Real-Time Safe Route Finding and Visualization Using Shared Edge Devices Takenori Hara1* , Hideo Saito1 1 Keio University, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama, Kanagawa, 223-8522, Japan Abstract Conventional safe route-finding systems display routes on a map to avoid dangerous areas based on offline data such as statistical data on crime rates. However, such dangerous level changes in a dynamic manner, which can be detected by people walking around. This paper presents a system that shares the detected data measured by edge devices owned by walking people for dynamic safe route finding in real-time. This system evaluates the safety of routes in real time using and displays the route in AR on HMDs and smartphones. This paper reports findings from a simulation and edge device (smartphone) implementation of spatial safety assessment, safe route finding, and route visualization. Keywords 1 Safe Routing, Edge Device, Visualization, AR 1. Introduction outdoors and 30% of cases occur in a house (Figure 2). A higher percentage of assaults occur 1.1. Research Background on public transportation or in stores than assaults, and we often hear news stories of station staff, Violent crimes such as assault and injury shopkeepers, passersby, and passengers suddenly (Assault is defined in Japan as a crime in which being violently attacked. Although transportation the victim was not injured, while an injury is a and shopping are essential to daily life, the crime in which the victim was injured) are crimes possibility of sudden violence and crime prevents that occur close to people, have a significant people from leading their daily lives with peace of impact on the victim's mind and body, threaten mind. their peaceful daily life, and may increase social unrest. According to a study on violent crime conducted by the Ministry of Justice's Legal Research Institute in Japan[1], the number of assault cases has remained high at around 30,000 since 2006, and the number of injury cases has also remained in the 20,000s since 2008 (Figure 1). In addition, these are the number of crimes reported to the police; the actual number of assaults and injuries is expected to be much higher. The largest number of assault cases was from people who did not know each other, while the Figure 1: Number of assaults and injuries in number of injury cases was from people who Japan knew each other, as typified by domestic violence. About 30% of both assault and injury cases occur APMAR’22: The 14th Asia-PacificWorkshop on Mixed and Augmented Reality, Dec. 02-03, 2022, Yokohama, Japan *Corresponding author. EMAIL: gouki@hvrl.ics.keio.ac.jp (T.Hara); hs@keio.jp (H. Saito); ORCID: 0000-0002-7699-0376 (T.Hara); 0000-0002-2421-9862 (H.Saito); © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Wor Pr ks hop oceedi ngs ht I tp: // ceur - SSN1613- ws .or 0073 g CEUR Workshop Proceedings (CEUR-WS.org) Sukru et al. propose a mobile app for the social distancing of people in a COVID-19 environment. It allows each user to manually register their health status and then share their current location on the network in real-time, predicting the Figure 2: Location of injury and assault in Japan walking paths of other users and alerting them with sound and vibration to the possibility of approaching users with poor health status [4]. Maria et al. proposed a method that uses BLE 1.2. Research Objectives beacons to detect and share a user's location and provide a route to reach a destination without Conventional navigation systems are designed passing other people indoors [5]. To successfully to arrive at a destination smoothly and quickly. To avoid people, robot pathfinding methods can be achieve a safe and secure society, we research, helpful: Kapil et al. proposed a pathfinding develop, and implement navigation systems that method that predicts the movement path of a can avoid crimes and unpleasant events by group of people [6], and Lucia et al. proposed a detecting them in advance. The navigation system method to move around humans and obstacles in uses edge devices such as surveillance cameras a social compatible and safe manner [7]. and smartphones to measure the level of danger in As a mechanism for sharing information real-time and search for safe routes. The system sensed by the user, the Joint Tactical Information also visualizes the detected dangerous elements Distribution System (JTIDS) and the Inter- and the safe routes. vehicular Information System (IVIS), which are We are convinced that this system can used in military applications, can be used as contribute to solving various social problems. For references. These systems share the position, example, the system can be used for urban heading, altitude, and speed of detected aircraft, planning to prevent crimes, support services to ships, and vehicles with all platforms participating maintain social distance in infectious disease in the network. environments such as COVID-19, detect people in For safe route finding, it is necessary to trouble and automatically ask for help from evaluate the safety of a location. According to people around them, support services to protect Stacy et al., a person's gender, facial expression, wild animals, and services to find lost cats. gaze, appearance, clothing, attitude, and physique In this paper, we report on the findings and are known to help determine whether a person is problems encountered in simulating the level of suspicious [8]. For example, if a person is silent danger assessment, safe route search, and safe and stares at another person, has an aggressive or route visualization of a location using edge predatory facial expression or body language, or devices. We also report our findings and problems is carrying a weapon such as a gun or a knife, he in a prototype system using a smartphone. or she is highly dangerous. Fan [9] and Fang [10] et al. proposed a method for detecting abnormal 1.3. Related Works human behavior in real-time from video images, and it is also provided as a service, such as the Many methods have been proposed for safe Incident Detection Solution [11]. Salamon et al. route finding that minimizes the level of danger proposed a method for sound classification [12], and distance on the path and displays the path on we think this method evaluates the safety of a a map. location by analyzing sounds such as Galbrun et al. proposed a safe route search conversations or detecting gunshots or explosions. method based on Total-Paths (total level of danger Kim et al. proposed a method to estimate the level on a path) and Max-Paths (maximum level of of danger of a location based on the content of danger on a path) [2]. Yizhou et al. conducted a geotagged messages on social media [13]. safe route search simulation experiment on an RedZone Map [14], a service that guides users to actual congestion dataset for each Paris train safe routes for cars based on government-released station based on another research result that crime map data; My Safety pin[15], a navigation "higher congestion leads to higher crime rate" and application that uses the results of interviews with confirmed the effectiveness of the method [3]. users about the safety of each location; CrimeReports[16], which works with police information systems to visualize crimes that have occurred in; My Safe Map[17], a map service that 2. Study of a navigation system that uses existing external data to search for safe streets and blocks, have also been put to practical can detect and avoid criminal use. Many methods have been proposed to damage and unpleasant events in evaluate the safety of a location, such as those in advance these previous studies. However, no method has been established that runs on an edge device and evaluates the safety of a location with sufficient accuracy. The freshness, spatial resolution, and accuracy 2.1. System Overview of the original data are important for assessing the level of danger. Ideally, the data should be We have conducted a system study to achieve updated in real-time and evaluated by an impartial a navigation system that can detect and avoid third party with a spatial resolution of about 3.5 m criminal damage and unpleasant events in [18], which is defined by Edward et al. as a social advance. This system consists of six subsystems distance that is hard to reach but easy to talk to. as shown in Figure 3. However, most of the aforementioned studies and services use statistical data such as crime maps, which are not real-time, have a low spatial resolution, and have low accuracy because they Safty are self-reported. And most of the existing services that detect abnormal behavior in real- time from video images are not available because (1) Edge Devices (2) Location danger level (3) Wide-area safe route they do not disclose the detection results. evaluation system search system Therefore, conventional navigation services are limited to route guidance to avoid areas that are statistically known to be dangerous. No safe route-finding method has been proposed to successfully pass by dangerous people in a narrow (4) Narrow-area safe route (5) Safe route (6) Data sharing server space while maintaining social distance from search system visualization system them. As for visualization, the system is limited to Figure 3: System Overview displaying routes on a 2D map and alerting drivers with sound and vibration. (1)Edge devices Therefore, we are conducting research, A device equipped with various sensors such development, and social implementation of an as a camera, microphone, thermo, GPS, etc. We information-sharing system and navigation assume surveillance cameras, smartphones, and system that can detect and avoid criminal damage wearable devices. and unpleasant events in advance, featuring the following three elements. (2) Location danger level evaluation system The system evaluates and shares the safety of (1) Edge devices accurately measure and share the a location based on information acquired by level of danger of a location in real-time. various sensors in edge devices. We can use other information such as sound (conversations, (2) A wide-area safe route-finding method based gunshots, explosions) or temperature (human on the level of danger measured by edge devices, body, road surface, fire, freezing) to evaluate the and a narrow-area safe route-finding method for safety of the location. This information can be successfully passing dangerous people in a used to set various conditions in addition to safety, narrow space while maintaining social distance. such as easy walking routes, cool routes, and routes with many pedestrians. (3) Social Distance and safe route visualization and human guidance methods (3) Wide-area safe route search system This system performs a wide-area route search to maximize safety and minimize distance based on the safety level and distance of the location evaluated by the edge device. The location and attributes of PFs, PDs, and PSs (4) Narrow-area safe route search system detected by the device and their measured level of This system searches for a safe route in a danger are sent to the data-sharing server as a narrow space (e.g., a street or a station) to pass by Danger Point (DP). Although the DP is quantified a dangerous person while maintaining a social by the location safety evaluation system by distance from him or her. analyzing the facial expressions and attitudes of each person, we set the DP uniformly for each (5) Safe route visualization system attribute as shown in Table 1 for simplicity in this This system visualizes shared information like simulation. dangerous persons detected by other edge devices. This system also visualizes the routes and social Table 1 distance calculated by the safe route search Attributes and DP of people system. Wide-area safe routes are displayed on a Attributes Color DP Number map, and narrow-area safe routes for passing each PE other are displayed on the HMD. person with an - 100 edge device (6) Data-sharing server A server that accumulates real-time spatial PF person with a 1 10 safety information. It stores information uploaded fever from each edge terminal and distributes it to each terminal in real-time. PD 10 10 dangerous person 2.2. Simulator PS police officer or -10 10 We will evaluate the usefulness of the security guard designed system. However, our system includes subsystems that are difficult to implement at this Figure 4 shows the results of mapping the time. In particular, as mentioned in section 1.3, current positions of PF, PD, and PS detected by there is no established method to evaluate the 100 edge devices on a 2D map. We drew bubbles safety of a location with sufficient accuracy on an (spheres) colored according to the attributes at the edge device. In Addition, there are also no small, detected person's location. This bubble is drawn at lightweight, safe, optical see-through HMDs that the location of the PF, PD, and PS at the time the can be easily worn. Because of these difficulties PE detected them, but they could move. Also, the in implementing our system in the real world, we map would be filled with bubbles of newly first conducted our system evaluation in a detected PFs, PDs, and PSs. Therefore, we set the simulator. transparency of the bubbles to indicate how new We constructed a virtual Akihabara city [19] the information is, and set them to gradually area of approximately 625 m x 625 m. All disappear in one minute so that the map would not subsystems operate ideally in a virtual Akihabara. be filled with bubbles. Users can see that the For example, virtual Akihabara has an ideal edge disappearing bubble is old information. device that measures the safety of the location with 100% accuracy. Then, We randomly placed autonomously roaming people with various attributes PE, PF, PD, and PS shown in Table 1 in a virtual Akihabara. PE is a person with an edge device (100 people), PF is a person with a fever (10 people), PD is a person who can be judged dangerous for some reason such as a facial expression or attitude (10 people), and PS is a person who can reduce the level of danger in that location such as a police officer or security guard (10 people). The PE has an ideal edge device that detects PF, PD, and PS within a 30-meter radius without error and measures the level of danger. Figure 5: Wide-area safe route search Figure 4: Mapping results of detected PF(Red), PD(Yellow), and PS(Green) When a PE with an edge device sets a destination, a wide-area safe route system performs the route search. We have extended the Dijkstra method, which is used for route finding in navigation systems, to perform wide-area safe route finding considering distance and level of danger in space. Dijkstra's method is an algorithm in graph theory that can find the shortest distance from a start node to a goal node and its path. We generated a graph structure from map data in which the intersections are represented as nodes I and the roads connecting the intersections as edges E. We defined the Edge Danger Level (EDL) as the level of danger between intersection In and the adjacent intersection In+1, where EDL is the sum of the DP of PF, PD, and PS that exist between the Figure 6: Narrow-area safety route search intersections. We set a danger threshold value DLth, and if EDL exceeds the DLth, the path is Figure 5 shows an example of wide-area safe considered impassable and the node connection is routing. When a PE with an edge device starts disconnected. In this simulator, we set the from point S and goes to G, Figure 5(a) is usually threshold DLth = 5. The system evaluates the EDL the shortest path. If one PF is detected at E(I1, I2), of all edges, updates the graph structure, and finds one PF and one PD at E(I2, I3), and one PF, PD, the shortest and safest path using the Dijkstra and PS at E(I3, I4), the level of danger EDL for each method. edge is as follows EDL(I1, I2)= 1 :passable EDL(I2, I3)= 11 :impassable EDL(I3, I4)= 1 :passable Considering the threshold DLth = 5, edge E(I2, I3) is cut off because it is impassable, and the shortest path search is performed on the remaining edges, resulting in the path shown in Figure 5(b). E(I2, I3) and E(I3, I4) are passable, but there are PF and PD, so a narrow-area safe path search is performed to find a path that allows them to pass or PD on the route, the system performs a narrow- each other while maintaining the social distance. area safe route search and shows PE0 a route to Figure 6 shows an example of a narrow-area safe pass them while maintaining social distance. path search. The system generates a graph Figure 8 shows the view from PE0. In this structure by dividing the space to be traversed into experiment, PE0 is assumed to be wearing a see- meshes. The size of the mesh was set to 3.5 m, a through HMD. System display PF, PD, and PS social distance defined by Edward et al[18]. as detected and shared by other edge devices. The hard to reach but easily conversable. In the system also displays a narrow-area safe route narrow-area safe path search, the Social Distance search result. The system superimposed bubbles according to the attributes of PF, PD, and PS was with sizes corresponding to the social distance for considered for the EDL evaluation. For PF with each attribute of PF, PD, and PS, and the safe fever, the Social Distance in the COVID-19 passing route (green). environment is defined as 6 feet by the Centers for Disease Control and Prevention and 1 m by the WHO [20][21]. We defined Social Distance as 5 m, five times the WHO standard. According to Matsunaga et al., when the distance to a person is less than 6 m, the likelihood of assault increases[22]. Therefore, we set the social distance to PD (person with dangerous facial expressions/attitudes) as 10 m. We also set the social distance as 20 m assuming that the PS (police officer or security guard) has an eye range of 20 m. Based on these social distances, the system calculates EDL for all edges in the same way as in a wide-area safe route search, updates the graph structure, and finds the shortest path using the Dijkstra method. In this way, we can Figure 7: Results of wide-area safe route search avoid dangerous people by computing travel paths that can maintain safe social distances. In addition, these social distances can be changed dynamically according to the user's attributes, season, time of use, and level of danger of the person to make it safer and more convenient. For example, the social distance can be adjusted to take more time when the user is a child or a woman, or when it is late at night. 2.3. Simulation Results Figure 8: Visualization detected and shared PF, Figure 7 shows the mapping results of the PD, and PS, and Narrow-area safety route search current positions of PF, PD, and PS detected and results shared by 100 edge devices and the wide-area safe route on a 2D map. We deployed PE0, a person 2.4. Smartphone prototype system tasked with moving from the start point S to the goal point G. PE0 is equipped with an edge device Simulator experiments have shown that the and moves along the route indicated by the edge system works effectively within the virtual device's wide-area safety route search. PE0 is Akihabara. Therefore, we developed a prototype equipped with an edge device and moves along system using a smartphone as shown in Figure 9. the route indicated by the edge device's wide-area The edge device on the simulator we implemented safe path search. Although the shortest route is to was an ideal device that could detect people and go straight from S to G, the blue color indicates their attributes within a radius of 30 meters that the route search is performed in consideration without error. However, since such an ideal of the level of danger. When PE0 needs to pass PF device does not exist in reality, our prototype system simply detects a person from a 2.5. Smartphone Prototype Result smartphone's RGBD camera image (without a level of danger assessment) and shares the As shown in Figure 11 we placed PF, a person person's location coordinates. We developed a assumed to have a fever, in the park. Next, smartphone application in Unity and installed it smartphones were placed at PE1, PE2, and PE3. on an iPhone 13 pro max (Figure 10). The app The location of PE1 is in the same park as PF and obtains the position coordinates (latitude, has no obstacles, so PF can be detected directly, longitude, and altitude) of the smartphone from but from the location of PE2 and PE3, PF cannot the Global Navigation Satellite System (GNSS), be detected directly due to the obstacles (height the azimuth and orientation of the device from the difference and trees). magnetic compass and gyro, and detects the person using the RGB camera and LiDAR, and also gets the distance to the person. The distance to the person is also obtained. The application then calculated the position coordinates of the PE1 detected person and displayed a translucent PF PE3 bubble (red sphere) with a diameter of 5 meters. The location information of the detected person is shared by Unity's photon plug-in and is superimposed on the same location from another smartphone. The location coordinates of the detected person are uploaded to the data server PE2 (Nifty Cloud mobile backend), and the Figure 11: PF and edge devices position information of the detected person can be viewed from a web browser (Google Map). Figure 12 shows the screen when looking at PF from PE1, where PF is detected and a red bubble Data Server Web Server with a diameter of 5 m is superimposed. Edge Device Edge Device Web Browser Figure 9: Smartphone prototype system position azimuth Person Detection coordinates orientation RGB-Cam/LiDAR Figure 12: Detected PF from PE1 Figure 13 and 14 show the view of PF from PE2 and PE3. From PE2 and PE3, the PF cannot be seen directly due to the height difference and the trees, respectively. However, a red bubble is displayed at the location of the PF based on the information from PE1, so that the user can iphone13 recognize the presence of the PF. pro max Figure 10: Prototype Application Figure 13: View of PF from PE2 Figure 15: Floated Bubble from PE2 Figure 14: View of PFs from PE3 Figure 16: Floated Bubble from PE3 A red bubble with a diameter of 5m Figure 17 shows the results of mapping the PFs representing the PF is shown in Figures 12, 13, detected by PE1 on Google Map (aerial photo) and 14, but these bubbles are not occluded by with images. This allows users in remote locations obstacles such as the ground or trees in real space, to determine the location of PFs. making it difficult to get a sense of distance. In the simulator, the 3D geometry of the entire townscape is known, so the bubbles can be occluded, but the prototype system cannot measure the 3D geometry of the real world, so occlusion is not possible. The LiDAR in the iPhone13 can measure real-world 3D geometry at close range (about 15m). The AR Foundation tool provides an Automatic Environment Occlusion function using LiDAR, but it does not work on objects at long distances as in this experiment. Therefore, We generally assume that there are fewer obstacles in the sky, we floated the bubble Figure 17: Detected persons on Google Map at 30 m above the detected PF and displayed a thin cylinder up to the bubble. The results are shown in Figures 15 and 16. 3. Discussion, and Future Works 3.2. Smart Phone and Future Works We have developed a prototype system that As mentioned in section 3.5, the bubble can detect and avoid criminal damage and representing the location of the detected PF is not unpleasant events in advance, using a simulator occluded by objects in the real world, making it and a smartphone. Through experiments, we difficult to get a sense of the distance. We floated confirmed that the system works and that the the bubble at 30 m above the PF, but the same information about the detected persons can be problem occurs when there is an object in the sky. shared. In the future, we would like to estimate the 3D geometry of the object in front of the PF from the 3.1. Simulator and future works video and perform bubble occlusion. Another issue is the accuracy of GNSS. We experimented in a park with no obstacles in the sky, but the Once the simulator was run and the locations GNSS accuracy was at best about 5 m horizontally of PFs, PDs, and PSs were identified on the 2D and 3 m vertically, with errors of 30 m or more in map, we felt that "we should avoid that dangerous some situations. Therefore, a method to estimate area where PFs and PDs are densely located," and self-position by measuring the 3D geometry of an did not feel that much need for wide-area safe object is possible. For example, position route search. It may be sufficient to have estimation can be performed by matching point information that "that area is dangerous". In cloud data obtained by LiDAR sensors installed in addition, when we had to pass by a PF or PD, the recent smartphones with real space, and AR display of social distance in the form of a something similar has already been implemented bubble made us feel secure, but when we had to in automatic driving. For this purpose, it is pass through their bubble, we felt great stress necessary to convert the entire real space into despite it being a simulation. On the other hand, point cloud data. However, point cloud data in when there was a PS that was supposed to be a cities and buildings are available through the police officer, etc., I was able to move with ease PLATEAU project [23] promoted by Japan's even if there was a PD. However, the bubble was Ministry of Land, Infrastructure, Transport, and often invisible behind a building, and when we Tourism, and we would like to consider turned a corner, we were sometimes surprised improving the accuracy of self-position when the bubble suddenly appeared, and we felt estimation using this method in the future. that the AR display needed to be improved in this Through these research activities, we will regard. The edge device on the simulator is an promote the social implementation of ideal device to detect PF, PD, and PS within a information-sharing and navigation systems that radius of 30m without error, but in reality, such an can detect and avoid criminal damage and ideal device is difficult to implement. Therefore, unpleasant events in advance. in the future, we would first like to narrow down the detection target to people with fever and conduct experiments in the real world to 4. References determine the social distance from people with a fever to verify the effectiveness of the system. We [1] Study on Violent Offenders (Ministry of would also like to study a safer route-finding Justice, Japan), URL: method by incorporating PF, PD, and PS path http://www.moj.go.jp/housouken/housouken forecasts into the wide-area and narrow-area safe 03_00104.html, Sep 2021 route-finding method proposed in this study. [2] E. Galbrun, K. Pelechrinis, E. Terzi, "Urban In this paper, we have evaluated the navigation beyond shortest route: The case of effectiveness of the system subjectively, but in the safe paths", Information Systems, 57, 160- future, we would like to evaluate the effectiveness 171. of the system quantitatively. For example, as [3] Z. Yizhou, X. Yuetian, A. Shohreh. "On indicators of quantitative evaluation, we are Integration of Any Factor with Distance for considering the frequency with which PDs can not Navigation : Walk Safely and Fast Enough", be avoided, how many were able to take the safe Proc. 2019 IEEE 23rd International route, the average of the shortest distance to a PD, Enterprise Distributed Object Computing and the distance increased by the safe route Workshop (EDOCW). proposed by the system. [4] G. Sukru, C. Mustafa, A. Bilin, "Pedestrian [16] CrimeReports, Path Modification Mobile Tool for COVID- URL:https://www.crimereports.com, Sep 19 Social Distancing for Use in Multi-Modal 2021. Trip Navigation", arXiv.org, May 2021. [17] My Safe Map, [5] F. Maria, B. Alina, G. Antonino, C. Antonio, URL:https://web.mysafemap.com/, Sep V. Massimo, "Viale S., A proximity-based 2021. indoor navigation system tackling the [18] Edward T. Hall, The Hidden Dimension, COVID-19 social distancing measures", Doubleday, New York, 1990. Proc. 2020 IEEE Symposium on Computers [19] ZENRIN City Asset Series, and Communications (ISCC). URL:https://www.zenrin.co.jp/contents/pro [6] K. Kapil, G. Yuxiang, M. Jared, W. I-Jeng, duct/service/3d/asset/index.html, Sep 2021. H. Chien-Ming, "Group-Aware Robot [20] CDC "How to Protect Yourself & Others", Navigation in Crowded Environments", URL:https://www.cdc.gov/coronavirus/2019 arXiv.org, Dec 2020. -ncov/prevent-getting-sick/prevention.html, [7] L. Lucia, D. Daniel, C. Gianluca, S. Roland, Sep 2021. D. Renaud, "Robot Navigation in Crowded [21] WHO " Coronavirus disease (COVID-19) Environments Using Deep Reinforcement advice for the public", Learning", Proc. IEEE/RSJ International URL:https://www.who.int/emergencies/dise Conference on Intelligent Robots and ases/novel-coronavirus-2019/advice-for- Systems (IROS) 2020. public, Sep 2021. [8] B. Stacy, A. Ali, E. William, S. Morgan, R. Erick, "Is Someone There? Do They Have a Gun- How Visual Information about Others Can Improve Personal Safety Management for Blind Individuals", Proc. ACM SIGACCESS Conference on Computers and Accessibility 2017. [9] Z Fan, J Yin, Y Song, Z Liu, Real-time and accurate abnormal behavior detection in videos - Machine Vision and Applications, 2020. [10] M Fang, Z Chen, K Przystupa, T Li, M Majka, O Kochan. Examination of abnormal behavior detection based on improved YOLOv3, Electronics, 2021 [11] Incident Detection Solutions, URL:https://info.hitachi- ics.co.jp/topics/news/20210309a.html, Mar 2021. [12] J. Salamon and J. P. Bello, "Deep Convolutional Neural Networks and Data Augmentation for Environmental Sound Classification," in IEEE Signal Processing Letters, vol. 24, no. 3, pp. 279-283, March 2017. [13] K. Jaewoo, C. Meeyoung, S. Thomas, " SocRoutes: safe routes based on tweet sentiments", Proc. 23rd International Conference on World Wide Web, April 2014, 179-182 [14] RedZone Map, URL: https://www.redzonemap.com/, Jul 2019. [15] My Safetipin, URL:http://safetipin.com/, Sep 2021.