Researchers Develop 3-D Model To Predict Behavior Of Large Crowds

Patterns of human behavior and movement in crowded cities -- the tipping point at which agitated crowds become anti-social mobs, the configuration of civic areas as defensible spaces that also promote free speech, the design of retail space that fosters active walking -- are at the core of an immersive 3-D computational model under development by an Arizona State University geographer.

“Crowds are vital to the lifeblood of our cities, yet, crowd behavior is veiled to traditional academic inquiry,” said Paul M. Torrens, an assistant professor in the School of Geographical Sciences.

It is impractical, Torrens said, “to establish live experiments with hundreds or thousands of people along busy streetscapes, to reproduce mob behavior during riots for the purposes of academic experimentation, or, to expect to replicate the life and death behavior under emergency situations in a fabricated fashion.”

“You couldn’t stage a realistic rehearsal of an evacuation because people are not going to panic appropriately, or you could never bulldoze large sections of the city to see how it affects pedestrian flow,” he said.

Instead, Torrens is developing a realistic computer model that can be used to assist city planners, shopping center developers, public safety and health officials, and researchers in exploring the dynamics of individual pedestrian and crowd behavior in dense urban settings.

“The goal of this project is to develop a reusable and behaviorally-founded computer model of pedestrian movement and crowd behavior amid dense urban environments, to serve as a test-bed for experimentation. The idea is to use the model to test hypotheses, real world plans and strategies that are not very easy or are impossible to test in practice,” Torrens said.

The current ways of measuring behavior that use statistical analysis or physics models have not proven to have the veracity that this model could potentially have, according to Torrens.

The new modeling approach will incorporate individual behavior and independent characteristics -- age, sex, size, health, body language -- while also taking into account crowd-level features such as panic, as well as characteristics of the environment, such as safety levels. The simulations will model both motion and emotion, Torrens said.

The model “will serve as an experimental, but wholly realistic, environment for exploring ‘what-if’ and unforeseen scenarios of relevance to cities and their citizens,” Torrens said.

For example, the project will develop simulations to explore questions of sustainability in downtown settings: how cities can promote walking as an alternative to driving; how pedestrian flow can be better integrated with transit-oriented development.

Another set of scenarios will explore a range of health issues, for example, how might a pathogen be transmitted through mobile pedestrians over a short time period?

Urban and economic planners will be able to use scenarios to explore questions involving the positioning of anchor stores along main shopping streets, pedestrian flow past street entertainers and placement of tourist information sites.

In the areas of public safety and homeland security, the model can be used to examine questions asking how pedestrian interactions with cars can be minimized; what the early signs of anti-social behavior in large crowds are and how polarizing influences can be neutralized; and strategies that might be used to compel anti-social crowds into quiescence without the use of force.

A prototype of the model has already been developed and used to crowd dynamics following outbreak of a fire in a dense part of a city with only a single point of evacuation. Torrens explains: “When trying to evacuate, people start to run and panic. Jams will occur and the evacuation doesn’t proceed as efficiently as it might otherwise.”

The prototype model records every state of everything in the model every 60th of a second. Once those data are in the system, the model exports this information into a Geographic Information System where the data can be analyzed mathematically.

From this information, “we are able to study collective human dynamics in incredible detail and explore how pedestrian crowds form under a range of conditions; and then provide information on how crowds might be better managed,” Torrens said.

“I can quantitatively and empirically benchmark what is normal behavior or what is a deviation from normal behavior and what could have caused somebody to panic in that situation. We’re able to look at panic levels and why people react to things the way that they do,” Torrens said.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.