Kil-Tae case, the preschool, the crime scene, and the criminal’s house were located within 300m. This shows that many crimes are committed within the child’s home environment. On study showed that the luring point and crime scene are only 30 min. away (i.e. within 2km).
Phase | Counter Measures |
Crime prerequisite | Need for systematic measures to block any attempts for crime will, victim, crime scene. |
Approaching | Alert the child’s parent by receiving signals from the Electronic Tagging of recidivism through a device for children. |
Luring | Educating the child about the action guide and letting them avoid the crime scene. |
Kidnapping | Informing the third party about the danger using an emergency button or strap when captured by force. |
Movement | Collecting all data about a child’s routine pattern and alerting the parents when their child strays from the routine. |
Counter measures for each crime phases
According to a survey, cases where the victim’s house, crime scene, lure place, victim’s school and perpetrator’s house were located within 2 km and accounted for 50% or more of crimes. Findings also revealed that a perpetrator searched for the subject of the crime in surrounding areas and the crime scene was a familiar environment. In addition, the lure place was not the same as the crime scene, and a perpetrator lured the child to another place to commit the crime. In these cases, it is the only time when a child can be rescued. Of note, 2 km takes up to 30 minutes to traverse on foot.
Distance from victim’s house, crime scene, lure place, victim’s school, and perpetrator’s house.
A main characteristic of crimes against children is that it is impossible for children to protect themselves or ask for help when they perceive a crime because of physical differences between the child and perpetrator. Accordingly, it has been perceived that the intervention of a third party, who can immediately extend a helping hand to children, is desperately needed. Therefore, this study focuses on determining measures to achieve such an intervention.
Physical differences between a victim and a pertpetrator
Preventive means can be divided into individual and social means. As seen in the Figure 3, the social means are characterized by handling a situation after the fact. As it is difficult to protect many and unspecified persons, an emphasis is placed on preventing the recurrence of crimes that center on ex-cons. However, it is difficult to protect victims prior to a crime. Individual means are characterized by prevention that is focused on self-protective instincts aimed to protect oneself and one’s family from many and unspecified persons.
Characteristics of individual and social means
According to Table 5, which compares the domestic and foreign prevention system, the domestic system shows more favor to the rights of the criminal than those of the victims or the many and unspecified possible victims. Under certain circumstances, prevention becomes essential.
type | Measures | Comparison |
Domestic System | Child safety guards Amber alert Electronic Tagging Posting identities of sexual offenders | Victim’s human right < perpetrator’s human right |
Foreign System | Isolation policy of the sexual offenders (U.S) Amber alert Posting sexual abuse record/ identities(U.S.) Surgical or drug castration of sexual offenders(U.S.) Genetic database (U.K.) | Victim’s human right "/> perpetrator’s human right |
Comparison of domestic and foreign systems and victims‘ and perpetrators’ human rights
The followings are current technologies used for crime prevention.
SOS feature on mobile phones: Transmits the signal to five or six people who are registered by users in case of emergency and are available for only limited mobile phones.
LBS (Location Based Service): Electronic Tagging of ex-convicts; this has been adopted in many different fields. The security company ADT uses LBS-based mobile service for crime prevention. Users can set up an ETA (Estimated Time of Arrival) and if the users do not arrive on time, the company dispatched their men. If users enter the plate number of a taxi, the company will do the background check. However, as seen from the Fig. 2, this is problematic because it is not a kid friendly interface.
Example of setting up an ADT mobile phone - service name : Taxi care
Electronic Tagging: Domestically, electronic tagging of ex-convicts uses an LBS system. Legislation regarding adherence to Electronic Tagging for specific sexual offenders was enacted in April, 2007. After its revision in May 2008, electronic tagging was effective starting September 1st, which is an another use of LBS. Thus, if inspectors and mobile phones for children can detect the signal of the Electronic Tagging, it would provide a significant solution for preventing crimes against child.
Table 6. summarizes the results of the analysis of utilization of applicable systems and technologies through an assessment of effectiveness of each crime phase.
Phases | SOS feature of Mobile phone | LBS | Electronic positioning system /Electronic Tagging |
Phase 1 : approaching | - | - | - |
Phase 2 : luring and kidnapping | ○ (when kidnapped) | ○ (when kidnapped) | ○ (when kidnapped) |
Phase 3: movement | ○ | ○ | ○ |
Post crime phase | ○ | ○ | ○ |
Characteristics | Informs guardians in case of an emergency. Frequently unintended operation causes loss of reliability | Not a user friendly interface when using the service through a mobile phone; requires frequently resetting the settings. High cost for extra device and fees can be a burden on users when using a satellite-based system | It is a current measure that is systematically utilized. There is limits to prevention of crimes against people with no criminal records. May not expect any prevention when intentionally detached and committing a crime |
Assessment of effectiveness of prevention technologies regarding each crime phase.
It is concluded that mobile phone SOS features, LBS, Electronic Tagging are ineffective for luring and kidnapping because a child is not aware of it; however, it is effective for movement after kidnapping. In addition, to find a solution for preventing crimes against children, it is necessary to integrate mobile phone ubiquitous and LBS.
The evaluation of precedents of existing mobile phones for kids was conducted to analyze features that are needed for this population of users.
Company model | Image | Characteristics |
Verizon Migo | -emergency use for kids/elders, -minimum capacity that allows only five limited numbers be saved including emergency number (911) -no texting | |
Kyocera Mamorino cell phone for kids | -only available in Japan, can locate child’s position and sounds alarm in emergency to inform -limited texting available through preregistered texts -there is a strap besides an emergency button and when pulled, it sounds an alarm and transmits signal to security company -when there is no light based on the setting, the lights will be turned on | |
Cingular Firefly | -private button for mom and dad -can save up to 20 numbers -emergency call button and designed to prevent mal-manipulation -suggests that child can be protected from harmful materials becuace there is no internet or email connection | |
Willcom Nico | -arrangement of large buttons/buttons with enlarged dome design -positioning system that can inform parents of child’s location -parents can learn child’s location by calling or through a computer at any time -high quality audio with low electromagnetic waves, which ensures safe use for kids | |
Gigabyte Sergeant Keroro, Doraemon | -Keroro and Doraemon version released by Taiwanese company Gigabyte -no specific features for child safety | |
au A5520SA | -provides location of child in real-time using GPS and informs when a child approaches specific location -pressing # for several seconds sounds an alarm and transmits current location through GPS mail to registered number and simultaneously informs the security company -can contact fire department or hospital in emergency of fire or illness -informs the child’s location in time intervals, even if the power is off -wireless internet NTT Tokomo arranged ‘Kids I menu’ and prevents child from harmful internet content | |
Hop-on chitterchatter | -mobile phone that can frequently connect family with child under 10 or person with disability -comprises five (mom, dad, home, 911, Track Me) buttons with total of seven emergency numbers -child can inform parents of their location -can be put in backpack, wallet, pocket, etc, or can hang on neck or worn on the wrist | |
Willcom Papipo | -Papipo, released by Willcom, is manufactured by plastic model company Bandai -produced in Blue, Damogochi, Chao version and has meticulous UI design -once connected to kids studio, a database for children, a child can download wallpaper, games, ring tones and even raising Damagochi (function of fun) -provides positioning system using PHS base station, and emergency button | |
Dmodo M900 | -manufactured by Hong Kong mobile phone handsets company -uses Walt Disney’s Mickey-Mouse design -popular among kids and young women, also uses Disney characters for integrated programs such as wall papers, animation, icon, button sound. |
Precedents of existing mobile phone for kids
The precedent analysis showed that it is not easy for a child to control the device in an emergency and protecting a child through third party involvement seems an easy task. However, some features of these devices were useful such as A5520SA from AU, which informs parents when a child is approaching a specific location and informs the child’s location at specific time intervals, even if the power is off. Additionally, Chitterchatter’s wearing method was found useful. Table 8 summarizes useful features for preventing crimes against children.
Categories | Functions | Contents |
Button | Specified Key | Easy operation for various ages and children with disabilities. Can maximize battery by allowing limited number of phone numbers to be saved and prevent unnecessary calls and harmful content. |
Emergency Button | Informs the current situation and self location to the preregistered person in case of an emergency | |
Notifying Self Location Button | Can inform self location at any time | |
Power | Battery Cover | When the battery cover is forcibly removed, a warning sign will be sent out to preregistered numbers |
Powerless Positioning Signal | Can notify one’s location without any power in certain time intervals | |
Lamp | Lamp | When a child is trapped in dark area, the lights will be turned on based on the settings |
Emergency | Strap | If a situation doesn’t allow a child to a press button, he/she can pull the strap, which will sound the alarm and send out a text message to the preregistered numbers |
App. | GPS | Parents can confirm their child’s location any time and will be notified when the child approaches a specific location |
DB | Parents can protect their child from harmful content and decorate the mobile phone using DB for kids. |
Useful current technologies to prevent crimes against children
The users have a need for normalization and avoiding admitting that they are special[1] -. Thus, mobile phones for kids that are currently available have very small LCDs or none at all; nevertheless, designs for both specified-key mode and 10-key mode would be viable by parents setting up the key-type screens based on the Full Touch Technology and adjusted for their children’s age-specific cognition levels.
Children aged 7 to 11 experience concrete operational stage as mentioned by Piaget with regard to characteristics of children who can deal with simplified manipulation and logical inference, which suggests that children have no problem manipulating a device.
With regard to characteristics of crimes against children, a perpetrator commits a crime if three conditions, crime will, victim, and crime scene are met and the crime goes through the stages Approaching→ Luring and Kidnapping →Movement→ Committing Crime.
Cases where victim’s house, commit place, lure place, victim’s school, and perpetrator’s house are located within 2 km account for 50% or more; therefore, crimes are committed near routing of children.
As it is deemed impossible for children to protect themselves due to physical differences between the child and perpetrator, it is perceived that intervention by a third party is essential and many thoughts have been given to intervention by a third party.
There are various methods to prevent crimes, which are divided into individual and social means. Individual means are preventive measures to protect oneself and family from many and unspecified perpetrators; however, few methods have been found to enable children to protect themselves. On the other hand, social means are related to ex-cons and are characterized by prevention after the fact; therefore, they are less often characterized by prevention prior to a crime.
According to an inquiry into preventive technologies, many useful technologies and functions have been found with mobile phones and include such diversified technologies as LBS and SOS functions. However, they may have problems because children are unable to perceive situations where they are exposed to crimes or there are difficulties in helping them directly or indirectly when they ask for help even thought they have perceived a crime.
As the study aims to prevent crimes, it is focused on suggesting the direction of design so that children can be protected from a crime through a device one way or another. Accordingly, it has designated a scenario to extract factors according to situations while suggesting guidelines needed for a device from the extracted factors.
The following scenario was written based on crime categorization of Table 9 and was used to support reasons for necessary device features.
Criminal records | Methods | Cognition | Categories |
Less than two previous conviction | Luring | does not perceive danger | category 1 |
Kidnapping | recognize danger | category 2 | |
More than two previous conviction | Luring | does not perceive danger | category 3 |
Kidnapping | recognize danger | category 4 |
Setting up four categories
This scenario was established based on a previous research and has the following conditions. It has been sub-divided into the following crime stages: crime prerequisite → approaching → luring and kidnapping → movement → committing crime before suggestion.
First, perpetrators are divided into ex-cons and first offenders and this scenario is related to the application of electric tagging. Some criminals attempt to commit a crime after removing electronic tagging; these are regarded as first offenders. These criminals are divided into luring and kidnapping and luring refers to as a situation where a child is unable to be exposed to a crime; kidnapping refers to as a circumstance where a child perceives that he or she is in danger.
Category. 1 : Without Electronic Tagging and Luring
Category 1 of Table 10 describes the role of mobile phone for each phase under the premises that a 40-year-old man with less than two previous convictions targets a 12-year-old female victim.
Category 1 | Setting | Phase 1 | Phase 2 | Phase 3 | Phase 4 |
Perpetrator | 40 year old, less than two previous convictions | Approaching | Luring | Movement | Commit a crime |
Victim | 6-12 year old girl / playground | Does not Perceive /wariness | Does not perceive | Does not perceive | Recognize |
Function of mobile phone | Detecting any abnormal activities (route, speed, etc.) | - | - | Detecting any abnormal activities (route, speed, etc.) | Emergency button / Alarm/ lighting |
Category 1: Criminal without Electronic Tagging and Luring
The worst case is Category 1 because the perpetrator can hide intention and the child may never recognize the danger until right before the crime. In such a case, parents can be informed about abnormal activity of their child such as different routine pattern or sudden acceleration of speed and detect changes in mode of transportation; they can also confirm the situation of their child. In many cases, the child does not recognize danger until right before a crime, thus, active involvement of third party is necessary.
Category. 2 : Without Electronic Tagging and Kidnapping
Category 2, seen in Table 11, shows a case of threatening and forcible kidnapping by a criminal with a similar previous conviction. Here, the child does not recognize danger until the criminal approaches; however, is aware of that the situation is threatening
Category 2 | Setting | Phase 1 | Phase 2 | Phase 3 | Phase 4 |
Perpetrator | 40 year old, less than two previous convictions | Approaching | Kidnapping (threatening) | Movement | Commit a crime |
Victim | 6-12 year old girl / playground | Does not recognize/ wariness | Recognize | Recognize danger | Recognize danger |
Function of mobile phone | Detecting any abnormal activities (route, speed, etc.) | - | Emergency button / Alarm/ lighting | Emergency button / Alarm/ lighting | Emergency button / Alarm/ lighting |
Category 2: Criminal without Electronic Tagging and Kidnapping
While the mobile phone detects routine pattern and speed, it can also alert a nearby third party by sounding an alarm or informing the child’s parents and police when he or she presses the emergency button. However, when the child is being kidnapped forcibly or too nervous to control the device, the mobile phone’s secondary function activates through LBS and informs guardians of abnormal activities.
Category. 3 : With Electronic Tagging and Luring
Category 3, seen in Table 12, shows crimes committed by 40-year-old man with more than one previous conviction, wearing Electronic Tagging. Proposed mobile phone receives signals from Electronic Tagging; however, does not inform the child to avoid the human rights violation of the ex-convict.
Category 3 | Setting | Phase 1 | Phase 2 | Phase 3 | Phase 4 |
Perpetrator | 40 year old, more than one previous conviction | Approaching | Luring | Movement | Commit a crime |
Victim | 6-12 year old girl / road | Does not recognize/ wariness | Does not recognize | Does not recognize | Does not recognize |
Function of mobile phone | Detecting any abnormal activities (route, speed, etc.) | receives signals from Electronic Tagging, transmits warning message to guardians | check with guardian’s remote camera, sound the emergency alarm, report to the police | Emergency button / Alarm/ Lighting | Emergency button / Alarm/ Lighting |
Category 3: Criminal with Electronic Tagging and Luring
The signal received from the Electronic Tagging transmits a warning message, such as “exposed to possible threat,” to the child’s guardian so they can determine whether their child is exposed to the actual threat or not. Additionally, if the guardian believes there is an actual threat, they can remotely sound the alarm on the child’s mobile phone regardless of the child’s will.
Category. 4 : With Electronic Tagging and Kidnapping
Category 4, as seen in Table 13, is criminal wearing Electronic Tagging and kidnapping a child by threatening. In such a case, the child recognizes a danger and may take immediate action to notify a third party by pressing the emergency button. Even if the child fails to press button, he or she still can get help because the guardians are being notified by signals from Electronic Tagging device.
Category 4 | Setting | Phase 1 | Phase 2 | Phase 3 | Phase 4 |
Perpetrator | 40 year old, more than one previous conviction | Approaching | Kidnapping (threatening) | Movement | Commit a crime |
Victim | 6-12 year old girl / Apartment entrance | Does not recognize/ wariness | Recognize | Recognize | Recognize |
Function of mobile phone | Detecting any abnormal activities (route, speed, etc.) | receives signals from Electronic Tagging, transmits warning message to guardians | check with guardian’s remote camera, sound the emergency alarm, report to the police | Emergency button / Alarm/ Lighting | Emergency button / Alarm/ Lighting |
Category 4: Criminal with Electronic Tagging and Kidnapping
Although it was impossible to consider every circumstance, this chapter has discussed the most common circumstances to conduct a study on children’s perceptions of crimes and devices that can be helpful in such situations. This discussion has led to the understanding that devices require the LBS function to locate a child, a child’s action radius and progress needed to be recorded and designated and a remotely controlled camera and microphone are required to help a protector judge the situation. It has also helped better understand that it is necessary to be able to communicate with parents or a guard.
Research was conducted to determine how devices sense abnormal movement by situation and how to deliver the information to a third party via logical operational device systems.
For the purpose of the operational system, routing, the rate of movement and location of a child, needs to be collected as data in advance for a certain period to be patternized. If the patternization is completed, the movement deviating from it, which is abnormal speed or change in rout, is considered abnormal movement of a child and is primarily reported to a protector. The following figure provides a detailed explanation.
As seen in Figure 5, a model for device function has been proposed based on the analysis of the above stated categories.
Model showing function of child protection device
Model showing function of device when abnormal activities are detected
Based on the model illustrated on Fig. 5, Fig. 6 explains how a device for kids uses data on a child’s routine pattern, moving speed, and signal from the Electronic Tagging and transmits information to a child’s guardian when it detects abnormal activities
Fig. 7 shows how parents can explain to a child how to act through texting or calling based on the level of the threat. If a serious threat is determined, parents can sound the alarm and notify people nearby or contact a preregistered 911(US), 119(Korea), 112(Korea), or security company.
Role of guardians through understanding the situation
Fig. 8 shows how a system can automatically be activated and reported to the police when the device is damaged, the battery is forcibly removed, or the child presses the emergency button.
Model showing how children can report.
Findings suggest that a government agency (the police or a private company), a protector, and a child need to be linked to one another for cooperation when equipped with the system above as the device acts as a link. From examining products with similar or available functions among those on the market, smart phones are the technologies that best meet these requirements. However, given children aged 6 to 12 and such peripheral functions as an emergency button, it is difficult to apply existing smart phones as they are, and guidelines are deemed necessary for developing beneficial devices.
Ex-cons, first offenders, luring and kidnapping have been mixed to categorize four scenarios based on four stages of a crime as extracted from the study: crime prerequisite → approaching → luring and kidnapping → movement → committing crime. Research has been conducted to determine the status of a child and the role of a device in each phase.
Research has been conducted to comprehend the role of a device through these scenarios. Toward this end, research has been conducted on detailed functions of a device through a systematic diagram.
This process revealed that practical preventive measures can be generated when a protector – the government (the police) or a private company (a security service provider) and a child communicate with one another to effectively prevent crimes. A protector can immediately estimate the situation on behalf of a child and a government agency or a private security service provider must intervene to protect a child while the device acts as a link.
From examining products on the market with regard to a device that can fulfill such a role, smart phones are deemed the closest ones and, given that users are children, separate developmental guidelines are needed.
The chapter suggests guidelines for developing a device for children so that crimes can be prevented.
Information herein has been established based on useful factors on previous research, technologies, and services.
Categories | Types | Contents | |
LCD Screen | Without | - | May be limited as it allows only text informing |
With | - | Informs a child of how to respond through various information | |
Type | Window | Provides information through text or illustrations | |
Full touch | Button type (Hotkey & 10-key) can be jointly used and age-specific usage is possible | ||
Size | - | Should not be larger than 5x9cm for usage by children aged over 6 | |
Button | Number of buttons | 6-9 year old | Number and size of buttons should be designed while carefully examining abilities of 6-9 year old child’s operational skill. Buttons with icons are preferred over letter and should be limited with call, end, select menu, and number button (includes emergency button) |
- | 9-12 year old | Number and size of buttons should be designed while carefully examining ability of 6-9 year old child’s operational skill. Uses numeric keys and should be limited with call, end, select menu, and number button (includes emergency button) | |
Size of buttons | - | Size and shape of buttons should consider one hand and two hand operation separately | |
Shape of buttons | General | Should have convex design for easy operation of frequently used buttons | |
emergency | Should be differentiated with general button and minimize unintended operation | ||
Arrangement of buttons | - | General and emergency buttons should be separated to minimize unintended operation, but should not hide it | |
Type of buttons | Hot key | Specified key type makes for easy operation for a child under the age of 9. However, cannot make calls to many people | |
10 key | Able to make phone calls to many people, but losses rapidness and is easy to operate for a child over age of 9 | ||
Emergency key or strap | Can use specified key in addition to keypad to supplement weakness of 10-key type | ||
Track me | Unlike emergency button or strap, it has general button and different operational strategies | ||
Color of buttons | Achromatic color | - | |
Low /high chroma | Change of chrome can visually alert people to cognize threat | ||
Text of buttons | - | - | |
Emergency function | Emergency buttons | Button type | Separate button can activate emergency button. It is easy to locate but has high risk of malfunctioning and is easily exposed to criminals |
Projected type | Projected type looks as if part of a mobile phone but activates when broken. Once it is broken, it is hard to restore. It is not easily exposed to criminals and may be hard for a child to break under certain circumstances | ||
Emergency function | Emergency strap | Has a strap with hook. The hook may lead into malfunctioning; however, it has the advantage that a child can operate quickly compares to a button in any case | |
Track me button | Child can inform guardians of his/her location when it is hard to make phone call or cognize great danger (unlike emergency button, it is used with general button and transmits signal with special operational method in emergency) | ||
Lighting | Lamp | -During night time phone calls -Notifying self location through flickering -Used as lantern in dark areas | |
Sound | Speaker | Informs a child what he/she should do through sound | |
siren | Ask for help through sound | ||
Battery | Battery cover | Enclosed type (integrated) | Main body has integrated battery and powering off should not be easy |
Screw down type | Stops criminals from forcible powering off of a child’s mobile phone. There will be an interval time to power off | ||
Battery charging | Use solar power | Should be sustained to enable communication with a child under any circumstances | |
Self charged kit | Install portable or integrated self charger | ||
Latent battery | Has enough power to transmits signal of one’s position for a certain length of time even after the battery is removed | ||
Ubiquitous | camera | General phone call | Video telephone |
Emergency | Remotely collects data about the environment | ||
Mic. | General phone call | Telephone | |
Emergency | Remotely collects data about the environment | ||
sound | Siren | Third party can remotely sound the alarm | |
Optional device | Watch, ring, necklace | Report the threat automatically once child’s mobile phone is removed by criminals | |
waterproof | Should operate under any circumstances |
Guideline for figure design
Categories | Features | Characteristics |
Screen layout | Selective layout is possible. | Cognition and operational skill of 6-9 and 9-11 year olds should be considered, respectively, for age-specific design. |
Using illustration is suggested over text for UI. | ||
Text | Font size can be adjusted. | Suggests using 16 font of computer monitor and could be modified, if necessary. |
Font type can be adjusted. | Suggests using Gothic type, but may choose other types. | |
Maximum number of characters within screen. | Should be able to give information with minimum number of letters; Korean 4-6, English 9 letters, and should be legible instantly (e.g., emergency) | |
Electronic Tagging | -Receives signal from Electronic Tag. -Informs preregistered guardians about the signal. | Receives signal once Electronic Tag and a child falls within certain distance. |
Emergency service | Informs when child breaks out of route. | Warns guardians when child breaks time-based activity pattern. |
Informs when detects change of moving speed. | When detecting dramatic change of speed; from 2-3km/h (normal walking speed) to 30-60km/h or stop moving for long period. | |
Guardians can remotely control child’s camera and microphone of mobile phone. | With prior consent, guardians who received warning message may access and control child’s camera, microphone, and siren, which are installed in child’s mobile phone. | |
SMS | Able to transmits short texts | |
Transmits preregistered message in case of emergency. | Child can transmit text message to his/her guardians with one touch. |
Guideline for application design
The chapter introduces an example of a selective application of guidelines for a crime-prevention device for children.
Example of Device Specification
It is possible to set up the screen by age or taste. As users are aged 6 to 12, it has been divided into hotkey method and 10-key method based on children aged 9; however, can be set up in consideration of cognitive ability and manipulability.
Example of Age Specified Set-up
Because it is difficult for a child to conduct an initial setup for oneself, it can be set up with the help of parents as seen below. The initial setup is conducted based on synchronization of a device with a computer. Figure 11 provides an explanation for the initial setup. First, if the home address and school address (destination) are entered, movement section is indicated, and if a private academy or friends are added, destinations are additionally entered as well. At that time, a child enters all possible routes. Although all routings have not been entered, they can be added during the period of collection of data.
Example of Computer-Based Initial Setup Screen
After the setup, the device collects and records the routing of a child during a certain period. At that time, the direction and speed of movement are recorded by time and routes. The minimum unit of time is a week during a certain period and considerations are given for time of end of the class and after-school activities by day; learning schedule is designated by the week. Figure 12 below shows an example of recording changes in the daily movement of a child.
Example of Collection of Routing Data by Time and Day
Information collected for a week is recorded and the longer the period of data collection, more accurate patterns are displayed. The frequency of a child’s movements are indicated as the thickness of a line and a private academy and a friend’s house that have not been initially set up are recognized as abnormal routes to be reported to a protector for confirmation before the addition of the new destination and route. Figure 13 exhibits patternization of collected information.
Example of Patternization Based on Collected Information
This figure refers to collecting routing and speed and direction of movement by unit time in addition to frequency of routing.
It senses abnormal changes in speed, long-time stoppage, and reverse-directional movement on the part of a child to report them to a protector for interaction.
Theoretical examination and statistical research have helped understand serious problems in crimes against children who cannot protect themselves because of physical differences between when children perceive imminent danger. Such research has led to understanding that it is necessary for a third party to intervene for the sake of children. In the process of conducting research on including a third party, finding suggest that effective prevention can be realized when three factors exist (e.g., a child, society (the government or a private company), and a protector) and cooperate with one another. To facilitate such cooperation, a device enabling interaction is required to act as a link among the three factors. Among commercial products that are equipped with such functions, smart phones have been deemed appropriate; however, children are expected to have difficulties using existing smart phones as they are. In this regard, guidelines have been suggested through the application of available technologies and functions based on collected information.
With regard to the effectiveness of the study, it seems desirable that the government, rather than private companies, take the initiative for the welfare of children. This is because more children from low income families could benefit from measures taken by the government as it incurs costs of purchasing and maintaining such devices.
In the process of conducting interviews at welfare facilities, it was found that more sexual assaults are committed by acquaintances than by strangers and unofficial small crimes are frequently committed by relatives, which has not been accurately reported to protect children.
According to the study, it is impossible to protect many children from acquaintances committing a crime; however, it is difficult to prevent ex-con acquaintances from accessing children as they are acquainted with children.
In the process of conducting interviews with experts, other circumstances than usual situations were discussed with regard to evaluation of scenarios, which has been excluded as it appears difficult to consider each circumstance.
The longer the period for collecting data, the more sophisticated patterns; however, it might result in difficulties in preventing crimes that occur in the process of collecting data. Additionally, if it is difficult for parents to use a computer, it might be tricky to get help immediately.
Chromosomic instability is characterized by aneuploidy, allelic losses, and the consecutive accumulation of chromosomal abnormalities [1].
Aneuploidy is widely acknowledged as a leading cause of miscarriage and birth defects in humans and is generally known to be deleterious to the survival of individual cells. However, aneuploidy is also ubiquitous in cancer and is thought to arise as an adaptive response in certain contexts given the technical difficulties to study it and the poor understanding of the involved processes. This dichotomy of aneuploidy has attracted the interest of researchers for over a century, but many studies have reached conflicting conclusions [2] which reflect how difficult it is to understand billions of years of evolution. The emergence of new technology apparently has allowed scientists to revisit the aneuploidy problem and has fueled several recent studies aimed at understanding the effects of aneuploidy on cell physiology with frustrating results. Therefore, the reviewing of those studies, considering previous observations and knowledge, specifically focusing on the effects of aneuploidy on cellular homeostasis, chromosome stability, and adaptation, gives notably fewer useful conclusions than the expected.
Under normal conditions, genomic integrity is given by chromosomes that are assembled by the DNA sequence and proteins, such as histones that play essential structural and functional roles in the transition between active and inactive chromatin states [3]. Histones have a high degree of conservation regarding maintaining the overall structure of the nucleosomal octameric core.
The DNA is hierarchically packed in the nucleus with the aid of proteins forming a complex called chromatin. Histone variants and posttranslational modifications and interactions with chromatin remodeling complexes influence DNA replication, transcription, repair, and recombination.
The study of the chromatin has been focused in the structural aspect only. And even this type of analysis faces, so far, formidable technical challenges. But it’s not simple or even possible to find articles about the flow of energy through the nucleus, nor works on the absence of mitochondria and ATP in the cell nucleus.
Despite the progress in structural studies, we cannot yet answer the question of who controls who. Does chromatin control histones or vice versa or both or other genetic or epigenetic factors?
Eukaryotic chromatin is a highly dynamic macromolecular assembly, which means that it requires energy expenditure continuously, not only to carry out its functions but also to preserve the shape of each component, beginning with the covalent bonds and other types in every molecule, and so on until it reaches to the macromolecule. Most eukaryotic organisms have multiple copies of histone gene; thereby, they are highly conserved in evolution.
The highly complex histone interactions with the nucleosomal core particle are processes that happen in amazing accurate way. All histone domains share a similar structural motif; they form interfaces with each other in several unique ways. This interface specificity is consistent across many variant histone sequences, demonstrating the flexible and adaptable architecture of histone complexes. These are extraordinarily complex biochemical processes that repeat in the same way since the beginning of time.
So far, it is not clear if chromatin inactivation is due to an enzymatic activity and/or a steric block that impedes access by transcription factors or the chromatin remodeling machinery [4]. However, there is an unexpected actor that has not been studied at least in detail: the generation and distribution or flow of energy (from melanin) across the cell nucleus.
It is relatively easy to reverse core histone tails, i.e., by acetylation, methylation, ubiquitination, and phosphorylation, among others [5]. So it is interesting the evolution could happen relatively fast. Evolution is not a process of trial and error, because in that way it would have required time lapse greater than the age of the universe.
Thereby it is possible that the generation and distribution of energy coming from melanin not only releases energy but also is giving information.
CIN is a form of genomic instability in which chromosomes are uneven, such that either whole chromosomes or fractions of chromosomes are duplicated or deleted. The inadequate distribution of DNA to daughter cells upon mitosis results in a failure to maintain euploidy (the correct number of chromosomes) leading to aneuploidy (incorrect number of chromosomes). The daughter cells do not have the same number of chromosomes as the cell they originated from.
In solid and hematological cancers, chromosomal instability is a common occurrence [6], involving gain or loss of whole chromosomes or fraction of chromosomes [7]. Chromosomal instability is thought to be an early event during tumorigenesis or furthermore is involved in tumor initiation.
Cancers result from the accumulation of inherited and somatic mutations in oncogenes and tumor suppressor genes [8]. Supposedly, these genes encode proteins that function in growth regulatory and differentiation pathways. Mutations in those genes increase the net reproductive rate of cells. Mutations in genes increase the rate at which whole chromosomes or large parts of chromosomes are lost or gained during cell division.
Chromosomal instability causes an imbalance in chromosome number (aneuploidy) and an enhanced rate of loss of heterozygosity, which seems as an important mechanism of inactivating tumor suppressor genes. Thereby, cancer results if normal regulatory mechanisms of cell birth and death are disrupted [9].
Maintenance of chromosomal stability requires a statistically nonsignificant gene mutation. Many cancers, if not all, are characterized by a high degree of aneuploidy, result of chromosomal instability mainly. However, linear analysis of chromosomal instability with mathematical models suggests that it does not arise simply because it allows a faster accumulation of carcinogenic mutations. Instead chromosomal instability must arise because other reasons, such as environmental factors, epigenetic events, or as direct consequence of a tumor suppressor gene inactivation. The increased variability alone is not enough explanation for the presence of chromosomal instability in most cancers [10].
The characteristics of cancer cells as aneuploidy, and multiple chromosomal anomalies including gain or loss of whole chromosomes or transposed chromosomal fragments [11], suggest that many cell processes are failing at the same time. The above is compatible with a generalized failure, which is characteristic of energy problems.
The prior intracellular conditions necessary to induce substantive mutations in the genes as well as aneuploidy, which are considered necessary conditions for neoplastic transformation; they are like widespread chaos inside the cell. And in a biological system as evolved as the eukaryote, cell is difficult to explain, unless we take energy into account.
Maybe, so far, the investigation did not consider the energy flow required by the cell nucleus because it does not have mitochondria or ATP. And perhaps that’s why you might think it does not require energy; but the cell nucleus is the largest intracellular organelle, so its energy needs are expected to be substantive; and on the other hand, let us remember that the cell uses energy in many ways, not only to impel each and every one of the amazingly accurate biochemical reactions that make up what we call life, which happen in the same way, with the same sequence, with the same temporality, with the same molecules, with the same location, and in similar proportions since the beginning of the time.
We can think that the eukaryotic cell knows his work perfectly, because he has done it millions of years, millions of times. But the astonishing perfection and characteristic coordination of living entities requires a source of energy that possesses similar characteristics, which are so different from the ATP energy currency prevalent theory.
The cell, therefore, requires energy for many things, not only to carry out the extraordinarily complex biological functions that we are far from understanding but even to preserve the form and stability.
The biochemical processes involved with the hematopoiesis are extraordinarily complex and surprisingly accurate, since they have been repeated in the same way continually since the beginning of time. They can be disturbed by physicochemical alterations in some of their foremost components, for example, the water viscosity is one of the characteristics that is altered with greatest ease.
The bone marrow produces an average of 2.5 million erythrocytes per second, which requires prodigious amounts of precursors of organic molecules and energy. And the production of such a quantity of blood-forming elements requires great and fast coordination between the different and highly biochemical processes involved, since they must happen with an astonishing exactitude, but their main requirement is, without a doubt, energy.
Hematopoiesis in the bone marrow turns ineffective when the biochemical steps that make up and that happen at a staggering speed suffer some alteration due to the presence of contaminants in water, in the air, or in food such as pesticides, herbicides, fertilizers, metals, plastics, solvents, industrial waste, drugs, anesthetic agents, alcohol, drug addiction, extreme climates (cold, heat) etc.
This perturbed hematopoiesis in the bone marrow can lead to cytopenias in the blood and predisposition to acute myeloid leukemia (AML) [12]. There is a delicate interplay between the hematopoietic stem and progenitor cells, stromal cells, and cytokines or chemokines secreted within the microenvironment that is needed to maintain hematopoiesis. Thereby, this microenvironment is at the same time highly complex and highly dynamic, requiring enough available chemical energy at any moment.
The bone marrow is separated into vascular and nonvascular sections. The vascular section contains blood vessels that supply the bone with nutrients and transport CO2, blood stem cells, and mature cells away from the bone and into circulation. The nonvascular sections of the bone marrow are where the hematopoiesis or blood cell formation occurs.
It is contradictory that in nonvascular section of bone marrow, hematopoiesis takes place. Supposedly, the current deep-rooted dogma says that our body can get the energy and mass precursors through a single molecule, this is glucose. However, glucose requires to be transported through blood stream, and surprisingly, the bone marrow section with the highest metabolic rate has no blood vessels at all.
Something similar happens in human retina, where the rod and cone layer, with a metabolic rate almost ten times greater than cerebral cortex, under normal conditions, it has no blood vessels at all.
Bone marrow stromal cells are progenitors of skeletal tissue components such as the bone, cartilage, the hematopoiesis-supporting stroma, and adipocytes and possibly can also form neural and myogenic cells [13].
In average, there are 2.5 trillion of red blood cells in your body at any moment. To maintain this number, under normal conditions, about two and a half million new ones need to be produced every second by your bone marrow. Considering all the tissues and cells in our body, 25 million new cells are being produced each second. We give birth to over 200 billion red cells every day.
Hypoxia or low oxygen availability is a prominent molecular feature of the bone marrow that contributes to both normal and malignant hematopoiesis. Relative to most tissues, the bone marrow microenvironment resides in a particularly hypoxic microenvironment. Oxygen tensions within the bone marrow cavity range from 0.6% to 4.2%, whereas oxygen tensions in most other adult tissues range from 2 to 9% O2 [14]. But because each cell can dissociate the molecule from water, thanks to melanin, then oxygen levels are an indirect indicator of molecular hydrogen levels in tissues.
The purely structural analysis of bone marrow, as it has been to date, confronts, at least two important challenges: (1) substantive technical limitations due to the complex anatomy and biochemistry of the area to study and (2) researchers are trying to decipher 4 billion years of evolution without considering the generation and flow of energy.
Glucose is (supposedly) an important fuel that is used by nearly all organisms through a common set of metabolic pathways. The knowledge of glucose metabolism that is prevalent until today, dates to 1860, with the identification of glycolysis with Louis Pasteur and thereafter in 1937, with the work of Gustav Embden and Otto Fritz Meyerhof [15]. Also, in 1937, the foundations of citric acid cycle were provided by Albert Szent-Gyorgyi, Hans A. Krebs, and William A. Johnson [16]. Two decades later, Peter D. Mitchell hypothesized a chemiosmotic mechanism that supposedly led to the elucidation of the electron transport chain and oxidative phosphorylation [17]. Thereby, at least apparently, the pathway for aerobic glucose metabolism and ATP generation was completed.
However, glucose is the universal precursor of any organic matter in the human body, but it cannot provide the energy that its own metabolism requires. Our circumstantial finding in human retina, during an observational study about the three main worldwide causes of blindness, about the unsuspected intrinsic property of melanin to dissociate the water molecule, like chlorophyll in plants [18], constitutes a disruptive discovery because it destroys existing dogmas deeply rooted and allows to open new ways to knowledge (Figure 1).
Schematic representation of the way in which melanin (center) dissipates the energy it absorbs, dissociating the water molecule, that is, hydrogen and molecular oxygen (H2 and O2), which are released in the form of growing spheres of energy that follow the laws of simple diffusion. The difference in color of the spheres is to remark that a sphere contains higher concentration of H2 and O2, result of the dissociation of the water; the next sphere would contain higher quantity of electrons of high energy, as melanin generates four electrons of high energy for every two molecules of water that is reassociated.
Glucose and ATP have biological functions related mainly to biomass metabolism and not so much with energy. The unexpected intrinsic property of melanin to transform photon energy into chemical energy through the dissociation of water molecule, a role performed supposedly only by chlorophyll in plants, seriously questions the sacrosanct role of glucose and thereby mitochondria and ATP as the primary source of energy for the cells (Figure 2). Furthermore, increased glycosylation has been linked to increased apoptosis [19].
General outline of the very first step in photosynthesis in plants and humans. In plants the chlorophyll dissociates irreversibly the water molecule by expelling the oxygen to the atmosphere. In humans, melanin dissociates the water molecule in reversible form, and for every two water molecules that are reformed, four high-energy electrons are generated.
If we accepted by a moment that our body is able to take energy from the light thanks to the melanin, then the absence of blood vessels in anatomical structures with very high metabolic rate such as photoreceptors of the retina and the avascular region of the bone marrow is now explainable, and it is congruent with the fact that the blood vessels are not able to transport energy (Figures 3 and 4).
When the amount of sunlight is abundant, as in the tropics, the amount of melanin in the skin is higher to regulate the quantity of light that must penetrate the inside of the organism, because even the bone marrow requires luminous energy continuously. It is not surprising that leukemia in white people is more frequent than in dark-skinned people.
When the amount of sunlight is lower, as in cold countries, the amount of melanin in the skin decreases to allow for a greater passage of light, and in that way, the final quantity of light that the body inside needs will remain the right one. The amount of melanin in the skin is determined by the amount of light in the environment where people inhabit.
The absence of capillaries in anatomical regions with a high metabolic cup is explained, at least, for two reasons:
Blood cannot carry on energy. The bloodstream only transports metabolites and their intermediaries. Considering the discovery of the unsuspected bioenergetic role of melanin, the main gas that the blood transports is the CO2. Recall that unknowns about blood are important and numerous, for example, albumin formula is not yet known, and by other side, the similitudes of hemoglobin and chlorophyll molecules are substantive, thereby cannot be discarded that hemoglobin can also dissociate the water molecule, irreversible, like chlorophyll.
If all the capillaries in the human body were lined up in a single file, the line would stretch over 100,000 miles. It’s been estimated that there are 40 billion capillaries in the average human body.
The circulatory system has a complex design and is very extensive, and not all capillaries are permeable at the same time, supposedly something less than half is closed at a given time, otherwise, the volume of circulating blood would not reach to fill them all at the same time.
The intricate circulatory system and its highly complex blood content have functions related to the biology of the structure or mass mainly, but anyway energy expenditure is constantly required, thereby, our body or the cell itself, can capture it from visible and invisible light, and it is transduced into chemical energy by melanin, throughout the dissociation of the water molecule, like chlorophyll in plants and hemoglobin in blood.
Melanin absorbs the full electromagnetic spectrum, visible and invisible light, from radio waves to gamma rays; thereby, the process of transduction is quite similar during night and day, the products being molecular hydrogen (H2) from water dissociation and high-energy electrons (e-) from reformatted water.
The cells are energetically independent, because melanin is found in every one of them, mainly placed in the perinuclear space; therefore, each cell can generate its own energy by dissociating the water molecule (Figure 5).
Melanin is usually not represented in the eukaryotic cell models available in the different sources of information.
The fact is surprising that in the different schemes of the cell, melanin passes unnoticed, very seldom or never depicted in the drawings of the eukaryotic cell. It is necessary to add the melanosomes in the perinuclear space, its main location (Figure 6).
Drawing of eukaryotic cell to which the melanosomes have been added in their most usual location, the perinuclear space, from releasing the energy symmetrically, in all directions, following the laws of simple diffusion. The melanosomes surround the cell nucleus, enveloping it in its entirety, thus constituting a constant source of energy for the largest intracellular organelle, since it contains neither mitochondria nor ATP.
On the other hand, the rarely noticed absence of mitochondria and ATP in the cell nucleus, the largest organelle of the eukaryotic cell, now has a coherence with the presence of melanosomes in the perinuclear space, which surround the nucleus, while they provide it with the energy necessary for its functions (Figure 7).
Schematic representation of the cell nucleus (deep blue) and some melanosomes (black dots) of which emanate the growing spheres (light blue) composed of molecular hydrogen (H2), which transports the energy that is released by dissociating the molecule of water. Molecular hydrogen easily crosses any membrane or barrier inside the cell, so the growing spheres provide energy to both the inside of the cell nucleus and the rest of the organelles located outer of the nucleus by inside cell membrane. That molecular hydrogen does not combine with water is a crucial physic-chemical of hydrogen characteristic that explains the normal displacement of molecular hydrogen (H2) along cytoplasm.
Hence the importance of water in living beings, because it is the perfect substrate for melanin that must always be available and accessible so that the cell can obtain the energy it requires incessantly throught water dissociation.
The water content of the cells is very high, 77% by weight and 94.54% by number of molecules, and the constant need for water (and energy) explains the cerebral caesuras, because in this way the water of the cerebrospinal fluid (CSF) can circulate quickly and deeply, reaching up to the neuron furthest from the ventricles and the subarachnoid space.
Although the discussion of water, so far, is largely focused on its properties as a solvent, it also serves as a ligand. For example, in both hemoglobin and cytochrome oxidase, the binding and subsequent release of water molecules is critical to their proper function and now in ahead with need to add a new possibility: water as substrate to energy production.
The amount of chemical energy in the form of H2 and high-energy electrons that eukaryotic cells need at any moment is surprisingly accurate, and when water or melanin physic-chemical properties are altered by pollution of the surroundings (pesticides, herbicides, fertilizers, metals, plastics, solvents, industrial waste, anesthetic agents, drugs, alcohol, variations in climate, cold, heat; etc.), the cell seems as it goes into imbalance, experiencing a turning-point in evolution.
It is a sequence of chemicals that form information that control how humans are made and how they work. It is a digital-like code, but it is not binary, but quaternary with four distinct items: adenosine (A), cytosine (C), guanine (G), and thymine (T).
These four substances are the fundamental “bits” of information in the genetic code and are called “base pairs” because there are actually two substances per “bit.” Everything else is built on top of this basis of four DNA digits.
However, life origin cannot be explained arising from DNA. The sequence in melanin about dissociation and reformation of water, this is, liquid → gas → liquid → gas → liquid → gas, and so on, can be reduced to 0 (liquid) and 1 (gas), a kind of binary code and a binary code that gives origin and therefore also regulates a quaternary code has room to explain the origin and evolution of life.
The genetic code is not an autonomous system, as any other chemical process, nevertheless complicated, requires energy to be created, to replicate, to carry out their functions, and even to preserve the shape, because the water of the cytoplasm tend to separate the molecules.
The human genome is about 3 billion bases in total, and every human being has 2 copies of this code; one copy from each parent, thereby a human’s cell DNA contains around 6 billion bases.
These 6 billion base pairs are split among 46 chromosomes. Each person gets 2 pairs of chromosomes, 23 from each parent, to total 46 chromosomes per human cell. A chromosome is the largest form of a DNA molecule, with a large sequence of DNA codes, of differing lengths, usually hundreds of millions of base pairs in each chromosome.
Chromosomes are independent molecules of DNA, with the typical double helix, a start and end, but no cycles. Each chromosome has subsequences of DNA bases that encode features, and these are called “genes.” All genes have different lengths. The total number of distinct genes in the human genome is believed to be around 30,000 genes.
Most genes clearly encode the data sequence representing a specific protein that would be synthesized in the precise moment, right temporality, exact amount, and accurate location; therefore, a gene, besides constant energy supply, also requires detailed information to adequately carry out its highly complex functions. All the genes together are only a small part of DNA code. The 30,000 odd genes in human DNA might only make up 4% of human DNA.
The structure of DNA and RNA are very similar, but RNA uses uracil (U) instead of thymine (T). Proteins are a base-20 code using the 20 amino acids. DNA represents a protein that has an ordered sequence of base-4 triplets, using 64 possible values to 20 amino acids.
The following phrase “Chronic Myeloid Leukemia (CLL) is a genetic disease, but not a hereditary disease” is confusing because in any disease some degree of altered gene expression can be expected. Therefore, most leukemia patients have no family history of the disease, and there is no evidence that it can be passed on to the children of someone living with the disease. Occasionally, there are families that may have other members living with leukemia, however, without taking in account the role of toxic compounds capable to perturb the generation and distribution of energy, never was and never will conclusive genetic evidence that family members are predisposed to develop leukemia.
There are diseases that are difficult to classify, i.e., the CLL that is a B-cell lymphoproliferative disorder and is one of the most common adult leukemias [20]. Although the cause remains unknown, a family history of the disease is one of the best characterized risk factors, but more for familial exposure to external toxic compounds than for theoretical minute punctual mutations or loci that cannot be found yet or even less to probe.
This is a long-lasting observation that is congruent with the fact that the genetic code is as perfect as everything else, instead what we see are groups of people (family members or factory workers) exposed to similar toxics.
The family groups share the same customs, the same food, the same house, the same trades or professions, the same environment, etc.
In fact, familial aggregation of the disease has been observed for decades, with multiple reports in the literature of families in whom the occurrence of CLL is greatly enriched with what appears to be almost Mendelian inheritance [21], and worst, there are environmental toxicants so persistent that can be transmitted from parents to child, for instance, through mother’s milk.
“Along with its antibodies, enzymes and general goodness, breast milk also contains dozens of compounds that have been linked to negative health effects,” bisphenol A (BPA, a plastic component), PBDEs (used in flame retardants), perchlorate (used in rocket fuel), perfluorinated chemicals (PFCs, used in floor cleaners and nonstick pans), phthalates (used in plastics), polyvinyl chloride (PVC, commonly known as vinyl), organochlorine pesticides, dioxin, benzene (a known human carcinogen [22]), and the heavy metals cadmium, lead, and mercury as leading offenders [23].
Risk of childhood leukemia is increased for benzene exposures of > 10 μg/m3 associated with traffic [24] and auto repair garages and gasoline stations [25].
Human milk serves as a valuable biological matrix for the assessment of public and environmental health. The more lipophilic the chemical is, the more likely it is to be found in human milk. By the way, the bone marrow has a high content of lipids.
Family predisposition should be understood as epigenetic predisposition, as external factors such as contaminated air, contaminated water, polluted air, contaminated food, pesticides, herbicides, fertilizers, metals, plastics, solvents, industrial waste, shocks, addiction drugs, emotional strains, etc.
Such factors are common to the group of people we define as family; these are father, mother, siblings, and sometimes close relatives who live in the same house.
The exposure to exogenous factors in factory employees is called professional risk, as is the newly sounded case of leukemia in Samsung employees. And the difference between one and another example is only the name that we put, because both in the families and in the factories, the effect of the toxins is similar as they alter the delicate balance between mass and energy in the processes that make up the life, in this case in the complex functions of the bone marrow.
Familial CLL does not appear to differ from sporadic CLL in terms of prognostic markers and clinical outcome [26].
But such external factors only modify the genetic expression in one way or another, but they do not have an effect that we could call direct on the DNA chains or their components. In fact, what is importantly affected is the generation and distribution of energy that emanates from melanin, and hence, general failures, characteristic of disturbances in the generation, and distribution of energy begin to happen, as it happens in any system.
So, it is to date, the identification of genes that predisposes to chronic familial leukemia has been unsuccessful in real terms, which is attributed to various factors, such as the small number of affected individuals susceptible to being studied and technological limitations or maybe because there are many genes affected and each contributes a little [27].
Farming-related exposure and occupational chemicals increase risk of CLL. This is congruent with population-based studies and cohorts that have shown significant family aggregation in CLL and related conditions such as non-Hodgkin lymphoma and other lymphomas; and on the other hand, the absolute risk of a first-degree family member for the development of CLL or a similar disease is very low.
Thereby, linkage studies have been conducted in high-risk CLL families to screen the whole genome for loci that contribute to susceptibility, but no gene mutations have yet been identified by this method.
The accumulation of small, mature-appearing lymphocytes in the bone marrow, blood, and lymphoid tissues in CLL indicates that many germ cells are altered, as well as the daughter cells that are produced. The possibilities that a point mutation (loci) or the joint failure of several genes occurs in a significant portion of the germ cells and that such dysfunction is also expressed in the daughter cells is so unlikely that it has not been able to prove much least explain.
On the contrary, a failure in the generation and distribution of energy from melanin that is repeated in numerous cells both germs and daughters is so feasible that it can easily be demonstrated, as is the case of the experiment described in Section 2.4.
Incidence rates in men are nearly twice as high as in women that can be explained due to men are exposed to environmental toxics more often than women. Although advanced age, white ancestry (less melanin equal to less water dissociation) and family history of hematologic malignancies are risk factors; the etiology of CLL is still not understood more than unknown [28].
In any system, when the failure is widespread, energy is the usual or main cause. And in the case of the eukaryotic cell, alterations are diffuse, so they can be found at any level, including genes, histones, chromosomes, etc. The study of cellular structures separately from the flow of energy leads to biased conclusions, because the mass and the energy are inseparable in the real world.
Any structural alteration of the cell is preceded and accompanied by a disturbance in the flow of energy that comes from the dissociation of the water, which happens inside the melanin. The name of the affected structures or substances (protein, histone, amino acid, nucleotide, gene, chromosome, etc.), does not have more relevance, because the cell ignores it; there is simply an imbalance between mass and energy.
The cell uses the energy in many ways, and it does in a surprisingly exact way, leaving almost nothing at random; as it has done since the beginning of time. When the amount of chemical energy available in the form of molecular hydrogen (H2) and high-energy electrons(e-) is not enough to fill the energy needs of the cell, then the role of chance begins to be significant, so the clinical manifestations also depend on chance, but the basic problem is still the same: balance between mass and energy.
Leukemia is cancer that starts in the tissue that forms blood. Most blood cells develop from cells in the bone marrow called stem cells. In a person with leukemia, the bone marrow makes abnormal white blood cells. The abnormal cells are leukemia cells. Unlike normal blood cells, leukemia cells do not die when they should. These may crowd out abnormal white blood cells, red blood cells, and platelets. This makes it hard for normal blood cells to do their work. The four main types of leukemias are acute lymphoblastic leukemia (ALL), acute myelogenous leukemia (AML), chronic lymphocytic leukemia (CLL), and chronic myelogenous leukemia (CML).
The risk factors already described in leukemia are genetic disorders, radiation exposure, physical and chemical exposures, and chemotherapy.
The greater incidence of leukemia per 100,000 persons is in white races, with 17.5/10.7 (male/female), and in black race, the incidence per 100,000 persons is 12.9/8.0, suggesting that a greater amount of melanin in the skin or body is a protective factor.
Supposedly, a clone of invasive cells may arise at any stage of cell maturation and specialization in the lymphoid, myeloid, or pluripotential stage. The cause of this apparent clonal development is quite unknown in most cases; it appears to involve the rearrangement of sequence of bases on DNA molecules or chromosomal instability syndrome.
External and internal factors such as ionizing radiation and chemicals favor chromosomal anomalies. These random DNA changes will lead to an uncontrollable mitosis of cells.
These leukemic blasts show abnormal behavior infiltrating into the bone marrow, altering, by means of diverse mechanisms, the astonishing accuracies of the normal processes of hematopoiesis (formation of cellular components of blood).
The abnormal cells eventually infiltrate into other organs as such as the spleen, the eye, or the liver, also disrupting the astonishing accuracy of their regular processes.
The blood becomes unable to carry out its functions, and the individual affected will experience within a few days or weeks increased fatigue and infections and will bruise and bleed more easily than they usually would have.
The clinical findings of leukemia, such as thrombocytopenia, anemia, severe infections widespread, bone pain, arthralgias, and involvement of the liver, spleen, thymus, lymph nodes, skin, gums, eye, head (CNS), and neck; it is compatible with a generalized system failure, which is typical of problems in the generation and distribution of energy (from light/melanin/water).
The experiment that we describe below points in that direction (Figures 8–28).
Bone marrow, control group (A), H&E, 5X.
Bone marrow, exposed group (B) to arsenic. H&E, 5X.
Bone marrow. Group C exposed to arsenic and treated at the same time. H&E, 5X.
Bone marrow, control group (A). H&E, 10X.
Bone marrow. Exposed group (B) to arsenic in water. H&E, 10X.
Bone marrow. Group C exposed to arsenic in water and treated at the same time. H&E, 10X.
Bone marrow, control group (A). H&E, 40X.
Bone marrow. Exposed group (B) to arsenic in water. H&E, 40X.
Bone marrow. Group C exposed to arsenic in water and treated at the same time. H&E, 40X.
Bone marrow. Control group A. H&E, 100 X.
Bone marrow. Group B exposed to arsenic in water. H&E, 100X.
Bone marrow. Group C exposed to arsenic in water and treated at the same time. H&E, 100X.
Peripheral blood smear. Control group A. Giemsa stain. 10X.
Peripheral blood smear. Group B exposed to arsenic in water. Giemsa stain, 10X.
Peripheral blood smear. Group C exposed to arsenic in water and treated at the same time. Giemsa stain, 10X.
Peripheral blood smear. Control group A. Giemsa stain, 40X.
Peripheral blood smear. Group B exposed to arsenic in water. Giemsa stain, 40X.
Peripheral blood smear. Group C exposed to arsenic in water and treated at the same time. Giemsa stain, 40X.
Peripheral blood smear. Control group A. Giemsa stain, 100X.
Peripheral blood smear. Group B exposed to arsenic in water. Giemsa stain, 100X.
Peripheral blood smear. Group C exposed to arsenic in water and treated at the same time. Giemsa stain, 100X.
It is a metalloid with atomic number 33, atomic mass of 74.92, and oxidation number: ± 3, 5. It alters multiple metabolic pathways by supposedly uncoupling oxidative phosphorylation. Its effect is not specific; it attacks several organs and is tasteless and odorless. The ingestion of arsenic induces a general failure of the organism, suggesting that arsenic acts by disturbing the amazingly accurate generation and distribution of energy.
Arsenic binds the cofactor sulfhydryl, dihydrolipoate, which inhibits the oxidative metabolic pathway of pyruvate and succinate. The body also replaces arsenic with phosphorus, which inhibits oxidative phosphorylation, but the most significant alteration seems to be the inhibition of sulfhydryl.
Arsenic pentavalent is well absorbed by the GI tract, and it is initially located in blood, coupled with globulin; thereafter, redistribution occurs within following 24 hours mainly to the liver, lungs, intestine, and spleen. Arsenic replaces the phosphorus of the bone, where it remains 30 years or more.
Arsenic, when decoupling the oxidative phosphorylation, induces a significant decrease in the availability of energy of the cell. However, arsenic affects the melanin itself, because they have great affinity with each other, so arsenic (As) not only damages the complex energy distribution system arising from the dissociation of the water molecule by melanin but damages the melanin itself, disturbing the generation of energy, so the damage is widespread.
Arsenic in small doses stimulates the generation and distribution of energy from melanin, so it is, in the seventeenth and eighteenth century, was used by the aristocracy in France to rejuvenate the skin of the face.
Furthermore, in the fifteenth century, William Withering, who discovered digitalis, was a strong proponent of arsenic-based therapies [29]. He argued, “Poisons in small doses are the best medicines; and the best medicines in too large doses are poisonous”.
Thomas Fowler compounded a potassium bicarbonate-based solution of arsenic trioxide (As2O3) and was used empirically to treat a variety of diseases during the eighteenth, nineteenth, and early twentieth centuries [30]. In 1910, Nobel Laureate and Paul Ehrlich developed Salvarsan, an organic arsenical for treating syphilis and trypanosomiasis.
But in higher doses, the opposite effect occurs; therefore, chronic exposure is a serious with arsenic public health problem in some parts of the world [31]. Intoxication by this heavy metal can result from breathing sawdust, workplace air, or arsenic-preserved wood or from ingesting contaminated water, food, or soil [32].
Contamination of groundwater happens by naturally occurring arsenic, also by widespread use of arsenic-containing herbicides and pesticides; its incorporation into feed as a substance to promote the growth of livestock and poultry and its industrial use has caused the environmental arsenic dispersion.
Biomagnification of arsenic is observed in many species of fish and shellfish. Sadly, the average daily human intake of arsenic is approximately 300 μg, mainly ingested with food and water. The World Health Organization (WHO) safe limit for arsenic in drinking water is 0.01 mg/L.
Acute and chronic poisoning of arsenic can be confused with hemorrhagic gastroenteritis, cardiac arrhythmias, and psychiatric disease. In 1878, Boston City Hospital described the effect of Fowler’s solution on the reduction of white blood cells in two normal people and one patient with “leukocythemia” [33].
Subsequently, As2O3 was administered as a primary antileukemic agent until it was replaced by radiation therapy. In 1930, the hematologic use of arsenic experienced a resurgence in popularity, when its efficacy was reported in patients with chronic myelogenous leukemia [34].
Until supplanted by modern chemotherapy, arsenic trioxide after radiation was considered the most effective treatment for CML and other types of leukemia. Recently, reports from China have described the induction of clinical and hematological responses by arsenic trioxide in patients with de novo and relapsed acute promyelocytic leukemia (APL) [35]. This is an important observation, since around 20–30% of patients with this form of acute myelogenous leukemia relapse despite treatment with all-trans retinoic acid and combination chemotherapy.
Arsenic treatment was not associated with bone marrow suppression and produced only limited side effects. Thereby, arsenic trioxide (Trisenox®) was approved for the treatment of relapsed or refractory APL by the US Food and Drug Administration in September 2000.
It is interesting that the therapeutic application of arsenic in low dose is widely used. Due to generalized systemic effects, so far, a clear explanation about its therapeutic effects is not available. It is possible that other similar therapies, based in toxic compounds as all-trans retinoic acid and daunorubicin/doxorubicin/epirubicin/idarubicin, an anthracycline-related compounds [36], are altering gene expression (genotoxic agents) through different pathways; thereby their effect is generalized, so it can be expected that it also affects the generation and flow of energy from melanin.
Arsenic, all trans-retinoic acid, and anthracycline-related compounds, when it is used at very high doses, then the amazingly accurate process of generation and distribution of energy, from the dissociation of the water molecule by melanin, stops almost completely, so death occurs in minutes.
Therefore, the administration of arsenic in laboratory animals is an easy way to induce general dysfunction or failure, as we are altering a fundamental process of life as is the generation and distribution of melanin energy.
Our working hypothesis was to induce widespread failure in rats and to study the effects on different tissues, such as the lung, kidney, liver, etc. [37]. The results in kidney and liver were published already. This is the first publication of results in the bone marrow.
There were 3 groups of 10 Wistar rats each one, all males, adults. Group A was control. Group B was the exposed group to arsenic in water. The administration of pentavalent arsenic was 0.50 mg/L in the water and administered ad libitum. Group C was the group exposed to arsenic in the same way as group B and treated at the same time with a novel formula that restores the balance between mass and energy.
The results of the experiment were according to what was expected. The administration of pentavalent arsenic was 0.50 mg/L in the water. Arsenic is a toxic and a carcinogen; among the noncarcinogenic harmful effects of this metalloid, the most common associated with its ingestion are those presented in the skin, hyperpigmentation, agent hypopigmentation, and hyperkeratosis, damage to the cardiovascular system; renal and hepatic alterations, development of peripheral neuropathies and encephalopathies; and its capacity of endocrine disruptor related to the development of diabetes. The relationship between the presence of arsenic in water in several regions and the increase in the presence and mortality of the bladder, lung, kidney, and hepatic cancer has been recognized in the potentially exposed populations.
As described in literature and as we observed in the histological slides of the group of animals exposed to arsenic (group B), the damage is generalized. It would be necessary to elaborate multiple conjectures to try to explain the diffuse impairment to organs and systems that are produced from the ingestion of arsenic in the water. However, the significant disturbance caused by arsenic in the generation and distribution of energy derived from melanin, it could explain the different levels of microscopic alterations observed in the histological stains of the lung, kidney, liver, spleen, bone marrow, etc.
According to the adage that good experiments are those with few animals, many results are obtained; group B was constituted with only ten animals, and the size of the effect of arsenic was substantive. On the other hand, it fulfilled the observed fact that in any system, when the fault is widespread, we must think first of energy.
So, we can think that, in this experiment, we could induce and thereby demonstrated in a reasonable way that the widespread failure caused by arsenic ingestion is due to the perturbations of the generation and distribution of energy derived from melanin.
The findings of group C—exposed and treated at the same time—cast better than expected findings, because on the one hand, the generalized toxicity of arsenic manifested itself again, but significantly decreased by the simultaneous administration of the therapeutic drug. And on the other hand, we could demonstrate the usefulness of our therapy to prevent and treat the general failure of organs and systems that is induced with the ingestion of arsenic that also gives a real hope for the many patients in similar situation.
The improvement with the treatment was also manifested in the different tissues studied, which is consistent with the fact that, by reducing the alteration in the generation and distribution of energy, the improvement is detectable at the microscopic level and it is also a general improvement.
The induced changes during the experiment with the exposure and treatment mean widespread effects, positive and negatives. The size of the effect is noticeable in both cases, exposure and treatment. And the magnitude of the effect was similar in other tissues in which biopsy was taken.
The observable findings under the microscope are very interesting, as they involve numerous variables such as cell size, shape, color changes, etc. But there are so many changes that are hard to explain based only in analysis of observable structures.
The improvement in group C (treated and exposed) is notorious. Thereby, two hypotheses were tested with one experiment, few animals, and many results, a good experiment. The way melanin releases energy, symmetrically and in all directions, in the manner of growing spheres that follow the laws of simple diffusion, flooding of molecular hydrogen cytosol, allows the vast majority of chemical reactions to be driven by these hydrogen molecules, which are not combined with water, so they only move through it reaching until the last corner of the eukaryotic cells with its precious energy charge and its powerful antioxidant effect.
Therefore, when the generation and distribution of energy that comes from melanin is altered or at least disturbed by environmental factors, of a chemical or physical nature, many biochemical processes are randomly affected by the decrease in energy levels.
We must not forget that intracellular biochemical processes are surprisingly accurate in every one of their physical and chemical characteristics, as they have been since the beginning of time. But the exact chemical reactions require in turn to be driven by an exact amount of energy. And only a molecule as wonderful as melanin has the necessary bioenergetic capacity.
The multiple tissue changes observable in the histological images of the rat and arsenic experiment underpin the concept of the unsuspected bioenergetic role of melanin. The structural changes susceptible to being observed in the light microscope and stains Giemsa, in the case of the smears, and hematoxylin and eosin, in the case of histological cuts, allow to glimpse that the number of factors involved is vast.
And analyzing one by one from a structural point of view, without considering the incessant flow of energy, would lead us to the same errors that we currently observe in the literature. It is a fact that the cell uses energy in many ways, and in studying cell biology, we must be aware that even to study ultrastructure alone, our technological resources are relatively limited.
The changes that we observed in the experiment are very interesting and highly significant, it would be very difficult to explain them based on genes, since genes are not autonomous, because they depend on the energy and surrounding cell scaffolding to replicate, express themselves and even to preserve the form, stability and function. They are also immersed in a highly complex biological system, with which they interact in a way that is not yet understood, but all the components of this highly complex system depend entirely on the energy that emanates from the melanin, so that by restoring the generation and Energy distribution, which it is so fundamental, then it is possible to explain the positive and negative changes that we could observe under the light microscope.
Characteristically, energy failures produce widespread alterations, we can say otherwise, when the problem of energy is improved or corrected, then many processes are in turn restored, which can be detected by microscopically examining the cellular structure, which is all what we can value, being an indirect indicator of the flow of energy.
Simplistically, if the ultrastructure is altered, the generation and distribution of energy is indeed disturbed, in a directly proportional form, and vice versa. That is why, despite many efforts, trying to explain diseases such as leukemia, based on purely observations of the structure, for example genes, histones or chromosomes, has given so far poor results, it is necessary to consider at the same time the highly dynamic generation and distribution of energy.
The current medicine is ensnared in the dogma that a single molecule, glucose, provides energy and mass at the same time; furthermore it also considers that only the chlorophyll of plants can transform the luminous energy into chemical energy by means of the dissociation of the water molecule. On the other hand, analyzing in a separate way the microstructure (mass) and the energy flow in the cells has led to important biases since the mass and energy are inseparable in the real world.
Trying to find the cause or explanation of diseases, based merely on the study of observable of micro or ultrastructural alterations has produced very limited results, because the cell is a highly dynamic living entity, in which the flow of energy and mass are incessant and inseparable. The optimal thing would be to study both phenomena (mass and energy) at the same time and in real time, which is not currently feasible.
During the study of biological phenomena, we must keep in mind that the size of the effect should be large [38]; otherwise, when the size of the effect is small, we end up studying in detail some prevalent bias. Bias is defined as the combination of various design, data, analysis, and presentation factors that tend to produce research findings when they should not be produced. There is an increasing concern that most current published research findings are false. The extremely large studies may be more likely to find a formally statistically significant difference for a trivial effect that is not meaningfully different from the null hypothesis [39].
It is likely that current unawareness of physicians about the human body’s ability to take light energy and the impoverishment of it by environment toxicants is a significant factor of the poor performance of health systems. For instance, in the USA, 225000 annual deaths are estimated due to unnecessary surgeries, errors in patient medication, errors of different types in hospitals; nosocomial infections, and adverse effects of medications [40]. Most of the data are derived from studies in hospitalized patients, thereby are estimates of death only and do not include adverse effects associated with disability or discomfort.
Therefore between 4% and 18% experience adverse effects in outpatient settings, with 116 million extra physician visits, 8 million hospitalizations, 3 million long-term admissions, 199.000 additional deaths, and $77 billion in extra costs [41].
The specific alterations of the genes cannot explain the diseases called genetic or hereditary, because the influence of genes is relatively limited and highly complex, i.e., the cystic fibrosis gene, codify to almost 600 proteins. Furthermore, disturbances in the generation and distribution of energy from melanin can manifest—structurally—as alterations in the genes, since the replication and the expression of chromosomes require an astonishing accurate source and level of available energy in the form of molecular hydrogen (H2) and high-energy electrons (e-).
And if we consider the effects of energy flow not only in the cell nucleus, histones, genes, and chromosomes but also in the scaffolding around them, things become even more incomprehensible to us; but to have understood that the energy of the cell comes from the light-melanin-water triad in order of abundance in the universe, and that it does not come from glucose, represents a critical advance in the knowledge, which can be translated in an expedited way to the clinic, for the benefit of the patient, especially if we take into account the role of environmental toxins and their detrimental and generalized effects on the amazingly accurate process of generation and distribution of energy by melanin.
This work was supported by Human Photosynthesis® Research Center, Aguascalientes 2000, México.
IntechOpen's Authorship Policy is based on ICMJE criteria for authorship. In order to be identified as an Author, one must:
',metaTitle:"Authorship Policy",metaDescription:"IN TECH's Authorship Policy is based on ICMJE criteria for authorship. In order to be identified as an Author, one must:",metaKeywords:null,canonicalURL:"/page/authorship-policy",contentRaw:'[{"type":"htmlEditorComponent","content":"All contributors who meet the three criteria should be listed as Authors. Their exact contributions should be described in the manuscript at the time of submission.
\\n\\nConversely, all contributors who don't meet the three criteria should be listed in the acknowledgments section of the manuscript, along with a short description of their contributions.
\\n\\nCHANGES IN AUTHORSHIP
\\n\\nIf it is necessary to make changes to the Authors' list after a manuscript has been submitted or published, the corresponding Author must provide a valid reason to amend the list of Authors. All listed Authors must verify and approve the proposed changes in order for them to be made.
\\n\\nAFFILIATION
\\n\\nAuthors are responsible for ensuring all addresses and emails provided are correct. The affiliation(s) of all authors should be the affiliation(s) where the research was conducted. No changes to the affiliation(s) can be made after the chapter is published.
\\n\\nPolicy last updated: 2017-05-29
\\n"}]'},components:[{type:"htmlEditorComponent",content:"All contributors who meet the three criteria should be listed as Authors. Their exact contributions should be described in the manuscript at the time of submission.
\n\nConversely, all contributors who don't meet the three criteria should be listed in the acknowledgments section of the manuscript, along with a short description of their contributions.
\n\nCHANGES IN AUTHORSHIP
\n\nIf it is necessary to make changes to the Authors' list after a manuscript has been submitted or published, the corresponding Author must provide a valid reason to amend the list of Authors. All listed Authors must verify and approve the proposed changes in order for them to be made.
\n\nAFFILIATION
\n\nAuthors are responsible for ensuring all addresses and emails provided are correct. The affiliation(s) of all authors should be the affiliation(s) where the research was conducted. No changes to the affiliation(s) can be made after the chapter is published.
\n\nPolicy last updated: 2017-05-29
\n"}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:null},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"Vienna University of Technology",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:null},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:"Assist. Prof.",profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:"Postdoctoral researcher",profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"University Joseph Fourier (Grenoble I)",country:null}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:null}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:451},{group:"region",caption:"Middle and South America",value:2,count:605},{group:"region",caption:"Africa",value:3,count:199},{group:"region",caption:"Asia",value:4,count:1081},{group:"region",caption:"Australia and Oceania",value:5,count:75},{group:"region",caption:"Europe",value:6,count:1470}],offset:12,limit:12,total:103552},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{},books:[{type:"book",id:"6841",title:"Environmental Impact of Coal Mining",subtitle:null,isOpenForSubmission:!0,hash:"7a8afe368fe4e28ac98644281db99678",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6841.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6842",title:"Aerosol Generation",subtitle:null,isOpenForSubmission:!0,hash:"efe043290c576559ee15f293bc924f65",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6842.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6857",title:"Sol-gel Synthesis of Nanoparticles",subtitle:null,isOpenForSubmission:!0,hash:"04543c86f1b644f12f1e3294d9bb9b75",slug:null,bookSignature:"Dr. Kalsoom Akhtar, Dr. Sher Bahadar Khan, Dr. Fayaz Ali and Dr. Abdullah M. Asiri",coverURL:"https://cdn.intechopen.com/books/images_new/6857.jpg",editedByType:null,editors:[{id:"245469",title:"Dr.",name:"Kalsoom",surname:"Akhtar",slug:"kalsoom-akhtar",fullName:"Kalsoom Akhtar"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6865",title:"Avatars - 3D Characters or Humanoid Robots as a Key for Future Interaction",subtitle:null,isOpenForSubmission:!0,hash:"e208316a62e4ab5b042486aea682ee18",slug:null,bookSignature:"Prof. Ahmad Hoirul Basori",coverURL:"https://cdn.intechopen.com/books/images_new/6865.jpg",editedByType:null,editors:[{id:"13394",title:"Prof.",name:"Ahmad Hoirul",surname:"Basori",slug:"ahmad-hoirul-basori",fullName:"Ahmad Hoirul Basori"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6867",title:"Hygiene and Health",subtitle:null,isOpenForSubmission:!0,hash:"8822409955307b3fca03816188d475e9",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6867.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6868",title:"Industrial Use of Electrolysis",subtitle:null,isOpenForSubmission:!0,hash:"ee3411b8e247c50e9dc81fa86219ae3c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6868.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6877",title:"Environmental Health",subtitle:null,isOpenForSubmission:!0,hash:"94bdbe3ffbda57de2952961bb286dba5",slug:null,bookSignature:"Prof. Abdelhadi Makan",coverURL:"https://cdn.intechopen.com/books/images_new/6877.jpg",editedByType:null,editors:[{id:"247727",title:"Prof.",name:"Abdelhadi",surname:"Makan",slug:"abdelhadi-makan",fullName:"Abdelhadi Makan"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6899",title:"Chronobiology",subtitle:null,isOpenForSubmission:!0,hash:"521dfb38a216470da6f8f7d02469832c",slug:null,bookSignature:"Dr. Pavol Svorc",coverURL:"https://cdn.intechopen.com/books/images_new/6899.jpg",editedByType:null,editors:[{id:"169212",title:"Dr.",name:"Pavol",surname:"Svorc",slug:"pavol-svorc",fullName:"Pavol Svorc"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6901",title:"Chemical Ecology and Semiochemistry",subtitle:null,isOpenForSubmission:!0,hash:"b0e57b577bb258d8d3290e46066153b1",slug:null,bookSignature:"Prof. Sajal Ray",coverURL:"https://cdn.intechopen.com/books/images_new/6901.jpg",editedByType:null,editors:[{id:"173697",title:"Prof.",name:"Sajal",surname:"Ray",slug:"sajal-ray",fullName:"Sajal Ray"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6908",title:"Cellular Senescence",subtitle:null,isOpenForSubmission:!0,hash:"10449bfc4a1c33bf377190ce699ec129",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/6908.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6914",title:"Proteomics Technologies and Applications",subtitle:null,isOpenForSubmission:!0,hash:"a38a096c9acaf7cad951db42497b23ac",slug:null,bookSignature:"Prof. Ibrokhim Y. Abdurakhmonov",coverURL:"https://cdn.intechopen.com/books/images_new/6914.jpg",editedByType:null,editors:[{id:"124834",title:"Prof.",name:"Ibrokhim",surname:"Abdurakhmonov",slug:"ibrokhim-abdurakhmonov",fullName:"Ibrokhim Abdurakhmonov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6916",title:"Fabry Disease - Overview and Perspectives",subtitle:null,isOpenForSubmission:!0,hash:"b10f37a93e56d6b0bd21e113c2748d32",slug:null,bookSignature:"Prof. Ane Claudia Fernandes Nunes",coverURL:"https://cdn.intechopen.com/books/images_new/6916.jpg",editedByType:null,editors:[{id:"55270",title:"Prof.",name:"Ane",surname:"Nunes",slug:"ane-nunes",fullName:"Ane Nunes"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:29},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:31},{group:"topic",caption:"Business, Management and Economics",value:7,count:7},{group:"topic",caption:"Chemistry",value:8,count:32},{group:"topic",caption:"Computer and Information Science",value:9,count:20},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:8},{group:"topic",caption:"Engineering",value:11,count:92},{group:"topic",caption:"Environmental Sciences",value:12,count:12},{group:"topic",caption:"Immunology and Microbiology",value:13,count:10},{group:"topic",caption:"Materials Science",value:14,count:20},{group:"topic",caption:"Mathematics",value:15,count:6},{group:"topic",caption:"Medicine",value:16,count:99},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:8},{group:"topic",caption:"Neuroscience",value:18,count:4},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:2},{group:"topic",caption:"Physics",value:20,count:16},{group:"topic",caption:"Psychology",value:21,count:1},{group:"topic",caption:"Robotics",value:22,count:3},{group:"topic",caption:"Social Sciences",value:23,count:16},{group:"topic",caption:"Technology",value:24,count:8},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:1},{group:"topic",caption:"Composite Materials",value:156,count:1}],offset:12,limit:12,total:1105},popularBooks:{featuredBooks:[{type:"book",id:"8122",title:"Vectors and Vector-Borne Zoonotic Diseases",subtitle:null,isOpenForSubmission:!1,hash:"5a088c3ab82e499c8d5d2f8ceec6a601",slug:"vectors-and-vector-borne-zoonotic-diseases",bookSignature:"Sara Savić",coverURL:"https://cdn.intechopen.com/books/images_new/8122.jpg",editors:[{id:"92185",title:"Dr.",name:"Sara",middleName:null,surname:"Savic",slug:"sara-savic",fullName:"Sara Savic"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7486",title:"Advanced Sorption Process Applications",subtitle:null,isOpenForSubmission:!1,hash:"bc77a8d4e58d7c7eb4d2137adb0f0f34",slug:"advanced-sorption-process-applications",bookSignature:"Serpil Edebali",coverURL:"https://cdn.intechopen.com/books/images_new/7486.jpg",editors:[{id:"223744",title:"Dr.",name:"Serpil",middleName:null,surname:"Edebali",slug:"serpil-edebali",fullName:"Serpil Edebali"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7694",title:"Simulation Modelling Practice and Theory",subtitle:null,isOpenForSubmission:!1,hash:"f955d03d619f68fec7b6f3518e792e6f",slug:"simulation-modelling-practice-and-theory",bookSignature:"Evon Abu-Taieh and Asim Abdel El Sheikh Ahmed",coverURL:"https://cdn.intechopen.com/books/images_new/7694.jpg",editors:[{id:"223522",title:"Dr.",name:"Evon",middleName:"M.O.",surname:"Abu-Taieh",slug:"evon-abu-taieh",fullName:"Evon Abu-Taieh"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"6797",title:"Chalcogen Chemistry",subtitle:null,isOpenForSubmission:!1,hash:"721946bc223c90085bafaf501d5b7329",slug:"chalcogen-chemistry",bookSignature:"Peter Papoh Ndibewu",coverURL:"https://cdn.intechopen.com/books/images_new/6797.jpg",editors:[{id:"87629",title:"Prof.",name:"Peter",middleName:"Papoh",surname:"Ndibewu",slug:"peter-ndibewu",fullName:"Peter Ndibewu"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3568",title:"Recent Advances in Plant in vitro Culture",subtitle:null,isOpenForSubmission:!1,hash:"830bbb601742c85a3fb0eeafe1454c43",slug:"recent-advances-in-plant-in-vitro-culture",bookSignature:"Annarita Leva and Laura M. R. Rinaldi",coverURL:"https://cdn.intechopen.com/books/images_new/3568.jpg",editors:[{id:"142145",title:"Dr.",name:"Annarita",middleName:null,surname:"Leva",slug:"annarita-leva",fullName:"Annarita Leva"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"1770",title:"Gel Electrophoresis",subtitle:"Principles and Basics",isOpenForSubmission:!1,hash:"279701f6c802cf02deef45103e0611ff",slug:"gel-electrophoresis-principles-and-basics",bookSignature:"Sameh Magdeldin",coverURL:"https://cdn.intechopen.com/books/images_new/1770.jpg",editors:[{id:"123648",title:"Dr.",name:"Sameh",middleName:null,surname:"Magdeldin",slug:"sameh-magdeldin",fullName:"Sameh Magdeldin"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"632",title:"Wide Spectra of Quality Control",subtitle:null,isOpenForSubmission:!1,hash:"9f7ce64f86daee44a8c5604e8924de1c",slug:"wide-spectra-of-quality-control",bookSignature:"Isin Akyar",coverURL:"https://cdn.intechopen.com/books/images_new/632.jpg",editors:[{id:"36323",title:"Dr.",name:"Isin",middleName:null,surname:"Akyar",slug:"isin-akyar",fullName:"Isin Akyar"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7452",title:"Microbiology of Urinary Tract Infections",subtitle:"Microbial Agents and Predisposing Factors",isOpenForSubmission:!1,hash:"e99363f3cb1fe89c406f4934a23033d0",slug:"microbiology-of-urinary-tract-infections-microbial-agents-and-predisposing-factors",bookSignature:"Payam Behzadi",coverURL:"https://cdn.intechopen.com/books/images_new/7452.jpg",editors:[{id:"45803",title:"Ph.D.",name:"Payam",middleName:null,surname:"Behzadi",slug:"payam-behzadi",fullName:"Payam Behzadi"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3037",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 3",isOpenForSubmission:!1,hash:"1de63ac4f2c398a1304a7c08ee883655",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-3",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/3037.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2175",title:"Risk Management",subtitle:"Current Issues and Challenges",isOpenForSubmission:!1,hash:"c6406ba890ef4569efd8298e1121685d",slug:"risk-management-current-issues-and-challenges",bookSignature:"Nerija Banaitiene",coverURL:"https://cdn.intechopen.com/books/images_new/2175.jpg",editors:[{id:"139414",title:"Dr.",name:"Nerija",middleName:null,surname:"Banaitiene",slug:"nerija-banaitiene",fullName:"Nerija Banaitiene"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"1667",title:"A Bird's-Eye View of Veterinary Medicine",subtitle:null,isOpenForSubmission:!1,hash:"7be827d70aa0311258d658f729670887",slug:"a-bird-s-eye-view-of-veterinary-medicine",bookSignature:"Carlos C. Perez-Marin",coverURL:"https://cdn.intechopen.com/books/images_new/1667.jpg",editors:[{id:"25632",title:"Dr.",name:"Carlos C.",middleName:null,surname:"Perez-Marin",slug:"carlos-c.-perez-marin",fullName:"Carlos C. Perez-Marin"}],productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:1816},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"8122",title:"Vectors and Vector-Borne Zoonotic Diseases",subtitle:null,isOpenForSubmission:!1,hash:"5a088c3ab82e499c8d5d2f8ceec6a601",slug:"vectors-and-vector-borne-zoonotic-diseases",bookSignature:"Sara Savić",coverURL:"https://cdn.intechopen.com/books/images_new/8122.jpg",editors:[{id:"92185",title:"Dr.",name:"Sara",middleName:null,surname:"Savic",slug:"sara-savic",fullName:"Sara Savic"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7486",title:"Advanced Sorption Process Applications",subtitle:null,isOpenForSubmission:!1,hash:"bc77a8d4e58d7c7eb4d2137adb0f0f34",slug:"advanced-sorption-process-applications",bookSignature:"Serpil Edebali",coverURL:"https://cdn.intechopen.com/books/images_new/7486.jpg",editors:[{id:"223744",title:"Dr.",name:"Serpil",middleName:null,surname:"Edebali",slug:"serpil-edebali",fullName:"Serpil Edebali"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7694",title:"Simulation Modelling Practice and Theory",subtitle:null,isOpenForSubmission:!1,hash:"f955d03d619f68fec7b6f3518e792e6f",slug:"simulation-modelling-practice-and-theory",bookSignature:"Evon Abu-Taieh and Asim Abdel El Sheikh Ahmed",coverURL:"https://cdn.intechopen.com/books/images_new/7694.jpg",editors:[{id:"223522",title:"Dr.",name:"Evon",middleName:"M.O.",surname:"Abu-Taieh",slug:"evon-abu-taieh",fullName:"Evon Abu-Taieh"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"6797",title:"Chalcogen Chemistry",subtitle:null,isOpenForSubmission:!1,hash:"721946bc223c90085bafaf501d5b7329",slug:"chalcogen-chemistry",bookSignature:"Peter Papoh Ndibewu",coverURL:"https://cdn.intechopen.com/books/images_new/6797.jpg",editors:[{id:"87629",title:"Prof.",name:"Peter",middleName:"Papoh",surname:"Ndibewu",slug:"peter-ndibewu",fullName:"Peter Ndibewu"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"2160",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 1",isOpenForSubmission:!1,hash:"dd9c658341fbd264ed4f8d9e6aa8ca29",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-1",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/2160.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3568",title:"Recent Advances in Plant in vitro Culture",subtitle:null,isOpenForSubmission:!1,hash:"830bbb601742c85a3fb0eeafe1454c43",slug:"recent-advances-in-plant-in-vitro-culture",bookSignature:"Annarita Leva and Laura M. R. Rinaldi",coverURL:"https://cdn.intechopen.com/books/images_new/3568.jpg",editors:[{id:"142145",title:"Dr.",name:"Annarita",middleName:null,surname:"Leva",slug:"annarita-leva",fullName:"Annarita Leva"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"1770",title:"Gel Electrophoresis",subtitle:"Principles and Basics",isOpenForSubmission:!1,hash:"279701f6c802cf02deef45103e0611ff",slug:"gel-electrophoresis-principles-and-basics",bookSignature:"Sameh Magdeldin",coverURL:"https://cdn.intechopen.com/books/images_new/1770.jpg",editors:[{id:"123648",title:"Dr.",name:"Sameh",middleName:null,surname:"Magdeldin",slug:"sameh-magdeldin",fullName:"Sameh Magdeldin"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"632",title:"Wide Spectra of Quality Control",subtitle:null,isOpenForSubmission:!1,hash:"9f7ce64f86daee44a8c5604e8924de1c",slug:"wide-spectra-of-quality-control",bookSignature:"Isin Akyar",coverURL:"https://cdn.intechopen.com/books/images_new/632.jpg",editors:[{id:"36323",title:"Dr.",name:"Isin",middleName:null,surname:"Akyar",slug:"isin-akyar",fullName:"Isin Akyar"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7452",title:"Microbiology of Urinary Tract Infections",subtitle:"Microbial Agents and Predisposing Factors",isOpenForSubmission:!1,hash:"e99363f3cb1fe89c406f4934a23033d0",slug:"microbiology-of-urinary-tract-infections-microbial-agents-and-predisposing-factors",bookSignature:"Payam Behzadi",coverURL:"https://cdn.intechopen.com/books/images_new/7452.jpg",editors:[{id:"45803",title:"Ph.D.",name:"Payam",middleName:null,surname:"Behzadi",slug:"payam-behzadi",fullName:"Payam Behzadi"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"3037",title:"MATLAB",subtitle:"A Fundamental Tool for Scientific Computing and Engineering Applications - Volume 3",isOpenForSubmission:!1,hash:"1de63ac4f2c398a1304a7c08ee883655",slug:"matlab-a-fundamental-tool-for-scientific-computing-and-engineering-applications-volume-3",bookSignature:"Vasilios N. Katsikis",coverURL:"https://cdn.intechopen.com/books/images_new/3037.jpg",editors:[{id:"12289",title:"Prof.",name:"Vasilios",middleName:"N.",surname:"Katsikis",slug:"vasilios-katsikis",fullName:"Vasilios Katsikis"}],productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"7694",title:"Simulation Modelling Practice and Theory",subtitle:null,isOpenForSubmission:!1,hash:"f955d03d619f68fec7b6f3518e792e6f",slug:"simulation-modelling-practice-and-theory",bookSignature:"Evon Abu-Taieh and Asim Abdel El Sheikh Ahmed",coverURL:"https://cdn.intechopen.com/books/images_new/7694.jpg",editedByType:"Edited by",editors:[{id:"223522",title:"Dr.",name:"Evon",middleName:"M.O.",surname:"Abu-Taieh",slug:"evon-abu-taieh",fullName:"Evon Abu-Taieh"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7695",title:"Green Energy Advances",subtitle:null,isOpenForSubmission:!1,hash:"ca498ae0f824bac0c43f5cfb011d8e9c",slug:"green-energy-advances",bookSignature:"Diana Enescu",coverURL:"https://cdn.intechopen.com/books/images_new/7695.jpg",editedByType:"Edited by",editors:[{id:"226207",title:"Ph.D.",name:"Diana",middleName:null,surname:"Enescu",slug:"diana-enescu",fullName:"Diana Enescu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7199",title:"Charged Particles",subtitle:null,isOpenForSubmission:!1,hash:"c456f670b68b3512e9e9866f9837fd98",slug:"charged-particles",bookSignature:"Malek Maaza and Mahmoud Izerrouken",coverURL:"https://cdn.intechopen.com/books/images_new/7199.jpg",editedByType:"Edited by",editors:[{id:"192286",title:"Prof.",name:"Malek",middleName:null,surname:"Maaza",slug:"malek-maaza",fullName:"Malek Maaza"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7465",title:"Trends in Geomatics",subtitle:"An Earth Science Perspective",isOpenForSubmission:!1,hash:"a32ff40d6c47e2b545b92d5075508c9c",slug:"trends-in-geomatics-an-earth-science-perspective",bookSignature:"Rifaat Abdalla",coverURL:"https://cdn.intechopen.com/books/images_new/7465.jpg",editedByType:"Edited by",editors:[{id:"222877",title:"Dr.",name:"Rifaat",middleName:null,surname:"Abdalla",slug:"rifaat-abdalla",fullName:"Rifaat Abdalla"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6710",title:"Update on Multiple Myeloma",subtitle:null,isOpenForSubmission:!1,hash:"229a96a2de131b3ac67f9f41b91de8f8",slug:"update-on-multiple-myeloma",bookSignature:"Khalid Ahmed Al-Anazi",coverURL:"https://cdn.intechopen.com/books/images_new/6710.jpg",editedByType:"Edited by",editors:[{id:"37255",title:"Dr.",name:"Khalid Ahmed",middleName:null,surname:"Al-Anazi",slug:"khalid-ahmed-al-anazi",fullName:"Khalid Ahmed Al-Anazi"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7225",title:"Dam Engineering",subtitle:null,isOpenForSubmission:!1,hash:"a845c7ddd9193f56a6bc91bc22bc503d",slug:"dam-engineering",bookSignature:"Hasan Tosun",coverURL:"https://cdn.intechopen.com/books/images_new/7225.jpg",editedByType:"Edited by",editors:[{id:"79083",title:"Prof.",name:"Hasan",middleName:null,surname:"Tosun",slug:"hasan-tosun",fullName:"Hasan Tosun"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7486",title:"Advanced Sorption Process Applications",subtitle:null,isOpenForSubmission:!1,hash:"bc77a8d4e58d7c7eb4d2137adb0f0f34",slug:"advanced-sorption-process-applications",bookSignature:"Serpil Edebali",coverURL:"https://cdn.intechopen.com/books/images_new/7486.jpg",editedByType:"Edited by",editors:[{id:"223744",title:"Dr.",name:"Serpil",middleName:null,surname:"Edebali",slug:"serpil-edebali",fullName:"Serpil Edebali"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6722",title:"Acoustic Emission Technology for High Power Microwave Radar Tubes",subtitle:null,isOpenForSubmission:!1,hash:"ef80c9b4123e022ea69a4bf777088522",slug:"acoustic-emission-technology-for-high-power-microwave-radar-tubes",bookSignature:"Narayan R. Joshi, Ayax D. Ramirez, Stephen D. Russell and David W. Brock",coverURL:"https://cdn.intechopen.com/books/images_new/6722.jpg",editedByType:"Authored by",editors:[{id:"95431",title:"Dr.",name:"Narayan",middleName:"R.",surname:"Joshi",slug:"narayan-joshi",fullName:"Narayan Joshi"}],productType:{id:"3",chapterContentType:"chapter",authoredCaption:"Authored by"}},{type:"book",id:"7237",title:"Energy-Efficient Approaches in Industrial Applications",subtitle:null,isOpenForSubmission:!1,hash:"a7b403a3af7828987f078b91334839bb",slug:"energy-efficient-approaches-in-industrial-applications",bookSignature:"Murat Eyvaz, Abdülkerim Gok and Ebubekir Yüksel",coverURL:"https://cdn.intechopen.com/books/images_new/7237.jpg",editedByType:"Edited by",editors:[{id:"170083",title:"Dr.",name:"Murat",middleName:null,surname:"Eyvaz",slug:"murat-eyvaz",fullName:"Murat Eyvaz"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6991",title:"Neurons",subtitle:"Dendrites and Axons",isOpenForSubmission:!1,hash:"696489f55e1077935f47087fa3829b5f",slug:"neurons-dendrites-and-axons",bookSignature:"Gonzalo Emiliano Aranda Abreu and María Elena Hernández Aguilar",coverURL:"https://cdn.intechopen.com/books/images_new/6991.jpg",editedByType:"Edited by",editors:[{id:"72314",title:"Dr.",name:"Gonzalo Emiliano",middleName:null,surname:"Aranda Abreu",slug:"gonzalo-emiliano-aranda-abreu",fullName:"Gonzalo Emiliano Aranda Abreu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"28",title:"Agrochemical",slug:"agrochemical",parent:{title:"Agricultural and Biological Sciences",slug:"agricultural-and-biological-sciences"},numberOfBooks:1,numberOfAuthorsAndEditors:20,numberOfWosCitations:4,numberOfCrossrefCitations:11,numberOfDimensionsCitations:22},booksByTopicFilter:{topicSlug:"agrochemical",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"4637",title:"Toxicity and Hazard of Agrochemicals",subtitle:null,isOpenForSubmission:!1,hash:"6aff74df1ea32df7f1e20e29c8363ff5",slug:"toxicity-and-hazard-of-agrochemicals",bookSignature:"Marcelo L. Larramendy and Sonia Soloneski",coverURL:"https://cdn.intechopen.com/books/images_new/4637.jpg",editedByType:"Edited by",editors:[{id:"14764",title:"Dr.",name:"Marcelo",middleName:"L.",surname:"Larramendy",slug:"marcelo-larramendy",fullName:"Marcelo Larramendy"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:1,mostCitedChapters:[{id:"48553",doi:"10.5772/60767",title:"Ecotoxicology of Glyphosate and Glyphosate-Based Herbicides — Toxicity to Wildlife and Humans",slug:"ecotoxicology-of-glyphosate-and-glyphosate-based-herbicides-toxicity-to-wildlife-and-humans",totalDownloads:1099,totalCrossrefCites:2,totalDimensionsCites:6,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Paul K. Mensah, Carolyn G. Palmer and Oghenekaro N. Odume",authors:[{id:"169135",title:"Dr.",name:"Paul",middleName:null,surname:"Mensah",slug:"paul-mensah",fullName:"Paul Mensah"},{id:"173888",title:"Prof.",name:"Carolyn",middleName:null,surname:"Palmer",slug:"carolyn-palmer",fullName:"Carolyn Palmer"},{id:"175580",title:"Dr.",name:"Oghenekaro Nelson",middleName:null,surname:"Odume",slug:"oghenekaro-nelson-odume",fullName:"Oghenekaro Nelson Odume"}]},{id:"48545",doi:"10.5772/60739",title:"Environmental Risk Assessment of Agrochemicals — A Critical Appraisal of Current Approaches",slug:"environmental-risk-assessment-of-agrochemicals-a-critical-appraisal-of-current-approaches",totalDownloads:989,totalCrossrefCites:1,totalDimensionsCites:5,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Francisco Sánchez-Bayo and Henk A. Tennekes",authors:[{id:"74970",title:"Dr.",name:"Francisco",middleName:null,surname:"Sánchez-Bayo",slug:"francisco-sanchez-bayo",fullName:"Francisco Sánchez-Bayo"},{id:"173845",title:"Dr.",name:"Henk",middleName:null,surname:"Tennekes",slug:"henk-tennekes",fullName:"Henk Tennekes"}]},{id:"48552",doi:"10.5772/60779",title:"Environmental Pesticides and Heavy Metals — Role in Breast Cancer",slug:"environmental-pesticides-and-heavy-metals-role-in-breast-cancer",totalDownloads:1198,totalCrossrefCites:2,totalDimensionsCites:4,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"David R. Wallace",authors:[{id:"173819",title:"Dr.",name:"David",middleName:null,surname:"Wallace",slug:"david-wallace",fullName:"David Wallace"}]}],mostDownloadedChaptersLast30Days:[{id:"48545",title:"Environmental Risk Assessment of Agrochemicals — A Critical Appraisal of Current Approaches",slug:"environmental-risk-assessment-of-agrochemicals-a-critical-appraisal-of-current-approaches",totalDownloads:989,totalCrossrefCites:1,totalDimensionsCites:5,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Francisco Sánchez-Bayo and Henk A. Tennekes",authors:[{id:"74970",title:"Dr.",name:"Francisco",middleName:null,surname:"Sánchez-Bayo",slug:"francisco-sanchez-bayo",fullName:"Francisco Sánchez-Bayo"},{id:"173845",title:"Dr.",name:"Henk",middleName:null,surname:"Tennekes",slug:"henk-tennekes",fullName:"Henk Tennekes"}]},{id:"48594",title:"Environmental Exposure and Health Effects Associated with Malathion Toxicity",slug:"environmental-exposure-and-health-effects-associated-with-malathion-toxicity",totalDownloads:986,totalCrossrefCites:2,totalDimensionsCites:3,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Paul B. Tchounwou, Anita K. Patlolla, Clement G. Yedjou and\nPamela D. Moore",authors:[{id:"113353",title:"Prof.",name:"Paul",middleName:null,surname:"Tchounwou",slug:"paul-tchounwou",fullName:"Paul Tchounwou"}]},{id:"48553",title:"Ecotoxicology of Glyphosate and Glyphosate-Based Herbicides — Toxicity to Wildlife and Humans",slug:"ecotoxicology-of-glyphosate-and-glyphosate-based-herbicides-toxicity-to-wildlife-and-humans",totalDownloads:1097,totalCrossrefCites:2,totalDimensionsCites:6,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Paul K. Mensah, Carolyn G. Palmer and Oghenekaro N. Odume",authors:[{id:"169135",title:"Dr.",name:"Paul",middleName:null,surname:"Mensah",slug:"paul-mensah",fullName:"Paul Mensah"},{id:"173888",title:"Prof.",name:"Carolyn",middleName:null,surname:"Palmer",slug:"carolyn-palmer",fullName:"Carolyn Palmer"},{id:"175580",title:"Dr.",name:"Oghenekaro Nelson",middleName:null,surname:"Odume",slug:"oghenekaro-nelson-odume",fullName:"Oghenekaro Nelson Odume"}]},{id:"48552",title:"Environmental Pesticides and Heavy Metals — Role in Breast Cancer",slug:"environmental-pesticides-and-heavy-metals-role-in-breast-cancer",totalDownloads:1198,totalCrossrefCites:2,totalDimensionsCites:4,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"David R. Wallace",authors:[{id:"173819",title:"Dr.",name:"David",middleName:null,surname:"Wallace",slug:"david-wallace",fullName:"David Wallace"}]},{id:"48784",title:"Genotoxicity of the Neonicotinoid Insecticide Poncho (Clothianidin) on CD1 Mice Based on Alkaline Comet and Micronucleus Assays",slug:"genotoxicity-of-the-neonicotinoid-insecticide-poncho-clothianidin-on-cd1-mice-based-on-alkaline-come",totalDownloads:718,totalCrossrefCites:3,totalDimensionsCites:3,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"María Elena Calderón-Segura, José Arturo Marcial Rojas, María de\nGuadalupe Mézquita Brito, Manuel TecCab, María del Carmen\nCalderón-Ezquerro and Sandra Gómez-Arroyo",authors:[{id:"174590",title:"Dr.",name:"María Elena",middleName:null,surname:"Calderón Segura",slug:"maria-elena-calderon-segura",fullName:"María Elena Calderón Segura"},{id:"175532",title:"Prof.",name:"Jose Arturo",middleName:null,surname:"Marcial-Rojas",slug:"jose-arturo-marcial-rojas",fullName:"Jose Arturo Marcial-Rojas"},{id:"175533",title:"Dr.",name:"María De Guadalupe",middleName:null,surname:"Mezquita-Brito",slug:"maria-de-guadalupe-mezquita-brito",fullName:"María De Guadalupe Mezquita-Brito"},{id:"175534",title:"BSc.",name:"Manuel",middleName:null,surname:"TecCab",slug:"manuel-teccab",fullName:"Manuel TecCab"},{id:"175535",title:"Dr.",name:"María Del Carmen",middleName:null,surname:"Calderón-Esquerro",slug:"maria-del-carmen-calderon-esquerro",fullName:"María Del Carmen Calderón-Esquerro"}]},{id:"48539",title:"Toxicity of Agrochemicals on Freshwater Invertebrates — A Short Review",slug:"toxicity-of-agrochemicals-on-freshwater-invertebrates-a-short-review",totalDownloads:747,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Daniel Robles-Vargas",authors:[{id:"173830",title:"Dr.",name:"Daniel",middleName:null,surname:"Robles-Vargas",slug:"daniel-robles-vargas",fullName:"Daniel Robles-Vargas"}]},{id:"48760",title:"The Ecotoxicity of Pyrimethanil for Aquatic Biota",slug:"the-ecotoxicity-of-pyrimethanil-for-aquatic-biota",totalDownloads:697,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:"toxicity-and-hazard-of-agrochemicals",title:"Toxicity and Hazard of Agrochemicals",fullTitle:"Toxicity and Hazard of Agrochemicals"},signatures:"Cristiano V.M. Araújo, Cândida Shinn, Ruth Müller, Matilde Moreira-\nSantos, Evaldo L.G. Espíndola and Rui Ribeiro",authors:[{id:"173959",title:"Dr.",name:"Cristiano",middleName:"V.M.",surname:"Araújo",slug:"cristiano-araujo",fullName:"Cristiano Araújo"},{id:"174319",title:"Dr.",name:"Cândida",middleName:null,surname:"Shinn",slug:"candida-shinn",fullName:"Cândida Shinn"},{id:"174320",title:"Dr.",name:"Matilde",middleName:null,surname:"Moreira-Santos",slug:"matilde-moreira-santos",fullName:"Matilde Moreira-Santos"},{id:"174321",title:"Dr.",name:"Ruth",middleName:null,surname:"Müller",slug:"ruth-muller",fullName:"Ruth Müller"},{id:"174322",title:"Dr.",name:"Evaldo",middleName:null,surname:"Espíndola",slug:"evaldo-espindola",fullName:"Evaldo Espíndola"},{id:"174323",title:"Dr.",name:"Rui",middleName:null,surname:"Ribeiro",slug:"rui-ribeiro",fullName:"Rui Ribeiro"}]}],onlineFirstChaptersFilter:{topicSlug:"agrochemical",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},privacyPolicy:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"8841",title:"Deterministic Artificial Intelligence",subtitle:null,isOpenForSubmission:!0,hash:"bd65f564ea0b77f91dea36cfcbaa1da7",slug:null,bookSignature:"Prof. Timothy Sands",coverURL:"https://cdn.intechopen.com/books/images_new/8841.jpg",editedByType:null,editors:[{id:"258189",title:"Prof.",name:"Timothy",middleName:null,surname:"Sands",slug:"timothy-sands",fullName:"Timothy Sands"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8922",title:"Modelling of Artificial Intelligence Controller for Microgrid Application",subtitle:null,isOpenForSubmission:!0,hash:"f5a9f1298be5472f9e429f3ab47cd404",slug:null,bookSignature:"Prof. M Venkateshkumar, Dr. Umashankar Subramaniam and Dr. Cheng Siong Chin",coverURL:"https://cdn.intechopen.com/books/images_new/8922.jpg",editedByType:null,editors:[{id:"108910",title:"Prof.",name:"M",middleName:null,surname:"Venkateshkumar",slug:"m-venkateshkumar",fullName:"M Venkateshkumar"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8124",title:"Clean Generators - Advances in Modelling of Hydro and Wind Generators",subtitle:null,isOpenForSubmission:!0,hash:"5cfcddf90faee3ea02e759eb04fcb32a",slug:null,bookSignature:"Dr. Amir Ebrahimi",coverURL:"https://cdn.intechopen.com/books/images_new/8124.jpg",editedByType:null,editors:[{id:"256252",title:"Dr.",name:"Amir",middleName:null,surname:"Ebrahimi",slug:"amir-ebrahimi",fullName:"Amir Ebrahimi"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8915",title:"Advances in Membrane Technologies",subtitle:null,isOpenForSubmission:!0,hash:"19febde893f705494f2334d02977fd83",slug:null,bookSignature:"Dr. Amira Abdelrasoul",coverURL:"https://cdn.intechopen.com/books/images_new/8915.jpg",editedByType:null,editors:[{id:"151521",title:"Dr.",name:"Amira",middleName:null,surname:"Abdelrasoul",slug:"amira-abdelrasoul",fullName:"Amira Abdelrasoul"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7404",title:"Hystersis of Composites",subtitle:null,isOpenForSubmission:!0,hash:"e703f836282435b95fb7d1c1efb86fc2",slug:null,bookSignature:"Dr. Li Longbiao",coverURL:"https://cdn.intechopen.com/books/images_new/7404.jpg",editedByType:null,editors:[{id:"260011",title:"Dr.",name:"Li",middleName:null,surname:"Longbiao",slug:"li-longbiao",fullName:"Li Longbiao"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8851",title:"Advances in Neural Signal Processing",subtitle:null,isOpenForSubmission:!0,hash:"a44ac118b233b29a3d5b57d61680ec38",slug:null,bookSignature:"Dr. Ramana Vinjamuri",coverURL:"https://cdn.intechopen.com/books/images_new/8851.jpg",editedByType:null,editors:[{id:"196746",title:"Dr.",name:"Ramana",middleName:null,surname:"Vinjamuri",slug:"ramana-vinjamuri",fullName:"Ramana Vinjamuri"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8899",title:"Modelling and Control of Switched Reluctance Machines",subtitle:null,isOpenForSubmission:!0,hash:"e19068f7f6c92b5643a3f8fbf2f895e0",slug:null,bookSignature:"Prof. Rui Esteves Esteves Araújo and Dr. José Roberto Camacho",coverURL:"https://cdn.intechopen.com/books/images_new/8899.jpg",editedByType:null,editors:[{id:"31663",title:"Prof.",name:"Rui Esteves",middleName:"Esteves",surname:"Araújo",slug:"rui-esteves-araujo",fullName:"Rui Esteves Araújo"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8919",title:"Environmental Impacts of Solar Panels",subtitle:null,isOpenForSubmission:!0,hash:"84b4f2c95c817552f02813474b074576",slug:null,bookSignature:"Dr. Abdülkerim Gok",coverURL:"https://cdn.intechopen.com/books/images_new/8919.jpg",editedByType:null,editors:[{id:"266161",title:"Dr.",name:"Abdülkerim",middleName:null,surname:"Gok",slug:"abdulkerim-gok",fullName:"Abdülkerim Gok"}],productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:24},humansInSpaceProgram:{},route:{name:"profile.detail",path:"/profiles/64845/irismar-reis-de-oliveira",hash:"",query:{},params:{id:"64845",slug:"irismar-reis-de-oliveira"},fullPath:"/profiles/64845/irismar-reis-de-oliveira",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()