Researchers Develop 3-D Model To Predict Behavior Of Large Crowds

Patterns of human behavior and movement in crowded cities -- the tipping point at which agitated crowds become anti-social mobs, the configuration of civic areas as defensible spaces that also promote free speech, the design of retail space that fosters active walking -- are at the core of an immersive 3-D computational model under development by an Arizona State University geographer.

“Crowds are vital to the lifeblood of our cities, yet, crowd behavior is veiled to traditional academic inquiry,” said Paul M. Torrens, an assistant professor in the School of Geographical Sciences.

It is impractical, Torrens said, “to establish live experiments with hundreds or thousands of people along busy streetscapes, to reproduce mob behavior during riots for the purposes of academic experimentation, or, to expect to replicate the life and death behavior under emergency situations in a fabricated fashion.”

“You couldn’t stage a realistic rehearsal of an evacuation because people are not going to panic appropriately, or you could never bulldoze large sections of the city to see how it affects pedestrian flow,” he said.

Instead, Torrens is developing a realistic computer model that can be used to assist city planners, shopping center developers, public safety and health officials, and researchers in exploring the dynamics of individual pedestrian and crowd behavior in dense urban settings.

“The goal of this project is to develop a reusable and behaviorally-founded computer model of pedestrian movement and crowd behavior amid dense urban environments, to serve as a test-bed for experimentation. The idea is to use the model to test hypotheses, real world plans and strategies that are not very easy or are impossible to test in practice,” Torrens said.

The current ways of measuring behavior that use statistical analysis or physics models have not proven to have the veracity that this model could potentially have, according to Torrens.

The new modeling approach will incorporate individual behavior and independent characteristics -- age, sex, size, health, body language -- while also taking into account crowd-level features such as panic, as well as characteristics of the environment, such as safety levels. The simulations will model both motion and emotion, Torrens said.

The model “will serve as an experimental, but wholly realistic, environment for exploring ‘what-if’ and unforeseen scenarios of relevance to cities and their citizens,” Torrens said.

For example, the project will develop simulations to explore questions of sustainability in downtown settings: how cities can promote walking as an alternative to driving; how pedestrian flow can be better integrated with transit-oriented development.

Another set of scenarios will explore a range of health issues, for example, how might a pathogen be transmitted through mobile pedestrians over a short time period?

Urban and economic planners will be able to use scenarios to explore questions involving the positioning of anchor stores along main shopping streets, pedestrian flow past street entertainers and placement of tourist information sites.

In the areas of public safety and homeland security, the model can be used to examine questions asking how pedestrian interactions with cars can be minimized; what the early signs of anti-social behavior in large crowds are and how polarizing influences can be neutralized; and strategies that might be used to compel anti-social crowds into quiescence without the use of force.

A prototype of the model has already been developed and used to crowd dynamics following outbreak of a fire in a dense part of a city with only a single point of evacuation. Torrens explains: “When trying to evacuate, people start to run and panic. Jams will occur and the evacuation doesn’t proceed as efficiently as it might otherwise.”

The prototype model records every state of everything in the model every 60th of a second. Once those data are in the system, the model exports this information into a Geographic Information System where the data can be analyzed mathematically.

From this information, “we are able to study collective human dynamics in incredible detail and explore how pedestrian crowds form under a range of conditions; and then provide information on how crowds might be better managed,” Torrens said.

“I can quantitatively and empirically benchmark what is normal behavior or what is a deviation from normal behavior and what could have caused somebody to panic in that situation. We’re able to look at panic levels and why people react to things the way that they do,” Torrens said.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3