\r\n\tIn this book, the authors will present the highlights of basic research of biomechanical and biochemical pathways of bone homeostasis and the developing clinical methods for treatment of bone loss, either following trauma or systemic disease.
",isbn:"978-1-83880-330-8",printIsbn:"978-1-83880-329-2",pdfIsbn:null,doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!1,hash:"a67783226e0c4e1343d82c3a811ba1b3",bookSignature:"Dr. Nahum Rosenberg",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/8442.jpg",keywords:"Bone Homeostasis, Osteoblast, Bone Matrix, Inorganic Component, Organic Componet, Bone Resorption, Cellular Mechanotransduction, Hormonal Regulation, Autografts, Allografts, Distraction Osteogenesis",numberOfDownloads:269,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:0,numberOfTotalCitations:0,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"August 30th 2019",dateEndSecondStepPublish:"September 20th 2019",dateEndThirdStepPublish:"November 19th 2019",dateEndFourthStepPublish:"February 7th 2020",dateEndFifthStepPublish:"April 7th 2020",remainingDaysToSecondStep:"3 months",secondStepPassed:!0,currentStepOfPublishingProcess:4,editedByType:null,kuFlag:!1,editors:[{id:"68911",title:"Dr.",name:"Nahum",middleName:null,surname:"Rosenberg",slug:"nahum-rosenberg",fullName:"Nahum Rosenberg",profilePictureURL:"https://mts.intechopen.com/storage/users/68911/images/system/68911.png",biography:"Rosenberg Nahum MD, MOrth (Hons.), FRCS (England) is an orthopedic surgeon holding MD degree from Technion – ITT in 1990. \r\nHe did a residency in Orthopedic Surgery in Rambam Medical Center, Haifa between 1990-97. MOrth, Nuffield Fellow (Orthopedic Surgery) in Oxford University in 1998-9, fellowship in Orthopedic Surgery in University of Nottingham – 2002. \r\nHe is a senior orthopedic surgeon in Rambam Health Care Campus since 2003 and an Assistant Clinical Professor in the Faculty of Medicine, Technion -ITT, Haifa since 2007. \r\nHe is a member of editorial boards in 8 scientific journals. His research interests include the outcome of orthopedic procedures and bone biology.",institutionString:"I.M. Sechenov First Moscow State Medical University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"4",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Tel Aviv Sourasky Medical Center",institutionURL:null,country:{name:"Israel"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"16",title:"Medicine",slug:"medicine"}],chapters:[{id:"68993",title:"Distraction Osteogenesis: Biological Principles and Its Application in Companion Animals",slug:"distraction-osteogenesis-biological-principles-and-its-application-in-companion-animals",totalDownloads:130,totalCrossrefCites:0,authors:[null]},{id:"67977",title:"Thyroid Disorders and Osteoporosis",slug:"thyroid-disorders-and-osteoporosis",totalDownloads:139,totalCrossrefCites:0,authors:[null]},{id:"70137",title:"Relation between Vitamin K and Osteoporosis",slug:"relation-between-vitamin-k-and-osteoporosis",totalDownloads:23,totalCrossrefCites:0,authors:[null]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"194667",firstName:"Marijana",lastName:"Francetic",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/194667/images/4752_n.jpg",email:"marijana@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"8676",title:"Hip Surgeries",subtitle:null,isOpenForSubmission:!1,hash:"35280afd3082f1a6b3c10bdc0ae447f6",slug:"hip-surgeries",bookSignature:"Nahum Rosenberg",coverURL:"https://cdn.intechopen.com/books/images_new/8676.jpg",editedByType:"Edited by",editors:[{id:"68911",title:"Dr.",name:"Nahum",surname:"Rosenberg",slug:"nahum-rosenberg",fullName:"Nahum Rosenberg"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"6550",title:"Cohort Studies in Health Sciences",subtitle:null,isOpenForSubmission:!1,hash:"01df5aba4fff1a84b37a2fdafa809660",slug:"cohort-studies-in-health-sciences",bookSignature:"R. Mauricio Barría",coverURL:"https://cdn.intechopen.com/books/images_new/6550.jpg",editedByType:"Edited by",editors:[{id:"88861",title:"Dr.",name:"René Mauricio",surname:"Barría",slug:"rene-mauricio-barria",fullName:"René Mauricio Barría"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4816",title:"Face Recognition",subtitle:null,isOpenForSubmission:!1,hash:"146063b5359146b7718ea86bad47c8eb",slug:"face_recognition",bookSignature:"Kresimir Delac and Mislav Grgic",coverURL:"https://cdn.intechopen.com/books/images_new/4816.jpg",editedByType:"Edited by",editors:[{id:"528",title:"Dr.",name:"Kresimir",surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3794",title:"Swarm Intelligence",subtitle:"Focus on Ant and Particle Swarm Optimization",isOpenForSubmission:!1,hash:"5332a71035a274ecbf1c308df633a8ed",slug:"swarm_intelligence_focus_on_ant_and_particle_swarm_optimization",bookSignature:"Felix T.S. Chan and Manoj Kumar Tiwari",coverURL:"https://cdn.intechopen.com/books/images_new/3794.jpg",editedByType:"Edited by",editors:[{id:"252210",title:"Dr.",name:"Felix",surname:"Chan",slug:"felix-chan",fullName:"Felix Chan"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"53177",title:"Energy-Efficient Communication in Wireless Networks",doi:"10.5772/65986",slug:"energy-efficient-communication-in-wireless-networks",body:'\n
1. Introduction
\n
The promise of the ‘fourth industrial revolution’ relies on the development and integration of the so‐called Internet of Things, cyberphysical systems and associated services and process improvements. The basis of the promise is the ability to instrument, connect, automate and remotely manage the majority of industrial systems and processes. The underlying assumption is that cheap, wirelessly communicating sensors and actuators can contribute to providing this capability, either autonomously or as part of a decision support system with a human in the loop.
\n
In many cases, it is assumed that monitoring and control applications will require the use of devices that operate without persistent energy availability. Where no mains power is available, energy becomes a major constraint for applications expected to operate for increasingly long time periods. These periods are determined by the feasibility of maintenance of devices, with respect to both practicality and cost. Therefore, a major recent theme of research has been to attempt to achieve energy neutrality. This has been approached from many different angles, including novel ultra‐low power receiver circuits (wake‐up radio, WuR) [1, 2], energy harvesting and hybrid‐storage (battery‐supercapacitor) systems [3], compressive and predictive sensing [4–6], and traditionally, energy‐efficient communications protocols [7].
\n
Achieving energy neutral operation requires a comprehensive understanding of the application at design time and is seen as a ‘holy grail’ for networked embedded computing devices. However, applications tend to be characterised by heterogeneous performance requirements [8], deployment environments and criticalities. Therefore, there are few, if any, ‘one size fits all’ solutions. If one assumes that sensors and actuators are low cost with respect to energy in terms of sampling and information processing (which is not always true in the case of industrial applications [9]), communication is widely accepted to be the primary consumer of energy [10]. This energy consumption occurs when the radio transceiver is in an active state to send, receive and/or route packets. Assuming a worst‐case scenario whereby the radio transceiver is always active (a state which tends to require tens of milliwatts of power [11]), the obvious way to reduce energy consumption is to place the device in the lowest power mode available for as long as possible—a technique known as duty cycling [12], which can be applied to the radio transceiver (radio duty cycling, RDC) and the other components of the device. This is equally true for recent system on chip (SoC) solutions that integrate transceiver and microcontroller circuitry on the same chip.
\n
However, the device must also be able to participate in a network, which necessitates the implementation of a communications protocol stack (Section 1.1.1). This is a long‐standing research area in the wireless sensor networks (WSN) community, which in the past 10–15 years has developed numerous energy‐efficient communications mechanisms that operate at and across various layers. The remainder of this chapter is dedicated to exploring the evolution of energy‐efficient communications primitives, explaining the inherent trade‐offs in the design space and providing a comprehensive description of the state of the art. The emphasis is placed on link and routing layers.
\n
1.1. Wireless communication
\n
There are several well‐known wireless communications technologies in popular use. These range from cellular, now on the verge of the 5th Generation (5G) [13], to WiFi (IEEE 802.11) and Bluetooth Low Energy (BLE) [14], among the most widespread [1] - Recent WiFi and BLE chip‐sets are significantly lower power than their predecessors and are increasingly competitive for certain classes of energy‐efficient ‘IoT’‐type applications, particularly in the consumer electronics market.
\n
This chapter focuses on wireless communications protocols suitable for use with RF transceivers and SoCs typically considered ideal for low‐power WSN‐type applications, such as the (now obsolete) TI CC2420 [16], CC2538 (used in the recent OpenMote devices) [17], and the NXP JN5168. These are compliant with the IEEE 802.15.4 standard for low‐rate wireless personal area networks (LR‐WPAN) [18], which is responsible for underlying much of the research in this area and has found its way into numerous industrial standards and specifications including ZigBee [19], WirelessHART [20] and ISA100.11a [21].
\n
1.1.1. Communications protocol suites
\n
A communications protocol suite specifies how data should be formatted (i.e. in packets), transmitted and received (channel access), and routed in a network [1] -. Layers of abstraction are used to describe the various networking functions involved and vary somewhat depending upon the model of abstraction. For example, the OSI model specifies seven layers, whereas the TCP/IP model (Internet Protocol suite) specifies four. This is a particularly relevant issue in WSN design, as it is well known that efficiencies are best achieved by co‐designing the layers [22], but they are often designed independently (e.g. RPL) [23] to enable interoperability. The most recent IETF stack proposed by the 6TiSCH working group, which is particularly suited to IoT, is shown in Figure 1 and loosely maintains the TCP/IP model. In this case, IEEE 802.15.4 time synchronised channel hopping (TSCH) is used at the ‘link layer’ (which includes medium access control), 6top is an interface layer to the 6LoWPAN adaptation and compression layer (used to reduce the size of the IPv6 header such that it comfortably fits in the 127‐bytes available in an IEEE 802.15.4 physical layer packet), and RPL (Section 3.2.5) at the Internet/routing layer. UDP is used at the transport layer to mitigate the overheads associated with TCP (i.e. end‐to‐end handshaking), and the Constrained Application Protocol (CoAP) [24] handles application layer functionality.
Figure 1.
The 6TiSCH Protocol Stack [84].
\n
While the higher layers of the stack benefit from having an understanding of, and in many instances real‐time information from, the lower layers, the most critical from an energy efficiency perspective are the physical layer (i.e. the radio transceiver itself) and the link layer, the latter of which is responsible for medium access control, and therefore, how long the transceiver remains in an active or sleep state. Energy‐efficient medium access control (MAC) protocols are discussed in Section 2. However, as discussed in Section 2, the selection of a suitable MAC protocol is heavily dependent upon the application, specifically with regard to the statistical properties of the traffic generated in the network, the network topology and environmental factors. A well‐designed application will take each of these factors into account at design time.
\n
1.2. Hardware
\n
The electrical characteristics of the hardware play a significant part in the overall energy efficiency of a networked device and the performance of a network. While a complete analysis of each component is beyond the scope of this chapter, it is worth highlighting where hardware mostly impacts the design of applications and implications for various layers in the protocol stack.
\n
Firstly, selection of the radio itself is a key. From an application standpoint, basic quality of service requirements must be met, primarily bandwidth—otherwise the application is probably infeasible (without resorting to trickery in software, such as compressive or predictive sensing, and assuming this is satisfactory for an end‐user). The worst‐case scenario from an energy perspective is that the radio must be on 100% of the time. Therefore, once a wireless technology is selected (e.g. take IEEE 802.15.4), the designer sets about choosing a chip. The majority are reasonably similar in terms of their electrical characteristics, irrespective of the manufacturer. This makes life easier but it is worth considering the features of the chip selected. For example, on‐board hardware acceleration of security functions can greatly reduce the overheads associated with implementation in software. Most contemporary RFICs compliant with IEEE 802.15.4 are in the tens of milliwatts range in active modes and drop to the microwatt range in low power modes, making them good candidates for long‐term low‐power applications. They require additional RF front‐end design, including antenna and matching networks, plus an oscillator circuit to drive the clock. The latter requires the selection of inductors and capacitors, which are variable in their characteristics.
\n
Important performance characteristics are often affected by environmental conditions such as temperature and humidity. In the case of a wireless node, these have effects internally (i.e. on each device) and externally (i.e. the effects on the wireless medium), which both impact on the performance of a network. In the case of the device, temperature effects and component selection have a significant effect on relative clock drift, which must be taken into account when tuning and learning protocol parameters like guard times and phase offsets, respectively (Section 2). Understanding clock drift is essential to tightly configure networking parameters, such as guard times to ensure accurate synchronisation, and has been studied in [25] where the authors investigate the effects of environmental temperature on clock drift and propose strategies to help designers choose optimal resynchronisation periods for given accuracies, and in [26] where the authors study the impact of oscillator drift on end‐to‐end latency over multiple hops using varying capacitor accuracies and show how to determine optimal parameters to minimise energy consumption in duty‐cycled wireless sensor networks using low power medium access control techniques. It is also worth noting that temperature influences battery performance, particularly as temperatures reduce, where capacity is degraded and voltage is known to reduce. This is a relatively understudied area in terms of IoT/WSN technologies, but is likely to be very important where devices are deployed outdoors in cold environments.
\n
2. Energy‐efficient medium access control
\n
A large body of research exists concerning MAC protocols for WSNs. Notable examples of energy‐efficient implementations include A‐MAC [27], BoX‐MAC [28], HuiMAC [29], SCP‐MAC [10], ContikiMAC [30] and WiseMAC [31]. These MAC protocols are based on globally asynchronous, radio duty‐cycled (RDC) approaches, where the objective is to minimise the active time of the RF transceiver. Typically, trade‐offs are assumed to be inherent in the design of these protocols, and the Pareto‐optimal solution is sought when considering energy efficiency and application level or performance requirements, such as throughput, reliability and latency. In [32], the authors consider low data‐rate applications and attempt a tractable analytical approach to modelling latency and energy efficiency as functions of protocol parameters including duty cycle, slot duration and total slots, seeking to determine optimal settings for given workloads defined by application‐level parameters. They find that WiseMAC best balances energy efficiency and latency based on the scenarios considered, and attribute minimising protocol overhead through local synchronisation (also referred to as phase lock optimisation in the literature, and exploited in several subsequent proposed MACs [30, 33]) and random channel access as key to achieving this balance.
\n
These protocols, however, are just the tip of the iceberg (and are heavily oriented towards aggressively duty‐cycled, energy‐efficient scenarios for low data‐rate applications). In [34], Bachir et al. present a comprehensive taxonomy of MAC protocols according to the various techniques being used, classifying them according to the challenge they address. They describe the importance of understanding the statistical properties of the network traffic when selecting and tuning a MAC protocol, which is argued to be a more useful approach for the application developer. The authors classify the traditional ‘MAC families’ as Reservation‐Based Protocols and Contention‐Based Protocols at the highest level, where the former is synonymous with scheduled approaches such as Time Division Multiple Access (TDMA), and the latter with simpler, popular approaches such as ALOHA and Carrier Sense Multiple Access (CSMA). They proceed to explore the functions relative to: high—scheduled protocols for high‐rate applications such as multimedia; medium—protocols with common active periods for medium rate applications such as those found in many industrial applications; and low—preamble sampling for low‐rate applications with rare event‐reporting, such as long‐term monitoring or metering, and finally consider hybrid protocols for time‐varying application‐level functionality. Table 1 borrows the structure and updates the taxonomy of that presented in [34]. Specifically, A‐MAC, Reins‐MAC and IEEE 802.15.4e, which leverages TSMP and is closely linked with ongoing standardisation initiatives, are notable protocols published since Bachir et al. presented their study.
Summary of MAC protocols by functionality, updates [34].
\n
Another interesting development relates to the exploitation of constructive interference, which is contrary to CSMA mechanisms and seeks to benefit from concurrent transmissions. Flip‐MAC [39] and Glossy (not strictly a MAC protocol) [40], for example, make good use of this with regard to packet acknowledgements and efficient network flooding, respectively.
\n
2.1. Standards and evolution
\n
The IEEE 802.15.4 standard is one of the most important standards in WSN/IoT. First published in 2003, it specified the physical and medium access control mechanisms for low‐rate wireless personal area networks and became part of the industrial standards and specifications listed in Section 1. The medium access control layer specified in the standard is effectively a hybrid construct that allows the use of slotted or un‐slotted CSMA‐CA with optional guaranteed timeslots and packet delivery. It was designed to accommodate a range of topologies, including star and peer‐to‐peer, specifying device classes that allowed for reduced protocol complexity for ‘reduced’ function devices (RFD) opposed to ‘full’ function device (FFD) capable of communication with any device in the network. While this allows for relatively low duty cycles to be achieved, there is an inherent trade‐off between energy saving and latency and bandwidth. This was studied immediately, and simulations were used to illustrate the trade‐offs related to using the various modes, for example, in [41].
\n
De facto standards simultaneously emerged in the research community where a number of competing objectives made it difficult to build practical implementations for the hardware available at the time. Factors such as ultra‐low power operation, collision avoidance, efficient channel utilisation, robustness to time‐varying channel and networking conditions, scalability, and efficiency in terms of implementation and memory requirements needed to be addressed by design. B‐MAC (short for Berkeley) was one of the earliest protocols built into an open source ‘operating system’ for WSNs, namely TinyOS [42]. B‐MAC (2004) is a carrier sense protocol that improved upon the performance of S‐MAC (one of the first to use RTS/CTS in sensor networking) under certain conditions, making use of clear channel assessments, acknowledgements, back‐offs and low power listening (LPL). This was later improved upon by merging features with X‐MAC (a link‐layer only approach, 2006), resulting in the BoX‐MAC (2008) protocols which eventually shipped with TinyOS [28]. BoX‐MAC demonstrates cross‐layer design and how to achieve significant energy efficiencies and throughput improvements for reasonable workloads.
\n
Within the Contiki community, a number of the same protocols were implemented and extended into standard link layers and radio duty cycling mechanisms in a cross layer fashion. Features from BoX‐MAC and X‐MAC, such as periodic wake‐ups and strobes, and WiseMAC, specifically the phase lock optimisation, were integrated to form the ContikiMAC protocol, which has shipped as a de facto standard link layer since around 2011.
\n
TSMP is one of the most notable TDMA MAC layers developed in the last decade [43]. It uses synchronisation between devices to communicate in scheduled timeslots (allowing low‐energy radio management) and operates reliably in noisy environments by using channel hopping to avoid interference, with different time‐slotted packets sent on different channels depending on the time of the transmission. Therefore, the approach is suitable for applications that require relatively low‐power and high‐reliability performance, characteristic of industrial automation scenarios, and has thus been included in the WirelessHART and ISA standards (Section 1.1). More recently, it has become fundamental to the development of the IEEE 802.15.4e amendment to the standard, which is actively being included as a core technology in the IETF standardisation effort (e.g. Figure 1).
\n
2.2. Design trade‐offs
\n
It is important to understand the trade‐offs inherent in the link layer design choice. From an energy efficiency perspective, selection of a low‐power transceiver is critical, but selection of the appropriate link layer will depend on the application\'s performance requirements. All of the aforementioned protocols are relatively energy efficient. Therefore, depending on the reliability, throughput and latency required, certain protocols perform better than others. For critical applications, it is usual that energy efficiency is not prioritised as highly as reliability and low latency. Therefore, in a high‐criticality application, TSMP would be preferable to an asynchronous protocol such as ContikiMAC.
\n
Table 1 shows that the area of MAC design for wireless sensor network applications has been comprehensively researched. As a result, many recently proposed protocols integrate and build upon ideas previously presented. The parameters of importance are now reasonably well known. CSMA‐CA protocols with arguably the best performance typically operate using request‐to‐send/clear‐to‐send (RTS/CTS) signalling, where networked devices periodically listen to the channel to determine whether any neighbours want to send packets, or alternatively begin to strobe RTS packets and wait for a CTS message from a listening neighbour if the device wants to transmit. The choice of what to send in the RTS packet is an interesting one, with many designers proposing to effectively send an entire data packet as the RTS strobe, such as in ContikiMAC, whereupon the receiving node sends an ACK having received the data payload. However, this can be suboptimal considering variable length data packets. It is argued in [33] that the use of a fixed‐length RTS packet can bring efficiencies when considering its relationship to strict timing parameters. Addressing information (to enable unicast, broadcast and/or multicast communication) is a key inclusion for such a packet.
\n
Timing parameters for such protocols are bounded by performance characteristics of the RFIC (such as turnaround times between TX and RX modes) and the theoretical minimum times required to transmit, receive and act upon packets. Perhaps the most critical parameters are the receive check (RC) and receive check intervals (RCI). It is also worth noting that receive checks can be performed at both the physical (L1) and link layers (L2), which enforces a trade‐off between absolute energy efficiency and reliability. Where L1 only methods are used, the RC operation is cheaper, but net energy efficiency may be worse if devices that are not being addressed stay in RX mode and parse packets not specifically intended for them.
\n
The RC is where a node samples the wireless medium for energy to determine whether or not there is an incoming packet. An optimal duration for the RC is tightly coupled with the time taken to listen for a CTS strobe during a wake‐up stream. Minimising the RC is a key to optimising energy efficiency, but this period is also closely related to reliability performance. Theoretical minimum values for length of the RC and the CTS listen period are calculated using the RXTX turnaround times for the transceiver, its bit rate and processing time.
\n
The RCI is the interval between performing RCs, typically measured in Hz. It is possible to determine an optimal RCI with regard to energy efficiency, but this is detrimental to latency (where a latency is fundamentally lower bounded by the RCI and the number of hops over which a packet must travel to reach its destination). RCIs are often lengthened to reduce their impact on the quiescent power consumption of a device. Where large RCIs are used, for example, >0.5 Hz, it becomes more important to implement phase or offset learning (resulting from positive or negative relative clock drift) to ensure that energy consumption is minimised when beginning the next RTS/CTS wake‐up stream.
\n
Transmitting nodes may or may not, depending on the application, have an enforced periodic data reporting interval. This is often referred to as the inter‐packet interval (IPI) in the literature and broadly reflects the frequency with which sensor data are transmitted from each device in the network. It is worth remembering that the IPI is not necessarily the same as the sampling rate of the sensor, where in many cases an aggregate or average values may be returned periodically (i.e. at the IPI rate of the node).
\n
A factor less studied in the literature is the implementation of the CSMA algorithm itself. In [33], the authors demonstrate that a quantised approach to the implementation of back‐offs performs better with regard to energy efficiency and reliability than randomised approaches.
\n
So called receiver‐initiated protocols have more recently been studied, whereby when a node wants to transmit a packet it waits for a neighbour (i.e. a potential receiver) to send a probe. Upon hearing the probe, the sending node transmits its packet. Examples of this approach are Low‐Power Probing (LPP) as introduced in Koala [37], RI‐MAC [38] and A‐MAC [27].
\n
The physical and link layers determine the lower bound for energy efficiency with respect to point‐to‐point communication. When a network extends beyond a one‐hop (or star) topology, devices in the network must implement some routing functionality (usually referred to as Layer 3 or the NWK layer), to ensure that packets arrive at the intended destination, which is explored in the next section.
\n
3. Energy‐efficient networking, data collection and dissemination
\n
Routing algorithms are essential for every WSN as they define how packets flow within the network. Algorithms differ from each other based on their capabilities, effectiveness, amount of memory required to store the routing state, agility and energy awareness.
\n
Routing protocols for WSNs can be categorised into three main groups depending on the functionality they provide: (i) protocols that route data only towards one or more predefined base‐station or sink nodes, referred to as data collection protocols or many‐to‐one patterns of communication, (ii) protocols that allow peer‐to‐peer or any‐to‐any patterns of communication between nodes in the network and (iii) protocols allowing one node to disseminate a message to all or a subset of the nodes in the network, also referred to a one‐to‐many pattern of communication. Protocols which belong to the first group are usually based on building routing trees which are rooted at one (or more) sink node(s). Every node in the network forwards all data towards a sink via a selected parent. Protocols from the second group support peer‐to‐peer communication, that is, any node in the network can send a message to any other node. These protocols either exploit some kind of routing table, learned beforehand, to forward data towards the destination or they first need to find the destination node and establish a connection. Protocols from the last group are usually based on gossiping or flooding the whole network.
\n
3.1. Data collection
\n
Typically, WSNs have been deployed to collect data about certain phenomena in predefined geographic areas (sensing field). Nodes in such a network sample a sensor at a predefined rate and report the sensed data towards a sink node. The network may contain several base‐stations, in which case a node typically forwards data towards the closest base‐station only.
\n
Two of the most common routing protocols are Collection Tree Protocol (CTP) [44] and Routing Protocol for Low Power and Lossy Network (RPL)[1] - [23]. CTP is a standard library of the TinyOS [42] operating system, while the Contiki [46] operating system comes with two standard alternatives: (i) Collect, which is part of the basic Rime network stack [47] and is an alternative implementation of CTP for Contiki OS and (ii) RPL, which is part of the more complex IPv6 stack. There is also an RPL implementation for TinyOS called TinyRPL. These protocols are based on creating a directed acyclic graph rooted at the base‐station. Each node in the network forwards all data towards the root.
\n
A primary challenge in the design of these protocols is defining the metric by which a node chooses its parent, via which the node will forward all packets. Early adopters of this approach used hop count to the base‐station as a metric [48]. Later, CTP used a new metric: Expected Transmission Count (ETX). ETX uses the number of transmissions required to deliver the packet to the destination without error. ETX depends on the quality of the link. Many protocols vary by how the quality of the link is measured and computed (e.g. based on RSSI, or a statistical measure of the number of packets lost, or a function of both). It has been shown that using this metric decreases the network traffic and leads to lower energy consumption.
\n
Energy efficiency can be described as the ratio between the total number of packets received at the destination node (i.e. the base‐station, in the case of collection protocols) and the total energy spent by the network to deliver these packets. Due to the overhead of IPv6 protocol, researchers were concerned about the energy efficiency of the RPL protocol. However, it was shown that packet delivery ratio of CTP and RPL is very similar, while the overall energy consumption is only 3% higher for the latter [49]. Similar results were observed in a study focused on interoperability of RPL implementation for Contiki and TinyOS operating systems [50].
\n
A disadvantage of building rigid routing trees is that the nodes along the path towards the base‐station have to transfer more data than other nodes, and hence their batteries deplete faster. This especially applies to the nodes closer to the base‐station. To tackle this problem, Lindsey et al. proposed Disjoint Paths and Braided Paths algorithms [51]. Disjoint Paths algorithm constructs a small number of alternative paths from each sensor to the base‐station. These paths are sensor‐disjoint, that is, paths have no intermediate nodes in common. Braided Paths algorithm creates partially disjoint paths from the primary path, that is, for each node on the path an alternative path is created which does not contain given nodes. Therefore, in the case of a node failure, an alternative path can be used without the need to first find the path.
\n
An alternative approach to creating rigid routing trees is the back‐pressure protocol (BCP) [52] presented by Moeller et al. In networks with BCP, the routing decision depends on the size of the packet queue and the packet rate between two nodes. Each node maintains a queue of packets, where a base‐station has a queue of zero length. A node forwards a packet to a neighbour only if the neighbour\'s queue is shorter than the queue of the sending node. The received packet is put on the top of the queue and in the next iteration forwarded to a node with a shorter queue. This can lead to more evenly spread network traffic while exploiting various routes towards the base‐station.
\n
An older approach which tries to eliminate rigid routing trees is hierarchical routing. This approach breaks the network into clusters, each of which has a cluster‐head. Nodes send data to these cluster‐heads which are then responsible for delivering data to the base‐station.
\n
Heinzelman et al. presented Low‐Energy Adaptive Clustering Hierarchy (LEACH) [53], a popular clustering algorithm whose goal is to reduce energy consumption of nodes in a WSN. The operation of the algorithm is split into two phases: (i) the setup phase during which cluster‐heads are elected and nodes choose which cluster they will be part of and (ii) the steady phase during which sensor nodes transfer data to the cluster‐heads which aggregate received data and forward them to the base‐station. Cluster‐head election is distributed, and nodes do not require any global knowledge of the network. A disadvantage of this algorithm is that the communication between nodes and cluster‐heads, as well as the communication between the cluster‐heads and the base‐station is single‐hop only, which limits the size of the network. Additionally, cluster‐head selection does not take into account the residual energy of the node. Being a cluster‐head is very energy demanding, as the cluster‐head has to be 100% duty‐cycled in order to receive messages from all nodes. If a node with small residual energy is elected, it may deplete its battery before it collects all data and forwards them to the base‐station.
\n
One of the extensions of LEACH algorithm presented by Lindsey and Raghavendra, Power‐Efficient Gathering in Sensor Information Systems (PEGASIS) [54], creates chains of sensor nodes where each node aggregates data received from the previous node with its local data. In each iteration, a random node from the chain is chosen to forward aggregated data to the base‐station. A disadvantage of PEGASIS is that it assumes that each node has global knowledge of the network layout, particularly the position of the nodes.
\n
Younis and Fahmy presented another LEACH extension called Hybrid, Energy‐Efficient Distributed Clustering (HEED) [55]. Unlike LEACH, it operates in multi‐hop networks and for cluster selection it uses both the residual energy of the node and the node degree or density. Thus, the algorithm may better balance energy consumption amongst the nodes, hence prolonging the lifetime of the network.
\n
Each of these hierarchical routing protocols scored three out of four points for energy efficiency in a large survey on routing protocols [56], meaning that these protocols achieved average packet delivery rates while choosing routes based on the residual energy, thereby prolonging the lifetime of the network.
\n
3.2. Peer‐to‐peer routing
\n
For networks deployed for the purpose of monitoring and continuous collection of data, peer‐to‐peer (P2P) communication is often not necessary. Each node only needs to know how to deliver data to one of the base‐stations. However, as WSNs become more common and serve a wider range of purposes, communication among nodes in the network will become more important. WSNs are not only used to collect data but also to react to the environment and control it via actuators, that is, components of emerging cyberphysical systems. Nodes in the network need to send messages directly to other nodes, while lowering the overall traffic. With actuation networks, this requirement becomes even more important to send an actuation message directly to the actuator. For that purpose, routing protocols which allow P2P communication were developed.
\n
Such P2P protocols may be categorised into five groups, depending on how they locate and forward messages to the communicate with a peer: (i) geographic routing, (ii) routing based on trees, (iii) hierarchical routing, (iv) ad hoc shortest path routing and (v) routing based on routing tables.
\n
3.2.1. Geographic routing
\n
In geographic routing, each node is not addressed by its ID or IP address but by its geographic location. The routing decision is then based on the position of the node making the forwarding decision, the position of the destination node and the position of the neighbours of the forwarding node. The neighbour which is closest to the destination node is chosen as the next‐hop. As geographic routing heavily relies on the exact geographic position of the nodes, specialised hardware is required (e.g. GPS) and/or a localisation algorithm must be used. However, specialised hardware increases the price of the node, increases the energy requirements and is sometimes not very precise. Similarly, using localisation algorithms tends to lead to additional network traffic and may also be imprecise [57–59].
\n
Among others, Karp and Kung proposed Greedy Perimeter Stateless Routing (GPSR) [60], Kuhn et al. proposed Geometric Ad hoc Routing [61], and Yu et al. proposed Geographic and Energy Aware Routing (GEAR) [62], all of which implement greedy geographic routing. Even though this type of greedy routing works well under ideal conditions, it fails when a routing void is encountered. The routing void is a situation when there is no neighbour which is closer to the destination node. In practice, this situation is common when there is either an error in the localisation algorithm or a physical obstacle prevents radio communication between nearby nodes. Additionally, there is currently no practical way of porting geographic routing to the three‐dimensional space [63], for example, in a network deployed in a building or a tower.
\n
According to the survey on routing protocols in [56], GEAR outperforms GPSR in terms of the packet delivery; however, it scores only two points out of four for energy efficiency.
\n
3.2.2. Routing trees
\n
In networks where P2P communication is based on routing trees, the nodes are organised in one or several trees where each node stores its parent\'s ID only. The root of a tree is represented by a more powerful node storing connectivity information of the whole network. The packet is first routed to the root of a tree, where the central router computes the shortest path to the destination. The packet is then routed downwards towards the destination via this shortest path. The advantage of this approach is minimal memory requirements on the nodes and simplicity of the routing algorithm. The disadvantage is potentially high routing stretch, that is, the ratio between the length of the found path and the optimal one, and the requirement that the central router is aware of the whole network topology. Additionally, top‐level nodes may become overloaded by the network traffic, especially in large networks.
\n
To tackle some of the disadvantages mentioned above, several improvements to the routing trees have been introduced. The key improvements are based on storing meta‐data on the nodes within the network. Dedicated nodes store meta‐data about all nodes in a sub‐tree rooted in given node. Then, a node can decide to route a packet down a tree without forwarding it to the root node. In RPL, the base‐station holds a routing table for the whole network. However, any node in the network, provided it has enough memory, can store a routing table for a sub‐tree rooted in given node. These nodes are referred to as routing nodes. If a routing node receives a packet, it first checks its local routing table to see whether it contains a record for the destination. If so, the packet is forwarded directly to the destination. Otherwise, it is forwarded towards the root.
\n
Duquennoy et al. presented an opportunistic version of RPL called Opportunistic RPL (ORPL) [64]. Here, each node uses a Bloom filter [65] to store all node IDs from the sub‐tree rooted in a given node. Each node then uses the summary to decide whether the packet should be forwarded up towards the root of the tree or down the sub‐tree rooted in a given node. When the packet travels up the tree, it does not necessary follow the spanning tree. Any node which is closer to the root can opportunistically forward the packet. These two improvements can significantly lower the routing stretch. However, the possibility of a false positive in Bloom filters is the main disadvantage of this approach. In this case, a special algorithm is required which can recover from the situation when a packet is routed down the tree based on a false positive. The packet has to be sent to the root of the tree which can then find the correct path to the destination. This leads to unnecessary traffic and large routing stretch.
\n
Mihaylov et al. use a similar approach in their Innet algorithm [66], but, to reduce the routing stretch, they build up to three routing trees, each rooted in a different part of the network. Each node stores a summary for each sub‐tree rooted in given node. The search for the destination node is performed in all routing trees in parallel. Furthermore, to avoid the problem of false positives in Bloom filters, the packet is always also forwarded up, until it reaches the root of a tree. The packet stores the path it takes until it reaches the destination node. The destination node replies to the source node by reversing this path. As the reply packet travels back to the source node, each node uses several techniques to find a shortcut between the communicating nodes. Innet was designed to support long‐term communication, that is, the communicating peers exchange messages for a longer period of time. Therefore, the main goal of the algorithm is to minimise the routing stretch. The higher cost of the search phase is outbalanced by savings that could be achieved during the long‐term communication amongst the nodes.
\n
3.2.3. Hierarchical routing
\n
In hierarchical routing, each node is a part of multi‐level hierarchically organised clusters [63, 67]. At the lowest level 0, each node is a member of its own singleton cluster. Then, a neighbourhood of level 0 clusters is organised into level 1 cluster, which in turn are grouped into level 2 cluster, until all nodes are member of one (or very few) big cluster(s). At each level, a node is a member of exactly one cluster.
\n
At the centre of each cluster is a cluster‐head. At each level i the cluster‐head is advertised Ri hops away. The R depends exponentially on the level i. A node can be a member of a level i cluster if it is at most ri hops away from the cluster‐head, where ri≤Ri−1. In practice, usually Ri=2i and ri=⌊Ri/2⌋. Each node is addressable by concatenating the cluster‐head ID at each level (e.g. X.Y.Z, where node\'s ID is X, Y is a level 1 cluster‐head, and Z is a level 2 cluster‐head).
\n
The routing table, stored at each node, consists of entries for each cluster‐head the node received an advertisement from. Remember that each cluster‐head is at most Ri hops away at every level. Because the routing table is stored at every node, each node in a network acts as a router. When a node receives a packet, it tries to find the record in the routing table for the cluster‐head from the lowest level. For example, if the packet\'s destination is X.Y.Z, the node first tries to locate a record for X. If it is not found, it tries the same for Y, and Z, respectively. Because Z is the top‐level cluster, every node in the network will know a route to it. The packet is routed towards the first found record. Because ri≤Ri−1 it is guaranteed that as the packet is routed towards the level i cluster‐head, there will be a node on the path which knows the route towards the level i−1 cluster‐head. Therefore, the packet will eventually reach the destination node. In practice, hierarchical routing achieves relatively small average routing stretch of 25% [63]; however, additional network traffic is required to keep the routing tables updated.
\n
3.2.4. Ad hoc routing
\n
Unlike other routing algorithms, ad hoc routing does not require any global preparation phase during which the network is prepared for P2P communication. However, when a node needs to communicate with a peer, a path between the nodes must be established first. This is usually done by flooding the network with a request [68–70]. The request contains the source node ID, the destination node ID and a path taken by the request so far. Each node, unless the node is the destination that receives the request, adds itself to the path and re‐broadcasts the request. Once the destination node receives the request, it replies to the source node by reversing the path of relay nodes. The algorithm leads to discovery of the shortest path between two nodes.
\n
The disadvantage of this approach is a very expensive path discovery. As the whole network is flooded with a request, this results in poor energy efficiency. Even though other approaches like routing via trees also rely on path discovery, the search in those networks is more directed and does not flood the entire network.
\n
3.2.5. Routing based on routing tables
\n
Approaches based on routing tables first execute a learning or a bootstrapping phase during which every node learns routes to nodes that are of interest. For every node, two other pieces of information are usually stored: 〈distance,next_hop〉. As a distance, usually number of hops is used, but any other additive metric could be used. Once the bootstrapping phase is complete, each node can independently forward the packet using the locally stored routing table.
\n
Routing algorithms like RPL [23] use a subset of nodes to store the routing table and only for nodes that are in the sub‐tree rooted in a given node. Other approaches like Energy Aware Routing (EAR) [71] use a routing table to store several alternative routes to the base‐station so a node can choose alternative routes in order to better distribute network load. Kolcun et al. proposed Dragon [72], where every node in the network stores a path to every other node in the network. The platform also includes algorithms for quick update of the routing table in the case of a node failure while keeping the network overhead low.
\n
3.3. Dissemination protocols
\n
The purpose of dissemination protocols is to deliver information to either all or a subset of the nodes in the network. This type of communication is often referred to as a one‐to‐manycommunication pattern. Often the initiator of the communication is the base‐station when it wants to, for example, update the reporting interval. Because most of the collection protocols do not support one‐to‐one communication, dissemination protocols are also often used if a node wants to deliver a message to one particular node only, even at the expense of flooding the whole network.
\n
Two of the basic techniques used are flooding and gossiping [73]. While in the case of flooding each node just re‐broadcasts every message it receives, in the case of gossiping, a node upon receiving a message randomly chooses a neighbour to which it forwards the message. The disadvantage of flooding is the implosion and duplication of messages, while the disadvantage of gossiping is a possible large delay in propagation of the message.
\n
Heinzelman et al. proposed a family of Sensor Protocols for Information via Negotiation (SPIN) [74]. A node running SPIN, upon receiving a new message, broadcasts an advertising message containing meta‐data of the received message. Nodes which have not previously received the message reply with a request message. The node then broadcasts the data message to all the nodes that requested the data. SPIN can significantly decrease the network traffic by eliminating redundant data. However, SPIN cannot guarantee delivery of the message to all the intended recipients due to message loss and unreliable communication.
\n
Braginsky and Estrin proposed Rumor Routing (RR) [75] where nodes that wish to distribute information about a certain event generate special long‐lived packets called agents which are then gossiped through the network. Every node which receives an agent packet creates a record in its event table. Subsequently, if a node is interested in a given event, the node generates a query and uses the gossip protocol to propagate it through the network. Any node that has a record in its event table can forward the query to the node that holds the information about the event. Rumor Routing can significantly decrease the network traffic in cases where the number of events is small and the number of queries is large.
\n
Both SPIN and RR scored the lowest mark for energy efficiency—one out of four—in the survey on routing protocols [56], due to their low packet delivery rate and not being energy aware when disseminating the data.
\n
Levis et al. introduced probably the most popular dissemination protocol called Trickle [76]. It uses a ‘polite gossip’ policy where a node periodically broadcasts the message it wants to propagate, but stays quiet if it hears a message from a neighbour which is identical to its own. Because the time interval after the same message is re‐broadcast increases exponentially, each node hears only a small trickle of packets. The algorithm can achieve global dissemination of the message at a very low maintenance cost. Trickle facilitates the DRIP, DIP and DHV dissemination libraries available in TinyOS and is a key component of the CTP and RPL protocols.
\n
Kolcun et al. introduced the Static Attribute Propagation algorithm as a part of their Dragon platform [72]. The algorithm eliminates unnecessary re‐broadcasts of the message by overhearing the messages of its neighbours. It relies on the knowledge of a list of common neighbours at every node. A node upon receiving a message sets up a random timer. While waiting, the node overhears all its neighbours broadcasting the message. Upon expiration of the random timeout, the node checks whether the set of neighbours which broadcast the message cover all the nodes neighbours. If so, the message is discarded, and otherwise, the node broadcasts the message. This approach can significantly decrease the network traffic, especially in dense networks where the number of common neighbours is high.
\n
3.3.1. Special case: low‐power wireless bus
\n
The low‐power wireless bus (LWB) is a special case that considers multiple traffic patterns, including one‐to‐many, many‐to‐one and many‐to‐many traffic by exploiting the aforementioned Glossy mechanism to facilitate efficient and reliable floods [77]. It uses time synchronisation to manage access to the bus, where a global communication schedule is maintained (computed online based on immediate traffic) and flooded periodically to nodes (thus avoiding relative clock drift). The authors demonstrate that the LWB is comparable to or outperforms a number of state‐of‐the‐art stacks with regard to many‐to‐one (i.e. collection) traffic, adapts well to varying traffic volumes, significantly outperforms contemporary approaches in terms of many‐to‐many, is robust to inference and intermittent node participation, and supports mobile nodes as source or sink network devices (Table 2).\x3c!--
Please check the suggested in-text citation for Table 2.
With arrival of IPv6, researchers set about implementing it for sensor networks. This was met with several challenges. Because the main usage domain of IPv6 is Ethernet, to cope with increased Internet traffic, the maximum transmission unit (MTU) was increased from 576 to 1280 bytes, when compared to IPv4. IPv6 addresses are 128‐bit long, and the standard IPv6 header size is 40 bytes. This is in strict contrast with the IEEE 802.15.4 standard whose throughput is limited to 250 kbps and the length of the frame to 127 bytes. The standard supports two addresses: short 16‐bit and EUI‐64 extended addresses. With link headers included, the effective size of the payload could be as small as 81 bytes, which make IPv6 headers seem too large.
\n
In 2007, Mulligan and an Internet Engineering Task Force (IETF) working group published a proposal on how to transfer IPv6 packets in low‐rate wireless personal area networks. A new protocol called 6LoWPAN [79] was introduced. The aim of the working group was to define a stateless header compression that would decrease the header size so it can be used with the IEEE 802.15.4 standard. The reduction was achieved by introducing four basic header types: (i) Dispatch Header, (ii) Mesh Header, (iii) Fragmentation Header and (iv) HC1 Header (IPv6 Header Compression Header). 6LoWPAN implements variable‐sized headers, where the header size varies from 4 to 13 bytes, depending on what kind of communication is required. The protocol is also prepared to support new types of headers in the future.
\n
When an address needs to be included in the header, 6LoWPAN supports either 16‐bit short addresses or full 64‐bit addresses. These addresses are then translated to full 128‐bit IPv6 addresses by a border router. The border router is a router that enables communication between a WSN and the Internet.
\n
If a node needs to send a packet whose size is larger than the size of the payload of 802.15.4 frame (107 bytes), 6LoWPAN defines a fragmentation header which allows the node to split the original datagram into several packets. The header includes the size of the original datagram as well as the ordering number. Fragmentation is also necessary as the specification of IPv6 requires support of a minimum MTU of 1280 bytes.
\n
6LoWPAN supports two types of routing: (i) mesh‐under and (ii) route‐over. In the mesh‐under approach, routing is done by the link layer (layer two) using IEEE 802.15.4 frame or 6LoWPAN header. To send a packet to a destination node, EUI 64‐bit or 16‐bit short addresses are used to forward the packet to the next‐hop neighbour, preferably closer to the destination. To complete a single IP hop multiple link layer hops may be required. If an IP packet is fragmented into several fragments, these fragments may travel over different paths. The packet is reassembled at the final destination only. The advantage of mesh‐under is that the forwarding nodes do not need to reassemble the whole packet to make the routing decision which lowers the memory requirements. Additionally, because the packets may travel via different paths, mesh‐under can increase throughput and lower the congestion of the network. On the other hand, if the destination node is missing, a fragment of the IP packet, the whole packet (i.e. all fragments) needs to be resent.
\n
In the route‐over approach, the routing decision is done on the network layer (layer 3) and each node acts as an IP router. Each link/hop is considered to be an IP hop too. If a packet is fragmented, then all fragments are first reassembled on the next hop neighbour and the packet is passed to the network layer. The network layer decides whether the packet should be processed on the node or forwarded to a neighbour. To make this decision, the node has to either store the routing table which maps the destination address to the next‐hop address or the packet itself has to contain this information. In route‐over approach, each node must have enough memory to reconstruct the packet, and all fragments are routed via one path only. On the other hand, if a fragment is lost during the transmission, the whole IP packet must be resent over one link layer hop only.
\n
Recalling Figure 1, a full stack implementation requires some higher and lower layer primitives. At the application layer, the IETF has worked to standardise the so‐called Constrained Application Protocol (CoAP), which is essentially a RESTful (Representational State Transfer) protocol that uses a small subset of HTTP commands, and more recently TSCH at the link layer, detailed earlier. To‐date, there are no comprehensive evaluations of the energy performance of the entire stack. However, there are several which evaluate snapshots of the stack, or subsets thereof (e.g. by layer), such as in the case of CoAP in [80], where the authors show that CoAP is efficient when implemented over RPL, 6LoWPAN and ContikiMAC (and reiterate that the key efficiencies are to be gained at the link layer), and 6TiSCH [81], where a realistic energy model presented for TSCH demonstrated that under certain conditions, sub‐1% duty cycles are demonstrable for real and simulated networks under reasonable traffic loads.
\n
4.2. Composable stacks
\n
Many of the protocols described thus far have open source, modular implementations available in the libraries of the various operating systems. Therefore, they can easily be composed to suit an intended application scenario. We know that performance and appropriate selection depend on application level requirements and statistical properties of the network traffic generated by that application. Therefore, there are very few studies that explore in‐depth full‐stack implementations on per‐application bases. However, there are a number well‐documented implementations that comparatively evaluate performance such as in [77], where the authors compare the performance of LWB against Dozer (a highly efficient TDMA‐based data collection protocol) [82], CTP+A‐MAC and CTP+LPL, under a variety of conditions. CTP+A‐MAC, LWB and more recently Chaos [78] are representative state‐of‐the‐art stacks from the research community that rival the standards‐based stacks which tend to adopt something very similar to the 6TiSCH approach (Figure 1), for example. While many of the protocols described so far have been implemented in the longer‐standing operating systems developed in the research community, a number of more recent such operating systems have emerged, such as OpenWSN—https://openwsn.atlassian.net/wiki/, and RIOT—https://www.riot‐os.org/#features, which provide implementations of the standardised stack for a variety of recent hardware development platforms.
\n
4.3. Energy analysis
\n
One of the most comprehensive evaluations of a relatively complete stack is presented in [44], where CTP is run on a number of heterogeneous test‐beds, over a number of link layers, for a variety of inter‐packet intervals (typically determined by the application scenario) and at a variety of radio frequencies on various channels. While the evaluation shows that the combination of beaconing and data path validation used in its design is robust over a variety of physical and link layers, the performance characteristics still do not quite meet those needed for ultra‐long‐lived, large (i.e. extremely dense) and highly reliable applications. The authors also leave open the question of whether these methods are suitable for distance vector algorithms synonymous with ad hoc networking.
\n
Generally speaking, it is extremely difficult to validate or comparatively evaluate the energy performance of a protocol stack relative to another. The use of simulators and non‐standard test facilities (e.g. community‐known test‐beds set‐up with arbitrary configurations) contribute to this problem. This could be mitigated against by having a set of standard simulation and test‐bed configurations against which to benchmark protocols at each layer, and in combination. This has been recently alluded to in the literature in [83], wherein the authors conclude that there is insufficient knowledge available for a majority of the community when it comes to trialling experiments on real‐world facilities such that they can be trustworthy, reproducible and thus independently verifiable.
\n
5. Conclusion and future directions
\n
Practical, energy‐efficient wireless communications protocols have been comprehensively studied and documented in the literature in the preceding decades. We have presented a comprehensive summary review of the state‐of‐the‐art concerning link and routing layer technologies developed during this period suitable for constrained wireless sensor network, IoT and CPS applications.
\n
A great deal is known about their limitations and the trade‐offs inherent in their selection and implementation. It is arguable that fundamental performance limits have been reached in the design of link layer technologies for contemporary radio transceivers. For this reason, and understanding the time‐varying nature of the wireless medium, routing protocols are being developed by the standards bodies that take into account lower layer parameters in their design (e.g. IEEE 802.15.5). These may include link quality, residual energy and dynamic energy availability in the case of energy harvesting devices.
\n
Devices are incrementally more efficient, and their inter‐networking based on link and routing layer technologies is maturing to the point where protocols can confidently be selected where certain performance requirements must be satisfied. We tend to readily trade energy efficiency against reliability and determinism for industrial and high‐criticality applications. This is problematic, however, because many potential application scenarios are dismissed as economically infeasible due to high network maintenance costs. Simultaneously, as devices and protocols maximise efficiency, the gap with feasible energy harvesting from devices’ ambient environments is reducing. Coupled with other techniques and technologies, like compressive and predictive sensing, ultra‐low power wake‐up radio circuits and so on, there is an emergent design space—where applications can be holistically co‐designed with regard to energy. It is almost certain that such approaches will be investigated in the short to medium term, which will result in the economic feasibility of a range of new connected monitoring and control applications.
\n',keywords:"Internet of Things, sensor networks, energy efficiency, communications protocols",chapterPDFUrl:"https://cdn.intechopen.com/pdfs/53177.pdf",chapterXML:"https://mts.intechopen.com/source/xml/53177.xml",downloadPdfUrl:"/chapter/pdf-download/53177",previewPdfUrl:"/chapter/pdf-preview/53177",totalDownloads:992,totalViews:716,totalCrossrefCites:3,totalDimensionsCites:2,hasAltmetrics:0,dateSubmitted:"May 18th 2016",dateReviewed:"September 27th 2016",datePrePublished:null,datePublished:"March 22nd 2017",readingETA:"0",abstract:"This chapter describes the evolution of, and state of the art in, energy‐efficient techniques for wirelessly communicating networks of embedded computers, such as those found in wireless sensor network (WSN), Internet of Things (IoT) and cyberphysical systems (CPS) applications. Specifically, emphasis is placed on energy efficiency as critical to ensuring the feasibility of long lifetime, low‐maintenance and increasingly autonomous monitoring and control scenarios. A comprehensive summary of link layer and routing protocols for a variety of traffic patterns is discussed, in addition to their combination and evaluation as full protocol stacks.",reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/53177",risUrl:"/chapter/ris/53177",book:{slug:"ict-energy-concepts-for-energy-efficiency-and-sustainability"},signatures:"David Boyle, Roman Kolcun and Eric Yeatman",authors:[{id:"191964",title:"Dr.",name:"David",middleName:null,surname:"Boyle",fullName:"David Boyle",slug:"david-boyle",email:"david.boyle@imperial.ac.uk",position:null,institution:null}],sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_1_2",title:"1.1. Wireless communication",level:"2"},{id:"sec_1_3",title:"1.1.1. Communications protocol suites",level:"3"},{id:"sec_3_2",title:"1.2. Hardware",level:"2"},{id:"sec_5",title:"2. Energy‐efficient medium access control",level:"1"},{id:"sec_5_2",title:"2.1. Standards and evolution",level:"2"},{id:"sec_6_2",title:"2.2. Design trade‐offs",level:"2"},{id:"sec_8",title:"3. Energy‐efficient networking, data collection and dissemination",level:"1"},{id:"sec_8_2",title:"3.1. Data collection",level:"2"},{id:"sec_9_2",title:"3.2. Peer‐to‐peer routing",level:"2"},{id:"sec_9_3",title:"3.2.1. Geographic routing",level:"3"},{id:"sec_10_3",title:"3.2.2. Routing trees",level:"3"},{id:"sec_11_3",title:"3.2.3. Hierarchical routing",level:"3"},{id:"sec_12_3",title:"3.2.4. Ad hoc routing",level:"3"},{id:"sec_13_3",title:"3.2.5. Routing based on routing tables",level:"3"},{id:"sec_15_2",title:"3.3. Dissemination protocols",level:"2"},{id:"sec_15_3",title:"Table 2.",level:"3"},{id:"sec_18",title:"4. Full stack implementations",level:"1"},{id:"sec_18_2",title:"4.1. IPv6 over LR‐WPAN",level:"2"},{id:"sec_19_2",title:"4.2. Composable stacks",level:"2"},{id:"sec_20_2",title:"4.3. Energy analysis",level:"2"},{id:"sec_22",title:"5. Conclusion and future directions",level:"1"}],chapterReferences:[{id:"B1",body:'L. Gu and \x3c!--
References were renumbered because they are out of sequence. Please check if changes have been carried out accurately.
--\x3eJ.A. Stankovic. Radio‐triggered wake‐up for wireless sensor networks. Real‐Time Systems, 29(2–3):157–182, 2005. '},{id:"B2",body:'S.J. Marinkovic and E.M. Popovici. Nano‐power wireless wake‐up receiver with serial peripheral interface. IEEE Journal on Selected Areas in Communications, 29(8):1641–1647, 2011. '},{id:"B3",body:'M. Magno, D. Boyle, D. Brunelli, B. O\'Flynn, E. Popovici, and L. Benini. Extended wireless monitoring through intelligent hybrid energy supply. IEEE Transactions on Industrial Electronics, 61(4):1871–1881, April 2014. '},{id:"B4",body:'R.G. Baraniuk. \x3c!--
Please provide page range for Ref. [4].
--\x3eCompressive sensing. IEEE Signal Processing Magazine, 24(4), 118–121 2007. '},{id:"B5",body:'R.G. Baraniuk, V. Cevher, M.F. Duarte, and C. Hegde. Model‐based compressive sensing. IEEE Transactions on Information Theory, 56(4):1982–2001, 2010. '},{id:"B6",body:'U. Raza, A. Camerra, A.L. Murphy, T. Palpanas, and G.P. Picco. What does model‐driven data acquisition really achieve in wireless sensor networks? In 2012 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 85–94. IEEE, 2012. '},{id:"B7",body:'W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy‐efficient communication protocol for wireless microsensor networks. In 2000 Proceedings of the 33rd annual Hawaii International Conference on System Sciences, 10 pp. IEEE, 2000. '},{id:"B8",body:'L. Mottola, G.P. Picco, M. Ceriotti, S. Gunçž, and A.L. Murphy. Not all wireless sensor networks are created equal: A comparative study on tunnels. ACM Transactions on Sensor Networks (TOSN), 7(2):15, 2010. '},{id:"B9",body:'D. Boyle, B. Srbinovski, E. Popovici, and B. O\'Flynn. Energy analysis of industrial sensors in novel wireless shm systems. In Sensors, 2012 IEEE, pp. 1–4, Oct 2012. '},{id:"B10",body:'W. Ye, J. Heidemann, and D. Estrin. An energy‐efficient mac protocol for wireless sensor networks. In INFOCOM 2002. Twenty‐First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1567–1576. IEEE, 2002. '},{id:"B11",body:'A. Moschitta and I. Neri. Power consumption assessment in wireless sensor networks. ICT‐Energy‐Concepts Towards Zero‐Power Information and Communication Technology, 2014. '},{id:"B12",body:'J. Polastre, J. Hill, and D. Culler. Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 95–107. ACM, 2004. '},{id:"B13",body:'T.S. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G.N. Wong, J.K. Schulz, M. Samimi, and F. Gutierrez. Millimeter wave mobile communications for 5g cellular: It will work! IEEE Access, 1:335–349, 2013. '},{id:"B14",body:'SIG Bluetooth. Bluetooth core specification version 4.0. Specification of the Bluetooth System, 2010. '},{id:"B15",body:'T.S Rappaport et al. Wireless communications: principles and practice, vol. 2. Prentice Hall PTR ,New Jersey, 1996. '},{id:"B16",body:'Texas Instruments. Cc2420: 2.4 ghzieee 802.15. 4/zigbee‐ready rf transceiver. Available athttp://www.ti.com/lit/gpn/cc2420, 53, 2006. '},{id:"B17",body:'Texas Instruments. Cc2538 powerful wireless microcontroller system‐on‐chip for 2.4‐ghz ieee 802.15. 4, 6lowpan, and zigbee applications. CC2538 datasheet (April 2015), 2015. '},{id:"B18",body:'IEEE standard for information technology—local and metropolitan area networks—specific requirements—part 15.4: Wireless medium access control (mac) and physical layer (phy) specifications for low rate wireless personal area networks (wpans). IEEE Std 802.15.4‐2006 (Revision of IEEE Std 802.15.4‐2003), pp. 1–320, Sept 2006. '},{id:"B19",body:'ZigBee \x3c!--
Please provide complete bibliographic details for Refs. [19, 30].
--\x3eAlliance. Zigbee specification, 2006. '},{id:"B20",body:'J. Song, S. Han, A.K. Mok, D. Chen, M. Lucas, and M. Nixon. Wirelesshart: Applying wireless technology in real‐time industrial process control. In Real‐Time and Embedded Technology and Applications Symposium, 2008. RTAS\'08. IEEE, pp. 377–386. IEEE, 2008. '},{id:"B21",body:'S. Petersen and S. Carlsen. Wirelesshart versus isa100. 11a: the format war hits the factory floor. Industrial Electronics Magazine, IEEE, 5(4):23–34, 2011. '},{id:"B22",body:'R. Madan, S. Cui, S. Lall, and N. A. Goldsmith. Cross‐layer design for lifetime maximization in interference‐limited wireless sensor networks. IEEE Transactions on Wireless Communications, 5(11):3142–3152, Nov. 2006. '},{id:"B23",body:'T. Winter, P. Thubert, T. Clausen, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, and J. Vasseur. Rpl: Ipv6 routing protocol for low power and lossy networks, rfc 6550. IETF ROLL WG, Tech. Rep, 2012. '},{id:"B24",body:'C. Bormann, K. Hartke, and Z. Shelby. The Constrained Application Protocol (CoAP). RFC 7252, October 2015. '},{id:"B25",body:'T. Schmid, R. Shea, Z. Charbiwala, J. Friedman, M.B. Srivastava, and Y.H. Cho. On the interaction of clocks, power, and synchronization in duty‐cycled embedded sensor nodes. ACM Trans. Sen. Netw., 7(3):24:1–24:19, October 2010. '},{id:"B26",body:'E. O\'Connell, B. O\'Flynn, and D. Boyle. Clocks, latency and energy efficiency in duty cycled, multi‐hop wireless sensor networks. In Advances in Sensors and Interfaces (IWASI), 2013 5th IEEE International Workshop on, pp. 199–204, June 2013. '},{id:"B27",body:'P. Dutta, S. Dawson‐Haggerty, Y. Chen, C‐J. Mike Liang, and A. Terzis. Design and evaluation of a versatile and efficient receiver‐initiated link layer for low‐power wireless. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, pp. 1–14. ACM, 2010. '},{id:"B28",body:'D. Moss and P. Levis. Box‐macs: Exploiting physical and link layer boundaries in low‐power networking. Computer Systems Laboratory Stanford University, pp. 116–119, 2008. '},{id:"B29",body:'J.W. Hui and D.E. Culler. Ip is dead, long live ip for wireless sensor networks. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 15–28. ACM, 2008. '},{id:"B30",body:'A. Dunkels. The ContikiMAC radio duty cycling protocol. Technical Report T2011:13, Swedish Institute of Computer Science. December 2011.'},{id:"B31",body:'A. El‐Hoiydi and J‐D. Decotignie. Wisemac: An ultra low power mac protocol for multi‐hop wireless sensor networks. In Algorithmic Aspects of Wireless Sensor Networks, pp. 18–31. Springer, 2004. '},{id:"B32",body:'K. \x3c!--
At the end of all the references in the reference list, numerals such as 1, 2, 4, 6 etc. are appearing. Please check whether this number should be retained or deleted.
--\x3eLangendoen and A. Meier. Analyzing mac protocols for low data‐rate applications. ACM Transactions on Sensor Networks (TOSN), 7(2):19, 2010. '},{id:"B33",body:'E. O\'Connell, B. O\'Flynn, and D. Boyle. Energy & reliability optimal mac for wsns. In 2014 10th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 1–8, April 2014. '},{id:"B34",body:'A. Bachir, M. Dohler, T. Watteyne, and K.K. Leung. Mac essentials for wireless sensor networks. Communications Surveys & Tutorials, IEEE, 12(2):222–248, 2010. '},{id:"B35",body:'IEEE standard for local and metropolitan area networks–part 15.4: Low‐rate wireless personal area networks (lr‐wpans) amendment 1: Mac sublayer. IEEE Std 802.15.4e‐2012 (Amendment to IEEE Std 802.15.4‐2011), pp. 1–225, April 2012. '},{id:"B36",body:'M. Ceriotti and A.L. Murphy. A mac contest between lpl (the champion) and reins‐mac (the challenger, an anarchic tdma scheduler providing qos). In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, pp. 371–372. ACM, 2010. '},{id:"B37",body:'R. Musaloiu‐E., C.J.M. Liang, and A. Terzis. Koala: Ultra‐low power data retrieval in wireless sensor networks. In 2008 IPSN ‘08. International Conference on Information Processing in Sensor Networks, pp. 421–432, April 2008. '},{id:"B38",body:'Y. Sun, O. Gurewitz, and D.B. Johnson. Ri‐mac: A receiver‐initiated asynchronous duty cycle mac protocol for dynamic traffic loads in wireless sensor networks. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys ‘08, pp. 1–14, New York, NY, USA, 2008. ACM. '},{id:"B39",body:'D. Carlson and A. Terzis. Flip‐mac: A density‐adaptive contention‐reduction protocol for efficient any‐to‐one communication. In 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1–8. IEEE, 2011. '},{id:"B40",body:'F. Ferrari, M. Zimmerling, L. Thiele, and O. Saukh. Efficient network flooding and time synchronization with glossy. In 2011 10th International Conference on Information Processing in Sensor Networks (IPSN), pp. 73–84. IEEE, 2011. '},{id:"B41",body:'G. Lu, B. Krishnamachari, and C.S. Raghavendra. Performance evaluation of the IEEE 802.15.4 mac for low‐rate low‐power wireless networks. In 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 701–706, 2004. '},{id:"B42",body:'P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, and D. Culler. Tinyos: An operating system for sensor networks. In W. Weber, J.M. Rabaey, and E. Aarts, editors, Ambient Intelligence, pp. 115–148. Springer, Berlin Heidelberg, 2005. '},{id:"B43",body:'K. Pister and L. Doherty. Tsmp: Time synchronized mesh protocol. IASTED Distributed Sensor Networks, pp. 391–398, 2008. '},{id:"B44",body:'O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis. Collection tree protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys ‘09, pp. 1–14, New York, NY, USA, 2009. ACM. '},{id:"B45",body:'T. Istomin, C. Kiraly, and G.P. Picco. Is rpl ready for actuation? A comparative evaluation in a smart city scenario. In Wireless Sensor Networks, pp. 291–299. Springer, 2015. '},{id:"B46",body:'A. Dunkels, B. Gronvall, and T. Voigt. Contiki—a lightweight and flexible operating system for tiny networked sensors. In 2004 29th Annual IEEE International Conference on Local Computer Networks, pp. 455–462, Nov 2004.'},{id:"B47",body:'A. Dunkels, F. Österlind, and Z. He. An adaptive communication architecture for wireless sensor networks. In SenSys ‘07, pp. 335–349, 2007. '},{id:"B48",body:'S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong. The design of an acquisitional query processor for sensor networks. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD ‘03, pp. 491–502, New York, NY, USA, 2003. ACM. '},{id:"B49",body:'J.G. Ko, S. Dawson‐Haggerty, O. Gnawali, D. Culler, and A. Terzis. Evaluating the performance of rpl and 6lowpan in tinyos. In Workshop on Extending the Internet to Low Power and Lossy Networks (IPSN), vol. 80, pp. 85–90, 2011. '},{id:"B50",body:'J.G. Ko, J. Eriksson, N. Tsiftes, S. Dawson‐Haggerty, J‐P. Vasseur, M. Durvy, A. Terzis, A. Dunkels, and D. Culler. Industry: Beyond interoperability: Pushing the performance of sensor network ip stacks. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, SenSys ‘11, pp. 1–11, New York, NY, USA, 2011. ACM. '},{id:"B51",body:'S. Lindsey, C.S. Raghavendra, and K.M. Sivalingam. Data gathering in sensor networks using the energy delay metric. In Proceedings of the 15th International Parallel & Distributed Processing Symposium, IPDPS ‘01, pp. 188, Washington, DC, USA, 2001. IEEE Computer Society. '},{id:"B52",body:'S. Moeller, A. Sridharan, B. Krishnamachari, and O. Gnawali. Routing without routes: The backpressure collection protocol. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN ‘10, pp. 279–290, New York, NY, USA, 2010. ACM. '},{id:"B53",body:'W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy‐efficient communication protocol for wireless microsensor networks. In 2000 Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 10 pp. vol. 2, Jan 2000. '},{id:"B54",body:'S. Lindsey and C.S. Raghavendra. Pegasis: Power‐efficient gathering in sensor information systems. In Aerospace Conference Proceedings, 2002. IEEE, vol. 3, pp. 3–1125–3–1130, 2002. '},{id:"B55",body:'O. Younis and S. Fahmy. Distributed clustering in ad‐hoc sensor networks: a hybrid, energy‐efficient approach. In INFOCOM 2004. Twenty‐third Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 640, March 2004. '},{id:"B56",body:'A. Murtala Zungeru, L.‐M. Ang, and K.P. Seng. Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison. Journal of Network and Computer Applications, 35(5):1508–1536, 2012. Service Delivery Management in Broadband Networks. '},{id:"B57",body:'P. Bahl and V.N. Padmanabhan. Radar: an in‐building rf‐based user location and tracking system. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pp. 775–784 vol. 2, 2000. '},{id:"B58",body:'N. Bulusu, J. Heidemann, and D. Estrin. Gps‐less low‐cost outdoor localization for very small devices. Personal Communications, IEEE, 7(5):28–34, Oct 2000. '},{id:"B59",body:'L. Doherty, K.S.J. Pister, and L. El Ghaoui. Convex position estimation in wireless sensor networks. In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pp. 1655–1663, vol. 3, 2001. '},{id:"B60",body:'B. Karp and H.T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom’00, pp. 243–254, New York, NY, USA, 2000. ACM. '},{id:"B61",body:'F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger. Geometric ad‐hoc routing: Of theory and practice. In Proceedings of the Twenty‐second Annual Symposium on Principles of Distributed Computing, PODC ‘03, pp. 63–72, New York, NY, USA, 2003. ACM. '},{id:"B62",body:'Y. Yu, R. Govindan, and D. Estrin. Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report, Technical report ucla/csd‐tr‐01‐0023, UCLA Computer Science Department, 2001. '},{id:"B63",body:'K. Iwanicki and M. van Steen. On hierarchical routing in wireless sensor networks. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, IPSN ‘09, pp. 133–144, Washington, DC, USA, 2009. IEEE Computer Society. '},{id:"B64",body:'S. Duquennoy, O. Landsiedel, and T. Voigt. Let the tree bloom: Scalable opportunistic routing with orpl. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, SenSys ‘13, pp. 2:1–2:14, New York, NY, USA, 2013. ACM. '},{id:"B65",body:'Burton H. Bloom. Space/time trade‐offs in hash coding with allowable errors. Communications of the ACM, 13(7):422–426, July 1970. '},{id:"B66",body:'S.R. Mihaylov, M. Jacob, Z.G. Ives, and S. Guha. A substrate for in‐network sensor data integration. In Proceedings of the 5th Workshop on Data Management for Sensor Networks, DMSN ‘08, pp. 35–41, New York, NY, USA, 2008. ACM. '},{id:"B67",body:'E. Cañete, M. Daz, L. Llopis, and B. Rubio. Hero: A hierarchical, efficient and reliable routing protocol for wireless sensor and actor networks. Computer Communications, 35(11):1392–1409, June 2012. '},{id:"B68",body:'D.B. Johnson and D.A. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H.F. Korth, editors, Mobile Computing, The Kluwer International Series in Engineering and Computer Science, vol. 353, pp. 153–181. Springer, USA, 1996. '},{id:"B69",body:'S‐J. Lee and M. Gerla. Aodv‐br: backup routing in ad hoc networks. In Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE, vol. 3, pp. 1311–1316, 2000.'},{id:"B70",body:'C.E. Perkins and E.M. Royer. Ad‐hoc on‐demand distance vector routing. In WMCSA ‘99. Second IEEE Workshop on Mobile Computing Systems and Applications, 1999. Proceedings, WMCSA ‘99, pp. 90–100, Feb 1999. '},{id:"B71",body:'R.C. Shah and J.M. Rabaey. Energy aware routing for low energy ad hoc sensor networks. In Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, vol. 1, pp. 350–355, Mar 2002.'},{id:"B72",body:'R. Kolcun, D.E. Boyle, and J.A. McCann. Efficient distributed query processing. IEEE Transactions on Automation Science and Engineering, pp. 1–17, July 2016. '},{id:"B73",body:'S.M. Hedetniemi, S.T. Hedetniemi, and A.L. Liestman. A survey of gossiping and broadcasting in communication networks. Networks, 18(4):319–349, 1988.'},{id:"B74",body:'W.R. Heinzelman, J. Kulik, and H. Balakrishnan. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom ‘99, pp. 174–185, New York, NY, USA, 1999. ACM. '},{id:"B75",body:'D. Braginsky and D. Estrin. Rumor routing algorithm for sensor networks. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, WSNA ‘02, pp. 22–31, New York, NY, USA, 2002. ACM. '},{id:"B76",body:'P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A self‐regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation ‐ Volume 1, NSDI\'04, pp. 2–2, Berkeley, CA, USA, 2004. USENIX Association. '},{id:"B77",body:'F. Ferrari, M. Zimmerling, L. Mottola, and L. Thiele. Low‐power wireless bus. In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys ‘12, pp. 1–14, New York, NY, USA, 2012. ACM. '},{id:"B78",body:'O. Landsiedel, F. Ferrari, and M. Zimmerling. Chaos: Versatile and efficient all‐to‐all data sharing and in‐network processing at scale. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, SenSys ‘13, pp. 1:1–1:14, New York, NY, USA, 2013. ACM. '},{id:"B79",body:'G. Mulligan. The 6lowpan architecture. In Proceedings of the 4th Workshop on Embedded Networked Sensors, EmNets ‘07, pp. 78–82, New York, NY, USA, 2007. ACM. '},{id:"B80",body:'M. Kovatsch, S. Duquennoy, and A. Dunkels. A low‐power coap for contiki. In 2011 IEEE Eighth International Conference on Mobile Ad‐Hoc and Sensor Systems, pp. 855–860, Oct 2011. '},{id:"B81",body:'X. Vilajosana, Q. Wang, F. Chraim, T. Watteyne, T. Chang, and K.S.J. Pister. A realistic energy consumption model for TSCH networks. IEEE Sensors Journal, 14(2):482–489, Feb 2014. '},{id:"B82",body:'N. Burri, P. von Rickenbach, and R. Wattenhofer. Dozer: Ultra‐low power data gathering in sensor networks. In Proceedings of the 6th International Conference on Information Processing in Sensor Networks, IPSN ‘07, pp. 450–459, New York, NY, USA, 2007. ACM. '},{id:"B83",body:'G. Z. Papadopoulos, K. Kritsis, A. Gallais, P. Chatzimisios, and T. Noel. Performance evaluation methods in ad hoc and wireless sensor networks: a literature study. IEEE Communications Magazine, 54(1):122–128, January 2016. '},{id:"B84",body:'P. Thubert. An architecture for IPv6 over the TSCH mode of IEEE 802.15.4. Internet‐Draft draft‐ietf‐6tisch‐architecture‐09, Internet Engineering Task Force, November 2015. Work in Progress. '}],footnotes:[{id:"fn1",explanation:" Full coverage of wireless communication fundamentals is available in [15]."},{id:"fn2",explanation:" The practical implementation of a protocol suite is typically referred to as a ‘stack’."},{id:"fn3",explanation:" RPL is in fact designed to support any-to-any communication; however, very little work has been done in this regard, with early evaluations suggesting that it is not ready for actuation-type messages [45]."}],contributors:[{corresp:"yes",contributorFullName:"David Boyle",address:"david.boyle@imperial.ac.uk",affiliation:'
Department of Electrical and Electronic Engineering, Imperial College London, England
Department of Electrical and Electronic Engineering, Imperial College London, England
'}],corrections:null},book:{id:"5350",title:"ICT - Energy Concepts for Energy Efficiency and Sustainability",subtitle:null,fullTitle:"ICT - Energy Concepts for Energy Efficiency and Sustainability",slug:"ict-energy-concepts-for-energy-efficiency-and-sustainability",publishedDate:"March 22nd 2017",bookSignature:"Giorgos Fagas, Luca Gammaitoni, John P. Gallagher and Douglas J. Paul",coverURL:"https://cdn.intechopen.com/books/images_new/5350.jpg",licenceType:"CC BY-NC 4.0",editedByType:"Edited by",editors:[{id:"168209",title:"Dr.",name:"Giorgos",middleName:null,surname:"Fagas",slug:"giorgos-fagas",fullName:"Giorgos Fagas"}],productType:{id:"3",title:"Monograph",chapterContentType:"chapter",authoredCaption:"Authored by"},chapters:[{id:"54075",title:"Energy Challenges for ICT",slug:"energy-challenges-for-ict",totalDownloads:1704,totalCrossrefCites:1,signatures:"Giorgos Fagas, John P. Gallagher, Luca Gammaitoni and Douglas J.\nPaul",authors:[{id:"168209",title:"Dr.",name:"Giorgos",middleName:null,surname:"Fagas",fullName:"Giorgos Fagas",slug:"giorgos-fagas"}]},{id:"54033",title:"Fundamentals on Energy in ICT",slug:"fundamentals-on-energy-in-ict",totalDownloads:735,totalCrossrefCites:0,signatures:"Luca Gammaitoni",authors:[{id:"168284",title:"Prof.",name:"Luca",middleName:null,surname:"Gammaitoni",fullName:"Luca Gammaitoni",slug:"luca-gammaitoni"}]},{id:"53179",title:"Measuring Energy",slug:"measuring-energy",totalDownloads:649,totalCrossrefCites:1,signatures:"Steve Kerrison, Markus Buschhoff, Jose Nunez-Yanez and Kerstin\nEder",authors:[{id:"185803",title:"Prof.",name:"Kerstin",middleName:null,surname:"Eder",fullName:"Kerstin Eder",slug:"kerstin-eder"},{id:"209323",title:"Dr.",name:"Jose",middleName:null,surname:"Nunez-Yanez",fullName:"Jose Nunez-Yanez",slug:"jose-nunez-yanez"},{id:"209333",title:"Dr.",name:"Steve",middleName:null,surname:"Kerrison",fullName:"Steve Kerrison",slug:"steve-kerrison"}]},{id:"53599",title:"An Energy-Efficient Design Paradigm for a Memory Cell Based on Novel Nanoelectromechanical Switches",slug:"an-energy-efficient-design-paradigm-for-a-memory-cell-based-on-novel-nanoelectromechanical-switches",totalDownloads:621,totalCrossrefCites:0,signatures:"Azam Seyedi, Vasileios Karakostas, Stefan Cosemans, Adrian Cristal,\nMario Nemirovsky and Osman Unsal",authors:[{id:"186363",title:"Dr.",name:"Azam",middleName:null,surname:"Seyedi",fullName:"Azam Seyedi",slug:"azam-seyedi"}]},{id:"53164",title:"Energy-Aware Software Engineering",slug:"energy-aware-software-engineering",totalDownloads:730,totalCrossrefCites:3,signatures:"Kerstin Eder and John P. Gallagher",authors:[{id:"185803",title:"Prof.",name:"Kerstin",middleName:null,surname:"Eder",fullName:"Kerstin Eder",slug:"kerstin-eder"},{id:"187818",title:"Prof.",name:"John P.",middleName:null,surname:"Gallagher",fullName:"John P. Gallagher",slug:"john-p.-gallagher"}]},{id:"53613",title:"Energy-Aware High Performance Computing",slug:"energy-aware-high-performance-computing",totalDownloads:732,totalCrossrefCites:0,signatures:"Martin Wlotzka, Vincent Heuveline, Manuel F. Dolz, M. Reza\nHeidari, Thomas Ludwig, A. Cristiano I. Malossi and Enrique S.\nQuintana-Orti",authors:[{id:"185597",title:"Mr.",name:"Martin",middleName:null,surname:"Wlotzka",fullName:"Martin Wlotzka",slug:"martin-wlotzka"},{id:"188048",title:"Prof.",name:"Vincent",middleName:null,surname:"Heuveline",fullName:"Vincent Heuveline",slug:"vincent-heuveline"},{id:"188049",title:"Dr.",name:"Manuel F.",middleName:null,surname:"Dolz",fullName:"Manuel F. Dolz",slug:"manuel-f.-dolz"},{id:"188052",title:"Prof.",name:"Thomas",middleName:null,surname:"Ludwig",fullName:"Thomas Ludwig",slug:"thomas-ludwig"},{id:"188054",title:"Dr.",name:"A. Cristiano I.",middleName:null,surname:"Malossi",fullName:"A. Cristiano I. Malossi",slug:"a.-cristiano-i.-malossi"},{id:"188055",title:"Prof.",name:"Enrique S.",middleName:null,surname:"Quintana Orti",fullName:"Enrique S. Quintana Orti",slug:"enrique-s.-quintana-orti"},{id:"188058",title:"MSc.",name:"M. Reza",middleName:null,surname:"Heidari",fullName:"M. Reza Heidari",slug:"m.-reza-heidari"}]},{id:"53177",title:"Energy-Efficient Communication in Wireless Networks",slug:"energy-efficient-communication-in-wireless-networks",totalDownloads:992,totalCrossrefCites:3,signatures:"David Boyle, Roman Kolcun and Eric Yeatman",authors:[{id:"191964",title:"Dr.",name:"David",middleName:null,surname:"Boyle",fullName:"David Boyle",slug:"david-boyle"}]},{id:"53053",title:"Globally Optimised Energy-Efficient Data Centres",slug:"globally-optimised-energy-efficient-data-centres",totalDownloads:801,totalCrossrefCites:1,signatures:"Dirk Pesch, Susan Rea, J. Ignacio Torrens, Vojtech Zavrel, J.L.M.\nHensen, Diarmuid Grimes, Barry O'Sullivan, Thomas Scherer, Robert\nBirke, Lydia Chen, Ton Engbersen, Lara Lopez, Enric Pages, Deepak\nMehta, Jacinta Townley and Vassilios Tsachouridis",authors:[{id:"189880",title:"Dr.",name:"Dirk",middleName:null,surname:"Pesch",fullName:"Dirk Pesch",slug:"dirk-pesch"}]},{id:"53130",title:"Thermoelectrics, Photovoltaics and Thermal Photovoltaics for Powering ICT Devices and Systems",slug:"thermoelectrics-photovoltaics-and-thermal-photovoltaics-for-powering-ict-devices-and-systems",totalDownloads:759,totalCrossrefCites:0,signatures:"Lourdes Ferre Llin and Douglas J. Paul",authors:[{id:"168459",title:"Prof.",name:"Douglas",middleName:"J.",surname:"Paul",fullName:"Douglas Paul",slug:"douglas-paul"}]}]},relatedBooks:[{type:"book",id:"3589",title:"ICT - Energy - Concepts Towards Zero",subtitle:"Power Information and Communication Technology",isOpenForSubmission:!1,hash:"52d111bb721e0d749c1cee6c8b6d8ab8",slug:"ict-energy-concepts-towards-zero-power-information-and-communication-technology",bookSignature:"Giorgos Fagas, Luca Gammaitoni, Douglas Paul and Gabriel Abadal Berini",coverURL:"https://cdn.intechopen.com/books/images_new/3589.jpg",editedByType:"Edited by",editors:[{id:"168209",title:"Dr.",name:"Giorgos",surname:"Fagas",slug:"giorgos-fagas",fullName:"Giorgos Fagas"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"45937",title:"A Research Agenda Towards Zero-Power ICT",slug:"a-research-agenda-towards-zero-power-ict",signatures:"Gabriel Abadal Berini, Giorgos Fagas, Luca Gammaitoni and\nDouglas Paul",authors:[{id:"168209",title:"Dr.",name:"Giorgos",middleName:null,surname:"Fagas",fullName:"Giorgos Fagas",slug:"giorgos-fagas"},{id:"63935",title:"Prof.",name:"Luca",middleName:null,surname:"Gammaitoni",fullName:"Luca Gammaitoni",slug:"luca-gammaitoni"},{id:"168251",title:"Associate Prof.",name:"Gabriel",middleName:null,surname:"Abadal",fullName:"Gabriel Abadal",slug:"gabriel-abadal"},{id:"168459",title:"Prof.",name:"Douglas",middleName:"J.",surname:"Paul",fullName:"Douglas Paul",slug:"douglas-paul"}]},{id:"46168",title:"Energy Management at the Nanoscale",slug:"energy-management-at-the-nanoscale",signatures:"Luca Gammaitoni",authors:[{id:"63935",title:"Prof.",name:"Luca",middleName:null,surname:"Gammaitoni",fullName:"Luca Gammaitoni",slug:"luca-gammaitoni"}]},{id:"45931",title:"Kinetic Energy Harvesting",slug:"kinetic-energy-harvesting",signatures:"Helios Vocca and Francesco Cottone",authors:[{id:"149370",title:"Dr.",name:"Francesco",middleName:null,surname:"Cottone",fullName:"Francesco Cottone",slug:"francesco-cottone"},{id:"168298",title:"Dr.",name:"Helios",middleName:null,surname:"Vocca",fullName:"Helios Vocca",slug:"helios-vocca"}]},{id:"45742",title:"Thermoelectric Energy Harvesting",slug:"thermoelectric-energy-harvesting",signatures:"Douglas Paul",authors:[{id:"168459",title:"Prof.",name:"Douglas",middleName:"J.",surname:"Paul",fullName:"Douglas Paul",slug:"douglas-paul"}]},{id:"45904",title:"Electromagnetic Radiation Energy Harvesting – The Rectenna Based Approach",slug:"electromagnetic-radiation-energy-harvesting-the-rectenna-based-approach",signatures:"Gabriel Abadal, Javier Alda and Jordi Agustí",authors:[{id:"168251",title:"Associate Prof.",name:"Gabriel",middleName:null,surname:"Abadal",fullName:"Gabriel Abadal",slug:"gabriel-abadal"},{id:"168373",title:"Prof.",name:"Javier",middleName:null,surname:"Alda",fullName:"Javier Alda",slug:"javier-alda"},{id:"168374",title:"MSc.",name:"Jordi",middleName:null,surname:"Agustí",fullName:"Jordi Agustí",slug:"jordi-agusti"}]},{id:"45932",title:"Energy Storage: Battery Materials and Architectures at the Nanoscale",slug:"energy-storage-battery-materials-and-architectures-at-the-nanoscale",signatures:"James F. Rohan, Maksudul Hasan, Sanjay Patil, Declan P. Casey and\nTomás Clancy",authors:[{id:"153161",title:"Dr.",name:"James",middleName:null,surname:"Rohan",fullName:"James Rohan",slug:"james-rohan"}]},{id:"46170",title:"Minimum Energy of Computing, Fundamental Considerations",slug:"minimum-energy-of-computing-fundamental-considerations",signatures:"Victor Zhirnov, Ralph Cavin and Luca Gammaitoni",authors:[{id:"63935",title:"Prof.",name:"Luca",middleName:null,surname:"Gammaitoni",fullName:"Luca Gammaitoni",slug:"luca-gammaitoni"}]},{id:"45936",title:"Electronics for Power and Energy Management",slug:"electronics-for-power-and-energy-management",signatures:"Naser Khosro Pour, François Krummenacher and Maher Kayal",authors:[{id:"168386",title:"Mr.",name:"Naser",middleName:null,surname:"Khosro Pour",fullName:"Naser Khosro Pour",slug:"naser-khosro-pour"}]},{id:"45946",title:"Power consumption Assessment in Wireless Sensor Networks",slug:"power-consumption-assessment-in-wireless-sensor-networks",signatures:"Antonio Moschitta and Igor Neri",authors:[{id:"168252",title:"M.Sc.",name:"Igor",middleName:null,surname:"Neri",fullName:"Igor Neri",slug:"igor-neri"},{id:"168283",title:"Dr.",name:"Antonio",middleName:null,surname:"Moschitta",fullName:"Antonio Moschitta",slug:"antonio-moschitta"}]},{id:"46019",title:"Autonomous Sensors: Existing and Prospective Applications",slug:"autonomous-sensors-existing-and-prospective-applications",signatures:"Francesco Orfei and Giulia Orecchini",authors:[{id:"168281",title:"Dr.Ing.",name:"Francesco",middleName:null,surname:"Orfei",fullName:"Francesco Orfei",slug:"francesco-orfei"},{id:"168282",title:"Dr.",name:"Giulia",middleName:null,surname:"Orecchini",fullName:"Giulia Orecchini",slug:"giulia-orecchini"}]}]}]},onlineFirst:{chapter:{type:"chapter",id:"63007",title:"Mathematical Model as a Tool for the Control of Vector-Borne Diseases: Wolbachia Example",doi:"10.5772/intechopen.79754",slug:"mathematical-model-as-a-tool-for-the-control-of-vector-borne-diseases-wolbachia-example",body:'\n
\n
1. Introduction
\n
Dengue is a vector-borne disease caused by four distinct serotypes (DEN1–DEN4), and is endemic in most countries particularly in tropical and subtropical areas [1]. It is estimated that around 390 million cases happen each year [2]. Individuals obtain lifelong immunity to the serotype that they are infected with, but have a higher chance to get the most severe form of dengue in the subsequent infection [1]. It is estimated that around 500,000 individuals get severe dengue and require hospitalisation. Of these, about 2.5% die [3]. Without a proper treatment, the fatality rate can reach 20% [3]. Dengue is also a substantial public health and economic burden [4].
\n
A number of strategies have been implemented, but they are generally effective in the short term. Although some progresses have been made for dengue antiviral treatment, dengue control strategies still depend on vector control [5]. One of the strategies against dengue is by the use of Wolbachia bacterium. There are two Wolbachia strains used in the experiments: WMelPop and WMel. WMelPop strain can reduce the mosquito lifespan of more than 50% and almost 20% reduction in fecundity [6]. WMel strain reduces the lifespan of around 10% and only small reduction in fecundity [6]. Wolbachia can reduce the level of virus in the salivary glands. Wolbachia gives reproductive advantage for Wolbachia-carrying female mosquitoes known as cytoplasmic incompatibility (CI). The Wolbachia-carrying female mosquitoes can reproduce when mating with both non-Wolbachia and Wolbachia-carrying male mosquitoes. Non-Wolbachia female mosquitoes can reproduce when mating with non-Wolbachia males [7]. Field experiments showed that Wolbachia-carrying mosquitoes have established and dominated the population [8]. When Wolbachia-carrying mosquitoes persist in the field, the Wolbachia intervention can be implemented. The question that arises is that to what extend this intervention can reduce dengue transmission? To answer the above question, a number of mathematical models have been formulated and analysed. Mathematical model is a useful tool to understand complex phenomena. This can be used to understand population dynamics [9], disease transmission dynamics [10, 11], and others [12, 13]. A number of mathematical models have been developed to examine the persistence and spread of Wolbachia-carrying mosquitoes and its effects on dengue transmission dynamics. In this chapter, we review the existing mathematical models of Wolbachia-carrying mosquito population dynamics and dengue with Wolbachia intervention, give examples of the mathematical models, and show several numerical simulations to illustrate the model’s solutions.
\n
\n
\n
2. Mathematical modelling
\n
This section presents background on mathematical modelling of infectious diseases. Mathematical modelling is a useful tool to understand complex phenomena including disease transmission dynamics and their control strategies. There are several types of modelling that are generally used: deterministic, stochastic, statistical, agent-based modelling, and the others. A deterministic model is mostly used because it is easily solved and can include many parameters or variables. The model is in the form of system of differential equations.
\n
Many mathematical models have been developed to investigate disease transmission dynamics including vector-borne diseases [14]. The model is based on a standard SIR model where the human population is divided into susceptible (S), infected (I), and recovered (R) [15]. The susceptible individuals become exposed after being contacted with infected individuals at a rate \n\nβ\n\n. They then recover at a rate \n\nγ\n\n. The model is written in the following system of differential equations:
The model can then be extended to include other compartments and parameters depending on the characteristics of diseases. For example, if the disease has long incubation period, we can add exposed compartment. If the disease is transmitted via vector, we can add another system of equations describing vector dynamics. When one aims to investigate the effects of vaccination, vaccinated compartment can be included. The important principles in modelling are to know characteristics of studied phenomena and the purpose of the research. The principles have been applied when we formulate mathematical models for Wolbachia-carrying mosquito population dynamics and dengue with Wolbachia.
\n
\n
\n
3. Overview of mathematical models of Wolbachia and dengue
\n
In this section, we review existing mathematical model of Wolbachia-carrying mosquito population dynamics and dengue with Wolbachia intervention.
\n
Many (spatial and non-spatial) mathematical models have been formulated to analyse the persistence and spread or dispersal of Wolbachia-carrying mosquitoes in the populations [9, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29]. The general aim is to understand the underlying factors required for the persistence and spread of Wolbachia-carrying mosquitoes.
\n
A number of nonspatial mathematical model for Wolbachia-carrying mosquito population dynamics have been developed. Ndii et al. [19] developed a mathematical model for Wolbachia-carrying mosquito population dynamics and assessed the persistence of Wolbachia-carrying mosquito populations. They found that Wolbachia-carrying mosquitoes persist in the population given that the death rate is not too high. Zhang et al. [30] formulated a mathematical model to assess the best strategies for releasing Wolbachia-carrying mosquitoes. They found that initial quantities of non-Wolbachia and Wolbachia-carrying mosquitoes and augmentation methods (timing, quantity, and order of frequency) determine the success of the Wolbachia intervention. They also formulated birth-pulse model with different density dependent death rate functions. They found that for condition with a strong density dependent death rate, the initial ratio of non-Wolbachia and Wolbachia-carrying mosquitoes should exceed a critical threshold for Wolbachia-carrying mosquitoes to dominate the population.
\n
The spatial mathematical models have been developed to assess the Wolbachia-carrying mosquitoes’ dispersal. Chan and Kim [9] used reaction diffusion approach and incorporated slow and fast dispersal mode to assess the dynamics of the Wolbachia spread. They found that temperature affects the wavespeed of the Wolbachia-carrying Aedes aegypti, that is, Wolbachia invasion for Aedes aegypti increases when the temperature decreases within the optimal temperature rate for mosquito survival. Hancock et al. [17] developed a metapopulation model to assess the spatial dynamics of Wolbachia. They found that spatial variation in the density-dependent competition experienced by juvenile host insects can influence the spread of Wolbachia into population. In their other paper [16], they found a new expression for the threshold which takes into account the main aspects of insects’ life history. They showed that constant or pulsed immigrations affect the spread of Wolbachia-carrying mosquitoes.
\n
Mathematical models for Wolbachia-carrying mosquitoes’ populations consider several important aspects. They are cytoplasmic incompatibility (CI), the maternal transmission, Wolbachia-carrying mosquito death rate, release strategies of Wolbachia-carrying mosquitoes [9, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 31, 32]. These are expressed in the parameters, variables, or simulations.
\n
A number of mathematical models have been developed to understand dengue transmission mathematical models [33, 34]. However, little mathematical models have been developed to investigate the efficacy of Wolbachia-intervention [35, 36, 37, 38, 39, 40] in reducing dengue transmission. Hancock et al. [39] developed a mathematical model and investigated the strategies for releasing Wolbachia-carrying mosquitoes and its effects on dengue transmission dynamics. They found that male-biased releases can substantially reduce the dengue transmission. Furthermore, male-biased release can be an effective strategy that results in the persistence of Wolbachia-carrying mosquitoes. Ndii et al. [36, 41, 42] formulated single and two serotype dengue mathematical models to investigate the Wolbachia effectiveness in reducing dengue transmission. They found that Wolbachia can reduce primary and secondary dengue infections with higher reduction in secondary infections. Hughes and Britton [35] found that Wolbachia can reduce dengue transmission in areas where the basic reproduction number is not too high. This implies that Wolbachia can reduce dengue transmission in areas with low to moderate transmission settings, which is similar to that found Ndii et al. [36] and Ferguson et al. [37]. Supriatna et al. [40] showed that Wolbachia can reduce the value of basic reproduction number. In their other paper, they showed that the predatory and Wolbachia can reduce primary and secondary infections [43]. Furthermore, Supriatna et al. [44] investigated the use of vaccine and Wolbachia on dengue transmission dynamics [44] and showed that the optimal dengue control is determined by the epidemiological parameters and economic factors. Furthermore, they found that introducing too many Wolbachia-carrying mosquitoes would be counter-productive.
\n
\n
\n
4. Examples and numerical simulations of mathematical models
\n
In this section, we present examples of mathematical models of Wolbachia-carrying mosquito population dynamics and dengue with Wolbachia intervention and their numerical simulations.
\n
\n
4.1. Mathematical model of Wolbachia-carrying mosquito population dynamics and numerical simulations
\n
\n
4.1.1. Mathematical model of Wolbachia-carrying mosquito population dynamics
\n
Here, we present an example of the mathematical model of the Wolbachia-carrying mosquito population dynamics. We present the model by Ndii et al. [19, 45] and show several numerical simulations. The mosquito population is divided into aquatic (\n\n\nA\nN\n\n\n and \n\n\nA\nW\n\n\n), male (\n\n\nM\nN\n\n\n and \n\n\nM\nW\n\n\n) and female (\n\n\nF\nN\n\n\n and \n\n\nF\nW\n\n\n) mosquitoes. Note that the aquatic compartment consists of eggs, larvae and pupae, which are grouped into one compartment. Furthermore, the subscripts \n\nM\n\n and \n\nW\n\n denote non-Wolbachia and Wolbachia-carrying mosquito population.
\n
The effect of CI is captured by the following expression. The non-Wolbachia female mosquitoes reproduce when mating with non-Wolbachia males, which is governed by the following equations:
and the Wolbachia-carrying females reproduce when mating with non-Wolbachia and Wolbachia-carrying males, which is governed by the following equations:
Note that the population growth is limited by carrying capacity \n\nK\n\n. The maternal transmission is not perfect [46]. This means that not all Wolbachia-carrying aquatic mature to be Wolbachia-carrying adult. There is a proportion of \n\n\n\n1\n−\nα\n\n\n\n that mature to be non-Wolbachia adults that is \n\n\nϵ\nNW\n\n\n\n1\n−\nα\n\n\n\n. Note that the ratio of male and female mosquitoes is denoted by \n\nϵ\n\n (\n\n\nϵ\nN\n\n,\n\nϵ\nW\n\n,\n\nϵ\nNW\n\n\n). The model is governed by the following systems of differential equations:
where \n\nP\n=\n\nM\nN\n\n+\n\nF\nN\n\n+\n\nM\nW\n\n+\n\nF\nW\n\n\n is the total population.
\n
\n
\n
4.1.2. Numerical simulations
\n
In this section, numerical simulations are conducted to illustrate the solutions of the model. The parameter values used are given in Table 1. The initial conditions are \n\n\nA\n\nN\n0\n\n\n=\n0\n\n, \n\n\nF\n\nN\n0\n\n\n=\n\nM\n\nN\n0\n\n\n=\n7253\n\n, \n\n\nA\n\nW\n0\n\n\n=\n0\n\n, and \n\n\nM\n\nW\n0\n\n\n=\n\nF\n\nW\n0\n\n\n=\n14200\n\n.
Parameter descriptions, values, and sources. Note that W and N are used to indicate Wolbachia-carrying and non-Wolbachia mosquitoes in the parameter descriptions, respectively. \n\n\nN\nH\n\n=\n\n10\n5\n\n\n.
\n
Figure 1 shows the numerical solutions of the model using the parameter values given in Table 1, but the Wolbachia adult mosquito death rate is \n\n2\n×\n\nμ\nN\n\n\n. This reflects the WMelPop Wolbachia strain which reduces the mosquito lifespan by a half. Figure 1 shows that the non-Wolbachia mosquitoes dominate the population. This means that this strain cannot be used as a strategy to reduce dengue transmission. Figure 2 shows the numerical solutions of the model using the parameter values given in Table 1. The Wolbachia mosquito death rate is \n\n1.1\n×\n\nμ\nN\n\n\n which reflects the WMel Wolbachia strain. This strain reduces the mosquito lifespan by around 10%. It shows that the Wolbachia-carrying mosquitoes dominate the population. This means that WMel strain can be used in the Wolbachia intervention. Figure 3 shows the simulation results using WMel parameter values with initial conditions of \n\n\nA\n\nN\n0\n\n\n=\n0\n\n, \n\n\nF\n\nN\n0\n\n\n=\n\nM\n\nN\n0\n\n\n=\n7253\n\n, \n\n\nA\n\nW\n0\n\n\n=\n0\n\n, and \n\n\nM\n\nW\n0\n\n\n=\n\nF\n\nW\n0\n\n\n=\n145\n\n. It shows that the non-Wolbachia mosquitoes dominate the populations. It implies that the initial conditions also affects the persistence of Wolbachia-carrying mosquitoes.
\n
Figure 1.
Numerical simulations of the Model (4). The parameter values used are given in Table 1, but the parameter \n\n\nμ\nW\n\n\n is \n\n2\n×\n\nμ\nN\n\n\n to reflect the WMelPop Wolbachia strain.
\n
Figure 2.
Numerical simulations of the Model (4). The parameter values used are given in Table 1. The parameter values reflect the WMel Wolbachia strain.
\n
Figure 3.
Numerical simulations of the Model (4). The parameter values used are given in Table 1. The parameter values reflect the WMel Wolbachia strain but different initial conditions. The initial conditions are \n\n\nA\n\nN\n0\n\n\n=\n0\n\n, \n\n\nF\n\nN\n0\n\n\n=\n\nM\n\nN\n0\n\n\n=\n7253\n\n, \n\n\nA\n\nW\n0\n\n\n=\n0\n\n, and \n\n\nM\n\nW\n0\n\n\n=\n\nF\n\nW\n0\n\n\n=\n145\n\n.
\n
\n
\n
\n
4.2. Dengue mathematical model and numerical simulations
\n
\n
4.2.1. Dengue mathematical model in the presence of Wolbachia
\n
In this section, we give example of two-serotype dengue mathematical model. We present the model by Ndii et al. [42]. The model consists of human, non-Wolbachia and Wolbachia-carrying mosquito population. The human population is divided into susceptible (\n\n\nS\nH\n\n\n), exposed to serotype \n\ni\n\n (\n\n\nE\nH\ni\n\n\n), infected to serotype \n\ni\n\n (\n\n\nI\nH\ni\n\n\n), temporary immunity to the serotype \n\ni\n\n (\n\n\nX\nH\ni\n\n\n), recovered class (\n\n\nR\nH\n\n\n), susceptible, exposed and infected to \n\nj\n\n strain (\n\n\nS\nH\nji\n\n,\n\nE\nH\nji\n\n,\n\nI\nH\nji\n\n\n, respectively). The superscript \n\nji\n\n means individuals that were previously infected by serotype \n\ni\n\n and currently infected by serotype \n\nj\n\n. The mosquito population is divided into susceptible (\n\n\nS\nN\n\n\n and \n\n\nS\nW\n\n\n), exposed to serotype \n\ni\n\n (\n\n\nE\nN\ni\n\n\n and \n\n\nE\nW\ni\n\n\n) and infected to serotype \n\ni\n\n (\n\n\nI\nN\ni\n\n\n and \n\n\nI\nW\ni\n\n\n). The subscript \n\nN\n\n and \n\nW\n\n is for non-Wolbachia and Wolbachia-carrying mosquitoes.
\n
The model is governed by the following system of differential equations:
where \n\n\nϕ\ni\n\n\n is the antibody-dependent enhancement factor for serotype \n\ni\n\n. Note that the susceptible human becomes exposed to dengue after being bitten by non-Wolbachia and Wolbachia-infected mosquitoes, which then becomes infected and have temporary immunity. After a certain period in temporary immunity class, they become susceptible to the other dengue serotype. They will have secondary infection after being bitten by infected mosquitoes carrying different dengue serotype to that they are previously infected.
\n
\n
\n
4.2.2. Numerical simulations
\n
This section presents numerical simulations of the model. Figures 4 and 5 show the numerical simulations of primary and secondary infections in the absence and presence of Wolbachia, respectively.
\n
Figure 4.
Numerical simulations of primary and secondary infections in the absence of Wolbachia-carrying mosquitoes. The parameters values used are given in Table 2. Initial conditions are \n\n\nI\nH\n1\n\n\n0\n\n=\n\nI\nH\n2\n\n\n0\n\n=\n1\n\n and \n\n\nN\nH\n\n=\n\n10\n5\n\n\n. \n\n\nA\nN\n\n\n0\n\n=\n\nS\nN\n\n\n0\n\n=\n3\n×\n\nN\nH\n\n\n.
\n
Figure 5.
Numerical simulations of primary and secondary infections in the presence of Wolbachia-carrying mosquitoes. The parameters values used are given in Table 2. Initial conditions are \n\n\nI\nH\n1\n\n\n0\n\n=\n\nI\nH\n2\n\n\n0\n\n=\n1\n\n and \n\n\nN\nH\n\n=\n\n10\n5\n\n\n. \n\n\nA\nN\n\n\n0\n\n=\n\nS\nN\n\n\n0\n\n=\n\nA\nW\n\n\n0\n\n=\n\nS\nW\n\n\n0\n\n=\n1.5\n×\n\nN\nH\n\n\n.
\n
Figures 4 and 5 show that Wolbachia can reduce dengue transmission. The number of infections in the presence of Wolbachia-carrying mosquitoes (see Figure 5) is smaller than that in the absence of Wolbachia-carrying mosquitoes (see Figure 4). This means that the Wolbachia can potentially be used to break the cycle of dengue transmission. Note that the parameter values are largely uncertain. Therefore, large data set is needed to validate the model against data.
\n
\n
\n
\n
\n
5. Discussion and conclusions
\n
The use of Wolbachia bacterium has been proposed as a new innovative strategy against dengue. A lot of research have been conducted to look at the persistence of Wolbachia-carrying mosquitoes and the potential reduction in the number of dengue cases by the use of Wolbachia bacterium. One of the approaches is by the use of mathematical model. It can be seen that mathematical model can provide insights into the persistence and the effectiveness of the Wolbachia in reducing dengue transmission dynamics.
\n
One of the important steps in modelling is model’s validation. The model can be validated against the real data. Although several parameters can be obtained from literature, it is important to estimate the influential parameters such as transmission rate against the real data. Ferguson et al. [37] validated their model against the real data. Furthermore, most parameters are strongly uncertain, which indicate that sensitivity analysis is strongly required. This aims to find the most important parameters which can guide us in collecting appropriate data to be estimated.
\n
Models presented in this work do not take into account the environmental factors such as temperature and rainfall. These may affect the dynamics of mosquito population and hence dengue transmission dynamics. Furthermore, in our work, the ratio of male and female mosquitoes is equal, which possibly affects the mosquito’s population dynamics. It is important to consider sex-biased ratio to determine its effects on the persistence of Wolbachia-carrying mosquitoes and dengue reduction.
\n
In this paper, we review existing mathematical models of Wolbachia-carrying mosquitoes’ population dynamics and dengue with Wolbachia. Examples of the mathematical models are given. It shows that Wolbachia-carrying mosquitoes can persist in the population depending on the Wolbachia strains. Furthermore, the initial conditions also affect the persistence of Wolbachia-carrying mosquito populations. It is shown that Wolbachia can potentially reduce the primary and secondary infections with higher reduction in secondary infections. Results suggest that using Wolbachia can potentially reduce the transmission of dengue and hence minimise the public health and economic burden.
\n
The results showed that the Wolbachia can persist in the population. When mosquitoes are infected with the WMel strain of Wolbachia. For dengue mathematical models with Wolbachia, it shows that the Wolbachia can potentially reduce the primary and secondary infections. This means that using Wolbachia can be an alternative strategy against dengue.
\n
\n
Acknowledgments
\n
MZN acknowledges funding from Ministry of Research, Technology and Higher Education of Indonesia through Penelitian Pascadoctor scheme 2018 (Grant No: 70/UN15.19/LT/2018). EDW received funding from Ministry of Research, Technology and Higher Education of Indonesia (Grant No: 3/E/KPT/2018). NA received Academic Leadership Grant from Padjadjaran University (Grant No: 2297 /UN6.D/KS/2018) and Penelitian Dasar Unggulan Perguruan Tinggi (Grant No: 1126/UN6.D/LT/2018).
\n
\n',keywords:"Wolbachia, dengue, mathematical model",chapterPDFUrl:"https://cdn.intechopen.com/pdfs/63007.pdf",chapterXML:"https://mts.intechopen.com/source/xml/63007.xml",downloadPdfUrl:"/chapter/pdf-download/63007",previewPdfUrl:"/chapter/pdf-preview/63007",totalDownloads:292,totalViews:283,totalCrossrefCites:0,dateSubmitted:"March 26th 2018",dateReviewed:"June 26th 2018",datePrePublished:"November 5th 2018",datePublished:"January 30th 2019",readingETA:"0",abstract:"Dengue is a vector-borne disease that risks two-thirds of the world’s population particularly in tropical and subtropical regions. Strategies have been implemented, but they are only effective in the short term. A new innovative and promising strategy against dengue is by the use of Wolbachia bacterium. This requires that Wolbachia-carrying mosquitoes should persist in the population. To assess the persistence of Wolbachia-carrying mosquitoes and its effects on dengue, a number of mathematical models have been formulated and analysed. In this chapter, we review the existing mathematical models of Wolbachia-carrying mosquito population dynamics and dengue with Wolbachia intervention and provide examples of the mathematical models. Simulations of the models are presented to illustrate the model’s solutions.",reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/63007",risUrl:"/chapter/ris/63007",signatures:"Meksianis Z. Ndii, Eti D. Wiraningsih, Nursanti Anggriani and Asep\nK. Supriatna",book:{id:"7107",title:"Dengue Fever",subtitle:"a Resilient Threat in the Face of Innovation",fullTitle:"Dengue Fever - a Resilient Threat in the Face of Innovation",slug:"dengue-fever-a-resilient-threat-in-the-face-of-innovation",publishedDate:"January 30th 2019",bookSignature:"Jorge Abelardo Falcón-Lezama, Miguel Betancourt-Cravioto and Roberto Tapia-Conyer",coverURL:"https://cdn.intechopen.com/books/images_new/7107.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"198399",title:"Dr.",name:"Jorge Abelardo",middleName:null,surname:"Falcón-Lezama",slug:"jorge-abelardo-falcon-lezama",fullName:"Jorge Abelardo Falcón-Lezama"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:[{id:"173228",title:"Prof.",name:"Asep",middleName:"K.",surname:"Supriatna",fullName:"Asep Supriatna",slug:"asep-supriatna",email:"a.k.supriatna@unpad.ac.id",position:null,institution:{name:"Padjadjaran University",institutionURL:null,country:{name:"Indonesia"}}},{id:"173504",title:"Dr.",name:"Nursanti",middleName:null,surname:"Anggriani",fullName:"Nursanti Anggriani",slug:"nursanti-anggriani",email:"nursanti.anggriani@gmail.com",position:null,institution:null},{id:"225819",title:"Dr.",name:"Meksianis",middleName:"N.",surname:"Ndii",fullName:"Meksianis Ndii",slug:"meksianis-ndii",email:"meksianis.ndii@staf.undana.ac.id",position:null,institution:{name:"Padjadjaran University",institutionURL:null,country:{name:"Indonesia"}}},{id:"262243",title:"Dr.",name:"Eti D.",middleName:null,surname:"Wiraningsih",fullName:"Eti D. Wiraningsih",slug:"eti-d.-wiraningsih",email:"etidwi@gmail.com",position:null,institution:null}],sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_2",title:"2. Mathematical modelling",level:"1"},{id:"sec_3",title:"3. Overview of mathematical models of Wolbachia and dengue",level:"1"},{id:"sec_4",title:"4. Examples and numerical simulations of mathematical models",level:"1"},{id:"sec_4_2",title:"4.1. Mathematical model of Wolbachia-carrying mosquito population dynamics and numerical simulations",level:"2"},{id:"sec_4_3",title:"4.1.1. Mathematical model of Wolbachia-carrying mosquito population dynamics",level:"3"},{id:"sec_5_3",title:"Table 1.",level:"3"},{id:"sec_7_2",title:"4.2. Dengue mathematical model and numerical simulations",level:"2"},{id:"sec_7_3",title:"4.2.1. Dengue mathematical model in the presence of Wolbachia",level:"3"},{id:"sec_8_3",title:"4.2.2. Numerical simulations",level:"3"},{id:"sec_11",title:"5. Discussion and conclusions",level:"1"},{id:"sec_12",title:"Acknowledgments",level:"1"}],chapterReferences:[{id:"B1",body:'Gubler DJ. Dengue and dengue hemorrhagic fever. Clinical Microbiology Reviews. 1998;11:480-496\n'},{id:"B2",body:'Bhatt S, Gething PW, Brady OJ, Messina JP, Farlow AW, et al. The global distribution and burden of dengue. Nature. 2013;496:1476-4687\n'},{id:"B3",body:'World Health Organisation. Dengue and Severe Dengue, Fact Sheet No. 117 [Online]. February 2018. Available from: http://www.who.int/news-room/fact-sheets/detail/dengue-and-severe-dengue [Accessed: June 1, 2018]\n'},{id:"B4",body:'Shepard DS, Undurraga EA, Halasa YA, Stanaway JD. The global economic burden of dengue: A systematic analysis. The Lancet Infectious Diseases. 2016;16(8):935-941\n'},{id:"B5",body:'Dorigatti I, McCormack C, Nedjati-Gilani G, Ferguson NM. Using Wolbachia for dengue control: Insights from modelling. Trends in Parasitology. 2018;34(2):102-113\n'},{id:"B6",body:'McMeniman CJ, Lane RV, Cass BN, Fong AWC, Sidhu M, Wang Y-F, O’Neill SL. Stable introduction of a life-shortening Wolbachia infection into the mosquito Aedes aegypti. Science. 2009;323(5910):141-144\n'},{id:"B7",body:'Sinkins SP. Wolbachia and cytoplasmic incompatibility in mosquitoes. Insect Biochemistry and Molecular Biology. 2004;34(7):723-729\n'},{id:"B8",body:'Hoffmann AA, Iturbe-Ormaetxe I, Callahan AG, Phillips BL, Billington K, Axford JK, Montgomery B, Turley AP, O’Neill SL. Stability of the WMel Wolbachia infection following invasion into Aedes aegypti populations. PLoS Neglected Tropical Diseases. 2014;8:e3115\n'},{id:"B9",body:'Chan MHT, Kim PS. Modelling a Wolbachia invasion using a slow–fast dispersal reaction–diffusion approach. Bulletin of Mathematical Biology. 2013;75(9):1501-1523\n'},{id:"B10",body:'Ndii MZ, Supriatna AK. Stochastic mathematical models in epidemiology. Information. 2017;20:6185-6196\n'},{id:"B11",body:'Ndii MZ, Amarti Z, Wiraningsih ED, Supriatna AK. Rabies epidemic model with uncertainty in parameters: Crisp and fuzzy approaches. IOP Conference Series: Materials Science and Engineering. 2018;332(1):012031\n'},{id:"B12",body:'Ndii MZ, Carnia E, Supriatna AK. Mathematical models for the spread of rumors: A review. In: Gaol FL, Hutagalung F, Chew FP, editors. Issues and Trends in Interdisciplinary Behavior and Social Science. USA: CRC Press; 2018. pp. 266-290\n'},{id:"B13",body:'Tambaru D, Djahi BS, Ndii MZ. The effects of hard water consumption on kidney function: Insights from mathematical modelling. AIP Conference Proceedings. 2018;1937(1):020020\n'},{id:"B14",body:'Reiner RC, Perkins T, Barker CM, et al. A systematic review of mathematical models of mosquito-borne pathogen transmission: 1970–2010. Journal of the Royal Society Interface. 2013;10(81):20120921\n'},{id:"B15",body:'Keeling MJ, Rohani P. Modeling Infectious Diseases in Humans and Animals. USA: Princeton University Press; 2008\n'},{id:"B16",body:'Hancock PA, Sinkins SP, Godfray HCJ. Population dynamic models of the spread of Wolbachia. The American Naturalist. 2011;177(3):323-333\n'},{id:"B17",body:'Hancock PA, Godfray HCJ. Modelling the spread of Wolbachia in spatially heterogeneous environments. Journal of Royal Society Interface. 2012;9(76):3045-3054\n'},{id:"B18",body:'Hancock PA, White VL, Callahan AG, Godfray CHJ, Hoffmann AA, Ritchie SA. Density dependent population dynamics in Aedes aegypti slow the spread of wMel Wolbachia. Journal of Applied Ecology. 2016;53(3):785-793\n'},{id:"B19",body:'Ndii MZ, Hickson RI, Mercer GN. Modelling the introduction of Wolbachia into Aedes aegypti to reduce dengue transmission. The ANZIAM Journal. 2012;53:213-227\n'},{id:"B20",body:'Li Y, Liu X. An impulsive model for Wolbachia infection control of mosquito-borne diseases with general birth and death rate functions. Nonlinear Analysis: Real World Applications. 2017;37:412-432\n'},{id:"B21",body:'Turelli M, Barton NH. Deploying dengue-suppressing Wolbachia: Robust models predict slow but effective spatial spread in Aedes aegypti. Theoretical Population Biology. 2017;115:45-60\n'},{id:"B22",body:'Xue L, Manore CA, Thongsripong P, Hyman JM. Two-sex mosquito model for the persistence of Wolbachia. Journal of Biological Dynamics. 2017;11(Suppl. 1):216-237\n'},{id:"B23",body:'Zhang X, Tang S, Liu Q, Cheke RA, Zhu H. Models to assess the effects of non-identical sex ratio augmentations of Wolbachia-carrying mosquitoes on the control of dengue disease. Mathematical Biosciences. 2018;299:58-72\n'},{id:"B24",body:'Guevara-Souza M, Vallejo EE. A computer simulation model of Wolbachia invasion for disease vector population modification. BMC Bioinformatics. 2015;16(1):317\n'},{id:"B25",body:'Strau JF, Telschow A. Modeling the indirect effect of Wolbachia on the infection dynamics of horizontally transmitted viruses. Frontiers in Microbiology. 2015;6:378\n'},{id:"B26",body:'Bliman PA, Aronna MS, Coelho FC, Moacyr A, da Silva HB. Ensuring successful introduction of Wolbachia in natural populations of Aedes aegypti by means of feedback control. Journal of Mathematical Biology. 2018;76(5):1269-1300\n'},{id:"B27",body:'Li Y, Liu X. A sex-structured model with birth pulse and release strategy for the spread of Wolbachia in mosquito population. Journal of Theoretical Biology. 2018;448:53-65\n'},{id:"B28",body:'Huang M, Luo J, Hu L, Zheng B, Yu J. Assessing the efficiency of Wolbachia driven aedes mosquito suppression by delay differential equations. Journal of Theoretical Biology. 2018;440:1-11\n'},{id:"B29",body:'Zheng B, Guo W, Hu L, Huang M, Yu J. Complex Wolbachia infection dynamics in mosquitoes with imperfect maternal transmission. Mathematical Biosciences and Engineering. 2018;15:523-541\n'},{id:"B30",body:'Zhang X, Tang S, Cheke RA. Models to assess how best to replace dengue virus vectors with Wolbachia-infected mosquito populations. Mathematical Biosciences. 2015;269:164-177\n'},{id:"B31",body:'Keeling MJ, Jiggins FM, Read JM. The invasion and coexistence of competing Wolbachia strains. Heredity. 2003;91:382-388\n'},{id:"B32",body:'Rasgon JL. Using Predictive Models to Optimize Wolbachia-Based Strategies for Vector-Borne Disease Control. New York, NY: Springer New York; 2008. pp. 114-125\n'},{id:"B33",body:'Supriatna AK, Soewono E, van Gils SA. A two-age-classes dengue transmission model. Mathematical Biosciences. 2008;216(1):114-121\n'},{id:"B34",body:'Anggriani N, Supriatna AK, Soewono E. A critical protection level derived from dengue infection mathematical model considering asymptomatic and symptomatic classes. Journal of Physics: Conference Series. 2013;423(1):012056\n'},{id:"B35",body:'Hughes H, Britton NF. Modelling the use of Wolbachia to control dengue fever transmission. Bulletin of Mathematical Biology. 2013;75(5):796-818\n'},{id:"B36",body:'Ndii MZ, Hickson RI, Allingham D, Mercer GN. Modelling the transmission dynamics of dengue in the presence of Wolbachia. Mathematical Biosciences. 2015;262:157-166\n'},{id:"B37",body:'Ferguson NM, Kien DTH, Clapham H, Aguas R, Trung VT, Chau TNB, Popovici J, Ryan PA, O’Neill SL, McGraw EA, Long VT, Dui LT, Nguyen HL, Van Vinh Chau N, Wills B, Simmons CP. Modeling the impact on virus transmission of Wolbachia-mediated blocking of dengue virus infection of Aedes aegypti. Science Translational Medicine. 2015;7(279):279ra37\n'},{id:"B38",body:'Qu Z, Xue L, Hyman JM. Modeling the transmission of Wolbachia in mosquitoes for controlling mosquito-borne diseases. SIAM Journal on Applied Mathematics. 2018;78(2):826-852\n'},{id:"B39",body:'Hancock PA, Sinkins SP, Godfray HCJ. Strategies for introducing Wolbachia to reduce transmission of mosquito-borne diseases. PLoS Neglected Tropical Diseases. 2011;5(4):1-10\n'},{id:"B40",body:'Supriatna AK, Anggriani N. System dynamics model of Wolbachia infection in dengue transmission. Procedia Engineering. 2012;50:12-18\n'},{id:"B41",body:'Ndii MZ, Allingham D, Hickson RI, Glass K. The effect of Wolbachia on dengue outbreaks when dengue is repeatedly introduced. Theoretical Population Biology. 2016;111:9-15\n'},{id:"B42",body:'Ndii MZ, Allingham D, Hickson RI, Glass K. The effect of Wolbachia on dengue dynamics in the presence of two serotypes of dengue: Symmetric and asymmetric epidemiological characteristics. Epidemiology and Infection. 2016;144(13):2874-2882\n'},{id:"B43",body:'Anggriani N, Supriatna AK. The effect of Wolbachia introduction and predatory in dengue disease transmission. Advanced Science, Engineering and Medicine. 2015;7(10):864-868\n'},{id:"B44",body:'Supriatna AK, Anggriani N, Nurulputri L, Wulantini R, Aldila D. The optimal release strategy of Wolbachia infected mosquitoes to control dengue disease. Advanced Science, Engineering and Medicine. 2014;6(8):831-837\n'},{id:"B45",body:'Ndii MZ. Analysis of a Wolbachia intervention to reduce dengue spread [Master’s thesis]. The Australian National University; 2011\n'},{id:"B46",body:'Walker T, Johnson PH, Moreira LA, Iturbe-Ormaetxe I, Frentiu FD, et al. The WMel Wolbachia strain blocks dengue and invades caged Aedes aegypti populations. Nature. 2011;476:450-453\n'},{id:"B47",body:'Yang HM, Macoris MLG, Galvani KC, Andrighetti MTM, Wanderley DMV. Assessing the effects of temperature on the population of Aedes aegypti, the vector of dengue. Epidemiology and Infection. 2009;137(8):1188-1202\n'},{id:"B48",body:'Maidana NA, Yang HM. Describing the geographic spread of dengue disease by traveling waves. Mathematical Biosciences. 2008;215(1):64-77\n'},{id:"B49",body:'Ruang-areerate T, Kittayapong P. Wolbachia transinfection in aedes aegypti: A potential gene driver of dengue vectors. Proceedings of the National Academy of Sciences. 2006;103(33):12534-12539\n'},{id:"B50",body:'Xi Z, Khoo CCH, Dobson SL. Wolbachia establishment and invasion in an Aedes aegypti laboratory population. Science. 2005;310:326-328\n'},{id:"B51",body:'Yeap HL, Mee P, Walker T, Weeks AR, O’Neill SL, et al. Dynamics of the “Popcorn” Wolbachia infection in outbred Aedes aegypti informs prospects for mosquito vector control. Genetics. 2011;187:583-595\n'},{id:"B52",body:'Hoffmann AA, Turelli M, Harshman LG. Factors affecting the distribution of cytoplasmic incompatibility in Drosophila simulans. Genetics. 1990;126:933-948\n'},{id:"B53",body:'Scott TW, Amerasinghe PH, Morrison AC, Lorenz LH, Clark GG, Strickman D, Kittayapong P, Edman JD. Longitudinal studies of Aedes aegypti (Diptera: Culicidae) in Thailand and Puerto Rico: Blood feeding frequency. Journal of Medical Entomology. 2000;37:89-101\n'},{id:"B54",body:'Turley AP, Moreira LA, O’Neill SL, McGraw EA. Wolbachia infection reduces blood–feeding success in the dengue fever mosquito, Aedes aegypti. PLoS Neglected Tropical Diseases. 2009;3:e516\n'},{id:"B55",body:'Chowel G, Diaz-Duenas P, Miller JC, Velazco AA, Hyman JM, Fenimore PW, Castillo-Chaves C. Estimation of the reproduction number of dengue fever from spatial epidemic data. Mathematical Biosciences. 2007;208:571-589\n'},{id:"B56",body:'Hu K, Thoens C, Bianco S, Edlund S, Davis M, Douglas J, Kaufman JH. The effect of antibody-dependent enhancement, cross immunity, and vector population on the dynamics of dengue fever. Journal of Theoretical Biology. 2013;319:62-74\n'},{id:"B57",body:'Bian G, Xu Y, Lu P, Xie Y, Xi Z. The endosymbiotic bacterium Wolbachia induces resistance to dengue virus in Aedes aegypti. PLoS Pathogen. 2010;6:e1000833\n'},{id:"B58",body:'Wearing HJ, Rohani P. Ecological and immunological determinants of dengue epidemics. Proceedings of the National Academy of Sciences. 2006;103:11802-11807\n'}],footnotes:[],contributors:[{corresp:"yes",contributorFullName:"Meksianis Z. Ndii",address:"meksianis.ndii@staf.undana.ac.id",affiliation:'
Department of Mathematics, Faculty of Sciences and Engineering, University of Nusa Cendana, Indonesia
'},{corresp:null,contributorFullName:"Eti D. Wiraningsih",address:null,affiliation:'
Department of Mathematics, Faculty of Mathematics and Natural Sciences, State University of Jakarta, Indonesia
Department of Mathematics, Faculty of Mathematics and Natural Sciences, Padjadjaran University, Indonesia
'},{corresp:null,contributorFullName:"Asep K. Supriatna",address:null,affiliation:'
Department of Mathematics, Faculty of Mathematics and Natural Sciences, Padjadjaran University, Indonesia
'}],corrections:null},book:{id:"7107",title:"Dengue Fever",subtitle:"a Resilient Threat in the Face of Innovation",fullTitle:"Dengue Fever - a Resilient Threat in the Face of Innovation",slug:"dengue-fever-a-resilient-threat-in-the-face-of-innovation",publishedDate:"January 30th 2019",bookSignature:"Jorge Abelardo Falcón-Lezama, Miguel Betancourt-Cravioto and Roberto Tapia-Conyer",coverURL:"https://cdn.intechopen.com/books/images_new/7107.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"198399",title:"Dr.",name:"Jorge Abelardo",middleName:null,surname:"Falcón-Lezama",slug:"jorge-abelardo-falcon-lezama",fullName:"Jorge Abelardo Falcón-Lezama"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},profile:{item:{id:"81886",title:"Dr.",name:"Elisabeth",middleName:null,surname:"Naschberger",email:"elisabeth.naschberger@uk-erlangen.de",fullName:"Elisabeth Naschberger",slug:"elisabeth-naschberger",position:null,biography:null,institutionString:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",totalCites:0,totalChapterViews:"0",outsideEditionCount:0,totalAuthoredChapters:"1",totalEditedBooks:"0",personalWebsiteURL:null,twitterURL:null,linkedinURL:null,institution:{name:"Universitätsklinikum Erlangen",institutionURL:null,country:{name:"Germany"}}},booksEdited:[],chaptersAuthored:[{title:"Modulation of Tumor Angiogenesis by a Host Anti-Tumor Response in Colorectal Cancer",slug:"modulation-of-tumor-angiogenesis-by-a-host-anti-tumor-response-in-colorectal-cancer",abstract:null,signatures:"N. Britzen-Laurent, V.S. Schellerer, R.S. Croner M. Stürzl1 and E. Naschberger",authors:[{id:"75889",title:"Prof.",name:"Michael",surname:"Stürzl",fullName:"Michael Stürzl",slug:"michael-sturzl",email:"michael.stuerzl@chir.imed.uni-erlangen.de"},{id:"81886",title:"Dr.",name:"Elisabeth",surname:"Naschberger",fullName:"Elisabeth Naschberger",slug:"elisabeth-naschberger",email:"elisabeth.naschberger@uk-erlangen.de"},{id:"81910",title:"Dr.",name:"Nathalie",surname:"Britzen-Laurent",fullName:"Nathalie Britzen-Laurent",slug:"nathalie-britzen-laurent",email:"nathalie.laurent@uk-erlangen.de"},{id:"81911",title:"Dr",name:"Vera",surname:"Schellerer",fullName:"Vera Schellerer",slug:"vera-schellerer",email:"vera.schellerer@uk-erlangen.de"},{id:"81912",title:"Dr.",name:"Roland S",surname:"Croner",fullName:"Roland S Croner",slug:"roland-s-croner",email:"roland.croner@uk-erlangen.de"}],book:{title:"Colorectal Cancer Biology",slug:"colorectal-cancer-biology-from-genes-to-tumor",productType:{id:"1",title:"Edited Volume"}}}],collaborators:[{id:"69289",title:"Dr.",name:"Amanda",surname:"Toland",slug:"amanda-toland",fullName:"Amanda Toland",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"The Ohio State University",institutionURL:null,country:{name:"United States of America"}}},{id:"69749",title:"Prof.",name:"Spaska",surname:"Stanilova",slug:"spaska-stanilova",fullName:"Spaska Stanilova",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/69749/images/system/69749.jpg",biography:"Dr Spaska Angelova Stanilova started her career in Medical Biology and received her PhD in Immunology at Higher Medical Institute in 1991. She is currently a full professor of Molecular Biology and Dcs in Immunology, and Head of Department of Molecular Biology, Immunology and Medical Genetics at the Faculty of Medicine, Trakia University. \nAt the department, she leads the Molecular Immunology research unit at the crossroad of genetics and immune regulation. Their main research goals are to gain an insight into the molecular mechanisms of gene expression with an emphasis on implication of cytokine gene polymorphisms and intracellular signaling in immune mediated and cancer diseases. Dr Stanilova is a member of the European Federation of Immunological Society and has reviewed for several scientific journals.",institutionString:null,institution:{name:"Trakia University",institutionURL:null,country:{name:"Bulgaria"}}},{id:"72472",title:"Prof.",name:"Rodney",surname:"Scott",slug:"rodney-scott",fullName:"Rodney Scott",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"University of Newcastle Australia",institutionURL:null,country:{name:"Australia"}}},{id:"72851",title:"Prof.",name:"Tatyana",surname:"Vlaykova",slug:"tatyana-vlaykova",fullName:"Tatyana Vlaykova",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Trakia University",institutionURL:null,country:{name:"Bulgaria"}}},{id:"78549",title:"Dr.",name:"Rajunor",surname:"Ettarh",slug:"rajunor-ettarh",fullName:"Rajunor Ettarh",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/78549/images/3518_n.jpg",biography:"Dr. Rajunor Ettarh is Professor and Vice-Chair for Education in the Department of Structural and Cellular Biology at Tulane University School of Medicine, where he also serves as Director of the Graduate Program in Anatomy. A Fellow of the Royal Society of Medicine in London, he spent much of his research career in Ireland, where his main interests centered on radiobiology and epithelial cell biology of the digestive tract, the regulatory mechanisms that mediate uninhibited proliferation in gastrointestinal cancers, and potential therapeutic targets. He has published extensively, has previously edited two books on colorectal cancer, and reviews for a number of cancer journals.",institutionString:null,institution:{name:"Tulane University",institutionURL:null,country:{name:"United States of America"}}},{id:"81227",title:"Prof.",name:"Maya",surname:"Gulubova",slug:"maya-gulubova",fullName:"Maya Gulubova",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Trakia University",institutionURL:null,country:{name:"Bulgaria"}}},{id:"81233",title:"Prof.",name:"Yovcho",surname:"Yovchev",slug:"yovcho-yovchev",fullName:"Yovcho Yovchev",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Trakia University",institutionURL:null,country:{name:"Bulgaria"}}},{id:"81235",title:"Dr.",name:"Dimo",surname:"Dimov",slug:"dimo-dimov",fullName:"Dimo Dimov",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Trakia University",institutionURL:null,country:{name:"Bulgaria"}}},{id:"81239",title:"Dr.",name:"Petjo",surname:"Chilingirov",slug:"petjo-chilingirov",fullName:"Petjo Chilingirov",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"127726",title:"Prof.",name:"Nikolai",surname:"Zhelev",slug:"nikolai-zhelev",fullName:"Nikolai Zhelev",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null}]},generic:{page:{slug:"sponsors-humans-in-space-program",title:"Sponsors",intro:"
“Scientific progress is fueled by collaboration. By democratizing the world’s scientific research, making it freely available to all, we want to inspire greater opportunity for collaboration, speed of discovery and scientific progress.”
\n\n
--IntechOpen
",metaTitle:"Sponsors",metaDescription:"“Scientific progress is fueled by collaboration. By democratizing the world’s scientific research,\nmaking it freely available to all, we want to inspire greater opportunity for collaboration, speed of discovery and scientific progress.”\n\n--IntechOpen",metaKeywords:null,canonicalURL:"/page/sponsors-humans-in-space-program",contentRaw:'[{"type":"htmlEditorComponent","content":"
Open Access is in the heart of the Humans in Space program as it removes barriers and allows everyone to freely access the research published. However, open access publishing fees also pose a barrier to many talented authors who just can’t afford to pay.
\\n\\n
Humans in Space program aims to remove this barrier and pursue a model under which none of our authors will need to pay for publication and the editors will receive a budget for their editorial work.
\\n\\n
We are currently in the process of collecting sponsorship. If you have any ideas or would like to help sponsor the program, we’d love to hear from you. Contact: Natalia Reinic Babic at natalia@intechopen.com. All of our IntechOpen sponsors are in good company The research in past IntechOpen books and chapters have been funded / sponsored by:
\\n\\n
\\n\\t
Colgate
\\n\\t
Kappa Bioscience
\\n\\t
Japanese Society for Regenerative Medicine
\\n\\t
Royal Military Academy of Belgium
\\n\\t
Nagoya University
\\n\\t
Max Planck Institute
\\n\\t
United Nations (Secretariat of the Convention on Biological Diversity)
Open Access is in the heart of the Humans in Space program as it removes barriers and allows everyone to freely access the research published. However, open access publishing fees also pose a barrier to many talented authors who just can’t afford to pay.
\n\n
Humans in Space program aims to remove this barrier and pursue a model under which none of our authors will need to pay for publication and the editors will receive a budget for their editorial work.
\n\n
We are currently in the process of collecting sponsorship. If you have any ideas or would like to help sponsor the program, we’d love to hear from you. Contact: Natalia Reinic Babic at natalia@intechopen.com. All of our IntechOpen sponsors are in good company The research in past IntechOpen books and chapters have been funded / sponsored by:
\n\n
\n\t
Colgate
\n\t
Kappa Bioscience
\n\t
Japanese Society for Regenerative Medicine
\n\t
Royal Military Academy of Belgium
\n\t
Nagoya University
\n\t
Max Planck Institute
\n\t
United Nations (Secretariat of the Convention on Biological Diversity)
\n\t
European Commission
\n\t
Bill and Melinda Gates Foundation
\n\t
Wellcome Trust
\n\t
National Institute of Health (NIH)
\n\t
National Science Foundation (NSF)
\n\t
Research Councils United Kingdom (RCUK)
\n\t
Chinese Academy of Sciences
\n\t
German Research Foundation (DFG)
\n\t
Austrian Science Fund (FWF)
\n\t
Australian Research Council (ARC)
\n
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:null},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5313},{group:"region",caption:"Middle and South America",value:2,count:4819},{group:"region",caption:"Africa",value:3,count:1468},{group:"region",caption:"Asia",value:4,count:9362},{group:"region",caption:"Australia and Oceania",value:5,count:837},{group:"region",caption:"Europe",value:6,count:14778}],offset:12,limit:12,total:108153},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{topicId:"6"},books:[{type:"book",id:"7852",title:"Binding Immunoglobulin Protein",subtitle:null,isOpenForSubmission:!0,hash:"2e2e79aa033b6f1c096eb1fb9be03d1c",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/7852.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7921",title:"Optogenetics",subtitle:null,isOpenForSubmission:!0,hash:"c30f69dd72c06511ff4c85f7468d3938",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/7921.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7997",title:"Autophagy in Injury, Infection and Cancer Diseases",subtitle:null,isOpenForSubmission:!0,hash:"3daed6048bc8ff8368c4279558f109d7",slug:null,bookSignature:"Dr. Nikolai Gorbunov",coverURL:"https://cdn.intechopen.com/books/images_new/7997.jpg",editedByType:null,editors:[{id:"180960",title:"Dr.",name:"Nikolai",surname:"Gorbunov",slug:"nikolai-gorbunov",fullName:"Nikolai Gorbunov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8003",title:"Amylase Molecular Biology, Physiology, Pharmacology and Drug Development",subtitle:null,isOpenForSubmission:!0,hash:"41629b4b920a5fe065f411e88a4ee389",slug:null,bookSignature:"Dr. Qamar Abbas",coverURL:"https://cdn.intechopen.com/books/images_new/8003.jpg",editedByType:null,editors:[{id:"311463",title:"Dr.",name:"Qamar",surname:"Abbas",slug:"qamar-abbas",fullName:"Qamar Abbas"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8018",title:"Extracellular Matrix",subtitle:null,isOpenForSubmission:!0,hash:"1d618cbd9b0e87c29cb7c3b87e746007",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/8018.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8027",title:"Carotenes and Xanthophylls: Recent Trends in Occurrence, Properties, and Determination",subtitle:null,isOpenForSubmission:!0,hash:"7722afd076f59aa99a07719fa9405a1e",slug:null,bookSignature:"Dr. Leila Queiroz Zepka, Dr. Eduardo Jacob-Lopes and Dr. Veridiana Vera De Rosso",coverURL:"https://cdn.intechopen.com/books/images_new/8027.jpg",editedByType:null,editors:[{id:"261969",title:"Dr.",name:"Leila",surname:"Queiroz Zepka",slug:"leila-queiroz-zepka",fullName:"Leila Queiroz Zepka"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8043",title:"Monoclonal Antibodies",subtitle:null,isOpenForSubmission:!0,hash:"f91663c18759c1a0ce9e98e9d9022dcc",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/8043.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8046",title:"Adrenaline, Noradrenaline and Dopamine",subtitle:null,isOpenForSubmission:!0,hash:"6a6e8cf9e87acaad24d72b6fd94aa9f2",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/8046.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8053",title:"Psychrophiles and Psychrotrophs",subtitle:null,isOpenForSubmission:!0,hash:"a309fb613d0f7bf26435040b45676236",slug:null,bookSignature:"Dr. Cristina Cid",coverURL:"https://cdn.intechopen.com/books/images_new/8053.jpg",editedByType:null,editors:[{id:"113044",title:"Dr.",name:"Cristina",surname:"Cid",slug:"cristina-cid",fullName:"Cristina Cid"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8154",title:"Lipoproteins and Apolipoproteins - New Perspectives and Applications",subtitle:null,isOpenForSubmission:!0,hash:"b2a14bae73cbba82483f14aec115d8ef",slug:null,bookSignature:"Dr. Miljana Z Jovandaric",coverURL:"https://cdn.intechopen.com/books/images_new/8154.jpg",editedByType:null,editors:[{id:"268043",title:"Dr.",name:"Miljana",surname:"Jovandaric",slug:"miljana-jovandaric",fullName:"Miljana Jovandaric"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8173",title:"Electrophoresis",subtitle:null,isOpenForSubmission:!0,hash:"5ef0f1cd60f719358f76bc0ad32aa9ed",slug:null,bookSignature:"Dr. Farheen Aslam",coverURL:"https://cdn.intechopen.com/books/images_new/8173.jpg",editedByType:null,editors:[{id:"309320",title:"Dr.",name:"Farheen",surname:"Aslam",slug:"farheen-aslam",fullName:"Farheen Aslam"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8175",title:"Cell Division",subtitle:null,isOpenForSubmission:!0,hash:"04a0532e6a111cd7d152af6621dacf23",slug:null,bookSignature:"",coverURL:"https://cdn.intechopen.com/books/images_new/8175.jpg",editedByType:null,editors:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:34},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:32},{group:"topic",caption:"Business, Management and Economics",value:7,count:10},{group:"topic",caption:"Chemistry",value:8,count:30},{group:"topic",caption:"Computer and Information Science",value:9,count:25},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:14},{group:"topic",caption:"Engineering",value:11,count:74},{group:"topic",caption:"Environmental Sciences",value:12,count:13},{group:"topic",caption:"Immunology and Microbiology",value:13,count:3},{group:"topic",caption:"Materials Science",value:14,count:38},{group:"topic",caption:"Mathematics",value:15,count:14},{group:"topic",caption:"Medicine",value:16,count:136},{group:"topic",caption:"Nanotechnology and Nanomaterials",value:17,count:5},{group:"topic",caption:"Neuroscience",value:18,count:6},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:8},{group:"topic",caption:"Physics",value:20,count:20},{group:"topic",caption:"Psychology",value:21,count:2},{group:"topic",caption:"Robotics",value:22,count:6},{group:"topic",caption:"Social Sciences",value:23,count:13},{group:"topic",caption:"Technology",value:24,count:10},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:3},{group:"topic",caption:"Intelligent System",value:535,count:1},{group:"topic",caption:"Osteology",value:1414,count:1}],offset:12,limit:12,total:100},popularBooks:{featuredBooks:[{type:"book",id:"7878",title:"Advances in Extracorporeal Membrane Oxygenation",subtitle:"Volume 3",isOpenForSubmission:!1,hash:"f95bf990273d08098a00f9a1c2403cbe",slug:"advances-in-extracorporeal-membrane-oxygenation-volume-3",bookSignature:"Michael S. Firstenberg",coverURL:"https://cdn.intechopen.com/books/images_new/7878.jpg",editors:[{id:"64343",title:null,name:"Michael S.",middleName:"S",surname:"Firstenberg",slug:"michael-s.-firstenberg",fullName:"Michael S. Firstenberg"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8299",title:"Timber Buildings and Sustainability",subtitle:null,isOpenForSubmission:!1,hash:"bccf2891cec38ed041724131aa34c25a",slug:"timber-buildings-and-sustainability",bookSignature:"Giovanna Concu",coverURL:"https://cdn.intechopen.com/books/images_new/8299.jpg",editors:[{id:"108709",title:"Dr.",name:"Giovanna",middleName:null,surname:"Concu",slug:"giovanna-concu",fullName:"Giovanna Concu"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7614",title:"Fourier Transforms",subtitle:"Century of Digitalization and Increasing Expectations",isOpenForSubmission:!1,hash:"ff3501657ae983a3b42fef1f7058ac91",slug:"fourier-transforms-century-of-digitalization-and-increasing-expectations",bookSignature:"Goran S. Nikoli? and Dragana Z. Markovi?-Nikoli?",coverURL:"https://cdn.intechopen.com/books/images_new/7614.jpg",editors:[{id:"23261",title:"Prof.",name:"Goran",middleName:"S.",surname:"Nikolic",slug:"goran-nikolic",fullName:"Goran Nikolic"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7062",title:"Rhinosinusitis",subtitle:null,isOpenForSubmission:!1,hash:"14ed95e155b1e57a61827ca30b579d09",slug:"rhinosinusitis",bookSignature:"Balwant Singh Gendeh and Mirjana Turkalj",coverURL:"https://cdn.intechopen.com/books/images_new/7062.jpg",editors:[{id:"67669",title:"Prof.",name:"Balwant Singh",middleName:null,surname:"Gendeh",slug:"balwant-singh-gendeh",fullName:"Balwant Singh Gendeh"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7087",title:"Tendons",subtitle:null,isOpenForSubmission:!1,hash:"786abac0445c102d1399a1e727a2db7f",slug:"tendons",bookSignature:"Hasan Sözen",coverURL:"https://cdn.intechopen.com/books/images_new/7087.jpg",editors:[{id:"161402",title:"Dr.",name:"Hasan",middleName:null,surname:"Sözen",slug:"hasan-sozen",fullName:"Hasan Sözen"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7955",title:"Advances in Hematologic Malignancies",subtitle:null,isOpenForSubmission:!1,hash:"59ca1b09447fab4717a93e099f646d28",slug:"advances-in-hematologic-malignancies",bookSignature:"Gamal Abdul Hamid",coverURL:"https://cdn.intechopen.com/books/images_new/7955.jpg",editors:[{id:"36487",title:"Prof.",name:"Gamal",middleName:null,surname:"Abdul Hamid",slug:"gamal-abdul-hamid",fullName:"Gamal Abdul Hamid"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7701",title:"Assistive and Rehabilitation Engineering",subtitle:null,isOpenForSubmission:!1,hash:"4191b744b8af3b17d9a80026dcb0617f",slug:"assistive-and-rehabilitation-engineering",bookSignature:"Yves Rybarczyk",coverURL:"https://cdn.intechopen.com/books/images_new/7701.jpg",editors:[{id:"72920",title:"Prof.",name:"Yves",middleName:"Philippe",surname:"Rybarczyk",slug:"yves-rybarczyk",fullName:"Yves Rybarczyk"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7837",title:"Geriatric Medicine and Gerontology",subtitle:null,isOpenForSubmission:!1,hash:"e277d005b23536bcd9f8550046101979",slug:"geriatric-medicine-and-gerontology",bookSignature:"Edward T. Zawada Jr.",coverURL:"https://cdn.intechopen.com/books/images_new/7837.jpg",editors:[{id:"16344",title:"Dr.",name:"Edward T.",middleName:null,surname:"Zawada Jr.",slug:"edward-t.-zawada-jr.",fullName:"Edward T. Zawada Jr."}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7123",title:"Current Topics in Neglected Tropical Diseases",subtitle:null,isOpenForSubmission:!1,hash:"61c627da05b2ace83056d11357bdf361",slug:"current-topics-in-neglected-tropical-diseases",bookSignature:"Alfonso J. Rodriguez-Morales",coverURL:"https://cdn.intechopen.com/books/images_new/7123.jpg",editors:[{id:"131400",title:"Dr.",name:"Alfonso J.",middleName:null,surname:"Rodriguez-Morales",slug:"alfonso-j.-rodriguez-morales",fullName:"Alfonso J. Rodriguez-Morales"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7610",title:"Renewable and Sustainable Composites",subtitle:null,isOpenForSubmission:!1,hash:"c2de26c3d329c54f093dc3f05417500a",slug:"renewable-and-sustainable-composites",bookSignature:"António B. Pereira and Fábio A. O. Fernandes",coverURL:"https://cdn.intechopen.com/books/images_new/7610.jpg",editors:[{id:"211131",title:"Prof.",name:"António",middleName:"Bastos",surname:"Pereira",slug:"antonio-pereira",fullName:"António Pereira"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8416",title:"Non-Equilibrium Particle Dynamics",subtitle:null,isOpenForSubmission:!1,hash:"2c3add7639dcd1cb442cb4313ea64e3a",slug:"non-equilibrium-particle-dynamics",bookSignature:"Albert S. Kim",coverURL:"https://cdn.intechopen.com/books/images_new/8416.jpg",editors:[{id:"21045",title:"Prof.",name:"Albert S.",middleName:null,surname:"Kim",slug:"albert-s.-kim",fullName:"Albert S. Kim"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8008",title:"Antioxidants",subtitle:null,isOpenForSubmission:!1,hash:"76361b4061e830906267933c1c670027",slug:"antioxidants",bookSignature:"Emad Shalaby",coverURL:"https://cdn.intechopen.com/books/images_new/8008.jpg",editors:[{id:"63600",title:"Prof.",name:"Emad",middleName:null,surname:"Shalaby",slug:"emad-shalaby",fullName:"Emad Shalaby"}],productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:4392},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"7878",title:"Advances in Extracorporeal Membrane Oxygenation",subtitle:"Volume 3",isOpenForSubmission:!1,hash:"f95bf990273d08098a00f9a1c2403cbe",slug:"advances-in-extracorporeal-membrane-oxygenation-volume-3",bookSignature:"Michael S. Firstenberg",coverURL:"https://cdn.intechopen.com/books/images_new/7878.jpg",editors:[{id:"64343",title:null,name:"Michael S.",middleName:"S",surname:"Firstenberg",slug:"michael-s.-firstenberg",fullName:"Michael S. Firstenberg"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8299",title:"Timber Buildings and Sustainability",subtitle:null,isOpenForSubmission:!1,hash:"bccf2891cec38ed041724131aa34c25a",slug:"timber-buildings-and-sustainability",bookSignature:"Giovanna Concu",coverURL:"https://cdn.intechopen.com/books/images_new/8299.jpg",editors:[{id:"108709",title:"Dr.",name:"Giovanna",middleName:null,surname:"Concu",slug:"giovanna-concu",fullName:"Giovanna Concu"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7614",title:"Fourier Transforms",subtitle:"Century of Digitalization and Increasing Expectations",isOpenForSubmission:!1,hash:"ff3501657ae983a3b42fef1f7058ac91",slug:"fourier-transforms-century-of-digitalization-and-increasing-expectations",bookSignature:"Goran S. Nikoli? and Dragana Z. Markovi?-Nikoli?",coverURL:"https://cdn.intechopen.com/books/images_new/7614.jpg",editors:[{id:"23261",title:"Prof.",name:"Goran",middleName:"S.",surname:"Nikolic",slug:"goran-nikolic",fullName:"Goran Nikolic"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7062",title:"Rhinosinusitis",subtitle:null,isOpenForSubmission:!1,hash:"14ed95e155b1e57a61827ca30b579d09",slug:"rhinosinusitis",bookSignature:"Balwant Singh Gendeh and Mirjana Turkalj",coverURL:"https://cdn.intechopen.com/books/images_new/7062.jpg",editors:[{id:"67669",title:"Prof.",name:"Balwant Singh",middleName:null,surname:"Gendeh",slug:"balwant-singh-gendeh",fullName:"Balwant Singh Gendeh"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7087",title:"Tendons",subtitle:null,isOpenForSubmission:!1,hash:"786abac0445c102d1399a1e727a2db7f",slug:"tendons",bookSignature:"Hasan Sözen",coverURL:"https://cdn.intechopen.com/books/images_new/7087.jpg",editors:[{id:"161402",title:"Dr.",name:"Hasan",middleName:null,surname:"Sözen",slug:"hasan-sozen",fullName:"Hasan Sözen"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7955",title:"Advances in Hematologic Malignancies",subtitle:null,isOpenForSubmission:!1,hash:"59ca1b09447fab4717a93e099f646d28",slug:"advances-in-hematologic-malignancies",bookSignature:"Gamal Abdul Hamid",coverURL:"https://cdn.intechopen.com/books/images_new/7955.jpg",editors:[{id:"36487",title:"Prof.",name:"Gamal",middleName:null,surname:"Abdul Hamid",slug:"gamal-abdul-hamid",fullName:"Gamal Abdul Hamid"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7701",title:"Assistive and Rehabilitation Engineering",subtitle:null,isOpenForSubmission:!1,hash:"4191b744b8af3b17d9a80026dcb0617f",slug:"assistive-and-rehabilitation-engineering",bookSignature:"Yves Rybarczyk",coverURL:"https://cdn.intechopen.com/books/images_new/7701.jpg",editors:[{id:"72920",title:"Prof.",name:"Yves",middleName:"Philippe",surname:"Rybarczyk",slug:"yves-rybarczyk",fullName:"Yves Rybarczyk"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7837",title:"Geriatric Medicine and Gerontology",subtitle:null,isOpenForSubmission:!1,hash:"e277d005b23536bcd9f8550046101979",slug:"geriatric-medicine-and-gerontology",bookSignature:"Edward T. Zawada Jr.",coverURL:"https://cdn.intechopen.com/books/images_new/7837.jpg",editors:[{id:"16344",title:"Dr.",name:"Edward T.",middleName:null,surname:"Zawada Jr.",slug:"edward-t.-zawada-jr.",fullName:"Edward T. Zawada Jr."}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7123",title:"Current Topics in Neglected Tropical Diseases",subtitle:null,isOpenForSubmission:!1,hash:"61c627da05b2ace83056d11357bdf361",slug:"current-topics-in-neglected-tropical-diseases",bookSignature:"Alfonso J. Rodriguez-Morales",coverURL:"https://cdn.intechopen.com/books/images_new/7123.jpg",editors:[{id:"131400",title:"Dr.",name:"Alfonso J.",middleName:null,surname:"Rodriguez-Morales",slug:"alfonso-j.-rodriguez-morales",fullName:"Alfonso J. Rodriguez-Morales"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7610",title:"Renewable and Sustainable Composites",subtitle:null,isOpenForSubmission:!1,hash:"c2de26c3d329c54f093dc3f05417500a",slug:"renewable-and-sustainable-composites",bookSignature:"António B. Pereira and Fábio A. O. Fernandes",coverURL:"https://cdn.intechopen.com/books/images_new/7610.jpg",editors:[{id:"211131",title:"Prof.",name:"António",middleName:"Bastos",surname:"Pereira",slug:"antonio-pereira",fullName:"António Pereira"}],productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"8463",title:"Pediatric Surgery, Flowcharts and Clinical Algorithms",subtitle:null,isOpenForSubmission:!1,hash:"23f39beea4d557b0ae424e2eaf82bf5e",slug:"pediatric-surgery-flowcharts-and-clinical-algorithms",bookSignature:"Sameh Shehata",coverURL:"https://cdn.intechopen.com/books/images_new/8463.jpg",editedByType:"Edited by",editors:[{id:"37518",title:"Prof.",name:"Sameh",middleName:null,surname:"Shehata",slug:"sameh-shehata",fullName:"Sameh Shehata"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7187",title:"Osteosarcoma",subtitle:"Diagnosis, Mechanisms, and Translational Developments",isOpenForSubmission:!1,hash:"89096359b754beb806eca4c6d8aacaba",slug:"osteosarcoma-diagnosis-mechanisms-and-translational-developments",bookSignature:"Matthew Gregory Cable and Robert Lawrence Randall",coverURL:"https://cdn.intechopen.com/books/images_new/7187.jpg",editedByType:"Edited by",editors:[{id:"265693",title:"Dr.",name:"Matthew Gregory",middleName:null,surname:"Cable",slug:"matthew-gregory-cable",fullName:"Matthew Gregory Cable"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7955",title:"Advances in Hematologic Malignancies",subtitle:null,isOpenForSubmission:!1,hash:"59ca1b09447fab4717a93e099f646d28",slug:"advances-in-hematologic-malignancies",bookSignature:"Gamal Abdul Hamid",coverURL:"https://cdn.intechopen.com/books/images_new/7955.jpg",editedByType:"Edited by",editors:[{id:"36487",title:"Prof.",name:"Gamal",middleName:null,surname:"Abdul Hamid",slug:"gamal-abdul-hamid",fullName:"Gamal Abdul Hamid"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7701",title:"Assistive and Rehabilitation Engineering",subtitle:null,isOpenForSubmission:!1,hash:"4191b744b8af3b17d9a80026dcb0617f",slug:"assistive-and-rehabilitation-engineering",bookSignature:"Yves Rybarczyk",coverURL:"https://cdn.intechopen.com/books/images_new/7701.jpg",editedByType:"Edited by",editors:[{id:"72920",title:"Prof.",name:"Yves",middleName:"Philippe",surname:"Rybarczyk",slug:"yves-rybarczyk",fullName:"Yves Rybarczyk"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7726",title:"Swarm Intelligence",subtitle:"Recent Advances, New Perspectives and Applications",isOpenForSubmission:!1,hash:"e7ea7e74ce7a7a8e5359629e07c68d31",slug:"swarm-intelligence-recent-advances-new-perspectives-and-applications",bookSignature:"Javier Del Ser, Esther Villar and Eneko Osaba",coverURL:"https://cdn.intechopen.com/books/images_new/7726.jpg",editedByType:"Edited by",editors:[{id:"49813",title:"Dr.",name:"Javier",middleName:null,surname:"Del Ser",slug:"javier-del-ser",fullName:"Javier Del Ser"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8256",title:"Distillation",subtitle:"Modelling, Simulation and Optimization",isOpenForSubmission:!1,hash:"c76af109f83e14d915e5cb3949ae8b80",slug:"distillation-modelling-simulation-and-optimization",bookSignature:"Vilmar Steffen",coverURL:"https://cdn.intechopen.com/books/images_new/8256.jpg",editedByType:"Edited by",editors:[{id:"189035",title:"Dr.",name:"Vilmar",middleName:null,surname:"Steffen",slug:"vilmar-steffen",fullName:"Vilmar Steffen"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7240",title:"Growing and Handling of Bacterial Cultures",subtitle:null,isOpenForSubmission:!1,hash:"a76c3ef7718c0b72d0128817cdcbe6e3",slug:"growing-and-handling-of-bacterial-cultures",bookSignature:"Madhusmita Mishra",coverURL:"https://cdn.intechopen.com/books/images_new/7240.jpg",editedByType:"Edited by",editors:[{id:"204267",title:"Dr.",name:"Madhusmita",middleName:null,surname:"Mishra",slug:"madhusmita-mishra",fullName:"Madhusmita Mishra"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8299",title:"Timber Buildings and Sustainability",subtitle:null,isOpenForSubmission:!1,hash:"bccf2891cec38ed041724131aa34c25a",slug:"timber-buildings-and-sustainability",bookSignature:"Giovanna Concu",coverURL:"https://cdn.intechopen.com/books/images_new/8299.jpg",editedByType:"Edited by",editors:[{id:"108709",title:"Dr.",name:"Giovanna",middleName:null,surname:"Concu",slug:"giovanna-concu",fullName:"Giovanna Concu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7062",title:"Rhinosinusitis",subtitle:null,isOpenForSubmission:!1,hash:"14ed95e155b1e57a61827ca30b579d09",slug:"rhinosinusitis",bookSignature:"Balwant Singh Gendeh and Mirjana Turkalj",coverURL:"https://cdn.intechopen.com/books/images_new/7062.jpg",editedByType:"Edited by",editors:[{id:"67669",title:"Prof.",name:"Balwant Singh",middleName:null,surname:"Gendeh",slug:"balwant-singh-gendeh",fullName:"Balwant Singh Gendeh"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7837",title:"Geriatric Medicine and Gerontology",subtitle:null,isOpenForSubmission:!1,hash:"e277d005b23536bcd9f8550046101979",slug:"geriatric-medicine-and-gerontology",bookSignature:"Edward T. Zawada Jr.",coverURL:"https://cdn.intechopen.com/books/images_new/7837.jpg",editedByType:"Edited by",editors:[{id:"16344",title:"Dr.",name:"Edward T.",middleName:null,surname:"Zawada Jr.",slug:"edward-t.-zawada-jr.",fullName:"Edward T. Zawada Jr."}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"904",title:"Intravascular Immunity",slug:"pure-immunology-intravascular-immunity",parent:{title:"Pure Immunology",slug:"pure-immunology"},numberOfBooks:1,numberOfAuthorsAndEditors:4,numberOfWosCitations:0,numberOfCrossrefCitations:1,numberOfDimensionsCitations:1,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"pure-immunology-intravascular-immunity",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[{type:"book",id:"7129",title:"Neutrophils",subtitle:null,isOpenForSubmission:!1,hash:"4f71e75cb45249658d48e765d179ce9f",slug:"neutrophils",bookSignature:"Maitham Khajah",coverURL:"https://cdn.intechopen.com/books/images_new/7129.jpg",editedByType:"Edited by",editors:[{id:"173123",title:"Dr.",name:"Maitham",middleName:null,surname:"Khajah",slug:"maitham-khajah",fullName:"Maitham Khajah"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],booksByTopicTotal:1,mostCitedChapters:[{id:"68185",doi:"10.5772/intechopen.88013",title:"Macrophages: The Potent Immunoregulatory Innate Immune Cells",slug:"macrophages-the-potent-immunoregulatory-innate-immune-cells",totalDownloads:256,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:null,title:"Macrophage at the Crossroads of Innate and Adaptive Immunity",fullTitle:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Vijay Kumar",authors:[{id:"63844",title:"Dr.",name:"Vijay",middleName:null,surname:"Kumar",slug:"vijay-kumar",fullName:"Vijay Kumar"}]},{id:"64123",doi:"10.5772/intechopen.81543",title:"Essence of Reducing Equivalent Transfer Powering Neutrophil Oxidative Microbicidal Action and Chemiluminescence",slug:"essence-of-reducing-equivalent-transfer-powering-neutrophil-oxidative-microbicidal-action-and-chemil",totalDownloads:219,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Robert C. Allen",authors:null},{id:"65212",doi:"10.5772/intechopen.83602",title:"Introductory Chapter: Background Summary Regarding Neutrophils",slug:"introductory-chapter-background-summary-regarding-neutrophils",totalDownloads:229,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Maitham Khajah",authors:[{id:"173123",title:"Dr.",name:"Maitham",middleName:null,surname:"Khajah",slug:"maitham-khajah",fullName:"Maitham Khajah"}]}],mostDownloadedChaptersLast30Days:[{id:"68185",title:"Macrophages: The Potent Immunoregulatory Innate Immune Cells",slug:"macrophages-the-potent-immunoregulatory-innate-immune-cells",totalDownloads:256,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:null,title:"Macrophage at the Crossroads of Innate and Adaptive Immunity",fullTitle:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Vijay Kumar",authors:[{id:"63844",title:"Dr.",name:"Vijay",middleName:null,surname:"Kumar",slug:"vijay-kumar",fullName:"Vijay Kumar"}]},{id:"67289",title:"The Pivotal Role of Macrophages in Metabolic Distress",slug:"the-pivotal-role-of-macrophages-in-metabolic-distress",totalDownloads:204,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:null,title:"Macrophage at the Crossroads of Innate and Adaptive Immunity",fullTitle:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Joseph Roberts, Padraic G. Fallon and Emily Hams",authors:null},{id:"63248",title:"Neutrophil Activation by Antibody Receptors",slug:"neutrophil-activation-by-antibody-receptors",totalDownloads:303,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Carlos Rosales and Eileen Uribe-Querol",authors:[{id:"192432",title:"Dr.",name:"Carlos",middleName:null,surname:"Rosales",slug:"carlos-rosales",fullName:"Carlos Rosales"},{id:"198687",title:"Dr.",name:"Eileen",middleName:null,surname:"Uribe-Querol",slug:"eileen-uribe-querol",fullName:"Eileen Uribe-Querol"}]},{id:"67817",title:"Wnt Signaling Regulates Macrophage Mediated Immune Response to Pathogens",slug:"wnt-signaling-regulates-macrophage-mediated-immune-response-to-pathogens",totalDownloads:133,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:null,title:"Macrophage at the Crossroads of Innate and Adaptive Immunity",fullTitle:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Suborno Jati and Malini Sen",authors:null},{id:"64155",title:"Remodeling of Phenotype CD16 + CD11b + Neutrophilic Granulocytes in Acute Viral and Acute Bacterial Infections",slug:"remodeling-of-phenotype-cd16-cd11b-neutrophilic-granulocytes-in-acute-viral-and-acute-bacterial-infe",totalDownloads:238,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Irina V. Nesterova, Galina A. Chudilova, Svetlana V. Kovaleva,\nLyudmila V. Lomtatidze and Tatyana V. Rusinova",authors:null},{id:"64543",title:"Cannabinoid Receptors as Regulators of Neutrophil Activity in Inflammatory Diseases",slug:"cannabinoid-receptors-as-regulators-of-neutrophil-activity-in-inflammatory-diseases",totalDownloads:294,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Mariana Conceição Souza and Elaine Cruz Rosas",authors:null},{id:"68678",title:"Macrophages in the Pathogenesis of Leprosy",slug:"macrophages-in-the-pathogenesis-of-leprosy",totalDownloads:77,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:null,title:"Macrophage at the Crossroads of Innate and Adaptive Immunity",fullTitle:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Rhana Berto da Silva Prata, Mayara Garcia de Mattos Barbosa, Bruno Jorge de Andrade Silva, Jéssica Araujo da Paixão de Oliveira, Tamiris Lameira Bittencourt and Roberta Olmo Pinheiro",authors:null},{id:"64123",title:"Essence of Reducing Equivalent Transfer Powering Neutrophil Oxidative Microbicidal Action and Chemiluminescence",slug:"essence-of-reducing-equivalent-transfer-powering-neutrophil-oxidative-microbicidal-action-and-chemil",totalDownloads:219,totalCrossrefCites:1,totalDimensionsCites:1,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Robert C. Allen",authors:null},{id:"65212",title:"Introductory Chapter: Background Summary Regarding Neutrophils",slug:"introductory-chapter-background-summary-regarding-neutrophils",totalDownloads:229,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:"neutrophils",title:"Neutrophils",fullTitle:"Neutrophils"},signatures:"Maitham Khajah",authors:[{id:"173123",title:"Dr.",name:"Maitham",middleName:null,surname:"Khajah",slug:"maitham-khajah",fullName:"Maitham Khajah"}]},{id:"67326",title:"Polarization of Tumor-Associated Macrophages by Chinese Medicine Intervention: Mechanisms and Applications",slug:"polarization-of-tumor-associated-macrophages-by-chinese-medicine-intervention-mechanisms-and-applica",totalDownloads:166,totalCrossrefCites:0,totalDimensionsCites:0,book:{slug:null,title:"Macrophage at the Crossroads of Innate and Adaptive Immunity",fullTitle:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Yuanjun Lu, Hor Yue Tan, Ning Wang and Yibin Feng",authors:[{id:"14428",title:"Prof.",name:"Yibin",middleName:null,surname:"Feng",slug:"yibin-feng",fullName:"Yibin Feng"}]}],onlineFirstChaptersFilter:{topicSlug:"pure-immunology-intravascular-immunity",limit:3,offset:0},onlineFirstChaptersCollection:[{id:"68585",title:"Macrophage Polarization Is Decisive for Chronic Bacterial Infection-Induced Carcinogenesis",slug:"macrophage-polarization-is-decisive-for-chronic-bacterial-infection-induced-carcinogenesis",totalDownloads:30,totalDimensionsCites:0,doi:"10.5772/intechopen.88171",book:{title:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Mishi Wasson, Sonia Kapoor, Manoj Garg, Sandhya Singh and Hridayesh Prakash"},{id:"68678",title:"Macrophages in the Pathogenesis of Leprosy",slug:"macrophages-in-the-pathogenesis-of-leprosy",totalDownloads:78,totalDimensionsCites:0,doi:"10.5772/intechopen.88754",book:{title:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Rhana Berto da Silva Prata, Mayara Garcia de Mattos Barbosa, Bruno Jorge de Andrade Silva, Jéssica Araujo da Paixão de Oliveira, Tamiris Lameira Bittencourt and Roberta Olmo Pinheiro"},{id:"68185",title:"Macrophages: The Potent Immunoregulatory Innate Immune Cells",slug:"macrophages-the-potent-immunoregulatory-innate-immune-cells",totalDownloads:264,totalDimensionsCites:1,doi:"10.5772/intechopen.88013",book:{title:"Macrophage at the Crossroads of Innate and Adaptive Immunity"},signatures:"Vijay Kumar"}],onlineFirstChaptersTotal:6},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"6837",title:"Lithium-ion Batteries - Thin Film for Energy Materials and Devices",subtitle:null,isOpenForSubmission:!0,hash:"ea7789260b319b9a4b472257f57bfeb5",slug:null,bookSignature:"Prof. Mitsunobu Sato, Dr. Li Lu and Dr. Hiroki Nagai",coverURL:"https://cdn.intechopen.com/books/images_new/6837.jpg",editedByType:null,editors:[{id:"179615",title:"Prof.",name:"Mitsunobu",middleName:null,surname:"Sato",slug:"mitsunobu-sato",fullName:"Mitsunobu Sato"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9423",title:"Applications of Artificial Intelligence in Process Industry Automation, Heat and Power Generation and Smart Manufacturing",subtitle:null,isOpenForSubmission:!0,hash:"10ac8fb0bdbf61044395963028653d21",slug:null,bookSignature:"Prof. Konstantinos G. Kyprianidis and Prof. Erik Dahlquist",coverURL:"https://cdn.intechopen.com/books/images_new/9423.jpg",editedByType:null,editors:[{id:"35868",title:"Prof.",name:"Konstantinos",middleName:"G.",surname:"Kyprianidis",slug:"konstantinos-kyprianidis",fullName:"Konstantinos Kyprianidis"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9428",title:"New Trends in the Use of Artificial Intelligence for the Industry 4.0",subtitle:null,isOpenForSubmission:!0,hash:"9e089eec484ce8e9eb32198c2d8b34ea",slug:null,bookSignature:"Dr. Luis Romeral Martinez, Dr. Roque A. Osornio-Rios and Dr. Miguel Delgado Prieto",coverURL:"https://cdn.intechopen.com/books/images_new/9428.jpg",editedByType:null,editors:[{id:"86501",title:"Dr.",name:"Luis",middleName:null,surname:"Romeral Martinez",slug:"luis-romeral-martinez",fullName:"Luis Romeral Martinez"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10107",title:"Artificial Intelligence in Oncology Drug Discovery & Development",subtitle:null,isOpenForSubmission:!0,hash:"043c178c3668865ab7d35dcb2ceea794",slug:null,bookSignature:"Dr. John Cassidy and Dr. Belle Taylor",coverURL:"https://cdn.intechopen.com/books/images_new/10107.jpg",editedByType:null,editors:[{id:"244455",title:"Dr.",name:"John",middleName:null,surname:"Cassidy",slug:"john-cassidy",fullName:"John Cassidy"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8903",title:"Carbon Based Material for Environmental Protection and Remediation",subtitle:null,isOpenForSubmission:!0,hash:"19da699b370f320eca63ef2ba02f745d",slug:null,bookSignature:"Dr. Mattia Bartoli and Dr. Marco Frediani",coverURL:"https://cdn.intechopen.com/books/images_new/8903.jpg",editedByType:null,editors:[{id:"188999",title:"Dr.",name:"Mattia",middleName:null,surname:"Bartoli",slug:"mattia-bartoli",fullName:"Mattia Bartoli"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10132",title:"Applied Computational Near-surface Geophysics - From Integral and Derivative Formulas to MATLAB Codes",subtitle:null,isOpenForSubmission:!0,hash:"38cdbbb671df620b36ee96af1d9a3a90",slug:null,bookSignature:"Dr. Afshin Aghayan",coverURL:"https://cdn.intechopen.com/books/images_new/10132.jpg",editedByType:null,editors:[{id:"311030",title:"Dr.",name:"Afshin",middleName:null,surname:"Aghayan",slug:"afshin-aghayan",fullName:"Afshin Aghayan"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10110",title:"Advances and Technologies in Building Construction and Structural Analysis",subtitle:null,isOpenForSubmission:!0,hash:"df2ad14bc5588577e8bf0b7ebcdafd9d",slug:null,bookSignature:"Dr. Ali Kaboli and Dr. Sara Shirowzhan",coverURL:"https://cdn.intechopen.com/books/images_new/10110.jpg",editedByType:null,editors:[{id:"309192",title:"Dr.",name:"Ali",middleName:null,surname:"Kaboli",slug:"ali-kaboli",fullName:"Ali Kaboli"}],productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"10175",title:"Ethics in Emerging Technologies",subtitle:null,isOpenForSubmission:!0,hash:"9c92da249676e35e2f7476182aa94e84",slug:null,bookSignature:"Prof. Ali Hessami",coverURL:"https://cdn.intechopen.com/books/images_new/10175.jpg",editedByType:null,editors:[{id:"108303",title:"Prof.",name:"Ali",middleName:null,surname:"Hessami",slug:"ali-hessami",fullName:"Ali Hessami"}],productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:16},humansInSpaceProgram:{},teamHumansInSpaceProgram:{},route:{name:"profile.detail",path:"/profiles/81886/elisabeth-naschberger",hash:"",query:{},params:{id:"81886",slug:"elisabeth-naschberger"},fullPath:"/profiles/81886/elisabeth-naschberger",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()