The Open Transportation Journal




ISSN: 1874-4478 ― Volume 12, 2018
RESEARCH ARTICLE

The Trolley Problem Version of Autonomous Vehicles



Yair Wiseman*, Ilan Grinberg
1 Computer Science Department, Bar-Ilan University, Ramat-Gan 52900, Israel

Abstract

Introduction:

The Trolley problem is a very well-known ethics dilemma about actively killing one or sometimes even more persons in order to save a number of persons. The problem can occur in autonomous vehicles when the vehicle realizes that there is no way to prevent a collision, the computer of the vehicle should analyze which collision is considered to be the least harmful collision.

Method and Result:

In this paper, we suggest a method to evaluate the likely harmfulness of each sort of collision using Spatial Data Structures and Bounding Volumes and accordingly to decide which course of actions would be the less harmful and therefore should be chosen by the autonomous vehicle.

Conclusion:

The aim of this paper is to emphasize that the “Trolley Problem” occurs when the human driver is replaced by a robot and if a moral answer is given by an authoritative and legitimate board of experts, it can be coded in autonomous vehicle software.

Keywords: Autonomous Vehicles, Car Accidents, Embedded Real-Time Systems, Trolley Problem, Spatial Data Structures, Bounding Volumes.


Article Information


Identifiers and Pagination:

Year: 2018
Volume: 12
First Page: 105
Last Page: 113
Publisher Id: TOTJ-12-105
DOI: 10.2174/18744478018120100105

Article History:

Received Date: 20/12/2017
Revision Received Date: 05/02/2018
Acceptance Date: 25/02/2018
Electronic publication date: 13/03/2018
Collection year: 2018

Article Metrics:

CrossRef Citations:
1

Total Statistics:

Full-Text HTML Views: 443
Abstract HTML Views: 504
PDF Downloads: 337
ePub Downloads: 282
Total Views/Downloads: 1566

Unique Statistics:

Full-Text HTML Views: 293
Abstract HTML Views: 308
PDF Downloads: 174
ePub Downloads: 129
Total Views/Downloads: 904
Geographical View

© 2018 Wiseman and Grinberg.

open-access license: This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International Public License (CC-BY 4.0), a copy of which is available at: https://creativecommons.org/licenses/by/4.0/legalcode. This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


* Address correspondence to this author at the Computer Science Department, Bar-Ilan University, Ramat-Gan 52900, Israel; Tel: +972-3-531-7015; E-mail: wiseman@cs.biu.ac.il




1. INTRODUCTION

Ethics is not an exact science. Someone can consider one decision as moral; whereas the other one can consider the very same decision as immoral. When it comes to autonomous vehicles, the ethics should be sometimes encoded into the software of the vehicle. The programmer should sometimes decide questions like whose life is more precious, the occupants in the vehicle or pedestrians go nearby the vehicle?

Such questions have been weighed up over the years and specifically for autonomous vehicles in the recent years [1N.J. Goodall, "'Can you program ethics into a self-driving car?", IEEE Spectr., vol. 53, no. 6, pp. 28-31.[http://dx.doi.org/10.1109/MSPEC.2016.7473149] ], but no clear decisions have been made. One of the most popular forms to present the question about the priority of human lives is the “Trolley Problem” [2J.J. Thomson, “Killing, letting die, and the trolley problem”, Ethical Theory - An Anthology., 2nd edJohn Wiley & Sons, Inc., pp. 204-217.2nd edPublication]. There are some versions for the trolley problem but the common concept is that there is a need to prioritize the life of several persons.

In the “Trolley Problem” the situation is clear i.e. you should kill a certain person in order to save another certain person; however, the reality is not so clear [3N.J. Goodall, "From Trolleys to Risk: Models for Ethical Autonomous Driving", Am. J. Public Health, vol. 107, no. 4, p. 496. [AJPH].[http://dx.doi.org/10.2105/AJPH.2017.303672] [PMID: 28272942] , 4N.J. Goodall, "Away from trolley problems and toward risk management", Appl. Artif. Intell., vol. 30, no. 8, pp. 810-821.[http://dx.doi.org/10.1080/08839514.2016.1229922] ]. Sometimes the software of the autonomous vehicle cannot be sure whether in a case of an accident, the occupants in the vehicle, nearby pedestrians or anyone else will die. e.g. when there is a rollover crash the occupants in the vehicle have a smaller chance to die relative to a pedestrian that the vehicle falls on him; however, there is still a small chance that an occupant in the vehicles will sustain a severer injuries than a nearby pedestrian [5A.M. Eigen, Rollover Crash Mechanisms and Injury Outcomes for Restrained Occupants.NHTSA Technical Report., U.S. Department of Transportation: Washington, DC, .].

There was a claim that the autonomous vehicle makers prefer the lives of the occupants in the autonomous vehicle over the lives of the pedestrians in their surroundings, because the occupants are their customers and the vehicle makers

want to please them and convince more potential customers that the vehicle is safe [6E. Aharonson, Actuality in ‘Halacha’ – Autonomous Cars, .https://www.youtube.com/watch?v=gmgUJDVDreg]; however, no evidence has been found for this hypothetical claim [7Y. Wiseman, and Y. Giat, Multi-modal passenger security in Israel Multimodal Security in Passenger and Freight Transportation: Frameworks and Policy Applications., Edward Elgar Publishing Limited, pp. 246-260.].

This paper suggests a way to give the most accurate data to the algorithm and according to this data, the software can decide whatever decision the software developer believes is the most appropriate one.

2. METHODS

Polygons are simple shapes that can simulate the real objects. It is very common to generate models of real objects using simple polygons. This practice is usually called Spatial Data Structures [8K. Keul, P. Lemke, and S. Müller, "Accelerating spatial data structures in ray tracing through precomputed line space visibility", Proceedings of the 24th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 17-26.].

When it comes to simulation of car accidents, Spatial Data Structures are implemented in order to find the intersections between two objects that are about to collide and realize which polygons are about to be damaged. Obviously, trying to check all the polygons of each of the objects is pointless, because there are parts of objects that have no chance to collide with another object in some sorts of crashes, for e.g. in a front accident, the rear part of the vehicle will not be damaged; therefore, there are several methods to reduce the number of polygons intersections when using Spatial Data Structures [9I. Grinberg, and Y. Wiseman, "Scalable Parallel Simulator for Vehicular Collision Detection", Inter J. Veh Sys Mod Tes, vol. 8, no. 2, pp. 119-144.].

Spatial Data Structures are the basis for Space Partitioning [10R. Vuillemot, and J. Boy, "Structuring Visualization Mock-ups at the Graphical Level by Dividing the Display Space", To appear in IEEE Transactions on Visualization and Computer Graphics, .http://romain.vuillemot.net/publis/infovis17-visualization-mockups.pdf] and Bounding Volumes [11J.S. Park, C. Park, and D. Manocha, "Efficient probabilistic collision detection for non-convex shapes", proceedings of IEEE International Conference on Robotics and Automation (ICRA), pp. 1944-1951.Singapore[http://dx.doi.org/10.1109/ICRA.2017.7989226] ]. Space Partitioning is a method of space sub-partitioning into convex regions. These convex regions are named “cells”. Each of these cells maintains a list of objects that it comprises of. By employing these cells, the intersection algorithm knows how to sift out pairs of polygons that have no chance to intersect.

The other method is Bounding Volume. This method breaks an object into small components; then the algorithm finds a fitted bounding volume for each of the small component. After that, the intersection algorithm checks for intersected components. It should be noted that the sifting out is less demanding in this method, because the algorithm just have to detect the at least partly cover bounding volumes.

Bounding Volumes applications have been intensely studied over the years and many variations of the method have been suggested: Bounding Spheres [12T. Larsson, "Exact bounding spheres by iterative octant scan", Proceedings of SIGRAD 2015, pp. 9-12.Stockholm, Sweden], K-DOPs - Discrete Orientation Polytopes [13Y. Wang, Z.X. Luo, J.C. Liu, X. Fan, H. Li, and Y. Wu, "Real-time estimation of hand gestures based on manifold learning from monocular videos", Multimedia Tools Appl., vol. 71, no. 2, pp. 555-574.[http://dx.doi.org/10.1007/s11042-013-1524-7] ], OBB - Oriented Bounding Boxes [14Q. Fu, X. Chen, X. Su, J. Li, and H. Fu, "Structure adaptive shape editing for man made objects", Comput. Graph. Forum, vol. 35, no. 2, pp. 27-36.[http://dx.doi.org/10.1111/cgf.12808] ], AABB - Axis Aligned Bounding Boxes [15P. Cai, C. Indhumathi, Y. Cai, J. Zheng, Y. Gong, T.S. Lim, and P. Wong, Collision detection using axis aligned bounding boxes.Simulations, Serious Games and Their Applications., Springer: Singapore, pp. 1-14.[http://dx.doi.org/10.1007/978-981-4560-32-0_1] ] and Hierarchical Spherical Distance Fields [16R. Weller, New geometric data structures for collision detection and haptics., Springer Science & Business Media, .[http://dx.doi.org/10.1007/978-3-319-01020-5] ].

In this paper, we have used the AABB approach which is one of the most well-known approaches. In AABB, each of the bounding volume in the object model is represented by its minimum and its maximum values. Compared to the “Bounding Sphere” approach, AABB has an advantage and a disadvantage. AABB encompasses the components of the model more tightly which probably yield fewer intersection checks and also the split of the object into its bounding volumes is faster [17U. Schwesinger, R. Siegwart, and P. Furgale, "Fast collision detection through bounding volume hierarchies in workspace-time space for sampling-based motion planners", proceedings of IEEE International Conference on Robotics and Automation (ICRA), pp. 63-68.[http://dx.doi.org/10.1109/ICRA.2015.7138981] ]. The algorithm first checks each of the basic elements that a bounding volume consists of and projects the element on the axes and then finds the minimum and the maximum values for each axis. The fast operation is quite essential in real-time systems like collisions of autonomous vehicles. The algorithm should be fast and decide promptly what course of actions should be taken.

However, AABB also has a disadvantage. Saving the data for AABB takes more memory space which in the past was very costly, but nowadays, ample memory space is quite economical and even simple computers have plenty of memory space, so this disadvantage is not so acute; therefore, we have chosen the AABB approach.

Since our system is a real-time system and the computation time is very essential we have decided to implement the AABB approach. We generated the bounding volume tree in a recursive manner. In each step, the algorithm generates bounding volumes for the remaining triangles and splits the triangle set into two sub-graphs. Then, it recursively calls itself to do the same for each of these sub-graphs.

2.1. Bounding Volume Hierarchies

Bounding volume hierarchies are actually a tree symolizing a model of an object [18D. Meister, and J. Bittner, "Parallel locally-ordered clustering for bounding volume hierarchy construction", IEEE Trans. Vis. Comput. Graph., vol. 24, no. 3, pp. 1345-1353.[http://dx.doi.org/10.1109/TVCG.2017.2669983] [PMID: 28212090] ]. The basic components are the leaves of the tree and each sub-tree rooted by an internal node represents a segment of the model.

Such trees have only one leave for each basic component, so the size of the storage needed for each vehicle model is linear in the number of the basic components. This also impacts on the intersection check time which is therefore quite fast.

The construction time, however, is lengthy. This can be a significant disadvantage when the model is flexible and a reconstruction is frequently needed whenever the object changes its shape; however, a vehicle is a rigid object and no changes are made, so the construction can be done only once and the tree will be good for the entire life of the vehicle, so this disadvantage is irrelevant for the objective of this paper.

When the algorithm checks for collisions, it will begin to check the roots of the model trees and then in a recursive manner it will go down the trees to check whether an intersection between sub-trees or even leaves occur.

The total time needed to check the severity of a collision between two model trees is given by this formula:

Ttotal=NbCb+NpCp

Where,

Ttotal – Total time for an intersection check between two model trees.

Nb – Number of bounding volume pairs checked for one intersection.

Cb – Time for one intersection check between a particular bounding volume pair.

Np – Number of primitive polygon pairs checked for one intersection.

Cp –Time for one intersection check between a particular primitive polygon pair.

Methods with a tight-fitting bounding volume like OBB will yield low Nb and Np; however, Cb will be in these methods much higher. On the contrary, AABB will yield high Nb and Np; whereas Cb will be lower.

2.2. Implementation

As was explained above, the implementation of the method was in a recursive manner. We used triangles as it is a very common in such implementations [19K.J. Mei, and R.S. Lee, "Collision detection for virtual machine tools and virtual robot arms using the Shared Triangles Extended Octrees method", Inter J. Comp Inte Manu, vol. 29, no. 4, pp. 355-373.[http://dx.doi.org/10.1080/0951192X.2015.1033755] ].

Initially, the algorithm finds a bounding volume for the remaining triangles. Then, the algorithm splits the set of triangles into two sub-graphs. Finally, the algorithm calls itself in a recursive manner to handle the two new sub-graphs that have been generated in the previous step. When a sub-graph has just one triangle, the recursive call will stop and the algorithm will not call itself any longer.

The incentive for the triangles split into several sub-graphs is the formation of as small as possible bounding volumes so the model will as accurate as possible.

(Fig. 1a and b) explains by an example how four triangles can be split in two different ways. The number written in the triangles denotes which sub-graph contains the triangle after the suggested split. This figure clearly shows that a hierarchical intersection checking with a specific segment can generate more triangle intersection checks in the right side figure because the generated bounding volume is bigger. This attribute motivated us to implement a split algorithm that uses better splits as in the left side, so as to minimize the triangle intersection checks.

Fig. (1)
Triangle split (a) Example of split that causes 2 checks; (b) Example of split that causes 4 checks.


Actually, the bounding volume algorithms and the triangle split algorithms greatly shape the bounding volume tree generation algorithm and its efficiency. We have employed “Fitting points with Gaussian distribution” [20L. Maarten, and J.M. Phillips, Shape fitting on point sets with probability distributions.Algorithms-ESA 2009., Springer: Berlin, Heidelberg, pp. 313-324.] to as the basis for the algorithm for generating the bounding volumes.

2.3. Triangle Split Algorithm

Each graph of triangles has a corresponding bounding volume that can be split into two sub-graphs. The pseudo code of this split algorithm is:

  • For each axis of any volume select a positive direction.
  • For each triangle find a vertex with the highest value on the projected axis.
  • Sort the triangles vector by their vertex values.
  • For each triangle in the triangles vector compute the sum of the projection lengths on the axis divided by the original graph projection lengths of the two sub-graphs and split this triangle in order to get a smaller sub-graphs.

The algorithm strives to do its best in order to generate the least possible intersecting sub-graphs.

(Figs. 2 and 3) illustrate two different potential index split. (Fig. 2) shows one potential split at triangle index 4. If indeed the algorithm chooses to split at this index, the split will ineffectually generate a larger intersection between the two new graphs. (Fig. 3) shows a better option which is a split in triangle index 2 which generates a smaller intersection between the two new graphs. This example shows a case when the algorithm would select a better split over an inferior split. In this particular example, it was a split at triangle index 2 rather than a split at triangle index 4.

Fig. (2)
Example of triangles' split on the projecting axis.


Fig. (3)
Yet another example of triangles' split on the projecting axis.


4. RESULT

We evaluated several schemes for parallel implementation of the algorithm:

  • Best Match – Select a core with the maximum number of correlated model sections.
  • Random Match – Select a random core.
  • Lowest Match - Select a core with the minimum number of correlated model sections.
  • Best Match-Load – This is a combination of the Best Match scheme and a Load parameter that calculated for each core. The algorithm prefers less loaded cores over more loaded cores. The load on any core is computed by dividing the buffered checks waiting for this core by the maximal size of this core's buffer. The algorithm takes into account both the load in the core and the correlation between the model sections that the core checks and the newly designed model section, so as to get the best decision.

The suggested method has been implemented on a four cores processor. We endeavored to evaluate the efficiency of the suggested triangle scheme. The particular processor was Intel® Pentium® Processor N3540 which is a very widespread quad-core processor with 2.16GZ; however, another process would have yield similar results.

We checked two kinds of damages. In (Figs. 4 and 5), we can see a vehicle with a substantial damage. (Fig. 4) shows the vehicle before it has been triangulated and (Fig. 5) shows the same vehicle before it has been triangulated. Similarly, (Figs. 6 and 7) show a vehicle before it has been triangulated and after before it has been triangulated. However, (Figs. 6 and 7) show a vehicle with only scratches.

Fig. (4)
Vehicle with a substantial damage.


Fig. (5)
Triangulated version of the vehicle from (Fig. 4).


Fig. (6)
Vehicle with small scratches.


Fig. (7)
Triangulated version of the vehicle from (Fig. 6).


Selecting the distribution depth of the bounding volumes is also very important and should be carefully selected. Small depths result in large overlapping bounding volumes, which will generate many node collision pairs. However, large depths result in a long analysis of the first step by the main process, while the other cores are idle. This is an unnecessary bottleneck that the algorithm should prevent.

We have checked the effect of several distribution depths on the algorithm performance. We have used the images of the vehicle in (Fig. 5) and the vehicle in (Fig. 7). The findings can be seen in (Figs. 8 and 9). It can be noticeably observed that the Best Match algorithm yields better performance, both in relative data transfer and speedup.

Fig. (8)
Distribution depth effect in the vehicle of (Fig. 5) on (a) speedup (b) relative data transfer.


Fig. (9)
Distribution depth effect in the vehicle of (Fig. 7) on (a) speedup (b) relative data transfer.


The best possible distribution depth can be different in different cases. An example of this difference can be seen in (Figs. 8 and 9). The vehicle in (Fig. 8) has an optimal distribution depth of 12; whereas the vehicle in (Fig. 9) has an optimal distribution depth of 10. Other vehicles can have other optimal distribution depths.

5. DISCUSSION

The results clearly show that different distribution depths should be chosen for different vehicle models.

Moreover, we can also figure out from the results that if the vehicle model is larger, the Best Match algorithm will have a greater benefit over the other algorithms.

The buffer size of the cores has a noticeable effect on the performance of the algorithms. The buffer gives a core option of collecting several jobs and sending them en masse to another core. Therefore, the main process has more time for setting up tasks for other cores.

If we choose an algorithm that consumes more memory, like Lowest Match or Random Match, the processor will swiftly run out of memory and therefore will be incapable to accomplish the task. The processor will have to bring into play virtual memory mechanism that can turn out even to thrashing [21M. Reuven, and Y. Wiseman, "Medium-Term Scheduler as a Solution for the Thrashing Effect", The Comp J, Oxford University Press, Swindon, UK, vol. 49, no. 3, pp. 297-309.].

Such a situation can be seen in the last Figures where there are trimmed lines. It occurs in algorithms that inefficiently allocate memory and when a low distribution depth is select. The lines are trimmed because the algorithm went into a thrashing situation and therefore no data could be obtained.

CONCLUSION

There is no confident moral answer to the “Trolley Problem” and different people gave different moral answers to this problem. Our paper also did not aim at realizing the “correct moral answer” for the “Trolley Problem” and it was out of scope of this paper. The aim of this paper is to emphasize that the “Trolley Problem” occurs when the human driver is replaced by a robot and if a moral answer is given by an authoritative and legitimate board of experts, it can be coded in autonomous vehicle software.

The paper has suggested a real-time estimation system for vehicle crash probable damages. The aim of this system is to facilitate autonomous vehicle's embedded computer to decide which crash is the least harmful when it comprehends that a crash is unavoidable by analyzing all the damaged for each of the possible crashes.

Actually, this paper has suggested how to adapt the well-known Primitive Intersection scheme into an estimation tool of potential vehicle crash damages so as to decide which course of actions should be taken by the vehicle in an inescapable crash.

In the future, we consider checking how other strategies could be implemented and also the advisability of using other polygonal shapes.

CONSENT FOR PUBLICATION

Not applicable.

CONFLICT OF INTEREST

The authors declare no conflict of interest, financial or otherwise.

ACKNOWLEDGEMENTS

Declared none.

REFERENCES

[1] N.J. Goodall, "'Can you program ethics into a self-driving car?", IEEE Spectr., vol. 53, no. 6, pp. 28-31.[http://dx.doi.org/10.1109/MSPEC.2016.7473149]
[2] J.J. Thomson, “Killing, letting die, and the trolley problem”, Ethical Theory - An Anthology., 2nd edJohn Wiley & Sons, Inc., pp. 204-217.2nd edPublication
[3] N.J. Goodall, "From Trolleys to Risk: Models for Ethical Autonomous Driving", Am. J. Public Health, vol. 107, no. 4, p. 496. [AJPH].[http://dx.doi.org/10.2105/AJPH.2017.303672] [PMID: 28272942]
[4] N.J. Goodall, "Away from trolley problems and toward risk management", Appl. Artif. Intell., vol. 30, no. 8, pp. 810-821.[http://dx.doi.org/10.1080/08839514.2016.1229922]
[5] A.M. Eigen, Rollover Crash Mechanisms and Injury Outcomes for Restrained Occupants.NHTSA Technical Report., U.S. Department of Transportation: Washington, DC, .
[6] E. Aharonson, Actuality in ‘Halacha’ – Autonomous Cars, .https://www.youtube.com/watch?v=gmgUJDVDreg
[7] Y. Wiseman, and Y. Giat, Multi-modal passenger security in Israel Multimodal Security in Passenger and Freight Transportation: Frameworks and Policy Applications., Edward Elgar Publishing Limited, pp. 246-260.
[8] K. Keul, P. Lemke, and S. Müller, "Accelerating spatial data structures in ray tracing through precomputed line space visibility", Proceedings of the 24th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, pp. 17-26.
[9] I. Grinberg, and Y. Wiseman, "Scalable Parallel Simulator for Vehicular Collision Detection", Inter J. Veh Sys Mod Tes, vol. 8, no. 2, pp. 119-144.
[10] R. Vuillemot, and J. Boy, "Structuring Visualization Mock-ups at the Graphical Level by Dividing the Display Space", To appear in IEEE Transactions on Visualization and Computer Graphics, .http://romain.vuillemot.net/publis/infovis17-visualization-mockups.pdf
[11] J.S. Park, C. Park, and D. Manocha, "Efficient probabilistic collision detection for non-convex shapes", proceedings of IEEE International Conference on Robotics and Automation (ICRA), pp. 1944-1951.Singapore[http://dx.doi.org/10.1109/ICRA.2017.7989226]
[12] T. Larsson, "Exact bounding spheres by iterative octant scan", Proceedings of SIGRAD 2015, pp. 9-12.Stockholm, Sweden
[13] Y. Wang, Z.X. Luo, J.C. Liu, X. Fan, H. Li, and Y. Wu, "Real-time estimation of hand gestures based on manifold learning from monocular videos", Multimedia Tools Appl., vol. 71, no. 2, pp. 555-574.[http://dx.doi.org/10.1007/s11042-013-1524-7]
[14] Q. Fu, X. Chen, X. Su, J. Li, and H. Fu, "Structure adaptive shape editing for man made objects", Comput. Graph. Forum, vol. 35, no. 2, pp. 27-36.[http://dx.doi.org/10.1111/cgf.12808]
[15] P. Cai, C. Indhumathi, Y. Cai, J. Zheng, Y. Gong, T.S. Lim, and P. Wong, Collision detection using axis aligned bounding boxes.Simulations, Serious Games and Their Applications., Springer: Singapore, pp. 1-14.[http://dx.doi.org/10.1007/978-981-4560-32-0_1]
[16] R. Weller, New geometric data structures for collision detection and haptics., Springer Science & Business Media, .[http://dx.doi.org/10.1007/978-3-319-01020-5]
[17] U. Schwesinger, R. Siegwart, and P. Furgale, "Fast collision detection through bounding volume hierarchies in workspace-time space for sampling-based motion planners", proceedings of IEEE International Conference on Robotics and Automation (ICRA), pp. 63-68.[http://dx.doi.org/10.1109/ICRA.2015.7138981]
[18] D. Meister, and J. Bittner, "Parallel locally-ordered clustering for bounding volume hierarchy construction", IEEE Trans. Vis. Comput. Graph., vol. 24, no. 3, pp. 1345-1353.[http://dx.doi.org/10.1109/TVCG.2017.2669983] [PMID: 28212090]
[19] K.J. Mei, and R.S. Lee, "Collision detection for virtual machine tools and virtual robot arms using the Shared Triangles Extended Octrees method", Inter J. Comp Inte Manu, vol. 29, no. 4, pp. 355-373.[http://dx.doi.org/10.1080/0951192X.2015.1033755]
[20] L. Maarten, and J.M. Phillips, Shape fitting on point sets with probability distributions.Algorithms-ESA 2009., Springer: Berlin, Heidelberg, pp. 313-324.
[21] M. Reuven, and Y. Wiseman, "Medium-Term Scheduler as a Solution for the Thrashing Effect", The Comp J, Oxford University Press, Swindon, UK, vol. 49, no. 3, pp. 297-309.

Endorsements



"Open access will revolutionize 21st century knowledge work and accelerate the diffusion of ideas and evidence that support just in time learning and the evolution of thinking in a number of disciplines."


Daniel Pesut
(Indiana University School of Nursing, USA)

"It is important that students and researchers from all over the world can have easy access to relevant, high-standard and timely scientific information. This is exactly what Open Access Journals provide and this is the reason why I support this endeavor."


Jacques Descotes
(Centre Antipoison-Centre de Pharmacovigilance, France)

"Publishing research articles is the key for future scientific progress. Open Access publishing is therefore of utmost importance for wider dissemination of information, and will help serving the best interest of the scientific community."


Patrice Talaga
(UCB S.A., Belgium)

"Open access journals are a novel concept in the medical literature. They offer accessible information to a wide variety of individuals, including physicians, medical students, clinical investigators, and the general public. They are an outstanding source of medical and scientific information."


Jeffrey M. Weinberg
(St. Luke's-Roosevelt Hospital Center, USA)

"Open access journals are extremely useful for graduate students, investigators and all other interested persons to read important scientific articles and subscribe scientific journals. Indeed, the research articles span a wide range of area and of high quality. This is specially a must for researchers belonging to institutions with limited library facility and funding to subscribe scientific journals."


Debomoy K. Lahiri
(Indiana University School of Medicine, USA)

"Open access journals represent a major break-through in publishing. They provide easy access to the latest research on a wide variety of issues. Relevant and timely articles are made available in a fraction of the time taken by more conventional publishers. Articles are of uniformly high quality and written by the world's leading authorities."


Robert Looney
(Naval Postgraduate School, USA)

"Open access journals have transformed the way scientific data is published and disseminated: particularly, whilst ensuring a high quality standard and transparency in the editorial process, they have increased the access to the scientific literature by those researchers that have limited library support or that are working on small budgets."


Richard Reithinger
(Westat, USA)

"Not only do open access journals greatly improve the access to high quality information for scientists in the developing world, it also provides extra exposure for our papers."


J. Ferwerda
(University of Oxford, UK)

"Open Access 'Chemistry' Journals allow the dissemination of knowledge at your finger tips without paying for the scientific content."


Sean L. Kitson
(Almac Sciences, Northern Ireland)

"In principle, all scientific journals should have open access, as should be science itself. Open access journals are very helpful for students, researchers and the general public including people from institutions which do not have library or cannot afford to subscribe scientific journals. The articles are high standard and cover a wide area."


Hubert Wolterbeek
(Delft University of Technology, The Netherlands)

"The widest possible diffusion of information is critical for the advancement of science. In this perspective, open access journals are instrumental in fostering researches and achievements."


Alessandro Laviano
(Sapienza - University of Rome, Italy)

"Open access journals are very useful for all scientists as they can have quick information in the different fields of science."


Philippe Hernigou
(Paris University, France)

"There are many scientists who can not afford the rather expensive subscriptions to scientific journals. Open access journals offer a good alternative for free access to good quality scientific information."


Fidel Toldrá
(Instituto de Agroquimica y Tecnologia de Alimentos, Spain)

"Open access journals have become a fundamental tool for students, researchers, patients and the general public. Many people from institutions which do not have library or cannot afford to subscribe scientific journals benefit of them on a daily basis. The articles are among the best and cover most scientific areas."


M. Bendandi
(University Clinic of Navarre, Spain)

"These journals provide researchers with a platform for rapid, open access scientific communication. The articles are of high quality and broad scope."


Peter Chiba
(University of Vienna, Austria)

"Open access journals are probably one of the most important contributions to promote and diffuse science worldwide."


Jaime Sampaio
(University of Trás-os-Montes e Alto Douro, Portugal)

"Open access journals make up a new and rather revolutionary way to scientific publication. This option opens several quite interesting possibilities to disseminate openly and freely new knowledge and even to facilitate interpersonal communication among scientists."


Eduardo A. Castro
(INIFTA, Argentina)

"Open access journals are freely available online throughout the world, for you to read, download, copy, distribute, and use. The articles published in the open access journals are high quality and cover a wide range of fields."


Kenji Hashimoto
(Chiba University, Japan)

"Open Access journals offer an innovative and efficient way of publication for academics and professionals in a wide range of disciplines. The papers published are of high quality after rigorous peer review and they are Indexed in: major international databases. I read Open Access journals to keep abreast of the recent development in my field of study."


Daniel Shek
(Chinese University of Hong Kong, Hong Kong)

"It is a modern trend for publishers to establish open access journals. Researchers, faculty members, and students will be greatly benefited by the new journals of Bentham Science Publishers Ltd. in this category."


Jih Ru Hwu
(National Central University, Taiwan)


Browse Contents


Webmaster Contact: info@benthamopen.com
Copyright © 2018 Bentham Open