The Open Cybernetics & Systemics Journal




(Discontinued)

ISSN: 1874-110X ― Volume 12, 2018

An Improved Underground Location Algorithm Based on Convex Sets of RSSI



Wentao Zhao1, 2, Yafei Cheng1, Lingjun Meng1, *, Chunchun Wang1, Lina Wang1, 2
1 School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454000, China
2 Opening Project of Key Laboratory of Mine Informatization, Henan Polytechnic University, Jiaozuo 454000, Henan, China

Abstract

Location algorithm based on fingerprint has been applied to underground tunnel of coal mines. However, obvious and un-ignorable errors will occur if reference locations are selected sparsely when detecting unknown points, which may make it difficult for locating people in coal mines. Hence, an underground location algorithm based on convex sets of Received Signal Strength Indication (RSSI) is proposed in this paper. Many reference location points are deployed at the experimental tunnel every 5m both 2 sides as depicted in Fig. (5) shows, then a reference location can be randomly selected. Firstly, calculate the Euclidean distance between unknown points and reference locations in a fingerprint database established by using RSSI value that de-noised by the Kalman filter algorithm. Secondly, select several reference locations that mostly match with unknown points, construct a convex. Finally, take the coordinates of centroid of the convex as the coordinates of the unknown points. The simulation experiments indicate that the proposed algorithm locates unknown points with higher accuracy than the traditional one based on fingerprint.

Keywords: Convex, Fingerprint, Locate, RSSI, Underground tunnel.


Article Information


Identifiers and Pagination:

Year: 2016
Volume: 10
First Page: 163
Last Page: 171
Publisher Id: TOCSJ-10-163
DOI: 10.2174/1874110X01610010163

Article History:

Received Date: 13/01/2015
Revision Received Date: 20/06/2016
Acceptance Date: 1/08/2016
Electronic publication date: 16/09/2016
Collection year: 2016

© Zhao et al.; Licensee Bentham Open

open-access license: This is an open access article licensed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 International Public License (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/legalcode), which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited.


* Address correspondence to this author at the School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454000, China; Tel:(+86)13707659600; E-mail: menglingjun1109@126.com





1. INTRODUCTION

Underground environment of coal mines is very complex. Coal miners are often threatened by accidents [1C. Lizhen, and Y. Quan, "Design and implementation based on the Zig Bee adaptive communications in the mine gas monitoring system", Min. Safety Environ., vol. 39, pp. 19-21, 2012.
[http://dx.doi.org/10.1109/TCE.2010.5606278]
] from roof collapse, explosion, flooding, fire etc., which make it critical for escaping and rescuing to accurately locate coal miners underground. Many researchers have performed a lot experiments on underground location techniques. Owing to the fact that wireless network can be constructed and maintained easily and low-cost, especially its stubborn features that make it stick to efficient work though accidents happened, location techniques based on WiFi [2L. Xiaowen, Z. Xiujun, and H. Lina, "Research on underground location algorithm based on WI-FI", J. Transducer Technol., vol. 26, pp. 854-858, 2012.] have been widely used in the underground environments of coal mines.

The techniques based on the time of arrival (TOA), the time difference of arrival (TDOA), the angle of arrival (AOA), or the received signal strength indication (RSSI) have been adopted in main location methods. The first three techniques require high quality hardware, while the last one is low-cost, easy to implement and little special requirements on hardware. The algorithm based on fingerprint [3W. Ding, M. Juan, and Z. Yixuan, "Fingerprint localization algorithm based on RSS space-time processing", App. Res. Comp., vol. 29, pp. 4726-4728, 2012.] adopts RSSI to locate unknown points. However, the RSSI is affected greatly by the factors like movements of people and equipment, changes of temperature [4W. Yang, H. Liusheng, and X. Mingjun, "A wireless sensor network node localization algorithm based on RSSI calibration", Small Microcomp. Syst., vol. 30, pp. 59-62, 2009., 5W. Fubao, S. Long, and R. Fengyuan, "Self-positioning system and algorithm in wireless sensor networks", J. Softw., vol. 16, pp. 1148-1157, 2005.] etc. The fingerprint algorithm locates unknown points with un-ignorable errors especially when reference locations are selected sparsely.

To handle this problem, we propose an underground tunnel location algorithm based on convex sets of RSSI. Firstly, calculate the Euclidean distance between unknown points and reference locations in a fingerprint database established by using RSSI value that de-noised by the Kalman filter algorithm. Secondly, select several reference locations that mostly match with unknown points, construct a convex. Finally, take the coordinates of centroid of the convex as the coordinates of the unknown points. We have implemented our algorithm on the smart phone whose OS is Android [6Y. Fan, and Z. Dongdong, "WiFi positioning based on the Android platform", Elec. Meas. Tech., vol. 35, pp. 116-119, 2012.], the simulation experiments indicate that the proposed algorithm locates unknown points with higher accuracy than the traditional one based on fingerprint.

2. THE TWO COMMON ALGORITHMS

2.1. A Location Algorithm Based on Location Fingerprint

Given the special underground geographic model, the algorithm based on location fingerprints [2L. Xiaowen, Z. Xiujun, and H. Lina, "Research on underground location algorithm based on WI-FI", J. Transducer Technol., vol. 26, pp. 854-858, 2012.] locates with higher accuracy than the algorithm based on trilateration survey [7L. Henghui, and L. Xingchuan, "Comparison of WiFi location based on triangle and location fingerprint recognition algorithm", Mobile Commun., vol. 34, pp. 72-76, 2010.].

In geometry, trilateration is the process of determining absolute or relative locations of points by measurement of distances, using the geometry of circles, spheres or triangles. In three-dimensional geometry, when it is known that a point lies on the surfaces of three spheres, then the centres of the three spheres along with their radii provide sufficient information to narrow the possible locations down to no more than two (unless the centres lie on a straight line).

While Fingerprint algorithm locates with two phases: offline training phase and online locating phase [8L. Lun, D. Enjie, and H. Lina, "An improved coal mine fingerprint matching localization algorithm", J. Sens. Technol., vol. 34, pp. 72-76, 2010., 9B. Li, I. Quader, and A. Dempster, "On outdoor positioning with Wi-Fi", J. Glob. Position. Syst., vol. 7, pp. 18-26, 2008.
[http://dx.doi.org/10.5081/jgps.7.1.18]
]. Fig. (1) shows the details of these two phases.

Fig. (1)
Location frame of the fingerprint algorithm.


In offline training phase, it firstly chooses reference locations, measures the RSSI values from different communication base stations. Then, it calculates the measured values with Kalman filter, stores the results with related reference locations and MAC addresses of base stations into a fingerprint database. It repeats all the above steps till all the reference locations have been measured.

In online locating phase, it firstly measures the RSSI and related MAC address of a communication base station at the location to be located. Then, it matches the location with the reference locations in fingerprint database by the Nearest Neighbour algorithm [10A. Kushki, K.N. Plataniotis, and A.N. Venetsanopoulos, "Kernel-Based positioning in wireless local area networks", IEEE Trans. Mobile Comput., vol. 6, pp. 689-705, 2007.
[http://dx.doi.org/10.1109/TMC.2007.1017]
, 11G. Sinan, "A survey on wireless position estimation", Wirel. Pers. Commun., vol. 44, pp. 263-282, 2008.
[http://dx.doi.org/10.1007/s11277-007-9375-z]
] (NN). It uses Euclidean distance formula to calculate the distance between the location to be located and its neighbors. Formula (1) is the Euclidean distance formula. It takes the location of the nearest neighbor as the location of the one to be located.

(1)

In formula (1), Ri is the signal strength vector of the ith reference location., represent the signal strength of the kth base station measured at the ith reference location. is the vector of the unknown point to be located., T (t1, t2, tn), tk, (k ϵ (1, n)) represents the signal strength of the kth base station measured at the unknown point. l (Ri, T) represents the Euclidean distance between the unknown point and the reference location.

2.2. A Location Algorithm Based on Convex Optimization

Doherty et al. proposed a location algorithm based on convex optimization [12P. Li, “Wireless Sensor Network Technology”, Metall. Press: Ind., 2011.-14"L. El Ghaoui, “Convex position estimation in wireless sensor networks", In: 20th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2001, pp. 1655-1663 ]. They take the communication connection between nodes as a geometric constraint. Hence take the whole communication network as a convex set. They found that the location problem could be translated into a convex optimization problem. They can locate an object according to the global optimal solution of convex optimization problem.

As shown in Fig. (2), according to the communication between unknown nodes and reference locations (labelled by O1, O2, O3 separately algorithm) and nodes in wireless range, we take advantage of the proximity and nodes joint information to regard the network as convex model so as to transmit the location problem to convex optimization problem. Finally, we can calculate unknown node position in the area (the slash shadow area in the figure) by LP or SDP. So we can get a rectangular area, with regard to the centroid of the rectangle as the unknown node location.

Fig. (2)
Convex optimization location algorithm.


3. THE PROPOSED ALGORITHM BASED ON CONVEX SETS OF RSSI

3.1. Kalman Filters for De-noising

Kalman filter is commonly used in inertial navigation systems for signal filtering. This section presents an overview of the basic Kalman filter. KF output is calculated using state space representation of the input and various other parameters. Process noise covariance matrix and measurement noise covariance matrix are the main two parameters that affect the output of KF. There are several variants of the KF based on the way the values of and are estimated. In the basic KF fixed values of and are considered to filter the signal by assuming that the process noise and measurement noise characteristics are statistically known. The de-noising process using Kalman filter has two stages:

  1. The first stage predicts the current state and the error covariance based on previous state estimate.
  2. The second stage corrects the previous predicted values using the present measured value.

3.2. How to Locate an Unknown Point

When locating in coal mines, if reference locations are selected sparsely, NN algorithm locates with obvious errors. To locate with higher accuracy, we propose an algorithm based on convex sets of RSSI to locate coal miners underground. The algorithm uniformly selects reference locations for the location to be located. It calculates the mass centre of the convex sets defined by the selected candidates, takes the location of the mass centre as the one to be located. Alg. (1) shows the model of the proposed algorithm.

Step 1: Select reference candidates

Taking the location to be located as an unknown point, the algorithm firstly measures the strength of the RSSI signals from different base stations at the unknown point.

Then, it calculates the distance between the unknown points and each reference location in a fingerprint database. It takes the first m reference locations which are the nearest m locations to the unknown points. The algorithm uses Euclidean distance formula to calculate the distance between the unknown points and reference locations.

Actually, the algorithm takes the distance between the signal strength of the unknown point and that of a reference location as the distance between these two points. The smaller the distance is, the more the two point match. Here, we use matching score to describe the distance between two point, take as the matching score between the unknown point and the ith reference location. can be calculated according to formula (2).

(2)

In formula (2), Max (l (Ri, T)) represents the maximum Euclidean distance between the unknown point and reference location candidates. The greater value of MSRi, the farther the distance between the unknown point and the reference location.

Algorithm I: pseudo code of the proposed algorithm.


Step 2: Calculate coordinate

The candidates near to the unknown point affect location the most. However, if more and more base stations are involved, the candidates far from the unknown point will affect locating increasingly, which may degrade the location accuracy. To avoid this case, we use matching factor to control the effect from different candidates, describe it as MF. MF can be calculated according to formula (3).

(3)

In formula (3), MFRi is the matching factor of the ith candidate. k (k ϵ (1, 0)) represents the impact index. The candidates near to the unknown point increasingly affect location with the decrease of k. If k = 0, the greatest effect of the location, namely the value of MSRi, while all candidates affect locating uniformly if k = 1. In this paper, 0.5 is enough for k to degrade the effect from the candidates far from the unknown point while increasing the effect from the candidate near to the point.

Due to that reference candidates are selected uniformly, the unknown point is located in the convex set which is composed of all reference location candidates. In general, different weighting functions could have been used, but the idea is the same, to weight reference coordinates depending on how similar the signals are. According to the natures of convex sets, we can calculate the coordinates of the unknown point by the formula (4).

(4)

In the formula (4), u1 + u2 +...,un = 1, n is the total number of the candidates. (x, y) is the coordinate of the measured point. (xi, yi) is the coordinate of the ith candidate. ui is the relative impact factor of the ith candidate, it can be calculated by formula (5).

(5)

3.3. How to De-noise Measured Signals

Consider random processes X(n) and Y(n) such that

where Wn and Nn are independent Gaussian random processes and independent of X. Clearly, Xn is a Markov process which together with the observations Yn form a Hidden Markov process.

Fig. (3)
Signal strength figure before filtering.


The problem of obtaining the best estimate of X from the observations Y requires one to estimate the conditional probabilities p(X n|Y n) .

Fig. (4)
Signal strength figure after Kalman filtering.


Underground environment of coal mines is very complex and bad for wireless communication. Communication signals will be transferred with noises especially when people and equipment are moving, which degrade location accuracy heavily. To handle this problem, the Kalman filter algorithm [15S. Jiping, and L. Chenxin, "Mine TOA positioning method based on Kalman filter and fingerprint location", J. China Univ. Mining, vol. 43, pp. 1117-1123, 2014., 16J. Yim, C. Park, and J. Joo, "Extended Kalman Filter for wireless LAN based indoor positioning", Decis. Support Syst., vol. 45, pp. 960-971, 2008.
[http://dx.doi.org/10.1016/j.dss.2008.03.004]
] is to be applied to filter out noise hidden in the signals we measured.

We measure strength of signals in the environment to simulate coal mines. Figs. (3 and 4) respectively show the signal strength before and after de-noised by Kalman filter algorithm. It can be obviously found that the signal strength which is filtered by Kalman has been strengthened compared with the original one. Compared with Fig. (3), much more points’ RSSI is smaller than -66.5. We consider the mean of the signal strengths de-noised as the signal strength in this paper.

4. EXPERIMENTAL RESULTS AND ANALYSIS

4.1. Experimental Environment

We firstly evaluate the algorithm in a simulation environment constructed on Matlab platform. Given the communication radius which is configured to be 100, we randomly distribute 100 nodes in a 500×3 area.

We also evaluate our algorithm in an experimental tunnel in air raid shelter of Henan Polytechnic University, which is completely similar to underground tunnels.

The tunnel is 130*2.5 *3 (m3). A lot of WiFi hotspots are deployed in the experimental tunnel. Many reference location points are deployed at the tunnel every 5m both 2 sides as the following Fig. (5) shows, then a reference location can be randomly selected.

Fig. (5)
Schematic of simulation location points.


4.2. Experimental Results and Analysis

Fig. (6) describes the final results that locate unknown points with our algorithm and the one based on fingerprint respectively.

Fig. (6)
Locating errors with different reference locations density.


It can be obviously found that locating errors of these two algorithms decreased with the diversity of reference locations increasing. While our algorithm locates with higher accuracy than the one based on fingerprint when the diversity of reference locations is lower than 20.

Due to the underground tunnel has the characteristic of a single linear. In order to verify the performance of our algorithm, we also evaluate our algorithm in the experimental tunnel introduced above. The points to be located mostly deviate from the middle line of the tunnel, which is similar to the distribution of people's movements in underground tunnels. The final positions of unknown points separately by our algorithm and fingerprint algorithm are depicted in Fig. (7).

Fig. (7)
The coordinates calculated by the two algorithm.


In Fig. (7), real locations of unknown points are labelled by A1-A8 with hollow triangles. Locations calculated by our algorithm and fingerprint algorithm are labelled by B1-B8 with Hollow Square, C1-C8 with hollow circular. The details of the former 5 points are described in Table 1. Table 1 also shows the errors of the two algorithms when locating those unknown points.

Table 1
Details of points and errors of the two algorithms.


Fig. (8)
The coordinates calculated by the two algorithm.


Next, we can depict the results in Table 1 into changing curves as shown in Fig. (8). It is obvious that our algorithm locates unknown points with less error than fingerprint algorithm. The minimum error of our algorithm is about 1m, while the maximum is about 2.5m. The accuracy of our algorithm is acceptable since the real underground tunnel of coal mines is about more than several hundred meters long [17S. Dawei, and H. Jilan, "Discussion on the key technology of coal mine personnel positioning system", Coal Mine Machine., vol. 9, pp. 82-84, 2010.].

CONCLUSION

In this paper, we translate the problem of underground locating into the problem of the optimization of RSSI convex sets. Different from other algorithms, we choose reference locations for unknown points according to matching score. During calculating the coordinates of unknown points, we use the relative impact factors to enlarge the influence from the reference locations near to the unknown points. The results of evaluations show that our algorithm located unknown points with higher accuracy.

CONFLICT OF INTEREST

No conflict of interest exits in the submission of this manuscript. This manuscript is approved by all authors for publication. I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, not under consideration for publication elsewhere, in whole or in part.

ACKNOWLEDGEMENTS

This work is supported by the Provincial Key Technologies R & D Program of Henan under Grant No. 142402210435 and Open Fund Project of Henan Higher Key Discipline Laboratory of Mine Information under Grant No. KZ2012-03.

REFERENCES

[1] C. Lizhen, and Y. Quan, "Design and implementation based on the Zig Bee adaptive communications in the mine gas monitoring system", Min. Safety Environ., vol. 39, pp. 19-21, 2012.
[http://dx.doi.org/10.1109/TCE.2010.5606278]
[2] L. Xiaowen, Z. Xiujun, and H. Lina, "Research on underground location algorithm based on WI-FI", J. Transducer Technol., vol. 26, pp. 854-858, 2012.
[3] W. Ding, M. Juan, and Z. Yixuan, "Fingerprint localization algorithm based on RSS space-time processing", App. Res. Comp., vol. 29, pp. 4726-4728, 2012.
[4] W. Yang, H. Liusheng, and X. Mingjun, "A wireless sensor network node localization algorithm based on RSSI calibration", Small Microcomp. Syst., vol. 30, pp. 59-62, 2009.
[5] W. Fubao, S. Long, and R. Fengyuan, "Self-positioning system and algorithm in wireless sensor networks", J. Softw., vol. 16, pp. 1148-1157, 2005.
[6] Y. Fan, and Z. Dongdong, "WiFi positioning based on the Android platform", Elec. Meas. Tech., vol. 35, pp. 116-119, 2012.
[7] L. Henghui, and L. Xingchuan, "Comparison of WiFi location based on triangle and location fingerprint recognition algorithm", Mobile Commun., vol. 34, pp. 72-76, 2010.
[8] L. Lun, D. Enjie, and H. Lina, "An improved coal mine fingerprint matching localization algorithm", J. Sens. Technol., vol. 34, pp. 72-76, 2010.
[9] B. Li, I. Quader, and A. Dempster, "On outdoor positioning with Wi-Fi", J. Glob. Position. Syst., vol. 7, pp. 18-26, 2008.
[http://dx.doi.org/10.5081/jgps.7.1.18]
[10] A. Kushki, K.N. Plataniotis, and A.N. Venetsanopoulos, "Kernel-Based positioning in wireless local area networks", IEEE Trans. Mobile Comput., vol. 6, pp. 689-705, 2007.
[http://dx.doi.org/10.1109/TMC.2007.1017]
[11] G. Sinan, "A survey on wireless position estimation", Wirel. Pers. Commun., vol. 44, pp. 263-282, 2008.
[http://dx.doi.org/10.1007/s11277-007-9375-z]
[12] P. Li, “Wireless Sensor Network Technology”, Metall. Press: Ind., 2011.
[13] C. Min, W. Jun, and L. Junhua, “Principles and Practice of Wireless Sensor Networks”, Chemistry, Press: Ind., 2011.
[14] "L. El Ghaoui, “Convex position estimation in wireless sensor networks", In: 20th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2001, pp. 1655-1663
[15] S. Jiping, and L. Chenxin, "Mine TOA positioning method based on Kalman filter and fingerprint location", J. China Univ. Mining, vol. 43, pp. 1117-1123, 2014.
[16] J. Yim, C. Park, and J. Joo, "Extended Kalman Filter for wireless LAN based indoor positioning", Decis. Support Syst., vol. 45, pp. 960-971, 2008.
[http://dx.doi.org/10.1016/j.dss.2008.03.004]
[17] S. Dawei, and H. Jilan, "Discussion on the key technology of coal mine personnel positioning system", Coal Mine Machine., vol. 9, pp. 82-84, 2010.
Track Your Manuscript:


Endorsements



"Open access will revolutionize 21st century knowledge work and accelerate the diffusion of ideas and evidence that support just in time learning and the evolution of thinking in a number of disciplines."


Daniel Pesut
(Indiana University School of Nursing, USA)

"It is important that students and researchers from all over the world can have easy access to relevant, high-standard and timely scientific information. This is exactly what Open Access Journals provide and this is the reason why I support this endeavor."


Jacques Descotes
(Centre Antipoison-Centre de Pharmacovigilance, France)

"Publishing research articles is the key for future scientific progress. Open Access publishing is therefore of utmost importance for wider dissemination of information, and will help serving the best interest of the scientific community."


Patrice Talaga
(UCB S.A., Belgium)

"Open access journals are a novel concept in the medical literature. They offer accessible information to a wide variety of individuals, including physicians, medical students, clinical investigators, and the general public. They are an outstanding source of medical and scientific information."


Jeffrey M. Weinberg
(St. Luke's-Roosevelt Hospital Center, USA)

"Open access journals are extremely useful for graduate students, investigators and all other interested persons to read important scientific articles and subscribe scientific journals. Indeed, the research articles span a wide range of area and of high quality. This is specially a must for researchers belonging to institutions with limited library facility and funding to subscribe scientific journals."


Debomoy K. Lahiri
(Indiana University School of Medicine, USA)

"Open access journals represent a major break-through in publishing. They provide easy access to the latest research on a wide variety of issues. Relevant and timely articles are made available in a fraction of the time taken by more conventional publishers. Articles are of uniformly high quality and written by the world's leading authorities."


Robert Looney
(Naval Postgraduate School, USA)

"Open access journals have transformed the way scientific data is published and disseminated: particularly, whilst ensuring a high quality standard and transparency in the editorial process, they have increased the access to the scientific literature by those researchers that have limited library support or that are working on small budgets."


Richard Reithinger
(Westat, USA)

"Not only do open access journals greatly improve the access to high quality information for scientists in the developing world, it also provides extra exposure for our papers."


J. Ferwerda
(University of Oxford, UK)

"Open Access 'Chemistry' Journals allow the dissemination of knowledge at your finger tips without paying for the scientific content."


Sean L. Kitson
(Almac Sciences, Northern Ireland)

"In principle, all scientific journals should have open access, as should be science itself. Open access journals are very helpful for students, researchers and the general public including people from institutions which do not have library or cannot afford to subscribe scientific journals. The articles are high standard and cover a wide area."


Hubert Wolterbeek
(Delft University of Technology, The Netherlands)

"The widest possible diffusion of information is critical for the advancement of science. In this perspective, open access journals are instrumental in fostering researches and achievements."


Alessandro Laviano
(Sapienza - University of Rome, Italy)

"Open access journals are very useful for all scientists as they can have quick information in the different fields of science."


Philippe Hernigou
(Paris University, France)

"There are many scientists who can not afford the rather expensive subscriptions to scientific journals. Open access journals offer a good alternative for free access to good quality scientific information."


Fidel Toldrá
(Instituto de Agroquimica y Tecnologia de Alimentos, Spain)

"Open access journals have become a fundamental tool for students, researchers, patients and the general public. Many people from institutions which do not have library or cannot afford to subscribe scientific journals benefit of them on a daily basis. The articles are among the best and cover most scientific areas."


M. Bendandi
(University Clinic of Navarre, Spain)

"These journals provide researchers with a platform for rapid, open access scientific communication. The articles are of high quality and broad scope."


Peter Chiba
(University of Vienna, Austria)

"Open access journals are probably one of the most important contributions to promote and diffuse science worldwide."


Jaime Sampaio
(University of Trás-os-Montes e Alto Douro, Portugal)

"Open access journals make up a new and rather revolutionary way to scientific publication. This option opens several quite interesting possibilities to disseminate openly and freely new knowledge and even to facilitate interpersonal communication among scientists."


Eduardo A. Castro
(INIFTA, Argentina)

"Open access journals are freely available online throughout the world, for you to read, download, copy, distribute, and use. The articles published in the open access journals are high quality and cover a wide range of fields."


Kenji Hashimoto
(Chiba University, Japan)

"Open Access journals offer an innovative and efficient way of publication for academics and professionals in a wide range of disciplines. The papers published are of high quality after rigorous peer review and they are Indexed in: major international databases. I read Open Access journals to keep abreast of the recent development in my field of study."


Daniel Shek
(Chinese University of Hong Kong, Hong Kong)

"It is a modern trend for publishers to establish open access journals. Researchers, faculty members, and students will be greatly benefited by the new journals of Bentham Science Publishers Ltd. in this category."


Jih Ru Hwu
(National Central University, Taiwan)


Browse Contents




Webmaster Contact: info@benthamopen.net
Copyright © 2023 Bentham Open