<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mobile Location-Based Social Distancing Recommender System with Context Evaluation: a Project Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olga Artemenko</string-name>
          <email>olga.hapon@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Kunanets</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Pasichnyk</string-name>
          <email>vpasichnyk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Kut</string-name>
          <email>kut.vasilij81@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr</string-name>
          <email>Oleksandr.A.Lozytskyy@lpnu.ua</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Franko National University of Lviv</institution>
          ,
          <addr-line>Universutetska Street 1, Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Stepana Bandery Street 32-a, Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>PHEI "Bukovinian University"</institution>
          ,
          <addr-line>Darvina Street 2-a, Chernivtsi, 58000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Uzhhorod National University</institution>
          ,
          <addr-line>Universytetska Street 14, Uzhhorod, 88000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper describes main modern tendencies for projects in the design and development of urban route planning recommender systems. In this research the difficulties and unsolved problems were analyzed for development and use of location-based mobile recommender systems for social distancing. This paper focuses on project of development of mobile location-based recommender system with context evaluation. The main features of decisionmaking on passing and changing the route are analyzed. Technologies for determining the danger of crowding and managing human flows have been studied. The study considers the possibility of creating software to manage the flow of people within the city to ensure social distancing. A prototype of a mobile application has been created, which will be used to teach the multi-agent system the peculiarities of the space-time behavior of pedestrians during quarantine. prevention management Mobile location-based recommender systems, urban route planning, social distancing, crowd Proceedings of the 2nd International Workshop IT Project Management (ITPM 2021), February 16-18, 2021, Slavsko, Lviv region, Ukraine</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The key element for social distancing is the management of human crowd [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Everyone has a
smart gadget of one type or another and information technology for managing big data,
including personal data of smartphone users, opens up new opportunities to prevent crowds.
      </p>
      <p>Route planning in the context of urban infrastructure and with the provision of social distancing is
a guarantee of safe, efficient and "smart" navigation of people within large settlements. Classically,
the task of paving a route is usually solved for cases of tourist travel, long-distance travel with a large
number of points to visit, or travel to unfamiliar places.</p>
      <p>
        Crowd management, organization of human flows during mass events, during rush hours at traffic
interchanges, in crowded places was still considered a task relevant to megacities, festive and festival
events, places of religious pilgrimage, etc [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>This was not a problem for non-urban areas, the daily life of provincial cities, and even
lowdensity countries. The 2020 pandemic has changed the situation radically.</p>
    </sec>
    <sec id="sec-2">
      <title>2. The human crowd prevention management</title>
      <p>2021 Copyright for this paper by its authors.</p>
      <p>
        The current level of development of mobile devices allows them to implement different types of
sensors (eg, GPS, accelerometer, camera, digital compass, magnetometer, barometer, gyroscope) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
Thus, "smart" devices (such as smartphones, Google glasses, Apple Watch and Mi Band) can be used
to collect a variety of spatial information about the user, as well as from the environment. Mobile
devices can now be used to determine noise levels, speeds, temperatures, and more. Meanwhile, these
devices can upload sensor-sensitive data to the data collector's server over wireless access networks,
such as cellular or Wi-Fi, at a convenient time and location.
      </p>
      <p>
        Thus, it becomes technologically possible to develop mobile crowd sensing (MCS) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. MCS is a
paradigm that encompasses a large number of people with sensor and computing devices, in which
people can collect probing data and receive certain information. Depending on the level of user
involvement, MCS can be classified into two categories: opportunistic sounding and participatory
sounding. The first is a passive process where probing data is collected automatically without the
user's knowledge of the gadget. The latter is an active process when users need to directly initiate
probing actions, such as the choice of sensory tasks and the solution of inquiring efforts [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Due to the advantages of sensing functions in smartphones and user mobility, MCS provides
unique functions for processing big data arrays [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]:
• Scalability: High scalability is one of the key features of MCS. In a fixed network of
sensors, increasing the sensing area will lead to the deployment of sensors in an extended
area, which is time consuming and expensive. With MCS technology, it is easy to achieve
the collection of probing information over a large area, motivating more mobile users in
the extended area to participate in probing tasks. Thus, MCS is an effective paradigm with
high scalability and is very suitable for collecting sounding data over a large area, such as
the territory of settlements. Meanwhile, high scalability also makes MCS more reliable
compared to a traditional touch network for creating software to manage the flow of
people within the city to ensure social distancing.
• Flexibility: Another unique feature of MCS is its great flexibility. In a fixed sensor
network, changing the sensing area will require changing the settings and relocating the
sensors. However, in the MCS system, the system must recruit some mobile users in the
target area for probing, which is easy to achieve due to the large number of mobile users
among citizens and the fact, that smartphone is always with the user. Therefore, MCS is a
flexible paradigm for collecting sounding data.
• Self-Determination of User Behavior: Self-determination of gadget user behavior is a
major feature of participatory probing, which is a major category of MCS. When probing
participation, mobile users can make their own decisions instead of being guided by a
central controller. Mobile device users are heterogeneous. They may be in different places
with different interests and opportunities. Their mobile devices can have different
functions, memory capacity, power, etc [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Thus, each mobile user can decide whether to
participate in MCS or not, and take on different tasks based on their own situations.
Meanwhile, the usefulness of each mobile user may be influenced by the decisions of
other mobile users, which make each mobile user's self-determination more difficult.
• Different data quality: due to the heterogeneity of mobile users, different functionality of
their smart devices, different data quality is obtained - another feature of MCS. In fixed
sensor networks, sensors are usually pre-deployed based on a single model or format.
Therefore, the number of sensors and the type of data they can produce are known a priori.
This makes it easier to control the quality of the data. However, with MCS, data quality
may change over time due to mobile user mobility, mobile user preferences, and different
probing contexts. To maintain the confidentiality of participants, some programs remove
identification information from the sensor data. In this way, anonymous users can send
low-quality or even fake data to the platform. In addition, data provided by different
participants may be redundant, duplicate or inconsistent. Therefore, how to collect high
quality data is a critical issue in MCS due to the variety of data quality.
• Weak power limitation: In fixed sensor networks, power limitation is a major problem due
to the inconvenience of replacing the power supply of the sensor. Many studies have
focused on how to extend the life of a network. However, with MCS, the sensors are built
into users' mobile devices. Users can be aware of the remaining charge at any time and
conveniently charge their devices when the battery is below a certain level. Therefore,
power limitation is not a major issue for MCS [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. A project of Mobile Crowd Sensing software for</title>
      <p>planning with risk evaluation recommender system
Multi-criteria route</p>
      <p>
        In order to reduce the severity of the problem and establish procedures for effective
communication with the masses, to avoid manipulation of the public consciousness, there is a need to
implement a project that involves the creation of Mobile Crowd Sensing software [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] for
Multicriteria route planning with risk evaluation recommender system [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>Implementation of an IT project to create mobile location-based social distancing recommender
system with context evaluation involves the passage of several classical stages.</p>
      <p>Stage 1 Stage before project preparation. At this stage it is substantiated that in the implementation
of external public mass communications, caused by the desire to implement such communications,
there is a desire to expand the scope of operation and development of information exchange, and later
the objects of material production. In the implementation of social communications, it is important not
only what is used, but who participates in the interaction, how information and connections are used,
to whom the information is addressed and where the communication links are directed. The
effectiveness of information exchange and the whole process of communication with the masses
largely depends on the recognizability of the subjects of communication of the subject of discussion
(information exchange) and the communicative competence of those who try to control the
consciousness of the masses.</p>
      <p>The effectiveness of information exchange, which causes certain actions, depends on the level of
communicative competence. Moreover, the key mechanism of influencing the masses of people is
manifested at all levels of socio-cultural organization of society, which generates the social
significance of the project. This approach contributed to the formulation of the goals and objectives of
the project, the development of the project concept.</p>
      <p>Stage 2. Communicative. This stage is to analyze the main components of the problem based on a
wide range of sources and search for possible solutions; study of the project environment, selection of
the optimal variant of the project task; tools for the project task.</p>
      <p>Stage 3. Technological Execution of tasks by each project participant in accordance with the
developed plan and division of responsibilities. Scheduling the project to determine the start and end
dates of all project operations.</p>
      <p>Stage 4. Final Presentation of the results of the project, presentation of the main functional
characteristics of the information system.</p>
      <p>
        One of the requirements of social distancing is to keep the distance between people in society and
to avoid crowds of large numbers of people. That is, ideally, it is necessary to organize the movement
of people so that their routes intersect as little as possible both in time and space [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It is desirable
that people not only were not in one place at the same time (space), but also did not visit the same
place in large number (time). To ensure these conditions when laying the route for the user of the
recommended application, you must do the following [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]:
•
•
      </p>
      <p>Obtain data on the stay and movement trajectories of other city residents</p>
      <p>
        Analyze the density of people on different routes, streets
• Identify places of potential crowd formation
• Identify potential people who may encounter on the route and identify the risks of such a
collision [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
      </p>
      <p>
        Laying the trajectory in such a way as to obtain the least number of intersections with other
people[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Analysis of the applications of tourist routes shows that the task of route optimization is usually to
make it the shortest and cover the most popular destinations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Unlike maritime navigation
research [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], where safety criteria are preferred and traffic congestion is avoided. That is why the
combination of models to take into account the risk of too close intersection with other road users
with the functionality of spatially oriented tourist recommendation systems [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] will allow to change
the algorithm of routing for the user so that the priority is not saving time and finding the most
popular route [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>The risk of forming a crowd of people according to the trajectories of the closest participants can
be described as follows:
СRi = Hi, place</p>
      <p> Qi, places   wi,weathercond
Hi,context  
Qi,context 
(1)
where CRi is the crowd creation risk for area i, the subscript i is the area identification number,
H i, place is the hazard index of the area popularity history (depends on how many people visit area in
short time) , H i,context is the hazard index of context factors influence,
Qi, places is a coefficient of
quarantine restrictions influence, Qi,context is a coefficient of quarantine necessity (got from level of
morbidity in the region) and wi,weathercond describes the influence of the weather conditions.</p>
      <p>
        To adequately assess the risk of crowding in a group of people walking through the city streets [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ],
when choosing a safe route, the following types of risk should be identified:
      </p>
      <p>
        The level of safety on different sections of the route and, in particular, pay attention to the peak
risk indicator for the route [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>Optimize the total length of the route. The walking route cannot be too long. However, the
shortest route can be more risky to cross with other people and form crowds [19]. In addition,
during quarantine restrictions, people can use hiking for shopping or business as a kind of fitness
exercise or a walk in the fresh air.</p>
      <p>Convenience of route adjustment while moving. A route in which it is difficult or impossible to
make changes quickly (choose a detour, turn in another direction) is assessed as more risky. To
obtain a rating in this case, the total number of route points at which it is possible to transform it
is important. Such points are, for example, intersections and open areas, where a person can
freely change direction and avoid contact with other people [20].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Using smartphone big data and functionality in the project</title>
      <p>For developing efficient tool for social distancing urban route planning various types of contextual
information becomes important [21] and plays an increasing role in the calculation of complete,
qualitative and correct recommendations from the user point of view .</p>
      <sec id="sec-4-1">
        <title>Server part (data management)</title>
      </sec>
      <sec id="sec-4-2">
        <title>Recommender system (knowledge management)</title>
      </sec>
      <sec id="sec-4-3">
        <title>Client part (user interface)</title>
        <sec id="sec-4-3-1">
          <title>Context</title>
          <p>r e i
P s( rc
seitiroi noitcel )airet
n
ks itao
iR lua
v
e</p>
          <p>Sensor
module
data of
other
people in
the area
• The ability of the user to overcome the route: is assessed as the average risk gradient, which
takes into account the impact on the assessment of the route of weather conditions, the physical
condition of the pedestrian, time of day, etc.</p>
        </sec>
        <sec id="sec-4-3-2">
          <title>User</title>
        </sec>
        <sec id="sec-4-3-3">
          <title>The User submits places to create and navigate the route</title>
          <p>the one hand, heterogeneous mobile users compete with each other; on the other hand,
they can work together to reduce costs or perform some complex tasks. How to model and
analyze the competition and cooperation of mobile users is one of the main challenges for
achieving group or individual optimization of mobile users.</p>
          <p>In addition, data redundancy and data diversity should be taken into account when optimizing the
spatial, temporal and spatio- temporal behavior of mobile users. For example, users of nearby mobile
devices may send similar data to the noise level collection, resulting in data redundancy. In addition,
devices in the same location may have different sensing capabilities due to a different brand of mobile
communication or a different configuration [23]. Even such devices can receive different probing data
when they are in different conditions (for example, a device in a pocket or out of pocket). Therefore,
from a system point of view, how to optimize the behavior of mobile users is also an important
question (Fig. 3).</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Construction of the training sample</title>
      <p>The decision-making process for laying and promptly changing the route should be provided by a
multi-agent system. To successfully configure it, you must first collect as large an array of data as
possible that describes the temporal, spatial, and spatiotemporal behavior of different categories of
pedestrians. In addition, the actual territory matters. Characteristics of streets, relief, features of city
infrastructure. Therefore, the streets of the city for which the software is created must be used to
collect data. In our case, it is the city of Chernivtsi (Ukraine). Given the research challenges described
in Section 4, the simplest way to collect big data describing pedestrian behavior was chosen: a mobile
application was created, the users of which joined the research group using digital authorization. They
know that data from their mobile sensors will be collected in the cloud storage of the group
administrator.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The study provides an analysis of the ways and resources for creating context-oriented mobile
location-based recommender systems for social distancing route planning in urban area. The approach
to building location-based recommender systems is proposed. It allows considering the context data in
calculation of the risks for crowd appearance process. That provides better quality of
recommendations and gives the opportunity to create recommendations for safe trip in the city in
realtime. The prototype of the system is designed to provide a quality interactive trip support for the user
during his moving. Preventing unexpected and unplanned crowds is currently a pressing issue for the
health of urban residents. The use of data on the movement of city residents, taken from their
smartphones and gadgets, as well as data from cellular stations will be useful to optimize the walking
route with the provision of social distance. The previously listed data sets belong to the category of
big data. Therefore, it is information technology for big data analysis and smartphone functionality
should be the basis for the development of information support projects for social distancing. The
main features of decision-making on passing and changing the route are analyzed. Technologies for
determining the danger of crowding and managing human flows have been studied. The study
considers the possibility of creating software to manage the flow of people within the city to ensure
social distancing. A prototype of a mobile application has been created, which will be used to teach
the multi-agent system the peculiarities of the space-time behavior of pedestrians during quarantine.
7. References
[19] C. Xiong, X. Chen, X. He, X. Lin, L. Zhang, Agent-based en-route diversion: dynamic
behavioral responses and network performance represented by macroscopic fundamental
diagrams. Transp. Res. Part C: Emerg. Technol 64, (2016), 148–163.
[20] A. Delic, J. Neidhardt, T. N Nguyen, F. Ricci, An observational user study for group
recommender systems in the tourism domain. Information Technology &amp; Tourism 19(1-4),
(2018) 87–116. doi:10.1007/s40558-018-0106-y.
[21] J. Kim, S. Rasouli, H. J.P. Timmermans, Investigating heterogeneity in social influence by social
distance in car-sharing decisions under uncertainty: A regret minimizing hybrid choice model
framework based on sequential stated adaptation experiments, Transportation Research Part C 85
(2017) 47–63. doi: http://dx.doi.org/10.1016/j.trc.2017.09.001.
[22] A. Copie, T. Fortis, V. I. Munteanu, V. Negru, From cloud governance to iot governance. in:</p>
      <p>Advanced Information Networking and Applications Workshops, 2013, pp. 1229–1234.
[23] F. Ricciato, G. Lanzieri, A. Wirthmann, G. Seynaeve, Towards a methodological framework for
estimating present population density from mobile network operator data. Pervasive and Mobile
Computing 68 (2020) 101263, doi: https://doi.org/10.1016/j.pmcj.2020.101263.
[24] Z. Xiang, D. R. Fesenmaier, Big Data Analytics, Tourism Design and Smart Tourism. Tourism
on the Verge (2016) 299–307. doi:10.1007/978-3-319-44263-1_17.
[25] C. Trattner, A. Oberegger, L. Marinho, D. Parra, Investigating the utility of the weather context
for point of interest recommendations. Information Technology &amp; Tourism 19(1-4) (2018) 117–
150. doi:10.1007/s40558-017-0100-9.
[26] M. Sigala, R. Rahimi, M. Thelwall, Big Data and Innovation in Tourism, Travel, and Hospitality.</p>
      <p>URL: https://www.springer.com/gp/book/9789811363382.
[27] V. Pasichnyk, V.Lytvyn, N.Kunanets, R. Vovnyanka, Y. Bolyubash, A. Rzheuskyi, Ontological
approach in the formation of effective pipeline operation procedures, in: 13th International
Scientific and Technical Conference on Computer Sciences and Information Technologies,
CSIT, 2018, pp. 80–83.
[28] Rzheuskyi, H. Matsuik, N. Veretennikova, R. Vaskiv, Selective Dissemination of Information –
Technology of Information Support of Scientific Research. Advances in Intelligent Systems and
Computing 871 (2019) 235–245.
[29] O. Matsyuk, M. Nazaruk, Y. Turbal, N. Veretennikova, R. Nebesnyi, Information analysis of
procedures for choosing a future specialty. Advances in Intelligent Systems and Computing
(AISC) 871 (2019) 364–375.
[30] N. Veretennikova, R. Vaskiv, Application of the Lean startup methodology in project
management at launching new innovative products, in: Proceedings of the 13th International
Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT
2018, 2018, pp. 169–173.
[31] V. Tomashevskyi, A. Yatsyshyn, V. Pasichnyk, N. Kunanets, A. Rzheuskyi, Data Warhouses of
Hybrid Type: Features of Construction. Advances in Intelligent Systems and Computing book
series 938 (2019) 325–334.
[32] R. Kaminskyi, N. Kunanets, V. Pasichnyk, A. Rzheuskyi, A. Khudyi, Recovery gaps in
experimental data. CEUR Workshop Proceedings 2136 (2018) 108–118.
[33] R. Kaminskyi, N. Kunanets, A. Rzheuskyi, A. Khudyi, Methods of statistical research for
information managers, in: Proceedings of the 13th International Scientific and Technical
Conference on Computer Sciences and Information Technologies, CSIT 2018, 2018, pp. 127–
131.
[34] M. Odrekhivskyy, V. Pasichnyk, A. Rzheuskyi, V. Andrunyk, M. Nazaruk, O. Kunanets, D.</p>
      <p>Tabachyshyn, Problems of the intelligent virtual learning environment development. CEUR
Workshop Proceedings 2386 (2019) 359–369.
[35] E. Vasilevskis, I. Dubyak, T. Basyuk, V. Pasichnyk, A. Rzheuskyi, Mobile application for
preliminary diagnosis of diseases. CEUR Workshop Proceedings 2255 (2018) 275–286.
[36] V. Piterska, A. Shakhov, Development of the methodological proposals for the use of innovative
risk-based mechanism in transport system. International Journal of Engineering and
Technology(UAE) 7(4.3 Special Issue 3) (2018) 257–261.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>El Saddik</surname>
          </string-name>
          et al.,
          <source>Connected Health in Smart Cities</source>
          , Springer Nature Switzerland AG,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Leung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Leung</surname>
          </string-name>
          ,
          <article-title>Nowcasting and forecasting the potential domestic and international spread of the 2019-nCoV outbreak originating in Wuhan, China: a modelling study”</article-title>
          .
          <source>Lancet</source>
          <volume>395</volume>
          (
          <issue>10225</issue>
          ) (
          <year>2020</year>
          ).
          <fpage>689</fpage>
          -
          <lpage>697</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Hu</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cai</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monterola</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <article-title>Guide them through: An automatic crowd control framework using multi-objective genetic programming</article-title>
          .
          <source>Applied Soft Computing</source>
          <volume>66</volume>
          (
          <year>2018</year>
          )
          <fpage>90</fpage>
          -
          <lpage>103</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.asoc.
          <year>2018</year>
          .
          <volume>01</volume>
          .037
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hou</surname>
          </string-name>
          et al.,
          <article-title>Mobile Crowd Sensing: Incentive Mechanism Design, SpringerBriefs in Electrical</article-title>
          and Computer Engineering, URL: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -01024-
          <issue>9</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bozzon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fraternali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Galli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Karam</surname>
          </string-name>
          ,
          <article-title>Modeling crowdsourcing scenarios in socially enabled human computation applications</article-title>
          .
          <source>Journal on Data Semantics</source>
          (
          <year>2013</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Xue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <article-title>Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing”</article-title>
          .
          <source>In: Proceedings of the 18th annual international conference on Mobile computing and networking</source>
          ,
          <year>2012</year>
          , pp
          <fpage>173</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Gonzalez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Hidalgo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.-L.</given-names>
            <surname>Barabasi</surname>
          </string-name>
          ,
          <article-title>Understanding individual human mobility patterns</article-title>
          .
          <source>Nature</source>
          <volume>453</volume>
          (
          <issue>7196</issue>
          ), (
          <year>2008</year>
          )
          <fpage>779</fpage>
          -
          <lpage>782</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R. T.</given-names>
            <surname>Panik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.A.</given-names>
            <surname>Morris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.T.</given-names>
            <surname>Voulgaris</surname>
          </string-name>
          ,
          <article-title>Does walking and bicycling more mean exercising less? Evidence from the U.S. and the Netherlands</article-title>
          .
          <source>J. Trans. Health 15 100590</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Logesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Subramaniyaswamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vijayakumar</surname>
          </string-name>
          , et al.,
          <article-title>Efficient User Profiling Based Intelligent Travel Recommender System for Individual and</article-title>
          Group of Users.
          <source>Mobile Networks and Applications</source>
          , (
          <year>2018</year>
          ). doi: https://doi.org/10.1007/s11036-018-1059-2.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>B.</given-names>
            <surname>Oosterhoff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Palmer</surname>
          </string-name>
          , J. Wilson,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shook</surname>
          </string-name>
          ,
          <article-title>Adolescents Motivations to Engage in Social Distancing during the COVID-19 Pandemic: Associations with Mental and Social Health</article-title>
          ,
          <source>Journal of Adolescent Health</source>
          (
          <year>2020</year>
          ), doi: https://doi.org/10.1016/j.jadohealth.
          <year>2020</year>
          .
          <volume>05</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Stienmetz</surname>
          </string-name>
          ,
          <article-title>Big data and tourism planning</article-title>
          .
          <source>Information Technology &amp; Tourism</source>
          ,
          <volume>20</volume>
          (
          <issue>1-4</issue>
          ) (
          <year>2018</year>
          )
          <fpage>189</fpage>
          -
          <lpage>190</lpage>
          . doi:
          <volume>10</volume>
          .1007/s40558-018-0127-6.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Big Data Support of Urban Planning and Management</article-title>
          .
          <source>Advances in Geographic Information Science</source>
          , Springer International Publishing AG,
          <year>2018</year>
          , p.
          <volume>456</volume>
          ,
          <issue>doi</issue>
          : 10.1007/978-3-
          <fpage>319</fpage>
          -51929-
          <issue>6</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Artemenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kunanets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pasichnyk</surname>
          </string-name>
          ,
          <article-title>E-tourism recommender systems: a survey and development perspectives</article-title>
          ,
          <source>Econtechmod an international quarterly journal 6(2)</source>
          (
          <year>2017</year>
          )
          <fpage>91</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Min-Gi</surname>
            <given-names>Jeong</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eun-Bang</surname>
            <given-names>Lee</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Moonjin</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Jung-Yeul Jung, Multi-criteria route planning with risk contour map for smart navigation</article-title>
          ,
          <source>Ocean Engineering</source>
          <volume>172</volume>
          (
          <year>2019</year>
          )
          <fpage>72</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>Ricci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rokach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shapira</surname>
          </string-name>
          ,
          <source>Recommender Systems Handbook: Second Edition</source>
          , Springer Science+Business Media New York,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
            <surname>Artemenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pasichnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Korz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Fedorka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kis</surname>
          </string-name>
          ,
          <article-title>Using Big Data in E-tourism Mobile Recommender Systems: A project approach</article-title>
          ,
          <source>in: Proceedings of the 1st International Workshop IT Project Management (ITPM</source>
          <year>2020</year>
          ),
          <year>2020</year>
          , pp.
          <fpage>194</fpage>
          -
          <lpage>204</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T. J.</given-names>
            <surname>Ryley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Zanni</surname>
          </string-name>
          ,
          <article-title>An examination of the relationship between social interactions and travel uncertainty</article-title>
          .
          <source>J. Transp. Geogr</source>
          .
          <volume>31</volume>
          (
          <year>2013</year>
          )
          <fpage>249</fpage>
          -
          <lpage>257</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kantarci</surname>
          </string-name>
          , H. T. Mouftah,
          <article-title>Reputation-based sensing-as-a-service for crowd management over the cloud</article-title>
          ,
          <source>in: International Conference on Communications (ICC)</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>3614</fpage>
          -
          <lpage>3619</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>