-
The social stratification of internal migration and daily mobility during the COVID-19 pandemic
Authors:
Erick Elejalde,
Leo Ferres,
Víctor Navarro,
Loreto Bravo,
Emilio Zagheni
Abstract:
This study leverages mobile phone data for 5.4 million users to unveil the complex dynamics of internal migration and daily mobility in Santiago de Chile during the global COVID-19 pandemic, with a focus on socioeconomic differentials. Major findings include an increase in daily mobility among lower-income brackets compared to higher ones in 2020. In contrast, long-term relocation patterns rose pr…
▽ More
This study leverages mobile phone data for 5.4 million users to unveil the complex dynamics of internal migration and daily mobility in Santiago de Chile during the global COVID-19 pandemic, with a focus on socioeconomic differentials. Major findings include an increase in daily mobility among lower-income brackets compared to higher ones in 2020. In contrast, long-term relocation patterns rose primarily among higher-income groups. These shifts indicate a nuanced response to the pandemic across socioeconomic strata. Unlike in 2017, economic factors in 2020 influenced a change not only in the decision to emigrate but also in the selection of destinations, suggesting a profound transformation in mobility behaviors. Contrary to expectations, there was no evidence supporting a preference for rural over urban destinations despite the surge in emigration from Santiago during the pandemic. The study enhances our understanding of how varying socioeconomic conditions intersect with mobility decisions during crises and provides valuable insights for policymakers aiming to enact fair, informed measures in rapidly changing circumstances.
△ Less
Submitted 21 September, 2023; v1 submitted 20 September, 2023;
originally announced September 2023.
-
Numerical Study of Distorted Tulip Flame Propagation in Confined Systems
Authors:
Fernando Illacanchi,
Sebastian Valencia,
Cesar Celis,
Andres Mendiburu,
Luis Bravo,
Prashant Khare
Abstract:
Understanding the dynamics of premixed flames that propagates in confined systems is important in a wide range of applications. The study of premixed flames propagating in a closed channel covers a variety of complexities related to flame ignition, laminar flame development, and strong non-linear interaction between the flame and the surrounding walls. Accordingly, to study the dynamics of premixe…
▽ More
Understanding the dynamics of premixed flames that propagates in confined systems is important in a wide range of applications. The study of premixed flames propagating in a closed channel covers a variety of complexities related to flame ignition, laminar flame development, and strong non-linear interaction between the flame and the surrounding walls. Accordingly, to study the dynamics of premixed flames propagating in closed channels, numerical simulations of the propagation of distorted tulip flames are carried out in this work. More specifically, a set of fully reactive compressible transport equations are solved here using the high-order PPM. A 21-step chemical kinetic mechanism is employed to model the chemical kinetics and the energy release in an air-hydrogen mixture. Computational mesh independence studies are carried out in this work by both refining grid elements and employing different levels of adaptive mesh refinements (AMR). The main results show that the classic tulip flame behavior evolves into a distorted one. Indeed, two consecutive collapses on the flame front are observed, which are related to wave pressure and the presence of reverse flow. It is particularly found that the pressure wave produced by the interaction of the flame skirt with the side walls reduces the flame velocity and contributes to the formation of tulip flames. This is consistent with the reduction in both flame area and pressure gradient at the flame tip. Furthermore, the collapse of flame cups is associated with the formation of the vortex near the channel side walls and the increase of pressure waves.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Fluid Dynamic Simulations of Mach and Regular Reflections in Oblique Shock-Wave Configurations using Adaptive Mesh Refinement
Authors:
Sebastian Valencia,
Cesar Celis,
Andres Mendiburu,
Luis Bravo,
Prashant Khare
Abstract:
In the context of the interaction between a moving plane shock wave and an inclined wall (wedge), it is possible to distinguish four distinct shock reflection configurations. These shock wave reflections, which depend on the characteristics of the incident shock wave and the geometry of the surface that it interacts with, are (i) regular reflection (RR), (ii) simple Mach reflection (SMR), (iii) tr…
▽ More
In the context of the interaction between a moving plane shock wave and an inclined wall (wedge), it is possible to distinguish four distinct shock reflection configurations. These shock wave reflections, which depend on the characteristics of the incident shock wave and the geometry of the surface that it interacts with, are (i) regular reflection (RR), (ii) simple Mach reflection (SMR), (iii) transition Mach reflection (TMR), and (iv) double Mach reflection (DMR). The impact of these shock reflections on flow properties can be significant so understanding them is important when predicting the behavior of shock waves in more complex flow configurations. Previous research works have explored the referred shock reflections through both numerical and experimental approaches, employing various gases and different flow and geometrical configurations. The present study involves the use of a high-fidelity computational fluid dynamics (CFD) tool, known as PeleC, which is a compressible solver based on AMReX specifically designed to handle complex flow configurations. Accordingly, by solving the time-dependent Euler equations for various 2D flow configurations, this work studies shock wave reflections accounting for four different Mach-based operating conditions and compares and analyzes the resulting density profiles on the wedge wall with experimental data. To strike a balance between model accuracy and computational efficiency, adaptive mesh refinement (AMR) is incorporated, and a mesh independence study is performed by varying the number of AMR levels. The results of this study demonstrate the capabilities of the CFD tool employed as it accurately predicts the sensitivity of wave characteristics to different operating conditions.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Assessment of Large Eddy Simulation (LES) Sub-grid Scale Models Accounting for Compressible Homogeneous Isotropic Turbulence
Authors:
Jhon Cordova,
Cesar Celis,
Andres Mendiburu,
Luis Bravo,
Prashant Khare
Abstract:
Most sub-grid scale (SGS) models employed in LES (large eddy simulation) formulations were originally developed for incompressible, single phase, inert flows and assume transfer of energy based on the classical energy cascade mechanism. Although they have been extended to numerically study compressible and reactive flows involving deflagrations and detonations, their accuracy in such sensitive and…
▽ More
Most sub-grid scale (SGS) models employed in LES (large eddy simulation) formulations were originally developed for incompressible, single phase, inert flows and assume transfer of energy based on the classical energy cascade mechanism. Although they have been extended to numerically study compressible and reactive flows involving deflagrations and detonations, their accuracy in such sensitive and challenging flows is an open question. Therefore, there is a need for both assessing these existing SGS models and identifying the opportunities for proposing new ones, which properly characterize reacting flows in complex engine configurations such as those characterizing rotating detonation engines (RDEs). Accordingly, accounting for the decay of free homogeneous isotropic turbulence (HIT), this work provides a comparison of four different SGS models when compressibility effects are present, (i) the classical Smagorinsky model, (ii) the dynamic Smagorinsky model, (iii) the wall-adapting local eddy-viscosity (WALE) model, and (iv) the Vreman model. More specifically, SGS models are firstly implemented in the open-source computational tool PeleC, which is a high-fidelity finite-volume solver for compressible flows, and then numerical simulations are carried out using them. In terms of results, turbulent spectra, and the decay of physical quantities such as kinetic energy, enstrophy, temperature, and dilatation are computed for each SGS LES model and compared with direct numerical simulations (DNS) results available in literature. The LES numerical results obtained here highlight that the studied SGS models are capable of capturing the overall trends of all physical quantities accounted for. However, they also emphasize the need of improved SGS models capable of adequately describing turbulence dynamics in compressible flows.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Characterization of partial wetting by CMAS droplets using multiphase many-body dissipative particle dynamics and data-driven discovery based on PINNs
Authors:
Elham Kiyani,
Mahdi Kooshkbaghi,
Khemraj Shukla,
Rahul Babu Koneru,
Zhen Li,
Luis Bravo,
Anindya Ghoshal,
George Em Karniadakis,
Mikko Karttunen
Abstract:
The molten sand, a mixture of calcia, magnesia, alumina, and silicate, known as CMAS, is characterized by its high viscosity, density, and surface tension. The unique properties of CMAS make it a challenging material to deal with in high-temperature applications, requiring innovative solutions and materials to prevent its buildup and damage to critical equipment. Here, we use multiphase many-body…
▽ More
The molten sand, a mixture of calcia, magnesia, alumina, and silicate, known as CMAS, is characterized by its high viscosity, density, and surface tension. The unique properties of CMAS make it a challenging material to deal with in high-temperature applications, requiring innovative solutions and materials to prevent its buildup and damage to critical equipment. Here, we use multiphase many-body dissipative particle dynamics (mDPD) simulations to study the wetting dynamics of highly viscous molten CMAS droplets. The simulations are performed in three dimensions, with varying initial droplet sizes and equilibrium contact angles. We propose a coarse parametric ordinary differential equation (ODE) that captures the spreading radius behavior of the CMAS droplets. The ODE parameters are then identified based on the Physics-Informed Neural Network (PINN) framework. Subsequently, the closed form dependency of parameter values found by PINN on the initial radii and contact angles are given using symbolic regression. Finally, we employ Bayesian PINNs (B-PINNs) to assess and quantify the uncertainty associated with the discovered parameters. In brief, this study provides insight into spreading dynamics of CMAS droplets by fusing simple parametric ODE modeling and state-of-the-art machine learning techniques.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
In A Society of Strangers, Kin Is Still Key: Identified Family Relations In Large-Scale Mobile Phone Data
Authors:
Tamás Dávid-Barrett,
Sebastian Diaz,
Carlos Rodriguez-Sickert,
Isabel Behncke,
Anna Rotkirch,
János Kertész,
Loreto Bravo
Abstract:
Mobile call networks have been widely used to investigate communication patterns and the network of interactions of humans at the societal scale. Yet, more detailed analysis is often hindered by having no information about the nature of the relationships, even if some metadata about the individuals are available. Using a unique, large mobile phone database with information about individual surname…
▽ More
Mobile call networks have been widely used to investigate communication patterns and the network of interactions of humans at the societal scale. Yet, more detailed analysis is often hindered by having no information about the nature of the relationships, even if some metadata about the individuals are available. Using a unique, large mobile phone database with information about individual surnames in a population in which people inherit two surnames: one from their father, and one from their mother, we are able to differentiate among close kin relationship types. Here we focus on the difference between the most frequently called alters depending on whether they are family relationships or not. We find support in the data for two hypotheses: (1) phone calls between family members are more frequent and last longer than phone calls between non-kin, and (2) the phone call pattern between family members show a higher variation depending on the stage of life-course compared to non-family members. We give an interpretation of these findings within the framework of evolutionary anthropology: kinship matters even when demographic processes, such as low fertility, urbanisation and migration reduce the access to family members. Furthermore, our results provide tools for distinguishing between different kinds of kin relationships from mobile call data, when information about names are unavailable.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Deep neural operators can serve as accurate surrogates for shape optimization: A case study for airfoils
Authors:
Khemraj Shukla,
Vivek Oommen,
Ahmad Peyvan,
Michael Penwarden,
Luis Bravo,
Anindya Ghoshal,
Robert M. Kirby,
George Em Karniadakis
Abstract:
Deep neural operators, such as DeepONets, have changed the paradigm in high-dimensional nonlinear regression from function regression to (differential) operator regression, paving the way for significant changes in computational engineering applications. Here, we investigate the use of DeepONets to infer flow fields around unseen airfoils with the aim of shape optimization, an important design pro…
▽ More
Deep neural operators, such as DeepONets, have changed the paradigm in high-dimensional nonlinear regression from function regression to (differential) operator regression, paving the way for significant changes in computational engineering applications. Here, we investigate the use of DeepONets to infer flow fields around unseen airfoils with the aim of shape optimization, an important design problem in aerodynamics that typically taxes computational resources heavily. We present results which display little to no degradation in prediction accuracy, while reducing the online optimization cost by orders of magnitude. We consider NACA airfoils as a test case for our proposed approach, as their shape can be easily defined by the four-digit parametrization. We successfully optimize the constrained NACA four-digit problem with respect to maximizing the lift-to-drag ratio and validate all results by comparing them to a high-order CFD solver. We find that DeepONets have low generalization error, making them ideal for generating solutions of unseen shapes. Specifically, pressure, density, and velocity fields are accurately inferred at a fraction of a second, hence enabling the use of general objective functions beyond the maximization of the lift-to-drag ratio considered in the current work.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
An individual-level ground truth dataset for home location detection
Authors:
Luca Pappalardo,
Leo Ferres,
Manuel Sacasa,
Ciro Cattuto,
Loreto Bravo
Abstract:
Home detection, assigning a phone device to its home antenna, is a ubiquitous part of most studies in the literature on mobile phone data. Despite its widespread use, home detection relies on a few assumptions that are difficult to check without ground truth, i.e., where the individual that owns the device resides. In this paper, we provide an unprecedented evaluation of the accuracy of home detec…
▽ More
Home detection, assigning a phone device to its home antenna, is a ubiquitous part of most studies in the literature on mobile phone data. Despite its widespread use, home detection relies on a few assumptions that are difficult to check without ground truth, i.e., where the individual that owns the device resides. In this paper, we provide an unprecedented evaluation of the accuracy of home detection algorithms on a group of sixty-five participants for whom we know their exact home address and the antennas that might serve them. Besides, we analyze not only Call Detail Records (CDRs) but also two other mobile phone streams: eXtended Detail Records (XDRs, the ``data'' channel) and Control Plane Records (CPRs, the network stream). These data streams vary not only in their temporal granularity but also they differ in the data generation mechanism', e.g., CDRs are purely human-triggered while CPR is purely machine-triggered events. Finally, we quantify the amount of data that is needed for each stream to carry out successful home detection for each stream. We find that the choice of stream and the algorithm heavily influences home detection, with an hour-of-day algorithm for the XDRs performing the best, and with CPRs performing best for the amount of data needed to perform home detection. Our work is useful for researchers and practitioners in order to minimize data requests and to maximize the accuracy of home antenna location.
△ Less
Submitted 17 October, 2020;
originally announced October 2020.
-
Shop** Mall Attraction and Social Mixing at a City Scale
Authors:
Mariano G. Beiró,
Loreto Bravo,
Diego Caro,
Ciro Cattuto,
Leo Ferres,
Eduardo Graells-Garrido
Abstract:
The social inclusion aspects of shop** malls and their effects on our understanding of urban spaces have been a controversial argument largely discussed in the literature. Shop** malls offer an open, safe and democratic version of the public space. Many of their detractors suggest that malls target their customers in subtle ways, promoting social exclusion. In this work, we analyze whether mal…
▽ More
The social inclusion aspects of shop** malls and their effects on our understanding of urban spaces have been a controversial argument largely discussed in the literature. Shop** malls offer an open, safe and democratic version of the public space. Many of their detractors suggest that malls target their customers in subtle ways, promoting social exclusion. In this work, we analyze whether malls offer opportunities for social mixing by analyzing the patterns of shop** mall visits in a large Latin-American city: Santiago de Chile.
We use a large XDR (Data Detail Records) dataset from a telecommunication company to analyze the mobility of $387,152$ cell phones around $16$ large malls in Santiago de Chile during one month. We model the influx of people to malls in terms of a gravity model of mobility, and we are able to predict the customer profile distribution of each mall, explaining it in terms of mall location, the population distribution, and mall size.
Then, we analyze the concept of social attraction, expressed as people from low and middle classes being attracted by malls that target high-income customers. We include a social attraction factor in our model and find that it is negligible in the process of choosing a mall. We observe that social mixing arises only in peripheral malls located farthest from the city center, which both low and middle class people visit. Using a co-visitation model we show that people tend to choose a restricted profile of malls according to their socio-economic status and their distance from the mall. We conclude that the potential for social mixing in malls could be capitalized by designing public policies regarding transportation and mobility.
△ Less
Submitted 9 February, 2018; v1 submitted 31 January, 2018;
originally announced February 2018.
-
The Effect of Pokémon Go on The Pulse of the City: A Natural Experiment
Authors:
Eduardo Graells-Garrido,
Leo Ferres,
Diego Caro,
Loreto Bravo
Abstract:
Pokémon Go, a location-based game that uses augmented reality techniques, received unprecedented media coverage due to claims that it allowed for greater access to public spaces, increasing the number of people out on the streets, and generally improving health, social, and security indices. However, the true impact of Pokémon Go on people's mobility patterns in a city is still largely unknown. In…
▽ More
Pokémon Go, a location-based game that uses augmented reality techniques, received unprecedented media coverage due to claims that it allowed for greater access to public spaces, increasing the number of people out on the streets, and generally improving health, social, and security indices. However, the true impact of Pokémon Go on people's mobility patterns in a city is still largely unknown. In this paper, we perform a natural experiment using data from mobile phone networks to evaluate the effect of Pokémon Go on the pulse of a big city: Santiago, capital of Chile. We found significant effects of the game on the floating population of Santiago compared to movement prior to the game's release in August 2016: in the following week, up to 13.8\% more people spent time outside at certain times of the day, even if they do not seem to go out of their usual way. These effects were found by performing regressions using count models over the states of the cellphone network during each day under study. The models used controlled for land use, daily patterns, and points of interest in the city.
Our results indicate that, on business days, there are more people on the street at commuting times, meaning that people did not change their daily routines but slightly adapted them to play the game. Conversely, on Saturday and Sunday night, people indeed went out to play, but favored places close to where they live.
Even if the statistical effects of the game do not reflect the massive change in mobility behavior portrayed by the media, at least in terms of expanse, they do show how "the street" may become a new place of leisure. This change should have an impact on long-term infrastructure investment by city officials, and on the drafting of public policies aimed at stimulating pedestrian traffic.
△ Less
Submitted 18 September, 2017; v1 submitted 25 October, 2016;
originally announced October 2016.
-
Consistency and Trust in Peer Data Exchange Systems
Authors:
Leopoldo Bertossi,
Loreto Bravo
Abstract:
We propose and investigate a semantics for "peer data exchange systems" where different peers are related by data exchange constraints and trust relationships. These two elements plus the data at the peers' sites and their local integrity constraints are made compatible via a semantics that characterizes sets of "solution instances" for the peers. They are the intended -possibly virtual- instances…
▽ More
We propose and investigate a semantics for "peer data exchange systems" where different peers are related by data exchange constraints and trust relationships. These two elements plus the data at the peers' sites and their local integrity constraints are made compatible via a semantics that characterizes sets of "solution instances" for the peers. They are the intended -possibly virtual- instances for a peer that are obtained through a data repair semantics that we introduce and investigate. The semantically correct answers from a peer to a query, the so-called "peer consistent answers", are defined as those answers that are invariant under all its different solution instances. We show that solution instances can be specified as the models of logic programs with a stable model semantics. The repair semantics is based on null values as used in SQL databases, and is also of independent interest for repairs of single databases with respect to integrity constraints.
△ Less
Submitted 6 June, 2016;
originally announced June 2016.
-
Repairing Inconsistent XML Write-Access Control Policies
Authors:
Loreto Bravo,
James Cheney,
Irini Fundulaki
Abstract:
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of allowed operations. This paper investigates the problem of deciding whether a policy is consistent, and if not, how its inconsistencies can be repaired. We consider policies expressed in terms of annotated DTDs defining…
▽ More
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of allowed operations. This paper investigates the problem of deciding whether a policy is consistent, and if not, how its inconsistencies can be repaired. We consider policies expressed in terms of annotated DTDs defining which operations are allowed or denied for the XML trees that are instances of the DTD. We show that consistency is decidable in PTIME for such policies and that consistent partial policies can be extended to unique "least-privilege" consistent total policies. We also consider repair problems based on deleting privileges to restore consistency, show that finding minimal repairs is NP-complete, and give heuristics for finding repairs.
△ Less
Submitted 15 August, 2007;
originally announced August 2007.
-
Semantically Correct Query Answers in the Presence of Null Values
Authors:
Loreto Bravo,
Leopoldo Bertossi
Abstract:
For several reasons a database may not satisfy a given set of integrity constraints(ICs), but most likely most of the information in it is still consistent with those ICs; and could be retrieved when queries are answered. Consistent answers to queries wrt a set of ICs have been characterized as answers that can be obtained from every possible minimally repaired consistent version of the original…
▽ More
For several reasons a database may not satisfy a given set of integrity constraints(ICs), but most likely most of the information in it is still consistent with those ICs; and could be retrieved when queries are answered. Consistent answers to queries wrt a set of ICs have been characterized as answers that can be obtained from every possible minimally repaired consistent version of the original database. In this paper we consider databases that contain null values and are also repaired, if necessary, using null values. For this purpose, we propose first a precise semantics for IC satisfaction in a database with null values that is compatible with the way null values are treated in commercial database management systems. Next, a precise notion of repair is introduced that privileges the introduction of null values when repairing foreign key constraints, in such a way that these new values do not create an infinite cycle of new inconsistencies. Finally, we analyze how to specify this kind of repairs of a database that contains null values using disjunctive logic programs with stable model semantics.
△ Less
Submitted 19 April, 2006;
originally announced April 2006.
-
Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints
Authors:
L. Bertossi,
L. Bravo,
E. Franconi,
A. Lopatenko
Abstract:
Consistent query answering is the problem of computing the answers from a database that are consistent with respect to certain integrity constraints that the database as a whole may fail to satisfy. Those answers are characterized as those that are invariant under minimal forms of restoring the consistency of the database. In this context, we study the problem of repairing databases by fixing in…
▽ More
Consistent query answering is the problem of computing the answers from a database that are consistent with respect to certain integrity constraints that the database as a whole may fail to satisfy. Those answers are characterized as those that are invariant under minimal forms of restoring the consistency of the database. In this context, we study the problem of repairing databases by fixing integer numerical values at the attribute level with respect to denial and aggregation constraints. We introduce a quantitative definition of database fix, and investigate the complexity of several decision and optimization problems, including DFP, i.e. the existence of fixes within a given distance from the original instance, and CQA, i.e. deciding consistency of answers to aggregate conjunctive queries under different semantics. We provide sharp complexity bounds, identify relevant tractable cases; and introduce approximation algorithms for some of those that are intractable. More specifically, we obtain results like undecidability of existence of fixes for aggregation constraints; MAXSNP-hardness of DFP, but a good approximation algorithm for a relevant special case; and intractability but good approximation for CQA for aggregate queries for one database atom denials (plus built-ins).
△ Less
Submitted 28 October, 2005; v1 submitted 14 March, 2005;
originally announced March 2005.
-
Query Answering in Peer-to-Peer Data Exchange Systems
Authors:
Leopoldo Bertossi,
Loreto Bravo
Abstract:
The problem of answering queries posed to a peer who is a member of a peer-to-peer data exchange system is studied. The answers have to be consistent wrt to both the local semantic constraints and the data exchange constraints with other peers; and must also respect certain trust relationships between peers. A semantics for peer consistent answers under exchange constraints and trust relationshi…
▽ More
The problem of answering queries posed to a peer who is a member of a peer-to-peer data exchange system is studied. The answers have to be consistent wrt to both the local semantic constraints and the data exchange constraints with other peers; and must also respect certain trust relationships between peers. A semantics for peer consistent answers under exchange constraints and trust relationships is introduced and some techniques for obtaining those answers are presented.
△ Less
Submitted 20 January, 2004;
originally announced January 2004.