<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Real-Time Safe Route Finding and Visualization Using Shared Edge Devices</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Takenori Hara</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hideo Saito</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Keio University</institution>
          ,
          <addr-line>3-14-1 Hiyoshi, Kohoku-ku, Yokohama, Kanagawa, 223-8522</addr-line>
          ,
          <country country="JP">Japan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Conventional safe route-finding systems display routes on a map to avoid dangerous areas based on offline data such as statistical data on crime rates. However, such dangerous level changes in a dynamic manner, which can be detected by people walking around. This paper presents a system that shares the detected data measured by edge devices owned by walking people for dynamic safe route finding in real-time. This system evaluates the safety of routes in real time using and displays the route in AR on HMDs and smartphones. This paper reports findings from a simulation and edge device (smartphone) implementation of spatial safety assessment, safe route finding, and route visualization.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>1.1. Research Background</title>
      <p>
        Violent crimes such as assault and injury
(Assault is defined in Japan as a crime in which
the victim was not injured, while an injury is a
crime in which the victim was injured) are crimes
that occur close to people, have a significant
impact on the victim's mind and body, threaten
their peaceful daily life, and may increase social
unrest. According to a study on violent crime
conducted by the Ministry of Justice's Legal
Research Institute in Japan[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the number of
assault cases has remained high at around 30,000
since 2006, and the number of injury cases has
also remained in the 20,000s since 2008 (Figure
1). In addition, these are the number of crimes
reported to the police; the actual number of
assaults and injuries is expected to be much higher.
The largest number of assault cases was from
people who did not know each other, while the
number of injury cases was from people who
knew each other, as typified by domestic violence.
About 30% of both assault and injury cases occur
outdoors and 30% of cases occur in a house
(Figure 2). A higher percentage of assaults occur
on public transportation or in stores than assaults,
and we often hear news stories of station staff,
shopkeepers, passersby, and passengers suddenly
being violently attacked. Although transportation
and shopping are essential to daily life, the
possibility of sudden violence and crime prevents
people from leading their daily lives with peace of
mind.
      </p>
      <p>Conventional navigation systems are designed
to arrive at a destination smoothly and quickly. To
achieve a safe and secure society, we research,
develop, and implement navigation systems that
can avoid crimes and unpleasant events by
detecting them in advance. The navigation system
uses edge devices such as surveillance cameras
and smartphones to measure the level of danger in
real-time and search for safe routes. The system
also visualizes the detected dangerous elements
and the safe routes.</p>
      <p>We are convinced that this system can
contribute to solving various social problems. For
example, the system can be used for urban
planning to prevent crimes, support services to
maintain social distance in infectious disease
environments such as COVID-19, detect people in
trouble and automatically ask for help from
people around them, support services to protect
wild animals, and services to find lost cats.</p>
      <p>In this paper, we report on the findings and
problems encountered in simulating the level of
danger assessment, safe route search, and safe
route visualization of a location using edge
devices. We also report our findings and problems
in a prototype system using a smartphone.
1.3.</p>
    </sec>
    <sec id="sec-3">
      <title>Related Works</title>
      <p>Many methods have been proposed for safe
route finding that minimizes the level of danger
and distance on the path and displays the path on
a map.</p>
      <p>
        Galbrun et al. proposed a safe route search
method based on Total-Paths (total level of danger
on a path) and Max-Paths (maximum level of
danger on a path) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Yizhou et al. conducted a
safe route search simulation experiment on an
actual congestion dataset for each Paris train
station based on another research result that
"higher congestion leads to higher crime rate" and
confirmed the effectiveness of the method [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Sukru et al. propose a mobile app for the social
distancing of people in a COVID-19 environment.
It allows each user to manually register their
health status and then share their current location
on the network in real-time, predicting the
walking paths of other users and alerting them
with sound and vibration to the possibility of
approaching users with poor health status [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Maria et al. proposed a method that uses BLE
beacons to detect and share a user's location and
provide a route to reach a destination without
passing other people indoors [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. To successfully
avoid people, robot pathfinding methods can be
helpful: Kapil et al. proposed a pathfinding
method that predicts the movement path of a
group of people [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and Lucia et al. proposed a
method to move around humans and obstacles in
a social compatible and safe manner [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>As a mechanism for sharing information
sensed by the user, the Joint Tactical Information
Distribution System (JTIDS) and the
Intervehicular Information System (IVIS), which are
used in military applications, can be used as
references. These systems share the position,
heading, altitude, and speed of detected aircraft,
ships, and vehicles with all platforms participating
in the network.</p>
      <p>
        For safe route finding, it is necessary to
evaluate the safety of a location. According to
Stacy et al., a person's gender, facial expression,
gaze, appearance, clothing, attitude, and physique
are known to help determine whether a person is
suspicious [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. For example, if a person is silent
and stares at another person, has an aggressive or
predatory facial expression or body language, or
is carrying a weapon such as a gun or a knife, he
or she is highly dangerous. Fan [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] and Fang [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
et al. proposed a method for detecting abnormal
human behavior in real-time from video images,
and it is also provided as a service, such as the
Incident Detection Solution [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Salamon et al.
proposed a method for sound classification [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
we think this method evaluates the safety of a
location by analyzing sounds such as
conversations or detecting gunshots or explosions.
Kim et al. proposed a method to estimate the level
of danger of a location based on the content of
geotagged messages on social media [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
RedZone Map [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], a service that guides users to
safe routes for cars based on government-released
crime map data; My Safety pin[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], a navigation
application that uses the results of interviews with
users about the safety of each location;
CrimeReports[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], which works with police
information systems to visualize crimes that have
occurred in; My Safe Map[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], a map service that
uses existing external data to search for safe
streets and blocks, have also been put to practical
use. Many methods have been proposed to
evaluate the safety of a location, such as those in
these previous studies. However, no method has
been established that runs on an edge device and
evaluates the safety of a location with sufficient
accuracy.
      </p>
      <p>
        The freshness, spatial resolution, and accuracy
of the original data are important for assessing the
level of danger. Ideally, the data should be
updated in real-time and evaluated by an impartial
third party with a spatial resolution of about 3.5 m
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], which is defined by Edward et al. as a social
distance that is hard to reach but easy to talk to.
However, most of the aforementioned studies and
services use statistical data such as crime maps,
which are not real-time, have a low spatial
resolution, and have low accuracy because they
are self-reported. And most of the existing
services that detect abnormal behavior in
realtime from video images are not available because
they do not disclose the detection results.
Therefore, conventional navigation services are
limited to route guidance to avoid areas that are
statistically known to be dangerous. No safe
route-finding method has been proposed to
successfully pass by dangerous people in a narrow
space while maintaining social distance from
them. As for visualization, the system is limited to
displaying routes on a 2D map and alerting drivers
with sound and vibration.
      </p>
      <p>Therefore, we are conducting research,
development, and social implementation of an
information-sharing system and navigation
system that can detect and avoid criminal damage
and unpleasant events in advance, featuring the
following three elements.
(1) Edge devices accurately measure and share the
level of danger of a location in real-time.
(2) A wide-area safe route-finding method based
on the level of danger measured by edge devices,
and a narrow-area safe route-finding method for
successfully passing dangerous people in a
narrow space while maintaining social distance.
(3) Social Distance and safe route visualization
and human guidance methods
2.1.</p>
    </sec>
    <sec id="sec-4">
      <title>System Overview</title>
      <p>We have conducted a system study to achieve
a navigation system that can detect and avoid
criminal damage and unpleasant events in
advance. This system consists of six subsystems
as shown in Figure 3.</p>
      <p>Safty
(1) Edge Devices
(2) Location danger level
evaluation system
(3) Wsiedaer-cahresaysstaefmeroute
(4) Nasreroawrc-harseyastseamfe route visu(a5l)izSaatfieonrosuytsetem
Figure 3: System Overview
(6) Data sharing server
(1)Edge devices</p>
      <p>A device equipped with various sensors such
as a camera, microphone, thermo, GPS, etc. We
assume surveillance cameras, smartphones, and
wearable devices.
(2) Location danger level evaluation system</p>
      <p>The system evaluates and shares the safety of
a location based on information acquired by
various sensors in edge devices. We can use other
information such as sound (conversations,
gunshots, explosions) or temperature (human
body, road surface, fire, freezing) to evaluate the
safety of the location. This information can be
used to set various conditions in addition to safety,
such as easy walking routes, cool routes, and
routes with many pedestrians.
(3) Wide-area safe route search system</p>
      <p>This system performs a wide-area route search
to maximize safety and minimize distance based
on the safety level and distance of the location
evaluated by the edge device.
(4) Narrow-area safe route search system</p>
      <p>This system searches for a safe route in a
narrow space (e.g., a street or a station) to pass by
a dangerous person while maintaining a social
distance from him or her.
(5) Safe route visualization system</p>
      <p>This system visualizes shared information like
dangerous persons detected by other edge devices.
This system also visualizes the routes and social
distance calculated by the safe route search
system. Wide-area safe routes are displayed on a
map, and narrow-area safe routes for passing each
other are displayed on the HMD.
(6) Data-sharing server</p>
      <p>A server that accumulates real-time spatial
safety information. It stores information uploaded
from each edge terminal and distributes it to each
terminal in real-time.
2.2.</p>
    </sec>
    <sec id="sec-5">
      <title>Simulator</title>
      <p>We will evaluate the usefulness of the
designed system. However, our system includes
subsystems that are difficult to implement at this
time. In particular, as mentioned in section 1.3,
there is no established method to evaluate the
safety of a location with sufficient accuracy on an
edge device. In Addition, there are also no small,
lightweight, safe, optical see-through HMDs that
can be easily worn. Because of these difficulties
in implementing our system in the real world, we
first conducted our system evaluation in a
simulator.</p>
      <p>
        We constructed a virtual Akihabara city [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
area of approximately 625 m x 625 m. All
subsystems operate ideally in a virtual Akihabara.
For example, virtual Akihabara has an ideal edge
device that measures the safety of the location
with 100% accuracy. Then, We randomly placed
autonomously roaming people with various
attributes PE, PF, PD, and PS shown in Table 1 in
a virtual Akihabara. PE is a person with an edge
device (100 people), PF is a person with a fever
(10 people), PD is a person who can be judged
dangerous for some reason such as a facial
expression or attitude (10 people), and PS is a
person who can reduce the level of danger in that
location such as a police officer or security guard
(10 people). The PE has an ideal edge device that
detects PF, PD, and PS within a 30-meter radius
without error and measures the level of danger.
The location and attributes of PFs, PDs, and PSs
detected by the device and their measured level of
danger are sent to the data-sharing server as a
Danger Point (DP). Although the DP is quantified
by the location safety evaluation system by
analyzing the facial expressions and attitudes of
each person, we set the DP uniformly for each
attribute as shown in Table 1 for simplicity in this
simulation.
      </p>
      <p>Figure 4 shows the results of mapping the
current positions of PF, PD, and PS detected by
100 edge devices on a 2D map. We drew bubbles
(spheres) colored according to the attributes at the
detected person's location. This bubble is drawn at
the location of the PF, PD, and PS at the time the
PE detected them, but they could move. Also, the
map would be filled with bubbles of newly
detected PFs, PDs, and PSs. Therefore, we set the
transparency of the bubbles to indicate how new
the information is, and set them to gradually
disappear in one minute so that the map would not
be filled with bubbles. Users can see that the
disappearing bubble is old information.</p>
      <p>When a PE with an edge device sets a
destination, a wide-area safe route system
performs the route search. We have extended the
Dijkstra method, which is used for route finding
in navigation systems, to perform wide-area safe
route finding considering distance and level of
danger in space. Dijkstra's method is an algorithm
in graph theory that can find the shortest distance
from a start node to a goal node and its path. We
generated a graph structure from map data in
which the intersections are represented as nodes I
and the roads connecting the intersections as
edges E. We defined the Edge Danger Level (EDL)
as the level of danger between intersection In and
the adjacent intersection In+1, where EDL is the sum
of the DP of PF, PD, and PS that exist between the
intersections. We set a danger threshold value
DLth, and if EDL exceeds the DLth, the path is
considered impassable and the node connection is
disconnected. In this simulator, we set the
threshold DLth = 5. The system evaluates the EDL
of all edges, updates the graph structure, and finds
the shortest and safest path using the Dijkstra
method.</p>
      <p>
        Considering the threshold DLth = 5, edge E(I2,
I3) is cut off because it is impassable, and the
shortest path search is performed on the remaining
edges, resulting in the path shown in Figure 5(b).
E(I2, I3) and E(I3, I4) are passable, but there are PF
and PD, so a narrow-area safe path search is
performed to find a path that allows them to pass
each other while maintaining the social distance.
Figure 6 shows an example of a narrow-area safe
path search. The system generates a graph
structure by dividing the space to be traversed into
meshes. The size of the mesh was set to 3.5 m, a
social distance defined by Edward et al[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. as
hard to reach but easily conversable. In the
narrow-area safe path search, the Social Distance
according to the attributes of PF, PD, and PS was
considered for the EDL evaluation. For PF with
fever, the Social Distance in the COVID-19
environment is defined as 6 feet by the Centers for
Disease Control and Prevention and 1 m by the
WHO [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ][
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. We defined Social Distance as 5
m, five times the WHO standard. According to
Matsunaga et al., when the distance to a person is
less than 6 m, the likelihood of assault
increases[22]. Therefore, we set the social
distance to PD (person with dangerous facial
expressions/attitudes) as 10 m. We also set the
social distance as 20 m assuming that the PS
(police officer or security guard) has an eye range
of 20 m. Based on these social distances, the
system calculates EDL for all edges in the same
way as in a wide-area safe route search, updates
the graph structure, and finds the shortest path
using the Dijkstra method. In this way, we can
avoid dangerous people by computing travel paths
that can maintain safe social distances. In addition,
these social distances can be changed dynamically
according to the user's attributes, season, time of
use, and level of danger of the person to make it
safer and more convenient. For example, the
social distance can be adjusted to take more time
when the user is a child or a woman, or when it is
late at night.
2.3.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Simulation Results</title>
      <p>Figure 7 shows the mapping results of the
current positions of PF, PD, and PS detected and
shared by 100 edge devices and the wide-area safe
route on a 2D map. We deployed PE0, a person
tasked with moving from the start point S to the
goal point G. PE0 is equipped with an edge device
and moves along the route indicated by the edge
device's wide-area safety route search. PE0 is
equipped with an edge device and moves along
the route indicated by the edge device's wide-area
safe path search. Although the shortest route is to
go straight from S to G, the blue color indicates
that the route search is performed in consideration
of the level of danger. When PE0 needs to pass PF
or PD on the route, the system performs a
narrowarea safe route search and shows PE0 a route to
pass them while maintaining social distance.
Figure 8 shows the view from PE0. In this
experiment, PE0 is assumed to be wearing a
seethrough HMD. System display PF, PD, and PS
detected and shared by other edge devices. The
system also displays a narrow-area safe route
search result. The system superimposed bubbles
with sizes corresponding to the social distance for
each attribute of PF, PD, and PS, and the safe
passing route (green).</p>
    </sec>
    <sec id="sec-7">
      <title>Smartphone prototype system</title>
      <p>Simulator experiments have shown that the
system works effectively within the virtual
Akihabara. Therefore, we developed a prototype
system using a smartphone as shown in Figure 9.
The edge device on the simulator we implemented
was an ideal device that could detect people and
their attributes within a radius of 30 meters
without error. However, since such an ideal
device does not exist in reality, our prototype
system simply detects a person from a
smartphone's RGBD camera image (without a
level of danger assessment) and shares the
person's location coordinates. We developed a
smartphone application in Unity and installed it
on an iPhone 13 pro max (Figure 10). The app
obtains the position coordinates (latitude,
longitude, and altitude) of the smartphone from
the Global Navigation Satellite System (GNSS),
the azimuth and orientation of the device from the
magnetic compass and gyro, and detects the
person using the RGB camera and LiDAR, and
also gets the distance to the person. The distance
to the person is also obtained. The application
then calculated the position coordinates of the
detected person and displayed a translucent
bubble (red sphere) with a diameter of 5 meters.
The location information of the detected person is
shared by Unity's photon plug-in and is
superimposed on the same location from another
smartphone. The location coordinates of the
detected person are uploaded to the data server
(Nifty Cloud mobile backend), and the
information of the detected person can be viewed
from a web browser (Google Map).</p>
      <p>Data Server</p>
      <p>Web Server
2.5.</p>
      <p>As shown in Figure 11 we placed PF, a person
assumed to have a fever, in the park. Next,
smartphones were placed at PE1, PE2, and PE3.
The location of PE1 is in the same park as PF and
has no obstacles, so PF can be detected directly,
but from the location of PE2 and PE3, PF cannot
be detected directly due to the obstacles (height
difference and trees).</p>
      <p>PF</p>
      <p>PE1</p>
      <p>PE3</p>
      <p>PE2
Figure 13 and 14 show the view of PF from PE2
and PE3. From PE2 and PE3, the PF cannot be
seen directly due to the height difference and the
trees, respectively. However, a red bubble is
displayed at the location of the PF based on the
information from PE1, so that the user can
recognize the presence of the PF.</p>
      <p>A red bubble with a diameter of 5m
representing the PF is shown in Figures 12, 13,
and 14, but these bubbles are not occluded by
obstacles such as the ground or trees in real space,
making it difficult to get a sense of distance. In the
simulator, the 3D geometry of the entire
townscape is known, so the bubbles can be
occluded, but the prototype system cannot
measure the 3D geometry of the real world, so
occlusion is not possible. The LiDAR in the
iPhone13 can measure real-world 3D geometry at
close range (about 15m). The AR Foundation tool
provides an Automatic Environment Occlusion
function using LiDAR, but it does not work on
objects at long distances as in this experiment.
Therefore, We generally assume that there are
fewer obstacles in the sky, we floated the bubble
at 30 m above the detected PF and displayed a thin
cylinder up to the bubble. The results are shown
in Figures 15 and 16.</p>
      <p>Figure 17 shows the results of mapping the PFs
detected by PE1 on Google Map (aerial photo)
with images. This allows users in remote locations
to determine the location of PFs.</p>
    </sec>
    <sec id="sec-8">
      <title>3. Discussion, and Future Works 3.2.</title>
    </sec>
    <sec id="sec-9">
      <title>Smart Phone and Future Works</title>
      <p>We have developed a prototype system that
can detect and avoid criminal damage and
unpleasant events in advance, using a simulator
and a smartphone. Through experiments, we
confirmed that the system works and that the
information about the detected persons can be
shared.
3.1.</p>
    </sec>
    <sec id="sec-10">
      <title>Simulator and future works</title>
      <p>Once the simulator was run and the locations
of PFs, PDs, and PSs were identified on the 2D
map, we felt that "we should avoid that dangerous
area where PFs and PDs are densely located," and
did not feel that much need for wide-area safe
route search. It may be sufficient to have
information that "that area is dangerous". In
addition, when we had to pass by a PF or PD, the
AR display of social distance in the form of a
bubble made us feel secure, but when we had to
pass through their bubble, we felt great stress
despite it being a simulation. On the other hand,
when there was a PS that was supposed to be a
police officer, etc., I was able to move with ease
even if there was a PD. However, the bubble was
often invisible behind a building, and when we
turned a corner, we were sometimes surprised
when the bubble suddenly appeared, and we felt
that the AR display needed to be improved in this
regard. The edge device on the simulator is an
ideal device to detect PF, PD, and PS within a
radius of 30m without error, but in reality, such an
ideal device is difficult to implement. Therefore,
in the future, we would first like to narrow down
the detection target to people with fever and
conduct experiments in the real world to
determine the social distance from people with a
fever to verify the effectiveness of the system. We
would also like to study a safer route-finding
method by incorporating PF, PD, and PS path
forecasts into the wide-area and narrow-area safe
route-finding method proposed in this study.</p>
      <p>In this paper, we have evaluated the
effectiveness of the system subjectively, but in the
future, we would like to evaluate the effectiveness
of the system quantitatively. For example, as
indicators of quantitative evaluation, we are
considering the frequency with which PDs can not
be avoided, how many were able to take the safe
route, the average of the shortest distance to a PD,
and the distance increased by the safe route
proposed by the system.</p>
      <p>As mentioned in section 3.5, the bubble
representing the location of the detected PF is not
occluded by objects in the real world, making it
difficult to get a sense of the distance. We floated
the bubble at 30 m above the PF, but the same
problem occurs when there is an object in the sky.
In the future, we would like to estimate the 3D
geometry of the object in front of the PF from the
video and perform bubble occlusion. Another
issue is the accuracy of GNSS. We experimented
in a park with no obstacles in the sky, but the
GNSS accuracy was at best about 5 m horizontally
and 3 m vertically, with errors of 30 m or more in
some situations. Therefore, a method to estimate
self-position by measuring the 3D geometry of an
object is possible. For example, position
estimation can be performed by matching point
cloud data obtained by LiDAR sensors installed in
recent smartphones with real space, and
something similar has already been implemented
in automatic driving. For this purpose, it is
necessary to convert the entire real space into
point cloud data. However, point cloud data in
cities and buildings are available through the
PLATEAU project [23] promoted by Japan's
Ministry of Land, Infrastructure, Transport, and
Tourism, and we would like to consider
improving the accuracy of self-position
estimation using this method in the future.</p>
      <p>Through these research activities, we will
promote the social implementation of
information-sharing and navigation systems that
can detect and avoid criminal damage and
unpleasant events in advance.</p>
    </sec>
    <sec id="sec-11">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Study on Violent Offenders (Ministry of Justice, Japan)</article-title>
          , URL: http://www.moj.go.jp/housouken/housouken 03_00104.html, Sep 2021
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Galbrun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Pelechrinis</surname>
          </string-name>
          , E. Terzi,
          <article-title>"Urban navigation beyond shortest route: The case of safe paths"</article-title>
          ,
          <source>Information Systems</source>
          ,
          <volume>57</volume>
          ,
          <fpage>160</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yizhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yuetian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shohreh</surname>
          </string-name>
          .
          <article-title>"On Integration of Any Factor with Distance for Navigation : Walk Safely and Fast Enough"</article-title>
          ,
          <source>Proc. 2019 IEEE 23rd International Enterprise Distributed Object Computing Workshop (EDOCW).</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Sukru</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Mustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bilin</surname>
          </string-name>
          ,
          <article-title>"Pedestrian Path Modification Mobile Tool for COVID19 Social Distancing for Use in Multi-Modal Trip Navigation"</article-title>
          , arXiv.org, May
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Maria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Alina</surname>
          </string-name>
          , G. Antonino, C. Antonio,
          <string-name>
            <given-names>V.</given-names>
            <surname>Massimo</surname>
          </string-name>
          ,
          <article-title>"Viale S., A proximity-based indoor navigation system tackling the COVID-19 social distancing measures"</article-title>
          ,
          <source>Proc. 2020 IEEE Symposium on Computers and Communications (ISCC).</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kapil</surname>
          </string-name>
          , G. Yuxiang,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jared</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. I-Jeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Chien-Ming</surname>
          </string-name>
          ,
          <article-title>"Group-Aware Robot Navigation in Crowded Environments"</article-title>
          , arXiv.org,
          <year>Dec 2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lucia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Daniel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gianluca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Roland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Renaud</surname>
          </string-name>
          ,
          <article-title>"Robot Navigation in Crowded Environments Using Deep Reinforcement Learning"</article-title>
          ,
          <source>Proc. IEEE/RSJ International Conference on Intelligent Robots and Systems</source>
          (IROS)
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Stacy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ali</surname>
          </string-name>
          , E. William, S. Morgan,
          <string-name>
            <given-names>R.</given-names>
            <surname>Erick</surname>
          </string-name>
          ,
          <article-title>"Is Someone There? Do They Have a Gun- How Visual Information about Others Can Improve Personal Safety Management for Blind Individuals"</article-title>
          ,
          <source>Proc. ACM SIGACCESS Conference on Computers and Accessibility</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <surname>Z Liu</surname>
          </string-name>
          ,
          <article-title>Real-time and accurate abnormal behavior detection in videos - Machine Vision</article-title>
          and Applications,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K</given-names>
            <surname>Przystupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M</given-names>
            <surname>Majka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O</given-names>
            <surname>Kochan</surname>
          </string-name>
          .
          <article-title>Examination of abnormal behavior detection based on improved YOLOv3, Electronics, 2021</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Incident</given-names>
            <surname>Detection</surname>
          </string-name>
          <string-name>
            <surname>Solutions</surname>
          </string-name>
          , URL:https://info.hitachiics.co.jp/topics/news/20210309a.html,
          <year>Mar 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Salamon</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Bello</surname>
          </string-name>
          ,
          <article-title>"Deep Convolutional Neural Networks and Data Augmentation for Environmental Sound Classification,"</article-title>
          <source>in IEEE Signal Processing Letters</source>
          , vol.
          <volume>24</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>279</fpage>
          -
          <lpage>283</lpage>
          ,
          <year>March 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Jaewoo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Meeyoung</surname>
          </string-name>
          , S. Thomas,
          <article-title>" SocRoutes: safe routes based on tweet sentiments"</article-title>
          ,
          <source>Proc. 23rd International Conference on World Wide Web, April</source>
          <year>2014</year>
          ,
          <fpage>179</fpage>
          -
          <lpage>182</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>RedZone</given-names>
            <surname>Map</surname>
          </string-name>
          , URL: https://www.redzonemap.com/,
          <year>Jul 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>My</surname>
            <given-names>Safetipin</given-names>
          </string-name>
          , URL:http://safetipin.com/,
          <year>Sep 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] CrimeReports, URL:https://www.crimereports.com,
          <year>Sep 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>My</given-names>
            <surname>Safe</surname>
          </string-name>
          <string-name>
            <surname>Map</surname>
          </string-name>
          , URL:https://web.mysafemap.com/,
          <year>Sep 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Edward</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Hall</surname>
          </string-name>
          , The Hidden Dimension, Doubleday, New York,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>ZENRIN</given-names>
            <surname>City Asset</surname>
          </string-name>
          <string-name>
            <surname>Series</surname>
          </string-name>
          , URL:https://www.zenrin.co.jp/contents/pro duct/service/3d/asset/index.html,
          <year>Sep 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <article-title>[20] CDC "How to Protect Yourself &amp; Others"</article-title>
          , URL:https://www.cdc.gov/coronavirus/2019 -ncov/prevent-getting-sick/prevention.html,
          <year>Sep 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>WHO</surname>
          </string-name>
          <article-title>" Coronavirus disease (COVID-19) advice for the public"</article-title>
          , URL:https://www.who.int/emergencies/dise ases/novel-coronavirus-2019/advice-forpublic,
          <year>Sep 2021</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>