<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Movement pattern analysis using Voronoi Diagrams</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>David Amores</string-name>
          <email>damores@student.unimelb.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maria Vasardani</string-name>
          <email>mvasardani@unimelb.edu.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Infrastracture Engineering, The University of Melbourne</institution>
          ,
          <addr-line>Parkville, VIC 3010, AU</addr-line>
        </aff>
      </contrib-group>
      <fpage>41</fpage>
      <lpage>48</lpage>
      <abstract>
        <p>Analysis of clusters and movement patterns during emergency scenarios has the potential to provide vital information to key decision stakeholders. This paper presents a method using Voronoi Diagrams for de ning both clusters and movement patterns in terms of voronoi cell properties: size, elongation, orientation and neighbourhood. Initial experimentation and testing against baseline methods using an evacuation trajectory dataset show promising results.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>Related work on movement patterns during disasters and Voronoi Diagrams</title>
      <p>
        Previous research used data from tracking devices on people (e.g., in
        <xref ref-type="bibr" rid="ref17">Zheng et al. (2008)</xref>
        ), or georeferenced data
from social media platforms such as Twitter, Gowalla or Brightkite
        <xref ref-type="bibr" rid="ref2">(Cho et al., 2011)</xref>
        to study patterns during
disasters. Qualitative data, such as interviews and reports, have allowed the creation of disaster simulations
ranging from cellular automata
        <xref ref-type="bibr" rid="ref15">(Wei-Guo et al., 2006)</xref>
        to complex system modelling
        <xref ref-type="bibr" rid="ref1">(Adam and Gaudou, 2016)</xref>
        ,
and multi-agent based systems
        <xref ref-type="bibr" rid="ref11">(Pan et al., 2006)</xref>
        . Fine-grained analysis of movement patterns comprises an
array of statistical methods and modeling. For instance,
        <xref ref-type="bibr" rid="ref10">Lu et al. (2012)</xref>
        use data from mobile users during the
2010 Haiti Earthquake to build a model that predicts mobility patterns.
        <xref ref-type="bibr" rid="ref16">Yabe et al. (2016)</xref>
        built a framework
for hotspot detection using a Gaussian Kernel Density Estimation method, and then anomaly value detection
by comparing to the usual density distribution.
      </p>
      <p>
        A Voronoi Diagram is a data structure that partitions space around a set of points (generators) such that
each generator is the nearest object to any point inside its corresponding partition
        <xref ref-type="bibr" rid="ref5">(Gold et al., 1997)</xref>
        . Although
VD generalise to higher dimensions, for disaster scenarios we only consider them on a 2D space, the plane. The
partitions created by the VD are called Voronoi cells. Given the high time complexity of building VDs and its
variants (higher order, generalised), most uses of the VD are performed in a static environment and with a small
number of generator points. Early work on dynamic VDs by
        <xref ref-type="bibr" rid="ref7">Guibas et al. (1991)</xref>
        detects topological changes
(called topological events) in the VD relations for low cost updating rather than rebuilding.
        <xref ref-type="bibr" rid="ref12">Sud et al. (2008)</xref>
        make innovative uses of rst and second order VDs to build a structure used for route planning in environments
with a large number of moving agents. Additionally, a number of optimisation techniques are used when dealing
with dynamic settings, such as using hierarchical
        <xref ref-type="bibr" rid="ref3">(Choset and Burdick, 1996)</xref>
        , discrete
        <xref ref-type="bibr" rid="ref8">(Ho III et al., 1999)</xref>
        , or
approximation VDs
        <xref ref-type="bibr" rid="ref14">(Vleugels and Overmars, 1998)</xref>
        .
      </p>
      <p>
        The method presented here is based on previous work on point pattern analysis, where VDs are used for
pattern detection. Similarly to work described in
        <xref ref-type="bibr" rid="ref13">Tuceryan and Jain (1990)</xref>
        , Voronoi cell properties, such as
area, elongation, eccentricity, or neighbourhood, form a feature vector, and then feature vectors of neighbouring
cells are examined for possible patterns.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Method</title>
      <p>
        Before describing how VDs are used to de ne and analyse movement patterns, a visual inspection of the
evacuation data is performed. Observed patterns are de ned in terms of Voronoi cell properties inspired by the work of
        <xref ref-type="bibr" rid="ref13">Tuceryan and Jain (1990)</xref>
        on point pattern recognition. The results are compared to those of baseline methods.
3.1
      </p>
      <sec id="sec-3-1">
        <title>Visualisation</title>
        <p>
          The data used for exploratory analysis are taken from the VAST 2008 Challenge
          <xref ref-type="bibr" rid="ref6">(Grinstein et al., 2008)</xref>
          . This
synthetic dataset contains trajectory information of 82 persons during 837 time steps of a building evacuation,
as well as the topology of the building. An interactive visualisation allows viewing people's position at each time
step. The layout of the building is drawn in the background. Peoples' locations are used as generator points for
a dynamic VD displayed on top of these points, which changes at each time step. A snapshot is shown in Figure
1. For each step we collect the properties of cells of interest, as well as some general statistics. In particular, for
person p and its respective voronoi cell Vp, we record the following properties:
• E(Vp): Elongation of the voronoi cell. Calculated using E(Vp) = 4 ( PA((VVpp)) ) where P (Vp) is the perimeter of
the cell.
• O(Vp): Orientation of the voronoi cell. A value from 0° to 180° obtained by calculating the orientation of
the longest edge of the cell.
• S(Vp): The number of sides (edges) of the cell.
• D(Vp; Vq): The length of the Delaunay Triangulation edge from p to q, collected for every neighbour q of p.
        </p>
        <p>The area A(Vp), number of sides S(Vp), and distance D(Vp; Vq) to neighbours are standard geometrical
measures. In contrast, the elongation E(Vp) and orientation O(Vp) of a polygon are not standard and the methods
for computing them described above are empirically tested heuristics. Comparing or using other methods of
computation are out of the scope of this paper, but are brie y discussed in future work (Section 5).
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Voronoi Diagram cluster and movement patterns</title>
        <p>
          During the visual analysis of the data, two types of patterns emerged in the VD structure: clusters and movement.
The clusters are de ned at corridors people use when exiting the building, especially when two such corridors
meet. Accordingly, the movement pattern we focus on is the transition from one corridor cluster to the next.
Both of these patterns are recurrently analysed in disaster evacuation related research
          <xref ref-type="bibr" rid="ref11">(Pan et al., 2006)</xref>
          .
3.2.1
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Pattern 1 - Corridor Cluster pattern</title>
        <p>While clusters formed by people queuing at an exit are visually easy to spot, to formally de ne them can be
challenging. In particular, we want to de ne the two corridor clusters shown in Figure 2: the vertical (in brown)
and horizontal (in purple). We refer to these as VC and HC, respectively. As observed, cells belonging to one
of these clusters are elongated, have a certain orientation, and their generator points are close together. These
Voronoi cell properties are used to formally describe the clusters.</p>
        <p>We de ne as corridor cluster the group of three or more neighbouring cells (cells that share an edge) that
satifsy the following condition: Given any pair of neighbouring cells Vp and Vq, their score(Vp; Vq) is less than
a threshold . That is, a generator p is part of the same cluster as q, i score(Vp; Vq) &lt; . This score is the
weighted average of the elongation E(Vp), the normalised angle between orientations O(Vp) and O(Vq), and the
normalised distance between the generator points D(Vp; Vq):
score(Vp; Vq) =</p>
        <p>WE</p>
        <p>E(Vp) + WO</p>
        <p>O(Vp; Vq) + WD d(Vp; Vq)
WE + WO + WD
(1)
where O(Vp; Vq) = jO(Vp)#O(Vq)j is the normalised angle di erence, and d(Vp; Vq) = D(Vp;Vq) is the normalised
distance. As the maximum possible angle between two cells (in the current experiment) is 90°, it is used as
the value # for normalisation. Likewise, the maximum distance in the provided dataset between two points is
90, and is the value used as for normalisation. Having a single score that combines the three cluster de ning
properties allows for some cluster membership exibility. For instance, a cell that is not so elongated, but has
the same orientation and is very close to other members, can be in the same cluster. Likewise, an elongated cell
with the same orientation as the cluster, even if a little distant (due to the underlying environment perhaps),
can still belong to the cluster. An additional restriction is placed such that WE + WO + WD = 1, so that the
weights represent a trade-o between the properties.</p>
        <p>The value of roughly represents the property values of an 'ideal' cluster member cell. It is important,
therefore, to de ne appropriately. The ideal (trivial to identify both visually and computationally) corridor
cluster would have members perfectly aligned one after the other, and as close as possible. In that case, cells are
elongated, have the exact same orientation, and are minimally separated. Numerically, it would be:
• E(Vp) = 0:35. Mildly elongated. This is the 80 percentile of elongation in the dataset used. It is equivalent
to a rectangle of sides 7 and 1.
• jO(Vp)</p>
        <p>O(Vq)j = 0°, same orientation
• D(Vp; Vq) = 1, minimum distance</p>
        <p>Plugging these values to Equation (1) then results in = 0:12, when all weights WE , WO and WD are equal.
As stated before, the uni ed score allows trade-o s to be made. For instance, if a cell were to have a slight
rotation (jO(Vp) O(Vq)j = 5°) and be further apart (D(Vp; Vq) = 3), but is more elongated (E(Vp) = 0:26), it
would still be a member (score(Vp; Vq) = 0:118 &lt; 0:12).
3.2.2</p>
      </sec>
      <sec id="sec-3-4">
        <title>Pattern 2 - Transition Movement pattern</title>
        <p>The second pattern de ned and analysed is a movement behaviour during the merging of two corridor clusters,
particularly when the clusters are orthogonal to each other. Analysing other con gurations is out of the current
scope, but is discussed brie y in future work. Whenever there is an intersection between two ows of people,
there is a transitioning cell at the intersection of the two clusters. Using the same case shown in Figure 2, the
transitioning cell goes through a speci c set of states, outlined below:
1. State 1. The cell is elongated, it has a horizontal orientation, and has more than three sides
2. State 2. The cell becomes a triangle
3. State 3. The cell returns to being elongated with a vertical orientation, and having more than three sides
(a) Person 14 in VC</p>
        <p>(b) Person 14 transitioning (c) Person 14 in HC</p>
        <p>These states are shown in Figure 3. In general, we call a set of transitioning states a movement pattern and
de ne it as a set of n sequential states M = S1(Vp); : : : ; Sn(Vp). Each state Si is a set of conditions a Voronoi cell
should meet to be in said state. We formally de ne the transition movement pattern as a movement pattern
of n = 3, where each state has the following conditions (the threshold values for elongation (0.7) and orientation
( 20°) allow for exibility in the membership of the vertical and horizontal corridor clusters):
20° &lt; O(Vp) &lt; 20°, and (iii) has more than
• State 1 (S1): (i) Is elongated: E(Vp) &lt; 0:7, (ii) is horizontal:</p>
        <p>three sides: S(Vp) &gt; 3
• State 2 (S2): Is a triangle: S(Vp) = 3
• State 3 (S3): (i) Is elongated, E(Vp) &lt; 0:7, (ii) is vertical, 70° &lt; O(Vp) &lt; 110°, and (iii) has more than three
sides, S(Vp) &gt; 3
In order to ascertain the veracity of the pattern detection methods described previously, two sets of experiments
are performed using the data described in Section 3.1. For each set, manual pattern identi cation is used as
ground truth. Then we apply the Voronoi cell properties method and measure its ability to identify the patterns
and compare its performance to a baseline.
During the manual identi cation of the clusters, at time step i the members of each cluster Ci are recorded
and named M (Ci). The corridor cluster method (Section 3.2.1), retrieves a cluster CCi with members M (CCi).
These values are computed for clusters VC and HC, and are used to calculate the precision, recall and F1 score as
explained in Section 4.1. The same is done with a baseline for comparison. The baseline used is distance-based
clustering, where all points within distance are clustered together.</p>
        <p>This experiment was run with a number of di erent weight combinations using insights learned from the visual
analysis. The most relevant combinations are summarised in Table 1. Experiments 1 and 2 are the baselines
with two di erent values. Experiment 3 shows the method using equal weights, that is, using cell properties
for the 'ideal' corridor cluster. As observed in the visualisation, the most important predictor of a cluster is still
the distance between the generator points. Therefore, the distance weight WD is assigned a higher value in both
Experiments 4 and 5. Deciding for WE and WO proved more challenging as they seem equally important for the
clustering. Orientation seems to prevail at times; therefore, two cases are tested: one with a higher weight for
orientation (Experiment 4), and another with equal orientation and elongation weights (Experiment 5).
The number of points behaving in the way de ned in Section 3.2.2 is rst manually recorded for each time step,
and used as ground truth. The set of manually collected points is named T P (transitioning points). Then, the
described method to identify the movement pattern is applied , and a set of points AP (attempted points) is
retrieved. These values are calculated for obtaining the precision, recall and F1 scores, as described in Section
4.2. The same data is collected for the baselines, de ned as follows: For every moving point, check if the
point performed a vertical movement followed by a horizontal movement. For generator p at time step i, these
movements are de ned as:
verticalpmove = ypi 1
ypi &gt;
(xpi 1</p>
        <p>xpi )
horizontalpmove = xpi 1
xpi &gt;
(ypi 1
ypi )
(2)
(3)
where is a user-de ned constant that represents how "straight" the movement is. The higher is, the more
"straight" the movement. Four experiments are realised. Experiments 1-3 are baselines and involve setting
di erent values for , namely 2, 4 and 10. Experiment 4 uses the suggested method and is contrasted to the
other three in the results analysis.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Results analysis</title>
      <p>Precision and recall values are frequently used for measuring the performance of pattern recognition methods
and are, here, also compared to the values of the baseline methods. Additionally, we compute the F-measure, or
F1, as a way to represent the overall accuracy of precision and recall together.
Precision, recall and F1 values for the Voronoi cell properties method, as well as the baseline, are calculated
using Equations 4, 5 and 6 and summarized in Table 2 for di erent weights and constant values. Experiments 1
and 2 are done using the baselines and, thus, a xed distance metric . Experiments 3, 4 and 5 use the Voronoi
cell properties method with di erent values for the weights WE , WO, and WD.</p>
      <p>precision =
recall =</p>
      <p>Pn
i=1 jM (Ci) \ M (CCi)j</p>
      <p>Pn</p>
      <p>i=1 jM (CCi)j
Pn
i=1 jM (Ci) \ M (CCi)j</p>
      <p>Pn</p>
      <p>i=1 jM (Ci)j</p>
      <p>The baseline methods have surprisingly acceptable precision and recall. The recall is high because, as they do
not have additional conditions, the distance metric picks up everything nearby. Thus, members of both clusters
are frequently considered as a single larger cluster, which is precisely what we sought to di erentiate with the
suggested method.</p>
      <p>Experiment 3 ranks the highest in precision but has very low recall scores, much lower than the baselines.
This con rms that the ideal de nition of the corridor cluster is not achieved in practice and, therefore, variations
in the weights are needed as proved by the next two experiments. Experiment 4 shows much better results for
recall. Weights used in Experiment 5 prove to be superior to the baselines and the rest of the runs, with the
highest F1 scores for all VC and HC experiments. These two experiments demonstrate three points:
1. Distance remains the best predictor for cluster membership as shown by higher values of WD
2. Combination of distance, cell elongation and cell orientation improves the performance, as shown by the
consistent higher scores than the baselines.
3. Voronoi cell properties can in fact be used to e ectively identify the corridor cluster pattern.
Precision, recall and F1 scores are used to measure the performance of this method as well. They are calculated
using Equations 7, 8 and 9. Table 3 shows the results from the transition movement pattern experiment.
Experiments 1, 2, and 3 are the baselines with di erent values for (Section 3.3.2). Experiment 4 implements
the suggested movement pattern detection method, as described in Section 3.2.2.</p>
      <p>precision = jT P \ AP j
jAP j
(4)
(5)
(6)
(7)
recall = jT P \ AP j</p>
      <p>jT P j</p>
      <p>In the baselines, as the value for increases, the number of retrieved patterns decreases (recall). Accordingly,
Experiment 1 has a perfect recall but a very low precision. When increasing , the precision improves, but
the recall drastically drops. In contrast, the suggested method (Experiment 4) proves superior and acceptable
overall, in both precision and recall, even if recall is lower than the highest observed. The method's better
performance is also summarized with the highest F1 score.
This research shows how elements of the VD structure can be used to determine and analyse two types of
ne-grained spatio-temporal patterns: clusters and movements. The suggested methods allow for the exible
de nition of these patterns by the combination of Voronoi cell properties | namely elongation, orientation, and
distance to neighbours. These properties were selected as the most relevant for the testing dataset scenarios:
elongation and orientation were paramount to the identi cation of corridor clusters, for example. The exibility
of the method, however, allows the use of di erent Voronoi cell properties that may be more appropriate for
di erent datasets and environments. With consistently high scores in precision and improving recall scores,
the suggested method proved better than baseline methods that are only considering distance factors for the
formation of clusters.</p>
      <p>
        The suggested method has advantages over previous approaches. Until now, there has not been a standard
movement pattern de nition and they are, thus, mostly analysed using general measures such as distance traveled
        <xref ref-type="bibr" rid="ref10">(Lu et al., 2012)</xref>
        or cluster methods
        <xref ref-type="bibr" rid="ref16">(Yabe et al., 2016)</xref>
        . In contrast, the suggested method allows for very
negrained de nition of movement patterns by providing a sequence of states the Voronoi cells exhibit while 'moving'
to form di erent patterns. The experiments show better overall scores than baseline methods. A shortcoming
is the rather small number of instances of this dataset | people that move during an evacuation scenario
and which are considered as the generator points for the dynamic VDs. This number is especially low for the
transition movement pattern (8 instances). Even so, the promising experimental results suggest that with a
larger evaluation dataset, the suggested method's advantages can be further veri ed.
      </p>
      <p>
        This preliminary work shows some of the bene ts of using the VD structure properties for the detection
and analysis of various patterns, which can aid in emergency response and evacuation operations. The method's
exibility allows for the use of di erent or additional cell properties. For instance, eccentricity is another clustering
indicator that has been used in digital image processing applications and could be considered in future research.
In addition, patterns that use non-standard properties of a polygon such as elongation and orientation can bene t
from di erent computing methods. For example,
        <xref ref-type="bibr" rid="ref13">Tuceryan and Jain (1990)</xref>
        use mathematic moments in order to
de ne elongation, orientation, area, and eccentricity, and such methods can be utilized in providing ner, more
precise cell monitoring parameters for pattern detection.
      </p>
      <p>In the analysis of movement patterns, the conditions of each cell transition state can also be more exibly
de ned to allow for the detection of more and varied patterns. For example, state S1 in the transition movement
pattern could be something close to, rather than an exact triangle (i.e., S(Vp) = 3), such as having 4 sides
with one of them being much smaller than the rest. This generalisation is especially important when aiming
at identifying other corridor con gurations. Finally, when dealing with large amounts of data, it is important
to also consider time complexity for comparing with other methods. Building a VD has a time complexity of
O(n log n) in the worst case scenario, and O(n) in the average case. Therefore, any additional analysis would
have to consider this as a base cost.
The authors wish to thank Dr Egemen Tanin for his valuable comments during initial discussions on this work.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Adam</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Gaudou</surname>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Modelling human behaviours in disasters from interviews: application to melbourne bush res</article-title>
          .
          <source>In Social Simulation Conference (SSC)</source>
          , Rome, Italy.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Cho</surname>
            , E.,
            <given-names>S. A.</given-names>
          </string-name>
          <string-name>
            <surname>Myers</surname>
          </string-name>
          , and J.
          <string-name>
            <surname>Leskovec</surname>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Friendship and mobility: user movement in location-based social networks</article-title>
          .
          <source>In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          , pp.
          <volume>1082</volume>
          {
          <fpage>1090</fpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Choset</surname>
            ,
            <given-names>H. M.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Burdick</surname>
          </string-name>
          (
          <year>1996</year>
          ).
          <article-title>Sensor based motion planning: The hierarchical generalized Voronoi graph</article-title>
          .
          <source>Ph. D. thesis</source>
          , California Institute of Technology Pasadena (California).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Dodge</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Weibel</surname>
          </string-name>
          , and A.
          <string-name>
            <surname>-K. Lautenschu</surname>
          </string-name>
          <article-title>tz (</article-title>
          <year>2008</year>
          ).
          <article-title>Towards a taxonomy of movement patterns</article-title>
          .
          <source>Information visualization 7</source>
          (
          <issue>3-4</issue>
          ),
          <volume>240</volume>
          {
          <fpage>252</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Gold</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Remmele</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Roos</surname>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>Voronoi methods in gis</article-title>
          .
          <source>In Algorithmic Foundations of Geographic Information Systems</source>
          , pp.
          <volume>21</volume>
          {
          <fpage>35</fpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Grinstein</surname>
            , G.,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Plaisant</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Laskowski</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <article-title>O'connell</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Scholtz</surname>
          </string-name>
          , and M.
          <string-name>
            <surname>Whiting</surname>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Vast 2008 challenge: Introducing mini-challenges</article-title>
          .
          <source>In Visual Analytics Science and Technology</source>
          ,
          <year>2008</year>
          . VAST'08. IEEE Symposium on, pp.
          <volume>195</volume>
          {
          <fpage>196</fpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Guibas</surname>
            ,
            <given-names>L. J.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Mitchell</surname>
          </string-name>
          , and T.
          <string-name>
            <surname>Roos</surname>
          </string-name>
          (
          <year>1991</year>
          ).
          <article-title>Voronoi diagrams of moving points in the plane</article-title>
          .
          <source>In International Workshop on Graph-Theoretic Concepts in Computer Science</source>
          , pp.
          <volume>113</volume>
          {
          <fpage>125</fpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Ho</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <surname>K. E.</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Keyser</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Manocha</surname>
            , and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Culver</surname>
          </string-name>
          (
          <year>1999</year>
          ).
          <article-title>Fast computation of generalized voronoi diagrams using graphics hardware</article-title>
          .
          <source>In Proceedings of the 26th annual conference on Computer graphics and interactive techniques</source>
          , pp.
          <volume>277</volume>
          {
          <fpage>286</fpage>
          . ACM Press/Addison-Wesley Publishing Co.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Kinateder</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Kuligowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Reneke</surname>
          </string-name>
          , and R. D.
          <string-name>
            <surname>Peacock</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>A review of risk perception in building re evacuation</article-title>
          .
          <source>National Institute of Standards and Technology.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Bengtsson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Holme</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Predictability of population displacement after the 2010 haiti earthquake</article-title>
          .
          <source>Proceedings of the National Academy of Sciences</source>
          <volume>109</volume>
          (
          <issue>29</issue>
          ),
          <volume>11576</volume>
          {
          <fpage>11581</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dauber</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K. H.</given-names>
            <surname>Law</surname>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Human and social behavior in computational modeling and analysis of egress</article-title>
          .
          <source>Automation in construction 15 (4)</source>
          ,
          <volume>448</volume>
          {
          <fpage>461</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Sud</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Andersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Curtis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Lin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Manocha</surname>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Real-time path planning in dynamic virtual environments using multiagent navigation graphs</article-title>
          .
          <source>IEEE transactions on visualization and computer graphics 14 (3)</source>
          ,
          <volume>526</volume>
          {
          <fpage>538</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Tuceryan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Jain</surname>
          </string-name>
          (
          <year>1990</year>
          ).
          <article-title>Texture segmentation using voronoi polygons</article-title>
          .
          <source>IEEE transactions on pattern analysis and machine intelligence</source>
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <volume>211</volume>
          {
          <fpage>216</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Vleugels</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Overmars</surname>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>Approximating voronoi diagrams of convex sites in any dimension</article-title>
          .
          <source>International Journal of Computational Geometry &amp; Applications</source>
          <volume>8</volume>
          (
          <issue>02</issue>
          ),
          <volume>201</volume>
          {
          <fpage>221</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Wei-Guo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yan-Fei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Bing-Hong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Wei-Cheng</surname>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Evacuation behaviors at exit in ca model with force essentials: A comparison with social force model</article-title>
          .
          <source>Physica A: Statistical Mechanics and its Applications</source>
          <volume>371</volume>
          (
          <issue>2</issue>
          ),
          <volume>658</volume>
          {
          <fpage>666</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Yabe</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Tsubouchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sudo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sekimoto</surname>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>A framework for evacuation hotspot detection after large scale disasters using location data from smartphones: case study of kumamoto earthquake</article-title>
          .
          <source>In Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems</source>
          , pp.
          <fpage>44</fpage>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Xie</surname>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Learning transportation mode from raw gps data for geographic applications on the web</article-title>
          .
          <source>In Proceedings of the 17th international conference on World Wide Web</source>
          , pp.
          <volume>247</volume>
          {
          <fpage>256</fpage>
          . ACM.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>