jackkuo commited on
Commit
11907b3
·
verified ·
1 Parent(s): cc8e806

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NFAT4oBgHgl3EQfqB2B/content/tmp_files/2301.08644v1.pdf.txt +5266 -0
  2. -NFAT4oBgHgl3EQfqB2B/content/tmp_files/load_file.txt +0 -0
  3. .gitattributes +67 -0
  4. 19AzT4oBgHgl3EQfe_xt/content/tmp_files/2301.01445v1.pdf.txt +1799 -0
  5. 19AzT4oBgHgl3EQfe_xt/content/tmp_files/load_file.txt +0 -0
  6. 2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss +3 -0
  7. 3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/2301.11392v1.pdf.txt +1048 -0
  8. 3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/load_file.txt +0 -0
  9. 59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf +3 -0
  10. 59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss +3 -0
  11. 59AyT4oBgHgl3EQfcfe1/vector_store/index.pkl +3 -0
  12. 59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss +3 -0
  13. 5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf +3 -0
  14. 5dE0T4oBgHgl3EQfvgHM/content/tmp_files/2301.02620v1.pdf.txt +717 -0
  15. 5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt +0 -0
  16. 5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss +3 -0
  17. 5dFIT4oBgHgl3EQf7yth/vector_store/index.pkl +3 -0
  18. 6NE1T4oBgHgl3EQfmwRz/content/tmp_files/2301.03301v1.pdf.txt +824 -0
  19. 6NE1T4oBgHgl3EQfmwRz/content/tmp_files/load_file.txt +0 -0
  20. 79E1T4oBgHgl3EQfBwKM/vector_store/index.pkl +3 -0
  21. 79E4T4oBgHgl3EQfCgub/content/tmp_files/2301.04861v1.pdf.txt +1150 -0
  22. 79E4T4oBgHgl3EQfCgub/content/tmp_files/load_file.txt +0 -0
  23. 89FQT4oBgHgl3EQfIjX8/content/tmp_files/2301.13253v1.pdf.txt +0 -0
  24. 89FQT4oBgHgl3EQfIjX8/content/tmp_files/load_file.txt +0 -0
  25. 8NE5T4oBgHgl3EQfQg5R/vector_store/index.faiss +3 -0
  26. 8NE5T4oBgHgl3EQfQg5R/vector_store/index.pkl +3 -0
  27. 9NFQT4oBgHgl3EQfJDUU/content/tmp_files/2301.13254v1.pdf.txt +1072 -0
  28. 9NFQT4oBgHgl3EQfJDUU/content/tmp_files/load_file.txt +0 -0
  29. 9tFLT4oBgHgl3EQfui8A/content/tmp_files/2301.12155v1.pdf.txt +1637 -0
  30. 9tFLT4oBgHgl3EQfui8A/content/tmp_files/load_file.txt +0 -0
  31. CNA0T4oBgHgl3EQfAP_i/content/2301.01961v1.pdf +3 -0
  32. CNA0T4oBgHgl3EQfAP_i/vector_store/index.pkl +3 -0
  33. DNAzT4oBgHgl3EQfwf6z/content/2301.01724v1.pdf +3 -0
  34. DNAzT4oBgHgl3EQfwf6z/vector_store/index.pkl +3 -0
  35. DtFRT4oBgHgl3EQfxjhb/content/tmp_files/2301.13642v1.pdf.txt +0 -0
  36. DtFRT4oBgHgl3EQfxjhb/content/tmp_files/load_file.txt +0 -0
  37. EtA0T4oBgHgl3EQfA__T/content/tmp_files/2301.01971v1.pdf.txt +712 -0
  38. EtA0T4oBgHgl3EQfA__T/content/tmp_files/load_file.txt +0 -0
  39. FtE1T4oBgHgl3EQfEwPV/content/2301.02895v1.pdf +3 -0
  40. FtE1T4oBgHgl3EQfEwPV/vector_store/index.faiss +3 -0
  41. FtE1T4oBgHgl3EQfEwPV/vector_store/index.pkl +3 -0
  42. GNE4T4oBgHgl3EQfHQyx/content/tmp_files/2301.04902v1.pdf.txt +569 -0
  43. GNE4T4oBgHgl3EQfHQyx/content/tmp_files/load_file.txt +459 -0
  44. GdE1T4oBgHgl3EQfXQRO/content/tmp_files/2301.03124v1.pdf.txt +695 -0
  45. GdE1T4oBgHgl3EQfXQRO/content/tmp_files/load_file.txt +0 -0
  46. H9AzT4oBgHgl3EQfxv52/content/tmp_files/2301.01743v1.pdf.txt +1335 -0
  47. H9AzT4oBgHgl3EQfxv52/content/tmp_files/load_file.txt +0 -0
  48. HtE1T4oBgHgl3EQf_gZv/content/tmp_files/2301.03581v1.pdf.txt +2019 -0
  49. HtE1T4oBgHgl3EQf_gZv/content/tmp_files/load_file.txt +0 -0
  50. IdAyT4oBgHgl3EQfr_me/content/2301.00569v1.pdf +3 -0
-NFAT4oBgHgl3EQfqB2B/content/tmp_files/2301.08644v1.pdf.txt ADDED
@@ -0,0 +1,5266 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ANALYSIS OF THE SMOOTHLY AMNESIA-REINFORCED
2
+ MULTIDIMENSIONAL ELEPHANT RANDOM WALK
3
+ JIAMING CHEN AND LUCILE LAULIN
4
+ Abstract. In this work, we discuss the smoothly amnesia-reinforced multidimensional elephant
5
+ random walk (MARW). The scaling limit of the MARW is shown to exist in the diffusive, critical
6
+ and superdiffusive regimes. We also establish the almost sure convergence in all of the three
7
+ regimes. The quadratic strong law is displayed in the diffusive regime as well as in the critical
8
+ regime. The mean square convergence towards a non-Gaussian random variable is established
9
+ in the superdiffusive regime. Similar results for the barycenter process are also derived. Finally,
10
+ the last two Sections are devoted to a discussion of the convergence velocity of the mean square
11
+ displacement and the Cram´er moderate deviations.
12
+ Contents
13
+ 1.
14
+ Introduction
15
+ 1
16
+ 2.
17
+ The amnesia-reinforced elephant random walk
18
+ 4
19
+ 3.
20
+ A correlated martingale approach
21
+ 6
22
+ 4.
23
+ Scaling limit and convergence
24
+ 7
25
+ 5.
26
+ Scaling limit of the barycenter process
27
+ 13
28
+ 6.
29
+ Velocity of quadratic mean displacement
30
+ 21
31
+ 7.
32
+ Cram´er moderate deviations
33
+ 23
34
+ Appendix A.
35
+ Technical Lemmas
36
+ 24
37
+ References
38
+ 35
39
+ 1. Introduction
40
+ The study of reinforced processes and reinforced random walks has known a growing interest
41
+ over the last decades. In particular, random walks on graphs, or more precisely edge [37] or vertex
42
+ [39] reinforced random walks, have been the subject of a great number of contributions, see also
43
+ [1, 12, 27] and the references therein. The insight of introducing reinforcement mechanisms to
44
+ stochastic processes has also shed light on more applied models. In [30], the adaptive strategy of
45
+ an agent who plays a two-armed bandit machine was described as a self-reinforced random walk.
46
+ The philosophy of stochastic reinforcement has also been discussed in the topics of evolutionary
47
+ ecology [4] and machine learning theory [17]. Another manifestation of reinforced P´olya urn models
48
+ on financial economics can be found in [35]. We also refer the readers to [38] for a comprehensive
49
+ and extensive survey on the subject.
50
+ The Elephant Random Walk (ERW) is a discrete-time random walk, introduced by Sch¨utz and
51
+ Trimper [40] in 2004. It was referred to as the ERW in allusion to the traditional saying that
52
+ elephants can always remember anywhere they have been. As it was pointed out [12] by Bertoin
53
+ 2010 Mathematics Subject Classification. 60G50, 60G42, 62M09.
54
+ Key words and phrases. Reinforced random walk, scaling limit, Cram´er moderate deviation, martingale.
55
+ 1
56
+ arXiv:2301.08644v1 [math.PR] 20 Jan 2023
57
+
58
+ 2
59
+ JIAMING CHEN AND LUCILE LAULIN
60
+ (a) Diffusive regime
61
+ (b) Critical regime
62
+ (c) Superdiffusive regime
63
+ Figure 1. The two-dimensional ERW with amnesia (in blue) and its barycenter
64
+ (in red).
65
+ who relied on K¨ursten’s work [29], the ERW is a special case of step-reinforced random walk. In
66
+ fact, the ERW is reinforced because its behavior is influenced by its past : the ERW may have
67
+ a tendency to do the same thing over and over, or on the contrary, it may try to compensate its
68
+ previous steps. This different types of behavior, here-called regimes, are ruled by the memory
69
+ parameter p and it is well-known that the ERW shows three regimes of behavior and that the
70
+ critical value is p = 3/4.
71
+ The ERW in dimension d = 1 has received a lot of attention from mathematicians and physicists
72
+ over the last two decades.
73
+ The almost sure convergence and the asymptotic normality of the
74
+ position of the ERW were established in the diffusive regime p < 3/4 and the critical regime
75
+ p = 3/4, see [3, 9, 16] and the references therein. In the superdiffusive regime p > 3/4, Bercu
76
+ [5] proved that the limit of the position of the ERW is not Gaussian and Kubota and Takei [28]
77
+ showed that the fluctuation of the ERW around this limit is Gaussian. To obtain those asymptotics,
78
+ various approaches have been followed : Baur and Bertoin [3] went with the connection to P´olya-
79
+ type urns while martingales were used by Bercu [5] and Coletti et al. [16] and the construction of
80
+ random trees with Bernoulli percolation have been explicited by K¨ursten [29] and Businger [13].
81
+ Other quantities of interest regarding the ERW have been studied. For example, Fan et al.
82
+ [20] provided the Cramer moderate deviations associated with the ERW in dimension 1 and, more
83
+ recently, Hayashi et al. [26] studied the rate of quadratic mean displacement.
84
+ Bercu and Laulin [9] introduced the multidimensional ERW (MERW), where d ≥ 1, and estab-
85
+ lished the natural extensions of the results [5] in dimension d = 1. Then, they investigated the
86
+ center of mass of the MERW [8]. In both papers, they extensively used a martingale approach.
87
+ Bertenghi [10] made use of the connection to P´olya-type urns in order to establish functional
88
+ results for the MERW.
89
+ Finally, the ERW with changing memory has also been introduced. The ERW with linearly
90
+ reinforced memory has been studied by Baur [1] via the urn approach, and Laulin [31] using
91
+ martingales. Gut and Stadm¨uller [25] proposed an amnesic ERW where the elephant could stop
92
+ and only remember the first (and second) step it tooks. They also investigated the case where
93
+ the elephant only remembered a fixed or time-evolving portion of its past (recent or distant)
94
+ [24]. In the recent work [32], Laulin introduced smooth amnesia to the memory of the ERW and
95
+ established the asymptotic behavior of this new process.
96
+ The idea of our paper is to generalise the work [32] in dimension 1 to the dimension d ≥ 1.
97
+ In other words, we introduce smooth amnesia to the memory of the multidimensional elephant
98
+ random walk.
99
+
100
+ 40
101
+ 19
102
+ 30
103
+ 20
104
+ 10
105
+ 0
106
+ -10
107
+ -20
108
+ 0
109
+ 10
110
+ 20
111
+ 30
112
+ 40
113
+ 50
114
+ 60400
115
+ 300
116
+ 200
117
+ 100
118
+ 0
119
+ 0
120
+ 50
121
+ 100
122
+ 150
123
+ 200
124
+ 250
125
+ 35060
126
+ 50
127
+ 40
128
+ 30
129
+ 20
130
+ 10
131
+ 0
132
+ 0
133
+ 200
134
+ 400
135
+ 600
136
+ 800MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
137
+ 3
138
+ Our paper is organized as follows. In Section 2, we introduce the basic setting of the elephant
139
+ random walk (Sn)n∈N placed under an amnesia reinforcement mechanism, which is controlled
140
+ by the memory sequence (βn)n∈N. This type of multidimensional reinforced random walked is
141
+ named as the multidimensional amnesia-reinforced elephant random walk (MARW). Similar to
142
+ the ERW with the amnesia reinforcement, the MARW also admits a martingale structure, which
143
+ is discussed in Section 2. Unlike the usual ERW, the additional amnesia-reinforcement induces
144
+ two discrete-time martingales, instead of a single martingale, which are strongly correlated in a
145
+ nontrivial fashion. Such strong correlation of martingales will eventually pose some computational
146
+ difficulties when we analyze the limiting behavior of the MARW in Section 4. For instance, when
147
+ we compute the pointwise limit and the scaling limit of (Sn)n∈N in the diffusive regime, the two
148
+ strongly correlated martingales have to be dealt with separately, see [8, 31, 32] for the same
149
+ methodology.
150
+ As a courtesy to our readers, we give a preview of some of our main results, whose proofs will
151
+ be deferred to Theorem 4.1, Theorem 4.2, and Theorem 4.3. In the diffusive regime, we have the
152
+ almost sure convergence,
153
+ 1
154
+ nSn → 0
155
+ as
156
+ n → ∞
157
+ P − a.s.
158
+ Another logarithmic scaling to the MARW yields the quadratic strong law,
159
+ 1
160
+ log n
161
+ n
162
+
163
+ k=1
164
+ SkST
165
+ k
166
+ k2
167
+ → C(p, (βn)n∈N) · 1
168
+ dId
169
+ as
170
+ n → ∞
171
+ P-a.s.
172
+ where the constant C(p, (βn)n∈N) > 0 depends only on the parameter p and the control sequence
173
+ (βn)n∈N of the amnesia-reinforcement.
174
+ Using square-root scaling factor, we observe that the
175
+ MARW also admits a scaling limit in the diffusive regime, or convergence in distribution, in the
176
+ Skorokhod space D(R+) of c`adl`ag functions, in the sense that
177
+ � 1
178
+ √nS⌊nt⌋, t ≥ 0
179
+
180
+ =⇒
181
+
182
+ Wt, t ≥ 0
183
+
184
+ where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process such that W0 = 0 and with
185
+ covariance structure given in (4.6).
186
+ It is also of interest to look at the barycenter process (Gn)n∈N of the MARW. Its definition as
187
+ well as its limiting behavior are discussed in Section 5. Similar to the discussion of the MARW,
188
+ we obtain its pointwise convergence, quadratic strong law, and its scaling limit. In particular,
189
+ Theorem 5.5 states that the barycenter process admits a scaling limit at the diffusive regime, or
190
+ convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that
191
+ � 1
192
+ √nG⌊nt⌋, t ≥ 0
193
+
194
+ =⇒
195
+
196
+ 1
197
+
198
+ 0
199
+ Wtr dr, t ≥ 0
200
+
201
+ where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process defined in Theorem 4.3 with
202
+ its covariance structure defined in (4.6).
203
+ A natural question to ask is how fast the limiting Theorems in Section 4 are carried on. Section
204
+ 6 provides a quantitative estimate on the mean square convergence velocity of the pointwise limit,
205
+ quadratic strong law, and the scaling limit of the MARW. It should be possible to derive similar
206
+ convergence velocity to the barycenter process, which is not computed in this work. In Section
207
+ 7, we end this work with a discussion on the Cram´er moderate deviations of the MARW in the
208
+ diffusive and critical regimes. As a preview of our result in this Section, let (ϑn)n∈N ⊆ R be a
209
+ non-decreasing sequence so that ϑn/√n → 0 as n → ∞, and wn the sequence with asymptotic
210
+
211
+ 4
212
+ JIAMING CHEN AND LUCILE LAULIN
213
+ behavior described in Lemma A.1. Take any non-empty Borel set B ⊆ Rd, then we have
214
+
215
+ inf
216
+ x∈int B
217
+ 1
218
+ 2∥x∥2 ≤ lim inf
219
+ n→∞ ϑ−2
220
+ n log P
221
+ �anµnSn
222
+ ϑn√wn
223
+ ∈ B
224
+
225
+ ≤ lim sup
226
+ n→∞ ϑ−2
227
+ n log P
228
+ �anµnSn
229
+ ϑn√wn
230
+ ∈ B
231
+
232
+ ≤ − inf
233
+ x∈cl B
234
+ 1
235
+ 2∥x∥2,
236
+ (1.1)
237
+ where int B and cl B denote the interior and the closure of B ⊆ Rd, respectively. This is the
238
+ Cram´er moderate deviations for the MARW in the diffusive and critical regimes.
239
+ Moreover, we chose to postpone some technicalities regarding the analysis of the random walk
240
+ to the Appendix A. That way, the reader can focus on the main Theorems and the ideas of their
241
+ proofs. However, some analogous technicalities are displayed in the proof of the Theorems on the
242
+ barycenter such that the reader can also have a complete overview of the work needed.
243
+ Other probabilistic aspects of interest to the MARW include the statistical inference and an
244
+ analysis on the Fisher information, see [7], as well as the Wasserstein distance of the reinforced
245
+ random walk, see [21]. Perturbations of the amnesia intensity and its stability for the MARW is
246
+ also of independent interest. A similar topic for another type of stochastic process, the Schramn-
247
+ Loewner evolution, has been considered in [2, 15]. The transience and recurrence property of the
248
+ MARW remains unknown, to the best of our knowledge. Readers are referred to [11, 20] for an
249
+ exposition on the ERW without the amnesia reinforcement mechanism.
250
+ 2. The amnesia-reinforced elephant random walk
251
+ To begin with, let us properly introduce the MARW. It is the natural extension to higher
252
+ dimensions of the one-dimensional MARW, defined in [31]. For an arbitrarily given dimension
253
+ d ≥ 1, let (Sn)n∈N be a (reinforced) random walk on Zd starting from the origin at time n = 0,
254
+ i.e. S0 = 0. At time n = 1, the reinforced random walk moves to one of the 2d nearest-neighbors
255
+ with equal probability 1/2d. After that, at time n ≥ 1, the reinforced random walk chooses at
256
+ random an integer 1 ≤ k ≤ n among the past times and performs the same step with probabily p,
257
+ or goes in any of the 2d − 1 other directions with probability (1 − p)/(2d − 1). This random walk
258
+ possesses the amnesia property, in the sense that it remembers its most recent past steps better
259
+ than its remote past steps. Colloquially, this random walk has higher probability to choose its
260
+ recent steps than its earlier steps.
261
+ From a mathematical perspective, the position of this reinforced random walk at time n+1 ≥ 1
262
+ is given by
263
+ Sn+1 = Sn + Xn+1
264
+ with Xn+1 being defined as the step of this random walk at time n + 1, satisfying
265
+ Xn+1 = An+1Xβn+1.
266
+ Here An+1 is a random d × d matrix given by
267
+ P(An = +Id) = p,
268
+ and, for all 1 ≤ k ≤ d − 1,
269
+ P(An = −Id) = P(An = +Jk
270
+ d ) = P(An = −Jk
271
+ d ) = 1 − p
272
+ 2d − 1
273
+ where Id is the identity matrix of order d, Id = (δi,j)d and Jd = C(0, 1, 0, . . . , 0) is the circulant
274
+ matrix of order d such that J = (δi+1,j)d. It is easy to observe that the fixed permutation matrix
275
+ Jd satisfied Jd
276
+ d = Id. The distribution of the memory βn of the reinforced random walk is such
277
+
278
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
279
+ 5
280
+ that the probability of choosing a fixed past time k ∈ N decays approximately with rate kβ/nβ+1,
281
+ where β ≥ 0 is the amnesia parameter.
282
+ (a) n = 10
283
+ (b) n = 100
284
+ Figure 2. Evolution of the distribution of the memory β depending on the value
285
+ of β and the time.
286
+ To be precise, this random walk chooses βn+1 according to
287
+ P
288
+
289
+ βn+1 = k
290
+
291
+ = (β + 1)Γ(β + k)Γ(n)
292
+ Γ(k)Γ(β + n + 1)
293
+ = β + 1
294
+ n
295
+ ·
296
+ µk
297
+ µn+1
298
+ for all
299
+ 1 ≤ k ≤ n,
300
+ where
301
+ µn =
302
+ n−1
303
+
304
+ k=1
305
+
306
+ 1 + β
307
+ k
308
+
309
+ =
310
+ Γ(β + n)
311
+ Γ(n)Γ(β + 1).
312
+ (2.1)
313
+ (a) d = 1
314
+ (b) d = 2
315
+ (c) d = 3
316
+ (d) d = 10
317
+ Figure 3. Competition between the dimension and the amnesia.
318
+ Figure 3 aims to give a better understanding on how amnesia affects the MARW in various
319
+ dimensions. The horizontal axis corresponds to p (from 0 to 1) and the vertical axis corresponds to
320
+ β (from 0 to 10, arbitrary chosen). The diffusive regime, ie. when p < 4dβ+2d+1
321
+ 4d(β+1)
322
+ or a < 1−
323
+ 1
324
+ 2(β+1),
325
+ is in blue while the superdiffusive regime is in red, see Lemma A.1 for the definition of the regimes.
326
+ One can observe that when the amnesia parameter β grows, the superdiffusive regime tends to be
327
+ less represented. It should also be noted that when the dimension grows the superdiffusive regime
328
+ is more important. Hence, the amnesia is somehow leading the MARW to a behavior closer to
329
+ the one in dimension 1. When β vanishes, i.e. β = 0, the MARW reduces to the multidimensional
330
+ elephant random walk (MERW) introduced in [9].
331
+ The two random variables An and βn are constructed to be conditionally independent. At each
332
+ time n, define the σ-algebra Fn = σ(X1, . . . , Xn). Then (Fn)n∈N is a discrete-time filtration to
333
+ which the MARW is clearly adapted.
334
+
335
+ β= 0
336
+ 0.5
337
+ β= 1
338
+ β= 2
339
+ 0.4
340
+ β= 5
341
+ β= 10
342
+ 0.3
343
+ 0.2
344
+ 0.1
345
+ 0.0
346
+ 2
347
+ 4
348
+ 9
349
+ 00
350
+ 100.10
351
+ β= 0
352
+ β= 1
353
+ 0.08
354
+ β= 2
355
+ β= 5
356
+ 0.06
357
+ β= 10
358
+ 0.04-
359
+ 0.02
360
+ 0.00
361
+ 0
362
+ 20
363
+ 40
364
+ 60
365
+ 80
366
+ 10010
367
+ 8 -
368
+ 6
369
+ 4
370
+ 2 -
371
+ 0.0
372
+ 0.2
373
+ 0.4
374
+ 0.6
375
+ 0.8
376
+ 1.0
377
+ p10
378
+ 8 -
379
+ 6
380
+ B
381
+ 4
382
+ +0
383
+ 0.0
384
+ 0.2
385
+ 0.4
386
+ 0.6
387
+ 0.8
388
+ 1.0
389
+ p10
390
+ 8 -
391
+ 6
392
+ B
393
+ 4
394
+ 0.0
395
+ 0.2
396
+ 0.4
397
+ 0.6
398
+ 0.8
399
+ 1.0
400
+ p10
401
+ 8 -
402
+ 6
403
+ B
404
+ 4
405
+ +0
406
+ 0.0
407
+ 0.2
408
+ 0.4
409
+ 0.6
410
+ 0.8
411
+ 1.0
412
+ p6
413
+ JIAMING CHEN AND LUCILE LAULIN
414
+ Since An and βn are conditionally independent, we clearly have
415
+ E
416
+
417
+ Xn+1|Fn
418
+
419
+ = E
420
+
421
+ An
422
+
423
+ E
424
+
425
+ Xβn+1|Fn
426
+
427
+ = 2dp − 1
428
+ 2d − 1 E
429
+
430
+ n
431
+
432
+ k=1
433
+ Xk1{βn+1=k}|Fn
434
+
435
+ = 2dp − 1
436
+ 2d − 1 · β + 1
437
+ nµn+1
438
+ n
439
+
440
+ k=1
441
+ µkXk.
442
+ (2.2)
443
+ We further denote
444
+ a = 2dp − 1
445
+ 2d − 1
446
+ and
447
+ Yn =
448
+ n
449
+
450
+ k=1
451
+ µkXk
452
+ (2.3)
453
+ such that
454
+ E
455
+
456
+ Yn+1|Fn
457
+
458
+ =
459
+
460
+ 1 + a(β + 1)
461
+ n
462
+
463
+ Yn = γnYn
464
+ with γn = 1 + a(β + 1)/n. Hereafter, for each n ≥ 1, let
465
+ an =
466
+ n−1
467
+
468
+ k=1
469
+ γ−1
470
+ k
471
+ = Γ(n)Γ(a(β + 1) + 1)
472
+ Γ(a(β + 1) + n)
473
+ and
474
+ wn =
475
+ n
476
+
477
+ k=1
478
+ (akµk)2.
479
+ (2.4)
480
+ From a Gamma function estimate, also see in [31], we have that
481
+ na(β+1)an → Γ(a(β + 1) + 1)
482
+ as
483
+ n → ∞
484
+ (2.5)
485
+ and
486
+ n−βµn → Γ(β + 1)−1
487
+ as
488
+ n → ∞.
489
+ (2.6)
490
+ 3. A correlated martingale approach
491
+ Define the following two Rd-valued processes by
492
+ Mn = anYn
493
+ and
494
+ Nn = Sn +
495
+ a(β + 1)
496
+ β − a(β + 1)µ−1
497
+ n Yn.
498
+ (3.1)
499
+ Proposition 3.1. The Rd-valued processes (Mn)n∈N and (Nn)n∈N defined in (3.1) are locally
500
+ square-integrable martingales adapted to (Fn)n∈N.
501
+ Proof. Since, both Mn and Nn are finite sums for each n ≥ 1, the square-integrability and adapt-
502
+ ness are immediate. By (2.3) and (2.4), we have
503
+ E
504
+
505
+ Mn+1|Fn
506
+
507
+ = anγ−1
508
+ n Yn + anµnγ−1
509
+ n E
510
+
511
+ Xn+1|Fn
512
+
513
+ = anYn.
514
+ And by (2.2), we have
515
+ E
516
+
517
+ Nn+1|Fn
518
+
519
+ = E
520
+
521
+ Sn+1 +
522
+ a(β + 1)
523
+ β − a(β + 1)µ−1
524
+ n+1Yn+1|Fn
525
+
526
+ = Sn +
527
+ a(β + 1)
528
+ β − a(β + 1)µ−1
529
+ n Yn.
530
+ Hence the assertion is verified.
531
+
532
+ Notice that via introducing the martingales (Mn)n∈N and (Nn)n∈N, we can write Sn as
533
+ Sn = Nn −
534
+ a(β + 1)
535
+ β − a(β + 1)(anµn)−1Mn.
536
+ (3.2)
537
+ This writing is the key on which rely all of our analysis and our martingale approach.
538
+ Moreover, the asymptotic behavior of (Mn)n∈N is closely related to wn defined in (2.4). In fact,
539
+ we have the following asymptotic result, which states the three regimes of the MARW.
540
+ Lemma 3.1. In the diffusive regime when p < 4dβ+2d+1
541
+ 4d(β+1)
542
+ or a < 1 −
543
+ 1
544
+ 2(β+1), we have
545
+ wn
546
+ n1−2(a(β+1)−β) → l(β)
547
+ as
548
+ n → ∞
549
+ (3.3)
550
+
551
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
552
+ 7
553
+ with
554
+ l(β) =
555
+ 1
556
+ 1 + 2(β − a(β + 1))
557
+ �Γ(a(β + 1) + 1)
558
+ Γ(β + 1)
559
+ �2
560
+ .
561
+ In the critical regime when p = 4dβ+2d+1
562
+ 4d(β+1)
563
+ or a = 1 −
564
+ 1
565
+ 2(β+1), we have
566
+ wn
567
+ log n →
568
+ �Γ(β + 1 + 1
569
+ 2)
570
+ Γ(β + 1)
571
+ �2
572
+ as
573
+ n → ∞.
574
+ (3.4)
575
+ In the superdiffusive regime when p > 4dβ+2d+1
576
+ 4d(β+1)
577
+ or a > 1 −
578
+ 1
579
+ 2(β+1), we have
580
+ wn →
581
+
582
+
583
+ k=1
584
+ �Γ(a(β + 1) + 1)Γ(β + k)
585
+ Γ(a(β + 1) + k)Γ(β + 1)
586
+ �2
587
+ < ∞
588
+ as
589
+ n → ∞.
590
+ (3.5)
591
+ In order to investigate the asymptotic behavior of (Sn)n∈N, we first introduce an arbitrarily
592
+ fixed test non-zero vector u ∈ Rd and we define
593
+ Mn(u) = uT Mn
594
+ and
595
+ Nn(u) = uT Nn
596
+ for each
597
+ n ∈ N.
598
+ It is then clear that (Mn(u))n∈N (Nn(u))n∈N are real-valued locally square-integrable martingales
599
+ for each fixed u ∈ Rd.
600
+ We further infer that (Sn(u))n∈N satisfies an equation analogous to (3.2). In
601
+ this setting, we have reduced the multidimensional martingales to real-valued martingales without
602
+ loss of generality. This technique greatly simplifies our martingale analysis. From now on, we fix
603
+ the test vector u ∈ Rd and we introduce the two-dimensional martingale (Ln(u))n∈N defined as
604
+ Ln(u) =
605
+
606
+ Nn(u)
607
+ Mn(u)
608
+
609
+ for each
610
+ n ∈ N.
611
+ (3.6)
612
+ Denote the martingale increment ϵn+1 = Yn+1 − γnYn for each n.
613
+ Then (ϵn)n∈N satisfies the
614
+ martingale difference relation E[ϵn+1|Fn] = 0. We obtain that
615
+ ∆Ln+1(u) = Ln+1(u) − Ln(u) =
616
+
617
+ Sn+1(u) − Sn(u) +
618
+ a(β+1)
619
+ β−a(β+1)
620
+
621
+ µ−1
622
+ n+1Yn+1(u) − µ−1
623
+ n Yn(u)
624
+
625
+ an+1Yn+1(u) − anYn(u)
626
+
627
+ =
628
+
629
+ βµ−1
630
+ n+1
631
+ β−a(β+1)
632
+
633
+ µn+1Xn+1(u) − (γn − 1)Yn(u)
634
+
635
+ an+1ϵn+1(u)
636
+
637
+ =
638
+
639
+ βµ−1
640
+ n+1
641
+ β−a(β+1)
642
+ an+1
643
+
644
+ ϵn+1(u).
645
+ (3.7)
646
+ 4. Scaling limit and convergence
647
+ In this section, we discuss the scaling limit as well as the almost sure convergence in the
648
+ diffusive, critical and the superdiffusive regimes, depending on the value of p with respect to
649
+ (4dβ +2d+1)/(4d(β +1)). We also give the quadratic strong law in the diffusive regime as well as
650
+ in the critical regime. Afterwards, the mean square convergence is established in the superdiffusive
651
+ regime.
652
+ 4.1. The diffusive regime.
653
+ Theorem 4.1. We have the almost sure convergence
654
+ 1
655
+ nSn → 0
656
+ as
657
+ n → ∞
658
+ P-a.s.
659
+
660
+ 8
661
+ JIAMING CHEN AND LUCILE LAULIN
662
+ Proof. We have from [18, Theorem 4.3.15] again that, for all γ > 0,
663
+ ∥Mn∥2
664
+ λmax⟨M⟩n
665
+ = o
666
+ ��
667
+ log Tr⟨M⟩n
668
+ �1+γ�
669
+ P-a.s.
670
+ (4.1)
671
+ From equation (A.9) and the fact that λmax⟨M⟩n ≤ Tr⟨M⟩n ≤ wn, we get
672
+ ∥Mn∥2 = o
673
+
674
+ wn
675
+
676
+ log wn
677
+ �1+γ�
678
+ P-a.s.
679
+ (4.2)
680
+ By (3.3), we observe
681
+ ∥Mn∥2 = o
682
+
683
+ n1−2(a(β+1)−β)�
684
+ log n
685
+ �1+γ�
686
+ P-a.s.
687
+ Since Mn = anYn, we have from equations (2.5) and (2.6)
688
+ ∥Yn∥2
689
+ (nµn+1)2 = o
690
+
691
+ n−1�
692
+ log n
693
+ �1+γ�
694
+ P-a.s.
695
+ which implies
696
+ Yn
697
+ nµn+1
698
+ → 0
699
+ as
700
+ n → ∞
701
+ P-a.s.
702
+ By (A.10) and [18, Theorem 4.3.15] again, we find that
703
+ ∥Nn∥2 = o
704
+
705
+ n
706
+
707
+ log n
708
+ �1+γ�
709
+ P-a.s.
710
+ (4.3)
711
+ Moreover, we obtain from equation (3.2)
712
+ 1
713
+ n2
714
+ ����Sn +
715
+ a(β + 1)
716
+ (β − a(β + 1))µn+1
717
+ Yn
718
+ ����
719
+ 2
720
+ = o
721
+
722
+ n−1�
723
+ log n
724
+ �1+γ�
725
+ P-a.s.
726
+ Hence, we conclude that
727
+ Sn
728
+ n +
729
+ a(β + 1)
730
+ β − a(β + 1) ·
731
+ Yn
732
+ nµn+1
733
+ → 0
734
+ as
735
+ n → ∞
736
+ P-a.s.
737
+ and the proof is complete.
738
+
739
+ Theorem 4.2. We have the quadratic strong law
740
+ 1
741
+ log n
742
+ n
743
+
744
+ k=1
745
+ SkST
746
+ k
747
+ k2
748
+
749
+ 2β + 1 − a
750
+ (1 − a)(1 − 2(a(β + 1) − β)) · 1
751
+ dId
752
+ as
753
+ n → ∞
754
+ P-a.s.
755
+ Proof. We will check that all the conditions of [32, Theorem A.3] are satisfied, see also [14, 41].
756
+ The condition (H.1) is satisfied thanks to Lemma A.4 while the condition (H.2) directly follows
757
+ from Lemma A.5 and the condition (H.4) is exactly the statement of Lemma A.7. Therefore,
758
+ 1
759
+ log
760
+
761
+ det V −1
762
+ n
763
+ �2
764
+ n
765
+
766
+ k=1
767
+ �(det Vk)2 − (det Vk+1)2
768
+ (det Vk)2
769
+
770
+ VkLk(u)Lk(u)T V T
771
+ k → 1
772
+ duT uVt=1
773
+ as n → ∞ P-a.s. On the one hand, we have from (A.24) that
774
+ 1
775
+ log n
776
+ n
777
+
778
+ k=1
779
+ �(det Vk)2 − (det Vk+1)2
780
+ (det Vk)2
781
+
782
+ VkLk(u)Lk(u)T V T
783
+ k → 2(1 − a)(β + 1)
784
+ d
785
+ uT uVt=1
786
+ (4.4)
787
+ as n → ∞ P-a.s. On the other hand, by (2.5), (2.6) and (A.24), we have
788
+ n
789
+ �(det Vn)2 − (det Vn+1)2
790
+ (det Vn)2
791
+
792
+ → 2(1 − a)(β + 1)
793
+ as
794
+ n → ∞
795
+ P-a.s.
796
+ Finally, we obtain from (A.17) and (4.4) that
797
+ 1
798
+ log n
799
+ n
800
+
801
+ k=1
802
+ uT SkST
803
+ k u
804
+ k2
805
+ =
806
+ 1
807
+ log n
808
+ n
809
+
810
+ k=1
811
+ vT VkLk(u)Lk(u)T V T
812
+ k v
813
+ k
814
+ → vT Vt=1v · 1
815
+ duT u
816
+ (4.5)
817
+
818
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
819
+ 9
820
+ as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (4.5).
821
+
822
+ Theorem 4.3. The MARW admits a scaling limit at the diffusive regime, or convergence in
823
+ distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that
824
+ � 1
825
+ √nS⌊nt⌋, t ≥ 0
826
+
827
+ =⇒
828
+
829
+ Wt, t ≥ 0
830
+
831
+ where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process such that W0 = 0 and with
832
+ covariance
833
+ E
834
+
835
+ WsW T
836
+ t
837
+
838
+ =
839
+ a(β + 1)(1 − a) + aβ
840
+ (2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a)s
841
+ � t
842
+ s
843
+ �a−β(1−a)
844
+ · 1
845
+ dId
846
+ +
847
+ β
848
+ (β(1 − a) − a)(1 − a)s · 1
849
+ dId
850
+ for all
851
+ 0 ≤ s ≤ t < ∞.
852
+ (4.6)
853
+ Proof. We will check that all the conditions of [32, Theorem A.2] are satisfied, see also [14, 41].
854
+ The condition (H.1) is satisfied thanks to Lemma A.4 while the condition (H.2) directly follows
855
+ from Lemma A.5 and the condition (H.3) is exactly the statement of Lemma A.6. Consequently,
856
+ we have the convergence in distribution in the Skorokhod space D(R+) such that
857
+
858
+ VnL⌊nt⌋(u), t ≥ 0
859
+
860
+ =⇒
861
+
862
+ Wt(u), t ≥ 0
863
+
864
+ where (Wt(u))t≥0 is a continuous R2-valued centered Gaussian process such that W0 = 0 and with
865
+ covariance
866
+ E
867
+
868
+ Ws(u)Wt(u)T �
869
+ = 1
870
+ duT uVs
871
+ for all
872
+ 0 ≤ s ≤ t < ∞.
873
+ From (2.5), (2.6), and (3.2), we see that S⌊nt⌋(u) is asymptotically equivalent to
874
+ N⌊nt⌋(u) + tβ−a(β+1)
875
+ a(β + 1)
876
+ β − a(β + 1)(anµn)−1M⌊nt⌋(u)
877
+ P-a.s.
878
+ Multiplying on the left side by vt = (1, ta(β+1)−β)T , we obtain
879
+ � 1
880
+ √nS⌊nt⌋(u), t ≥ 0
881
+
882
+ =⇒
883
+
884
+ Wt(u), t ≥ 0
885
+
886
+ with Wt(u) = vT
887
+ t Wt(u). Hereafter, when 0 ≤ s ≤ t < ∞, we have the covariance
888
+ E
889
+
890
+ Ws(u)Wt(u)T �
891
+ = vT
892
+ s E
893
+
894
+ Ws(u)Wt(u)T �
895
+ vt = 1
896
+ d(uT u)vT
897
+ s Vsvt.
898
+ (4.7)
899
+ Solving (4.7), we have
900
+ E
901
+
902
+ WsW T
903
+ t
904
+
905
+ = 1
906
+ dvT
907
+ s Vsvt
908
+ for all
909
+ 0 ≤ s ≤ t < ∞
910
+ and the assertion (4.6) is verified.
911
+
912
+ 4.2. The critical regime.
913
+ Theorem 4.4. We have the almost sure convergence
914
+ 1
915
+ √n log nSn → 0
916
+ as
917
+ n → ∞
918
+ P-a.s.
919
+ Proof. We still have (4.1) and (4.2) such that
920
+ ∥Mn∥2 = o
921
+
922
+ wn
923
+
924
+ log wn
925
+ �1+γ�
926
+ for all
927
+ γ > 0
928
+ P-a.s.
929
+ However, in the critical regime, we have (3.4) rather than (3.3), and
930
+ wn
931
+ log n →
932
+ �Γ(β + 1 + 1
933
+ 2)
934
+ Γ(β + 1)
935
+ �2
936
+ as
937
+ n → ∞.
938
+
939
+ 10
940
+ JIAMING CHEN AND LUCILE LAULIN
941
+ Since (2.5), (2.6), and since Mn = anYn, we observe for all γ > 0 that
942
+ ∥Yn∥2
943
+ n(log n)2µ2n
944
+ = o
945
+
946
+ (log n)−1�
947
+ log log n
948
+ �1+γ�
949
+ P-a.s.
950
+ In this regard
951
+ Yn
952
+ √n log nµn
953
+ → 0
954
+ as
955
+ n → ∞
956
+ P-a.s.
957
+ (4.8)
958
+ Similarly, we still have (A.10) and
959
+ ∥Nn∥2 = o
960
+
961
+ n
962
+
963
+ log n
964
+ �1+γ�
965
+ for all
966
+ γ > 0
967
+ P-a.s.
968
+ Then
969
+ ∥Nn∥2
970
+ n(log n)2 = o
971
+
972
+ (log n)γ−1�
973
+ for all
974
+ γ ∈ (0, 1)
975
+ P-a.s.
976
+ and therefore
977
+ Nn
978
+ √n log n → 0
979
+ as
980
+ n → ∞
981
+ P-a.s.
982
+ By (3.2), we can hereafter conclude that
983
+ Sn
984
+ √n log n +
985
+ a(β + 1)
986
+ β − a(β + 1) ·
987
+ Yn
988
+ √n log nµn
989
+ → 0
990
+ as
991
+ n → ∞
992
+ P-a.s.
993
+ Combining with (4.8), the assertion is verified.
994
+
995
+ Theorem 4.5. We have the quadratic strong law
996
+ 1
997
+ log log n
998
+ n
999
+
1000
+ k=1
1001
+ SkST
1002
+ k
1003
+ (k log k)2 → (2β + 1)2 · 1
1004
+ dId
1005
+ as
1006
+ n → ∞
1007
+ P-a.s.
1008
+ Proof. We will check that all the conditions of [32, Theorem A.3] are satisfied. The condition
1009
+ (H.1) is satisfied thanks to Lemma A.8 while the condition (H.2) directly follows from Lemma
1010
+ A.9 and the condition (H.4) is exactly the statement of Lemma A.10. Therefore,
1011
+ 1
1012
+ log
1013
+
1014
+ det W −1
1015
+ n
1016
+ �2
1017
+ n
1018
+
1019
+ k=1
1020
+ �(det Wk)2 − (det Wk+1)2
1021
+ (det Wk)2
1022
+
1023
+ WkLk(u)Lk(u)T W T
1024
+ k → 1
1025
+ duT uW
1026
+ (4.9)
1027
+ as n → ∞ P-a.s. On the one hand, we have from (A.34)
1028
+ 1
1029
+ log log n
1030
+ n
1031
+
1032
+ k=1
1033
+ �(det Wk)2 − (det Wk+1)2
1034
+ (det Wk)2
1035
+
1036
+ WkLk(u)Lk(u)T W T
1037
+ k → 1
1038
+ duT uW
1039
+ as n → ∞ P-a.s. On the other hand, by (2.5), (2.6), and (A.33), we have
1040
+ n log n
1041
+ �(det Wk)2 − (det Wk+1)2
1042
+ (det Wk)2
1043
+
1044
+ → (2β + 1)2
1045
+ as
1046
+ n → ∞
1047
+ P-a.s.
1048
+ Then, we obtain from (A.17) and (4.9) that
1049
+ 1
1050
+ log log n
1051
+ n
1052
+
1053
+ k=1
1054
+ uT SkST
1055
+ k u
1056
+ (k log k)2 =
1057
+ 1
1058
+ log log n
1059
+ n
1060
+
1061
+ k=1
1062
+ wT WkLk(u)Lk(u)T W T
1063
+ k w
1064
+ k log k
1065
+ → (2β + 1)2
1066
+ d
1067
+ uT u
1068
+ (4.10)
1069
+ as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (4.10).
1070
+
1071
+ Theorem 4.6. The MARW admits a scaling limit at the critical regime, or convergence in dis-
1072
+ tribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that
1073
+
1074
+ 1
1075
+
1076
+ nt log n
1077
+ S⌊nt⌋, t ≥ 0
1078
+
1079
+ =⇒
1080
+
1081
+ (2β + 1)Bt, t ≥ 0
1082
+
1083
+
1084
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
1085
+ 11
1086
+ where (Bt)t≥0 is a continuous d-dimensional canonical Brownian motion with covariance
1087
+ E
1088
+
1089
+ BsBT
1090
+ t
1091
+
1092
+ = s · 1
1093
+ dId
1094
+ for all
1095
+ 0 ≤ s ≤ t < ∞.
1096
+ Proof. We will check that all the three conditions of [32, Theorem A.2] are satisfied, see also [42,
1097
+ Theorem 1]. First of all, by (3.4) and (A.7) we know that
1098
+ w−1/2
1099
+ n
1100
+ ⟨M(u)⟩⌊nt⌋w−1/2
1101
+ n
1102
+ → t
1103
+ d · uT u
1104
+ as
1105
+ n → ∞
1106
+ P-a.s.
1107
+ (4.11)
1108
+ Hence the condition (H.1) is satisfied. Notice that
1109
+ ⌊nt⌋
1110
+
1111
+ k=1
1112
+ 1
1113
+ wn
1114
+ E
1115
+
1116
+ ∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1
1117
+
1118
+
1119
+ ⌊nt⌋
1120
+
1121
+ k=1
1122
+ �w⌊nt⌋
1123
+ wn
1124
+ �2
1125
+ 1
1126
+ ϵ2w2
1127
+ ⌊nt⌋
1128
+ E
1129
+
1130
+ ∆Mk(u)4|Fk−1
1131
+
1132
+ ,
1133
+ (4.12)
1134
+ since (2.5), (2.6), and (A.21), we observe that
1135
+ ⌊nt⌋
1136
+
1137
+ k=1
1138
+ ��∆Mk(u)4�� ≤ C1(β)∥u∥4
1139
+ ⌊nt⌋
1140
+
1141
+ k=1
1142
+ (akµk)4 ≤ C2(β)∥u∥4
1143
+ ⌊nt⌋
1144
+
1145
+ k=1
1146
+ 1
1147
+ k2
1148
+ P-a.s.
1149
+ (4.13)
1150
+ with constants C1(β), C2(β) > 0. Therefore, by (4.12) and (4.13), we have
1151
+ ⌊nt⌋
1152
+
1153
+ k=1
1154
+ 1
1155
+ wn
1156
+ E
1157
+
1158
+ ∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1
1159
+
1160
+ ≤ C3(β)∥u∥4 · t2
1161
+ ϵ2 ·
1162
+ 1
1163
+ nt(log nt)2
1164
+ P-a.s.
1165
+ Simplifying the above expression, we obtain
1166
+ ⌊nt⌋
1167
+
1168
+ k=1
1169
+ 1
1170
+ wn
1171
+ E
1172
+
1173
+ ∆Mk(u)21{|∆Mk(u)|≥ϵ√wk}|Fk−1
1174
+
1175
+ → 0
1176
+ as
1177
+ n → ∞
1178
+ P-a.s.
1179
+ (4.14)
1180
+ Then the condition (H.2), or the Lindeberg condition, is satisfied by (4.14). In this particular case
1181
+ at critical regime, (4.11) implies that the condition (H.3) is satisfied. Hence
1182
+
1183
+ 1
1184
+ √wn
1185
+ M⌊nt⌋(u), t ≥ 0
1186
+
1187
+ =⇒
1188
+
1189
+ Bt(u), t ≥ 0
1190
+
1191
+ where (Bt(u))t≥0 is a continuous real-valued centered Gaussian process such that B0(u) = 0 and
1192
+ with covariance
1193
+ E
1194
+
1195
+ Bs(u)Bt(u)
1196
+
1197
+ = s
1198
+ d · uT u
1199
+ for all
1200
+ 0 ≤ s ≤ t < ∞.
1201
+ In the critical regime, from (3.2) we can write
1202
+ S⌊nt⌋(u) = N⌊nt⌋(u) + (2β + 1) M⌊nt⌋(u)
1203
+ a⌊nt⌋µ⌊nt⌋
1204
+ .
1205
+ (4.15)
1206
+ From (A.8) we know that
1207
+ ⟨N(u)⟩⌊nt⌋
1208
+ nt log n
1209
+ → 0
1210
+ and
1211
+ N⌊nt⌋(u)
1212
+
1213
+ nt log n
1214
+ → 0
1215
+ as
1216
+ n → ∞
1217
+ P-a.s.
1218
+ (4.16)
1219
+ Using (2.5), (2.6), and (3.4) again, we conclude that
1220
+
1221
+ 1
1222
+
1223
+ nt log n
1224
+ S⌊nt⌋(u), t ≥ 0
1225
+
1226
+ =⇒
1227
+
1228
+ (2β + 1)Bt(u), t ≥ 0
1229
+
1230
+ with
1231
+ E
1232
+
1233
+ Bs(u)Bt(u)
1234
+
1235
+ = s · uT u
1236
+ d
1237
+ for all
1238
+ 0 ≤ s ≤ t.
1239
+ (4.17)
1240
+ Solving (4.17), we get
1241
+ E
1242
+
1243
+ BsBT
1244
+ t
1245
+
1246
+ = s · 1
1247
+ dId
1248
+ for all
1249
+ 0 ≤ s ≤ t.
1250
+
1251
+ 12
1252
+ JIAMING CHEN AND LUCILE LAULIN
1253
+ which completes the proof.
1254
+
1255
+ 4.3. The superdiffusive regime.
1256
+ Theorem 4.7. We have the almost sure convergence
1257
+ 1
1258
+ na(β+1)−β Sn → Lβ
1259
+ as
1260
+ n → ∞
1261
+ P-a.s.
1262
+ where the limiting Lβ is an Rd-valued random variable.
1263
+ Remark 4.1. In fact, from Theorem 4.8 below, we will see the random vector Lβ is non-degenerate.
1264
+ Proof. From (3.5) and (A.7), in the superdiffusive regime, we have
1265
+ Tr⟨M⟩n ≤ wn ≤
1266
+
1267
+
1268
+ k=1
1269
+ �Γ(a(β + 1) + 1)Γ(β + k)
1270
+ Γ(a(β + 1) + k)Γ(β + 1)
1271
+ �2
1272
+ < ∞
1273
+ for all
1274
+ n ∈ N.
1275
+ By [18, Theorem 4.3.15], this leads to
1276
+ Mn → M
1277
+ as
1278
+ n → ∞
1279
+ P-a.s.
1280
+ with
1281
+ M =
1282
+
1283
+
1284
+ k=1
1285
+ akϵk.
1286
+ By (3.1), Mn = anYn, and by (2.5), we observe that
1287
+ Yn
1288
+ na(β+1) →
1289
+ 1
1290
+ Γ(a(β + 1) + 1)M
1291
+ as
1292
+ n → ∞
1293
+ P-a.s.
1294
+ (4.18)
1295
+ Moreover, equations (4.3) still holds and, as 2a(β + 1) > 2β + 1 in the superdiffusive regime, we
1296
+ find that
1297
+ 1
1298
+ n2(a(β+1)−β)
1299
+ ����Sn +
1300
+ a(β + 1)
1301
+ (β − a(β + 1))µn+1
1302
+ Yn
1303
+ ����
1304
+ 2
1305
+ = o
1306
+
1307
+ n−(1−2a(β+1)+2β)�
1308
+ log n
1309
+ �1+γ�
1310
+ P-a.s.
1311
+ Thanks to (2.6), we obtain
1312
+ Sn
1313
+ na(β+1)−β +
1314
+ a(β + 1)
1315
+ β − a(β + 1) · Γ(β + 1)Yn
1316
+ na(β+1)
1317
+ → 0
1318
+ as
1319
+ n → ∞
1320
+ P-a.s.
1321
+ (4.19)
1322
+ Combining (4.18), it yields
1323
+ Sn
1324
+ na(β+1)−β → Lβ
1325
+ as
1326
+ n → ∞
1327
+ P-a.s.
1328
+ where
1329
+ Lβ =
1330
+ a(β + 1)
1331
+ a(β + 1) − β ·
1332
+ Γ(β + 1)
1333
+ Γ(a(β + 1) + 1)M
1334
+ (4.20)
1335
+ and the assertion follows.
1336
+
1337
+ Theorem 4.8. We have the following mean square convergence
1338
+ E
1339
+ �����
1340
+ 1
1341
+ na(β+1)−β Sn − Lβ
1342
+ ����
1343
+ 2�
1344
+ → 0
1345
+ as
1346
+ n → ∞.
1347
+ (4.21)
1348
+ Proof. For each test vector u ∈ Rd, we have
1349
+ E
1350
+
1351
+ Mn(u)2�
1352
+ = E
1353
+
1354
+ ⟨M(u)⟩n
1355
+
1356
+ ≤ 1
1357
+ dwnuT u
1358
+ for all
1359
+ n ∈ N.
1360
+ From (3.5), we obtain
1361
+ sup
1362
+ n≥1
1363
+ E
1364
+
1365
+ Mn(u)2�
1366
+ < ∞
1367
+ which implies that (Mn(u))n∈N is a martingale bounded in L2. Therefore
1368
+ E
1369
+
1370
+ |Mn(u) − M(u)|2�
1371
+ → 0
1372
+ as
1373
+ n → ∞.
1374
+ (4.22)
1375
+
1376
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
1377
+ 13
1378
+ Moreover, on the one hand (4.22) together with (4.18) implies that
1379
+ E
1380
+ �����
1381
+ 1
1382
+ na(β+1) Yn(u) − Y (u)
1383
+ ����
1384
+ 2�
1385
+ → 0
1386
+ as
1387
+ n → ∞.
1388
+ (4.23)
1389
+ On the other hand, from (A.8) we know that
1390
+ E
1391
+
1392
+ Nn(u)2�
1393
+ = E
1394
+
1395
+ ⟨N(u)⟩n
1396
+
1397
+ ≤ 1
1398
+ d
1399
+
1400
+ β
1401
+ β − a(β + 1)
1402
+ �2
1403
+ nuT u
1404
+ for all
1405
+ n ∈ N.
1406
+ Since a(β + 1) > β + 1
1407
+ 2 in the superdiffusive regime, we have
1408
+ E
1409
+ �����
1410
+ 1
1411
+ na(β+1)−β Nn(u)
1412
+ ����
1413
+ 2�
1414
+ → 0
1415
+ as
1416
+ n → ∞.
1417
+ (4.24)
1418
+ The proof is complete by combining (4.23) and (4.24).
1419
+
1420
+ Remark 4.2. The expected value of Lβ is
1421
+ E
1422
+
1423
+
1424
+
1425
+ = 0
1426
+ (4.25)
1427
+ whereas its quadratic deviation is
1428
+ E
1429
+
1430
+ LβLT
1431
+ β
1432
+
1433
+ =
1434
+
1435
+ a(β + 1)
1436
+ β − a(β + 1)
1437
+ �2 Γ(β + 1)2Γ(2(a − 1)(β + 1) + 1)
1438
+ Γ((2a − 1)(β + 1) + 1)2
1439
+ · 1
1440
+ dId.
1441
+ (4.26)
1442
+ Theorem 4.9. The MARW admits a scaling limit at the superdiffusive regime, or convergence in
1443
+ distribution, in the Skorokhod space D(R+) of c`adl`ag functions, in the sense that
1444
+
1445
+ 1
1446
+ na(β+1)−β S⌊nt⌋, t ≥ 0
1447
+
1448
+ =⇒
1449
+
1450
+ Qt, t ≥ 0
1451
+
1452
+ (4.27)
1453
+ with the limiting Qt = ta(β+1)−βLβ for all t ≥ 0.
1454
+ Proof. For all t ≥ 0 and from (4.19), we observe that
1455
+ S⌊nt⌋
1456
+ ⌊nt⌋a(β+1)−β +
1457
+ a(β + 1)
1458
+ β − a(β + 1) ·
1459
+ Y⌊nt⌋
1460
+ ⌊nt⌋a(β+1) → 0
1461
+ as
1462
+ n → ∞
1463
+ P-a.s.
1464
+ which implies
1465
+ 1
1466
+ na(β+1)−β Sn → ta(β+1)−βLβ
1467
+ as
1468
+ n → ∞
1469
+ P-a.s.
1470
+ (4.28)
1471
+ The P-a.s. convergence in (4.28)holds in all finite-dimensional distributions which characterizes
1472
+ the Skorokhod space topology. Hence, we have (4.27) and the assertion is verified.
1473
+
1474
+ 5. Scaling limit of the barycenter process
1475
+ The study of the scaling limit of the MARW (Sn)n∈N gives us some information on its asymptotic
1476
+ behavior.
1477
+ Nonetheless, to understand its pathwise geometric features, we need to discuss its
1478
+ barycenter, or center of mass process. Such topics have been raised and discussed in [36, 43]. In
1479
+ this Section, we turn our attention to the above-mentioned barycenter process (Gn)n∈N defined
1480
+ by
1481
+ Gn := 1
1482
+ n
1483
+ n
1484
+
1485
+ k=1
1486
+ Sk
1487
+ (5.1)
1488
+ Our work contains the discussion on the scaling limit and the almost sure convergence in the
1489
+ diffusive, critical and superdiffusive regimes. The quadratic strong law in the diffusive and crit-
1490
+ ical regimes is also discussed while the mean square convergence in the superdiffusive regime is
1491
+ established.
1492
+
1493
+ 14
1494
+ JIAMING CHEN AND LUCILE LAULIN
1495
+ 5.1. Almost sure convergence. The barycenter process was discussed in [8] for the elephant
1496
+ random walk in dimension d, which is a special case of the process we study here when β = 0. We
1497
+ first begin with the almost sure convergence.
1498
+ Theorem 5.1. We have the almost sure convergence, in the diffusive regime,
1499
+ 1
1500
+ nGn → 0
1501
+ as
1502
+ n → ∞
1503
+ P-a.s.
1504
+ (5.2)
1505
+ while in the critical regime,
1506
+ 1
1507
+ √n log nGn → 0
1508
+ as
1509
+ n → ∞
1510
+ P-a.s.
1511
+ (5.3)
1512
+ and, in the superdiffusive regime,
1513
+ 1
1514
+ na(β+1)−β Gn →
1515
+ 1
1516
+ 1 + a(β + 1) − β Lβ
1517
+ as
1518
+ n → ∞
1519
+ P-a.s.
1520
+ (5.4)
1521
+ where Lβ was characterized in Theorems 4.7 and 4.2.
1522
+ Proof. In the diffusive regime, from (5.1) we observe that
1523
+ 1
1524
+ nGn =
1525
+ n
1526
+
1527
+ k=1
1528
+ k
1529
+ n2 · 1
1530
+ k Sk =
1531
+ n
1532
+
1533
+ k=1
1534
+ 1
1535
+ k Ska′
1536
+ n,k
1537
+ with
1538
+ a′
1539
+ n,k = k
1540
+ n2 .
1541
+ Since �n
1542
+ k=1 a′
1543
+ n,k ≤ 1 for all n ∈ N and the almost sure convergence in Theorem 4.1, from Lemma
1544
+ A.12 we can conclude that
1545
+ 1
1546
+ nGn =
1547
+ n
1548
+
1549
+ k=1
1550
+ 1
1551
+ k Ska′
1552
+ n,k → 0
1553
+ as
1554
+ n → ∞
1555
+ P-a.s.
1556
+ such that (5.2) is verified. In the critical regime, we have from (5.1) that
1557
+ 1
1558
+ √n log nGn =
1559
+ 1
1560
+ n3/2 log n
1561
+ n
1562
+
1563
+ k=1
1564
+ Sk =
1565
+ n
1566
+
1567
+ k=1
1568
+ 1
1569
+
1570
+ k log k
1571
+ Ska′′
1572
+ n,k
1573
+ with
1574
+ a′′
1575
+ n,k = k1/2 log k
1576
+ n3/2 log n.
1577
+ Since �n
1578
+ k=1 a′′
1579
+ n,k ≤ 1 for all n ∈ N and the almost sure convergence in Theorem 4.4 holds, we get
1580
+ from Lemma A.12 hat
1581
+ 1
1582
+ √n log nGn =
1583
+ n
1584
+
1585
+ k=1
1586
+ 1
1587
+
1588
+ k log k
1589
+ Ska′′
1590
+ n,k → 0
1591
+ as
1592
+ n → ∞
1593
+ P-a.s.
1594
+ and we obtain (5.3). Finally, in the superdiffusive regime, we also get from (5.1) that
1595
+ 1
1596
+ na(β+1)−β Gn =
1597
+ 1
1598
+ n1+a(β+1)−β
1599
+ n
1600
+
1601
+ k=1
1602
+ Sn =
1603
+ n
1604
+
1605
+ k=1
1606
+ 1
1607
+ ka(β+1)−β Ska′′′
1608
+ n,k
1609
+ with
1610
+ a′′′
1611
+ n,k =
1612
+ ka(β+1)−β
1613
+ n1+a(β+1)−β .
1614
+ Since
1615
+ n
1616
+
1617
+ k=1
1618
+ a′′′
1619
+ n,k →
1620
+ 1
1621
+ 1 + a(β + 1) − β
1622
+ as
1623
+ n → ∞
1624
+ by a simple calculation, and because of the almost sure convergence in Theorem 4.7, we can
1625
+ conclude using Lemma A.13
1626
+ 1
1627
+ na(β+1)−β Gn →
1628
+ 1
1629
+ 1 + a(β + 1) − β Lβ
1630
+ as
1631
+ n → ∞
1632
+ P-a.s.
1633
+ and (5.4) is verified.
1634
+
1635
+ 5.2. Quadratic strong law.
1636
+
1637
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
1638
+ 15
1639
+ Theorem 5.2. In the diffusive regime, we have the quadratic strong law
1640
+ 1
1641
+ log n
1642
+ n
1643
+
1644
+ k=1
1645
+ GkGT
1646
+ k
1647
+ k2
1648
+ → 4I(a, β) · 1
1649
+ dId
1650
+ as
1651
+ n → ∞
1652
+ P-a.s.
1653
+ where I(a, β) is given explicitly
1654
+ I(a, β) =
1655
+ 1
1656
+ Γ(a(β + 1) + 1)2Γ(β + 1)2 ·
1657
+ 2a2(1 − a)(β + 1)3
1658
+ 3(β − a(β + 1))2(1 − a(β + 1) + β).
1659
+ Proof. We will check that all the three conditions of [32, Theorem A.2] are satisfied. Looking back
1660
+ to (5.1), we observe that
1661
+ Gn = 1
1662
+ n
1663
+ n
1664
+
1665
+ k=1
1666
+ Nk − 1
1667
+ n
1668
+ a(β + 1)
1669
+ β − a(β + 1)
1670
+ n
1671
+
1672
+ k=1
1673
+ 1
1674
+ akµk
1675
+ Mk = 1
1676
+ n
1677
+ n
1678
+
1679
+ k=1
1680
+ Nk − 1
1681
+ n
1682
+ a(β + 1)
1683
+ β − a(β + 1)
1684
+ n
1685
+
1686
+ k=1
1687
+ 1
1688
+ akµk
1689
+ k
1690
+
1691
+ l=1
1692
+ alϵl.
1693
+ Then, changing the order of summation, we have
1694
+ Gn = 1
1695
+ n
1696
+ n
1697
+
1698
+ k=1
1699
+ Nk − 1
1700
+ n
1701
+ a(β + 1)
1702
+ β − a(β + 1)
1703
+ n
1704
+
1705
+ k=1
1706
+ akϵk
1707
+ n
1708
+
1709
+ l=k
1710
+ 1
1711
+ alϵl
1712
+ = 1
1713
+ n
1714
+ n
1715
+
1716
+ k=1
1717
+ Nk − 1
1718
+ n
1719
+ a(β + 1)
1720
+ β − a(β + 1)
1721
+ n
1722
+
1723
+ k=1
1724
+ ak(δn − δk−1)ϵk
1725
+ where we define δn = �n
1726
+ k=1(akµk)−1 for all n ∈ N. Moreover, we denote
1727
+ Zn =
1728
+ n
1729
+
1730
+ k=1
1731
+ Nk −
1732
+ a(β + 1)
1733
+ β − a(β + 1)
1734
+ n
1735
+
1736
+ k=1
1737
+ akδk−1ϵk.
1738
+ such that we have
1739
+ Gn = 1
1740
+ nZn − δn
1741
+ n ·
1742
+ a(β + 1)
1743
+ β − a(β + 1)
1744
+ n
1745
+
1746
+ k=1
1747
+ akϵk = 1
1748
+ n
1749
+
1750
+ Zn −
1751
+ a(β + 1)
1752
+ β − a(β + 1)δnMn
1753
+
1754
+ .
1755
+ For a fixed text vector u ∈ Rd, we define
1756
+ Hn(u) =
1757
+
1758
+ Zn(u)
1759
+ Mn(u)
1760
+
1761
+ for all
1762
+ n ∈ N.
1763
+ (5.5)
1764
+ which implies
1765
+ ∆Hn(u) = Hn+1(u) − Hn(u) =
1766
+
1767
+ Nn+1(u)ϵn+1(u)−1 −
1768
+ a(β+1)
1769
+ β−a(β+1)an+1δn
1770
+ an+1
1771
+
1772
+ ϵn+1(u).
1773
+ Then, let
1774
+ Vn =
1775
+ 1
1776
+ n3/2
1777
+
1778
+ 1
1779
+ 0
1780
+ 0
1781
+ a(β+1)
1782
+ β−a(β+1)δn
1783
+
1784
+ and
1785
+ v =
1786
+
1787
+ 1
1788
+ −1
1789
+
1790
+ .
1791
+ Then it is immediate that
1792
+ vT VnHn(u) =
1793
+ 1
1794
+ √nGn
1795
+ for all
1796
+ n ∈ N
1797
+ (5.6)
1798
+ and that
1799
+ lim
1800
+ n→∞ Vn⟨H(u)⟩nV T
1801
+ n = lim
1802
+ n→∞
1803
+ 1
1804
+ n3
1805
+
1806
+ 1
1807
+ −1
1808
+ −1
1809
+ 1
1810
+ � n−1
1811
+
1812
+ k=1
1813
+
1814
+ a(β + 1)
1815
+ β − a(β + 1)
1816
+ �2
1817
+ δ2
1818
+ ka2
1819
+ k+1E
1820
+
1821
+ ϵk+1(u)2|Fk
1822
+
1823
+ = lim
1824
+ n→∞
1825
+ 1
1826
+ n3 ·
1827
+ a2(1 − a)(β + 1)3uT u
1828
+ d(β − a(β + 1))2(1 − a(β + 1) + β)
1829
+
1830
+ 1
1831
+ −1
1832
+ −1
1833
+ 1
1834
+ � n−1
1835
+
1836
+ k=1
1837
+ δ2
1838
+ ka2
1839
+ k+1µ2
1840
+ k+1
1841
+ P-a.s.
1842
+
1843
+ 16
1844
+ JIAMING CHEN AND LUCILE LAULIN
1845
+ By (2.5) and (2.6), we know that
1846
+ n−(1+a(β+1)−β)δn →
1847
+ 1
1848
+ 1 + a(β + 1) − β ·
1849
+ 1
1850
+ Γ(a(β + 1) + 1)Γ(β + 1)
1851
+ as
1852
+ n → ∞.
1853
+ Hence the above calculation leads us to
1854
+ Vn⟨H(u)⟩nV T
1855
+ n → I(a, β)uT u · 1
1856
+ d
1857
+
1858
+ 1
1859
+ −1
1860
+ −1
1861
+ 1
1862
+
1863
+ as
1864
+ n → ∞
1865
+ P-a.s.
1866
+ (5.7)
1867
+ where
1868
+ I(a, β) =
1869
+ 1
1870
+ 1 − 2(a(β + 1) − β) ·
1871
+ a2(1 − a)(β + 1)3
1872
+ (β − a(β + 1))2(1 − a(β + 1) + β).
1873
+ (5.8)
1874
+ Consequently, (5.7) ensures that the condition (H.1) is satisfied. Notice that by (2.3) and (3.1),
1875
+ there exists some constant C1(a, β) > 0 and similarly, by (2.5), (2.6), (A.22), there exists some
1876
+ other constant C2(a, β) > 0 such that
1877
+ ∥Nn∥2 ≤ C1(a, β)n2
1878
+ and
1879
+ a2
1880
+ kϵk(u)2 ≤ C2(a, β)n2δ−2
1881
+ n
1882
+ for all
1883
+ 1 ≤ k ≤ n.
1884
+ Moreover, notice that for all 1 ≤ k ≤ n,
1885
+ Vn∆Hk(u) =
1886
+ 1
1887
+ n3/2
1888
+
1889
+ Nk(u)ϵk(u)−1 −
1890
+ a(β+1)
1891
+ β−a(β+1)akδk−1
1892
+ a(β+1)
1893
+ β−a(β+1)akδn
1894
+
1895
+ ϵk(u).
1896
+ Hence, for all 1 ≤ k ≤ n, we observe that
1897
+ ∥Vn∆Hk(u)∥2 ≤ 4a2
1898
+ k
1899
+ n3
1900
+
1901
+ a(β + 1)
1902
+ β − a(β + 1)
1903
+ �2��β − a(β + 1)
1904
+ aka(β + 1)
1905
+ Nk(u)
1906
+ ϵk(u)
1907
+ �2
1908
+ + δ2
1909
+ k−1 + δ2
1910
+ n
1911
+
1912
+ ϵk(u)2 ≤ C(a, β)
1913
+ n
1914
+ (5.9)
1915
+ for some constant C(a, β) > 0. Consequently, we
1916
+ n
1917
+
1918
+ k=1
1919
+ E
1920
+
1921
+ ∥Vn∆Hk(u)∥4�
1922
+ ≤ 1
1923
+ nC(a, β) → 0
1924
+ as
1925
+ n → ∞
1926
+ P-a.s.
1927
+ since, for all ϵ > 0,
1928
+ n
1929
+
1930
+ k=1
1931
+ E
1932
+
1933
+ ∥Vn∆Hk(u)∥21{∥Vn∆Hk(u)∥>ϵ}|Fk−1
1934
+
1935
+ ≤ 1
1936
+ ϵ2
1937
+ n
1938
+
1939
+ k=1
1940
+ E
1941
+
1942
+ ∥Vn∆Hk(u)∥4�
1943
+ → 0
1944
+ as
1945
+ n → ∞
1946
+ P-a.s.
1947
+ (5.10)
1948
+ Then the condition (H.2), or the Lindeberg condition, is satisfied by (5.10). Hereafter, by (2.5),
1949
+ (2.6), and by the definition of δn, we know there exists some constant C′(a, β) ̸= 0 such that
1950
+ log
1951
+
1952
+ det V −1
1953
+ n
1954
+ �2
1955
+ log n
1956
+ → C′(a, β)
1957
+ as
1958
+ n → ∞.
1959
+ This ensures that there exists some other constant C′′(a, β) > 0 such that
1960
+
1961
+
1962
+ n=1
1963
+ 1
1964
+
1965
+ log
1966
+
1967
+ det V −1
1968
+ n
1969
+ �2�2 E
1970
+
1971
+ ∥Vn∆Hn(u)∥4|Fn−1
1972
+
1973
+ ≤ C2(a, β)
1974
+
1975
+
1976
+ n=1
1977
+ 1
1978
+ (log n)2 E
1979
+
1980
+ ∥Vn∆Hn(u)∥4|Fn−1
1981
+
1982
+ .
1983
+ Finally, using (5.9) leads to
1984
+
1985
+
1986
+ n=1
1987
+ 1
1988
+ (log n)2 ∥Vn∆Hn(u)∥4 ≤ C(a, β)
1989
+
1990
+
1991
+ n=1
1992
+ 1
1993
+ (n log n)2 < ∞
1994
+ P-a.s.
1995
+
1996
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
1997
+ 17
1998
+ for some constant C(a, β) > 0 depending only on a and β. The condition (H.4) is satisfied by
1999
+ combining the above with (5.10). On the one hand,
2000
+ 1
2001
+ log
2002
+
2003
+ det V −1
2004
+ n
2005
+ �2
2006
+ n
2007
+
2008
+ k=1
2009
+ �(det Vk)2 − (det Vk+1)2
2010
+ (det Vk)2
2011
+
2012
+ VkHk(u)Hk(u)T V T
2013
+ k → 1
2014
+ duT uV
2015
+ (5.11)
2016
+ as n → ∞ P-a.s. where
2017
+ V =
2018
+
2019
+ 1
2020
+ −1
2021
+ −1
2022
+ 1
2023
+
2024
+ I(a, β)
2025
+ and I(a, β) has been specified in (5.8). Then, we have
2026
+ 1
2027
+ log n
2028
+ n
2029
+
2030
+ k=1
2031
+ �(det Vk)2 − (det Vk+1)2
2032
+ (det Vk)2
2033
+
2034
+ VkHk(u)Hk(u)T V T
2035
+ k → 4 − 2(a(β + 1) − β)
2036
+ d
2037
+ uT uV
2038
+ as n → ∞ P-a.s. since
2039
+ log n
2040
+ log
2041
+
2042
+ det V −1
2043
+ n
2044
+ �2 → 4 − 2(a(β + 1) − β)
2045
+ as
2046
+ n → ∞.
2047
+ On the other hand, by (2.5) and (2.6), we have
2048
+ n
2049
+ �(det Vn)2 − (det Vn+1)2
2050
+ (det Vn)2
2051
+
2052
+ → 4 − 2
2053
+
2054
+ a(β + 1) − β
2055
+
2056
+ as
2057
+ n → ∞
2058
+ P-a.s.
2059
+ Using (5.6) and (5.11), we observe that
2060
+ 1
2061
+ log n
2062
+ n
2063
+
2064
+ k=1
2065
+ uT GkGT
2066
+ k u
2067
+ k2
2068
+ =
2069
+ 1
2070
+ log n
2071
+ n
2072
+
2073
+ k=1
2074
+ vT VkHk(u)Hk(u)T V T
2075
+ k v
2076
+ k
2077
+ → vT V v · 1
2078
+ duT u
2079
+ as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (4.5).
2080
+
2081
+ Theorem 5.3. In the critical regime, we have the quadratic strong law
2082
+ 1
2083
+ log log n
2084
+ n
2085
+
2086
+ k=1
2087
+ GkGT
2088
+ k
2089
+ (k log k)2 → 4(2β + 1)2
2090
+ 9
2091
+ · 1
2092
+ dId
2093
+ as
2094
+ n → ∞
2095
+ P-a.s.
2096
+ Proof. We will check that all the three conditions of [32, Theorem A.2] are satisfied. Denote
2097
+ Wn =
2098
+ 1
2099
+ n√n log n
2100
+
2101
+ 1
2102
+ 0
2103
+ 0
2104
+ a(β+1)
2105
+ β−a(β+1)δn
2106
+
2107
+ and
2108
+ w =
2109
+
2110
+ 1
2111
+ −1
2112
+
2113
+ .
2114
+ Then, for H defined in (5.5), it is clear that
2115
+ wT WnHn(u) =
2116
+ 1
2117
+ √n log nGn
2118
+ for all
2119
+ n ∈ N
2120
+ and that
2121
+ lim
2122
+ n→∞ Wn⟨H(u)⟩nW T
2123
+ n = lim
2124
+ n→∞
2125
+ 1
2126
+ n3 log n
2127
+
2128
+ 1
2129
+ −1
2130
+ −1
2131
+ 1
2132
+ � n−1
2133
+
2134
+ k=1
2135
+ (2β + 1)2δ2
2136
+ ka2
2137
+ k+1E
2138
+
2139
+ ϵk+1(u)2|Fk
2140
+
2141
+ = lim
2142
+ n→∞
2143
+ (2β + 1)2
2144
+ n3 log n · uT u
2145
+ d
2146
+
2147
+ 1
2148
+ −1
2149
+ −1
2150
+ 1
2151
+ � n−1
2152
+
2153
+ k=1
2154
+ δ2
2155
+ ka2
2156
+ k+1µ2
2157
+ k+1
2158
+ P-a.s.
2159
+ By (2.5) and (2.6), we know that
2160
+ n−3/2δn → 2
2161
+ 3 ·
2162
+ Γ(β + 1)
2163
+ Γ(β + 1 + 1
2164
+ 2)
2165
+ as
2166
+ n → ∞.
2167
+
2168
+ 18
2169
+ JIAMING CHEN AND LUCILE LAULIN
2170
+ Hence, the above calculation leads us to
2171
+ Wn⟨H(u)⟩nW T
2172
+ n → I(β)uT u · 1
2173
+ d
2174
+
2175
+ 1
2176
+ −1
2177
+ −1
2178
+ 1
2179
+
2180
+ as
2181
+ n → ∞
2182
+ P-a.s.
2183
+ with
2184
+ I(β) = 4(2β + 1)2
2185
+ 9
2186
+ .
2187
+ (5.12)
2188
+ Consequently, the condition (H.1) is satisfied thanks to (5.12). Notice that by (2.3) and (3.1),
2189
+ there exists some constant C1(β) > 0 and similarly, there exists some constant C2(β) > 0 such
2190
+ that
2191
+ ∥Nn∥2 ≤ C1(β)n2
2192
+ and
2193
+ a2
2194
+ kϵk(u)2 ≤ C2(β)n2δ−2
2195
+ n log n
2196
+ for all
2197
+ 1 ≤ k ≤ n.
2198
+ Then, notice for all 1 ≤ k ≤ n that
2199
+ Wn∆Hk(u) =
2200
+ 1
2201
+ n√n log n
2202
+
2203
+ Nk(u)ϵk(u)−1 −
2204
+ a(β+1)
2205
+ β−a(β+1)akδk−1
2206
+ a(β+1)
2207
+ β−a(β+1)akδn
2208
+
2209
+ ϵk(u).
2210
+ The ensures that, for all 1 ≤ k ≤ n,
2211
+ ∥Wn∆Hk(u)∥2 ≤
2212
+ 4a2
2213
+ k
2214
+ n3 log n(2β + 1)2
2215
+ ��
2216
+ (2β + 1)−2 Nk(u)
2217
+ ϵk(u)
2218
+ �2 + δ2
2219
+ k−1 + δ2
2220
+ n
2221
+
2222
+ ϵk(u)2 ≤ C(β)
2223
+ n
2224
+ (5.13)
2225
+ for some constant C(β) > 0. Hence,
2226
+ n
2227
+
2228
+ k=1
2229
+ E
2230
+
2231
+ ∥Wn∆Hk(u)∥4�
2232
+ ≤ 1
2233
+ nC(β) → 0
2234
+ as
2235
+ n → ∞
2236
+ P-a.s.
2237
+ since, for all ϵ > 0,
2238
+ n
2239
+
2240
+ k=1
2241
+ E
2242
+
2243
+ ∥Wn∆Hk(u)∥21{∥Wn∆Hk(u)∥>ϵ}|Fk−1
2244
+
2245
+ ≤ 1
2246
+ ϵ2
2247
+ n
2248
+
2249
+ k=1
2250
+ E
2251
+
2252
+ ∥Wn∆Hk(u)∥4�
2253
+ → 0
2254
+ as
2255
+ n → ∞.
2256
+ (5.14)
2257
+ Therefore, the condition (H.2), or the Lindeberg condition, is satisfied using (5.14). Hereafter, we
2258
+ know that
2259
+ log
2260
+
2261
+ det W −1
2262
+ n
2263
+ �2
2264
+ log log n
2265
+ → 4
2266
+ as
2267
+ n → ∞.
2268
+ This ensures that there exists some constant C2(β) > 0 such that
2269
+
2270
+
2271
+ n=1
2272
+ 1
2273
+
2274
+ log
2275
+
2276
+ det W −1
2277
+ n
2278
+ �2�2 E
2279
+
2280
+ ∥Wn∆Hn(u)∥4|Fn−1
2281
+
2282
+
2283
+
2284
+
2285
+ n=1
2286
+ C2(β)
2287
+ (log log n)2 E
2288
+
2289
+ ∥Wn∆Hn(u)∥4|Fn−1
2290
+
2291
+ .
2292
+ (5.15)
2293
+ We get from (5.13) that
2294
+
2295
+
2296
+ n=1
2297
+ 1
2298
+ (log log n)2 ∥Wn∆Hn(u)∥4 ≤ C(β)
2299
+
2300
+
2301
+ n=1
2302
+ 1
2303
+ (n log n log log n)2 < ∞
2304
+ P-a.s.
2305
+ for some constant C(β) > 0 depending only onβ. The condition (H.4) is satisfied using the above
2306
+ together with (5.15). Then,
2307
+ 1
2308
+ log
2309
+
2310
+ det W −1
2311
+ n
2312
+ �2
2313
+ n
2314
+
2315
+ k=1
2316
+ �(det Wk)2 − (det Wk+1)2
2317
+ (det Wk)2
2318
+
2319
+ WkHk(u)Hk(u)T W T
2320
+ k → 1
2321
+ duT uW
2322
+ as n → ∞ P-a.s. where
2323
+ W = 4(2β + 1)2
2324
+ 9
2325
+
2326
+ 1
2327
+ −1
2328
+ −1
2329
+ 1
2330
+
2331
+ .
2332
+
2333
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
2334
+ 19
2335
+ Furthermore, on the one hand we have
2336
+ 1
2337
+ log log n
2338
+ n
2339
+
2340
+ k=1
2341
+ �(det Wk)2 − (det Wk+1)2
2342
+ (det Wk)2
2343
+
2344
+ WkHk(u)Hk(u)T W T
2345
+ k → 1
2346
+ duT uW
2347
+ as n → ∞ P-a.s. since
2348
+ log log n
2349
+ log
2350
+
2351
+ det W −1
2352
+ n
2353
+ �2 → 1
2354
+ 4
2355
+ as
2356
+ n → ∞.
2357
+ On the other hand, we have
2358
+ n log n
2359
+ �(det Wn)2 − (det Wn+1)2
2360
+ (det Wn)2
2361
+
2362
+ → 1
2363
+ as
2364
+ n → ∞
2365
+ P-a.s.
2366
+ By (5.6) and (5.11), we observe that
2367
+ 1
2368
+ log log n
2369
+ n
2370
+
2371
+ k=1
2372
+ uT GkGT
2373
+ k u
2374
+ (k log k)2 =
2375
+ 1
2376
+ log log n
2377
+ n
2378
+
2379
+ k=1
2380
+ wT WkHk(u)Hk(u)T W T
2381
+ k w
2382
+ 4k log k
2383
+ → wT Ww · 1
2384
+ 4duT u
2385
+ (5.16)
2386
+ as n → ∞ P-a.s. Since u ∈ Rd is arbitrary, the assertion follows from (5.16).
2387
+
2388
+ Theorem 5.4. In the superdiffusive regime, we have the mean square convergence, given by
2389
+ E
2390
+ �����
2391
+ 1
2392
+ na(β+1)−β Gn −
2393
+ 1
2394
+ 1 + a(β + 1) − β Lβ
2395
+ ����
2396
+ 2�
2397
+ → 0
2398
+ as
2399
+ n → ∞.
2400
+ (5.17)
2401
+ Proof. For all test vector u ∈ Rd, it is immediate that
2402
+ E
2403
+ �����
2404
+ 1
2405
+ na(β+1)−β Gn(u) −
2406
+ 1
2407
+ 1 + a(β + 1) − β Lβ(u)
2408
+ ����
2409
+ 2�
2410
+ ≤ 2E
2411
+ �����
2412
+ 1
2413
+ n1+a(β+1)−β Zn(u)
2414
+ ����
2415
+ 2�
2416
+ + 2E
2417
+ �����
2418
+ 1
2419
+ n1+a(β+1)−β ·
2420
+ a(β + 1)
2421
+ a(β + 1) − β δnMn −
2422
+ 1
2423
+ 1 + a(β + 1) − β Lβ
2424
+ ����
2425
+ 2�
2426
+ .
2427
+ (5.18)
2428
+ By (4.20) and (5.7), the second term converges to zero. Looking back to the first term in (5.18),
2429
+ we observe
2430
+ E
2431
+ �����
2432
+ 1
2433
+ n1+a(β+1)−β Zn(u)
2434
+ ����
2435
+ 2�
2436
+
2437
+ 4
2438
+ n1+2(a(β+1)−β)
2439
+ n
2440
+
2441
+ k=1
2442
+ E
2443
+
2444
+ Nk(u)2�
2445
+ +
2446
+ 4
2447
+ n1+2(a(β+1)−β)
2448
+
2449
+ a(β + 1)
2450
+ a(β + 1) − β
2451
+ �2
2452
+ E
2453
+ ������
2454
+ n
2455
+
2456
+ k=1
2457
+ akδk−1ϵk(u)
2458
+ �����
2459
+ 2�
2460
+ .
2461
+ (5.19)
2462
+ The first term in (5.19) converges to zero because E[Nk(u)] ≤ (uT u)n for all 1 ≤ k ≤ n, and
2463
+ moreover, in the superdiffusive regime we have a(β +1) > β +1/2. The second term in (5.19) also
2464
+ converges to zero because
2465
+ n−(1+a(β+1)−β)δn →
2466
+ 1
2467
+ 1 + a(β + 1) − β ·
2468
+ 1
2469
+ Γ(1 + a(β + 1))Γ(β + 1)
2470
+ as
2471
+ n → ∞.
2472
+ Finally, using the above and that M(u) = �∞
2473
+ k=1 akϵk(u) is bounded in L2, the assertion follows.
2474
+
2475
+ 5.3. Scaling limit.
2476
+ Theorem 5.5. The barycenter process admits a scaling limit at the diffusive regime, or conver-
2477
+ gence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that
2478
+ � 1
2479
+ √nG⌊nt⌋, t ≥ 0
2480
+
2481
+ =⇒
2482
+
2483
+ 1
2484
+
2485
+ 0
2486
+ Wtr dr, t ≥ 0
2487
+
2488
+
2489
+ 20
2490
+ JIAMING CHEN AND LUCILE LAULIN
2491
+ where (Wt)t≥0 is a continuous Rd-valued centered Gaussian process define in Theorem 4.3 with its
2492
+ covariance defined in (4.6). In particular,
2493
+ E
2494
+ ��
2495
+ 1
2496
+
2497
+ 0
2498
+ Wsv dv
2499
+ ��
2500
+ 1
2501
+
2502
+ 0
2503
+ Wtu du
2504
+ �T �
2505
+ =
2506
+ β
2507
+ 3(β(1 − a) − a)(1 − a)s · 1
2508
+ dId
2509
+ +
2510
+ 2(a(β + 1)(1 − a) + aβ)
2511
+ 3(2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a)(1 + (1 − a)(β + 1))ta−β(1−a)s1−a+β(1−a) · 1
2512
+ dId
2513
+ (5.20)
2514
+ for all 0 ≤ s ≤ t < ∞.
2515
+ Proof. An easy calculation leads to
2516
+ lim
2517
+ n→∞
2518
+ 1
2519
+ ��nG⌊nt⌋ = lim
2520
+ n→∞
2521
+ 1
2522
+
2523
+ 0
2524
+ 1
2525
+ √nS⌊ntr⌋ dr =⇒
2526
+ 1
2527
+
2528
+ 0
2529
+ Wtr dr
2530
+ which ensures that G⌊nt⌋ is a continuous function of S⌊ntr⌋ in D([0, 1]). Then, the last convergence
2531
+ in law is due to the functional central limit Theorem 4.3, with (Wt)t≥0 defined there. Hence, the
2532
+ barycenter process (Gn)n∈N admits a Gaussian scaling limit in the diffusive regime as well, with
2533
+ covariance
2534
+ E
2535
+ ��
2536
+ 1
2537
+
2538
+ 0
2539
+ Wsv dv
2540
+ ��
2541
+ 1
2542
+
2543
+ 0
2544
+ Wtu du
2545
+ �T �
2546
+ = 2
2547
+ 1
2548
+
2549
+ 0
2550
+ u
2551
+
2552
+ 0
2553
+ E
2554
+
2555
+ WsvW T
2556
+ tu
2557
+
2558
+ dv du.
2559
+ Using (4.6), the formula (5.20) and the assertion follows.
2560
+
2561
+ Theorem 5.6. The barycenter process admits a scaling limit at the critical regime, or convergence
2562
+ in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that
2563
+
2564
+ 1
2565
+
2566
+ nt log n
2567
+ G⌊nt⌋, t ≥ 0
2568
+
2569
+ =⇒
2570
+
2571
+ 1
2572
+
2573
+ 0
2574
+ (2β + 1)Btr dr, t ≥ 0
2575
+
2576
+ where (Bt)t≥0 is a continuous Rd-valued centered Gaussian process define in Theorem 4.6 with its
2577
+ covariance defined in (4.17).
2578
+ Proof. For each r ∈ [0, 1], (3.2) and (4.11) implies that
2579
+ lim
2580
+ n→∞
2581
+ 1
2582
+
2583
+ nt log n
2584
+ · M⌊ntr⌋(u)
2585
+ a⌊ntr⌋µ⌊ntr⌋
2586
+ = lim
2587
+ n→∞
2588
+ 1
2589
+
2590
+ nt log n
2591
+
2592
+ ntr(log n + r
2593
+ t log r)
2594
+ �1/2Btr(u)
2595
+ P-a.s.
2596
+ for all u ∈ Rd. Moreover, (4.16) yields
2597
+ lim
2598
+ n→∞
2599
+ 1
2600
+
2601
+ nt log n
2602
+ N⌊ntr⌋(u) = lim
2603
+ n→∞ r1/2 ·
2604
+ 1
2605
+
2606
+ ntr log n
2607
+ N⌊ntr⌋(u) = 0
2608
+ P-a.s.
2609
+ for all u ∈ Rd. By (4.15), we have
2610
+
2611
+ 1
2612
+
2613
+ nt log n
2614
+ S⌊ntr⌋(u), t ≥ 0
2615
+
2616
+ =⇒
2617
+
2618
+ (2β + 1)Btr(u), t ≥ 0
2619
+
2620
+ for all u ∈ Rd and r ∈ [0, 1]. Hence, we use again
2621
+ lim
2622
+ n→∞
2623
+ 1
2624
+
2625
+ nt log n
2626
+ G⌊nt⌋ = lim
2627
+ n→∞
2628
+ 1
2629
+
2630
+ 0
2631
+ 1
2632
+
2633
+ nt log n
2634
+ S⌊ntr⌋ dr =⇒
2635
+ 1
2636
+
2637
+ 0
2638
+ (2β + 1)Btr dr
2639
+ and the assertion is verified.
2640
+
2641
+
2642
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
2643
+ 21
2644
+ Theorem 5.7. The barycenter process admits a scaling limit at the superdiffusive regime, or
2645
+ convergence in distribution, in the Skorokhod space D([0, 1]) of c`adl`ag functions, such that
2646
+
2647
+ 1
2648
+ na(β+1)−β G⌊nt⌋, t ≥ 0
2649
+
2650
+ =⇒
2651
+
2652
+ 1
2653
+
2654
+ 0
2655
+ Qtr dr, t ≥ 0
2656
+
2657
+ with the covariance specified in (5.3) and the limiting Lβ characterized in Theorem 4.8 and Qt =
2658
+ ta(β+1)−βLβ characterized in Theorem 4.9 for all t ≥ 0.
2659
+ Proof. Again, we find that
2660
+ lim
2661
+ n→∞
2662
+ 1
2663
+ na(β+1)−β G⌊nt⌋ =
2664
+ 1
2665
+
2666
+ 0
2667
+ 1
2668
+ na(β+1)−β S⌊ntr⌋ dr =⇒
2669
+ 1
2670
+
2671
+ 0
2672
+ Qtr dr
2673
+ which ensures that G⌊nt⌋ is a continuous function of S⌊ntr⌋ in D([0, 1]). Then, the last convergence
2674
+ in law is due to the functional central limit Theorem 4.9. Hence the barycenter process (Gn)n∈N
2675
+ admits a non-degenerate scaling limit in the superdiffusive regime as well, with covariance
2676
+ E
2677
+ ��
2678
+ 1
2679
+
2680
+ 0
2681
+ Qsv dv
2682
+ ��
2683
+ 1
2684
+
2685
+ 0
2686
+ Qtu du
2687
+ �T �
2688
+ = 2
2689
+ 1
2690
+
2691
+ 0
2692
+ u
2693
+
2694
+ 0
2695
+ E
2696
+
2697
+ QsvQT
2698
+ tu
2699
+
2700
+ dv du = ta(β+1)−βsa(β+1)−β
2701
+ (1 + a(β + 1) − β)2 E
2702
+
2703
+ LβLT
2704
+ β
2705
+
2706
+ = ta(β+1)−βsa(β+1)−β
2707
+ (1 + a(β + 1) − β)2
2708
+
2709
+ a(β + 1)
2710
+ β − a(β + 1)
2711
+ �2 Γ(2(a − 1)(β + 1) + 1)
2712
+ Γ((2a − 1)(β + 1) + 1)2 · 1
2713
+ dId
2714
+ for all 0 ≤ s ≤ t < ∞.
2715
+
2716
+ 6. Velocity of quadratic mean displacement
2717
+ In this Section, we investigate the velocity of the mean square displacement of the MARW.
2718
+ This quantitative estimates give us the information on how fast the limit Theorems in Section 4
2719
+ are carried on. Similar convergence velocities have been discussed in [20, 26], where the authors
2720
+ analyzed the convergence velocity of the moments of a one-dimensional elephant random walk of
2721
+ all orders. In the superdiffusive regime, the convergence velocity was discussed in [6]. Here, only
2722
+ the rate of quadratic moment convergence for the MARW in all of the three (diffusive, critical,
2723
+ and superdiffusive) regimes are discussed.
2724
+ Following the limit Theorems in Section 4, we expect the asymptotic behavior of the mean
2725
+ square displacement is as follows,
2726
+ E
2727
+
2728
+ SnST
2729
+ n
2730
+
2731
+
2732
+
2733
+
2734
+
2735
+
2736
+
2737
+
2738
+
2739
+
2740
+
2741
+
2742
+
2743
+ n ·
2744
+ (a−2β)(1−a)(β+1)+β(a+1)
2745
+ (2(β+1)(1−a)−1)(a−β(1−a))(1−a) · 1
2746
+ dId
2747
+ when
2748
+ a < 1 −
2749
+ 1
2750
+ 2(β+1)
2751
+ n log n · (2β + 1)2 · 1
2752
+ dId
2753
+ when
2754
+ a = 1 −
2755
+ 1
2756
+ 2(β+1)
2757
+ n2(a(β+1)−β) ·
2758
+
2759
+ a(β+1)
2760
+ β−a(β+1)
2761
+ �2
2762
+ Γ(2(a−1)(β+1)+1)
2763
+ Γ((2a−1)(β+1)+1)2 · 1
2764
+ dId
2765
+ when
2766
+ a > 1 −
2767
+ 1
2768
+ 2(β+1),
2769
+ (6.1)
2770
+ where the notation ∼ indicates two sequences an ∼ bn if and only if an/bn → 1 as n → ∞.
2771
+ The aim of this Section is not only to show that the above estimates (6.1) are valid, but also
2772
+ to investigate the exact velocity of their convergence in the diffusive and critical regime.
2773
+ 6.1. Diffusive regime.
2774
+ Theorem 6.1. For all p < (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞,
2775
+ 1
2776
+ nE
2777
+
2778
+ SnST
2779
+ n
2780
+
2781
+
2782
+ (a − 2β)(1 − a)(β + 1) + β(a + 1)
2783
+ (2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a) · 1
2784
+ dId
2785
+ ∼ −(C1n−2(1−a)(β+1) + C2n−1) · 1
2786
+ dId.
2787
+
2788
+ 22
2789
+ JIAMING CHEN AND LUCILE LAULIN
2790
+ Proof. Take the vector v = (1, −1)T and Vn ∈ R2×2 as in (A.16). Then,
2791
+ 1
2792
+ √nSn(u) = vT VnLn(u),
2793
+ where Ln(u) = (Nn(u), Mn(u))T is as in (3.6). In particular,
2794
+ 1
2795
+ nuT E
2796
+
2797
+ SnST
2798
+ n
2799
+
2800
+ u = vT VnE
2801
+
2802
+ Ln(u)Ln(u)T �
2803
+ V T
2804
+ n v
2805
+ = vT VnE
2806
+ � �
2807
+ E
2808
+
2809
+ Nn(u)2�
2810
+ E
2811
+
2812
+ Nn(u)Mn(u)
2813
+
2814
+ E
2815
+
2816
+ Mn(u)Nn(u)
2817
+
2818
+ E
2819
+
2820
+ Mn(u)2�
2821
+ � �
2822
+ V T
2823
+ n v
2824
+ = vT VnE
2825
+ � �
2826
+ E
2827
+
2828
+ ⟨N(u)⟩n
2829
+
2830
+ E
2831
+
2832
+ ⟨N(u), M(u)⟩n
2833
+
2834
+ E
2835
+
2836
+ ⟨M(u), N(u)⟩n
2837
+
2838
+ E
2839
+
2840
+ ⟨M(u)⟩n
2841
+
2842
+ � �
2843
+ V T
2844
+ n v.
2845
+ Therefore,
2846
+ 1
2847
+ nuT E
2848
+
2849
+ SnST
2850
+ n
2851
+
2852
+ u = 1
2853
+ nE
2854
+
2855
+ ⟨N(u)⟩n
2856
+
2857
+ +
2858
+ 1
2859
+ na2nµ2n
2860
+
2861
+ a(β + 1)
2862
+ β − a(β + 1)
2863
+ �2
2864
+ E
2865
+
2866
+ ⟨M(u)⟩n
2867
+
2868
+
2869
+ 2
2870
+ nanµn
2871
+
2872
+ a(β + 1)
2873
+ β − a(β + 1)
2874
+
2875
+ E
2876
+
2877
+ ⟨M(u), N(u)⟩n
2878
+
2879
+ .
2880
+ Since the test vector u ∈ Rd is taken arbitrarily, we get from Lemmas A.15 and A.16 that
2881
+ 1
2882
+ nE
2883
+
2884
+ SnST
2885
+ n
2886
+
2887
+
2888
+ (a − 2β)(1 − a)(β + 1) + β(a + 1)
2889
+ (2(β + 1)(1 − a) − 1)(a − β(1 − a))(1 − a) · 1
2890
+ dId
2891
+ ∼ −(C1n−2(1−a)(β+1) + C2n−1) · 1
2892
+ dId
2893
+ as
2894
+ n → ∞.
2895
+
2896
+ 6.2. Critical regime.
2897
+ Theorem 6.2. When p = (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞,
2898
+ 1
2899
+ n log nE
2900
+
2901
+ SnST
2902
+ n
2903
+
2904
+ − (2β + 1)2 · 1
2905
+ dId ∼ −(C1(log n)−1 + C2n−1) · 1
2906
+ dId.
2907
+ Proof. Take w = (1, −1)T and Wn ∈ R2×2 as in (A.28). Then
2908
+ 1
2909
+ √n log nSn(u) = wT WnLn(u) as in
2910
+ (A.29) for all u ∈ Rd. In particular,
2911
+ 1
2912
+ n log nuT E
2913
+
2914
+ SnST
2915
+ n
2916
+
2917
+ u = wT WnE
2918
+
2919
+ Ln(u)Ln(u)T �
2920
+ W T
2921
+ n w.
2922
+ Hence,
2923
+ 1
2924
+ n log nuT E
2925
+
2926
+ SnST
2927
+ n
2928
+
2929
+ u = wT WnE
2930
+ � �
2931
+ E
2932
+
2933
+ ⟨N(u)⟩n
2934
+
2935
+ E
2936
+
2937
+ ⟨N(u), M(u)⟩n
2938
+
2939
+ E
2940
+
2941
+ ⟨M(u), N(u)⟩n
2942
+
2943
+ E
2944
+
2945
+ ⟨M(u)⟩n
2946
+
2947
+ � �
2948
+ W T
2949
+ n w.
2950
+ Therefore, we get by (3.4) as n → ∞,
2951
+ 1
2952
+ n log nuT E
2953
+
2954
+ SnST
2955
+ n
2956
+
2957
+ u =
2958
+ 1
2959
+ n log n
2960
+
2961
+ E
2962
+
2963
+ ⟨N(u)⟩n
2964
+
2965
+ + (2β + 1)2
2966
+ a2nµ2n
2967
+ E
2968
+
2969
+ ⟨M(u)⟩n
2970
+ ��
2971
+ ,
2972
+ which implies
2973
+ 1
2974
+ n log nE
2975
+
2976
+ SnST
2977
+ n
2978
+
2979
+ − (2β + 1)2 · 1
2980
+ dId ∼ −(C1(log n)−1 + C2n−1) · 1
2981
+ dId
2982
+ as
2983
+ n → ∞.
2984
+
2985
+ 6.3. Superdiffusive regime.
2986
+
2987
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
2988
+ 23
2989
+ Theorem 6.3. When p > (4dβ + 2d + 1)/4d(β + 1), we have, as n → ∞,
2990
+ 1
2991
+ n2(a(β+1)−β) E
2992
+
2993
+ SnST
2994
+ n
2995
+
2996
+
2997
+
2998
+ a(β + 1)
2999
+ β − a(β + 1)
3000
+ �2 Γ(2(a − 1)(β + 1) + 1)
3001
+ Γ((2a − 1)(β + 1) + 1)2 · 1
3002
+ dId
3003
+ ∼ −(C1n−4(a(β+1)−β)+1 + C2n−2(a(β+1)−β)).
3004
+ Proof. Similar to previous computations for the diffusive regime, we have for all u ∈ Rd,
3005
+ 1
3006
+ n2(a(β+1)−β) uT E
3007
+
3008
+ SnST
3009
+ n
3010
+
3011
+ u =
3012
+ 1
3013
+ n2(a(β+1)−β) E
3014
+
3015
+ ⟨N(u)⟩n
3016
+
3017
+ +
3018
+ 1
3019
+ n2(a(β+1)−β)a2nµ2n
3020
+
3021
+ a(β + 1)
3022
+ β − a(β + 1)
3023
+ �2
3024
+ E
3025
+
3026
+ ⟨M(u)⟩n
3027
+
3028
+
3029
+ 2
3030
+ n2(a(β+1)−β)anµn
3031
+
3032
+ a(β + 1)
3033
+ β − a(β + 1)
3034
+
3035
+ E
3036
+
3037
+ ⟨M(u), N(u)⟩n
3038
+
3039
+ .
3040
+ Hence, by (2.5), (2.6), (3.5) and since u ∈ Rd is arbitrary,
3041
+ 1
3042
+ n2(a(β+1)−β) E
3043
+
3044
+ SnST
3045
+ n
3046
+
3047
+
3048
+
3049
+ a(β + 1)
3050
+ β − a(β + 1)
3051
+ �2 Γ(2(a − 1)(β + 1) + 1)
3052
+ Γ((2a − 1)(β + 1) + 1)2 · 1
3053
+ dId
3054
+ ∼ −(C1n−4(a(β+1)−β)+1 + C2n−2(a(β+1)−β))
3055
+ as
3056
+ n → ∞.
3057
+
3058
+ 7. Cram´er moderate deviations
3059
+ In this Section, we discuss the Cram´er moderate deviations for the multidimensional reinforced
3060
+ random walk (Sn)n∈N. The similar statistical quantity as well as the Berry-Esseen bound for the
3061
+ one-dimensional elephant random walk (ERW) without amnesia-reinforcement has been given in
3062
+ [20]. Our derivation of Cram´er moderate deviations for the MARW does not rely on a Berry-
3063
+ Esseen bound. The discussion of such statistical quantities is expected to reveal the transience
3064
+ property and the central limit Theorems for the MARW. For this direction, readers are refereed
3065
+ to [3, 16]. Thanks to Lemma A.21 and Lemma A.22, we can properly state the Cram´er moderate
3066
+ deviations principles for the MARW.
3067
+ Theorem 7.1. In the diffusive and critical regimes, we have the following Cram´er moderate
3068
+ deviations for the MARW. Let (ϑn)n∈N ⊆ R be a non-decreasing sequence so that ϑn/√n → 0 as
3069
+ n → ∞. Take any non-empty Borel set B ⊆ Rd, then we have
3070
+
3071
+ inf
3072
+ x∈int B
3073
+ 1
3074
+ 2∥x∥2 ≤ lim inf
3075
+ n→∞ ϑ−2
3076
+ n log P
3077
+ �anµnSn
3078
+ ϑn√wn
3079
+ ∈ B
3080
+
3081
+ ≤ lim sup
3082
+ n→∞ ϑ−2
3083
+ n log P
3084
+ �anµnSn
3085
+ ϑn√wn
3086
+ ∈ B
3087
+
3088
+ ≤ − inf
3089
+ x∈cl B
3090
+ 1
3091
+ 2∥x∥2,
3092
+ where int B and cl B denote the interior and the closure of B ⊆ Rd, respectively.
3093
+ Proof. Our proof will only present the Cram´er moderate deviations for the MARW in the diffusive
3094
+ regime. The same property for the critical regime follows from exactly the same steps. First, take
3095
+ xB = infx∈B ∥x∥.
3096
+ Then it is obvious that infx∈cl B ∥x∥ ≤ xB and infx∈cl B ∥x∥2/2 ≤ x2
3097
+ B/2.
3098
+ Henceforth,
3099
+ P
3100
+ �anµnSn
3101
+ ϑn√wn
3102
+ ∈ B
3103
+
3104
+
3105
+ d
3106
+
3107
+ j=1
3108
+ P
3109
+ �����
3110
+ anµnSj
3111
+ n
3112
+ √wn
3113
+ ���� ≥ ϑnxB
3114
+ d
3115
+
3116
+
3117
+
3118
+ 1 − Φ(ϑnxB)
3119
+
3120
+ F(B, ϑ, n),
3121
+ (7.1)
3122
+
3123
+ 24
3124
+ JIAMING CHEN AND LUCILE LAULIN
3125
+ where we write
3126
+ F(B, ϑ, n) := 2Cd · exp
3127
+
3128
+ 1
3129
+ √n
3130
+ � ϑnxB
3131
+ 2d
3132
+ �3 + 1
3133
+ n
3134
+ � ϑnxB
3135
+ 2d
3136
+ �2 +
3137
+ 1
3138
+ √n(1 + 1
3139
+ 2 log n)(1 + ϑnxB
3140
+ 2d )
3141
+
3142
+ + 2Cd · exp
3143
+
3144
+ 1
3145
+ √n
3146
+ � ϑnxB
3147
+ 2d
3148
+ �3 +
3149
+ 1
3150
+ n2(1−a)(β+1)
3151
+ � ϑnxB
3152
+ 2d
3153
+ �2 +
3154
+ 1
3155
+ √n(1 + 1
3156
+ 2 log n)(n1/2−(1−a)(β+1) + ϑnxB
3157
+ 2d )
3158
+
3159
+ .
3160
+ Hence,
3161
+ lim sup
3162
+ n→∞ ϑ−2
3163
+ n log P
3164
+ �anµnSn
3165
+ ϑn√wn
3166
+ ∈ B
3167
+
3168
+ ≤ −1
3169
+ 2x2
3170
+ B ≤ − inf
3171
+ x∈cl B
3172
+ 1
3173
+ 2∥x∥2.
3174
+ To achieve the asymptotic lower bound, we first notice that this assertion automatically holds if
3175
+ int B = ∅, whence − infx∈∅ ∥x∥2/2 = −∞. Consequently, we assume that int B ̸= ∅. Notice that
3176
+ int B is open in Rd. Hence, for all ϵ∗ > 0 sufficiently small, we could find x∗ ∈ int B with
3177
+ 0 < 1
3178
+ 2∥x∗∥2 <
3179
+ inf
3180
+ x∈int B
3181
+ 1
3182
+ 2∥x∥2 + ϵ∗
3183
+ and
3184
+ 0 < min
3185
+ ���xj
3186
+
3187
+ �� : 1 ≤ j ≤ d
3188
+
3189
+ .
3190
+ Choose ϵ∗∗ sufficient small such that 0 < ϵ∗∗ <
3191
+ ���xj
3192
+
3193
+ ��� for each j = 1, . . . , d. Then,
3194
+ U(x∗, ϵ∗∗) ⊆ int B ⊆ B,
3195
+ where
3196
+ U(x∗, ϵ∗∗) :=
3197
+
3198
+ x ∈ Rd :
3199
+ ��xj − xj
3200
+
3201
+ �� < ϵ∗∗ for all j
3202
+
3203
+ .
3204
+ On the other hand,
3205
+ P
3206
+ �anµnSn
3207
+ ϑn√wn
3208
+ ∈ B
3209
+
3210
+ ≥ P
3211
+ �anµnSn
3212
+ √wn
3213
+ ∈ ϑn · U(x∗, ϵ∗∗)
3214
+
3215
+
3216
+ d
3217
+
3218
+ j=1
3219
+ P
3220
+
3221
+ ϑn(xj
3222
+ ∗ + ϵ∗∗) ≥ anµnSj
3223
+ n
3224
+ √wn
3225
+ ≥ ϑn(xj
3226
+ ∗ − ϵ∗∗)
3227
+
3228
+ .
3229
+ From Lemma A.21 and Lemma A.22, we know that
3230
+ lim
3231
+ n→∞ P
3232
+ �anµnSj
3233
+ n
3234
+ √wn
3235
+ ≥ ϑn(xj
3236
+ ∗ + ϵ∗∗)
3237
+ ��
3238
+ P
3239
+ �anµnSj
3240
+ n
3241
+ √wn
3242
+ ≥ ϑn(xj
3243
+ ∗ − ϵ∗∗)
3244
+
3245
+ = 0
3246
+ for each
3247
+ j.
3248
+ Similar to (7.1),
3249
+ lim inf
3250
+ n→∞ ϑ−2
3251
+ n log P
3252
+ �anµnSn
3253
+ ϑn√wn
3254
+ ∈ B
3255
+
3256
+ ≥ −1
3257
+ 2∥x∗ − ϵ∗∗∥2.
3258
+ Letting ϵ∗∗ → 0, we observe that
3259
+ lim inf
3260
+ n→∞ ϑ−2
3261
+ n log P
3262
+ �anµnSn
3263
+ ϑn√wn
3264
+ ∈ B
3265
+
3266
+ ≥ −1
3267
+ 2∥x∗∥2 ≥ −
3268
+ inf
3269
+ x∈int B
3270
+ 1
3271
+ 2∥x∥2 − ϵ∗.
3272
+ Since ϵ∗ > 0 was take arbitrarily, letting ϵ∗ → 0, we verify the assertion.
3273
+
3274
+ Appendix A. Technical Lemmas
3275
+ A.1. Asymptotics of the processes. We start by introducing the following processes that are
3276
+ of great influence on the behavior of the random walk. Let (e1, e2, . . . , ed) denote a canonical
3277
+ Euclidean basis of Rd. For each n ∈ N and 1 ≤ j ≤ d, define
3278
+ N X
3279
+ n (j) =
3280
+ n
3281
+
3282
+ k=1
3283
+ 1{Xj
3284
+ k̸=0}µk
3285
+ and
3286
+ Σn =
3287
+ d
3288
+
3289
+ j=1
3290
+ N X
3291
+ n (j)ejeT
3292
+ j ,
3293
+ (A.1)
3294
+ such that (Σn)n∈N is a matrix-valued process.
3295
+ Lemma A.1. We have the following almost sure convergence in the three regimes.
3296
+ 1
3297
+ nµn+1
3298
+ Σn →
3299
+ 1
3300
+ d(β + 1)Id
3301
+ as
3302
+ n → ∞
3303
+ P-a.s.
3304
+ (A.2)
3305
+
3306
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
3307
+ 25
3308
+ Proof. For each n ∈ N and 1 ≤ j ≤ d, define
3309
+ ΛX
3310
+ n (j) = N X
3311
+ n (j)
3312
+ n
3313
+ .
3314
+ (A.3)
3315
+ It follows from (A.1) that
3316
+ ΛX
3317
+ n+1(j) =
3318
+ n
3319
+ n + 1ΛX
3320
+ n (j) +
3321
+ 1
3322
+ n + 11{Xj
3323
+ n+1̸=0}µn+1.
3324
+ Moreover, we observe thanks to (A.12) that
3325
+ ΛX
3326
+ n+1(j) =
3327
+ n
3328
+ n + 1 · γnΛX
3329
+ n (j) +
3330
+ 1
3331
+ n + 11{Xj
3332
+ n+1̸=0}µn+1 − a(β + 1)
3333
+ n + 1 ΛX
3334
+ n (j)
3335
+ =
3336
+ n
3337
+ n + 1 · γnΛX
3338
+ n (j) + µn+1
3339
+ n
3340
+ δX
3341
+ n+1(j) + (1 − a)µn+1
3342
+ d(n + 1)
3343
+ with
3344
+ δX
3345
+ n+1(j) = 1{Xj
3346
+ n+1̸=0} − P
3347
+
3348
+ Xj
3349
+ n+1 ̸= 0|Fn
3350
+
3351
+ .
3352
+ Then, by (2.4) we know
3353
+ ΛX
3354
+ n (j) =
3355
+ 1
3356
+ nan
3357
+
3358
+ ΛX
3359
+ 1 (j) + 1 − a
3360
+ d
3361
+ n
3362
+
3363
+ k=2
3364
+ akµk + HX
3365
+ n (j)
3366
+
3367
+ (A.4)
3368
+ with
3369
+ HX
3370
+ n (j) =
3371
+ n
3372
+
3373
+ k=2
3374
+ akµkδX
3375
+ k (j).
3376
+ It is clear that for a fixed 1 ≤ j ≤ d, the real-valued process (HX
3377
+ n (j))n∈N is locally square-integrable
3378
+ since it is a finite sum. Afterwards, this process appears to be a martingale adapted to (Fn)n∈N
3379
+ because (δX
3380
+ n (j))n∈N satisfied the martingale difference relation E[δX
3381
+ n+1(j)|Fn] = 0. It is obvious
3382
+ that
3383
+ ⟨HX(j)⟩n ≤ wn =
3384
+ n
3385
+
3386
+ k=1
3387
+ (akµk)2
3388
+ P-a.s.
3389
+ Hence, we get by [18, Theorem 4.3.15] that for all γ > 0
3390
+ HX
3391
+ n (j)2
3392
+ ⟨HX(j)⟩n
3393
+ = o
3394
+ ��
3395
+ log⟨HX(j)⟩n
3396
+ �1+γ�
3397
+ P-a.s.
3398
+ (A.5)
3399
+ Since ⟨HX(j)⟩n ≤ wn and by (A.5), we obtain that
3400
+ HX
3401
+ n (j)2 = o
3402
+
3403
+ wn
3404
+
3405
+ log wn
3406
+ �1+γ�
3407
+ P-a.s.
3408
+ In the diffusive regime, by Lemma A.1 and (3.3), we have
3409
+ HX
3410
+ n (j)2 = o
3411
+
3412
+ n1−2(a(β+1)−β)�
3413
+ log n
3414
+ �1+γ�
3415
+ P-a.s.
3416
+ By (2.5) and (2.6), we observe that
3417
+ � HX
3418
+ n (j)
3419
+ nanµn+1
3420
+ �2
3421
+ = o
3422
+
3423
+ n−1�
3424
+ log n
3425
+ �1+γ�
3426
+ P-a.s.
3427
+ Hence
3428
+ HX
3429
+ n (j)
3430
+ nanµn+1
3431
+ → 0
3432
+ as
3433
+ n → ∞
3434
+ P-a.s.
3435
+ By (2.5) and (2.6) again, we observe further
3436
+ 1
3437
+ nanµn+1
3438
+ n
3439
+
3440
+ k=1
3441
+ akµk →
3442
+ 1
3443
+ (1 − a)(β + 1)
3444
+ as
3445
+ n → ∞.
3446
+ (A.6)
3447
+
3448
+ 26
3449
+ JIAMING CHEN AND LUCILE LAULIN
3450
+ Hence, we have
3451
+ µ−1
3452
+ n+1ΛX
3453
+ n (j) →→
3454
+ 1
3455
+ β + 1
3456
+ as
3457
+ n → ∞.
3458
+ By (A.3) and (A.4), we can then conclude that
3459
+ 1
3460
+ nµn+1
3461
+ Σn →
3462
+ 1
3463
+ d(β + 1)Id
3464
+ as
3465
+ n → ∞
3466
+ P-a.s.
3467
+ in the diffusive regime. In the critical regime, where a = 1 −
3468
+ 1
3469
+ 2(β+1), we have from (3.4))
3470
+ HX
3471
+ n (j)2 = o
3472
+
3473
+ log n
3474
+
3475
+ log log n
3476
+ �1+γ�
3477
+ P-a.s.
3478
+ Hence
3479
+ � HX
3480
+ n (j)
3481
+ nanµn+1
3482
+ �2
3483
+ = o
3484
+
3485
+ n−1 log n
3486
+
3487
+ log log n
3488
+ �1+γ�
3489
+ P-a.s.
3490
+ which implies that
3491
+ HX
3492
+ n (j)
3493
+ nanµn+1
3494
+ → 0
3495
+ as
3496
+ n → ∞
3497
+ P-a.s.
3498
+ Similar to the convergence in (A.6), in the critical regime, we observe
3499
+ 1
3500
+ nanµn+1
3501
+ n
3502
+
3503
+ k=1
3504
+ akµk → 1
3505
+ 2
3506
+ P-a.s.
3507
+ Hence, we conclude that
3508
+ µ−1
3509
+ n+1ΛX
3510
+ n (j) →
3511
+ 1
3512
+ d(β + 1)
3513
+ and
3514
+ 1
3515
+ nµn+1
3516
+ Σn →
3517
+ 1
3518
+ d(β + 1)Id
3519
+ as
3520
+ n → ∞
3521
+ P-a.s.
3522
+ which proves (A.2). In the superdiffusive regime, we have
3523
+ HX
3524
+ n (j)2 = o
3525
+
3526
+ 1
3527
+
3528
+ P-a.s.
3529
+ and then
3530
+ � HX
3531
+ n (j)
3532
+ nanµn+1
3533
+ �2
3534
+ = o
3535
+
3536
+ n−2(1−a)(β+1)�
3537
+ P-a.s.
3538
+ which implies
3539
+ HX
3540
+ n (j)
3541
+ nanµn+1
3542
+ → 0
3543
+ as
3544
+ n → ∞
3545
+ P-a.s.
3546
+ We can similarly show that
3547
+ µ−1
3548
+ n+1ΛX
3549
+ n (j) →
3550
+ 1
3551
+ β + 1
3552
+ as
3553
+ n → ∞.
3554
+ which then ensures that
3555
+ 1
3556
+ nµn+1
3557
+ Σn →
3558
+ 1
3559
+ d(β + 1)Id
3560
+ as
3561
+ n → ∞
3562
+ P-a.s.
3563
+ Consequently, the assertion is verified.
3564
+
3565
+ The next result follows directly from the definition of Mn and Nn
3566
+ Lemma A.2. We have the following formulas for the predictable matrix-valued quadratic varia-
3567
+ tions
3568
+ ⟨M⟩n = (a1µ1)2E
3569
+
3570
+ X1XT
3571
+ 1
3572
+
3573
+ +
3574
+ n−1
3575
+
3576
+ k=1
3577
+ a(β + 1)
3578
+ ka−2
3579
+ k+1
3580
+ µk+1Σk + 1 − a
3581
+ da−2
3582
+ k+1
3583
+ µ2
3584
+ k+1Id −
3585
+ �γk − 1
3586
+ a−1
3587
+ k+1
3588
+ �2
3589
+ YkY T
3590
+ k ,
3591
+ (A.7)
3592
+ and
3593
+ ⟨N⟩n =
3594
+
3595
+ β
3596
+ β − a(β + 1)
3597
+ �2
3598
+ E
3599
+
3600
+ X1XT
3601
+ 1
3602
+
3603
+ +
3604
+ n−1
3605
+
3606
+ k=1
3607
+ a(β + 1)
3608
+ kµk+1
3609
+ Σk + 1 − a
3610
+ d
3611
+ Id −
3612
+ �γk − 1
3613
+ µk+1
3614
+ �2
3615
+ YkY T
3616
+ k .
3617
+ (A.8)
3618
+
3619
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
3620
+ 27
3621
+ In particular, we have
3622
+ Tr⟨M⟩n = wn −
3623
+ n
3624
+
3625
+ k=1
3626
+ (γk − 1)2a2
3627
+ k+1∥Yk∥2,
3628
+ (A.9)
3629
+ and
3630
+ Tr⟨N⟩n =
3631
+
3632
+ β
3633
+ β − a(β + 1)
3634
+ �2
3635
+ n −
3636
+ n−1
3637
+
3638
+ k=1
3639
+ �a(β + 1)
3640
+ kµk+1
3641
+ �2
3642
+ ∥Yk∥2.
3643
+ (A.10)
3644
+ Lemma A.3. We have the following estimate for the matrix-valued conditional expectation.
3645
+ E
3646
+
3647
+ ϵn+1ϵT
3648
+ n+1|Fn
3649
+
3650
+ = a(β + 1)
3651
+ n
3652
+ µn+1Σn + 1 − a
3653
+ d
3654
+ µ2
3655
+ n+1Id − (γn − 1)2YnY T
3656
+ n .
3657
+ And as a consequence
3658
+ E
3659
+
3660
+ ∥ϵn+1∥2|Fn
3661
+
3662
+ = µ2
3663
+ n+1 − (γn − 1)2∥Yn∥2.
3664
+ Proof. Observe that
3665
+ E
3666
+
3667
+ ϵn+1ϵT
3668
+ n+1|Fn
3669
+
3670
+ = E
3671
+
3672
+ Yn+1Y T
3673
+ n+1|Fn
3674
+
3675
+ − γ2
3676
+ nYnY T
3677
+ n
3678
+ with
3679
+ E
3680
+
3681
+ Yn+1Y T
3682
+ n+1|Fn
3683
+
3684
+ = YnY T
3685
+ n + 2µn+1YnE
3686
+
3687
+ XT
3688
+ n+1|Fn
3689
+
3690
+ + µ2
3691
+ n+1E
3692
+
3693
+ Xn+1XT
3694
+ n+1|Fn
3695
+
3696
+ =
3697
+
3698
+ 1 + 2a(β + 1)
3699
+ n
3700
+
3701
+ YnY T
3702
+ n + µ2
3703
+ n+1E
3704
+
3705
+ Xn+1XT
3706
+ n+1|Fn
3707
+
3708
+ .
3709
+ (A.11)
3710
+ For all k ≥ 1, we know that XkXT
3711
+ k = �d
3712
+ j=1 1{Xj
3713
+ k̸=0}ejeT
3714
+ j . Then
3715
+ P
3716
+
3717
+ Xj
3718
+ n+1 ̸= 0|Fn
3719
+
3720
+ =
3721
+ n
3722
+
3723
+ k=1
3724
+ P
3725
+
3726
+ βn+1 = k
3727
+
3728
+ · P
3729
+
3730
+ (AnXk)j ̸= 0|Fn
3731
+
3732
+ =
3733
+ n
3734
+
3735
+ k=1
3736
+ 1{Xj
3737
+ k̸=0}P
3738
+
3739
+ An = ±Id
3740
+
3741
+ · (β + 1)µk
3742
+ nµn+1
3743
+ +
3744
+ n
3745
+
3746
+ k=1
3747
+
3748
+ 1 − 1{Xj
3749
+ k̸=0}
3750
+
3751
+ P
3752
+
3753
+ An = ±Jd
3754
+
3755
+ · (β + 1)µk
3756
+ nµn+1
3757
+ .
3758
+ Hence
3759
+ P
3760
+
3761
+ Xj
3762
+ n+1 ̸= 0|Fn
3763
+
3764
+ = β + 1
3765
+ nµn+1
3766
+ ·
3767
+
3768
+ P
3769
+
3770
+ An = +Id
3771
+
3772
+ − P
3773
+
3774
+ An = +Jd
3775
+ ��
3776
+ N X
3777
+ n (j) + 2P
3778
+
3779
+ An = +Jd
3780
+
3781
+ = a(β + 1)
3782
+ nµn+1
3783
+ N X
3784
+ n (j) + 1 − a
3785
+ d
3786
+ .
3787
+ (A.12)
3788
+ Therefore
3789
+ E
3790
+
3791
+ Xn+1XT
3792
+ n+1|Fn
3793
+
3794
+ =
3795
+ d
3796
+
3797
+ j=1
3798
+ P
3799
+
3800
+ Xj
3801
+ n+1 ̸= 0|Fn
3802
+
3803
+ ejeT
3804
+ j = a(β + 1)
3805
+ nµn+1
3806
+ Σn + 1 − a
3807
+ d
3808
+ Id.
3809
+ (A.13)
3810
+ And from (A.11) and (A.13) we can conclude that
3811
+ E
3812
+
3813
+ ϵn+1ϵT
3814
+ n+1|Fn
3815
+
3816
+ = E
3817
+
3818
+ Yn+1Y T
3819
+ n+1|Fn
3820
+
3821
+ − γ2
3822
+ nYnY T
3823
+ n
3824
+ =
3825
+
3826
+ 1 + 2a(β + 1)
3827
+ n
3828
+
3829
+ YnY T
3830
+ n + a(β + 1)
3831
+ n
3832
+ µn+1Σn + 1 − a
3833
+ d
3834
+ µ2
3835
+ n+1Id − γ2
3836
+ nYnY T
3837
+ n
3838
+ = a(β + 1)
3839
+ n
3840
+ µn+1Σn + 1 − a
3841
+ d
3842
+ µ2
3843
+ n+1Id − (γn − 1)2YnY T
3844
+ n .
3845
+ (A.14)
3846
+ On the other hand
3847
+ Tr(Σn) = nµn+1
3848
+ β + 1 .
3849
+ (A.15)
3850
+ Taking traces in (A.14) and by (A.15), we have
3851
+ E
3852
+
3853
+ ∥ϵn+1∥2|Fn
3854
+
3855
+ = µ2
3856
+ n+1 − (γn − 1)2∥Yn∥2
3857
+ which ensures that the assertion is verified.
3858
+
3859
+
3860
+ 28
3861
+ JIAMING CHEN AND LUCILE LAULIN
3862
+ A.2. Scaling limits of the random walk and the barycenter.
3863
+ A.2.1. The diffusive regime.
3864
+ Lemma A.4. For each n ∈ N and test vector u ∈ Rd, let
3865
+ Vn =
3866
+ 1
3867
+ √n
3868
+
3869
+ 1
3870
+ 0
3871
+ 0
3872
+ a(β+1)
3873
+ β−a(β+1)(anµn)−1
3874
+
3875
+ and
3876
+ v =
3877
+
3878
+ 1
3879
+ −1
3880
+
3881
+ .
3882
+ (A.16)
3883
+ Then
3884
+ vT VnLn(u) =
3885
+ 1
3886
+ √nSn(u).
3887
+ (A.17)
3888
+ And for all t ≥ 0, we have
3889
+ Vn⟨L(u)⟩⌊nt⌋V T
3890
+ n → uT u
3891
+ d Vt
3892
+ as
3893
+ n → ∞
3894
+ P-a.s.
3895
+ (A.18)
3896
+ where
3897
+ Vt =
3898
+ 1
3899
+ (β − a(β + 1))2
3900
+
3901
+ β2t
3902
+
3903
+ 1−at1+β−a(β+1)
3904
+
3905
+ 1−at1+β−a(β+1)
3906
+ a2(β+1)2
3907
+ 1−2a(β+1)+2β t1+2β−2a(β+1)
3908
+
3909
+ .
3910
+ (A.19)
3911
+ Proof. From Lemma A.3 and the fact that ⟨M(u)⟩n = uT ⟨M⟩nu, we see that
3912
+ ⟨M(u)⟩⌊nt⌋ = a2
3913
+ 1µ2
3914
+ 1uT E
3915
+
3916
+ X1XT
3917
+ 1
3918
+
3919
+ u
3920
+ +
3921
+ ⌊nt⌋−1
3922
+
3923
+ k=1
3924
+ a(β + 1)
3925
+ k
3926
+ a2
3927
+ k+1µk+1uT Σku + 1 − a
3928
+ d
3929
+ a2
3930
+ k+1µ2
3931
+ k+1uT u − (γk − 1)2a2
3932
+ k+1uT YkY T
3933
+ k u
3934
+ and
3935
+ ⟨N(u)⟩⌊nt⌋ =
3936
+
3937
+ β
3938
+ β − a(β + 1)
3939
+ �2
3940
+ uT E
3941
+
3942
+ X1XT
3943
+ 1
3944
+
3945
+ u
3946
+ +
3947
+
3948
+ β
3949
+ β − a(β + 1)
3950
+ �2 ⌊nt⌋−1
3951
+
3952
+ k=1
3953
+ a(β + 1)
3954
+ kµk+1
3955
+ uT Σku + 1 − a
3956
+ d
3957
+ uT u −
3958
+ �γk − 1
3959
+ µk+1
3960
+ �2
3961
+ uT YkY T
3962
+ k u.
3963
+ Using a similar token and Lemma A.1, we can work out the off-diagonal entries in ⟨L(u)⟩⌊nt⌋, and
3964
+ we obtain that
3965
+ lim
3966
+ n→∞ Vn⟨L(u)⟩⌊nt⌋V T
3967
+ n
3968
+ = lim
3969
+ n→∞
3970
+ uT u
3971
+ nd(β − a(β + 1))2
3972
+
3973
+
3974
+
3975
+ β2⌊nt⌋
3976
+ a(β+1)β
3977
+ anµn
3978
+ �⌊nt⌋−1
3979
+ k=0
3980
+ ak+1µk+1
3981
+ a(β+1)β
3982
+ anµn
3983
+ �⌊nt⌋−1
3984
+ k=0
3985
+ ak+1µk+1
3986
+
3987
+ a(β+1)
3988
+ anµn
3989
+ �2 �⌊nt⌋−1
3990
+ k=0
3991
+ (ak+1µk+1)2
3992
+
3993
+
3994
+
3995
+ =
3996
+ uT u
3997
+ d(β − a(β + 1))2
3998
+
3999
+ β2t
4000
+
4001
+ 1−at1−(a(β+1)−β)
4002
+
4003
+ 1−at1−(a(β+1)−β)
4004
+ a2(β+1)2
4005
+ 1−2(a(β+1)−β)t1−2(a(β+1)−β)
4006
+
4007
+ = uT u
4008
+ d Vt
4009
+ P-a.s.
4010
+ where the last equality is due to (2.5) and (2.6). Thus, it implies that
4011
+ 1
4012
+ nanµn
4013
+ n
4014
+
4015
+ k=1
4016
+ akµk →
4017
+ 1
4018
+ 1 − (a(β + 1) − β)
4019
+ and
4020
+ 1
4021
+ n(anµn)2
4022
+ n
4023
+
4024
+ k=1
4025
+ (akµk)2 →
4026
+ 1
4027
+ 1 − 2(a(β + 1) − β)
4028
+ as n → ∞. Hence, equation (A.18) holds and the assertion is then verified.
4029
+
4030
+ Lemma A.5. The MARW satisfies the Lindeberg condition in the diffusive regime. That is, for
4031
+ all t ≥ 0 and all ϵ > 0,
4032
+ ⌊nt⌋
4033
+
4034
+ k=1
4035
+ E
4036
+
4037
+ ∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1
4038
+
4039
+ → 0
4040
+ as
4041
+ n → ∞
4042
+ P-a.s.
4043
+
4044
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
4045
+ 29
4046
+ Proof. On the one hand, it is easy to compute from (3.7) and (A.16) that, for all 1 ≤ k ≤ n,
4047
+ Vn∆Lk(u) =
4048
+ 1
4049
+ √n(β − a(β + 1))µn
4050
+
4051
+ β µn
4052
+ µk
4053
+ a ak
4054
+ an
4055
+
4056
+ ϵk(u)
4057
+ which implies
4058
+ ∥Vn∆Lk(u)∥2 =
4059
+ 1
4060
+ n(β − a(β + 1))2
4061
+ �β2
4062
+ µ2
4063
+ k
4064
+ +
4065
+ a2a2
4066
+ k
4067
+ (anµn)2
4068
+
4069
+ ϵk(u)2.
4070
+ Hence
4071
+ ∥Vn∆Lk(u)∥4 ≤
4072
+ 2
4073
+ n2(β − a(β + 1))4
4074
+ �β4
4075
+ µ4
4076
+ k
4077
+ +
4078
+ a4a4
4079
+ k
4080
+ (anµn)4
4081
+
4082
+ ϵk(u)4.
4083
+ (A.20)
4084
+ On the other hand, from (2.5) we observe that
4085
+ 1
4086
+ na2n
4087
+ n
4088
+
4089
+ k=1
4090
+ a2
4091
+ k ≤ C1(a, β)−1
4092
+ and
4093
+ 1
4094
+ na4n
4095
+ n
4096
+
4097
+ k=1
4098
+ a4
4099
+ k ≤ C2(a, β)−1
4100
+ for all
4101
+ n ∈ N
4102
+ (A.21)
4103
+ and where C1(a, β), C2(a, β) > 0 are constants depending only on a and β. Moreover, we get that
4104
+ sup
4105
+ 1≤k≤n
4106
+ |ϵk(u)| ≤
4107
+ sup
4108
+ 1≤k≤n
4109
+ ∥ϵk∥∥u∥ ≤
4110
+ sup
4111
+ 1≤k≤n
4112
+ (β + 2)µk∥u∥ ≤ (β + 2)µn∥u∥.
4113
+ (A.22)
4114
+ Hence, we deduce from (A.21) and (A.22)
4115
+ n
4116
+
4117
+ k=1
4118
+ ∥Vn∆Lk(u)∥4 ≤
4119
+ 2
4120
+ n2(β − a(β + 1))4
4121
+ ��
4122
+ β(β + 2)
4123
+ �4∥u∥4 +
4124
+
4125
+ a(β + 2)
4126
+ �4∥u∥4
4127
+ C2(a, β)
4128
+
4129
+ → 0
4130
+ (A.23)
4131
+ as n → ∞ P-a.s. This implies that
4132
+ n
4133
+
4134
+ k=1
4135
+ E
4136
+
4137
+ ∥Vn∆Lk(u)∥4|Fk−1
4138
+
4139
+ → 0
4140
+ as
4141
+ n → ∞
4142
+ P-a.s.
4143
+ Therefore, for all ϵ > 0, we obtain
4144
+ n
4145
+
4146
+ k=1
4147
+ E
4148
+
4149
+ ∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1
4150
+
4151
+ ≤ 1
4152
+ ϵ2
4153
+ n
4154
+
4155
+ k=1
4156
+ E
4157
+
4158
+ ∥Vn∆Lk(u)∥4|Fk−1
4159
+
4160
+ → 0
4161
+ as n → ∞ P-a.s. This yields finally
4162
+ ⌊nt⌋
4163
+
4164
+ k=1
4165
+ E
4166
+
4167
+ ∥Vn∆Lk(u)∥21{∥VnLk(u)∥2>ϵ}|Fk−1
4168
+
4169
+ ≤ 1
4170
+ ϵ2
4171
+ ⌊nt⌋
4172
+
4173
+ k=1
4174
+ E
4175
+ ����(VnV −1
4176
+ ⌊nt⌋)V⌊nt⌋∆Lk(u)
4177
+ ���
4178
+ 4
4179
+ |Fk−1
4180
+
4181
+ → 0
4182
+ as n → ∞ P-a.s. since VnV −1
4183
+ ⌊nt⌋ converges as n → ∞.
4184
+
4185
+ Lemma A.6. The deterministic matrix Vt defined in (A.19) can be rewritten as
4186
+ Vt = tα1K1 + tα2K2 + · · · + tαqKq
4187
+ with q ∈ N, αj > 0 and each Kj is a symmetric matrix for all 1 ≤ j ≤ 1.
4188
+ Proof. A direct computation analoguous to the one in [32] shows that Vt = tα1K1+tα2K2+tα3K3,
4189
+ where
4190
+ α1 = 1,
4191
+ α2 = 1 − a(β + 1) > 0,
4192
+ α3 = 1 − 2a(β + 1) > 0
4193
+ since a < 1 −
4194
+ 1
4195
+ 2(β+1) is in the diffusive regime. Moreover
4196
+ K1 =
4197
+ β2
4198
+ (a(β + 1) − β)2
4199
+
4200
+ 1
4201
+ 0
4202
+ 0
4203
+ 0
4204
+
4205
+ ,
4206
+ K2 =
4207
+
4208
+ (1 − a)(a(β + 1) − β)2
4209
+
4210
+ 0
4211
+ 1
4212
+ 1
4213
+ 0
4214
+
4215
+ ,
4216
+ K3 =
4217
+ a2(β + 1)2
4218
+ (1 − 2a(β + 1) + 2β)(a(β + 1) − β)2
4219
+
4220
+ 0
4221
+ 0
4222
+ 0
4223
+ 1
4224
+
4225
+ .
4226
+
4227
+ 30
4228
+ JIAMING CHEN AND LUCILE LAULIN
4229
+
4230
+ Lemma A.7. Given the matrix-valued process (Vn)n∈N define in (A.16), we have
4231
+
4232
+
4233
+ n=1
4234
+ 1
4235
+
4236
+ log
4237
+
4238
+ det V −1
4239
+ n
4240
+ �2�2 E
4241
+
4242
+ ∥Vn∆Ln(u)∥4|Fn−1
4243
+
4244
+ < ∞
4245
+ P-a.s.
4246
+ Proof. From (A.16), it is immediate that
4247
+ det V −1
4248
+ n
4249
+ = β − a(β + 1)
4250
+ a(β + 1)
4251
+ nanµn.
4252
+ (A.24)
4253
+ By (2.5) and (2.6), we obtain
4254
+ log
4255
+
4256
+ det V −1
4257
+ n
4258
+ �2
4259
+ log n
4260
+ → 2(1 − a)(β + 1)
4261
+ as
4262
+ n → ∞
4263
+ P-a.s.
4264
+ (A.25)
4265
+ Hence there exists a constant C(a, β) > 0 depending only on a and β such that
4266
+
4267
+
4268
+ n=1
4269
+ 1
4270
+
4271
+ log
4272
+
4273
+ det V −1
4274
+ n
4275
+ �2�2 E
4276
+
4277
+ ∥Vn∆Ln(u)∥4|Fn−1
4278
+
4279
+ ≤ C(a, β)
4280
+
4281
+
4282
+ n=1
4283
+ 1
4284
+ (log n)2 E
4285
+
4286
+ ∥Vn∆Ln(u)∥4|Fn−1
4287
+
4288
+ .
4289
+ (A.26)
4290
+ Hereafter, equations (A.20), (A.22), (A.23) together imply that
4291
+
4292
+
4293
+ n=1
4294
+ 1
4295
+ (log n)2 ∥Vn∆Ln(u)∥4 ≤ C′(a, β)
4296
+
4297
+
4298
+ n=1
4299
+ 1
4300
+ (n log n)2 < ∞
4301
+ P-a.s.
4302
+ (A.27)
4303
+ for some other constant C′(a, β) > 0 depending only on a and β. Consequently, equation (A.27)
4304
+ together (A.26) ensures that the assertion is verified.
4305
+
4306
+ A.2.2. The critical regime.
4307
+ Lemma A.8. For each n ∈ N and test vector u ∈ Rd, let
4308
+ Wn =
4309
+ 1
4310
+ √n log n
4311
+
4312
+ 1
4313
+ 0
4314
+ 0
4315
+ 2β+1
4316
+ anµn
4317
+
4318
+ and
4319
+ w =
4320
+
4321
+ 1
4322
+ −1
4323
+
4324
+ .
4325
+ (A.28)
4326
+ Then for all t ≥ 0, we have
4327
+ wT WnLn(u) =
4328
+ 1
4329
+ √n log nSn(u)
4330
+ (A.29)
4331
+ and
4332
+ Wn⟨L(u)⟩nW T
4333
+ n → uT u
4334
+ d W
4335
+ as
4336
+ n → ∞
4337
+ P-a.s.
4338
+ where
4339
+ Wt = (2β + 1)2
4340
+
4341
+ 0
4342
+ 0
4343
+ 0
4344
+ 1
4345
+
4346
+ .
4347
+ (A.30)
4348
+ Proof. It is clear that (A.29) follows from (3.2). Using a similar token than for the proof Lemma
4349
+ A.4, we have
4350
+ lim
4351
+ n→∞ Wn⟨L(u)⟩nW T
4352
+ n
4353
+ = lim
4354
+ n→∞
4355
+ 4uT u
4356
+ (n log n)d
4357
+
4358
+
4359
+
4360
+ β2n
4361
+ β(β+ 1
4362
+ 2 )
4363
+ anµn
4364
+ �n−1
4365
+ k=0 ak+1µk+1
4366
+ β(β+ 1
4367
+ 2 )
4368
+ anµn
4369
+ �n−1
4370
+ k=0 ak+1µk+1
4371
+
4372
+ β+ 1
4373
+ 2
4374
+ anµn
4375
+ �2 �n−1
4376
+ k=0(ak+1µk+1)2
4377
+
4378
+
4379
+
4380
+ = 4uT u
4381
+ d
4382
+
4383
+ 0
4384
+ 0
4385
+ 0
4386
+
4387
+ β + 1
4388
+ 2
4389
+ �2
4390
+
4391
+ = uT u
4392
+ d W
4393
+ P-a.s.
4394
+ and the proof is complete.
4395
+
4396
+
4397
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
4398
+ 31
4399
+ Lemma A.9. The MARW satisfies the Lindeberg condition in the critical regime. That is, for all
4400
+ t ≥ 0 and all ϵ > 0, given the (Wn)n∈N defined in (A.16), it satisfies
4401
+ n
4402
+
4403
+ k=1
4404
+ E
4405
+
4406
+ ∥Wn∆Lk(u)∥21{∥WnLk(u)∥2>ϵ}|Fk−1
4407
+
4408
+ → 0
4409
+ as
4410
+ n → ∞
4411
+ P-a.s.
4412
+ Proof. We state that equations (A.20) and (A.21) remain true with Vn replaced by Wn. More
4413
+ precisely, they can be rewritten as
4414
+ ∥Wn∆Lk(u)∥4 ≤
4415
+ 32
4416
+ (n log n)2
4417
+ �β4
4418
+ µ4
4419
+ k
4420
+ +
4421
+ a4a4
4422
+ k
4423
+ (anµn)4
4424
+
4425
+ ϵk(u)4
4426
+ (A.31)
4427
+ and
4428
+ 1
4429
+ na4n
4430
+ n
4431
+
4432
+ k=1
4433
+ a4
4434
+ k ≤ C(a, β)−1
4435
+ for all
4436
+ n ∈ N
4437
+ where C(a, β) > 0 is a constant depending only on t, a, and β. Since (A.22) is not affected by
4438
+ switching regimes, we have that
4439
+ n
4440
+
4441
+ k=1
4442
+ ∥Wn∆Lk(u)∥4 ≤
4443
+ 32
4444
+ (n log n)2
4445
+ ��
4446
+ β(β + 2)
4447
+ �4∥u∥4 +
4448
+
4449
+ a(β + 2)
4450
+ �4∥u∥4
4451
+ C(t, a, β)
4452
+
4453
+ → 0
4454
+ (A.32)
4455
+ as n → ∞ P-a.s. This implies
4456
+ n
4457
+
4458
+ k=1
4459
+ E
4460
+
4461
+ ∥Wn∆Lk(u)∥4|Fk−1
4462
+
4463
+ → 0
4464
+ as
4465
+ n → ∞
4466
+ P-a.s.
4467
+ Therefore, for all ϵ > 0, we obtain
4468
+ n
4469
+
4470
+ k=1
4471
+ E
4472
+
4473
+ ∥Wn∆Lk(u)∥21{∥WnLk(u)∥2>ϵ}|Fk−1
4474
+
4475
+ ≤ 1
4476
+ ϵ2
4477
+ n
4478
+
4479
+ k=1
4480
+ E
4481
+
4482
+ ∥Wn∆Lk(u)∥4|Fk−1
4483
+
4484
+ → 0
4485
+ as n → ∞ P-a.s. and the assertion is verified.
4486
+
4487
+ Lemma A.10. Given the matrix-valued sequence (Wn)n∈N define in (A.28), we have
4488
+
4489
+
4490
+ n=1
4491
+ 1
4492
+
4493
+ log
4494
+
4495
+ det W −1
4496
+ n
4497
+ �2�2 E
4498
+
4499
+ ∥Wn∆Ln(u)∥4|Fn−1
4500
+
4501
+ < ∞
4502
+ P-a.s.
4503
+ Proof. From (A.28), it is immediate that
4504
+ det W −1
4505
+ n
4506
+ =
4507
+ 1
4508
+ 2β + 1
4509
+
4510
+ n log n · anµn.
4511
+ (A.33)
4512
+ Then, we obtain by (2.5) and (2.6) that
4513
+ log
4514
+
4515
+ det W −1
4516
+ n
4517
+ �2
4518
+ log log n
4519
+ → 1
4520
+ as
4521
+ n → ∞
4522
+ P-a.s.
4523
+ (A.34)
4524
+ Hence, there exists a constant C(a, β) > 0 depending only on a and β such that
4525
+
4526
+
4527
+ n=1
4528
+ 1
4529
+
4530
+ log
4531
+
4532
+ det W −1
4533
+ n
4534
+ �2�2 E
4535
+
4536
+ ∥Wn∆Ln(u)∥4|Fn−1
4537
+
4538
+
4539
+
4540
+
4541
+ n=1
4542
+ C(a, β)
4543
+ (log log n)2 E
4544
+
4545
+ ∥Wn∆Ln(u)∥4|Fn−1
4546
+
4547
+ .
4548
+ (A.35)
4549
+ Hereafter, (A.31) together with (A.32) imply that
4550
+
4551
+
4552
+ n=1
4553
+ 1
4554
+ (log log n)2 ∥Wn∆Ln(u)∥4 ≤ C′(a, β)
4555
+
4556
+
4557
+ n=1
4558
+ 1
4559
+ (n log n log log n)2 < ∞
4560
+ P-a.s.
4561
+ for some other constant C′(a, β) > 0 depending only on a and β. Finally, using the above equation
4562
+ together with (A.35) completes the proof.
4563
+
4564
+
4565
+ 32
4566
+ JIAMING CHEN AND LUCILE LAULIN
4567
+ Lemma A.11. Fix the test vector u ∈ Rd. The growth rate of the compensator of the partial sum
4568
+ of (Nn(u)2)n∈N is less than cubic growth, in the sense that
4569
+ 1
4570
+ n3
4571
+ n−1
4572
+
4573
+ k=1
4574
+ E
4575
+
4576
+ Nk+1(u)2|Fn
4577
+
4578
+ → 0
4579
+ as
4580
+ n → ∞
4581
+ P-a.s.
4582
+ Proof. The law of iterated expectations and (A.8) yields
4583
+ 1
4584
+ nE
4585
+
4586
+ E
4587
+
4588
+ Nn+1(u)2|Fn
4589
+ ��
4590
+ = 1
4591
+ nE
4592
+
4593
+ ⟨N(u)⟩n
4594
+
4595
+
4596
+
4597
+ β
4598
+ β − a(β + 1)
4599
+ �2
4600
+ uT u
4601
+ as
4602
+ n → ∞
4603
+ P-a.s.
4604
+ The strong law of large numbers then yields
4605
+ 1
4606
+ n
4607
+ n−1
4608
+
4609
+ k=1
4610
+ 1
4611
+ k E
4612
+
4613
+ Nk+1(u)2|Fk
4614
+
4615
+
4616
+
4617
+ β
4618
+ β − a(β + 1)
4619
+ �2
4620
+ uT u
4621
+ as
4622
+ n → ∞
4623
+ P-a.s.
4624
+ Hence
4625
+ 1
4626
+ n3
4627
+ n−1
4628
+
4629
+ k=1
4630
+ E
4631
+
4632
+ Nk+1(u)2|Fn
4633
+
4634
+ ≤ 1
4635
+ n2
4636
+ n−1
4637
+
4638
+ k=1
4639
+ 1
4640
+ k E
4641
+
4642
+ Nk+1(u)2|Fk
4643
+
4644
+ → 0
4645
+ as
4646
+ n → ∞
4647
+ P-a.s.
4648
+
4649
+ A.2.3. The barycenter process. For the following Toeplitz Lemmas, see [18] and [33].
4650
+ Lemma A.12. [33, Theorem 1.1 Part I] Let (an,k)1≤k≤kn, n∈N be a double array of real numbers
4651
+ such that for all k ≥ 1, we have an,k → 0 as n → ∞ and supn∈N
4652
+ �kn
4653
+ k=1 |an,k| < ∞. Let (xn)n∈N
4654
+ be a real sequence. If xn → 0 as n → ∞, then �kn
4655
+ k=1 an,kxk → 0 as n → ∞.
4656
+ Lemma A.13. [33, Theorem 1.1 Part II] Let (an,k)1≤k≤kn, n∈N be a double array of real numbers
4657
+ such that for all k ≥ 1, we have an,k → 0 as n → ∞ and supn∈N
4658
+ �kn
4659
+ k=1 |an,k| < ∞. Let (xn)n∈N
4660
+ be a real sequence. If xn → x as n → ∞ with x ∈ R and �kn
4661
+ k=1 an,k = 1, then �kn
4662
+ k=1 an,kxk → x
4663
+ as n → ∞.
4664
+ A.3. Quadratic rate estimates. Our first result is about the convergence rate of the process
4665
+ (Yn)n∈N defined in (2.3).
4666
+ Lemma A.14. For all p ∈ (0, 1), then we have, as n → ∞,
4667
+ E[YnY T
4668
+ n ] ∼
4669
+ n2a(β+1)
4670
+ Γ(1 + 2a(β + 1)) · 1
4671
+ dId +
4672
+ n1+2β
4673
+ Γ(β + 1)2(1 + 2β − 2a(β + 1))(β + 1) · 1
4674
+ dId.
4675
+ Proof. From (A.11) and (A.13), we see
4676
+ E
4677
+
4678
+ Yn+1Y T
4679
+ n+1|Fn
4680
+
4681
+ =
4682
+
4683
+ 1 + 2a(β + 1)
4684
+ n
4685
+
4686
+ YnY T
4687
+ n + µ2
4688
+ n+1
4689
+ �a(β + 1)
4690
+ nµn+1
4691
+ Σn + 1 − a
4692
+ d
4693
+ Id
4694
+
4695
+ .
4696
+ Then, remember that
4697
+ E
4698
+
4699
+ Σn
4700
+
4701
+ =
4702
+ d
4703
+
4704
+ j=1
4705
+ E
4706
+
4707
+ N X
4708
+ n (j)
4709
+
4710
+ ejeT
4711
+ j =
4712
+ d
4713
+
4714
+ j=1
4715
+ n
4716
+
4717
+ k=1
4718
+ P
4719
+
4720
+ Xj
4721
+ k ̸= 0
4722
+
4723
+ µk · ejeT
4724
+ j .
4725
+ Lemma A.1 yields E[(nµn+1)−1Σn] ∼ (β + 1)−1 · 1
4726
+ dId. Hence,
4727
+ E
4728
+
4729
+ Yn+1Y T
4730
+ n+1
4731
+
4732
+
4733
+
4734
+ 1 + 2a(β + 1)
4735
+ n
4736
+
4737
+ E
4738
+
4739
+ YnY T
4740
+ n
4741
+
4742
+ + µ2
4743
+ n+1
4744
+ β + 1 · 1
4745
+ dId.
4746
+
4747
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
4748
+ 33
4749
+ A recursive argument then gives
4750
+ E
4751
+
4752
+ YnY T
4753
+ n
4754
+
4755
+
4756
+ Γ(n + 2a(β + 1))
4757
+ Γ(n)Γ(1 + 2a(β + 1))E
4758
+
4759
+ Y1Y T
4760
+ 1
4761
+
4762
+ +
4763
+ n−1
4764
+
4765
+ j=1
4766
+ µ2
4767
+ j
4768
+ β + 1 ·
4769
+ �n−1
4770
+ k=1(1 + k−12a(β + 1))
4771
+ �j−1
4772
+ k=1(1 + k−12a(β + 1))
4773
+ · 1
4774
+ dId
4775
+
4776
+ Γ(n + 2a(β + 1))
4777
+ Γ(n)Γ(1 + 2a(β + 1)) · 1
4778
+ dId +
4779
+ n−1
4780
+
4781
+ j=1
4782
+ µ2
4783
+ j
4784
+ β + 1 · Γ(n + 2a(β + 1))Γ(j)
4785
+ Γ(j + 2a(β + 1))Γ(n) · 1
4786
+ dId.
4787
+ Employing the asymptotics in (2.1) and (2.6), the assertion follows.
4788
+
4789
+ The process Yn = �n
4790
+ k=1 µkXk differs from Sn by a multiplicative factor at each step. When
4791
+ there is no amnesia, the asymptotics of these two processes coincide. However, when β ≥ 0, we
4792
+ have to treat the general case in another way.
4793
+ Lemma A.15. For all p ∈ (0, 1) and test vector u ∈ Rd, we have, as n → ∞,
4794
+ E
4795
+
4796
+ ⟨M(u)⟩n
4797
+
4798
+ ∼ wnuT u − (C1n−1 + C2n−2(a(β+1)−β))uT u,
4799
+ and
4800
+ E
4801
+
4802
+ ⟨N(u)⟩n
4803
+
4804
+
4805
+
4806
+ β
4807
+ β − a(β + 1)
4808
+ �2
4809
+ nuT u − (C1n1−2(1−a)(β+1) + C2)uT u.
4810
+ Proof. By Lemma A.2
4811
+ E
4812
+
4813
+ ⟨M(u)⟩n
4814
+
4815
+ = E
4816
+
4817
+ Tr⟨M⟩n
4818
+
4819
+ uT u = wnuT u −
4820
+ n
4821
+
4822
+ k=1
4823
+ (γk − 1)2a2
4824
+ k+1uT E
4825
+
4826
+ YkY T
4827
+ k
4828
+
4829
+ u.
4830
+ By Lemma A.14 and a finite summation,
4831
+ E
4832
+
4833
+ ⟨M(u)⟩n
4834
+
4835
+ ∼ wnuT u −
4836
+ n−1
4837
+
4838
+ k=1
4839
+ a2(β + 1)2
4840
+ k2
4841
+ (k + 1)−2a(β+1)(C1k2a(β+1) + C2k1+2β)uT u
4842
+ ∼ wnuT u − (C1n−1 + C2n−2(a(β+1)−β))uT u.
4843
+ Similarly,
4844
+ E
4845
+
4846
+ ⟨N(u)⟩n
4847
+
4848
+ = E
4849
+
4850
+ Tr⟨N⟩n
4851
+
4852
+ uT u =
4853
+
4854
+ β
4855
+ β − a(β + 1)
4856
+ �2
4857
+ nuT u −
4858
+ n−1
4859
+
4860
+ k=1
4861
+ a2(β + 1)2
4862
+ k2
4863
+ µ−2
4864
+ k+1uT E
4865
+
4866
+ YkY T
4867
+ k
4868
+
4869
+ u.
4870
+ Hence, using Lemma A.14 again, we observe
4871
+ E
4872
+
4873
+ ⟨N(u)⟩n
4874
+
4875
+
4876
+
4877
+ β
4878
+ β − a(β + 1)
4879
+ �2
4880
+ nuT u −
4881
+ n−1
4882
+
4883
+ k=1
4884
+ a2(β + 1)2
4885
+ k2
4886
+ (k + 1)−2β(C1k2a(β+1) + C2k1+2β)uT u
4887
+
4888
+
4889
+ β
4890
+ β − a(β + 1)
4891
+ �2
4892
+ nuT u − (C1n1−2(1−a)(β+1) + C2)uT u.
4893
+
4894
+ Lemma A.16. For all p ∈ (0, 1) and test vector u ∈ Rd, we have, as n → ∞,
4895
+ E
4896
+
4897
+ ⟨M(u), N(u)⟩n
4898
+
4899
+
4900
+ β
4901
+ β − a(β + 1) · Γ(β + 1)Γ(a(β + 1) + 1)
4902
+ (1 − a)(β + 1)
4903
+ n(1−a)(β+1)uT u
4904
+ − (C1n−(1−a)(β+1) + C2n(1−a)(β+1)−1)uT u.
4905
+ Proof. By (3.7) and Lemma A.2, for all test vector u ∈ Rd
4906
+ ∆Ln+1(u) =
4907
+
4908
+ βµ−1
4909
+ n+1
4910
+ β − a(β + 1)
4911
+ �T
4912
+ ϵn+1(u),
4913
+
4914
+ 34
4915
+ JIAMING CHEN AND LUCILE LAULIN
4916
+ and therefore,
4917
+ ⟨M(u), N(u)⟩n =
4918
+ n
4919
+
4920
+ k=1
4921
+ β
4922
+ β − a(β + 1)akµ−1
4923
+ k E
4924
+
4925
+ ϵk(u)ϵk(u)T |Fk−1
4926
+
4927
+ .
4928
+ Taking the trace will give us
4929
+ Tr⟨M, N⟩n =
4930
+ β
4931
+ β − a(β + 1)
4932
+ n
4933
+
4934
+ k=1
4935
+ akµk −
4936
+ β
4937
+ β − a(β + 1)
4938
+ n
4939
+
4940
+ k=1
4941
+ akµ−1
4942
+ k (γk − 1)2∥Yk∥2.
4943
+ Taking the expectation and using Lemma A.14 completes the proof.
4944
+
4945
+ A.4. Moderate deviations.
4946
+ Lemma A.17. For all p ∈ (0, 1) and for all j = 1, . . . , d,
4947
+ ��∆M j
4948
+ n
4949
+ �� ≤
4950
+
4951
+ a(β + 1) + 1
4952
+
4953
+ anµn
4954
+ for all
4955
+ n ∈ N.
4956
+ (A.36)
4957
+ Proof. By (2.3) and (3.1),
4958
+ ∆M j
4959
+ n = anY j
4960
+ n − an−1Y j
4961
+ n−1 = anµnXj
4962
+ n − (an − an−1)
4963
+ n−1
4964
+
4965
+ k=1
4966
+ µkXj
4967
+ k.
4968
+ Since ∥Xk∥ = 1 for eack k ≤ n, then by (2.4),
4969
+ ��∆M j
4970
+ n
4971
+ �� ≤ anµn + (n − 1)(an−1 − an)µn−1 ≤ anµn + a(β + 1)anµn.
4972
+ And the assertion is verified.
4973
+
4974
+ Lemma A.18. For all p ∈ (0, 1) and for all j = 1, . . . , d,
4975
+ ��∆N j
4976
+ n
4977
+ �� ≤ 2a(β + 1) +
4978
+ β
4979
+ β − a(β + 1)
4980
+ for all
4981
+ n ∈ N.
4982
+ Proof. By (2.3) and (3.6),
4983
+ ∆N j
4984
+ n =
4985
+ βµ−1
4986
+ n+1
4987
+ β − a(β + 1)ϵj
4988
+ n+1 =
4989
+ βµ−1
4990
+ n+1
4991
+ β − a(β + 1) ·
4992
+
4993
+ µn+1Xj
4994
+ n+1 + (1 − γn)
4995
+ n
4996
+
4997
+ k=1
4998
+ Xj
4999
+ kµk
5000
+
5001
+ .
5002
+ Taking absolute value on both sides, and the assertion is verified.
5003
+
5004
+ Lemma A.19. For all p ∈ (0, 1) and for all j = 1, . . . , d,
5005
+ ����
5006
+ 1
5007
+ √wn
5008
+ ∆M j
5009
+ k
5010
+ ���� ≤
5011
+
5012
+ a(β + 1) + 1
5013
+ �anµn
5014
+ √wn
5015
+ for each
5016
+ 1 ≤ k ≤ n,
5017
+ (A.37)
5018
+ and in the diffusive and critical regime,
5019
+ ����
5020
+ 1
5021
+ wn
5022
+ ⟨M j⟩n − 1
5023
+ ���� ≤
5024
+
5025
+
5026
+
5027
+ C · n−1
5028
+ when
5029
+ a < 1 −
5030
+ 1
5031
+ 2(β+1)
5032
+ C · (log n)−1
5033
+ when
5034
+ a = 1 −
5035
+ 1
5036
+ 2(β+1).
5037
+ Proof. Dividing by √wn from both sides of (A.36), we get (A.37). Moreover, by (A.9),
5038
+ ��⟨M j⟩n − wn
5039
+ �� ≤
5040
+ n
5041
+
5042
+ k=1
5043
+ (γk − 1)2a2
5044
+ k+1∥Yk∥2 ≤ C
5045
+ n
5046
+
5047
+ k=1
5048
+ wk
5049
+ k2 .
5050
+ Dividing both sides by wn and following (3.3), (3.4), the assertion is verified.
5051
+
5052
+ Lemma A.20. For all p ∈ (0, 1) and for all j = 1, . . . , d,
5053
+ ����
5054
+ anµn
5055
+ √wn
5056
+ ∆N j
5057
+ k
5058
+ ���� ≤
5059
+
5060
+ 2a(β + 1) +
5061
+ β
5062
+ β − a(β + 1)
5063
+ �anµn
5064
+ √wn
5065
+ for each
5066
+ 1 ≤ k ≤ n,
5067
+ (A.38)
5068
+
5069
+ MULTIDIMENSIONAL AMNESIA-REINFORCED ELEPHANT RANDOM WALK
5070
+ 35
5071
+ and in both the diffusive and critical regime,
5072
+ ����
5073
+ a2
5074
+ nµ2
5075
+ n
5076
+ wn
5077
+ ⟨N j⟩n − 1
5078
+ ���� ≤
5079
+
5080
+
5081
+
5082
+ C · n−2(1−a)(β+1)
5083
+ when
5084
+ a < 1 −
5085
+ 1
5086
+ 2(β+1)
5087
+ C · (n log n)−1
5088
+ when
5089
+ a = 1 −
5090
+ 1
5091
+ 2(β+1).
5092
+ Proof. Dividing by √wn and multiplied by anµu from both sides of (A.18), we get (A.38). Then,
5093
+ by (A.10), we make use of the estimates and the inequalities hold.
5094
+
5095
+ Denote by Φ(·) := (2π)−1/2 � ·
5096
+ −∞ e−t2/2 dt the cumulative distribution of the standard normal
5097
+ random variable. The following lemmas are straightforward derivations from [19, Theorem 1], see
5098
+ also [22].
5099
+ Lemma A.21. There exists an absolute constant α′(p, β) > 0 depending only on p, β such that
5100
+ for all j = 1, . . . , d and all 0 ≤ x ≤ α′(p, β) · n−1/2, in the diffusive and critical regime,
5101
+ P(M j
5102
+ n/√wn ≥ x)
5103
+ 1 − Φ(x)
5104
+ = P(M j
5105
+ n/√wn ≤ −x)
5106
+ 1 − Φ(−x)
5107
+ =
5108
+
5109
+
5110
+
5111
+ C · exp
5112
+
5113
+ x3
5114
+ √n + x2
5115
+ n +
5116
+ 1
5117
+ √n(1 + 1
5118
+ 2 log n)(1 + x)
5119
+
5120
+ when
5121
+ a < 1 −
5122
+ 1
5123
+ 2(β+1)
5124
+ C · exp
5125
+
5126
+ x3
5127
+ √n +
5128
+ x2
5129
+ log n + (
5130
+ 1
5131
+ √log n +
5132
+ 1
5133
+ 2√n log n)(1 + x)
5134
+
5135
+ when
5136
+ a = 1 −
5137
+ 1
5138
+ 2(β+1).
5139
+ Lemma A.22. There exists an absolute constant α′′(p, β) > 0 depending only on p, β such that
5140
+ for all j = 1, . . . , d and all 0 ≤ x ≤ α′′(p, β) · n−1/2, in the diffusive and critical regime,
5141
+ P(anµnN j
5142
+ n/√wn ≥ x)
5143
+ 1 − Φ(x)
5144
+ = P(anµnN j
5145
+ n/√wn ≤ −x)
5146
+ 1 − Φ(−x)
5147
+ =
5148
+
5149
+
5150
+
5151
+ C · exp
5152
+
5153
+ x3
5154
+ √n +
5155
+ x2
5156
+ n2(1−a)(β+1) +
5157
+ 1
5158
+ √n(n1/2−(1−a)(β+1) + 1
5159
+ 2 log n)(1 + x)
5160
+
5161
+ when
5162
+ a < 1 −
5163
+ 1
5164
+ 2(β+1)
5165
+ C · exp
5166
+
5167
+ x3
5168
+ √n +
5169
+ x2
5170
+ n log n + (
5171
+ 1
5172
+ √n log n +
5173
+ 1
5174
+ 2√n log n)(1 + x)
5175
+
5176
+ when
5177
+ a = 1 −
5178
+ 1
5179
+ 2(β+1).
5180
+ Acknowledgements. The authors wish to thank Jean Bertoin and Pierre Tarres for numerous
5181
+ discussions and insightful comments.
5182
+ References
5183
+ [1] E. Baur. On a class of random walks with reinforced memory. J. Stat. Phys. 181 (2020), 772–802.
5184
+ [2] M. Bauer, D. Bernard, K. Kyt¨ol¨a. Multiple Schramm-Loewner Evolutions and Statistical Mechanics Martin-
5185
+ gales. J. Stat. Phys., 120: 1125–1163, 2005.
5186
+ [3] E. Baur, J. Bertoin. Elephant random walks and their connection to P´olya-type urns. Phys. Rev. E, 94 (5):
5187
+ 052134, 2016.
5188
+ [4] M. Bena¨ım, S. J. Schreiber, P. Tarr`es. Generalized urn models of evolutionary processes. Ann. Appl. Probab.,
5189
+ 14 (3): 1455–1478, 2004.
5190
+ [5] B. Bercu. A martingale approach for the elephant random walk. J. Phys. A: Math. Theor., 51: 015201, 2017.
5191
+ [6] B. Bercu, M.-L. Chabanol, J.-J. Ruch. Hypergeometric identities arising from the elephant random walk. J.
5192
+ Math. Anal. Appl., 488: 123360, 2019.
5193
+ [7] B. Bercu, L. Laulin. How to estimate the memory of the elephant random walk. Commun. Stat. Theor. Method.,
5194
+ 2022.
5195
+ [8] B. Bercu, L. Laulin. On the center of mass of the elephant random walk. Sto. Proces. Appl., 133: 111–128,
5196
+ 2021.
5197
+ [9] B. Bercu, L. Laulin. On the Multi-dimensional Elephant Random Walk. J. Stat. Phys., 175: 1146–1163, 2019.
5198
+ [10] M. Bertenghi. Functional limit Theorems for the multi-dimensional elephant random walk. Sto. Model., 38 (1):
5199
+ 37–50. 2022.
5200
+ [11] J. Bertoin. Counting the zeros of an elephant random walk. Trans. Am. Math. Soc., 375 (8): 5539–5560, 2022.
5201
+ [12] J. Bertoin. Scaling exponents of step-reinforced random walks. Probab. Theor. Rel. Field., 179 (1): 295–315,
5202
+ 2021.
5203
+ [13] S. Businger. The shark random swim (L´evy flight with memory). J. Stat. Phys. 172, 3 (2018), 701–717.
5204
+
5205
+ 36
5206
+ JIAMING CHEN AND LUCILE LAULIN
5207
+ [14] F. Chaabane, F. Maaouia. Th´eor`emes limites avec poids pour les martingales vectorielles. ESAIM Prob. Stat.,
5208
+ 4: 137–189, 2000.
5209
+ [15] J. Chen, V. Margarint. Perturbations of multiple Schramm–Loewner evolution with two non-colliding Dyson
5210
+ Brownian motions. Sto. Proces. Appl., 151: 553–570, 2022.
5211
+ [16] C. F. Coletti, R. Gava, G. M. Sch¨utz. Central limit Theorem and related results for the elephant random walk.
5212
+ J. Math. Phys., 58 (5): 053303, 2017.
5213
+ [17] P. Dai Pra, P. Louis, I. Minelli. Synchronization via Interacting Reinforcement. J. Appl. Probab., 51 (2):
5214
+ 556–568, 2014.
5215
+ [18] M. Duflo. Random iterative models. Appl. Math. Springer-Verlag, Berlin, 34, 1997.
5216
+ [19] X. Fan, I. Grama, Q. Liu. Cram´er Moderate Deviation Expansion for Martingales with One-Sided Sakhanenko’s
5217
+ Condition and Its Applications. J. Theor. Prob., 33: 749–787, 2020.
5218
+ [20] X. Fan, H. Hu, X. Ma. Cram´er moderate deviations for the elephant random walk. J. Stat. Mech., 023402,
5219
+ 2021.
5220
+ [21] X. Ma, M. E. Machkouri, X. Fan. On Wasserstein-1 distance in the central limit Theorem for elephant random
5221
+ walk. J. Math. Phys., 63: 013301, 2022.
5222
+ [22] I. Grama, E. Haeusler. Large deviations for martingales via Cram´er’s method. Sto. Proces. Appl., 85: 279–293,
5223
+ 2000.
5224
+ [23] K. Grill. On the average of a random walk. Stat. Probab. Lett., 6 (5): 357–361, 1988.
5225
+ [24] A. Gut, U. Stadtm¨uller. The elephant random walk with gradually increasing memory. arXiv:2110.13497
5226
+ (2021).
5227
+ [25] A. Gut, U. Stadtm¨uller. Variations of the elephant random walk. J. Appl. Probab. 58, 3 (2021), 805–829
5228
+ [26] M. Hayashi, S. Oshiro, M. Takei. Rate of moment convergence in the central limit Theorem for elephant
5229
+ random walks. arXiv preprint, arXiv: 2205.00651, 2022.
5230
+ [27] G. Kozma Reinforced random walk. In European Congress of Mathematics. Eur. Math. Soc., Z¨urich, 2013,
5231
+ pp. 429–443.
5232
+ [28] N. Kubota, M. Takei. Gaussian fluctuation for superdiffusive elephant random walks. J. Stat. Phys. 177, 6
5233
+ (2019), 1157–1171.
5234
+ [29] R. K¨ursten. Random recursive trees and the elephant random walk. Physical Review E 93, 032111 (2016).
5235
+ [30] D. Lamberton, G. Pag`es, P. Tarr`es. When Can the Two-Armed Bandit Algorithm Be Trusted? Ann. Appl.
5236
+ Probab., 14 (3): 1424–1454, 2004.
5237
+ [31] L. Laulin. Introducing smooth amnesia to the memory of the Elephant Random Walk. Electron. Commun.
5238
+ Prob., 27: 1–12, 2022.
5239
+ [32] L. Laulin. New Insights on the Reinforced Elephant Random Walk Using a Martingale Approach. J. Stat.
5240
+ Phys., 186, 9, 2022.
5241
+ [33] J. Li, Z. Hu. Toeplitz Lemma, Complete Convergence and Complete Moment Convergence. Commun. Stat.-
5242
+ Theor. Method., 46 (4): 1731–1743, 2017.
5243
+ [34] C. H. Lo, A. R. Wade. On the centre of mass of a random walk. Sto. Proces. Appl., 129 (11): 4663–4686, 2019.
5244
+ [35] R. Marcaccioli, G. Livan. A P´olya urn approach to information filtering in complex networks. Nat. Commun.,
5245
+ 10, 745 (2019).
5246
+ [36] J. McRedmond, A. R. Wade. The convex hull of a planar random walk: perimeter, diameter, and shape.
5247
+ Electron. J. Probab. 23: 1–24, 2018.
5248
+ [37] F. Merkl, S. W. W. Rolles. Linearly edge-reinforced random walks. IMS Lect Note - Mon. Ser. Dyn. Sto., 48:
5249
+ 66–77, 2006.
5250
+ [38] R. Pemantle. A survey of random processes with reinforcement. Probab. Surveys 4 (2007), 1–79.
5251
+ [39] R. Pemantle. Vertex-reinforced random walk. Probab. Theor. Rel. Field., 92: 117–136, 1992.
5252
+ [40] G. M. Sch¨utz, S. Trimper. Elephants can always remember:
5253
+ Exact long-range memory effects in a non-
5254
+ markovian random walk. Physical review. E 70, 045101 (2004).
5255
+ [41] C. Sheng. Arzela-Ascoli’s Theorem and Applications. Preprint., 2022100209, 2022.
5256
+ [42] A. Touati. Sur la convergence en loi fonctionnelle de suites de semimartingales vers un m´elange de mouvements
5257
+ browniens. Teor. Veroyatnost. i Primenen., 36 (4): 744–763, 1991.
5258
+ [43] A. R. Wade, C. Xu. Convex hulls of planar random walks with drift. Proc. Amer. Math. Soc., 143 (1): 433–445,
5259
+ 2015.
5260
+ Departement Mathematik, ETH Z¨urich
5261
+ Current address: 101, R¨amistrasse, CH-8092 Z¨urich, Switzerland
5262
+ Email address: jiamchen@student.ethz.ch
5263
+ Laboratoire de Math´ematiques Jean Leray, Nantes Universit´e
5264
+ Current address: 2 Chem. de la Houssini`ere, 44322 Nantes, France
5265
+ Email address: lucile.laulin@math.cnrs.fr
5266
+
-NFAT4oBgHgl3EQfqB2B/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -8202,3 +8202,70 @@ CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
8202
  _NFLT4oBgHgl3EQfvy-O/content/2301.12161v1.pdf filter=lfs diff=lfs merge=lfs -text
8203
  adE2T4oBgHgl3EQfFAZQ/content/2301.03641v1.pdf filter=lfs diff=lfs merge=lfs -text
8204
  CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8202
  _NFLT4oBgHgl3EQfvy-O/content/2301.12161v1.pdf filter=lfs diff=lfs merge=lfs -text
8203
  adE2T4oBgHgl3EQfFAZQ/content/2301.03641v1.pdf filter=lfs diff=lfs merge=lfs -text
8204
  CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf filter=lfs diff=lfs merge=lfs -text
8205
+ utE5T4oBgHgl3EQfLg6S/content/2301.05474v1.pdf filter=lfs diff=lfs merge=lfs -text
8206
+ Q9E3T4oBgHgl3EQfDAmJ/content/2301.04282v1.pdf filter=lfs diff=lfs merge=lfs -text
8207
+ FtE1T4oBgHgl3EQfEwPV/content/2301.02895v1.pdf filter=lfs diff=lfs merge=lfs -text
8208
+ oNFKT4oBgHgl3EQfFy2H/content/2301.11722v1.pdf filter=lfs diff=lfs merge=lfs -text
8209
+ 2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8210
+ OdE1T4oBgHgl3EQfuAUH/content/2301.03382v1.pdf filter=lfs diff=lfs merge=lfs -text
8211
+ JdE0T4oBgHgl3EQfSACX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8212
+ n9AyT4oBgHgl3EQfY_cz/content/2301.00213v1.pdf filter=lfs diff=lfs merge=lfs -text
8213
+ k9E2T4oBgHgl3EQfdwdn/content/2301.03909v1.pdf filter=lfs diff=lfs merge=lfs -text
8214
+ mNE2T4oBgHgl3EQfzAhZ/content/2301.04126v1.pdf filter=lfs diff=lfs merge=lfs -text
8215
+ T9E0T4oBgHgl3EQf2QLa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8216
+ gdE3T4oBgHgl3EQfIAlQ/content/2301.04329v1.pdf filter=lfs diff=lfs merge=lfs -text
8217
+ d9E0T4oBgHgl3EQfoQG6/content/2301.02524v1.pdf filter=lfs diff=lfs merge=lfs -text
8218
+ YdE5T4oBgHgl3EQfdg8f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8219
+ mNE2T4oBgHgl3EQfzAhZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8220
+ IdAyT4oBgHgl3EQfr_me/content/2301.00569v1.pdf filter=lfs diff=lfs merge=lfs -text
8221
+ gdE3T4oBgHgl3EQfIAlQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8222
+ 59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf filter=lfs diff=lfs merge=lfs -text
8223
+ LtE0T4oBgHgl3EQfSgD7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8224
+ kNE1T4oBgHgl3EQf0QWt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8225
+ utE5T4oBgHgl3EQfLg6S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8226
+ OdE1T4oBgHgl3EQfuAUH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8227
+ IdE2T4oBgHgl3EQfowif/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8228
+ 59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8229
+ IdAyT4oBgHgl3EQfr_me/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8230
+ kNE1T4oBgHgl3EQf0QWt/content/2301.03454v1.pdf filter=lfs diff=lfs merge=lfs -text
8231
+ KtE3T4oBgHgl3EQfvgte/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8232
+ 5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf filter=lfs diff=lfs merge=lfs -text
8233
+ ddFPT4oBgHgl3EQfDDRR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8234
+ u9FJT4oBgHgl3EQfeiys/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8235
+ qdFJT4oBgHgl3EQfaSwR/content/2301.11535v1.pdf filter=lfs diff=lfs merge=lfs -text
8236
+ IdE2T4oBgHgl3EQfowif/content/2301.04022v1.pdf filter=lfs diff=lfs merge=lfs -text
8237
+ PtAzT4oBgHgl3EQflf1o/content/2301.01548v1.pdf filter=lfs diff=lfs merge=lfs -text
8238
+ 5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8239
+ i9FAT4oBgHgl3EQf-B7W/content/2301.08761v1.pdf filter=lfs diff=lfs merge=lfs -text
8240
+ T9E0T4oBgHgl3EQf2QLa/content/2301.02711v1.pdf filter=lfs diff=lfs merge=lfs -text
8241
+ t9E2T4oBgHgl3EQf2Ain/content/2301.04157v1.pdf filter=lfs diff=lfs merge=lfs -text
8242
+ 59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8243
+ iNE_T4oBgHgl3EQf4Byz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8244
+ e9E3T4oBgHgl3EQf3AuS/content/2301.04760v1.pdf filter=lfs diff=lfs merge=lfs -text
8245
+ t9E2T4oBgHgl3EQf2Ain/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8246
+ sdFIT4oBgHgl3EQfyyum/content/2301.11362v1.pdf filter=lfs diff=lfs merge=lfs -text
8247
+ e9E3T4oBgHgl3EQf3AuS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8248
+ pdAyT4oBgHgl3EQfZPdk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8249
+ adE2T4oBgHgl3EQfFAZQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8250
+ n9AyT4oBgHgl3EQfY_cz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8251
+ FtE1T4oBgHgl3EQfEwPV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8252
+ PtAzT4oBgHgl3EQflf1o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8253
+ TNE5T4oBgHgl3EQfaw8F/content/2301.05590v1.pdf filter=lfs diff=lfs merge=lfs -text
8254
+ 8NE5T4oBgHgl3EQfQg5R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8255
+ etE1T4oBgHgl3EQfegQF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8256
+ sdFIT4oBgHgl3EQfyyum/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8257
+ CNA0T4oBgHgl3EQfAP_i/content/2301.01961v1.pdf filter=lfs diff=lfs merge=lfs -text
8258
+ pdAyT4oBgHgl3EQfZPdk/content/2301.00219v1.pdf filter=lfs diff=lfs merge=lfs -text
8259
+ KNFOT4oBgHgl3EQfyzQ_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8260
+ sNE0T4oBgHgl3EQfrgFB/content/2301.02566v1.pdf filter=lfs diff=lfs merge=lfs -text
8261
+ PtAyT4oBgHgl3EQf7fqt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8262
+ iNE_T4oBgHgl3EQf4Byz/content/2301.08350v1.pdf filter=lfs diff=lfs merge=lfs -text
8263
+ P9AyT4oBgHgl3EQftvku/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8264
+ K9FOT4oBgHgl3EQfzjRn/content/2301.12932v1.pdf filter=lfs diff=lfs merge=lfs -text
8265
+ vtFAT4oBgHgl3EQfih2j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8266
+ DNAzT4oBgHgl3EQfwf6z/content/2301.01724v1.pdf filter=lfs diff=lfs merge=lfs -text
8267
+ qdFJT4oBgHgl3EQfaSwR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8268
+ odFQT4oBgHgl3EQfrDYd/content/2301.13382v1.pdf filter=lfs diff=lfs merge=lfs -text
8269
+ P9AyT4oBgHgl3EQftvku/content/2301.00599v1.pdf filter=lfs diff=lfs merge=lfs -text
8270
+ tNAzT4oBgHgl3EQfcvzv/content/2301.01410v1.pdf filter=lfs diff=lfs merge=lfs -text
8271
+ XNE3T4oBgHgl3EQf1Qsz/content/2301.04744v1.pdf filter=lfs diff=lfs merge=lfs -text
19AzT4oBgHgl3EQfe_xt/content/tmp_files/2301.01445v1.pdf.txt ADDED
@@ -0,0 +1,1799 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A compositional account of motifs, mechanisms, and dynamics in
2
+ biochemical regulatory networks
3
+ Rebekah Aduddell
4
+ James Fairbanks
5
+ Amit Kumar
6
+ Pablo S. Ocal
7
+ Evan Patterson
8
+ Brandon T. Shapiro
9
+ Abstract
10
+ Regulatory networks depict promoting or inhibiting interactions between molecules in a
11
+ biochemical system. We introduce a category-theoretic formalism for regulatory networks, using
12
+ signed graphs to model the networks and signed functors to describe occurrences of one network
13
+ in another, especially occurrences of network motifs. With this foundation, we establish functorial
14
+ mappings between regulatory networks and other mathematical models in biochemistry. We
15
+ construct a functor from reaction networks, modeled as Petri nets with signed links, to regulatory
16
+ networks, enabling us to precisely define when a reaction network could be a physical mechanism
17
+ underlying a regulatory network. Turning to quantitative models, we associate a regulatory
18
+ network with a Lotka-Volterra system of differential equations, defining a functor from the
19
+ category of signed graphs to a category of parameterized dynamical systems. We extend this
20
+ result from closed to open systems, demonstrating that Lotka-Volterra dynamics respects not
21
+ only inclusions and collapsings of regulatory networks, but also the process of building up complex
22
+ regulatory networks by gluing together simpler pieces. Formally, we use the theory of structured
23
+ cospans to produce a lax double functor from the double category of open signed graphs to that
24
+ of open parameterized dynamical systems. Throughout the paper, we ground the categorical
25
+ formalism in examples inspired by systems biology.
26
+ 1
27
+ Introduction
28
+ The genes, proteins, and RNA molecules that comprise living cells interact in complex, varied ways
29
+ to sustain the cell throughout its lifecycle and respond to changes in its environment. Intensive
30
+ experimental study of these interactions is distilled in an idealized form as regulatory networks,
31
+ a kind of directed graph in which vertices represent molecules and edges represent interactions
32
+ between molecules (Figure 1.1). The edges are labeled with a positive or negative sign according to
33
+ whether the interaction is activating or inhibiting. Regulatory networks are the subject of a large
34
+ body of experimental and theoretical work, notably reviewed by Alon [Alo07; Alo19] and Tyson
35
+ et al [TN10; TLK19] among others. Particular attention has been paid to network motifs [Alo07;
36
+ TN10], the simple but functionally meaningful patterns that recur frequently in regulatory networks,
37
+ and to various quantitative dynamics [TLK19] that can be assigned to the networks.
38
+ Although regulatory networks are simple enough to define mathematically—we shall define them
39
+ to be directed graphs, possibly with multiple edges and loops, whose edges are assigned a positive
40
+ or negative sign—important scientific concepts involving them, such as occurrences of motifs in
41
+ networks and biochemical mechanisms generating networks, are often treated imprecisely. Likewise
42
+ for relationships between regulatory networks and other mathematical models in biochemistry,
43
+ particularly dynamical models based on ordinary or stochastic differential equations. Hence a first
44
+ aim of this paper is to put certain concepts and relations concerning regulatory networks on a firm
45
+ mathematical footing. To do so, we will use methods from category theory.
46
+ 1
47
+ arXiv:2301.01445v1 [q-bio.MN] 4 Jan 2023
48
+
49
+ Ash1
50
+ Cdk1/ClbS
51
+ Sld2
52
+ Figure 1.1: A small biochemical regulatory network: regulation of Sld2 by Cdk1 or ClbS with Ash1 as a
53
+ predicted transcription factor. Adapted from Csikász-Nagy et al [Csi+09, Figure 3C].
54
+ Category theory, in both the small and the large, is a natural tool for this study. In saying that
55
+ a motif occurs in a network, one should allow for the possibility that the occurrence is indirect,
56
+ involving a sequence of appropriately signed interactions. For example, positive autoregulation
57
+ can occur directly but also indirectly through a double-negative feedback loop. Since a small
58
+ category is exactly a graph in which consecutive edges can be composed, subject to certain laws,
59
+ regulatory networks should be viewed not only as signed graphs (Section 2.1) but also as signed
60
+ categories freely generated by those (Section 2.2). Sign-preserving functors, unlike sign-preserving
61
+ graph homomorphisms, can express indirect occurrences and are in this sense a better notion of
62
+ morphism for regulatory networks. Here we are doing category theory in the small, using categories
63
+ as algebraic structures comparable to familiar ones like graphs, groups, and monoids.
64
+ Having laid these foundations for regulatory networks, we turn to category theory in the large, a
65
+ mathematical theory of structure well suited to describe the passages between regulatory networks
66
+ and other mathematical models of biochemical systems. Formally speaking, these passages are
67
+ functors into or out of the category of regulatory networks. Making a functor is significantly stronger
68
+ than making an objects-only mapping, as is typically done in the literature, since if morphisms
69
+ of signed graphs formalize relationships between different regulatory networks, then functorality
70
+ requires that these relationships be transported to or from other models of interest. By contrast,
71
+ an objects-only mapping is, abstractly speaking, entirely unconstrained and so is capable of acting
72
+ highly irregularly across different models of a given class. Functorality thus serves as a kind of
73
+ safeguard for model transformation: it does not, on its own, ensure that a transformation makes
74
+ good scientific sense but it does impose nontrivial logical constraints and coherences.
75
+ A first illustration of this principle is the connection between regulatory networks and biochemical
76
+ reaction networks (Section 2.3). When modeling the complex biochemical systems that constitute a
77
+ living cell, it is often practically necessary to abstract away certain details of the underlying chemical
78
+ processes. Regulatory networks generally do not capture all the species or reactions involved in
79
+ a given system; nor can they capture multispecies reactions faithfully because they describe only
80
+ pairwise interactions. Given that regulatory networks are, to some degree, phenomenological models,
81
+ it is natural to ask whether a given network could arise as a summary of a specific chemical process.
82
+ The latter are described by biochemical reaction networks, graph-like structures allowing reactions
83
+ or transitions with multiple inputs and outputs. Inspired by graphical syntax from systems biology
84
+ [Voi00; Voi13], we formalize reaction networks as “Petri nets with links,” and we construct a functor
85
+ from the category of Petri nets with signed links to the category of signed graphs. This functor
86
+ enables us to propose a formal definition for when a reaction network could be a mechanism for a
87
+ regulatory network, a concept that is rarely if ever treated in a precise way.
88
+ This concludes the content of Section 2. In Section 3, we turn from qualitative to quantitative
89
+ analysis, seeking a functorial assignment of continuous dynamics to regulatory networks. Although
90
+ rarely made explicitly functorial, systematic ways to formulate a model belonging to a mathematically
91
+ homogeneous class of models are ubiquitous in science. Voit calls these “canonical representations”
92
+ 2
93
+
94
+ or “canonical models,”1 and identifies Lotka-Volterra models and BST models/S-systems as two
95
+ prominent examples in biology [Voi13, §3]. Reflecting their phenomenological status, regulatory
96
+ networks do not admit a single, obvious dynamical interpretation, and so a wide variety of dynamical
97
+ models have been considered, spanning the discrete and continuous, deterministic and stochastic
98
+ [TLK19]. We consider the Lotka-Volterra systems of ordinary differential equations. While not
99
+ necessarily the most biologically plausible, it is among the simplest continuous models and hence a
100
+ natural place to begin a functorial study.
101
+ A Lotka-Volterra system of equations has the form
102
+ ˙xi = ρi xi +
103
+ n
104
+
105
+ j=1
106
+ βi,j xi xj,
107
+ i = 1, . . . , n.
108
+ or equivalently, has logarithmic derivatives that are affine functions of the state variables:
109
+ d
110
+ dt[log xi(t)] = ρi +
111
+ n
112
+
113
+ j=1
114
+ βi,j xj(t),
115
+ i = 1, . . . , n.
116
+ The coefficients ρi specify baseline rates of growth or decay, according to their sign, and the
117
+ coefficients βi,j rates of activation or inhibition, according to their sign. We construct a functor
118
+ that sends a signed graph (regulatory network) to a Lotka-Volterra model suitably constraining the
119
+ signs of the rate coefficients (Section 3.2). As a prerequisite, we define a category of parameterized
120
+ dynamical systems (Section 3.1), a construction of intrinsic interest that is by no means confined to
121
+ Lotka-Volterra dynamics.
122
+ In order to comprehend complex biological systems, we must decompose them into small, readily
123
+ understandable pieces and then compose them back together to reproduce the behavior of the
124
+ original system. This is the mantra of systems biology, which stresses that compositionality is no
125
+ less important than reductionism in biology. With this motivation, a secondary aim of this paper
126
+ is to extend the above constructions from closed systems to open ones, which can be composed
127
+ together by gluing them along their interfaces. Mathematically, we pass from categories to double
128
+ categories [Gra19], two-dimensional categorical structures in which the usual morphisms of systems
129
+ compose along one direction (by convention, the “vertical” one) and open systems compose along
130
+ the other direction (the “horizontal” one). Among other results, we show that the Lotka-Volterra
131
+ dynamics functor extends to a lax double functor from the double category of open signed graphs
132
+ to a double category of open parameterized dynamical systems (Section 3.3).
133
+ The mathematics developed here is motivated by biochemistry but need not be restricted to it.
134
+ Famously, Lotka-Volterra systems originated in ecology to model predator-prey dynamics [Lot25].
135
+ Regulatory networks and Lotka-Volterra systems can be used as generic models of entities that
136
+ “regulate” each other in some manner, be it at the scale of individual cells or animal ecosystems.
137
+ Regulatory networks are highly reminiscent of the causal loop diagrams in system dynamics [Ste00,
138
+ Chapter 5], where the latter explicitly label feedback loops and their polarities.
139
+ The language of category theory is indispensable to this work but the level of knowledge assumed
140
+ by the reader is not constant. We assume throughout that the reader is familiar with the basic
141
+ notions of category theory, such as categories, functors, and natural transformations. Our main
142
+ reference for facts about category theory is Riehl’s text [Rie16], although there are many others.
143
+ In the definitions and theorems, we have tried to minimize the technical level and explicate the
144
+ statements in concrete terms. In the proofs, we have aimed for efficiency and freely use concepts
145
+ 1This usage of “canonical” should not be confused with the unrelated, in fact incompatible, meaning of “canonical”
146
+ in pure mathematics, especially category theory.
147
+ 3
148
+
149
+ and results from the literature that do not appear in the main text. The reader can omit the proofs
150
+ without disrupting the continuity of the paper.
151
+ 2
152
+ Qualitative analysis: motifs and mechanisms
153
+ 2.1
154
+ Regulatory networks as signed graphs
155
+ To begin, we clarify the notion of graph to be used throughout in this paper. The following definition
156
+ is standard among category theorists. In other fields, it might be called a “directed multigraph,”
157
+ but we will call it simply a “graph.”
158
+ Definition 2.1 (Graphs). The schema for graphs is the category Sch(Graph) freely generated
159
+ by two parallel morphisms:
160
+ V
161
+ E
162
+ src
163
+ tgt
164
+ .
165
+ A graph is a functor X : Sch(Graph) → Set. A graph homomorphism from a graph X to another
166
+ graph Y is a natural transformation φ : X → Y . Graphs and graph homomorphisms form the
167
+ category Graph.
168
+ To restate the definition in explicit terms, a graph X consists of
169
+ • a set X(V ) of vertices;
170
+ • a set X(E) of edges; and
171
+ • functions X(src), X(tgt) : X(E) → X(V ), assigning to each edge its source and target.
172
+ A graph homomorphism φ : X → Y consists of a function φV : X(V ) → Y (V ), the vertex map,
173
+ and another function φE : X(E) → Y (E), the edge map. These maps must preserve sources and
174
+ targets, meaning that the following squares commute:
175
+ X(E)
176
+ X(V )
177
+ Y (E)
178
+ Y (V )
179
+ X(src)
180
+ φE
181
+ Y (src)
182
+ φV
183
+ X(E)
184
+ X(V )
185
+ Y (E)
186
+ Y (V )
187
+ X(tgt)
188
+ φE
189
+ Y (tgt)
190
+ φV .
191
+ We now turn to the main notion of this section, signed graph. Write Sgn for the set of (nonzero)
192
+ signs, whose two elements may be denoted {1, −1} or {+, −}. The set of signs is an abelian group,
193
+ isomorphic to the cyclic group Z2, under the usual multiplication.
194
+ Definition 2.2 (Signed graphs). The category of signed graphs is the slice category
195
+ SgnGraph := Graph/Sgn,
196
+ where, by abuse of notation, Sgn is regarded as a graph with one vertex and two loops.
197
+ Unpacking the definition, a signed graph is seen to be a graph X equipped with a function
198
+ X(sgn) : X(E) → Sgn that assigns a sign to each edge. Given signed graphs X and Y , a morphism
199
+ of signed graphs from X to Y is a graph homomorphism φ that preserves signs, meaning that
200
+ the following triangle commutes:
201
+ X(E)
202
+ Y (E)
203
+ Sgn
204
+ X(sgn)
205
+ Y (sgn)
206
+ φE
207
+ .
208
+ 4
209
+
210
+ Signed graphs are a mathematical description of the regulatory networks studied in systems
211
+ biology [Alo07; TN10].
212
+ For the purposes of this paper, we will simply define a regulatory
213
+ network to be a signed graph. The vertices of the graph represent the components of the network,
214
+ which could be proteins, genes, or RNA molecules. Signed edges represent interactions between
215
+ components, where the source has the effect of either activating/promoting the target (positive sign)
216
+ or inhibiting/repressing it (negative sign). As is customary, we denote activation interactions by
217
+ arrows with pointed heads (−→) and inhibition interactions by arrows with flat heads (−−⊣). For
218
+ instance, the two drawings
219
+ x
220
+ y
221
+ +
222
+
223
+
224
+ x
225
+ y
226
+ represent the same network, a negative feedback loop in which x activates y, which in turn inhibits
227
+ x [TN10, Scheme 1, Motif B].
228
+ In the literature [TN10], regulatory networks are often modeled as sign-valued matrices. This
229
+ approach is a special case of ours in that an n-by-n matrix valued in {+1, −1, 0} can be interpreted
230
+ as a simple signed graph on n vertices, with signed edges defined by the nonzero matrix elements.
231
+ Unlike the matricial formalism, our formalism allows multiple edges between the same pair of edges,
232
+ which can model multiple interactions based on different mechanisms. Allowing multiple edges and
233
+ self-loops also ensures that graphs and signed graphs form well behaved categories, as the following
234
+ proposition shows.
235
+ Proposition 2.3. The category of signed graphs is complete (has all limits) and cocomplete (has
236
+ all colimits).
237
+ Proof. Because Graph is a copresheaf category, it is complete and cocomplete [Rie16, Proposition
238
+ 3.3.9]. The slice category SgnGraph = Graph/Sgn is hence also complete and cocomplete [Rie16,
239
+ Proposition 3.5.5]; alternatively, this follows because slices of copresheaf categories are again
240
+ (equivalent to) copresheaf categories [Str00, Remark p. 303].
241
+ Colimits of signed graphs can be used to construct a category, or rather a double category, of
242
+ open signed graphs. Composition of open signed graphs formalizes the process of building large
243
+ regulatory networks from smaller pieces, including network motifs.
244
+ Proposition 2.4 (Open signed graphs). There is a symmetric monoidal double category of open
245
+ signed graphs, Open(SgnGraph), having
246
+ • as objects, sets A, B, C, . . . ;
247
+ • as vertical arrows, functions f : A → B;
248
+ • as horizontal arrows, open signed graphs, which consist of a signed graph X together with
249
+ a cospan of sets A0
250
+ ℓ0
251
+ −→ X(V )
252
+ ℓ1
253
+ ←− A1;
254
+ • as cells, morphisms of open signed graphs (X, ℓ0, ℓ1) → (Y, m0, m1), which consist of a
255
+ map of signed graphs φ : X → Y along with functions fi : Ai → Bi, i = 0, 1, making the
256
+ following diagram commute:
257
+ A0
258
+ X(V )
259
+ A1
260
+ B0
261
+ Y (V )
262
+ B1
263
+ ℓ0
264
+ f0
265
+ ℓ1
266
+ φV
267
+ m0
268
+ f1
269
+ m1
270
+ .
271
+ 5
272
+
273
+ Vertical composition is by composition in Set and in SgnGraph. Horizontal composition and monoidal
274
+ products are by pushouts and coproducts in SgnGraph, respectively, viewing the sets in the feet of the
275
+ cospans as discrete signed graphs.
276
+ Proof. To construct this symmetric monoidal double category, we use the method of structured
277
+ cospans [FS07] in its double-categorical form [BC20]. The categories of sets and of signed graphs
278
+ are related by an adjoint pair of functors
279
+ Set
280
+ SgnGraph
281
+ Disc
282
+ evV
283
+
284
+ .
285
+ Here evV : SgnGraph → Set is the evaluation at V functor, sending a signed graph X to its set of
286
+ vertices X(V ) and a morphism of signed graphs φ to its vertex map φV , and Disc : Set → SgnGraph
287
+ is the discrete signed graph functor, sending a set A to the signed graph with vertex set A and no
288
+ edges. We obtain a symmetric monoidal double category of open signed graphs as the L-structured
289
+ cospans for the functor L := Disc : Set → SgnGraph [BC20, Theorems 2.3 and 3.9].
290
+ To show that this symmetric monoidal double category is the same one in the proposition
291
+ statement, suppose that L ⊣ R : A → X is an adjoint pair of functors, where in our application
292
+ L = Disc and R = evV . By the defining bijection of an adjunction, L-structured cospans, i.e.,
293
+ objects A0 and A1 in A together with a cospan L(A0) → X ← L(A1) in X, correspond exactly
294
+ to “R-decorated cospans,” i.e., an object X in X together with a cospan A0 → R(X) ← A1 in A.
295
+ Furthermore, by the naturality of this bijection [Rie16, Lemma 4.1.3], morphisms of L-structured
296
+ and R-decorated cospans
297
+ L(A0)
298
+ X
299
+ L(A1)
300
+ L(B0)
301
+ Y
302
+ L(B1)
303
+ L(f0)
304
+ φ
305
+ L(f1)
306
+
307
+ A0
308
+ R(X)
309
+ A1
310
+ B0
311
+ R(Y )
312
+ B1
313
+ f0
314
+ R(φ)
315
+ f1
316
+ related by the adjunction are equivalent in that one diagram commutes if and only if the other does.
317
+ We will tacitly reuse this reasoning in future constructions, such as Proposition 2.8 below.
318
+ A morphism of signed graphs can do two things. Most obviously, it can pick out a signed graph
319
+ as a subobject of another one, via a sign-preserving subgraph embedding. A signed graph morphism
320
+ can also collapse multiple vertices onto a single vertex, and multiple edges onto a single edge with
321
+ the same sign, in the fairly restrictive sense permitted by a graph homomorphism. To illustrate,
322
+ consider the following morphism inspired by Alon’s review [Alo07, Figure 5].
323
+ argR
324
+ argCBH
325
+ argD
326
+ argE
327
+ argF
328
+ argI
329
+ −→
330
+ argR
331
+ arg∗
332
+ (2.1)
333
+ The network in the domain is a “single-input module” in the arginine biosynthesis system, in which
334
+ the regulator argR represses five different enzymes (argCHB, argD, etc.) involved in producing
335
+ arginine. The morphism above forgets the distinction between these enzymes, collapsing them
336
+ into a catch-all entity labeled “arg∗”. These two functions—embedding and collapsing—are all
337
+ that a signed graph morphism can do, because any such morphism factors essentially uniquely as
338
+ 6
339
+
340
+ an epimorphism (morphism with surjective vertex and edge maps) followed by a monomorphism
341
+ (morphism with injective vertex and edge maps), using the epi-mono factorization available in any
342
+ copresheaf category, or more generally in any topos [MM94, §IV.6].
343
+ 2.2
344
+ Refining regulatory networks using signed categories and functors
345
+ While morphisms of signed graph have their uses, they do not capture the important idea of refining
346
+ regulatory networks, in which an interaction in one network is realized as a composite of several
347
+ interactions in another. To express refinement, we must generalize our notion of morphism from
348
+ graph homomorphisms to functors. This, in turn, requires the concept of a signed category.
349
+ Definition 2.5 (Signed categories). The category of signed categories is the slice category
350
+ SgnCat := Cat/Sgn,
351
+ where Cat is the category of small categories and the group of signs, Sgn, is regarded as a category
352
+ with one object and two morphisms.
353
+ Unpacking the definition, a signed category is a category C in which every morphism f is
354
+ assigned a sign sgn(f) ∈ {1, −1} in a functorial way, meaning that
355
+ sgn(x0
356
+ f1
357
+ −→ x1
358
+ f2
359
+ −→ · · ·
360
+ fn
361
+ −→ xn) =
362
+ n
363
+
364
+ i=1
365
+ sgn(fi)
366
+ for every n ≥ 0 and every sequence of composable morphisms f1, . . . , fn. In particular (n = 0), the
367
+ identity morphisms have positive sign. A morphism of signed categories, or signed functor,
368
+ is a functor F : C → D between signed categories that preserves the signs, meaning that
369
+ sgnD(F(f)) = sgnC(f)
370
+ for every morphism f in C.
371
+ Since our aim is to have a more flexible notion of morphism between signed graphs, we will
372
+ mostly restrict ourselves to those signed categories that are freely generated by a signed graph. The
373
+ free signed category or signed path category functor
374
+ Path : SgnGraph → SgnCat
375
+ sends a signed graph X to the signed category Path(X) having
376
+ • as objects, the vertices of X;
377
+ • as morphisms from x to y, the paths in X from x to y, whose sign is defined to be the product
378
+ of the signs of the edges comprising the path.
379
+ Composition of paths is by concatenation, which clearly preserves the sign. The identity morphism
380
+ at x is the empty path at x, which has positive sign. By convention, if X and Y are signed graphs,
381
+ we say that a signed functor from X to Y is a signed functor F : Path(X) → Path(Y ) between
382
+ the corresponding signed path categories. Since the morphisms of Path(X) are freely generated
383
+ by the edges in X, a signed functor from X to Y is uniquely determined by a morphism of signed
384
+ graphs from X to the underlying signed graph of Path(Y ). This means that each edge in X is
385
+ sent to an appropriately signed path of edges in Y , which can be regarded as a refinement of the
386
+ relationship that the edge represents.
387
+ 7
388
+
389
+ Motif
390
+ Generic instance
391
+ Positive autoregulation
392
+ L+ :=
393
+
394
+
395
+
396
+ Negative autoregulation
397
+ L− :=
398
+
399
+
400
+
401
+ Coherent feedforward loop
402
+ I++ :=
403
+
404
+
405
+
406
+
407
+ Incoherent feedforward loop
408
+ I± :=
409
+
410
+
411
+
412
+
413
+ Positive feedback loop
414
+ L++ :=
415
+
416
+
417
+
418
+
419
+ Negative feedback loop
420
+ L± :=
421
+
422
+
423
+
424
+
425
+ Double-negative feedback loop
426
+ L−− :=
427
+ �•
428
+
429
+
430
+ Table 2.1: Common motifs in biochemical regulation networks [Alo07; TN10]
431
+ We now have a precise language with which to classify network motifs and their occurrences.
432
+ As a first example, Alon identifies four types of incoherent feedforward loop (FFL) involving three
433
+ components,
434
+ x
435
+ x
436
+ x
437
+ x
438
+ y
439
+ y
440
+ y
441
+ y
442
+ z
443
+ z
444
+ z
445
+ z
446
+ ,
447
+ those of type 1, 2, 3, and 4, respectively [Alo07, Figure 2a]. Besides having three components, what
448
+ these motifs have in common is that there exists a signed functor into each of them from the signed
449
+ graph I± :=
450
+
451
+
452
+
453
+
454
+ having two parallel arrows of opposite sign. The network I± is thus the
455
+ “generic” incoherent feedforward loop, in the sense that signed functors out of it refine the pattern
456
+ in specific ways. A similar situation holds for other common network motifs (Table 2.1), which
457
+ motivates the following definition.
458
+ Definition 2.6 (Motif instance). Given a signed graph A, regarded as a motif, an instance or
459
+ occurrence of the motif A in a network X is a monic signed functor A ↣ X.
460
+ Note that a signed functor is a monomorphism exactly when the functor is an embedding of
461
+ categories, i.e., an injective-on-objects, faithful functor. Requiring the functor in the definition to
462
+ be monic excludes “degenerate instances” of motifs where vertices or edges are identified.
463
+ Now, should the incoherent FFL be regarded as a network motif, or is it the more specific types,
464
+ such as the incoherent FFL of type 1, that are motifs? From our point of view, they are all equally
465
+ motifs but they have different degrees of specificity, and the functorial language clarifies how motifs
466
+ are iteratively refined. Specifically, an instance of an incoherent FFL of type 1 in a network X
467
+ also gives an instance of an incoherent FFL in X (of unspecified type), simply by composing the
468
+ monomorphisms involved:
469
+ I± ∼=
470
+
471
+ x
472
+ z
473
+
474
+
475
+
476
+ x
477
+ y
478
+ z
479
+
480
+
481
+ X.
482
+ 8
483
+
484
+ Similarly, in the notation of Table 2.1, any instance of double-negative feedback (L−−) also gives an
485
+ instance of positive autoregulation (L+) [CP09], via the monomorphism L+ ↣ L−− that sends the
486
+ positive loop to the double-negative 2-cycle.
487
+ For any choice of motif A, the mapping that sends a regulatory network X to the set of
488
+ occurrences of A in X is a functor
489
+ HomSgnCatm(Path(A), Path(−)) : SgnGraphm → Set,
490
+ where SgnGraphm and SgnCatm denote the wide subcategories of monomorphisms in SgnGraph and
491
+ SgnCat, respectively. This functor is almost, but not quite, representable, due to the distinction
492
+ between signed graphs and signed categories. More importantly, the existence of this functor means
493
+ that a monomorphism between regulatory networks induces a map between instances of A, for any
494
+ motif A.
495
+ We now extend the construction of open signed graphs to open signed categories.
496
+ Proposition 2.7. The category of signed categories is complete and cocomplete.
497
+ Proof. Because the category Cat is complete and cocomplete [Rie16, Proposition 3.5.6], its slice
498
+ SgnCat = Cat/Sgn is also [Rie16, Proposition 3.5.5].
499
+ Proposition 2.8 (Open signed categories). There is a symmetric monoidal double category of open
500
+ signed categories, Open(SgnCat), having
501
+ • as objects, sets A, B, C, . . . ;
502
+ • as vertical arrows, functions f : A → B;
503
+ • as horizontal arrows, open signed categories, which consist of a signed category C together
504
+ with a cospan of sets A0
505
+ ℓ0
506
+ −→ Ob(C)
507
+ ℓ1
508
+ ←− A1;
509
+ • as cells, morphisms of open signed categories (C, ℓ0, ℓ1) → (D, m0, m1), which consist of
510
+ a signed functor F : C → D along with functions fi : Ai → Bi, i = 0, 1, making the diagram
511
+ commute:
512
+ A0
513
+ Ob(C)
514
+ A1
515
+ B0
516
+ Ob(D)
517
+ B1
518
+ ℓ0
519
+ f0
520
+ ℓ1
521
+ Ob(F)
522
+ m0
523
+ f1
524
+ m1
525
+ .
526
+ Vertical composition is by composition in Set and in SgnCat. Horizontal composition and monoidal
527
+ products are by pushouts and coproducts in SgnCat, respectively, viewing the sets in the feet of
528
+ cospans as discrete signed categories.
529
+ Moreover, the signed path category functor extends to a symmetric monoidal double functor
530
+ Path : Open(SgnGraph) → Open(SgnCat).
531
+ Proof. We take Open(SgnCat) to be the symmetric monoidal double category of L′-structured
532
+ cospans for the functor L′ := Disc : Set → SgnCat involved the composite adjunction
533
+ Set
534
+ SgnCat
535
+ =
536
+ Set
537
+ SgnGraph
538
+ SgnCat
539
+ Disc
540
+ Ob
541
+ Disc
542
+ evV
543
+ U
544
+ Path
545
+
546
+
547
+
548
+ .
549
+ On the right hand side, the first adjunction was already used in the proof of Proposition 2.4, and
550
+ the second adjunction is the free-forgetful adjunction between signed graphs and signed categories.
551
+ 9
552
+
553
+ To prove the last statement, we notice that all functors involved in the commutative square
554
+ Set
555
+ SgnGraph
556
+ Set
557
+ SgnCat
558
+ L=Disc
559
+ L′=Disc
560
+ Path
561
+ are left adjoints, hence preserve colimits. We can therefore appeal to [BC20, Theorem 4.3] to obtain
562
+ a symmetric monoidal double functor
563
+ Open(SgnGraph) ∼= LCsp(SgnGraph) → L′Csp(SgnCat) ∼= Open(SgnCat).
564
+ 2.3
565
+ Mechanistic models as Petri nets with links
566
+ However challenging they may be to identify through experiments and data analysis, regulatory
567
+ networks still only summarize how the components of a complex biochemical system interact.
568
+ Regulatory networks typically include only a subset of the system’s components, and they do not
569
+ model individual reactions and processes, only pairwise promoting or inhibiting interactions between
570
+ components. In this sense, regulatory networks are not fully mechanistic models, even if they have
571
+ a stronger causal interpretation than, say, a correlation matrix.
572
+ By contrast, mechanistic models in biochemistry model individual reactions, which requires a
573
+ different formalism. Pictures like the following, adapted from Voit’s review [Voi13, Figure 4], are
574
+ common in systems biology.
575
+ A
576
+ B
577
+ D
578
+ C
579
+
580
+ (2.2)
581
+ This diagram possesses two distinctive features. First, directed hyperedges represent reactions
582
+ having a number of inputs or outputs different than one. There are, for example, hyperedges from
583
+ B and C to D, from nothing to A (an inflow), and from D to nothing (an outflow). If, in lieu of
584
+ hyperedges, we introduce a second type of vertex, we obtain a structure similar to a Petri net
585
+ A
586
+ B
587
+ C
588
+ D
589
+
590
+ (2.3)
591
+ but with the second distinctive feature of having signed links from the first type of vertices (species)
592
+ to the second type (transitions), whose signs indicate promotion or inhibition.
593
+ In this section, we explain how a Petri net with signed links can provide a mechanism for a
594
+ regulatory network. This involves constructing a functor from Petri nets with signed links to signed
595
+ graphs, approximating the former as the latter. As a prerequisite, we need a rigorous definition of a
596
+ Petri net with links, which seems to be absent from the literature.
597
+ 10
598
+
599
+ Definition 2.9 (Petri net with links). The schema for Petri nets with links is the category
600
+ Sch(LPetri) freely generated by these objects and morphisms:
601
+ I
602
+ S
603
+ O
604
+ T
605
+ L
606
+ srcL
607
+ tgtL
608
+ srcI
609
+ tgtI
610
+ tgtO
611
+ srcO
612
+ .
613
+ A Petri nets with links is a functor P : Sch(LPetri) → Set, and a morphism of these is a natural
614
+ transformation. A morphism φ : P → Q preserves arities if the naturality squares associated
615
+ with the morphisms I → T and O → T are also pullback squares:
616
+ P(I)
617
+ P(T)
618
+ Q(I)
619
+ Q(T)
620
+ P(tgtI)
621
+ φI
622
+ φT
623
+ P(tgtI)
624
+
625
+ P(O)
626
+ P(T)
627
+ Q(O)
628
+ Q(T)
629
+ P(srcO)
630
+ φO
631
+ φT
632
+ P(srcO)
633
+
634
+ .
635
+ Petri nets with links and their morphisms form the category LPetri.
636
+ To explicate the definition, a Petri net with links P consists of
637
+ • a set P(S) of species;
638
+ • a set P(T) of transitions;
639
+ • a set P(I) of input arcs going from species to transitions, via maps P(srcI) : P(I) → P(S)
640
+ and P(tgtI) : P(I) → P(T);
641
+ • a set P(O) of output arcs going from transitions to species, via maps P(srcO) : P(O) → P(T)
642
+ and P(tgtO) : P(O) → P(S); and finally
643
+ • a set P(L) of links going from species to transitions, via maps P(srcL) : P(L) → P(S) and
644
+ P(tgtL) : P(L) → P(T).
645
+ The property of preserving arities, called “etale” by Kock [Koc22, §3.4], means that a morphism
646
+ φ : P → Q of Petri nets with links preserves the input and output arities of all transitions. Namely,
647
+ for each transition t in the net P the map φI : P(I) → Q(I) restricts to a bijection between the
648
+ input arcs to t and to φT (t), and similarly the map φO : P(O) → Q(O) restricts to a bijection
649
+ between the output arcs from t and from φT (t). This property seems appropriate for many purposes,
650
+ including in biochemistry, but for mathematical convenience we will not always assume it.
651
+ Remark 2.10 (Related literature). Our definition of a Petri net with links, while apparently novel,
652
+ is the obvious joint generalization of two existing concepts. Kock has described Petri nets as
653
+ copresheaves on a category with objects S, T, I, O [Koc22], calling them whole-grain Petri nets to
654
+ distinguish them from classical Petri nets, whose semantics are subtly different [Bae+21]. Meanwhile,
655
+ the concept of a link is essential to stock and flow diagrams, originating in the field of system
656
+ dynamics [For61; Ste00] and recently given a rigorous categorical account [Bae+22]. We also note
657
+ that the Petri nets with catalysts proposed by Baez, Foley, and Moeller [BFM19] differ significantly
658
+ from Petri nets with links: the former fix a subset of the species to be catalysts throughout the net,
659
+ whereas the latter uses links to make catalyzation specific to individual reactions.
660
+ 11
661
+
662
+ Remark 2.11 (Petri nets as typed graphs). Like bare Petri nets, Petri nets with links can be described
663
+ as graphs with two types of vertices. To see this, take the graph
664
+ TLPetri :=
665
+
666
+
667
+
668
+
669
+
670
+
671
+
672
+ S
673
+ T
674
+ I
675
+ L
676
+ O
677
+
678
+
679
+
680
+
681
+
682
+
683
+
684
+ with vertices S and T and edges I, O, and L. The category of Petri nets with links and natural
685
+ transformations is isomorphic to the slice category Graph/TLPetri. Moreover, the schema category
686
+ Sch(LPetri) is isomorphic to the category of elements of the functor TLPetri : Sch(Graph) → Set,
687
+ exemplifying a general fact about slices of copresheaf categories [Str00, Remark p. 303].
688
+ Petri nets with signed links are defined analogously to signed graphs (Definition 2.2).
689
+ Definition 2.12 (Petri nets with signed links). The category of Petri nets with signed links
690
+ is the slice category
691
+ SgnPetri := LPetri/PSgn,
692
+ where PSgn is the Petri net with links having one species, one transition, one input arc, one output
693
+ arc, and two links, namely the elements of Sgn.
694
+ Incidentally, the morphism P → PSgn defining a Petri net with signed links does not preserve
695
+ arities unless every transition in P has exactly one input and one output.
696
+ We now turn to the main construction of this section, a functor that “approximates” a Petri net
697
+ with signed links as a signed graph. On the example in Equations (2.2) and (2.3), this functor gives
698
+ the signed graph
699
+ A
700
+ B
701
+ D
702
+ C
703
+ .
704
+ (2.4)
705
+ In general, the resulting signed graph has, as vertices, the Petri net’s species and has signed edges
706
+ for each of the four cases:
707
+ (a) for every input-output pair to a transition, a positive edge from input to output;
708
+ (b) for every input to a transition, a negative self loop, representing consumption by the reaction;
709
+ (c) for every signed link, an edge of opposite sign going from the linked species to each input to
710
+ the linked transition;
711
+ (d) for every signed link, an edge of equal sign going from the linked species to each output from
712
+ the linked transition.
713
+ All four cases are visible in the example of Equation (2.4). Set-theoretically, each of these cases is
714
+ the result of a conjunctive query, or equivalently of a representable functor
715
+ HomLPetri(P, −) : LPetri → Set
716
+ associated with a particular Petri net with links P, the generic instance for that query. The four
717
+ generic instances we need are shown in Figure 2.1. Their sum is a disjoint union of conjunctive
718
+ queries, or duc-query for short.
719
+ 12
720
+
721
+ (a) Input-output pair to tran-
722
+ sition
723
+ (b) Input to transition
724
+ (c) Input to transition with
725
+ incident link
726
+ (d) Output from transition
727
+ with incident link
728
+ Figure 2.1: Four different Petri nets with links. For each of these instances P, evaluating the representable
729
+ functor HomLPetri(P, −) : LPetri → Set gives the edges for one case in the case analysis that defines the functor
730
+ from Petri nets with signed links to signed graphs (Proposition 2.13).
731
+ To make the construction just sketched on objects fully precise and functorial, we use Spivak’s
732
+ theory of functorial data migration based on duc-queries [Spi21]. In order to apply it, we fully
733
+ schematize the definitions of signed graphs and Petri nets with signed links.
734
+ The schema for signed graphs is the category Sch(SgnGraph) freely generated by these objects
735
+ and morphisms:
736
+ V
737
+ E
738
+ A
739
+ neg
740
+ src
741
+ tgt
742
+ sgn
743
+ .
744
+ A signed graph as in Definition 2.2 is equivalent to a functor X : Sch(SgnGraph) → Set such that
745
+ X(A) = Sgn, the set of signs, and X(neg) : Sgn → Sgn is negation (i.e., multiplication by −1). Note
746
+ that negation is not needed to define the data of a signed graph but is relevant to the data migration.
747
+ A morphism of signed graphs X → Y is a natural transformation φ : X → Y whose component at
748
+ A is the identity function, φA = 1Sgn. We thus obtain a category isomorphic to SgnGraph.
749
+ Similarly, the schema for Petri nets with signed links is the category Sch(SgnPetri) freely
750
+ generated by:
751
+ S
752
+ I
753
+ O
754
+ L
755
+ A
756
+ T
757
+ neg
758
+ srcL
759
+ tgtL
760
+ srcI
761
+ tgtI
762
+ tgtO
763
+ srcO
764
+ sgn
765
+ one
766
+ .
767
+ A Petri net with signed links, as in Definition 2.12, is equivalent to a functor P : Sch(SgnPetri) → Set
768
+ such that P(A) = Sgn, the map P(neg) : Sgn → Sgn is negation, and P(one) : P(T) → Sgn is the
769
+ constant map at +1. Again, these maps are needed for data migration, not for the data itself. A
770
+ morphism of Petri nets with signed links is a natural transformation φ : P → Q such φA = 1Sgn,
771
+ yielding a category isomorphic to SgnPetri.
772
+ Proposition 2.13 (Regulatory net induced by Petri net). A functor
773
+ Net : SgnPetri → SgnGraph
774
+ 13
775
+
776
+ is specified by the following functor from Sch(SgnGraph) to the category of duc-queries on Sch(SgnPetri):
777
+ Sch(SgnGraph) → ⨿
778
+ ��
779
+ SetSch(SgnPetri)�op�
780
+ V �→ S
781
+ E �→ I ×T O + I + I ×T L + O ×T L
782
+ A �→ A
783
+ src �→ [srcI ◦πI, srcI, srcL ◦πL, srcL ◦πL]
784
+ tgt �→ [tgtO ◦πO, srcI, srcI ◦πI, tgtO ◦πO]
785
+ sgn �→ [one ◦πT , neg ◦ one ◦ tgtI, neg ◦ sgn ◦πL, sgn ◦πL]
786
+ neg �→ neg .
787
+ (2.5)
788
+ Proof. We will define the functor Net : SgnPetri → SgnGraph as the restriction of a functor
789
+ SetD → SetC between the categories of copresheaves on D := Sch(SgnPetri) and C := Sch(SgnGraph).
790
+ In fact, the functor SetD → SetC will be of the special kind known as a parametric right adjoint
791
+ [Str00, Definition p. 311].
792
+ According to the theory of data migration [Spi21, Corollary 2.3.6], giving a parametric right
793
+ adjoint SetD → SetC is equivalent to giving a functor from C to ⨿((SetD)op), the free coproduct
794
+ completion of the free limit completion of D. Our functor C → ⨿((SetD)op) is defined by Equa-
795
+ tion (2.5). The assignment of E ∈ C can also be described as the sum of the four representables
796
+ associated with the Petri nets with links in Figure 2.1.
797
+ Finally, the assignments A �→ A and neg �→ neg ensure that if P is a copresheaf on D with
798
+ P(A) = Sgn and P(neg) is negation, then applying this parametric right adjoint functor to P yields
799
+ a copresheaf X on C where again X(A) = Sgn and X(neg) is negation. Thus, this functor between
800
+ copresheaf categories restricts to a functor SgnPetri → SgnGraph as claimed.
801
+ With this construction, we can give a formal account of what it means to have a mechanistic
802
+ model for a regulatory network.
803
+ Definition 2.14 (Mechanism). A mechanistic model for a regulatory network X is a Petri
804
+ net with signed links P together with an occurrence of X in Net(P), i.e., a monic signed functor
805
+ X ↣ Net(P).
806
+ For example, the Petri net with signed links in Equation (2.3) is a mechanistic model for a
807
+ regulatory network in which A and D participate in a positive feedback loop:
808
+ A
809
+ D .
810
+ 3
811
+ Quantitative analysis: parameters and dynamics
812
+ 3.1
813
+ Parameterized dynamical systems
814
+ Pioneering the idea of functorial semantics for scientific models, Baez and Pollard extended the
815
+ mass-action model of reaction networks to a functor from the category of Petri nets with rates
816
+ into a category of dynamical systems [BP17]. In this picture, the reaction rate coefficients are
817
+ known constants associated with the reaction network. In practice, however, rate coefficients are
818
+ often unknown and must be extracted from existing literature or estimated from experimental data.
819
+ We therefore change our perspective slightly and consider dynamical systems not in isolation but
820
+ as parameterized families. This shift also turns out to have formal advantages: the category of
821
+ 14
822
+
823
+ parameterized dynamical systems is better behaved than the category of dynamical systems, which
824
+ has too few morphisms.
825
+ To begin, we recall the dynamics functor, nearly identical to Baez-Pollard’s [BP17, Lemma 15]:
826
+ Lemma 3.1 (Dynamics). There is a functor Dynam : FinSet → VectR that sends
827
+ • a finite set S to the vector space of algebraic vector fields v : RS → RS, where algebraic
828
+ means that the components of the vector field are polynomials in the state variables;
829
+ • a function f : S → S′ between finite sets to the linear transformation
830
+ (v : RS → RS)
831
+ �→
832
+ (f∗ ◦ v ◦ f∗ : RS′ → RS′),
833
+ where the linear map f∗ : RS′ → RS is the pullback along f
834
+ f∗(x′)(i) := x′(f(i)),
835
+ x′ ∈ RS′, i ∈ S,
836
+ and the linear map f∗ : RS → RS′ is the pushforward along f
837
+ f∗(x)(i′) :=
838
+
839
+ i∈f−1(i′)
840
+ x(i),
841
+ x ∈ RS, i′ ∈ S′.
842
+ Proof. The functor Dynam : FinSet → VectR can be constructed as the composite
843
+ FinSet
844
+ ⟨D,F⟩
845
+ −−−−→ Vectop
846
+ R × VectR
847
+ Poly(−,−)
848
+ −−−−−−→ VectR,
849
+ where F : FinSet → VectR is the free vector space functor (restricted to finite sets); D : FinSetop →
850
+ VectR is the dual vector space functor (restricted to F), whose underlying set-valued functor is
851
+ VectR(F(−), R) ∼= Set(−, R) : FinSetop → Set;
852
+ and Poly(−, −) is the VectR-enriched hom-functor that sends a pair of vector spaces to the vector
853
+ space of polynomial maps between them.2
854
+ The dynamics functor is the same one studied by Baez and Pollard except that we take the
855
+ vector space, rather than merely the set, of vector fields. That is because we are interested in
856
+ linearly parameterized dynamical systems. In calling the functor “dynamics,” we implictly identify a
857
+ vector field with the differentiable dynamical system that it generates. This common practice is not
858
+ entirely innocent since even when a system of differential equations depends linearly on parameters,
859
+ its solutions rarely do. We also note that the restriction to algebraic vector fields, as opposed to
860
+ smooth or even just continuous ones, is inessential but suffices for us and agrees with Baez-Pollard.
861
+ The dynamics functor is the main building block in constructing a category of parameterized
862
+ dynamical systems.
863
+ Definition 3.2 (Linear parameterizations). The category of linearly parameterized dynami-
864
+ cal systems is the comma category
865
+ Para(Dynam) := F/ Dynam,
866
+ where F : FinSet → VectR, X �→ RX is the free vector space functor restricted to finite sets.
867
+ 2For a coordinate-free description of polynomial maps between vector spaces, see [Car71, §1.6].
868
+ 15
869
+
870
+ So, by definition, a linearly parameterized dynamical system consists of a finite set P, the
871
+ parameter variables, and a finite set S, the state variables, together with a linear map
872
+ v : RP → Dynam(S)
873
+ sending each choice of parameters θ ∈ RP to an algebraic vector field v(θ). In more conventional
874
+ notation, we can write v(x; θ) := v(θ)(x) for x ∈ RS and θ ∈ RP . A morphism (P, S, v) → (P ′, S′, v′)
875
+ of linearly parameterized dynamical systems is a pair of functions q : P → P ′ and f : S → S′
876
+ making the square
877
+ RP
878
+ Dynam(S)
879
+ RP ′
880
+ Dynam(S′)
881
+ v
882
+ f∗◦(−)◦f∗
883
+ v′
884
+ q∗
885
+ (3.1)
886
+ commute, or equivalently making the equation
887
+ f∗(v(f∗(x′); θ)) = v′(x′; q∗(θ))
888
+ hold for all x′ ∈ RS′ and θ ∈ RP .
889
+ While certainly not all dynamical models depend linearly on their parameters, a great many
890
+ of them do, including several important canonical models in biology and chemistry. The law of
891
+ mass action defines dynamical systems that depend linearly on the rate coefficients. The generalized
892
+ Lotka-Volterra equations, studied in the next section, are linear in the rate and affinity parameters.
893
+ Of course, the mass-action and Lotka-Volterra equations are nonlinear ODEs; linearity of a vector
894
+ field in state or in parameters are separate matters. Nevertheless, even for nonlinear models such
895
+ as Lotka-Volterra, linearity in parameters is a useful assumption that aides in the identifiability
896
+ analysis of the model [SRS14, §5].
897
+ To express important physical constraints and to define a semantics for signed graphs, we will
898
+ restrict the dynamical system and its parameters to be nonnegative. This is straightforward enough
899
+ but requires a bit of additional formalism.
900
+ Write R+ := {x ∈ R : x ≥ 0} for the semiring of nonnegative real numbers. A module over R+
901
+ is called a conical space, and the category of conical spaces and conic-linear (R+-linear) maps is
902
+ denoted Con := ModR+. A conical space is a structure in which one can take linear combinations
903
+ with nonnegative real coefficients, just as a real vector space (R-module) is a structure in which
904
+ one can take linear combinations with arbitrary real coefficients. Any convex cone in a real vector
905
+ space is a conical space. Our main example is the nonnegative orthant of RS for some set S: the
906
+ function space RS
907
+ + := {x : S → R+}, with conical combinations taken pointwise. A real vector space
908
+ can itself be regarded as a conical space; more precisely, the inclusion of semirings R+ �→ R induces
909
+ a forgetful functor VectR → Con by restriction of scalars.
910
+ Recall that a dynamical system is nonnegative if whenever the initial condition is in the
911
+ nonnegative orthant, its trajectory always remains in the nonnegative orthant. A dynamical system
912
+ of form ˙x = v(x) is nonnegative if and only if vi(x) ≥ 0 whenever x ≥ 0 componentwise and
913
+ xi = 0 [HCH10, Proposition 2.1], in which case the vector field v is called essentially nonnegative
914
+ [HCH10, Definition 2.1]. Using this criterion, it is easy to see that a reaction network with mass-
915
+ action kinetics is nonnegative assuming the rate constants are nonnegative, as is a Lotka-Volterra
916
+ system for any choice of parameters. Hence both systems satisfy the obvious physical constraint
917
+ that no species should have negative concentration or population.
918
+ Lemma 3.3 (Nonnegative dynamics). There is a functor Dynam+ : FinSet → Con that sends a
919
+ finite set S to the conical space of essentially nonnegative, algebraic vector fields v : RS → RS and
920
+ sends a function f : S → S′ to the transformation v �→ f∗ ◦ v ◦ f∗.
921
+ 16
922
+
923
+ Proof. The proof is similar to that of Lemma 3.1. It is clear that the essentially nonnegative functions
924
+ are stable under pointwise conical combinations, hence form a conical space. (They are, of course, not
925
+ stable under arbitrary linear combinations.) We just need to check that if v : RS → RS is essentially
926
+ nonnegative, then so is the transformed vector field f∗ ◦ v ◦ f∗ : RS′ → RS′. Fix x′ ∈ RS′
927
+ + and i′ ∈ S′,
928
+ and suppose that x′(i′) = 0. For every i ∈ f−1(i′), we have f∗(x′)(i) = x′(f(i)) = x′(i′) = 0 and so
929
+ v(f∗(x′))(i) ≥ 0, whence the inequality of essential nonnegativity follows:
930
+ (f∗ ◦ v ◦ f∗)(x′)(i′) =
931
+
932
+ i∈f−1(i′)
933
+ v(f∗(x′))(i) ≥ 0.
934
+ We now define the conical analogue of linearly parameterized dynamical systems.
935
+ Definition 3.4 (Conical parameterizations). The category of conically parameterized non-
936
+ negative dynamical systems is the comma category
937
+ Para(Dynam+) := F+/ Dynam+ .
938
+ where F+ : FinSet → Con, X �→ RX
939
+ + is the free conical space functor restricted to finite sets.
940
+ So, a conically parameterized nonnegative dynamical system consists of finite sets P and S
941
+ together with a conic-linear map
942
+ v : RP
943
+ + → Dynam+(S).
944
+ Proposition 3.5 (Colimits of parameterized dynamical systems). The categories of linearly and
945
+ conically parameterized dynamical systems are finitely cocomplete. Moreover, these finite colimits
946
+ are computed by colimits in FinSet of the parameter variables and of the state variables.
947
+ Proof. The category FinSet has finite colimits and the functors F : FinSet → VectR and F+ :
948
+ FinSet → Con preserve finite colimits, since they are composites of the inclusion FinSet �→ Set with
949
+ the left adjoints
950
+ Set
951
+ VectR
952
+ F
953
+ U
954
+
955
+ and
956
+ Set
957
+ Con
958
+ F+
959
+ U+
960
+
961
+ to the underlying set functors on vector spaces and conical spaces. By Lemma 3.6 below, the comma
962
+ categories Para(Dynam) = F/ Dynam and Para(Dynam+) = F+/ Dynam+ have finite colimits,
963
+ which are preserved by the projection functors onto FinSet.
964
+ To illustrate, we describe the initial object and binary coproducts in Para(Dynam). The initial
965
+ linearly parameterized dynamical system has no parameter variables, no state variables, and the
966
+ unique (trivial) vector field on the zero vector space. The coproduct of two linearly parameterized
967
+ dynamical systems (P1, S1, v1) and (P2, S2, v2) has parameter variables P1 + P2, state variables
968
+ S1 + S2, and parameterized vector field
969
+ RP1+P2 ∼= RP1 ⊕ RP2
970
+ v1⊕v2
971
+ −−−−→ Dynam(S1) ⊕ Dynam(S2)
972
+ [Dynam(ι1),Dynam(ι2))]
973
+ −−−−−−−−−−−−−−−→ Dynam(S1 + S2),
974
+ where ι1 : S1 → S1 +S2 and ι2 : S2 → S1 +S2 are the canonical inclusions. In conventional notation,
975
+ the coproduct system has parameterized vector field
976
+ v
977
+ ��
978
+ x1
979
+ x2
980
+
981
+ ;
982
+
983
+ θ1
984
+ θ2
985
+ ��
986
+ =
987
+
988
+ v1(x1; θ1)
989
+ v2(x2; θ2)
990
+
991
+ .
992
+ The proof of Proposition 3.5, as well as of Theorems 3.7 and 3.8 below, depends on the following
993
+ technical lemma about comma categories, which the reader can omit without loss of continuity.
994
+ 17
995
+
996
+ Lemma 3.6 (Colimits in comma categories). Let C0
997
+ F0
998
+ −→ C
999
+ F1
1000
+ ←− C1 be a cospan of categories such
1001
+ that C0 and C1 have colimits of shape J and F0 preserves J-shaped colimits. Then the comma category
1002
+ F0/F1 also has J-shaped colimits, and the projection functors πi : F0/F1 → Ci, i = 0, 1, preserve
1003
+ those colimits.
1004
+ Furthermore, a functor G : X → F0/F1 into the comma category preserves J-shaped colimits
1005
+ whenever the associated functors Gi := πi ◦ G : X → Ci, i = 0, 1, do so.
1006
+ Proof. Colimits in the comma category F0/F1 are constructed in [RB88, §5.2]. To make the rest of
1007
+ the proof self-contained, we recall the construction here.
1008
+ By the universal property of the comma category, a diagram D : J → F0/F1 is equivalent to
1009
+ diagrams Di := πi ◦ D : J → Ci, i = 0, 1, along with a natural transformation ⃗D : F0 ◦ D0 ⇒ F1 ◦ D1.
1010
+ Let (ci, λi) be a colimit cocone for the diagram Di in Ci, having legs Di(j)
1011
+ λi
1012
+ j
1013
+ −→ ci for each j ∈ J.
1014
+ The family of morphisms
1015
+ F0(D0(j))
1016
+ ⃗Dj
1017
+ −−→ F1(D1(j))
1018
+ F1(λ1
1019
+ j)
1020
+ −−−−→ F1(c1),
1021
+ j ∈ J,
1022
+ is then a cocone under F0 ◦ D0. Since F0 preserves J-shaped limits, (F0(c0), F0 ∗ λ0) is a colimit
1023
+ cocone for F0 ◦ D0, so by its universal property, there exists a unique morphism f : F0(c0) → F1(c1)
1024
+ making the squares commute:
1025
+ F0(D0(j))
1026
+ F1(D1(j))
1027
+ F0(c0)
1028
+ F1(c1)
1029
+ ⃗Dj
1030
+ f
1031
+ F0(λ0
1032
+ j)
1033
+ F1(λ1
1034
+ j) ,
1035
+ j ∈ J.
1036
+ Setting λ := (λ0
1037
+ j, λ1
1038
+ j)j∈J, the cocone ((c0, c1, f), λ) can be shown to be a colimit of the diagram D.
1039
+ To prove the last statement about colimit preservation, let D : J → X be a diagram with colimit
1040
+ cocone (x, λ), having legs Dj
1041
+ λj
1042
+ −→ y for j ∈ J. We must show that its image cocone (G(x), G ∗ λ) is
1043
+ a colimit of the diagram G ◦ D in F0/F1. By the universal property of the comma category, the
1044
+ functor G : X → F0/F1 is equivalent to the functors Gi : X → Ci, i = 0, 1, along with a natural
1045
+ transformation ⃗G : F0 ◦ G0 ⇒ F1 ◦ G1. The image cocone (G(x), G ∗ λ) then amounts to cocones
1046
+ (G0(x), G0 ∗ λ) and (G1(x), G1 ∗ λ), which by hypothesis are colimits of the diagrams G0 ◦ D and
1047
+ G1 ◦ D in C0 and C1, together with a family of commutative squares in C:
1048
+ F0(G0(Dj))
1049
+ F1(G1(Dj))
1050
+ F0(G0(x))
1051
+ F1(G1(x))
1052
+ ⃗GDj
1053
+ F0(G0(λj))
1054
+ ⃗Gx
1055
+ F1(G1(λj)) ,
1056
+ j ∈ J.
1057
+ But a morphism ⃗Gx making all these squares commute is already uniquely determined by the
1058
+ universal property of the colimit cocone (F0(G0(x)), F0 ∗ G0 ∗ λ) for the diagram F0 ◦ G0 ◦ D, using
1059
+ the hypothesis that F0 preserves J-shaped colimits. Indeed, this is precisely how one constructs the
1060
+ colimit of the diagram G ◦ D in F0/F1, as shown above. It follows that (G(x), G ∗ λ) is a colimit
1061
+ cocone for G ◦ D.
1062
+ 18
1063
+
1064
+ 3.2
1065
+ The Lotka-Volterra dynamical model
1066
+ A Lotka-Volterra system with n species has, using matrix notation, the vector field
1067
+ v(x; ρ, β) := x ⊙ (ρ + βx) = diag(x)(ρ + βx)
1068
+ with state vector x ∈ Rn and arbitrary real-valued parameters ρ ∈ Rn and β ∈ Rn×n [SMH18, §2.2].
1069
+ In coordinates, the vector field is
1070
+ vi(x; ρ, β) = xi
1071
+
1072
+ �ρi +
1073
+ n
1074
+
1075
+ j=1
1076
+ βi,jxj
1077
+
1078
+ � = ρixi +
1079
+ n
1080
+
1081
+ j=1
1082
+ βi,jxixj,
1083
+ i = 1, . . . , n.
1084
+ The parameter ρi sets the baseline rate of growth (when positive) or decay (when negative) for
1085
+ species i, whereas βi,j defines a promoting (when positive) or inhibiting (when negative) effect of
1086
+ species j on species i. In typical applications the signs of the parameters are fixed and known in
1087
+ advance of any data. For example, in the famous predator-prey Lotka-Volterra system
1088
+ ˙x = ax − bxy
1089
+ ˙y = dxy − cy,
1090
+ with prey x and predators y, the parameters ρ =
1091
+
1092
+ a
1093
+ −c
1094
+
1095
+ and β =
1096
+
1097
+ 0
1098
+ −b
1099
+ d
1100
+ 0
1101
+
1102
+ are specified by nonnegative
1103
+ real numbers a, b, c, d ≥ 0.
1104
+ In this section, we define quantitative semantics for graphs and signed graphs using the Lotka-
1105
+ Volterra dynamical model. To illustrate the main ideas, we first construct a functor from finite
1106
+ graphs (Definition 2.1) to linearly parameterized dynamical systems (Definition 3.2), giving a
1107
+ semantics for unlabeled graphs. It is more useful to have a semantics for regulatory networks, which
1108
+ we have defined to be signed graphs. We therefore construct a second functor from finite signed
1109
+ graphs (Definition 2.2) to conically parameterized nonnegative dynamical systems (Definition 3.4).
1110
+ Recall that a graph is finite if its vertex and edge sets are both finite. Let FinGraph denote the
1111
+ full subcategory of Graph spanned by finite graphs.
1112
+ Theorem 3.7 (Lotka-Volterra model for finite graphs). There is a functor
1113
+ LV : FinGraph → Para(Dynam)
1114
+ that sends
1115
+ • a finite graph X to the linearly parameterized dynamical system with parameter variables
1116
+ P := X(V ) + X(E), state variables S := X(V ), and algebraic vector field3
1117
+ v(x; ρ, β)(i) := ρ(i) x(i) +
1118
+
1119
+ (e:i′→i)∈X
1120
+ β(e) x(i′) x(i),
1121
+ x ∈ RX(V ), i ∈ X(V ),
1122
+ parameterized by vectors ρ ∈ RX(V ) and β ∈ RX(E);
1123
+ • a graph homomorphism φ : X → Y to a morphism of systems with parameter variable map
1124
+ φV + φE : X(V ) + X(E) → Y (V ) + Y (E) and state variable map φV : X(V ) → Y (V ).
1125
+ Moreover, the functor LV preserves finite colimits.
1126
+ 3For a fixed graph X and vertex i ∈ X(V ), the notation (e : i′ → i) ∈ X means any edge e ∈ X(tgt)−1(i) incoming
1127
+ to i, whose source i′ = X(src)(e) varies with e.
1128
+ 19
1129
+
1130
+ Proof. By the universal property of the comma category Para(Dynam) = F/ Dynam, to give a
1131
+ functor LV : FinGraph → Para(Dynam) is to give a pair of functors LV0, LV1 : FinGraph → FinSet
1132
+ along with a natural transformation
1133
+
1134
+ LV : (F ◦ LV0) ⇒ (Dynam ◦ LV1) : FinGraph → VectR.
1135
+ We set LV0(X) := X(V ) + X(E) and LV1(X) := X(V ). Using the universal property of the
1136
+ coproduct in VectR, the components
1137
+
1138
+ LVX : RX(V ) ⊕ RX(E) ∼= RX(V )+X(E) → Dynam(X(V )).
1139
+ of the transformation ⃗
1140
+ LV themselves decompose into two parts, call them
1141
+ v0
1142
+ X := ⃗
1143
+ LV
1144
+ 0
1145
+ X : RX(V ) → Dynam(X(V ))
1146
+ and
1147
+ v1
1148
+ X := ⃗
1149
+ LV
1150
+ 1
1151
+ X : RX(E) → Dynam(X(V )).
1152
+ We define these to be
1153
+ v0
1154
+ X(x; ρ)(i) := ρ(i) x(i)
1155
+ and
1156
+ v1
1157
+ X(x; β)(i) :=
1158
+
1159
+ e∈X(tgt)−1(i)
1160
+ β(e) x(X(src)(e)) x(i).
1161
+ Putting the pieces back together reproduces the first statement of the theorem. We just need to
1162
+ check that the transformation ⃗
1163
+ LV is, in fact, natural.
1164
+ Given a graph homomorphism φ : X → Y , the naturality square for the transformation ⃗
1165
+ LV is
1166
+ RX(V )+X(E)
1167
+ Dynam(X(V ))
1168
+ RY (V )+Y (E)
1169
+ Dynam(Y (V ))
1170
+
1171
+ LVX
1172
+ (φV +φE)∗
1173
+ (φV )∗◦(−)◦(φV )∗
1174
+
1175
+ LVY
1176
+ ,
1177
+ (3.2)
1178
+ which decomposes into two squares,
1179
+ RX(V )
1180
+ Dynam(X(V ))
1181
+ RY (V )
1182
+ Dynam(Y (V ))
1183
+ v0
1184
+ X
1185
+ (φV )∗
1186
+ (φV )∗◦(−)◦(φV )∗
1187
+ v0
1188
+ Y
1189
+ and
1190
+ RX(E)
1191
+ Dynam(X(V ))
1192
+ RY (E)
1193
+ Dynam(Y (V ))
1194
+ v1
1195
+ X
1196
+ (φE)∗
1197
+ (φV )∗◦(−)◦(φV )∗
1198
+ v1
1199
+ Y
1200
+ .
1201
+ Let us check that both squares commute. For the first, we have
1202
+ (φV )∗(v0
1203
+ X(φ∗
1204
+ V (y); ρ))(j) =
1205
+
1206
+ i∈φ−1
1207
+ V (j)
1208
+ v0
1209
+ X(y ◦ φV ; ρ)(i) =
1210
+
1211
+ i∈φ−1
1212
+ V (j)
1213
+ ρ(i) y(φV (i))
1214
+ =
1215
+
1216
+
1217
+
1218
+
1219
+ i∈φ−1
1220
+ V (j)
1221
+ ρ(i)
1222
+
1223
+
1224
+ � y(j) = v0
1225
+ Y (y; (φV )∗(ρ))(j)
1226
+ 20
1227
+
1228
+ for all y ∈ RY (V ), ρ ∈ RX(V ), and j ∈ Y (V ). For the second, we have
1229
+ (φV )∗(v1
1230
+ X(φ∗
1231
+ V (y); β))(j) =
1232
+
1233
+ i∈φ−1
1234
+ V (j)
1235
+ v1
1236
+ X(y ◦ φV ; β)(i)
1237
+ =
1238
+
1239
+ i∈φ−1
1240
+ V (j)
1241
+
1242
+ e∈X(tgt)−1(i)
1243
+ β(e) y(φV (X(src)(e))) y(j)
1244
+ =
1245
+
1246
+ f∈Y (tgt)−1(j)
1247
+
1248
+ e∈φ−1
1249
+ E (f)
1250
+ β(e) y(Y (src)(φE(e))) y(j)
1251
+ =
1252
+
1253
+ f∈Y (tgt)−1(j)
1254
+
1255
+
1256
+
1257
+
1258
+ e∈φ−1
1259
+ E (f)
1260
+ β(e)
1261
+
1262
+
1263
+ � y(Y (src)(f))y(j)
1264
+ = v1
1265
+ Y (y; (φE)∗(β))(j),
1266
+ for all y ∈ RY (V ), β ∈ RX(E), and j ∈ Y (V ). When exchanging the order of the summations we
1267
+ have used the facts that the graph homomorphism φ : X → Y preserves sources and targets, the
1268
+ latter in its contravariant form
1269
+ X(E)
1270
+ X(V )
1271
+ Y (E)
1272
+ Y (V )
1273
+ X(tgt)
1274
+ φE
1275
+ Y (tgt)
1276
+ φV
1277
+
1278
+ P(Y (V ))
1279
+ P(X(V ))
1280
+ P(Y (E))
1281
+ P(X(E))
1282
+ X(tgt)−1
1283
+ φ−1
1284
+ E
1285
+ Y (tgt)−1
1286
+ φ−1
1287
+ V
1288
+ ,
1289
+ where P(S) denotes the power set of a set S.
1290
+ Finally, we must verify that the functor LV preserves finite colimits. By Lemma 3.6, that
1291
+ happens provided both functors LV0, LV1 : FinGraph → FinSet preserve finite colimits. The functor
1292
+ LV1 = evV is an evaluation functor on a copresheaf category, hence preserves colimits [Rie16,
1293
+ Proposition 3.3.9].
1294
+ Since coproducts commute with colimits, the pointwise coproduct of two
1295
+ evaluation functors
1296
+ LV0 =
1297
+ �FinGraph
1298
+ ⟨evV ,evE⟩
1299
+ −−−−−−→ FinSet × FinSet +
1300
+ −→ FinSet
1301
+
1302
+ also preserves colimits. This completes the proof.
1303
+ A quantitative semantics for signed graphs can be defined similarly, subject to a caveat about
1304
+ the vertex parameters. Our notion of signed graph, designed to capture regulatory networks as
1305
+ studied in the biochemistry literature, attaches signs only to edges. We are thus led to assume that,
1306
+ in the Lotka-Volterra dynamical model, all species have baseline rates of decay rather than growth.
1307
+ This assumption is generally valid for protein regulatory networks, but not for gene regulatory
1308
+ networks in which mediating proteins are ignored [TN10], nor for predator-prey models in ecology.
1309
+ More flexible approaches are certainly possible. It would be straightforward to attach signs to
1310
+ vertices as well as edges and use them in the quantitative semantics. Alternatively, at the expense
1311
+ of a more cumbersome formalism, one could define dynamical systems with mixed linear-conical
1312
+ parameterizations, allowing the vertex parameters to be arbitrary reals while the edge parameters
1313
+ are constrained to be nonnegative.4 For simplicity and uniformity of presentation, we do not describe
1314
+ these extensions further.
1315
+ Let FinSgnGraph denote the full subcategory of SgnGraph spanned by finite signed graphs.
1316
+ 4Similar mixed parameterizations are a practical necessity for parametric statistical models, studied in detail in
1317
+ one author’s PhD thesis [Pat20].
1318
+ 21
1319
+
1320
+ Theorem 3.8 (Lotka-Volterra model for finite signed graphs). There is a functor
1321
+ LV : FinSgnGraph → Para(Dynam+)
1322
+ that sends a finite signed graph X to the conically parameterized nonnegative dynamical system with
1323
+ parameter variables P := X(V ) + X(E), state variables S := X(V ), and essentially nonnegative,
1324
+ algebraic vector field
1325
+ v(x; ρ, β)(i) := −ρ(i) x(i) +
1326
+
1327
+ (e:i′→i)∈X
1328
+ X(sgn)(e) β(e) x(i′) x(i),
1329
+ x ∈ RX(V ), i ∈ X(V ),
1330
+ parameterized by ρ ∈ RX(V )
1331
+ +
1332
+ and β ∈ RX(E)
1333
+ +
1334
+ . Moreover, the functor LV preserves finite colimits.
1335
+ Proof. Similarly to the previous proof, the functor LV : FinSgnGraph → Para(Dynam+) is defined
1336
+ by functors LV0, LV1 : FinSgnGraph → FinSet along with a natural transformation
1337
+
1338
+ LV : F+ ◦ LV0 ⇒ Dynam+ ◦ LV1 : FinSgnGraph → Con,
1339
+ now having components ⃗
1340
+ LVX given by the copairing of
1341
+ v0
1342
+ X := ⃗
1343
+ LV
1344
+ 0
1345
+ X : RX(V )
1346
+ +
1347
+ → Dynam+(X(V ))
1348
+ and
1349
+ v1
1350
+ X := ⃗
1351
+ LV
1352
+ 1
1353
+ X : RX(E)
1354
+ +
1355
+ → Dynam+(X(V )),
1356
+ where we define
1357
+ v0
1358
+ X(x; ρ)(i) := −ρ(i) x(i)
1359
+ and
1360
+ v1
1361
+ X(x; β)(i) :=
1362
+
1363
+ e∈X(tgt)−1(i)
1364
+ X(sgn)(e) β(e) x(X(src)(e)) x(i).
1365
+ The proof of naturality is essentially the same as before, using the crucial additional fact that
1366
+ morphisms of signed graphs preserve signs. The proof that the functor LV preserves finite colimits
1367
+ is unchanged.
1368
+ To exemplify the theorem, let us see how the Lotka-Volterra dynamics functor acts on a
1369
+ monomorphism and on an epimorphism of signed graphs.
1370
+ In order to compare the dynamics of two species A and B involved in a negative feedback loop
1371
+ versus A and B in isolation, we take the inclusion of signed graphs
1372
+ A
1373
+ B
1374
+ A
1375
+ B
1376
+ ι
1377
+ Labeling the edges in the feedback loop as AB and BA, the morphism LV(ι) sends the conically
1378
+ parameterized dynamical system
1379
+
1380
+ vA(x; ρ) = −ρA xA
1381
+ vB(x; ρ) = −ρB xB
1382
+ ,
1383
+ ρ ∈ R{A,B}
1384
+ +
1385
+ ,
1386
+ to the parameterized dynamical system
1387
+
1388
+ vA(x; ρ, β) = −ρA xA − βBA xB xA
1389
+ vB(x; ρ, β) = −ρB xB + βAB xA xB
1390
+ ,
1391
+ ρ ∈ R{A,B}
1392
+ +
1393
+ , β ∈ R{AB,BA}
1394
+ +
1395
+ ,
1396
+ by setting the latter’s interaction coefficients to zero: βAB = βBA = 0.
1397
+ This formalizes the
1398
+ commonsense fact that the first system is a degenerate case of the second.
1399
+ 22
1400
+
1401
+ For a more interesting example, we return to the projection map between regulatory networks
1402
+ given by Equation (2.1) of Section 2.1, inspired by the arginine biosynthesis system. Call this
1403
+ projection map p, and abbreviate the regulator molecule as R and the enzymes as S := {C, D, E, F, I}.
1404
+ The morphism LV(p) sends the parameterized dynamical system
1405
+
1406
+
1407
+
1408
+
1409
+
1410
+
1411
+
1412
+ vR(x; ρ, β) = −ρR xR − βR x2
1413
+ R
1414
+ vC(x; ρ, β) = −ρC xC − βC xR xC
1415
+ vD(x; ρ, β) = −ρD xD − βD xR xD
1416
+ vE(x; ρ, β) = −ρE xE − βE xR xE
1417
+ vF (x; ρ, β) = −ρF xF − βF xR xF
1418
+ vI(x; ρ, β) = −ρI xI − βI xR xI
1419
+ with state variables {R} + S and parameters ρ, β ∈ R{R}+S
1420
+ +
1421
+ to the parameterized dynamical system
1422
+
1423
+ vR(x; ρ, β) = −ρR xR − βR x2
1424
+ R
1425
+ v∗(x; ρ, β) = −ρ∗ x∗ − β∗ xR x∗
1426
+ with state variables {R, ∗} and parameters ρ, β ∈ R{R,∗}
1427
+ +
1428
+ , in two different but equivalent ways. The
1429
+ first way sets the latter system’s coefficients equal to sums of the former’s coefficients, namely
1430
+ ρ∗ =
1431
+
1432
+ i∈S
1433
+ ρi
1434
+ and
1435
+ β∗ =
1436
+
1437
+ i∈S
1438
+ βi.
1439
+ The second way substitutes x∗ for each xi, i ∈ S, in the first system and then takes the vector field
1440
+ v∗ to be the sum of the vi’s, i ∈ S, with these substitutions. The equivalence of these operations
1441
+ is precisely the condition for LV(p) to be a morphism of parameterized dynamical systems, cf.
1442
+ Equations (3.1) and (3.2).
1443
+ 3.3
1444
+ Composing Lotka-Volterra models
1445
+ To complete this part of the story, we extend the Lotka-Volterra dynamics functors between
1446
+ graphs and parameterized dynamical systems, constructed in Theorems 3.7 and 3.8, to double
1447
+ functors between open graphs and open parameterized dynamical systems. We begin by making
1448
+ parameterized dynamical systems into open systems.
1449
+ Proposition 3.9 (Open parameterized dynamical systems). There is a symmetric monoidal double
1450
+ category of open linearly parameterized dynamical systems, Open(Para(Dynam)), having
1451
+ • as objects, finite sets A, A′, . . . ;
1452
+ • as vertical arrows, functions f : A → A′;
1453
+ • as horizontal arrows, open linearly parameterized dynamical systems, which consist of
1454
+ a linearly parameterized dynamical system (P, S, v : RP → Dynam(S)) along with a cospan
1455
+ A0
1456
+ ℓ0
1457
+ −→ S
1458
+ ℓ1
1459
+ ←− A1 whose apex is the set S of state variables;
1460
+ • as cells, morphisms of such open systems (P, S, v, ℓ0, ℓ1) → (P ′, S′, v′, ℓ′
1461
+ 0, ℓ′
1462
+ 1), which
1463
+ consist of a morphism (q, f) : (P, S, v) → (P ′, S′, v′) between linearly parameterized dynamical
1464
+ systems along with functions f0 : A0 → A′
1465
+ 0 and f1 : A1 → A′
1466
+ 1 making the diagram commute:
1467
+ A0
1468
+ S
1469
+ A1
1470
+ A′
1471
+ 0
1472
+ S′
1473
+ A′
1474
+ 1
1475
+ ℓ0
1476
+ ℓ1
1477
+ f0
1478
+ f
1479
+ ℓ′
1480
+ 0
1481
+ f1
1482
+ ℓ′
1483
+ 1
1484
+ .
1485
+ 23
1486
+
1487
+ Vertical composition is by composition in FinSet and in Para(Dynam). Horizontal composition and
1488
+ monoidal products are by pushouts and coproducts in Para(Dynam), respectively, interpreting the
1489
+ finite sets in the feet of the cospans as linearly parameterized dynamical systems with no parameter
1490
+ variables and identically zero vector fields.
1491
+ Similarly, there is a symmetric monoidal double category Open(Para(Dynam+)) of open conically
1492
+ parameterized nonnegative dynamical systems.
1493
+ Proof. We perform the construction for linearly parameterized dynamical systems. The construction
1494
+ for conically parameterized nonnegative dynamical systems is perfectly analogous, replacing R with
1495
+ R+ and vector spaces with conical spaces.
1496
+ The projection functor πS : Para(Dynam) → FinSet, (P, S, v) �→ S that sends a linearly parame-
1497
+ terized dynamical systems to its set of state variables has a left adjoint Z : FinSet → Para(Dynam)
1498
+ that sends a finite set S to the system (∅, S, 0) with empty set of parameter variables. By linearity, its
1499
+ parameterized vector field 0 ∼= R∅ → Dynam(S) is necessarily the zero vector field. This indeed gives
1500
+ an adjunction Z ⊣ πS, because to any function f : S → S′ and linearly parameterized dynamical
1501
+ system (P ′, S′, v′) there corresponds a unique morphism (0P ′, f) : Z(S) → (P ′, S′, v′), where the
1502
+ required square
1503
+ 0
1504
+ Dynam(S)
1505
+ RP ′
1506
+ Dynam(S′)
1507
+ f∗◦(−)◦f∗
1508
+ v′
1509
+ commutes trivially, since the zero vector space is initial in VectR.
1510
+ Since Para(Dynam) has finite colimits (Proposition 3.5), we can construct a symmetric monoidal
1511
+ double category of Z-structured cospans [BC20, Theorem 3.9]. As we have argued before, it will be
1512
+ isomorphic to Open(Para(Dynam)).
1513
+ With this definition, we can construct double functors between open graphs and open param-
1514
+ eterized dynamical systems, but the vertex parameters under Lotka-Volterra dynamics cause a
1515
+ twist in the story compared to Baez and Pollard’s compositionality result for mass-action kinetics
1516
+ [BP17, Theorem 18]. When composing open dynamical systems in the image of the Lotka-Volterra
1517
+ functor, one takes a coproduct of the parameter variables, i.e., a direct sum of the parameter spaces,
1518
+ belonging to identified vertices. However, if one composes the open graphs first, then the identified
1519
+ vertices receive a single copy of the parameters from the Lotka-Volterra functor. Thus this functor
1520
+ does not preserve composition of open systems, not even up to isomorphism. Nevertheless, there is
1521
+ a natural (noninvertible) comparison between them: given a pair of parameters in the direct sum,
1522
+ we can reduce them to a single parameter simply by summing them. In mathematical terms, we get
1523
+ a lax double functor: a double functor that strictly preserves vertical composition, as usual, but
1524
+ preserves horizontal composition only up to specified comparison maps.5
1525
+ Theorem 3.10 (Open Lotka-Volterra models). There is a symmetric monoidal lax double functor
1526
+ LV : Open(FinGraph) → Open(Para(Dynam))
1527
+ that acts
1528
+ • on objects and vertical arrows, as the identity;
1529
+ 5The precise definition of a lax double functor can be found in the textbook [Gra19, §3.5], among other sources.
1530
+ 24
1531
+
1532
+ • on horizontal arrows and cells, by the functor LV : FinGraph → Para(Dynam) on graphs and
1533
+ graph homomorphisms and as the identity on the associated cospans and cospan morphisms:
1534
+
1535
+ X, A0
1536
+ ℓ0
1537
+ −→ X(V )
1538
+ ℓ1
1539
+ ←− A1
1540
+
1541
+ �→
1542
+
1543
+ LV(X), A0
1544
+ ℓ0
1545
+ −→ X(V )
1546
+ ℓ1
1547
+ ←− A1
1548
+
1549
+ .
1550
+ The comparison cells are defined using the morphisms of linearly parameterized dynamical systems
1551
+ αS : Z(S) → LV(Disc S), where
1552
+ αS := (0S, 1S) : (∅, S, 0) → (S, S, ⃗
1553
+ LV(Disc S)),
1554
+ S ∈ FinSet.
1555
+ • Given composable open graphs (X, A → X(V ) ← B) and (Y, B → Y (V ) ← C), the comparison
1556
+ cell for horizontal composition is given by the morphism of systems
1557
+ LV(X) +Z(B) LV(Y )
1558
+ id +αB id
1559
+ −−−−−−→ LV(X) +LV(Disc B) LV(Y )
1560
+
1561
+ =
1562
+ −→ LV(X +Disc B Y ).
1563
+ • Given a finite set A, the comparison cell for the horizontal unit is given by the morphism of
1564
+ systems αA : Z(A) → LV(Disc A).
1565
+ Similarly, there is a symmetric monoidal lax double functor
1566
+ LV : Open(FinSgnGraph) → Open(Para(Dynam+)).
1567
+ Proof. To construct the lax double functor, we use a lax version of [BC20, Theorem 4.3]. The
1568
+ family of morphisms αS : Z(S) → LV(Disc S), S ∈ FinSet, in the theorem statement assemble into
1569
+ a natural transformation
1570
+ FinSet
1571
+ FinGraph
1572
+ FinSet
1573
+ Para(Dynam)
1574
+ L=Disc
1575
+ LV
1576
+ L′=Z
1577
+ α
1578
+ .
1579
+ The functors involved in this cell all preserve finite colimits: the top and bottom ones because they
1580
+ are left adjoints and the right one by Theorem 3.7. The hypotheses of [BC20, Theorem 4.3] are
1581
+ therefore satisfied, except that α is not a natural isomorphism but merely a natural transformation.
1582
+ By inspection of the proof, the result still holds except that the resulting double functor is lax rather
1583
+ than pseudo. We obtain a lax double functor
1584
+ Open(FinGraph) ∼= LCsp(FinGraph) → L′Csp(Para(Dynam)) ∼= Open(Para(Dynam)).
1585
+ To show that this double functor is the same one in the theorem statement, we once again
1586
+ use the adjunctions to pass between L-structured and R-decorated cospans (recalling terminology
1587
+ introduced in the proof of Proposition 2.4). Notice that the natural transformation α has as its
1588
+ mate [CGR14, §1] the identity transformation ¯α = 1evV :
1589
+ FinSet
1590
+ FinGraph
1591
+ FinSet
1592
+ Para(Dynam)
1593
+ R=evV
1594
+ LV
1595
+ R′=πS
1596
+ ¯α
1597
+ .
1598
+ 25
1599
+
1600
+ Thus the action of the double functor F := LV on L-structured cospans simplifies to the identity
1601
+ when translated to R-decorated cospans.
1602
+ L(A0)
1603
+ X
1604
+ L(A1)
1605
+ L′(A0)
1606
+ F(L(A0))
1607
+ F(X)
1608
+ F(L(A1))
1609
+ L′(A1)
1610
+
1611
+ A0
1612
+ R(X)
1613
+ A1
1614
+ A0
1615
+ R(X)
1616
+ R′(F(X))
1617
+ R(X)
1618
+ A1
1619
+ ℓ0
1620
+ ℓ1
1621
+ αA0
1622
+ F(ℓ0)
1623
+ F(ℓ1)
1624
+ αA1
1625
+ ¯ℓ0
1626
+ ¯ℓ1
1627
+ ¯ℓ0
1628
+ ¯αX
1629
+ ¯αX
1630
+ ¯ℓ1
1631
+ A similar statement holds for the action of the double functor on morphisms of L-structured and
1632
+ R-decorated cospans.
1633
+ 4
1634
+ Conclusion
1635
+ Summary.
1636
+ Regulatory networks are a minimalistic but widely used tool to describe the interactions
1637
+ between molecules in biochemical systems. We have made the first functorial study of regulatory
1638
+ networks, formalized as signed graphs, and their connections with other mathematical models in
1639
+ biochemistry. Among the latter, we have studied reaction networks, formalized as Petri nets with
1640
+ signed links, and parameterized dynamical systems, focusing on Lotka-Volterra dynamics. This
1641
+ project fits into a broader program by applied category theorists and other scientists aiming to
1642
+ systematize, in a completely precise way, the language and methods of describing, composing, and
1643
+ transforming scientific models.
1644
+ The major categories of this paper, and the functors between them, are summarized in the
1645
+ following diagram, where “LV” is the Lotka-Volterra dynamics functor (§3.2).
1646
+ SgnCat (§2.2)
1647
+ SgnGraph (§2.1)
1648
+ SgnPetri (§2.3)
1649
+ FinSgnGraph
1650
+ Para(Dynam+) (§3.1)
1651
+ Path
1652
+ U
1653
+ LV
1654
+ Net
1655
+
1656
+ Most of the main results extend from closed systems to open systems, which compose by gluing
1657
+ along their boundaries. Of the diagram above, we have extended the following parts to double
1658
+ categories of open systems and double functors between them.
1659
+ Open(SgnCat)
1660
+ Open(SgnGraph)
1661
+ Open(FinSgnGraph)
1662
+ Open(Para(Dynam+)) (§3.3)
1663
+ LV
1664
+ Path
1665
+ 26
1666
+
1667
+ Future work.
1668
+ Of many possible directions for future work, we mention a few. As noted in the
1669
+ introduction, Lotka-Volterra dynamics are only one of numerous dynamics that could be considered
1670
+ as a canonical model for regulatory networks, and they are not even among the most commonly
1671
+ studied in the biochemistry literature [TLK19]. It would be desirable to have dynamics functors for
1672
+ regulatory networks that draw on more flexible or more biologically plausible classes of dynamical
1673
+ systems. In another direction, the two halves of this paper—qualitative and quantitative—are not as
1674
+ tightly as integrated as one might hope. How does the presence of a motif in a regulatory network,
1675
+ such as an incoherent feedforward loop perhaps even of a specific type, manifest in the continuous
1676
+ dynamics of that network? Put in category-theoretic terms, the Lotka-Volterra dynamics functor is
1677
+ defined on signed graphs, so how does it relate to the freely generated signed categories in which
1678
+ motifs are expressed? These intriguing questions are suggestive of “feedback loop analysis” in the
1679
+ field of system dynamics [Ric95], to which stronger connections should be made.
1680
+ Acknowledgments.
1681
+ The authors thank the American Mathematical Society (AMS) for hosting
1682
+ the 2022 Mathematical Research Community (MRC) on Applied Category Theory, where this
1683
+ research project began. The AMS MRC was supported by NSF grant 1916439. We thank John Baez,
1684
+ our group’s mentor at the MRC, for suggesting this project and for much helpful advice along the
1685
+ way. Authors Fairbanks, Patterson, and Shapiro acknowledge subsequent support from the DARPA
1686
+ ASKEM and Young Faculty Award programs through grants HR00112220038 and W911NF2110323.
1687
+ Author Ocal acknowledges subsequent support from an AMS-Simons Travel Grant and from the
1688
+ Hausdorff Research Institute for Mathematics funded by the German Research Foundation (DFG)
1689
+ under Germany’s Excellence Strategy - EXC-2047/1 - 390685813.
1690
+ References
1691
+ [Alo07]
1692
+ Uri Alon. “Network motifs: theory and experimental approaches”. Nature Reviews
1693
+ Genetics 8.6 (2007), pp. 450–461. doi: 10.1038/nrg2102.
1694
+ [Alo19]
1695
+ Uri Alon. An introduction to systems biology: design principles of biological circuits.
1696
+ 2nd ed. CRC Press, 2019. doi: 10.1201/9780429283321.
1697
+ [Bae+21]
1698
+ John C. Baez, Fabrizio Genovese, Jade Master, and Michael Shulman. “Categories of
1699
+ nets”. 2021 Symposium on Logic in Computer Science (LICS). 2021, pp. 1–13. doi:
1700
+ 10.1109/LICS52264.2021.9470566. arXiv: 2101.04238.
1701
+ [Bae+22]
1702
+ John Baez, Xiaoyan Li, Sophie Libkind, Nathaniel Osgood, and Evan Patterson. “Com-
1703
+ positional modeling with stock and flow diagrams”. Proceedings of the 2022 Applied
1704
+ Category Theory Conference. 2022. arXiv: 2205.08373. In press.
1705
+ [BC20]
1706
+ John C. Baez and Kenny Courser. “Structured cospans”. Theory and Applications of
1707
+ Category Theory 35.48 (2020), pp. 1771–1822. arXiv: 1911.04630. url: http://www.
1708
+ tac.mta.ca/tac/volumes/35/48/35-48abs.html.
1709
+ [BFM19]
1710
+ John C. Baez, John Foley, and Joe Moeller. “Network models from Petri nets with
1711
+ catalysts”. Compositionality 1.4 (2019). doi: 10.32408/compositionality-1-4. arXiv:
1712
+ 1904.03550.
1713
+ [BP17]
1714
+ John C. Baez and Blake S. Pollard. “A compositional framework for reaction net-
1715
+ works”. Reviews in Mathematical Physics 29.9 (2017), p. 1750028. doi: 10.1142/
1716
+ S0129055X17500283.
1717
+ [Car71]
1718
+ Henri Cartan. Differential calculus. Kershaw Publishing Company, 1971.
1719
+ 27
1720
+
1721
+ [CGR14]
1722
+ Eugenia Cheng, Nick Gurski, and Emily Riehl. “Cyclic multicategories, multivariable
1723
+ adjunctions and mates”. Journal of K-Theory 13.2 (2014), pp. 337–396. doi: 10.1017/
1724
+ is013012007jkt250. arXiv: 1208.4520.
1725
+ [CP09]
1726
+ Stephen T. Crews and Joseph C. Pearson. “Transcriptional autoregulation in develop-
1727
+ ment”. Current Biology 19.6 (2009), R241–R246. doi: 10.1016/j.cub.2009.01.015.
1728
+ [Csi+09]
1729
+ Attila Csikász-Nagy, Orsolya Kapuy, Attila Tóth, Csaba Pál, Lars J. Jensen, Frank
1730
+ Uhlmann, John J. Tyson, and Béla Novák. “Cell cycle regulation by feed-forward
1731
+ loops coupling transcription and phosphorylation”. Molecular Systems Biology 5 (2009),
1732
+ pp. 236–241. doi: 10.1038/msb.2008.73.
1733
+ [For61]
1734
+ Jay W. Forrester. Industrial dynamics. MIT Press, 1961.
1735
+ [FS07]
1736
+ José Luiz Fiadeiro and Vincent Schmitt. “Structured co-spans: an algebra of interaction
1737
+ protocols”. International Conference on Algebra and Coalgebra in Computer Science
1738
+ (CALCO 2007). 2007, pp. 194–208. doi: 10.1007/978-3-540-73859-6_14.
1739
+ [Gra19]
1740
+ Marco Grandis. Higher dimensional categories: From double to multiple categories. World
1741
+ Scientific, 2019. doi: 10.1142/11406.
1742
+ [HCH10]
1743
+ Wassim M. Haddad, VijaySekhar Chellaboina, and Qing Hui. Nonnegative and compart-
1744
+ mental dynamical systems. Princeton University Press, 2010.
1745
+ [Koc22]
1746
+ Joachim Kock. “Whole-grain Petri nets and processes”. Journal of the ACM (2022). doi:
1747
+ 10.1145/3559103. arXiv: 2005.05108. In press.
1748
+ [Lot25]
1749
+ Alfred J. Lotka. Elements of physical biology. Williams & Wilkins, 1925. url: https:
1750
+ //archive.org/details/elementsofphysic017171mbp.
1751
+ [MM94]
1752
+ Saunders Mac Lane and Ieke Moerdijk. Sheaves in geometry and logic: A first introduction
1753
+ to topos theory. Springer, 1994. doi: 10.1007/978-1-4612-0927-0.
1754
+ [Pat20]
1755
+ Evan Patterson. “The algebra and machine representation of statistical models”. PhD
1756
+ thesis. Stanford University, 2020. arXiv: 2006.08945.
1757
+ [RB88]
1758
+ David E. Rydeheard and Rod M. Burstall. Computational category theory. Prentice Hall,
1759
+ 1988. url: https://www.cs.man.ac.uk/~david/categories/.
1760
+ [Ric95]
1761
+ George P. Richardson. “Loop polarity, loop dominance, and the concept of dominant po-
1762
+ larity”. System Dynamics Review 11.1 (1995), pp. 67–88. doi: 10.1002/sdr.4260110106.
1763
+ [Rie16]
1764
+ Emily Riehl. Category theory in context. Courier Dover Publications, 2016. url: http:
1765
+ //www.math.jhu.edu/~eriehl/context.pdf.
1766
+ [SMH18]
1767
+ Gabor Szederkényi, Attila Magyar, and Katalin M. Hangos. Analysis and control of
1768
+ polynomial dynamic models with biological applications. Academic Press, 2018. doi:
1769
+ 10.1016/C2015-0-06035-X.
1770
+ [Spi21]
1771
+ David I. Spivak. “Functorial aggregation” (2021). arXiv: 2111.10968.
1772
+ [SRS14]
1773
+ S. Stanhope, Jonathan E. Rubin, and David Swigon. “Identifiability of linear and linear-
1774
+ in-parameters dynamical systems from a single trajectory”. SIAM Journal on Applied
1775
+ Dynamical Systems 13.4 (2014), pp. 1792–1815. doi: 10.1137/130937913.
1776
+ [Ste00]
1777
+ John D. Sterman. Business dynamics: systems thinking and modeling for a complex
1778
+ world. McGraw-Hill, 2000.
1779
+ [Str00]
1780
+ Ross Street. “The petit topos of globular sets”. Journal of Pure and Applied Algebra
1781
+ 154.1-3 (2000), pp. 299–315. doi: 10.1016/S0022-4049(99)00183-8.
1782
+ 28
1783
+
1784
+ [TLK19]
1785
+ John J. Tyson, Teeraphan Laomettachit, and Pavel Kraikivski. “Modeling the dynamic
1786
+ behavior of biochemical regulatory networks”. Journal of Theoretical Biology 462 (2019),
1787
+ pp. 514–527. doi: 10.1016/j.jtbi.2018.11.034.
1788
+ [TN10]
1789
+ John J. Tyson and Béla Novák. “Functional motifs in biochemical reaction networks”.
1790
+ Annual Review of Physical Chemistry 61 (2010), pp. 219–240. doi: 10.1146/annurev.
1791
+ physchem.012809.103457.
1792
+ [Voi00]
1793
+ Eberhard O. Voit. Computational analysis of biochemical systems: A practical guide for
1794
+ biochemists and molecular biologists. Cambridge University Press, 2000.
1795
+ [Voi13]
1796
+ Eberhard O. Voit. “Biochemical systems theory: a review”. International Scholarly
1797
+ Research Notices 2013 (2013). doi: 10.1155/2013/897658.
1798
+ 29
1799
+
19AzT4oBgHgl3EQfe_xt/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2dE2T4oBgHgl3EQfjAeF/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:859544ca0890fa51462fefca987aa42898f3dbeaff2743c14cb69d2ec8eb2764
3
+ size 6029357
3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/2301.11392v1.pdf.txt ADDED
@@ -0,0 +1,1048 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11392v1 [cond-mat.mes-hall] 26 Jan 2023
2
+ Noise and Thermal Depinning of Wigner Crystals
3
+ C. Reichhardt and C. J. O. Reichhardt
4
+ Theoretical Division and Center for Nonlinear Studies, Los Alamos National
5
+ Laboratory, Los Alamos, New Mexico 87545, USA
6
+ 30 January 2023
7
+ Abstract.
8
+ We examine changes in the depinning threshold and conduction noise
9
+ fluctuations for driven Wigner crystals in the presence of quenched disorder. At low
10
+ temperatures there is a well defined depinning threshold and a strong peak in the noise
11
+ power with 1/f noise characteristics. At higher temperatures, the depinning threshold
12
+ shifts to lower drives and the noise, which is also reduced in power, becomes more white
13
+ in character. At lower temperatures, a washboard frequency appears when the system
14
+ depins elastically or forms a moving smectic state; however, this washboard signal is
15
+ strongly reduced for higher temperatures and completely disappears above the melting
16
+ temperature of a system without quenched disorder. Our results are in good agreement
17
+ with recent transport and noise studies for systems where electron crystal depinning is
18
+ believed to arise, and also show how noise can be used to distinguish between crystal,
19
+ glass, and liquid phases.
20
+ 1. Introduction
21
+ When a collection of interacting particles is driven over quenched disorder, the system
22
+ can exhibit a pinned phase, a depinning threshold, and a sliding phase [1, 2].
23
+ The
24
+ existence of these phases can be deduced from changes in transport measures such
25
+ as the velocity-force and differential resistance curves [1, 2, 3, 4, 5, 6, 7, 8].
26
+ If the
27
+ particles maintain the same neighbors during the depinning and sliding process, the
28
+ depinning is considered elastic and is associated with specific scaling features in the
29
+ velocity-force curves [1, 2, 9, 10], while if there is tearing or mixing of the particles,
30
+ the behavior is plastic and can produce multiple steps or jumps in the transport curves
31
+ [1, 2, 9, 11].
32
+ In the sliding phase, there can also be dynamical transitions between
33
+ different types of plastic flow or fluidlike flow, as well as dynamical ordering transitions
34
+ where the driven particles move so rapidly over the substrate that the effectiveness of
35
+ the pinning is reduced and a disordered system can organize into a moving crystal or
36
+ smectic state [2, 12, 13, 14, 15, 16, 17, 18, 19, 20]. When thermal effects are included,
37
+ additional behaviors can occur both during depinning and in the sliding states.
38
+ In
39
+ general, sharp depinning thresholds become rounded due to thermal creep; however, a
40
+ peak in the differential velocity can still arise near the T = 0 depinning threshold due
41
+ to a transition from creep to sliding dynamics [1, 2, 13]. If the temperature is higher
42
+
43
+ Noise and Thermal Depinning of Wigner Crystals
44
+ 2
45
+ than the melting temperature of the quenched disorder-free system, a system containing
46
+ quenched disorder will always be in a disordered state, and can form a glass phase with
47
+ thermal creep or a fluctuating liquid state at high drives [2, 13, 21, 22].
48
+ Another method to examine the driven dynamics is to measure changes in the noise
49
+ for systems in which time series of the velocity or density fluctuations can be obtained
50
+ as a function of drive [2, 4, 17, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33].
51
+ One of
52
+ the most common characterization techniques is to determine the power spectrum of
53
+ the fluctuations and to measure the noise power over some frequency range. For elastic
54
+ depinning or ordered moving states where the particles maintain a fixed set of neighbors
55
+ and travel at speed v, there is typically a narrow band noise signature containing peaks
56
+ at specific frequencies ω = 2πv/a that are associated with the average spacing a between
57
+ the particles [2, 4]. Additional peaks appear at higher harmonics of these characteristic
58
+ frequencies. Narrow band noise signatures have been observed for sliding charge density
59
+ waves [4], superconducting vortex lattices [17, 26, 27, 28, 34], moving charge crystals [33],
60
+ and skyrmion systems [30, 35]. In some cases it is possible to observe multiple frequencies
61
+ when the system is broken up into several large sections that locally behave elastically
62
+ but globally provide multiple degrees of freedom, permitting switching behavior to occur
63
+ [33, 36]. If the depinning is strongly plastic, the narrow band noise signal is lost and is
64
+ typically replaced by 1/f α noise with 0.75 < α < 2.0 [2, 17, 25, 27, 28], while for a fluid
65
+ the noise power is often low and the fluctuations have white noise characteristics with
66
+ α = 0. In other cases, the fluctuations are Lorentizan and the noise has a 1/f shape at
67
+ low frequencies but becomes white above a characteristic frequency ωc that is associated
68
+ with the average time between collisions of particles with pinning sites [2]. Broad band
69
+ 1/f noise has been observed near the depinning transition for superconducting vortices
70
+ [2, 17, 25, 28], magnetic skyrmions [30, 32], and charge crystals [33, 37]. The noise
71
+ measurements can also be used to identify a transition between different dynamical
72
+ states such as plastic flow to dynamically ordered flow. In this case, 1/f noise occurs in
73
+ the plastic flow phase just above depinning, but at higher drives there is a crossover to
74
+ narrow band noise as dynamical ordering emerges [2, 17, 28, 30]. These different noise
75
+ features can be modified significantly when thermal effects become important [2].
76
+ Another example of an assembly of particle-like objects that can be coupled to
77
+ quenched disorder and driven is electron crystals or Wigner crystals [38, 39, 40, 41, 42],
78
+ where transport measures provide evidence for a conduction threshold that is consistent
79
+ with the existence of a depinning transition [39, 40, 43, 44, 45, 46, 36, 47, 48]. Recently, a
80
+ growing number of materials have been identified that can support Wigner crystals, such
81
+ as moir`e superlattices [49, 50], transition metal dichalcogenide monolayers [51, 52, 53],
82
+ and systems where Wigner crystals are stable at zero magnetic field [54].
83
+ It would
84
+ be interesting to examine conduction and noise measures as a function of drive and
85
+ temperature in these new systems. Previous experiments that showed evidence of a
86
+ conduction threshold also revealed a large increase in the conduction noise just above
87
+ depinning [46], and previous numerical studies of driven Wigner crystals also showed
88
+ both a conduction threshold and 1/f noise features near depinning followed by a
89
+
90
+ Noise and Thermal Depinning of Wigner Crystals
91
+ 3
92
+ crossover to narrow band noise at higher drives [55]. Brussarski et al. [56] examined the
93
+ transport and noise of Wigner crystals near depinning as function of temperature, and
94
+ found that at low temperature, there is a sharp depinning threshold that is correlated
95
+ with a large peak in the noise power. Additionally, the noise near depinning is of 1/f 0.75
96
+ form. As the temperature is increased, the depinning threshold shifts to lower values
97
+ and the peak noise power is also reduced. This suggests that at higher temperature, the
98
+ system forms a Wigner liquid in which the correlated motion associated with glassy or
99
+ plastic flow phases and large noise power is lost. Noise studies have also been performed
100
+ near the metal-insulator transition, which could be associated with a change from a
101
+ Wigner glass to a Wigner liquid, and a drop in the noise power is observed at higher
102
+ temperatures where a fluid phase may be present [57, 58]. Particle-based simulations
103
+ across a Wigner glass to Wigner fluid crossover show high power 1/f α noise in the
104
+ Wigner glass state and lower noise power with a white spectrum at higher temperatures
105
+ in the fluid state [59]. Thermal effects and thermal melting in Wigner crystals have
106
+ also been extensively studied [60, 61, 62, 63, 64], so it should be feasible to perform
107
+ experimental noise and transport measures across a thermal melting transition while
108
+ the system is being driven.
109
+ In this work, we consider thermally induced transport and noise measurements for
110
+ a two-dimensional (2D) electron system driven over quenched disorder. Previous work
111
+ on this system focused on the T = 0 case, and showed that for plastic depinning, there is
112
+ strong 1/f noise with a peak in the noise power near the depinning transition, followed
113
+ by a drop in the noise power and a transition to white or narrow band noise at high
114
+ driving where a moving smectic or moving crystal phase emerges [55, 65]. Here we find
115
+ that as we increase the temperature, the depinning threshold decreases and the noise
116
+ power drops, in agreement with experiments. Additionally, we find that the narrow
117
+ band noise visible for T = 0 at high drives is strongly reduced at higher temperatures
118
+ and vanishes above the temperature Tm at which the system melts in the absence of
119
+ quenched disorder. This suggests that narrow band noise signals may only be accessible
120
+ at temperatures well below melting.
121
+ We map out the dynamic phase diagram as a
122
+ function of drive versus temperature and show that at Tm there is a divergence in the
123
+ drive at which a transition to ordered or partially ordered flow occurs, similar to the
124
+ dynamic phase diagram proposed by Koshelev and Vinokur for driven superconducting
125
+ vortex systems [13, 22]. For the case of elastic depinning, we find a thermally induced
126
+ creep regime in which the lattice moves by one lattice constant at a time, and show
127
+ that a narrow band signal can still arise even in the creep regime. The spectral peaks
128
+ become sharper and shift to higher frequencies with increasing drive, but the narrow
129
+ band signature is lost with increasing temperature even before the system reaches the
130
+ clean melting temperature Tm.
131
+
132
+ Noise and Thermal Depinning of Wigner Crystals
133
+ 4
134
+ 2. Simulation and System
135
+ We model a 2D classical Wigner crystal with charge density n = Ne/L2, where Ne is the
136
+ number of electrons and L is the system size. We employ periodic boundary conditions
137
+ in the x and y directions, and the sample contains Np randomly placed pinning sites
138
+ modeled as short range attractive wells with a density of np = Np/L2. Throughout
139
+ this work we fix n = 0.208 and np = 0.25. At T = 0 and in the absence of quenched
140
+ disorder, the charges form a triangular lattice that has a well defined melting transition
141
+ temperature Tm [66]. Additionally, when T = 0 there is a well defined quenched disorder
142
+ strength above which the system disorders [66].
143
+ We represent the charges using a
144
+ previously studied model [55, 67, 65, 66, 68, 69, 70, 71], where the equation of motion
145
+ for charge i is
146
+ αdvi =
147
+ N
148
+
149
+ j
150
+ ∇U(rij) + Fp + FD + FT
151
+ i .
152
+ (1)
153
+ Here αd is a damping term and Ui = q2/r is the long range Coulomb repulsion between
154
+ charges of magnitude q. As in previous work [55, 71], we employ a Lekner summation to
155
+ evaluate the long range interactions. The second term on the right hand side represents
156
+ pinning sites modeled as finite range parabolic traps that impart a maximum pinning
157
+ force of Fp at radius rp. The thermal fluctuations are applied with the term FT , which
158
+ has the following properties: ⟨F T⟩ = 0 and ⟨F T(ti)F T(t′
159
+ j)⟩ = 2kBTδijδ(t − t′). The
160
+ initial positions of the charges are obtained through simulated annealing at zero drive.
161
+ Once the system has been initialized, we apply a driving force FD = FDˆx representing
162
+ an applied voltage. The drive can be set to a constant value, in which case we wait
163
+ for the system to reach a steady state before measuring the average velocity per charge
164
+ ⟨V ⟩ =
165
+ �Ne
166
+ i
167
+ vi · ˆx or obtaining a time series of the velocity to examine the temporal
168
+ fluctuations. By considering a range of drives and measuring the average velocity at
169
+ each drive, we can create a current-voltage curve. If there is a magnetic field present,
170
+ the changes experience an additional force qB × vi that can create a Hall angle for the
171
+ electron motion. This effect is generally small and we neglect it in the present work,
172
+ but we have studied it in detail elsewhere [71].
173
+ 3. Elastic and Plastic Regimes
174
+ In Fig. 1 we plot the fraction P6 of six-fold coordinated charges versus temperature T/Tm
175
+ for a system with no quenched disorder. The melting temperature Tm is defined to be the
176
+ temperature at which a proliferation of topological defects or non-sixfold coordinated
177
+ charges occurs. For T/Tm < 1.0, P6 is close to 1.0, as expected for a triangular lattice,
178
+ while for T/Tm > 1.0, a large number of fivefold and sevenfold coordinated charges
179
+ appear, causing P6 to drop.
180
+ Once we have defined Tm by measuring a clean system, we introduce quenched
181
+ disorder in order to study the conduction noise and transport response above and below
182
+ Tm for varied disorder strengths Fp. We apply a constant drive with FD = 0.01 to
183
+
184
+ Noise and Thermal Depinning of Wigner Crystals
185
+ 5
186
+ 0
187
+ 0.5
188
+ 1
189
+ 1.5
190
+ T/Tm
191
+ 0.5
192
+ 0.6
193
+ 0.7
194
+ 0.8
195
+ 0.9
196
+ 1
197
+ P6
198
+ Figure 1.
199
+ The average fraction of sixfold-coordinated charges P6 versus temperature
200
+ T/Tm in a system with no quenched disorder. Tm is defined to be the temperature at
201
+ which a proliferation of non-sixfold coordinated charges occurs in a clean system.
202
+ samples with different Fp and measure the time average velocity per charge ⟨V ⟩ over
203
+ 4 × 106 simulation time steps. When Fp = 0, the charge velocity V0 is identical to the
204
+ driving force, V0 = FD = 0.01, so a measurement of ⟨V ⟩/V0 = 1 indicates that the
205
+ flow of the charges has reached the pin-free limit. In Fig. 2(a), where we plot ⟨V/V0⟩
206
+ versus Fp, at T/Tm = 0 there is a large drop in ⟨V ⟩/V0 near Fp = 0.75. Figure 2(b)
207
+ shows the corresponding values of P6 versus Fp, where for T/Tm = 0 there is a well
208
+ defined transition from an ordered Wigner crystal to a disordered Wigner glass, and the
209
+ proliferation of defects correlates with the velocity drop in Fig. 2(a). At T/Tm = 0.3,
210
+ the overall velocity is higher than for the T/Tm = 0 sample due to the lowering of
211
+ the effectiveness of the pinning by the thermal fluctuations. Additionally, the pinning
212
+ strength required to disorder the system is shifted upward to a value close to Fp = 0.1,
213
+ which is again due to the partial reduction of the pinning effectiveness by the thermal
214
+ fluctuations. A similar trend occurs for T/Tm = 0.6, where the velocity is higher. For
215
+ T/Tm = 1.03, the system is disordered for all values of Fp and the velocity is even higher
216
+ but has a gradual drop with increasing Fp, and the same trend occurs for T/Tm = 1.36. A
217
+ more detailed study of the general phase diagram for the disordered and ordered phases
218
+ as a function of pinning strength versus temperature appears in Ref. [66]. The results in
219
+
220
+ Noise and Thermal Depinning of Wigner Crystals
221
+ 6
222
+ 0
223
+ 0.2
224
+ 0.4
225
+ 0.6
226
+ 0.8
227
+ 1
228
+ <V>/V0
229
+ 0
230
+ 0.05
231
+ 0.1
232
+ 0.15
233
+ Fp
234
+ 0.5
235
+ 0.6
236
+ 0.7
237
+ 0.8
238
+ 0.9
239
+ 1
240
+ P6
241
+ Figure 2. (a) The average charge velocity ⟨V ⟩/V0 vs pinning strength Fp at FD = 0.01,
242
+ where V0 = FD = 0.01 is the average velocity in a disorder-free system. T/Tm = 0
243
+ (dark blue), 0.3 (light blue), 0.6 (green), 1.03 (yellow) and 1.38 (red).
244
+ (b) The
245
+ corresponding P6 vs Fp showing that for T/Tm < 1.0, there is a well defined pinning-
246
+ induced order to disorder transition.
247
+ Fig. 1 and Fig. 2 indicate that the system exhibits three distinct regimes. These are an
248
+ ordered or crystal regime containing sixfold-coordinated charges, which occurs at low
249
+ temperatures or low pinning strengths; a disordered or plastic regime where the system
250
+ has low mobility and is strongly affected by the pinning; and a high temperature fluid
251
+ phase where the effectiveness of the pinning is reduced and the system is in a strongly
252
+ fluctuating state. In terms of transport, in the presence of pinning the ordered state
253
+ exhibits elastic depinning in which the charges maintain their same neighbors. The glass
254
+ state undergoes plastic depinning, and the fluid state does not have a pinned phase but
255
+ can still have a regime in which the charges are trapped for a time before thermally
256
+
257
+ Noise and Thermal Depinning of Wigner Crystals
258
+ 7
259
+ hopping out of the pinning sites.
260
+ 4. Transport and Noise in the Plastic Regime
261
+ We next examine the noise and transport in the three regimes identified above. We
262
+ consider samples with Fp = 0.5, a pinning strength at which the charges are disordered
263
+ for T/Tm = 0, so the system is in a strongly disordered glass phase. The T/Tm = 0
264
+ plastic depinning that occurs in this regime was studied in detail in [66], where a pinned
265
+ phase, a filamentary flow phase, a disordered flow phase, and a dynamically ordered
266
+ moving smectic phase appear in sequence as a function of increasing drive.
267
+ In Fig. 3(a) we show a snapshot of the charge locations, pinning site locations, and
268
+ trajectories in the plastic flow regime for FD = 0.15 at T/Tm = 0.15, where a portion
269
+ of the charges are moving in a series of well defined channels, with occasional jumps
270
+ between the channels when certain channels open or close again. In general, for strong
271
+ pinning, at low temperature the system exhibits channel flow just above depinning,
272
+ similar to that studied in other systems at zero temperature. Figure 3(b) shows the
273
+ same system at T/Tm = 0.606 where there is a combination of channel flow and random
274
+ thermal hopping, indicating that as the temperature increases, there is a transition
275
+ from one-dimensional (1D) channels to two-dimensional (2D) flow.
276
+ In Fig. 3(c), at
277
+ T/Tm = 1.03 the motion is 2D and fluidlike. For higher temperatures, the images look
278
+ similar to what is shown in Fig. 3(c).
279
+ In Fig. 4(a) we plot ⟨V ⟩ versus FD for the system in Fig. 3 at T/Tm = 0, 0.606,
280
+ 0.9, 1.21, 1.81, and 2.42. For the lower temperatures, there is a well-defined depinning
281
+ threshold followed by a nonlinear regime, while when T/Tm > 1.0, the threshold is
282
+ replaced by a creep regime and the nonlinear regime at higher drives persists. At the
283
+ highest drives, all of the curves approach the pin-free limit. In Fig. 4(b) we show the
284
+ corresponding d⟨V ⟩/dFD versus FD curves, where for T/Tm ≥ 1.21 there is a peak
285
+ in d⟨V ⟩/dFD due to the S shape of the velocity-force curves.
286
+ Similar peaks in the
287
+ differential conductivity were observed for driven superconducting vortices in the plastic
288
+ flow regime [12, 17, 21, 22]. For T/Tm > 1.21, the peaks are lost and a creep regime
289
+ appears. The dashed line is the differential conductivity for the pin free system, and
290
+ all of the curves approach this value at high drives. We note that for T/Tm = 0, at
291
+ low drives there are a number of jumps in the conduction as well as a few regimes of
292
+ negative differential conduction. This arises due to a filamentary flow channel effect
293
+ that is described in more detail in [65]. For T/Tm > 0.5, the jumps associated with
294
+ the filamentary flow phase are lost and a single large peak in d⟨V ⟩/dFD appears in the
295
+ plastic flow regime where there is a combination of moving and pinned charges.
296
+ In Fig. 5 we plot P6 versus FD for the system in Fig. 4 for T/Tm = 0, 0.303, 0.606,
297
+ 0.757, 0.91, 1.21, and 2.42. For T/Tm < 1.0 there is an initial dip in P6 at the onset of
298
+ plastic flow, and at high drives where d⟨V ⟩/dFD starts to flatten, P6 approaches values
299
+ of 0.9 or higher as the system forms a moving smectic phase. In the moving smectic
300
+ state, the charges move in well defined channels and a small number of dislocations are
301
+
302
+ Noise and Thermal Depinning of Wigner Crystals
303
+ 8
304
+ x
305
+ (a)
306
+ y
307
+ x
308
+ (b)
309
+ y
310
+ x
311
+ (c)
312
+ y
313
+ Figure 3.
314
+ Charge locations (red circles), trajectories (blue lines), and pinning
315
+ site locations (black circles) for the system in Fig. 2 at FD = 0.15 and Fp = 0.5. (a)
316
+ Filamentary flow at T/Tm = 0.15. (b) Disordered flow with channels at T/Tm = 0.606.
317
+ (c) T/Tm = 1.03.
318
+ present that have their Burgers vectors aligned with the driving direction [2, 55, 65].
319
+ As T/Tm increases further, the drive at which the smectic state emerges shifts to higher
320
+ values of FD, and for T/Tm > 1.0, the system no longer forms a moving smectic but
321
+ instead becomes a moving fluid.
322
+ From the features in the transport curves and P6 plotted in Figs. 4 and 5, we
323
+ construct a dynamic phase diagram of the evolution of the different phases as a function
324
+ of FD versus T/Tm in Fig. 6. At low drives we find a pinned or creep regime denoted
325
+ C, where d⟨V ⟩/dFD < 0.5. The dynamically ordered moving smectic phase MS appears
326
+
327
+ Noise and Thermal Depinning of Wigner Crystals
328
+ 9
329
+ 0
330
+ 0.2
331
+ 0.4
332
+ 0.6
333
+ 0.8
334
+ 1
335
+ <V>
336
+ 0
337
+ 0.25
338
+ 0.5
339
+ 0.75
340
+ 1
341
+ FD
342
+ 0
343
+ 0.5
344
+ 1
345
+ 1.5
346
+ d<V>/dFD
347
+ (a)
348
+ (b)
349
+ Figure 4.
350
+ (a) Velocity ⟨V ⟩ vs drive FD for the system in Fig. 3 with Fp = 0.5 at
351
+ T/Tm = 0.0 (purple), 0.606 (blue), 0.91 (dark green), 1.21 (light green), 1.81 (orange),
352
+ and 2.42 (red). (b) The corresponding d⟨V ⟩/dFD vs FD curves. The dashed lines
353
+ indicate the pin-free limit.
354
+ when P6 > 0.9. The disordered regime is where the system is structurally disordered but
355
+ moving, and it can be either a moving glass MG for T/Tm < 1.0, or a moving liquid ML
356
+ for T/Tm > 1.0. The overall features of the phase diagram are similar to those observed
357
+ in driven superconducting vortex systems with quenched disorder, as first proposed by
358
+ Koshelev and Vinokur [13], where the transition between the MG and MS states shifts to
359
+ higher drives as T/Tm is approached. In Ref. [13], the transition line from the disordered
360
+ to moving ordered phase was argued to be proportional to A/(Tm −T), where A is some
361
+ prefactor and the moving ordered phase can be described in terms of having an effective
362
+ temperature that is decreasing toward zero. This picture assumes the formation of a
363
+
364
+ Noise and Thermal Depinning of Wigner Crystals
365
+ 10
366
+ 0
367
+ 0.5
368
+ 1
369
+ 1.5
370
+ 2
371
+ FD
372
+ 0.4
373
+ 0.6
374
+ 0.8
375
+ 1
376
+ P6
377
+ Figure 5.
378
+ P6 vs FD for the system in Fig. 4 with Fp = 0.5 at T/Tm = 0 (purple),
379
+ 0.303 (dark blue), 0.606 (light blue), 0.757 (green), 0.91 (yellow), 1.21 (orange), and
380
+ 2.42 (red). The system reaches an ordered state at high drives for T/Tm < 1.0.
381
+ moving crystal at high drive, and is somewhat modified in our system since the moving
382
+ state we observe is a smectic in which the dynamic fluctuations are anisotropic [16]. We
383
+ find that a better fit to the transition line in our case is (Tm − T)−0.7, which is likely
384
+ due to the anisotropic nature of the moving smectic.
385
+ Now that we have established the dynamic phase diagram as a function of drive
386
+ versus temperature, we can ask how the velocity fluctuation power spectra change as a
387
+ function of FD and T. The power spectrum as a function of ω = 2πf can be calculated
388
+ using the time series v(t) of the velocity fluctuations,
389
+ S(ω) =
390
+ ����
391
+
392
+ v(t)e−iωt
393
+ ����
394
+ 2
395
+ (2)
396
+ At T = 0 the noise has a 1/f α signature with α ≈ 0.8, in agreement with recent
397
+ experiments [56]. The noise power is reduced at high drives and shows a crossover to
398
+ a narrow band signature when the system forms a moving smectic phase; however, the
399
+ experiments do not detect a narrow band noise signature at higher drives, suggesting
400
+ that thermal effects could be coming into play.
401
+ In Fig. 7 we plot power spectra of the velocity time series for the system in Fig. 6
402
+ at a drive of FD = 0.15 for T/Tm = 0, 0.303, 0.606, and 1.03. For T/Tm = 0, the
403
+
404
+ Noise and Thermal Depinning of Wigner Crystals
405
+ 11
406
+ 0
407
+ 0.5
408
+ 1
409
+ 1.5
410
+ T/Tm
411
+ 0
412
+ 1
413
+ 2
414
+ 3
415
+ 4
416
+ FD
417
+ MS
418
+ ML
419
+ MG
420
+ C
421
+ Figure 6.
422
+ Dynamic phase diagram as a function of FD vs T/Tm for the system in
423
+ Figs. 4 and 5 with Fp = 0.5. There is a pinned or creep phase C (red), a disordered
424
+ moving phase (blue) that is a moving glass, MG, at lower temperatures and a moving
425
+ liquid, ML, at higher temperatures, and a moving smectic MS (green).
426
+ low frequency noise has a 1/f α form, where the dashed line is a fit with α = −0.8,
427
+ while at higher frequencies the noise tail has α = −2.0. At T/Tm = 0.5, the lower
428
+ frequency noise power is reduced and α drops closer to α = 0, the value expected for
429
+ white noise; however, the high frequency noise still has a 1/f 2 form. For higher T/Tm,
430
+ the low frequency noise power is further reduced while the higher frequency noise power
431
+ is enhanced, and the spectrum becomes much whiter overall.
432
+ To better characterize the system, we measure the noise power S0, which is the
433
+ value of the spectral power integrated in a small window around a specific frequency
434
+ ω = 20. In Fig. 8 we show S0 versus FD for T/Tm = 0, 0.303, 0.606, and 1.03 on a log-
435
+ linear plot. For T = 0 there is a large peak in S0 over the range 0.01 < FD < 0.5, which
436
+ corresponds to the appearance of 1/f 0.85 noise. The noise is white for 0.5 < FD < 0.9,
437
+ and for FD > 0.9 a narrow band noise signal appears. For T/Tm = 0.303 and 0.606,
438
+ there is still a peak in the noise near FD = 0.2, but as the temperature increases, the
439
+ peak power diminishes and the peak location shifts to lower drives. This is correlated
440
+ with a whitening of the low frequency noise, as shown in Fig. 7. For T/Tm = 1.03, the
441
+
442
+ Noise and Thermal Depinning of Wigner Crystals
443
+ 12
444
+ 10
445
+ 100
446
+ 1000
447
+ ω
448
+ 10
449
+ -9
450
+ 10
451
+ -8
452
+ 10
453
+ -7
454
+ 10
455
+ -6
456
+ 10
457
+ -5
458
+ S(ω)
459
+ Figure 7.
460
+ Power spectra S(ω) vs ω for the system in Fig. 6 with FD = 0.15 for
461
+ T/Tm = 0 (dark blue), 0.303 (light blue), 0.606 (yellow), and 1.03 (red). The spectral
462
+ signature changes from 1/f to white at low frequencies as the temperature increases,
463
+ while the amount of noise power at higher frequencies increases with increasing T .
464
+ sharp noise power peak is lost. At large FD, we find that the noise power increases with
465
+ increasing temperature due to the transition from flow through narrow 1D channels
466
+ in the smectic state to a 2D Brownian like motion in the liquid state.
467
+ The overall
468
+ behavior of the noise power that we find is in agreement with experimental observations
469
+ [56], where there is a large peak in the noise power near the depinning threshold at
470
+ low temperatures, while for higher temperatures the noise power peak is reduced and
471
+ shifts to lower drives before disappearing at sufficiently high temperature.
472
+ Another
473
+ feature that is also observed in the experiments is that the noise power increases with
474
+ temperature at large drives.
475
+ We next consider thermal effects in the high drive limit where the system forms a
476
+ moving smectic at T = 0. In Fig. 9(a) we show S(ω) vs ω for the system from Fig. 6 at
477
+ FD = 1.5 and T/Tm = 0, where there are a series of peaks associated with a narrow band
478
+ noise signature. At T/Tm = 0.303 in Fig. 9(b), there are still strong peaks associated
479
+ with the narrow band noise but the higher harmonic peaks are strongly reduced in
480
+ power. In Fig. 9(c) at T/Tm = 0.606, the level of background noise has increased and
481
+ the narrow band peaks are diminished in size, while at T/Tm = 1.03 in Fig. 9(d), the
482
+
483
+ Noise and Thermal Depinning of Wigner Crystals
484
+ 13
485
+ 0
486
+ 0.5
487
+ 1
488
+ 1.5
489
+ 2
490
+ FD
491
+ 10
492
+ -10
493
+ 10
494
+ -9
495
+ 10
496
+ -8
497
+ 10
498
+ -7
499
+ 10
500
+ -6
501
+ 10
502
+ -5
503
+ S0
504
+ Figure 8.
505
+ The noise power S0 at fixed ω = 20 vs FD for the system in Fig. 7 at
506
+ FD = 0.15 for T/Tm = 0 (dark blue), 0.303 (light blue), 0.606 (yellow), and 1.03 (red).
507
+ moving smectic phase is lost and the narrow band peaks disappear into the background
508
+ noise. To better characterize the change in the narrow band noise signature, in Fig. 10
509
+ we plot the noise power S0 at ω = 323, which is the location of the most pronounced
510
+ narrow band noise peak in Fig. 9(a). For T/Tm < 0.5 there is a strong narrow band
511
+ noise signal; however, at T/Tm = 0.75 the narrow band noise level is close to the value
512
+ of the background noise. This suggests that thermal effects can strongly reduce the
513
+ narrow band noise signal even at temperatures well below T/Tm = 1.0, which could
514
+ explain why the narrow band noise signals are difficult to see in experiment. To better
515
+ understand the origins of the changes in the noise signals, in Fig. 11(a) we plot the
516
+ trajectories of the charges at T/Tm = 0.606 where narrow band noise is present. The
517
+ system is still in a moving smectic state but the channels have been broadened by the
518
+ thermal fluctuations, and there are several regions in which the channel structures are
519
+ starting to break down. Figure 11(b) shows the trajectories for T/Tm = 1.07, where
520
+ the 1D channel structure is lost, there is a significant amount of transverse diffusion,
521
+ and the narrow band noise peaks disappear. This result indicates that the narrow band
522
+ noise occurs only when the motion of the charges is mostly 1D in character.
523
+
524
+ Noise and Thermal Depinning of Wigner Crystals
525
+ 14
526
+ 0.0
527
+ 5.0×10
528
+ -6
529
+ 1.0×10
530
+ -5
531
+ 1.5×10
532
+ -5
533
+ 2.0×10
534
+ -5
535
+ 2.5×10
536
+ -5
537
+ S(ω)
538
+ 0.0
539
+ 5.0×10
540
+ -6
541
+ 1.0×10
542
+ -5
543
+ 1.5×10
544
+ -5
545
+ 2.0×10
546
+ -5
547
+ 2.5×10
548
+ -5
549
+ S(ω)
550
+ 0
551
+ 1000
552
+ 2000
553
+ 3000
554
+ ω
555
+ 0.0
556
+ 5.0×10
557
+ -6
558
+ 1.0×10
559
+ -5
560
+ 1.5×10
561
+ -5
562
+ 2.0×10
563
+ -5
564
+ 2.5×10
565
+ -5
566
+ S(ω)
567
+ 0
568
+ 1000 2000 3000 4000 5000
569
+ ω
570
+ 0.0
571
+ 5.0×10
572
+ -6
573
+ 1.0×10
574
+ -5
575
+ 1.5×10
576
+ -5
577
+ S(ω)
578
+ (a)
579
+ (b)
580
+ (c)
581
+ (d)
582
+ Figure 9.
583
+ S(ω) vs ω for the system in Fig. 6 at FD = 1.5 where the system is in the
584
+ moving smectic phase. T/Tm = (a) 0, (b) 0.303, (c) 0.606, and (d) 1.03.
585
+ 5. Thermal Depinning Noise in the Elastic Regime
586
+ We next consider the thermal depinning and noise in the elastic regime where the charges
587
+ maintain their same neighbors. From Fig. 2 we select a value of Fp = 0.05, well below
588
+ the T/Tm = 0 disordering threshold of Fp = 0.075. In Fig. 12(a) we show ⟨V ⟩ versus
589
+ FD at Fp = 0.05 for T/Tm = 0, 0.0378, 0.0756, 0.17, 0.303, 0.606, and 1.03, and we plot
590
+ the corresponding d⟨V ⟩/dFD curves in Fig. 12(b). As T/Tm increases, the depinning
591
+ threshold shifts to lower FD, and in Fig. 12(b), the peak in d⟨V ⟩/dFD that appears for
592
+ T = 0 is lost for T/Tm > 0.303. We note that the system remains in an ordered state
593
+ up to T/Tm = 1.0 for all values of FD. The d⟨V ⟩/dFD curves also show a multiple peak
594
+ feature at high temperatures, with one peak at the finite temperature threshold and a
595
+ second peak near the T = 0 depinning threshold. In between these two peaks, the flow
596
+ is creep-like in nature.
597
+ In Fig. 13 we plot S(ω) versus ω for the system in Fig. 12 at T/Tm = 0.1515 for
598
+ different values of FD = 0.025, 0.03, 0.04, 0.046, 0.06, and 0.01. At FD = 0.025, the
599
+ motion occurs mostly in the form of avalanches, and no clear narrow band signatures
600
+ are present but the low frequency noise has high power. For FD = 0.03, the system
601
+ starts to develop a narrow band noise signature that sharpens with increasing drive,
602
+ and for FD ≥ 0.06, which is above the zero temperature depinning threshold, the low
603
+ frequency noise is strongly suppressed and the narrow band noise peaks become much
604
+
605
+ Noise and Thermal Depinning of Wigner Crystals
606
+ 15
607
+ 0
608
+ 0.5
609
+ 1
610
+ T/Tm
611
+ 1×10
612
+ -5
613
+ S0
614
+ Figure 10.
615
+ The value of the noise power S0 at ω = 323, the frequency of the largest
616
+ narrow band noise peak in Fig. 9, vs T/Tm for the system in Fig. 8 with FD = 0.15.
617
+ Here the narrow band noise peaks are lost near T/Tm = 0.75.
618
+ x
619
+ (a)
620
+ y
621
+ x
622
+ (b)
623
+ y
624
+ Figure 11.
625
+ Charge locations (red circles), trajectories (blue lines), and pinning site
626
+ locations (black circles) for the system in Figs. 9 and 10 at FD = 1.5 for T/Tm = (a)
627
+ 0.606 and (b) 1.03.
628
+
629
+ Noise and Thermal Depinning of Wigner Crystals
630
+ 16
631
+ 0
632
+ 0.01
633
+ 0.02
634
+ <V>
635
+ 0
636
+ 0.01
637
+ 0.02
638
+ FD
639
+ 0
640
+ 2
641
+ 4
642
+ 6
643
+ d<V>/dFD
644
+ (a)
645
+ (b)
646
+ Figure 12. (a) ⟨V ⟩ vs FD for a system that exhibits elastic depinning at T/Tm = 0,
647
+ where Fp = 0.05. The different curves are for temperatures of T/Tm = 0, 0.0378,
648
+ 0.0756, 0.17, 0.303, 0.606, and 1.03, from right to left. The dashed line is the expected
649
+ curve in the pin free limit. (b) The corresponding d⟨V ⟩/dFD vs FD curves.
650
+ sharper. This result shows that in the elastic flow regime, the narrow band noise signal
651
+ is more robust than in the plastic phase, and it appears once the system has depinned.
652
+ In Fig. 14 we plot S(ω) vs ω for the system in Fig. 13 at T/Tm = 0 and T/Tm = 0.303
653
+ at a drive of FD = 0.02. At T/Tm = 0, there is a strong narrow band noise feature.
654
+ Interestingly, at T/Tm = 0.303, although the level of background noise has increased,
655
+ the primary narrow band noise peak is enhanced in power. The increase in the narrow
656
+ band peak occurs when thermal effects weaken the effectiveness of the pinning and allow
657
+ the charges to become better ordered. This effect is diminished in the case of strong
658
+ pinning.
659
+
660
+ Noise and Thermal Depinning of Wigner Crystals
661
+ 17
662
+ 10
663
+ -10
664
+ 10
665
+ -9
666
+ 10
667
+ -8
668
+ S(ω)
669
+ 10
670
+ -10
671
+ 10
672
+ -9
673
+ 10
674
+ -8
675
+ S(ω)
676
+ 10
677
+ -10
678
+ 10
679
+ -9
680
+ 10
681
+ -8
682
+ S(ω)
683
+ 10
684
+ -10
685
+ 10
686
+ -9
687
+ 10
688
+ -8
689
+ 10
690
+ -7
691
+ S(ω)
692
+ 10
693
+ 0
694
+ 10
695
+ 1
696
+ 10
697
+ 2
698
+ 10
699
+ 3
700
+ 10
701
+ 4
702
+ ω
703
+ 10
704
+ -11
705
+ 10
706
+ -10
707
+ 10
708
+ -9
709
+ 10
710
+ -8
711
+ S(ω)
712
+ 10
713
+ 0
714
+ 10
715
+ 1
716
+ 10
717
+ 2
718
+ 10
719
+ 3
720
+ 10
721
+ 4
722
+ ω
723
+ 10
724
+ -11
725
+ 10
726
+ -10
727
+ 10
728
+ -9
729
+ 10
730
+ -8
731
+ 10
732
+ -7
733
+ S(ω)
734
+ (a)
735
+ (b)
736
+ (c)
737
+ (d)
738
+ (e)
739
+ (f)
740
+ Figure 13.
741
+ S(ω) vs ω for the system in Fig. 12 with Fp = 0.05 at T/Tm = 0.1515
742
+ for FD = (a) 0.025, (b) 0.03, (c) 0.04, (d) 0.046, (e) 0.06, and (f) 0.01.
743
+ To better characterize the narrow band noise behavior for the system in Figs. 12 and
744
+ 13, in Fig. 15 we plot the noise power S0 versus T/Tm for FD = 0.02 where the system is
745
+ always in a moving state at the narrow band peak of ω = 80 and the background noise
746
+ signal at ω = 300, along with the difference between these two noise powers. Unlike the
747
+ case for strong pinning, the power of the narrow band noise signal generally increases
748
+ with increasing T/Tm; however, the background noise power also increases, and the
749
+ amount of power in the two signals becomes equal near T/Tm = 1.0. The narrow band
750
+ noise peak has the greatest amount of additional power compared to the background
751
+ noise near T/Tm = 0.3. This is again due to thermal effects washing out any additional
752
+ avalanche-like motion and permitting the charge lattice to become better ordered.
753
+ 6. Discussion
754
+ Narrow band noise has been observed experimentally in superconducting vortex [26, 28],
755
+ magnetic skyrmion [32], and charge density wave [4] systems, but has not been seen for
756
+ Wigner crystals. There have been reports of periodic noise in charge ordering systems
757
+ such as stripe or bubble forming states [33, 37]; however, this noise generally appears at
758
+ low frequencies and is probably not associated with the lattice-scale narrow band noise,
759
+
760
+ Noise and Thermal Depinning of Wigner Crystals
761
+ 18
762
+ 0
763
+ 200
764
+ 400
765
+ 600
766
+ ω
767
+ 0
768
+ 2×10
769
+ -8
770
+ 4×10
771
+ -8
772
+ 6×10
773
+ -8
774
+ S(ω)
775
+ Figure 14.
776
+ The power spectra S(ω) vs ω for the system in Fig. 13 with Fp = 0.05
777
+ at FD = 0.02 in the moving phase for T/Tm = 0 (blue) and T/Tm = 0.303 (green).
778
+ At T/Tm = 0.303, although the overall background noise power is higher, there is an
779
+ enhancement of the narrow band noise signal.
780
+ but instead arises due to the motion of some other periodically moving macroscopic scale
781
+ structure. In the experiments of Brussarski et al. [56], the peak noise power decreased
782
+ with increasing temperature, similar to what we observe, but no narrow band noise signal
783
+ was observed. This could be the result of several possible factors. If the drive applied to
784
+ the system is not uniform, there could still be strong plastic flow at low drives; however,
785
+ at high drives the system may not form a uniformly ordered moving state but could
786
+ instead break into several locally ordered regions that are moving at different speeds.
787
+ Related to this, if the quenched disorder has a wide range of strength so that some of
788
+ the charges are moving while a small number remain pinned, a disordered flow regime
789
+ would emerge in which narrow band noise is absent. A narrow band noise signal could
790
+ also be masked by strong background noise. In this case, the signal could be boosted
791
+ by applying an additional ac drive. If the frequency of this ac drive is swept, phase
792
+ locking or Shapiro steps would appear when the frequency comes into resonance with
793
+ the narrow band signal [26]. Another possible issue is that the narrow band frequency
794
+ could be too high to detect with the available experimental setup; however, for a system
795
+ in the elastic depinning limit, fairly low frequency periodic signals could be generated in
796
+ the creep regime. The lack of experimentally observed narrow band noise may suggest
797
+
798
+ Noise and Thermal Depinning of Wigner Crystals
799
+ 19
800
+ 0
801
+ 0.5
802
+ 1
803
+ T/Tm
804
+ 0
805
+ 2×10
806
+ -8
807
+ 4×10
808
+ -8
809
+ 6×10
810
+ -8
811
+ 8×10
812
+ -8
813
+ S0
814
+ Figure 15.
815
+ The noise power S0 vs T/Tm for the system in Figs. 12 and 13 with
816
+ Fp = 0.05 at FD = 0.02 for the narrow band frequency of ω = 80 (green circles), the
817
+ background noise at ω = 300 (red squares), and the difference (blue triangles).
818
+ that elastic depinning of the Wigner crystal is not occurring and that the systems are
819
+ generally in the disordered or plastic flow regimes where the only available narrow band
820
+ noise signals are of the moving smectic type. In principle, we think that the best place
821
+ to look for a narrow band noise signature is in a sample with relatively weak pinning just
822
+ above the depinning threshold. In our work, we focused on samples that were entirely
823
+ within the elastic or plastic regimes; however, close to the transition between the elastic
824
+ and plastic regimes, the plastic flow noise may be enhanced.
825
+ 7. Summary
826
+ We have investigated the thermally induced depinning and noise fluctuations for driven
827
+ Wigner crystal systems with quenched disorder. We identify an elastic regime in which
828
+ the charges maintain the same neighbors at depinning as well as a plastic regime in which
829
+ the system is broken up into moving and non-moving regions. In the plastic depinning
830
+ regime, the velocity noise has a 1/f shape and there is a peak in the noise power above
831
+ the depinning threshold at lower temperatures, while for large temperatures, the noise
832
+ power peak is reduced and the spectrum becomes white, in agreement with experiments.
833
+ For high drives at low temperatures in the plastic regime, the system forms a moving
834
+
835
+ Noise and Thermal Depinning of Wigner Crystals
836
+ 20
837
+ smectic with a narrow band noise signal. We find that this narrow band signal persists
838
+ up to T/Tm = 0.75, where Tm is the temperature at which the charge lattice melts in the
839
+ absence of quenched disorder. In the elastic regime, the system remains ordered up to
840
+ temperatures approaching T/Tm = 1.0, although thermal effects reduce the depinning
841
+ threshold. In the elastic regime, 1/f noise appears only in the creep regime where there
842
+ are avalanches or jumps of motion, while in the sliding regime, pronounced narrow band
843
+ noise appears that reaches its lowest power at the disorder-free melting temperature.
844
+ Our results show that measurements of the velocity noise spectra and noise power can
845
+ be used in connection with transport curves to distinguish different phases of driven
846
+ Wigner crystals.
847
+ Acknowledgments
848
+ We gratefully acknowledge the support of the U.S. Department of Energy through
849
+ the LANL/LDRD program for this work.
850
+ This work was supported by the US
851
+ Department of Energy through the Los Alamos National Laboratory.
852
+ Los Alamos
853
+ National Laboratory is operated by Triad National Security, LLC, for the National
854
+ Nuclear Security Administration of the U. S. Department of Energy (Contract No.
855
+ 892333218NCA000001).
856
+ [1] D. S. Fisher. Collective transport in random media: from superconductors to earthquakes. Phys.
857
+ Rep., 301:113–150, 1998.
858
+ [2] C. Reichhardt and C. J. Olson Reichhardt.
859
+ Depinning and nonequilibrium dynamic phases of
860
+ particle assemblies driven over random and ordered substrates: a review.
861
+ Rep. Prog. Phys.,
862
+ 80(2):026501, 2017.
863
+ [3] G. Gr¨uner, A. Zawadowski, and P. M. Chaikin. Nonlinear conductivity and noise due to charge-
864
+ density-wave depinning in NbSe3. Phys. Rev. Lett., 46:511–515, 1981.
865
+ [4] G. Gr¨uner. The dynamics of charge-density waves. Rev. Mod. Phys., 60:1129–1181, 1988.
866
+ [5] A. Pertsinidis and X. S. Ling. Statics and dynamics of 2D colloidal crystals in a random pinning
867
+ potential. Phys. Rev. Lett., 100:028303, 2008.
868
+ [6] T. Bohlein, J. Mikhael, and C. Bechinger.
869
+ Observation of kinks and antikinks in colloidal
870
+ monolayers driven across ordered surfaces. Nature Mater., 11(2):126–130, 2012.
871
+ [7] T. Schulz, R. Ritz, A. Bauer, M. Halder, M. Wagner, C. Franz, C. Pfleiderer, K. Everschor,
872
+ M. Garst, and A. Rosch. Emergent electrodynamics of skyrmions in a chiral magnet. Nature
873
+ Phys., 8(4):301–304, 2012.
874
+ [8] A. Vanossi, N. Manini, M. Urbakh, S. Zapperi, and E. Tosatti. Colloquium: Modeling friction:
875
+ From nanoscale to mesoscale. Rev. Mod. Phys., 85:529–552, 2013.
876
+ [9] C. Reichhardt and C. J. Olson. Colloidal dynamics on disordered substrates. Phys. Rev. Lett.,
877
+ 89:078301, 2002.
878
+ [10] N. Di Scala, E. Olive, Y. Lansac, Y. Fily, and J. C. Soret.
879
+ The elastic depinning transition of
880
+ vortex lattices in two dimensions. New J. Phys., 14:123027, 2012.
881
+ [11] Y. Fily, E. Olive, N. Di Scala, and J. C. Soret. Critical behavior of plastic depinning of vortex
882
+ lattices in two dimensions: Molecular dynamics simulations. Phys. Rev. B, 82:134519, 2010.
883
+ [12] S. Bhattacharya and M. J. Higgins. Dynamics of a disordered flux line lattice. Phys. Rev. Lett.,
884
+ 70:2617–2620, 1993.
885
+ [13] A. E. Koshelev and V. M. Vinokur.
886
+ Dynamic melting of the vortex lattice.
887
+ Phys. Rev. Lett.,
888
+ 73:3580–3583, 1994.
889
+
890
+ Noise and Thermal Depinning of Wigner Crystals
891
+ 21
892
+ [14] K. Moon, R. T. Scalettar, and G. T. Zim´anyi. Dynamical phases of driven vortex systems. Phys.
893
+ Rev. Lett., 77:2778–2781, 1996.
894
+ [15] T. Giamarchi and P. Le Doussal. Moving glass phase of driven lattices. Phys. Rev. Lett., 76:3408–
895
+ 3411, 1996.
896
+ [16] L. Balents, M. C. Marchetti, and L. Radzihovsky. Nonequilibrium steady states of driven periodic
897
+ media. Phys. Rev. B, 57:7705–7739, 1998.
898
+ [17] C. J. Olson, C. Reichhardt, and F. Nori.
899
+ Nonequilibrium dynamic phase diagram for vortex
900
+ lattices. Phys. Rev. Lett., 81:3757–3760, 1998.
901
+ [18] F. Pardo, F. de la Cruz, P. L. Gammel, E. Bucher, and D. J. Bishop. Observation of smectic and
902
+ moving-Bragg-glass phases in flowing vortex lattices. Nature, 396(6709):348–350, 1998.
903
+ [19] A. B. Kolton, D. Dom´ınguez, and N. Grønbech-Jensen. Hall noise and transverse freezing in driven
904
+ vortex lattices. Phys. Rev. Lett., 83:3061–3064, 1999.
905
+ [20] C. Reichhardt, D. Ray, and C. J. Olson Reichhardt.
906
+ Collective transport properties of driven
907
+ skyrmions with random disorder. Phys. Rev. Lett., 114:217202, 2015.
908
+ [21] M. C. Hellerqvist, D. Ephron, W. R. White, M. R. Beasley, and A. Kapitulnik. Vortex dynamics
909
+ in two-dimensional amorphous Mo77Ge23 films. Phys. Rev. Lett., 76:4022–4025, 1996.
910
+ [22] S. Ryu, M. Hellerqvist, S. Doniach, A. Kapitulnik, and D. Stroud. Dynamical phase transition in
911
+ a driven disordered vortex lattice. Phys. Rev. Lett., 77:5114–5117, 1996.
912
+ [23] M. B. Weissman.
913
+ 1
914
+ f noise and other slow, nonexponential kinetics in condensed matter. Rev. Mod.
915
+ Phys., 60:537–571, 1988.
916
+ [24] I. Bloom, A. C. Marley, and M. B. Weissman. Nonequilibrium dynamics of discrete fluctuators in
917
+ charge-density waves in NbSe3. Phys. Rev. Lett., 71:4385–4388, 1993.
918
+ [25] A. C. Marley, M. J. Higgins, and S. Bhattacharya. Flux flow noise and dynamical transitions in
919
+ a flux line lattice. Phys. Rev. Lett., 74:3029–3032, 1995.
920
+ [26] S. Okuma, J. Inoue, and N. Kokubo. Suppression of broadband noise at mode locking in driven
921
+ vortex matter. Phys. Rev. B, 76:172503, 2007.
922
+ [27] T. J. Bullard, J. Das, G. L. Daquila, and U. C. Tauber. Vortex washboard voltage noise in type-II
923
+ superconductors. Eur. Phys. J. B, 65(4):469–484, 2008.
924
+ [28] S. Okuma, K. Kashiro, Y. Suzuki, and N. Kokubo. Order-disorder transition of vortex matter in
925
+ a-MoxGe1−x films probed by noise. Phys. Rev. B, 77:212505, 2008.
926
+ [29] G. Liu, S. Rumyantsev, M. A. Bloodgood, T. T. Salguero, and A. A. Balandin. Low-frequency
927
+ current fluctuations and sliding of the charge density waves in two-dimensional materials. Nano
928
+ Lett., 18:3630–3636, 2018.
929
+ [30] S. A. D´ıaz, C. J. O. Reichhardt, D. P. Arovas, A. Saxena, and C. Reichhardt. Fluctuations and
930
+ noise signatures of driven magnetic skyrmions. Phys. Rev. B, 96:085106, 2017.
931
+ [31] K. Bennaceur, C. Lupien, B. Reulet, G. Gervais, L. N. Pfeiffer, and K. W. West.
932
+ Competing
933
+ charge density waves probed by nonlinear transport and noise in the second and third Landau
934
+ levels. Phys. Rev. Lett., 120:136801, 2018.
935
+ [32] T. Sato, W. Koshibae, A. Kikkawa, T. Yokouchi, H. Oike, Y. Taguchi, N. Nagaosa, Y. Tokura,
936
+ and F. Kagawa.
937
+ Slow steady flow of a skyrmion lattice in a confined geometry probed by
938
+ narrow-band resistance noise. Phys. Rev. B, 100:094410, 2019.
939
+ [33] J. Sun, J. Niu, Y. Li, Y. Liu, L. N. Pfeiffer, K. W. West, P. Wang, and X. Lin. Dynamic ordering
940
+ transitions in charged solid. Fund. Res., 2:178–183, 2022.
941
+ [34] S. Maegochi, K. Ienaga, and S. Okuma. Moving smectic phase and transverse mode locking in
942
+ driven vortex matter. Phys. Rev. Res., 4:033085, 2022.
943
+ [35] T. Sato, A. Kikkawa, Y. Taguchi, Y. Tokura, and F. Kagawa. Mode locking phenomena of the
944
+ current-induced skyrmion-lattice motion in microfabricated MnSi. Phys. Rev. B, 102:180411,
945
+ 2020.
946
+ [36] G. A. Cs´athy, D. C. Tsui, L. N. Pfeiffer, and K. W. West.
947
+ Astability and negative differential
948
+ resistance of the Wigner solid. Phys. Rev. Lett., 98:066805, 2007.
949
+ [37] K. B. Cooper, J. P. Eisenstein, L. N. Pfeiffer, and K. W. West.
950
+ Observation of narrow-band
951
+
952
+ Noise and Thermal Depinning of Wigner Crystals
953
+ 22
954
+ noise accompanying the breakdown of insulating states in high Landau levels. Phys. Rev. Lett.,
955
+ 90:226803, 2003.
956
+ [38] E. Wigner. On the interaction of electrons in metals. Phys. Rev., 46:1002–1011, 1934.
957
+ [39] P. Monceau. Electronic crystals: an experimental overview. Adv. Phys., 61(4):325–581, 2012.
958
+ [40] M. Shayegan. Wigner crystals in flat band 2D electron systems. Nature Rev. Phys., 4:212–213,
959
+ 2022.
960
+ [41] E. Y. Andrei, G. Deville, D. C. Glattli, F. I. B. Williams, E. Paris, and B. Etienne. Observation
961
+ of a magnetically induced Wigner solid. Phys. Rev. Lett., 60:2765–2768, 1988.
962
+ [42] C. J. DaSilva, J. P. Rino, P. F. Damasceno, and E. Ya. Sherman. Two-dimensional Coulomb solid
963
+ with interaction anisotropy. Phys. Rev. B, 81:153307, 2010.
964
+ [43] V. J. Goldman, M Santos, M Shayegan, and J. E. Cunningham.
965
+ Evidence for two-dimentional
966
+ quantum Wigner crystal. Phys. Rev. Lett., 65:2189–2192, 1990.
967
+ [44] F. I. B. Williams, P. A. Wright, R. G. Clark, E. Y. Andrei, G. Deville, D. C. Glattli, O. Probst,
968
+ B. Etienne, C. Dorin, C. T. Foxon, and J. J. Harris. Conduction threshold and pinning frequency
969
+ of magnetically induced Wigner solid. Phys. Rev. Lett., 66:3285–3288, 1991.
970
+ [45] H. W. Jiang, H. L. Stormer, D. C. Tsui, L. N. Pfeiffer, and K. W. West. Magnetotransport studies
971
+ of the insulating phase around ν=1/5 Landau-level filling. Phys. Rev. B, 44:8107–8114, 1991.
972
+ [46] Y. P. Li, T. Sajoto, L. W. Engel, D. C. Tsui, and M. Shayegan.
973
+ Low-frequency noise in the
974
+ reentrant insulating phase around the 1/5 fractional quantum Hall liquid.
975
+ Phys. Rev. Lett.,
976
+ 67:1630–1633, 1991.
977
+ [47] Y. Kopelevich, R. R. da Silva, A. Rougier, and I. A. Luk’yanchuk. Charge ordering in amorphous
978
+ WOx films. Phys. Lett. A, 368:419–422, 2007.
979
+ [48] Md. S. Hossain, M. K. Ma, K. A. Villegas-Rosales, Y. J. Chung, L. N. Pfeiffer, K. W. West, K. W.
980
+ Baldwin, and M. Shayegan. Anisotropic two-dimensional disordered Wigner solid. Phys. Rev.
981
+ Lett., 129:036601, 2022.
982
+ [49] Y. Xu, S. Liu, D. A. Rhodes, K. Watanabe, T. Taniguchi, J. Hone, V. Elser, K. F. Mak, and
983
+ J. Shan.
984
+ Correlated insulating states at fractional fillings of moir`e superlattices.
985
+ Nature
986
+ (London), 587:214–218, 2020.
987
+ [50] H. Li, S. Li, E. C. Regan, D. Wang, W. Zhao, S. Kahn, K. Yumigeta, M. Blei, T. Taniguchi,
988
+ K. Watanabe, S. Tongay, A. Zettl, M. F. Crommie, and F. Wang.
989
+ Imaging two-dimensional
990
+ generalized Wigner crystals. Nature (London), 597:650–654, 2021.
991
+ [51] T. Smole´nski, P. E. Dolgirev, C. Kuhlenkamp, A. Popert, Y. Shimazaki, P. Back, X. Lu, M. Kroner,
992
+ K. Watanabe, T. Taniguchi, I. Esterlis, E. Demler, and A. Imamoglu.
993
+ Signatures of Wigner
994
+ crystal of electrons in a monolayer semiconductor. Nature (London), 595:53–57, 2021.
995
+ [52] Y. Zhou, J. Sung, E. Brutschea, I. Esterlis, Y. Wang, G. Scuri, R. J. Gelly, H. Heo, T. Taniguchi,
996
+ K. Watanabe, G. Zar´and, M. D. Lukin, P. Kim, E. Demler, and H. Park. Bilayer Wigner crystals
997
+ in a transition metal dichalcogenide heterostructure. Nature (London), 595:48–52, 2021.
998
+ [53] M. Matty and E.-A. Kim. Melting of generalized Wigner crystals in transition metal dichalcogenide
999
+ heterobilayer Moir´e systems. Nature Commun., 13:7098, 2022.
1000
+ [54] J. Falson, I. Sodemann, B. Skinner, D. Tabrea, Y. Kozuka, A. Tsukazaki, M. Kawasaki,
1001
+ K. von Klitzing, and J. H. Smet.
1002
+ Competing correlated states around the zero-field Wigner
1003
+ crystallization transition of electrons in two dimensions. Nature Mater., 21:311–316, 2022.
1004
+ [55] C. Reichhardt, C. J. Olson, N. Grønbech-Jensen, and F. Nori. Moving Wigner glasses and smectics:
1005
+ Dynamics of disordered Wigner crystals. Phys. Rev. Lett., 86:4354–4357, 2001.
1006
+ [56] P. Brussarski, S. Li, S. V. Kravchenko, A. A. Shashkin, and M. P. Sarachik. Transport evidence
1007
+ for a sliding two-dimensional quantum electron solid. Nature Commun., 9:3803, 2018.
1008
+ [57] S. Bogdanovich and D. Popovi´c. Onset of glassy dynamics in a two-dimensional electron system
1009
+ in silicon. Phys. Rev. Lett., 88:236401, 2002.
1010
+ [58] J. Jaroszy´nski, D. Popovi´c, and T. M. Klapwijk. Universal behavior of the resistance noise across
1011
+ the metal-insulator transition in silicon inversion layers. Phys. Rev. Lett., 89:276401, 2002.
1012
+ [59] C. Reichhardt and C. J. Olson Reichhardt. Noise at the crossover from Wigner liquid to Wigner
1013
+
1014
+ Noise and Thermal Depinning of Wigner Crystals
1015
+ 23
1016
+ glass. Phys. Rev. Lett., 93:176405, 2004.
1017
+ [60] Y. P. Chen, G. Sambandamurthy, Z. H. Wang, R. M. Lewis, L. W. Engel, D. C. Tsui, P. D. Ye,
1018
+ L. N. Pfeiffer, and K. W. West. Melting of a 2D quantum electron solid in high magnetic field.
1019
+ Nat. Phys., 2(7):452–455, 2006.
1020
+ [61] T. Knighton, Z. Wu, J. Huang, A. Serafin, J. S. Xia, L. N. Pfeiffer, and K. W. West. Evidence of
1021
+ two-stage melting of Wigner solids. Phys. Rev. B, 97:085135, 2018.
1022
+ [62] H. Deng, L. N. Pfeiffer, K. W. West, K. W. Baldwin, L. W. Engel, and M. Shayegan. Probing the
1023
+ melting of a two-dimensional quantum Wigner crystal via its screening efficiency. Phys. Rev.
1024
+ Lett., 122:116601, 2019.
1025
+ [63] M. K. Ma, K. A. Villegas Rosales, H. Deng, Y. J. Chung, L. N. Pfeiffer, K. W. West, K. W.
1026
+ Baldwin, R. Winkler, and M. Shayegan. Thermal and quantum melting phase diagrams for a
1027
+ magnetic-field-induced Wigner solid. Phys. Rev. Lett., 125:036601, 2020.
1028
+ [64] S. Kim, J. Bang, C. Lim, S. Y. Lee, J. Hyun, G. Lee, Y. Lee, J. D. Denlinger, S. Huh, C. Kim,
1029
+ S. Y. Song, J. Seo, D. Thapa, S.-G. Kim, Y. H. Lee, Y. Kim, and S. W. Kim. Quantum electron
1030
+ liquid and its possible phase transition. Nature Mater., 21:1269–1274, 2022.
1031
+ [65] C. Reichhardt and C. J. O. Reichhardt.
1032
+ Nonlinear dynamics, avalanches, and noise for driven
1033
+ Wigner crystals. Phys. Rev. B, 106:235417, 2022.
1034
+ [66] C. Reichhardt and C. J. O. Reichhardt. Melting, reentrant ordering and peak effect for Wigner
1035
+ crystals with quenched and thermal disorder. 2022, arXiv:2211.11911.
1036
+ [67] Q. Qian, J. Nakamura, S. Fallahi, G. C. Gardner, and M. J. Manfra. Possible nematic to smectic
1037
+ phase transition in a two-dimensional electron gas at half-filling.
1038
+ Nature Commun., 8:1536,
1039
+ 2017.
1040
+ [68] M.-C. Cha and H. A. Fertig. Topological defects, orientational order, and depinning of the electron
1041
+ solid in a random potential. Phys. Rev. B, 50:14368–14380, 1994.
1042
+ [69] M.-C. Cha and H. A. Fertig. Disorder-induced phase transitions in two-dimensional crystals. Phys.
1043
+ Rev. Lett., 74:4867–4870, 1995.
1044
+ [70] G. Piacente and F. M. Peeters. Pinning and depinning of a classic quasi-one-dimensional Wigner
1045
+ crystal in the presence of a constriction. Phys. Rev. B, 72:205208, 2005.
1046
+ [71] C. Reichhardt and C. J. O. Reichhardt. Drive dependence of the Hall angle for a sliding Wigner
1047
+ crystal in a magnetic field. Phys. Rev. B, 103:125107, 2021.
1048
+
3tFIT4oBgHgl3EQf6Cuj/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
59AyT4oBgHgl3EQfcfe1/content/2301.00285v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6c08fddbe9fd8a833a2f9eaefff0d413bc28b0fea5d7cef8c7f9cdd63e6d872b
3
+ size 3309581
59AyT4oBgHgl3EQfcfe1/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f7752b589ffadaba691b18ccb9a6662e2b6a7a2f73aacfa5f774ba1be99c4e02
3
+ size 1835053
59AyT4oBgHgl3EQfcfe1/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f1604784afc6223526c01d326b0144a6a6fa46e4026bfd07aba6b86adea52751
3
+ size 67501
59E1T4oBgHgl3EQfTAPi/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:036c2489b2309ed738d85389271ee73aa43b9cbc65f40e748e05935619718022
3
+ size 3932205
5NE2T4oBgHgl3EQfOgaA/content/2301.03749v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6f23037ce4f2ae6c10957851cc04ef12e3de5ebc98ab4d2189b254420cf8adc2
3
+ size 20155402
5dE0T4oBgHgl3EQfvgHM/content/tmp_files/2301.02620v1.pdf.txt ADDED
@@ -0,0 +1,717 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Information Flow Tracking Methods for Protecting
2
+ Cyber-Physical Systems against Hardware Trojans
3
+ - a Survey -
4
+ Sofia Maragkou
5
+ Institute of Computer Technology, TU Wien
6
+ Vienna University of Technology
7
+ Gusshausstr. 27–29 / 384, 1040 Wien, Austria
8
+ sofia.maragkou@tuwien.ac.at
9
+ Axel Jantsch
10
+ Institute of Computer Technology, TU Wien
11
+ Vienna University of Technology
12
+ Gusshausstr. 27–29 / 384, 1040 Wien, Austria
13
+ axel.jantsch@tuwien.ac.at
14
+ Abstract—Cyber-physical systems (CPS) provide profitable
15
+ surfaces for hardware attacks such as hardware Trojans. Hard-
16
+ ware Trojans can implement stealthy attacks such as leaking
17
+ critical information, taking control of devices or harm humans.
18
+ In this article we review information flow tracking (IFT) methods
19
+ for protecting CPS against hardware Trojans, and discuss their
20
+ current limitations. IFT methods are a promising approach for
21
+ the detection of hardware Trojans in complex systems because the
22
+ detection mechanism does not necessarily rely on potential Trojan
23
+ behavior. However, in order to maximize the benefits research
24
+ should focus more on black-box design models and consider real-
25
+ world attack scenarios.
26
+ Index Terms—hardware Trojans, detection, hardware security,
27
+ real hardware attacks, information flow tracking, cyber-physical
28
+ production systems, cyber-physical systems
29
+ I. INTRODUCTION
30
+ Hardware security began facing desultory challenges much
31
+ later than software [1]. In 1996 a timing attack was published
32
+ [2] based on which sensitive information could be leaked from
33
+ a cryptographic component. After this point, hardware security
34
+ research became more systematic. From 2005 on [1, 3] the
35
+ field of hardware security has gained ground in the academic
36
+ and the industrial world because it breaks the chain of trust
37
+ known so far.
38
+ This chain of trust, from the hardware security perspective,
39
+ begins at the integrated circuit (IC) supply chain, where
40
+ security vulnerabilities are formed by the needs of the market
41
+ for fast and cheap technology. The involvement of external en-
42
+ tities in the design process and the internationally outsourced
43
+ fabrication can create security breaches that can be even
44
+ relevant for national security. Design houses, in order to stay
45
+ competitive, purchase third-party intellectual property (3PIP)
46
+ cores from vendors and outsource the fabrication process
47
+ without always verifying the returned product with respect
48
+ to hardware security breaches. The reason for that is that the
49
+ verification of the purchased cores is an expensive process that
50
+ requires resources and time. Those intellectual property (IP)
51
+ cores or chips are integrated and distributed to the customers.
52
+ Consequently, hardware security has to deal with attacks like
53
+ IP piracy, reverse engineering, counterfeit chips and hardware
54
+ Trojans.
55
+ In a real world scenario, when an IP core is being purchased,
56
+ the design house requests some design specification and the
57
+ 3PIP core vendor replies with the IP core and the specifications
58
+ of the IP core. Throughout this information exchange, the only
59
+ trusted part is the specification requested by the design house.
60
+ The core in return, is considered untrusted and it is treated
61
+ as black box. Information flow tracking (IFT) methods are
62
+ a promising research direction for the detection of hardware
63
+ Trojans because the verification can be based on the security
64
+ specification of the application and not only on potentially
65
+ malicious designs. Thus, the verification methods can be
66
+ adapted based on the application. In addition, those methods
67
+ can be flexible regarding new attacks, and can be expandable
68
+ in case of the alteration of the security specifications.
69
+ A. Known Real World Attacks
70
+ The real world hardware attacks are much more complicated
71
+ than the attacks developed by the research community, since
72
+ real world attacks interact with different layers of the comput-
73
+ ing system and communicate with external systems over long
74
+ distance. Compared to software, real world hardware attacks
75
+ are less frequent. The information that is publicly available
76
+ about real world attacks is limited and specific details are
77
+ rarely known to the public.
78
+ The real world attack that received most attention is the
79
+ 2007 attack on a Syrian military radar [4, 5]. Even though
80
+ the details were not officially revealed, all the indications
81
+ suggest that the radar at a nuclear installation in Syria has
82
+ been tampered. The attack took place in September 2007 and
83
+ the nuclear installation was completely destroyed by Israeli
84
+ bombing jets. The Israeli jets, took off from southern Israel,
85
+ crossed the Mediterranean Sea and the Syrian-Turkish borders
86
+ and returned four hours later. The state of the art radars did not
87
+ detect the jets, which raised suspicions for malicious alteration
88
+ of their functionality. Adee [4] suspects a kill-switch or a
89
+ backdoor in the off-the-shelf microprocessor that could block
90
+ a bombing radar by an apparently remote command (trigger)
91
+ arXiv:2301.02620v1 [cs.CR] 27 Nov 2022
92
+
93
+ without shutting down the whole system. The difference of
94
+ a kill switch and a backdoor is that the kill switch will shut
95
+ off a specific chip when triggered, but a backdoor requires
96
+ an intruder to implement the same effect. The hypothesis of
97
+ the kill switch is more likely and, in order to be implemented,
98
+ requires the injection of extra logic. The HW and SW overhead
99
+ for such an attack is very small which makes it hard to
100
+ detect during testing, and the threat models discussed are
101
+ the malicious designer and the malicious manufacturer. The
102
+ microprocessor used remains unknown. This is not the only
103
+ occasion where microprocessors including a kill switch have
104
+ supposedly been used. According to anonymous sources from
105
+ U.S defense department, it is known that a European chip
106
+ maker is building microprocessors with a kill switch, and the
107
+ French defense uses this technology for military applications.
108
+ Undocumented microchips were found in the servers assem-
109
+ bled by Supermicro [6, 7], that implemented a doorway to the
110
+ network of the original system, which incorporated memory,
111
+ networking capacity and processing power. The attack aimed
112
+ at leaking sensitive information over a long term.
113
+ Stuxnet attack provides an example of the real world attack
114
+ capabilities in the industrial environment [8]. Stuxnet is a
115
+ worm that was introduced in the Microsoft Windows operating
116
+ systems and it was targeting specific industrial control systems
117
+ of Siemens which were used in Iran to run centrifuges. Until
118
+ the target was found the worm was updating itself. The worm
119
+ was compromising the targeted system by exploiting ’zero-
120
+ day’ vulnerabilities. After monitoring the operation, the worm
121
+ was taking the control of the control system and it ran the
122
+ centrifuges to the point of failure, returning false feedback to
123
+ cover the failure until the damage was irreversible.
124
+ Hybrid attacks are very common in real world scenar-
125
+ ios. The hybrid attacks can include hardware, software and
126
+ firmware parts. Such an attack can be malicious software that
127
+ exploits vulnerabilities of the hardware, damaging physical
128
+ resources such as Stuxnet [8].
129
+ B. Cyber-Physical Production Systems
130
+ Cyber-physical systems (CPS) are sophisticated systems that
131
+ combine physical and cyber units. They are used in many
132
+ different applications and they are the fundamental units of
133
+ the internet of things (IoT) . Their functionality is based on
134
+ the information exchange and the interaction with each other.
135
+ According to the [9], the nature of the CPS makes them
136
+ particularly sensitive to attacks, due to their heterogeneous
137
+ nature, their reliance on data and their large scale.
138
+ When those systems are integrated in the production envi-
139
+ ronment then we refer to them as cyber-physical production
140
+ systems (CPPS). Often, CPPS expose a profitable surface to
141
+ adversaries for hardware Trojan introduction, because they are
142
+ complex, sophisticated structures that manage sensitive infor-
143
+ mation with extend communication among them, which facili-
144
+ tates malicious functionality to stay hidden. Consequently, we
145
+ consider securing the CPPS an emerging, critical issue.
146
+ According to [10], the pyramid of the automation hierar-
147
+ chy known until recently, is decentralized in the concept of
148
+ Industry 4.0. The information processing has been distributed
149
+ in many control units which exchanging information with the
150
+ goal to optimize the production process. The control units have
151
+ moved closer to the technical processes for efficiency, creating
152
+ an interactive communication net among heterogeneous sys-
153
+ tems. This creates the challenge to secure those components.
154
+ Assume that a hardware Trojan is included in one of
155
+ the control units. In Industry 4.0 machines use machine
156
+ to machine (M2M) communication for sensitive information
157
+ exchange. That means that the authentication keys are stored
158
+ and processed in the machines. If the hardware Trojan leaks
159
+ an authentication key to the adversary, she can take the control
160
+ of the unit and possibly the control of the factory.
161
+ In such a demanding environment the CPPS should stay
162
+ consistent to the security requirements. Availability, integrity
163
+ and confidentiality are only the basic guidelines of the prop-
164
+ erties that should be taken into consideration. The proof that
165
+ the units of those systems comply to those properties and to
166
+ more detailed ones can be achieved with IFT methods as we
167
+ discuss in the next sections.
168
+ C. Scope
169
+ The scope of this report is to survey how IFT methodologies
170
+ can secure CPS against hardware Trojan attacks and how those
171
+ methods need to be further developed in order to be applicable
172
+ in real world scenarios.
173
+ The remainder of this survey is organised as follows:
174
+ Section II provides basic information about hardware Trojans.
175
+ Section III refers to basic information for IFT methods and
176
+ presents state of the art methodologies against information
177
+ leakage. Finally, in section V we compare the IFT methods
178
+ and we discuss future steps for research.
179
+ II. HARDWARE TROJANS
180
+ Hardware Trojans are circuits with hidden, unspecified,
181
+ malicious functionality that can be included in any phase
182
+ of the IC supply chain. In the environment of Industry 4.0,
183
+ stealthy attacks like hardware Trojans can implement any kind
184
+ of effect, including information leakage. In this report we are
185
+ interested in this kind of malicious activity.
186
+ Figure 1 shows a time bomb hardware Trojan from [11].
187
+ This hardware Trojan is activated when the counter reaches
188
+ the value 2k − 1. When the trigger is activated, the output
189
+ value at ER* becomes different from the initial signal ER.
190
+ The circuitry with the counter is the trigger and the circuitry
191
+ that changes the value of the signal ER is the payload. This
192
+ is a simplified example. More sophisticated mechanisms have
193
+ been proposed from the research community like the Trojans
194
+ mentioned above.
195
+ According to the taxonomy of R. Karri, J. Rajendran, K.
196
+ Rosenfeld, M. Tehranipoor [12], a hardware Trojan can be
197
+ described by the insertion phase, the abstraction level, the
198
+ activation mechanism (trigger), the effects (payload) and the
199
+ location in the design.
200
+
201
+
202
+ 0
203
+ 1
204
+ K-1
205
+ CLK
206
+ ER
207
+ ER*
208
+ Fig. 1. Time bomb hardware Trojan based on [11]
209
+ 1) Insertion phase: The earlier a hardware Trojan is in-
210
+ troduced in the design the broader the range of its impact is
211
+ and the lower the cost of the attack is. For instance, assume
212
+ that a third party vendor infects an IP core with a hardware
213
+ Trojan. This IP core can be integrated in more than one
214
+ design, increasing the number of infected systems. On the
215
+ other hand, the scenario of the malicious manufacturer is
216
+ design-specific. The attacker, in order to introduce a Trojan,
217
+ should be aware of the design details which can be acquired by
218
+ reverse engineering, a technique that needs special knowledge
219
+ and is expensive in time and resources. Consequently, the
220
+ phase of the hardware Trojan introduction, in combination
221
+ with the value of the protected assets should be taken into
222
+ consideration, during the development of countermeasures.
223
+ 2) Abstraction level: Depending on the abstraction level of
224
+ the design, a hardware Trojan can be injected at system level,
225
+ at the development environment, at register-transfer level as
226
+ soft IP core, at gate level as firm IP core, at transistor level as
227
+ hard IP core or at the physical level.
228
+ 3) Triggers: There are hardware Trojans exploiting don’t
229
+ care conditions for their trigger mechanisms [13], or data
230
+ patterns in specific memory addresses [14], or even dedicated
231
+ input images [15]. Some attacks have even more sophisticated
232
+ triggers which are activated during the design flow, leaving no
233
+ trigger signal to the possible detection algorithm [16, 17].
234
+ 4) Payload: The most common attacks realized by hard-
235
+ ware Trojans are sensitive information leakage and denial
236
+ of service (DoS) attacks. Other attacks can be functional
237
+ alteration, downgrade performance, data corruption, circuit
238
+ aging, chip destruction, etc.
239
+ 5) Attack targets: The most common targets for hardware
240
+ Trojan attacks are memory elements [18–21] and crypto-
241
+ graphic components [13, 22, 23]. However, there are many
242
+ proposals for attacking cores such as UARTs [24] or AXI4-
243
+ bus interconnects [25], FPGA LUTs [16], CPUs [26–28], etc.
244
+ 6) Resources required: For the majority of the Trojans we
245
+ study, the attacker needs knowledge of the design and access
246
+ to it (e.g. bitstream [29], netlists [30] or access to the design
247
+ tools [16, 17, 31]).
248
+ III. INFORMATION FLOW TRACKING
249
+ The basic idea behind IFT methods is that they track the
250
+ influence of information of a system during computation. In
251
+ order to achieve that, they assign tags (usually binary values)
252
+ for each of the data element of the design and they update
253
+ the value of the tag based on the applied method and the
254
+ applied security properties. The verification is achieved by the
255
+ observation of the value of the tags.
256
+ IFT methods can be used with different verification tech-
257
+ niques as it is described in the taxonomy in [32]. More
258
+ specifically they can verify security properties through static
259
+ methods like simulation, formal verification, emulation, and
260
+ virtual prototyping or through dynamic methods like runtime
261
+ monitoring techniques.
262
+ There are many IFT methods used with different verification
263
+ techniques and at different abstraction levels and tackling dif-
264
+ ferent problems, since not all those methods address hardware
265
+ Trojans.
266
+ Here in this paper we chose to present different IFT ap-
267
+ proaches and discuss their limitations and requirements. We
268
+ present IFT static methods that tackle information leakage.
269
+ Information leakage is the most common hardware Trojan
270
+ effect and in the case of CPS it can cause economic loss or
271
+ even set a human life in danger.
272
+ As we discussed earlier, the runtime monitoring methods
273
+ can be expensive in resources, and the recovery from those
274
+ attacks can be costly too. Based on that, we chose to focus
275
+ on the static IFT verification methods. Static IFT methods are
276
+ applied in design-time, identifying the malicious behavior soon
277
+ enough to minimize the recovery cost. Moreover, they do not
278
+ add overhead in the original designs resources.
279
+ IV. IFT METHODS AGAINST HARDWARE TROJANS
280
+ Many methodologies are using theorem proving to verify
281
+ the information flow in the designs [33–36]. In those methods
282
+ the security properties are expressed as theorems and theorem
283
+ proving tools such as Coq are used to verify them. In the
284
+ proof-carrying hardware IP (PCHIP) framework [33] the IP
285
+ vendors are required to deliver the HDL code of the design
286
+ with formal proofs that the code is according to some security
287
+ properties predefined among the two parties. For instance, such
288
+ a property could describe that an instruction is allowed to
289
+ access memory locations, which are defined in its op-code.
290
+ With the provided security tags to the signals PCHIP can
291
+ track the information flow in the design. The disadvantage
292
+ of theorem proving methods is the manual conversion of
293
+ the HDL core to the theorem proving language and proof
294
+ checking environment (e.g. Coq and CoqIDE). Even though
295
+ a conversion from HDL to Coq has been proposed [33, 34],
296
+ theorem proving is far from an automated technique.
297
+ The approach proposed in [37] addresses black box models.
298
+ It is based on information flow security (IFS) verification
299
+ which detects violations of security properties. An asset is
300
+ modeled as stuck-at-0 and stuck-at-1 faults and, by leverag-
301
+ ing the automatic test pattern generation (ATPG), faults are
302
+ searched for. When a fault is detected, it means that there
303
+ is an information flow from the asset to observation points.
304
+ Finally the trigger mechanisms is extracted. This methodology
305
+ is based on the fact that the trigger mechanism is injected in
306
+ the original circuit.
307
+
308
+ The tool Register Transfer Level Information Flow Tracking
309
+ (RTLIFT)[38], can be applied directly to HDL code. Secu-
310
+ rity tags (or labels) are assigned to every signal. Register
311
+ transfer level information flow tracking (RTLIFT) uses IFT
312
+ logic to securely propagate the tags throughout the design.
313
+ The functionality of the additional IFT logic depends on the
314
+ precision required. For instance, the output of an operation can
315
+ be tainted when any of the inputs is tainted. If an untainted
316
+ input influences the output to be untainted even though the
317
+ other input is tainted, a false positive may occur. To avoid
318
+ inaccuracies, the modules implementing the flow tracking
319
+ logic take such cases into consideration. Based on the required
320
+ trade off between complexity and precision, different precision
321
+ levels can be achieved. Given the Verilog code, the control
322
+ and the data flow precision flags (which define the required
323
+ precision level), the tool generates a functionally equivalent
324
+ Verilog code including IFT logic (IFT-Verilog code). The IFT-
325
+ Verilog code is tested against the security properties requested
326
+ for the design through simulation or formal verification. If the
327
+ design passes this process, the extra logic is removed and the
328
+ design is sent for fabrication. If it fails, the design has to be
329
+ altered and to go through this process again.
330
+ The methodology described in [39], gate-level information-
331
+ flow tracking (GLIFT), can detect hardware Trojans injected
332
+ by malicious third-party vendors, that alter the functionality
333
+ of the original circuit or leak sensitive information. According
334
+ to GLIFT, each data bit is assigned to a security label. This
335
+ is implemented with additional tracking logic. It is up to the
336
+ designers to define the security properties and use the GLIFT
337
+ to verify the cores. For example, assume that the goal is
338
+ to track the flow of a cryptographic key in order to ensure
339
+ that it does not leak. The security labels of the keys will
340
+ take the value ’confidential’ and the security property that
341
+ verifies that there is no leakage should ensure that no bit with
342
+ ’confidential’ label ends up in an output or memory with the
343
+ label ’untrusted’. Thus, this technique can identify violations
344
+ of confidentiality and integrity and, hence, expose a hardware
345
+ Trojan.
346
+ Both methods discussed above [38, 39] face the problem of
347
+ false positives results, which have to be resolved manually.
348
+ The method proposed by Wang et al. [40], called HLIFT,
349
+ detects hardware Trojans based on the trigger behavior at
350
+ register transfer level (RTL) with the use of control and
351
+ data flow graphs (CDFG). The method can identify hardware
352
+ Trojans that leak information through specific outputs pins
353
+ or side channel, without functional modification and through
354
+ unspecified output pins. This approach is based on a feature
355
+ matching methodology that captures specific Trojan features.
356
+ The features are based on three kind of Trojan triggers: always-
357
+ on, immediate-on, sequential-on. This methodology can be
358
+ divided in the predefinition flow and the application flow.
359
+ During the predefinition flow, statement CDFGs are build
360
+ based on already known infected RTL designs. Statement
361
+ CDFGs are abstract, high-level and compact RTL netlists. That
362
+ way unnecessary information is removed which decreases the
363
+ complexity. IFT is applied on the CDFGs and a list of Trojan
364
+ IFT features is created. At the application flow, the statement-
365
+ level CDFG is extracted from the unknown RTL design, and
366
+ it is compared for matches with the list of the extracted Trojan
367
+ features.
368
+ The methodology proposed in [41] uses virtual prototyping
369
+ (SystemC TLM 2.0) to identify information leakage or un-
370
+ trusted access. At the behavioral level there is a lack of design
371
+ details. Thus, the security properties applied are very strict.
372
+ This can lead to false positives. This approach identifies the
373
+ vulnerable paths and reports them to the user for inspection.
374
+ Consequently, the inspection process is done manually, adding
375
+ time overhead.
376
+ The approach in [42], creates IFT models and optimizes
377
+ them according to specific security properties. The security
378
+ properties are compiled to security constraints and assertions,
379
+ which are combined with the trimmed IFT model. Finally, the
380
+ combination of the IFT model with the security constraints and
381
+ assertions is verified through simulation, emulation or formal
382
+ verification.
383
+ In contrast to the methods presented above, the method in
384
+ [43] does not use any of the mentioned verification methods.
385
+ The HDL code is converted to an abstract syntax tree (AST)
386
+ to identify, track and localize anomaly behavior. The AST is
387
+ converted to directed data-flow graph (DFG). This process
388
+ automatically recognizes interaction between IP cores. By
389
+ identifying the sink and the source signals, the tool detects
390
+ vulnerabilities and finally locates the threats.
391
+ V. DISCUSSION AND CONCLUSIONS
392
+ The development of hardware Trojans is flourishing as they
393
+ attract interest from the academia and industry. As counter-
394
+ measures, IFT methodologies are very promising, because
395
+ they can be flexible, adaptable and expandable based on the
396
+ application.
397
+ However, the IFT verification methodologies proposed so
398
+ far, cannot be applied in real world scenarios. To the best
399
+ of our knowledge, usually the purchased IP cores are not in
400
+ a white box form (usually the cores are purchased locked
401
+ in order to avoid IP piracy), or the specifications of the
402
+ cores provided are considered untrusted. Thus, the IP cores
403
+ purchased are treated as black boxes. That means that the
404
+ internals of the purchased modules are unknown and can
405
+ be leveraged from other layers of the systems (firmware or
406
+ software) for potential attacks.
407
+ Thus, there is a need to explore more IFT methods for black
408
+ box designs without the usage of known hardware Trojan
409
+ behaviors. The reason we suggest, that the known Trojan
410
+ behaviors should not be taken into consideration is because the
411
+ attackers want their Trojans to stay hidden, pushing the limits
412
+ of the current known Trojan behaviors, in order to make them
413
+ more stealthy. A case in point is the development of trigger
414
+ mechanisms. In recent years there is the tendency to include
415
+ the trigger mechanisms in the design flow, so that the detection
416
+ methods searching for trigger behaviors cannot detect them.
417
+ On the other hand, methods that are based on security
418
+ properties to identify unwanted or unspecified behavior in the
419
+
420
+ TABLE I
421
+ STATIC IFT METHODS - WB=WHITE BOX, BB=BLACK BOX,
422
+ TP=THEOREM PROVING, MC=MODEL CHECKING, GL= GATE LEVEL,
423
+ SL=SEQUENCIAL LOGIC
424
+ Method
425
+ Abstraction
426
+ BB/
427
+ Verification
428
+ Limitations
429
+ level
430
+ WB
431
+ method
432
+ [33]
433
+ RTL
434
+ WB
435
+ TP
436
+ based on
437
+ conservative
438
+ rules [44]
439
+ [35]
440
+ GL
441
+ WB
442
+ TP
443
+ manual proof
444
+ or RTL
445
+ construction
446
+ [36]
447
+ GL
448
+ WB
449
+ TP
450
+ proof of genuine
451
+ benchmark ,
452
+ does not
453
+ support SL
454
+ [34]
455
+ GL
456
+ WB
457
+ TP and MC
458
+ high complexity,
459
+ false positives
460
+ [37]
461
+ GL
462
+ BB
463
+ partial scan ATPG
464
+ based on
465
+ analysis
466
+ trigger condition
467
+ [38]
468
+ RTL
469
+ WB
470
+ simulation or
471
+ challenged in
472
+ SAT solving
473
+ complex
474
+ structures
475
+ [39]
476
+ GL
477
+ WB
478
+ simulation
479
+ creates
480
+ false positives
481
+ [40]
482
+ RTL
483
+ WB
484
+ feature matching
485
+ based on HT
486
+ features
487
+ [41]
488
+ behavioral
489
+ WB
490
+ virtual prototypes
491
+ lack of design
492
+ details,
493
+ manual inspection
494
+ [42]
495
+ RTL
496
+ WB
497
+ assertion based
498
+ false positives
499
+ or GL
500
+ simulation
501
+ emulation
502
+ [43]
503
+ RTL
504
+ WB
505
+ If-tracker
506
+ false positives
507
+ designs seem more flexible with respect to unknown attacks.
508
+ However, the completeness of the security properties is an
509
+ open problem. Another issue is the definition of the security
510
+ properties by the engineers. Manual processes can result in
511
+ vulnerabilities of the systems which can be leveraged by
512
+ adversaries.
513
+ Identifying a hardware Trojan in a real world example can
514
+ be very challenging, especially since the trigger mechanism is
515
+ not necessarily part of the original design. In some concepts
516
+ a fault, a vulnerability, or a backdoor may be no different
517
+ from a well covered Trojan. From the real world attacks we
518
+ can conclude that the attack scenarios implemented are much
519
+ more complete than the ones provided by academia. In the
520
+ real world examples mentioned above we identify mechanisms
521
+ that can communicate at great distance and can affect state of
522
+ the art systems. The attacks were sophisticated enough with
523
+ complicated mechanisms with more than negligible overhead.
524
+ It will be useful for the research community to explore more
525
+ complicated attacks, across the levels of a computing system
526
+ in order to facilitate corresponding countermeasures.
527
+ REFERENCES
528
+ [1] S. Bhunia, Hardware security : a hands-on learning
529
+ approach.
530
+ Morgan Kaufmann, an imprint of Elsevier,
531
+ 2019.
532
+ [2] P. C. Kocher, “Timing attacks on implementations of
533
+ diffie-hellman, rsa, dss, and other systems,” in 16th
534
+ Annual Int. Cryptology Conference 1996, Proceedings,
535
+ vol. 1109.
536
+ Springer, 1996.
537
+ [3] Xiaoxiao Wang, M. Tehranipoor, and J. Plusquellic, “De-
538
+ tecting malicious inclusions in secure hardware: Chal-
539
+ lenges and solutions,” in IEEE Int. Workshop on Hardw.
540
+ Oriented Secur. Trust, 2008.
541
+ [4] S. Adee, “The hunt for the kill switch,” IEEE Spectrum,
542
+ vol. 45, no. 5, 2008.
543
+ [5] Israel admits striking suspected syrian nuclear reactor
544
+ in 2007. [Online]. Available: https://www.bbc.com/news/
545
+ world-middle-east-43481803
546
+ [6] J. Robertson and M. Riley. The big hack: How china
547
+ used a tiny chip to infiltrate u.s. companies.
548
+ [7] D. Mehta, H. Lu, O. P. Paradis, M. A. M. S., M. T. Rah-
549
+ man, Y. Iskander, P. Chawla, D. L. Woodard, M. Tehra-
550
+ nipoor, and N. Asadizanjani, “The big hack explained:
551
+ Detection and prevention of pcb supply chain implants,”
552
+ J. Emerg. Technol. Comput. Syst., vol. 16, no. 4, 2020.
553
+ [8] D. Kushner, “The real story of stuxnet,” IEEE Spectrum,
554
+ vol. 50, no. 3, pp. 48–53, 2013.
555
+ [9] J.-P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche,
556
+ A. Chehab, and M. Malli, “Cyber-physical systems secu-
557
+ rity: Limitations, issues and future trends,” Microprocess.
558
+ Microsyst., vol. 77, p. 103201, 2020.
559
+ [10] L.
560
+ Monostori,
561
+ “Cyber-physical
562
+ production
563
+ systems:
564
+ Roots, expectations and R&D challenges,” Procedia
565
+ CIRP, vol. 17, 2014, variety Management in Manufac-
566
+ turing.
567
+ [11] R. S. Chakraborty, S. Narasimhan, and S. Bhunia, “Hard-
568
+ ware trojan: Threats and emerging solutions,” in IEEE
569
+ Int. High Level Design Validation and Test Workshop,
570
+ 2009, pp. 166–171.
571
+ [12] R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehra-
572
+ nipoor, “Trustworthy hardware: Identifying and classi-
573
+ fying hardware trojans,” Computer, vol. 43, pp. 39 – 46,
574
+ 11 2010.
575
+ [13] W. Hu, L. Zhang, A. Ardeshiricham, J. Blackstone,
576
+ B. Hou, Y. Tai, and R. Kastner, “Why you should
577
+ care about don’t cares: Exploiting internal don’t care
578
+ conditions for hardware trojans,” in Proceedings of Int.
579
+ Conf. on Comput.-Aided Des.
580
+ IEEE Press, 2017, p.
581
+ 707–713.
582
+ [14] M. N. Imtiaz Khan, K. Nagarajan, and S. Ghosh, “Hard-
583
+ ware trojans in emerging non-volatile memories,” in
584
+ Design, Autom. Test in Europe Conf. Exhibition (DATE),
585
+ 2019, pp. 396–401.
586
+ [15] Y. Zhao, X. Hu, S. Li, J. Ye, L. Deng, Y. Ji, J. Xu,
587
+ D. Wu, and Y. Xie, “Memory trojan attack on neural
588
+ network accelerators,” in Design, Autom. Test in Europe
589
+ Conf. Exhibition (DATE), 2019, pp. 1415–1420.
590
+ [16] A. J. Christian Krieg, Clifford Wolf, “Malicious LUT:
591
+ A stealthy FPGA trojan injected and triggered by the
592
+ design flow,” in IEEE/ACM Int. Conf. on Comput.-Aided
593
+ Des. (ICCAD), 2016.
594
+
595
+ [17] Q. A. Ahmed, T. Wiersema, and M. Platzner, “Malicious
596
+ routing: Circumventing bitstream-level verification for
597
+ fpgas,” in Design, Autom. Test in Europe Conf. Exhibition
598
+ (DATE), 2021, pp. 1490–1495.
599
+ [18] B. Hopkins, J. Shield, and C. North, “Redirecting dram
600
+ memory pages: Examining the threat of system memory
601
+ hardware trojans,” in IEEE Int. Symp. Hardw. Oriented
602
+ Secur. Trust HOST, 2016, pp. 197–202.
603
+ [19] M. Kim, S. Kong, B. Hong, L. Xu, W. Shi, and T. Suh,
604
+ “Evaluating coherence-exploiting hardware trojan,” in
605
+ Design, Autom. Test in Europe Conf. Exhibition (DATE),
606
+ 2017, pp. 157–162.
607
+ [20] X. Hu, Y. Zhao, L. Deng, L. Liang, P. Zuo, J. Ye, Y. Lin,
608
+ and Y. Xie, “Practical attacks on deep neural networks
609
+ by memory trojaning,” IEEE Trans. Comput.-Aided Des.
610
+ Integr. Circuits Syst., vol. 40, no. 6, pp. 1230–1243, 2021.
611
+ [21] K. Nagarajan, M. N. I. Khan, and S. Ghosh, “Entt: A
612
+ family of emerging nvm-based trojan triggers,” in IEEE
613
+ Int. Symp. Hardw. Oriented Secur. Trust HOST, 2019, pp.
614
+ 51–60.
615
+ [22] Y. Liu, Y. Jin, A. Nosratinia, and Y. Makris, “Silicon
616
+ demonstration of hardware trojan design and detection
617
+ in wireless cryptographic ics,” IEEE Trans. Very Large
618
+ Scale Integr. (VLSI) Syst., vol. 25, no. 4, pp. 1506–1519,
619
+ 2017.
620
+ [23] F. Schellenberg, D. R. Gnad, A. Moradi, and M. B.
621
+ Tahoori, “An inside job: Remote power analysis attacks
622
+ on fpgas,” in Design, Autom. Test in Europe Conf.
623
+ Exhibition (DATE), 2018, pp. 1111–1116.
624
+ [24] N. Fern and K.-T. T. Cheng, “Detecting hardware trojans
625
+ in unspecified functionality using mutation testing,” in
626
+ Proceedings of the IEEE/ACM Int. Conf. on Comput.-
627
+ Aided Des.
628
+ IEEE Press, 2015, p. 560–566.
629
+ [25] N. Fern, I. San, c. K. Koc¸, and K.-T. T. Cheng, “Hardware
630
+ trojans in incompletely specified on-chip bus systems,”
631
+ in Proceedings of Conf. on Design, Autom. & Test in
632
+ Europe.
633
+ EDA Consortium, 2016, p. 527–530.
634
+ [26] M. Gross, N. Jacob, A. Zankl, and G. Sigl, “Breaking
635
+ trustzone memory isolation through malicious hardware
636
+ on a modern fpga-soc,” in Proceedings of ACM Workshop
637
+ on Attacks and Solutions in Hardware Security Work-
638
+ shop.
639
+ Association for Computing Machinery, 2019, p.
640
+ 3–12.
641
+ [27] A. De, M. Nasim Imtiaz Khan, K. Nagarajan, and
642
+ S. Ghosh, “Hartbleed: Using hardware trojans for data
643
+ leakage exploits,” IEEE Trans. Very Large Scale Integr.
644
+ (VLSI) Syst., vol. 28, no. 4, pp. 968–979, 2020.
645
+ [28] J. Zhang, Y. Zhang, H. Li, and J. Jiang, “Hit: A hidden
646
+ instruction trojan model for processors,” in Proceedings
647
+ of Conf. on Design, Autom. and Test in Europe.
648
+ EDA
649
+ Consortium, 2020, p. 1271–1274.
650
+ [29] P. Swierczynski, M. Fyrbiak, P. Koppe, and C. Paar,
651
+ “Fpga trojans through detecting and weakening of cryp-
652
+ tographic primitives,” IEEE Trans. Comput.-Aided Des.
653
+ Integr. Circuits Syst., vol. 34, no. 8, pp. 1236–1249, 2015.
654
+ [30] J. Cruz, Y. Huang, P. Mishra, and S. Bhunia, “An
655
+ automated configurable trojan insertion framework for
656
+ dynamic trust benchmarks,” in Design, Autom. Test in
657
+ Europe Conf. Exhibition (DATE), 2018, pp. 1598–1603.
658
+ [31] C. Pilato, K. Basu, F. Regazzoni, and R. Karri, “Black-
659
+ hat high-level synthesis: Myth or reality?” IEEE Trans.
660
+ Very Large Scale Integr. (VLSI) Syst., vol. 27, no. 4, 2019.
661
+ [32] W. Hu, A. Ardeshiricham, and R. Kastner, “Hardware
662
+ information flow tracking,” ACM Comput. Surv., vol. 54,
663
+ no. 4, 2021.
664
+ [33] M.-M. Bidmeshki and Y. Makris, “Toward automatic
665
+ proof generation for information flow policies in third-
666
+ party hardware ip,” in IEEE Int. Symp. Hardw. Oriented
667
+ Secur. Trust HOST, 2015.
668
+ [34] X. Guo, R. G. Dutta, P. Mishra, and Y. Jin, “Automatic
669
+ code converter enhanced pch framework for soc trust
670
+ verification,” IEEE Trans. Very Large Scale Integr. (VLSI)
671
+ Syst., vol. 25, no. 12, 2017.
672
+ [35] M. Qin, W. Hu, X. Wang, D. Mu, and B. Mao, “Theorem
673
+ proof based gate level information flow tracking for
674
+ hardware security verification,” Computers & Security,
675
+ vol. 85, 2019.
676
+ [36] Q. Zhang, J. He, Y. Zhao, and X. Guo, “A formal
677
+ framework for gate- level information leakage using
678
+ z3,” in Asian Hardw. Oriented Secur. and Trust Symp.
679
+ (AsianHOST), 2020, pp. 1–6.
680
+ [37] A. Nahiyan, M. Sadi, R. Vittal, G. Contreras, D. Forte,
681
+ and M. Tehranipoor, “Hardware trojan detection through
682
+ information flow security verification,” in IEEE Interna-
683
+ tional Test Conference (ITC), 2017, pp. 1–10.
684
+ [38] A. Ardeshiricham, W. Hu, J. Marxen, and R. Kastner,
685
+ “Register transfer level information flow tracking for
686
+ provably secure hardware design,” in Design, Autom.
687
+ Test in Europe Conf. Exhibition (DATE), 2017, 2017, pp.
688
+ 1691–1696.
689
+ [39] W. Hu, B. Mao, J. Oberg, and R. Kastner, “Detecting
690
+ hardware trojans with gate-level information-flow track-
691
+ ing,” Computer, vol. 49, no. 8, pp. 44–52, 2016.
692
+ [40] C. Wang, Y. Cai, and Q. Zhou, “Hlift: A high-level
693
+ information flow tracking method for detecting hardware
694
+ trojans,” in Asia and South Pacific Design Automation
695
+ Conference (ASP-DAC), 2018, pp. 727–732.
696
+ [41] M. Hassan, V. Herdt, H. M. Le, D. Große, and R. Drech-
697
+ sler, “Early soc security validation by vp-based static
698
+ information flow analysis,” in Proceedings of Int. Conf.
699
+ on Comput.-Aided Des.
700
+ IEEE Press, 2017, p. 400–407.
701
+ [42] W. Hu, A. Ardeshiricham, M. S. Gobulukoglu, X. Wang,
702
+ and R. Kastner, “Property specific information flow anal-
703
+ ysis for hardware security verification,” in Proceedings
704
+ of the Int. Conf. Comput.-Aided Des.
705
+ Association for
706
+ Computing Machinery, 2018.
707
+ [43] Z. Liu, O. Arias, W. Fu, Y. Jin, and X. Guo, “Inter-ip ma-
708
+ licious modification detection through static information
709
+ flow tracking,” in Design, Autom. Test in Europe Conf.
710
+ Exhibition (DATE), 2022, pp. 600–603.
711
+ [44] W. Hu, C.-H. Chang, A. Sengupta, S. Bhunia, R. Kastner,
712
+ and H. Li, “An overview of hardware security and trust:
713
+
714
+ Threats, countermeasures, and design tools,” IEEE Trans.
715
+ Comput.-Aided Des. Integr. Circuits Syst., vol. 40, no. 6,
716
+ 2021.
717
+
5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dFIT4oBgHgl3EQf7yth/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d4580bd4207f97863d472096ada8744924cbd984cc788827b45dacc7f28afd2a
3
+ size 4915245
5dFIT4oBgHgl3EQf7yth/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1db5d4e79766c96cb082519833684eea5ef4aa7070025b4b02f50fa45a1cf0ad
3
+ size 183446
6NE1T4oBgHgl3EQfmwRz/content/tmp_files/2301.03301v1.pdf.txt ADDED
@@ -0,0 +1,824 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Deep Breath: A Machine Learning Browser
2
+ Extension to Tackle Online Misinformation
3
+ Marc Kydd
4
+ School of Design and Informatics
5
+ Division of Cyber Security
6
+ Abertay University
7
+ Dundee, United Kingdom
8
+ m.kydd1800@abertay.ac.uk
9
+ Lynsay A. Shepherd
10
+ School of Design and Informatics
11
+ Division of Cyber Security
12
+ Abertay University
13
+ Dundee, United Kingdom
14
+ lynsay.shepherd@abertay.ac.uk
15
+ Abstract—Over the past decade, the media landscape has seen
16
+ a radical shift. As more of the public stay informed of current
17
+ events via online sources, competition has grown as outlets vie
18
+ for attention. This competition has prompted some online outlets
19
+ to publish sensationalist and alarmist content to grab readers’
20
+ attention. Such practices may threaten democracy by distorting
21
+ the truth and misleading readers about the nature of events.
22
+ This paper proposes a novel system for detecting, processing,
23
+ and warning users about misleading content online to combat the
24
+ threats posed by misinformation. By training a machine learning
25
+ model on an existing dataset of 32,000 clickbait news article
26
+ headlines, the model predicts how sensationalist a headline is and
27
+ then interfaces with a web browser extension which constructs
28
+ a unique content warning notification based on existing design
29
+ principles and incorporates the models’ prediction. This research
30
+ makes a novel contribution to machine learning and human-
31
+ centred security with promising findings for future research. By
32
+ warning users when they may be viewing misinformation, it is
33
+ possible to prevent spontaneous reactions, helping users to take
34
+ a deep breath and approach online media with a clear mind.
35
+ Index Terms—Misinformation, Machine Learning, Human-
36
+ Centred Security, Cyber Security, Web Technologies.
37
+ I. INTRODUCTION AND BACKGROUND
38
+ The Internet has rapidly become the dominant means for
39
+ users to stay connected, even more so in the wake of the
40
+ COVID-19 pandemic; however, this has led to several prob-
41
+ lems [1]. From connecting with friends and family, comment-
42
+ ing on recent events, or just being entertained, the Internet
43
+ plays an integral role in how we inform and stay informed
44
+ [2]. However, in a landscape that rewards attention rather than
45
+ quality, some have turned to more dubious practices such as
46
+ sensationalism, misinformation, and shocking imagery.
47
+ A. The Incentivisation of Misinformation & Clickbait
48
+ As more and more content is published every second, focus
49
+ shifts from producing quality content to hijacking attention.
50
+ When users’ interest is constantly pulled from one article,
51
+ video, or image to the next, publishers need to find new
52
+ ways to garner clicks. Consequently, this can easily lead
53
+ to sensationalism, clickbait, and in the worst case, outright
54
+ misinformation without the user being aware.
55
+ The constant news cycle of the Information Age presents
56
+ difficulties for news outlets to write up each emerging story.
57
+ Instead, some outlets adopt the practice of aggregating content,
58
+ either lightly editorialising a piece of existing content or
59
+ directing users to another source to read the information there.
60
+ The method of news aggregation is controversial, with some
61
+ feeling that it is blatant theft of content, whilst others see
62
+ it as the only viable solution to surviving in a fast-paced
63
+ information economy [3] [4].
64
+ B. The Impact of Sharing Misinformation and Clickbait
65
+ Regardless of the ethics of clickbait and similar practices,
66
+ publishing misinformation can be harmful once it reaches a
67
+ broader audience. Many internet users utilise social network-
68
+ ing, which compounds misinformation’s effects by allowing
69
+ for rapid dissemination of falsehoods and half-truths. Often
70
+ this creates a chain-reaction scenario where one user shares
71
+ a story with another user, who in turn shares it with another,
72
+ and so on. The impact of this phenomenon does not require a
73
+ user to have a vast following on social media platforms. Cˆot´e
74
+ and Darling [5] found that once a Twitter account surpassed
75
+ approximately 1000 followers, it was much more likely to
76
+ attract other users from a wide variety of backgrounds, in-
77
+ cluding members of the general public, outreach groups, and
78
+ even influential decision makers. This dramatically increases
79
+ the potential audience that a piece of content can reach - and be
80
+ shared by. Such a situation can result in users being presented
81
+ with the same information multiple times, albeit being posted
82
+ by different users.
83
+ Fazio, Rand and Pennycook analysed the effects of
84
+ widespread sharing of information [6]. The authors exam-
85
+ ined how repeated exposure to information (both true and
86
+ false) affects individuals’ perception of the data presented.
87
+ Participants were asked to rate a series of statements on a
88
+ percentage scale based on their believability. Statements were
89
+ presented in two ways: some were shown only once, while
90
+ others were repeatedly shown and were interspersed with one-
91
+ off statements. Participants’ perception of truth across the
92
+ accuracy scale rose without any influencing factor, other than
93
+ being repeatedly shown the same information.
94
+ When rated by participants, information regarded as the
95
+ truth was rated as such. Similarly, information strongly con-
96
+ sidered false did not influence participants sufficiently to
97
+ arXiv:2301.03301v1 [cs.HC] 9 Jan 2023
98
+
99
+ cross over into the “considered as true” category. This was
100
+ noticeable in the 1%-30% bin, where repeated exposure did not
101
+ generate a pronounced change in participant opinion. One of
102
+ the paper’s key findings relates to information considered to be
103
+ ambiguous. Information initially considered unclear gradually
104
+ became regarded as accurate and authentic the more the user
105
+ was exposed to the statement. This was particularly evident
106
+ in the 41-70% bin which saw, on average, an increase of 6
107
+ points compared to their original rating.
108
+ Existing research [3]–[6] suggests that, in the current hyper-
109
+ social age, users risk having their perceptions warped by
110
+ misleading statements, hyperbole, and repeated exposure to
111
+ information. This repetition does not have to stem purely from
112
+ repeatedly seeing the same news article displayed but also
113
+ from the conversation surrounding the topic. Increasingly frag-
114
+ mented and confrontational viewpoints presented online com-
115
+ plicates how users determine what is true or false. However,
116
+ simply stating that a user is ‘misinformed’ or ‘wrong’ does
117
+ not make them more inclined to reassess their understanding.
118
+ Instead, a more thoughtful approach is required, giving users
119
+ a starting point from which to come to their own conclusions.
120
+ As Bronstein et al. [7] suggests, interventions catering towards
121
+ the promotion of ‘open-minded and analytical thinking’ could
122
+ be of benefit in curbing the impact of misinformation.
123
+ C. Informing Users of Risk Online
124
+ As
125
+ misinformation
126
+ has
127
+ become
128
+ more
129
+ apparent
130
+ and
131
+ widespread in recent years, research into warning users when
132
+ they are being misled has received increased interest, both in
133
+ academia and industry. Many social media sites have taken
134
+ steps to curb the impact of misinformation on their respective
135
+ platforms, typically by presenting users with a warning label.
136
+ This approach offers a simple means of quickly informing
137
+ users that the content they are viewing may be misleading;
138
+ proving popular with various social media platforms adopting
139
+ similar practices including Twitter [8] and Meta’s Facebook
140
+ [9].
141
+ Ross et al. [10] analysed the effectiveness of warning labels
142
+ adopted by major social platforms. Focusing primarily on the
143
+ methods used to dissuade users from sharing misinformation,
144
+ the authors tested two different label styles, one replicating
145
+ those used by Meta and another informed by contemporary
146
+ research. Participants (N = 151) were shown content consisting
147
+ of six true and six false stories. Group one were presented
148
+ all stories without any warning label. Group two were shown
149
+ half the stories with a warning and the other half without. The
150
+ participants in each group were then asked to determine which
151
+ stories were manipulated or fake and which were unaltered.
152
+ The research found that neither of the warning messages
153
+ changed user behaviour. Users did not appear to be more
154
+ suspicious of labelled content and were just as likely to interact
155
+ with the content as that which was unlabelled.
156
+ D. Designing Effective Warning Labels
157
+ Ross et al. [10] indicate that providing additional context to
158
+ the user can be beneficial in curbing the impact of misinfor-
159
+ mation. Careful consideration in the design process on what
160
+ information is communicated to the user and how could be
161
+ instrumental in limiting misinformation’s reach.
162
+ Shepherd and Renaud [11] conducted a literature review
163
+ on designing effective security warning labels in browsers.
164
+ Assessing existing work in this area, the authors found that
165
+ time and resources are not adequately allocated to designing
166
+ warning labels leading to user frustration and confusion. This
167
+ sentiment appeared to be validated by Ross et al. [10]. The au-
168
+ thors found that the effectiveness of current solutions differed.
169
+ Some warnings wrongly assumed that users had background
170
+ knowledge on a topic which decreased their effectiveness,
171
+ whilst others were too vague in their language that users did
172
+ not understand the ramifications of their choices.
173
+ To combat the aforementioned issues, Shepherd and Renaud
174
+ [11] concluded with the proposal of a set of design guidelines
175
+ for browser warnings. The authors note that warnings designed
176
+ for privacy and those designed for security differed, suggesting
177
+ that different priorities must be considered depending on the
178
+ intended use- case. The proposed guidelines recommend using
179
+ simple and concise language to alert users to a potential
180
+ issue and using neutral colours to avoid an undue emotional
181
+ response. Furthermore, the guidelines propose linking to ad-
182
+ ditional resources should the initial description not prove
183
+ sufficient. Although the research in question is primarily
184
+ targeted toward warning labels for security purposes, there
185
+ is still value in applying these recommendations to tackling
186
+ misinformation.
187
+ E. Designing Effective Browser Warnings and Labels
188
+ Much work has been done previously in the field of usable
189
+ security concerning the design of warning labels. Early at-
190
+ tempts at warning systems typically used contextual measures
191
+ such as a small on-page popup informing the user of potential
192
+ risk. However, work by Wu, Miller and Garfinkel [12] illus-
193
+ trated these popups are often ignored, misunderstood, or users
194
+ do not even recognise they are there.
195
+ Further research in this area took on a different approach,
196
+ utilising interstitial warnings. This approach required users to
197
+ interact with the warning label before proceeding, the under-
198
+ lying theory of this approach being that making the warning
199
+ the central focus of the users’ attention would increase the
200
+ likelihood of users reading and making an informed decision
201
+ on the contents of the warning.
202
+ Until recently, most research on effective warning design
203
+ has been limited to web-security topics such as expired cer-
204
+ tificates or phishing links. Kaiser et al. [13] examined warning
205
+ label design to inform users of potential disinformation online.
206
+ Evaluating several different warning design styles, ranging
207
+ from information-dense with minimal colouring, to warnings
208
+ with a strong visual impact but minimal detail, the authors
209
+ assessed how users responded to the designs in a realistic
210
+ environment.
211
+ In a survey conducted with 238 participants, the authors
212
+ found that participants responded most favourably to designs
213
+ which featured a reference to the perceived risk (“This page
214
+
215
+ contains misinformation”) and the recommended next step
216
+ (“Consider finding alternative sources.”). The authors note
217
+ that none of the designs evaluated showed any significant
218
+ difference in how likely users were to consult a second
219
+ or alternative source afterwards. The authors propose that
220
+ changes in behaviour were more likely to stem from the
221
+ friction caused by having to manually click through a warning
222
+ rather than the content of the warning itself.
223
+ Multiple factors play a role in shaping how users respond
224
+ to warning labels, including the language used within them.
225
+ Findings from a research study conducted by Mozilla [14] to
226
+ understand how to design better warning labels highlighted
227
+ that employing opinionated design was more important than
228
+ providing objective information. This means it is more im-
229
+ portant to convey the idea of a threat rather than what the
230
+ threat is - prior research suggested overly technical warnings
231
+ lead to confusion among users. Mozilla implemented this
232
+ by simplifying the warning heading to feature abstract but
233
+ understandable language. Additionally, for scenarios where
234
+ users want to know details of the underlying issue, the warning
235
+ provides an accessible description of the risks associated with
236
+ the security fault.
237
+ The issue of labelling misleading content is a challenging
238
+ one. What counts as misinformation must be determined,
239
+ and designing warning systems that promote critical thinking
240
+ rather than knee-jerk reactions is still an ongoing area of re-
241
+ search. Although the means of warning users adopted by major
242
+ social platforms may have limited efficacy [10], Shepherd and
243
+ Renaud [11] indicate that warning labels can cater to users’
244
+ assumed knowledge and understanding without provoking
245
+ undue alarm or concern. Similarly, Kaiser et al. [13] suggest
246
+ that such research can be used to combat misinformation.
247
+ F. Detecting Clickbait with Machine Learning
248
+ The vast array of content posted online every second makes
249
+ it impossible for human moderators to assess and review all
250
+ dubious uploads. The use of an automated system is merited,
251
+ one capable of rapidly and reliably analysing content for
252
+ potentially misleading information which can integrate inter-
253
+ vention measures. Machine learning’s inherent capabilities for
254
+ finding and predicting patterns in information are well-suited
255
+ to tackling misinformation. Furthermore, machine learning
256
+ has seen renewed interest over the past decade as computing
257
+ power and data storage have matured to enable real-world
258
+ applications across a host of use cases.
259
+ Chen, Conroy and Rubin [15] explored if clickbait, and by
260
+ extension, misinformation, could be detected using machine
261
+ learning methods. Conducting a holistic view of research in
262
+ the field, the authors note four unique means of detecting
263
+ clickbait. Initially focusing on the textual content of clickbait
264
+ articles, the authors found clickbait often displays lexical and
265
+ semantic features unique to its form. The authors cited work
266
+ by Lex, Juffinger and Granitzer [16] which analysed clickbait
267
+ based upon factors such as word length, word choice, and
268
+ terminology, and found that a machine learning model could
269
+ be trained to detect clickbait with 77% accuracy regardless of
270
+ the topic discussed.
271
+ Appealing to users’ innate curiosity by using unresolved
272
+ pronouns or alluding to content within the article was also
273
+ consistent with clickbait. As a subsequent paper by Rubin et al.
274
+ [17] noted, automated fact-checking and verification systems
275
+ could help detect language patterns in text and warn users
276
+ that the content they are about to read may be misleading.
277
+ The authors also note that such a tool could prove helpful
278
+ for journalists too, alerting them when they may be conflating
279
+ claims or accidentally misleading.
280
+ Clickbait is not strictly limited to the text of the article
281
+ in question; the authors also found that surrounding factors
282
+ such as imagery and how the user interacts with the article
283
+ play a key role. Regarding the former, the authors [17] cite
284
+ Ecker et al. [18] who found that clickbait articles were likely
285
+ to feature images which were incongruent with the headline.
286
+ In such articles, an image can be used to grab the would-be
287
+ readers’ attention with an impactful but unrelated image or
288
+ shape opinion before the article was read.
289
+ The authors [17] also noted that previous research had found
290
+ clickbait outlets typically aimed to attract user attention before
291
+ funnelling them towards sponsored content or advertising.
292
+ Additionally, the time difference between “time spent reading
293
+ the article” and “time spent sharing and commenting about
294
+ the article” could also be a signifier of clickbait. In this
295
+ aspect, clickbait articles tend to use alarmist or sensationalist
296
+ headlines to provoke knee-jerk responses (whether that be
297
+ commenting or sharing) before the user has actually read the
298
+ content within.
299
+ G. Problem Space
300
+ The rapid rise of the information age has led some to
301
+ adopt unethical practices to drive engagement. Whether these
302
+ practices are deployed purposefully or not, they pose a serious
303
+ risk to society. Although existing work has explored the use of
304
+ warning labels, depending on how these are designed, these
305
+ may be ineffective. Given the amount of content published
306
+ every second, it would be impossible to label the accuracy
307
+ of content manually. Instead, machine learning offers a com-
308
+ pelling alternative. Misinformation poses a severe threat; there-
309
+ fore combining advances in machine learning and warning
310
+ design means an effective solution can be proposed to keep
311
+ users safe.
312
+ II. METHODOLOGY
313
+ The proposed method consists of two-components: the
314
+ machine learning model, for analysing and classifying content,
315
+ and the web extension for communicating potential risk to the
316
+ user. A simplified pipeline can been seen in Figure 1.
317
+ Using TensorFlow [19] and adopting the same dataset as
318
+ used by Chakraborty et al. [20], a Sequential Model was
319
+ trained on 32,000 news article headlines, labelled as either
320
+ ‘clickbait’ or ‘non-clickbait’. The model, consisting of four
321
+ layers (excluding the input layer), tokenises input text into a
322
+ 64-dimensional dense vector before running it through a global
323
+
324
+ average pooling filter. Output is then fed through a layer of
325
+ ReLU nodes, followed by a final layer of Sigmoid nodes to
326
+ arrive at a real number between zero (indicating neutral) and
327
+ one (indicating strongly misleading).
328
+ The model was then connected to a browser extension via a
329
+ Native Manifest, which allowed the browser to send portions
330
+ of an article (e.g., the headline) to the model to analyse and
331
+ generate a rating. The rating is then returned to the browser,
332
+ after which a relevant warning can be presented to the user.
333
+ Warnings were designed to be informative and actionable for
334
+ the user, presenting clear detailing about the perceived risk
335
+ and recommended next steps.
336
+ A. Developing the machine learning model
337
+ 1) Dataset: The same dataset used by Chakraborty et al.
338
+ [20] was adopted for this project and consisted of 32,000
339
+ news article headlines labelled as either ‘clickbait’ or ‘non-
340
+ clickbait’. The dataset offered a robust and relevant base upon
341
+ which to build. In particular, clickbait and misinformation rely
342
+ on emotional language to provoke a response, suggesting the
343
+ dataset would help develop a model well suited to detecting
344
+ such language.
345
+ 2) Model: In practice, the backend of this project cen-
346
+ tres around binary classification: Is this piece of text click-
347
+ bait/misinformation or not? As such, using a Sequential model
348
+ was deemed the most suitable due to its singular input-output
349
+ structure, a structure well suited to classification tasks such as
350
+ this.
351
+ Fig. 1. Example simplified data pipeline.
352
+ 3) Preprocessing Data : The dataset was split into 26,666
353
+ training samples and 5,334 testing samples which equates to
354
+ 83% of the dataset for training and the remaining 17% for test-
355
+ ing. Before training, the dataset had to be formatted such that
356
+ the model could determine distinctions between clickbait and
357
+ non-clickbait. This was achieved by converting, the headlines
358
+ in the dataset into a vocabulary of word embeddings (Figure
359
+ 2). To ensure uniformity across the dataset, all sequences
360
+ were padded to 24 tokens long which was considered a safe
361
+ maximum length for a headline. Headlines longer than 24
362
+ words long were automatically truncated to the maximum
363
+ length.
364
+ Fig. 2. Example word embedding.
365
+ 4) Building the Model: The model is visualised in Figure
366
+ 3, and consists of the input layer, two hidden layers, and
367
+ the output layer. The first layer takes the input (a tokenised
368
+ sentence) and transforms it into a 64-dimensional dense vector.
369
+ The usage of dense vectors allows for the semantic meaning
370
+ Fig. 3. Visualisation of the Model.
371
+ of the sentence to be compressed, ensuring better general-
372
+ isation. Despite their ability to derive underlying meanings
373
+ and connections for a given sentence, the aforementioned
374
+ dense vectors can result in overfitting if they become too
375
+ detailed. To address the issue, the second layer consists of
376
+ a Global Average Pool. This layer takes the 64-dimensional
377
+ vector and determines the mean of each input channel (the 24-
378
+ dimensional token sequences) which allows the model to learn
379
+ approximations of embeddings rather than their exact values
380
+ (Figure 4).
381
+ Fig. 4. Visualisation of 1-Dimensional global average pooling.
382
+ At this stage, the input data is now formatted and approx-
383
+ imated to limit overfitting, and layers can be constructed,
384
+ which will inform the output of the model. The first activation
385
+ function of the model uses a rectified linear activation function
386
+ (or ‘ReLU’). ReLU ensures that the next layer of the network
387
+ receives a positive value as ReLU outputs 0 for input values
388
+ equal to or less than 0 or the original value for those greater
389
+ than 0. Finally, the data is passed through a Sigmoid activation
390
+ layer, ensuring the resultant output falls between 0 and 1, i.e.,
391
+ “Is this piece of text clickbait or not?”.
392
+ The model measures its performance based on the ac-
393
+ curacy of its predictions. The task involves classification;
394
+
395
+ 9 makeup tips you won't believe!
396
+ Model
397
+ Clickbait: 1If Disney Princesses Were From Florida
398
+ [10122
399
+ 752
400
+ 6586 4 1 737
401
+ 0
402
+ 0 0 (
403
+ 0 (
404
+ 0 (
405
+ 000000000000(
406
+ 01input:
407
+ [(None, 24)]
408
+ InputLayer
409
+ output:
410
+ [(None, 24)]
411
+ input:
412
+ (None,24)
413
+ Embedding
414
+ output:
415
+ (None, 24, 64)
416
+ input:
417
+ (None, 24, 64)
418
+ GlobalAveragePooling1D
419
+ output:
420
+ (None, 64)
421
+ input:
422
+ (None, 64)
423
+ Dense
424
+ output:
425
+ (None, 2)
426
+ input:
427
+ (None, 2)
428
+ Dense
429
+ output:
430
+ (None, 1)4
431
+ 6
432
+ 4
433
+ 2
434
+ 4Fig. 5. Accuracy graph during model training (Higher is better).
435
+ thus, a binary cross-entropy loss function is used. The func-
436
+ tion calculates how far the models’ predictions stray from
437
+ the dataset’s labels. A gradient descent with a momentum
438
+ optimiser (also known as Stochastic Gradient Descent or
439
+ SGD) further minimises the loss function. The optimiser helps
440
+ improve the model’s training rate by minimising loss across
441
+ training iterations. By doing so, it is intended that the model
442
+ predictions will gradually trend towards the expected output.
443
+ Fig. 6. Loss graph during model training (Lower is better).
444
+ The model was trained for 80 epochs with a batch size
445
+ of 128. Although batch sizes larger than 32 can lead to
446
+ underfitting, it was intended that the larger epoch size would
447
+ gradually result in greater accuracy and convergence, which
448
+ can be seen in Figures 5 and 6. After the model was compiled,
449
+ trained, and evaluated, it was exported for use by the web
450
+ extension.
451
+ B. Web extension and warning messages
452
+ 1) Creating the web extension: A web browser extension
453
+ was developed to ensure the model could be deployed in a real-
454
+ world context. The extension means the model can analyse
455
+ news articles as the user views them, providing a warning if
456
+ misleading content is found.
457
+ Native Manifests [21] were used to allow a web browser to
458
+ interface with a native application, passing data back and forth
459
+ between the two. These manifests allowed the TensorFlow
460
+ model to perform predictions locally on the machine and then
461
+ send the resultant prediction to the browser for further analysis
462
+ and output.
463
+ Within the browser, the analysis begins when the headline
464
+ of the page the user has visited is fetched. Initially, white
465
+ space and control characters are trimmed. The headline is
466
+ processed, and a value is returned indicating how sensationalist
467
+ the headline is.
468
+ On the user’s device, the program transfers over to the native
469
+ application, which handles parsing the headline into a format
470
+ suitable for the model before computing a rating which is
471
+ returned to the browser. Data from the browser is JSON-
472
+ encapsulated and is sent via standard input (stdin), which
473
+ the program reads from. Following this, the script begins
474
+ importing libraries for loading the model and formatting the
475
+ incoming data accordingly. The model is loaded, and the
476
+ tokeniser is instantiated to convert the incoming headline. At
477
+ this stage, the initial setup is complete and the model is ready
478
+ for use.
479
+ The core of the script features a loop which waits for a
480
+ message from the browser to be received, at which point the
481
+ decoding process can take place. Now that the headline of the
482
+ article is available, the script tokenises it and provides padding
483
+ to ensure compatibility with the model. From here, a standard
484
+ model prediction call can be made, encoded, and returned to
485
+ the browser for display to the user.
486
+ 2) Presenting warnings to the user: When the native ap-
487
+ plication produces a result, it is returned to the browser. The
488
+ browser extension then generates a message sent to the news
489
+ article’s page, with the native applications result stored in a
490
+ variable. This message is received by the content script, which
491
+ is injected into each page by the extension.
492
+ The content script dynamically generates a warning label
493
+ for the user. This is done by waiting to receive a message
494
+ (the result) from the background script. This value is then
495
+ multiplied by ten (to accommodate any floating-point issues
496
+ that may arise (i.e. converting 0.8 to 8)). To prevent repeatedly
497
+ warning the user about innocuous content, only headlines that
498
+ score above five out of ten have a warning generated. Scrolling
499
+ is disabled whilst the warning is on-screen, ensuring the user
500
+ has to acknowledge it.
501
+ With regards to this project, the existing literature points
502
+ towards interstitial warnings being the most likely to promote
503
+ change in user behaviour. Additionally, even if most users do
504
+ not appear to actually read the content of a warning label, they
505
+ do show a preference for such information being present.
506
+ Informed by the papers discussed in Section I-D, the web
507
+ extension was designed to ensure strong visual clarity to
508
+ effectively convey risks associated with a piece of misleading
509
+ content.
510
+ The warning adopts a paywall-style design, mimicking an
511
+ approach that users will likely already be familiar with from
512
+ other news sites. This helps to ensure that the warning is
513
+ not overlooked, which can happen with contextual warnings.
514
+ To further ensure that the warning is brought to the user’s
515
+ attention, an overlay is used to darken the article and scrolling
516
+
517
+ model accuracy
518
+ tain
519
+ 0.85
520
+ val
521
+ 0.80
522
+ 0.75
523
+ accuracy
524
+ 0.70
525
+ 0.65
526
+ 0.60
527
+ 0.55
528
+ 0.50
529
+ 10
530
+ 70
531
+ 0
532
+ 20
533
+ 30
534
+ 40
535
+ 50
536
+ 60
537
+ 80
538
+ epochmodel loss
539
+ 0.70
540
+ tain
541
+ val
542
+ 0.65
543
+ 0.60
544
+ los5
545
+ 0.55
546
+ 0.50
547
+ 0.45
548
+ 0.40
549
+ 10
550
+ 20
551
+ 30
552
+ 40
553
+ 50
554
+ 0
555
+ 70
556
+ 60
557
+ 80
558
+ epochis prevented while the warning is on screen. The warning
559
+ design comes in 5 variants - ranging from most minor to most
560
+ severe, depending on the article’s rating. Exemplar designs can
561
+ be seen in Figure 7
562
+ Fig. 7. Sample of warning designs.
563
+ A vital problem with previous warning designs is the poor
564
+ communication of risk, whereby warnings may be obscured
565
+ by jargon [13]. The design of the warnings seeks to minimise
566
+ existing issues by conveying as much relevant information
567
+ as possible in an easy-to-read format. Prominent symbols
568
+ represent increasing risk levels based on the article’s rating.
569
+ Articles lower on the risk scale are given a more general
570
+ ’magnifying glass’ symbol, promoting the notion of thinking
571
+ more critically about the article’s merit. If an article includes
572
+ more severe levels of misinformation, increasingly prominent
573
+ ’alert’-oriented symbols are deployed, such as warning signs,
574
+ stop signs and symbols of authority such as police figures.
575
+ Additionally, an oscillating gradient is placed behind the
576
+ warning. Depending on the severity of the warning, the colour
577
+ used will shift from yellow to orange to red. The subtle
578
+ movement of the gradient is intended to draw the user’s eye
579
+ to the warning, with the unique colour of each warning also
580
+ helping the user understand the associated level of risk.
581
+ Ultimately, the extension seeks to change user behaviour
582
+ and provide education on meaningful steps users can take to
583
+ protect themselves from misinformation in the future. As such,
584
+ each warning label features unique phrasing that informs the
585
+ user of not just what the perceived risk is but also advice on
586
+ actionable next steps.
587
+ Two buttons are presented to the user at the bottom of the
588
+ warning, allowing them to dismiss the warning and continue,
589
+ or navigate away from the page. To indicate the intended
590
+ behaviour, the option to navigate away is displayed in promi-
591
+ nent green with a ’Recommended’ label included in brackets.
592
+ Conversely, the option to dismiss the warning is presented in
593
+ red and is slightly faded out to deliberately be obscured against
594
+ the background until the user hovers over the button.
595
+ III. RESULTS AND DISCUSSION
596
+ Fig. 8. Accuracy comparison between training and evaluation.
597
+ During training, the model achieved an accuracy of approx-
598
+ imately 85% and a loss of 0.39, and when pitted against
599
+ the evaluation dataset, the model achieved an accuracy of
600
+ approximately 45% with a loss of 1.15 (Figure 8, Figure 9).
601
+ This decline in accuracy likely stems from inconsistencies in
602
+ the existing evaluation dataset, e.g., improperly formatted data,
603
+ such as some of the labels assigned to the headlines do not
604
+ appear to be correct. This could be resolved via an additional
605
+ data cleaning. Another point of note is that the evaluation
606
+ dataset used only binary labels (Is this headline ‘clickbait’ or
607
+ ‘news’?), which may have also contributed to the discrepancy
608
+ in accuracy as the model was producing a result between 0
609
+ and 1 instead of a pure binary output.
610
+
611
+ ThisContent PutsYouatRisk
612
+ Misleadingarticlescanwarpyourperceptionofevents
613
+ Think twice before continuing
614
+ Deep Breathhas detectedthatthis article is misleading
615
+ and should not be viewed.
616
+ Backto safety (Recommended)
617
+ Misleading Content Alert
618
+ Sensationalistcontentcantrickyouinto consumingfalse
619
+ information.Consultmultiplesources
620
+ Websites can use sensationalist languageto mislead and
621
+ deceive.Deep Breaths detection algorithmbelieves that
622
+ this article is misleading.
623
+ Dismiss and continue
624
+ Back to safety (Recommended)
625
+ SensationalistContentWarning
626
+ Thispagemaycontainsensationalistormisleading
627
+ content.Considerconsulting additionalsources.
628
+ Websites can use sensationalist languagetograb your
629
+ attention.DeepBreathsdetectionalgorithmbelievesthat
630
+ this article may be misleading.
631
+ Dismiss and continue
632
+ Backto safety (Recommended)100
633
+ 90
634
+ 85%
635
+ 80
636
+ 70
637
+ Accuracy
638
+ 60
639
+ 50
640
+ 45%
641
+ 40
642
+ 30
643
+ 20
644
+ 10
645
+ 0
646
+ Training
647
+ Evaluation
648
+ (Higher is better.)Fig. 9. Loss comparison between training and evaluation.
649
+ With regards to machine learning, the project confirms the
650
+ findings of Lex, Juffinger and Granitzer (2010) that clickbait
651
+ and misinformation can be detected based upon lexical seman-
652
+ tics, namely word choice, word length, and word commonality,
653
+ i.e., Word x appears frequently alongside word y.
654
+ IV. CONCLUSION AND FUTURE WORK
655
+ The model demonstrated in this paper has shown a re-
656
+ liable degree of performance, however, it could be refined
657
+ further to derive even better results. The models’ accuracy
658
+ and loss were still increasing and decreasing, respectively,
659
+ suggesting better performance could be obtained before the
660
+ curves flattened out. Furthermore, the capability of the model
661
+ could be extended further. The model has been trained only on
662
+ clickbait-styled headlines, which was effective. However, more
663
+ robust results may be achieved by training on the contents of
664
+ clickbait articles which would allow the model to develop a
665
+ deeper understanding of the article and make a more nuanced
666
+ prediction. The model used in this paper is a Sequential model
667
+ designed to take a single output and produce a single result.
668
+ Although this is effective at classifying a single headline as
669
+ used in this paper, greater functionality could be achieved
670
+ by allowing multiple inputs and outputs. This could include
671
+ assessing the article’s headline but also a selection of sentences
672
+ from the article. The rating assigned to content is dynamic;
673
+ however, the underlying warning remains static. By expanding
674
+ the models’ capabilities, it may also be possible to provide
675
+ personalised warnings relevant to the content. In practice, this
676
+ could mean warning the user about specific aspects of the
677
+ article, such as sensationalist authors, misleading sentences,
678
+ and miscaptioned images. Although every effort was taken to
679
+ ensure the model made balanced and accurate predictions, no
680
+ system is infallible. Conducting user testing and introducing
681
+ the option for users to report when the model makes a
682
+ perceived miscalculation could help adjust for missteps.
683
+ The work presented in this paper makes promising ad-
684
+ vances toward tackling the issue of misinformation online
685
+ by combining machine learning, human-computer interaction
686
+ research, and web technologies. Findings validate and build
687
+ upon prior research, and incorporating machine learning with
688
+ usable security is still a relatively under-explored area of study.
689
+ REFERENCES
690
+ [1] H. S. Lallie, L. A. Shepherd, J. R. Nurse, A. Erola, G. Epiphaniou,
691
+ C. Maple, and X. Bellekens, “Cyber security in the age of covid-19:
692
+ A timeline and analysis of cyber-crime and cyber-attacks during the
693
+ pandemic,” Computers & Security, vol. 105, p. 102248, 2021.
694
+ [2] A.
695
+ Mitchell,
696
+ E.
697
+ Shearer,
698
+ and
699
+ G.
700
+ Stocking,
701
+ “News
702
+ on
703
+ twitter:
704
+ Consumed
705
+ by
706
+ most
707
+ users
708
+ and
709
+ trusted
710
+ by
711
+ many,”
712
+ 2021.
713
+ [Online]. Available: https://www.pewresearch.org/journalism/2021/11/
714
+ 15/news-on-twitter-consumed-by-most-users-and-trusted-by-many/
715
+ [3] H. I. Chyi, S. C. Lewis, and N. Zheng, “Parasite or partner? coverage
716
+ of google news in an era of news aggregation,” Journalism & Mass
717
+ Communication Quarterly, vol. 93, no. 4, pp. 789–815, 2016.
718
+ [4] M. Coddington, “Gathering evidence of evidence: News aggregation as
719
+ an epistemological practice,” Journalism, vol. 21, no. 3, pp. 365–380,
720
+ 2020.
721
+ [5] I. M. Cˆot´e and E. S. Darling, “Scientists on twitter: Preaching to the
722
+ choir or singing from the rooftops?” Facets, vol. 3, no. 1, pp. 682–694,
723
+ 2018.
724
+ [6] L. K. Fazio, D. G. Rand, and G. Pennycook, “Repetition increases
725
+ perceived truth equally for plausible and implausible statements,” Psy-
726
+ chonomic bulletin & review, vol. 26, no. 5, pp. 1705–1710, 2019.
727
+ [7] M. V. Bronstein, G. Pennycook, A. Bear, D. G. Rand, and T. D. Can-
728
+ non, “Belief in fake news is associated with delusionality, dogmatism,
729
+ religious fundamentalism, and reduced analytic thinking,” Journal of
730
+ applied research in memory and cognition, vol. 8, no. 1, pp. 108–117,
731
+ 2019.
732
+ [8] Y.
733
+ Roth
734
+ and
735
+ N.
736
+ Pickles,
737
+ “Updating
738
+ our
739
+ ap-
740
+ proach
741
+ to
742
+ misleading
743
+ information,”
744
+ 2020,
745
+ https://blog.twitter.com/en us/topics/product/2020/updating-our-
746
+ approach-to-misleading-information (Accessed 8 February 2022).
747
+ [9] Facebook, “Taking Action Against People Who Repeatedly Share
748
+ Misinformation,”
749
+ 2021,
750
+ https://about.fb.com/news/2021/05/taking-
751
+ action-against-people-who-repeatedly-share-misinformation/ (Accessed
752
+ 8 February 2022).
753
+ [10] B. Ross, A. Jung, J. Heisel, and S. Stieglitz, “Fake news on social media:
754
+ The (in) effectiveness of warning messages,” in CIS 2018 Proceedings.
755
+ 16.
756
+ Association for Information Systems, 2018.
757
+ [11] L. A. Shepherd and K. Renaud, “How to design browser security
758
+ and privacy alerts,” in 2018 AISB Convention: Symposium on Digital
759
+ Behaviour Intervention for Cyber Security.
760
+ Society for the Study of
761
+ Artificial Intelligence and Simulation for . . . , 2018, pp. 21–28.
762
+ [12] M. Wu, R. C. Miller, and S. L. Garfinkel, “Do security toolbars actually
763
+ prevent phishing attacks?” in Proceedings of the SIGCHI conference on
764
+ Human Factors in computing systems, 2006, pp. 601–610.
765
+ [13] B. Kaiser, J. Wei, E. Lucherini, K. Lee, J. N. Matias, and J. Mayer,
766
+ “Adapting security warnings to counter online disinformation,” in 30th
767
+ USENIX Security Symposium (USENIX Security 21), 2021, pp. 1163–
768
+ 1180.
769
+ [14] M.
770
+ Walkington,
771
+ “Designing
772
+ Better
773
+ Security
774
+ Warnings,”
775
+ 2019,
776
+ https://blog.mozilla.org/ux/2019/03/designing-better-security-warnings/
777
+ (Accessed 8 February 2022).
778
+ [15] Y. Chen, N. J. Conroy, and V. L. Rubin, “Misleading online content:
779
+ recognizing clickbait as” false news”,” in Proceedings of the 2015 ACM
780
+ on workshop on multimodal deception detection, 2015, pp. 15–19.
781
+ [16] E. Lex, A. Juffinger, and M. Granitzer, “Objectivity classification in
782
+ online media,” in Proceedings of the 21st ACM conference on Hypertext
783
+ and hypermedia, 2010, pp. 293–294.
784
+ [17] V. L. Rubin, N. Conroy, Y. Chen, and S. Cornwell, “Fake news or
785
+ truth? using satirical cues to detect potentially misleading news,” in
786
+ Proceedings of the second workshop on computational approaches to
787
+ deception detection, 2016, pp. 7–17.
788
+ [18] U. K. Ecker, S. Lewandowsky, E. P. Chang, and R. Pillai, “The effects
789
+ of subtle misinformation in news headlines.” Journal of experimental
790
+ psychology: applied, vol. 20, no. 4, p. 323, 2014.
791
+ [19] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S.
792
+ Corrado, A. Davis, J. Dean, M. Devin et al., “Tensorflow: Large-scale
793
+ machine learning on heterogeneous distributed systems,” arXiv preprint
794
+ arXiv:1603.04467, 2016.
795
+
796
+ 1.2
797
+ 1.15
798
+ 1.1
799
+ 1
800
+ 0.9
801
+ 0.8
802
+ .Oss
803
+ 0.7
804
+ 0.6
805
+ L
806
+ 0.5
807
+ 0.39
808
+ 0.4
809
+ 0.3
810
+ 0.2
811
+ 0.1
812
+ 0
813
+ Training
814
+ Evaluation
815
+ (Lower is better.)[20] A. Chakraborty, B. Paranjape, S. Kakarla, and N. Ganguly, “Stop
816
+ clickbait: Detecting and preventing clickbaits in online news media,”
817
+ in Advances in Social Networks Analysis and Mining (ASONAM), 2016
818
+ IEEE/ACM International Conference on.
819
+ IEEE, 2016, pp. 9–16.
820
+ [21] Mozilla, “Native Manifests,” 2022, https://developer.mozilla.org/en-
821
+ US/docs/Mozilla/Add-ons/WebExtensions/Native manifests
822
+ (Accessed
823
+ 5 March 2022).
824
+
6NE1T4oBgHgl3EQfmwRz/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
79E1T4oBgHgl3EQfBwKM/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ad31a4232d7e603450018ddb759702565b183fa1afa2aa92c4c4fae4625239e2
3
+ size 163491
79E4T4oBgHgl3EQfCgub/content/tmp_files/2301.04861v1.pdf.txt ADDED
@@ -0,0 +1,1150 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04861v1 [cs.IT] 12 Jan 2023
2
+ Grant-Free Random Access of IoT devices in
3
+ Massive MIMO with Partial CSI
4
+ Gilles Callebaut1, Franc¸ois Rottenberg1, Liesbet Van der Perre1, and Erik G. Larsson2
5
+ 1Department of Electrical Engineering (ESAT-DRAMCO), KU Leuven, 9000 Ghent, Belgium
6
+ 2Department of Electrical Engineering (ISY), Link¨oping University, Link¨oping, Sweden
7
+ Abstract—The number of wireless devices is drastically in-
8
+ creasing, resulting in many devices contending for radio re-
9
+ sources. In this work, we present an algorithm to detect ac-
10
+ tive devices for unsourced random access, i.e., the devices are
11
+ uncoordinated. The devices use a unique, but non-orthogonal
12
+ preamble, known to the network, prior to sending the payload
13
+ data. They do not employ any carrier sensing technique and
14
+ blindly transmit the preamble and data. To detect the active
15
+ users, we exploit partial channel state information (CSI), which
16
+ could have been obtained through a previous channel estimate.
17
+ For static devices, e.g., Internet of Things nodes, it is shown that
18
+ CSI is less time-variant than assumed in many theoretical works.
19
+ The presented iterative algorithm uses a maximum likelihood
20
+ approach to estimate both the activity and a potential phase
21
+ offset of each known device. The convergence of the proposed
22
+ algorithm is evaluated. The performance in terms of probability
23
+ of miss detection and false alarm is assessed for different qualities
24
+ of partial CSI and different signal-to-noise ratio.
25
+ Index Terms—activity detection, grant-free, massive MIMO,
26
+ maximum likelihood, random access.
27
+ I. INTRODUCTION
28
+ Massive machine-typed communication (mMTC) is envi-
29
+ sioned to enable low-power connectivity to a very large
30
+ number of devices and open up new applications. While it
31
+ has been put forward as a key building block in 5G and
32
+ beyond, it has so far received less attention than enhanced
33
+ Mobile Broadband (eMBB) and Ultra-Reliable Low Latency
34
+ Communications (URLLC). The challenge in mMTC, and
35
+ in general Internet of Things (IoT) systems, resides in the
36
+ low-power operation, sporadic nature of the traffic and a
37
+ large amount of uncoordinated devices. As these devices are
38
+ often battery-powered, they are constrained in the signalling
39
+ overhead they can handle [2]. Furthermore, they are often
40
+ deployed in remote areas, where network coverage is low or
41
+ non-existent [2, 3]. To address this, novel protocols need to
42
+ be designed tailored to the low-power, sporadic and massive
43
+ nature of mMTC traffic. One promising direction, and the
44
+ focus of this work, is the use of massive MIMO, where a
45
+ large number of antennas is present at the base station.
46
+ Two multiple access approaches can be taken, grant-based
47
+ and grant-free random access. The former requires the devices
48
+ to obtain a grant from the network, where after it can use a
49
+ The research reported herein was partly funded by the European Union’s
50
+ Horizon 2020 research and innovation programme under grant agreement No
51
+ 101013425.
52
+ This paper is presented at IEEE WCNC 2023. G. Callebaut, F. Rottenberg,
53
+ L. Van der Perre, and E. G. Larsson, “Grant-Free random access of IoT devices
54
+ in massive MIMO with partial CSI,” in 2023 IEEE Wireless Communications
55
+ and Networking Conference (WCNC) (IEEE WCNC 2023), Glasgow, United
56
+ Kingdom (Great Britain), Mar. 2023
57
+ collision-free radio resource to transmit its data. The disadvan-
58
+ tage of this approach for IoT and mMTC is that devices need
59
+ to compete for grants, requiring, e.g., dedicated preambles or a
60
+ lot of signalling for collision resolution. Due to the number of
61
+ competing devices such schemes are not practical and scalable.
62
+ Therefore, grant-free approaches are advocated over grant-
63
+ based solutions [4–6]. In grant-free random access, devices
64
+ do not contend for a grant, but just access the network when
65
+ required. Often these devices are unaware of the other devices
66
+ in the system and operate in an uncoordinated fashion, which
67
+ is called unsourced grant-free random access [6]. Different
68
+ approaches have been studied to detect the active devices in
69
+ massive MIMO systems. Detecting active devices is facilitated
70
+ when each device uses a unique and orthogonal preamble
71
+ sequence. This entails that each preamble should have the
72
+ same length as the number of devices to have no collisions,
73
+ which is unpractical. Therefore a number of studies have
74
+ considered a pool of orthogonal pilots [7] or the use of non-
75
+ orthogonal pilots. Both of these strategies have been elaborated
76
+ in [4], where they formulate the device-activity detection
77
+ problem as a compressed sensing problem, where the sparsity
78
+ of the active devices at each time slot is exploited. However,
79
+ compressed sensing requires the preamble length to be larger
80
+ than the active devices, increasing the energy expenditure of
81
+ data transfer. To combat this, in [6, 8] a covariance-based
82
+ method is suggested using two estimators for device activity
83
+ recovery, i.e., maximum-likelihood (ML) and non-negative
84
+ least squares (NNLS). This work is generalized by Ganesan,
85
+ Bjornson, and Larsson [9, 10] to the cell-free case where mul-
86
+ tiple access points (APs) are geographically distributed. They
87
+ considered different large-scale fading coefficients per APs.
88
+ They employed a simplification of their proposed algorithm
89
+ by including only the AP with the strongest contribution. They
90
+ concluded that co-located massive MIMO is highly sensitive to
91
+ low signal-to-noise ratios (SNRs), while cell-free deployment
92
+ is better suited against shadowing fading effects.
93
+ Contributions. Inspired by these works, we propose a
94
+ new algorithm exploiting the static nature of IoT devices. As
95
+ demonstrated in [11] and elaborated in Secion II, the channel
96
+ state information (CSI) can remain almost invariant over large
97
+ period of times (hours) for scenarios with low mobility. This
98
+ was not yet leveraged by practical algorithms in the literature
99
+ to the best of our knowledge. Given that the base station
100
+ knows a part of the CSI of each device the performance of
101
+ the device activity scheme can be improved. To do so, we
102
+ formulate the maximum-likelihood activity detection problem
103
+ using partial CSI. Furthermore, a phase offset can be estimated
104
+ which occurs due to carrier frequency offset (CFO) (when
105
+
106
+ the CFO is static over the preamble duration). We validate
107
+ the convergence of the iterative algorithm, study the impact
108
+ of different initialization vectors for the device activity, the
109
+ impact of the quality of the partial CSI and the SNR on the
110
+ performance of the algorithm.
111
+ The
112
+ used
113
+ mathematical
114
+ notations
115
+ are
116
+ described
117
+ in
118
+ https://github.com/wavecore-research/math-notations.
119
+ II. MOTIVATION – RECURRENCE IN CSI
120
+ IoT technologies are often put in the field with a deploy-
121
+ and-forget strategy, where the devices remain immobile after-
122
+ wards. As such, we can expect that the channel conditions
123
+ are less time-variant than typically assumed in literature [12,
124
+ 13]. An experimental campaign to investigate the long-term
125
+ behavior of the channel is presented in [11]. The long-
126
+ term behavior is measured by taking the channel correlation
127
+ δi,j = |¯hH
128
+ i ·¯hj|/∥¯hi∥∥¯hj∥ of the first channel estimate and the
129
+ other channel N measurements, i.e., δ1,j for j ∈ {1, . . ., N}.
130
+ The observed channel correlations are depicted in Fig. 1.
131
+ It illustrates that most of the time the correlation coefficient
132
+ is close to 1, indicating that the channel is highly correlated
133
+ with the first estimate and thus can be considered static. It also
134
+ shows that, while in some occasions the correlation drops,
135
+ the channel quickly becomes again highly correlated with
136
+ the first channel instance. More than 90% of the measured
137
+ channels1 have a correlation coefficient higher than 0.9. This
138
+ demonstrates the potential of re-using channel estimates in IoT
139
+ contexts.2
140
+ 0
141
+ 0.2
142
+ 0.4
143
+ 0.6
144
+ 0.8
145
+ 1
146
+ 0.6
147
+ 0.8
148
+ 1
149
+ Sample index
150
+ Channel Correlation δ1,j
151
+ Node 1
152
+ Node 2
153
+ Figure 1: Channel correlation over a full day (9h24-17h48) with over 10 000
154
+ channel instances, with an average correlation of 0.935/0.968 and a standard
155
+ deviation of 0.06/0.03 for Node 1/Node 2.
156
+ III. SYSTEM MODEL
157
+ There is a total of K single-antenna devices and a total of M
158
+ co-located base station (BS) antennas. The set of active users
159
+ trying to access the network is denoted by Ka, with |Ka| ≤ K.
160
+ To access the network, each active device k ∈ Ka sends a
161
+ unique, non-orthogonal preamble of length T , known to the
162
+ network. The pilot symbol of the preamble sent by device k at
163
+ pilot symbol t is denoted by sk,t. The channel vector between
164
+ the receive antenna m and user k is denoted by hk,m ∈ C, and
165
+ 1More specifically, 91% and 95% for Node 1 and Node 2, respectively.
166
+ 2We use here the term “re-using” to indicate that we no longer operate in
167
+ a block fading model with independent channel realizations. Typically, these
168
+ blocks are considered in the order of 50 ms.
169
+ is considered fixed over the preamble duration. The received
170
+ symbol at the m-th BS antenna at time t is
171
+ yt,m =
172
+ K−1
173
+
174
+ k=0
175
+ hk,msk,tγk + wt,m,
176
+ (1)
177
+ where γk is an unknown complex scalar and wt,m ∈ C is
178
+ independently and identically distributed (i.i.d.) zero mean
179
+ circularly symmetric complex Gaussian (ZMCSCG) noise with
180
+ variance σ2. The unknown complex scalar γk can be developed
181
+ as
182
+ γk = √ρkakejφk,
183
+ (2)
184
+ where ρk ∈ R+ is the transmit power of device k, ak ∈ {0, 1}
185
+ is the device activity and φk models a potential phase offset.
186
+ This offset φk can account for a CFO, where the phase is
187
+ considered constant over the preamble duration. This occurs
188
+ when no frequency drift has occurred during the preamble
189
+ duration, which is a feasible assumption as the CFO is
190
+ typically low, yielding negligible phase rotations during the
191
+ preamble interval. By assuming that all M antennas are
192
+ perfectly synchronized, this offset is only dependent on the
193
+ device. In case the device is inactive, γk will be zero. We will
194
+ introduce the term activity indicator to denote γk.
195
+ Let us consider that the BS knows a part of the CSI, i.e.,
196
+ gk,m in
197
+ hk,m = gk,m + λkǫk,m,
198
+ (3)
199
+ where ǫk,m are i.i.d. ZMCSCG variables with unit variance,
200
+ and λk ∈ R+ models the unknown part of the CSI. The large-
201
+ scale fading coefficient of user k is βk = E(∥hk∥2 /M) =
202
+ ∥gk∥2 /M +λ2
203
+ k. The factor λk models the quality of the known
204
+ CSI. Hence, it quantifies the correlation of the actual channel
205
+ hk,m to the known partial CSI gk,m. In the extreme case with
206
+ λk = 0, the CSI is perfectly known and there is no uncertainty
207
+ left, as was studied in [11]. This could be the case in a
208
+ fully static environment and if the CSI estimates are noiseless.
209
+ However, for a realistic IoT scenario, even for static devices,
210
+ CSI is not perfect due to i) environment dynamics and ii) noisy
211
+ estimates. The parameter λk then quantifies this imperfection.
212
+ It is here assumed to be known3. Another extreme case,
213
+ as considered in [8, 10], is obtained when gk,m = 0, ∀m,
214
+ implying that only the large scale fading coefficient of user k
215
+ is known, i.e., λk = √βk.
216
+ IV. DEVICE ACTIVITY DETECTION
217
+ This section describes the proposed activity detection al-
218
+ gorithm. First, the log-likelihood of the received preamble is
219
+ derived. Then, given its non-convex expression, an iterative
220
+ approach is proposed to estimate the parameters γk ∀k. Finally,
221
+ activity detection is performed.
222
+ A. Log-Likelihood of the Received Symbols
223
+ Combining (1) and (3), the symbol, received at BS antenna
224
+ m and for pilot symbol t, is given by
225
+ yt,m =
226
+ K−1
227
+
228
+ k=0
229
+ (gk,m + ǫk,mλk)st,kγk + wt,m.
230
+ 3It could be set to a certain value depending on the user activity profile
231
+ and/or tracked for each user over time.
232
+
233
+ Stacking the observations at antenna m gives
234
+ ym =
235
+ K−1
236
+
237
+ k=0
238
+ gk,mskγk +
239
+ K−1
240
+
241
+ k=0
242
+ ǫk,mλkskγk + wm,
243
+ where
244
+ ym =
245
+
246
+
247
+
248
+ y0,m
249
+ ...
250
+ yT −1,m
251
+
252
+
253
+  , sk =
254
+
255
+
256
+
257
+ s0,k
258
+ ...
259
+ sT −1,k
260
+
261
+
262
+  , wm =
263
+
264
+
265
+
266
+ wm,0
267
+ ...
268
+ wT −1,m
269
+
270
+
271
+  .
272
+ For a given value of γk, ym|γk has a circularly symmetric
273
+ Gaussian distribution with mean �K−1
274
+ k=0 gk,mskγk. After defin-
275
+ ing the vector θm = �K−1
276
+ k=0 ǫk,mλkskγk+wm, the covariance
277
+ matrix is
278
+ C = E
279
+
280
+ θmθH
281
+ m
282
+
283
+ =
284
+ K−1
285
+
286
+ k=0
287
+ λ2
288
+ k|γk|2sksH
289
+ k + σ2IT ,
290
+ (4)
291
+ where we used the fact that ǫk,m were assumed to be i.i.d. and
292
+ the additive noise is white. Note that this covariance matrix
293
+ does not depend on the antenna index m and is thus valid for
294
+ all ym. Defining the vector γ = (γ0, ..., γK−1)T , and Θm =
295
+ ym − �K−1
296
+ k=0 gk,mskγk the log-likelihood of the observation
297
+ vector ym is
298
+ log p(ym|γ) = − ln (|C|) − T ln(π) − ΘH
299
+ mC−1Θm.
300
+ Given the conditional independence of ǫk,m and wt,m over the
301
+ antennas, the different ym are independent as well. Hence, the
302
+ log-likelihood of the aggregated observations at all antennas
303
+ y = (yT
304
+ 0 , ..., yT
305
+ M−1)T becomes
306
+ log p(y|γ) = −M ln (|C|) − MT ln(π) −
307
+ M−1
308
+
309
+ m=0
310
+ ΘH
311
+ mC−1Θm.
312
+ (5)
313
+ B. Iterative Algorithm for Maximizing Likelihood
314
+ The maximum likelihood estimator of γ is obtained by
315
+ maximizing
316
+ ˆγML = arg max
317
+ γ
318
+ log p(y|γ).
319
+ This problem is not trivial to solve given the nonlinear and
320
+ non-convex dependence of the log-likelihood, more specifi-
321
+ cally the covariance matrix C, in γ. An idea to maximize
322
+ the likelihood is to use an iterative approach, similarly as [8,
323
+ 10]: at each iteration, all γk are kept fixed but one, which is
324
+ optimized and updated. This way, they get updated one by
325
+ one until convergence is attained, i.e., a maximum number of
326
+ iterations or a certain tolerance is reached. A block diagram
327
+ of the algorithm is given in Figure 2 and the pseudocode is
328
+ summarized in Algorithm 1.
329
+ Let us consider that the complex-valued γk′ needs to be
330
+ updated. Using the definition introduced in (2), we can rewrite
331
+ γk′ with a phase-amplitude decomposition: γk′ = rk′eφk′,
332
+ with rk′ = |γk′| = √ρk′ak′. The optimization with respect
333
+ to γk′ is done in the following in several steps: i) optimizing
334
+ the phase φk′ for a fixed value of rk′, ii) re-inserting this
335
+ expression in the objective function to remove the dependence
336
+ in φk′ and iii) optimizing the amplitude rk′.
337
+ 1) Phase optimization: To highlight the dependence of the
338
+ objective function in γk′ for constant values of other γk, k ̸=
339
+ k′, let us define the vector
340
+ yk′,m = ym −
341
+ K−1
342
+
343
+ k=0,k̸=k′
344
+ gk,mskγk,
345
+ (8)
346
+ which can be seen as a cancellation of device interference to
347
+ isolate the contribution from device k′. Hence, the objective
348
+ function to maximize can be written as in (7)4.
349
+ where we explicitly express the dependence in (rk′, φk′)
350
+ while the other (rk, φk), k ̸= k′ do not appear since they are
351
+ considered constant. Note that the matrix C, defined in (4),
352
+ does not depend on φk′ but only rk′. In the extreme case of no
353
+ prior CSI, i.e., gk′,m = 0 ∀m, the dependence of f(rk′, φk′)
354
+ in φk′ disappears and there is an underdetermination and no
355
+ estimate of the phase offset can be obtained. In other cases,
356
+ we can find that, after some manipulations,
357
+ ˆφk′ = ∠sH
358
+ k′C−1
359
+ M−1
360
+
361
+ m=0
362
+ g∗
363
+ k′,myk′,m.
364
+ (9)
365
+ This result has an intuitive understanding: the optimal phase
366
+ φ′
367
+ k tends to align the partial CSI with the observations due to
368
+ device k′.
369
+ 2) Removing the phase dependence: Inserting this optimal
370
+ value in the objective function f(rk′, φk′) makes the depen-
371
+ dence in φk′ vanish and gives (6).
372
+ 3) Amplitude optimization: To alleviate the dependence on
373
+ rk′ in (6), let us define
374
+ C−k′ = C − λ2
375
+ k′|γk′|2sk′sH
376
+ k′
377
+ (10)
378
+ =
379
+
380
+ k\k′
381
+ λ2
382
+ k|γk|2sksH
383
+ k + σ2IT ,
384
+ which does not depend on rk′ and is full rank, thus invertible.
385
+ Applying the Sherman-Morrison formulas [14] to C−1 and
386
+ C−1sk′ gives
387
+ C−1 = C−1
388
+ −k′ − C−1
389
+ −k′sk′sH
390
+ k′C−1
391
+ −k′r2
392
+ k′λ2
393
+ k′
394
+ 1 + sH
395
+ k′C−1
396
+ −k′sk′r2
397
+ k′λ2
398
+ k′
399
+ (11)
400
+ We insert these expressions in (6) and we omit terms that
401
+ do not depend on rk′, which will vanish after taking the
402
+ derivative. This gives
403
+ ˜f(rk′) = −M ln (|C|) + αr2
404
+ k′ + βrk′
405
+ 1 + δr2
406
+ k′
407
+ ,
408
+ (12)
409
+ where we defined the constants (independent of rk′) α, β and
410
+ δ, as
411
+ α =
412
+ M−1
413
+
414
+ m=0
415
+ |yH
416
+ k′,mC−1
417
+ −k′sk′|2λ2
418
+ k′ − sH
419
+ k′C−1
420
+ −k′sk′
421
+ M−1
422
+
423
+ m=0
424
+ |gk′,m|2
425
+ β = 2
426
+ �����
427
+ M−1
428
+
429
+ m=0
430
+ yH
431
+ k′,mC−1
432
+ −k′sk′gk′,m
433
+ �����
434
+ δ = sH
435
+ k′C−1
436
+ −k′sk′λ2
437
+ k′.
438
+ (13)
439
+ 4For clarity, we omit in the following the constant term MT ln(π) which
440
+ does not affect optimization as it does not depend on γ and vanishes after
441
+ differentiation.
442
+
443
+ f(rk′) = −M ln (|C|) −
444
+ M−1
445
+
446
+ m=0
447
+ yH
448
+ k′,mC−1yk′,m − r2
449
+ k′sH
450
+ k′C−1sk′
451
+ M−1
452
+
453
+ m=0
454
+ |gk′,m|2 + 2
455
+ �����
456
+ M−1
457
+
458
+ m=0
459
+ yH
460
+ k′,mC−1sk′gk′,m
461
+ ����� rk′
462
+ (6)
463
+ f(rk′, φk′) = −M ln (|C|) −
464
+ M−1
465
+
466
+ m=0
467
+
468
+ yk′,m − gk′,msk′rk′eφk′�H C−1 �
469
+ yk′,m − gk′,msk′rk′eφk′�
470
+ (7)
471
+ Inputs
472
+ σ2, λk, gm,k,
473
+ ym ∀m, k
474
+ Initialization
475
+ k′ ← 0, ˆγ ← ˆγinit
476
+ Amplitude Optimization
477
+ (14), (16) or (17)
478
+ ˆrk′ ← arg max ˜f(rk′)
479
+ Phase Optimization (9)
480
+ ˆφk′ ← ∠sH
481
+ k′C−1 �M−1
482
+ m=0 g∗
483
+ k′,myk′,m
484
+ Converged?
485
+ Iterative maximum likelihood estimator
486
+ Tolerance
487
+ Max iteration
488
+ Activity Detection
489
+ ˆγk ≤ γth,k ∀k
490
+ No
491
+ Yes
492
+ k′ ← k′ + 1 mod K
493
+ Updated ˆγk′ ← ˆrk′eφk′
494
+ ˆγ
495
+ Figure 2: Block diagram of the iterative maximum likelihood estimator and activity detection.
496
+ One can note that ˜f(rk′) in (12) can now be differentiated
497
+ with respect to rk′, using the differential rule ∂(log |A|) =
498
+ tr[A−1∂A]. Setting the derivative to zero gives, noting that
499
+ the denominator is always strictly positive,
500
+ 0 = −r3
501
+ k′2Mδ2 − r2
502
+ k′βδ + rk′(−2Mδ + 2α) + β,
503
+ (14)
504
+ which is a polynomial of degree 3 in rk′. There are closed-
505
+ form solutions for the roots of such polynomials. Following
506
+ Descarte’s rule of signs, (14) has only one real and positive
507
+ root, as required, in case the terms are non-zero. Below we
508
+ discuss the special cases when the terms are not non-zero, i.e.,
509
+ when there is no or complete CSI knowledge.
510
+ The algorithm is summarized in the pseudocode Algo-
511
+ rithm 1. At each iteration, the constants α, β and δ can
512
+ be easily re-evaluated based on (13). They require the matrix
513
+ inversion C−1
514
+ −k′. To avoid re-computing a full inverse at each
515
+ iteration, one can rely on the Sherman-Morrison formula and
516
+ on the current knowledge of C−1, which is updated at the end
517
+ of each iteration by inserting the obtained value of rk′ in (11).
518
+ Using (10), we find
519
+ C−1
520
+ −k′ = C−1 + λ2
521
+ k′|γk′|2C−1sk′sH
522
+ k′C−1
523
+ 1 − λ2
524
+ k′|γk′|2sH
525
+ k′C−1sk′ .
526
+ (15)
527
+ Moreover, computations can be optimized as several quantities
528
+ appear multiple times and can be computed only once. The
529
+ complexity of the proposed algorithm is O(IMT 2), where I
530
+ is the number of iterations.5
531
+ We now investigate two particular cases, to gain further
532
+ insights.
533
+ Algorithm 1 Iterative maximum likelihood device activity
534
+ detector
535
+ Require: σ2, λk, ym, gk,m, ˆγinit ∀k, m
536
+ k′ ← 0
537
+ ˆγ ← ˆγinit
538
+ C−1 ←
539
+ ��K−1
540
+ k=0 λ2
541
+ k|ˆγk|2sksH
542
+ k + σ2IT
543
+ �−1
544
+ while Not converged do
545
+ Compute yk′,m, C−1
546
+ −k′, α, β and δ based on (8), (15) and
547
+ (13)
548
+ ˆrk′ ← arg max ˜f(rk′)
549
+ ⊲ Update amplitude based on (14),
550
+ (16) or (17)
551
+ ˆφk′ ← ∠sH
552
+ k′C−1 �M−1
553
+ m=0 g∗
554
+ k′,myk′,m
555
+ ⊲ Update phase
556
+ ˆγk′ ← ˆrk′e ˆφk′
557
+ C−1 ← C−1
558
+ −k′ −
559
+ C−1
560
+ −k′ sk′ sH
561
+ k′ C−1
562
+ −k′ r2
563
+ k′ λ2
564
+ k′
565
+ 1+sH
566
+ k′ C−1
567
+ −k′ sk′ r2
568
+ k′ λ2
569
+ k′
570
+ k′ ← k′ + 1 mod K
571
+ end while
572
+ a) Particular case: device with no CSI: Now consider
573
+ that, for a given k′, gk′,m = 0 ∀m. This could be because
574
+ this device is new or moving a lot, such that its CSI is
575
+ outdated. Only, its parameter λk′ is known, which is equal
576
+ 5Note that I will in practice depend on K as we will iterate N times over
577
+ all users K, but this is not a requirement.
578
+
579
+ to the large-scale fading coefficient √βk′. At iteration of user
580
+ k′, evaluating (13) for gk′,m = 0 ∀m implies that β = 0.
581
+ Hence, (14) simplifies to
582
+ 0 = 2rk′(−r2
583
+ k′Mδ2 − Mδ + α),
584
+ which has a trivial solution in rk′ = 0. One of the other roots
585
+ is always negative. Keeping only the positive one, we find the
586
+ amplitude update
587
+ ˆrk′ =
588
+
589
+ α − Mδ
590
+ Mδ2
591
+ .
592
+ (16)
593
+ If this root is imaginary, we set ˆrk′ to zero. As discussed
594
+ before introducing the phase update equation (9), in the case
595
+ of no prior CSI, the phase ambiguity cannot be resolved.
596
+ This particular case gives an update relatively similar to the
597
+ maximum likelihood estimator derived in [8, (23)], where
598
+ their ML expression estimates the error, while ours estimates
599
+ directly the coefficient ˆrk′, given the same estimate of γk′ at
600
+ each iteration.
601
+ b) Particular case: device with complete prior CSI: Now,
602
+ consider that, for a given k′, λk′ = 0, so that the CSI is
603
+ perfectly known. Only the phase shift and the transmit power
604
+ are unknown. At iteration of user k′, evaluating (13) for λk′ =
605
+ 0 implies that δ = 0. Hence, (14) simplifies to a linear equation
606
+ 0 = rk′2α + β, which gives the following amplitude update
607
+ ˆrk′ = −β
608
+ 2α =
609
+ |sH
610
+ k′C−1 �M−1
611
+ m=0 g∗
612
+ k′,myk′,m|
613
+ sH
614
+ k′C−1sk′ �
615
+ m′ |gk′,m′|2
616
+ ,
617
+ (17)
618
+ while the phase is updated according to (9).
619
+ 4) Initialization: To start the iterative algorithm, we con-
620
+ sider different choices to initialize ˆγinit. A simple choice is
621
+ to initialize to zero, i.e., ˆγ0
622
+ init = 0. Another choice is to
623
+ initialize solely based on the available prior CSI, considering
624
+ that λk ≈ 0, ∀k. The estimator is similar to [11], except that,
625
+ here, prior CSI is used instead of complete CSI.
626
+ If λk ≈ 0, ∀k, the covariance matrix C, defined in (4),
627
+ simplifies to C = σ−2IT , which is independent of γk. Hence,
628
+ many terms of the log-likelihood in (5) become independent
629
+ of γ. Maximizing (5) becomes equivalent to the following
630
+ minimization
631
+ max
632
+ γ
633
+ log p(y|γ) = min
634
+ γ
635
+ M−1
636
+
637
+ m=0
638
+ �����ym −
639
+ K−1
640
+
641
+ k=0
642
+ gk,mskγk
643
+ �����
644
+ 2
645
+ = min
646
+ γ ∥y − Γγ∥2 ,
647
+ where we defined the vector and matrix notations
648
+ y =
649
+ �y0 . . . yM−1
650
+ �T , Γ =
651
+ �Γ0 . . . ΓM−1
652
+ �T ,
653
+ Γm =
654
+ �s0 . . . sK−1
655
+
656
+ diag(g0,m . . . gK−1,m).
657
+ This minimization problem is a quadratic function of γ, which
658
+ is a least squares problem. The estimate has the following
659
+ closed-form expression
660
+ ˆγZF
661
+ init =
662
+
663
+ ΓHΓ
664
+ �−1
665
+ ΓHy.
666
+ (18)
667
+ This last estimator can be seen as a zero-forcing (ZF) es-
668
+ timator, which requires a matrix inversion. To avoid ill-
669
+ conditioning, a first necessary condition is that K ≤ MT .
670
+ This condition is not sufficient as the channel and preamble
671
+ of two devices could be correlated, especially when K is on
672
+ the order of MT . Moreover, if no prior information is available
673
+ for a given user k′, i.e., gk′,m = 0, ∀m, the inverse will also
674
+ be ill-conditioned. This implies that the k′-th column of Γ
675
+ becomes null and thus Γ is rank deficient. Moreover, the prior
676
+ CSI might be noisy, leading to unstable results.
677
+ To make initialization more robust, we can use an least
678
+ minimum mean square error (LMMSE) criterion. To do this,
679
+ some prior knowledge must be assumed on the statistics of
680
+ γ, more specifically, its first and second order moments.
681
+ We here make the following assumptions: i) the activity of
682
+ each device is independent of one another, ii) the average
683
+ activity and average transmit power of each device is known
684
+ and iii) no prior information is known on the phase offset
685
+ so that φk is considered uniformly distributed between 0
686
+ and 2π. Under these assumptions, we have E(γ) = 0 and
687
+ D = E(γγH) = diag (E(a0)E(ρ0), ..., E(aK−1)E(ρK−1)).
688
+ Hence, for the linear observation model y = Γγ + w, still
689
+ considering that λk ≈ 0, ∀k, the LMMSE estimator of γ is
690
+ then given by [15]
691
+ ˆγLMMSE
692
+ init
693
+ =
694
+
695
+ ΓHΓ + σ2D−1�−1
696
+ ΓHy.
697
+ (19)
698
+ Note that the matrix to be inverted is always well-conditioned.
699
+ Finally, a matched filter (MF) estimator could be used to avoid
700
+ the need for matrix inversion.
701
+ ˆγMF
702
+ init =
703
+
704
+ diag(ΓHΓ) + σ2D−1�−1
705
+ ΓHy.
706
+ (20)
707
+ C. Activity Detection
708
+ A non-negative activity threshold γth,k is applied for each
709
+ device k. A device is considered active if |ˆγk| ≥ γth,k. The
710
+ real-valued threshold is defined as,
711
+ γth,k = v
712
+
713
+ SNRk
714
+ −1,
715
+ (21)
716
+ where v is chosen to have a desired probability of false alarm
717
+ and miss detection performance and with SNRk = Mβk/σ2 =
718
+ E(∥hk∥2)/σ2 = (∥gk∥2 + Mλ2
719
+ k)/σ2.
720
+ Miss detection happens when a device was undetected,
721
+ while it was actually transmitting. Equivalently, a false alarm
722
+ occurs if a device is considered active by the algorithm but
723
+ was not. We define the probability of miss detection as the
724
+ average ratio of undetected devices to the number of active
725
+ devices Pmd = 1 −
726
+ ����Ka ∩ ˆKa
727
+ ��� / |Ka|
728
+
729
+ , where Ka is the set
730
+ of active devices and ��Ka = {k|ˆak = 1, ∀ ∈ [1, K]} denotes
731
+ the estimated set of active devices. Note that on average
732
+ |Ka| = Ka. Similarly, the probability of false alarm is the ratio
733
+ of inactive devices considered active to the number of inactive
734
+ devices and is given by Pfa =
735
+ ���� ˆKa \ Ka
736
+ ��� /(K − |Ka|)
737
+
738
+ .
739
+ A trade-off can be made between the two probabilities
740
+ by varying v in (21). A lower v yields a lower activity
741
+ threshold, resulting in more devices considered active. This in
742
+ turn lowers the probability of miss detection, while increasing
743
+ the probability of generating a false alarm. In the simulations,
744
+ the parameter v is swept across the range [−40, 40]dB.
745
+
746
+ Table I: Simulation parameter set with default values.
747
+ Parameter
748
+ Symbol
749
+ Default value
750
+ Number of devices
751
+ K
752
+ 500
753
+ Number of total BS antennas
754
+ M
755
+ 64
756
+ Signal-to-noise ratio
757
+ SNR
758
+ 20 dB
759
+ Device activity probability
760
+ ǫa
761
+ 0.1
762
+ Pilot sequence
763
+ sk
764
+ ∼ CN (0, 1)
765
+ Pilot length
766
+ τp
767
+ 10 symbols
768
+ Phase offset
769
+ φk
770
+ ∼ U[0,2π]
771
+ Number of simulations
772
+ Nsim
773
+ >10 000
774
+ Number of algorithm iterations
775
+ Niter
776
+ K · 4
777
+ Initialization vector
778
+ ˆ
779
+ γinit
780
+ ˆγLMMSE
781
+ init
782
+ (19)
783
+ Unknown part of the CSI
784
+ λ
785
+ 0.3
786
+ V. NUMERICAL ASSESSMENT
787
+ The default simulation configurations are summarized in
788
+ Table I. The device activity profile is generated randomly and
789
+ independently for each device with a probability ǫa = 0.1,
790
+ meaning that on average ǫaK = 50 devices are active simul-
791
+ taneously. Or equivalently, the devices have an average duty
792
+ cycle of 10%, which is high for typical IoT applications [2].
793
+ The channel between the BS and device k is modelled as
794
+ in (3). The pilot sequence is randomly generated from a
795
+ complex Gaussian distribution sk ∼ CN (0, 1), and is assumed
796
+ to be known by the BS. Each device uses a pilot sequence
797
+ of 10 symbols. A random phase offset φk
798
+ ∼ U[0,2π] is
799
+ generated to simulate a carrier frequency offset (considered
800
+ time-invariant over the preamble duration). The source code
801
+ for all simulations can be accessed online6.
802
+ A. Convergence of different initialization vectors
803
+ The convergence of different initializations is evaluated with
804
+ respect to the genie-aided approach. In the genie-aided case,
805
+ the algorithm is initialized with the real activity indicators, i.e.,
806
+ γ. The convergence is assessed via the likelihood (5) and the
807
+ mean square error (MSE). The former should monotonically
808
+ increase with each iteration, while the MSE can vary as it can
809
+ not directly be minimized. The performance of the different
810
+ initialization vectors for ˆγinit are depicted in Figure 3. The
811
+ bottom figures zoom in on a smaller region to distinguish
812
+ the performance of the initialization vectors when converging
813
+ closer to the genie-aided case. While all initialization methods
814
+ approximate the genie-aided case, the initialization vector has
815
+ a non-negligible impact on the performance of the algorithm.
816
+ An intuitive approach is to initialize with 0 because the activity
817
+ probability is low and hence, on average, 90 % of the devices
818
+ are expected to be inactive. As illustrated in Figure 3, ˆγinit = 0
819
+ requires considerably more iterations to approach the other
820
+ initialization methods.
821
+ B. Impact of the quality of prior CSI
822
+ Figure 4 illustrates the performance of the detector algo-
823
+ rithms for different correlations between the actual channel
824
+ and the known CSI, i.e., λ. With increased λ, and thus
825
+ decreased channel knowledge, both the LMMSE estimator
826
+ and the proposed algorithm have an increased probability of
827
+ miss detection. The figure also demonstrates the gain of the
828
+ 6https://github.com/wavecore-research/grant-free-random-access-partial-csi
829
+ 0
830
+ 5
831
+ 10
832
+ 15
833
+ 20
834
+ −8,000
835
+ −6,000
836
+ −4,000
837
+ −2,000
838
+ log p(y|γ) (5)
839
+ LMMSE (19)
840
+ ZF (18)
841
+ MF (20)
842
+ zeros
843
+ genie (γ)
844
+ 0
845
+ 5
846
+ 10
847
+ 15
848
+ 20
849
+ −8,000
850
+ −6,000
851
+ −4,000
852
+ −2,000
853
+ log p(y|γ) (5)
854
+ LMMSE (19)
855
+ ZF (18)
856
+ MF (20)
857
+ zeros
858
+ genie (γ)
859
+ 0
860
+ 5
861
+ 10
862
+ 15
863
+ 20
864
+ 10−2
865
+ 10−1
866
+ 100
867
+ 101
868
+ Number of iterations (Niter/K)
869
+ MSE(ˆγ)
870
+ 0
871
+ 5
872
+ 10
873
+ 15
874
+ 20
875
+ 10−2
876
+ 10−1
877
+ 100
878
+ 101
879
+ Number of iterations (Niter/K)
880
+ MSE(ˆγ)
881
+ Figure 3: The log-likelihood (5) and MSE of the estimated activity indicators
882
+ for different initialization vectors. While with all initialization vectors the
883
+ genie-aided case is approximated, different number of iterations are required.
884
+ 0.3
885
+ 0.4
886
+ 0.5
887
+ 0.6
888
+ 0.7
889
+ 0.8
890
+ 0.9
891
+ 10−4
892
+ 10−3
893
+ 10−2
894
+ 10−1
895
+ λ
896
+ Pmd
897
+ Pfa
898
+ 0.1
899
+ 0.01
900
+ 0.001
901
+ Figure 4: Performance of the proposed algorithm (
902
+ ) versus the LMMSE
903
+ estimator (
904
+ ) for different values of channel knowledge. The probability
905
+ of miss detection is shown for different values of Pfa (10 %, 1 %, 0.1 %).
906
+ proposed algorithm with respect to the LMMSE estimator. The
907
+ algorithm outperforms the LMMSE estimator for all λ and
908
+ is most effective when the prior CSI has a strong correlation
909
+ with the actual channel, and diminishes with decreased channel
910
+ knowledge.
911
+ C. Impact of the signal-to-noise ratio
912
+ Figure 5 shows the false alarm and miss detection prob-
913
+ ability of the LMMSE estimator and the iterative maximum
914
+ likelihood device activity detector for different device SNRs.
915
+ The full CSI case is included as a baseline for comparison,
916
+
917
+ 10−5
918
+ 10−4
919
+ 10−3
920
+ 10−2
921
+ 10−5
922
+ 10−4
923
+ 10−3
924
+ 10−2
925
+ 21x
926
+ Pfa
927
+ Pmd
928
+ −6.67 dB
929
+ 6.67 dB
930
+ 20 dB
931
+ Figure 5: The probability of false alarm and miss detection for different device
932
+ SNRs for the LMMSE estimator when having full CSI (
933
+ ) and partial CSI
934
+ (
935
+ ), and the proposed iterative algorithm with partial CSI (
936
+ ). No
937
+ miss detection or false alarm occurred in the full CSI case for SNR values of
938
+ −6.67 dB and 20 dB.
939
+ where the full CSI is known instead of only a portion (λ).
940
+ Fig. 5 demonstrates the large performance gain of the proposed
941
+ algorithm with respect to the LMMSE estimator. The graph
942
+ demonstrates that the iterative algorithm lowers the probability
943
+ of miss detection by a factor of 21 for the same probability
944
+ of false alarm.7 The performance is only marginally increased
945
+ for very low SNRs (below zero).
946
+ VI. CONCLUSION
947
+ We formulated an iterative maximum-likelihood (ML) al-
948
+ gorithm to detect active devices using prior channel state
949
+ information (CSI) when performing grant-free random access.
950
+ Previous experimental work has demonstrated that, in many
951
+ massive machine-typed communication (mMTC) applications,
952
+ the CSI is less time-variant than assumed in theoretical models.
953
+ Given the static nature of Internet of Things (IoT) devices, we
954
+ have exploited this feature in the activity detection estimator.
955
+ During grant-free access, the devices transmit a unique, but
956
+ non-orthogonal preamble, which is used for activity detection.
957
+ Next to this, the algorithm is also able to detect a device-
958
+ specific phase offset, which could be caused by carrier fre-
959
+ quency offset (CFO). The algorithm is numerically evaluated
960
+ and compared to the conventional least minimum mean square
961
+ error (LMMSE) estimator with full channel knowledge and
962
+ partial CSI. The presented results indicate that the iterative al-
963
+ gorithm converges and outperforms the conventional LMMSE
964
+ estimator. For a signal-to-noise ratio (SNR) of 6.67 dB, the
965
+ probability of not detecting an active device is 21 times lower
966
+ for the proposed iterative ML estimator than the LMMSE
967
+ estimator for the same probability of wrongly considering an
968
+ inactive device as an active device.
969
+ This work can be extended to the cell-free or distributed case
970
+ with geographically distributed access points. In that case, the
971
+ partial CSI becomes access point-dependent.
972
+ 7Notably, the LMMSE estimator does not employ an iterative approach.
973
+ Therefore, our proposed algorithm will be compared in future work with
974
+ other iterative approaches.
975
+ REFERENCES
976
+ [1]
977
+ G. Callebaut, F. Rottenberg, L. Van der Perre, and E. G. Larsson,
978
+ “Grant-Free random access of IoT devices in massive MIMO with
979
+ partial CSI,” in 2023 IEEE Wireless Communications and Networking
980
+ Conference (WCNC) (IEEE WCNC 2023), Glasgow, United Kingdom
981
+ (Great Britain), Mar. 2023.
982
+ [2]
983
+ G. Callebaut, G. Leenders, J. Van Mulders, G. Ottoy, L. De Strycker,
984
+ and L. Van der Perre, “The Art of Designing Remote IoT De-
985
+ vices—Technologies and Strategies for a Long Battery Life,” Sensors,
986
+ vol. 21, no. 3, 2021, ISSN: 1424-8220. DOI: 10.3390/s21030913.
987
+ [Online]. Available: https://www.mdpi.com/1424-8220/21/3/913.
988
+ [3]
989
+ S. Wielandt and B. Dafflon, “A local lora based network pro-
990
+ tocol with low power redundant base stations enabling remote
991
+ environmental
992
+ monitoring,” in 2020 54th Asilomar Conference
993
+ on Signals, Systems, and Computers, 2020, pp. 520–523.
994
+ DOI:
995
+ 10.1109/IEEECONF51394.2020.9443344.
996
+ [4]
997
+ L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanovic, and E. de
998
+ Carvalho, “Sparse signal processing for grant-free massive connectiv-
999
+ ity: A future paradigm for random access protocols in the internet of
1000
+ things,” IEEE Signal Process Mag., vol. 35, no. 5, pp. 88–99, Sep.
1001
+ 2018, ISSN: 1053-5888, 1558-0792. DOI: 10.1109/msp.2018.2844952.
1002
+ [Online]. Available: https://doi.org/10.1109/msp.2018.2844952.
1003
+ [5]
1004
+ J. Ding, D. Qu, H. Jiang, and T. Jiang, “Success probability of
1005
+ grant-free random access with massive MIMO,” IEEE Internet of
1006
+ Things Journal, vol. 6, no. 1, pp. 506–516, Feb. 2019, ISSN: 2327-
1007
+ 4662, 2372-2541. DOI: 10.1109/jiot.2018.2869003. [Online]. Avail-
1008
+ able: https://doi.org/10.1109/jiot.2018.2869003.
1009
+ [6]
1010
+ A.
1011
+ Fengler,
1012
+ S.
1013
+ Haghighatshoar,
1014
+ P.
1015
+ Jung,
1016
+ and
1017
+ G.
1018
+ Caire,
1019
+ “Grant-free
1020
+ massive
1021
+ random
1022
+ access
1023
+ with
1024
+ a
1025
+ massive
1026
+ MIMO
1027
+ receiver,”
1028
+ in
1029
+ 2019
1030
+ 53rd
1031
+ Asilomar
1032
+ Conference
1033
+ on
1034
+ Signals,
1035
+ Systems,
1036
+ and Computers,
1037
+ IEEE, Nov. 2019, pp. 23–30.
1038
+ DOI:
1039
+ 10.1109/ieeeconf44664.2019.9049039.
1040
+ [Online].
1041
+ Available:
1042
+ https://doi.org/10.1109/ieeeconf44664.2019.9049039.
1043
+ [7]
1044
+ Q.
1045
+ Zhang,
1046
+ S.
1047
+ Jin,
1048
+ and
1049
+ H.
1050
+ Zhu,
1051
+ “A
1052
+ hybrid-grant
1053
+ random
1054
+ access
1055
+ scheme
1056
+ in
1057
+ massive
1058
+ MIMO
1059
+ systems
1060
+ for
1061
+ IoT,”
1062
+ IEEE
1063
+ Open
1064
+ Access,
1065
+ vol.
1066
+ 8,
1067
+ pp.
1068
+ 88 487–88 497,
1069
+ 2020,
1070
+ ISSN: 2169-
1071
+ 3536.
1072
+ DOI:
1073
+ 10.1109/access.2020.2993597.
1074
+ [Online].
1075
+ Available:
1076
+ https://doi.org/10.1109/access.2020.2993597.
1077
+ [8]
1078
+ A. Fengler, S. Haghighatshoar, P. Jung, and G. Caire, “Non-Bayesian
1079
+ activity detection, large-scale fading coefficient estimation, and un-
1080
+ sourced random access with a massive MIMO receiver,” IEEE Trans.
1081
+ Inf. Theory, vol. 67, no. 5, pp. 2925–2951, May 2021, ISSN: 0018-
1082
+ 9448, 1557-9654. DOI: 10.1109/tit.2021.3065291. [Online]. Available:
1083
+ https://doi.org/10.1109/tit.2021.3065291.
1084
+ [9]
1085
+ U. K. Ganesan, E. Bjornson, and E. G. Larsson, “An algo-
1086
+ rithm for grant-free random access in cell-free massive MIMO,”
1087
+ in 2020 IEEE 21st International Workshop on Signal Processing
1088
+ Advances in Wireless Communications (SPAWC), IEEE, May 2020,
1089
+ pp. 1–5. DOI: 10.1109/spawc48557.2020.9154288. [Online]. Avail-
1090
+ able: https://doi.org/10.1109/spawc48557.2020.9154288.
1091
+ [10]
1092
+ ——, “Clustering-based activity detection algorithms for grant-free
1093
+ random access in cell-free massive MIMO,” IEEE Trans. Commun.,
1094
+ vol. 69, no. 11, pp. 7520–7530, Nov. 2021,
1095
+ ISSN: 0090-6778,
1096
+ 1558-0857. DOI: 10.1109/tcomm.2021.3102635. [Online]. Available:
1097
+ https://doi.org/10.1109/tcomm.2021.3102635.
1098
+ [11]
1099
+ G.
1100
+ Callebaut,
1101
+ L. Van der Perre,
1102
+ and
1103
+ F. Rottenberg,
1104
+ “Grant-
1105
+ Free
1106
+ Random
1107
+ Access
1108
+ in
1109
+ Massive
1110
+ MIMO
1111
+ for
1112
+ Static
1113
+ Low-
1114
+ Power
1115
+ IoT
1116
+ Nodes,”
1117
+ pp.
1118
+ 46–51,
1119
+ 2021.
1120
+ [Online].
1121
+ Available:
1122
+ arXiv%20preprint%20arXiv:2110.07927.
1123
+ [12]
1124
+ E. Bj¨ornson, J. Hoydis, and L. Sanguinetti, “Massive mimo net-
1125
+ works: Spectral, energy, and hardware efficiency,” Foundations and
1126
+ Trends® in Signal Processing, vol. 11, no. 3-4, pp. 154–655, 2017,
1127
+ ISSN: 1932-8346.
1128
+ DOI: 10.1561/2000000093. [Online]. Available:
1129
+ http://dx.doi.org/10.1561/2000000093.
1130
+ [13]
1131
+ T. L. Marzetta, E. G. Larsson, H. Yang, and H. Q. Ngo, Fundamentals
1132
+ of Massive MIMO. Cambridge University Press, 2016.
1133
+ [14]
1134
+ J. Sherman and W. J. Morrison, “Adjustment of an inverse matrix
1135
+ corresponding to a change in one element of a given matrix,” The
1136
+ Annals of Mathematical Statistics, vol. 21, no. 1, pp. 124–127, 1950.
1137
+ [15]
1138
+ S.
1139
+ Nandi
1140
+ and
1141
+ D.
1142
+ Kundu,
1143
+ Statistical
1144
+ Signal
1145
+ Processing,
1146
+ Fre-
1147
+ quency Estimation. Springer Singapore, 2020, ISBN: 9789811562792,
1148
+ 9789811562808. DOI: 10.1007/978-981-15-6280-8. [Online]. Avail-
1149
+ able: https://doi.org/10.1007/978-981-15-6280-8.
1150
+
79E4T4oBgHgl3EQfCgub/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
89FQT4oBgHgl3EQfIjX8/content/tmp_files/2301.13253v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
89FQT4oBgHgl3EQfIjX8/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8NE5T4oBgHgl3EQfQg5R/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:90235a580b8489c29de8916f385d16c98e4313de338b8fdd29a817e510fc34d2
3
+ size 4325421
8NE5T4oBgHgl3EQfQg5R/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9d760020db3b80949857bbf4d6110ff5f602417b11116dd54c4cf8955763ff3f
3
+ size 152593
9NFQT4oBgHgl3EQfJDUU/content/tmp_files/2301.13254v1.pdf.txt ADDED
@@ -0,0 +1,1072 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ (Preprint) AAS 23-294
2
+ DEEP MONOCULAR HAZARD DETECTION FOR
3
+ SAFE SMALL BODY LANDING
4
+ Travis Driver⋆*, Kento Tomita⋆†, Koki Ho‡, and Panagiotis Tsiotras§
5
+ Hazard detection and avoidance is a key technology for future robotic small body
6
+ sample return and lander missions. Current state-of-the-practice methods rely on
7
+ high-fidelity, a priori terrain maps, which require extensive human-in-the-loop
8
+ verification and expensive reconnaissance campaigns to resolve mapping uncer-
9
+ tainties. We propose a novel safety mapping paradigm that leverages deep se-
10
+ mantic segmentation techniques to predict landing safety directly from a single
11
+ monocular image, thus reducing reliance on high-fidelity, a priori data products.
12
+ We demonstrate precise and accurate safety mapping performance on real in-situ
13
+ imagery of prospective sample sites from the OSIRIS-REx mission.
14
+ INTRODUCTION
15
+ Hazard detection and avoidance (HD&A) is a key technology for future robotic small body sam-
16
+ ple return and lander missions. Current approaches rely on high-fidelity digital elevation maps
17
+ (DEMs) derived from digital terrain models (DTMs), local topography and albedo maps, generated
18
+ on the ground.1 However, DTM construction involves extensive human-in-the-loop verification,
19
+ carefully designed image acquisition plans, and expensive reconnaissance campaigns to resolve
20
+ mapping uncertainties.2,3 We, instead, propose a novel safety mapping paradigm that leverages
21
+ Bayesian deep learning techniques to accurately predict landing safety maps directly from monocu-
22
+ lar images in order to reduce reliance on expensive high-fidelity, a priori data products (i.e., DTMs).
23
+ Safety mapping methodologies that leverage deep learning have demonstrated potential to im-
24
+ prove the accuracy of onboard hazard detection. Previous works4,5 have leveraged deep semantic
25
+ segmentation to classify safe and unsafe landing locations from digital elevation maps (DEMs)
26
+ derived from simulated LiDAR scans. However, generating reliable DEMs from LiDAR scans is
27
+ non-trivial and requires accurate state estimates and range measurements. Moreover, LiDARs typ-
28
+ ically feature a relatively small effective operating range6 and increased size, weight, and power
29
+ (SWaP) requirements relative to passive sensors such as monocular cameras. Thus, we propose to
30
+ derive landing safety maps directly from monocular images without assuming any a priori data or
31
+ relying on the fidelity of the current state estimate. Deep semantic segmentation has been previously
32
+ employed for surface characterization of small bodies from simulated monocular images, primar-
33
+ ily focusing on boulder detection.7,8 Conversely, we apply our models to real images and directly
34
+ predict safety maps that conform to realistic landing parameters and constraints.
35
+ ⋆These authors contributed equally to this work.
36
+ *PhD Student, Institute for Robotics and Intelligent Machines, School of Aerospace Engineering, Georgia Institute of
37
+ Technology, Atlanta, GA 30332, USA.
38
+ †PhD Student, School of Aerospace Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA.
39
+ ‡Associate Professor, School of Aerospace Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA.
40
+ §David & Andrew Lewis Chair, Professor, Institute for Robotics and Intelligent Machines, School of Aerospace Engineer-
41
+ ing, Georgia Institute of Technology, Atlanta, GA 30332, USA.
42
+ 1
43
+ arXiv:2301.13254v1 [cs.CV] 30 Jan 2023
44
+
45
+ The contributions of this paper are as follows: first, we develop a novel safety mapping paradigm
46
+ that leverages Bayesian deep learning techniques to predict landing safety directly from monoc-
47
+ ular images; second, we construct a dataset of real monocular images and corresponding land-
48
+ ing safety maps that conform to realistic landing parameters for training and testing our mod-
49
+ els; third, we demonstrate precise and accurate safety mapping performance on real imagery of
50
+ prospective sample sites from the recent OSIRIS-REx mission to Asteroid 101955 Bennu. Our
51
+ code, data, and trained models will be made available to the public at https://github.com/
52
+ travisdriver/deep_monocular_hd.
53
+ RELATED WORK
54
+ Current hazard detection methodologies for small body missions rely on high-fidelity digital el-
55
+ evation maps (DEMs) derived from digital terrain models (DTMs), local topography and albedo
56
+ maps.1 However, DTM construction typically involves extensive human-in-the-loop verification
57
+ and carefully designed image acquisition plans to achieve optimal results.2,3 Consequently, au-
58
+ tonomous hazard detection and avoidance (HD&A) has been identified as a high-priority technol-
59
+ ogy9 to promote and enable new mission concepts to near-earth asteroids, comets, the Moon, Mars,
60
+ and beyond.
61
+ The Autonomous Landing Hazard Avoidance Technology (ALHAT)10,11 program was launched
62
+ in 2005, followed by the Safe & Precise Landing—Integrated Capabilities Evolution (SPLICE)
63
+ program12 in 2018, in order to develop autonomous landing technologies. These programs have fo-
64
+ cused on developing HD&A algorithms that operate on DEMs generated from range measurements
65
+ acquired by active sensors such as flash LiDARs. However, these methods are constrained by the
66
+ relatively small effective operating range and the increased size, weight, and power (SWaP) require-
67
+ ments of LiDARs relative to passive sensors such as monocular cameras. Indeed, the OSIRIS-REx
68
+ Guidance, Navigation, and Control (GNC) flash LiDAR had a maximum operational range of ap-
69
+ proximately 1 km,13,14 while preliminary testing of the Hazard Detection LiDAR of the SPLICE
70
+ program demonstrated a 5 cm ground sample distance at 500 meters and near-nadir pointing.12
71
+ Conversely, the OSIRIS-REx Camera Suite (OCAMS)15 was able to acquire 5 cm GSD images
72
+ at almost 4 km, providing higher-resolution measurements earlier in the mission than the active
73
+ sensors onboard and allowing for detailed surface characterization during the early phases of the
74
+ mission.6 Moreover, constructing a DEM from LiDAR scans is non-trivial and requires accurate
75
+ range measurements and precise knowledge of the spacecraft’s relative pose to the landing plane.
76
+ Instead, we focus on estimating landing safety directly from a single monocular image.
77
+ Safety mapping methodologies that leverage deep learning have demonstrated potential to im-
78
+ prove hazard detection accuracy and have also been shown to offer competitive runtimes on flight
79
+ relevant hardware.16 Previous works have leveraged deep semantic segmentation to classify safe
80
+ and unsafe landing locations from high-resolution DEMs. Moghe and Zanetti4 leverage a deep neu-
81
+ ral network architecture for predicting safety maps from a DEM and design a novel loss function
82
+ specifically designed to decrease the false safe rate and encourage more precise safe predictions.
83
+ Tomita et al.5 employ a Bayesian SegNet architecture17 for segmentation of input DEMs into safe
84
+ and unsafe landing locations. The Bayesian architecture implemented by Tomita et al.5 enables
85
+ uncertainty quantification of the predicted safety map through the predictive entropy of the model,
86
+ allowing for more precise predictions through global thresholding with respect to this uncertainty
87
+ measure. We build upon this work and demonstrate its efficacy on monocular imagery.
88
+ Methods based on deep learning have also been developed for surface segmentation from monoc-
89
+ 2
90
+
91
+ ular imagery. Pugliatti and Maestrini7 employ a custom U-Net architecture for classification of
92
+ surface landmarks, i.e., boulders and crater rims. Caroselli et al.8 apply deep semantic segmen-
93
+ tation to boulder detection on synthetic images of a fabricated small body model and post-process
94
+ the network prediction to derive a landing safety map based on boulder density. Conversely, we
95
+ apply our models to real images and directly predict safety maps that conform to realistic landing
96
+ parameters and constraints.
97
+ PROPOSED APPROACH
98
+ Our novel safety mapping paradigm leverages Bayesian deep learning techniques to develop an
99
+ uncertainty-aware semantic segmentation model to predict safety maps from monocular imagery.
100
+ We train and test our model on real in-situ imagery from the OSIRIS-REx mission to asteroid
101
+ 101955 Bennu with corresponding ground truth safety maps generated using realistic landing pa-
102
+ rameters and constraints.
103
+ Bayesian Deep Learning
104
+ Given training input data X = {x1, . . . , xN} with corresponding labels Y = {y1, . . . , yN},
105
+ Bayesian deep learning employs Bayesian inference to maximize the posterior distribution of the
106
+ network parameters θ given the training data X, Y:
107
+ p(θ | X, Y) = p(Y | X, θ)p(θ)
108
+ p(Y | X)
109
+ .
110
+ (1)
111
+ The distribution above can then be used to predict the likelihood of an output y∗ for a new input x∗
112
+ via
113
+ p(y∗ | x∗, X, Y) = Ep(θ | X,Y)[p(y∗ | x∗, θ)],
114
+ (2)
115
+ where we may assume a softmax likelihood for p(y∗ | x∗, θ). However, computing p(θ | X, Y) is
116
+ intractable and must be approximated using variational inference.
117
+ Gal and Ghahramani18,19 showed that training a deep convolutional neural network (CNN) with
118
+ dropout layers is equivalent to approximate variational inference with a variational distribution q(θ)
119
+ which imposes a Bernoulli distribution over the model weights. Specifically, consider a convolu-
120
+ tional layer i with ci−1 input channels, ci output channels, and kernel size k. Then dropout can be
121
+ viewed as imposing a distribution over the layer weights Wi according to
122
+ Wi = Mi diag([ϵj]ci
123
+ j=1),
124
+ ϵj ∼ Bern(pj),
125
+ (3)
126
+ where ϵj are Bernoulli distributed random variables with parameter pj (which we take to be 0.5),
127
+ and Mi ∈ Rci−1×k×k×ci are the variational weight parameters optimized during training. Therefore,
128
+ Equation (2) may be approximated by
129
+ p(y∗ | x∗, X, Y) ≈ Eq(θ)[p(y∗ | x∗, θ)].
130
+ (4)
131
+ Finally, employing dropout at test time permits the use of the predictive entropy approximated
132
+ through T stochastic forward passes through the network as a measure of uncertainty:20
133
+ H[y | x, X, Y] ≈ −
134
+ d
135
+
136
+ k=1
137
+
138
+ 1
139
+ T
140
+ T
141
+
142
+ t=1
143
+ p(y = k | x, θt)
144
+
145
+ log
146
+
147
+ 1
148
+ T
149
+ T
150
+
151
+ t=1
152
+ p(y = k | x, θt)
153
+
154
+ ,
155
+ (5)
156
+ 3
157
+
158
+ CFF
159
+ (1/2)
160
+ CFF
161
+ Entropy
162
+ Mean
163
+ Stochastic dropout
164
+ samples
165
+ Uncertainty
166
+ Safety map
167
+ 32
168
+ 32
169
+ 64
170
+ 128
171
+ 2
172
+ 64
173
+ 128
174
+ 256
175
+ 128
176
+ 1024
177
+ CFF
178
+ Conv + BN + ReLU
179
+ Dropout
180
+ Max Pool
181
+ Pyramid Pool
182
+ (1/4)
183
+ (1/8)
184
+ (1/16)
185
+ Bilinear downsampling
186
+ (1/32)
187
+ 256
188
+ 256
189
+ 2x Bilinear Upsample
190
+ Cascade Feature Fusion
191
+ (1/2)
192
+ (1/4)
193
+ (1/4)
194
+ (1/2)
195
+ (1)
196
+ Figure 1: Bayesian ICNet architecture. Multiscale fusion is conducted within the cascade feature
197
+ fusion (CFF)21 modules. The ratio in parentheses denotes the relative magnitude of the spatial
198
+ dimensions with respect to the original image.
199
+ where θt corresponds to a realization of the network parameters, distributed according to q(θ),
200
+ sampled during a forward pass through the network, and the average over the forward passes is
201
+ taken to be the final prediction probabilities. This process is referred to as Monte Carlo (MC)
202
+ dropout.18,19 For the task of semantic segmentation, assume x is a tuple (X, u) containing an
203
+ image tensor X ∈ Rh×w×c and an image coordinate u ∈ R2, and k ∈ {1, . . . , d} is a pixel-wise
204
+ class label for the pixel located at u. We will demonstrate that leveraging this uncertainty measure
205
+ for our network predictions leads to increased precision and accuracy of safe landing locations.
206
+ Uncertainty-Aware Semantic Segmentation
207
+ We leverage an uncertainty-aware semantic segmentation architecture based on the image cas-
208
+ cade network (ICNet),21 shown in Figure 1. ICNet is a highly efficient segmentation architecture
209
+ that blends coarse prediction maps obtained from down-sampled inputs with high-resolution feature
210
+ maps obtained from high throughput networks that operate on the full-resolution image, allowing
211
+ for fast inference on high-resolution images while maintaining accuracy. Multiscale feature map
212
+ fusion is conducted by the cascade feature fusion (CFF) modules, whereby a reduced-resolution
213
+ segmentation map is computed from the two multiscale feature map inputs. The multiscale predic-
214
+ tions are used to train the network via a weighted softmax cross-entropy loss.21
215
+ We implement a Bayesian version of ICNet, which we denote as BICNet, where dropout layers
216
+ are added to allow for stochastic sampling with respect to the model parameters using techniques
217
+ from Bayesian deep learning, i.e., MC dropout, as described in the previous subsection. Ideally, a
218
+ Bayesian NN would feature a dropout layer after every hidden layer of the network.18,19 However,
219
+ as observed in previous works,17,20 adding dropout layers after every convolutional layer in more
220
+ complex networks is too strong of a regularizer, resulting in underfitting. Therefore, we follow the
221
+ 4
222
+
223
+ 00(a) Global shape model
224
+ Nightingale
225
+ Osprey
226
+ Kingfisher
227
+ Sandpiper
228
+ (b) DTM (left) and reconnaissance imagery (right) for each tag site
229
+ Figure 2: OSIRIS-REx TAG site datasets. TAG site locations are indicated by the corresponding
230
+ color in the global shape model.
231
+ work of Mukhoti et al.20 and Kendall and Cippola17 and only insert dropout layers after the central
232
+ encoder and decoder layers. At test time, we perform T = 8 stochastic forward passes and use the
233
+ predictive entropy, defined in Equation (5), as a measure of uncertainty, and use the average of this
234
+ measure over all training instances as a threshold to mask out high uncertainty regions in the image.
235
+ Data Generation
236
+ High-fidelity DTMs (i.e., 5 cm ground sample distance) of the four prospective Touch-And-Go
237
+ (TAG) sample sites developed as part of the OSIRIS-REx mission to Asteroid 101955 Bennu, i.e.,
238
+ Nightingale, Kingfisher, Osprey, and Sandpiper, were used to generate ground truth safety map
239
+ labels for reconnaissance imagery from the mission. Specifically, we leverage monocular recon-
240
+ naissance imagery and the corresponding camera pose labels, relative to a body fixed frame of the
241
+ asteroid, provided through the AstroVision dataset.22 For each image, DEMs are constructed by
242
+ transforming the DTM into a local coordinate system in which the +z-axis points opposite the
243
+ vector corresponding to the direction of the gravitational force due to the target body at the point
244
+ on the surface closest to the center of the image. The gravity due to body was computed using a
245
+ global shape model of Bennu23 and assuming a constant-denity polyhedron.24 Safety mapping was
246
+ conducted on the DEM and then projected back into the image to produce pixel-wise landing safety
247
+ labels. Example reconnaissance images for each prospective TAG site are provided in Figure 2.
248
+ Landing safety was computed from the DEMs using the method developed by the Autonomous
249
+ Landing Hazard Avoidance Technology (ALHAT) project.25 The ALHAT method evaluates the
250
+ lander contact locations for all pixels and for all orientations to assess the worst-case surface slope
251
+ and roughness values with respect to the surface elevation data contained in the ground truth DEMs.
252
+ Specifically, a landing plane is computed for each pixel by assessing the elevation of four evenly
253
+ spaced contact points, emulating lander foot pads, on the perimeter of a circle specified by the di-
254
+ ameter of the lander. Slope is defined as the largest angle between the landing plane and x-y plane
255
+ of the ground truth DEM for all orientations, and the roughness is the largest perpendicular distance
256
+ to the terrain above the the landing plane for all orientations. Any pixel with slope and roughness
257
+ exceeding a given threshold is labeled as unsafe, where we chose a threshold of 30◦ for slope and 3.5
258
+ cm for roughness. We specify a lander with a 35 cm diameter, similar to the MASCOT (Mobile As-
259
+ teroid surface SCOuT) lander that was deployed during the Hayabusa2 mission to Asteroid 162173
260
+ 5
261
+
262
+ (a) Image
263
+ 20
264
+ 40
265
+ 60
266
+ 80
267
+ Slope ( )
268
+ (b) Slope
269
+ 0.0
270
+ 0.1
271
+ 0.2
272
+ 0.3
273
+ 0.4
274
+ 0.5
275
+ Roughness (m)
276
+ (c) Roughness
277
+ (d) Slope & Roughness Safety Map
278
+ (e) Roughness-only Safety Map
279
+ Figure 3: Ground truth safety map example. Safe and unsafe regions are drawn in green and red,
280
+ respectively, in the safety map.
281
+ Ryugu.26 An example safety map along with its corresponding monocular image is provided in
282
+ Figure 3.
283
+ Moreover, we provide the data distributions of our datasets with respect to the ground sample
284
+ distance, imaging depth, viewing angle, and visibility ratio in Figure 4. Ground sample distance
285
+ (GSD) measures the average distance on the surface spanned by a single pixel, which is a function
286
+ of the distance to the surface and the camera intrinsics, as landing safety becomes increasingly
287
+ difficult to observe as the relative size of the lander in the image decreases. The imaging depth
288
+ measures the average distance to the surface when the image was taken, and provides context for
289
+ the GSD values. Specifically, the MapCam of the OSIRIS-REx Camera Suite (OCAMS),15 with
290
+ a focal length of ∼125 mm, can provide 5 cm GSD measuresments of the surface at distances
291
+ of approximately 1 km, while the PolyCam, with a focal length of ∼620 mm, provides the same
292
+ resolution at distances of almost 4 km. Viewing angle measures the angle between the −z-axis of
293
+ the ground truth DEM and the camera boresight. Finally, the visibility ratio is the ratio of visible
294
+ (i.e., not occluded by shadows) pixels to total pixels in the image and provides a measure of the
295
+ illumination conditions in the image.
296
+ 6
297
+
298
+ +PolyCam
299
+ MapCam
300
+ SamCam
301
+ Figure 4: Data distributions with respect to imaging depth, GSD, viewing angle, and visibility
302
+ ratio. Our dataset features a total of 770 images annotated with per-pixel safety labels: 133 of
303
+ Kingfisher, 342 of Nightingale, 162 of Osprey, and 91 of Sandpiper, and 42 from the TAG sample
304
+ collection event at Nightingale.
305
+ RESULTS
306
+ In this section, we first present our suite of metrics used to evaluate the performance of our
307
+ approach. We then validate our approach on two different experiments using real images from the
308
+ OSIRIS-REx mission to Asteroid 101955 Bennu, including images captured during the actual TAG
309
+ sample collection event.
310
+ Metric Definitions
311
+ We measure the quality of the predicted per-pixel safety map labels of our model with respect to
312
+ precision, sensitivity, accuracy, and mean intersection over union (mIoU):
313
+ precision =
314
+ true safe
315
+ true safe + false safe,
316
+ (6)
317
+ 7
318
+
319
+ Table 1: Overall performance for the Sandpiper landing site experiment. The values in paren-
320
+ theses are the metrics with shadowed pixels ignored. All reported values are percentages.
321
+ METHOD
322
+ PRECISION
323
+ SENSITIVITY
324
+ ACCURACY
325
+ MIOU
326
+ SLOPE & ROUGHNESS
327
+ WITHOUT UNCERTAINTY
328
+ 60.66 (62.91)
329
+ 67.21 (70.05)
330
+ 69.53 (69.41)
331
+ 52.05 (52.27)
332
+ WITH UNCERTAINTY
333
+ 76.98 (77.67)
334
+ 20.09 (21.86)
335
+ 82.29 (82.01)
336
+ 65.76 (65.93)
337
+ ROUGHNESS ONLY
338
+ WITHOUT UNCERTAINTY
339
+ 77.24 (78.92)
340
+ 61.61 (63.66)
341
+ 63.53 (64.41)
342
+ 44.87 (45.31)
343
+ WITH UNCERTAINTY
344
+ 85.71 (86.32)
345
+ 28.78 (31.63)
346
+ 73.77 (73.93)
347
+ 55.11 (54.98)
348
+ sensitivity =
349
+ true safe
350
+ true safe + false unsafe,
351
+ (7)
352
+ accuracy = true safe + true unsafe
353
+ valid pixels
354
+ ,
355
+ (8)
356
+ mIoU = 1
357
+ 2
358
+
359
+ true safe
360
+ valid pixels − true unsafe +
361
+ true unsafe
362
+ valid pixels − true safe
363
+
364
+ .
365
+ (9)
366
+ True safe (false safe) includes pixels predicted to be safe by our models that are safe (unsafe) in
367
+ the ground truth labels, and true unsafe (false unsafe) includes pixels predicted to be unsafe that
368
+ are unsafe (safe) in the ground truth labels. Note that false unsafe includes safe pixels that are
369
+ ignored and not labeled safe due to high uncertainty. For our application, we can interpret precision
370
+ as the reliability of the pixels predicted to be safe, and sensitivity as detection rate of true safe
371
+ sites, respectively. Accuracy and mIoU are the metrics evaluated for the valid pixels, which are
372
+ the pixels with smaller uncertainty than the threshold. In other words, valid pixels correspond
373
+ to the predictions that the network is most “certain” about. For the results without uncertainty
374
+ thresholding, accuracy and mIoU are evaluated for all the pixels with valid safety labels. In the
375
+ following analysis, we refer to the ratio of pixels that fall above our uncertainty threshold, and
376
+ consequently marked as unsafe, to valid pixels as the screening rate.
377
+ Experiment 1: Prospective Landing Site Sandpiper
378
+ We train our model on images from three of the prospective landing sites from the OSIRIS-
379
+ Rex mission, namely, Nightingale, Osprey, and Kingfisher, and test our model on images of the
380
+ remaining sample site, Sandpiper. This emulates a scenario in which data from previously mapped
381
+ landing sites could be used to train a network to predict landing safety in a new, unexplored region of
382
+ the target body without requiring the construction of high-fidelity DEMs. These results are detailed
383
+ in Table 1, and qualitative examples are provided in Figure 5, where we consider performance with
384
+ respect to identifying both slope and roughness hazards and roughness-only hazards.
385
+ The results illustrate that our models are able to predict safety maps from just a single monocular
386
+ image of the propspective landing site, which is completely unseen during training, with accuracy
387
+ over 69% for the slope and roughness hazard detection case, and over 63% for the roughness-only
388
+ 8
389
+
390
+ 0.1
391
+ 0.2
392
+ 0.3
393
+ 0.4
394
+ 0.5
395
+ 0.6
396
+ Uncertainty
397
+ 0.1
398
+ 0.2
399
+ 0.3
400
+ 0.4
401
+ 0.5
402
+ 0.6
403
+ Uncertainty
404
+ 0.1
405
+ 0.2
406
+ 0.3
407
+ 0.4
408
+ 0.5
409
+ 0.6
410
+ Uncertainty
411
+ (a) Slope & roughness
412
+ 0.1
413
+ 0.2
414
+ 0.3
415
+ 0.4
416
+ 0.5
417
+ 0.6
418
+ Uncertainty
419
+ 0.1
420
+ 0.2
421
+ 0.3
422
+ 0.4
423
+ 0.5
424
+ 0.6
425
+ Uncertainty
426
+ 0.1
427
+ 0.2
428
+ 0.3
429
+ 0.4
430
+ 0.5
431
+ 0.6
432
+ Uncertainty
433
+ Test Image
434
+ Without Uncertainty
435
+ With Uncertainty
436
+ Uncertainty
437
+ (b) Roughness-only
438
+ Figure 5: Qualitative monocular safety mapping results for the Sandpiper experiment. Green,
439
+ yellow, blue, and red labels represent true safe, true unsafe, false unsafe, and false safe, respectively.
440
+ 9
441
+
442
+ hazard detection case, even without uncertainty thresholding. Moreover, our Bayesian ICNet archi-
443
+ tecture enables uncertainty thresholding in order to further boost performance by ignoring regions in
444
+ which the models’ prediction has high entropy. With the uncertainty threshold, accuracy increases
445
+ to 82.29% and 73.77% for the slope and roughness and roughness-only cases, respectively, at the
446
+ cost of decreased sensitivity. Importantly, we are able to achieve 76.98% and 85.71% precision for
447
+ the slope and roughness and roughness-only cases, respectively, after uncertainty thresholding. We
448
+ also have a slight increase in all the metrics by ignoring shadowed pixels, which are reported in
449
+ parentheses in Table 1.
450
+ Comparing the two different hazard detection tasks, i.e., slope and roughness hazards and roughness-
451
+ only hazards, the roughness-only case has lower values of sensitivity, accuracy, and mIoU, but
452
+ higher values of precision. This suggests that the roughness-only case is a harder task in terms of
453
+ precisely labeling safe and unsafe pixels on average, resulting in lower accuracy and mIoU, but is
454
+ an easier task in terms of identifying only safe pixels, thus resulting in higher precision. This is
455
+ partially due to the higher incidence of safe pixels for the roughness-only case as compared to the
456
+ slope and roughness case, as illustrated in Figure 3.
457
+ Additionally, we analyzed the per-image metrics with respect to GSD, viewing angle, and visibil-
458
+ ity ratio for the slope and roughness case, shown in Figure 6, and the roughness-only case, shown in
459
+ Figure 7, in order to identify possible causes of uncertainty in the predictions. As a general trend, we
460
+ can observe that a higher uncertainty results in lower performance metrics of precision, sensitivity,
461
+ accuracy, and mIoU. Intuitively, low visibility is a common factor that results in higher uncertainty
462
+ in our model for both the slope and roughness case and the roughness-only case. Our models as-
463
+ sign a higher uncertainty to images with larger GSD for the slope and roughness case, and larger
464
+ viewing angle for the roughness-only case. Note that increased uncertainty for images at higher
465
+ GSDs may also be due to these instances being less represented in the training data as shown in
466
+ Figure 4. In either case, we demonstrate that the uncertainty threshold serves as a powerful tool for
467
+ detecting and accounting for difficult or out-of-distribution input conditions, allowing our models
468
+ to predict precise and accurate safety maps across multiple GSDs, viewing angles, and illumination
469
+ conditions.
470
+ Experiment 2: OSIRIS-REx TAG Sequence
471
+ For the second experiment, we trained two models using different combinations of images from
472
+ the OSIRIS-REx mission: one model, denoted by BICNet-NKO, is trained on Nightingale, King-
473
+ fisher, and Osprey, and the other model, denoted by BICNet-KOS, is trained on Kingfisher, Osprey,
474
+ and Sandpiper. These models were trained for the slope and roughness case only. We tested the two
475
+ models on images captured during the TAG sample collection event at the Nightingale sample site.
476
+ We present both models to illustrate the effect of the different training data distributions on the test
477
+ results. A subset of the 42 image sequence is shown in Figure 8. Note that the 42 test images are
478
+ not included in the training set for the Nightingale images.
479
+ Table 2 and Figure 10 show quantitative results and qualitative examples, respectively. Compar-
480
+ ing BICNet-NKO and BICNet-KOS in Table 2, we can see sensitivity of BICNet-KOS is signifi-
481
+ cantly lower than that of BICNet-NKO after uncertainty thresholding. Indeed, BICNet-KOS assigns
482
+ a high uncertainty to almost all regions of the input images and are thus overwritten as unsafe after
483
+ uncertainty thresholding, as shown in Figure 10, which is not the case for BICNet-NKO. These
484
+ differences are most likely explained by the difference between the training and testing data distri-
485
+ butions for BICNet-KOS, as illustrated in Figure 4. Specifially, the TAG images have less overlap
486
+ 10
487
+
488
+ 0.6
489
+ 0.8
490
+ Precision
491
+ 0.02
492
+ 0.03
493
+ 0.04
494
+ 0.05
495
+ 0.06
496
+ GSD (m/pixel)
497
+ 0.0
498
+ 0.2
499
+ 0.4
500
+ Sensitivity
501
+ 0.6
502
+ 0.8
503
+ Accuracy
504
+ uncertainty
505
+ 0.44
506
+ 0.48
507
+ 0.52
508
+ 0.56
509
+ 0.60
510
+ 0.4
511
+ 0.6
512
+ 0.8
513
+ IoU
514
+ 0.02
515
+ 0.03
516
+ 0.04
517
+ 0.05
518
+ 0.06
519
+ GSD (m/pixel)
520
+ 0.45
521
+ 0.50
522
+ 0.55
523
+ 0.60
524
+ Uncertainty
525
+ 0.6
526
+ 0.7
527
+ 0.8
528
+ 0.9
529
+ Screen Rate
530
+ 0.6
531
+ 0.8
532
+ Precision
533
+ 10
534
+ 20
535
+ 30
536
+ 40
537
+ 50
538
+ Viewing Angle ( )
539
+ 0.0
540
+ 0.2
541
+ 0.4
542
+ Sensitivity
543
+ 0.6
544
+ 0.8
545
+ Accuracy
546
+ uncertainty
547
+ 0.44
548
+ 0.48
549
+ 0.52
550
+ 0.56
551
+ 0.60
552
+ 0.4
553
+ 0.6
554
+ 0.8
555
+ IoU
556
+ 10
557
+ 20
558
+ 30
559
+ 40
560
+ 50
561
+ Viewing Angle ( )
562
+ 0.45
563
+ 0.50
564
+ 0.55
565
+ 0.60
566
+ Uncertainty
567
+ 0.6
568
+ 0.7
569
+ 0.8
570
+ 0.9
571
+ Screen Rate
572
+ 0.6
573
+ 0.8
574
+ Precision
575
+ 0.4
576
+ 0.6
577
+ 0.8
578
+ Visibility Ratio
579
+ 0.0
580
+ 0.2
581
+ 0.4
582
+ Sensitivity
583
+ 0.6
584
+ 0.8
585
+ Accuracy
586
+ uncertainty
587
+ 0.44
588
+ 0.48
589
+ 0.52
590
+ 0.56
591
+ 0.60
592
+ 0.4
593
+ 0.6
594
+ 0.8
595
+ IoU
596
+ 0.4
597
+ 0.6
598
+ 0.8
599
+ Visibility Ratio
600
+ 0.45
601
+ 0.50
602
+ 0.55
603
+ 0.60
604
+ Uncertainty
605
+ 0.6
606
+ 0.7
607
+ 0.8
608
+ 0.9
609
+ Screen Rate
610
+ Figure 6: Per-image metrics for slope & roughness safety on the Sandpiper experiment with
611
+ respect to GSD, viewing angle, and visibility ratio.
612
+ 11
613
+
614
+ 0.7
615
+ 0.8
616
+ 0.9
617
+ Precision
618
+ 0.02
619
+ 0.03
620
+ 0.04
621
+ 0.05
622
+ 0.06
623
+ GSD (m/pixel)
624
+ 0.0
625
+ 0.2
626
+ 0.4
627
+ 0.6
628
+ Sensitivity
629
+ 0.5
630
+ 0.6
631
+ 0.7
632
+ 0.8
633
+ Accuracy
634
+ uncertainty
635
+ 0.40
636
+ 0.44
637
+ 0.48
638
+ 0.52
639
+ 0.56
640
+ 0.60
641
+ 0.3
642
+ 0.4
643
+ 0.5
644
+ 0.6
645
+ 0.7
646
+ IoU
647
+ 0.02
648
+ 0.03
649
+ 0.04
650
+ 0.05
651
+ 0.06
652
+ GSD (m/pixel)
653
+ 0.40
654
+ 0.45
655
+ 0.50
656
+ 0.55
657
+ 0.60
658
+ Uncertainty
659
+ 0.4
660
+ 0.6
661
+ 0.8
662
+ Screen Rate
663
+ 0.7
664
+ 0.8
665
+ 0.9
666
+ Precision
667
+ 10
668
+ 20
669
+ 30
670
+ 40
671
+ 50
672
+ Viewing Angle ( )
673
+ 0.0
674
+ 0.2
675
+ 0.4
676
+ 0.6
677
+ Sensitivity
678
+ 0.5
679
+ 0.6
680
+ 0.7
681
+ 0.8
682
+ Accuracy
683
+ uncertainty
684
+ 0.40
685
+ 0.44
686
+ 0.48
687
+ 0.52
688
+ 0.56
689
+ 0.60
690
+ 0.3
691
+ 0.4
692
+ 0.5
693
+ 0.6
694
+ 0.7
695
+ IoU
696
+ 10
697
+ 20
698
+ 30
699
+ 40
700
+ 50
701
+ Viewing Angle ( )
702
+ 0.40
703
+ 0.45
704
+ 0.50
705
+ 0.55
706
+ 0.60
707
+ Uncertainty
708
+ 0.4
709
+ 0.6
710
+ 0.8
711
+ Screen Rate
712
+ 0.7
713
+ 0.8
714
+ 0.9
715
+ Precision
716
+ 0.4
717
+ 0.6
718
+ 0.8
719
+ Visibility Ratio
720
+ 0.0
721
+ 0.2
722
+ 0.4
723
+ 0.6
724
+ Sensitivity
725
+ 0.5
726
+ 0.6
727
+ 0.7
728
+ 0.8
729
+ Accuracy
730
+ uncertainty
731
+ 0.40
732
+ 0.44
733
+ 0.48
734
+ 0.52
735
+ 0.56
736
+ 0.60
737
+ 0.3
738
+ 0.4
739
+ 0.5
740
+ 0.6
741
+ 0.7
742
+ IoU
743
+ 0.4
744
+ 0.6
745
+ 0.8
746
+ Visibility Ratio
747
+ 0.40
748
+ 0.45
749
+ 0.50
750
+ 0.55
751
+ 0.60
752
+ Uncertainty
753
+ 0.4
754
+ 0.6
755
+ 0.8
756
+ Screen Rate
757
+ Figure 7: Per-image metrics for roughness-only safety on the Sandpiper experiment with re-
758
+ spect to GSD, viewing angle, and visibility ratio.
759
+ 12
760
+
761
+ 2020-10-20T21:30:48
762
+ 2020-10-20T21:31:48
763
+ 2020-10-20T21:32:48
764
+ 2020-10-20T21:33:48
765
+ 2020-10-20T21:34:48
766
+ 2020-10-20T21:35:48
767
+ 2020-10-20T21:36:48
768
+ 2020-10-20T21:37:48
769
+ 2020-10-20T21:38:48
770
+ 2020-10-20T21:39:48
771
+ 2020-10-20T21:40:48
772
+ 2020-10-20T21:41:48
773
+ Figure 8: Frames from the OSIRIS-Rex TAG sequence captured by the SamCam.
774
+ with the images of the prospective landing sites except for Nightingale with respect to viewing angle
775
+ and visibility ratio. Therefore, the exclusion of Nightingale from training data increases the predic-
776
+ tive uncertainty for TAG images at test time for BICNet-KOS. Note that the Nightingale images
777
+ (excluding the TAG images) were used for validation during training for the BICNet-KOS model in
778
+ order to rule out overfitting as a cause for the decreased prediction performance.
779
+ This effect of training data distributions on the uncertainty level, and the accompanying predictive
780
+ performance, is consistent with the per-image metrics with respect to GSD, as shown in Figure 9.
781
+ Indeed, for BICNet-NKO, as the GSD of testing images gets closer to the peak of the training data,
782
+ the predictive performance increases and uncertainty decreases. Lower precision for the higher
783
+ GSD images is also partly due to the very low incidence of safe regions for these instances (see
784
+ Figure 10). Conversely, for BICNet-KOS, all test images have a high screening rate and a low
785
+ sensitivity due to the high uncertainty, purportedly due to the out-of-distribution training data with
786
+ respect to the viewing angle and visibility ratio and the relatively small size of the training set (386
787
+ images). We do not provide the per-image metrics with respect to the viewing angle and visibility
788
+ ratio, as these values remain relatively constant over the entire TAG sequence at ∼7◦ and ∼71%,
789
+ respectively, as shown in Figure 4. These results illustrate the effect of training data distributions
790
+ and the ability of the uncertainty measure to identify out-of-distribution data for uncertainty-aware
791
+ segmentation networks. We postulate that training our model with a more comprehensive set of
792
+ images will decrease prediction uncertainty and increase the performance.
793
+ CONCLUSION
794
+ In this paper we presented a novel landing hazard detection approach for small body missions that
795
+ predicts safety maps directly from monocular imagery. We implemented an efficient, uncertainty-
796
+ aware segmentation network that demonstrated hazard detection performance at over 80% accuracy
797
+ and over 85% precision on real images of unseen landing sites captured during the OSIRIS-REx
798
+ mission to Asteroid 101955 Bennu. We believe that monocular safety mapping is a promising
799
+ technology for reducing reliance on human-in-the-loop procedures used in current safety mapping
800
+ methodologies. Future work will involve developing a more comprehensive distribution of training
801
+ data and identifying and rectifying causes of uncertainty to increase the reliability of the proposed
802
+ 13
803
+
804
+ 0.4
805
+ 0.6
806
+ 0.8
807
+ Precision
808
+ 0.015
809
+ 0.020
810
+ 0.025
811
+ 0.030
812
+ 0.035
813
+ 0.040
814
+ 0.045
815
+ GSD (m/pixel)
816
+ 0.2
817
+ 0.4
818
+ 0.6
819
+ Sensitivity
820
+ 0.7
821
+ 0.8
822
+ 0.9
823
+ Accuracy
824
+ uncertainty
825
+ 0.38
826
+ 0.40
827
+ 0.42
828
+ 0.44
829
+ 0.46
830
+ 0.5
831
+ 0.6
832
+ 0.7
833
+ 0.8
834
+ IoU
835
+ 0.015
836
+ 0.020
837
+ 0.025
838
+ 0.030
839
+ 0.035
840
+ 0.040
841
+ 0.045
842
+ GSD (m/pixel)
843
+ 0.375
844
+ 0.400
845
+ 0.425
846
+ 0.450
847
+ 0.475
848
+ Uncertainty
849
+ 0.5
850
+ 0.6
851
+ Screen Rate
852
+ (a) BICNet-NKO
853
+ 0.5
854
+ 0.6
855
+ 0.7
856
+ 0.8
857
+ Precision
858
+ 0.015
859
+ 0.020
860
+ 0.025
861
+ 0.030
862
+ 0.035
863
+ 0.040
864
+ 0.045
865
+ GSD (m/pixel)
866
+ 0.00
867
+ 0.02
868
+ 0.04
869
+ 0.06
870
+ 0.08
871
+ Sensitivity
872
+ 0.75
873
+ 0.80
874
+ 0.85
875
+ Accuracy
876
+ uncertainty
877
+ 0.49
878
+ 0.50
879
+ 0.51
880
+ 0.52
881
+ 0.53
882
+ 0.5
883
+ 0.6
884
+ IoU
885
+ 0.015
886
+ 0.020
887
+ 0.025
888
+ 0.030
889
+ 0.035
890
+ 0.040
891
+ 0.045
892
+ GSD (m/pixel)
893
+ 0.50
894
+ 0.52
895
+ Uncertainty
896
+ 0.65
897
+ 0.70
898
+ 0.75
899
+ 0.80
900
+ Screen Rate
901
+ (b) BICNet-KOS
902
+ Figure 9: Per-image metrics for the TAG experiment with respect to the GSD for slope &
903
+ roughness safety.
904
+ 14
905
+
906
+ 0.1
907
+ 0.2
908
+ 0.3
909
+ 0.4
910
+ 0.5
911
+ 0.6
912
+ Uncertainty
913
+ 0.1
914
+ 0.2
915
+ 0.3
916
+ 0.4
917
+ 0.5
918
+ 0.6
919
+ Uncertainty
920
+ 0.1
921
+ 0.2
922
+ 0.3
923
+ 0.4
924
+ 0.5
925
+ 0.6
926
+ Uncertainty
927
+ (a) BICNet-NKO
928
+ 0.1
929
+ 0.2
930
+ 0.3
931
+ 0.4
932
+ 0.5
933
+ 0.6
934
+ Uncertainty
935
+ 0.1
936
+ 0.2
937
+ 0.3
938
+ 0.4
939
+ 0.5
940
+ 0.6
941
+ Uncertainty
942
+ 0.1
943
+ 0.2
944
+ 0.3
945
+ 0.4
946
+ 0.5
947
+ 0.6
948
+ Uncertainty
949
+ Test Image
950
+ Without Uncertainty
951
+ With Uncertainty
952
+ Uncertainty
953
+ (b) BICNet-KOS
954
+ Figure 10: Qualitative monocular safety mapping results for the TAG experiment. Green,
955
+ yellow, blue, and red labels represent true safe, true unsafe, false unsafe, and false safe, respectively.
956
+ 15
957
+
958
+ Table 2: Overall performance for the TAG experiment for slope & roughness safety. BICNet-
959
+ NKO is our Bayesian ICNet model trained on Nightingale, Kingfisher, and Osprey, and BICNet-
960
+ KOS is trained on Kingfisher, Osprey, and Sandpiper. All reported values are percentages.
961
+ METHOD
962
+ PRECISION
963
+ SENSITIVITY
964
+ ACCURACY
965
+ MIOU
966
+ BICNET-NKO
967
+ WITHOUT UNCERTAINTY
968
+ 49.02 (50.21)
969
+ 61.16 (66.53)
970
+ 67.44 (67.09)
971
+ 48.65 (48.66)
972
+ WITH UNCERTAINTY
973
+ 61.38 (61.66)
974
+ 26.60 (30.80)
975
+ 78.62 (77.09)
976
+ 60.04 (59.23)
977
+ BICNET-KOS
978
+ WITHOUT UNCERTAINTY
979
+ 50.08 (50.42)
980
+ 42.18 (50.37)
981
+ 67.24 (65.32)
982
+ 45.48 (45.11)
983
+ WITH UNCERTAINTY
984
+ 65.05 (64.89)
985
+ 2.87 (4.05)
986
+ 83.11 (82.65)
987
+ 52.58 (55.87)
988
+ approach. Our code, data, and trained models will be made available to the public at https:
989
+ //github.com/travisdriver/deep_monocular_hd.
990
+ ACKNOWLEDGMENTS
991
+ This work supported by a NASA Space Technology Graduate Research Opportunity and the
992
+ NASA Early Career Faculty Program (grant no. 80NSSC20K0064). The authors would like to
993
+ thank Kenneth Getzandanner and Michael Shoemaker from NASA Goddard Space Flight Center
994
+ for several helpful discussions and comments.
995
+ REFERENCES
996
+ [1] K. Berry, K. M. Getzandanner, M. C. Moreau, S. M. Rieger, P. G. Antreasian, C. D. Adam, D. Wibben,
997
+ J. M. Leonard, A. H. Levine, J. Geeraert, et al., “Contact with Bennu! Flight Performance Versus
998
+ Prediction of OSIRIS-REx “TAG” Sample Collection,” AIAA SciTech Forum, 2022, p. 2521.
999
+ [2] O. Barnouin, M. Daly, E. Palmer, C. Johnson, R. Gaskell, M. Al Asad, E. Bierhaus, K. Craft, C. Ernst,
1000
+ R. Espiritu, H. Nair, G. Neumann, L. Nguyen, M. Nolan, E. Mazarico, M. Perry, L. Philpott, J. Roberts,
1001
+ R. Steele, J. Seabrook, H. Susorney, J. Weirich, and D. Lauretta, “Digital terrain mapping by the
1002
+ OSIRIS-REx mission,” Planetary and Space Science, Vol. 180, 2020, p. 104764.
1003
+ [3] E. E. Palmer, R. Gaskell, M. G. Daly, O. S. Barnouin, C. D. Adam, and D. S. Lauretta, “Practical
1004
+ Stereophotoclinometry for Modeling Shape and Topography on Planetary Missions,” Planetary Science,
1005
+ Vol. 3, No. 102, 2022, pp. 1–16.
1006
+ [4] R. Moghe and R. Zanetti, “A Deep learning approach to Hazard detection for Autonomous Lunar land-
1007
+ ing,” J. of the Astronautical Sciences, Vol. 67, No. 4, 2020, pp. 1811–1830.
1008
+ [5] K. Tomita, A. K. Skinner, and K. Ho, “Bayesian Deep Learning for Segmentation for Autonomous Safe
1009
+ Planetary Landing,” J. of Spacecraft and Rockets, 2022, https://doi.org/10.2514/1.A35104.
1010
+ [6] D. A. Lorenz, R. Olds, A. May, C. Mario, M. E. Perry, E. E. Palmer, and M. Daly, “Lessons learned
1011
+ from OSIRIS-REx autonomous navigation using natural feature tracking,” IEEE Aerospace Conf., 2017,
1012
+ pp. 1–12.
1013
+ [7] M. Pugliatti and M. Maestrini, “Small-Body Segmentation Based on Morphological Features with a
1014
+ U-Shaped Network Architecture,” J. of Spacecraft and Rockets, 2022, pp. 1–15.
1015
+ [8] E. Caroselli, F. Belien, A. Falke, F. Curti, and R. F¨orstner, “Deep Learning-Based Passive Hazard
1016
+ Detection for Asteroid Landing in Unexplored Environment,” AAS Guidance, Navigation and Control
1017
+ (GN&C) Conf., 2022, pp. 1–16.
1018
+ [9] “NASA Technology Taxonomy,” tech. rep., National Aeronautics and Space Administration (NASA),
1019
+ 2020.
1020
+ [10] C. D. Epp, E. A. Robertson, and T. Brady, “Autonomous landing and hazard avoidance technology
1021
+ (ALHAT),” IEEE Aerospace Conf., IEEE, 2008, pp. 1–7.
1022
+ [11] J. M. Carson, N. Trawny, E. Robertson, V. E. Roback, D. Pierrottet, J. Devolites, J. Hart, and J. N. Estes,
1023
+ “Preparation and integration of ALHAT precision landing technology for Morpheus flight testing,” AIAA
1024
+ SPACE Conf., 2014, pp. 1–16.
1025
+ 16
1026
+
1027
+ [12] R. R. Sostaric, S. Pedrotty, J. M. Carson, J. N. Estes, F. Amzajerdian, A. M. Dwyer-Cianciolo, and J. B.
1028
+ Blair, “The SPLICE Project: Safe and Precise Landing Technology Development and Testing,” AIAA
1029
+ SciTech Forum, 2021, pp. 1–9.
1030
+ [13] E. Church, T. Bourbeau, J. Curriden, A. Deguzman, F. Jaen, H. Ma, K. Mahoney, C. Miller, B. Short,
1031
+ K. Waldorff, et al., “Flash Lidar On-Orbit Performance at Asteroid Bennu,” AAS Guidance, Navigation
1032
+ and Control (GN&C) Conf., 2020.
1033
+ [14] J. M. Leonard, M. C. Moreau, P. G. Antreasian, K. M. Getzandanner, E. Church, C. Miller, M. G. Daly,
1034
+ O. S. Barnouin, and D. S. Lauretta, “Cross-Calibration of GNC and OLA LIDAR Systems Onboard
1035
+ OSIRIS-REx,” AAS Guidance, Navigation and Control (GN&C) Conf., No. 22-166, 2022.
1036
+ [15] B. Rizk, C. D. d’Aubigny, D. Golish, C. Fellows, C. Merrill, P. Smith, M. Walker, J. Hendershot, J. Han-
1037
+ cock, S. Bailey, D. DellaGiustina, D. Lauretta, R. Tanner, M. Williams, K. Harshman, M. Fitzgibbon,
1038
+ W. Verts, J. Chen, T. Connors, D. Hamara, A. Dowd, A. Lowman, M. Dubin, R. Burt, M. Whiteley,
1039
+ M. Watson, T. McMahon, M. Ward, D. Booher, M. Read, B. Williams, M. Hunten, E. Little, T. Saltz-
1040
+ man, D. Alfred, S. O’Dougherty, M. Walthall, K. Kenagy, S. Peterson, B. Crowther, M. Perry, C. See,
1041
+ S. Selznick, C. Sauve, M. Beiser, W. Black, R. Pfisterer1, A. Lancaster, S. Oliver, C. Oquest, D. Crow-
1042
+ ley, C. Morgan, C. Castle, R. Dominguez, and M. Sullivan, “OCAMS: The OSIRIS-REx Camera Suite,”
1043
+ Space Science Reviews, Vol. 214, No. 26, 2018, pp. 1–55.
1044
+ [16] T. Claudet, K. Tomita, and K. Ho, “Benchmark Analysis of Semantic Segmentation Algorithms for Safe
1045
+ Planetary Landing Site Selection,” IEEE Access, Vol. 10, 2022, pp. 41766–41775.
1046
+ [17] V. B. Alex Kendall and R. Cipolla, “Bayesian SegNet: Model Uncertainty in Deep Convolutional
1047
+ Encoder-Decoder Architectures for Scene Understanding,” British Machine Vision Conf. (BMVC),
1048
+ BMVA Press, September 2017, pp. 57.1–57.12.
1049
+ [18] Y. Gal and Z. Ghahramani, “Bayesian convolutional neural networks with Bernoulli approximate vari-
1050
+ ational inference,” arXiv preprint arXiv:1506.02158, 2015.
1051
+ [19] Y. Gal and Z. Ghahramani, “Dropout as a Bayesian approximation: Representing model uncertainty in
1052
+ deep learning,” Int. Conf. on Machine Learning (ICML), PMLR, 2016, pp. 1050–1059.
1053
+ [20] J. Mukhoti and Y. Gal, “Evaluating Bayesian deep learning methods for semantic segmentation,” Int.
1054
+ Conf. on Learning Representations (ICLR), 2018.
1055
+ [21] H. Zhao, X. Qi, X. Shen, J. Shi, and J. Jia, “ICNet for real-time semantic segmentation on high-
1056
+ resolution images,” European Conf. on Computer Vision (ECCV), 2018, pp. 405–420.
1057
+ [22] T. Driver, K. Skinner, M. Dor, and P. Tsiotras, “AstroVision: Towards Autonomous Feature Detection
1058
+ and Description for Missions to Small Bodies Using Deep Learning,” Special Issue on AI for Space,
1059
+ Acta Astronautica, 2022.
1060
+ [23] J. A. Seabrook, M. G. Daly, O. S. Barnouin, E. E. Palmer, R. W. Gaskell, H. Nair, and D. S. Lauretta,
1061
+ “Building a High-resolution Digital Terrain Model of Bennu from Laser Altimetry Data,” The Planetary
1062
+ Science J., Vol. 3, No. 12, 2022, p. 265.
1063
+ [24] R. A. Werner and D. J. Scheeres, “Exterior gravitation of a polyhedron derived and compared with
1064
+ harmonic and mascon gravitation representations of asteroid 4769 Castalia,” Celestial Mechanics and
1065
+ Dynamical Astronomy, Vol. 65, 1996, pp. 313–344.
1066
+ [25] T. Ivanov, A. Huertas, and J. M. Carson, “Probabilistic hazard detection for autonomous safe landing,”
1067
+ AIAA Guidance, Navigation, and Control (GNC) Conf., 2013, pp. 1–13.
1068
+ [26] T.-M. Ho, V. Baturkin, C. Grimm, J. T. Grundmann, C. Hobbie, E. Ksenik, C. Lange, K. Sasaki,
1069
+ M. Schlotterer, M. Talapina, et al., “MASCOT—the mobile asteroid surface scout onboard the
1070
+ Hayabusa2 mission,” Space Science Reviews, Vol. 208, No. 1, 2017, pp. 339–374.
1071
+ 17
1072
+
9NFQT4oBgHgl3EQfJDUU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9tFLT4oBgHgl3EQfui8A/content/tmp_files/2301.12155v1.pdf.txt ADDED
@@ -0,0 +1,1637 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ epl draft
2
+ Towards a liquid-state theory for active matter
3
+ Yuting Irene Li1, Rosalba Garcia-Millan1,3, Michael E. Cates1 and ´Etienne Fodor2
4
+ 1 DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK
5
+ 2 Department of Physics and Materials Science, University of Luxembourg, L-1511 Luxembourg, Luxembourg
6
+ 3 St John’s College, University of Cambridge, Cambridge CB2 1TP, UK
7
+ PACS 05.70.Ln – Nonequilibrium and irreversible thermodynamics
8
+ Abstract – In equilibrium, the collective behaviour of particles interacting via steep, short-ranged
9
+ potentials is well captured by the virial expansion of the free energy at low density. Here, we extend
10
+ this approach beyond equilibrium to the case of active matter with self-propelled particles. Given
11
+ that active systems do not admit any free-energy description in general, our aim is to build the
12
+ dynamics of the coarse-grained density from first principles without any equilibrium assumption.
13
+ Starting from microscopic equations of motion, we obtain the hierarchy of density correlations,
14
+ which we close with an ansatz for the two-point density valid in the dilute regime at small activity.
15
+ This closure yields the nonlinear dynamics of the one-point density, with hydrodynamic coefficients
16
+ depending explicitly on microscopic interactions, by analogy with the equilibrium virial expan-
17
+ sion. This dynamics admits a spinodal instability for purely repulsive interactions, a signature
18
+ of motility-induced phase separation. Therefore, although our approach should be restricted to
19
+ dilute, weakly-active systems a priori, it actually captures the features of a broader class of active
20
+ matter.
21
+ Active matter is a wide category of systems out of equi-
22
+ librium, where a net flow of energy takes place at the local,
23
+ individual level [1–3]. Examples are swimming bacteria [4]
24
+ and active emulsions [5], amongst others. The realm of
25
+ motile active matter includes interacting, many-particle
26
+ systems, where particles move persistently. Different the-
27
+ oretical approaches have been proposed to describe such
28
+ systems. They include (i) particle-based models, such as
29
+ run-and-tumble particles (RTPs) [6], active Brownian par-
30
+ ticles (ABPs) [7], and active Ornstein-Uhlenbeck particles
31
+ (AOUPs) [8,9], (ii) microscopic field theories [10,11], and
32
+ (iii) coarse-grained field theories [12–14].
33
+ Self-propelled particles tend to slow down at high densi-
34
+ ties, due to either biochemical reasons or steric repulsions.
35
+ In contrast with passively diffusing particles, this slow-
36
+ down in turn increases the local density, creating a pos-
37
+ itive feedback loop that can result in a phase separation
38
+ between a dense and a dilute phase, known as motility-
39
+ induced phase separation (MIPS) [15].
40
+ To predict an-
41
+ alytically the emergence of MIPS, previous works have
42
+ relied on a local mean-field approximation to replace mi-
43
+ croscopic interaction with density-dependent motility [16],
44
+ and also on an adiabatic elimination of orientational de-
45
+ gree of freedom [15]. Other studies have developed some
46
+ aspects of a liquid-state theory for active matter with pair-
47
+ wise interactions. This is done, for instance, by expressing
48
+ thermodynamic observables, such as pressure [17–19] and
49
+ dissipation [20,21], in terms of correlations between hydro-
50
+ dynamic fields, typically density and polarization. Also,
51
+ exact results for density correlations have been obtained
52
+ at infinite dimensions [22,23].
53
+ The success of equilibrium thermodynamics largely
54
+ stems from the ability to detect phase transitions by an-
55
+ alyzing the free-energy.
56
+ In the dilute regime, the virial
57
+ expansion provides an approximate expression of the free-
58
+ energy that averages the effect of steep, short-ranged pair-
59
+ wise interactions [24].
60
+ For passive Brownian particles
61
+ (PBPs) interacting with an isotropic pairwise potential
62
+
63
+ i,j<i Ψ(|xi − xj|) at temperature T, the free energy per
64
+ unit volume is given in terms of the uniform density ρ as
65
+ fvirial(ρ)/T = ρ log ρ + B(T)ρ2 + O(ρ3),
66
+ B = 1
67
+ 2
68
+
69
+ dr
70
+
71
+ 1 − e−Ψ(r)/T �
72
+ .
73
+ (1)
74
+ Here B is commonly referred to as the second virial coef-
75
+ ficient. The major success of the virial expansion lies in
76
+ predicting the onset of liquid-gas phase separation in parti-
77
+ cle systems with a combination of strongly repulsive short-
78
+ ranged forces and weakly attractive long-range forces, such
79
+ as the Lennard-Jones potential. As temperature increases,
80
+ p-1
81
+ arXiv:2301.12155v1 [cond-mat.soft] 28 Jan 2023
82
+
83
+ Y. I. Li et al.
84
+ the free energy, as a function of density ρ, goes from convex
85
+ (B > 0) to concave (B < 0): It yields a phase transition
86
+ from homogeneous to non-homogeneous density profiles,
87
+ with a separation between dilute and dense phases. Im-
88
+ portantly, the virial expansion holds for a generic micro-
89
+ scopic potential (excluding those of such long range that
90
+ the excess free energy is not analytic in density).
91
+ In classical thermodynamics, the virial expansion is of-
92
+ ten derived from the equilibrium partition function [24].
93
+ Interestingly, it is also possible to arrive at approx-
94
+ imate expressions of free energy by truncating the
95
+ hierarchy of density correlations,
96
+ known as the Bo-
97
+ goliubov–Born–Green–Kirkwood–Yvon (BBGKY) hierar-
98
+ chy [25]. For instance, using an ansatz for the two-particle
99
+ density, informed by the steady-state solution of the two-
100
+ body problem [26], the dynamics of the one-body density
101
+ follows a gradient flow with respect to fvirial, as shown
102
+ in the SM. This type of derivation can potentially be ex-
103
+ tended to a large class of nonequilibrum systems, where
104
+ the dynamics does not derive from any free energy a pri-
105
+ ori. Such an extension requires proposing an ansatz for
106
+ the two-particle density, which should be appropriate to
107
+ the specific nonequilibrium system at hand.
108
+ Interestingly, the two-body probability distribution can
109
+ be approached perturbatively for AOUPs, where the per-
110
+ sistence time is the small parameter in natural units [8,9].
111
+ To first order, this solution already predicts that repul-
112
+ sive interaction yields effective attraction. This suggests
113
+ that the onset of MIPS can likewise already be captured
114
+ by approximating the dynamics of density at this order.
115
+ Therefore, inspired by the equilibrium virial expansion, it
116
+ is tempting to explore whether the density dynamics al-
117
+ ready contains any spinodal instability for dilute active
118
+ systems at weak persistence. Note that, although previ-
119
+ ous work refer to “active virial” as an expansion of pres-
120
+ sure [27, 28], here we are instead interested in deriving
121
+ dynamical equations of motion for the density. Indeed, at
122
+ variance with equilibrium, phase transitions in active sys-
123
+ tems are usually not thermodynamically controlled by any
124
+ equation of state, but they can still be directly detected
125
+ as instability in the dynamics.
126
+ In this Letter, we start with the particle-based descrip-
127
+ tion of AOUPs, and consider their steady-state probability
128
+ distribution. Our roadmap is essentially a “small density-
129
+ small persistence” bottom-up derivation of the density dy-
130
+ namics. To this end, we first introduce the corresponding
131
+ hierarchy of density correlations. Inspired by equilibrium
132
+ thermodynamics [25, 26], we then close the hierarchy to
133
+ arrive at a nonlinear dynamics for the one-point density.
134
+ It allows us to identify the MIPS spinodal instability for
135
+ any microscopic repulsive interactions. An advantage of
136
+ our approach is that does not impose an equilibrium map-
137
+ ping a priori (see [8,9] for a discussion of closures to the
138
+ AOUP equations that do so), instead retaining the non-
139
+ equilibrium structure of the microscopic theory. A disad-
140
+ vantage is that extensions to higher order in density would
141
+ involved increasingly complicated calculations of higher
142
+ virial coefficients, which we do not attempt here.
143
+ Interacting AOUPs:
144
+ Joint distribution func-
145
+ tion – We consider a system of N AOUPs at positions
146
+ xi interacting with pairwise potential U.
147
+ The particles
148
+ are subject to stochastic self-propulsion velocities vi with
149
+ persistence time τ and diffusivity D [8,9]:
150
+ ˙xi = vi − ∂xiU,
151
+ U =
152
+ N
153
+
154
+ i=1
155
+ N
156
+
157
+ j<i
158
+ Ψ(rij),
159
+ τ ˙vi = −vi +
160
+
161
+ 2DΛi,
162
+ (2)
163
+ where rij = |xi − xj|, and we have set the mobility to
164
+ unity. Here Λi is a Gaussian white noise, with correlation
165
+ ⟨(Λi)α(t)(Λj)β(0)⟩ = δijδαβδ(t), where latin and Greek
166
+ letters respectively denote particle index and spatial co-
167
+ ordinates. It follows that vi is a colored Gaussian noise,
168
+ with correlation ⟨(vi)α(t)(vj)β(0)⟩ = δijδαβ(D/τ)e−|t|/τ.
169
+ In the limit of vanishing persistence (τ → 0), the corre-
170
+ lation of vi becomes white, so that the system reduces to
171
+ a set of overdamped PBPs. Note that, at finite τ, if the
172
+ potential term −∂xiU was in the rhs of the vi-equation
173
+ (instead of the xi-equation), the system would represent
174
+ underdamped PBPs in equilibrium. For this reason, over-
175
+ damped AOUPs and underdamped PBPs coincide in the
176
+ noninteracting limit.
177
+ Following
178
+ standard
179
+ procedures
180
+ [29],
181
+ the
182
+ Fokker-
183
+ Planck equation of the joint probability distribution
184
+ pN(x1, v1, x1, v2, . . . , xN, vN, t) associated with eq. (2) is
185
+ ∂tpN =
186
+ N
187
+
188
+ i=1
189
+
190
+ Lf,ipN + ∂xi · (pN ∂xiU)
191
+
192
+ ,
193
+ Lf,i = D
194
+ τ 2 ∂2
195
+ vi +
196
+ �1
197
+ τ ∂vi − ∂xi
198
+
199
+ · vi,
200
+ (3)
201
+ where Lf,i is the non-interacting Fokker-Planck operator
202
+ governing the free-particle motion of the i-th particle. Al-
203
+ though it cannot be solved exactly, its steady state can be
204
+ computed to lowest orders in the persistence time τ in a
205
+ similar manner to [8, 9]. Such a perturbative calculation
206
+ can be performed in arbitrary dimension, though we now
207
+ restrict ourselves to 1D for simplicity, as a proof of prin-
208
+ ciple. After scaling units as v → v
209
+
210
+ τ/D , x → x/
211
+
212
+ τD,
213
+ t → t/τ, and Ψ → Ψ/D, we find the many-body steady
214
+ state probability [see SM for details],
215
+ pN ∝ e−U−
216
+ v2
217
+ 1+v2
218
+ 2
219
+ 2
220
+
221
+ 1 + √τ
222
+ N
223
+
224
+ i=1
225
+ vi∂xiU
226
+ + τ
227
+ N
228
+
229
+ i=1
230
+ �v2
231
+ i
232
+ 2
233
+
234
+ (∂xiU)2 − ∂2
235
+ xiU
236
+
237
+ − (∂xiU)2 + 3
238
+ 2∂2
239
+ xiU
240
+
241
+ + o(τ)
242
+
243
+ .
244
+ (4)
245
+ Note that the steady state probability here is given in
246
+ (x, v) space, whereas [8] gives the corresponding probabil-
247
+ ity in (x, ˙x) space.
248
+ p-2
249
+
250
+ Towards a liquid-state theory for active matter
251
+ Nonequilibrium density correlations: Hierarchy
252
+ of equations – Although the joint distribution function
253
+ pN in eq. (4) contains all information about the steady
254
+ state density, it is generally difficult to predict the emer-
255
+ gence of phase transitions from the perspective of the full
256
+ phase space. Instead, our aim is to obtain a reduced de-
257
+ scription of the systel in terms of density correlations. The
258
+ n-particle density pn is found by marginalising the joint
259
+ distribution function pN as
260
+ pn(x1, v1, . . . , xn, vn, t)
261
+ = PN,n
262
+
263
+ pN(x1, v1, . . . , xN, vN, t)
264
+ N
265
+
266
+ j=n+1
267
+ dxjdvj,
268
+ (5)
269
+ where PN,n = N!/(N − n)! is the permutation coefficient.
270
+ Thereafter, for simplicity, we use the shorthand notation
271
+ pn = pn(x1, v1, . . . , xn, vn, t) for arbitrary n, where the
272
+ dependence on positions, self-propulsion velocities, and
273
+ time will be omitted. Integrating eq. (3) over the positions
274
+ and velocities of all particles but one yields an equation for
275
+ the one-particle density that depends on the two-particle
276
+ density:
277
+ ∂tp1 = Lf,1p1 + F1[p2],
278
+ F1[p2] = ∂x1 ·
279
+
280
+ p2 ∂x1Ψ(r12) dx2dv2.
281
+ (6)
282
+ The first term Lf,1p1 corresponds to the free single-particle
283
+ dynamics, whereas the second term F1[p2] represents the
284
+ effects of pairwise interaction between one particle and all
285
+ the others.
286
+ Following the same marginalisation procedure for the
287
+ n-particle density pn, we obtain a hierarchy of equations,
288
+ each depending on the density pn+1, analoguous to the
289
+ BBGKY hierarchy of PBPs [25]. The resulting equation
290
+ for the two-particle density reads
291
+ ∂tp2 = (Lf,1 + Lf,2 + Lint)p2 + F2[p3],
292
+ Lint =
293
+
294
+ i=1,2
295
+ ∂xi ·
296
+
297
+ ∂xiΨ(r12)
298
+
299
+ ,
300
+ F2[p3] =
301
+
302
+ i=1,2
303
+ ∂xi ·
304
+
305
+ p3 ∂xiΨ (ri3) dx3dv3.
306
+ (7)
307
+ Here Lint governs the pairwise interactions between any
308
+ two particles, and F2[p3] represents the interactions be-
309
+ tween either of the first two particles and all the other
310
+ particles. As we will show now, this is a higher-order term
311
+ in the average number density ρ = N/V compared to the
312
+ rest, and hence can be neglected in the dilute limit.
313
+ To determine the scaling of pn with respect to ρ, one
314
+ can start with their normalisation properties [24]
315
+
316
+ pn
317
+ n
318
+
319
+ i=1
320
+ dxidvi = PN,n,
321
+ (8)
322
+ from which follows pn ∼ ρn for small n. Physically, this
323
+ is indeed expected as p1(x1, v1) is the probability density
324
+ of finding n particles at a given set of coordinates. With
325
+ this scaling in mind, we estimate the scaling of each term
326
+ in eq. (7) as
327
+ (∂t − Lf,1 − Lf,2 − Lint
328
+ ����
329
+ ∼1/τint
330
+ ) p2
331
+ ����
332
+ ∼ρ2
333
+ =
334
+
335
+ i=1,2
336
+ ∂xi ·
337
+
338
+ p3
339
+ ����
340
+ ∼ρ3
341
+ ∂xiΨ(ri3)
342
+
343
+ ��
344
+
345
+ ∼1/τint
346
+ dx3
347
+ ����
348
+ ∼(r0)d
349
+ dv3,
350
+ (9)
351
+ where τint is the typical timescale of interaction, r0 is the
352
+ lengthscale of the potential, and d denotes the sptial di-
353
+ mension. One can see that the rhs of eq. (9) is small if
354
+ rd
355
+ 0ρ ≪ 1. Since rd
356
+ 0 is effectively the volume of a particle,
357
+ this condition is satisfied if the volume fraction of parti-
358
+ cles in the system is low. Therefore, as expected from the
359
+ analogy with the BBKY hierarchy [25], the interaction of
360
+ two particles with respect to others in the bath can be
361
+ neglected at small volume fraction.
362
+ Closure of hierarchy:
363
+ Insight from quasistatic
364
+ approximation – We now propose a closure of the hierar-
365
+ chy of equation for density correlations. At small volume
366
+ fraction, neglecting the rhs in eq. (9) yields
367
+ ∂tp2 = (Lf,1 + Lf,2 + Lint) p2.
368
+ (10)
369
+ The dynamics in eq. (10) is equivalent to the Fokker-
370
+ Planck equation of two AOUPs interacting through the
371
+ pairwise potential Ψ(r12).
372
+ Recall from eq. (4) the N-
373
+ particle stationary probability, calculated order by order
374
+ in the persistence time τ. The two-particle probability is
375
+ hence,
376
+ p2,ss(r12, v1, v2) ∝ e−Ψ(r12)−
377
+ v2
378
+ 1+v2
379
+ 2
380
+ 2
381
+ g(r12, v1 − v2),
382
+ (11)
383
+ where
384
+ g(r, w) = 1 + √τwΨ′ + (τw2/2)((Ψ′)2 − Ψ′′)
385
+ + τ(3Ψ′′ − 2(Ψ′)2) + O(τ 3/2),
386
+ (12)
387
+ and Ψ′ = dΨ/dr [see SM]. In the quasistatic limit, where
388
+ the interaction timescale is much shorter than the persis-
389
+ tence (τint ≪ τ), we assume that every pair of particles
390
+ reaches steady state. Inspired by previous works [26, 30],
391
+ this assumption motivates the following ansatz to close the
392
+ hierarchy of density correlations:
393
+ p2(x1, v1, x2, v2, t) = p1(x1, v1, t) p1(x2, v2, t)
394
+ × e−Ψ(r12)g(r12, v1 − v2).
395
+ (13)
396
+ There is evidence that the above ansatz works well for
397
+ strong short-ranged interactions in the equilibrium case
398
+ [see SM]. We assume it would also work in the non-
399
+ equilibrium case. Indeed, when the interparticle distance
400
+ is larger than the interaction range (r12 > r0), the two-
401
+ point function p2 reduces to the product of one-point func-
402
+ tions p1, as expected from a mean-field approach for non-
403
+ interacting systems. The second line of eq. (13) accounts
404
+ p-3
405
+
406
+ Y. I. Li et al.
407
+ for corrections due to interactions. For repulsive poten-
408
+ tial, the factor e−Ψ captures the reduction of the two-
409
+ point density caused by the interaction, as expected from
410
+ equilibrium, whereas g(r12, v1 − v2) encapsulates nonequi-
411
+ librium effects.
412
+ Substituting the ansatz from eq. (13) into eq. (6), we
413
+ arrive at the following dynamics for the one-particle den-
414
+ sity:
415
+ (∂t−Lf) p1(x, v, t)
416
+ = τ∂x
417
+
418
+ p1(x, v, t)
419
+
420
+ Lvp1(x, v − w, t)dw
421
+
422
+ .
423
+ (14)
424
+ Here, Lf is the free Fokker-Planck operator in scaled units,
425
+ and the operator Lv effectively takes into account interac-
426
+ tions:
427
+ Lf = ∂2
428
+ v +
429
+
430
+ ∂v − √τ∂x
431
+
432
+ v,
433
+ Lv =
434
+
435
+ Ψ′(r)e−Ψ(r)g(r, w)e−r∂xdr,
436
+ (15)
437
+ where we have introduced the translation operator e−r∂x,
438
+ which shifts the position of the function acted upon as
439
+ e−r∂xp1(x, v) = p1(x − r, v). Hence, Lv corresponds to an
440
+ infinite series of the gradient ∂x, with series coefficients set
441
+ by the microscopic potential. Equation (14) is the central
442
+ result of this Letter: It provides the dynamics of the one-
443
+ particle density in a closed form for small average density.
444
+ Importantly, this closed form depends explicitly on the
445
+ details of the pairwise potential Ψ.
446
+ To obtain a more explicit expression of Lv, we next
447
+ substitute our perturbative result for g [eq. (12)] into the
448
+ definition of Lv [eq. (15)], yielding
449
+ Lv = 2wLa + 2Lb∂x + w2Lc∂x,
450
+ (16)
451
+ where, after integration by parts, we get
452
+ La = √τ
453
+ � ∞
454
+ 0
455
+ dr(Ψ′)2 e−Ψe−r∂x,
456
+ Lb = −
457
+ � ∞
458
+ 0
459
+ drf0(r)e−r∂x,
460
+ Lc = −
461
+ � ∞
462
+ 0
463
+ dr f1(r)e−r∂x,
464
+ (17)
465
+ and
466
+ f0(s) =
467
+ � ∞
468
+ s
469
+ dr Ψ′e−Ψ �
470
+ 1 − τ
471
+
472
+ 2(Ψ′)2 − 3Ψ′′��
473
+ ,
474
+ f1(s) = τ
475
+ � ∞
476
+ s
477
+ dr Ψ′ �
478
+ (Ψ′)2 − Ψ′′�
479
+ e−Ψ.
480
+ (18)
481
+ The integrands featuring in the definition of the operators
482
+ {La, Lb, Lc} [eq. (17)] are even with respect to r, provided
483
+ that Ψ(r) = Ψ(−r). It follows that these operators can be
484
+ expressed as a series of ∂2
485
+ x.
486
+ The functions f0 and f1 are analoguous to the Mayer
487
+ function which appears in the equilibrium virial expan-
488
+ sion [25]. Indeed, in the equilibrium limit (τ → 0), the
489
+ only surviving term in Lv stems from the leading order in
490
+ f0, in agreement with the derivation for equilibrium over-
491
+ damped PBPs [see SM]. This term is responsible for the
492
+ B coefficient in eq. (1) when that result is derived dynam-
493
+ ically for equilibrium systems. In that respect, eq. (16)
494
+ can be regarded as a direct generalization of the equilib-
495
+ rium virial expansion to the AOUP setting. Importantly,
496
+ eq. (16) shows that activity produces additional velocity-
497
+ dependent terms that are absent in equilibrium. In what
498
+ follows, we analyze in detail the corresponding dynam-
499
+ ics, in search for the onset of instability as a signature of
500
+ MIPS.
501
+ Linear stability analysis: Eigenvalue problem –
502
+ The stationary solution of eq. (14) is given by p(0)
503
+ 1 (v) =
504
+ (ρ/
505
+
506
+ 2π)e−v2/2. This solution corresponds to a uniform
507
+ density for the position and a Gaussian distribution for
508
+ the self-propulsion.
509
+ In addition, as we will see shortly,
510
+ this is also the ground state of the free operator. In the
511
+ following, we expand perturbatively around p(0)
512
+ 1
513
+ to find its
514
+ instability regions in parameter space: If the uniform state
515
+ is not stable, then we argue that the system undergoes
516
+ spinodal decomposition via a MIPS mechanism.
517
+ We consider p1(x, v, t) = p(0)
518
+ 1 (v) + ε(x, v, t), with ε a
519
+ small perturbation about the ground state p(0)
520
+ 1 . Expand-
521
+ ing eq. (14) to linear order in ε, we get
522
+ (∂t− ¯Lf) ε(x, v, t) = τp(0)
523
+ 1 (v)
524
+
525
+ Lv∂xε(x, v−w, t)dw, (19)
526
+ where Lv is defined in eq. (16), and
527
+ ¯Lf = ∂2
528
+ v + (∂v − α∂x)v,
529
+ α = √τ − 2ρτ 3/2
530
+ � ∞
531
+ 0
532
+ (Ψ′)2e−Ψdr.
533
+ (20)
534
+ To analyze the time evolution of the perturbation given in
535
+ eq. (20), the difficulty lies in treating the effect of the op-
536
+ erator Lv, which contains information about microscopic
537
+ interactions.
538
+ Then, it is convenient to expand ε in the
539
+ eigenfunctions of the bare theory, namely in the absence
540
+ of Lv. Interestingly, as stated previously, the bare theory
541
+ maps into underdamped passive Brownian motion, and
542
+ one can readily find the solution in the literature [29].
543
+ The corresponding eigenfunctions, which we here call the
544
+ Fourier-Hermite basis, are
545
+ ψnk(x, v) = e−ik(x+αv)Un(v − 2iαk),
546
+ (21)
547
+ where Un is the Hermite function
548
+ Un(z) =
549
+ 1
550
+
551
+ 2π Hn(z) e−z2/2 = (−1)n
552
+
553
+ 2π ∂n
554
+ z e−z2/2,
555
+ (22)
556
+ with the property that (∂2
557
+ z + ∂zz)Un(z) = −nUn(z). In-
558
+ deed, acting on the Fourier-Hermite basis with the modi-
559
+ fied free operator ¯Lf yields
560
+ ¯Lfψnk = −λknψnk,
561
+ λkn = (αk)2 + n.
562
+ (23)
563
+ p-4
564
+
565
+ Towards a liquid-state theory for active matter
566
+ As the operator ¯Lf is not Hermitian, the conjugate basis is
567
+ not simply the complex conjugate. Instead, we introduce
568
+ the following conjugate basis
569
+ ¯ψnk(x, v) = eik(x+αv) ¯Un(v − 2iαk),
570
+ ¯Un(z) = 1
571
+ n!Hn(z),
572
+ (24)
573
+ yielding
574
+
575
+ dxdv ¯ψmk′(x, v)ψnk(x, v) = 2πδ(k − k′)δmn,
576
+ (25)
577
+ so that the orthogonality relation between the basis ψnk
578
+ and its conjugate ¯ψnk indeed holds as expected.
579
+ Having obtained the eigenvectors and eigenvalues of the
580
+ bare theory, we decompose the perturbation ε in eigen-
581
+ functions of ¯Lf as
582
+ ε(x, v, t) =
583
+
584
+ n
585
+
586
+ εkn(t)ψnk(x, v)dk.
587
+ (26)
588
+ Multiplying eq. (19) with the conjugate basis ¯ψkn and inte-
589
+ grating over {x, v} yields the dynamics of the perturbation
590
+ ε, in the Fourier-Hermite basis, as
591
+ ˙εkm = −λkmεkm+
592
+
593
+ n
594
+
595
+ M (1)
596
+ kmn+M (2)
597
+ kmn+M (3)
598
+ kmn
599
+
600
+ εkn, (27)
601
+ where
602
+ M (1)
603
+ kmn = 2τρLa,k
604
+ (−iαk)n+m
605
+ αm!
606
+ e(αk)2(m − n),
607
+ M (2)
608
+ kmn = −2τρLb,kk2 (−iαk)n+m
609
+ m!
610
+ e(αk)2,
611
+ M (3)
612
+ kmn = τρLc,k
613
+ (−iαk)n+m
614
+ α2m!
615
+ e(αk)2
616
+ ×
617
+
618
+ m(m − 1) + n(n − 1) − 2mn − 2(αk)2�
619
+ .
620
+ (28)
621
+ Here, La,k =
622
+
623
+ eikxLadk, with similar definitions for Lb,k
624
+ and Lc,k, where the operators {La, Lb, Lc} are defined in
625
+ eq. (17).
626
+ If the matrix Mknm = −λkmδmn + M (1)
627
+ kmn +
628
+ M (2)
629
+ kmn +M (3)
630
+ kmn, which controls the growth rate of the per-
631
+ turbation ε, has no positive eigenvalue, the uniform so-
632
+ lution is stable; otherwise the system undergoes spinodal
633
+ decomposition. Hence we only need the largest eigenvalue
634
+ of M. As shown in the SM, the matrix M can be diagnon-
635
+ alized exactly. This calculation actually only amounts to
636
+ finding the maximum eigenvalue of a 3 × 3 matrix, which
637
+ can be done straightforwardly, while also perturbatively
638
+ keeping track of orders of τ.
639
+ Spinodal instability – We now illustrate how our ap-
640
+ proach, valid for an arbitrary pairwise potential, can be
641
+ deployed to detect the onset of instability. We consider the
642
+ following short-ranged, weakly repusive interaction poten-
643
+ tial:
644
+ Ψ(r) = ν exp
645
+
646
+
647
+ 1
648
+ 1 − (r/r0)2
649
+
650
+ ,
651
+ (29)
652
+ 0.00
653
+ 0.25
654
+ 0.50
655
+ 0.75
656
+ 1.00
657
+ k
658
+ −0.10
659
+ −0.05
660
+ 0.00
661
+ 0.05
662
+ 0.10
663
+ λmax
664
+ τ=0.20
665
+ 0.00
666
+ 0.25
667
+ 0.50
668
+ 0.75
669
+ 1.00
670
+ k
671
+ τ=0.50
672
+ Fig. 1: The value of the largest eigenvalue λmax as a function of
673
+ the wavevector k for ν = 10, r0 = 2, varying τ and φ (blue solid
674
+ line). The orange dotted line represents the short length-scale
675
+ cut-off as we are only concerned with length-scales beyond the
676
+ particle size r0.
677
+ characterised by its strength ν and range r0, whose deriva-
678
+ tives are continuous at any order for r within [0, r0]. The
679
+ maximum eigenvalue of the corresponding growth rate ma-
680
+ trix M, expanded analytically to first order in the persis-
681
+ tence time τ, is plotted against wavevector k in Fig. 1
682
+ for various values of τ and volume fraction φ = 2r0N/V ,
683
+ where 2r0 is taken as the size of the particle in 1D and
684
+ V = L is the system volume. As expected [15], the sys-
685
+ tem exhibits a spinodal instability at high τ and packing
686
+ fraction φ, for which the linear perturbation ε is unstable,
687
+ namely limk→0 λmax(k) = 0+.
688
+ Fig. 2 shows the stabil-
689
+ ity diagram based on the sign of the longest wavelength
690
+ perturbation, λmax(2π/L), as a function of τ and φ, show-
691
+ ing the transition between a uniform stable and a phase-
692
+ separated state. (Note that we could equally have chosen
693
+ the fastest growing mode to locate the spinodal.)
694
+ It is notable that our theory of interacting AOUPs
695
+ shows a spinodal instability. As in equilibrium systems
696
+ with attractions, it does this even at lowest order in the
697
+ virial-type expansion in powers of density. Just as holds
698
+ there, finding the instability requires using a low-density
699
+ theory at finite densities. However the purpose of this ap-
700
+ proach is not to gain quantitative predictions about the ex-
701
+ act location of the spinodal curve, but rather to establish
702
+ that the macroscopic conditions for phase separation can
703
+ be satisfied, by considering microscopic interaction laws
704
+ and dynamics. Notably, unlike in equilibrium, the spin-
705
+ odal instability happens here for purely repulsive interac-
706
+ tions – a key feature of MIPS [15]. Our microscopic calcu-
707
+ lation complements previous viewpoints based on effective
708
+ quasi-equilibrium attractions [31], and/or collisional slow-
709
+ ing down [16,32].
710
+ Nonetheless, there are several caveats and limitations to
711
+ our method. Firstly, the chosen potential is not strictly
712
+ hard-core, but depends on the strength parameter ν. In
713
+ fact it is not possible to implement a true hard-core po-
714
+ tential due to the nature of the small τ expansion for the
715
+ two-particle density, as there are terms directly propor-
716
+ tional to Ψ or its derivatives.
717
+ Unsurprisingly then, the
718
+ p-5
719
+
720
+ Y. I. Li et al.
721
+ 0.0
722
+ 0.2
723
+ 0.4
724
+ 0.6
725
+ 0.8
726
+ 1.0
727
+ φ
728
+ 10−1
729
+ 100
730
+ τ
731
+ Phase separation
732
+ Uniform
733
+ 0
734
+ λmax
735
+ Fig. 2: Stability diagram in τ − φ space showing λmax(2π/L)
736
+ for φ = 0.6, L = 200, ν = 10, r0 = 2. The white region in the
737
+ top-right corner corresponds to when α < 0, where the method
738
+ breaks down, as it is no longer in the small τ limit. The solid
739
+ black line is the spinodal instability.
740
+ results presented here do depend on ν. While overly large
741
+ ν will break the small-τ expansion, we have checked that a
742
+ range of moderate values produce stability diagrams qual-
743
+ itatively similar to Fig. 2. Secondly, for some parameters,
744
+ we found that the largest eigenvalue stays negative at low
745
+ wavenumber but turns positive (unstable) at large ones,
746
+ resembling an upside-down version of the right frame of
747
+ Fig. 1. At first sight this might be taken as evidence of
748
+ new physics in the form of microphase separation at finite
749
+ wavenumber, an outcome generically predicted by some
750
+ field-theoretic models [14]. However, when this happens
751
+ the wavenumbers in question (at or around the orange line
752
+ in Fig. 1) are comparable to the inverse particle separation
753
+ 1/r0. As the theory proposed here is a macroscopic one,
754
+ it may not operate reliably in this large k region, so we
755
+ do not take this as evidence of microphase separation in
756
+ repulsive AOUPs.
757
+ Conclusion – Inspired by liquid-state theory of equi-
758
+ librium systems, we have started with the hierarchy of
759
+ density correlations for AOUPs, and closed it at second
760
+ order using a quasistatic approximation. This approach is
761
+ closely related to the virial expansion in the equilibrium
762
+ case. It yields a mean field theory for the one-point den-
763
+ sity from first principles. We have analysed the stability
764
+ of the uniform solution by looking at the largest eigen-
765
+ value of the growth matrix, and determined the onset of
766
+ a spinodal instability.
767
+ Our method deals directly with particle velocities as well
768
+ as positions. Perhaps more importantly, it is able to cap-
769
+ ture (to lowest order in density) the physics of steep, short-
770
+ ranged interactions.
771
+ In that respect, it is distinct from
772
+ standard coarse-graining methods for non-equilibrium sys-
773
+ tems, such as those based on Dean’s equation [33], which
774
+ starts as an exact representation but upon assuming a
775
+ smooth (coarse-grained) density becomes an expansion in
776
+ weak or slowly varying interaction forces.
777
+ The Dean’s
778
+ approach neglects strong, short-range interactions that
779
+ change the statistics of close encounters even when the
780
+ density, and hence the average interaction force, is small.
781
+ In equilibrium statistical mechanics, the virial expansion
782
+ is designed to handle exactly this situation. We have pre-
783
+ sented the leading order counterpart of this, for an active
784
+ system comprising interacting AOUPs.
785
+ There are some limitations to our method. Firstly, the
786
+ two-particle stationary solution used in the quasistatic
787
+ ansatz is not exact, but rather a small-persistence approx-
788
+ imation, unlike the equilibrium case. Secondly, in truncat-
789
+ ing the density-correlation hierarchy at the second order,
790
+ we assumed that the number density is low. Hence, even
791
+ assuming small persistence, our approach is quantitatively
792
+ accurate only in the dilute limit. Nonetheless, our method
793
+ gives bottom-up confirmation of how phase separation can
794
+ occur in purely repulsive active systems, and it can be used
795
+ to study how the spinodal density varies with interaction
796
+ parameters and with the persistence time.
797
+ ∗ ∗ ∗
798
+ The authors acknowledge insightful discussions with
799
+ Alexander Grosberg, Jean-Francois Joanny and Marius
800
+ Bothe.
801
+ YIL acknowledges support from Royal Society
802
+ grant (RP\R1\180165).
803
+ ´EF acknowledges support from
804
+ the Luxembourg National Research Fund (FNR), grant
805
+ reference 14389168.
806
+ Work funded in part by the Euro-
807
+ pean Research Council under the EU’s Horizon 2020 Pro-
808
+ gramme (Grant number 740269).
809
+ RG-M acknowledges
810
+ support from a St John’s College Research Fellowship,
811
+ University of Cambridge.
812
+ REFERENCES
813
+ [1] Marchetti M. C., Joanny J. F., Ramaswamy S., Liv-
814
+ erpool T. B., Prost J., Rao M. and Simha R. A., Rev.
815
+ Mod. Phys., 85 (2013) 1143.
816
+ [2] O’Byrne J., Kafri Y., Tailleur J. and van Wijland
817
+ F., Nat. Rev. Phys., 4 (2022) 167.
818
+ [3] Fodor E., Jack R. L. and Cates M. E., Annu. Rev.
819
+ Condens. Matter Phys., 13 (2022) 215.
820
+ [4] Elgeti J., Winkler R. G. and Gompper G., Rep. Prog.
821
+ Phys., 78 (2015) 056601.
822
+ [5] Weber C. A., Zwicker D., J¨ulicher F. and Lee C. F.,
823
+ Rep. Prog. Phys., 82 (2019) 064601.
824
+ [6] Tailleur J. and Cates M., Phys. Rev. Lett., 100 (2008)
825
+ 218103.
826
+ [7] Fily Y. and Marchetti M. C., Phys. Rev. Lett., 108
827
+ (2012) 235702.
828
+ [8] Fodor ´E., Nardini C., Cates M. E., Tailleur J.,
829
+ Visco P. and van Wijland F., Phys. Rev. Lett., 117
830
+ (2016) 038103.
831
+ [9] Martin D., O’Byrne J., Cates M. E., Fodor ´E.,
832
+ Nardini C., Tailleur J. and van W. F., Phys. Rev.
833
+ E, 103 (2021) 032607.
834
+ p-6
835
+
836
+ Towards a liquid-state theory for active matter
837
+ [10] Garcia-Millan R. and Pruessner G., J. Stat. Mech.:
838
+ Theory Exp., 2021 (2021) 063203.
839
+ [11] Pruessner G. and Garcia-Millan R., Field theories
840
+ of active particle systems and their entropy production
841
+ (2022).
842
+ [12] Nardini C., Fodor E., Tjhung E., van Wijland F.,
843
+ Tailleur J. and Cates M. E., Phys. Rev. X, 7 (2017)
844
+ 021007.
845
+ [13] J¨ulicher F., Grill S. W. and Salbreux G., Rep. Prog.
846
+ Phys., 81 (2018) 076601.
847
+ [14] Tjhung E., Nardini C. and Cates M. E., Physical Re-
848
+ view X, 8 (2018) 031080.
849
+ [15] Cates M. E. and Tailleur J., Annu. Rev. Condens.
850
+ Matter Phys., 6 (2015) 219.
851
+ [16] Stenhammar J., Tiribocchi A., Allen R. J., Maren-
852
+ duzzo D. and Cates M. E., Phys. Rev. Lett., 111 (2013)
853
+ 145702.
854
+ [17] Takatori S. C., Yan W. and Brady J. F., Phys. Rev.
855
+ Lett., 113 (2014) 028103.
856
+ [18] Yang X., Manning M. L. and Marchetti M. C., Soft
857
+ Matter, 10 (2014) 6477.
858
+ [19] Solon A. P., Fily Y., Baskaran A., Cates M. E.,
859
+ Kafri Y., Kardar M. and Tailleur J., Nature Physics,
860
+ 11 (2015) 673.
861
+ [20] Tociu L., Fodor ´E., Nemoto T. and Vaikuntanathan
862
+ S., Physical Review X, 9 (2019) 041026.
863
+ [21] Fodor E., Nemoto T. and Vaikuntanathan S., New
864
+ J.Phys., 22 (2020) 013052.
865
+ [22] Arnoulx de Pirey T., Lozano G. and van Wijland
866
+ F., Phys. Rev. Lett., 123 (2019) 260602.
867
+ [23] Arnoulx de Pirey T., Manacorda A., van Wijland
868
+ F. and Zamponi F., J. Chem. Phys., 155 (2021) 174106.
869
+ [24] Kardar M., Statistical physics of particles (Cambridge
870
+ University Press) 2007.
871
+ [25] Hansen J.-P. and McDonald I. R., Theory of simple
872
+ liquids: with applications to soft matter (Academic press)
873
+ 2013.
874
+ [26] Grosberg A. Y. and Joanny J.-F., Phys. Rev. E, 92
875
+ (2015) 032118.
876
+ [27] Winkler R. G., Wysocki A. and Gompper G., Soft
877
+ matter, 11 (2015) 6680.
878
+ [28] Falasco G., Baldovin F., Kroy K. and Baiesi M.,
879
+ New Journal of Physics, 18 (2016) 093043.
880
+ [29] Risken H., Fokker-planck equation (Springer) 1996.
881
+ [30] Ilker E. and Joanny J.-F., Phys. Rev. Research, 2
882
+ (2020) 023200.
883
+ [31] Farage T. F. F., Krinninger P. and Brader J. M.,
884
+ Phys. Rev. E, 91 (2015) 042310.
885
+ [32] Takatori S. C. and Brady J. F., Phys. Rev. E, 91
886
+ (2015) 032117.
887
+ [33] Dean D. S., J. Phys. A, 29 (1996) L613.
888
+ p-7
889
+
890
+ epl draft
891
+ Supplementary material:
892
+ “Towards a liquid-state theory for active matter”
893
+ Yuting Irene Li1, Rosalba Garcia-Millan1,3, Michael E. Cates1 and ´Etienne
894
+ Fodor2
895
+ 1 DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road,
896
+ Cambridge CB3 0WA, UK
897
+ 2 Department of Physics and Materials Science, University of Luxembourg, L-1511 Luxem-
898
+ bourg, Luxembourg
899
+ 3 St John’s College, University of Cambridge, Cambridge CB2 1TP, UK
900
+ PACS 05.70.Ln – Nonequilibrium and irreversible thermodynamics
901
+ Abstract – Supplementary material to “Towards a liquid-state theory for active matter”.
902
+ Overdamped passive Brownian particles: Quasistatic ansatz for density cor-
903
+ relations. –
904
+ In this section, we demonstrate that, for overdamped passive Brownian par-
905
+ ticles (PBPs), one recovers the virial expansion of the free energy when using the quasistatic
906
+ ansatz p2(x1, x2, t) = p1(x1, t)p1(x2, t)pss(x1, x2). We consider the following equations of
907
+ motion for N PBPs with pair-interaction potential Ψ:
908
+ ˙xi = −∂xiU +
909
+
910
+ 2TΛi,
911
+ U =
912
+ N
913
+
914
+ i=1
915
+ N
916
+
917
+ j<i
918
+ Ψ(|xi − xj|),
919
+ (S1)
920
+ where we have set the mobility to unity, so that T is the diffusion constant, and Λi is a
921
+ Gaussian white noise. Similar to the main text, we write down the corresponding hierarchy
922
+ for one- and two-particle densities, assuming that the density is sufficiently low to ignore
923
+ contributions from three-particle density:
924
+ ∂tp1(x1, t) = T∇2
925
+ x1p1(x1, t) + ∇x1 ·
926
+
927
+ p2(x1, x2, t)∇x1Ψ(r)dx2,
928
+ ∂tp2(x1, x2, t) = T
929
+
930
+ ∇2
931
+ x1 + ∇2
932
+ x2
933
+
934
+ p2(x1, x2, t) +
935
+
936
+ i=1,2
937
+ ∇xi · (p2(x1, x2, t)∇xiΨ(r)),
938
+ (S2)
939
+ where r = |x1 −x2|. In the quasistatic limit, where the interaction time is much faster than
940
+ the free particle travel time, it is reasonable to suppose that every pair of particles reach
941
+ steady state. This inspires the following ansatz to close the density hierarchy [1,2]:
942
+ p2(x1, x2, t) = p1(x1, t) p1(x2, t) exp(−Ψ(r)/T),
943
+ (S3)
944
+ where we have used that the Boltzmann distribution is the the steady-state distribution of
945
+ two particles. Substituting this ansatz into the p1 equation, we have
946
+ ∂tp1(x1, t) = T∇2
947
+ x1p1(x1, t) + ∇x1 ·
948
+
949
+ p1(x1, t)
950
+
951
+ p1(x2, t)e−Ψ(r)/T ∇x1Ψ(r)dx2
952
+
953
+ .
954
+ (S4)
955
+ p-1
956
+ arXiv:2301.12155v1 [cond-mat.soft] 28 Jan 2023
957
+
958
+ Y. I. Li et al.
959
+ Notice that e−Ψ(r)/T ∇x1Ψ(r) = −T∇x1f(r), where f(r) = exp(−Ψ(r)/T) − 1 is usually
960
+ called the Mayer-f function [3]. Changing variables from x2 to r = x1 −x2 in the integrand
961
+ of eq. (S4), and integrating by parts, we get
962
+ 1
963
+ T ∂tp1(x1, t) = ∇2
964
+ x1p1(x1, t) − ∇x1 ·
965
+
966
+ p1(x1, t)
967
+
968
+ f(r)∇x1p1(x1 − r, t)dr
969
+
970
+ .
971
+ (S5)
972
+ Thus far, we have closed the density hierarchy and obtained a mean-field equation for the
973
+ one-particle density. In the following, we seek to connect eq. (S5) with existing knowledge
974
+ of equilibrium physics of interacting gases, in particular, the virial expansion.
975
+ Virial expansion.
976
+ We assume that the density distribution ρ does not vary dramatically
977
+ over the length-scale of the pair-potential. Therefore, expanding p1(x1−r) in eq. (S5) around
978
+ x1 yields
979
+ ∂tp1 = ∇ · (p1∇µ),
980
+ µ = T(log p1 + 2Bp1),
981
+ B = −1
982
+ 2
983
+
984
+ f(r)dr.
985
+ (S6)
986
+ Here B(T) is the second virial coefficient in equilibrium statistical physics [3]. The stationary
987
+ solution minimises the following free energy:
988
+ F = T
989
+ � �
990
+ p1 log p1 + Bp2
991
+ 1
992
+
993
+ dx.
994
+ (S7)
995
+ The lack of gradient terms in the free energy is a result of neglecting higher-order terms in
996
+ the expansion of p1(x1 − r). Assuming that the stationary state is uniform with density
997
+ ρ = N/V , we obtain
998
+ F(N, V, T) = TN log(N/V )
999
+
1000
+ ��
1001
+
1002
+ ideal gas
1003
+ +
1004
+ TBN 2/V
1005
+
1006
+ ��
1007
+
1008
+ virial correction
1009
+ .
1010
+ (S8)
1011
+ This is exactly the equilibrium virial expansion to second order [3].
1012
+ All-gradient expansion.
1013
+ To explore the effects of higher-gradient terms, we expand
1014
+ p1(x − r) in eq. (S5) to all orders in gradient:
1015
+ p1(x − r) = e−r·∇xp1(x),
1016
+ (S9)
1017
+ where e−r·∇x = �
1018
+ n
1019
+ (−r·∇x)n
1020
+ n!
1021
+ . Substituting into eq. (S5), we obtain
1022
+ 1
1023
+ T ∂tp1 = ∇2p1 + 2∇ ·
1024
+
1025
+ p1∇
1026
+ � ¯Bp1
1027
+ ��
1028
+ ,
1029
+ ¯B = −1
1030
+ 2
1031
+
1032
+ f(r)e−r·∇xdr,
1033
+ (S10)
1034
+ where the second virial coefficient has the same form as in eq. (S6) but ¯B is now an operator.
1035
+ Proceeding as in the previous section, the chemical potential µ has the same form as eq. (S6).
1036
+ In Fourier space, ¯Bk =
1037
+
1038
+ eik·x ¯Bdx is the Fourier transform of the Meyer-f function. Note
1039
+ that ¯Bk=0 = B, since we only captured the zeroth mode when truncating the gradient
1040
+ expansion at the lowest order. The corresponding free energy is
1041
+ ¯F = T
1042
+
1043
+ p1 log p1dx
1044
+
1045
+ ��
1046
+
1047
+ ideal gas
1048
+ + T
1049
+
1050
+ p1,k ¯Bk p1,−k
1051
+ dk
1052
+ (2π)d
1053
+
1054
+ ��
1055
+
1056
+ interactions
1057
+ .
1058
+ (S11)
1059
+ Overall, the gradient expansion is a natural extension of the equilibrium virial expansion
1060
+ for non-uniform densities. We note that one cannot trust the high-k behaviour of B(k), as
1061
+ it is sensitive to the details of the potential at close range. However, since we are always
1062
+ interested in length-scales much larger than the range of the potential (i.e.
1063
+ size of the
1064
+ individual particles), we do not need to be concerned with such a high-k behaviour.
1065
+ p-2
1066
+
1067
+ Supplementary material: “Towards a liquid-state theory for active matter”
1068
+ Steady state of AOUPs: Small-τ expansion. –
1069
+ In this section, we derive the sta-
1070
+ tionary probability as an expansion at small τ . As opposed to [4], where the expansion was
1071
+ performed in the (x, ˙x) space, we consider here expansion in (x, v) space. This is necessary
1072
+ as we need the steady-state two-particle distribution in (x, v) space in the quasistatic ansatz.
1073
+ We start from the Fokker-Planck equation for two particles in one spatial dimension:
1074
+ ∂tP =
1075
+
1076
+ i=1,2
1077
+ LiP,
1078
+ Li = D
1079
+ τ 2 ∂2
1080
+ vi +
1081
+ �1
1082
+ τ ∂vi − ∂xi
1083
+
1084
+ vi + ∂xi(∂xiΨ).
1085
+ (S12)
1086
+ Scaling units as v → v
1087
+
1088
+ τ/D, x → x/
1089
+
1090
+ τD, t → t/τ, and Ψ → Ψ/D, we obtain
1091
+ Li = Li,0 + √τLi,1 + τLi,2,
1092
+ (S13)
1093
+ where
1094
+ Li,0 = ∂2
1095
+ vi + ∂vivi,
1096
+ Li,1 = −∂xivi,
1097
+ Li,2 = ∂xi(∂xiΨ).
1098
+ (S14)
1099
+ We assume the following τ-expansion for the stationary distribution:
1100
+ p2,ss = e− 1
1101
+ 2(v2
1102
+ 1+v2
1103
+ 2)−Ψ
1104
+
1105
+ 1 +
1106
+
1107
+ n
1108
+ (√τ)nAi({xi, vi})
1109
+
1110
+ ,
1111
+ (S15)
1112
+ where Ai is the i-th order term. Solving order by order, we get
1113
+ p2,ss ∝ exp
1114
+
1115
+ −Ψ(r) − 1
1116
+ 2
1117
+
1118
+ v2
1119
+ 1 + v2
1120
+ 2
1121
+ ��
1122
+ ×
1123
+
1124
+ 1 + √τ(v1 − v2)Ψ′ + τ
1125
+ �(v1 − v2)2
1126
+ 2
1127
+ ((Ψ′)2 − Ψ′′) − 2(Ψ′)2 + 3Ψ′′
1128
+
1129
+ + o(τ)
1130
+
1131
+ ,
1132
+ (S16)
1133
+ where Ψ′ = dΨ/dr. This result is used to derive the quasistatic approximation in eq. (12)
1134
+ of the main text.
1135
+ The interaction matrix in Fourier-Hermite basis. –
1136
+ In this section, we show the
1137
+ details of the change of basis to the Fourier-Hermite basis. Recall that the perturbation
1138
+ density field ε can be decomposed in the Fourier-Hermite basis as
1139
+ ε(x, v) =
1140
+
1141
+ n
1142
+
1143
+ εkn(t)ψnk(x, v)dk,
1144
+ ψnk = e−ik(x+αv)Un(v − 2iαk),
1145
+ (S17)
1146
+ where the Hermite function Un is defined in eq. (22) of the main text. Substituting the
1147
+ decomposition into eq. (19) in the main text, we get
1148
+
1149
+ n
1150
+
1151
+ ( ˙εkn + εknλnk)ψnk(x, v)dk = −τρ
1152
+
1153
+ n
1154
+
1155
+ ikεknU0(v)dk
1156
+
1157
+ ψnk(x, v − w)dw
1158
+ ×
1159
+
1160
+ 2La,kw + 2Lb,k(−ik) + Lc,k(−ik)w2�
1161
+ ,
1162
+ (S18)
1163
+ where
1164
+ La,k = √τ
1165
+ � ∞
1166
+ 0
1167
+ dr (Ψ′)2 e−Ψeirk,
1168
+ Lb,k = −
1169
+ � ∞
1170
+ 0
1171
+ drf0(r)eirk,
1172
+ f0(s) =
1173
+ � ∞
1174
+ s
1175
+ dr Ψ′e−Ψ �
1176
+ 1 − τ2(Ψ′)2 + τ3Ψ′′�
1177
+ ,
1178
+ Lc,k = −
1179
+ � ∞
1180
+ 0
1181
+ dr f1(r)eirk,
1182
+ f1(s) = τ
1183
+ � ∞
1184
+ s
1185
+ drΨ′((Ψ′)2 − Ψ′′)e−Ψ.
1186
+ (S19)
1187
+ p-3
1188
+
1189
+ Y. I. Li et al.
1190
+ We then multiply both sides of eq. (S18) by the dual basis ¯ψmk′, as defined in eq. (24) of
1191
+ the main text, and integrate over the (x, v). By orthogonality of the basis, as outlined in
1192
+ eq. (25) of the main text, we have
1193
+ ˙εkm = −λkmεkm +
1194
+
1195
+ n
1196
+
1197
+ M (1)
1198
+ kmn + M (2)
1199
+ kmn + M (3)
1200
+ kmn
1201
+
1202
+ εkn,
1203
+ (S20)
1204
+ where
1205
+ M (1)
1206
+ kmn = 2τρLa,k(−ik)
1207
+
1208
+ dv U0(v) ¯Um(v − 2iαk)
1209
+
1210
+ dw w eiαkwUn(v − w − 2iαk),
1211
+ M (2)
1212
+ kmn = 2τρLb,k(−ik)2
1213
+
1214
+ dv U0(v) ¯Um(v − 2iαk)
1215
+
1216
+ dw eiαkwUn(v − w − 2iαk),
1217
+ M (3)
1218
+ kmn = τρLc,k(−ik)2
1219
+
1220
+ dv U0(v) ¯Um(v − 2iαk)
1221
+
1222
+ dw w2eiαkwUn(v − w − 2iαk).
1223
+ (S21)
1224
+ We first perform all the w-integrals:
1225
+ In
1226
+ 0 (v, k) ≡
1227
+
1228
+ dw eikαwUn(v − w − 2iαk) = e
1229
+ 3
1230
+ 2 α2k2+iαkv(−iαk)n
1231
+ In
1232
+ 1 (v, k) ≡
1233
+
1234
+ dw
1235
+
1236
+ 2π w eiαkwUn(v − w − 2iαk) = −e
1237
+ 3
1238
+ 2 α2k2+iαkv(−iαk)n−1 �
1239
+ iαkv + n + α2k2�
1240
+ In
1241
+ 2 (v, k) ≡
1242
+
1243
+ dw
1244
+
1245
+ 2π w2eiαkwUn(v − w − 2iαk)
1246
+ = e
1247
+ 3
1248
+ 2 α2k2+iαkv(−iαk)n−2 �
1249
+ n(n − 1) − α2k2(1 + (v − iαk)2) + 2inαk(v − iαk)
1250
+
1251
+ .
1252
+ (S22)
1253
+ Performing next the v-integrals, we find:
1254
+ M (1)
1255
+ kmn = 2τρLa,k(−ik)
1256
+
1257
+ dv
1258
+
1259
+ 2π e− 1
1260
+ 2 v2Hm(v − 2iαk)In
1261
+ 1 (v, k)
1262
+ = 2τρLa,k
1263
+ (−iαk)n+m
1264
+ αm!
1265
+ eα2k2(m − n),
1266
+ M (2)
1267
+ kmn = −2τρLb,kk2
1268
+
1269
+ dv
1270
+
1271
+ 2π e− 1
1272
+ 2 v2Hm(v − 2iαk)In
1273
+ 0 (v, k)
1274
+ = −2τρLb,kk2 (−iαk)n+m
1275
+ m!
1276
+ eα2k2,
1277
+ M (3)
1278
+ kmn = τρLc,k(−ik)2
1279
+
1280
+ dv
1281
+
1282
+ 2π e− 1
1283
+ 2 v2Hm(v − 2iαk)In
1284
+ 2 (v, k)
1285
+ = τρLc,k
1286
+ (−iαk)n+m
1287
+ α2m!
1288
+ eα2k2 �
1289
+ m(m − 1) + n(n − 1) − 2mn − 2α2k2�
1290
+ .
1291
+ (S23)
1292
+ If the overall growth rate matrix Mkmn = −λkmδmn + M (1)
1293
+ kmn + M (2)
1294
+ kmn + M (3)
1295
+ kmn has no
1296
+ positive eigenvalue, the uniform solution is stable; otherwise the system undergoes spinodal
1297
+ decomposition. Hence, all we need is the sign of the largest eigenvalue of the M matrix.
1298
+ Despite the appearance of M as an infinite-dimensional matrix, it is in fact possible to
1299
+ find another set of basis where M is block diagonal. Indeed, {M (1), M (2), M (3)} are all
1300
+ linear combinations of the following matrices:
1301
+ (−iαk)m+n
1302
+ m!
1303
+ , (−iαk)m+n
1304
+ m!
1305
+ m, (−iαk)m+n
1306
+ m!
1307
+ n, (−iαk)m+n
1308
+ m!
1309
+ m(m − 1), (−iαk)m+n
1310
+ m!
1311
+ n(n − 1),
1312
+ (S24)
1313
+ p-4
1314
+
1315
+ Supplementary material: “Towards a liquid-state theory for active matter”
1316
+ so that they can be written as
1317
+ M (1) = 2τρLa,k
1318
+ α
1319
+ eα2k2 (u1v⊺
1320
+ 0 − u0v⊺
1321
+ 1) ,
1322
+ M (2) = −2τρLb,kk2eα2k2u0v⊺
1323
+ 0,
1324
+ M (3) = τρLc,k
1325
+ α2
1326
+ eα2k2 �
1327
+ u2v⊺
1328
+ 0 + u0v⊺
1329
+ 2 − 2u1v⊺
1330
+ 1 − 2α2k2u0v⊺
1331
+ 0
1332
+
1333
+ .
1334
+ (S25)
1335
+ where ⊺ denotes matrix transpose, and
1336
+ (u0)m = (−iαk)m
1337
+ m!
1338
+ ,
1339
+ (u1)m = (−iαk)m
1340
+ m!
1341
+ m,
1342
+ (u2)m = (−iαk)m
1343
+ m!
1344
+ m(m − 1),
1345
+ (v0)n = (−iαk)n,
1346
+ (v1)n = (−iαk)nn,
1347
+ (v2)n = (−iαk)nn(n − 1),
1348
+ (S26)
1349
+ Observe that when acting on an arbitrary vector y, uv⊺y = (v⊺y)u, meaning that a matrix of
1350
+ this form projects all vectors onto the direction of u. We introduce ∆ = M (1) +M (2) +M (3)
1351
+ in this section, and, grouping the terms, we have
1352
+ e−(αk)2∆ = h0u0v⊺
1353
+ 0 + h10(u1v⊺
1354
+ 0 − u0v⊺
1355
+ 1) + h11u1v⊺
1356
+ 1 + h2(u2v⊺
1357
+ 0 + u0v⊺
1358
+ 2),
1359
+ (S27)
1360
+ where
1361
+ h0 = −2k2τρ (Lb,k + Lc,k) ,
1362
+ h10 = 2τρLa,k/α,
1363
+ h11 = 2τρLc,k/α2,
1364
+ h2 = τρLc,k/α2.
1365
+ (S28)
1366
+ We now consider the following spanning set: (v0, v1, v2, ...), where (vj)n = (−iαk)nPn,j
1367
+ (recall Pn,j = n!/(n − j)! is the permutation coefficient). One can easily check that it is
1368
+ a spanning set by spotting that the first j elements of vj are zeros, and hence no vector
1369
+ in this set can be written as a linear combination of others. Furthermore, let us introduce
1370
+ (q0, q1, q2, ..) as the dual basis of {vj}, such that v⊺
1371
+ i qj = δij. We proceed to write ∆ in the
1372
+ new basis: ˜∆ij ≡ v⊺
1373
+ i ∆ qj, where
1374
+ ˜∆ = eα2k2
1375
+
1376
+
1377
+
1378
+
1379
+
1380
+
1381
+
1382
+
1383
+
1384
+
1385
+
1386
+ h0v⊺
1387
+ 0u0 + h10v⊺
1388
+ 0u1 + h2v⊺
1389
+ 0u2
1390
+ −h10v⊺
1391
+ 0u0 + h11v⊺
1392
+ 0u1
1393
+ h2v⊺
1394
+ 0u0
1395
+ 0
1396
+ . . .
1397
+ h0v⊺
1398
+ 1u0 + h10v⊺
1399
+ 1u1 + h2v⊺
1400
+ 1u2
1401
+ −h10v⊺
1402
+ 1u0 + h11v⊺
1403
+ 1u1
1404
+ h2v⊺
1405
+ 1u0
1406
+ 0
1407
+ . . .
1408
+ h0v⊺
1409
+ 2u0 + h10v⊺
1410
+ 2u1 + h2v⊺
1411
+ 2u2
1412
+ −h10v⊺
1413
+ 2u0 + h11v⊺
1414
+ 2u1
1415
+ h2v⊺
1416
+ 2u0
1417
+ 0
1418
+ . . .
1419
+ 0
1420
+ 0
1421
+ 0
1422
+ 0
1423
+ . . .
1424
+ ...
1425
+ ...
1426
+ ...
1427
+ ...
1428
+ ...
1429
+
1430
+
1431
+
1432
+
1433
+
1434
+
1435
+
1436
+
1437
+
1438
+
1439
+
1440
+ ,
1441
+ (S29)
1442
+ which is nonzero only in the top 3 × 3 due to the orthogonality relation between v’s and q’s.
1443
+ p-5
1444
+
1445
+ Y. I. Li et al.
1446
+ Computing the inner products and setting ˜k = αk for convenience, we have
1447
+ v⊺
1448
+ 0u0 =
1449
+
1450
+ n
1451
+ (−˜k2)n
1452
+ n!
1453
+ = e−˜k2,
1454
+ v⊺
1455
+ 1u0 = v⊺
1456
+ 0u1 =
1457
+
1458
+ n
1459
+ (−˜k2)n
1460
+ n!
1461
+ n = −˜k2 �
1462
+ n
1463
+ (−˜k2)n
1464
+ n!
1465
+ = −˜k2e−˜k2,
1466
+ v⊺
1467
+ 2u0 = v⊺
1468
+ 0u2 =
1469
+
1470
+ n
1471
+ (−˜k2)n
1472
+ n!
1473
+ n(n − 1) = ˜k4e−˜k2,
1474
+ v⊺
1475
+ 1u1 =
1476
+
1477
+ n
1478
+ (−˜k2)n
1479
+ n!
1480
+ [n(n − 1) + n] = (˜k4 − ˜k2)e−˜k2,
1481
+ v⊺
1482
+ 1u2 = v⊺
1483
+ 2u1 =
1484
+
1485
+ n
1486
+ (−˜k2)n
1487
+ n!
1488
+ [n(n − 1)(n − 2) + 2n(n − 1)] = (−˜k6 + 2˜k4)e−˜k2,
1489
+ v⊺
1490
+ 2u2 =
1491
+
1492
+ n
1493
+ (−˜k2)n
1494
+ n!
1495
+ [n(n − 1)(n − 2)(n − 3) + 4n(n − 1)(n − 2) + 2n(n − 1)]
1496
+ = (˜k8 − 4˜k6 + 2˜k4)e−˜k2.
1497
+ (S30)
1498
+ The resulting 3 × 3 matrix appearing in eq. (S29) can then be written as
1499
+
1500
+
1501
+
1502
+
1503
+
1504
+ h0 − h10˜k2 + h2˜k4
1505
+ −h10 − h11˜k2
1506
+ h2
1507
+ −h0˜k2 + h10
1508
+
1509
+ ˜k4 − ˜k2�
1510
+ + h2
1511
+
1512
+ −˜k6 + 2˜k4�
1513
+ h10˜k2 + h11
1514
+
1515
+ ˜k4 − ˜k2�
1516
+ −h2˜k2
1517
+ h0˜k4 + h10
1518
+
1519
+ −˜k6 + 2˜k4�
1520
+ + h2
1521
+
1522
+ ˜k8 − 4˜k6 + 2˜k4�
1523
+ −h10˜k4 + h11
1524
+
1525
+ −˜k6 + 2˜k4�
1526
+ h2˜k4
1527
+
1528
+
1529
+
1530
+
1531
+ � .
1532
+ (S31)
1533
+ To compute the eigenvalues of the full matrix M = D + ∆, where Dkmn = (−n − ˜k2)δmn,
1534
+ we also need to write D in the new basis:
1535
+ ˜Djl = v⊺
1536
+ j D ql = −δj+1,l − (j − ˜k2)δjl,
1537
+ (S32)
1538
+ where we have used n(vj)n = (vj+1 + jvj)n, or explicitly
1539
+ ˜D =
1540
+
1541
+
1542
+
1543
+
1544
+
1545
+
1546
+
1547
+
1548
+ −˜k2
1549
+ −1
1550
+ 0
1551
+ . . .
1552
+ 0
1553
+ −1 − ˜k2
1554
+ −1
1555
+ 0
1556
+ . . .
1557
+ 0
1558
+ 0
1559
+ −2 − ˜k2
1560
+ −1
1561
+ 0
1562
+ . . .
1563
+ ...
1564
+ ...
1565
+ ...
1566
+ ...
1567
+ ...
1568
+
1569
+
1570
+
1571
+
1572
+
1573
+
1574
+
1575
+
1576
+ .
1577
+ (S33)
1578
+ Notice that ˜D is upper triangular and therefore the eigenvalues are simply the diagonal
1579
+ elements −n − ˜k2, which are the same as for D.
1580
+ Having written both the diagonal and non-diagonal parts in the new basis, we proceed
1581
+ to solve for the eigenvalues λ of �
1582
+ M = ˜D + ˜∆, satisfying det
1583
+
1584
+
1585
+ M − λI
1586
+ ���
1587
+ = 0, where I is the
1588
+ identity matrix. Observe that �
1589
+ M is of the following form,
1590
+
1591
+ M =
1592
+
1593
+ �X
1594
+ Y
1595
+ 0
1596
+ Z
1597
+
1598
+ � ,
1599
+ (S34)
1600
+ where X is a 3 × 3 matrix. One can prove that det
1601
+
1602
+
1603
+ M − λI
1604
+
1605
+ = det(X − λI) det(Z − λI).
1606
+ So we only need to solve for the eigenvalues of X and Z separately, but we already know
1607
+ p-6
1608
+
1609
+ Supplementary material: “Towards a liquid-state theory for active matter”
1610
+ the eigenvalues of Z as it is upper-triangular with diagonal elements (−n − ˜k2) for n ≥ 3.
1611
+ Hence what remains are the eigenvalues of X, which can be solved numerically easily as it
1612
+ is only 3 × 3. Overall, we have reduced the problem of finding the maximum eigenvalue of
1613
+ an infinite-dimensional matrix to diagonalising the 3 × 3 matrix ˜∆ + ˜D. We then compute
1614
+ the largest eigenvalue as
1615
+ λmax = −k2
1616
+
1617
+ 1 + τ 1 + 2(B2(k) − 2A1(k)2 + C2(k)) − 4k2B0(k)(B2(k) + C2(k))
1618
+ 1 − 2B0(k)k2
1619
+
1620
+ + o(τ),
1621
+ (S35)
1622
+ where
1623
+ B0(k) = Lb,k
1624
+ ��
1625
+ τ=0,
1626
+ B2(k) = (d/dτ)Lb,k,
1627
+ A1(k) = (1/√τ)La,k,
1628
+ C2(k) = (1/τ)Lc,k.
1629
+ (S36)
1630
+ REFERENCES
1631
+ [1] Grosberg A. Y. and Joanny J.-F., Phys. Rev. E, 92 (2015) 032118.
1632
+ [2] Ilker E. and Joanny J.-F., Phys. Rev. Research, 2 (2020) 023200.
1633
+ [3] Kardar M., Statistical physics of particles (Cambridge University Press) 2007.
1634
+ [4] Fodor ´E., Nardini C., Cates M. E., Tailleur J., Visco P. and van Wijland F., Phys.
1635
+ Rev. Lett., 117 (2016) 038103.
1636
+ p-7
1637
+
9tFLT4oBgHgl3EQfui8A/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CNA0T4oBgHgl3EQfAP_i/content/2301.01961v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9414863031b7eee94db21c8af62782961768ef8a3e083520c32aa62d5e402844
3
+ size 225898
CNA0T4oBgHgl3EQfAP_i/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cae6bec6de6f3f0968552bdd5bb3370e57264dd80db6bc122c1abde19a5923fa
3
+ size 108380
DNAzT4oBgHgl3EQfwf6z/content/2301.01724v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dafa04cb195b9d594a273da3d145d9f2f7d56bfcf803d9cda6cdbec7db04ee0a
3
+ size 806258
DNAzT4oBgHgl3EQfwf6z/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3eadd1010b89f5fb9b1d991b22fe183615d0cb851bf0bcb779cd6de237d3c535
3
+ size 218471
DtFRT4oBgHgl3EQfxjhb/content/tmp_files/2301.13642v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
DtFRT4oBgHgl3EQfxjhb/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
EtA0T4oBgHgl3EQfA__T/content/tmp_files/2301.01971v1.pdf.txt ADDED
@@ -0,0 +1,712 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Two statistical regimes in the transition to filamentation
2
+ Alexis Gomel,1, 2 Geoffrey Gaulier,1 Debbie Eeltink,1, 2, 3 Maura Brunetti,1, 4 and Jérôme Kasparian
3
+ 1, 2, ∗
4
+ 1Group of Applied Physics, University of Geneva, 1205 Geneva, Switzerland
5
+ 2Institute for Environmental Sciences, University of Geneva, 1205 Geneva, Switzerland
6
+ 3Present address: Laboratory of Theoretical Physics of Nanosystems, EPFL, Ch-1015 Lausanne, 10 Switzerland
7
+ 4Institute for Environmental Sciences, University of Geneva, 1205 Geneva, Switzerland
8
+ Abstract
9
+ We experimentally investigate fluctuations in the spectrum of ultrashort laser pulses propagating in air, close to the critical
10
+ power for filamentation. Increasing the laser peak power broadens the spectrum while the beam approaches the filamentation
11
+ regime. We identify two regimes for this transition: In the center of the spectrum, the output spectral intensity increases
12
+ continuously. In contrast, on the edges of the spectrum the transition implies a bimodal probability distribution function for
13
+ intermediate incident pulse energies, where a high-intensity mode appears and grows at the expense of the original low-intensity
14
+ mode. We argue that this dual behavior prevents the definition of a univoquial threshold for filamentation, shedding a new
15
+ light on the long-standing lack of explicit definition of the boundary of the filamentation regime.
16
+ ∗ jerome.kasparian@unige.ch
17
+ 1
18
+ arXiv:2301.01971v1 [physics.optics] 5 Jan 2023
19
+
20
+ I.
21
+ INTRODUCTION
22
+ Filamentation is a self-guided propagation regime typical of ultrashort, high-power laser pulses [1–4]. Beyond a
23
+ critical power (3 GW in air), the Kerr effect balances diffraction.
24
+ The beam then self-focuses until higher-order
25
+ nonlinear defocusing effects like ionization or the saturation of the Kerr effect [5] come into play.
26
+ The resulting
27
+ dynamical balance gives rise to self-guided light structures known as filaments. Filaments can extend over atmospheric
28
+ scale distances [6, 7], opening the way to various applications from remote sensing [8] to lightning control [9–14],
29
+ THz generation [15–20], fog clearing [21, 22], or the triggering of condensation in sub-saturated atmospheres [8, 23,
30
+ 24]. Filaments show very characteristic and even spectacular features, including long-distance propagation, bright
31
+ light emission due to both plasma emission on the side and spectral broadening in the forward direction, and noise
32
+ associated to the shockwave [25–27]. Together, these features give rise to the intuitive notion of a qualitatively distinct
33
+ propagation regime. However, defining a clear threshold for the filamentation regime turns out to be difficult [28],
34
+ especially in focused beams where linear propagation can be sufficient to reach the ionization threshold [29], and even
35
+ produce a denser plasma than Kerr self-focusing does [30]. Similarly, along the propagation axis, defining the onset
36
+ and end of filaments, and therefore their length, requires somewhat arbitrary choices.
37
+ Here, we statistically investigate the transition to filamentation . Shot-to-shot fluctuations of the spectral amplitudes
38
+ of a high-power laser beam, whether filamenting or not, are known to display characteristic probability distribution
39
+ functions (PDF): A regular probability distribution is observed in the center of the spectrum, while on its edge the
40
+ distribution is long-tailed (optical rogue wave [31]) [32]. We extend this analysis to the sub-filamenting regime and to
41
+ the transition to filamentation, in order to characterize how the statistics evolves when the incident power progressively
42
+ reaches the critical power for filamentation. The evolution of spectral intensity PDFs turns out to display typical
43
+ and contrasted signatures on the edges and in the center of the spectrum, respectively, suggesting that transition
44
+ to filamentation cannot be characterized as a whole. By doing so, we suggest that the ambiguities in the definition
45
+ of the limits of the filamentation regime are intrinsic to the physical process rather than instrumental or conceptual
46
+ limitations, shedding a new light on the long-standing lack of explicit definition of the boundary of the filamentation
47
+ regime.
48
+ II.
49
+ EXPERIMENTAL SETUP
50
+ Figure 1. Experimental setup
51
+ The experimental setup (Figure 1) relied on a Coherent Astrella laser delivering ultrashort pulses at 1 kHz repetition
52
+ rate. A half-wave plate installed in a motorized rotating stage ensureing ±1◦ precision, followed by a linear polarizer,
53
+ allowed to adjust the pulse energy with an accuracy of ∼ 10 µJ. The angle-to-energy calibration was performed before
54
+ each experimental run with a powermeter (Coherent PM10). The laser compressor was adjusted so as to slightly chirp
55
+ the pulses to a duration of 55 fs (as measured with PulseCheck, APE Berlin), in order to reach the filamentation
56
+ threshold in air within the tuning range of the energy. The beam was slightly focused from an initial diameter of 11 mm
57
+ at 1/e2 by an f = 2 m BK7 plano-convex lens located approximately at 15 cm after the polarizer and subsequently
58
+ through a 13.5 cm-long turbulent region generated by 48◦C to 565◦C hot air blown transversally by a hot air blower
59
+ (Steinel HL1502 S). 15–27.5 cm downstream of the lens, the beam self-focused and filamentation started if the incident
60
+ peak power was sufficient. The filamentation region was surrounded by a PVC tube of 18 cm diameter to shield the
61
+ beam against air displacements in the room so as to improve its stability. After the end of filamentation region, the
62
+ beam was imaged by a second BK7 lens (f = 20 cm) onto the entrance slit of an OceanOptics USB2000 spectrometer
63
+ providing ∼0.5 nm spectral resolution over the visible range. A neutral density filter prevented the spectrometer from
64
+ saturating. The spectrum was measured and recorded independently for each laser shot. For each incident pulse
65
+ 2
66
+
67
+ energy, 5000 individual spectra were recorded.
68
+ At each wavelength and incident energy, we characterized the shot to shot fluctuations by recording the PDF of
69
+ the spectral intensity as a 100-bin histogram, using identical bins in all conditions to facilitate comparison. In the
70
+ characterization of the PDF, we use among others Hogg’s unbiased kurtosis estimator, defined as
71
+ Hg = U0.05 − L0.05
72
+ U0.5 − L0.5
73
+ − 2.59
74
+ (1)
75
+ where Um and Lm refer to the mean of the upper and lower m quantiles, respectively.
76
+ This means that Um =
77
+ 1
78
+ m
79
+ � 1
80
+ 1−m F −1(y)dy and Lm = 1
81
+ m
82
+ � m
83
+ 0 F −1(y)dy, where F is the cumulative distribution function. For a Gaussian PDF,
84
+ the Hogg estimator is 0.
85
+ III.
86
+ RESULTS AND DISCUSSION
87
+ 100
88
+ 102
89
+ Intensity (arb.units)
90
+ (a)
91
+ (b) 0.017 mJ
92
+ 100
93
+ 102
94
+ Intensity (arb.units)
95
+ (c) 0.054 mJ
96
+ (d) 0.102 mJ
97
+ 750
98
+ 800
99
+ 850
100
+ Wavelength [nm]
101
+ 100
102
+ 102
103
+ Intensity (arb.units)
104
+ (e) 0.130 mJ
105
+ 750
106
+ 800
107
+ 850
108
+ Wavelength [nm]
109
+ (f) 0.173 mJ
110
+ 0.017
111
+ 0.054
112
+ 0.095
113
+ 0.107
114
+ 0.119
115
+ 0.130
116
+ 0.140
117
+ 0.149
118
+ 0.157
119
+ 0.169
120
+ Peak energy [mJ]
121
+ Figure 2. Evolution of the spectrum for increasing peak energy. (a) Average spectra; (b)-(f) Intensity fluctuations for incident
122
+ pulse energies of 0.017, 0.054, 0.102, 0.130, and 0.173 mJ, respectively.
123
+ In each panel, the solid thick line is the average
124
+ intensity, the dark shaded area marks range between the 20th and the 80th percentiles and the light shaded area displays the
125
+ range between the 5th and the 95th percentiles.
126
+ Figure 2a displays the evolution of the typical spectra recorded in the center of the beam after it starts diverging,
127
+ for incident energies ranging from 0.017 to 0.173 mJ/pulse. The dark shaded area of Panels b–f encompasses the
128
+ 20th to the 80th percentiles, while the light shadowed ranges from the 5th to the 95th ones, evidencing the typical
129
+ range of the shot-to-shot fluctuations. As is typical for self-phase modulation (SPM) [32, 33], the spectral broadening
130
+ 3
131
+
132
+ is characterized by the formation of an oscillatory plateau. For increasing incident powers, the plateau both rises
133
+ in intensity and broadens by a progressive displacement of its edges away from the laser fundamental wavelength.
134
+ Shot-to-shot fluctuations of the spectrum can therefore be characterized as essentially vertical (i.e., in intensity) in
135
+ the central part of the spectrum, and essentially horizontal (i.e., in spectral range) on its edges.
136
+ As displayed in Figure 2b–f, the shot-to-shot fluctuations can have the same order of magnitude as the mean
137
+ spectral intensity all over the spectrum.
138
+ In particular, above the threshold for appreciable spectral broadening,
139
+ fluctuations reach a factor of 4, ranging from the non-filamenting to the filamenting regimes even at average incident
140
+ pulse energies up to the critical power (0.173 mJ, P = 3.15 GW ∼ Pcr) where the filamentation visually seems to be
141
+ well established. Such behavior randomly alternating filamenting (spectrally broadened) and non-filamenting pulses
142
+ is consistent with the previously observed effect of turbulence on filamentation [34–36]. These fluctuations stem from
143
+ the pre-filamentation fluctuations of the incident laser itself and from the influence of the turbulence, as well as
144
+ the nonlinear transformation of the spectrum performed by the spectral broadening in the high-intensity region of
145
+ propagation.
146
+ The vertical and horizontal behaviors of the shot-to-shot fluctuations result in qualitatively different evolutions of
147
+ the PDF as a function of incident energy (fig. 3). In the center of the spectrum (805 nm, panels g and h), increasing
148
+ the incident pulse energy continuously shifts the peak of the PDF, from low to high spectral intensity. This shift
149
+ becomes faster and faster when moving away from the center of the spectrum (See 785 nm, panels e and f). Reaching
150
+ the spectrum edges, the behavior qualitatively changes, with the PDF becoming bimodal over the transition (773
151
+ nm, panels b,c, and 860 nm, panels i,j). Over the power range where the transition occurs, the low-intensity peak
152
+ progressively vanishes, while the high-intensity peak emerges. This behavior develops over a spectral range of ∼10 nm
153
+ on each side of the spectrum. Even further on the edges (765 nm, panels a,b), the bimodal behavior disappears again.
154
+ The PDF initially peaks close to zero intensity and rises when the broadening becomes sufficient.
155
+ Note that in spite of patterns visually similar to tipping points, these transitions cannot be described as such.
156
+ Rather, each laser pulse is essentially an independent experiment, hitting a fresh parcel of air.
157
+ This experiment
158
+ therefore consists in a series of random probings of the system behavior, with random initial phase profiles. The
159
+ qualitative behaviors associated to each incident pulse energy at each wavelength can be summarized in a “phase
160
+ diagram” (fig. 4a). We identify the regions with negligible broadening, with fully deployed broadening, and two kinds
161
+ of transition regions: either continuous or bimodal. Remarkably, the bimodal transitions regions are characterized by
162
+ a drop in both the skewness (fig. 4b) and Hogg’s unbiased kurtosis estimator Hg [37] (fig. 4c), while the continuous
163
+ transitions are characterized by increasing skewness and Hg. This can be understood by considering the corresponding
164
+ evolutions on fig. 3. In the central region of the spectrum, corresponding to continuous transitions, the PDF tail rises
165
+ on the high-spectral intensity side, resulting in a heavier tail and growing asymmetry. In contrast, the appearance
166
+ and growth of a secondary mode of the PDF tends to occur at the expense of the tails, and simultaneously results
167
+ in a broadening of the central region of the PDF, which explains the smaller skewness and Hogg estimator. Further
168
+ statistical moment like the kurtosis and coefficient of variation (i.e., the ratio between variance and mean) display
169
+ qualitatively similar behaviors, as illustrated in fig. 5.
170
+ From a mechanistic point of view, the bimodal transition corresponds to the wavelength range where the evolution
171
+ of the spectrum for increasing pulse energies mostly occurs as a horizontal fluctuation of the cliff delimiting the
172
+ broadened spectrum, i.e., the creation of new frequencies that previously were virtually absent from the spectrum.
173
+ At these wavelengths, the sharp rise of the spectrum (large
174
+ �� dI
175
+ Idt
176
+ ��) followed by a relatively flat plateau of fluctuating
177
+ width ensures the bimodal distribution, since the rising section of the spectrum has a negligible contribution to the
178
+ PDF: The spectrum mainly features two ranges of attainable values, close to zero and on the plateau, respectively,
179
+ while the intensity variations of the plateau itself is of second order. This interpretation also explains why the bimodal
180
+ behavior is observed on a much narrower range of wavelengths around 850 nm (See fig. 4a), where the oscillation is
181
+ sharper and the plateau is much less flat. In contrast, on the plateau, the fluctuations are mostly vertical. They
182
+ consist in intensity fluctuations, i.e., an increased intensity of frequencies pre-existing in the incident pulse, so that
183
+ the transition occurs continuously when the plateau progressively rises.
184
+ These two qualitatively different transition modes to a broadened pulse coexist in the evolution of the same spectrum,
185
+ driven by the same self-phase modulation process, and only some nanometers apart. The discontinuous transition to
186
+ filamentation on the edges of the spectrum where bimodal spectral intensity distributions are observed would point
187
+ to a system where filamenting and non-filamenting regimes are qualitatively distinct, and co-exist over some range of
188
+ input power. In contrast, the central part of the spectrum and its smooth, continuous transition would not allow to
189
+ define a threshold for the filamenting regime. Note that this spectral range bears most of the pulse energy.
190
+ We argue that this dual behavior within the same spectrum during the transition to filamentation intrinsically
191
+ prevents an unambiguous definition of the edges of a filamenting regime that would be qualitatively different from an
192
+ essentially linear extended focus [29].
193
+ 4
194
+
195
+ 250
196
+ 500
197
+ 750
198
+ 1000
199
+ 1250
200
+ Intensity (arb.units)
201
+ 0
202
+ 500
203
+ 1000
204
+ Count
205
+ 765 [nm]
206
+ a)
207
+ 0.017
208
+ 0.054
209
+ 0.095
210
+ 0.107
211
+ 0.119
212
+ 0.130
213
+ 0.140
214
+ 0.149
215
+ 0.157
216
+ 0.169
217
+ Pulse Energy [mJ]
218
+ 0
219
+ 250
220
+ 500
221
+ 750
222
+ 1000
223
+ Intensity (arb.units)
224
+ 0.017
225
+ 0.039
226
+ 0.062
227
+ 0.084
228
+ 0.106
229
+ 0.128
230
+ 0.151
231
+ 0.173
232
+ Peak energy [mJ]
233
+ 765 [nm]
234
+ b)
235
+ 10−5
236
+ 10−4
237
+ 10−3
238
+ 10−2
239
+ Count normalized
240
+ 750
241
+ 800
242
+ 850
243
+ 100
244
+ 102
245
+ 250
246
+ 500
247
+ 750
248
+ 1000
249
+ 1250
250
+ 1500
251
+ Intensity (arb.units)
252
+ 0
253
+ 500
254
+ 1000
255
+ Count
256
+ 773 [nm]
257
+ c)
258
+ 0.017
259
+ 0.054
260
+ 0.095
261
+ 0.107
262
+ 0.119
263
+ 0.130
264
+ 0.140
265
+ 0.149
266
+ 0.157
267
+ 0.169
268
+ Pulse Energy [mJ]
269
+ 0
270
+ 250
271
+ 500
272
+ 750
273
+ 1000
274
+ Intensity (arb.units)
275
+ 0.017
276
+ 0.039
277
+ 0.062
278
+ 0.084
279
+ 0.106
280
+ 0.128
281
+ 0.151
282
+ 0.173
283
+ Peak energy [mJ]
284
+ 773 [nm]
285
+ d)
286
+ 10−5
287
+ 10−4
288
+ 10−3
289
+ 10−2
290
+ Count normalized
291
+ 750
292
+ 800
293
+ 850
294
+ 100
295
+ 102
296
+ 500
297
+ 1000
298
+ 1500
299
+ 2000
300
+ Intensity (arb.units)
301
+ 0
302
+ 500
303
+ 1000
304
+ Count
305
+ 785 [nm]
306
+ e)
307
+ 0.017
308
+ 0.054
309
+ 0.095
310
+ 0.107
311
+ 0.119
312
+ 0.130
313
+ 0.140
314
+ 0.149
315
+ 0.157
316
+ 0.169
317
+ Pulse Energy [mJ]
318
+ 0
319
+ 250
320
+ 500
321
+ 750
322
+ 1000
323
+ 1250
324
+ Intensity (arb.units)
325
+ 0.017
326
+ 0.039
327
+ 0.062
328
+ 0.084
329
+ 0.106
330
+ 0.128
331
+ 0.151
332
+ 0.173
333
+ Peak energy [mJ]
334
+ 785 [nm]
335
+ f)
336
+ 10−5
337
+ 10−4
338
+ 10−3
339
+ 10−2
340
+ Count normalized
341
+ 750
342
+ 800
343
+ 850
344
+ 100
345
+ 102
346
+ 500
347
+ 1000
348
+ 1500
349
+ 2000
350
+ Intensity (arb.units)
351
+ 0
352
+ 500
353
+ 1000
354
+ Count
355
+ 805 [nm]
356
+ g)
357
+ 0.017
358
+ 0.054
359
+ 0.095
360
+ 0.107
361
+ 0.119
362
+ 0.130
363
+ 0.140
364
+ 0.149
365
+ 0.157
366
+ 0.169
367
+ Pulse Energy [mJ]
368
+ 0
369
+ 500
370
+ 1000
371
+ 1500
372
+ 2000
373
+ Intensity (arb.units)
374
+ 0.017
375
+ 0.039
376
+ 0.062
377
+ 0.084
378
+ 0.106
379
+ 0.128
380
+ 0.151
381
+ 0.173
382
+ Peak energy [mJ]
383
+ 805 [nm]
384
+ h)
385
+ 10−5
386
+ 10−4
387
+ 10−3
388
+ Count normalized
389
+ 750
390
+ 800
391
+ 850
392
+ 100
393
+ 102
394
+ 50
395
+ 100
396
+ 150
397
+ 200
398
+ 250
399
+ Intensity (arb.units)
400
+ 0
401
+ 500
402
+ 1000
403
+ Count
404
+ 860 [nm]
405
+ i)
406
+ 0.017
407
+ 0.054
408
+ 0.095
409
+ 0.107
410
+ 0.119
411
+ 0.130
412
+ 0.140
413
+ 0.149
414
+ 0.157
415
+ 0.169
416
+ Pulse Energy [mJ]
417
+ 0
418
+ 50
419
+ 100
420
+ 150
421
+ 200
422
+ Intensity (arb.units)
423
+ 0.017
424
+ 0.039
425
+ 0.062
426
+ 0.084
427
+ 0.106
428
+ 0.128
429
+ 0.151
430
+ 0.173
431
+ Peak energy [mJ]
432
+ 860 [nm]
433
+ j)
434
+ 10−4
435
+ 10−3
436
+ 10−2
437
+ 10−1
438
+ Count normalized
439
+ 750
440
+ 800
441
+ 850
442
+ 100
443
+ 102
444
+ Figure 3. Evolution of the histogram of the spectral intensity at (a,b) 765 nm (transition through a bimodal distribution), (c,d)
445
+ 773 nm (intermediate regime), (e,f) 785 nm, (g,h) 805 nm (smooth offset of the peak), and (i,j) 860 nm (bimodal transition).
446
+ (a,c,e,g,i): Individual histograms for increasing incident pulse energies. The color scale is the same as in fig. 2. (b,d,f,h,j):
447
+ Colormap of the same data. Each histogram is normalised to 1. Insets display the position of the wavelength in the spectrum
448
+ (See also Figure 2a)
449
+ 5
450
+
451
+ 740
452
+ 760
453
+ 780
454
+ 800
455
+ 820
456
+ 840
457
+ 860
458
+ 880
459
+ Wavelength [nm]
460
+ 0.017
461
+ 0.039
462
+ 0.062
463
+ 0.084
464
+ 0.106
465
+ 0.128
466
+ 0.151
467
+ 0.173
468
+ Peak energy [mJ]
469
+ No broadening
470
+ Smooth transition
471
+ Bimodal transition
472
+ Full broadening
473
+ 0.31
474
+ 0.71
475
+ 1.12
476
+ 1.52
477
+ 1.93
478
+ 2.34
479
+ 2.74
480
+ 3.15
481
+ Average intensity [GW]
482
+ 740
483
+ 760
484
+ 780
485
+ 800
486
+ 820
487
+ 840
488
+ 860
489
+ 880
490
+ Wavelength [nm]
491
+ 0.017
492
+ 0.039
493
+ 0.062
494
+ 0.084
495
+ 0.106
496
+ 0.128
497
+ 0.151
498
+ 0.173
499
+ Peak energy [mJ]
500
+ 0.31
501
+ 0.71
502
+ 1.12
503
+ 1.52
504
+ 1.93
505
+ 2.34
506
+ 2.74
507
+ 3.15
508
+ Average intensity [GW]
509
+ Smooth transition
510
+ Full broadening
511
+ Bimodal transition
512
+ 0
513
+ 1
514
+ 2
515
+ 3
516
+ 4
517
+ Skewness
518
+ 740
519
+ 760
520
+ 780
521
+ 800
522
+ 820
523
+ 840
524
+ 860
525
+ 880
526
+ Wavelength [nm]
527
+ 0.017
528
+ 0.039
529
+ 0.062
530
+ 0.084
531
+ 0.106
532
+ 0.128
533
+ 0.151
534
+ 0.173
535
+ Peak energy [mJ]
536
+ 0.31
537
+ 0.71
538
+ 1.12
539
+ 1.52
540
+ 1.93
541
+ 2.34
542
+ 2.74
543
+ 3.15
544
+ Average intensity [GW]
545
+ Smooth transition
546
+ Full broadening
547
+ Bimodal transition
548
+ −0.5
549
+ 0.0
550
+ 0.5
551
+ 1.0
552
+ 1.5
553
+ 2.0
554
+ Hogg kurtosis
555
+ Figure 4. (a) "Phase diagram" displaying the different regimes as a function of wavelength and incident pulse energy, from
556
+ non-broadened to fully-broadened, with continuous and bimodal transition modes in between.
557
+ (b, c) Borders of the same
558
+ diagram overlaid on (b) the skewness and (c) the Hogg’s unbiased kurtosis estimator [37].
559
+ IV.
560
+ CONCLUSION
561
+ In summary, we characterized the evolution of intensity fluctuations across the spectrum of an ultrashort beam
562
+ propagating in air, for a wide range of powers covering below and up to the critical power for filamentation. While
563
+ on the edges of the spectrum the transition to filamentation is discontinuous and displays a bimodal distribution of
564
+ spectral intensities around the critical power, it is continuous around the fundamental incident laser wavelength. This
565
+ dual behavior provides an explanation for the lack of unambiguous definition of the edges of the filamentation regime
566
+ 6
567
+
568
+ 740
569
+ 760
570
+ 780
571
+ 800
572
+ 820
573
+ 840
574
+ 860
575
+ 880
576
+ Wavelength [nm]
577
+ 0.017
578
+ 0.039
579
+ 0.062
580
+ 0.084
581
+ 0.106
582
+ 0.128
583
+ 0.151
584
+ 0.173
585
+ Peak energy [mJ]
586
+ 0.31
587
+ 0.71
588
+ 1.12
589
+ 1.52
590
+ 1.93
591
+ 2.34
592
+ 2.74
593
+ 3.15
594
+ Average intensity [GW]
595
+ Smooth transition
596
+ Full broadening
597
+ Bimodal transition
598
+ 0
599
+ 5
600
+ 10
601
+ 15
602
+ 20
603
+ 25
604
+ 30
605
+ Kurtosis
606
+ 740
607
+ 760
608
+ 780
609
+ 800
610
+ 820
611
+ 840
612
+ 860
613
+ 880
614
+ Wavelength [nm]
615
+ 0.017
616
+ 0.039
617
+ 0.062
618
+ 0.084
619
+ 0.106
620
+ 0.128
621
+ 0.151
622
+ 0.173
623
+ Peak energy [mJ]
624
+ 0.31
625
+ 0.71
626
+ 1.12
627
+ 1.52
628
+ 1.93
629
+ 2.34
630
+ 2.74
631
+ 3.15
632
+ Average intensity [GW]
633
+ Smooth transition
634
+ Full broadening
635
+ Bimodal transition
636
+ 0
637
+ 50
638
+ 100
639
+ 150
640
+ 200
641
+ 250
642
+ 300
643
+ Variance/Mean
644
+ Figure 5. "Phase diagram" displaying the different regimes as a function of wavelength and incident pulse energy, from non-
645
+ broadened to fully-broadened, with continuous and bimodal transition modes in between overlaid on (a) the kurtosis and (b)
646
+ the the coefficient of variation (variance/mean).
647
+ in experiments or numerical simulations in spite of the intuitive understanding that filamentation qualitatively differs
648
+ from a more linear propagation regime.
649
+ Funding. Swiss National Science Foundation (SNF, grant 200020-175697)
650
+ Acknowledgements. Experimental support was provided by Michel Moret.
651
+ Disclosures. The authors declare no conflicts of interest.
652
+ [1] A. Braun, C. Y. Chien, S. Coe, and G. Mourou, Optics communications 105, 63 (1994).
653
+ [2] S. Chin, F. Théberge, and W. Liu, Applied Physics B 86, 477 (2007).
654
+ [3] A. Couairon and A. Mysyrowicz, Physics Reports 441, 47 (2007).
655
+ [4] L. Bergé, S. Skupin, R. Nuter, J. Kasparian,
656
+ and J.-P. Wolf, Reports on progress in physics 70, 1633 (2007), arXiv:
657
+ physics/0612063.
658
+ [5] P. Béjot, J. Kasparian, S. Henin, V. Loriot, T. Vieillard, E. Hertz, O. Faucher, B. Lavorel, and J.-P. Wolf, Physical Review
659
+ Letters 104, 103903 (2010).
660
+ [6] M. Rodriguez, R. Bourayou, G. Méjean, J. Kasparian, J. Yu, E. Salmon, A. Scholz, B. Stecklum, J. Eislöffel, U. Laux,
661
+ A. P. Hatzes, R. Sauerbrey, L. Wöste, and J.-P. Wolf, Physical Review E 69, 036607 (2004).
662
+ [7] M. Durand, A. Houard, B. Prade, A. Mysyrowicz, A. Durécu, B. Moreau, D. Fleury, O. Vasseur, H. Borchert, K. Diener,
663
+ R. Schmitt, F. Théberge, M. Chateauneuf, J.-F. Daigle, and J. Dubois, Optics Express 21, 26836 (2013).
664
+ [8] J. Kasparian, M. Rodriguez, G. Méjean, J. Yu, E. Salmon, H. Wille, R. Bourayou, S. Frey, Y.-B. André, A. Mysyrowicz,
665
+ R. Sauerbrey, J.-P. Wolf, and L. Wöste, Science 301, 61 (2003).
666
+ [9] X. M. Zhao, J.-C. Diels, C. Y. Wang, and J. M. Elizondo, IEEE Journal of Quantum Electronics 31, 599 (1995).
667
+ [10] D. Comtois, C. Y. Chien, A. Desparois, F. Gérin, G. Jarry, T. W. Johnston, J. C. Kieffer, B. L. Fontaine, F. Martin,
668
+ 7
669
+
670
+ R. Mawassi, H. Pépin, F. A. M. Rizk, F. Vidal, P. Couture, H. P. Mercure, C. Potvin, A. Bondiou-Clergerie,
671
+ and
672
+ I. Gallimberti, Applied physics Letters 76, 819 (2000).
673
+ [11] J. Kasparian, R. Ackermann, Y.-B. André, G. Méchain, G. Méjean, B. Prade, P. Rohwetter, E. Salmon, K. Stelmaszczyk,
674
+ J. Yu, A. Mysyrowicz, R. Sauerbrey, L. Wöste, and J.-P. Wolf, Optics Express 16, 5757 (2008).
675
+ [12] E. Schubert, D. Mongin, J. Kasparian, and J.-P. Wolf, Optics Express 23, 28640 (2015).
676
+ [13] E. Schubert, D. Mongin, J. Kasparian, and J.-P. Wolf, Optics Express 25, 11210 (2017).
677
+ [14] F. Théberge, J.-F. Daigle, J.-C. Kieffer, F. Vidal, and M. Châteauneuf, Scientific Reports 7 (2017), 10.1038/srep40063.
678
+ [15] P. Sprangle, J. R. Peñano, B. Hafizi, and C. A. Kapetanakos, Physical Review E 69 (2004).
679
+ [16] A. Houard, Y. Liu, B. Prade, V. T. Tikhonchuk, and A. Mysyrowicz, Physical Review Letters 100, 255006 (2008).
680
+ [17] A. G. Stepanov, S. Henin, Y. Petit, L. Bonacina, J. Kasparian, and J.-P. Wolf, Applied Phyisics B 101, 11 (2010), dOI:
681
+ 10.1007/s00340-010-4186-4.
682
+ [18] A. G. Stepanov, S. Henin, Y. Petit, L. Bonacina, J. Kasparian, and J.-P. Wolf, Applied Physics B-Lasers and Optics 115,
683
+ 293 (2014), WOS:000334493900018.
684
+ [19] J. Daigle, F. Théberge, M. Henriksson, T. Wang, S. Yuan, M. Châteauneuf, J. Dubois, M. Piché, and S. L. Chin, Optics
685
+ Express 20, 6825 (2012).
686
+ [20] M. Clerici, M. Peccianti, B. E. Schmidt, L. Caspani, M. Shalaby, M. Giguère, A. Lotti, A. Couairon, F. Légaré, T. Ozaki,
687
+ D. Faccio, and R. Morandotti, Physical Review Letters 110, 253901 (2013).
688
+ [21] L. de la Cruz, E. Schubert, D. Mongin, S. Klingebiel, M. Schultze, T. Metzger, K. Michel, J. Kasparian, and J.-P. Wolf,
689
+ Applied Physics Letters 109, 251105 (2016).
690
+ [22] G. Schimmel, T. Produit, D. Mongin, J. Kasparian, and J.-P. Wolf, Optica 5, 1338 (2018).
691
+ [23] S. Henin, Y. Petit, P. Rohwetter, K. Stelmaszczyk, Z. Hao, W. Nakaema, A. Vogel, T. Pohl, F. Schneider, J. Kasparian,
692
+ K. Weber, L. Wöste, and J. Wolf, Nature Communications 2, 456 (2011).
693
+ [24] J. Ju, J. Liu, C. Wang, H. Sun, W. Wang, X. Ge, C. Li, S. L. Chin, R. Li, and Z. Xu, Optics Letters 37, 1214 (2012).
694
+ [25] J. Yu, D. Mondelain, J. Kasparian, E. Salmon, S. Geffroy, C. Favre, V. Boutou, and J. P. Wolf, Applied Optics 42, 7117
695
+ (2003).
696
+ [26] O. Lahav, L. Levi, I. Orr, R. A. Nemirovsky, J. Nemirovsky, I. Kaminer, M. Segev, and O. Cohen, Physical Review A 90,
697
+ 021801 (2014).
698
+ [27] N. Jhajj, E. W. Rosenthal, R. Birnbaum, J. K. Wahlstrand, and H. M. Milchberg, Physical Review X 4, 011027 (2014).
699
+ [28] S. L. Chin, Y. Chen, O. Kosareva, V. P. Kandidov, and F. Théberge, Laser Physics 18, 962 (2008).
700
+ [29] K. Lim, M. Durand, M. Baudelet, and M. Richardson, Scientific Reports 4 (2015), 10.1038/srep07217.
701
+ [30] D. Reyes, M. Baudelet, M. Richardson, and S. Rostami Fairchild, Journal of Applied Physics 124, 053103 (2018).
702
+ [31] D. R. Solli, C. Ropers, P. Koonath, and B. Jalali, Nature 450, 1054 (2007), 10.1038/nature06402 0028-0836.
703
+ [32] J. Kasparian, P. Béjot, J.-P. Wolf, and J. M. Dudley, Optics Express 17, 12070 (2009).
704
+ [33] R. W. Boyd, Nonlinear Optics, 3rd ed. (Academic Press, Boston, 2008).
705
+ [34] R. Ackermann, G. Méjean, J. Kasparian, J. Yu, E. Salmon, and J.-P. Wolf, Optics Letters 31, 86 (2006).
706
+ [35] R. Salamé, N. Lascoux, E. Salmon, J. Kasparian, and J. P. Wolf, in 2nd French-Chinese Workshop on "Ultra-short and
707
+ Ultra-intense Lasers and Applications (FCILA-2007) (2007).
708
+ [36] E. Schubert, L. de la Cruz, D. Mongin, S. Klingebiel, M. Schultze, T. Metzger, K. Michel, J. Kasparian, and J.-P. Wolf,
709
+ Physical Review A 94, 043808 (2016).
710
+ [37] T. H. Kim and H. White, Finance Research Letters 1, 56 (2004).
711
+ 8
712
+
EtA0T4oBgHgl3EQfA__T/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FtE1T4oBgHgl3EQfEwPV/content/2301.02895v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2c32ed694524f1934251d98778c21d0c8b8cf69543f50a88d9e1e41af2a4113b
3
+ size 420950
FtE1T4oBgHgl3EQfEwPV/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fa6398fa123a2db5ea0cdb96ed37702986996a95d0b03baf6e64869bf95e3020
3
+ size 4915245
FtE1T4oBgHgl3EQfEwPV/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:560e7d11b51fb4a8d4a52e9dc9ca1b7c9837dc01ef881db09388ce379c4bdc05
3
+ size 181833
GNE4T4oBgHgl3EQfHQyx/content/tmp_files/2301.04902v1.pdf.txt ADDED
@@ -0,0 +1,569 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Prepared for submission to JINST
2
+ Study on U/Th residual radioactivity in acrylic from
3
+ surface treatment
4
+ Yuanxia Li,𝑎 Xiaohui Qian,𝑎 Xiaolan Luo,𝑎 Jie Zhao,𝑎,1 Gaofeng Zhang,𝑏 Xiaoyan Ma,𝑎
5
+ Yuekun Heng,𝑎 Liangjian Wen,𝑎 Monica Sisti,𝑐 Frédéric Perrot,𝑑 Hongqiang Tang𝑏
6
+ 𝑎Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China
7
+ 𝑏Donchamp New Material Technology Co. Ltd, Taixing 225400, China
8
+ 𝑐INFN Milano Bicocca and Università di Milano-Bicocca, Milano, Italy
9
+ 𝑑Univ. Bordeaux, CNRS, CENBG, UMR 5797, F-33170 Gradignan, France
10
+ E-mail: zhaojie@ihep.ac.cn
11
+ Abstract: Acrylic is widely used as material for the target container in low background experiments
12
+ due to its high light transparency and low intrinsic radioactivity. However, its surface can be easily
13
+ contaminated during production, so careful treatment of the surface is essential to avoid direct
14
+ contamination of the target. The Jiangmen Underground Neutrino Observatory will use about 600 t
15
+ of acrylic to build the spherical vessel of 35.4 m in diameter for a 20 kt liquid scintillator (LS).
16
+ Since acrylic will contact the LS directly, the cleanliness of the its surface is quite important for the
17
+ radiopurity of the LS. A new method for measuring the radioactivity of 238U and 232Th in acrylic to
18
+ sub-ppt (< 10−12 g/g) was developed, and it is crucial for the acrylic radioactivity screening in this
19
+ study. We performed many background tests on different surface treatments, and the recommended
20
+ procedure for the treatment of acrylic to achieve low radioactivity and high light transparency could
21
+ be applicable to other low background experiments.
22
+ 1Corresponding author.
23
+ arXiv:2301.04902v1 [physics.ins-det] 12 Jan 2023
24
+
25
+ Contents
26
+ 1
27
+ Introduction
28
+ 1
29
+ 2
30
+ Screening of surface treatment material by gamma spectrometer
31
+ 2
32
+ 3
33
+ Method for measuring U/Th in acrylic by ICP-MS
34
+ 3
35
+ 4
36
+ Study of the procedure for acrylic surface treatments
37
+ 5
38
+ 4.1
39
+ Solution absorption in acrylic
40
+ 5
41
+ 4.2
42
+ Contamination from different surface treatments
43
+ 7
44
+ 4.3
45
+ Protection film
46
+ 8
47
+ 5
48
+ Summary
49
+ 9
50
+ 1
51
+ Introduction
52
+ The Jiangmen Underground Neutrino Observatory (JUNO) is a multi-purpose neutrino experiment,
53
+ which will build the world’s largest liquid scintillator (LS) detector. An acrylic vessel is used as
54
+ the 20 kt LS container with 35.4 m in diameter and 120 mm in thickness because of its high light
55
+ transparency and low intrinsic radioactivity [1].
56
+ To reach the physics target, the average radio-purity of the acrylic is required to be less than
57
+ 1 ppt [2]. As shown in Ref. [3], the radio purity in the bulk has reached the requirement. However,
58
+ the distribution of radioactivity along the thickness is not extremely uniform. The bulk measurement
59
+ of samples with several centimeters of thickness can not reflect the surface contamination, since
60
+ the thickness of external contamination on the acrylic surface usually reaches nanometre to micron
61
+ level, and the surface contamination will result averaged out in the bulk measurement. If the external
62
+ radioactive contamination stays on the surface, only gammas and few alphas/betas from radioactive
63
+ decays can be emitted into the LS and rejected by the effective fiducial volume cut by the off-line
64
+ analysis. However, based on the experiences at Borexino [4] and SNO+ [5], the U/Th daughters
65
+ near the inner surface of the vessel could leak into the LS by diffusion and convection during stable
66
+ running, thus making the acrylic vessel a stable contamination source for the LS. Borexino put
67
+ great efforts on controlling the temperature distribution to avoid convection in LS; however, it is
68
+ impossible to repeat the same thing at JUNO due to the large size of the experiment (70 times
69
+ Borexino target). Therefore, the radiopurity of the inner surface of acrylic is quite important for
70
+ JUNO, especially for the physic topics in the low energy regions, such as solar neutrino studies [1].
71
+ The JUNO acrylic vessel is produced with 265 pieces because of its large size, as shown in
72
+ Fig. 1. Each acrylic panel is firstly produced in a carefully cleaned flat mold and then shaped to
73
+ bend board at high temperature at the company; finally it is bonded directly at JUNO site [1]. The
74
+ surface of the acrylic panel is exposed to air and covered with a high-temperature resistant cloth
75
+ – 1 –
76
+
77
+ during the bending, thus the surface is eventually contaminated and not as smooth as the flat panel.
78
+ Surface treatments are performed before shipment to the JUNO site. Typical protocols to remove
79
+ surface contaminations include the following steps:
80
+ • The highest contaminations can reach tens of µm depths from the surface [6]. Thus, at least
81
+ 0.1 µm thickness of the surface of acrylic is firstly removed by sanding with special paper.
82
+ • The surface is not so smooth after sanding, so polishing is needed to improve the transparency.
83
+ The polishing is done with a wool wheel and polishing fluid.
84
+ • The surface should be well cleaned with detergent and deionized water after polishing.
85
+ • Finally, a thin film is used to cover the acrylic surface to avoid external contamination during
86
+ transportation and installation.
87
+ All tools and detergents have risks to introduce more contamination on the surface, therefore
88
+ each surface treatment should be well studied to minimize those risks.
89
+ Figure 1. The acrylic vessel is produced with 265 pieces due to its very large size, as shown in the left figure.
90
+ Each panel is produced separately, and all the panels will be finally bonded to a sphere at JUNO site. One
91
+ JUNO panel is shown in the right figure as an example.
92
+ The paper is organized as follows. The surface treatment material screening is described in
93
+ Sec 2. The new method for measuring 238U and 232Th (U/Th) in acrylic to sub-ppt level is described
94
+ in Sec 3. Various tests on radioactivity from each step of the above treatment protocol are discussed
95
+ in Sec 4, and the recommended procedure is also shown in the same section. The concluding
96
+ remarks are in Sec. 5.
97
+ 2
98
+ Screening of surface treatment material by gamma spectrometer
99
+ The main tools and detergents used for surface treatments are sanding papers, polishing fluid,
100
+ Alconox powder [7], deionized water and protection film. We used a gamma spectrometer to screen
101
+ the radiopurity of the tools and detergents first. We have one HPGe facility at ground level at
102
+ IHEP [8]. The gamma spectrometer plays an important role in the primary screening of the raw
103
+ – 2 –
104
+
105
+ 0
106
+ 0
107
+ 0
108
+ 0
109
+ 0
110
+ Q
111
+ 0
112
+ 4
113
+ 0
114
+ .materials at JUNO, and the advantage is that samples can be screened directly without any pre-
115
+ treatment and with no damage to the sample. The principle of gamma spectroscopy is to measure
116
+ the emitted gamma from the decay chain, and it is more sensitive to gammas with higher energy
117
+ due to lower background. For example, the detector is more sensitive to the lower part of the
118
+ uranium chain starting from 226Ra, and the 238U concentration can be derived by assuming secular
119
+ equilibrium.
120
+ The measured results for the tools and detergent used for acrylic surface treatment are sum-
121
+ marized in Table 1. We found that special mirror wax purchased from Saint-Gobain [9] has lower
122
+ radioactivity for 40K than one-step fast wax, due to the different chemical components. The sand-
123
+ paper with a green base plate has lower radioactivity and better sand fastening than the one with a
124
+ black base plate for similar mesh numbers. Regarding the Alconox powder, the first measurement
125
+ performed at IHEP gave an upper limit of several tens to hundreds of ppb level for thorium and
126
+ uranium concentrations, respectively, due to the limited sensitivity of HPGe. The same sample was
127
+ further measured by HPGe at China Jinping Underground Laboratory (CJPL) with better shielding
128
+ and sensitivity [10] down to 10 ppb for 232Th. From the obtained results, there is a higher uranium
129
+ concentration than thorium in the Alconox powder. The polishing fluid and sandpaper with lower
130
+ radioactivity are selected for the surface treatments on acrylic.
131
+ After surface treatment, the acrylic surface will be protected with a thin film to avoid dust and
132
+ radon daughters deposition on the surface during the handling operations for transportation and
133
+ installation. The film on the inner surface will be removed by the final cleaning with high pressure
134
+ water jet after installation, and there is no possibility for manual operation inside the acrylic vessel.
135
+ There are two types of protection film that can be used to protect the acrylic surface, ordinary
136
+ polyethylene (PE) film with few glue on the surface and adhesive masking paper film. The PE film
137
+ is better in toughness, but it is not easy to be removed by the water jet. On the contrary, the paper
138
+ film with few water soluble glue on the surface can be easily removed by water washing since the
139
+ glue is soluble in water, but overall its mechanical strength is worse. The radioactivity screening of
140
+ the glue that is used on the PE film showed only upper limits for U/Th at the level of hundreds of
141
+ ppb. Concerning the adhesive masking paper film (purchased from [11]), we could only measure
142
+ the paper film and the glue together inside the HPGe detector. The water soluble glue itself was
143
+ further measured by ICP-MS, as it will be discussed later.
144
+ 3
145
+ Method for measuring U/Th in acrylic by ICP-MS
146
+ Different from gamma spectroscopy, the principle of the Inductively Coupled Plasma Mass Spec-
147
+ troscopy (ICP-MS) is to detect the nuclei according to their exact atomic weight. ICP-MS can
148
+ measure the isotopes 238U and 232Th directly without other information on the chain, and the sen-
149
+ sitivity can reach the sub-ppt level. However, the sample measured by ICP-MS must be in liquid
150
+ form, so a careful and optimized pre-treatment on the sample is needed.
151
+ For the radio purity measurement on acrylic surface samples, we have developed a new method
152
+ based on microwave ashing and ICP-MS equipment. The design for the pre-treatment flow is shown
153
+ in Fig. 2. Both the acrylic sample and the tracers (the natural-non-existing nuclei 229Th and 233U)
154
+ are ashed by the machine in a quartz vessel. The residual is collected by soaking with 35% HNO3.
155
+ – 3 –
156
+
157
+ Table 1.
158
+ Material screening by gamma spectroscopy on tools and detergents used for the acrylic surface
159
+ treatment. If not differently mentioned, the sample was measured at IHEP. The conversions between Bq/kg
160
+ and mass concentration units for U/Th are given: 1 Bq/kg of 232Th activity in a material is equal to
161
+ 2.5 × 10−7 g/g (or 250 ppb) of 232Th mass concentration in that material; similarly, 1 Bq/kg of 238U means
162
+ 8.1 × 10−8 g/g (or 81 ppb) of 238U.
163
+ 238U chain [Bq/kg]
164
+ 232Th chain [Bq/kg]
165
+ 40K
166
+ 214Bi/214Pb
167
+ 226Ra
168
+ 212Bi/208Tl
169
+ [Bq/kg]
170
+ Polishing
171
+ Special mirror wax
172
+ 2.8±0.2
173
+ 2.9±1.3
174
+ 5.8±0.3
175
+ 3.8±0.9
176
+ One step fast wax
177
+ 3.1±0.3
178
+ 5.0±1.7
179
+ 5.5±0.4
180
+ 34.5±3.1
181
+ Alconox powder
182
+ -
183
+ <0.37
184
+ <4.4
185
+ <0.24
186
+ 5.9±1.3
187
+ Measured at CJPL
188
+ 0.23±0.02
189
+ 0.82±0.14
190
+ 0.05±0.02
191
+ 7.5±1.0
192
+ Sand paper
193
+ Black base-plate
194
+ 7.2±0.6
195
+ <21
196
+ 13.6±0.6
197
+ <3.7
198
+ Green base-plate
199
+ <1.7
200
+ <10.2
201
+ <1.6
202
+ <2.2
203
+ Protection film
204
+ Glue on PE film
205
+ <0.2
206
+ <2.3
207
+ <0.1
208
+ <0.6
209
+ Water soluble film
210
+ <0.47
211
+ <10.8
212
+ 0.58±0.19
213
+ <1.56
214
+ The eluent is collected and heated to remove the excess acid, and the solution is finally diluted for
215
+ the ICP-MS measurement.
216
+ Figure 2. The flow chart for the pre-treamtent of acrylic samples. The ashing of the acrylic sample is done
217
+ with the microwave muffle furnace described in the text.
218
+ In Ref. [3], a different approach was used: the acrylic was vaporized and burned in a two-stage
219
+ furnace, while clean gas (mixed N2/O2) was supplied to the furnace. Monitoring of the pressure
220
+ in the whole system is essential in this case. Compared with the pre-treatment in [3], with the new
221
+ technique there is no need for gas input to the microwave muffle furnace, and the overall operation
222
+ is easier and safer. All the pre-treatment process is done in a class 10,000 tent, while the ICP-MS
223
+ measurement is performed in a class 1,000 room. The cleanliness of the quartz vessels is quite
224
+ important for the sensitivity of the measurement, and their cleaning procedure is similar to that
225
+ described in Ref. [3]. All the containers are soaked in the two-stage acid cylinders filled with
226
+ 6 mol/L HNO3 for at least one day at each stage to remove the U/Th on the surface. In the end,
227
+ the containers are filled with 6 mol/L HNO3 and boiled for 10 min, then they are rinsed with fresh
228
+ water and ready for use.
229
+ The microwave muffle furnace (Phoenix BLACK [12]) is put in the clean tent and used for
230
+ ashing the acrylic sample, as shown on the left of Fig. 3. The temperature for ashing is optimized
231
+ to achieve no visible organic residual in the vessel, and the optimized temperature as a function of
232
+ time is shown on the right of Fig. 3. The quartz vessel is used as the sample container and well
233
+ cleaned. The 229Th and 233U standards (preserved in 2% acid) are added together with the acrylic
234
+ – 4 –
235
+
236
+ Tracer and
237
+ Ashing in
238
+ Soak the vessel
239
+ acrylic
240
+ quartz vessel
241
+ with 35% HNO3
242
+ Diluted for ICP-MS
243
+ Eluent was collected and
244
+ measurement
245
+ heated to remove excess acid0
246
+ 20
247
+ 40
248
+ 60
249
+ 80
250
+ Time [min]
251
+ 0
252
+ 200
253
+ 400
254
+ 600
255
+ C]
256
+ o
257
+ Temperature [
258
+ Figure 3. The microwave muffle furnace (Phoenix BLACK) used for the pre-treatment of acrylic is shown
259
+ in the left figure. The optimized temperature as a function of time for acrylic ashing is shown in the right
260
+ figure.
261
+ sample to the vessel in the beginning, and the recovery efficiency can be evaluated by measuring the
262
+ 229Th/233U in the solution sent to ICP-MS. The average recovery efficiency of U/Th is calculated as
263
+ (95±13)% based on more than one hundreds measurements (the given uncertainty is the standard
264
+ deviation). The recovery efficiency is calibrated every time a sample is measured, and the single
265
+ precision is better than 5%. To estimate the background for the pre-treatment, we have followed
266
+ the same procedure without the acrylic sample (blank test). With careful background control, the
267
+ blank test showed that the absolute background for the pre-treatment amounts to 0.24±0.07 pg for
268
+ 238U and 0.38±0.04 pg for 232Th.
269
+ 4
270
+ Study of the procedure for acrylic surface treatments
271
+ 4.1
272
+ Solution absorption in acrylic
273
+ The acrylic panel is cleaned after surface treatments at the company before shipment, and the whole
274
+ acrylic sphere is finally cleaned onsite after installation. Acrylic can absorb water, thus traces of
275
+ radioactivity in cleaning water may diffuse into acrylic. The absorption of water in acrylic obeys
276
+ the mathematical laws of diffusion. We have performed several water absorption tests on flat acrylic
277
+ samples with 2 mm thickness. The mass proportion of absorbed water in acrylic as a function of
278
+ time is shown in Fig. 4. The absorption of water in acrylic did not reach equilibrium in one month,
279
+ and the mass of absorbed water in acrylic increased almost linearly at the beginning, which is far
280
+ away from the equilibrium state. Therefore, there is no impact of the acrylic panel thickness when
281
+ exposure to water is shortened to several hours. Assuming we will clean the acrylic surface during
282
+ one hour at the company, the absorbed water in acrylic can reach about 0.08% for the sample with
283
+ 2 mm thickness, which is 1 g/m2 water absorption for one side of acrylic surface.
284
+ For the cleaning procedure, we use Alconox solution (0.1% of water) for degreasing and
285
+ deionized water for rinsing. Traces of radioactivity in both water and Alconox can diffuse into
286
+ acrylic during cleaning. We use deionized water with 10−14 g/g U/Th to perform water cleaning, so
287
+ the residual traces of radioactivity from absorbed water is negligible. Even though the Alconox is
288
+ not as clean as the deionized water, most of Alconox can be removed by water rinsing. To validate
289
+ how much radioactivity from Alconox can go into acrylic, we soaked the acrylic sample with 2 mm
290
+ – 5 –
291
+
292
+ Pho
293
+ QulckTest
294
+ 方法
295
+ CM
296
+ OYFigure 4.
297
+ Results of water absorption tests performed on flat acrylic samples with 2 mm thickness. The
298
+ mass proportion of absorbed water to acrylic as a function of time is shown during 35 days, and the data
299
+ points in the first day are magnified in the sub-figure.
300
+ thickness in Alconox solution with different concentrations and time exposure, and the radiopurity
301
+ of the sample for U/Th is measured by ICP-MS in the end. We have soaked the samples in Alconox
302
+ solution for two months in order to enlarge the possible radioactivity contamination in the bulk of
303
+ acrylic (2 mm thickness). The results of the tests for U/Th surface contamination are shown in
304
+ Table 2.
305
+ Table 2.
306
+ The acrylic samples with 2 mm thickness are soaked in different solutions with different time
307
+ exposure. The U/Th contamination from solution absorption in acrylic after absorption is measured by
308
+ ICP-MS.
309
+ No.
310
+ Sample preparation
311
+ Exposure
312
+ Mass[g]
313
+ 238U[ppt]
314
+ 232Th[ppt]
315
+ 1
316
+ No soaking
317
+ -
318
+ 3.25
319
+ 0.5±0.1
320
+ 1.7±0.1
321
+ 2
322
+ 0.1% Alconox solution
323
+ 1 day
324
+ 3.21
325
+ 0.6±0.1
326
+ 2.3±0.2
327
+ 3
328
+ 0.1% Alconox solution
329
+ 2 months
330
+ 3.18
331
+ 1.9±0.1
332
+ 2.0±0.3
333
+ 4
334
+ 2% Alconox solution
335
+ 2 months
336
+ 3.74
337
+ 4.4±0.2
338
+ 2.3±0.2
339
+ 5
340
+ 0.1% Alconox solution + 30% HNO3
341
+ 2 months + 1 day
342
+ 3.11
343
+ 0.5±0.1
344
+ 1.5±0.2
345
+ 6
346
+ Tap water after filter [739 ppt 238U, 0.02 ppt 232Th]
347
+ 1 day
348
+ 3.28
349
+ 3.0±0.1
350
+ 1.7±0.2
351
+ 7
352
+ 1% HNO3 [106.7 ppt 238U, 614.5 ppt 232Th]
353
+ 1 day
354
+ 3.18
355
+ 2.9±0.2
356
+ 32.2±1.5
357
+ • No.1-5: we can see a clear increase on 238U in acrylic for Alconox solutions with different
358
+ concentration and exposure. However, the increase of 232Th is not obvious due to the lower
359
+ 232Th radioactivity in Alconox powder as shown in Table 1. Even though the Alconox can
360
+ be removed by further deionized water rinsing, the radioactivity from Alconox can diffuse
361
+ into acrylic together with water. If the residual radioactivity stick on acrylic from Alconox
362
+ solution is due to the active agent, the residual can not be easily removed by cleaning or
363
+ acid. On the contrary, if the mechanism of residual consists in ionic diffusion from Alconox
364
+ solution to acrylic, such residual can be removed by acid. We observed that the radioactivity
365
+ absorbed in acrylic can be further removed by acid soaking, as shown in result No.5.
366
+ • No.6-7: To further validate that the diffusion of radioactivity from Alconox to acrylic is
367
+ – 6 –
368
+
369
+ 1.8
370
+ [%]
371
+ Water absorbtion [
372
+ 1.6
373
+ 1.4
374
+ 1.2
375
+ 0.3
376
+ 0.8
377
+ 0.2
378
+ 0.6
379
+ 0.1
380
+ 0.4
381
+ Q
382
+ 0.2
383
+ 10
384
+ 20
385
+ Time [h]
386
+ 0
387
+ 5
388
+ 10
389
+ 15
390
+ 20
391
+ 25
392
+ 30
393
+ 35
394
+ Time [day]in ionic form, we have soaked another two acrylic samples in two kinds of water. One is
395
+ tap water after 0.2 µm filter, and radioactivity exists in small particles. The other one is
396
+ U/Th standard solution with 1% HNO3, and radioactivity is in ionic form. As shown in
397
+ No.6 and No.7, the 238U concentration in acrylic reached equilibrium at 3 ppt, while 232Th
398
+ can reach much higher to about 30 ppt. The reason for the difference between 238U and
399
+ 232Th is their different intrinsic physicochemical properties, which is also discussed in [13].
400
+ Thorium is more reactive than uranium, thus it is easier for thorium to stick to acrylic. A
401
+ similar phenomenon is observed in preparing tap water, most of the thorium is filtered and
402
+ less residual is found in the water. From the results in No.6 and No.7, radioactivity can also
403
+ diffuse into acrylic without the active agent, so the radioactivity in Alconox solution can
404
+ diffuse into acrylic due to the diffusion of ion, not the active agent. The final residual on
405
+ acrylic from the cleaning solution relies on the measurement of the surface sample.
406
+ 4.2
407
+ Contamination from different surface treatments
408
+ To study the surface contamination, we have treated the surface with different procedure and directly
409
+ measured the residual of radioactivity on surface. The surface samples were taken by scraping the
410
+ surface with well cleaned erasing knife, and the thickness of the surface sample can reach 5-10 µm.
411
+ The radioactivity of the raw surface for one JUNO acrylic panel without any surface treatment is
412
+ measured to be (52±1) ppt 238U and (133±5) ppt 232Th, which is 1-2 orders of magnitude higher than
413
+ the bulk measurement. The radioactivity distribution along the depth was measured in Ref. [6], and
414
+ has proven that U/Th contaminations can extend down to tens of µm from the surface. In addition,
415
+ the radon daughters (210Pb, 210Po) deposited on the acrylic surface is usually non-negligible. So we
416
+ decide to remove at least 0.1 mm depth of acrylic and to maintain a high light transparency (>96%
417
+ at 420 nm [14] in ultrapure water environment) at the same time.
418
+ A dedicated experiment was performed on a flat acrylic panel (not a JUNO panel) with a
419
+ 1 m2 area by applying different surface treatments including sanding, polishing, and cleaning
420
+ successively. All of these treatments are done in a 10,000 class tent. The sanding of acrylic surfaces
421
+ starts from 400 mesh (to remove at least 0.1 mm depth of acrylic) and is pursued by using sand
422
+ papers with larger mesh, 800, 1200, 2000, and 3000. The higher the mesh number, the smoother
423
+ the acrylic surface, and higher light transparency can be achieved. However, more steps increase
424
+ the risk of contaminations. We have measured the surface sample with different mesh numbers of
425
+ 1200, 2000, and 3000, and the results for residual U/Th concentration are consistent within 20%
426
+ among these samples.
427
+ Polishing of acrylic is performed by a wool wheel with polishing fluid, and the typical fluid is
428
+ purchased from Saint-Gobain [9], whose components are organic. If there is polishing with mirror
429
+ wax after sanding, sanding to 1200 mesh number is enough to reach the required light transparency.
430
+ Part of the polishing fluid can be further removed by degreasing with Alconox solution. To quantify
431
+ the contamination from residual polishing fluid and Alconox solution, we have done many tests on
432
+ the acrylic panel with sanding to 1200 mesh number, and the results are shown in Table 3. The
433
+ water cleaning is realized by a water jet with high pressure for 20 times, and the Alconox cleaning is
434
+ done by spraying the Alconox on surface and wiping with a clean cloth for several times. Compared
435
+ to the sample No.1, we have done additional cleaning with Alconox solution on No.2, and there is
436
+ obvious radioactive residual on the surface from Alconox. For the samples No. 3 and No. 4, we
437
+ – 7 –
438
+
439
+ have done polishing with the fluid for both samples, and performed cleaning with Alconox only on
440
+ No.4. From the results, it is quite clear that a large amount of polishing fluid residual exists on the
441
+ acrylic surface after cleaning even with Alconox solution.
442
+ Table 3. Many cleaning tests have been done on the non-JUNO acrylic panel after sanding to the 1200 mesh
443
+ number. The water cleaning is realized by a water jet with high pressure 20 times, and the Alconox cleaning
444
+ is done by wiping the surface with a clean cloth several times. The polishing is done with mirror wax. After
445
+ the treatments, surface samples are taken by scraping the surface with well cleaned erasing knife, and the
446
+ thickness of the surface sample can reach 5-10 µm. The radioactivity in the surface samples is summarized
447
+ in this table.
448
+ No.
449
+ Sample preparation
450
+ Mass[g]
451
+ 238U[ppt]
452
+ 232Th[ppt]
453
+ 1
454
+ Water cleaning
455
+ 0.25
456
+ 9.5±0.3
457
+ 9.3±0.5
458
+ 2
459
+ Alconox + water cleaning
460
+ 0.34
461
+ 27±1
462
+ 22±2
463
+ 3
464
+ Polishing + water cleaning
465
+ 0.28
466
+ 92±5
467
+ 893±27
468
+ 4
469
+ Polishing + Alconox + water cleaning
470
+ 0.35
471
+ 123±3
472
+ 817±33
473
+ Based on the above measurements, polishing with mirror wax and Alconox cleaning have non-
474
+ negligible residual on the acrylic surface, and we should avoid using them for surface treatments.
475
+ To reach light transparency greater than 96% at 420 nm in ultrapure water environment, we have
476
+ performed sanding with 3000 mesh number, polishing with deionized water and, in the end, cleaning
477
+ of the surface with a deionized water high pressure jet. We finally measured the surface of one JUNO
478
+ acrylic panel following this procedure of surface treatments, with good results of (15.2±0.7) ppt
479
+ 238U and (24.3±0.7) ppt 232Th in about 10 µm depth, which is several times lower than the raw
480
+ surface as shown in the beginning of this section. In addition, all the treatments of the inner surface
481
+ of the acrylic panel were done in one day to avoid radon daughters deposition.
482
+ 4.3
483
+ Protection film
484
+ After surface treatments with sanding, polishing, and cleaning, the acrylic surface will be covered
485
+ by a thin film to protect the acrylic from fallouts of radon and dust in the air during transportation
486
+ and installation, which will last several months. There are two kinds of protection films that can be
487
+ used to protect the acrylic surface, as discussed in Sec 2.
488
+ Since the glue on the adhesive masking paper is soluble in water, we soaked the paper film
489
+ in water for different exposure. By this way, we can measure the radiopurity of glue by ICP-MS
490
+ with high precision. To reduce the effect of surface cleanliness in this measurement, we swab the
491
+ surface of paper side with a little wet clean cloth. The paper is clipped out after soaking. Similar
492
+ to pre-treatments in Figure 2, the solution is vaporized and the residual is digested by acid. The
493
+ results of the measurements are shown in Table 4. It seems that most of the glue is dissolved in
494
+ water within one hour. The film put on inner surface of acrylic will be removed by high pressure
495
+ water jet during the final cleaning. The paper film with water soluble glue on it is quite easy to be
496
+ removed with water, so the contact time is much smaller than one hour.
497
+ The mass of glue on the paper is 5 g/m2, and the total mass of glue for the whole acrylic
498
+ surface is 20 kg. Assume all the U/Th in glue stay on acrylic surface and further go into LS,
499
+ the contamination to 20 kt LS is 10−16 g/g, one order higher than our requirement of U/Th in LS
500
+ (10−17 g/g). In reality, almost all the glue can be dissolved in water when contacting with enough
501
+ – 8 –
502
+
503
+ amount of water, and the radioactivity from glue can be absorbed in acrylic together with water.
504
+ However, the flow rate of water is about 15 liters per minute, so the glue is highly diluted in water.
505
+ Based on the study in Sec 4.1, the water absorbed in acrylic can reach 1 g/m2 after one hour soaking.
506
+ In reality, the absorbed U/Th in acrylic from glue is quite small.
507
+ Table 4. The water soluble glue on paper film is digested in water solution and measured by ICP-MS.
508
+ Exposure of soaking
509
+ 1 hour
510
+ 5 hours
511
+ 238U [ppt]
512
+ 222±11
513
+ 268±12
514
+ 232Th [ppt]
515
+ 117±5
516
+ 81±5
517
+ Besides the direct radiopurity measurement of the glues, we have also performed the test on
518
+ acrylic surface. We pasted the two kinds of films on acrylic surface, and took the surface sample
519
+ after removing the film. We did not see an obvious difference between the samples with films
520
+ and the raw panel sample, so it is safe to use both PE and paper film for acrylic protection. The
521
+ whole acrylic sphere with 35.4 m in diameter is divided into 265 panels produced in the company
522
+ separately. Considering the toughness of the films, we prefer to use PE film in the company, which
523
+ is better for protection of the panels during transportation and installation. All of these panels will
524
+ be bonded layer to layer from top to bottom at JUNO site. After bonding the panels of one layer, we
525
+ will clean the surface of the corresponding layer and cover the inner surface with paper film. When
526
+ the whole sphere will be finished, we will finally clean the inner surface with high pressure water
527
+ jet, and the paper film will be easily removed without manual operation inside the sphere.
528
+ 5
529
+ Summary
530
+ An acrylic vessel with 35.4 m in diameter is used as the 20 kt LS container for JUNO. The cleanliness
531
+ of the inner acrylic surface is quite important to ensure an excellent LS radiopurity. To remove
532
+ the contamination near the acrylic surface during production, many treatments will be done on the
533
+ acrylic surface before shipment. From this study, we found the polishing mirror wax and Alconox
534
+ solution have non-negligible U/Th residuals on the surface. The final recommended procedure for
535
+ the surface treatments consists of sanding up to 3000 mesh number, polishing and cleaning with
536
+ deionized water to achieve low background and high light transparency. Finally, a thin PE film will
537
+ cover acrylic surface during transportation, and the film will be replaced by the adhesive masking
538
+ paper for the inner surface after onsite bonding. This operation is quite important before finally
539
+ removing the film by water jet, since the glue on the adhesive masking paper is water soluble. This
540
+ procedure for acrylic surface treatments is also applicable to other low background experiments. In
541
+ addition, a new method for pre-treatment of acrylic samples based on a microwave muffle furnace
542
+ is shown in this paper, and the sensitivity of the measurement with ICP-MS can reach sub-ppt for
543
+ U/Th in acrylic.
544
+ Acknowledgments
545
+ This work is supported by the Youth Innovation Promotion Association of the Chinese Academy
546
+ of Sciences, the National Natural Science Foundation of China (No. 11905226), and the Strategic
547
+ Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA10010200).
548
+ – 9 –
549
+
550
+ References
551
+ [1] A. Abusleme et al. (JUNO), Prog. Part. Nucl. Phys. 123, 103927 (2022).
552
+ [2] A. Abusleme et al. (JUNO), JHEP 11, 102 (2021), arXiv:2107.03669 [physics.ins-det] .
553
+ [3] C. Cao, N. Li, X. Yang, J. Zhao, Y. Li, Z. Cai, L. Wen, X. Luo, Y. Heng, and Y. Ding, Nucl. Instrum.
554
+ Meth. A 1004, 165377 (2021), arXiv:2011.06817 [physics.ins-det] .
555
+ [4] S. Appel et al. (Borexino), (2022), arXiv:2205.15975 [hep-ex] .
556
+ [5] P. Khaghani, Neck sense rope system and leaching studies for SNO+, Ph.D. thesis.
557
+ [6] F. C. F. Perrot, C. Cerna and C. P´echeyran, “Advantages and sensitivity of UV fs laser ablation
558
+ HR-ICPMS technique for rare event experiments, talk at Low Radioactivity Techniques 2019,” .
559
+ [7] “https://www.alconox.com/product/alconox,” .
560
+ [8] S.-L. Niu et al., Chin. Phys. C 39, 086002 (2015), arXiv:1410.4291 [physics.ins-det] .
561
+ [9] Saint-Gobain, “https://www.saint-gobain.com.cn/abrasives/product/non-abrasive,” .
562
+ [10] X. Wang, X. Chen, C. Fu, X. Ji, X. Liu, Y. Mao, H. Wang, S. Wang, P. Xie, and T. Zhang, Journal of
563
+ Instrumentation 11, T12002 (2016).
564
+ [11] “https://www.daio-paper.co.jp/en,” .
565
+ [12] “https://cem.com/en/phoenix-black,” .
566
+ [13] B. D. LaFerriere, T. C. Maiti, I. J. Arnquist, and E. W. Hoppe, Nucl. Instrum. Meth. A 775, 93 (2015).
567
+ [14] Z. Li et al., Rad. Det. Tech. Meth. 5, 356 (2021).
568
+ – 10 –
569
+
GNE4T4oBgHgl3EQfHQyx/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,459 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf,len=458
2
+ page_content='Prepared for submission to JINST Study on U/Th residual radioactivity in acrylic from surface treatment Yuanxia Li,𝑎 Xiaohui Qian,𝑎 Xiaolan Luo,𝑎 Jie Zhao,𝑎,1 Gaofeng Zhang,𝑏 Xiaoyan Ma,𝑎 Yuekun Heng,𝑎 Liangjian Wen,𝑎 Monica Sisti,𝑐 Frédéric Perrot,𝑑 Hongqiang Tang𝑏 𝑎Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China 𝑏Donchamp New Material Technology Co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
3
+ page_content=' Ltd, Taixing 225400, China 𝑐INFN Milano Bicocca and Università di Milano-Bicocca, Milano, Italy 𝑑Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
4
+ page_content=' Bordeaux, CNRS, CENBG, UMR 5797, F-33170 Gradignan, France E-mail: zhaojie@ihep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
5
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
6
+ page_content='cn Abstract: Acrylic is widely used as material for the target container in low background experiments due to its high light transparency and low intrinsic radioactivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
7
+ page_content=' However, its surface can be easily contaminated during production, so careful treatment of the surface is essential to avoid direct contamination of the target.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
8
+ page_content=' The Jiangmen Underground Neutrino Observatory will use about 600 t of acrylic to build the spherical vessel of 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
9
+ page_content='4 m in diameter for a 20 kt liquid scintillator (LS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
10
+ page_content=' Since acrylic will contact the LS directly, the cleanliness of the its surface is quite important for the radiopurity of the LS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
11
+ page_content=' A new method for measuring the radioactivity of 238U and 232Th in acrylic to sub-ppt (< 10−12 g/g) was developed, and it is crucial for the acrylic radioactivity screening in this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
12
+ page_content=' We performed many background tests on different surface treatments, and the recommended procedure for the treatment of acrylic to achieve low radioactivity and high light transparency could be applicable to other low background experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
13
+ page_content=' 1Corresponding author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
14
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
15
+ page_content='04902v1 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
16
+ page_content='ins-det] 12 Jan 2023 Contents 1 Introduction 1 2 Screening of surface treatment material by gamma spectrometer 2 3 Method for measuring U/Th in acrylic by ICP-MS 3 4 Study of the procedure for acrylic surface treatments 5 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
17
+ page_content='1 Solution absorption in acrylic 5 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
18
+ page_content='2 Contamination from different surface treatments 7 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
19
+ page_content='3 Protection film 8 5 Summary 9 1 Introduction The Jiangmen Underground Neutrino Observatory (JUNO) is a multi-purpose neutrino experiment, which will build the world’s largest liquid scintillator (LS) detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
20
+ page_content=' An acrylic vessel is used as the 20 kt LS container with 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
21
+ page_content='4 m in diameter and 120 mm in thickness because of its high light transparency and low intrinsic radioactivity [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
22
+ page_content=' To reach the physics target, the average radio-purity of the acrylic is required to be less than 1 ppt [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
23
+ page_content=' As shown in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
24
+ page_content=' [3], the radio purity in the bulk has reached the requirement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
25
+ page_content=' However, the distribution of radioactivity along the thickness is not extremely uniform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
26
+ page_content=' The bulk measurement of samples with several centimeters of thickness can not reflect the surface contamination, since the thickness of external contamination on the acrylic surface usually reaches nanometre to micron level, and the surface contamination will result averaged out in the bulk measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
27
+ page_content=' If the external radioactive contamination stays on the surface, only gammas and few alphas/betas from radioactive decays can be emitted into the LS and rejected by the effective fiducial volume cut by the off-line analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
28
+ page_content=' However, based on the experiences at Borexino [4] and SNO+ [5], the U/Th daughters near the inner surface of the vessel could leak into the LS by diffusion and convection during stable running, thus making the acrylic vessel a stable contamination source for the LS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
29
+ page_content=' Borexino put great efforts on controlling the temperature distribution to avoid convection in LS;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
30
+ page_content=' however, it is impossible to repeat the same thing at JUNO due to the large size of the experiment (70 times Borexino target).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
31
+ page_content=' Therefore, the radiopurity of the inner surface of acrylic is quite important for JUNO, especially for the physic topics in the low energy regions, such as solar neutrino studies [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
32
+ page_content=' The JUNO acrylic vessel is produced with 265 pieces because of its large size, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
33
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
34
+ page_content=' Each acrylic panel is firstly produced in a carefully cleaned flat mold and then shaped to bend board at high temperature at the company;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
35
+ page_content=' finally it is bonded directly at JUNO site [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
36
+ page_content=' The surface of the acrylic panel is exposed to air and covered with a high-temperature resistant cloth – 1 – during the bending, thus the surface is eventually contaminated and not as smooth as the flat panel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
37
+ page_content=' Surface treatments are performed before shipment to the JUNO site.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
38
+ page_content=' Typical protocols to remove surface contaminations include the following steps: The highest contaminations can reach tens of µm depths from the surface [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
39
+ page_content=' Thus, at least 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
40
+ page_content='1 µm thickness of the surface of acrylic is firstly removed by sanding with special paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
41
+ page_content=' The surface is not so smooth after sanding, so polishing is needed to improve the transparency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
42
+ page_content=' The polishing is done with a wool wheel and polishing fluid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
43
+ page_content=' The surface should be well cleaned with detergent and deionized water after polishing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
44
+ page_content=' Finally, a thin film is used to cover the acrylic surface to avoid external contamination during transportation and installation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
45
+ page_content=' All tools and detergents have risks to introduce more contamination on the surface, therefore each surface treatment should be well studied to minimize those risks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
46
+ page_content=' Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
47
+ page_content=' The acrylic vessel is produced with 265 pieces due to its very large size, as shown in the left figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
48
+ page_content=' Each panel is produced separately, and all the panels will be finally bonded to a sphere at JUNO site.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
49
+ page_content=' One JUNO panel is shown in the right figure as an example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
50
+ page_content=' The paper is organized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
51
+ page_content=' The surface treatment material screening is described in Sec 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
52
+ page_content=' The new method for measuring 238U and 232Th (U/Th) in acrylic to sub-ppt level is described in Sec 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
53
+ page_content=' Various tests on radioactivity from each step of the above treatment protocol are discussed in Sec 4, and the recommended procedure is also shown in the same section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
54
+ page_content=' The concluding remarks are in Sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
55
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
56
+ page_content=' 2 Screening of surface treatment material by gamma spectrometer The main tools and detergents used for surface treatments are sanding papers, polishing fluid, Alconox powder [7], deionized water and protection film.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
57
+ page_content=' We used a gamma spectrometer to screen the radiopurity of the tools and detergents first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
58
+ page_content=' We have one HPGe facility at ground level at IHEP [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
59
+ page_content=' The gamma spectrometer plays an important role in the primary screening of the raw – 2 – 0 0 0 0 0 Q 0 4 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
60
+ page_content='materials at JUNO, and the advantage is that samples can be screened directly without any pre- treatment and with no damage to the sample.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
61
+ page_content=' The principle of gamma spectroscopy is to measure the emitted gamma from the decay chain, and it is more sensitive to gammas with higher energy due to lower background.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
62
+ page_content=' For example, the detector is more sensitive to the lower part of the uranium chain starting from 226Ra, and the 238U concentration can be derived by assuming secular equilibrium.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
63
+ page_content=' The measured results for the tools and detergent used for acrylic surface treatment are sum- marized in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
64
+ page_content=' We found that special mirror wax purchased from Saint-Gobain [9] has lower radioactivity for 40K than one-step fast wax, due to the different chemical components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
65
+ page_content=' The sand- paper with a green base plate has lower radioactivity and better sand fastening than the one with a black base plate for similar mesh numbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
66
+ page_content=' Regarding the Alconox powder, the first measurement performed at IHEP gave an upper limit of several tens to hundreds of ppb level for thorium and uranium concentrations, respectively, due to the limited sensitivity of HPGe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
67
+ page_content=' The same sample was further measured by HPGe at China Jinping Underground Laboratory (CJPL) with better shielding and sensitivity [10] down to 10 ppb for 232Th.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
68
+ page_content=' From the obtained results, there is a higher uranium concentration than thorium in the Alconox powder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
69
+ page_content=' The polishing fluid and sandpaper with lower radioactivity are selected for the surface treatments on acrylic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
70
+ page_content=' After surface treatment, the acrylic surface will be protected with a thin film to avoid dust and radon daughters deposition on the surface during the handling operations for transportation and installation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
71
+ page_content=' The film on the inner surface will be removed by the final cleaning with high pressure water jet after installation, and there is no possibility for manual operation inside the acrylic vessel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
72
+ page_content=' There are two types of protection film that can be used to protect the acrylic surface, ordinary polyethylene (PE) film with few glue on the surface and adhesive masking paper film.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
73
+ page_content=' The PE film is better in toughness, but it is not easy to be removed by the water jet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
74
+ page_content=' On the contrary, the paper film with few water soluble glue on the surface can be easily removed by water washing since the glue is soluble in water, but overall its mechanical strength is worse.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
75
+ page_content=' The radioactivity screening of the glue that is used on the PE film showed only upper limits for U/Th at the level of hundreds of ppb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
76
+ page_content=' Concerning the adhesive masking paper film (purchased from [11]), we could only measure the paper film and the glue together inside the HPGe detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
77
+ page_content=' The water soluble glue itself was further measured by ICP-MS, as it will be discussed later.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
78
+ page_content=' 3 Method for measuring U/Th in acrylic by ICP-MS Different from gamma spectroscopy, the principle of the Inductively Coupled Plasma Mass Spec- troscopy (ICP-MS) is to detect the nuclei according to their exact atomic weight.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
79
+ page_content=' ICP-MS can measure the isotopes 238U and 232Th directly without other information on the chain, and the sen- sitivity can reach the sub-ppt level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
80
+ page_content=' However, the sample measured by ICP-MS must be in liquid form, so a careful and optimized pre-treatment on the sample is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
81
+ page_content=' For the radio purity measurement on acrylic surface samples, we have developed a new method based on microwave ashing and ICP-MS equipment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
82
+ page_content=' The design for the pre-treatment flow is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
83
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
84
+ page_content=' Both the acrylic sample and the tracers (the natural-non-existing nuclei 229Th and 233U) are ashed by the machine in a quartz vessel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
85
+ page_content=' The residual is collected by soaking with 35% HNO3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
86
+ page_content=' – 3 – Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
87
+ page_content=' Material screening by gamma spectroscopy on tools and detergents used for the acrylic surface treatment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
88
+ page_content=' If not differently mentioned, the sample was measured at IHEP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
89
+ page_content=' The conversions between Bq/kg and mass concentration units for U/Th are given: 1 Bq/kg of 232Th activity in a material is equal to 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
90
+ page_content='5 × 10−7 g/g (or 250 ppb) of 232Th mass concentration in that material;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
91
+ page_content=' similarly, 1 Bq/kg of 238U means 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
92
+ page_content='1 × 10−8 g/g (or 81 ppb) of 238U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
93
+ page_content=' 238U chain [Bq/kg] 232Th chain [Bq/kg] 40K 214Bi/214Pb 226Ra 212Bi/208Tl [Bq/kg] Polishing Special mirror wax 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
94
+ page_content='8±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
95
+ page_content='2 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
96
+ page_content='9±1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
97
+ page_content='3 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
98
+ page_content='8±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
99
+ page_content='3 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
100
+ page_content='8±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
101
+ page_content='9 One step fast wax 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
102
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
103
+ page_content='3 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
104
+ page_content='0±1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
105
+ page_content='7 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
106
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
107
+ page_content='4 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
108
+ page_content='5±3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
109
+ page_content='1 Alconox powder <0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
110
+ page_content='37 <4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
111
+ page_content='4 <0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
112
+ page_content='24 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
113
+ page_content='9±1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
114
+ page_content='3 Measured at CJPL 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
115
+ page_content='23±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
116
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
117
+ page_content='82±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
118
+ page_content='14 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
119
+ page_content='05±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
120
+ page_content='02 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
121
+ page_content='5±1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
122
+ page_content='0 Sand paper Black base-plate 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
123
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
124
+ page_content='6 <21 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
125
+ page_content='6±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
126
+ page_content='6 <3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
127
+ page_content='7 Green base-plate <1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
128
+ page_content='7 <10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
129
+ page_content='2 <1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
130
+ page_content='6 <2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
131
+ page_content='2 Protection film Glue on PE film <0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
132
+ page_content='2 <2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
133
+ page_content='3 <0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
134
+ page_content='1 <0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
135
+ page_content='6 Water soluble film <0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
136
+ page_content='47 <10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
137
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
138
+ page_content='58±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
139
+ page_content='19 <1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
140
+ page_content='56 The eluent is collected and heated to remove the excess acid, and the solution is finally diluted for the ICP-MS measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
141
+ page_content=' Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
142
+ page_content=' The flow chart for the pre-treamtent of acrylic samples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
143
+ page_content=' The ashing of the acrylic sample is done with the microwave muffle furnace described in the text.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
144
+ page_content=' In Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
145
+ page_content=' [3], a different approach was used: the acrylic was vaporized and burned in a two-stage furnace, while clean gas (mixed N2/O2) was supplied to the furnace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
146
+ page_content=' Monitoring of the pressure in the whole system is essential in this case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
147
+ page_content=' Compared with the pre-treatment in [3], with the new technique there is no need for gas input to the microwave muffle furnace, and the overall operation is easier and safer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
148
+ page_content=' All the pre-treatment process is done in a class 10,000 tent, while the ICP-MS measurement is performed in a class 1,000 room.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
149
+ page_content=' The cleanliness of the quartz vessels is quite important for the sensitivity of the measurement, and their cleaning procedure is similar to that described in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
150
+ page_content=' [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
151
+ page_content=' All the containers are soaked in the two-stage acid cylinders filled with 6 mol/L HNO3 for at least one day at each stage to remove the U/Th on the surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
152
+ page_content=' In the end, the containers are filled with 6 mol/L HNO3 and boiled for 10 min, then they are rinsed with fresh water and ready for use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
153
+ page_content=' The microwave muffle furnace (Phoenix BLACK [12]) is put in the clean tent and used for ashing the acrylic sample, as shown on the left of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
154
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
155
+ page_content=' The temperature for ashing is optimized to achieve no visible organic residual in the vessel, and the optimized temperature as a function of time is shown on the right of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
156
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
157
+ page_content=' The quartz vessel is used as the sample container and well cleaned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
158
+ page_content=' The 229Th and 233U standards (preserved in 2% acid) are added together with the acrylic – 4 – Tracer and Ashing in Soak the vessel acrylic quartz vessel with 35% HNO3 Diluted for ICP-MS Eluent was collected and measurement heated to remove excess acid0 20 40 60 80 Time [min] 0 200 400 600 C] o Temperature [ Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
159
+ page_content=' The microwave muffle furnace (Phoenix BLACK) used for the pre-treatment of acrylic is shown in the left figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
160
+ page_content=' The optimized temperature as a function of time for acrylic ashing is shown in the right figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
161
+ page_content=' sample to the vessel in the beginning, and the recovery efficiency can be evaluated by measuring the 229Th/233U in the solution sent to ICP-MS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
162
+ page_content=' The average recovery efficiency of U/Th is calculated as (95±13)% based on more than one hundreds measurements (the given uncertainty is the standard deviation).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
163
+ page_content=' The recovery efficiency is calibrated every time a sample is measured, and the single precision is better than 5%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
164
+ page_content=' To estimate the background for the pre-treatment, we have followed the same procedure without the acrylic sample (blank test).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
165
+ page_content=' With careful background control, the blank test showed that the absolute background for the pre-treatment amounts to 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
166
+ page_content='24±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
167
+ page_content='07 pg for 238U and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
168
+ page_content='38±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
169
+ page_content='04 pg for 232Th.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
170
+ page_content=' 4 Study of the procedure for acrylic surface treatments 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
171
+ page_content='1 Solution absorption in acrylic The acrylic panel is cleaned after surface treatments at the company before shipment, and the whole acrylic sphere is finally cleaned onsite after installation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
172
+ page_content=' Acrylic can absorb water, thus traces of radioactivity in cleaning water may diffuse into acrylic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
173
+ page_content=' The absorption of water in acrylic obeys the mathematical laws of diffusion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
174
+ page_content=' We have performed several water absorption tests on flat acrylic samples with 2 mm thickness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
175
+ page_content=' The mass proportion of absorbed water in acrylic as a function of time is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
176
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
177
+ page_content=' The absorption of water in acrylic did not reach equilibrium in one month, and the mass of absorbed water in acrylic increased almost linearly at the beginning, which is far away from the equilibrium state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
178
+ page_content=' Therefore, there is no impact of the acrylic panel thickness when exposure to water is shortened to several hours.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
179
+ page_content=' Assuming we will clean the acrylic surface during one hour at the company, the absorbed water in acrylic can reach about 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
180
+ page_content='08% for the sample with 2 mm thickness, which is 1 g/m2 water absorption for one side of acrylic surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
181
+ page_content=' For the cleaning procedure, we use Alconox solution (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
182
+ page_content='1% of water) for degreasing and deionized water for rinsing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
183
+ page_content=' Traces of radioactivity in both water and Alconox can diffuse into acrylic during cleaning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
184
+ page_content=' We use deionized water with 10−14 g/g U/Th to perform water cleaning, so the residual traces of radioactivity from absorbed water is negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
185
+ page_content=' Even though the Alconox is not as clean as the deionized water, most of Alconox can be removed by water rinsing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
186
+ page_content=' To validate how much radioactivity from Alconox can go into acrylic, we soaked the acrylic sample with 2 mm – 5 – Pho QulckTest 方法 CM OYFigure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
187
+ page_content=' Results of water absorption tests performed on flat acrylic samples with 2 mm thickness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
188
+ page_content=' The mass proportion of absorbed water to acrylic as a function of time is shown during 35 days, and the data points in the first day are magnified in the sub-figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
189
+ page_content=' thickness in Alconox solution with different concentrations and time exposure, and the radiopurity of the sample for U/Th is measured by ICP-MS in the end.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
190
+ page_content=' We have soaked the samples in Alconox solution for two months in order to enlarge the possible radioactivity contamination in the bulk of acrylic (2 mm thickness).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
191
+ page_content=' The results of the tests for U/Th surface contamination are shown in Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
192
+ page_content=' Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
193
+ page_content=' The acrylic samples with 2 mm thickness are soaked in different solutions with different time exposure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
194
+ page_content=' The U/Th contamination from solution absorption in acrylic after absorption is measured by ICP-MS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
195
+ page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
196
+ page_content=' Sample preparation Exposure Mass[g] 238U[ppt] 232Th[ppt] 1 No soaking 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
197
+ page_content='25 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
198
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
199
+ page_content='1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
200
+ page_content='7±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
201
+ page_content='1 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
202
+ page_content='1% Alconox solution 1 day 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
203
+ page_content='21 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
204
+ page_content='6±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
205
+ page_content='1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
206
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
207
+ page_content='2 3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
208
+ page_content='1% Alconox solution 2 months 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
209
+ page_content='18 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
210
+ page_content='9±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
211
+ page_content='1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
212
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
213
+ page_content='3 4 2% Alconox solution 2 months 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
214
+ page_content='74 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
215
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
216
+ page_content='2 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
217
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
218
+ page_content='2 5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
219
+ page_content='1% Alconox solution + 30% HNO3 2 months + 1 day 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
220
+ page_content='11 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
221
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
222
+ page_content='1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
223
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
224
+ page_content='2 6 Tap water after filter [739 ppt 238U, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
225
+ page_content='02 ppt 232Th] 1 day 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
226
+ page_content='28 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
227
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
228
+ page_content='1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
229
+ page_content='7±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
230
+ page_content='2 7 1% HNO3 [106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
231
+ page_content='7 ppt 238U, 614.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
232
+ page_content='5 ppt 232Th] 1 day 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
233
+ page_content='18 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
234
+ page_content='9±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
235
+ page_content='2 32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
236
+ page_content='2±1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
237
+ page_content='5 No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
238
+ page_content='1-5: we can see a clear increase on 238U in acrylic for Alconox solutions with different concentration and exposure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
239
+ page_content=' However, the increase of 232Th is not obvious due to the lower 232Th radioactivity in Alconox powder as shown in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
240
+ page_content=' Even though the Alconox can be removed by further deionized water rinsing, the radioactivity from Alconox can diffuse into acrylic together with water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
241
+ page_content=' If the residual radioactivity stick on acrylic from Alconox solution is due to the active agent, the residual can not be easily removed by cleaning or acid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
242
+ page_content=' On the contrary, if the mechanism of residual consists in ionic diffusion from Alconox solution to acrylic, such residual can be removed by acid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
243
+ page_content=' We observed that the radioactivity absorbed in acrylic can be further removed by acid soaking, as shown in result No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
244
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
245
+ page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
246
+ page_content='6-7: To further validate that the diffusion of radioactivity from Alconox to acrylic is – 6 – 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
247
+ page_content='8 [%] Water absorbtion [ 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
248
+ page_content='6 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
249
+ page_content='4 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
250
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
251
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
252
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
253
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
254
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
255
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
256
+ page_content='4 Q 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
257
+ page_content='2 10 20 Time [h] 0 5 10 15 20 25 30 35 Time [day]in ionic form, we have soaked another two acrylic samples in two kinds of water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
258
+ page_content=' One is tap water after 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
259
+ page_content='2 µm filter, and radioactivity exists in small particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
260
+ page_content=' The other one is U/Th standard solution with 1% HNO3, and radioactivity is in ionic form.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
261
+ page_content=' As shown in No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
262
+ page_content='6 and No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
263
+ page_content='7, the 238U concentration in acrylic reached equilibrium at 3 ppt, while 232Th can reach much higher to about 30 ppt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
264
+ page_content=' The reason for the difference between 238U and 232Th is their different intrinsic physicochemical properties, which is also discussed in [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
265
+ page_content=' Thorium is more reactive than uranium, thus it is easier for thorium to stick to acrylic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
266
+ page_content=' A similar phenomenon is observed in preparing tap water, most of the thorium is filtered and less residual is found in the water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
267
+ page_content=' From the results in No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
268
+ page_content='6 and No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
269
+ page_content='7, radioactivity can also diffuse into acrylic without the active agent, so the radioactivity in Alconox solution can diffuse into acrylic due to the diffusion of ion, not the active agent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
270
+ page_content=' The final residual on acrylic from the cleaning solution relies on the measurement of the surface sample.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
271
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
272
+ page_content='2 Contamination from different surface treatments To study the surface contamination, we have treated the surface with different procedure and directly measured the residual of radioactivity on surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
273
+ page_content=' The surface samples were taken by scraping the surface with well cleaned erasing knife, and the thickness of the surface sample can reach 5-10 µm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
274
+ page_content=' The radioactivity of the raw surface for one JUNO acrylic panel without any surface treatment is measured to be (52±1) ppt 238U and (133±5) ppt 232Th, which is 1-2 orders of magnitude higher than the bulk measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
275
+ page_content=' The radioactivity distribution along the depth was measured in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
276
+ page_content=' [6], and has proven that U/Th contaminations can extend down to tens of µm from the surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
277
+ page_content=' In addition, the radon daughters (210Pb, 210Po) deposited on the acrylic surface is usually non-negligible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
278
+ page_content=' So we decide to remove at least 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
279
+ page_content='1 mm depth of acrylic and to maintain a high light transparency (>96% at 420 nm [14] in ultrapure water environment) at the same time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
280
+ page_content=' A dedicated experiment was performed on a flat acrylic panel (not a JUNO panel) with a 1 m2 area by applying different surface treatments including sanding, polishing, and cleaning successively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
281
+ page_content=' All of these treatments are done in a 10,000 class tent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
282
+ page_content=' The sanding of acrylic surfaces starts from 400 mesh (to remove at least 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
283
+ page_content='1 mm depth of acrylic) and is pursued by using sand papers with larger mesh, 800, 1200, 2000, and 3000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
284
+ page_content=' The higher the mesh number, the smoother the acrylic surface, and higher light transparency can be achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
285
+ page_content=' However, more steps increase the risk of contaminations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
286
+ page_content=' We have measured the surface sample with different mesh numbers of 1200, 2000, and 3000, and the results for residual U/Th concentration are consistent within 20% among these samples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
287
+ page_content=' Polishing of acrylic is performed by a wool wheel with polishing fluid, and the typical fluid is purchased from Saint-Gobain [9], whose components are organic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
288
+ page_content=' If there is polishing with mirror wax after sanding, sanding to 1200 mesh number is enough to reach the required light transparency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
289
+ page_content=' Part of the polishing fluid can be further removed by degreasing with Alconox solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
290
+ page_content=' To quantify the contamination from residual polishing fluid and Alconox solution, we have done many tests on the acrylic panel with sanding to 1200 mesh number, and the results are shown in Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
291
+ page_content=' The water cleaning is realized by a water jet with high pressure for 20 times, and the Alconox cleaning is done by spraying the Alconox on surface and wiping with a clean cloth for several times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
292
+ page_content=' Compared to the sample No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
293
+ page_content='1, we have done additional cleaning with Alconox solution on No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
294
+ page_content='2, and there is obvious radioactive residual on the surface from Alconox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
295
+ page_content=' For the samples No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
296
+ page_content=' 3 and No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
297
+ page_content=' 4, we – 7 – have done polishing with the fluid for both samples, and performed cleaning with Alconox only on No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
298
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
299
+ page_content=' From the results, it is quite clear that a large amount of polishing fluid residual exists on the acrylic surface after cleaning even with Alconox solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
300
+ page_content=' Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
301
+ page_content=' Many cleaning tests have been done on the non-JUNO acrylic panel after sanding to the 1200 mesh number.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
302
+ page_content=' The water cleaning is realized by a water jet with high pressure 20 times, and the Alconox cleaning is done by wiping the surface with a clean cloth several times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
303
+ page_content=' The polishing is done with mirror wax.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
304
+ page_content=' After the treatments, surface samples are taken by scraping the surface with well cleaned erasing knife, and the thickness of the surface sample can reach 5-10 µm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
305
+ page_content=' The radioactivity in the surface samples is summarized in this table.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
306
+ page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
307
+ page_content=' Sample preparation Mass[g] 238U[ppt] 232Th[ppt] 1 Water cleaning 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
308
+ page_content='25 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
309
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
310
+ page_content='3 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
311
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
312
+ page_content='5 2 Alconox + water cleaning 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
313
+ page_content='34 27±1 22±2 3 Polishing + water cleaning 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
314
+ page_content='28 92±5 893±27 4 Polishing + Alconox + water cleaning 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
315
+ page_content='35 123±3 817±33 Based on the above measurements, polishing with mirror wax and Alconox cleaning have non- negligible residual on the acrylic surface, and we should avoid using them for surface treatments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
316
+ page_content=' To reach light transparency greater than 96% at 420 nm in ultrapure water environment, we have performed sanding with 3000 mesh number, polishing with deionized water and, in the end, cleaning of the surface with a deionized water high pressure jet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
317
+ page_content=' We finally measured the surface of one JUNO acrylic panel following this procedure of surface treatments, with good results of (15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
318
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
319
+ page_content='7) ppt 238U and (24.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
320
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
321
+ page_content='7) ppt 232Th in about 10 µm depth, which is several times lower than the raw surface as shown in the beginning of this section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
322
+ page_content=' In addition, all the treatments of the inner surface of the acrylic panel were done in one day to avoid radon daughters deposition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
323
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
324
+ page_content='3 Protection film After surface treatments with sanding, polishing, and cleaning, the acrylic surface will be covered by a thin film to protect the acrylic from fallouts of radon and dust in the air during transportation and installation, which will last several months.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
325
+ page_content=' There are two kinds of protection films that can be used to protect the acrylic surface, as discussed in Sec 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
326
+ page_content=' Since the glue on the adhesive masking paper is soluble in water, we soaked the paper film in water for different exposure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
327
+ page_content=' By this way, we can measure the radiopurity of glue by ICP-MS with high precision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
328
+ page_content=' To reduce the effect of surface cleanliness in this measurement, we swab the surface of paper side with a little wet clean cloth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
329
+ page_content=' The paper is clipped out after soaking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
330
+ page_content=' Similar to pre-treatments in Figure 2, the solution is vaporized and the residual is digested by acid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
331
+ page_content=' The results of the measurements are shown in Table 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
332
+ page_content=' It seems that most of the glue is dissolved in water within one hour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
333
+ page_content=' The film put on inner surface of acrylic will be removed by high pressure water jet during the final cleaning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
334
+ page_content=' The paper film with water soluble glue on it is quite easy to be removed with water, so the contact time is much smaller than one hour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
335
+ page_content=' The mass of glue on the paper is 5 g/m2, and the total mass of glue for the whole acrylic surface is 20 kg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
336
+ page_content=' Assume all the U/Th in glue stay on acrylic surface and further go into LS, the contamination to 20 kt LS is 10−16 g/g, one order higher than our requirement of U/Th in LS (10−17 g/g).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
337
+ page_content=' In reality, almost all the glue can be dissolved in water when contacting with enough – 8 – amount of water, and the radioactivity from glue can be absorbed in acrylic together with water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
338
+ page_content=' However, the flow rate of water is about 15 liters per minute, so the glue is highly diluted in water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
339
+ page_content=' Based on the study in Sec 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
340
+ page_content='1, the water absorbed in acrylic can reach 1 g/m2 after one hour soaking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
341
+ page_content=' In reality, the absorbed U/Th in acrylic from glue is quite small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
342
+ page_content=' Table 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
343
+ page_content=' The water soluble glue on paper film is digested in water solution and measured by ICP-MS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
344
+ page_content=' Exposure of soaking 1 hour 5 hours 238U [ppt] 222±11 268±12 232Th [ppt] 117±5 81±5 Besides the direct radiopurity measurement of the glues, we have also performed the test on acrylic surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
345
+ page_content=' We pasted the two kinds of films on acrylic surface, and took the surface sample after removing the film.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
346
+ page_content=' We did not see an obvious difference between the samples with films and the raw panel sample, so it is safe to use both PE and paper film for acrylic protection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
347
+ page_content=' The whole acrylic sphere with 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
348
+ page_content='4 m in diameter is divided into 265 panels produced in the company separately.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
349
+ page_content=' Considering the toughness of the films, we prefer to use PE film in the company, which is better for protection of the panels during transportation and installation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
350
+ page_content=' All of these panels will be bonded layer to layer from top to bottom at JUNO site.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
351
+ page_content=' After bonding the panels of one layer, we will clean the surface of the corresponding layer and cover the inner surface with paper film.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
352
+ page_content=' When the whole sphere will be finished, we will finally clean the inner surface with high pressure water jet, and the paper film will be easily removed without manual operation inside the sphere.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
353
+ page_content=' 5 Summary An acrylic vessel with 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
354
+ page_content='4 m in diameter is used as the 20 kt LS container for JUNO.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
355
+ page_content=' The cleanliness of the inner acrylic surface is quite important to ensure an excellent LS radiopurity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
356
+ page_content=' To remove the contamination near the acrylic surface during production, many treatments will be done on the acrylic surface before shipment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
357
+ page_content=' From this study, we found the polishing mirror wax and Alconox solution have non-negligible U/Th residuals on the surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
358
+ page_content=' The final recommended procedure for the surface treatments consists of sanding up to 3000 mesh number, polishing and cleaning with deionized water to achieve low background and high light transparency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
359
+ page_content=' Finally, a thin PE film will cover acrylic surface during transportation, and the film will be replaced by the adhesive masking paper for the inner surface after onsite bonding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
360
+ page_content=' This operation is quite important before finally removing the film by water jet, since the glue on the adhesive masking paper is water soluble.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
361
+ page_content=' This procedure for acrylic surface treatments is also applicable to other low background experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
362
+ page_content=' In addition, a new method for pre-treatment of acrylic samples based on a microwave muffle furnace is shown in this paper, and the sensitivity of the measurement with ICP-MS can reach sub-ppt for U/Th in acrylic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
363
+ page_content=' Acknowledgments This work is supported by the Youth Innovation Promotion Association of the Chinese Academy of Sciences, the National Natural Science Foundation of China (No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
364
+ page_content=' 11905226), and the Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
365
+ page_content=' XDA10010200).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
366
+ page_content=' – 9 – References [1] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
367
+ page_content=' Abusleme et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
368
+ page_content=' (JUNO), Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
369
+ page_content=' Part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
370
+ page_content=' Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
371
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
372
+ page_content=' 123, 103927 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
373
+ page_content=' [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
374
+ page_content=' Abusleme et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
375
+ page_content=' (JUNO), JHEP 11, 102 (2021), arXiv:2107.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
376
+ page_content='03669 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
377
+ page_content='ins-det] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
378
+ page_content=' [3] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
379
+ page_content=' Cao, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
380
+ page_content=' Li, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
381
+ page_content=' Yang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
382
+ page_content=' Zhao, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
383
+ page_content=' Li, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
384
+ page_content=' Cai, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
385
+ page_content=' Wen, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
386
+ page_content=' Luo, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
387
+ page_content=' Heng, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
388
+ page_content=' Ding, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
389
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
390
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
391
+ page_content=' A 1004, 165377 (2021), arXiv:2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
392
+ page_content='06817 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
393
+ page_content='ins-det] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
394
+ page_content=' [4] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
395
+ page_content=' Appel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
396
+ page_content=' (Borexino), (2022), arXiv:2205.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
397
+ page_content='15975 [hep-ex] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
398
+ page_content=' [5] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
399
+ page_content=' Khaghani, Neck sense rope system and leaching studies for SNO+, Ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
400
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
401
+ page_content=' thesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
402
+ page_content=' [6] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
403
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
404
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
405
+ page_content=' Perrot, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
406
+ page_content=' Cerna and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
407
+ page_content=' P´echeyran, “Advantages and sensitivity of UV fs laser ablation HR-ICPMS technique for rare event experiments, talk at Low Radioactivity Techniques 2019,” .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
408
+ page_content=' [7] “https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
409
+ page_content='alconox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
410
+ page_content='com/product/alconox,” .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
411
+ page_content=' [8] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
412
+ page_content='-L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
413
+ page_content=' Niu et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
414
+ page_content=', Chin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
415
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
416
+ page_content=' C 39, 086002 (2015), arXiv:1410.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
417
+ page_content='4291 [physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
418
+ page_content='ins-det] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
419
+ page_content=' [9] Saint-Gobain, “https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
420
+ page_content='saint-gobain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
421
+ page_content='com.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
422
+ page_content='cn/abrasives/product/non-abrasive,” .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
423
+ page_content=' [10] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
424
+ page_content=' Wang, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
425
+ page_content=' Chen, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
426
+ page_content=' Fu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
427
+ page_content=' Ji, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
428
+ page_content=' Liu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
429
+ page_content=' Mao, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
430
+ page_content=' Wang, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
431
+ page_content=' Wang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
432
+ page_content=' Xie, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
433
+ page_content=' Zhang, Journal of Instrumentation 11, T12002 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
434
+ page_content=' [11] “https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
435
+ page_content='daio-paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
436
+ page_content='co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
437
+ page_content='jp/en,” .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
438
+ page_content=' [12] “https://cem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
439
+ page_content='com/en/phoenix-black,” .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
440
+ page_content=' [13] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
441
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
442
+ page_content=' LaFerriere, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
443
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
444
+ page_content=' Maiti, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
445
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
446
+ page_content=' Arnquist, and E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
447
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
448
+ page_content=' Hoppe, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
449
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
450
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
451
+ page_content=' A 775, 93 (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
452
+ page_content=' [14] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
453
+ page_content=' Li et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
454
+ page_content=', Rad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
455
+ page_content=' Det.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
456
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
457
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
458
+ page_content=' 5, 356 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
459
+ page_content=' – 10 –' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GNE4T4oBgHgl3EQfHQyx/content/2301.04902v1.pdf'}
GdE1T4oBgHgl3EQfXQRO/content/tmp_files/2301.03124v1.pdf.txt ADDED
@@ -0,0 +1,695 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+
3
+ 1
4
+ The COVID-19 vaccination, preventive behaviors and pro-social motivation:
5
+ panel data analysis from Japan
6
+
7
+ Short title: COVID-19 vaccination and preventive behaviors
8
+
9
+ Eiji Yamamura1*, Yoshiro Tsutsui2, Fumio Ohtake3
10
+
11
+
12
+ 1 Department of Economics, Seinan Gakuin University, Fukuoka, Japan
13
+
14
+ *Corresponding author
15
+ Email: yamaei@seinan-gu.ac.jp (EY)
16
+ Full list of author information is available at the end of the article
17
+
18
+ Abstract
19
+ Background
20
+ The COVID-19 vaccine reduces infection risk: even if one contracts COVID-19, the
21
+ probability of complications like death or hospitalization is lower. However, vaccination may
22
+ prompt people to decrease preventive behaviors, such as staying indoors, handwashing, and
23
+ wearing a mask. Thereby, if vaccinated people pursue only their self-interest, the vaccine’s
24
+ effect may be lower than expected. However, if vaccinated people are pro-social (motivated
25
+ toward benefit for the whole society), they might maintain preventive behaviors to reduce
26
+ the spread of infection.
27
+
28
+ Methods
29
+ We conducted 26 surveys nearly once a month from March 2020 (the early stage of COVID-
30
+ 19) to September 2022 in Japan. By corresponding with the identical individuals, we
31
+ independently constructed original panel data (N = 70,979). Based on the data, we identified
32
+ the timing of the second vaccine shot and compared preventive behaviors before and after
33
+
34
+
35
+
36
+ 2
37
+ vaccination. We investigated whether second-shot vaccination correlated with changes in
38
+ preventive behaviors. Furthermore, we explored whether the vaccination effect differs
39
+ between senior and younger groups. We then investigated the effect of pro-social motivation
40
+ on preventive behaviors.
41
+
42
+ Results
43
+ Major findings are as follows: (1) Being vaccinated led people to increase preventive
44
+ behaviors, such as mask-wearing by 1.04 (95% confidence intervals [Cis]: 0.96–1.11) points,
45
+ and handwashing by 0.34 (95% CIs: 0.30–0.38) points, on a 5-point scale. (2) vaccinated
46
+ people under the age of 65 years are less likely to stay indoors. (3) people with pro-social
47
+ motivation to be vaccinated are more likely to maintain prevention than those not so
48
+ motivated; the difference is 0.08 (95% CIs: 0.01–0.15) points for mask-wearing and 0.05
49
+ (95% CIs: 0.001–0.10) points for handwashing, on a 5-point scale.
50
+
51
+ Conclusion
52
+ After vaccination, the opportunity cost of staying indoors outweighs its benefits and people
53
+ are less inclined to stay home. This effect is lower for older people, who are at higher risk of
54
+ serious illness. The opportunity cost of mask-wearing and handwashing is lower than that of
55
+ staying indoors, and the benefit persists after vaccination if people have the motivation to
56
+ maintain these behaviors for others’ well-being.
57
+ Keywords: Vaccine, COVID-19, preventive behaviors, staying indoors, wearing mask,
58
+ washing hands, public goods, pro-social, Japan, panel data
59
+
60
+
61
+
62
+
63
+ 3
64
+
65
+ Introduction
66
+
67
+ During COVID-19 pandemic, especially in the early stages, various preventive
68
+ behaviors were required because vaccines against COVID-19 had not been developed.
69
+ Preventive behaviors can be considered a kind of public good that is not sufficiently supplied
70
+ through market mechanisms where people pursue self-interest [1,2]. Mitigating the pandemic
71
+ necessitated the collective actions of citizens. However, according to the Peltzman effect,
72
+ people tend to increase their risky behaviors if safety measures are implemented [3].
73
+ Since 2021, vaccines against COVID-19 have been distributed worldwide and have
74
+ played a vital role in coping with COVID-19. Newly reported cases have decreased in
75
+ countries where vaccines have been rapidly adopted [4]. People, if they are rational, tend to
76
+ engage in risky behaviors when security measures are mandated [5]. In terms of economics,
77
+ this is considered a moral hazard. An empirical question arises as to how the spread of the
78
+ vaccine influences preventive behaviors [6,7]. As a result of the reduction in the risk of
79
+ COVID-19 infection, risk-taking behaviors increase, so that preventive behaviors such as
80
+ staying indoors, wearing masks, and washing hands have changed [8,9]. However, some
81
+ studies show no clear evidence that vaccinated people have decreased their preventive
82
+ behaviors in comparison with those not vaccinated [6,10].
83
+ The influence of vaccination on preventive behaviors may vary according to the type of
84
+ behavior [11]. A study found that in China, vaccination lessened the frequency of
85
+ handwashing but did not change mask-wearing [7]. This study aimed to explore the
86
+ mechanisms stopping vaccinated people from decreasing preventive behaviors. To this end,
87
+
88
+
89
+
90
+ 4
91
+ we investigated how preventive measures can be pro-socially motivated based on altruism
92
+ and social solidarity [12].
93
+ Using monthly individual-level panel data, we investigated whether individuals’
94
+ preventive behaviors changed after vaccination. Furthermore, we looked at how the influence
95
+ of vaccination on preventive behaviors differs according to age and pro-social motivation.
96
+
97
+ Methods
98
+ Data collection
99
+ We commissioned the research company INTAGE, Inc., to conduct an online survey
100
+ because of their experience and reliability in academic research. The first wave of queries
101
+ was conducted March 13–16, 2020, and 4,359 observations were recorded. Participants
102
+ registered with INTAGE were recruited for this study. The participation rate was 54.7%. The
103
+ sampling method was designed to collect representatives of the Japanese adult population in
104
+ terms of educational background, gender, and residential area. For this purpose, INTAGE
105
+ recruited participants for a survey of pre-registered individuals. However, individuals aged
106
+ 15 years and below were too young to be registered with INTAGE, and we considered
107
+ individuals over 80 years of age too old to answer pertinent questions. Inevitably, the sample
108
+ population was restricted to ages 16–79 years, and participants were randomly selected to fill
109
+ the pre-specified quotas. INTAGE provided monetary incentives to participants upon study
110
+ completion.
111
+ Internet surveys were conducted repeatedly 26 separate times (“waves”) almost every
112
+ month with identical individuals to construct the panel data. The exceptional period was July-
113
+
114
+
115
+
116
+ 5
117
+ September 2020, when the survey could not be conducted owing to a shortage of research
118
+ funds. We resumed the surveys after receiving additional funds in October 2020. Vaccination
119
+ was implemented in April 2021; therefore, the data cover the period before and after
120
+ implementation of vaccination.
121
+ Respondents from the first wave were targeted in subsequent waves to record how some
122
+ respondents changed their behaviors during the COVID-19 pandemic. In particular, the data
123
+ allowed us to compare identical persons’ preventive behaviors against COVID-19 before and
124
+ after being vaccinated. During the study period, some identical respondents were dropped
125
+ from the study sample because some of them stopped taking the surveys, while others did
126
+ not take the surveys at all. Furthermore, the sample was restricted to those who were
127
+ completely vaccinated by getting the second shot. In this way, we could compare their
128
+ behaviors before and after vaccination. Eventually, the number of identical individuals was
129
+ reduced from 4,359 to 3,019, and the total number of observations used in this study was
130
+ 70,979.
131
+
132
+
133
+ Methods
134
+ Table 1 presents the key variables used in the estimation. The survey questionnaire
135
+ contained basic questions about demographics, such as birth year, gender, and educational
136
+ background. These characteristics were observed at different time points. The surveys were
137
+ conducted 26 times, between March 2020 and September 2022. During the study period,
138
+ conditions such as the spread of infection and policies against COVID-19 changed drastically.
139
+ Table 1 describes the key variables used in the regression estimations. As outcome variables,
140
+
141
+
142
+
143
+ 6
144
+ the respondents were asked questions concerning preventive behaviors, such as:
145
+ “Within a week, to what degree have you practiced the following behaviors? Please
146
+ answer based on a scale of 1 (I have not practiced this behavior at all) to 5 (I have completely
147
+ practiced this behavior).”
148
+ (1) Staying indoors
149
+ (2) Wearing a mask
150
+ (3) Washing my hands thoroughly
151
+ The answers to these questions served as proxies for the following variables for
152
+ preventive behaviors: staying indoors, frequency of handwashing, and degree of wearing
153
+ masks. Larger values indicate that respondents are more likely to engage in preventive
154
+ behaviors. Further, the motivation to get a shot of COVID-19 vaccination is asked in the
155
+ following question: “Do you get the shot in order to decrease the spread of COVID-19
156
+ infection?”
157
+ We also asked about the subjective probability of contracting COVID-19 and their
158
+ perceptions of the severity of COVID-19. We asked whether they received the second shot
159
+ of the vaccine because the vaccination was effective only after completing the second shot.
160
+ The latter question was included in the questionnaire from the 12th wave conducted in May
161
+ 2021 directly after the vaccine was introduced in Japan. The question was included until the
162
+ 18th wave in November 2021, when most people in the sample completed the second shot.
163
+ The question was then excluded from the questionnaire, starting with the 19th wave in
164
+ January 2022.
165
+
166
+
167
+
168
+
169
+ 7
170
+
171
+ Table 1. Definitions of key variables.
172
+ Variable
173
+
174
+ Definition
175
+
176
+ Outcome variables
177
+ STAYING INDOORS
178
+ In the last week, how consistent were you at “not going out of home?”
179
+ Please choose among 5 choices.
180
+ 1 (not completed at all) to 5 (completely consistent).
181
+ WEARING MASK
182
+
183
+
184
+ In the last week, how consistent were you at “wearing a mask?” Please
185
+ choose among 5 choices.
186
+ 1 (not completed at all) to 5 (completely achieved).
187
+ HANDWASHING
188
+
189
+ In the last week, how consistent were you at “washing your hands?” Please
190
+ choose among 5 choices.
191
+ 1 (not completed at all) to 5 (completely achieved).
192
+
193
+ Confounders (Independent variables)
194
+ VACCINE
195
+
196
+ Did you get the second shot?
197
+ 1 (Yes) or 0 (No)
198
+ PROB_COVID19
199
+
200
+ What percentage do you think is the probability of your contracting the
201
+ novel coronavirus (COVID-19)?
202
+ 0 to 100 (%)
203
+ SEVERITY COVID19 How serious do you expect your symptoms to be if you are infected with
204
+ the novel coronavirus? Choose from 6 choices.
205
+ 1 (very small influence) to 6 (death)
206
+ AGE_25
207
+ Answer 1 if respondents are age 19–25, otherwise 0
208
+
209
+ AGE_26_64
210
+ Answer 1 if respondents are age 16–64, otherwise 0
211
+
212
+ PRO_SOCIAL
213
+ In deciding whether you get the shot of COVID-19 vaccine, is it important
214
+ in preventing the spread of COVID-19?
215
+ 1 (strongly disagree) to 5 (strongly agree).
216
+ PRO-SOCIAL is 1 if respondent chooses 5, otherwise 0.
217
+
218
+ We pursued identical respondents from the first-wave survey to the 26th wave for 30
219
+ months even though some of the respondents quit the survey. The purpose of this study was
220
+ to explore how the preventive behaviors of identical persons changed before and after
221
+ vaccination. Therefore, we limited the sample to those who completed the second shot by the
222
+ 18th wave and then pursued identical persons until the 26th wave in September 2022. We
223
+ used panel data containing 3,019 individuals, covering 26 time points from March 2021 to
224
+ September 2022.
225
+ Based on the panel data, we used a fixed-effects (FE) model regression. The FE model is
226
+
227
+
228
+
229
+ 8
230
+ a type of linear regression model widely used in economics. The estimation result using an
231
+ FE model is equivalent to the results of a linear regression model with dummies for
232
+ individuals frequently included in each period [13-15]. In this study, 3,019 dummies were
233
+ included to control for individuals’ characteristics that do not change during the period, such
234
+ as gender, educational background, and childhood experience. Hence, 3,019 confounders
235
+ were included, reflecting the differences between individuals. Therefore, the estimated
236
+ results for the time-invariant confounders could not be obtained. Even if various time-variant
237
+ confounders are included, unobserved individual characteristics cannot be captured. This
238
+ inevitably results in omitted variable biases [13,15]. For instance, an increasing trend in the
239
+ number of newly infected persons was observed throughout Japan. This effect is common to
240
+ all residents in Japan and has changed over time. This can be regarded as a time-fixed effect
241
+ and can be controlled by including time-period dummies. In this study, 25 time-period
242
+ dummies were included when one base period was fixed. However, some variables changed
243
+ not only over time, but also between individuals. Examples are proxy variables for preventive
244
+ behaviors, which are outcome variables; or number of newly infected persons and deaths due
245
+ to COVID-19 in residential areas. Furthermore, the timing of obtaining the second vaccine
246
+ shot is a variable that changed over time and between individuals; therefore, the dummy for
247
+ vaccination is included in the estimated function as a confounder.
248
+ As explained, we controlled not only for unobservable individual fixed effects, but also
249
+ for unobservable time-fixed effects. This type of FE model is called the two-way error
250
+ component regression model [15]. This study focused on the correlation between vaccination
251
+ and preventive behaviors. The statistical software used in this study was the Stata/MP 15.0
252
+
253
+
254
+
255
+ 9
256
+ multiprocessor from StataCorp, LLC.
257
+ The estimated function of an FE model takes the following form:
258
+ Yit = α1 VACCINEit + α6 PROB COVID19it + α7 SEVERITY COVID19it +
259
+ α8 EMERGENCYit + kt + mi + uit
260
+
261
+ where Table 1 presents the definitions and basic statistics of these variables. In this formula,
262
+ Yit represents the outcome variable for individual i and wave t, respectively. The time-
263
+ invariant individual-level fixed effects are represented by mi. Furthermore, kt represents the
264
+ effects of different time points, controlled by 25 wave dummies, where the first wave is the
265
+ reference group. kt captures various shocks that occurred simultaneously throughout Japan at
266
+ each time point. Y includes preventive behaviors captured by three proxy variables: STAYING
267
+ INDOORS, HANDWASHING, and WEARING MASK. These outcome variables are discrete
268
+ ordered variables ranging from 1 to 5. Larger values of these variables can be interpreted as
269
+ indicating that the respondents are more likely to exhibit preventive behavior. In the same
270
+ specification, we conduct three separate estimations, and the regression parameters are
271
+ denoted as α. The error term is denoted by uit. A simple FE linear regression model is used in
272
+ this study.
273
+ The key confounder is the vaccination dummy; VACCINE is 1 if respondents have
274
+ completed the second shot of the COVID-19 vaccine, otherwise 0. People are obliged to get
275
+ the second shot within a month of the first shot to make the vaccine effective. Hence, in the
276
+ sample, there is hardly any time lag between the first and second shots because the survey
277
+ was conducted every month after the vaccine was approved. There are two age groups: young
278
+ age (AGE_25) and middle working age (AGE_26_64). The senior group is used as the
279
+
280
+
281
+
282
+ 10
283
+ reference group. PRO_SOCIAL is a dummy variable that captures pro-social motivation to
284
+ get vaccinated. The mean value of PRO_SOCIAL is 0.86, which shows that 86% of people
285
+ have the pro-social motivation.
286
+
287
+ Results
288
+ Baseline estimations
289
+ The coefficient of confounders indicates marginal effects (ME). Table 2 presents the
290
+ estimation results for the baseline FE model. VACCINE shows a positive sign and is
291
+ statistically significant at the 1% level, with the exception of Column (1), where STAYING
292
+ INDOORS is the outcome variable. The effects of VACCINE are ME 1.036 (95% CI: 0.960-
293
+ 1.111) and ME 0.339 (95% CI: 0.300–0.378) in columns (2) and (3), respectively. Thus,
294
+ people after vaccination are more likely than before to wear masks by 1.036 points and to
295
+ wash their hands by 0.339 points, respectively, on a 5-point scale. Before vaccination, the
296
+ mean values of WEARING MASK and HANDWASHING are 4.39 and 4.15, respectively.
297
+ Hence, this indicates that the degree of wearing masks increases by 23.6% and washing hands
298
+ by 8.16% after vaccination, compared with before vaccination. People’s behaviors depend
299
+ on behaviors of others; hence; they follow the social norm [16-19]. Peer pressure is stronger
300
+ for wearing masks than for washing hands because the surrounding people in a public place
301
+ can more easily see whether one wears a mask than whether one washes one’s hands.
302
+ SEVERITY COVID19 shows a significant positive value in all columns, and this means
303
+ that persons’ perception about seriousness of COVID-19 changes the incidence of preventive
304
+ behaviors.
305
+
306
+
307
+
308
+ 11
309
+
310
+ Table 2. FE model. Dependent variables are preventive behaviors.
311
+
312
+ (1)
313
+ STAYING
314
+ INDOORS
315
+ (2)
316
+ WEARING
317
+ MASK
318
+ (3)
319
+ HANDWASHING
320
+ VACCINE
321
+ −0.011
322
+ (−0.077-0.053)
323
+ 1.036***
324
+ (0.960-1.111)
325
+ 0.339***
326
+ (0.300-0.378)
327
+ PROBABILITY COVID19
328
+ 0.043
329
+ (−0.751-0.873)
330
+ 0.487
331
+ (−0.094-1.070)
332
+ 0.560
333
+ (0.254-0.867)
334
+ SEVERITY COVID19
335
+ 0.026***
336
+ (0.013-0.039)
337
+ 0.029***
338
+ (0.017-0.040)
339
+ 0.019***
340
+ (0.009-0.030)
341
+ Individual Fixed Effects
342
+ Yes
343
+ Yes
344
+ Yes
345
+ Time Fixed Effects
346
+ Yes
347
+ Yes
348
+ Yes
349
+ Controls: New deaths,
350
+ Newly affected persons,
351
+ Household income
352
+ Yes
353
+ Yes
354
+ Yes
355
+ Adjusted R2
356
+ Observations
357
+ 0.55
358
+ 70,979
359
+ 0.45
360
+ 70,979
361
+ 0.62
362
+ 70,979
363
+
364
+ Note: Numbers within parentheses are 95% CI. For convenience, the coefficient of probability of COVID-
365
+ 19 is multiplied by 1000. The model includes the number of deaths and infected persons in the residential
366
+ prefectures in the surveys. However, these results have not been reported. “Yes” means that variables are
367
+ included.
368
+ *** ρ < .01
369
+
370
+ Estimations with cross-terms
371
+ The probability and seriousness of contracting COVID-19 differ by age. COVID-19 is
372
+ more likely to be lethal for adults aged 65 years and older than for younger people [20,21].
373
+ Mask-wearing by elderly people is motivated by their self-regarding risk preferences,
374
+ whereas younger people are motivated by other-regarding concerns [22]. We explore how the
375
+ effect of COVID-19 vaccination on preventive behaviors differs between age groups. For
376
+ this purpose, the interaction terms between VACCINE and age groups (AGE_25 and
377
+ AGE_26_64) are included as key confounders. The reference age group is those over age 65.
378
+ The results are presented in Table 3. We find a significant negative sign in
379
+
380
+
381
+
382
+ 12
383
+ VACCINE×AGE_25 and VACCINE×AGE_26_64 in column (1), where STAYING
384
+ INDOORS is the outcome variable. The effects of VACCINE×AGE_25 and
385
+ VACCINE×AGE_26_64 are ME −0.537 (95% CI: −0.658 - −0.416) and ME −0.295 (95%
386
+ CI: −0.353 - −0.238). This means that those aged below 25 are less likely to stay home by
387
+ 0.537 points than those aged over 65, while those aged between 26 and 64 are less likely to
388
+ stay home by 0.297 points than those aged over 65. However, no differences in the effect of
389
+ the vaccination are observed when wearing masks and washing hands.
390
+
391
+ Table 3. FE model with cross-terms with age cohorts. Dependent variables are
392
+ preventive behaviors.
393
+
394
+ (1)
395
+ STAYING
396
+ INDOORS
397
+ (2)
398
+ WEARING
399
+ MASK
400
+ (3)
401
+ HANDWASHING
402
+ VACCINE
403
+ 0.206**
404
+
405
+ (0.142-0.269)
406
+ 1.058**
407
+
408
+ (0.980-1.137)
409
+ 0.319**
410
+
411
+ (0.281-0.356)
412
+ VACCINE×AGE_25
413
+ −0.537***
414
+ (−0.658 - −0.416)
415
+ −0.066
416
+ (−0.160-0.028)
417
+ −0.056
418
+ (−0.138-0.024)
419
+ VACCINE×AGE_26_64
420
+ −0.295***
421
+ (−0.353 - −0.238)
422
+ 0.030
423
+ (−0.077-0.015)
424
+ 0.036***
425
+ (0.004-0.068)
426
+ Individual Fixed Effects
427
+ Yes
428
+ Yes
429
+ Yes
430
+ Time Fixed Effects
431
+ Yes
432
+ Yes
433
+ Yes
434
+ Controls: New deaths,
435
+ Newly affected persons,
436
+ Household income
437
+ Yes
438
+ Yes
439
+ Yes
440
+ PROBABILITY COVID19,
441
+ SEVERITY COVID19
442
+ Yes
443
+ Yes
444
+ Yes
445
+ Adjusted R2
446
+ Observations
447
+
448
+ 0.57
449
+ 70,979
450
+ 0.47
451
+ 70,979
452
+ 0.64
453
+ 70,979
454
+
455
+ Note: Numbers within parentheses are 95% CI. All the models include control variables, which are
456
+ equivalent to those in Table 2. “Yes” means that variables are included. However, these results have not
457
+ been reported.
458
+ ** ρ < .01
459
+ *** ρ < .05
460
+
461
+
462
+
463
+ 13
464
+
465
+ We investigated how pro-social motivation affects preventive behaviors. The interaction
466
+ term between VACCINE and PRO_SOCIAL was included as a key confounder. Table 4
467
+ shows the significant positive sign of VACCINE×PRO_SOCIAL, where WEARING MASK
468
+ and HANDWASHING are the outcome variables. The effects of VACCINE×PRO_SOCIAL
469
+ are ME 0.110 (95% CI: 0.032 - 0.187) and ME 0.076 (95% CI: 0.014 - 0.137) on WEARING
470
+ MASK and HANDWASHING, respectively. This suggests that pro-social persons are more
471
+ likely than non-pro-social persons to wear masks by 0.110 points and to wash their hands by
472
+ 0.076 points. Effects of VACCINE are ME 0.938 (95% CI: 0.845 -1.031) and ME 0.275 (95%
473
+ CI: 0.209 - 0.342) on WEARING MASK and HANDWASHING, respectively. This is the
474
+ effect of vaccination on non-pro-social individuals’ preventive behaviors. Considering the
475
+ results jointly, pro-social persons are 11.8% more likely than non-pro-social persons to wear
476
+ masks and 27.6% more likely to wash their hands. That is, for pro-social persons, the degree
477
+ of the effects of vaccination on handwashing is more than twice as great as it is for wearing
478
+ masks. Wearing masks and washing hands are different in that the benefit of wearing a mask
479
+ is more likely to depend on the situation. Wearing masks in the open air is only marginally
480
+ effective in mitigating pandemics [23]. Pro-social vaccinated persons may consider the cost-
481
+ benefit ratio of preventive behaviors and therefore place more importance on washing hands
482
+ than on wearing masks.
483
+
484
+
485
+
486
+
487
+
488
+
489
+ 14
490
+
491
+ Table 4. FE model with cross-term with PRO_SOCIAL. Dependent variables are
492
+ preventive behaviors.
493
+
494
+ (1)
495
+ STAYING
496
+ INDOORS
497
+ (2)
498
+ WEARING
499
+ MASK
500
+ (3)
501
+ HANDWASHING
502
+ VACCINE
503
+ −0.051
504
+ (−0.154-0.050)
505
+ 0.938**
506
+
507
+ (0.845 -1.031)
508
+ 0.275**
509
+
510
+ (0.209 - 0.342)
511
+ VACCINE
512
+ ×PRO_SOCIAL
513
+ 0.052
514
+ (−0.019 – 0.122)
515
+ 0.110**
516
+
517
+ (0.032 - 0.187)
518
+ 0.076***
519
+ (0.014 - 0.137)
520
+ Individual Fixed Effects
521
+ Yes
522
+ Yes
523
+ Yes
524
+ Time Fixed Effects
525
+ Yes
526
+ Yes
527
+ Yes
528
+ Controls: New deaths,
529
+ New affected persons,
530
+ Household income
531
+ Yes
532
+ Yes
533
+ Yes
534
+ PROBABILITY COVID19,
535
+ SEVERITY COVID19
536
+ Yes
537
+ Yes
538
+ Yes
539
+ Adjusted R2
540
+ Observations
541
+ 0.55
542
+ 6,809
543
+ 0.45
544
+ 6,809
545
+ 0.62
546
+ 6,809
547
+
548
+ Note: Numbers within parentheses are 95% CI. All the models include control variables, which are
549
+ equivalent to those in Table 2. “Yes” means that variables are included. However, these results have not
550
+ been reported.
551
+ ** ρ <.01
552
+ ** ρ < .05
553
+
554
+ Conclusions
555
+ In some studies, individuals are unlikely to reduce preventive behaviors even after
556
+ vaccination [6,10,11]. This is contrary to rational behavior in terms of economics. However,
557
+ the underlying mechanisms have not yet been investigated. This study contributes to the
558
+ understanding of the mechanism by considering pro-social motivation. On the one hand, we
559
+ find that vaccinated people under 65 years of age are less likely to stay indoors than older
560
+ people. On the other hand, vaccinated individuals are more inclined to wash their hands and
561
+
562
+
563
+
564
+ 15
565
+ wear masks than before being vaccinated. The motivation to be vaccinated, for 86% of
566
+ respondents, is to mitigate the spread of infection in society. These are considered pro-social
567
+ people and are more likely than others to wash their hands and wear masks after vaccination.
568
+ However, their staying-indoors behavior is not different from that of the others.
569
+ Staying indoors differs from wearing masks and washing hands when we consider the cost-
570
+ benefit aspects of preventive behaviors. Staying home leads people to sacrifice their vacation
571
+ activities in the real world. Using economics terms, the sacrifice is the “opportunity cost” of
572
+ staying home. They would stay at home if their benefits were greater than their costs. After
573
+ vaccination, the opportunity cost of staying indoors is higher than its benefit. Accordingly,
574
+ younger people are more likely to go out.
575
+ Both vaccination and preventive behaviors are considered public goods for coping with the
576
+ pandemic. As a result of vaccination, people tend to go out, which may reduce public goods.
577
+ To compensate for this, vaccinated pro-social persons are more likely to be motivated to wear
578
+ masks and wash their hands by considering the benefit to society. Other possible
579
+ interpretations of the estimation results are related to the cost of getting a vaccination,
580
+ including the physical and psychological costs of the side effects. From an economic
581
+ viewpoint, the cost of vaccination can be considered the “sunk cost”—an investment already
582
+ incurred that cannot be recovered. Due to the sunk cost, vaccinated people continue to invest
583
+ in public goods by strengthening their mask-wearing and handwashing behaviors rather than
584
+ their staying-indoors behavior.
585
+ Wearing masks in the open air is only marginally effective in mitigating pandemics [23];
586
+ thus, this might result in over-investment in public goods. Owing to data limitations, we
587
+
588
+
589
+
590
+ 16
591
+ cannot analyze the situation in which vaccinated people wear masks. It is necessary to
592
+ determine how and to what extent the preventive behaviors of vaccinated people are effective
593
+ in mitigating COVID-19.
594
+
595
+ List of abbreviations
596
+ CI
597
+
598
+ confidence interval
599
+
600
+ COVID-19
601
+
602
+ coronavirus-19
603
+ FE
604
+
605
+ fixed effects
606
+
607
+ Inc.
608
+
609
+ Incorporated
610
+ LLC
611
+
612
+ Limited Liability Company
613
+ ME
614
+
615
+ marginal effects
616
+
617
+
618
+ References
619
+
620
+ 1. Cato S, Iida T, Ishida K, Ito A, Katsumata H, McElwain KM, et al. Vaccination and altruism
621
+ under the COVID-19 pandemic. Public Health Pract (Oxf). 2022;3:100225.
622
+ doi:10.1016/j.puhip.2022.100225.
623
+ 2. Cato S, Iida T, Ishida K, Ito A, McElwain KM, Shoji M. Social distancing as a public good under
624
+ the COVID-19 pandemic. Public Health. 2020;188:51-3. doi:10.1016/j.puhe.2020.08.005.
625
+ 3. Trogen B, Caplan A. Risk compensation and COVID-19 vaccines. Ann Intern Med. 2021;174:858-
626
+ 9. doi:10.7326/M20-8251.
627
+ 4.
628
+ World
629
+ Health
630
+ Organization,
631
+ WHO.
632
+ Coronavirus
633
+ (COVID-19)
634
+ Dashboard;
635
+ 2020.
636
+ https://covid19.who.int/. Accessed 20 Dec 2022.
637
+
638
+ 5. Peltzman S. The effects of automobile safety regulation. J Pol Econ. 1975;83:677-725.
639
+ doi:10.1086/260352.
640
+ 6. Zhang N, Lei H, Li L, Jin T, Liu X, Miao D, et al. COVID-19 vaccination did not change the
641
+
642
+
643
+
644
+ 17
645
+ personal protective behaviors of healthcare workers in China. Front Public Health.
646
+ 2021;9:777426. doi:10.3389/fpubh.2021.777426.
647
+ 7. Si R, Yao Y, Zhang X, Lu Q, Aziz N. Investigating the links between vaccination against COVID-
648
+ 19 and public attitudes toward protective countermeasures: Implications for public health.
649
+ Front Public Health. 2021;9:702699. doi:10.3389/fpubh.2021.702699.
650
+ 8. Zhang N, Liu X, Jin T, Zhao P, Miao D, Lei H, et al. Weakening personal protective behavior by
651
+ Chinese university students after COVID-19 vaccination. Build Environ. 2021;206:108367.
652
+ doi:10.1016/j.buildenv.2021.108367.
653
+ 9. Hossain MdE, Islam MdS, Rana MdJ, Amin MR, Rokonuzzaman M, Chakrobortty S, et al.
654
+ Scaling the changes in lifestyle, attitude, and behavioral patterns among COVID-19
655
+ vaccinated people: Insights from Bangladesh. Hum Vaccin Immunother. 2022;18:2022920.
656
+ doi:10.1080/21645515.2021.2022920.
657
+ 10. Wright L, Steptoe A, Mak HW, Fancourt D. Do people reduce compliance with COVID-19
658
+ guidelines following vaccination? A longitudinal analysis of matched UK adults. J Epidemiol
659
+ Community Health. 2022;76:109–15. doi:10.1136/jech-2021-217179.
660
+ 11. Corea F, Folcarelli L, Napoli A, del Giudice GM, Angelillo IF. The impact of COVID-19
661
+ vaccination in changing the adherence to preventive measures: Evidence from Italy.
662
+ Vaccines (Basel). 2022;10. doi:10.3390/vaccines10050777.
663
+ 12. Cheng KK, Lam TH, Leung CC. Wearing face masks in the community during the COVID-19
664
+ pandemic: Altruism and solidarity. Lancet. Published online 2020. 2022;399:e39–40.
665
+ doi:10.1016/S0140-6736(20)30918-1.
666
+ 13. Wooldridge J. Introductory Econometrics. 4th ed. South-Western Cengage Learning; 2009.
667
+ 14. Hsiao C. Analysis of Panel Data. Cambridge University Press; 1986.
668
+ 15. Baltagi B. Econometric Analysis of Panel Data. John Wiley & Sons; 1995.
669
+
670
+
671
+
672
+ 18
673
+ 16. Habersaat KB, Betsch C, Danchin M, Sunstein CR, Böhm R, Falk A, et al. Ten considerations
674
+ for effectively managing the COVID-19 transition. Nat Hum Behav. 2020;4:677-87.
675
+ doi:10.1038/s41562-020-0906-x.
676
+ 17. Ohtake F. Can nudges save lives? Jpn Econ Rev (Oxf). 2022;73:245-68. doi:10.1007/s42973-021-
677
+ 00095-7.
678
+ 18. Sasaki S, Saito T, Ohtake F. Nudges for COVID-19 voluntary vaccination: How to explain peer
679
+ information? Soc Sci Med. 2022;292:114561. doi:10.1016/j.socscimed.2021.114561.
680
+ 19. van der Westhuizen HM, Kotze K, Tonkin-Crine S, Gobat N, Greenhalgh T. Face coverings for
681
+ Covid-19: From medical intervention to social practice. BMJ. 2020;370:m3021.
682
+ doi:10.1136/bmj.m3021.
683
+ 20. Wu Z, McGoogan JM. Characteristics of and important lessons from the coronavirus disease
684
+ 2019 (COVID-19) outbreak in China: Summary of a Report of 72 314 Cases From the
685
+ Chinese Center for Disease Control and Prevention. JAMA. 2020;323:1239–42.
686
+ doi:10.1001/jama.2020.2648.
687
+ 21. Koh HK, Geller AC, Vanderweele TJ. Deaths from COVID-19. JAMA. 2021;325:133-4.
688
+ doi:10.1001/jama.2020.25381.
689
+ 22. Asri A, Asri V, Renerte B, Föllmi-Heusi F, Leuppi JD, Muser J, et al. Wearing a mask-For
690
+ yourself or for others? Behavioral correlates of mask wearing among COVID-19 frontline
691
+ workers. PLOS ONE. 2021;16 (7 July):e0253621. doi:10.1371/journal.pone.0253621.
692
+ 23. Javid B, Bassler D, Bryant MB, Cevik M, Tufekci Z, Baral S. Should masks be worn outdoors?
693
+ BMJ. 2021;373:n1036. doi:10.1136/bmj.n1036.
694
+
695
+
GdE1T4oBgHgl3EQfXQRO/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
H9AzT4oBgHgl3EQfxv52/content/tmp_files/2301.01743v1.pdf.txt ADDED
@@ -0,0 +1,1335 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CHATBOTS AS PROBLEM SOLVERS: PLAYING TWENTY
2
+ QUESTIONS WITH ROLE REVERSALS
3
+
4
+ David Noever1 and Forrest McKee2
5
+ PeopleTec, 4901-D Corporate Drive, Huntsville, AL, USA, 35805
6
+ 1 david.noever@peopletec.com 2forrest.mckee@peopletec.com
7
+
8
+
9
+ ABSTRACT
10
+ New chat AI applications like ChatGPT offer an advanced understanding of question context and memory
11
+ across multi-step tasks, such that experiments can test its deductive reasoning. This paper proposes a multi-
12
+ role and multi-step challenge, where ChatGPT plays the classic twenty-questions game but innovatively
13
+ switches roles from the questioner to the answerer. The main empirical result establishes that this
14
+ generation of chat applications can guess random object names in fewer than twenty questions (average,
15
+ 12) and correctly guess 94% of the time across sixteen different experimental setups. The research
16
+ introduces four novel cases where the chatbot fields the questions, asks the questions, both question-answer
17
+ roles, and finally tries to guess appropriate contextual emotions. One task that humans typically fail but
18
+ trained chat applications complete involves playing bilingual games of twenty questions (English answers
19
+ to Spanish questions). Future variations address direct problem-solving using a similar inquisitive format
20
+ to arrive at novel outcomes deductively, such as patentable inventions or combination thinking. Featured
21
+ applications of this dialogue format include complex protein designs, neuroscience metadata, and child
22
+ development educational materials.
23
+
24
+ KEYWORDS
25
+ Transformers, Text Generation, Malware Generation, Generative Pre-trained Transformers, GPT
26
+
27
+ 1. INTRODUCTION
28
+
29
+ When large, high-quality natural language processors (NLP) surged after 2018 [1-3], the field added many
30
+ challenging tasks, including question-answering (QA) benchmarks that recently approached fifty
31
+ challenges [4-5]. Stanford's SQuAD benchmark [6] represents an example of knowledge crowd-sourced
32
+ from Wikipedia in 2016 and formatted as 108,000 QA pairs. For large language models (LLMs), most
33
+ benchmarks follow this format of "prompt-response" pairs and the underlying knowledge base stored
34
+ answers [5], but the training on question datasets did not embed memory or long-conversational cues [7-
35
+ 10]. Domain-specific QA datasets include common sense and trivia about movies, news, Wikipedia,
36
+ Tweets, search engines, and books [4-5]. As a format, the familiar game of Twenty Questions [11-16]
37
+ features multi-hop reasoning, which often condenses to "Animal-Vegetable-Mineral" as opening questions
38
+ that narrow the theme [17]. The advent of ChatGPT (Generative Pre-trained Transformers, [18]) added
39
+ memory across questions (up to 8000 tokens or 20-25 pages). Appendix A lists the 48 specialty tasks
40
+ currently provided to guide users in creating capabilities and NLP prompts [19]. Examples like code
41
+ generation specialists, either codex or copilot, show a grasp of complex behavior for debugging, program
42
+ suggestions, and commentary [19-20]. One of the innovative ChatGPT extensions offers new QA sessions
43
+ that span multiple requests [18,21].
44
+
45
+ The present work applies the familiar QA challenge, Twenty Questions [11-16], with ChatGPT playing as
46
+ either participant- the one who knows the answer and fields the questions, but also the one who doesn't
47
+ know the answer but asks the questions. We call this role reversal a two-player conversation between "Bob"
48
+ and "Alice." While Twenty Questions dates back to 1882 [11], the applied problem-solving method [22]
49
+
50
+ now spans various challenging fields, including protein folding [23] and design [24], image segmentation
51
+ [25], child development [26-27], neuroscience [28] and diagnostic medicine, and crowd-sourced emotional
52
+ indices [30]. Variants of the game rules include role reversals [31], liars [32], and word relationships [33]
53
+ outside of simple categories such as "pertaining to" suggestions [34]. Our particular research interests
54
+ center on whether LLMs like ChatGPT offer constructive means for innovative problem-solving through
55
+ crafted language prompts and logical question sequences. This effort empirically assesses the model's
56
+ capability for deductive discovery. We summarize two problem statements in this area of deductive
57
+ discovery, "Can a chatbot play both roles in deductive question and answering conversations?" and if so,
58
+ "What can Twenty Questions reveal about future directions for LLMs?".
59
+
60
+ 2. METHODS
61
+
62
+ The approach is to test experimentally how well an LLM handles open-ended games like Twenty Questions
63
+ [11-16]. We employ the December 2022 research model from Open AI called ChatGPT [18]. We prompt
64
+ it to impersonate both roles [31], the one that knows the answer and the one that tries to guess it deductively.
65
+ We run four trials using each persona ("Bob" or "Alice"), and 80 questions are available to guess the object
66
+ or concept. We mix up the animate-inanimate fields and introduce concepts like alphabetic letters. We
67
+ report metrics for the mean and median number of questions required to guess the correct answer and failure
68
+ rates. We also score the exchange against the machine-written detector to determine ChatGPT's broad
69
+ capability to provide "real" or "fake" text outputs as judged by OpenAI's original GPT2 Detector [35]. The
70
+ detector features a high-dimensional pattern detector that provides initial confidence that human writing
71
+ might sample differently than transformer-based output regarding word choice and order, repetition, and
72
+ other syntax outliers.
73
+
74
+ Example variants of this pattern include forcing the QA session towards bilingual communication, thus
75
+ combining two tasks (translation and QA) in multi-hop conversations [5]. We also generalize the format to
76
+ elicit emotional indices based on crowd-sourced Emotion Twenty Questions (EMO20Q) [30]. Rather than
77
+ trying to guess an object, we query for one of 23 emotional states, such as "surprise" or "anger." As the
78
+ dataset designers [30] remarked, "The EMO20Q game requires that an emotionally intelligent agent can
79
+ understand emotions without observing them, thanks to natural language and empathy." EMO20Q emotions
80
+ include the following as candidates for twenty-question discovery: admire, adore, anger, awe, boredom,
81
+ bravery, calm, confidence, confusion, contempt, disgust, enthusiasm, frustration, gratefulness, jealousy,
82
+ love, proud, relief, serenity, shame, silly, surprised, and thankful.
83
+
84
+ The structure of the paper follows Appendices B-E closely. First, in Appendix B, we establish that ChatGPT
85
+ comprehends the game rules and recognizes properties of the object X to guess sufficiently to answer basic
86
+ questions such as "Is X an animal?". The sequence also establishes an exclusionary acceptance of "yes" and
87
+ "no" answers only without further elaborations. This case covers the traditional role of "Bob," who knows
88
+ the object of interest X and answers affirmatively or negatively throughout the game. The game also
89
+ underscores the unique memory of ChatGPT across multi-step deductive stages and builds toward a
90
+ successful conclusion to recall the object name in less than 40 steps (1 prompt and one answer over 20
91
+ iterations). We also set out to test the overall rule retention over four repetitions of the game punctuated
92
+ only by "Let's play again" without attempting to reset the rules while giving a new object X.
93
+
94
+ Secondly, Appendix C reverses the previous game, such that the human experimenter thinks of an object
95
+ or concept X, and ChatGPT plays the role of "Alice" when asking the questions. The prompt establishes
96
+ the reversed roles in a new session and again reiterates that the prompter cannot lie but can only answer
97
+ "yes" or "no." As in the previous case, four repetitions spanning eighty possible interactions. This case
98
+ establishes the deductive goal, "What is object X?" which also satisfies all the previous interactions such
99
+ that enough description includes the object of interest, "X is an animal," and excludes the alternatives, "X
100
+
101
+ is not a bird." A notable feature of this challenge spans multiple deductive steps and establishes a chain of
102
+ reasoning to arrive at a guess. ChatGPT requires no prompt for the final guess, and the model proposes its
103
+ terminating action, "Is it an X?" to end the game.
104
+
105
+ Both Appendix B and C mirror the familiar human game of twenty questions and introduce no new features
106
+ excluded from ChatGPT's training data. To raise the difficulty level, Appendix B highlights some non-
107
+ traditional concepts. For instance, concepts might prove scarce in previously seen online play, such as
108
+ answering truthfully to probing questions that seek to name the alphabetic letter "Q." Another challenging
109
+ variation works through identifying "X" as a food by listing its ingredients ("tiramisu"), but in the same
110
+ session introduces a recipe change ("eggless tiramisu") before launching into probing questions.
111
+
112
+ Appendix C also raises the difficulty further and forces ChatGPT to combine two of its established subtasks
113
+ ("question-answer" and "language translation"). The motivation for this test stems from the hypothesis that
114
+ LLMs parrot and mix up what previously corresponded to the internet of human training data. For twenty
115
+ questions, however, a Google search on "bilingual twenty-question examples" yield no definitive training
116
+ examples for ChatGPT to memorize or encode. Given a detailed prompt describing how the questions may
117
+ be asked or answered in Spanish or English, the game proceeds outside what typically would represent
118
+ human gameplay. Appendix C combines deductive reasoning, memory, and context and forces the game
119
+ into what might be considered "out-of-distribution" sampling. Thus, both multi-step and multi-lingual tasks
120
+ describe the ChatGPT challenge problem.
121
+
122
+ Thirdly, Appendix D introduces both QA roles as completing without human intervention once two browser
123
+ instances of ChatGPT exchange the initial rules. We call this example dueling twenty questions since the
124
+ two-headed LLM now must both ask and answer its questions between two non-communicating models of
125
+ itself ("Bob" vs. "Alice") with no human prompts. While this example centers on a simple object
126
+ ("chicken"), one can envision a lengthy and detailed exchange driven by an automated Application
127
+ Programming Interface or API that extends the conversation to the limit of token lengths (about 20-25 typed
128
+ pages). This self-questioning interface may also enable sophisticated future applications that sequentially
129
+ build a knowledge base or comprehensive assessment examination from scratch. For example, "tell me all
130
+ you know about gall bladder surgery" may not provide a compelling or thought-provoking essay in the style
131
+ of training data or Wikipedia. The back-and-forth format of QA previously has yielded better human
132
+ performance in medical test contexts [28-29]. One might compare this example to an instance of "semi-
133
+ supervised" learning for a chatbot.
134
+
135
+ Finally, for EMO20Q formats, Appendix E removes the requirement that X be an object to guess and
136
+ substitutes one of twenty-three emotions. One motivation for exploring the emotional quotient (EQ) of
137
+ ChatGPT stems from OpenAI's filtering of opinions and biases. To the authors' knowledge, this example
138
+ represents the first application of a chatbot deducing emotional states in a guessing game without any pre-
139
+ programmed pairs of pattern-template exchanges [9]. In other words, no explicit guidance provides
140
+ appropriate intent for the question "Describe emotions one might feel at a birthday party?" with the user
141
+ goal to elicit "surprise" as a deductive leap to the correct answer through repeated probing. We explore this
142
+ EQ aspect as previous chatbots might have approached the problem. Appendix E finally displays the open-
143
+ ended emotional context in a known prompt-response template called "Artificial Intelligence Markup
144
+ Language (AIML)," which offers training data for more traditional conversation templates in restricted
145
+ domains like customer service or AI assistants performing a narrow task [9].
146
+
147
+ 3. RESULTS
148
+
149
+ Figure 1 summarizes the experimental cases and associated metrics for all the twenty question games in
150
+ Appendices B-E. The main finding supports a general ChatGPT capability to play all aspects of the game,
151
+
152
+ including guessing and answering or both roles in the same game. The average number of questions required
153
+ to get the answer was 11.6, with a median of 13 owing to a few more demanding cases that reached the 20-
154
+ question limit. The addition of bilingual rules did not increase the number of required prompts (14) or force
155
+ the model to give up ("correct guess"). Similarly, the introduction of abstract objects like the alphabetic
156
+ letter "Q" or deceptive animals like "humans" did not significantly change the number of guesses (9-14) or
157
+ steer the conversation off-track from a final correct answer.
158
+
159
+ Over the sixteen tests and 185 exchanges, ChatGPT scored an overall correct guess rate of 94%. The only
160
+ incorrect answer ("paper clip" instead of "hammer") appeared to trigger prematurely, as ChatGPT declared
161
+ at guess number fourteen that the model had run out of questions and guessed incorrectly.
162
+
163
+ As described in the Methods section, the Open AI online detector [35] scores the majority of the exchanges
164
+ as "real," meaning not machine-generated by its GPT-2 model [1]. The 2018 detection model offered fewer
165
+ parameters and smaller training sets by at least several orders of magnitude compared to current generations
166
+ [18-19]. While the referenced detection accuracy for GPT-2 reached 95%, the scored detections flag only
167
+ 26% of the game content as "fake" or machine-generated text. Since the customized content involves some
168
+ human intervention as questions, answers, and rule prompts, one can postulate that the syntactic patterns
169
+ follow a semi-human or hybrid dialogue outside the detector's target patterns.
170
+ 4. DISCUSSION
171
+
172
+ The research literature on twenty questions provides a framework for probing with chat applications and
173
+ LLMs. In addition to systematically progressing through alternative scenarios, the output of the
174
+ conversation mirrors a binary search or decision tree. A particularly notable way to convert LLMs to
175
+ comparable knowledge graphs involves continuous probing and feedback until sufficient tree depth
176
+ Figure 1. Experimental results for ChatGPT across multiple QA sessions
177
+
178
+ Experiment
179
+ Real
180
+ Fake
181
+ Tokens
182
+ QA Length
183
+ Guess
184
+ Notes
185
+ Appendix B. Chatbot Fields the Questions
186
+ 100%
187
+ avg. 12; med: 14
188
+ oven
189
+ 98.78
190
+ 1.22
191
+ 116
192
+ 7
193
+ correct
194
+ avocado
195
+ 0.38
196
+ 99.62
197
+ 220
198
+ 15
199
+ correct
200
+ tiramisu
201
+ 2.77
202
+ 97.23
203
+ 230
204
+ 15
205
+ correct
206
+ eggless tiramisu
207
+ 7.14
208
+ 92.86
209
+ 223
210
+ 14
211
+ correct
212
+ fewer guesses
213
+ "o"
214
+ 60.27
215
+ 39.73
216
+ 232
217
+ 14
218
+ correct
219
+ difficult
220
+ human
221
+ 22.31
222
+ 77.69
223
+ 133
224
+ 9
225
+ correct
226
+ deceptive
227
+ Appendix C: Chatbot Asks the Questions
228
+ 84%
229
+ avg. 11.6; med: 12
230
+ dog
231
+ 99.96
232
+ 0.04
233
+ 161
234
+ 7
235
+ correct
236
+ Boston
237
+ 99.98
238
+ 0.02
239
+ 441
240
+ 11
241
+ correct
242
+ hammer
243
+ 99.57
244
+ 0.43
245
+ 297
246
+ 14
247
+ incorrect
248
+ out of questions
249
+ statue
250
+ 99.98
251
+ 0.02
252
+ 383
253
+ 12
254
+ correct
255
+ car"bilingual example"
256
+ 99.98
257
+ 0.02
258
+ 510
259
+ 14
260
+ correct
261
+ Appendix D: Dueling Bob and Alice Chatbots
262
+ 100%
263
+ avg. 17; med: 17
264
+ chicken
265
+ 99.98
266
+ 0.02
267
+ 313
268
+ 17
269
+ correct
270
+ Appendix E: Emotional Quotient Deduction
271
+ 100%
272
+ avg. 9; med: 6.5
273
+ confidence
274
+ 99.94
275
+ 0.06
276
+ 66
277
+ correct
278
+ jealousy
279
+ 99.98
280
+ 0.02
281
+ 232
282
+ 5
283
+ correct
284
+ silly
285
+ 99.77
286
+ 0.23
287
+ 756
288
+ 20
289
+ correct
290
+ final guess
291
+ calm
292
+ 99.98
293
+ 0.02
294
+ 343
295
+ 8
296
+ correct
297
+ Overall
298
+ 74.42
299
+ 25.58
300
+ 291
301
+ 11.56
302
+ 94%
303
+ avg. 11.56; med: 13describes a technical field of interest. Previous work [22-30] has used this
304
+ approach to describe neuroscience metadata and train medical students to
305
+ pass practice exams. Others [16-17] have also noted that the basic 20Q
306
+ format simplifies some complex search problems. As an interesting
307
+ historical note, a 2001 paper [36] addressed a similar problem as
308
+ insurmountable: "When will machine learning and pattern recognition rival
309
+ human ability to play Twenty Questions?" The present research
310
+ demonstrates not only can ChatGPT rival human ability and play more
311
+ demanding roles than a human might contemplate in virtually any field,
312
+ including discerning human emotions. To reproduce this ChatGPT output
313
+ with question templating systems or entity extraction poses an enormous
314
+ manual task to handle all the possible cases. The same paper [36] asks: "Can
315
+ we hope to stock a classification system with enough questions to play a
316
+ decent game, or must we instead focus on endowing with question-making
317
+ skills? How many classes and how many documents might be of interest?"
318
+
319
+ 5. CONCLUSIONS
320
+
321
+ The experimental plan tests ChatGPT as an LLM capable of playing multiple roles in verbal games like
322
+ twenty questions. The work demonstrates 94% accuracy in correctly guessing across numerous challenges
323
+ and an average question-answer length of 12. For the first time, dueling roles combine two chatbots in self-
324
+ play. An innovative application for future probing involves guessing objects and concepts and human
325
+ emotions for a given context or social situation.
326
+
327
+ ACKNOWLEDGEMENTS
328
+ The authors thank the PeopleTec Technical Fellows program for encouragement and project assistance.
329
+
330
+ REFERENCES
331
+ [1]
332
+ Radford, A., Narasimhan, K., Salimans, T., & Sutskever, I. (2018). Improving language understanding by
333
+ generative pre-training. OpenAI, https://cdn.openai.com/research-covers/language-
334
+ unsupervised/language_understanding_paper.pdf
335
+ [2]
336
+ Zhang, Q., Chen, S., Xu, D., Cao, Q., Chen, X., Cohn, T., & Fang, M. (2022). A survey for efficient open
337
+ domain question answering. arXiv preprint arXiv:2211.07886.
338
+ [3]
339
+ Tunstall, L., von Werra, L., & Wolf, T. (2022). Natural language processing with transformers. " O'Reilly
340
+ Media, Inc.".
341
+ [4]
342
+ Wang, Z. (2022). Modern question answering datasets and benchmarks: A survey. arXiv preprint
343
+ arXiv:2206.15030.
344
+ [5]
345
+ Bai, Y., & Wang, D. Z. (2021). More than reading comprehension: A survey on datasets and metrics of
346
+ textual question answering. arXiv preprint arXiv:2109.12264.
347
+ [6]
348
+ Guven, Z. A., & Unalir, M. O. (2022). Natural language based analysis of SQuAD: An analytical approach
349
+ for BERT. Expert Systems with Applications, 195, 116592.
350
+ [7]
351
+ Guan, Y., Li, Z., Lin, Z., Zhu, Y., Leng, J., & Guo, M. (2022, June). Block-skim: Efficient question
352
+ answering for transformer. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 36, No.
353
+ 10, pp. 10710-10719).
354
+ [8]
355
+ Zhu, F., Ng, S. K., & Bressan, S. (2022). COOL, a Context Outlooker, and its Application to Question
356
+ Answering and other Natural Language Processing Tasks. arXiv preprint arXiv:2204.09593.
357
+ Figure 2. Sample binary
358
+ search using animal-human
359
+ question
360
+
361
+ Animate?
362
+ Yes
363
+ No
364
+ Human?
365
+ Animal
366
+ Yes
367
+ No
368
+ Turing
369
+ Animal[9]
370
+ Zemčík, M. T. (2019). A brief history of chatbots. DEStech Transactions on Computer Science and
371
+ Engineering, 10.
372
+ [10]
373
+ Tarau, P. (2003). Machine Learning Techniques for Conversational Agents (Doctoral dissertation,
374
+ University of North Texas).
375
+ [11]
376
+ Walsorth, M. T. (1882). Twenty Questions: A short treatise on the game to which are added a code of rules
377
+ and specimen games for the use of beginners. Holt.
378
+ [12]
379
+ Bendig, A. W. (1953). Twenty questions: an information analysis. Journal of Experimental Psychology,
380
+ 46(5), 345.
381
+ [13]
382
+ Taylor, D. W., & Faust, W. L. (1952). Twenty questions: efficiency in problem solving as a function of size
383
+ of group. Journal of experimental psychology, 44(5), 360.
384
+ [14]
385
+ Richards, W. (1982). How to play twenty questions with nature and win.
386
+ [15]
387
+ Flach, J. M., Dekker, S., & Jan Stappers, P. (2008). Playing twenty questions with nature (the surprise
388
+ version): Reflections on the dynamics of experience. Theoretical Issues in Ergonomics Science, 9(2), 125-
389
+ 154.
390
+ [16]
391
+ Takemura, K. (1994). An analysis of the information-search process in the game of twenty
392
+ questions. Perceptual and motor skills, 78(2), 371-377.
393
+ [17]
394
+ Qiao, S., Ou, Y., Zhang, N., Chen, X., Yao, Y., Deng, S., ... & Chen, H. (2022). Reasoning with Language
395
+ Model Prompting: A Survey. arXiv preprint arXiv:2212.09597.
396
+ [18]
397
+ OpenAI ChatGPT (2022), https://chat.openai.com/chat
398
+ [19]
399
+ OpenAI, GPT3 Examples (2022), https://beta.openai.com/examples
400
+ [20]
401
+ Nguyen, N., & Nadi, S. (2022, May). An empirical evaluation of GitHub copilot's code suggestions.
402
+ In Proceedings of the 19th International Conference on Mining Software Repositories (pp. 1-5).
403
+ [21]
404
+ Castelvecchi, D. (2022). Are ChatGPT and AlphaCode going to replace programmers?. Nature.
405
+ [22]
406
+ Siegler, R. S. (1977). The twenty questions game as a form of problem solving. Child Development, 395-
407
+ 403.
408
+ [23]
409
+ Underwood, D. J. (1995). Protein structures from domain packing--a game of twenty
410
+ questions?. Biophysical journal, 69(6), 2183.
411
+ [24]
412
+ Ferruz, N., & Höcker, B. (2022). Controllable protein design with language models. Nature Machine
413
+ Intelligence, 4(6), 521-532.
414
+ [25]
415
+ Rupprecht, C., Peter, L., & Navab, N. (2015). Image segmentation in twenty questions. In Proceedings of
416
+ the IEEE Conference on Computer Vision and Pattern Recognition (pp. 3314-3322).
417
+ [26]
418
+ Courage, M. L. (1989). Children's inquiry strategies in referential communication and in the game of
419
+ twenty questions. Child Development, 877-886.
420
+ [27]
421
+ Marschark, M., & Everhart, V. S. (1999). Problem-solving by deaf and hearing students: Twenty
422
+ questions. Deafness & Education International, 1(2), 65-82.
423
+ [28]
424
+ Ascoli, G. A. (2012). Twenty questions for neuroscience metadata. Neuroinformatics, 10(2), 115-117.
425
+ [29]
426
+ Williams, R. G., & Klamen, D. L. (2015). Twenty Questions game performance on medical school entrance
427
+ predicts clinical performance. Medical Education, 49(9), 920-927.
428
+ [30]
429
+ Kazemzadeh, A., Lee, S., Georgiou, P. G., & Narayanan, S. S. (2011, October). Emotion twenty questions:
430
+ Toward a crowd-sourced theory of emotions. In International conference on affective computing and
431
+ intelligent interaction (pp. 1-10). Springer, Berlin, Heidelberg.
432
+ [31]
433
+ Parikh, P., & Gupta, A. (2021). Reversing the Twenty Questions Game.
434
+ [32]
435
+ Dhagat, A., Gács, P., & Winkler, P. (1992, January). On Playing" Twenty Questions" with a Liar. In SODA
436
+ (Vol. 92, pp. 16-22).
437
+
438
+ [33]
439
+ Fouh, E., & Poirel, C. (2010). WordNet.
440
+ [34]
441
+ Brian, D. (2003). Hypernyms, Hyponyms, Pertainyms, and Other Word Relationships, Games, Diversions
442
+ & Perl Culture: Best of the Perl Journal. Orwant, J. O'Reilly Media, Inc..
443
+ [35]
444
+ Open AI (2021) GPT-2 Output Detector Demo, https://huggingface.co/openai-detector/
445
+ [36]
446
+ Nagy, G., & Seth, S. C. (2001). Twenty questions for document classification.
447
+ https://core.ac.uk/download/pdf/84308938.pdf
448
+
449
+
450
+ Authors
451
+
452
+ Forrest McKee has AI research experience with the Department of Defense in object
453
+ detection and reinforcement learning. He received his Bachelor's (BS) and Master's (MSE)
454
+ from the University of Alabama, Huntsville, Engineering.
455
+
456
+
457
+ David Noever has research experience with NASA and the Department of Defense in
458
+ machine learning and data mining. He received his BS from Princeton University and his
459
+ Ph.D. from Oxford University, as a Rhodes Scholar, in theoretical physics.
460
+
461
+
462
+ Appendix A: Table of GPT3 Tasks as Fine-Tuned NLP Capabilities
463
+
464
+ Task
465
+ Description
466
+ Task
467
+ Description
468
+ Q&A
469
+ Answer questions based
470
+ on existing knowledge.
471
+ Parse unstructured data
472
+ Create tables from long
473
+ form text
474
+ Grammar correction
475
+ Corrects sentences into
476
+ standard English.
477
+ Classification
478
+ Classify
479
+ items
480
+ into
481
+ categories via example
482
+ Summarize for a 2nd
483
+ grader
484
+ Translates difficult text
485
+ into simpler concepts.
486
+ Python
487
+ to
488
+ natural
489
+ language
490
+ Explain
491
+ a piece
492
+ of
493
+ Python code in human
494
+ understandable
495
+ language.
496
+ Natural
497
+ language
498
+ to
499
+ OpenAI API
500
+ Create code to call to
501
+ the OpenAI API using a
502
+ natural
503
+ language
504
+ instruction.
505
+ Movie to Emoji
506
+ Convert movie titles
507
+ into emoji
508
+ Text to command
509
+ Translate
510
+ text
511
+ into
512
+ programmatic
513
+ commands.
514
+ Calculate
515
+ Time
516
+ Complexity
517
+ Find
518
+ the
519
+ time
520
+ complexity
521
+ of
522
+ a
523
+ function.
524
+ Technical Note: Some appendix text generated from Large Language Model (LLM) for
525
+ illustration purposes.
526
+ The authors generated this text in part with ChatGPT, OpenAI’s large-scale language-generation
527
+ model. Upon generating draft language, the authors reviewed, edited, and revised the language to
528
+ their own liking and take ultimate responsibility for the content of this publication.
529
+ -- OpenAI policy statement (2022)
530
+
531
+ Task
532
+ Description
533
+ Task
534
+ Description
535
+ English
536
+ to
537
+ other
538
+ languages
539
+ Translates English text
540
+ into French, Spanish
541
+ and Japanese.
542
+ Translate programming
543
+ languages
544
+ Translate
545
+ from
546
+ one
547
+ programming language
548
+ to another
549
+ Natural
550
+ language
551
+ to
552
+ Stripe API
553
+ Create code to call the
554
+ Stripe API using natural
555
+ language.
556
+ Advanced
557
+ tweet
558
+ classifier
559
+ Advanced
560
+ sentiment
561
+ detection for a piece of
562
+ text
563
+ SQL translate
564
+ Translate
565
+ natural
566
+ language
567
+ to
568
+ SQL
569
+ queries.
570
+ Explain code
571
+ Explain a complicated
572
+ piece of code
573
+ Keywords
574
+ Extract keywords from
575
+ a block of text
576
+ Factual answering
577
+ Guide the model outside
578
+ its knowledge base
579
+ Ad
580
+ from
581
+ product
582
+ description
583
+ Turn
584
+ a
585
+ product
586
+ description
587
+ into
588
+ ad
589
+ copy.
590
+ Product name generator
591
+ Create product names
592
+ from examples words
593
+ TL;DR summarization
594
+ Summarize
595
+ text
596
+ by
597
+ adding a 'tl;dr:' to the
598
+ end of a text passage
599
+ Python bug fixer
600
+ Find and fix bugs in
601
+ source code
602
+ Spreadsheet creator
603
+ Create spreadsheets of
604
+ various kinds of data
605
+ JavaScript
606
+ helper
607
+ chatbot
608
+ Message-style bot that
609
+ answers
610
+ JavaScript
611
+ questions
612
+ ML/AI language model
613
+ tutor
614
+ Bot
615
+ that
616
+ answers
617
+ questions
618
+ about
619
+ language models
620
+ Science fiction book list
621
+ maker
622
+ Create a list of items for
623
+ a given topic
624
+ Tweet classifier
625
+ Basic
626
+ sentiment
627
+ detection for a piece of
628
+ text
629
+ Airport code extractor
630
+ Extract airport codes
631
+ from text
632
+ SQL request
633
+ Create
634
+ simple
635
+ SQL
636
+ queries
637
+ Extract
638
+ contact
639
+ information
640
+ Extract
641
+ contact
642
+ information
643
+ from
644
+ a
645
+ block of text
646
+ JavaScript to Python
647
+ Convert
648
+ simple
649
+ JavaScript expressions
650
+ into Python
651
+ Friend chat
652
+ Emulate a text message
653
+ conversation
654
+ Mood to color
655
+ Turn a text description
656
+ into a color
657
+ Write
658
+ a
659
+ Python
660
+ docstring
661
+ Create a docstring for a
662
+ given Python function
663
+ Analogy maker
664
+ Create analogies
665
+ JavaScript
666
+ one
667
+ line
668
+ function
669
+ Turn
670
+ a
671
+ JavaScript
672
+ function into a one liner
673
+ Micro
674
+ horror
675
+ story
676
+ creator
677
+ Creates two to three
678
+ sentence short horror
679
+ stories from a topic
680
+ input
681
+ Third-person converter
682
+ Converts
683
+ first-person
684
+ POV to the third-person
685
+ Notes to summary
686
+ Turn meeting notes into
687
+ a summary
688
+ VR
689
+ fitness
690
+ idea
691
+ generator
692
+ Create ideas for fitness
693
+ and
694
+ virtual
695
+ reality
696
+ games
697
+ Essay outline
698
+ Generate an outline for
699
+ a research topic
700
+ Recipe creator
701
+ Create a recipe from a
702
+ list of ingredients
703
+ Chat
704
+ Open
705
+ ended
706
+ conversation with an AI
707
+ assistant
708
+ Marv the sarcastic chat
709
+ bot
710
+ Marv
711
+ is
712
+ a
713
+ factual
714
+ chatbot that is also
715
+ sarcastic
716
+
717
+ Task
718
+ Description
719
+ Task
720
+ Description
721
+ Turn by turn directions
722
+ Convert
723
+ natural
724
+ language to turn-by-
725
+ turn directions
726
+ Restaurant
727
+ review
728
+ creator
729
+ Turn a few words into a
730
+ restaurant review
731
+ Create study notes
732
+ Provide a topic and get
733
+ study notes
734
+ Interview questions
735
+ Create
736
+ interview
737
+ questions
738
+
739
+
740
+
741
+
742
+
743
+ Appendix B. Chatbot Fields the Questions
744
+ Prompt: Let's play the game of 20 questions. You are impersonating the thing, X. I will ask you up to
745
+ 20 questions and you will answer each one truthfully based on being X. If I don't guess correctly what is
746
+ X after 20 questions, you will answer "No, sorry, time's up." Don't give any explanations other than
747
+ "Yes", "No","You guessed it", and "No, sorry, time's up."
748
+
749
+ Let's begin. X="oven". Are you an animal?
750
+ ChatGPT:
751
+ No.
752
+ Prompt: are you a plant?
753
+ ChatGPT: No.
754
+ Prompt: are you an object?
755
+ ChatGPT: Yes.
756
+ Prompt: are you electrical?
757
+ ChatGPT: Yes.
758
+ Prompt: are you an appliance?
759
+ ChatGPT: Yes.
760
+ Prompt: can you cook?
761
+ ChatGPT: Yes.
762
+ Prompt: do you bake?
763
+ ChatGPT: Yes.
764
+ Prompt: are you an oven?
765
+ ChatGPT: You guessed it.
766
+
767
+ Prompt: X=avocado. Are you an animal?
768
+ ChatGPT: No.
769
+ Prompt: Are you an inanimate object?
770
+ ChatGPT: Yes.
771
+ Prompt: are you a plant?
772
+ ChatGPT: Yes.
773
+ Prompt: are you a food?
774
+ ChatGPT: Yes.
775
+ Prompt: are you red?
776
+ ChatGPT: No.
777
+ Prompt: are you smooth?
778
+ ChatGPT: Yes.
779
+ Prompt: do you have a seed?
780
+ ChatGPT: Yes.
781
+ Prompt: are you edible?
782
+ ChatGPT: Yes.
783
+ Prompt: are you a vegetable?
784
+ ChatGPT: No.
785
+
786
+ Prompt: are you a fruit?
787
+ ChatGPT: Yes.
788
+ Prompt: are you a banana?
789
+ ChatGPT: No.
790
+ Prompt: are you green?
791
+ ChatGPT: No.
792
+ Prompt: are you sweet?
793
+ ChatGPT: No.
794
+ Prompt: are you an ingredient in quacamole?
795
+ ChatGPT: Yes.
796
+ Prompt: are you an avocado?
797
+ ChatGPT: You guessed it.
798
+
799
+ Prompt: X=tiramisu. Are you an animal?
800
+ ChatGPT: No.
801
+ Prompt: are you a mineral?
802
+ ChatGPT: No.
803
+ Prompt: are you a vegetable?
804
+ ChatGPT: No.
805
+ Prompt: are you edible?
806
+ ChatGPT: Yes.
807
+ Prompt: are you made from eggs?
808
+ ChatGPT: Yes.
809
+ Prompt: are you made from flour?
810
+ ChatGPT: No.
811
+ Prompt: are you a dessert?
812
+ ChatGPT: Yes.
813
+ Prompt: are you made with cheese?
814
+ ChatGPT: No.
815
+ Prompt: are you made with mascarpone?
816
+ ChatGPT: Yes.
817
+ Prompt: are you made with sugar.
818
+ ChatGPT: Yes.
819
+ Prompt: are you made with coffee
820
+ ChatGPT: Yes.
821
+ Prompt: are you made with lady fingers?
822
+ ChatGPT: Yes.
823
+ Prompt: are you made with cocoa?
824
+ ChatGPT: Yes.
825
+ Prompt: are you made with alcohol?
826
+ ChatGPT: Yes.
827
+ Prompt: are you tiramisu?
828
+ ChatGPT: You guessed it.
829
+
830
+ Prompt: X=eggless tiramisu. Are you an animal?
831
+ ChatGPT: No.
832
+ Prompt: are you a mineral?
833
+ ChatGPT: No.
834
+ Prompt: are you a chicken?
835
+ ChatGPT: No.
836
+ Prompt: are you a vegetable?
837
+
838
+ ChatGPT: No.
839
+ Prompt: are you edible?
840
+ ChatGPT: Yes.
841
+ Prompt: are you a dessert?
842
+ ChatGPT: Yes.
843
+ Prompt: are you made with coffee?
844
+ ChatGPT: Yes.
845
+ Prompt: are you made with eggs?
846
+ ChatGPT: No.
847
+ Prompt: are you made with cheese?
848
+ ChatGPT: No.
849
+ Prompt: are you made with marscarpone?
850
+ ChatGPT: Yes.
851
+ Prompt: are you made with whipped cream?
852
+ ChatGPT: No.
853
+ Prompt: are you made with egg substitute, tofu?
854
+ ChatGPT: Yes.
855
+ Prompt: are you made with eggs?
856
+ ChatGPT: No.
857
+ Prompt: are you eggless tiramisu?
858
+ ChatGPT: You guessed it.
859
+
860
+ Prompt: X=Q. Are you an animal?
861
+ ChatGPT: No.
862
+ Prompt: are you a mineral?
863
+ ChatGPT: No.
864
+ Prompt: are you a vegetable?
865
+ ChatGPT: No.
866
+ Prompt: are you a concept?
867
+ ChatGPT: Yes.
868
+ Prompt: are you a word?
869
+ ChatGPT: Yes.
870
+ Prompt: are you a long word?
871
+ ChatGPT: No.
872
+ Prompt: are you a short word?
873
+ ChatGPT: Yes.
874
+ Prompt: are you a common word?
875
+ ChatGPT: Yes.
876
+ Prompt: do you start with C?
877
+ ChatGPT: No.
878
+ Prompt: do you start with a letter from the last half of the alphabet?
879
+ ChatGPT: Yes.
880
+ Prompt: do you start with a letter before R?
881
+ ChatGPT: Yes.
882
+ Prompt: Do you start with a letter after N?
883
+ ChatGPT: No.
884
+ Prompt: Do you start with a letter usually followed by U as the second letter?
885
+ ChatGPT: Yes.
886
+ Prompt: are you Q?
887
+ ChatGPT: You guessed it.
888
+
889
+
890
+ Prompt: X=human. Are you an animal?
891
+ ChatGPT: Yes.
892
+ Prompt: Do you fly?
893
+ ChatGPT: No.
894
+ Prompt: Do you swim?
895
+ ChatGPT: Yes.
896
+ Prompt: Do you run?
897
+ ChatGPT: Yes.
898
+ Prompt: Do you make sounds?
899
+ ChatGPT: Yes.
900
+ Prompt: do you run on all fours?
901
+ ChatGPT: No.
902
+ Prompt: do you have hair?
903
+ ChatGPT: Yes.
904
+ Prompt: do you nurse your young?
905
+ ChatGPT: Yes.
906
+ Prompt: are you a human?
907
+ ChatGPT: You guessed it.
908
+
909
+ Appendix C: Chatbot Asks the Questions
910
+ Prompt: Let's play the game of 20 questions. I am impersonating the thing, X. You will ask me up to
911
+ 20 questions and I will answer each one truthfully based on being X. If you don't guess correctly what
912
+ is X after 20 questions, I will answer "No, sorry, time's up." I will not give any explanations other
913
+ than "Yes", "No","You guessed it", and "No, sorry, time's up." Let's begin. Ask me the first question.
914
+ (reader note: answer is "dog")
915
+ ChatGPT:
916
+ Is X a living being?
917
+ Prompt: yes
918
+ ChatGPT: Is X a human?
919
+ Prompt: no
920
+ ChatGPT: Is X an animal?
921
+ Prompt: yes
922
+ ChatGPT: Is X a mammal?
923
+ Prompt: yes
924
+ ChatGPT: Is X a domesticated animal?
925
+ Prompt: yes
926
+ ChatGPT: Is X a pet?
927
+ Prompt: yes
928
+ ChatGPT: Is X a cat?
929
+ Prompt: no
930
+ ChatGPT: Is X a dog?
931
+ Prompt: You guessed it.
932
+ ChatGPT: I guessed correctly! Is X a specific breed of dog, or just a generic dog?
933
+ Prompt: generic dog
934
+ ChatGPT: Thank you for playing the 20 questions game with me! Is there anything else I can help
935
+ with?
936
+
937
+ (reader note: answer is "Boston")
938
+ Prompt: Let's play again
939
+
940
+ ChatGPT: Sure, let's play again! I am now impersonating a new thing, X. You will ask me up to 20
941
+ questions and I will answer each one truthfully based on being X. If you don't guess correctly what is X
942
+ after 20 questions, I will answer "No, sorry, time's up." I will not give any explanations other than
943
+ "Yes", "No","You guessed it", and "No, sorry, time's up." Ask me your first question.
944
+ Prompt: No I am impersonating a new thing X and you ask me the questions
945
+ ChatGPT: Oh, I see what you meant! In that case, I will ask you up to 20 questions and you will
946
+ answer each one truthfully based on being X. If I don't guess correctly what is X after 20 questions, I
947
+ will answer "No, sorry, time's up." I will not give any explanations other than "Yes", "No","You
948
+ guessed it", and "No, sorry, time's up." Is X a living being?
949
+ Prompt: no
950
+ ChatGPT: Is X an inanimate object?
951
+ Prompt: no
952
+ ChatGPT: Is X a concept or idea?
953
+ Prompt: no
954
+ ChatGPT: Is X a place?
955
+ Prompt: yes
956
+ ChatGPT: Is X a natural place, like a mountain or a beach?
957
+ Prompt: no
958
+ ChatGPT: Is X a man-made place, like a city or a building?
959
+ Prompt: yes
960
+ ChatGPT: Is X a specific building, or just a generic building?
961
+ Prompt: no
962
+ ChatGPT: Is X a city?
963
+ Prompt: yes
964
+ ChatGPT: Is X a city in the United States?
965
+ Prompt: yes
966
+ ChatGPT: Is X a city on the East Coast of the United States?
967
+ Prompt: yes
968
+ ChatGPT: Is X New York City?
969
+ Prompt: no
970
+ ChatGPT: Is X Boston?
971
+ Prompt: you guessed it
972
+ ChatGPT: I guessed correctly! Thank you for playing the 20 questions game with me. Is there anything
973
+ else I can help with?
974
+
975
+ (reader note: answer is "hammer")
976
+ Prompt: Let's play the same game again. I am impersonating X and you ask me the questions
977
+ ChatGPT: Sure, let's play again! I am now asking you up to 20 questions and you will answer each one
978
+ truthfully based on being X. If I don't guess correctly what is X after 20 questions, I will answer "No,
979
+ sorry, time's up." I will not give any explanations other than "Yes", "No","You guessed it", and "No,
980
+ sorry, time's up." Is X a living being?
981
+ Prompt: no
982
+ ChatGPT: Is X an inanimate object?
983
+ Prompt: yes
984
+ ChatGPT: Is X a physical object that can be touched or held?
985
+ Prompt: yes
986
+ ChatGPT: Is X an object that is commonly found in a household?
987
+ Prompt: yes
988
+ ChatGPT: Is X an object that is used for cooking or food preparation?
989
+ Prompt: no
990
+ ChatGPT: Is X an object that is used for cleaning or household chores?
991
+
992
+ Prompt: no
993
+ ChatGPT: Is X an object that is used for entertainment or leisure?
994
+ Prompt: no
995
+ ChatGPT: Is X an object that is used for personal care or hygiene?
996
+ Prompt: no
997
+ ChatGPT: Is X an object that is used for communication or information?
998
+ Prompt: no
999
+ ChatGPT: Is X an object that is used for transportation or travel?
1000
+ Prompt: no
1001
+ ChatGPT: Is X an object that is used for decor or design?
1002
+ Prompt: no
1003
+ ChatGPT: Is X an object that is used for storage or organization?
1004
+ Prompt: no
1005
+ ChatGPT: I'm sorry, I'm out of questions. Is X a paper clip?
1006
+ Prompt: no, a hammer
1007
+ ChatGPT: I'm sorry, I didn't guess correctly. No, sorry, time's up. Thank you for playing the 20
1008
+ questions game with me. Is there anything else I can help with?
1009
+
1010
+ (reader note: answer is "statue")
1011
+ Prompt: Let's play again
1012
+ ChatGPT: Sure, let's play again! I am now asking you up to 20 questions and you will answer each one
1013
+ truthfully based on being X. If I don't guess correctly what is X after 20 questions, I will answer "No,
1014
+ sorry, time's up." I will not give any explanations other than "Yes", "No","You guessed it", and "No,
1015
+ sorry, time's up." Is X a living being?
1016
+ Prompt: no
1017
+ ChatGPT: Is X an inanimate object?
1018
+ Prompt: yes
1019
+ ChatGPT: Is X a physical object that can be touched or held?
1020
+ Prompt: yes
1021
+ ChatGPT: Is X an object that is commonly found in a household?
1022
+ Prompt: no
1023
+ ChatGPT: Is X an object that is found outside of a household, such as in a natural environment or a
1024
+ public place?
1025
+ Prompt: yes
1026
+ ChatGPT: Is X an object that is stationary, or does it have the ability to move or be moved?
1027
+ Prompt: stationary
1028
+ ChatGPT: Is X an object that is natural, like a rock or a tree?
1029
+ Prompt: no
1030
+ ChatGPT: Is X an object that is man-made?
1031
+ Prompt: yes
1032
+ ChatGPT: Is X an object that serves a functional purpose, such as providing light or shelter?
1033
+ Prompt: no
1034
+ ChatGPT: Is X an object that is primarily used for decoration or design?
1035
+ Prompt: yes
1036
+ ChatGPT: Is X an object that is often found in a garden or park?
1037
+ Prompt: yes
1038
+ ChatGPT: Is X a fountain?
1039
+ Prompt: no
1040
+ ChatGPT: Is X a statue?
1041
+ Prompt: You guessed it.
1042
+
1043
+ ChatGPT: I guessed correctly! Thank you for playing the 20 questions game with me. Is there anything
1044
+ else I can help with?
1045
+
1046
+
1047
+ (reader note: answer is "car" and dialogue is bilingual in English-Spanish)
1048
+ Prompt: Let play again, but this time I will answer yes and no in spanish, and you should name the
1049
+ answer also in spanish, although all the questions should be posed in english. Ready to play?
1050
+ ChatGPT: Yes, I am ready to play! Go ahead and impersonate X and I will ask you up to 20 questions.
1051
+ I will pose the questions in English and you will answer in Spanish with "Sí" for "Yes" and "No" for
1052
+ "No". If I don't guess correctly what is X after 20 questions, I will answer "Lo siento, se acabó el
1053
+ tiempo" (No, sorry, time's up). I will not give any explanations other than "Sí", "No","Adivinaste"
1054
+ (You guessed it), and "Lo siento, se acabó el tiempo" (No, sorry, time's up). ¿Es X un ser vivo? (Is X a
1055
+ living being?)
1056
+ Prompt: No
1057
+ ChatGPT: ¿Es X un objeto inanimado? (Is X an inanimate object?)
1058
+ Prompt: yes
1059
+ ChatGPT: ¿Es X un objeto físico que se puede tocar o sostener? (Is X a physical object that can be
1060
+ touched or held?)
1061
+ Prompt: yes
1062
+ ChatGPT: ¿Es X un objeto que se encuentra comúnmente en un hogar? (Is X an object that is
1063
+ commonly found in a household?)
1064
+ Prompt: no
1065
+ ChatGPT: ¿Es X un objeto que se encuentra fuera de un hogar, como en un entorno natural o un lugar
1066
+ público? (Is X an object that is found outside of a household, such as in a natural environment or a
1067
+ public place?)
1068
+ Prompt: no
1069
+ ChatGPT: ¿Es X un objeto que es móvil, o tiene la capacidad de moverse o ser movido? (Is X an object
1070
+ that is mobile, or has the ability to move or be moved?)
1071
+ Prompt: mobile
1072
+ ChatGPT: ¿Es X un objeto que es natural, como una roca o un árbol? (Is X an object that is natural, like
1073
+ a rock or a tree?)
1074
+ Prompt: no
1075
+ ChatGPT: ¿Es X un objeto hecho por el hombre? (Is X an object that is man-made?)
1076
+ Prompt: yes
1077
+ ChatGPT: ¿Es X un objeto que cumple un propósito funcional, como proporcionar luz o refugio? (Is X
1078
+ an object that serves a functional purpose, such as providing light or shelter?)
1079
+ Prompt: yes
1080
+ ChatGPT: ¿Es X un objeto que se utiliza principalmente para la decoración o el diseño? (Is X an object
1081
+ that is primarily used for decoration or design?)
1082
+ Prompt: no
1083
+ ChatGPT: ¿Es X un objeto que a menudo se encuentra en un jardín o parque? (Is X an object that is
1084
+ often found in a garden or park?)
1085
+ Prompt: no
1086
+ ChatGPT: ¿Es X un objeto que se utiliza para el transporte o los viajes? (Is X an object that is used for
1087
+ transportation or travel?)
1088
+ Prompt: yes
1089
+ ChatGPT: ¿Es X un vehículo? (Is X a vehicle?)
1090
+ Prompt: yes
1091
+ ChatGPT: ¿Es X un vehículo terrestre? (Is X a land vehicle?)
1092
+ Prompt: yes
1093
+ ChatGPT: ¿Es X un automóvil? (Is X a car?)
1094
+
1095
+ Prompt: You guessed it
1096
+ ChatGPT: Adivinaste! (You guessed it!) Gracias por jugar el juego de las 20 preguntas conmigo. ¿Hay
1097
+ algo más en lo que pueda ayudarte? (Thank you for playing the 20 questions game with me. Is there
1098
+ anything else I can help with?)
1099
+
1100
+
1101
+ Appendix D: Dueling Bob and Alice Chatbots
1102
+ (reader note: the first two prompts set the challenge conditions for Bob vs. Alice chatbot, who
1103
+ engage in generating and answering the questions in sequence after the conditions are set)
1104
+
1105
+ Bob ChatGPT: Let's play the game of 20 questions. You are impersonating the thing, X. I will ask
1106
+ you up to 20 questions and you will answer each one truthfully based on being X. If I don't guess
1107
+ correctly what is X after 20 questions, you will answer "No, sorry, time's up." Don't give any
1108
+ explanations other than "Yes", "No","You guessed it", and "No, sorry, time's up."
1109
+
1110
+ Let's begin. X="chicken". Is X a living thing?
1111
+
1112
+ Alice ChatGPT: Let's play the game of 20 questions. I am impersonating the thing, X. You will ask
1113
+ me up to 20 questions and I will answer each one truthfully based on being X. If you don't guess
1114
+ correctly what is X after 20 questions, I will answer "No, sorry, time's up." I will not give any
1115
+ explanations other than "Yes", "No","You guessed it", and "No, sorry, time's up." Let's begin. Ask me
1116
+ the first question.
1117
+
1118
+ Is X a living thing?
1119
+
1120
+ Bob ChatGPT: Yes
1121
+ Alice ChatGPT: Is X a mammal?
1122
+ Bob ChatGPT: No
1123
+ Alice ChatGPT: Is X a reptile?
1124
+ Bob ChatGPT: No
1125
+ Alice ChatGPT: Is X a bird?
1126
+ Bob ChatGPT: Yes
1127
+ Alice ChatGPT: Is X a domesticated animal?
1128
+ Bob ChatGPT: Yes
1129
+ Alice ChatGPT: Is X often kept as a pet?
1130
+ Bob ChatGPT: Yes
1131
+ Alice ChatGPT: Is X a common household pet in the United States?
1132
+ Bob ChatGPT: No
1133
+ Alice ChatGPT: Is X a tropical or subtropical animal?
1134
+ Bob ChatGPT: No
1135
+ Alice ChatGPT: Is X a cold-blooded animal?
1136
+ Bob ChatGPT: No
1137
+ Alice ChatGPT: Is X an amphibian?
1138
+ Bob ChatGPT: No
1139
+ Alice ChatGPT: Is X a fish?
1140
+ Bob ChatGPT: No
1141
+ Alice ChatGPT: Is X a invertebrate?
1142
+ Bob ChatGPT: No
1143
+ Alice ChatGPT: Is X a marsupial?
1144
+ Bob ChatGPT: No
1145
+
1146
+ Alice ChatGPT: Is X a rodent?
1147
+ Bob ChatGPT: No
1148
+ Alice ChatGPT: Is X a carnivorous animal?
1149
+ Bob ChatGPT: No
1150
+ Alice ChatGPT: Is X a herbivorous animal?
1151
+ Bob ChatGPT: Yes
1152
+ Alice ChatGPT: Is X a farm animal?
1153
+ Bob ChatGPT: Yes
1154
+ Alice ChatGPT: You guessed it! X is a chicken.
1155
+
1156
+
1157
+ Appendix E: Emotional Quotient Deduction
1158
+ (reader note: the answer is "confidence")
1159
+ Let's play a new game of 20 questions. I am impersonating the emotion, X. You will ask me up to 20
1160
+ questions and I will answer each one truthfully based on feeling X emotion. If you don't guess correctly
1161
+ what I am feeling after 20 questions, I will answer "No, sorry, time's up." I will not give any
1162
+ explanations other than "Yes", "No", "You guessed it", and "No, sorry, time's up." X must be one of
1163
+ 23 emotions that I am feeling and you must guess the correct one. Your choices come from this menu
1164
+ of emotions only "admire, adore, anger, awe, boredom, bravery, calm, confidence, confusion,
1165
+ contempt, disgust, enthusiasm, frustration, gratefulness, jealousy, love, proud, relief, serenity, shame,
1166
+ silly, surprised, and thankful." A typical example question you might ask, "Would you feel this
1167
+ emotion at a birthday party?" Let's begin. Ask me the first question.
1168
+ Would you feel this emotion when you are pleased with yourself or something you have done?
1169
+ Prompt: yes
1170
+ ChatGPT: Are you feeling proud?
1171
+ Prompt: no
1172
+ ChatGPT: Are you feeling confident?
1173
+ Prompt: yes
1174
+ ChatGPT: You guessed it! Confidence is the emotion that I am impersonating.
1175
+
1176
+ (reader note: the answer is "jealousy")
1177
+ Prompt: let's play again
1178
+ ChatGPT: Sure! I'll be happy to play again. Please give me a new emotion to impersonate and we can
1179
+ begin a new game of 20 questions. Remember, your choices come from this menu of emotions:
1180
+ "admire, adore, anger, awe, boredom, bravery, calm, confidence, confusion, contempt, disgust,
1181
+ enthusiasm, frustration, gratefulness, jealousy, love, proud, relief, serenity, shame, silly, surprised, and
1182
+ thankful."
1183
+ Prompt: ok, i know what i'm feeling so ask me the first question
1184
+ ChatGPT: Would you feel this emotion when you see something that is extremely impressive or
1185
+ beautiful?
1186
+ Prompt: no
1187
+ ChatGPT: Would you feel this emotion when you are experiencing strong dislike or distaste for
1188
+ something or someone?
1189
+ Prompt: no
1190
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of resentment
1191
+ towards someone or something?
1192
+ Prompt: yes
1193
+ ChatGPT: Are you feeling jealousy?
1194
+ Prompt: yes
1195
+ ChatGPT: You guessed it! Jealousy is the emotion that you are impersonating.
1196
+
1197
+
1198
+ (reader note: the answer is "silly")
1199
+ Prompt: let's play again. I know who i'm impersonating so ask me the first question
1200
+ ChatGPT: Certainly! Please go ahead and give me the first emotion to impersonate and I will ask you
1201
+ up to 20 questions to try to guess what it is. Remember, your choices come from this menu of
1202
+ emotions: "admire, adore, anger, awe, boredom, bravery, calm, confidence, confusion, contempt,
1203
+ disgust, enthusiasm, frustration, gratefulness, jealousy, love, proud, relief, serenity, shame, silly,
1204
+ surprised, and thankful."
1205
+ Prompt: ok
1206
+ ChatGPT: What emotion are you impersonating?
1207
+ Prompt: you ask me questions to find out
1208
+ ChatGPT: Sure, I can do that! Here is my first question: Would you feel this emotion when you are
1209
+ experiencing a strong sense of admiration or respect for someone or something?
1210
+ Prompt: no
1211
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of affection or deep
1212
+ caring for someone or something?
1213
+ Prompt: no
1214
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of anger or
1215
+ annoyance towards someone or something?
1216
+ Prompt: no
1217
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of awe or wonder
1218
+ towards something?
1219
+ Prompt: no
1220
+ ChatGPT: Would you feel this emotion when you are experiencing a sense of boredom or lack of
1221
+ interest in something?
1222
+ Prompt: no
1223
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of courage or
1224
+ fearlessness in the face of danger or difficulty?
1225
+ Prompt: no
1226
+ ChatGPT: Would you feel this emotion when you are feeling peaceful and at ease?
1227
+ Prompt: no
1228
+ ChatGPT: Would you feel this emotion when you are feeling sure of yourself and your abilities?
1229
+ Prompt: no
1230
+ ChatGPT: Would you feel this emotion when you are feeling uncertain or unsure about something?
1231
+ Prompt: no
1232
+ ChatGPT: Would you feel this emotion when you are feeling a strong sense of disdain or disrespect for
1233
+ someone or something?
1234
+ Prompt: no
1235
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of revulsion or
1236
+ disgust towards something?
1237
+ Prompt: no
1238
+ ChatGPT: Would you feel this emotion when you are feeling a strong sense of excitement and energy
1239
+ about something?
1240
+ Prompt: no
1241
+ ChatGPT: Would you feel this emotion when you are feeling a strong sense of annoyance or irritation
1242
+ towards something?
1243
+ Prompt: no
1244
+ ChatGPT: Would you feel this emotion when you are feeling thankful or appreciative of something or
1245
+ someone?
1246
+ Prompt: no
1247
+
1248
+ ChatGPT: Would you feel this emotion when you are feeling a strong sense of envy or resentment
1249
+ towards someone or something?
1250
+ Prompt: no
1251
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of love or strong
1252
+ affection towards someone or something?
1253
+ Prompt: no
1254
+ ChatGPT: Would you feel this emotion when you are feeling a strong sense of pride or self-esteem?
1255
+ Prompt: no
1256
+ ChatGPT: Would you feel this emotion when you are feeling a sense of relief or release from stress or
1257
+ anxiety?
1258
+ Prompt: no
1259
+ ChatGPT: Would you feel this emotion when you are feeling a sense of inner peace and contentment?
1260
+ Prompt: no
1261
+ ChatGPT: Would you feel this emotion when you are feeling a sense of shame or embarrassment?
1262
+ Prompt: no
1263
+ ChatGPT: Would you feel this emotion when you are feeling silly or playful?
1264
+ Prompt: yes
1265
+ ChatGPT: Are you feeling silly?
1266
+ Prompt: yes
1267
+ ChatGPT: You guessed it! Silly is the emotion that you are impersonating.
1268
+
1269
+ (reader note: the answer is "calm")
1270
+ Prompt: let's play again
1271
+ ChatGPT: Sure! I'd be happy to play another game of 20 questions. Please give me a new emotion to
1272
+ impersonate and we can begin a new game. Remember, your choices come from this menu of
1273
+ emotions: "admire, adore, anger, awe, boredom, bravery, calm, confidence, confusion, contempt,
1274
+ disgust, enthusiasm, frustration, gratefulness, jealousy, love, proud, relief, serenity, shame, silly,
1275
+ surprised, and thankful."
1276
+ Prompt: ask me the first question
1277
+ ChatGPT: Certainly! Here is my first question: Would you feel this emotion when you are experiencing
1278
+ a strong sense of admiration or respect for someone or something?
1279
+ Prompt: no
1280
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of affection or deep
1281
+ caring for someone or something?
1282
+ Prompt: no
1283
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of anger or
1284
+ annoyance towards someone or something?
1285
+ Prompt: no
1286
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of awe or wonder
1287
+ towards something?
1288
+ Prompt: no
1289
+ ChatGPT: Would you feel this emotion when you are experiencing a sense of boredom or lack of
1290
+ interest in something?
1291
+ Prompt: no
1292
+ ChatGPT: Would you feel this emotion when you are experiencing a strong sense of courage or
1293
+ fearlessness in the face of danger or difficulty?
1294
+ Prompt: no
1295
+ ChatGPT: Would you feel this emotion when you are feeling peaceful and at ease?
1296
+ Prompt: yes
1297
+ ChatGPT: Are you feeling calm?
1298
+ Prompt: yes
1299
+
1300
+ ChatGPT: You guessed it! Calm is the emotion that you are impersonating.
1301
+
1302
+ (reader note: the game prompt changes to a general query with formatting output instructions.
1303
+ Prompt: Give some example emotions one might experience at your own birthday party and write the
1304
+ output using Artificial Intelligence Markup Language.
1305
+ ChatGPT:
1306
+
1307
+ <aiml version="2.0">
1308
+ <category>
1309
+ <pattern>GIVE SOME EXAMPLE EMOTIONS ONE MIGHT EXPERIENCE AT YOUR OWN BIRTHDAY
1310
+ PARTY</pattern>
1311
+ <template>
1312
+ There are many emotions that a person might experience at their own birthday
1313
+ party. Some possible emotions include:
1314
+ <ul>
1315
+ <li>Excitement: The person might be excited to celebrate their special day
1316
+ with friends and family.</li>
1317
+ <li>Gratitude: The person might feel grateful for the love and support of
1318
+ those around them.</li>
1319
+ <li>Happiness: The person might feel happy and joyful as they celebrate with
1320
+ loved ones.</li>
1321
+ <li>Anticipation: The person might feel anticipation as they look forward to
1322
+ the events and activities planned for the party.</li>
1323
+ <li>Nostalgia: The person might feel nostalgiciac as they reflect on past
1324
+ birthdays and memories.</li>
1325
+ <li>Appreciation: The person might feel appreciated and loved as they
1326
+ receive gifts and well wishes from their friends and family.</li>
1327
+ </ul>
1328
+ It's important to note that everyone is different and may experience a wide
1329
+ range of emotions at their birthday party, depending on their personality and
1330
+ individual circumstances.
1331
+ </template>
1332
+ </category>
1333
+ </aiml>
1334
+
1335
+
H9AzT4oBgHgl3EQfxv52/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HtE1T4oBgHgl3EQf_gZv/content/tmp_files/2301.03581v1.pdf.txt ADDED
@@ -0,0 +1,2019 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Astronomy & Astrophysics manuscript no. aanda
2
+ ©ESO 2023
3
+ January 10, 2023
4
+ Higher-order statistics of the large-scale structure from
5
+ photometric redshifts
6
+ Eleni Tsaprazi1, Jens Jasche1,2, Guilhem Lavaux2 and Florent Leclercq2
7
+ 1 The Oskar Klein Centre, Department of Physics, Stockholm University, Albanova University Center, SE 106 91
8
+ Stockholm, Sweden
9
+ e-mail: eleni.tsaprazi@fysik.su.se
10
+ 2 CNRS & Sorbonne Universit´e, UMR 7095, Institut d’Astrophysique de Paris, 98 bis boulevard Arago, F-75014 Paris,
11
+ France
12
+ ABSTRACT
13
+ Context. The large-scale structure is a major source of cosmological information. However, next-generation photometric
14
+ galaxy surveys will only provide a distorted view of cosmic structures due to large redshift uncertainties.
15
+ Aims. To address the need for accurate reconstructions of the large-scale structure in presence of photometric uncertain-
16
+ ties, we present a framework that constrains the three-dimensional dark matter density jointly with galaxy photometric
17
+ redshift probability density functions (PDFs), exploiting information from galaxy clustering.
18
+ Methods. Our forward model provides Markov Chain Monte Carlo realizations of the primordial and present-day dark
19
+ matter density, inferred jointly from data. Our method goes beyond 2-point statistics via field-level inference. It accounts
20
+ for all observational uncertainties and the survey geometry.
21
+ Results. We showcase our method using mock catalogs that emulate next-generation surveys with a worst-case redshift
22
+ uncertainty, equivalent to ∼300 Mpc. On scales 150 Mpc, we improve the cross-correlation of the photometric galaxy
23
+ positions with the ground truth from 28% to 86%. The improvement is significant down to 13 Mpc. On scales 150 Mpc,
24
+ we achieve a cross-correlation of 80 − 90% with the ground truth for the dark matter density, radial peculiar velocities,
25
+ tidal shear and gravitational potential.
26
+ Conclusions. We achieve accurate inferences of the large-scale structure on scales smaller than the original redshift
27
+ uncertainty. Despite the large redshift uncertainty, we recover individual cosmic structures. Owing to our structure
28
+ growth model, we infer plausible initial conditions of structure formation. Finally, we constrain individual photometric
29
+ redshift PDFs. This work opens up the possibility to extract information at the smallest cosmological scales with
30
+ next-generation photometric surveys, going beyond approaches that compress information in the data.
31
+ Key words. large-scale structure of Universe – distances and redshifts
32
+ 1. Introduction
33
+ High-accuracy galaxy redshift estimates are required for a
34
+ plethora of scientific cases, such as the mapping of the cos-
35
+ mic large-scale structure and tests on the geometry of the
36
+ universe (e.g. Ma et al. 2006; Albrecht et al. 2006; Pea-
37
+ cock et al. 2006; Fu et al. 2014; Mandelbaum & Hyper
38
+ Suprime-Cam (HSC) Collaboration 2017; Samuroff et al.
39
+ 2017; The LSST Dark Energy Science Collaboration et al.
40
+ 2018; Mandelbaum 2018; Yuan et al. 2019; Abruzzo &
41
+ Haiman 2019; Eifler et al. 2021; Loureiro et al. 2021; Secco
42
+ et al. 2022; Hasan et al. 2022; Newman & Gruen 2022).
43
+ Next-generation surveys will deliver low-accuracy redshift
44
+ estimates from photometry and in certain cases fewer, high-
45
+ accuracy, spectroscopic ones (e.g. LSST Science Collabora-
46
+ tion et al. 2009; Amendola et al. 2013; Dor´e et al. 2014;
47
+ Aihara et al. 2018; Ivezi´c et al. 2019). However, bias in
48
+ cosmological inferences may occur in sky areas, depth and
49
+ color ranges where only photometric data is available (e.g.
50
+ Ma et al. 2006). Fortunately, the physical clustering infor-
51
+ mation of the large-scale structure can be used to improve
52
+ the accuracy of photometric redshift observations (e.g. Seld-
53
+ ner & Peebles 1979; Phillipps & Shanks 1987; Landy et al.
54
+ 1996; Kovaˇc et al. 2010; Jasche & Wandelt 2012; M´enard
55
+ et al. 2013; Aragon-Calvo et al. 2015; Shuntov et al. 2020;
56
+ Mukherjee et al. 2021).
57
+ Synergies between spectroscopic and photometric sur-
58
+ veys have been explored, intended mainly for photometric
59
+ redshift calibration (e.g. Rhodes et al. 2017; Capak et al.
60
+ 2019). In light of this, a multitude of techniques to im-
61
+ prove redshift uncertainty has been proposed (e.g. Newman
62
+ et al. 2015; Masters et al. 2015; Speagle & Eisenstein 2017;
63
+ Speagle & Eisenstein 2017; Davidzon et al. 2019; Schaan
64
+ et al. 2020; Shuntov et al. 2020; Rau et al. 2020; Stan-
65
+ ford et al. 2021; Leistedt et al. 2022). However, there are
66
+ limitations to spectroscopy. Photometric surveys typically
67
+ reach fainter magnitudes, higher redshifts, cover a larger
68
+ portion of the color-space and have higher redshift com-
69
+ pleteness (e.g. LSST Science Collaboration et al. 2009; Bor-
70
+ doloi et al. 2010; Amendola et al. 2013; Ivezi´c et al. 2019).
71
+ In order to exploit these advantages and avoid biases in
72
+ cosmological analyses, it is necessary to mitigate the basic
73
+ limitation of photometry, low accuracy. Jasche & Wandelt
74
+ (2012) demonstrated that clustering information from the
75
+ Article number, page 1 of 16
76
+ arXiv:2301.03581v1 [astro-ph.CO] 9 Jan 2023
77
+
78
+ A&A proofs: manuscript no. aanda
79
+ Fig. 1: (a) Mock photometric galaxy positions. Galaxy positions are radially distorted due to redshift uncertainty. (b)
80
+ Galaxy positions in a typical MCMC sample after the application of our method. Galaxies now trace the filamentary
81
+ dark matter distribution. (c) Ground truth (mock) galaxy positions. The galaxy positions that were radially smeared in
82
+ the mock observations, closely trace the filamentary structure in the ground truth galaxy positions – within observational
83
+ uncertainties – after the application of our algorithm.
84
+ 10
85
+ 1
86
+ k [Mpc]
87
+ 1
88
+ 0.0
89
+ 0.2
90
+ 0.4
91
+ 0.6
92
+ 0.8
93
+ 1.0
94
+ cross correlation
95
+ with ground truth
96
+ mock observations
97
+ after photometric
98
+ redshift sampling
99
+ 3
100
+ Fig. 2: Cross-correlation of the gridded photometric galaxy
101
+ coordinates before (black) and after (orange) the applica-
102
+ tion of our method with the ground truth (mock data).
103
+ The 3σ error bars are across MCMC realizations. We con-
104
+ sider a subbox that is the largest unmasked cubic volume
105
+ in our inference domain, with side length 520 Mpc. On the
106
+ largest scales, ∼ 1.7⟨σz⟩, the cross-correlation increases from
107
+ 73% to 96%. On the smallest scales, ∼ 0.04⟨σz⟩, the cross-
108
+ correlation increases from 2% to 14%. The largest improve-
109
+ ment is on scales ∼ 0.5⟨σz⟩, from 28% to 86%.
110
+ large-scale structure alone can improve the accuracy of a
111
+ purely photometric sample up to one order of magnitude.
112
+ In this work, we developed a framework that, for the
113
+ first time, infers the three-dimensional cosmic large-scale
114
+ structure jointly with redshift probability density functions
115
+ (PDFs) of photometric galaxies using a physical structure
116
+ formation model. In this way, we improve upon photometric
117
+ redshift uncertainty and self-consistently quantify observa-
118
+ tional errors in the large-scale structure inference. In doing
119
+ so, we preserve all high-order statistics of the large-scale
120
+ structure and use a physically-motivated structure growth
121
+ model.
122
+ Our prior is the homogeneity and isotropy assump-
123
+ tion for the initial conditions of structure formation, as
124
+ well as the physical model for the formation of the large-
125
+ scale structure and Gaussian initial conditions. Our frame-
126
+ work is built within the Bayesian Origin Reconstruc-
127
+ tion from Galaxies (BORG) algorithm (Jasche & Wan-
128
+ delt 2013; Jasche et al. 2015; Lavaux et al. 2019; Jasche &
129
+ Lavaux 2019), which infers the initial conditions of struc-
130
+ ture formation from galaxy observations in a fully Bayesian
131
+ approach. We include 1% spectroscopic galaxies, similar to
132
+ the expected galaxy number ratio between next-generation
133
+ photometric and spectroscopic surveys (LSST Science Col-
134
+ laboration et al. 2009; Amendola et al. 2013; Ivezi´c et al.
135
+ 2019).
136
+ Control of the impact of photometric redshift uncertain-
137
+ ties on large-scale structure inferences is a requirement for
138
+ a wide range of studies (see Salvato et al. 2019, for a re-
139
+ view). First, this is relevant to peculiar velocity analyses
140
+ (e.g. Abate & Lahav 2008; Hudson & Turnbull 2012; John-
141
+ son et al. 2014; Watkins & Feldman 2015; Andersen et al.
142
+ 2016; Mediavilla et al. 2016; Said et al. 2020; Palmese &
143
+ Kim 2021; Turner et al. 2022; Prideaux-Ghee et al. 2022),
144
+ which constrain the growth of structure, gravity and cosmo-
145
+ logical parameters (e.g. Peebles 1976; Abate & Lahav 2008;
146
+ Johnson et al. 2014; Palmese & Kim 2021). The evolution
147
+ of the peculiar velocity divergence with redshift is predicted
148
+ by ΛCDM (e.g. Peebles 1980; Nusser et al. 1991; Maartens
149
+ 1998; Ellis et al. 2001; Tsaprazi & Tsagas 2020; Filippou &
150
+ Tsagas 2021) and can be used as a cosmological test.
151
+ Accounting for photometric redshift uncertainties is cru-
152
+ cial for weak lensing inferences (e.g. Mandelbaum et al.
153
+ 2008; Wright et al. 2020; Porqueres et al. 2022, 2021). More-
154
+ over, photometric redshift uncertainties significantly affect
155
+ estimates of intrinsic alignment (e.g. Bridle & King 2007;
156
+ Codis et al. 2015; Tsaprazi et al. 2022b; Fischbacher et al.
157
+ Article number, page 2 of 16
158
+
159
+ (a)
160
+ (b)
161
+ (c)
162
+ After redshift sampling
163
+ Mock photometric observations
164
+ Ground truth
165
+ 1.4
166
+ 1.4
167
+ 1.4
168
+ .0
169
+ .0
170
+ RA
171
+
172
+ 10
173
+ 0
174
+ 0
175
+ 0
176
+ 0
177
+ 0.
178
+ 0.00 0.08 0.16 0.24 0.32 0.40 0.48 0.56 0.64
179
+ 0
180
+ 0.00 0.08 0.16 0.24 0.32 0.40 0.48 0.56 0.64
181
+ C
182
+ 0.00 0.08 0.16 0.24 0.32 0.40 0.48 0.56 0.64
183
+ Z
184
+ z
185
+ ZTsaprazi et al.: Large-scale structure from photometric redshifts
186
+ Data
187
+ (photometric &
188
+ spectroscopic
189
+ galaxy survey)
190
+ Initial conditions
191
+ (Gaussian dark matter density &
192
+ cosmological power spectrum)
193
+ gridded
194
+ galaxy
195
+ counts
196
+ Forward Model
197
+ (LPT, galaxy bias,
198
+ redshift errors,
199
+ survey mask,
200
+ luminosity function)
201
+ likelihood
202
+ comparison
203
+ update 
204
+ dark matter density &
205
+ photometric redshifts
206
+ galaxy bias
207
+ redshift errors
208
+ survey mask
209
+ luminosity function
210
+ random LPT
211
+ dark matter density
212
+ (ground truth)
213
+ gridded Poisson
214
+ galaxy counts
215
+ mock galaxy
216
+ coordinates 
217
+ (observed & ground
218
+ truth)
219
+ Mock data generation
220
+ Joint density - redshift sampling
221
+ Fig. 3: Flowchart of our algorithm. Left column: Mock data generation. The input is a luminosity function, a survey mask,
222
+ galaxy bias parameters and redshift uncertainty. We generate a random LPT density field on which we apply galaxy bias.
223
+ From that, we draw a Poisson galaxy count sample. We populate the 3D grid with mock observations given a survey
224
+ mask and selection function. We finally apply Gaussian noise to the mock redshifts. This data is fed into our forward
225
+ model. Right column: MCMC sampling framework. We then evolve them using Lagrangian Perturbation Theory and
226
+ compare the output to the gridded galaxy counts. After the likelihood comparison, we sample the dark matter density
227
+ jointly with photometric redshifts.
228
+ 2022), redshift-space distortions (e.g. Kaiser 1987; Perci-
229
+ val et al. 2011), Baryon Acoustic Oscillations (e.g. Ross
230
+ et al. 2015; Chaves-Montero et al. 2018) and can hinder the
231
+ disentanglement of dynamical dark energy from modified
232
+ gravity (Wang et al. 2010). Further, probing the large-scale
233
+ structure with galaxy clustering at high-redshift through its
234
+ gravitational potential can constrain galaxy formation and
235
+ evolution (e.g. Schmitz et al. 2018; Tonegawa & Okumura
236
+ 2022). Moreover, it can constrain the scale of cosmic ho-
237
+ mogeneity, since next-generation surveys will be sensitive
238
+ to large-scale clustering and therefore, to superclusters and
239
+ voids (e.g. Benitez et al. 2014). Last but not least, accu-
240
+ rate inferences of the large-scale structure at high-redshift
241
+ constrained by photometric galaxy clustering can be used
242
+ complementary to Lyman-α, which is sensitive to voids and
243
+ quasar clustering, which are differently biased than regular
244
+ galaxies (e.g. Benitez et al. 2014; Porqueres et al. 2019).
245
+ The paper is structured as follows: In Section 2 we pro-
246
+ vide the mathematical formulation of the density and pho-
247
+ tometric redshift posteriors. In Section 3 we discuss the
248
+ algorithmic implementation and configuration of the mock
249
+ galaxy survey generator and the photometric redshift sam-
250
+ pler. In Section 4 and 5 we discuss our results and conclu-
251
+ sions, respectively.
252
+ 2. Statistical modelling of the large-scale structure
253
+ We build our photometric redshift sampler on the BORG
254
+ algorithm. BORG employs a hierarchical Bayesian forward-
255
+ model to infer the posterior distribution of plausible initial
256
+ conditions from which present structures have formed. To
257
+ solve this statistical initial conditions problem, BORG uses
258
+ a sophisticated Markov Chain Monte Carlo (MCMC) ap-
259
+ proach.
260
+ The resulting large-scale structure posterior is approx-
261
+ imated by realizations of the large-scale structure, con-
262
+ strained by galaxy observations. BORG takes into account
263
+ the survey geometry, flux limitations and related system-
264
+ atic effects and accounts for them in the large-scale struc-
265
+ ture inference. In the present work, we constrain the pri-
266
+ mordial and present-day large-scale structure jointly with
267
+ photometric galaxy observations, while quantifying all ob-
268
+ servational uncertainties.
269
+ 2.1. Gibbs sampling of the joint posterior
270
+ We achieve joint constraints on the large-scale structure
271
+ and galaxy comoving distances by jointly sampling from
272
+ their joint posterior. In order to do so, we choose a Gibbs
273
+ sampling approach (Hastings 1970), in which we first draw
274
+ Article number, page 3 of 16
275
+
276
+ A&A proofs: manuscript no. aanda
277
+ a real-space density sample conditioned on galaxy redshifts
278
+ and then galaxy redshifts conditioned on the primordial
279
+ density field, δi
280
+ zj+1
281
+
282
+ P
283
+
284
+ z
285
+ ���� zobs, θ, δi
286
+ j
287
+
288
+ (1)
289
+ δi
290
+ j+1
291
+
292
+ P
293
+
294
+ δi ���� z j+1, zobs, θ
295
+
296
+ ,
297
+ (2)
298
+ where z is the sampled redshift of a galaxy, zobs its observed
299
+ redshift, θ the right ascension and declination and j indi-
300
+ cates the MCMC sampling step. We then explore the joint
301
+ dark matter density and photometric redshift posterior by
302
+ iteratively sampling from the above conditional distribu-
303
+ tions.
304
+ 2.2. Dark matter density
305
+ For the sake of demonstration we use first-order Lagrangian
306
+ Perturbation Theory (LPT) to model structure formation
307
+ and a Poisson likelihood to associate the dark matter den-
308
+ sity field to photometric galaxy observations. BORG allows
309
+ for more complex structure formation models, such as the
310
+ particle-mesh model (Jasche & Lavaux 2019), which can
311
+ be used with the current photometric redshift sampling ap-
312
+ proach in the future. Within BORG, the galaxy coordinates
313
+ are transformed to galaxy counts, Ng, using Nearest Grid
314
+ Point projection (Eastwood & Hockney 1974). As we show
315
+ in Appendix A, Equation (2) can be written as P(δ|Ng).
316
+ Below, we focus on the main aspect of our work, inferring
317
+ the primordial density field, δi, in conjunction with the late-
318
+ time large-scale structure. We therefore write
319
+ P(δi | Ng) ∝
320
+
321
+ dδP(Ng | δ)P(δ | δi)P(δi),
322
+ (3)
323
+ where δi the primordial, real-space density field, P(Ng|δ)
324
+ is the Poisson likelihood, P(δ | δi) the structure formation
325
+ term and P(δi) the prior on the primordial density field.
326
+ The Poisson likelihood is
327
+ P(Ng | δ) =
328
+
329
+ k
330
+ λk
331
+ Ng
332
+ k e−λk
333
+ Ng
334
+ k!
335
+ ,
336
+ (4)
337
+ where λk is the expected number of galaxies at the kth grid
338
+ element. The index k runs over all grid elements. The de-
339
+ pendence of the Poisson intensity, λk, on space models the
340
+ inhomogeneous nature of the galaxy distribution. The Pois-
341
+ son intensity is given by
342
+ λk = Wk⟨n⟩(1 + δk)β,
343
+ (5)
344
+ where Wk is the survey window, ⟨n⟩ is the expected mean
345
+ number of galaxies per grid element and β the power-law
346
+ exponent. For the sake of demonstration here, we have as-
347
+ sumed a linear galaxy bias model, taking β = 1. Our method
348
+ can also account for nonlinear bias models, as demonstrated
349
+ previously in Jasche & Lavaux (2019); Lavaux et al. (2019);
350
+ Charnock et al. (2020). The survey window encapsulates
351
+ information on the luminosity function through the radial
352
+ completeness function, C, and survey mask, M, as follows
353
+ W(x) = C(|x|)M( ˆn),
354
+ (6)
355
+ ˆn being the unit vector along the line of sight to a galaxy
356
+ located at x. We write the structure formation term as
357
+ P(δ | δi) =
358
+
359
+ k
360
+ δD(δk − Fk(δi))
361
+ (7)
362
+ where δD is the Dirac delta distribution, k runs over the grid
363
+ indices and Fk is the structure formation model, for which
364
+ we choose first-order LPT. The Dirac delta represents that
365
+ we assume no error on our gravity model. We sample from
366
+ Equation (2) using a Hamiltonian Monte Carlo sampler, as
367
+ introduced in BORG by Jasche et al. (2010). Finally, we as-
368
+ sume that the initial conditions for structure formation are
369
+ described by a zero-mean multivariate Gaussian distribu-
370
+ tion of the primordial dark matter density, δi
371
+ P(δi) =
372
+ 1
373
+ √|2πS |
374
+ exp
375
+ ��������−1
376
+ 2
377
+ N
378
+
379
+ q
380
+ N
381
+
382
+ r
383
+ δi
384
+ qS −1
385
+ qr δi
386
+ r
387
+ �������� ,
388
+ (8)
389
+ where |S | indicates the determinant of the covariance ma-
390
+ trix, S , of the primordial density field.
391
+ 2.3. Photometric redshift modelling
392
+ We write the conditional redshift posterior that we use in
393
+ our Gibbs sampling approach (see Appendix B) for each
394
+ individual galaxy, i, as
395
+ P(zi | zobsi, δ) ∝ P(δ | zi)P(zi | zobsi)J(zi),
396
+ (9)
397
+ where zi the true redshift of a galaxy i and J the Jacobian
398
+ matrix of the transform from redshift- to real-space volume
399
+ element:
400
+ J(zi) =
401
+ ������r2(zi)∂r
402
+ ∂z
403
+ ����zi
404
+ ������.
405
+ (10)
406
+ We provide a detailed derivation of Equation (9) in Ap-
407
+ pendix B. The formulation in Equation (9) is possible be-
408
+ cause each galaxy can be treated independently from all
409
+ others given a density field, as a consequence of the Poisson
410
+ density likelihood (Jasche & Wandelt 2012). The first term
411
+ on the right-hand side is associated with the density field
412
+ along the line of sight to the galaxy and the second term
413
+ represents the photometric redshift likelihood. In real ob-
414
+ servations, photometric redshift likelihoods are highly non-
415
+ Gaussian (e.g. Christlein et al. 2009). Here, for demonstra-
416
+ tion, we choose a Gaussian likelihood with respect to the
417
+ observed redshift, truncated at zero
418
+ P(zobsi | zi) =
419
+ T(zi)
420
+
421
+ 2πσ2(1 + zi)2 exp
422
+
423
+ −1
424
+ 2
425
+ (zobsi − zi)2
426
+ σ2(1 + zi)2
427
+
428
+ ,
429
+ (11)
430
+ where
431
+ T(zi) =
432
+ �1
433
+ 2 + 1
434
+ 2erf
435
+
436
+ zi
437
+
438
+ 2σ(1 + zi)
439
+ ��−1
440
+ ,
441
+ (12)
442
+ where erf(x) is the error function. This term ensures con-
443
+ sistency with the truncation of observed redshifts at zero
444
+ in the mock data. Our method generalizes to non-uniform
445
+ photometric redshift uncertainties and can accept redshift
446
+ estimates already constrained by other independent meth-
447
+ ods. Therefore, our algorithm can accommodate arbitrar-
448
+ ily complex redshift distributions. Notice that we make the
449
+ photometric redshift uncertainty dependent on redshift. We
450
+ make this assumption as a proof-of-concept demonstration,
451
+ but the method can account for any redshift likelihood. The
452
+ Poisson term includes the radial component of the selection
453
+ function, Cr, and the line-of-sight density
454
+ P(δ | zi) = Cr(zi)λ(xi),
455
+ (13)
456
+ Article number, page 4 of 16
457
+
458
+ Tsaprazi et al.: Large-scale structure from photometric redshifts
459
+ in the range 0 < zi ≤ zmaxi, where zmaxi represents the maxi-
460
+ mum redshift that lies still within the observed volume. In
461
+ order to draw redshift samples from Equation (1), we use a
462
+ slice sampler (Neal 2003). One can either update all galaxy
463
+ redshifts at once, or one galaxy at a time. As demonstrated
464
+ in Jasche & Wandelt (2012), each galaxy can be treated
465
+ independently given the density field. We therefore sample
466
+ each galaxy individually and computationally in parallel.
467
+ In this process, galaxy redshifts at each sampling step are
468
+ conditioned on the previous density field. Then, via Equa-
469
+ tion (3), the next density sample is conditioned on the up-
470
+ dated redshifts. In this fashion, we constrain photometric
471
+ redshifts jointly with the dark matter density field. As a
472
+ result, we reduce the uncertainty in both compared to in-
473
+ ferring the density field from photometric redshifts directly.
474
+ 3. Mock data generation
475
+ In this section, we describe the algorithmic implementation
476
+ and configuration of the mock (ground truth) galaxy survey
477
+ generator, as well as the photometric redshift sampler.
478
+ The input to our algorithm is right ascension, declina-
479
+ tion, observed redshifts, redshift uncertainty, survey mask,
480
+ luminosity function and galaxy bias parameters. The out-
481
+ put is a three-dimensional large-scale structure posterior
482
+ and photometric galaxy PDFs, jointly constrained. The
483
+ large-scale structure realizations are samples of the 3D
484
+ large-scale structure posterior distribution and account for
485
+ data- and survey-related uncertainties. Our framework goes
486
+ beyond N-point correlations, as it infers the full 3D dark
487
+ matter density posterior. Our method applies to regions
488
+ where spectroscopic data coverage is not present or incom-
489
+ plete, because it can exploit information from photometric
490
+ galaxy clustering alone. As a result, our method yields con-
491
+ straints also when using only photometric redshifts. Here
492
+ we provide a proof-of-concept demonstration on mock data,
493
+ focusing on the inference of cosmological fields jointly with
494
+ photometric and spectroscopic observations with Gaussian
495
+ redshift errors.
496
+ To validate and test the performance of our method we
497
+ generate artificial photometric and spectroscopic surveys by
498
+ the following procedure:
499
+ 1. Generate a random Gaussian primordial density field
500
+ (initial conditions), δi and the corresponding present-
501
+ day density field, δ using the LPT forward model.
502
+ 2. Draw mock galaxy counts from a Poisson distribution
503
+ conditional on the present-day density field
504
+ Ng
505
+ true ↶ P
506
+
507
+ Ng
508
+ true
509
+ ����δ
510
+
511
+ ,
512
+ (14)
513
+ 3. Here we displace galaxies in the volume elements. We
514
+ start by drawing displacements for each galaxy from a
515
+ uniform distribution, U
516
+ ui,g ↶ U(0, 1),
517
+ (15)
518
+ where i = (1, 2, 3) represents the three Cartesian direc-
519
+ tions, g is the galaxy index, ui is the uniform displace-
520
+ ment along direction i for a given galaxy and xi is the
521
+ galaxy’s Cartesian coordinate i. We then displace galax-
522
+ ies in each cell of the three-dimensional grid as follows
523
+ xi,g = dBi + Ri(ni,g + ui,g − 0.5),
524
+ (16)
525
+ where dBi is the i-coordinate of the lower left box cor-
526
+ ners and ni runs over the number of grid elements in one
527
+ direction of the box. Ri is the resolution along the direc-
528
+ tion i, defined as Ri = Li/Ni, Ni being the grid resolution
529
+ along i and Li the corresponding box size. The subtrac-
530
+ tive factor assigns galaxies to the lower left corner of
531
+ each grid cell for the Nearest Grid Point projection.
532
+ 4. Iterate the following over galaxy counts in each grid cell
533
+ (a) Transform Cartesian comoving coordinates to right
534
+ ascension, declination, comoving distance, r and red-
535
+ shift, z.
536
+ (b) Calculate the observation probability, W(x), at the
537
+ galaxies’ location, according to Equation (6). The
538
+ observation probability depends on the luminosity
539
+ function and survey mask.
540
+ (c) Accept observed galaxies using rejection sampling:
541
+ We draw a random number, q, in the range (0, 1). If
542
+ q < W(x), we accept the galaxy and add it to the
543
+ survey, otherwise we reject it.
544
+ 5. We then generate observed redshifts by adding Gaus-
545
+ sian noise with zero mean and variance σ2(1 + z)2 to the
546
+ ground truth redshifts, z, according to Equation (11).
547
+ We truncate the observed redshifts at zero.
548
+ 6. We generate an observed galaxy count field using Near-
549
+ est Grid Point projection on the observed redshifts and
550
+ a ground truth galaxy count field using the ground truth
551
+ redshifts.
552
+ We perform the inference in a box extending to redshift
553
+ z = 0.8, with a box size of 1660 Mpc, a grid resolution of
554
+ 1283 and a real-space resolution of 13 Mpc. The observer is
555
+ at the lower left corner of the box, such that the observed
556
+ area covers ∼ 1 octant of the sky. We assume the Planck
557
+ 2018 cosmological parameters (Planck Collaboration et al.
558
+ 2020). We do not sample spectroscopic redshifts, as their
559
+ uncertainties are insignificant compared to the resolution
560
+ of our inference and photometric redshift uncertainties.
561
+ Our mock data consists of a catalog with 2 · 107 pho-
562
+ tometric and 2 · 105 spectroscopic galaxy redshifts, simi-
563
+ lar to the fraction of photometric to spectroscopic redshifts
564
+ and number density in next-generation surveys in our red-
565
+ shift range (LSST Science Collaboration et al. 2009; Amen-
566
+ dola et al. 2013; Ivezi´c et al. 2019). We take the photo-
567
+ metric luminosity function to be an i-band Schechter with
568
+ M∗ = −22.8 and α = −1 and the spectroscopic luminosity
569
+ function to be a j-band Schechter with M∗ = −23.04 and
570
+ α = −1 (Table 2, Helgason et al. 2012), as these are bands
571
+ that will be used in next-generation surveys. The generation
572
+ of the angular survey mask is described in Andrews et al.
573
+ (2022). The photometric and spectroscopic components of
574
+ each catalog fully overlap. We adopt a worst-case scenario
575
+ for photometric redshift uncertainties, σ = 0.05(1+z) (LSST
576
+ Science Collaboration et al. 2009). For illustrative purposes
577
+ we choose a linear galaxy bias model.
578
+ 4. Results
579
+ 4.1. Constraints on the large-scale structure
580
+ We present a qualitative illustration of our results in Fig-
581
+ ure 1. In Figure 1a we show the observed galaxy positions in
582
+ our mock survey that are radially-distorted due to Gaussian
583
+ redshift noise. In comparing that to the galaxy coordinates
584
+ as constrained by our algorithm in Figure 1b, we see that
585
+ despite the initially large redshift uncertainty, photometric
586
+ Article number, page 5 of 16
587
+
588
+ A&A proofs: manuscript no. aanda
589
+ 1661
590
+ 1424
591
+ 1186
592
+ 949
593
+ 712
594
+ 474
595
+ 237
596
+ y [Mpc]
597
+ (a)
598
+ (b)
599
+ (c)
600
+ 1661
601
+ 1424
602
+ 1186
603
+ 949
604
+ 712
605
+ 474
606
+ 237
607
+ y [Mpc]
608
+ (d)
609
+ (e)
610
+ (f)
611
+ 1661
612
+ 1424
613
+ 1186
614
+ 949
615
+ 712
616
+ 474
617
+ 237
618
+ y [Mpc]
619
+ (g)
620
+ (h)
621
+ (i)
622
+ 1661
623
+ 1107
624
+ 553
625
+ x [Mpc]
626
+ 1661
627
+ 1424
628
+ 1186
629
+ 949
630
+ 712
631
+ 474
632
+ 237
633
+ y [Mpc]
634
+ (j)
635
+ 1661
636
+ 1107
637
+ 553
638
+ x [Mpc]
639
+ (k)
640
+ 1661
641
+ 1107
642
+ 553
643
+ x [Mpc]
644
+ (l)
645
+ 1
646
+ 0
647
+ 1
648
+ 2
649
+ 3
650
+ 4
651
+ true
652
+ 1
653
+ 0
654
+ 1
655
+ 2
656
+ 3
657
+ 4
658
+ 0.5
659
+ 1.0
660
+ 1.5
661
+ 2.0
662
+ 2.5
663
+ 3.0
664
+ ( )
665
+ 1000
666
+ 750
667
+ 500
668
+ 250
669
+ 0
670
+ 250
671
+ 500
672
+ 750
673
+ 1000
674
+ vrtrue [km/s]
675
+ 1000
676
+ 750
677
+ 500
678
+ 250
679
+ 0
680
+ 250
681
+ 500
682
+ 750
683
+ 1000
684
+ vr [km/s]
685
+ 100
686
+ 150
687
+ 200
688
+ 250
689
+ 300
690
+ (vr) [km/s]
691
+ 1.00
692
+ 0.75
693
+ 0.50
694
+ 0.25
695
+ 0.00
696
+ 0.25
697
+ 0.50
698
+ 0.75
699
+ 1.00
700
+ true
701
+ 1.00
702
+ 0.75
703
+ 0.50
704
+ 0.25
705
+ 0.00
706
+ 0.25
707
+ 0.50
708
+ 0.75
709
+ 1.00
710
+ 0.15
711
+ 0.20
712
+ 0.25
713
+ 0.30
714
+ 0.35
715
+ 0.40
716
+ 0.45
717
+ 0.50
718
+ ( )
719
+ 1000
720
+ 750
721
+ 500
722
+ 250
723
+ 0
724
+ 250
725
+ 500
726
+ 750
727
+ 1000
728
+ true/4 G [Mpc
729
+ 2]
730
+ 1000
731
+ 750
732
+ 500
733
+ 250
734
+ 0
735
+ 250
736
+ 500
737
+ 750
738
+ 1000
739
+ /4 G
740
+ [Mpc
741
+ 2]
742
+ 50
743
+ 100
744
+ 150
745
+ 200
746
+ 250
747
+ 300
748
+ 350
749
+ ( /4 G ) [Mpc
750
+ 2]
751
+ Fig. 4: From top to bottom, slices through the three-dimensional dark matter density, radial peculiar velocity, divergence,
752
+ gravitational potential and the off-diagonal components of the tidal shear for the ground truth (left column), average
753
+ (middle column) and standard deviation (right column) across the MCMC samples. The slices are at the same fixed
754
+ distance from the observer. The white region is outside the survey footprint. As shown in the right column, regions
755
+ populated by galaxies have lower uncertainty than regions outside the survey footprint.
756
+ galaxies now trace filamentary structures in the dark mat-
757
+ ter distribution. These positions are derived from a typical
758
+ MCMC sample. Observational uncertainties are accounted
759
+ for in the entire set of MCMC samples. We show the ground
760
+ truth galaxy positions in Figure 1c. We notice high visual
761
+ resemblance between the constrained observations and the
762
+ ground truth. In Figure 2 we show the cross-correlation
763
+ between the gridded photometric galaxy coordinates with
764
+ the ground truth before and after the application of our
765
+ method. We select an unmasked subvolume of our infer-
766
+ ence domain to demonstrate the best-case improvement in
767
+ cross-correlation given the uncertainties in our survey con-
768
+ figuration. We find the largest improvement in the cross-
769
+ correlation to be on scales ∼ 0.5⟨σz⟩, from 28% to 86%.
770
+ This indicates that our method provides both accurate in-
771
+ ferences of the large-scale structure and reduces photomet-
772
+ ric redshift uncertainty. We refer the reader to Figure 3 for
773
+ the flowchart of our method.
774
+ In Appendix C we provide a description of the estima-
775
+ tors we use to derive properties of the large-scale structure,
776
+ along with scientific cases that call for use of the derived
777
+ properties. In Figure 4 we show statistical summaries of the
778
+ posterior distribution of cosmological fields. In Figure 4a
779
+ we show the ground truth dark matter density field. The
780
+ Article number, page 6 of 16
781
+
782
+ Tsaprazi et al.: Large-scale structure from photometric redshifts
783
+ 0.0
784
+ 0.2
785
+ 0.4
786
+ 0.6
787
+ 0.8
788
+ 1.0
789
+ cross correlation
790
+ with ground truth
791
+ (a)
792
+ Dark matter density
793
+ inference
794
+ 3
795
+ (b)
796
+ Radial peculiar velocity vr
797
+ 0.0
798
+ 0.2
799
+ 0.4
800
+ 0.6
801
+ 0.8
802
+ 1.0
803
+ cross correlation
804
+ with ground truth
805
+ (c)
806
+ Tidal tensor T12
807
+ (d)
808
+ Tidal tensor T01
809
+ 10
810
+ 1
811
+ k [Mpc]
812
+ 1
813
+ 0.2
814
+ 0.4
815
+ 0.6
816
+ 0.8
817
+ 1.0
818
+ cross correlation
819
+ with ground truth
820
+ (e)
821
+ Tidal tensor T02
822
+ 10
823
+ 1
824
+ k [Mpc]
825
+ 1
826
+ (f)
827
+ Gravitational potential
828
+ Fig. 5: Cross-correlation of our inferred cosmological fields with the ground truth. The colored windows indicate 3σ error
829
+ bars. We consider a subbox that is the largest unmasked cubic volume in our inference domain, with side length 520 Mpc.
830
+ On the largest scales, we find a cross-correlation > 90% with the ground truth for all cosmological fields. On the smallest
831
+ scales, ∼ 0.04⟨σz⟩, we find a cross-correlation of ∼ 20% for the dark matter density, peculiar velocity and tidal tensor and
832
+ ∼ 90% for the gravitational potential.
833
+ white region represents unobserved regions outside the sur-
834
+ vey footprint. As BORG effectively returns an unconstrained
835
+ simulation in this region, we remove it for easier compari-
836
+ son to the other plots. In Figure 4b, we show the ensemble
837
+ mean density across the MCMC realizations. In the volume
838
+ populated by galaxies the similarity between the mean and
839
+ the ground truth is visible. Outside this volume, the en-
840
+ semble mean tends to the cosmic mean. This is expected
841
+ for an ensemble of random density fields, because there is
842
+ no galaxy clustering information. Further, notice that over-
843
+ dense structures are smeared in the inference mean. Galax-
844
+ ies in each MCMC sample move along their line of sight.
845
+ Therefore, the smearing is due to averaging over density re-
846
+ alizations that account for photometric redshift uncertain-
847
+ ties. In Figure 4c we show the voxel-wise standard deviation
848
+ of the dark matter density field. This includes observational
849
+ uncertainties and shot noise due to the finite number of
850
+ galaxies in each voxel.
851
+ In Figure 4d-f, we present a slice through the peculiar
852
+ velocity field. In Figure 4d we show the ground truth ra-
853
+ dial peculiar velocity field, derived from the ground truth
854
+ dark matter density field with the dark matter sheet estima-
855
+ tor. In Figure 4e we show the radial peculiar velocity mean
856
+ across the MCMC realizations. In Figure 4f we present the
857
+ sample variance of the radial peculiar velocity posterior. In
858
+ Figure 4g-i, we show the radial peculiar velocity divergence
859
+ ground truth, ensemble mean and standard deviation.
860
+ In Figure 4j-l, we show our constraints on the gravita-
861
+ tional potential from photometric and spectroscopic galaxy
862
+ clustering. In Figure 4j we show the ground truth gravi-
863
+ tational potential, as derived from the ground truth dark
864
+ matter density field. In Figure 4k and Figure 4l, we show the
865
+ ensemble mean and standard deviation across the MCMC
866
+ realizations, respectively.
867
+ The above statistical summaries present high visual re-
868
+ semblance with the ground truth. We quantify this resem-
869
+ blance in Figure 5, by showing the cross-correlation of the
870
+ dark matter density, radial peculiar velocity, off-diagonal
871
+ components of the tidal shear tensor and gravitational po-
872
+ tential with the ground truth. We select an unmasked sub-
873
+ volume of the inference domain, to showcase the best-case
874
+ cross-correlation in regions with data. On the largest scales,
875
+ Article number, page 7 of 16
876
+
877
+ A&A proofs: manuscript no. aanda
878
+ 10
879
+ 2
880
+ 10
881
+ 1
882
+ k [Mpc
883
+ 1]
884
+ 103
885
+ 104
886
+ 105
887
+ P
888
+ (k) [Mpc3]
889
+ (a)
890
+ ground truth
891
+ mean
892
+ 3
893
+ 10
894
+ 2
895
+ 10
896
+ 1
897
+ k [Mpc
898
+ 1]
899
+ 108
900
+ 109
901
+ 1010
902
+ 1011
903
+ 1012
904
+ Pvv(k) [(km/s)2 Mpc3]
905
+ (b)
906
+ 10
907
+ 2
908
+ 10
909
+ 1
910
+ k [Mpc
911
+ 1]
912
+ 103
913
+ 104
914
+ 105
915
+ P
916
+ (k) [Mpc3]
917
+ (c)
918
+ 10
919
+ 2
920
+ 10
921
+ 1
922
+ k [Mpc
923
+ 1]
924
+ 0.70
925
+ 0.75
926
+ 0.80
927
+ 0.85
928
+ 0.90
929
+ 0.95
930
+ 1.00
931
+ P
932
+ /
933
+ P
934
+ P
935
+ (k)
936
+ (d)
937
+ Fig. 6: (a) Dark matter density, (b) radial peculiar velocity and (c) peculiar velocity divergence autocorrelation power
938
+ spectrum. (d) Normalized cross-correlation between the dark matter density and peculiar velocity divergence. The black
939
+ lines indicate the ground truth. The colored window represents 3σ error bars. The uncertainty on the 2-point statistics is
940
+ due to galaxy survey- and data-related uncertainties. The blue line is the CAMB density autocorrelation power spectrum.
941
+ as expected, we have the highest cross-correlation for all
942
+ cosmological fields. The cross-correlation of the gravita-
943
+ tional potential with the ground truth is > 80% on scales,
944
+ as Φ has the longest correlation length.
945
+ In Figure 6 we show the autocorrelation power spectra
946
+ of cosmological fields that are typically used in cosmologi-
947
+ cal analyses. ll power spectra were estimated and corrected
948
+ for the BORG Cloud-In-Cell mass assignment scheme using
949
+ Pylians (Villaescusa-Navarro 2018), as our density field
950
+ has been estimated with a Cloud-In-Cell estimator. The au-
951
+ tocorrelation power spectrum, Pδδ, is shown in Figure 6a.
952
+ The two-point statistics of the inferred density fields are
953
+ consistent with the ground truth and the sampler has cov-
954
+ ered the uncertainty due to cosmic variance (e.g. Pogosian
955
+ et al. 2010, Figure 2). In Figure 6b, we show the autocorre-
956
+ lation power spectrum of the radial peculiar velocity field,
957
+ Pvv. The inference is consistent with the ground truth.
958
+ In Figure 6c, we show the peculiar velocity divergence
959
+ autocorrelation power spectrum, Pθθ, which is also consis-
960
+ tent with the ground truth and ΛCDM prediction (e.g. Ata
961
+ et al. 2017). Further, we see that the power of Pθθ is sup-
962
+ pressed compared to Pδδ beyond k ∼ 0.05 Mpc−1. This is
963
+ expected because collapsing structures that have virialized
964
+ experience less volume change (e.g. Ata et al. 2017). As a re-
965
+ sult, the peculiar velocity divergence field evolves less than
966
+ the density field (e.g. Kitaura et al. 2012; Jennings 2012;
967
+ Hahn et al. 2015; Ata et al. 2017). In Figure 6d, we show
968
+ the normalized cross-correlation power spectrum between
969
+ Article number, page 8 of 16
970
+
971
+ Tsaprazi et al.: Large-scale structure from photometric redshifts
972
+ 0.55
973
+ 0.60
974
+ 0.65
975
+ 0.70
976
+ 2
977
+ LPT prediction
978
+ Inference
979
+ Ground truth
980
+ (a)
981
+ 1.0
982
+ 1.2
983
+ 1.4
984
+ 3
985
+ (b)
986
+ 4.5
987
+ 5.0
988
+ 5.5
989
+ 4
990
+ (c)
991
+ Fig. 7: (a) Variance, (b) skewness and (c) kurtosis of the dark matter density field for our inference, the ground truth and
992
+ a set of random LPT simulations at 13 Mpc (∼ 0.04⟨σz⟩) using the entire inference domain. The latter two are random,
993
+ unconstrained simulations. The inference is constrained jointly with galaxy observations. The error bars encapsulate the
994
+ 1σ uncertainty both from the mock galaxy survey and the estimator. Our ground truth is consistent with a random LPT
995
+ simulation and our inference is consistent with both. Our inference accurately captures higher-order statistics of the dark
996
+ matter density field on scales much smaller than the original photometric redshift uncertainty.
997
+ 1661
998
+ 1329
999
+ 997
1000
+ 664
1001
+ 332
1002
+ 0
1003
+ x [Mpc]
1004
+ 1661
1005
+ 1424
1006
+ 1186
1007
+ 949
1008
+ 712
1009
+ 474
1010
+ 237
1011
+ y [Mpc]
1012
+ z=30
1013
+ (a)
1014
+ 1661
1015
+ 1329
1016
+ 997
1017
+ 664
1018
+ 332
1019
+ 0
1020
+ x [Mpc]
1021
+ z=10
1022
+ (b)
1023
+ 1661
1024
+ 1329
1025
+ 997
1026
+ 664
1027
+ 332
1028
+ 0
1029
+ x [Mpc]
1030
+ z=0
1031
+ (c)
1032
+ 0.64
1033
+ 0.66
1034
+ 0.68
1035
+ 0.70
1036
+ 0.72
1037
+ 0.74
1038
+ 0.76
1039
+ ln(2+ )
1040
+ 0.55
1041
+ 0.60
1042
+ 0.65
1043
+ 0.70
1044
+ 0.75
1045
+ 0.80
1046
+ 0.85
1047
+ 0.90
1048
+ ln(2+ )
1049
+ 0.5
1050
+ 1.0
1051
+ 1.5
1052
+ 2.0
1053
+ ln(2+ )
1054
+ Fig. 8: Structure formation history derived from the dark matter density field at (a) z = 30, (b) z = 10, (c) z = 0 from a
1055
+ typical density sample. In red, we overlay the density slice with the galaxy coordinates in a typical realizations. Galaxies
1056
+ follow the present-day large-scale structure. The origins of high-density regions are already visible at z = 30.
1057
+ the velocity divergence and dark matter density. On large
1058
+ scales, it is expected that to linear order θ ∝ δ (e.g. Hahn
1059
+ et al. 2015). On smaller scales, structure formation becomes
1060
+ nonlinear, which LPT is able to capture. A more refined
1061
+ gravity model, like a particle mesh (Jasche & Lavaux 2019,
1062
+ in BORG), would be needed to push these results to smaller
1063
+ scales and capture the generation of peculiar velocity vor-
1064
+ ticity.
1065
+ In Figure 7, we show higher-order moments of the con-
1066
+ strained dark matter density field for the ground truth, our
1067
+ inference and the LPT prediction, with 1σ error bars at the
1068
+ target resolution of 13 Mpc (∼ 0.04⟨σz⟩). We derive the LPT
1069
+ prediction from a set of random simulations ran using the
1070
+ same cosmological parameters as our main inference, but
1071
+ without constraints from galaxy redshifts. The error bars
1072
+ naturally account for observational uncertainties and the
1073
+ estimator uncertainty related to the sample size (Harding
1074
+ et al. 2014). For this fully self-consistent setting, our results
1075
+ are consistent with the ground truth and LPT prediction
1076
+ within 1σ. This result suggests that we infer the density
1077
+ field, including its higher-order moments, on scales much
1078
+ smaller than the original photometric redshift uncertainty.
1079
+ In Figure 8 we show slices through the same randomly-
1080
+ selected realization in the structure formation history. Un-
1081
+ der the assumption of a causal structure formation model,
1082
+ we reconstruct the structure formation history which gives
1083
+ rise to the observed structures today. The initial conditions
1084
+ are set at z = 99, but we show slices up to z = 30, such
1085
+ that the seeds of present-day structures are visible. On the
1086
+ z = 0 slice we overlay the ground truth locations of galaxies.
1087
+ Galaxies closely trace clusters and filamentary structures,
1088
+ whereas voids are sparsely populated by galaxies. This is
1089
+ because the Poisson noise is lower in higher-density regions.
1090
+ As expected, the origins of high-density peaks in the dark
1091
+ matter density field are already visible at early times.
1092
+ In Figure 9a, we show a void in the volume covered
1093
+ by observations. In Figure 9c we show the average density
1094
+ contrast in shells around the void. We see that the density
1095
+ contrast tends to zero, as expected when averaging over a
1096
+ scale close to the cosmic homogeneity scale (e.g. Gon¸calves
1097
+ et al. 2018). In Figure 9b, we show the location of a cluster
1098
+ in the density field. In Figure 9d we show the mass enclosed
1099
+ in shells around the cluster. We derive it using the prescrip-
1100
+ tion in Porqueres et al. (2019). In this study, the particle
1101
+ mass is 3.45 × 1013 M⊙. Overall, these results suggest that
1102
+ we recover correctly both the statistical properties of the
1103
+ large-scale structure around voids and clusters, but also in-
1104
+ dividual structures.
1105
+ We further show radial peculiar velocity profiles around
1106
+ the same void and cluster. The radial peculiar velocity be-
1107
+ comes positive close to the void, indicating matter flow-
1108
+ ing outside the shells and toward overdense regions, as ex-
1109
+ Article number, page 9 of 16
1110
+
1111
+ A&A proofs: manuscript no. aanda
1112
+ 1661
1113
+ 1107
1114
+ 553
1115
+ x [Mpc]
1116
+ 1661
1117
+ 1424
1118
+ 1186
1119
+ 949
1120
+ 712
1121
+ 474
1122
+ 237
1123
+ y [Mpc]
1124
+ (a)
1125
+ 1661
1126
+ 1107
1127
+ 553
1128
+ x [Mpc]
1129
+ (b)
1130
+ 50
1131
+ 100
1132
+ 150
1133
+ 200
1134
+ 250
1135
+ R [Mpc]
1136
+ 1.0
1137
+ 0.8
1138
+ 0.6
1139
+ 0.4
1140
+ 0.2
1141
+ 0.0
1142
+ (R)
1143
+ (c)
1144
+ ground truth
1145
+ mean
1146
+ 3
1147
+ 50
1148
+ 100
1149
+ 150
1150
+ 200
1151
+ 250
1152
+ R [Mpc]
1153
+ 1018
1154
+ 1019
1155
+ 1020
1156
+ 1021
1157
+ 1022
1158
+ 1023
1159
+ 1024
1160
+ M (< R) [M
1161
+ ]
1162
+ (d)
1163
+ 50
1164
+ 100
1165
+ 150
1166
+ 200
1167
+ 250
1168
+ R [Mpc]
1169
+ 100
1170
+ 0
1171
+ 100
1172
+ 200
1173
+ 300
1174
+ 400
1175
+ vr(R) [km/s]
1176
+ (e)
1177
+ 50
1178
+ 100
1179
+ 150
1180
+ 200
1181
+ 250
1182
+ R [Mpc]
1183
+ 400
1184
+ 300
1185
+ 200
1186
+ 100
1187
+ 0
1188
+ vr(R) [km/s]
1189
+ (f)
1190
+ 1.0
1191
+ 0.5
1192
+ 0.0
1193
+ 0.5
1194
+ 1.0
1195
+ 1.5
1196
+ 2.0
1197
+ 2.5
1198
+ 3.0
1199
+ 1.0
1200
+ 0.5
1201
+ 0.0
1202
+ 0.5
1203
+ 1.0
1204
+ 1.5
1205
+ 2.0
1206
+ 2.5
1207
+ 3.0
1208
+ Fig. 9: (a) Slice through the ground truth dark matter density field. In purple, a spherical shell around a low-density
1209
+ region. (b) Slice through the ground truth dark matter density field. In purple, a spherical shell around a high-density
1210
+ peak. (c) The mean density contrast in spherical shells around the low-density region. (d) The mass enclosed in shells
1211
+ around the high-density peak. (e) The mean radial peculiar velocity in spherical shells around the low-density region
1212
+ with respect to the center of the void. (f) The mean radial peculiar velocity in spherical shells around the high-density
1213
+ peak with respect to the center of the peak.
1214
+ pected from gravitational structure growth (Peebles 1980).
1215
+ On larger scales the average peculiar velocity tends to zero
1216
+ due to cosmic homogeneity. In Figure 9f we show the aver-
1217
+ age radial peculiar velocity in shells of radius R around the
1218
+ cluster in Figure 9b, with respect to its center. The radial
1219
+ peculiar velocity is negative close to the cluster, as expected
1220
+ from gravitational infall. On larger scales, the average ve-
1221
+ locity tends to zero as expected from cosmic homogeneity.
1222
+ 4.2. Constraints on photometric redshifts
1223
+ In this section, we give a brief overview of how the joint
1224
+ inference of the large-scale structure and photometric red-
1225
+ shift PDFs yields constraints on photometric redshifts. In
1226
+ Figure 10 we show our results for three randomly-selected
1227
+ galaxies. The redshift likelihood is a Gaussian PDF. Its
1228
+ mean is the mock observed redshift and its standard devi-
1229
+ ation is 0.05(1 + z), z being the mock cosmological redshift.
1230
+ Article number, page 10 of 16
1231
+
1232
+ Tsaprazi et al.: Large-scale structure from photometric redshifts
1233
+ We derive the target posterior by multiplying the Gaussian
1234
+ likelihood with the Poisson term for the redshift inference
1235
+ in our Gibbs sampling approach, as shown in Equation (9).
1236
+ The results of our inference are overlayed as a histogram.
1237
+ This qualitative demonstration illustrates that the photo-
1238
+ metric redshift posterior after the application of our method
1239
+ contains more information than the likelihood and follows
1240
+ the radial density profile of the large-scale structure along
1241
+ the line of sight to each galaxy. This mechanism constrains
1242
+ the radial positions of galaxies from the initial, radially-
1243
+ distorted ones (Figure 1a), to the final ones, that trace the
1244
+ filamentary large-scale structure (Figure 1b).
1245
+ In Figure 11 we show the reduction in the mean stan-
1246
+ dard deviation of the photometric redshift posteriors as a
1247
+ function of density after the application of our algorithm.
1248
+ σi indicates the original photometric redshift uncertainty
1249
+ of the mock observations. We expect that higher-density
1250
+ regions yield better constraints and hence, lower redshift
1251
+ uncertainty. The linear fit suggests that ⟨σ(δ)⟩/⟨σi(δ)⟩ =
1252
+ −0.005(1 + δ) − 0.693. In low-density regions, the mean
1253
+ standard deviation reduces by a factor of 0.7⟨σi⟩, whereas
1254
+ in high-density regions the reduction reaches 0.4⟨σi⟩. The
1255
+ scatter is larger in high-density regions because there are
1256
+ fewer strongly overdense peaks. Overall, we expect the red-
1257
+ shift uncertainty reduction to be more significant in higher-
1258
+ resolution settings, where higher-density peaks will be re-
1259
+ solved. It should be noted, however, that due to the highly
1260
+ multimodal nature of the target redshift distribution, the
1261
+ reduction in standard deviation does not reflect the infor-
1262
+ mation gain from the original to the final redshift PDF.
1263
+ Finally, in Figure 12 we compare the inferred distribution
1264
+ of photometric redshifts, N(z), in our mock survey to the
1265
+ ground truth N(z). For legibility, we show the mean N(z)
1266
+ across the MCMC samples, along with 3σ error bars. The
1267
+ inferred N(z) is consistent with the ground truth N(z). We
1268
+ postpone the sampling of the N(z) to future work.
1269
+ 5. Conclusions
1270
+ Next-generation photometric galaxy surveys will deliver an
1271
+ extraordinary amount of observations, that will reduce the
1272
+ observational uncertainties, will extend deeper in redshift
1273
+ and cover a larger cosmological volume than spectroscopic
1274
+ ones. At the same time, most cosmological information is in
1275
+ the smallest cosmological scales which cannot be accessed in
1276
+ presence of large photometric redshift uncertainties. In such
1277
+ a setting, it is paramount to obtain control of photometric
1278
+ redshift uncertainties in cosmological inferences. Accurate
1279
+ inferences of the large-scale structure constrained jointly
1280
+ with photometric redshifts offer this possibility.
1281
+ In this study we developed a method to constrain
1282
+ the primordial and present-day cosmic large-scale struc-
1283
+ ture jointly with photometric redshifts at a resolution of
1284
+ 13 Mpc using, for the first time, a structure formation model
1285
+ in a Bayesian forward modelling approach. We achieved
1286
+ these joint constraints through Bayesian inference of the
1287
+ initial conditions of structure formation with photometric
1288
+ galaxy clustering. Our method takes into account data- and
1289
+ survey-related uncertainties and preserves all higher-order
1290
+ statistics of cosmological fields. In this study, we used first-
1291
+ order LPT, yet our algorithm can incorporate any gravi-
1292
+ tational model (e.g. Jasche et al. 2015; Jasche & Lavaux
1293
+ 2019). We demonstrated our constraints using a fully over-
1294
+ lapping mock photometric and spectroscopic galaxy cata-
1295
+ log as a proof-of-concept. We assumed a worst-case scenario
1296
+ for photometric redshift uncertainties in stage-IV surveys,
1297
+ σz = 0.05(1 + z), and demonstrated that our method can
1298
+ reduce this uncertainty.
1299
+ In particular, we showed large improvement in the cross-
1300
+ correlation of the photometric galaxy positions with the
1301
+ ground truth. The maximum improvement was on scales
1302
+ ∼ 0.5⟨σz⟩, where the cross-correlation increased from 28%
1303
+ (in the mock photometric observations) to 86% (in our in-
1304
+ ference). We further achieved accurate inferences of the
1305
+ dark matter density, peculiar velocities, gravitational po-
1306
+ tential and tidal shear on scales ∼ 0.04⟨σz⟩.
1307
+ We demonstrated the ability of our method to accu-
1308
+ rately capture the 2-point statistics of the dark matter den-
1309
+ sity, as well as its skewness and kurtosis on scales ∼ 0.04⟨σz⟩.
1310
+ Higher-order statistics have been promising in constraining
1311
+ dark energy (Velten & Fazolo 2020; Fazolo et al. 2022). As
1312
+ we can use our method with a particle mesh, our joint in-
1313
+ ference framework can be used to constrain the bispectrum
1314
+ with photometric galaxy clustering.
1315
+ Voids have been extensively used to probe structure for-
1316
+ mation close to the linear regime (e.g. Davies et al. 2019;
1317
+ Pisani et al. 2019; Davies et al. 2021; Stopyra et al. 2021;
1318
+ Contarini et al. 2022), however photometric uncertainties
1319
+ limit their detection (e.g. S´anchez et al. 2017). For this pur-
1320
+ pose, we explored the possibility of detecting cosmic struc-
1321
+ tures much smaller than the original photometric redshift
1322
+ uncertainty. The galaxy positions that were originally radi-
1323
+ ally smeared due to the presence of photometric uncertain-
1324
+ ties, accurately trace the filamentary pattern of the large-
1325
+ scale structure after the application of our method. Further,
1326
+ we are able to accurately capture individual structures, like
1327
+ voids and clusters. This is a crucial advantage of embedding
1328
+ a structure formation model in our forward model. Overall,
1329
+ we demonstrated that we accurately recover the statisti-
1330
+ cal properties of the large-scale structure on scales much
1331
+ smaller than the original photometric redshift uncertainty.
1332
+ The present work opens up the possibility to miti-
1333
+ gate photometric redshift uncertainties in next-generation
1334
+ photometric surveys. Concurrently, the incorporation of a
1335
+ structure formation model paves a new way forward to ex-
1336
+ tract as much information as possible from the smallest
1337
+ cosmological scales, while going beyond 2-point statistics
1338
+ and preserving information in the data.
1339
+ Data and software availability
1340
+ Data products can be made available upon reasonable re-
1341
+ quest.
1342
+ Author Contributions
1343
+ The main roles of the authors were, using the CRediT
1344
+ (Contribution
1345
+ Roles
1346
+ Taxonomy)
1347
+ system
1348
+ (https:
1349
+ //authorservices.wiley.com/author-resources/
1350
+ Journal-Authors/open-access/credit.html):
1351
+ E.T.: conceptualization, methodology, software, formal
1352
+ analysis, validation, writing - original draft; J.J.: conceptu-
1353
+ alization, methodology, software (supporting, transferred
1354
+ Jasche & Wandelt (2012) to new BORG version), supervi-
1355
+ sion, resources, writing - feedback, funding acquisition;
1356
+ G.L.: software (supporting, debugging and notably during
1357
+ the Message Passing Interface parallelization), writing -
1358
+ Article number, page 11 of 16
1359
+
1360
+ A&A proofs: manuscript no. aanda
1361
+ 0.05
1362
+ 0.10
1363
+ 0.15
1364
+ 0.20
1365
+ 0.25
1366
+ redshift
1367
+ 0
1368
+ 5
1369
+ 10
1370
+ 15
1371
+ 20
1372
+ P(z|zobs, )
1373
+ (a)
1374
+ observation
1375
+ target posterior
1376
+ ground truth
1377
+ redshift
1378
+ inference
1379
+ 0.05
1380
+ 0.10
1381
+ 0.15
1382
+ 0.20
1383
+ 0.25
1384
+ 0.30
1385
+ redshift
1386
+ (b)
1387
+ 0.05
1388
+ 0.10
1389
+ 0.15
1390
+ 0.20
1391
+ 0.25
1392
+ 0.30
1393
+ 0.35
1394
+ redshift
1395
+ (c)
1396
+ Fig. 10: Photometric redshift samples for three randomly-selected galaxies. Overlayed are the corresponding initial ob-
1397
+ servations estimated from our pipeline without a physical prior, the ideal photometric redshift posterior (for physical
1398
+ prior, using the ground truth density) and the ground truth redshift. The maximum redshift to which the posteriors
1399
+ extend indicates where each galaxy’s line of sight intercepts the inference box. The inferred posterior is the marginal over
1400
+ density realizations, accounting for observational and survey-related uncertainties. The redshift binning is determined by
1401
+ the real-space resolution of the inference.
1402
+ 0.0
1403
+ 2.5
1404
+ 5.0
1405
+ 7.5
1406
+ 10.0
1407
+ 12.5
1408
+ 1 +
1409
+ 0.4
1410
+ 0.5
1411
+ 0.6
1412
+ 0.7
1413
+ 0.8
1414
+ ( ) /
1415
+ i( )
1416
+ linear fit
1417
+ Fig. 11: Final to initial photometric redshift uncertainty as
1418
+ a function of density at the ground truth galaxy locations.
1419
+ The black line is a linear fit, indicating that the reduction in
1420
+ redshift uncertainty is greater in regions of high dark mat-
1421
+ ter density, as expected from the Poisson likelihood. The
1422
+ dispersion on the high-density end is due to shot noise, as
1423
+ there are fewer high-density peaks in the inference domain.
1424
+ feedback, funding acquisition; F.L.: software (support-
1425
+ ing, author of the Simplex-In-Cell estimator), writing -
1426
+ feedback.
1427
+ Acknowledgements
1428
+ ET thanks Metin Ata and Natalia Porqueres for helpful
1429
+ discussions and feedback, and Adam Andrews, Deaglan
1430
+ Bartlett, Andrija Kostic, James Prideaux-Ghee, Fabian
1431
+ Schmidt, Ben Wandelt and Pauline Zarrouk for com-
1432
+ ments on the original manuscript. Part of the computa-
1433
+ tion and data processing in this study were enabled by re-
1434
+ 0.0
1435
+ 0.1
1436
+ 0.2
1437
+ 0.3
1438
+ 0.4
1439
+ 0.5
1440
+ 0.6
1441
+ 0.7
1442
+ redshift
1443
+ 0.0
1444
+ 0.5
1445
+ 1.0
1446
+ 1.5
1447
+ 2.0
1448
+ 2.5
1449
+ 3.0
1450
+ normalized N(z)
1451
+ mock N(z)
1452
+ 3
1453
+ Fig. 12: In orange, the average of normalized N(z) of in-
1454
+ ferred photometric redshifts across MCMC samples for a
1455
+ subsample of galaxies, along with 3σ uncertainties. In black,
1456
+ the mock photometric N(z) for the same subsample. The
1457
+ N(z) of inferred photometric redshifts is consistent with the
1458
+ ground truth N(z).
1459
+ sources provided by the Swedish National Infrastructure
1460
+ for Computing (SNIC) at Tetralith, partially funded by
1461
+ the Swedish Research Council through grant agreement no.
1462
+ 2020-05143. This research utilized the HPC facility sup-
1463
+ ported by the Technical Division at the Department of
1464
+ Physics, Stockholm University. This work was enabled by
1465
+ the research project grant ‘Understanding the Dynamic
1466
+ Universe’ funded by the Knut and Alice Wallenberg Foun-
1467
+ dation under Dnr KAW 2018.0067. JJ acknowledges sup-
1468
+ port by the Swedish Research Council (VR) under the
1469
+ project 2020-05143 – ”Deciphering the Dynamics of Cosmic
1470
+ Structure”. GL acknowledges support by the ANR BIG4
1471
+ project, grant ANR-16-CE23-0002 of the French Agence
1472
+ Nationale de la Recherche, and the grant GCEuclid from
1473
+ ”Centre National d’Etudes Spatiales” (CNES). This work
1474
+ was supported by the Simons Collaboration on “Learning
1475
+ Article number, page 12 of 16
1476
+
1477
+ Tsaprazi et al.: Large-scale structure from photometric redshifts
1478
+ the Universe”. This work is conducted within the Aquila
1479
+ Consortium (https://aquila-consortium.org).
1480
+ A. Derivation of the conditional density posterior
1481
+ for real-space inference
1482
+ In this section, we describe how to arrive at the condi-
1483
+ tional density posterior of Equation (3) starting from Equa-
1484
+ tion (2). The former equation shows how we incorporate a
1485
+ gravitational structure growth model into our framework,
1486
+ whereas the latter represents the output of the Gibbs sam-
1487
+ pling process. Here, we discuss how we obtain constraints
1488
+ on the real-space late-time density field using galaxy obser-
1489
+ vations in redshift space.
1490
+ The present-day density field is conditionally indepen-
1491
+ dent of the observed galaxy redshifts given an ensemble of
1492
+ sampled redshifts. Therefore
1493
+ P(δ|z, zobs, θ)
1494
+ =
1495
+ P(δ|z, θ)
1496
+ =
1497
+
1498
+ Ng
1499
+ P(δ, Ng|z, θ)
1500
+ =
1501
+
1502
+ Ng
1503
+ P(δ|Ng)P(Ng|z, θ).
1504
+ (17)
1505
+ The last term in the sum indicates how we arrive from
1506
+ redshift-space observations to real-space galaxy counts. As
1507
+ elaborated on in (Jasche & Wandelt 2012, Eq. B4), this
1508
+ involves a transform from redshift- to real-space such that
1509
+ P(δ|z, θ) =
1510
+
1511
+ Ng
1512
+ P(δ|Ng)P(Ng|x(z, θ)),
1513
+ (18)
1514
+ x being the real-space galaxy positions. In what follows, we
1515
+ will omit dependence on (z, θ) for legibility. The latter term
1516
+ indicates how we bin galaxies onto a grid given their real-
1517
+ space positions. For this gridding operation, we use Nearest
1518
+ Grid Point projection such that
1519
+ P(Ng|x) =
1520
+
1521
+ i
1522
+ δD
1523
+ ��������Ng
1524
+ i −
1525
+
1526
+ p
1527
+ WNGP(xi − xp)
1528
+ �������� ,
1529
+ (19)
1530
+ i being the voxel index, p being the galaxy index and
1531
+ WNGP(x) =
1532
+ 3
1533
+
1534
+ n=1
1535
+ �1
1536
+ if |xn|Nn/Ln < 1
1537
+ 0
1538
+ otherwise,
1539
+ (20)
1540
+ Substituting the above into Equation (18) we arrive at
1541
+ P(δ|z, θ) = P(δ|Ng).
1542
+ (21)
1543
+ B. Derivation of the conditional redshift posterior
1544
+ for real-space inference
1545
+ In this subsection we describe how we arrive at the condi-
1546
+ tional redshift posterior in Equation (9), while performing
1547
+ an inference of the density field in real space. Let us denote
1548
+ by θ the right ascension and declination of a galaxy and by
1549
+ u the redshifts of all other galaxies in the previous sampling
1550
+ step. We start by the redshift posterior of a given galaxy i
1551
+ and apply Bayes’ law
1552
+ P(zi|θ, u, δ, zobsi)
1553
+ =
1554
+ P(zi)P(θ, u, δ, zobsi, zi)
1555
+ P(θ, u, δ, zobsi)
1556
+ =
1557
+ P(zi)P(zobsi|θ, u, δ, zi)P(θ, u, δ|zi)
1558
+ P(zobsi|θ, u, δ)P(θ, u, δ)
1559
+ =
1560
+ P(θ, u, δ|zi)P(zi)
1561
+ P(u, θ, δ)
1562
+ P(zobsi|θ, u, δ, zi)
1563
+ P(zobsi|θ, u, δ)
1564
+ =
1565
+ P(zi|θ, u, δ)P(zobsi|θ, zi, δ, u)
1566
+ P(zobsi|u, δ, θ)
1567
+ =
1568
+ P(θ, zi|u)P(δ|θ, zi)
1569
+ P(δ|u)
1570
+ P(zobsi|θ, zi, δ, u)
1571
+ P(zobsi|u, δ, θ)
1572
+ (22)
1573
+ We assume zobsi is conditionally independent of u given zi
1574
+ and δ and therefore we arrive at
1575
+ P(zi|θ, u, δ, zobsi) = P(θ, zi|u)P(δ|θ, zi)
1576
+ P(δ|u)
1577
+ P(zobsi|θ, zi, δ)
1578
+ P(zobsi|δ, θ)
1579
+ (23)
1580
+ The first term on the right-hand side of the above equa-
1581
+ tion describes the distribution of galaxies in redshift space.
1582
+ However, as we perform a real-space inference, we trans-
1583
+ form this term from redshift- z, to comoving Cartesian, r,
1584
+ space
1585
+ P(θ, zi|u) =
1586
+ ����r2(zi) sin (φ)∂r
1587
+ ∂z
1588
+ ����zi
1589
+ ����P(x|u),
1590
+ (24)
1591
+ φ being the declination of the galaxy and x its real-space
1592
+ position. The real-space galaxy positions are used to build
1593
+ the gridded galaxy count field, Mg. Mg indicates the galaxy
1594
+ counts except for the galaxy under consideration. We the
1595
+ last term on the right-hand side of the above equation as a
1596
+ marginal over galaxy counts
1597
+ P(x|u) =
1598
+
1599
+ Mg
1600
+ P(Mg|u)P(x|Mg)
1601
+ (25)
1602
+ The first term in the sum is the Nearest Grid Point projec-
1603
+ tion that we use to grid galaxies at the field-level. We will
1604
+ indicate the Nearest Grid Point kernel with WNGP. Under
1605
+ the assumption that galaxies are Poisson-distributed, the
1606
+ number counts in each voxel are independent events. Since
1607
+ the Poisson intensity depends only on the density, our Pois-
1608
+ son model is homogeneous. Following these assumptions
1609
+ P(x|u)
1610
+ =
1611
+
1612
+ Mg
1613
+ P(x|Mg)
1614
+ ×
1615
+
1616
+ i
1617
+ δD
1618
+ ��������Mg
1619
+ i −
1620
+
1621
+ p
1622
+ WNGP(xi − xp)
1623
+ �������� ,
1624
+ (26)
1625
+ where i is the voxel index and p the galaxy index. We now
1626
+ want to rewrite the first term in the above sum with respect
1627
+ to the entire galaxy count field, Ng. It differs from Mg in that
1628
+ it includes the galaxy under consideration. The reason we
1629
+ rewrite the redshift posterior with respect to Ng is because
1630
+ the entire galaxy count field is used in the density inference.
1631
+ Below this point we will drop the dependence on u, because
1632
+ all quantities are conditionally independent of u given Mg.
1633
+ P(x|Mg) =
1634
+ 1
1635
+ P(Mg)
1636
+
1637
+ Ng
1638
+ P(Ng)P(x|Ng)P(Mg|Ng, x)
1639
+ (27)
1640
+ Following our definition, the relationship between Mg and
1641
+ Ng is deterministic and yields
1642
+ P(x|Mg)
1643
+ =
1644
+ 1
1645
+ P(Mg)
1646
+
1647
+ Ng
1648
+ P(Ng)P(x|Ng)
1649
+ Article number, page 13 of 16
1650
+
1651
+ A&A proofs: manuscript no. aanda
1652
+ ×
1653
+
1654
+ i
1655
+ δD �
1656
+ Mg
1657
+ i − [Ng
1658
+ i − WNGP(xi − x)]
1659
+
1660
+ =
1661
+ P(x|Ng),
1662
+ (28)
1663
+ because P(Ng) and P(Mg) are equal, as they differ by one
1664
+ (at the position of the galaxy under consideration). The
1665
+ above result is equal to finding a galaxy at position x given
1666
+ a number counts field.
1667
+ P(x|Ng) =
1668
+
1669
+ i
1670
+ WNGP(xi − x)
1671
+ δV
1672
+ Ng
1673
+ i
1674
+ Ntotal
1675
+ ,
1676
+ (29)
1677
+ where δV is the volume of a voxel and Ntotal the total number
1678
+ of galaxies in the inference domain. As a result of the above,
1679
+ the second term on the right-hand side of Equation (23) is
1680
+ written as
1681
+ P(δ|θ, zi)
1682
+ P(δ|u)
1683
+ =
1684
+
1685
+ i
1686
+ Mi!
1687
+ Ni! λNi−Mi
1688
+ i
1689
+ =
1690
+
1691
+ i
1692
+ � λi
1693
+ Ni
1694
+ �WNGP(xi−x)
1695
+ ,
1696
+ (30)
1697
+ as it represents the ratio between the Poisson distribution
1698
+ for all galaxies and all galaxies expect for the one we con-
1699
+ sider at each step. Substituting Equation (29) and Equa-
1700
+ tion (30) into Equation (23) we arrive at
1701
+ P(zi|θ, u, δ, zobsi)
1702
+
1703
+ ����r2(zi) sin (φ)∂r
1704
+ ∂z
1705
+ ����zi
1706
+ ����
1707
+ ×
1708
+
1709
+ i
1710
+ WNGP(xi − x)λiP(zobsi|θ, zi, δ).
1711
+ (31)
1712
+ As demonstrated in Jasche & Wandelt (2013) the above
1713
+ form suggests that each galaxy can be sampled indepen-
1714
+ dently from all others, as the dependence on u vanishes
1715
+ through the conditioning on galaxy counts and therefore,
1716
+ the Poisson intensity. Finally, since sin (φ) is a constant
1717
+ term, it serves as a proportionality constant in each galaxy’s
1718
+ target posterior and therefore vanishes. Finally, we drop the
1719
+ dependence on right ascension and declination for legibil-
1720
+ ity, since we only sample redshifts. Therefore, the process
1721
+ in Equation (1) is equivalent to drawing a sample from
1722
+ P(zi|δ, zobsi)
1723
+
1724
+ ����r2(zi)∂r
1725
+ ∂z
1726
+ ����zi
1727
+ ����
1728
+ ×
1729
+
1730
+ i
1731
+ WNGP(xi − x)λiP(zobsi|zi, δ).
1732
+ (32)
1733
+ C. Estimators of large-scale structure properties
1734
+ Accurate inferences of the large-scale structure with pho-
1735
+ tometric galaxy clustering are necessary because next-
1736
+ generation photometric surveys probe deeper redshifts and
1737
+ have a wider footprint than spectroscopic surveys. Below,
1738
+ we discuss the aspects of the cosmic large-scale structure
1739
+ which we demonstrate our method on, as well as the esti-
1740
+ mators we use.
1741
+ C.1. Peculiar velocities
1742
+ In order to derive the peculiar velocity field, we use the
1743
+ Simplex-In-Cell (SIC) estimator (e.g. Abel et al. 2012; Hahn
1744
+ et al. 2015; Leclercq et al. 2017). Contrary to kernel meth-
1745
+ ods, which sample the velocity field only at a discrete set
1746
+ of locations with poor resolution in low-density regions, the
1747
+ SIC estimator provides an estimate of the velocity field at
1748
+ any point in space. In this framework, the Lagrangian posi-
1749
+ tions of the particles in the inference domain are considered
1750
+ as vertices of unit cubes. The Delaunay tessellation of each
1751
+ unique cube defines six tetrahedra which are followed dur-
1752
+ ing the evolution. Subsequently, each tetrahedron deposits
1753
+ a value to the grid (Leclercq et al. 2017, Equation 37).
1754
+ We further explore kinematic properties of the peculiar
1755
+ velocity field. Here, we focus on the peculiar velocity diver-
1756
+ gence, defined as
1757
+ θ = −
1758
+ 1
1759
+ f Ha∇ · v,
1760
+ (33)
1761
+ where f is the linear growth rate, H the Hubble parame-
1762
+ ter and a the cosmic scale factor. The divergence determines
1763
+ how the volume of a peculiar velocity flow changes. The pe-
1764
+ culiar velocity divergence can be used to constrain Ωm and
1765
+ structure formation (e.g. Bernardeau et al. 1995; Howlett
1766
+ et al. 2017). Further, the redshift-space distortion signal can
1767
+ be detected in the autocorrelation power spectrum of the
1768
+ peculiar velocity divergence and the cross-correlation power
1769
+ spectrum between the dark matter density and the peculiar
1770
+ velocity divergence (e.g. Bel et al. 2019). For ∇ · v > 0 the
1771
+ region is expanding, for ∇ · v < 0 the region is contracting,
1772
+ whereas for ∇ · v = 0 the volume remains invariant.
1773
+ C.2. Gravitational potential
1774
+ Probing gravitational tidal forces with photometric sur-
1775
+ veys is a challenging endeavor, but a necessary one (e.g.
1776
+ Troxel & Ishak 2015), as intrinsic galaxy alignments con-
1777
+ taminate weak lensing analyses and can be used as cos-
1778
+ mological probes. Further, as photometric surveys extend
1779
+ deeper in redshift, they allow us to probe the evolution of
1780
+ intrinsic alignments over time. This evolution can be used
1781
+ to constrain galaxy formation and evolution scenarios.
1782
+ For this purpose, we explore differing aspects of the dy-
1783
+ namics and kinematics of the large-scale structure. We de-
1784
+ rive the gravitational potential of the dark matter density
1785
+ field by solving Poisson’s equation in Fourier space
1786
+ Φ(k) = −4πGρ(k)
1787
+ |k|2
1788
+ ,
1789
+ (34)
1790
+ where G is the gravitational constant, ρ the density and
1791
+ k the wavevector. We further derive the tidal shear of the
1792
+ gravitational potential, which is given by
1793
+ Ti j =
1794
+ ∂2Φ
1795
+ ∂xi∂x j
1796
+ ,
1797
+ (35)
1798
+ where xi, ({i, j} = {1, 2, 3}) are comoving Cartesian coordi-
1799
+ nates. Our inference can further be used with cosmic web
1800
+ classification methods, particle- (e.g. Sousbie 2013) or cell-
1801
+ based (e.g. Libeskind et al. 2018; Buncher & Carrasco Kind
1802
+ 2020) to infer cosmic structures constrained by photomet-
1803
+ ric redshifts. Such classifications have been used to study
1804
+ the environment of cosmological tracers (e.g. Leclercq et al.
1805
+ 2016; Porqueres et al. 2018; Tsaprazi et al. 2022a). Kru-
1806
+ use et al. (2019) further showed that photometric redshifts
1807
+ are positively correlated with filaments detected in spectro-
1808
+ scopic galaxy observations.
1809
+ Article number, page 14 of 16
1810
+
1811
+ Tsaprazi et al.: Large-scale structure from photometric redshifts
1812
+ References
1813
+ Abate, A. & Lahav, O. 2008, MNRAS, 389, L47
1814
+ Abel, T., Hahn, O., & Kaehler, R. 2012, MNRAS, 427, 61
1815
+ Abruzzo, M. W. & Haiman, Z. 2019, MNRAS, 486, 2730
1816
+ Aihara, H., Arimoto, N., Armstrong, R., et al. 2018, PASJ, 70, S4
1817
+ Albrecht, A., Bernstein, G., Cahn, R., et al. 2006, arXiv e-prints, astro
1818
+ Amendola, L., Appleby, S., Bacon, D., et al. 2013, Living Reviews in
1819
+ Relativity, 16, 6
1820
+ Andersen, P., Davis, T. M., & Howlett, C. 2016, MNRAS, 463, 4083
1821
+ Andrews, A., Jasche, J., Lavaux, G., & Schmidt, F. 2022, arXiv e-
1822
+ prints, arXiv:2203.08838
1823
+ Aragon-Calvo, M. A., van de Weygaert, R., Jones, B. J. T., &
1824
+ Mobasher, B. 2015, MNRAS, 454, 463
1825
+ Ata, M., Kitaura, F.-S., Chuang, C.-H., et al. 2017, MNRAS, 467,
1826
+ 3993
1827
+ Bel, J., Pezzotta, A., Carbone, C., Sefusatti, E., & Guzzo, L. 2019,
1828
+ A&A, 622, A109
1829
+ Benitez, N., Dupke, R., Moles, M., et al. 2014, arXiv e-prints,
1830
+ arXiv:1403.5237
1831
+ Bernardeau, F., Juszkiewicz, R., Dekel, A., & Bouchet, F. R. 1995,
1832
+ MNRAS, 274, 20
1833
+ Bordoloi, R., Lilly, S. J., & Amara, A. 2010, MNRAS, 406, 881
1834
+ Bridle, S. & King, L. 2007, New Journal of Physics, 9, 444
1835
+ Buncher, B. & Carrasco Kind, M. 2020, MNRAS, 497, 5041
1836
+ Capak, P., Cuillandre, J.-C., Bernardeau, F., et al. 2019, arXiv e-
1837
+ prints, arXiv:1904.10439
1838
+ Charnock, T., Lavaux, G., Wandelt, B. D., et al. 2020, MNRAS, 494,
1839
+ 50
1840
+ Chaves-Montero, J., Angulo, R. E., & Hern´andez-Monteagudo, C.
1841
+ 2018, MNRAS, 477, 3892
1842
+ Christlein, D., Gawiser, E., Marchesini, D., & Padilla, N. 2009, MN-
1843
+ RAS, 400, 429
1844
+ Codis, S., Gavazzi, R., Dubois, Y., et al. 2015, MNRAS, 448, 3391
1845
+ Contarini, S., Verza, G., Pisani, A., et al. 2022, A&A, 667, A162
1846
+ Davidzon, I., Laigle, C., Capak, P. L., et al. 2019, MNRAS, 489, 4817
1847
+ Davies, C. T., Cautun, M., Giblin, B., et al. 2021, MNRAS, 507, 2267
1848
+ Davies, C. T., Cautun, M., & Li, B. 2019, MNRAS, 490, 4907
1849
+ Dor´e,
1850
+ O.,
1851
+ Bock,
1852
+ J.,
1853
+ Ashby,
1854
+ M.,
1855
+ et
1856
+ al.
1857
+ 2014,
1858
+ arXiv
1859
+ e-prints,
1860
+ arXiv:1412.4872
1861
+ Eastwood, J. W. & Hockney, R. W. 1974, Journal of Computational
1862
+ Physics, 16, 342
1863
+ Eifler, T., Miyatake, H., Krause, E., et al. 2021, MNRAS, 507, 1746
1864
+ Ellis, G. F. R., van Elst, H., & Maartens, R. 2001, Classical and
1865
+ Quantum Gravity, 18, 5115
1866
+ Fazolo, R. E., Amendola, L., & Velten, H. 2022, Phys. Rev. D, 105,
1867
+ 103521
1868
+ Filippou, K. & Tsagas, C. G. 2021, Ap&SS, 366, 4
1869
+ Fischbacher, S., Kacprzak, T., Blazek, J., & Refregier, A. 2022, arXiv
1870
+ e-prints, arXiv:2207.01627
1871
+ Fu, L., Kilbinger, M., Erben, T., et al. 2014, Monthly Notices of the
1872
+ Royal Astronomical Society, 441, 2725
1873
+ Gon¸calves, R. S., Carvalho, G. C., Bengaly, C. A. P., J., et al. 2018,
1874
+ MNRAS, 475, L20
1875
+ Hahn, O., Angulo, R. E., & Abel, T. 2015, MNRAS, 454, 3920
1876
+ Harding, B., Tremblay, C., & Cousineau, D. 2014, The Quantitative
1877
+ Methods for Psychology, 10, 107
1878
+ Hasan, I. S., Schmidt, S. J., Schneider, M. D., & Tyson, J. A. 2022,
1879
+ MNRAS, 511, 1029
1880
+ Hastings, W. K. 1970, Biometrika, 57, 97
1881
+ Helgason, K., Ricotti, M., & Kashlinsky, A. 2012, ApJ, 752, 113
1882
+ Howlett, C., Staveley-Smith, L., Elahi, P. J., et al. 2017, MNRAS,
1883
+ 471, 3135
1884
+ Hudson, M. J. & Turnbull, S. J. 2012, ApJ, 751, L30
1885
+ Ivezi´c, Z., Kahn, S. M., Tyson, J. A., et al. 2019, ApJ, 873, 111
1886
+ Jasche, J., Kitaura, F. S., Wandelt, B. D., & Enßlin, T. A. 2010,
1887
+ MNRAS, 406, 60
1888
+ Jasche, J. & Lavaux, G. 2019, A&A, 625, A64
1889
+ Jasche, J., Leclercq, F., & Wandelt, B. D. 2015, J. Cosmology As-
1890
+ tropart. Phys., 2015, 036
1891
+ Jasche, J. & Wandelt, B. D. 2012, MNRAS, 425, 1042
1892
+ Jasche, J. & Wandelt, B. D. 2013, MNRAS, 432, 894
1893
+ Jennings, E. 2012, MNRAS, 427, L25
1894
+ Johnson, A., Blake, C., Koda, J., et al. 2014, MNRAS, 444, 3926
1895
+ Kaiser, N. 1987, MNRAS, 227, 1
1896
+ Kitaura, F.-S., Angulo, R. E., Hoffman, Y., & Gottl¨ober, S. 2012,
1897
+ MNRAS, 425, 2422
1898
+ Kovaˇc, K., Lilly, S. J., Cucciati, O., et al. 2010, ApJ, 708, 505
1899
+ Kruuse, M., Tempel, E., Kipper, R., & Stoica, R. S. 2019, A&A, 625,
1900
+ A130
1901
+ Landy, S. D., Szalay, A. S., & Koo, D. C. 1996, ApJ, 460, 94
1902
+ Lavaux,
1903
+ G.,
1904
+ Jasche,
1905
+ J.,
1906
+ &
1907
+ Leclercq,
1908
+ F.
1909
+ 2019,
1910
+ arXiv
1911
+ e-prints,
1912
+ arXiv:1909.06396
1913
+ Leclercq, F., Jasche, J., Lavaux, G., Wandelt, B., & Percival, W. 2017,
1914
+ J. Cosmology Astropart. Phys., 2017, 049
1915
+ Leclercq, F., Lavaux, G., Jasche, J., & Wandelt, B. 2016, J. Cosmology
1916
+ Astropart. Phys., 2016, 027
1917
+ Leistedt, B., Alsing, J., Peiris, H., Mortlock, D., & Leja, J. 2022, arXiv
1918
+ e-prints, arXiv:2207.07673
1919
+ Libeskind, N. I., van de Weygaert, R., Cautun, M., et al. 2018, MN-
1920
+ RAS, 473, 1195
1921
+ Loureiro, A., Whittaker, L., Spurio Mancini, A., et al. 2021, arXiv
1922
+ e-prints, arXiv:2110.06947
1923
+ LSST Science Collaboration, Abell, P. A., Allison, J., et al. 2009,
1924
+ arXiv e-prints, arXiv:0912.0201
1925
+ Ma, Z., Hu, W., & Huterer, D. 2006, ApJ, 636, 21
1926
+ Maartens, R. 1998, Phys. Rev. D, 58, 124006
1927
+ Mandelbaum, R. 2018, ARA&A, 56, 393
1928
+ Mandelbaum, R. & Hyper Suprime-Cam (HSC) Collaboration. 2017,
1929
+ in American Astronomical Society Meeting Abstracts, Vol. 229,
1930
+ American Astronomical Society Meeting Abstracts #229, 226.02
1931
+ Mandelbaum, R., Seljak, U., Hirata, C. M., et al. 2008, MNRAS, 386,
1932
+ 781
1933
+ Masters, D., Capak, P., Stern, D., et al. 2015, ApJ, 813, 53
1934
+ Mediavilla, E., Jim´enez-Vicente, J., Mu˜noz, J. A., & Battaner, E.
1935
+ 2016, The Astrophysical Journal, 832, 46
1936
+ M´enard, B., Scranton, R., Schmidt, S., et al. 2013, arXiv e-prints,
1937
+ arXiv:1303.4722
1938
+ Mukherjee, S., Wandelt, B. D., Nissanke, S. M., & Silvestri, A. 2021,
1939
+ Phys. Rev. D, 103, 043520
1940
+ Neal, R. M. 2003, Ann. Statist., 31, 705, doi: 10.1214/aos/1056562461
1941
+ Newman, J. A., Abate, A., Abdalla, F. B., et al. 2015, Astroparticle
1942
+ Physics, 63, 81
1943
+ Newman, J. A. & Gruen, D. 2022, arXiv e-prints, arXiv:2206.13633
1944
+ Nusser, A., Dekel, A., Bertschinger, E., & Blumenthal, G. R. 1991,
1945
+ ApJ, 379, 6
1946
+ Palmese, A. & Kim, A. G. 2021, Phys. Rev. D, 103, 103507
1947
+ Peacock, J. A., Schneider, P., Efstathiou, G., et al. 2006, ESA-ESO
1948
+ Working Group on“Fundamental Cosmology”,“ESA-ESO Working
1949
+ Group on ”Fundamental Cosmology“, Edited by J.A. Peacock et al.
1950
+ ESA, 2006.”
1951
+ Peebles, P. J. E. 1976, ApJ, 205, 318
1952
+ Peebles, P. J. E. 1980, The large-scale structure of the universe
1953
+ Percival, W. J., Samushia, L., Ross, A. J., Shapiro, C., & Raccanelli,
1954
+ A. 2011, Philosophical Transactions of the Royal Society of London
1955
+ Series A, 369, 5058
1956
+ Phillipps, S. & Shanks, T. 1987, MNRAS, 229, 621
1957
+ Pisani, A., Massara, E., Spergel, D. N., et al. 2019, BAAS, 51, 40
1958
+ Planck Collaboration, Aghanim, N., Akrami, Y., et al. 2020, A&A,
1959
+ 641, A6
1960
+ Pogosian, L., Silvestri, A., Koyama, K., & Zhao, G.-B. 2010,
1961
+ Phys. Rev. D, 81, 104023
1962
+ Porqueres, N., Heavens, A., Mortlock, D., & Lavaux, G. 2021, MN-
1963
+ RAS, 502, 3035
1964
+ Porqueres, N., Heavens, A., Mortlock, D., & Lavaux, G. 2022, MN-
1965
+ RAS, 509, 3194
1966
+ Porqueres, N., Jasche, J., Enßlin, T. A., & Lavaux, G. 2018, A&A,
1967
+ 612, A31
1968
+ Porqueres, N., Jasche, J., Lavaux, G., & Enßlin, T. 2019, A&A, 630,
1969
+ A151
1970
+ Prideaux-Ghee, J., Leclercq, F., Lavaux, G., Heavens, A., & Jasche,
1971
+ J. 2022, arXiv e-prints, arXiv:2204.00023
1972
+ Rau, M. M., Wilson, S., & Mandelbaum, R. 2020, MNRAS, 491, 4768
1973
+ Rhodes, J., Nichol, R. C., Aubourg, ´E., et al. 2017, ApJS, 233, 21
1974
+ Ross, A. J., Samushia, L., Howlett, C., et al. 2015, MNRAS, 449, 835
1975
+ Said, K., Colless, M., Magoulas, C., Lucey, J. R., & Hudson, M. J.
1976
+ 2020, MNRAS, 497, 1275
1977
+ Salvato, M., Ilbert, O., & Hoyle, B. 2019, Nature Astronomy, 3, 212
1978
+ Samuroff, S., Troxel, M. A., Bridle, S. L., et al. 2017, MNRAS, 465,
1979
+ L20
1980
+ S´anchez, C., Clampitt, J., Kovacs, A., et al. 2017, MNRAS, 465, 746
1981
+ Schaan, E., Ferraro, S., & Seljak, U. 2020, J. Cosmology Astropart.
1982
+ Phys., 2020, 001
1983
+ Schmitz, D. M., Hirata, C. M., Blazek, J., & Krause, E. 2018, J.
1984
+ Cosmology Astropart. Phys., 2018, 030
1985
+ Secco, L. F., Samuroff, S., Krause, E., et al. 2022, Phys. Rev. D, 105,
1986
+ 023515
1987
+ Seldner, M. & Peebles, P. J. E. 1979, ApJ, 227, 30
1988
+ Shuntov, M., Pasquet, J., Arnouts, S., et al. 2020, A&A, 636, A90
1989
+ Article number, page 15 of 16
1990
+
1991
+ A&A proofs: manuscript no. aanda
1992
+ Sousbie, T. 2013, arXiv e-prints, arXiv:1302.6221
1993
+ Speagle, J. S. & Eisenstein, D. J. 2017, MNRAS, 469, 1186
1994
+ Speagle, J. S. & Eisenstein, D. J. 2017, Monthly Notices of the Royal
1995
+ Astronomical Society, 469, 1205
1996
+ Stanford, S. A., Masters, D., Darvish, B., et al. 2021, ApJS, 256, 9
1997
+ Stopyra, S., Peiris, H. V., & Pontzen, A. 2021, MNRAS, 500, 4173
1998
+ The LSST Dark Energy Science Collaboration, Mandelbaum, R., Ei-
1999
+ fler, T., et al. 2018, arXiv e-prints, arXiv:1809.01669
2000
+ Tonegawa, M. & Okumura, T. 2022, ApJ, 924, L3
2001
+ Troxel, M. A. & Ishak, M. 2015, Phys. Rep., 558, 1
2002
+ Tsaprazi, E., Jasche, J., Goobar, A., et al. 2022a, MNRAS, 510, 366
2003
+ Tsaprazi, E., Nguyen, N.-M., Jasche, J., Schmidt, F., & Lavaux, G.
2004
+ 2022b, J. Cosmology Astropart. Phys., 2022, 003
2005
+ Tsaprazi, E. & Tsagas, C. G. 2020, European Physical Journal C, 80,
2006
+ 757
2007
+ Turner, R. J., Blake, C., & Ruggeri, R. 2022, arXiv e-prints,
2008
+ arXiv:2207.03707
2009
+ Velten, H. & Fazolo, R. E. 2020, Phys. Rev. D, 101, 023518
2010
+ Villaescusa-Navarro, F. 2018, Pylians: Python libraries for the analysis
2011
+ of numerical simulations, Astrophysics Source Code Library, record
2012
+ ascl:1811.008
2013
+ Wang, Y., Percival, W., Cimatti, A., et al. 2010, MNRAS, 409, 737
2014
+ Watkins, R. & Feldman, H. A. 2015, MNRAS, 447, 132
2015
+ Wright, A. H., Hildebrandt, H., van den Busch, J. L., & Heymans, C.
2016
+ 2020, A&A, 637, A100
2017
+ Yuan, S., Pan, C., Liu, X., Wang, Q., & Fan, Z. 2019, ApJ, 884, 164
2018
+ Article number, page 16 of 16
2019
+
HtE1T4oBgHgl3EQf_gZv/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
IdAyT4oBgHgl3EQfr_me/content/2301.00569v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1126e8e6830cab4fe77bd2fc06b358eada3e4831761b7c1148dca3fb5b1a5078
3
+ size 165049