jackkuo commited on
Commit
1d962b9
·
verified ·
1 Parent(s): f8bcab7

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +48 -0
  2. 0NFLT4oBgHgl3EQfoi-S/vector_store/index.faiss +3 -0
  3. 2NFQT4oBgHgl3EQfFTWv/vector_store/index.pkl +3 -0
  4. 4tAyT4oBgHgl3EQfcPfW/content/tmp_files/2301.00280v1.pdf.txt +2849 -0
  5. 4tAyT4oBgHgl3EQfcPfW/content/tmp_files/load_file.txt +0 -0
  6. 5tE3T4oBgHgl3EQfpQqt/content/2301.04641v1.pdf +3 -0
  7. 5tE3T4oBgHgl3EQfpQqt/vector_store/index.faiss +3 -0
  8. 6tE4T4oBgHgl3EQf1w38/vector_store/index.pkl +3 -0
  9. 79E3T4oBgHgl3EQfqQqR/vector_store/index.faiss +3 -0
  10. 79E3T4oBgHgl3EQfqQqR/vector_store/index.pkl +3 -0
  11. 7dFJT4oBgHgl3EQfmywg/content/tmp_files/2301.11588v1.pdf.txt +3313 -0
  12. 7dFJT4oBgHgl3EQfmywg/content/tmp_files/load_file.txt +0 -0
  13. 8tE1T4oBgHgl3EQfUAOX/content/tmp_files/2301.03085v1.pdf.txt +726 -0
  14. 8tE1T4oBgHgl3EQfUAOX/content/tmp_files/load_file.txt +252 -0
  15. 9dE0T4oBgHgl3EQfwwE1/content/tmp_files/2301.02636v1.pdf.txt +1293 -0
  16. 9dE0T4oBgHgl3EQfwwE1/content/tmp_files/load_file.txt +0 -0
  17. ENE4T4oBgHgl3EQffQ0N/content/tmp_files/2301.05105v1.pdf.txt +598 -0
  18. ENE4T4oBgHgl3EQffQ0N/content/tmp_files/load_file.txt +0 -0
  19. ENFQT4oBgHgl3EQfQTaG/content/tmp_files/load_file.txt +0 -0
  20. F9AyT4oBgHgl3EQf5Pp6/content/tmp_files/2301.00801v1.pdf.txt +2919 -0
  21. F9AyT4oBgHgl3EQf5Pp6/content/tmp_files/load_file.txt +0 -0
  22. FtFKT4oBgHgl3EQfbC5a/content/2301.11810v1.pdf +3 -0
  23. FtFKT4oBgHgl3EQfbC5a/vector_store/index.faiss +3 -0
  24. FtFKT4oBgHgl3EQfbC5a/vector_store/index.pkl +3 -0
  25. G9E1T4oBgHgl3EQfrQVc/content/tmp_files/2301.03352v1.pdf.txt +1131 -0
  26. G9E1T4oBgHgl3EQfrQVc/content/tmp_files/load_file.txt +0 -0
  27. HNAzT4oBgHgl3EQfHfvA/content/2301.01047v1.pdf +3 -0
  28. HNAzT4oBgHgl3EQfHfvA/vector_store/index.faiss +3 -0
  29. HdAzT4oBgHgl3EQfxf76/content/2301.01741v1.pdf +3 -0
  30. HdAzT4oBgHgl3EQfxf76/vector_store/index.faiss +3 -0
  31. HdAzT4oBgHgl3EQfxf76/vector_store/index.pkl +3 -0
  32. HtFJT4oBgHgl3EQfui1l/content/2301.11622v1.pdf +3 -0
  33. HtFJT4oBgHgl3EQfui1l/vector_store/index.pkl +3 -0
  34. I9E4T4oBgHgl3EQfIgyC/content/2301.04913v1.pdf +3 -0
  35. I9E4T4oBgHgl3EQfIgyC/vector_store/index.pkl +3 -0
  36. IdAyT4oBgHgl3EQf5vqw/content/tmp_files/2301.00811v1.pdf.txt +2623 -0
  37. IdAyT4oBgHgl3EQf5vqw/content/tmp_files/load_file.txt +0 -0
  38. IdFAT4oBgHgl3EQfuh5k/content/2301.08670v1.pdf +3 -0
  39. IdFAT4oBgHgl3EQfuh5k/vector_store/index.faiss +3 -0
  40. IdFAT4oBgHgl3EQfuh5k/vector_store/index.pkl +3 -0
  41. JNAzT4oBgHgl3EQfx_7e/content/tmp_files/2301.01748v1.pdf.txt +1834 -0
  42. JNAzT4oBgHgl3EQfx_7e/content/tmp_files/load_file.txt +0 -0
  43. JdAzT4oBgHgl3EQfyP4s/vector_store/index.faiss +3 -0
  44. KdE1T4oBgHgl3EQfGgND/content/tmp_files/2301.02914v1.pdf.txt +2404 -0
  45. KdE1T4oBgHgl3EQfGgND/content/tmp_files/load_file.txt +0 -0
  46. LNE3T4oBgHgl3EQfAgnY/content/tmp_files/2301.04259v1.pdf.txt +2199 -0
  47. LNE3T4oBgHgl3EQfAgnY/content/tmp_files/load_file.txt +0 -0
  48. LNE4T4oBgHgl3EQfiQ3g/content/tmp_files/2301.05133v1.pdf.txt +683 -0
  49. LNE4T4oBgHgl3EQfiQ3g/content/tmp_files/load_file.txt +0 -0
  50. LdFOT4oBgHgl3EQf0DSF/content/2301.12934v1.pdf +3 -0
.gitattributes CHANGED
@@ -5586,3 +5586,51 @@ UtA0T4oBgHgl3EQfEf_h/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
5586
  d9FJT4oBgHgl3EQf_y11/content/2301.11696v1.pdf filter=lfs diff=lfs merge=lfs -text
5587
  E9FJT4oBgHgl3EQfCizA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5588
  19FST4oBgHgl3EQfXDjl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
5586
  d9FJT4oBgHgl3EQf_y11/content/2301.11696v1.pdf filter=lfs diff=lfs merge=lfs -text
5587
  E9FJT4oBgHgl3EQfCizA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5588
  19FST4oBgHgl3EQfXDjl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5589
+ XtAyT4oBgHgl3EQfvfkj/content/2301.00630v1.pdf filter=lfs diff=lfs merge=lfs -text
5590
+ V9E0T4oBgHgl3EQfVgDO/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5591
+ NNE1T4oBgHgl3EQftgVE/content/2301.03377v1.pdf filter=lfs diff=lfs merge=lfs -text
5592
+ ttE1T4oBgHgl3EQfjwR5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5593
+ 0NFLT4oBgHgl3EQfoi-S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5594
+ HNAzT4oBgHgl3EQfHfvA/content/2301.01047v1.pdf filter=lfs diff=lfs merge=lfs -text
5595
+ Y9E1T4oBgHgl3EQfJwPp/content/2301.02957v1.pdf filter=lfs diff=lfs merge=lfs -text
5596
+ q9E5T4oBgHgl3EQflQ94/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5597
+ Y9E1T4oBgHgl3EQfJwPp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5598
+ 5tE3T4oBgHgl3EQfpQqt/content/2301.04641v1.pdf filter=lfs diff=lfs merge=lfs -text
5599
+ O9FPT4oBgHgl3EQfnTX9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5600
+ ttE1T4oBgHgl3EQfjwR5/content/2301.03266v1.pdf filter=lfs diff=lfs merge=lfs -text
5601
+ MdAzT4oBgHgl3EQfkv0u/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5602
+ HdAzT4oBgHgl3EQfxf76/content/2301.01741v1.pdf filter=lfs diff=lfs merge=lfs -text
5603
+ O9FPT4oBgHgl3EQfnTX9/content/2301.13129v1.pdf filter=lfs diff=lfs merge=lfs -text
5604
+ 5tE3T4oBgHgl3EQfpQqt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5605
+ XdFQT4oBgHgl3EQfdDZR/content/2301.13329v1.pdf filter=lfs diff=lfs merge=lfs -text
5606
+ p9FRT4oBgHgl3EQfdzfW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5607
+ cNFJT4oBgHgl3EQf9y04/content/2301.11689v1.pdf filter=lfs diff=lfs merge=lfs -text
5608
+ V9AyT4oBgHgl3EQfhvhg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5609
+ HdAzT4oBgHgl3EQfxf76/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5610
+ utE3T4oBgHgl3EQfkgoZ/content/2301.04597v1.pdf filter=lfs diff=lfs merge=lfs -text
5611
+ HNAzT4oBgHgl3EQfHfvA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5612
+ mNE5T4oBgHgl3EQfiw-y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5613
+ HtFJT4oBgHgl3EQfui1l/content/2301.11622v1.pdf filter=lfs diff=lfs merge=lfs -text
5614
+ JdAzT4oBgHgl3EQfyP4s/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5615
+ IdFAT4oBgHgl3EQfuh5k/content/2301.08670v1.pdf filter=lfs diff=lfs merge=lfs -text
5616
+ LdFRT4oBgHgl3EQf1zij/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5617
+ FtFKT4oBgHgl3EQfbC5a/content/2301.11810v1.pdf filter=lfs diff=lfs merge=lfs -text
5618
+ LdFOT4oBgHgl3EQf0DSF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5619
+ q9FRT4oBgHgl3EQfezfQ/content/2301.13573v1.pdf filter=lfs diff=lfs merge=lfs -text
5620
+ IdFAT4oBgHgl3EQfuh5k/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5621
+ LdFOT4oBgHgl3EQf0DSF/content/2301.12934v1.pdf filter=lfs diff=lfs merge=lfs -text
5622
+ TdE0T4oBgHgl3EQf2QI-/content/2301.02709v1.pdf filter=lfs diff=lfs merge=lfs -text
5623
+ 79E3T4oBgHgl3EQfqQqR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5624
+ x9FRT4oBgHgl3EQfiTdH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5625
+ k9FLT4oBgHgl3EQfdS-S/content/2301.12086v1.pdf filter=lfs diff=lfs merge=lfs -text
5626
+ edFJT4oBgHgl3EQfTCwr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5627
+ edFJT4oBgHgl3EQfTCwr/content/2301.11502v1.pdf filter=lfs diff=lfs merge=lfs -text
5628
+ NdFKT4oBgHgl3EQfey4y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5629
+ I9E4T4oBgHgl3EQfIgyC/content/2301.04913v1.pdf filter=lfs diff=lfs merge=lfs -text
5630
+ gdE0T4oBgHgl3EQfpAGk/content/2301.02534v1.pdf filter=lfs diff=lfs merge=lfs -text
5631
+ FtFKT4oBgHgl3EQfbC5a/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5632
+ w9FIT4oBgHgl3EQfzit1/content/2301.11365v1.pdf filter=lfs diff=lfs merge=lfs -text
5633
+ O9AyT4oBgHgl3EQf7Prc/content/2301.00837v1.pdf filter=lfs diff=lfs merge=lfs -text
5634
+ jNFLT4oBgHgl3EQfbi-Q/content/2301.12079v1.pdf filter=lfs diff=lfs merge=lfs -text
5635
+ sNAyT4oBgHgl3EQfmfhl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
5636
+ WtA0T4oBgHgl3EQfFP8E/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0NFLT4oBgHgl3EQfoi-S/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bfc3cf710412c5898e53925a852bdc1289b4eb03772b9c4b97599445c89fe62a
3
+ size 4915245
2NFQT4oBgHgl3EQfFTWv/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:48c79b55232cd7e86736623b460a6cdfdee898d732c150e557c6e7d4820683c0
3
+ size 202862
4tAyT4oBgHgl3EQfcPfW/content/tmp_files/2301.00280v1.pdf.txt ADDED
@@ -0,0 +1,2849 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ RECOMMED: A Comprehensive Pharmaceutical
3
+ Recommendation System
4
+
5
+ Mariam Zomorodi1,*, Ismail Ghodsollahee2, Pawel Plawiak1,3, U. Rajendra Acharya4, 5, 6
6
+ 1 Department of Computer Science, Faculty of Computer Science and Telecommunications, Cracow University of
7
+ Technology, Krakow, Poland
8
+ 2 Department of Computer Engineering, Ferdowsi University of Mashhad
9
+ 3 Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Gliwice, Poland
10
+ 4 Department of ECE, Ngee Ann Polytechnic, 535 Clementi Road, Singapore 599 489, Singapore
11
+ 5 Department of Biomedical Engineering, School of Science and Technology, SUSS University, Singapore
12
+ 6 Department of Biomedical Informatics and Medical Engineering, Asia University, Taichung, Taiwan
13
+
14
+ Objectives: To extract datasets containing useful information from two drug databases and
15
+ recommend a list of drugs to physicians and patients with high accuracy while considering
16
+ the most important features of patients and drugs. The history and review of the target
17
+ patient and similar patients, and drug information, are used as a reference to recommend
18
+ drugs.
19
+ Methods: A comprehensive pharmaceutical recommendation system was designed based
20
+ on the patients’ and drugs’ features extracted from Drugs.com and Druglib.com. First, data
21
+ from these databases were combined, and a dataset of patients and drug information was
22
+ built. Secondly, the patients and drugs were clustered, and then the recommendation was
23
+ performed using different ratings provided by patients, and importantly by the knowledge
24
+ obtained from patients and drug specifications, and considering drug interactions. To the
25
+ best of our knowledge, we are the first group to consider patients’ conditions and history
26
+ in the proposed approach for selecting a specific medicine appropriate for that particular
27
+ user. Our approach applies artificial intelligence (AI) models for the implementation.
28
+ Sentiment analysis using natural language processing approaches is employed in pre-
29
+
30
+ processing along with neural network-based methods and recommender system algorithms
31
+ for modeling the system. In our work, patients’ conditions and drugs’ features are used for
32
+ making two models based on matrix factorization. Then we used drug interaction to filter
33
+ drugs with severe or mild interactions with other drugs.
34
+ We developed a deep learning model for recommending drugs by using data from 2304
35
+ patients as a training set, and then we used data from 660 patients as our validation set.
36
+ After that, we used knowledge from critical information about drugs and combined the
37
+ outcome of the model into a knowledge-based system with the rules obtained from
38
+ constraints on taking medicine.
39
+ Results: The results show that our recommendation system is able to recommend the best
40
+ combination of medicines according to the existing real-life prescriptions available. It also
41
+ has the best accuracy and other metrics in recommending a specific drug compared to other
42
+ existing approaches, which are generally based only on patient ratings or comments. Our
43
+ proposed model improves the accuracy, sensitivity, and hit rate by 26%, 34%, and 40%,
44
+ respectively, compared with conventional matrix factorization. In addition, it improves the
45
+ accuracy, sensitivity, and hit rate by an average of 31%, 29%, and 28% compared to other
46
+ machine learning methods. We have also open-sourced our implementation in Python.
47
+ Conclusions: Our proposed RECOMMED system extracts all vital information from the
48
+ drug, patient databases and considers all necessary factors for recommending accurate
49
+ medicine which can be trusted more by doctors and patients. We have shown the efficacy
50
+ of our proposed model in real test cases.
51
+ Keywords: recommendation system; drug recommendation system; drug information
52
+ extraction; hybrid recommendation method
53
+
54
+ 1- INTRODUCTION
55
+ Recommendation systems (RS) are knowledge extraction systems that use information retrieval
56
+ approaches to help people make better decisions and discover items through a complex information
57
+ space [1], [2]. They have been around for many years, and with the advancement in machine
58
+
59
+ learning approaches, their use has been widened, and it helps people to make more appropriate
60
+ decisions in using different products. The popularity of using RS in different fields has increased
61
+ since the announcement of the Netflix Prize competition that aimed to predict movie rates [3]. The
62
+ application of recommender systems is very extensive: from entertainment to e-commerce, the
63
+ tourism industry, and medical recommender systems. Also, with rapid progress in artificial
64
+ intelligence, there has been a greater acceleration in the application of recommender systems and
65
+ their development.
66
+ Medical recommender systems are a particular type of recommender system, and they have some
67
+ distinct features that make them special: They have to be used very carefully, and because they
68
+ affect people’s health, there are many concerns about using RS for them. On the other hand, many
69
+ people die every year because of medication errors. It has been reported as the third leading cause
70
+ of death in the world [4]. This makes the use of intelligent systems in medical science valuable
71
+ and necessary. Drug prescription is also vital for physicians, and it involves considering different
72
+ aspects. Patient history of using drugs, the specification of drugs for diseases related to the
73
+ recommendation in question, and the drug's effectiveness for that specific case are among such
74
+ concerns.
75
+ Having as many different medicines as 24000 [5] in just one database, they can benefit from a
76
+ recommendation system to perform a set of suggestions for a particular patient with a specific
77
+ disease to help physicians in prescribing the most appropriate medicines and also help patients to
78
+ have a better choice in using drugs.
79
+ Recommender systems can be distinguished by the degree of risk imposed when a user accepts a
80
+ recommendation [6]. In this regard, the medical domain can be seen as high risk, mostly due to the
81
+ recommendation given to the user.
82
+ On the other hand, while having a comprehensive drug recommender system is important,
83
+ designing a complete system requires a dataset of drugs with patient ratings, reviews, and also
84
+ information about drugs.
85
+ We gathered this information from two different and well-known databases Drugs.com [5] and
86
+ Druglib.com [7] and we built three datasets which train the system and construct the final model.
87
+ Finally, putting all of them together, we proposed a novel drug recommender system called
88
+
89
+ RECOMMED that learns the patient and drug features and their previous drugs taken, and also the
90
+ user reviews for different drugs to recommend a new drug to a patient.
91
+ The novelty of this work lies in the following parts:
92
+ 1- Propose a pharmaceutical recommender system by considering the features of patients and
93
+ drugs, including patients’ conditions, age, gender, drug side effects, and drug categories.
94
+ 2- Performing pre-processing steps on databases Druglib.com and Drugs.com websites to
95
+ gather the appropriate data for our recommendation system, leading to comprehensive
96
+ datasets for drug information.
97
+ 3- Our system considers sentiment analysis of reviews, the prescriptions of doctors, and
98
+ different similarity measures for recommending a medicine and its dose and other
99
+ recommendations, including side effects and warnings for their usage.
100
+ 4- Our system consists of a knowledge-based component to exclude drugs with serious side
101
+ effects for a specific patient.
102
+ 5- We proposed a model to predict the efficiency of medicine for patients.
103
+
104
+ In the next section, we provide some background in the general and general recommender systems
105
+ field; later in Section 3 we particularly introduce the drug recommender systems and their
106
+ challenges. Then in Section 4 we provide the current state-of-the-art of recommender systems
107
+ methods, specifically drug recommender systems. Section 5 is an elaborate explanation of our
108
+ proposed comprehensive drug recommender system in detail. Section 6 provides the results of this
109
+ work, plus a discussion about them. Finally, in Section 7 we conclude the paper and present the
110
+ future directions of this research.
111
+
112
+ 2- RECOMMENDATION SYSTEMS BACKGROUND
113
+ Recommender systems are decision-making systems that extract information from different kinds
114
+ of knowledge. For many years, many recommender systems have been in various domains with
115
+ different purposes [8]. In this section, we review the basic concepts of various types of
116
+ recommender systems and the way they are categorized.
117
+
118
+ According to the type of data that recommender systems use to make decisions, the algorithms
119
+ utilized in recommender systems have two major categories: - collaborative filtering (CF) and -
120
+ content-based filtering (CB). CF approaches are further divided into user-based and item-based
121
+ approaches. CF and CB approaches have shown acceptable results when they are used in
122
+ recommending different kinds of products like movies, books, and music.
123
+ Also, the recommendation system can combine these two major techniques, usually called hybrid
124
+ recommendations. In addition, there are some specific types of recommender systems that have
125
+ their strength in various domains. One of these types is a knowledge-based recommender system.
126
+ Here, we briefly introduce the major recommender system techniques considered in this work.
127
+ 2-1 Collaborative recommender systems
128
+ The idea behind this group of recommendation methods is to use a measure of similarity between
129
+ users or items to recommend something to a given user. It states that if two users share some
130
+ interest in the past, they will likely have similar interests in the future. A collaborative approach is
131
+ based on the rating a user gives to items; in its basic form, it doesn’t need any other information
132
+ about users and items. CF approaches can be divided into two basic types, neighborhood methods
133
+ (also known as memory-based) and latent factor models. Neighborhood methods are divided into
134
+ one of the following two basic methods:
135
+ 2-1-1 User-based neighborhood recommender system
136
+ This approach aims at suggesting the products based on the similarity between users. In this regard,
137
+ several similarity measures can be used.
138
+ We denote 𝒰 as the set of users, ℐ as the set of items, and 𝑅 as the set of existing ratings,
139
+ Pearson Correlation (PC) is one of the popular ones, which is computed as equation (1) for users
140
+ 𝑢 and 𝑣 [9]:
141
+ 𝑃𝑒𝑎𝑟𝑠𝑜𝑛_𝐶𝑜𝑟𝑟𝑒𝑙𝑎𝑡𝑖𝑜𝑛(𝑢, 𝑣) =
142
+
143
+ (𝑟𝑢𝑖−𝑟̅𝑢)(𝑟𝑣𝑖−𝑟̅𝑣)
144
+ 𝑖∈ℐ𝑢𝑣
145
+ √∑
146
+ (𝑟𝑢𝑖−𝑟̅𝑢)2
147
+ 𝑖∈ℐ𝑢𝑣
148
+ √∑
149
+ (𝑟𝑣𝑖−𝑟̅𝑣)2
150
+ 𝑖∈ℐ𝑢𝑣
151
+
152
+ (1)
153
+ In this equation, ℐ𝑢 is the set of items rated by user 𝑢 and ℐ𝑢𝑣 is the items rated by both 𝑢 and 𝑣.
154
+ Also, 𝑟𝑢𝑖 is the rating of the user 𝑢 for a new item 𝑖 and 𝑟̅𝑢 is the average of the ratings given by 𝑢.
155
+
156
+ And the prediction for the rating of user 𝑢 for item 𝑖 is calculated as equation (2):
157
+ 𝑝𝑟𝑒𝑑(𝑢, 𝑖) =
158
+
159
+ 𝑠𝑖𝑚(𝑢,𝑗)∗(𝑟𝑖,𝑗−𝑟̅𝑗)
160
+ 𝑗 ∈𝑢𝑠𝑒𝑟𝑠
161
+
162
+ 𝑠𝑖𝑚(𝑢,𝑗)
163
+ 𝑗 ∈𝑢𝑠𝑒𝑟𝑠
164
+ + 𝑟̅𝑢
165
+ (2)
166
+ Where 𝑠𝑖𝑚 is the measure of similarity between user 𝑢 and item 𝑖 and 𝑢𝑠𝑒𝑟𝑠 is the set of users
167
+ most similar to user 𝑢. Therefore, the ratings are weighted by the similarity measure in this
168
+ prediction.
169
+ 2-1-2 Item-based neighborhood recommender system
170
+ In contrast to user-based recommender systems, item-based recommender systems use item
171
+ similarity to suggest a product to a specific user. Similar to the user-based approach, here the
172
+ prediction for user 𝑢 for item 𝑖 is also calculated as equation (3):
173
+ 𝑝𝑟𝑒𝑑(𝑢, 𝑖) =
174
+
175
+ 𝑠𝑖𝑚(𝑖,𝑗)∗(𝑟𝑢,𝑗−𝑟̅𝑗)
176
+ 𝑗 ∈𝑁
177
+
178
+ 𝑠𝑖𝑚(𝑖,𝑗)
179
+ 𝑗 ∈𝑁
180
+ + 𝑟̅𝑖
181
+ (3)
182
+ Where 𝑠𝑖𝑚 is the measure of similarity between items 𝑖 and 𝑗 and 𝑁 is the set of items similar to
183
+ item 𝑖 rated by 𝑢.
184
+ 2-1-3 Matrix factorization
185
+ One of the biggest challenges for standard methods in CF is the sparsity of the rating matrix (or
186
+ user-item matrix); model-based CF can help overcome this challenge. There are many ways to
187
+ build models based on which we can make recommendations. Matrix factorization is one the
188
+ popular methods with the idea of decomposition of a matrix into the product of two or maybe three
189
+ matrices.
190
+ Having a dataset of the ratings of various users for different items, this model transforms the rating
191
+ matrix to the individual user and item matrices.
192
+ So the model is defined as follows:
193
+ Assume there is a set of users 𝑈 and items 𝐷, with rating matrix 𝑅(𝑀 × 𝑁), which is the ratings
194
+ given by users on items. 𝑀 and 𝑁 are the total numbers of users and items, respectively. Matrix
195
+ factorization in recommender systems aims to find 𝑘 total latent features/factors by decomposing
196
+ 𝑅 according to equation (4) to user matrix 𝑈 and item matrix 𝐼.
197
+
198
+ 𝑅 ≈ 𝑈 × 𝐼𝑇 = 𝑅̂
199
+ (4)
200
+ U is a 𝑀 × 𝑘 embedding matrix and,
201
+ I is a 𝑁 × 𝑘 embedding matrix.
202
+ 2-2 Content-based recommender systems
203
+ Content-based recommendation uses the attributes of the users or user profile and the attributes of
204
+ items to recommend an item to a user [10]. Providing this information requires extra work and
205
+ effort to represent items properly and build a user profile appropriate for the recommendation
206
+ process [10].
207
+ This kind of recommender system learns the user preferences and tries to recommend items similar
208
+ to the user's preferences.
209
+ Having 𝐷 rated items by user 𝑈, content-based RS aims to find the rating for item 𝑖, which is not
210
+ seen by user 𝑈.
211
+ In this method, items’ features are extracted, then used to find similarities between items. Then, in
212
+ a simple nearest neighbor approach top-𝑛 nearest neighbors of item 𝑖 in 𝐷 are selected. This
213
+ selection is based on a similarity measure like cosine similarity which is calculated as equation
214
+ (5):
215
+ cos(𝜃) =
216
+ 𝑿 .𝒀
217
+ ‖𝑿‖×‖𝒀‖ =
218
+
219
+ 𝑋𝑖𝑌𝑖
220
+ 𝑛
221
+ 𝑖=1
222
+ √∑
223
+ 𝑋𝑖
224
+ 2
225
+ 𝑛
226
+ 𝑖=1
227
+ √∑
228
+ 𝑌𝑖
229
+ 2
230
+ 𝑛
231
+ 𝑖=1
232
+
233
+ (5)
234
+ The ratings of these 𝑛 items are used to predict the rating for item 𝑖 by user 𝑈.
235
+ In most content-based recommender systems, item features are textual descriptions and don’t have
236
+ well-defined values. So, natural language processing approaches like TF-IDF or the bag-of-words
237
+ are used to assign numerical values to the textual features.
238
+ 2-3 Hybrid recommender systems
239
+ Hybrid approaches combine different recommender system algorithms to make a more accurate
240
+ system that considers the benefits of different approaches for recommending an item to the users.
241
+
242
+ A combination of content-based and collaborating filtering is the most common type of
243
+ hybridization method [11].
244
+ 2-4 Knowledge-based recommender systems
245
+ This RS aims to produce recommendations based on existing rules that satisfy a user’s needs. In
246
+ the context of drug recommendation, this knowledge involves many different conditions. For
247
+ example, death reports for a specific drug and drug interactions are two important information that
248
+ a drug recommender system has to consider before recommending a list of medicine to a patient.
249
+ 2-5 AI-based recommendation systems
250
+ Over time many different artificial intelligent approaches have been applied to recommendation
251
+ systems. However, the tendency to use AI methods in recommender systems is mostly because of
252
+ the big data availability and diversity of recommendation systems approaches, which can benefit
253
+ from AI, particularly machine learning algorithms.
254
+ Deep learning as a subfield of machine learning has attracted many researchers from a broad
255
+ variety of disciplines due to its learning capabilities from data. Recently there have been many
256
+ researches on deep learning-based recommendation systems [12], and Multilayer Perceptron
257
+ (MLP), Autoencoder (AE), Convolutional Neural Networks (CNN), Recurrent Neural Networks
258
+ (RNN), are among the mostly used deep learning models in RS [13]. Many of these deep learning-
259
+ based approaches have contributed to the works on CB, CF, and other types of RS [14]. Also, some
260
+ works utilize hybrid deep networks, like the combination of RNN and CNN [15]. Moreover, to
261
+ integrate the advantages of memorization and generalization for recommender systems, a wide &
262
+ deep neural network has been used [16], and the model shows better results with increased
263
+ acquisitions on the Google Play app.
264
+ 2-6 Other types of recommendation systems
265
+ Although these techniques are the basic and mostly used recommender system approaches, several
266
+ more types of recommender systems are suggested in the literature, and authors in [17] give a
267
+ detailed classification.
268
+
269
+
270
+ Medical and drug recommendation is one of the important applications of recommender systems
271
+ which uses techniques in recommender systems to recommend medicine, predict the usefulness of
272
+ drugs, etc. In the following sections, the position of recommender systems in medical science,
273
+ particularly in the pharmaceutical sector and the state-of-the-art in this field, is discussed.
274
+
275
+ 3- RECOMMENDER SYSTEMS IN MEDICAL SCIENCE
276
+
277
+ One of the attractive and important applications of recommendation systems is medical
278
+ recommendations and drug products.
279
+ Here are the major differences between medical recommender systems and other recommender
280
+ systems:
281
+ -
282
+ Medical recommender systems care more about the health of patients than to make a profit.
283
+ -
284
+ Security is the primary goal in drug recommender systems.
285
+ -
286
+ Many existing recommender system techniques cannot be used, and others must be used
287
+ with caution because of safety issues.
288
+ -
289
+ In the long term, time is considered an important factor in recommending a drug. There are
290
+ many situations where some drugs' negative effects are discovered over time. One example
291
+ is the drug zimeldine [18]. So, a comprehensive medical recommender system should
292
+ consider ratings in different time stamps.
293
+ In the drug recommender system, the domain is medicine, and the exact contents to be
294
+ recommended are one or more of the following lists:
295
+ 1. A list of drugs, at least one.
296
+ 2. The dose, is the amount of drug taken at one time.
297
+ 3. The frequency at which the drug doses are taken over time.
298
+ 4. Duration, which is how long the drug is taken.
299
+ Numbers 2 to 4 in the above list are referred to as the dosage. Therefore, we can define a drug
300
+ recommender system as a smart system that is able to recommend a list of drugs plus their dosages
301
+
302
+ with high accuracy in terms of a real prescription of a physician and also to have a positive effect
303
+ on a patient, which available data can partially verify.
304
+ It should be noted that, of course, there is no medicine recommender system that we can trust
305
+ thoroughly, and like other artificial intelligence systems applied in healthcare, their use and ethical
306
+ issues must be addressed appropriately [19], [20].
307
+
308
+ 4- LITERATURE REVIEW
309
+
310
+ Medical recommender systems have been around for many years, even before the emergence of
311
+ recommender systems as a new field in computer science. According to [21], medicine
312
+ recommender systems fall into two broad categories named “ontology and rule-based
313
+ approaches” and “data mining and machine learning-based” approaches. Ontology-based
314
+ recommender systems use the hierarchical organization of users and items to improve the
315
+ recommendation [22].
316
+ Data mining and machine learning algorithms in the medical field are used to predict and
317
+ recommend things like drug usefulness, having a disease [23], [24], the condition of the user, or
318
+ ratings [25], [26]. For example, SVM, backpropagation neural network, and ID3 decision tree have
319
+ been used in [27] for recommending drugs. The performance of these approaches has been
320
+ compared in the above work, and the authors have shown that SVM has better accuracy and
321
+ efficiency compared to the other algorithms. Their data set contains patients’ features age, sex,
322
+ blood pressure, cholesterol, Na and K levels, and drug.
323
+ Some other researchers, while described as medical or medicine recommender systems, consider
324
+ a detection and classification task where the dataset which is trained has some patient attributes,
325
+ and based on that, the objective of the work is the detection or prediction of a disease and then for
326
+ each disease a set of medicines is recommended [27].
327
+ Sentiment analysis of drug reviews is one of the basic approaches for drug recommendations [28],
328
+ [29], [30], [31], [32]. The sentiment analysis in these works mainly aims to recommend a drug or
329
+ extract useful information like adverse drug reactions.
330
+
331
+ In [31], different deep learning approaches, such as CNN, LSTM, and BERT, have been
332
+ investigated for sentiment analysis of patients’ drug reviews. In another work, the combination of
333
+ CNN-RNN has been applied
334
+ In addition to recommendation systems, sentiment analysis and opinion mining of drug reviews is
335
+ an active research area in drug review processing [33]. This analysis can be used for automatic
336
+ opinion mining and recommending drugs.
337
+ A hybrid knowledge-based medical prescription approach has been presented in [34]. The authors
338
+ use historical medical prescriptions to recommend a list of medicines to physicians. The approach uses the
339
+ similarity between cases where a case is medical information like demography, treatment, age, sex,
340
+ symptoms, and diagnosis. Based on the degree of similarity, a drug list is produced. The list is
341
+ complemented by Bayesian reasoning, where a model of the conditional probability of drugs is built. This
342
+ approach has been applied in Humphrey & Partners Medical Services Limited medical center.
343
+ Some works in medical recommendation have focused on particular drugs like diabetes [35]. Their
344
+ model is based on the ontology of medical knowledge and a decision decision-making approach
345
+ for multiple criteria and computes the medication. Then by using the entropy, the information
346
+ about patient’ history has been computed, and finally, the most appropriate medications have been
347
+ recommended to the physicians.
348
+ Many recommender system approaches have not been well considered in the medical and
349
+ pharmaceutical recommendations. However, using polarity in sentiment analysis of user
350
+ comments is one of the important parts of using NLP in recommendation systems. It can be viewed
351
+ as determining whether a word or phrase in the document or even a whole document is positive,
352
+ negative, or neutral in general.
353
+ Figure 1 shows the broad classification of different recommendation system approaches in
354
+ pharmaceutical research. We can see a growing tendency to use machine learning approaches in
355
+ this field.
356
+
357
+
358
+
359
+ Figure 1: Broad classification of recommendation system techniques.
360
+
361
+ 5- Material and methods
362
+ In this section, we formulate the medicine recommender system problem and present our approach
363
+ for the general medicine recommender system.
364
+ Many recommendation systems, like collaborative filtering and content-based approaches, mostly
365
+ rely on past information to make decisions for the current situation. It is not always the case in the
366
+ domain of drug recommendation. The patient condition is different compared to the other patients
367
+ and compared to the same patient over time. So, in addition to the history information like general
368
+ rates, reviews, and the effective rate of the drug, it is necessary to use the patient's current condition
369
+ to make a more accurate decision. We also cannot rely on diversity-based recommendations as it
370
+ is used in some recommender systems, like the one used in Netflix, even if the drug is not rated
371
+ high, it can be suitable for some patients.
372
+ On the other hand, many recommender systems rely on knowledge from users; when there is a
373
+ lack of users’ knowledge, we cannot personalize them. While we have an adequate dataset for our
374
+ recommendation task, the problem emerges when new inputs enter the system. In our medicine
375
+ Drug
376
+ Recommendation
377
+ Systems
378
+ Collaborative Filtering
379
+ Memory Based
380
+ User-Based Filtering
381
+ WaveLet [36]
382
+ Item-Based Filtering
383
+ Model Based
384
+ Matrix Factorization
385
+ SVD
386
+ SVD++
387
+ Content Based
388
+ Machine Learning
389
+ T-Recs [37]
390
+ Knowledge-Based
391
+ Machine Learning
392
+ Data mining Framework
393
+ [38]
394
+ Ontology-based
395
+ MCDM & Entropy [35]
396
+ SWRL [39] , [40], [41]
397
+ GalenOWL [42]
398
+ Panacea [43]
399
+ SemMed [44]
400
+ Hybrid
401
+ CB & Knowledge Based
402
+ Machine Learning
403
+ LOD cloud mining [45]
404
+ User CF & Knowledge
405
+ Based
406
+ Machine Learning
407
+ DiaTrack [46]
408
+ Personalized Clinical
409
+ Prescription [47]
410
+ CADRE [48]
411
+ Item Based CF &
412
+ Knowledge Based
413
+ Machine Learning
414
+ Data Driven[49]
415
+
416
+ recommender system, these inputs can be new patients or new drugs. Cold start problem is a term
417
+ used for this problem, and it is a challenging issue in designing any recommender system. We
418
+ reduced this effect by applying a clustering-based approach. Because drugs are clustered into a
419
+ specific category, we can put a new drug in the category which belongs to it, so we use the same
420
+ rating for the new drugs as those in that category. This is effective in solving the cold start problem
421
+ in our recommender system.
422
+ Proposed method
423
+ Since every recommendation technique has its own benefits, a universal recommender system
424
+ should be able to take advantage of all of these techniques to improve the outcome of a
425
+ recommender system. The drug recommendation system in our work has the benefits of different
426
+ recommendation categories and combines their advantages by using several steps. First, natural
427
+ language processing and machine learning algorithms are applied in the context of basic
428
+ recommender system techniques.
429
+ This section discusses all phases of our model for building a comprehensive drug recommender
430
+ system.
431
+ This paper presents a novel hybrid drug recommender system (RS) with features of several
432
+ recommender systems. It uses natural language processing (NLP) and other machine learning
433
+ techniques to implement the system. The proposed RS approach is a new recommendation system
434
+ method for pharmaceutical recommendation, which can be considered a hybrid of CB, CF model-
435
+ based, knowledge-based, and AI-based methods. Here in this section, we elaborate on each step
436
+ toward the final drug recommendation for each patient. After a very intensive web crawling
437
+ through two well-known pharmaceutical websites, Drugs.com and Druglib.com, and building
438
+ three different datasets, feature extraction and modeling are performed. Then in the next step,
439
+ recommendations for proper drugs are performed. At the final stage, the list of drugs is refined
440
+ based on defined rules in addition to the ratings and drug features which is an important aspect of
441
+ our medicine recommender system.
442
+
443
+
444
+
445
+ Figure 2: Components of RECOMMED drug recommendation system in the training stage.
446
+ Figure 2 presents the whole RECOMMED model in the training stage of our work, consists of
447
+ four components, and we elaborate on each phase of our approach in more detail in the following
448
+ parts:
449
+ 5-1 Dataset extraction
450
+ In this work, any recommendation for drugs and their dosage is based on the patients’ features like
451
+ age, gender, previous illness, and other drugs they consume, and drugs’ features like drug
452
+ classification, side effects, and drug interactions. So, in this phase, the extraction of user features,
453
+ drug features, and drug interaction datasets from Drugs.com and Druglib.com databases is
454
+ accomplished. In the second step of this phase, the dataset is prepared for clustering and modelling
455
+ the recommendation system. The review field in the drug recommendation database contains users'
456
+ and caregivers opinions about drugs' effectiveness. According to our knowledge, none of the
457
+ existing datasets have complete and comprehensive patient and drug information.
458
+
459
+
460
+ Start
461
+
462
+
463
+ Remove HTML Frames,
464
+
465
+ Tags and advertisement
466
+
467
+ End
468
+
469
+
470
+ Crawl Review Webpages
471
+
472
+ Dataset
473
+ Extraction
474
+ Modeling
475
+ User and Drug
476
+ Feature Set
477
+
478
+ Keyword Search
479
+
480
+ Drug
481
+ Interation Set
482
+ Pre-
483
+ processing
484
+
485
+ Feature Extraction
486
+
487
+ Normalized
488
+ User and Drug
489
+ Feature Set
490
+
491
+ Combining User Comment
492
+
493
+ Rates And Effectivness
494
+
495
+
496
+ Normalize Feature Sets
497
+
498
+ User Clusters
499
+ Feature Set
500
+ User Rating
501
+ Matrix
502
+ Drug Clusters
503
+ Feature Set
504
+ Drug Rating
505
+ Matrix
506
+
507
+ Clustering Users
508
+
509
+
510
+ Clustering Drugs
511
+
512
+
513
+ Generating
514
+
515
+ User Rating
516
+
517
+
518
+ Generating
519
+
520
+ Drug Rating
521
+
522
+ Knowledge-
523
+ based
524
+ User Weights
525
+ & Biases Sets
526
+ Drug Weights
527
+ & Biases Sets
528
+
529
+ Initialize Weights & Biases
530
+
531
+
532
+ Forward Propagation
533
+
534
+
535
+ Backward Propagation
536
+
537
+
538
+ Update Weights & Biases
539
+
540
+ Error < Threshold
541
+
542
+
543
+ New User Registration
544
+
545
+
546
+ Compute 10 High Rated
547
+ Drug for Recommendation
548
+
549
+ Drug[i]
550
+
551
+ Interaction?
552
+
553
+ i=0
554
+
555
+ i<10
556
+
557
+ i=i+1
558
+
559
+ User Features
560
+ Filter Set
561
+ Drug[i]
562
+
563
+ Allowed?
564
+
565
+
566
+ Recommendation
567
+
568
+ append(Drug[i])
569
+
570
+
571
+ We built three different datasets named users, drugs, and interactions.
572
+ 5.1.1 Drugs and users datasets
573
+ In this work, Druglib.com and Drugs.com were employed to extract information about patients
574
+ and drugs and build two datasets named drugs and patients. We should mention that there are also
575
+ other databases for drug information and recommendations, like SIDER [50], for drug side effects.
576
+ We will include them in future works to build a complete dataset for drugs. Three features
577
+ consisting of side effects, benefits, and membership in a given drug category were considered for
578
+ drugs.
579
+ First, different drug categories and side effects were extracted in tables 1 and 2. There are 150
580
+ different drug categories, and 128 different side effects were extracted from the Druglib.com
581
+ database.
582
+ TABLE 1 - DRUG CATEGORIES LIST
583
+ Category
584
+ Index
585
+ Acetylcholine-Agonists
586
+ 1
587
+ Adrenergic-Alpha-Agonists
588
+ 2
589
+
590
+
591
+ Vasodilators
592
+ 150
593
+
594
+ TABLE 2 -DRUGS SIDE EFFECTS
595
+ Side Effects
596
+ Index
597
+ Completed suicide
598
+ 1
599
+ Confusional state
600
+ 2
601
+
602
+
603
+ Wrong drug administered
604
+ 128
605
+
606
+ Then drug benefits were also extracted and combined with the information in the above tables, and
607
+ finally, the drugs dataset was prepared, as is partially shown in Table 3.
608
+ TABLE 3- DRUGS DATASET
609
+ Benefits
610
+ Side Effects
611
+ Drug Category
612
+ Drug Name
613
+ Index
614
+ 88
615
+
616
+ 2
617
+ 1
618
+ 128
619
+
620
+ 2
621
+ 1
622
+ 150
623
+
624
+ 2
625
+ 1
626
+ 0
627
+
628
+ 1
629
+ 1
630
+ 0
631
+
632
+ 0
633
+ 0
634
+ 0
635
+
636
+ 0
637
+ 1
638
+ Hytrin Terazosin
639
+ 1
640
+ 0
641
+
642
+ 0
643
+ 0
644
+ 0
645
+
646
+ 1
647
+ 1
648
+ 0
649
+
650
+ 0
651
+ 1
652
+ Mirtazapine
653
+ 2
654
+
655
+
656
+
657
+
658
+
659
+
660
+
661
+
662
+
663
+
664
+
665
+
666
+
667
+
668
+ 0
669
+
670
+ 0
671
+ 0
672
+ 0
673
+
674
+ 0
675
+ 0
676
+ 1
677
+
678
+ 0
679
+ 0
680
+ Proscar Finasteride
681
+ 480
682
+
683
+ We also extracted the users dataset of patient features and comments on different drugs. Six
684
+ features are considered for users datasets: age, gender, current disease (condition), other
685
+ conditions, other drugs are taken, and user level, which is patient or caregiver.
686
+ Table 4 represents the structure of this dataset.
687
+ TABLE3- USERS DATASET
688
+ Comment
689
+ Side
690
+ Effects
691
+ Effective
692
+ ness
693
+ Overall
694
+ Rating
695
+ Drug
696
+ Name
697
+ Other
698
+ Drug
699
+ Other
700
+ Conditio
701
+ n
702
+ Conditio
703
+ n
704
+ Genus
705
+ Age
706
+ Level
707
+ index
708
+
709
+ Severe Side
710
+ Effects
711
+ Ineffective
712
+
713
+ 1
714
+ Mirtazapine
715
+
716
+ None
717
+
718
+ Sleeplessness
719
+
720
+ Depression
721
+
722
+ Male
723
+ 22
724
+ Patient
725
+
726
+ 1
727
+
728
+ Moderate
729
+ Side Effects
730
+ Ineffective
731
+
732
+ 2
733
+ Mirtazapine
734
+
735
+ None
736
+
737
+ None
738
+
739
+ Depression
740
+
741
+ Male
742
+ 38
743
+ Patient
744
+
745
+ 2
746
+ ...
747
+ ...
748
+ ...
749
+ ...
750
+ ...
751
+ ...
752
+ ...
753
+ ...
754
+ ...
755
+ ...
756
+ ...
757
+
758
+
759
+ Mild Side
760
+ Effect
761
+ Moderately
762
+ Effective
763
+
764
+ 4
765
+ Proscar
766
+ Finasteride
767
+
768
+ None
769
+
770
+ None
771
+
772
+ Hair loss
773
+
774
+ Male
775
+
776
+
777
+ 28
778
+ Patient
779
+ 3294
780
+
781
+ 5.1.2 Interactions dataset
782
+ The last dataset prepared in this work is the interactions dataset. This information is important for
783
+ recommending the appropriate medicine list to the patients. We extracted drug interaction
784
+ information from Drugs.com, and after mapping drugs’ names with their counterparts in
785
+ Druglib.com, the interaction dataset, partially presented in Table 5, was created with 180 drug
786
+ interaction information.
787
+ TABLE 4 -DRUG INTERACTION DATASET
788
+
789
+ Abilifish
790
+
791
+
792
+
793
+ Cimbaita
794
+
795
+
796
+
797
+ Syntroid
798
+
799
+
800
+
801
+ zyban
802
+
803
+ Abilifish
804
+
805
+ -
806
+ -
807
+ Moderate
808
+
809
+
810
+
811
+ -
812
+
813
+
814
+ -
815
+ Accupril
816
+
817
+ -
818
+ -
819
+ -
820
+
821
+
822
+ Moderate
823
+
824
+
825
+
826
+ -
827
+ Aciphex
828
+
829
+ -
830
+ -
831
+ Major
832
+
833
+
834
+
835
+ -
836
+
837
+
838
+ -
839
+
840
+
841
+
842
+
843
+
844
+
845
+
846
+
847
+
848
+
849
+
850
+
851
+
852
+
853
+
854
+
855
+ Zyban
856
+
857
+ -
858
+ -
859
+ -
860
+
861
+
862
+ -
863
+
864
+
865
+ -
866
+
867
+ 5.2 Dataset preparation
868
+
869
+ In this phase, our dataset is prepared for creating the recommendation model in the next step. First,
870
+ using Natural Language Processing (NLP) techniques, user and drug features are extracted, and
871
+ then normalization and clustering are accomplished to prepare the datasets for modeling the
872
+ recommendation system. Here, we elaborate on each of these steps:
873
+
874
+ 5.2.1 Feature extraction
875
+ The first pre-processing step is feature extraction from user feature and drug features datasets.
876
+ Bag-Of-Words (BOW) method is used for this purpose.
877
+ NLP for extracting drug and user features
878
+ The feature extraction was mainly performed using natural language processing (NLP) techniques.
879
+ Two well-known methods to extract text features by NLP are Bag-of-Words (BOW) and term
880
+ frequency-inverse term frequency (TF-IDF).
881
+ Our proposed pharmaceutical recommendation system uses the BOW feature extraction method
882
+ to perform feature extraction from database texts. This method consists of four steps:
883
+ • Text-pre-processing pre-processing
884
+ • Vocabulary creation
885
+ • Building feature matrix
886
+ • Polarity of user comments
887
+ Here, every part of this process has been described:
888
+ Text-pre-processing pre-processing
889
+ In the text- pre-processing step, all punctuations and symbols are removed, and abbreviations are
890
+ converted into their full names or phrases. Some of these conversions are presented in Table 6.
891
+ Moreover, spelling mistakes were corrected using the TexBlob library of Python, and stop words
892
+ were removed using a predefined list of stop words.
893
+
894
+
895
+ TABLE 6- EXAMPLES OF ABBREVIATIONS TO FULL NAME CONVERSIONS
896
+ Original Form
897
+
898
+ Abbreviations
899
+
900
+ high blood pressure
901
+
902
+ HBP
903
+
904
+ chronic obstructive pulmonary disease
905
+
906
+ COPD
907
+
908
+ premenstrual syndrome
909
+
910
+ PMS
911
+
912
+ obsessive-compulsive disorder
913
+
914
+ OCD
915
+
916
+
917
+ Vocabulary creation
918
+ Using NLP techniques, a vocabulary of words is created in the second step of feature extraction.
919
+ For this purpose, an array of words is created by checking all registered words in the dataset. This
920
+ array is constructed from unique words of the dataset and their frequency. To deal with the random
921
+ filling of the feature matrix, words are rearranged according to their frequency. Moreover, to deal
922
+ with the sparseness of the feature matrix, words with low frequency are removed. Some of the
923
+ most frequent words extracted from the datasets created and discussed in the previous section can
924
+ be seen in Table 7.
925
+
926
+ TABLE 7. EXAMPLES OF MOST FREQUENT WORDS IN DATASETS.
927
+ Frequency
928
+
929
+ Term
930
+
931
+ 33
932
+
933
+ Pain
934
+
935
+ 22
936
+
937
+ Infection
938
+
939
+ 15
940
+
941
+ Surgery
942
+
943
+ 13
944
+
945
+ Chronic
946
+
947
+
948
+ Building feature matrix
949
+ The feature matrix is created in the third step of extracting the features. For this purpose, a unique
950
+ word is assigned to each matrix column, and a new row is considered for each user review. Each
951
+ cell of this matrix represents the existence of the word in the user’s review, which is essentially
952
+ zero or one.
953
+
954
+ Polarity of user comments (PUC)
955
+ We used NLP and opinion mining to extract PUC. This approach aims at extracting the opinion of
956
+ users as a positive or negative comment. The output of this component is used in the users’ rating
957
+ matrix.
958
+
959
+
960
+ ALGORITHM1. COMMENT POLARITY ACQUISITION
961
+ Input:𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠, 𝑆𝑡𝑜𝑝𝑊𝑜𝑟𝑑𝑠
962
+ Output: 𝑃𝑜𝑙𝑎𝑟𝑖𝑡𝑦𝑂𝑓𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠
963
+ 1. 𝑅𝑒𝑚𝑜𝑣𝑖𝑛𝑔 𝐶𝑎𝑝𝑖𝑡𝑎𝑙 𝐿𝑒𝑡𝑡𝑒𝑟𝑠 𝑎𝑛𝑑 𝐸𝑚𝑜𝑗𝑖𝑠 from 𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠
964
+ 2. 𝑅𝑒𝑚𝑜𝑣𝑖𝑛𝑔 𝑆𝑡𝑜𝑝𝑊𝑜𝑟𝑑𝑠 𝑓𝑟𝑜𝑚 𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠
965
+ 3. 𝑊𝑜𝑟𝑑 𝑇𝑜𝑘𝑒𝑛𝑖𝑧𝑒 (𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠)
966
+ 4. 𝑊𝑜𝑟𝑑𝐿𝑒𝑚𝑎𝑡𝑖𝑎𝑡𝑖𝑜𝑛(𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠)
967
+ 5. 𝐹𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦 𝑜𝑓 𝑊𝑜𝑟𝑑𝑠(𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠)
968
+ 6. 𝑇𝑒𝑥𝑡𝐵𝑙𝑜𝑏(𝑈𝑠𝑒𝑟𝐶𝑜𝑚𝑚𝑒𝑛𝑡𝑠)
969
+
970
+ Combined User Rating Acquisition
971
+ To have a more accurate rating for drugs, we considered the combined user comments and ratings
972
+ from different sources. This overall rating is called Combined User Rating Acquisition (CUR)
973
+ parameter and is obtained from analyzing user comments and ratings as follows:
974
+ 1. 𝑂𝑣𝑒𝑟𝑎𝑙𝑙 𝑅𝑎𝑡𝑖𝑛𝑔 ∈ 𝑍, 0 ≤ 𝑂𝑣𝑒𝑟𝑎𝑙𝑙 𝑅𝑎𝑡𝑖𝑛𝑔 ≤ 10
975
+ 2. 𝐸𝑓𝑓𝑒𝑐𝑡𝑖𝑣𝑛𝑒𝑠𝑠 ∈ 𝐸, 𝐸 = {Ineffective, Marginally Effective, Moderately Effective,
976
+ Considerably Effective, Highly Effective}
977
+ 3. 𝑆𝑖𝑑𝑒 𝐸𝑓𝑓𝑒𝑐𝑡 ∈ 𝑆, 𝑆 = {𝑁𝑜 𝑆𝑖𝑑𝑒 𝐸𝑓𝑓𝑒𝑐𝑡, 𝑀𝑖𝑙𝑑 𝑆𝑖𝑑𝑒 𝐸𝑓𝑓𝑒𝑐𝑡, 𝑀𝑜𝑑𝑒𝑟𝑎𝑡𝑒 𝑆𝑖𝑑𝑒 𝐸𝑓𝑓𝑒𝑐𝑡,
978
+ 𝑆𝑒𝑣𝑒𝑟𝑒 𝑆𝑖𝑑𝑒 𝐸𝑓𝑓𝑒𝑐𝑡, 𝐸𝑥𝑡𝑒𝑟𝑒𝑚𝑙 𝑆𝑒𝑣𝑒𝑟𝑒 𝑆𝑖𝑑𝑒 𝐸𝑓𝑓𝑒𝑐𝑡}
979
+ 4. User Comment
980
+
981
+ CUR parameter is calculated as equation (6), and the above parameters are replaced by CUR in
982
+ the user feature matrix:
983
+ CUR =
984
+ (𝑂𝑣𝑒𝑟𝑎𝑙𝑙𝑅𝑎𝑡𝑖𝑛𝑔
985
+ 10
986
+ +𝐷𝑂𝐸
987
+ 4
988
+ )
989
+ 2
990
+ − 𝐷𝑂𝑆
991
+ 4 +𝑃𝑈𝐶
992
+ 2
993
+
994
+ (6)
995
+ In equation (6), DOE (Degree of Effectiveness) represents the degree of drug effectiveness. The
996
+ user selects the effectiveness of a drug from a list of five different options: Ineffective, Marginally
997
+ Effective, Moderately Effective, Considerably Effective, and Highly Effective, and it takes a number
998
+ in the range [0-4]. Similarly, DOS (Degree of Side Effects) is the degree that a drug has a side
999
+ effect (range [0-4]), and the numbers applied in the denominator are for normalization purpose.
1000
+ PUC (Polarity of User Comments) is calculated using Natural Language Processing (NLP), and
1001
+ opinion mining techniques and the nltk library in Python are used in this regard. Algorithm 1 shows
1002
+ the steps of the work for calculating PUC.
1003
+
1004
+ Normalization- After extracting features from drug and user datasets, these features should also
1005
+ be normalized to perform better in training the model.
1006
+
1007
+
1008
+ Combined User
1009
+ Rating (CUR)
1010
+ Drug Name
1011
+ Other Drug
1012
+ Other Condition
1013
+ Condition
1014
+ Genus
1015
+ Age
1016
+ Level
1017
+ index
1018
+
1019
+ Comment
1020
+ Side Effects (DOS)
1021
+ Effectiveness (DOE)
1022
+ Overall Rating
1023
+ Drug Name
1024
+ Other Drug
1025
+ Other Condition
1026
+ Condition
1027
+ Genus
1028
+ Age
1029
+ Level
1030
+ Index
1031
+ 0.05
1032
+ Mirtazapine
1033
+ None
1034
+ Sleeplesness
1035
+ depression
1036
+ male
1037
+ 22
1038
+ patient
1039
+ 1
1040
+
1041
+ 0.8
1042
+ (Obtained
1043
+ from
1044
+ PUC)
1045
+ 0.75
1046
+ 0
1047
+ 0.1
1048
+ Mirtazapine
1049
+ None
1050
+ Sleeplesness
1051
+ depression
1052
+ male
1053
+ 22
1054
+ patient
1055
+ 1
1056
+
1057
+
1058
+
1059
+
1060
+
1061
+
1062
+
1063
+
1064
+
1065
+
1066
+
1067
+
1068
+
1069
+
1070
+
1071
+
1072
+
1073
+
1074
+
1075
+
1076
+
1077
+
1078
+ 0.1
1079
+ Proscar
1080
+ None
1081
+ None
1082
+ Hair loss
1083
+ male
1084
+ 28
1085
+ patient
1086
+ 3294
1087
+
1088
+ 0.2
1089
+ 0.25
1090
+ 0.5
1091
+ 0.4
1092
+ Proscar
1093
+ None
1094
+ None
1095
+ Hair loss
1096
+ male
1097
+ 28
1098
+ patient
1099
+ 3294
1100
+
1101
+ Figure 3- Combination of different user ratings for a given drug
1102
+
1103
+ Figure 3 is the final user rating dataset after applying the combined user rating acquisition stage.
1104
+ This stage converts the dataset on the left side into the right side dataset. Each column in both
1105
+ datasets has a given user’s features along with the drug name they rate. In the left side dataset, we
1106
+ can see different ratings of the user, and then in the right side dataset, these ratings are combined
1107
+ into CUR using equation (6).
1108
+
1109
+ 5.3 Clustering
1110
+ Clustering is considered one of the main steps in a recommender system for improving the
1111
+ diversity, consistency, and reliability [51], which has been considered in many works in
1112
+ recommender systems, particularly for reducing the sparsity of data [52], [53]. Due to the
1113
+ sparseness of the rating matrix, we consider a clustering-based approach, and patients are clustered
1114
+
1115
+ before performing the matrix factorization, which is elaborated in the next part. This clustering is
1116
+ mostly required because users usually review only one drug corresponding to a specific disease,
1117
+ so the rating matrix is highly sparse. Clustering can help group the users and drugs with similar
1118
+ features and significantly resolve the sparsity problem. Users are clustered based on their gender,
1119
+ age, comments, and being patient or caregiver. It is clear that after clustering, each class of users
1120
+ reviews several drugs, which can improve the matrix factorization process.
1121
+ We used a modified K-means algorithm in [54] to perform this clustering. While the original K-
1122
+ means algorithm is unsupervised, which is used for clustering, the number of clusters is pre-
1123
+ determined, and so it couldn't be utilized in the same way in our proposed drug recommendation
1124
+ system. Therefore, in this paper, we employed the U-Kmeans method [54]. This method performs
1125
+ the unsupervised K-means and determines the best cluster numbers that lead to better classification
1126
+ performance.
1127
+ If each row of the dataset and the center of each cluster are represented by F= {𝑓1, … , 𝑓𝑛} and A=
1128
+ {𝑎1, … , 𝑎𝑘} respectively, the K-means objective function is defined as (7).
1129
+
1130
+ 𝐽(𝑀, 𝐴) = ∑
1131
+
1132
+ 𝑀𝑖𝑗‖𝑓𝑖 − 𝑎𝑗‖
1133
+ 𝑘
1134
+ 𝑗=1
1135
+ 𝑛
1136
+ 𝑖=1
1137
+
1138
+ (7)
1139
+
1140
+ Where in (7), 𝑘 is the number of clusters, 𝑛 is the number of dataset features, and 𝑀𝑖𝑗 indicates
1141
+ the membership of 𝐹𝑖 to the 𝑗𝑡ℎ cluster. In the K-means algorithm, this objective function must be
1142
+ minimized. In [55], an entropy-based method is proposed to improve K-means. In this method, to
1143
+ determine the centers of the clusters, Equation (8) is added to the objective function.
1144
+ 𝐵𝑛 ∑
1145
+ 𝑎𝑗
1146
+ 𝑘
1147
+ 𝑗=1
1148
+ ln 𝑎𝑗
1149
+ (8)
1150
+ In (8), the effect of the cluster imbalance is added to the objective function. As can be seen in
1151
+ (9), when the 𝐵𝑛 coefficient of the improved objective function is zero. The following K-means
1152
+ objective function is obtained.
1153
+
1154
+ 𝐽(𝑀, 𝐴) = ∑
1155
+
1156
+ 𝑀𝑖𝑗‖𝑥𝑖 − 𝑎𝑗‖
1157
+ 𝑘
1158
+ 𝑗=1
1159
+ 𝑛
1160
+ 𝑖=1
1161
+ − 𝐵 ∑
1162
+ 𝜂𝑗
1163
+ 𝑘
1164
+ 𝑗=1
1165
+ ln 𝜂𝑗
1166
+
1167
+ (9)
1168
+
1169
+
1170
+ Where in this equation, 𝜂𝑗 represents the number of members of a cluster, which is determined
1171
+ by (10).
1172
+ 𝜂𝑗 =
1173
+
1174
+ 𝑀𝑖𝑗
1175
+ 𝑛
1176
+ 𝑖=1
1177
+ 𝑥𝑖
1178
+
1179
+ 𝑀𝑖𝑗
1180
+ 𝑛
1181
+ 𝑖=1
1182
+
1183
+ (10)
1184
+
1185
+ In [54], equation (11) is considered to determine the optimized number of clusters. By adding
1186
+ this term to equation (10), the final objective function is obtained as (12).
1187
+ L ∑
1188
+
1189
+ 𝑀𝑖𝑗
1190
+ 𝑘
1191
+ 𝑗=1
1192
+ ln 𝑎𝑗
1193
+ 𝑛
1194
+ 𝑖=1
1195
+
1196
+ (11)
1197
+ 𝐽(𝑀, 𝐴, 𝑎) = ∑
1198
+
1199
+ 𝑀𝑖𝑗‖𝑥𝑖 − 𝑎𝑗‖
1200
+ 𝑘
1201
+ 𝑗=1
1202
+ 𝑛
1203
+ 𝑖=1
1204
+ − 𝐵 ∑
1205
+ 𝑎𝑗
1206
+ 𝑘
1207
+ 𝑗=1
1208
+ ln 𝑎𝑗 − L ∑
1209
+
1210
+ 𝑀𝑖𝑗
1211
+ 𝑘
1212
+ 𝑗=1
1213
+ ln 𝑎𝑗
1214
+ 𝑛
1215
+ 𝑖=1
1216
+
1217
+ (12)
1218
+ The pseudocode of the U-K-means classification method based on the approach in [54] is
1219
+ presented in Algorithm 2.
1220
+ Algorithm .
1221
+ 2 Our modified Pseudo code of U-Kmeans based on [54].
1222
+ 1. 𝑖𝑛𝑖𝑡𝑖𝑎𝑙 𝑐(0) = 𝑛, 𝛼𝑘
1223
+ (0) =
1224
+ 1
1225
+ 𝑛 , 𝑎𝑘
1226
+ (0) = 𝑥𝑖
1227
+ 2. 𝐼𝑛𝑖𝑡𝑖𝑎𝑙 𝑙𝑒𝑎𝑟𝑛𝑖𝑛𝑔 𝑟𝑎𝑡𝑒𝑠 𝐿(0) = 𝐵(0) = 1
1228
+ 3. 𝑆𝑒𝑡 𝑡 = 0 , 𝜀 > 0
1229
+ 4. 𝑤ℎ𝑖𝑙𝑒 𝑚𝑎𝑥‖𝑎𝑘
1230
+ 𝑡+1 − 𝑎𝑘
1231
+ 𝑡 ‖ < 𝜀
1232
+ 5. If ‖𝑥𝑖 − 𝛼𝑘‖2 − 𝐿𝑙𝑛𝛼𝑘 = min
1233
+ 1≤𝑘≤𝑐‖𝑥𝑖 − 𝑎𝑘‖2 − 𝐿𝑙𝑛𝛼𝑘
1234
+ 6. 𝑀𝑖𝑘
1235
+ (𝑡+1) = 1
1236
+ 7. Else
1237
+ 8. 𝑀𝑖𝑘
1238
+ (𝑡+1) = 0
1239
+ 9. 𝐿(𝑡+1) = 𝑒−𝑐(𝑡+1)/250
1240
+ 10. 𝛼𝑘
1241
+ (𝑡+1) = ∑
1242
+ 𝑀𝑖𝑘
1243
+ 𝑛 + (
1244
+ 𝐵
1245
+ 𝐿) 𝛼𝑘
1246
+ (𝑡) ln 𝑎𝑘
1247
+ 𝑡 − ∑
1248
+ 𝛼𝑠
1249
+ 𝑡
1250
+ 𝑐
1251
+ 𝑠=1
1252
+ 𝑛
1253
+ 𝑖=1
1254
+ ln 𝑎𝑠
1255
+ 𝑡
1256
+ 11. 𝐵𝑡+1 = 𝑚𝑖𝑛 (
1257
+
1258
+ exp (−𝜂𝑛|𝑎𝑘
1259
+ 𝑡+1−𝑎𝑘
1260
+ 𝑡 |)
1261
+ 𝑐
1262
+ 𝑘=1
1263
+ 𝑐
1264
+ ,
1265
+ 1− max
1266
+ 1≤𝑘≤𝑐(1
1267
+ 𝑛 ∑
1268
+ 𝑀𝑖𝑘
1269
+ 𝑛
1270
+ 𝑖=1
1271
+ )
1272
+ − max
1273
+ 1≤𝑘≤𝑐 𝑎𝑘
1274
+ 𝑡 ∑
1275
+ ln 𝑎𝑘
1276
+ 𝑡
1277
+ 𝑐
1278
+ 𝑘=1
1279
+ )
1280
+ 12. 𝑢𝑝𝑑𝑎𝑡𝑒 𝐶𝑡 𝑡𝑜 𝐶𝑡+1 𝑏𝑦 𝑑𝑖𝑠𝑐𝑎𝑟𝑑 𝑡ℎ𝑜𝑠𝑒 𝑐𝑙𝑢𝑠𝑡𝑒𝑟 𝑤𝑖𝑡ℎ 𝑎𝑘
1281
+ 𝑡+1 ≤
1282
+ 1
1283
+ 𝑛
1284
+ 13. 𝑎𝑘
1285
+ ∗ =
1286
+ 𝑎𝑘
1287
+
1288
+
1289
+ 𝑎𝑠∗
1290
+ 𝑐(𝑡+1)
1291
+ 𝑠=1
1292
+
1293
+ 14. 𝑀𝑖𝑘
1294
+ ∗ =
1295
+ 𝑀𝑖𝑘
1296
+
1297
+
1298
+ 𝑀𝑖𝑠
1299
+
1300
+ 𝑐(𝑡+1)
1301
+ 𝑠=1
1302
+
1303
+ 15. 𝑎𝑘 =
1304
+
1305
+ 𝑀𝑖𝑘𝑥𝑖𝑗
1306
+ 𝑛
1307
+ 𝑖=1
1308
+
1309
+ 𝑀𝑖𝑘
1310
+ 𝑛
1311
+ 𝑖=1
1312
+
1313
+ 16. 𝑖𝑓 𝑡 ≥ 60 𝑎𝑛𝑑 𝑐(𝑡−60) − 𝑐𝑡 = 0
1314
+ 17. 𝐵(𝑡+1) = 0
1315
+ 18. t=t+1
1316
+
1317
+
1318
+
1319
+
1320
+ TABLE 8: RATE MATRIX WITHOUT CLASSIFICATION
1321
+ 619
1322
+
1323
+ 618
1324
+
1325
+ 617
1326
+
1327
+ 616
1328
+
1329
+ 615
1330
+
1331
+
1332
+
1333
+ 6
1334
+
1335
+ 5
1336
+
1337
+ 4
1338
+
1339
+ 3
1340
+
1341
+ 2
1342
+
1343
+ 1
1344
+
1345
+ Drugs
1346
+
1347
+
1348
+ Users
1349
+
1350
+
1351
+
1352
+
1353
+
1354
+
1355
+
1356
+
1357
+
1358
+
1359
+
1360
+
1361
+ 1
1362
+
1363
+ 1
1364
+
1365
+ 3
1366
+
1367
+
1368
+
1369
+
1370
+ 3
1371
+
1372
+
1373
+
1374
+
1375
+
1376
+
1377
+
1378
+
1379
+ 2
1380
+
1381
+
1382
+
1383
+
1384
+ 5
1385
+
1386
+
1387
+
1388
+
1389
+
1390
+
1391
+
1392
+
1393
+
1394
+ 3
1395
+
1396
+
1397
+
1398
+
1399
+
1400
+
1401
+
1402
+
1403
+
1404
+
1405
+
1406
+
1407
+
1408
+
1409
+
1410
+
1411
+
1412
+
1413
+
1414
+
1415
+
1416
+
1417
+
1418
+
1419
+
1420
+ 1
1421
+
1422
+
1423
+ 979
1424
+
1425
+
1426
+ 3
1427
+
1428
+
1429
+
1430
+
1431
+
1432
+
1433
+
1434
+
1435
+
1436
+
1437
+
1438
+ 980
1439
+
1440
+
1441
+
1442
+
1443
+
1444
+
1445
+
1446
+ 3
1447
+
1448
+
1449
+
1450
+
1451
+
1452
+
1453
+ 981
1454
+
1455
+
1456
+ TABLE 9: RATE MATRIX AFTER CLASSIFICATION
1457
+ 619
1458
+
1459
+ 618
1460
+
1461
+ 617
1462
+
1463
+ 616
1464
+
1465
+ 615
1466
+
1467
+
1468
+
1469
+ 6
1470
+
1471
+ 5
1472
+
1473
+ 4
1474
+
1475
+ 3
1476
+
1477
+ 2
1478
+
1479
+ 1
1480
+
1481
+ Drugs
1482
+
1483
+
1484
+ Users
1485
+
1486
+
1487
+
1488
+
1489
+
1490
+
1491
+
1492
+
1493
+
1494
+
1495
+
1496
+
1497
+ 1
1498
+
1499
+ 1
1500
+
1501
+ 3
1502
+
1503
+
1504
+
1505
+
1506
+ 3
1507
+
1508
+
1509
+
1510
+
1511
+
1512
+
1513
+
1514
+
1515
+ 2
1516
+
1517
+
1518
+
1519
+
1520
+ 5
1521
+
1522
+
1523
+
1524
+
1525
+
1526
+
1527
+
1528
+
1529
+
1530
+ 3
1531
+
1532
+
1533
+
1534
+
1535
+
1536
+
1537
+
1538
+
1539
+
1540
+
1541
+
1542
+
1543
+
1544
+
1545
+
1546
+
1547
+
1548
+
1549
+
1550
+
1551
+
1552
+
1553
+
1554
+
1555
+
1556
+ 1
1557
+
1558
+
1559
+ 38
1560
+
1561
+
1562
+ 3
1563
+
1564
+
1565
+
1566
+
1567
+
1568
+
1569
+
1570
+
1571
+
1572
+
1573
+
1574
+ 39
1575
+
1576
+
1577
+
1578
+
1579
+
1580
+
1581
+
1582
+ 3
1583
+
1584
+
1585
+
1586
+
1587
+
1588
+
1589
+ 40
1590
+
1591
+
1592
+
1593
+ 5.4 Modeling
1594
+ In the next step, the clustering outcome is used to build a recommender system model able to
1595
+ recommend the best drugs. Later, we filter the model's output with a knowledge-based component
1596
+ for safety reasons.
1597
+
1598
+ Neural Network-based Matrix Factorization
1599
+ Matrix factorization is a popular method for recommender systems aiming at finding two
1600
+ rectangular matrices called user and item matrices with smaller sizes than the rating matrix [56].
1601
+ The dot product between these two matrices results in the rating matrix.
1602
+
1603
+ To reduce the computational overhead, copeTo reduces the computational overhead, cope with the
1604
+ sparsity of the ratings, and increase accuracy. We proposed a neural network-based matrix
1605
+ factorization technique. The first two matrices, Rating and Effectiveness, are constructed by
1606
+ extracting information from Druglib.com.
1607
+ In our model, the rating matrix 𝑅𝑎𝑡𝑖𝑛𝑔 ∈ R𝑛∗𝑚 is estimated as the multiplication of two matrices
1608
+ 𝐶𝑙𝑢𝑠𝑡𝑒𝑟𝑠𝑛∗𝑘 and 𝐷𝑟𝑢𝑔𝑠𝑘∗𝑚 as (13):
1609
+ 𝑅𝑎𝑖𝑛𝑔 ≈ Clusters. 𝐷𝑟𝑢𝑔𝑠𝑇 (13)
1610
+
1611
+ This model applies a neural network algorithm to estimate the users’ comments for each medicine.
1612
+ Clustered users and drugs and users’ and drugs’ features are used in building this new model, as
1613
+ illustrated in Figure 4.
1614
+ Figure 4- Our proposed customized matrix factorization method.
1615
+
1616
+
1617
+
1618
+
1619
+
1620
+
1621
+
1622
+
1623
+
1624
+
1625
+
1626
+
1627
+
1628
+ 𝑏𝑚
1629
+
1630
+ 𝑏2
1631
+ 𝑏1
1632
+
1633
+
1634
+
1635
+
1636
+
1637
+
1638
+
1639
+
1640
+
1641
+
1642
+
1643
+
1644
+
1645
+
1646
+
1647
+
1648
+
1649
+
1650
+
1651
+
1652
+
1653
+
1654
+
1655
+ Drug
1656
+ Cluster k
1657
+
1658
+
1659
+
1660
+ Drug
1661
+ Cluster 2
1662
+
1663
+ Drug
1664
+ Cluster 1
1665
+
1666
+
1667
+
1668
+
1669
+
1670
+
1671
+
1672
+
1673
+
1674
+
1675
+ Drug m
1676
+
1677
+
1678
+
1679
+ Drug 2
1680
+
1681
+ Drug 1
1682
+
1683
+
1684
+
1685
+
1686
+
1687
+ 𝑐1,𝑚
1688
+
1689
+ 𝑐1,2
1690
+ 𝑐1,1
1691
+ Drug
1692
+ Feature
1693
+ 1
1694
+
1695
+
1696
+
1697
+
1698
+
1699
+
1700
+
1701
+
1702
+
1703
+
1704
+ 𝑑1,𝑚
1705
+
1706
+ 𝑑1,2
1707
+ 𝑑1,1
1708
+ Latent
1709
+ Factor 1
1710
+
1711
+
1712
+
1713
+ 𝑐2,𝑚
1714
+
1715
+ 𝑐2,2
1716
+ 𝑐2,1
1717
+ Drug
1718
+ Feature
1719
+ 2
1720
+
1721
+
1722
+
1723
+
1724
+
1725
+
1726
+
1727
+
1728
+
1729
+
1730
+ 𝑑2,𝑚
1731
+
1732
+ 𝑑2,2
1733
+ 𝑑2,1
1734
+ Latent
1735
+ Factor 2
1736
+
1737
+
1738
+
1739
+
1740
+
1741
+
1742
+
1743
+
1744
+
1745
+
1746
+
1747
+
1748
+
1749
+
1750
+
1751
+
1752
+
1753
+
1754
+
1755
+
1756
+
1757
+
1758
+ 𝑐𝑘,𝑚
1759
+
1760
+ 𝑐𝑘,2
1761
+ 𝑐𝑘,1
1762
+ Drug
1763
+ Feature
1764
+ k
1765
+
1766
+
1767
+
1768
+
1769
+
1770
+
1771
+
1772
+
1773
+
1774
+
1775
+ 𝑑𝑘,𝑚
1776
+
1777
+ 𝑑𝑘,2
1778
+ 𝑑𝑘,1
1779
+ Latent
1780
+ Factor k
1781
+
1782
+
1783
+
1784
+
1785
+
1786
+
1787
+
1788
+
1789
+ User
1790
+ Feature k
1791
+
1792
+
1793
+
1794
+
1795
+ User
1796
+ Feature 2
1797
+
1798
+ User
1799
+ Feature 1
1800
+
1801
+
1802
+
1803
+
1804
+
1805
+
1806
+
1807
+ User
1808
+ Feature k
1809
+
1810
+
1811
+
1812
+ User
1813
+ Feature 2
1814
+
1815
+ User
1816
+ Feature 1
1817
+
1818
+
1819
+ 𝑟1,𝑚
1820
+
1821
+ 𝑟1,2
1822
+ 𝑟1,1
1823
+
1824
+ 𝑢1,𝑘
1825
+
1826
+
1827
+ 𝑢1,2
1828
+ 𝑢1,1
1829
+ User
1830
+ 1
1831
+
1832
+
1833
+ 𝑏1
1834
+
1835
+ 𝑟1,𝑚
1836
+
1837
+ 𝑟1,2
1838
+ 𝑟1,1
1839
+
1840
+ 𝑐1,𝑘
1841
+
1842
+ 𝑐1,2
1843
+ 𝑐1,1
1844
+ User
1845
+ Cluster
1846
+ 1
1847
+
1848
+ 𝑟1,𝑚
1849
+
1850
+ 𝑟2,2
1851
+ 𝑟2,1
1852
+
1853
+ 𝑢2,𝑘
1854
+
1855
+
1856
+ 𝑢2,2
1857
+ 𝑢2,1
1858
+ User
1859
+ 2
1860
+
1861
+
1862
+ 𝑏1
1863
+
1864
+ 𝑟1,𝑚
1865
+
1866
+ 𝑟2,2
1867
+ 𝑟2,1
1868
+ 𝑐2,𝑘
1869
+
1870
+ 𝑐2,2
1871
+ 𝑐2,1
1872
+ User
1873
+ Cluster
1874
+ 2
1875
+
1876
+
1877
+
1878
+
1879
+
1880
+
1881
+
1882
+
1883
+
1884
+
1885
+
1886
+
1887
+
1888
+
1889
+
1890
+
1891
+
1892
+
1893
+
1894
+
1895
+
1896
+
1897
+
1898
+
1899
+
1900
+
1901
+ 𝑟𝑛,𝑚
1902
+
1903
+ 𝑟𝑛,2
1904
+ 𝑟𝑛,1
1905
+
1906
+ 𝑢𝑛,𝑘
1907
+
1908
+
1909
+ 𝑢𝑛,2
1910
+ 𝑢𝑛,1
1911
+ User
1912
+ n
1913
+
1914
+
1915
+ 𝑏𝑛
1916
+
1917
+ 𝑟𝑛,𝑚
1918
+
1919
+ 𝑟𝑛,2
1920
+ 𝑟𝑛,1
1921
+ 𝑐𝑛,𝑘
1922
+
1923
+ 𝑐𝑛,2
1924
+ 𝑐𝑛,1
1925
+ User
1926
+ Cluster
1927
+ n
1928
+
1929
+ User Ratings
1930
+
1931
+
1932
+
1933
+
1934
+
1935
+
1936
+ Drug Ratings
1937
+
1938
+
1939
+
1940
+ User embedding
1941
+ (User Weights)
1942
+ Drug Cluster Features
1943
+ sEmbedding
1944
+ Drug Embedding
1945
+ (Drug Weights)
1946
+
1947
+ Drug Bias
1948
+
1949
+ User Cluster Features
1950
+ User Bias
1951
+
1952
+
1953
+ The input to the neural network is user and drug-clustered features. Drug Embedding and User
1954
+ Embedding matrices are the input to this network, and drug and user are the network's outputs.
1955
+ With sparse rating matrices, the forward and backward pass calculations are accomplished just for
1956
+ non-zero ratings to reduce the computation load. The neural network layer output is calculated as:
1957
+ ��𝑧+1 = 𝑓𝑧+1(∑
1958
+ 𝑤𝑖
1959
+ 𝑧+1. 𝜓𝑧+1(𝑛, 𝑚). 𝑎𝑖
1960
+ 𝑧 + 𝑏𝑗
1961
+ 𝑧+1
1962
+ 𝐾
1963
+ 𝑖=1
1964
+ ) 𝑖 ∈ (1, 𝐾), 𝑗 ∈ (1, 𝑀𝑁), 𝑧 ∈ (0, 𝑍 − 1), 𝑛 ∈
1965
+ (0, 𝑁), 𝑚 ∈ (0, 𝑀)
1966
+ (14)
1967
+ In this equation, 𝑓𝑧+1 is the activation function, 𝑤𝑖
1968
+ 𝑧+1 are the weights, 𝑏𝑗
1969
+ 𝑧+1 are the biases, 𝑍 is the
1970
+ number of layers, 𝑀 is the number of drugs, 𝑁 is the number of users, 𝑎𝑍 is the output of the
1971
+ network, 𝐾 is the number of the features for drugs or users, and 𝑀𝑁 represents the number of
1972
+ drugs in the user network and represents the number of users in the drugs network. And finally
1973
+ 𝜓𝑧+1 is the rating existence function defined as:
1974
+ {𝜓𝑧+1(𝑛, 𝑚) = 1 𝑖𝑓(𝑅𝑎𝑡𝑖𝑛𝑔 𝑛, 𝑚 𝑒𝑥𝑖𝑡 𝑜𝑟 𝑧 < 𝑍 − 1)
1975
+ 𝜓𝑧+1(𝑛, 𝑚) = 0 𝑖𝑓(𝑅𝑎𝑡𝑖𝑛𝑔 𝑛, 𝑚 𝑛𝑜𝑡 𝑒𝑥𝑖𝑠𝑡)
1976
+ (15)
1977
+ Also, the backward pass calculations are as equations (16) to (19) for the output and hidden layers
1978
+ respectively:
1979
+ For the output:
1980
+ ∆𝑜𝑢𝑡 = (𝑅(𝑛,𝑚) − 𝑎𝑍). 𝜓𝑍(𝑛, 𝑚). 𝑓𝑧+1′(𝑎𝑍) 𝑛 ∈ (0, 𝑁), 𝑚 ∈ (0, 𝑀)
1981
+ (16)
1982
+ ∆𝑊𝑍 = ∆𝑜𝑢𝑡. 𝑎𝑍. 𝛾𝑍
1983
+ (17)
1984
+ For the hidden layers:
1985
+ ∆𝐻𝑖𝑑𝑑𝑒𝑛𝑧 = 𝑓′(𝑎𝑧). ∑ ∆𝑜𝑢𝑡𝑖
1986
+ 𝑖
1987
+ . 𝑤𝑖
1988
+ 𝑧 𝑖 ∈ (1, 𝐾), 𝑧 ∈ (0, 𝑍 − 1)
1989
+ (18)
1990
+ ∆𝑤𝑧 = ∆𝐻𝑖𝑑𝑑𝑒𝑛𝑧. 𝑎𝑧. 𝛾𝑧 𝑧 ∈ (0, 𝑍 − 1)
1991
+ (19)
1992
+ In these equations, 𝑓𝑧+1′ is the gradient of the activation function, 𝑅(𝑛,𝑚) is the rating
1993
+ corresponding to the users or drugs, ∆𝑊𝑍 is the error correction for the output layer, ∆𝑤𝑧 are the
1994
+ error corrections for the hidden layers, and 𝛾𝑧 is the learning rate. The weight updates are also
1995
+ according to equation (20):
1996
+ 𝑤𝑛𝑒𝑤
1997
+ 𝑧
1998
+ = 𝑤𝑜𝑙𝑑
1999
+ 𝑧
2000
+ + ∆𝑤𝑧 𝑧 ∈ (0, 𝑍) (20)
2001
+
2002
+
2003
+ 5.5 Knowledge-based component
2004
+ After modeling the recommendation system, several constraints on the model output are applied.
2005
+ The final stage in the recommendation process is based on the knowledge-based technique. The
2006
+ knowledge-based recommendation is a specific recommender system that can be used in
2007
+ combination with other algorithms or alone.
2008
+ The aim of using this module is its huge impact in increasing the safety of the recommendations.
2009
+ We extracted and gathered rules in the drug recommendation domain as queries. These rules are
2010
+ based on Drug Interactions and Adverse Events. Using these rules, we can prevent recommending
2011
+ drugs that lead to events like death, hospitalization, disability, and life-threatening events. The
2012
+ flowchart of this component has been extracted from Figure 2 and redrawn in Figure 5.
2013
+ The set of these rules which our knowledge-based component considers falls into these two
2014
+ categories:
2015
+ -
2016
+ Based on patients’ features:
2017
+ o Gender is allowed to recommend a drug.
2018
+ o The age is allowed for recommending a drug.
2019
+ -
2020
+ Based on drug interactions:
2021
+ o The recommended drug has no interaction with other drugs taken by the user.
2022
+
2023
+
2024
+ Figure 5- Knowledge-based component of our proposed approach based on the bottom left of
2025
+ Figure 2.
2026
+
2027
+ Table 10 presents knowledge-based rules based on patient’s features that have been considered in
2028
+ this work. For example, according to this table, a drug can only be recommended if the patient's
2029
+ age is in the allowed range and the gender is allowed for recommending the drug.
2030
+ TABLE 10- USER FEATURE-BASED RULES
2031
+ Zometa
2032
+
2033
+ Actemra
2034
+ Abilify
2035
+ Drug Name
2036
+ 31
2037
+
2038
+ 29
2039
+ 24
2040
+ Minimum
2041
+ Not allowed age
2042
+ ranges
2043
+ 67
2044
+
2045
+ 64
2046
+ 45
2047
+ Maximum
2048
+ 0
2049
+
2050
+ 1
2051
+ 0
2052
+ None
2053
+ Allowed gender
2054
+ 0
2055
+
2056
+ 0
2057
+ 0
2058
+ Female
2059
+ 0
2060
+
2061
+ 0
2062
+ 0
2063
+ Male
2064
+ 1
2065
+
2066
+ 0
2067
+ 1
2068
+ Both
2069
+
2070
+ Start
2071
+
2072
+
2073
+ New User Registration
2074
+
2075
+ User Weights
2076
+ & Biases Sets
2077
+ Drug Weights
2078
+ & Biases Sets
2079
+
2080
+ Compute 10 High Rated
2081
+ Drug Recommendation
2082
+ Drug[i] Interaction?
2083
+
2084
+ I=0
2085
+
2086
+ I<10
2087
+
2088
+ I=i+1
2089
+
2090
+ Drug
2091
+ Interation Set
2092
+ End
2093
+
2094
+
2095
+ Recommendation.append(Drug[i]
2096
+
2097
+ Knowledge-
2098
+ based
2099
+ Recommendations
2100
+ based on the model
2101
+
2102
+ User Features
2103
+ Filter Set
2104
+ Drug[i] Allowed?
2105
+
2106
+ Drug Recommendation
2107
+
2108
+
2109
+ For our proposed knowledge-based component, another adverse events dataset is generated from
2110
+ Druglib.com. The structure of this dataset is presented in Table 11. Features in this dataset include
2111
+ age, gender, the name of the drug taken by a given patient, its adverse event, reaction, and other
2112
+ drugs used by the patient.
2113
+ TABLE11-ADVERSE EVENTS DATASET
2114
+ Other Drug
2115
+ Adverse Event
2116
+ Reaction
2117
+ Genus
2118
+ Age
2119
+ Drug Name
2120
+ Index
2121
+ -
2122
+ Death
2123
+
2124
+ male
2125
+ 63
2126
+ Ability
2127
+ (Airipiprazole)
2128
+ 1
2129
+ ...
2130
+
2131
+
2132
+
2133
+
2134
+ ...
2135
+
2136
+ Insulin
2137
+ Death;
2138
+ Hospitalization
2139
+
2140
+ female
2141
+ 47
2142
+ Acterma
2143
+ 12
2144
+
2145
+
2146
+ ...
2147
+
2148
+
2149
+
2150
+
2151
+ Fluticasone propiate;
2152
+ Salmeterol; Carbemazepine
2153
+ Hospitalization
2154
+
2155
+ male
2156
+ 50
2157
+ Zyprexa
2158
+ 2486
2159
+
2160
+ We used Gaussian and Poisson distribution for patients' age and gender from the above dataset for
2161
+ the adverse events of using a specific drug. These adverse events can be death, hospitalization,
2162
+ disability, or other life-threatening events.
2163
+ Since, in this case, we require the average and standard deviation, by using Poisson and Gaussian
2164
+ distribution, it is possible to compute the allowed gender for recommending a drug to a patient
2165
+ using much less memory than machine learning for this specific task.
2166
+ Assume that on average, by recommending a drug 𝛾 for 𝜂 times to patients with 𝑔𝑒𝑛𝑑𝑒𝑟 =
2167
+ 𝑓𝑒𝑚𝑎𝑙𝑒 they experience one of the adverse events mentioned in Table 11, then the probability
2168
+ that by recommending drug 𝛾 to a female patient she experiences one of the adverse events is
2169
+ calculated as equation (21):
2170
+ 𝑃𝑛(𝑥) = 𝑒−𝜆𝐹𝑒𝑚𝑎𝑙𝑒
2171
+ 𝛶
2172
+ 𝜆𝐹𝑒𝑚𝑎𝑙𝑒
2173
+ 𝛶
2174
+ 𝜆𝐹𝑒𝑚𝑎𝑙𝑒
2175
+ 𝛶
2176
+ =
2177
+ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐴𝑑𝑣𝑒𝑟𝑠𝑒 𝐸𝑣𝑒𝑛𝑡
2178
+ 𝜂
2179
+
2180
+ (21)
2181
+ And similarly, for a male patient, this probability is calculated as equation (22):
2182
+ 𝑃𝑛(𝑥) = 𝑒−𝜆𝑀𝑎𝑙𝑒
2183
+ 𝛶
2184
+ 𝜆𝑀𝑎𝑙𝑒
2185
+ 𝛶
2186
+ 𝜆𝑀𝑎𝑙𝑒
2187
+ 𝛶
2188
+ =
2189
+ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐴𝑑𝑣𝑒𝑟𝑠𝑒 𝐸𝑣𝑒𝑛𝑡
2190
+ 𝜂
2191
+
2192
+ (22)
2193
+
2194
+
2195
+ Using the above calculations, if the probability of an adverse event for each gender and each
2196
+ medicine is more than a given threshold value, the medicine is removed from the list and is not
2197
+ recommended to the patient. In this paper, we set the 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 50%.
2198
+ Also, normal distribution was used for setting the rules related to the patients ages. Suppose the
2199
+ average and standard deviation of a patient’s age who have taken medicine 𝛾 and has an adverse
2200
+ event is represented by 𝜇 and 𝜎, respectively. In that case, the normal distribution function related
2201
+ to age is as equation (23):
2202
+ 𝑓(𝑥) =
2203
+ 1
2204
+ √2𝜋σ𝛶 𝑒
2205
+ −1
2206
+ 2(𝑥−μ𝛶
2207
+ σ𝛶 )
2208
+ 2
2209
+
2210
+ (23)
2211
+ and so for patients who are taking medicine 𝛾, equation (17) for age range has to be met to
2212
+ minimize the adverse event (24):
2213
+ 𝑋𝜖 (𝜇𝛶 − 1.96 (
2214
+ 𝜎𝛶
2215
+ √𝑛) , 𝜇𝛶 + 1.96 (
2216
+ 𝜎𝛶
2217
+ √𝑛)) , 1 − 𝑎 = 95%, 𝑍0.975 = 1.96
2218
+ (24)
2219
+
2220
+ In this research, we used the rules related to the users’ features and the medicine rules and drug
2221
+ interactions we are also considering. In this regard, the drug interactions dataset was used to
2222
+ exclude recommendations for drugs having high interactions with other drugs.
2223
+
2224
+ 6- RESULTS AND DISCUSSION
2225
+ This section discusses our proposed drug recommendation system implementation and the newly
2226
+ generated datasets. First, we explain the extracted and newly generated datasets and then we will
2227
+ demonstrate the results of our implemented system.
2228
+
2229
+ The dataset
2230
+ As discussed in the proposed method, we used the information from two databases of drugs
2231
+ Druglib.com [7] and Drugs.com [5]. The first database Druglib.com is a comprehensive resource
2232
+ for drug information. For each drug, a variety of information such as description, side-effects, drug
2233
+ ratings & reviews by patients, and clinical pharmacology has been provided. Also, Drugs.com is
2234
+
2235
+ another database for drug information, and many recommendation systems have been suggested
2236
+ that use this database to build their models. Both the original and the revised version of Drugs.com
2237
+ have been used in RS to evaluate the performance of the approaches.
2238
+ We crawled these pharmaceutical websites to construct our intended datasets with the required
2239
+ features in a structured way. As a result, we gathered much useful information about drugs and
2240
+ patients’ conditions and collected them into three datasets as follows:
2241
+ -
2242
+ The first extracted dataset is the Rating dataset consists of patients’ features and their
2243
+ ratings on drugs consisting of 3294 samples.
2244
+ -
2245
+ The second dataset consists of Drug features containing drug categories, side effects, and
2246
+ benefits.
2247
+ -
2248
+ The last dataset is the Interaction dataset containing interactions between drugs.
2249
+ To evaluate the performance of our system, we used the most popular existing machine learning
2250
+ evaluation metrics. Accuracy, sensitivity (recall), specificity, and precision were the basic metrics
2251
+ that we applied to our model.
2252
+ We used 70 percent of the samples (2304 samples) in the dataset for training our model, 20 percent
2253
+ (660 samples) for evaluation, and 10 percent (330 samples) for the test.
2254
+ After obtaining the values for true positive (TP), false positive (FP), true negative (TN), and false
2255
+ negative (FN), different metrics can be calculated.
2256
+ We compared our results with the existing approaches in [27], [48], [57], [58], and [59]. We
2257
+ implemented the algorithms in these papers with the datasets they have applied.
2258
+ In [27], SVM and recurrent neural network (RNN) ve been used to recommend a drug to a patient.
2259
+ In [48] the authors first considered the clustering of drugs according to the drug information, like
2260
+ the algorithm proposed in this paper. Then collaborative filtering is used to recommend a drug.
2261
+ But unlike our work, they haven’t considered the classification of users and their features. Finally,
2262
+ in [57], an improved matrix factorization has been used, filters the results using NSGA-III to
2263
+ improve the accuracy, diversity, novelty, and recall.
2264
+ Table 12 represents the comparison results between our work and other drug recommendation
2265
+ systems in terms of important machine learning metrics.
2266
+
2267
+ TABLE 12: COMPARISON RESULT OF OUR PROPOSED RECOMMENDATION SYSTEM
2268
+ WITH OTHER STATE-OF-THE-ART APPROACHES
2269
+ F1-Measure
2270
+
2271
+ Precision
2272
+
2273
+ Specificity
2274
+
2275
+ Sensitivity
2276
+
2277
+ Accuracy
2278
+
2279
+
2280
+ 0.07
2281
+
2282
+ 0.04
2283
+
2284
+ 0.33
2285
+
2286
+ 0.75
2287
+
2288
+ 0.34
2289
+
2290
+ SVM[26]
2291
+
2292
+ 0.18
2293
+
2294
+ 0.31
2295
+
2296
+ 0.86
2297
+
2298
+ 0.13
2299
+
2300
+ 0.31
2301
+
2302
+ Neural Network [26]
2303
+
2304
+ 0.41
2305
+
2306
+ 0.32
2307
+
2308
+ 0.54
2309
+
2310
+ 0.61
2311
+
2312
+ 0.55
2313
+
2314
+ Kmeans User CF [48]
2315
+
2316
+ 0.39
2317
+
2318
+ 0.41
2319
+
2320
+ 0.66
2321
+
2322
+ 0.39
2323
+
2324
+ 0.63
2325
+
2326
+ NSGA III [57]
2327
+
2328
+ 0.38
2329
+
2330
+ 0.33
2331
+
2332
+ 0.49
2333
+
2334
+ 0.45
2335
+
2336
+ 0.48
2337
+
2338
+ Conventional MF [58]
2339
+
2340
+ 0.45
2341
+
2342
+ 0.36
2343
+
2344
+ 0.38
2345
+
2346
+ 0.60
2347
+
2348
+ 0.45
2349
+
2350
+ MLP [59]
2351
+
2352
+ 0.65
2353
+
2354
+ 0.62
2355
+
2356
+ 0.64
2357
+
2358
+ 0.69
2359
+
2360
+ 0.65
2361
+
2362
+ Proposed Method
2363
+
2364
+
2365
+ Comparison results consist of the F2 measure, ROC, and confusion matrix of different approaches
2366
+ depicted in Figures 6 to 8.
2367
+
2368
+
2369
+
2370
+
2371
+
2372
+
2373
+
2374
+
2375
+ Figure 6- Comparison result of F2 measure metric
2376
+
2377
+ 0
2378
+ 0.2
2379
+ 0.4
2380
+ 0.6
2381
+ F2 Measure
2382
+ SVM [26]
2383
+ Backpropagation [26]
2384
+ Kmeans CF [48]
2385
+ NSGA II [57]
2386
+ ConvMF [58]
2387
+ MLP [59]
2388
+ Proposed Method
2389
+
2390
+
2391
+ Figure 7- comparison result of ROC.
2392
+
2393
+
2394
+ Figure 8- comparison result of the confusion matrix.
2395
+
2396
+ ROC
2397
+ 10
2398
+ True Positive Rate
2399
+ 0.8
2400
+ 0.6
2401
+ 0.4
2402
+ ProposedMethod
2403
+ Backpropagation
2404
+ 0.2
2405
+ KmeansUserCF
2406
+ Conventional MF
2407
+ 0.0
2408
+ RandomClassifier
2409
+ 0.0
2410
+ 0.2
2411
+ 0.4
2412
+ 0.6
2413
+ 0.8
2414
+ 10
2415
+ FalsePositiveRateProposed Method
2416
+ 110
2417
+ 100
2418
+ S
2419
+ proper
2420
+ 108
2421
+ 47
2422
+ ActualLabels
2423
+ 90
2424
+ 80
2425
+ 70
2426
+ not proper
2427
+ 113
2428
+ 60
2429
+ 50
2430
+ PredictedLabelsConventional MF
2431
+ 100
2432
+ I Labels
2433
+ proper
2434
+ 53
2435
+ 90
2436
+ Actual
2437
+ 80
2438
+ not proper
2439
+ 105
2440
+ 108
2441
+ 70
2442
+ 60
2443
+ Predicted LabelsMLP
2444
+ 120
2445
+ 110
2446
+ Labels
2447
+ proper
2448
+ 73
2449
+ 47
2450
+ 100
2451
+ 06
2452
+ Actual
2453
+ 80
2454
+ not_proper
2455
+ 128
2456
+ 82
2457
+ 70
2458
+ 60
2459
+ F 50
2460
+ PredictedLabelsSVM
2461
+ 200
2462
+ 175
2463
+ Labels
2464
+ proper
2465
+ 10
2466
+ 5
2467
+ 150
2468
+ 125
2469
+ Actual
2470
+ 100
2471
+ 75
2472
+ not_proper
2473
+ 208
2474
+ 107
2475
+ 50
2476
+ 25
2477
+ PredictedLabels
2478
+ Figure 9 -Confusion matrix obtained for the proposed method.
2479
+
2480
+ The construction of a confusion matrix for different ratings is also shown in Figure 9. The
2481
+ predictions are compared with actual ratings of users, and drugs for the case when they are
2482
+ considered separately and combined according to our proposed approach.
2483
+ One of the important components of our recommender system is the final knowledge-based
2484
+ approach. This component prevents death, hospitalization, and disability by considering drug
2485
+ interactions and the user’s age. The adverse Events Dataset is used in this regard to our system's
2486
+ performance for recognizing such cases and recommending the appropriate drugs. This dataset
2487
+ contains 2486 samples, where 80% of them are used for rule extraction, and the remaining 20%
2488
+ are for the test.
2489
+
2490
+ JustUserRatings
2491
+ 160
2492
+ 140
2493
+ Labels
2494
+ proper
2495
+ 37
2496
+ 19
2497
+ 120
2498
+ 100
2499
+ Actual
2500
+ 80
2501
+ not proper
2502
+ 112
2503
+ 162
2504
+ 60
2505
+ 40
2506
+ 20
2507
+ PredictedLabelsustDrugRatings
2508
+ 180
2509
+ 160
2510
+ S
2511
+ proper
2512
+ 30
2513
+ 14
2514
+ 140
2515
+ Label
2516
+ 120
2517
+ Actual
2518
+ 100
2519
+ 80
2520
+ not proper
2521
+ 98
2522
+ 188
2523
+ 60
2524
+ 40
2525
+ F 20
2526
+ PredictedLabelsUsers&DrugRatings
2527
+ 110
2528
+ 100
2529
+ S
2530
+ proper
2531
+ 108
2532
+ 47
2533
+ Label
2534
+ 90
2535
+ Actual
2536
+ 80
2537
+ 70
2538
+ not proper
2539
+ 113
2540
+ 60
2541
+ 50
2542
+ PredictedLabelsThe following parameters are considered for the evaluation:
2543
+ 𝐷𝑒𝑎𝑡ℎ 𝑅𝑎𝑡𝑖𝑜 =
2544
+ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐷𝑒𝑎𝑡ℎ
2545
+ 𝑇𝑜𝑡𝑎𝑙 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑅𝑒𝑐𝑜𝑚𝑚𝑒𝑛𝑑𝑎𝑡𝑖𝑜𝑛
2546
+ 𝐷𝑖𝑠𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑅𝑎𝑡𝑖𝑜 =
2547
+ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐷𝑖𝑠𝑎𝑏𝑖𝑙𝑖𝑡𝑦
2548
+ 𝑇𝑜𝑡𝑎𝑙 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑅𝑒𝑐𝑜𝑚𝑚𝑒𝑛𝑑𝑎𝑡𝑖𝑜𝑛
2549
+ 𝐻𝑜𝑠𝑝𝑖𝑡𝑎𝑙𝑖𝑧𝑎𝑡𝑖𝑜𝑛 𝑅𝑎𝑡𝑖𝑜 =
2550
+ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐻𝑜𝑠𝑝𝑖𝑡𝑎𝑙𝑖𝑧𝑎𝑡𝑖𝑜𝑛
2551
+ 𝑇𝑜𝑡𝑎𝑙 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑅𝑒𝑐𝑜𝑚𝑚𝑒𝑛𝑑𝑎𝑡𝑖𝑜𝑛
2552
+ For comparison, the system's performance for different adverse events was calculated one time
2553
+ without a knowledge-based component and the second time using this component.
2554
+ Table 13 and Figure 10 represent the results of this comparison.
2555
+ TABLE 13- COMPARISON RESULTS OF KNOWLEDGE-BASED COMPONENT
2556
+ Adverse event
2557
+ Without knowledge-based
2558
+ component
2559
+ With knowledge-based
2560
+ component
2561
+ Death rate
2562
+ 44%
2563
+ 6%
2564
+ Hospitalization
2565
+ 15%
2566
+ 2%
2567
+ Disability
2568
+ 4%
2569
+ 0.7%
2570
+
2571
+ Knowledge-based component is an essential part of a drug recommendation system in reducing
2572
+ adverse events and improving the quality of recommendations.
2573
+
2574
+ Figure 10- Comparison result of adding knowledge-based in the recommendation system.
2575
+ We also considered one more important metric for recommender systems evaluations: hit rate.
2576
+ 0
2577
+ 10
2578
+ 20
2579
+ 30
2580
+ 40
2581
+ 50
2582
+ Death Rate
2583
+ Disability Rate
2584
+ Hospitalization Rate
2585
+ With Knowledge Base
2586
+ Without Knowledge base
2587
+
2588
+ The data set's testing samples (330) are utilized in hit-rate evaluation. The hit-rate in evaluation is
2589
+ calculated by the ratio of the total hits in the top 10 recommended drugs returned for all users and
2590
+ the total testing samples. So if 𝜂 is the number of relevant predicted drugs for all users, and 𝑁 is
2591
+ the total number of testing samples, according to [60], the hit-rate is calculated as equation (25):
2592
+ ℎ𝑖𝑡_𝑟𝑎𝑡𝑒 =
2593
+ 𝜂
2594
+ 𝑁 (25)
2595
+ The result of hit rate evaluation is represented in Figure 11. As it can be seen from this figure, our
2596
+ proposed approach has the ℎ𝑖𝑡 𝑟𝑎𝑡𝑒 = 0.49, which is better than all other approaches.
2597
+
2598
+
2599
+ Figure 11- Top-10 hit-rate recommendation systems.
2600
+
2601
+ The next evaluation metric is cumulative hit-rate, which represents the number of hits with ratings
2602
+ above a given threshold and ignores the predicted ratings lower than the threshold. The result of
2603
+ the cumulative hit-rate with the threshold set to 4 is shown in Figure 12. The cumulative hit-rate
2604
+ is calculated as (26):
2605
+ 𝐶𝑢𝑚𝑢𝑙𝑎𝑡𝑖𝑣𝑒 𝐻𝑖𝑡 − 𝑅𝑎𝑡𝑒 =
2606
+ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 ℎ𝑖𝑡𝑠 𝑤𝑖𝑡ℎ 𝑟𝑎𝑡𝑖𝑛𝑔 𝑎𝑏𝑜𝑣𝑒 𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑
2607
+ 𝑁
2608
+
2609
+ (26)
2610
+ The utilization of this threshold makes a better match with the user’s interest in the recommended
2611
+ drug.
2612
+ 0
2613
+ 0.1
2614
+ 0.2
2615
+ 0.3
2616
+ 0.4
2617
+ 0.5
2618
+ 0.6
2619
+ Top-10 Hit Rate
2620
+ SVM [26]
2621
+ NeuralNetwork [26]
2622
+ Kmeans Used CF [48]
2623
+ NSGA III [57]
2624
+ Conventional MF [58]
2625
+ MLP [59]
2626
+ Proposed Method
2627
+
2628
+
2629
+ Figure 12- Top-10 cumulative hit-rate of recommendation systems.
2630
+
2631
+ Our results are encouraging in the field of drug recommendations. It has combined the benefits of
2632
+ basic recommender approaches with less computational overhead through a novel modeling
2633
+ approach and using statistical methods. It also classifies drugs and users in terms of their features,
2634
+ leading to high accuracy compared to state-of-the-art algorithms. However, better results can be
2635
+ achieved by considering the characteristics of diseases and recommending drugs based on disease
2636
+ features in addition to the features of patients and drugs.
2637
+ 7- CONCLUSION
2638
+ In this paper, we proposed a comprehensive drug recommender system that takes advantage of all
2639
+ basic recommender system techniques and applies natural language processing, neural network-
2640
+ based matrix factorization, and, more importantly, employing knowledge-based recommendations
2641
+ to recommend the most accurate drugs to patients. Compared with conventional matrix
2642
+ factorization, our proposed method improves the accuracy, sensitivity, and hit rate by 26%, 34%,
2643
+ and 40%, respectively. In comparison with other machine learning approaches, we obtained an
2644
+ accuracy, sensitivity, and hit rate by an average of 31%, 29%, and 28%, respectively. Our approach
2645
+ can be used as an adjunct tool torecommend drugs to patients and improve the quality of
2646
+ prescriptions and reduce the errors caused by medical practitioners.
2647
+ 0
2648
+ 0.05
2649
+ 0.1
2650
+ 0.15
2651
+ 0.2
2652
+ 0.25
2653
+ 0.3
2654
+ 0.35
2655
+ Top-10 Cumulative Hit Rate
2656
+ SVM [26]
2657
+ NeuralNetwork [26]
2658
+ Kmeans Used CF [48]
2659
+ NSGA III [57]
2660
+ Conventional MF [68]
2661
+ MLP [59]
2662
+ Proposed Method
2663
+
2664
+ In the future, we will extend the knowledge and information extraction from drug databases and
2665
+ include all existing patient features in the user features. Also, we are going to consider the features
2666
+ of the disease in the recommendation. These features can be captured by general practitioners and
2667
+ help improve the proposed drug recommender system performance and make more accurate
2668
+ recommendations by having more relevant features. In the final output of the recommendation, we
2669
+ also include the dosage and effectiveness of a drug in addition to the list of drugs. Also, in our
2670
+ future work, we will extract the information from other drug resources like the SIDER database
2671
+ for drug side effects.
2672
+ At the end, it should be noted that a physician should approve the recommended medicines for
2673
+ safety reasons.
2674
+
2675
+ Data availability
2676
+ The
2677
+ datasets
2678
+ generated
2679
+ during
2680
+ the
2681
+ current
2682
+ study
2683
+ are
2684
+ available
2685
+ in
2686
+ the
2687
+ https://github.com/DatasetsLibrary/RECOMMED repositories. In addition, preprocessed datasets and
2688
+ source code of this study are also available at https://github.com/DatasetsLibrary/RECOMMEDTool.
2689
+
2690
+ REFERENCES
2691
+ 1. McNee, Sean Michael. Meeting user information needs in recommender systems. University of
2692
+ Minnesota, 2006.
2693
+ 2. Pérez-Gallardo, Y., Alor-Hernández, G., Cortes-Robles, G., & Rodríguez-González, A. (2013).
2694
+ Collective intelligence as mechanism of medical diagnosis: The iPixel approach. Expert
2695
+ Systems with Applications, 40(7), 2726-2737.
2696
+ 3. Bennett, James, et al. "Kdd cup and workshop 2007." ACM SIGKDD Explorations
2697
+ Newsletter 9.2 (2007): 51-52.
2698
+ 4. Anderson, James G., and Kathleen Abrahamson. "Your Health Care May Kill You: Medical
2699
+ Errors." ITCH. 2017.
2700
+ 5. Drugs.com. https://www.drugs.com/support/about.html.
2701
+ 6. Burke, R., & Ramezani, M. (2011). Matching recommendation technologies and domains.
2702
+ In Recommender systems handbook (pp. 367-386). Springer, Boston, MA.
2703
+ 7. Druglib.com - Drug Information, Research, Clinical Trials, News
2704
+
2705
+ 8. Falk, Kim. Practical recommender systems. Simon and Schuster, 2019.
2706
+ 9. Ning, X., Desrosiers, C. and Karypis, G., 2015. A comprehensive survey of neighborhood-based
2707
+ recommendation methods. Recommender systems handbook, pp.37-76.
2708
+ 10. Lops, Pasquale, Marco de Gemmis, and Giovanni Semeraro. "Content-based recommender
2709
+ systems: State of the art and trends." Recommender systems handbook (2011): 73-105.
2710
+ 11. Burke, R., 2002. Hybrid recommender systems: Survey and experiments. User modeling and
2711
+ user-adapted interaction, 12(4), pp.331-370.
2712
+ 12. Zhang, Shuai, et al. "Deep learning based recommender system: A survey and new
2713
+ perspectives." ACM Computing Surveys (CSUR) 52.1 (2019): 1-38.
2714
+ 13. Singhal, A., Sinha, P. and Pant, R., 2017. Use of deep learning in modern recommendation
2715
+ system: A summary of recent works. arXiv preprint arXiv:1712.07525.
2716
+ 14. Hao, X., Zhike, H. and Yichen, S., 2020. ClothNet: A Neural Network Based Recommender
2717
+ System. Fuzzy Systems and Data Mining VI: Proceedings of FSDM 2020, 331, p.261.
2718
+ 15. Zhou, X., Li, Y. and Liang, W., 2020. CNN-RNN based intelligent recommendation for online
2719
+ medical pre-diagnosis support. IEEE/ACM Transactions on Computational Biology and
2720
+ Bioinformatics, 18(3), pp.912-921.
2721
+ 16. Cheng, H.T., Koc, L., Harmsen, J., Shaked, T., Chandra, T., Aradhye, H., Anderson, G.,
2722
+ Corrado, G., Chai, W., Ispir, M. and Anil, R., 2016, September. Wide & deep learning for
2723
+ recommender systems. In Proceedings of the 1st workshop on deep learning for recommender
2724
+ systems (pp. 7-10).
2725
+ 17. Lu, J., Wu, D., Mao, M., Wang, W. and Zhang, G., 2015. Recommender system application
2726
+ developments: a survey. Decision Support Systems, 74, pp.12-32.
2727
+ 18. Fagius, Jan, et al. "Guillain-Barré syndrome following zimeldine treatment." Journal of
2728
+ Neurology, Neurosurgery & Psychiatry 48.1 (1985): 65-69.
2729
+ 19. Milossi, M., Alexandropoulou-Egyptiadou, E., & Psannis, K. E. (2021). AI Ethics: Algorithmic
2730
+ Determinism or Self-Determination? The GPDR Approach. IEEE Access, 9, 58455-58466
2731
+ 20. Price, W., and I. I. Nicholson. "Artificial intelligence in the medical system: four roles for
2732
+ potential transformation." Yale JL & Tech. 21 (2019): 122.
2733
+ 21. Stark, Benjamin, et al. "A literature review on medicine recommender systems." International
2734
+ Journal of Advanced Computer Science and Applications (IJACSA) 10.8 (2019): 6-13.
2735
+ 22. Sheridan, P., Onsjö, M., Becerra, C., Jimenez, S., & Dueñas, G. (2019). An Ontology-Based
2736
+ Recommender System with an Application to the Star Trek Television Franchise. Future
2737
+ Internet, 11(9), 182.
2738
+
2739
+ 23. Roui, Mohammad Beheshti, Mariam Zomorodi, Masoomeh Sarvelayati, Moloud Abdar, Hamid
2740
+ Noori, Paweł Pławiak, Ryszard Tadeusiewicz et al. "A novel approach based on genetic
2741
+ algorithm to speed up the discovery of classification rules on GPUs." Knowledge-Based
2742
+ Systems 231 (2021): 107419.
2743
+ 24. Abdar, M., and Mariam Zomorodi-Moghadam. "Impact of patients’ gender on parkinson’s
2744
+ disease using classification algorithms." Journal of AI and Data Mining 6, no. 2 (2018): 277-
2745
+ 285.
2746
+ 25. Hossain, Md Deloar, Md Shafiul Azam, Md Jahan Ali, and Hakilo Sabit. "Drugs rating
2747
+ generation and recommendation from sentiment analysis of drug reviews using machine
2748
+ learning." In 2020 Emerging Technology in Computing, Communication and Electronics
2749
+ (ETCCE), pp. 1-6. IEEE, 2020.
2750
+ 26. Komal Kumar, N., and D. Vigneswari. "A drug recommendation system for multi-disease in
2751
+ health care using machine learning." In Advances in Communication and Computational
2752
+ Technology, pp. 1-12. Springer, Singapore, 2021.
2753
+ 27. Bao, Youjun, and Xiaohong Jiang. "An intelligent medicine recommender system
2754
+ framework." 2016 IEEE 11Th conference on industrial electronics and applications (ICIEA).
2755
+ IEEE, 2016.
2756
+ 28. Basiri, Mohammad Ehsan, et al. "A novel method for sentiment classification of drug reviews
2757
+ using fusion of deep and machine learning techniques." Knowledge-Based Systems 198 (2020):
2758
+ 105949.
2759
+ 29. Gräßer, F., Kallumadi, S., Malberg, H., & Zaunseder, S. (2018, April). Aspect-based sentiment
2760
+ analysis of drug reviews applying cross-domain and cross-data learning. In Proceedings of the
2761
+ 2018 International Conference on Digital Health (pp. 121-125).
2762
+ 30. Hossain, Md Deloar, et al. "Drugs Rating Generation and Recommendation from Sentiment
2763
+ Analysis of Drug Reviews using Machine Learning." 2020 Emerging Technology in
2764
+ Computing, Communication and Electronics (ETCCE). IEEE, 2020.
2765
+ 31. Colón-Ruiz, C., & Segura-Bedmar, I. (2020). Comparing deep learning architectures for
2766
+ sentiment analysis on drug reviews. Journal of Biomedical Informatics, 110, 103539.
2767
+ 32. Garg, S. (2021, January). Drug recommendation system based on sentiment analysis of drug
2768
+ reviews using machine learning. In 2021 11th International Conference on Cloud Computing,
2769
+ Data Science & Engineering (Confluence) (pp. 175-181). IEEE.
2770
+ 33. Noferesti, Samira, and Mehrnoush Shamsfard. "Resource construction and evaluation for
2771
+ indirect opinion mining of drug reviews." PloS one 10.5 (2015): e0124993.
2772
+
2773
+ 34. Ting, S. L., et al. "A hybrid knowledge-based approach to supporting the medical prescription
2774
+ for general practitioners: Real case in a Hong Kong medical center." Knowledge-Based
2775
+ Systems 24.3 (2011): 444-456.
2776
+ 35. Chen, R. C., Chiu, J. Y., & Batj, C. T. (2011, July). The recommendation of medicines based
2777
+ on multiple criteria decision making and domain ontology—An example of anti-diabetic
2778
+ medicines. In 2011 International Conference on Machine Learning and Cybernetics (Vol. 1, pp.
2779
+ 27-32). IEEE.
2780
+ 36. L. Brandão, F.P. Belfo, A. Silva, Wavelet-based cancer drug recommender system, Procedia
2781
+ Comput Sci, Elsevier, vol. 181, 2021, pp. 487-494, 10.1016/j.procs.2021.01.194
2782
+ 37. Hamed, A. A., Roose, R., Branicki, M., and Rubin, A. 2012. T-Recs: Time-aware Twitter-based
2783
+ Drug Recommender System. 2012 IEEE/ACM International Conference on Advances in Social
2784
+ Networks Analysis and Mining.
2785
+ 38. A. Aliper, S. Plis, A. Artemov, A. Ulloa, P.Mamoshina, A. Zhavoronkov, Deeplearning
2786
+ applications for predicting pharmacological properties of drug repuposing using transcript data,
2787
+ MoL Pharm, 13 (7)(2016), pp. 2524-2530
2788
+ 39. Chen, R.-C., Huang, Y.-H., Bau, C.-T., and Chen, S.-M. 2012. A recommendation system based
2789
+ on domain ontology and SWRL for antidiabetic drugs selection. Expert Systems with
2790
+ Applications 39, 4, 3995–4006.
2791
+ 40. Guo, W. Y. 2008. Reasoning with semantic web technologies in ubiquitous computing
2792
+ environment. Journal of Software 3, 8, 27–33.
2793
+ 41. Mahmoud, N. and Elbeh, H. 2016. IRS-T2D. Individualize Recommendation System for Type2
2794
+ Diabetes Medication Based on Ontology and SWRL. In Proceedings of the 10th International
2795
+ Conference on Informatics and Systems - INFOS '16. ACM Press, New York, New York, USA,
2796
+ 203–209. DOI=10.1145/2908446.2908495.
2797
+ 42. Doulaverakis, C., Nikolaidis, G., Kleontas, A., and Kompatsiaris, I. 2012. GalenOWL:
2798
+ Ontology-based drug recommendations discovery. Journal of Biomedical Semantics 3, 14.
2799
+ 43. Doulaverakis, C., Nikolaidis, G., Kleontas, A., and Kompatsiaris, I. 2014. Panacea, a semantic-
2800
+ enabled drug recommendations discovery framework. Journal of Biomedical Semantics 5, 13.
2801
+ 44. Rodríguez, A., Jiménez, E., Fernández, J., Eccius, M., Gómez, J. M., Alor-Hernandez, G.,
2802
+ Posada-Gomez, R., and Laufer, C. 2009. SemMed: Applying Semantic Web to Medical
2803
+ Recommendation Systems. 2009 First International Conference on Intensive Applications and
2804
+ Services.
2805
+ 45. Kushwaha, N., Goyal, R., Goel, P., Singla, S., and Vyas, O. P. 2014. LOD Cloud Mining for
2806
+ Prognosis Model(Case Study. Native App for Drug Recommender System). AIT 04, 03, 20–28.
2807
+
2808
+ 46. Medvedeva, O., Knox, T., and Paul, J. 2007. DiaTrack. Web-based application for assisted
2809
+ decision-making in treatment of diabetes. Journal of Computing Sciences in Colleges 23, 1,
2810
+ 154–161.
2811
+ 47. Zhang, Q., Zhang, G., Lu, J., and Wu, D. 2015. A framework of hybrid recommender system
2812
+ for personalized clinical prescription. 2015 International Conference on Intelligent Systems and
2813
+ Knowledge Engineering.
2814
+ 48. Zhang, Y., Zhang, D., Hassan, M. M., Alamri, A., and Peng, L. 2015. CADRE. Cloud-Assisted
2815
+ Drug REcommendation Service for Online Pharmacies. Mobile Netw Appl 20, 3, 348–355.
2816
+ 49. Sun, L., Liu, C., Guo, C., Xiong, H., and Xie, Y. 2016. Data-driven Automatic Treatment
2817
+ Regimen Development and Recommendation. KDD '16 Proceedings of the 22nd ACM
2818
+ SIGKDD International Conference on Knowledge Discovery and Data Mining, 1865–1874.
2819
+ 50. Kuhn, M., Letunic, I., Jensen, L.J. and Bork, P., 2016. The SIDER database of drugs and side
2820
+ effects. Nucleic acids research, 44(D1), pp.D1075-D1079.
2821
+ 51. Beregovskaya, I. and Koroteev, M., 2021. Review of Clustering-Based Recommender
2822
+ Systems. arXiv preprint arXiv:2109.12839.
2823
+ 52. Tian, Y., Zheng, B., Wang, Y., Zhang, Y. and Wu, Q., 2019. College library personalized
2824
+ recommendation system based on hybrid recommendation algorithm. Procedia CIRP, 83,
2825
+ pp.490-494.
2826
+ 53. Sun, Z. and Luo, N., 2010, August. A new user-based collaborative filtering algorithm
2827
+ combining data-distribution. In 2010 International Conference of Information Science and
2828
+ Management Engineering (Vol. 2, pp. 19-23). IEEE.
2829
+ 54. K. P. Sinaga and M. -S. Yang, "Unsupervised K-Means Clustering Algorithm," in IEEE Access,
2830
+ vol. 8, pp. 80716-80727, 2020, doi: 10.1109/ACCESS.2020.2988796.
2831
+ 55. M.-S. Yang, C.-Y. Lai, and C.-Y. Lin, ‘‘A robust EM clustering algorithm for Gaussian mixture
2832
+ models,’’ Pattern Recognit., vol. 45, no. 11, pp. 3950–3961, Nov. 2012
2833
+ 56. Koren, Y., Bell, R. and Volinsky, C., 2009. Matrix factorization techniques for recommender
2834
+ systems. Computer, 42(8), pp.30-37.
2835
+ 57. Zhihua Cui, Peng Zhao, Zhaoming Hu, Xingjuan Cai, Wensheng Zhang , Jinjun Chen, An
2836
+ improved matrix factorization based model for many-objective optimization recommendation,
2837
+ Informatic Science Elsevier, 2021
2838
+ 58. Ivan Carrera, Eduardo Tejera and Ines Dutra, Simple Matrix Factorization Collaborative
2839
+ Filtering for Drug Repositioning on Cell Lines, In Proceedings of the 14th International Joint
2840
+ Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2021) - Volume
2841
+ 5
2842
+
2843
+ 59. A. Aliper, S. Plis, A. Artemov, A. Ulloa, P.Mamoshina, A. Zhavoronkov, Deep learning
2844
+ applications for predicting pharmacological properties of drugs and drug repurposing using
2845
+ transcriptomic data, Molecular pharmaceutics, 13 (7)(2016), pp. 2524-2530
2846
+ 60. Dashpand Mukund, and George Karypis. “item-based top-n recommendation algorithms.”
2847
+ ACM Transactions on Informatics Systems (TOIS), 22.1 2004: 143-177
2848
+
2849
+
4tAyT4oBgHgl3EQfcPfW/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tE3T4oBgHgl3EQfpQqt/content/2301.04641v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2ffc4f6eba12d2679762bd0324c937f460376bb52e6961391c22752943203c8e
3
+ size 624162
5tE3T4oBgHgl3EQfpQqt/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bc151dcca11edcd8683ff18a344b8493d5b51d401d58dd7d9473c4209c1fcb0d
3
+ size 4587565
6tE4T4oBgHgl3EQf1w38/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2d5e5e47a17d1712dfea42d96c7e65cdec3cc2046d10fa6b7dadc9d06de66264
3
+ size 145891
79E3T4oBgHgl3EQfqQqR/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7f18243a2ef17222d12b6e448b4b1b40c9aeeeac626cbe00272e5078049d2c6c
3
+ size 4259885
79E3T4oBgHgl3EQfqQqR/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3ffb661275131255e2e97efb8bd4aaf80e6759c8618e20d58abc8a9692fae044
3
+ size 151041
7dFJT4oBgHgl3EQfmywg/content/tmp_files/2301.11588v1.pdf.txt ADDED
@@ -0,0 +1,3313 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Distributionally Robust Multi-objective Bayesian Optimization under
2
+ Uncertain Environments
3
+ Yu Inatsu1,∗
4
+ Ichiro Takeuchi2,3
5
+ 1 Department of Computer Science, Nagoya Institute of Technology
6
+ 2 Department of Mechanical Systems Engineering, Nagoya University
7
+ 3 RIKEN Center for Advanced Intelligence Project
8
+ ∗ E-mail: inatsu.yu@nitech.ac.jp
9
+ ABSTRACT
10
+ In this study, we address the problem of optimizing multi-output black-box functions under uncertain
11
+ environments.
12
+ We formulate this problem as the estimation of the uncertain Pareto-frontier (PF) of a
13
+ multi-output Bayesian surrogate model with two types of variables: design variables and environmental
14
+ variables.
15
+ We consider this problem within the context of Bayesian optimization (BO) under uncertain
16
+ environments, where the design variables are controllable, whereas the environmental variables are assumed
17
+ to be random and not controllable. The challenge of this problem is to robustly estimate the PF when the
18
+ distribution of the environmental variables is unknown, that is, to estimate the PF when the environmental
19
+ variables are generated from the worst possible distribution.
20
+ We propose a method for solving the BO
21
+ problem by appropriately incorporating the uncertainties of the environmental variables and their probability
22
+ distribution.
23
+ We demonstrate that the proposed method can find an arbitrarily accurate PF with high
24
+ probability in a finite number of iterations.
25
+ We also evaluate the performance of the proposed method
26
+ through numerical experiments.
27
+ 1. Introduction
28
+ In many industrial applications, we encounter the problem of optimizing the multi-output black-box function
29
+ under uncertain environments. For example, in the problem of optimizing growing conditions for crops, we want
30
+ to optimize several conditions such as fertilizer levels to maximize crop quality and yield under an uncertain
31
+ environment such as weather conditions.
32
+ To formulate this problem, let f (1)(x, w) and f (2)(x, w) be a pair of outputs of a black-box function that
33
+ we want to simultaneously maximize, where x ∈ X and w ∈ Ω are the design variables (such as fertilizer levels)
34
+ and environmental variables (such as weather conditions) defined in domains X and Ω, respectively, where the
35
+ former is controllable and the latter is not. To characterize the uncertainty of the environmental variables w,
36
+ we assume that it is sampled from an unknown probability distribution, P †. Because we do not know P †, we
37
+ consider the case where we know only A, which is a family of candidate distributions for w.
38
+ This study aims to identify a distributionally robust Pareto-frontier (DR-PF) in the above setting, which is
39
+ formulated as a PF of the following two functions:
40
+ F (1)(x) =
41
+ inf
42
+ p(w)∈A
43
+
44
+
45
+ f (1)(x, w)p(w)dw,
46
+ F (2)(x) =
47
+ inf
48
+ p(w)∈A
49
+
50
+
51
+ f (2)(x, w)p(w)dw.
52
+ Figure 1 shows an example of the problem setup.
53
+ To identify a DR-PF, it is necessary to predict it and quantify its uncertainty. In this study, under the
54
+ assumption that f (1)(x, w) and f (2)(x, w) follow a Gaussian process (GP), we developed a Bayesian optimization
55
+ (BO) method to find a lower bound of the DR-PF by considering the uncertainty of environmental variables w
56
+ and the uncertainty of the probability distribution for w. Specifically, we propose an acquisition function (AF)
57
+ that enables us to sequentially select the controllable design variable x in a sample-efficient manner to obtain
58
+ the DR-PF.
59
+ To this end, various technical challenges need to be resolved. One difficulty is that, even when f (1)(x, w)
60
+ and f (2)(x, w) are GPs, F (1)(x) and F (2)(x) are not GPs anymore. Therefore, we derive a non-trivial credible
61
+ intervals of F (1)(x) and F (2)(x) considering that they are defined as the infima of integrated GPs. Furthermore,
62
+ although a naive formulation of multi-objective BOs is computationally expensive, the proposed AF has the
63
+ advantage that it can be evaluated efficiently. We also conducted a theoretical analysis of the proposed BO
64
+ method to prove that the proposed BO method can find an arbitrarily accurate DR-PF with a high probability
65
+ in a finite number of iterations under mild conditions.
66
+ 1.1. Related Work
67
+ For black-box function optimization problems, BOs have been popularly used [Settles, 2009, Shahriari et al., 2016]
68
+ in which GP [Williams and Rasmussen, 2006] is often employed as a surrogate model. An optimization problem
69
+ 1
70
+ arXiv:2301.11588v1 [stat.ML] 27 Jan 2023
71
+
72
+ Multi-objective function
73
+ � �, � = � � �, � , � � �, �
74
+ (a)
75
+ Objective function 1
76
+ x
77
+ w
78
+ -4
79
+ -2
80
+ 0
81
+ 2
82
+ 4
83
+ -4
84
+ -2
85
+ 0
86
+ 2
87
+ 4
88
+ 0
89
+ 5
90
+ 10
91
+ 15
92
+ 20
93
+ 25
94
+ 30
95
+ 35
96
+ 40
97
+ Objective function 2
98
+ x
99
+ w
100
+ -4
101
+ -2
102
+ 0
103
+ 2
104
+ 4
105
+ -4
106
+ -2
107
+ 0
108
+ 2
109
+ 4
110
+ 0
111
+ 10
112
+ 20
113
+ 30
114
+ 40
115
+ 50
116
+ 60
117
+ 70
118
+ 80
119
+ (b)
120
+ Candidate distributions of
121
+ -4
122
+ -2
123
+ 0
124
+ 2
125
+ 4
126
+ 0.0
127
+ 0.1
128
+ 0.2
129
+ 0.3
130
+ 0.4
131
+ Candidate distribution of w
132
+ w
133
+ Density
134
+ -4
135
+ -2
136
+ 0
137
+ 2
138
+ 4
139
+ 0.0
140
+ 0.1
141
+ 0.2
142
+ 0.3
143
+ 0.4
144
+ Candidate distribution of w
145
+ w
146
+ Density
147
+ -4
148
+ -2
149
+ 0
150
+ 2
151
+ 4
152
+ 0.0
153
+ 0.1
154
+ 0.2
155
+ 0.3
156
+ 0.4
157
+ Candidate distribution of w
158
+ w
159
+ Density
160
+
161
+
162
+
163
+
164
+
165
+
166
+ ・��・
167
+
168
+
169
+ ・・・
170
+
171
+
172
+ ・・・
173
+
174
+ (c)
175
+ Expected value of � � (�, �)
176
+ Expected value of � � (�, �)
177
+ Candidate Pareto-frontiers
178
+ Distributionally robust
179
+ Pareto-frontier
180
+ 0
181
+ 1
182
+ 2
183
+ 3
184
+ 4
185
+ 0
186
+ 1
187
+ 2
188
+ 3
189
+ 4
190
+ 5
191
+ 6
192
+ 0
193
+ 1
194
+ 2
195
+ 3
196
+ 4
197
+ 0
198
+ 1
199
+ 2
200
+ 3
201
+ 4
202
+ 5
203
+ 6
204
+ 0
205
+ 1
206
+ 2
207
+ 3
208
+ 4
209
+ 0
210
+ 1
211
+ 2
212
+ 3
213
+ 4
214
+ 5
215
+ 6
216
+ 0
217
+ 1
218
+ 2
219
+ 3
220
+ 4
221
+ 0
222
+ 1
223
+ 2
224
+ 3
225
+ 4
226
+ 5
227
+ 6
228
+ 0
229
+ 1
230
+ 2
231
+ 3
232
+ 4
233
+ 0
234
+ 1
235
+ 2
236
+ 3
237
+ 4
238
+ 5
239
+ 6
240
+ 0
241
+ 1
242
+ 2
243
+ 3
244
+ 4
245
+ 0
246
+ 1
247
+ 2
248
+ 3
249
+ 4
250
+ 5
251
+ 6
252
+ 0
253
+ 1
254
+ 2
255
+ 3
256
+ 4
257
+ 0
258
+ 1
259
+ 2
260
+ 3
261
+ 4
262
+ 5
263
+ 6
264
+ 0
265
+ 1
266
+ 2
267
+ 3
268
+ 4
269
+ 0
270
+ 1
271
+ 2
272
+ 3
273
+ 4
274
+ 5
275
+ 6
276
+ 0
277
+ 1
278
+ 2
279
+ 3
280
+ 4
281
+ 0
282
+ 1
283
+ 2
284
+ 3
285
+ 4
286
+ 5
287
+ 6
288
+ 0
289
+ 1
290
+ 2
291
+ 3
292
+ 4
293
+ 0
294
+ 1
295
+ 2
296
+ 3
297
+ 4
298
+ 5
299
+ 6
300
+ 0
301
+ 1
302
+ 2
303
+ 3
304
+ 4
305
+ 0
306
+ 1
307
+ 2
308
+ 3
309
+ 4
310
+ 5
311
+ 6
312
+ 0
313
+ 1
314
+ 2
315
+ 3
316
+ 4
317
+ 0
318
+ 1
319
+ 2
320
+ 3
321
+ 4
322
+ 5
323
+ 6
324
+ 0
325
+ 1
326
+ 2
327
+ 3
328
+ 4
329
+ 0
330
+ 1
331
+ 2
332
+ 3
333
+ 4
334
+ 5
335
+ 6
336
+ 0
337
+ 1
338
+ 2
339
+ 3
340
+ 4
341
+ 0
342
+ 1
343
+ 2
344
+ 3
345
+ 4
346
+ 5
347
+ 6
348
+ 0
349
+ 1
350
+ 2
351
+ 3
352
+ 4
353
+ 0
354
+ 1
355
+ 2
356
+ 3
357
+ 4
358
+ 5
359
+ 6
360
+ 0
361
+ 1
362
+ 2
363
+ 3
364
+ 4
365
+ 0
366
+ 1
367
+ 2
368
+ 3
369
+ 4
370
+ 5
371
+ 6
372
+ 0
373
+ 1
374
+ 2
375
+ 3
376
+ 4
377
+ 0
378
+ 1
379
+ 2
380
+ 3
381
+ 4
382
+ 5
383
+ 6
384
+ 0
385
+ 1
386
+ 2
387
+ 3
388
+ 4
389
+ 0
390
+ 1
391
+ 2
392
+ 3
393
+ 4
394
+ 5
395
+ 6
396
+ 0
397
+ 1
398
+ 2
399
+ 3
400
+ 4
401
+ 0
402
+ 1
403
+ 2
404
+ 3
405
+ 4
406
+ 5
407
+ 6
408
+ 0
409
+ 1
410
+ 2
411
+ 3
412
+ 4
413
+ 0
414
+ 1
415
+ 2
416
+ 3
417
+ 4
418
+ 5
419
+ 6
420
+ 0
421
+ 1
422
+ 2
423
+ 3
424
+ 4
425
+ 0
426
+ 1
427
+ 2
428
+ 3
429
+ 4
430
+ 5
431
+ 6
432
+ 0
433
+ 1
434
+ 2
435
+ 3
436
+ 4
437
+ 0
438
+ 1
439
+ 2
440
+ 3
441
+ 4
442
+ 5
443
+ 6
444
+ 0
445
+ 1
446
+ 2
447
+ 3
448
+ 4
449
+ 0
450
+ 1
451
+ 2
452
+ 3
453
+ 4
454
+ 5
455
+ 6
456
+ 0
457
+ 1
458
+ 2
459
+ 3
460
+ 4
461
+ 0
462
+ 1
463
+ 2
464
+ 3
465
+ 4
466
+ 5
467
+ 6
468
+ 0
469
+ 1
470
+ 2
471
+ 3
472
+ 4
473
+ 0
474
+ 1
475
+ 2
476
+ 3
477
+ 4
478
+ 5
479
+ 6
480
+ 0
481
+ 1
482
+ 2
483
+ 3
484
+ 4
485
+ 0
486
+ 1
487
+ 2
488
+ 3
489
+ 4
490
+ 5
491
+ 6
492
+ 0
493
+ 1
494
+ 2
495
+ 3
496
+ 4
497
+ 0
498
+ 1
499
+ 2
500
+ 3
501
+ 4
502
+ 5
503
+ 6
504
+ 0
505
+ 1
506
+ 2
507
+ 3
508
+ 4
509
+ 0
510
+ 1
511
+ 2
512
+ 3
513
+ 4
514
+ 5
515
+ 6
516
+ 0
517
+ 1
518
+ 2
519
+ 3
520
+ 4
521
+ 0
522
+ 1
523
+ 2
524
+ 3
525
+ 4
526
+ 5
527
+ 6
528
+ 0
529
+ 1
530
+ 2
531
+ 3
532
+ 4
533
+ 0
534
+ 1
535
+ 2
536
+ 3
537
+ 4
538
+ 5
539
+ 6
540
+ 0
541
+ 1
542
+ 2
543
+ 3
544
+ 4
545
+ 0
546
+ 1
547
+ 2
548
+ 3
549
+ 4
550
+ 5
551
+ 6
552
+ 0
553
+ 1
554
+ 2
555
+ 3
556
+ 4
557
+ 0
558
+ 1
559
+ 2
560
+ 3
561
+ 4
562
+ 5
563
+ 6
564
+ 0
565
+ 1
566
+ 2
567
+ 3
568
+ 4
569
+ 0
570
+ 1
571
+ 2
572
+ 3
573
+ 4
574
+ 5
575
+ 6
576
+ 0
577
+ 1
578
+ 2
579
+ 3
580
+ 4
581
+ 0
582
+ 1
583
+ 2
584
+ 3
585
+ 4
586
+ 5
587
+ 6
588
+ 0
589
+ 1
590
+ 2
591
+ 3
592
+ 4
593
+ 0
594
+ 1
595
+ 2
596
+ 3
597
+ 4
598
+ 5
599
+ 6
600
+ 0
601
+ 1
602
+ 2
603
+ 3
604
+ 4
605
+ 0
606
+ 1
607
+ 2
608
+ 3
609
+ 4
610
+ 5
611
+ 6
612
+ 0
613
+ 1
614
+ 2
615
+ 3
616
+ 4
617
+ 0
618
+ 1
619
+ 2
620
+ 3
621
+ 4
622
+ 5
623
+ 6
624
+ 0
625
+ 1
626
+ 2
627
+ 3
628
+ 4
629
+ 0
630
+ 1
631
+ 2
632
+ 3
633
+ 4
634
+ 5
635
+ 6
636
+ 0
637
+ 1
638
+ 2
639
+ 3
640
+ 4
641
+ 0
642
+ 1
643
+ 2
644
+ 3
645
+ 4
646
+ 5
647
+ 6
648
+ 0
649
+ 1
650
+ 2
651
+ 3
652
+ 4
653
+ 0
654
+ 1
655
+ 2
656
+ 3
657
+ 4
658
+ 5
659
+ 6
660
+ 0
661
+ 1
662
+ 2
663
+ 3
664
+ 4
665
+ 0
666
+ 1
667
+ 2
668
+ 3
669
+ 4
670
+ 5
671
+ 6
672
+ 0
673
+ 1
674
+ 2
675
+ 3
676
+ 4
677
+ 0
678
+ 1
679
+ 2
680
+ 3
681
+ 4
682
+ 5
683
+ 6
684
+ 0
685
+ 1
686
+ 2
687
+ 3
688
+ 4
689
+ 0
690
+ 1
691
+ 2
692
+ 3
693
+ 4
694
+ 5
695
+ 6
696
+ 0
697
+ 1
698
+ 2
699
+ 3
700
+ 4
701
+ 0
702
+ 1
703
+ 2
704
+ 3
705
+ 4
706
+ 5
707
+ 6
708
+ 0
709
+ 1
710
+ 2
711
+ 3
712
+ 4
713
+ 0
714
+ 1
715
+ 2
716
+ 3
717
+ 4
718
+ 5
719
+ 6
720
+ 0
721
+ 1
722
+ 2
723
+ 3
724
+ 4
725
+ 0
726
+ 1
727
+ 2
728
+ 3
729
+ 4
730
+ 5
731
+ 6
732
+ 0
733
+ 1
734
+ 2
735
+ 3
736
+ 4
737
+ 0
738
+ 1
739
+ 2
740
+ 3
741
+ 4
742
+ 5
743
+ 6
744
+ 0
745
+ 1
746
+ 2
747
+ 3
748
+ 4
749
+ 0
750
+ 1
751
+ 2
752
+ 3
753
+ 4
754
+ 5
755
+ 6
756
+ 0
757
+ 1
758
+ 2
759
+ 3
760
+ 4
761
+ 0
762
+ 1
763
+ 2
764
+ 3
765
+ 4
766
+ 5
767
+ 6
768
+ 0
769
+ 1
770
+ 2
771
+ 3
772
+ 4
773
+ 0
774
+ 1
775
+ 2
776
+ 3
777
+ 4
778
+ 5
779
+ 6
780
+ 0
781
+ 1
782
+ 2
783
+ 3
784
+ 4
785
+ 0
786
+ 1
787
+ 2
788
+ 3
789
+ 4
790
+ 5
791
+ 6
792
+ Pareto-frontier
793
+ Figure
794
+ 1: Conceptional diagram of a DR-PF. The upper and lower color maps in (a) represent objective
795
+ functions f (1)(x, w) and f (2)(x, w), respectively, where x and w are the scalar design and environmental variable,
796
+ respectively. The plots within the frame in (b) represent multiple candidate distributions for w. A dashed line
797
+ in (c) is the expected PF for each candidate distributions of w. A red solid line is the DR-PF, which is defined
798
+ by the worst-case expectation of the candidate distributions, provides a lower bound of uncertain PF. The
799
+ objective of this study is to efficiently identify the DR-PF.
800
+ of multiple black-box functions is typically formulated as a Pareto optimization problem, and BO methods for
801
+ such problems have been also studied [Zuluaga et al., 2016, Suzuki et al., 2020].
802
+ Many studies have been conducted on BOs under uncertain environments. For example, [Bogunovic et al., 2018]
803
+ proposed a BO method to maximize the worst-case function value with respect to a shift in the input. In several
804
+ studies [Beland and Nair, 2017, Toscano-Palmerin and Frazier, 2018, Oliveira et al., 2019, Fr¨ohlich et al., 2020,
805
+ Gessner et al., 2020], a BO problem to maximize the expected value of a black-box function with respect to the
806
+ input distribution was considered. Furthermore, several studies considered the simultaneous optimization of
807
+ multiple black-box functions under the assumption that the distribution of environmental variables is known.
808
+ For example, [Iwazaki et al., 2021] dealt with constrained optimization and Pareto optimization problems for the
809
+ mean and variance of a black-box function with respect to environmental variables, [Qing et al., 2022] considered
810
+ Pareto optimization problems for the expected values of multiple objective functions, and [Amri et al., 2021]
811
+ dealt with chance-constrained optimization problems that is an extension of constrained optimization problems
812
+ to the input uncertainty setting.
813
+ Distributionally robust optimization (DRO) was first introduced by [Scarf, 1958]. Because DRO is an im-
814
+ portant topic in the context of robust optimization and has been the subject of numerous studies, we refer an
815
+ exhaustive survey of DRO to [Rahimian and Mehrotra, 2019]. In recent years, several studies on DRO in the
816
+ context of BOs (DRO-BOs) have been conducted. [Kirschner et al., 2020] and [Nguyen et al., 2020] proposed
817
+ BO methods to efficiently find the design variable that maximizes F (1)(x). DRO-BOs have also been stud-
818
+ ied under multiple black-box functions. [Inatsu et al., 2022] proposed a BO method for distributionally robust
819
+ chance-constrained problems, which is an extension of the chance-constrained problem to DRO. However, to the
820
+ best of our knowledge, there are no prior studies on BOs for Pareto optimization under the DRO framework.
821
+ 1.2. Contributions
822
+ The contributions of this study are as follows:
823
+ • We develop a BO method for identifying DR-PFs called DR-PF BO method. Specifically, we propose a
824
+ novel AF for the DR-PF BO, which is computationally inexpensive and has theoretical guarantees.
825
+ • Under mild conditions, we prove that the DR-PF BO method can find an arbitrarily accurate PF with a
826
+ high probability in a finite number of iterations.
827
+ • Additionally, we prove that with a specification of an appropriate family of candidate distributions, even
828
+ if the true distribution is unknown, the DR-PF BO method can find an arbitrarily accurate expected PF
829
+ on the true distribution.
830
+ 2
831
+
832
+ • We confirm the performance of the proposed method through numerical experiments with benchmark
833
+ functions and simulator-based functions.
834
+ 2. Preliminaries
835
+ Let f (1) : X × Ω → R and f (2) : X × Ω → R be the expensive-to-evaluate black-box functions1, where X
836
+ and Ω are the finite sets. For each input (x, w) ∈ X × Ω, the values of f (1)(x, w) and f (2)(x, w) are observed
837
+ with observation noise as y(1) = f (1)(x, w) + ε(1) and y(2) = f (2)(x, w) + ε(2), where ε(1) and ε(2) are random
838
+ samples from independent normal distributions with the mean zero and variances σ(1)2
839
+ noise and σ(2)2
840
+ noise, respectively.
841
+ In this study, the environmental variable w ∈ Ω was assumed to be a discrete random variable that follows an
842
+ unknown probability distribution P †. The two distinct phases called the development phase and use phase exist
843
+ in the literature of BOs under uncertainty. In the development phase, environmental variables are completely
844
+ controllable as design variables, whereas they are stochastic and uncontrollable in the use phase. In this study,
845
+ we consider the development phase, and the use phase is described in Appendix A. Furthermore, we denote the
846
+ family of candidate distributions of w as A and consider the following class of distributions:
847
+ A = {p(w) | d(p(w), p∗(w)) ≤ ξ},
848
+ where p∗(w) is a user-specified reference distribution, d(·, ·) is a given distance metric function between dis-
849
+ tributions, and ξ ≥ 0. This means that we consider a set of candidate distributions whose distance from the
850
+ reference distribution is not larger than a certain threshold. Subsequently, the distributionally robust expecta-
851
+ tions F (1)(x) and F (2)(x) for each design variable x ∈ X are defined as follows:
852
+ F (1)(x) =
853
+ inf
854
+ p(w)∈A
855
+
856
+ w∈Ω
857
+ f (1)(x, w)p(w),
858
+ F (2)(x) =
859
+ inf
860
+ p(w)∈A
861
+
862
+ w∈Ω
863
+ f (2)(x, w)p(w).
864
+ The objective of this study is to efficiently identify the PF determined by F (1)(x) and F (2)(x). Let F (x) =
865
+ (F (1)(x), F (2)(x)) for each x ∈ X, and let F (E) = {F (x) | x ∈ E} for a set E ⊂ X. Furthermore, for a set
866
+ B ⊂ R2, we denote the domain dominated by B and the PF of B, respectively, by
867
+ Dom(B) = {y ∈ R2 |∃ y′ ∈ B s.t. y ⪯ y′},
868
+ Par(B) = ∂(Dom(B)).
869
+ Here, for a point a = (a1, . . . , am) and b = (b1, . . . , bm), a ⪯ b implies ai ≤ bi for any i ∈ {1, . . . , m}. For a set
870
+ C, ∂(C) denotes the boundary of C. The PF determined by F (1)(x) and F (2)(x) can then be written as
871
+ Z∗ = Par(F (X)).
872
+ 2.1. Gaussian Process
873
+ In this study, we use GP surrogate models for black-box functions f (1) and f (2). First, we assume that
874
+ f (1) and f (2) follow GP priors GP(0, k(1)((x, w), (x′, w′))) and GP(0, k(2)((x, w), (x′, w′))), respectively, where
875
+ k(1)((x, w), (x′, w′)) and k(2)((x, w), (x′, w′)) are the positive-definite kernels. For l ∈ {1, 2}, given a dataset
876
+ {(xi, wi, y(l)
877
+ i )}t
878
+ i=1, where t is the number of queried instances, the posterior distribution of f (l) is a GP, and its
879
+ posterior mean µ(l)
880
+ t (x, w) and posterior variance σ(l)2
881
+ t
882
+ (x, w) are given by
883
+ µ(l)
884
+ t (x, w) = k(l)
885
+ t (x, w)⊤(K(l)
886
+ t
887
+ + σ(l)2
888
+ noiseIt)−1y(l)
889
+ t ,
890
+ σ(l)2
891
+ t
892
+ (x, w) = k(l)((x, w), (x, w)) − k(l)
893
+ t (x, w)⊤(K(l)
894
+ t
895
+ + σ(l)2
896
+ noiseIt)−1k(l)
897
+ t (x, w),
898
+ where k(l)
899
+ t (x, w) is the t-dimensional vector, whose jth element is k(l)((x, w), (xj, wj)), y(l)
900
+ t
901
+ = (y(l)
902
+ 1 , . . . , y(l)
903
+ t )⊤,
904
+ It is the t × t identity matrix, K(l)
905
+ t
906
+ is the t × t matrix whose (j, k) element is k(l)((xj, wj), (xk, wk)), with a
907
+ superscript ⊤ indicating the transpose of vectors or matrices.
908
+ 3. Proposed Method
909
+ Here, we propose a BO method to efficiently identify Z∗. Because the functions f (1)(x, w) and f (2)(x, w)
910
+ are random variables following GPs, F (1)(x) and F (2)(x) are also random variables. Therefore, a reasonable
911
+ approach is to construct credible intervals for F (1)(x) and F (2)(x), and use them to estimate the PF. However,
912
+ 1Note that the method proposed in this study can be straightforwardly extended to the case where there are more than three
913
+ objective functions f(1), f(2), f(3), . . ..
914
+ 3
915
+
916
+ unlike f (1)(x, w) and f (2)(x, w), F (1)(x) and F (2)(x) do not follow GPs. Therefore, we cannot directly obtain
917
+ credible intervals using the properties of GPs. In Section 3.1, we construct credible intervals for F (1)(x) and
918
+ F (2)(x) using the method proposed by [Kirschner et al., 2020] and provide a method for estimating the PF
919
+ based on the constructed credible intervals.
920
+ 3.1. Credible Intervals and PF Estimation
921
+ For each input (x, w) ∈ X × Ω and time t, the credible interval of f (1)(x, w) is denoted by Q(f (1))
922
+ t
923
+ (x, w) =
924
+ [l(f (1))
925
+ t
926
+ (x, w), u(f (1))
927
+ t
928
+ (x, w)]. Here, the lower value l(f (1))
929
+ t
930
+ (x, w) and the upper value u(f (1))
931
+ t
932
+ (x, w) are given as
933
+ l(f (1))
934
+ t
935
+ (x, w) = µ(1)
936
+ t (x, w) − β1/2
937
+ 1,t σ(1)
938
+ t
939
+ (x, w),
940
+ u(f (1))
941
+ t
942
+ (x, w) = µ(1)
943
+ t (x, w) + β1/2
944
+ 1,t σ(1)
945
+ t
946
+ (x, w),
947
+ where β1/2
948
+ 1,t
949
+ ≥ 0 is a user-specified tradeoff parameter.
950
+ We then define the credible interval Q(F (1))
951
+ t
952
+ (x) ≡
953
+ [l(F (1))
954
+ t
955
+ (x), u(F (1))
956
+ t
957
+ (x)] of F (1)(x). Here, the lower and upper values are respectively given by
958
+ l(F (1))
959
+ t
960
+ (x) =
961
+ inf
962
+ p(w)∈A
963
+
964
+ w∈Ω
965
+ l(f (1))
966
+ t
967
+ (x, w)p(w),
968
+ u(F (1))
969
+ t
970
+ (x) =
971
+ inf
972
+ p(w)∈A
973
+
974
+ w∈Ω
975
+ u(f (1))
976
+ t
977
+ (x, w)p(w).
978
+ (3.1)
979
+ Notably, if the L1- (or L2-) norm is used as the distance d(·, ·) between the distributions, the problem of
980
+ obtaining the lower and upper values in (3.1) is reduced to a linear programming problem (or a second-order
981
+ cone programming problem). In either case, the existence of a fast solver of these problems enabled us to obtain
982
+ Q(F (1))
983
+ t
984
+ (x). Similarly, we define credible intervals Q(f (2))
985
+ t
986
+ (x, w) = [l(f (2))
987
+ t
988
+ (x, w), u(f (2))
989
+ t
990
+ (x, w)] for f (2)(x, w) and
991
+ Q(F (2))
992
+ t
993
+ (x) ≡ [l(F (2))
994
+ t
995
+ (x), u(F (2))
996
+ t
997
+ (x)] for F (2)(x). Next, for any input x ∈ X and any subset E ⊂ X, we define
998
+ LCBt(x), UCBt(x) and LCBt(E) as follows:
999
+ LCBt(x) = (l(F (1))
1000
+ t
1001
+ (x), l(F (2))
1002
+ t
1003
+ (x)),
1004
+ UCBt(x) = (u(F (1))
1005
+ t
1006
+ (x), u(F (2))
1007
+ t
1008
+ (x)),
1009
+ LCBt(E) = {LCBt(x) | x ∈ E}.
1010
+ The estimated PF solution set ˆΠt ⊂ X for the design variables is then defined as follows:
1011
+ ˆΠt = {x ∈ X | LCBt(x) ∈ Par(LCBt(X))}.
1012
+ Figure 2 (a) shows a conceptual diagram of LCBt(x) and UCBt(x), and (b) shows a conceptual diagram of
1013
+ Par(LCBt(X)) and ˆΠt.
1014
+ 3.2. Acquisition Function
1015
+ Here, we propose an AF for determining the next evaluation point. First, for each point a ∈ Rm and subset
1016
+ B ⊂ Rm, we denote the closeness between them as
1017
+ dist(a, B) = inf
1018
+ b∈B d∞(a, b),
1019
+ where d∞(a, b) denotes the metric function given by d∞(a, b) = max{|a1 − b1|, . . . , |am − bm|}. Using this, we
1020
+ define AF at(x) for x ∈ X as
1021
+ at(x) = dist(UCBt(x), Dom(LCBt(ˆΠt))).
1022
+ We then select the following evaluation points, as described in the following definition:
1023
+ Definition 3.1. The next design variable, xt+1, to be evaluated is selected as follows:
1024
+ xt+1 = argmax
1025
+ x∈X
1026
+ at(x),
1027
+ and the next environmental variable, wt+1, to be evaluated is selected as
1028
+ wt+1 = argmax
1029
+ w∈Ω
1030
+ {σ(1)2
1031
+ t
1032
+ (xt+1, w) + σ(2)2
1033
+ t
1034
+ (xt+1, w)}.
1035
+ 4
1036
+
1037
+ 𝐹(2)(𝒙)
1038
+ 𝐹(1)(𝒙)
1039
+ 𝐹(2)(𝒙)
1040
+ 𝐹(1)(𝒙)
1041
+ 𝐹(2)(𝒙)
1042
+ 𝐹(1)(𝒙)
1043
+ (a)
1044
+ (b)
1045
+ (c)
1046
+ 𝒙1
1047
+ 𝒙2
1048
+ 𝒙3
1049
+ 𝒙4
1050
+ 𝒙5
1051
+ 𝒙6
1052
+ 𝒙7
1053
+ Figure 2: Conceptual diagrams of LCBt(x), UCBt(x), Par(LCBt(X)), ˆΠt and AFs for seven input points
1054
+ x1, . . . , x7. At each point x in the left figure (a), LCBt(x) and UCBt(x) indicate the lower left point and the
1055
+ upper right point of the dashed rectangular region, respectively. In (b), the PF (red line) computed using each
1056
+ LCBt(x) is Par(LCBt(X)), and because it is constructed by LCBt(x1), LCBt(x2), LCBt(x3), LCBt(x7), ˆΠt
1057
+ is given by ˆΠt = {x1, x2, x3, x7}. In (c), the light red region indicates Dom(LCBt(ˆΠt)), the region dominated
1058
+ by the red points (LCBt(ˆΠt)), and at(x) is the closeness between the light red region and UCBt(x) (purple
1059
+ point). The furthest point is represented by the purple triangle, UCBt(x4). Thus, the next design variable to
1060
+ be evaluated is x4.
1061
+ Figure 2 (c) shows a conceptual diagram of the AF at(x). Here, AF at(x) can be computed analytically
1062
+ using the following lemma:
1063
+ Lemma 3.1. Let UCBt(x) = (u1, u2) and LCBt(ˆΠt) = {(l(i)
1064
+ 1 , l(i)
1065
+ 2 ) | 1 ≤ i ≤ k}. Then, at(x) can be computed
1066
+ as follows:
1067
+ ˜at(x) = min
1068
+ 1≤i≤k max{u1 − l(i)
1069
+ 1 , u2 − l(i)
1070
+ 2 },
1071
+ at(x) = max{˜at(x), 0}.
1072
+ Notably, when the number of objective functions is m ≥ 3, at(x) is easily extended as follows:
1073
+ ˜at(x) = min
1074
+ 1≤i≤k′ max{u1 − l(i)
1075
+ 1 , . . . , um − l(i)
1076
+ m },
1077
+ at(x) = max{˜at(x), 0},
1078
+ (3.2)
1079
+ where UCBt(x) = (u1, . . . , um) and LCBt(ˆΠt) = {(l(i)
1080
+ 1 , . . . , l(i)
1081
+ m ) | 1 ≤ i ≤ k′}. The proofs of Lemma 3.1 and
1082
+ (3.2) are presented in Appendix B. From Lemma 3.1, once LCBt(ˆΠt) is computed, the maximum value of at(x)
1083
+ can be analytically obtained by performing 2|X| times inf calculations and computing u(F (1))
1084
+ t
1085
+ (x) and u(F (2))
1086
+ t
1087
+ (x)
1088
+ for all x ∈ X. On the other hand, an AF based on exact posterior distributions of target functions such as the
1089
+ expected hypervolume improvement [Emmerich, 2005] for ordinary Pareto optimization, requires approximation
1090
+ by sampling from f (1)(x, w) and f (2)(x, w) under this problem setting. However, in each posterior sample, the
1091
+ inf calculation must be performed again to calculate F (1)(x) and F (2)(x) for all design variables. Therefore, if
1092
+ the number of Monte Carlo samples is M, M times more inf calculations are required compared to the proposed
1093
+ AF. The comparison of computational times is given in Section 5.
1094
+ 3.3. Stopping Condition
1095
+ Here, we describe the stopping conditions of the proposed algorithm. From Fig. 2 (c), AF at(x) represents
1096
+ the closeness of the pessimistic PF and the optimistic predictive value of F (x).
1097
+ That is, if this value is
1098
+ sufficiently small, there is little room for improvement in the PF; therefore, it is reasonable to use it as the
1099
+ stopping condition. Let ϵ > 0 be a user-specified parameter. Then the algorithm is terminated if at(x) ≤ ϵ is
1100
+ satisfied. The pseudocode for the proposed algorithm is given in Algorithm 1.
1101
+ 4. Theoretical Analysis
1102
+ Here, we provide the theorems for the accuracy and convergence of the proposed algorithm. The details of
1103
+ the proofs are presented in Appendix B. First, to provide theoretical results, we assume that f (1) and f (2) follow
1104
+ 5
1105
+
1106
+ Algorithm 1 BO for identifying DR-PF
1107
+ Input: GP priors GP(0, k(1)), GP(0, k(2)), parameter ξ ≥ 0, tradeoff parameters {β1,t}t≥0, {β2,t}t≥0, stopping
1108
+ parameter ϵ > 0
1109
+ t ← 1
1110
+ while at(x) > ϵ do
1111
+ Compute Q(F (1))
1112
+ t
1113
+ (x) and Q(F (2))
1114
+ t
1115
+ (x) for each x ∈ X
1116
+ Select the next evaluation point (xt, wt)
1117
+ Observe y(1)
1118
+ t
1119
+ = f (1)(xt, wt) + ε(1)
1120
+ t
1121
+ and y(2)
1122
+ t
1123
+ = f (2)(xt, wt) + ε(2)
1124
+ t
1125
+ at the point (xt, wt)
1126
+ Update GPs by adding observed points
1127
+ t ← t + 1
1128
+ end while
1129
+ Output: Return ˆΠt as the estimated set of design variables comprising the DR-PF
1130
+ GPs GP(0, k(1)((x, w), (x′, w′))) and GP(0, k(2)((x, w), (x′, w′))), respectively. Moreover, we assume that the
1131
+ prior variances k(1)((x, w), (x, w)) ≡ σ(1)2
1132
+ 0
1133
+ (x, w) and k(2)((x, w), (x, w)) ≡ σ(2)2
1134
+ 0
1135
+ (x, w) satisfy
1136
+ max
1137
+ (x,w)∈X×Ω σ(1)2
1138
+ 0
1139
+ (x, w) ≤ 1,
1140
+ max
1141
+ (x,w)∈X×Ω σ(2)2
1142
+ 0
1143
+ (x, w) ≤ 1.
1144
+ Furthermore, let κ(1)
1145
+ T
1146
+ and κ(2)
1147
+ T
1148
+ be the maximum information gains of f (1) and f (2) at time T, respectively.
1149
+ Notably, the maximum information gain is a measure often used in theoretical analyses of GP-based BO (see,
1150
+ e.g., [Srinivas et al., 2010]). Here, for each j ∈ {1, 2}, using the mutual information I(y(j); f (j)) between y(j)
1151
+ and f (j), κ(j)
1152
+ T
1153
+ can be expressed as
1154
+ κ(j)
1155
+ T
1156
+ =
1157
+ max
1158
+ A⊂X×Ω I(y(j)
1159
+ A ; f (j)).
1160
+ Next, to quantify the goodness of the predicted ˆΠt, we define an ϵ-accurate Pareto region Zϵ. With user-specified
1161
+ positive numbers ϵ and ϵ = (ϵ, ϵ), we define Zϵ as
1162
+ Zϵ = {y ∈ R2 |∃ y′ ∈ Z∗ s.t. y ⪯ y′ and ∃y′′ ∈ Z∗ s.t. y′′ ⪯ y + ϵ}.
1163
+ That is, Zϵ is the set of points that lie inside Z∗ and within ϵ in the sense of d∞(·, ·)-distance. The concept of
1164
+ Zϵ was also used in [Zuluaga et al., 2016]. Using Zϵ, we define the accuracy of ˆΠt in terms of the following two
1165
+ aspects:
1166
+ Definition 4.1 (Accuracy for ˆΠt). Let ϵ be a positive value. We then define ˆΠt as an ϵ-accurate estimated
1167
+ solution set if the following holds:
1168
+ F (ˆΠt) ⊂ Zϵ.
1169
+ (4.1)
1170
+ Moreover, we define ˆΠt as an ϵ-accurate estimated Pareto solution set if the following holds:
1171
+ Par(F (ˆΠt)) ⊂ Zϵ.
1172
+ (4.2)
1173
+ It is easy to obtain a set that satisfies either (4.1) or (4.2). Generally, by ignoring F (2)(x) and focusing
1174
+ only on the maximization of F (1)(x), the maximization point x∗ can be estimated using methods such as
1175
+ [Kirschner et al., 2020]. Subsequently, by letting ˆΠt = {x∗}, (4.1) is satisfied with high probability. Similarly,
1176
+ if we predict that all points constitute the PF, that is, ˆΠt = X, then (4.2) is satisfied because Par(F (ˆΠt)) =
1177
+ Par(F (X)) = Z∗. The following theorem guarantees that the proposed algorithm satisfies both (4.1) and (4.2)
1178
+ with a high probability.
1179
+ Theorem 4.1. Let t ≥ 1 and δ ∈ (0, 1) and define β1,t = β2,t = 2 log(2|X × Ω|π2t2/(6δ)) ≡ βt. In addition, let
1180
+ ϵ > 0 be a user-specified stopping parameter. Then, when Algorithm 1 terminates, ˆΠt satisfies (4.1) and (4.2)
1181
+ with a probability of at least 1 − δ.
1182
+ Theorem 4.1 does not indicate whether the algorithm terminates or not. The following theorem guarantees
1183
+ the convergence of Algorithm 1.
1184
+ Theorem 4.2. Under the same conditions as those in Theorem 4.1, let T be the smallest positive integer that
1185
+ satisfies the following inequality:
1186
+ βT (C1κ(1)
1187
+ T
1188
+ + C2κ(2)
1189
+ T )
1190
+ T
1191
+ ≤ ϵ2
1192
+ 4 ,
1193
+ where C1 = 2/ log(1+σ(1)−2
1194
+ noise ) and C2 = 2/ log(1+σ(2)−2
1195
+ noise ). Then, Algorithm 1 terminates after at most T trials.
1196
+ 6
1197
+
1198
+ 0
1199
+ 100
1200
+ 200
1201
+ 300
1202
+ 400
1203
+ 500
1204
+ 0
1205
+ 5
1206
+ 10
1207
+ 15
1208
+ 20
1209
+ 25
1210
+ 30
1211
+ 35
1212
+ Simulator setting
1213
+ iteration
1214
+ R1
1215
+ 0
1216
+ 100
1217
+ 200
1218
+ 300
1219
+ 400
1220
+ 500
1221
+ 0
1222
+ 5
1223
+ 10
1224
+ 15
1225
+ 20
1226
+ 25
1227
+ 30
1228
+ 35
1229
+ 0
1230
+ 100
1231
+ 200
1232
+ 300
1233
+ 400
1234
+ 500
1235
+ 0
1236
+ 5
1237
+ 10
1238
+ 15
1239
+ 20
1240
+ 25
1241
+ 30
1242
+ 35
1243
+ 0
1244
+ 100
1245
+ 200
1246
+ 300
1247
+ 400
1248
+ 500
1249
+ 0
1250
+ 5
1251
+ 10
1252
+ 15
1253
+ 20
1254
+ 25
1255
+ 30
1256
+ 35
1257
+ 0
1258
+ 100
1259
+ 200
1260
+ 300
1261
+ 400
1262
+ 500
1263
+ 0
1264
+ 5
1265
+ 10
1266
+ 15
1267
+ 20
1268
+ 25
1269
+ 30
1270
+ 35
1271
+ 0
1272
+ 100
1273
+ 200
1274
+ 300
1275
+ 400
1276
+ 500
1277
+ 0
1278
+ 5
1279
+ 10
1280
+ 15
1281
+ 20
1282
+ 25
1283
+ 30
1284
+ 35
1285
+ Random
1286
+ UCB_F1
1287
+ UCB_F2
1288
+ MVA
1289
+ EHI
1290
+ Proposed
1291
+ 0
1292
+ 100
1293
+ 200
1294
+ 300
1295
+ 400
1296
+ 500
1297
+ 0
1298
+ 20
1299
+ 40
1300
+ 60
1301
+ 80
1302
+ Simulator setting
1303
+ iteration
1304
+ R2
1305
+ 0
1306
+ 100
1307
+ 200
1308
+ 300
1309
+ 400
1310
+ 500
1311
+ 0
1312
+ 20
1313
+ 40
1314
+ 60
1315
+ 80
1316
+ 0
1317
+ 100
1318
+ 200
1319
+ 300
1320
+ 400
1321
+ 500
1322
+ 0
1323
+ 20
1324
+ 40
1325
+ 60
1326
+ 80
1327
+ 0
1328
+ 100
1329
+ 200
1330
+ 300
1331
+ 400
1332
+ 500
1333
+ 0
1334
+ 20
1335
+ 40
1336
+ 60
1337
+ 80
1338
+ 0
1339
+ 100
1340
+ 200
1341
+ 300
1342
+ 400
1343
+ 500
1344
+ 0
1345
+ 20
1346
+ 40
1347
+ 60
1348
+ 80
1349
+ 0
1350
+ 100
1351
+ 200
1352
+ 300
1353
+ 400
1354
+ 500
1355
+ 0
1356
+ 20
1357
+ 40
1358
+ 60
1359
+ 80
1360
+ Random
1361
+ UCB_F1
1362
+ UCB_F2
1363
+ MVA
1364
+ EHI
1365
+ Proposed
1366
+ 0
1367
+ 100
1368
+ 200
1369
+ 300
1370
+ 400
1371
+ 500
1372
+ 0
1373
+ 5
1374
+ 10
1375
+ 15
1376
+ 20
1377
+ 25
1378
+ 30
1379
+ 35
1380
+ Uncontrollable setting
1381
+ iteration
1382
+ R1
1383
+ 0
1384
+ 100
1385
+ 200
1386
+ 300
1387
+ 400
1388
+ 500
1389
+ 0
1390
+ 5
1391
+ 10
1392
+ 15
1393
+ 20
1394
+ 25
1395
+ 30
1396
+ 35
1397
+ 0
1398
+ 100
1399
+ 200
1400
+ 300
1401
+ 400
1402
+ 500
1403
+ 0
1404
+ 5
1405
+ 10
1406
+ 15
1407
+ 20
1408
+ 25
1409
+ 30
1410
+ 35
1411
+ 0
1412
+ 100
1413
+ 200
1414
+ 300
1415
+ 400
1416
+ 500
1417
+ 0
1418
+ 5
1419
+ 10
1420
+ 15
1421
+ 20
1422
+ 25
1423
+ 30
1424
+ 35
1425
+ 0
1426
+ 100
1427
+ 200
1428
+ 300
1429
+ 400
1430
+ 500
1431
+ 0
1432
+ 5
1433
+ 10
1434
+ 15
1435
+ 20
1436
+ 25
1437
+ 30
1438
+ 35
1439
+ 0
1440
+ 100
1441
+ 200
1442
+ 300
1443
+ 400
1444
+ 500
1445
+ 0
1446
+ 5
1447
+ 10
1448
+ 15
1449
+ 20
1450
+ 25
1451
+ 30
1452
+ 35
1453
+ Random
1454
+ UCB_F1
1455
+ UCB_F2
1456
+ MVA
1457
+ EHI
1458
+ Proposed
1459
+ 0
1460
+ 100
1461
+ 200
1462
+ 300
1463
+ 400
1464
+ 500
1465
+ 0
1466
+ 20
1467
+ 40
1468
+ 60
1469
+ 80
1470
+ Uncontrollable setting
1471
+ iteration
1472
+ R2
1473
+ 0
1474
+ 100
1475
+ 200
1476
+ 300
1477
+ 400
1478
+ 500
1479
+ 0
1480
+ 20
1481
+ 40
1482
+ 60
1483
+ 80
1484
+ 0
1485
+ 100
1486
+ 200
1487
+ 300
1488
+ 400
1489
+ 500
1490
+ 0
1491
+ 20
1492
+ 40
1493
+ 60
1494
+ 80
1495
+ 0
1496
+ 100
1497
+ 200
1498
+ 300
1499
+ 400
1500
+ 500
1501
+ 0
1502
+ 20
1503
+ 40
1504
+ 60
1505
+ 80
1506
+ 0
1507
+ 100
1508
+ 200
1509
+ 300
1510
+ 400
1511
+ 500
1512
+ 0
1513
+ 20
1514
+ 40
1515
+ 60
1516
+ 80
1517
+ 0
1518
+ 100
1519
+ 200
1520
+ 300
1521
+ 400
1522
+ 500
1523
+ 0
1524
+ 20
1525
+ 40
1526
+ 60
1527
+ 80
1528
+ Random
1529
+ UCB_F1
1530
+ UCB_F2
1531
+ MVA
1532
+ EHI
1533
+ Proposed
1534
+ Figure 3: Average values of R1 and R2 for each method in Simulator and Uncontrollable settings. The length
1535
+ of each error bar represents twice the standard error.
1536
+ 0
1537
+ 20
1538
+ 40
1539
+ 60
1540
+ 80
1541
+ 100
1542
+ 0
1543
+ 5
1544
+ 10
1545
+ 15
1546
+ 20
1547
+ 25
1548
+ 30
1549
+ 35
1550
+ SIR (case1)
1551
+ iteration
1552
+ R1
1553
+ 0
1554
+ 20
1555
+ 40
1556
+ 60
1557
+ 80
1558
+ 100
1559
+ 0
1560
+ 5
1561
+ 10
1562
+ 15
1563
+ 20
1564
+ 25
1565
+ 30
1566
+ 35
1567
+ 0
1568
+ 20
1569
+ 40
1570
+ 60
1571
+ 80
1572
+ 100
1573
+ 0
1574
+ 5
1575
+ 10
1576
+ 15
1577
+ 20
1578
+ 25
1579
+ 30
1580
+ 35
1581
+ 0
1582
+ 20
1583
+ 40
1584
+ 60
1585
+ 80
1586
+ 100
1587
+ 0
1588
+ 5
1589
+ 10
1590
+ 15
1591
+ 20
1592
+ 25
1593
+ 30
1594
+ 35
1595
+ 0
1596
+ 20
1597
+ 40
1598
+ 60
1599
+ 80
1600
+ 100
1601
+ 0
1602
+ 5
1603
+ 10
1604
+ 15
1605
+ 20
1606
+ 25
1607
+ 30
1608
+ 35
1609
+ 0
1610
+ 20
1611
+ 40
1612
+ 60
1613
+ 80
1614
+ 100
1615
+ 0
1616
+ 5
1617
+ 10
1618
+ 15
1619
+ 20
1620
+ 25
1621
+ 30
1622
+ 35
1623
+ Random
1624
+ UCB_F1
1625
+ UCB_F2
1626
+ MVA
1627
+ EHI
1628
+ Proposed
1629
+ 0
1630
+ 20
1631
+ 40
1632
+ 60
1633
+ 80
1634
+ 100
1635
+ 0
1636
+ 20
1637
+ 40
1638
+ 60
1639
+ 80
1640
+ SIR (case1)
1641
+ iteration
1642
+ R2
1643
+ 0
1644
+ 20
1645
+ 40
1646
+ 60
1647
+ 80
1648
+ 100
1649
+ 0
1650
+ 20
1651
+ 40
1652
+ 60
1653
+ 80
1654
+ 0
1655
+ 20
1656
+ 40
1657
+ 60
1658
+ 80
1659
+ 100
1660
+ 0
1661
+ 20
1662
+ 40
1663
+ 60
1664
+ 80
1665
+ 0
1666
+ 20
1667
+ 40
1668
+ 60
1669
+ 80
1670
+ 100
1671
+ 0
1672
+ 20
1673
+ 40
1674
+ 60
1675
+ 80
1676
+ 0
1677
+ 20
1678
+ 40
1679
+ 60
1680
+ 80
1681
+ 100
1682
+ 0
1683
+ 20
1684
+ 40
1685
+ 60
1686
+ 80
1687
+ 0
1688
+ 20
1689
+ 40
1690
+ 60
1691
+ 80
1692
+ 100
1693
+ 0
1694
+ 20
1695
+ 40
1696
+ 60
1697
+ 80
1698
+ Random
1699
+ UCB_F1
1700
+ UCB_F2
1701
+ MVA
1702
+ EHI
1703
+ Proposed
1704
+ 0
1705
+ 20
1706
+ 40
1707
+ 60
1708
+ 80
1709
+ 100
1710
+ 0.0
1711
+ 0.2
1712
+ 0.4
1713
+ 0.6
1714
+ 0.8
1715
+ 1.0
1716
+ SIR (case2)
1717
+ iteration
1718
+ R1
1719
+ 0
1720
+ 20
1721
+ 40
1722
+ 60
1723
+ 80
1724
+ 100
1725
+ 0.0
1726
+ 0.2
1727
+ 0.4
1728
+ 0.6
1729
+ 0.8
1730
+ 1.0
1731
+ 0
1732
+ 20
1733
+ 40
1734
+ 60
1735
+ 80
1736
+ 100
1737
+ 0.0
1738
+ 0.2
1739
+ 0.4
1740
+ 0.6
1741
+ 0.8
1742
+ 1.0
1743
+ 0
1744
+ 20
1745
+ 40
1746
+ 60
1747
+ 80
1748
+ 100
1749
+ 0.0
1750
+ 0.2
1751
+ 0.4
1752
+ 0.6
1753
+ 0.8
1754
+ 1.0
1755
+ 0
1756
+ 20
1757
+ 40
1758
+ 60
1759
+ 80
1760
+ 100
1761
+ 0.0
1762
+ 0.2
1763
+ 0.4
1764
+ 0.6
1765
+ 0.8
1766
+ 1.0
1767
+ 0
1768
+ 20
1769
+ 40
1770
+ 60
1771
+ 80
1772
+ 100
1773
+ 0.0
1774
+ 0.2
1775
+ 0.4
1776
+ 0.6
1777
+ 0.8
1778
+ 1.0
1779
+ Random
1780
+ UCB_F1
1781
+ UCB_F2
1782
+ MVA
1783
+ EHI
1784
+ Proposed
1785
+ 0
1786
+ 20
1787
+ 40
1788
+ 60
1789
+ 80
1790
+ 100
1791
+ 0
1792
+ 10
1793
+ 20
1794
+ 30
1795
+ 40
1796
+ SIR (case2)
1797
+ iteration
1798
+ R2
1799
+ 0
1800
+ 20
1801
+ 40
1802
+ 60
1803
+ 80
1804
+ 100
1805
+ 0
1806
+ 10
1807
+ 20
1808
+ 30
1809
+ 40
1810
+ 0
1811
+ 20
1812
+ 40
1813
+ 60
1814
+ 80
1815
+ 100
1816
+ 0
1817
+ 10
1818
+ 20
1819
+ 30
1820
+ 40
1821
+ 0
1822
+ 20
1823
+ 40
1824
+ 60
1825
+ 80
1826
+ 100
1827
+ 0
1828
+ 10
1829
+ 20
1830
+ 30
1831
+ 40
1832
+ 0
1833
+ 20
1834
+ 40
1835
+ 60
1836
+ 80
1837
+ 100
1838
+ 0
1839
+ 10
1840
+ 20
1841
+ 30
1842
+ 40
1843
+ 0
1844
+ 20
1845
+ 40
1846
+ 60
1847
+ 80
1848
+ 100
1849
+ 0
1850
+ 10
1851
+ 20
1852
+ 30
1853
+ 40
1854
+ Random
1855
+ UCB_F1
1856
+ UCB_F2
1857
+ MVA
1858
+ EHI
1859
+ Proposed
1860
+ Figure 4: Average values of R1 and R2 for each method in Case1 and Case2 in SIR model experiments. The
1861
+ length of each error bar represents twice the standard error.
1862
+ Table 1: Computational time (second) and the ratios of the computational time to that of the proposed method
1863
+ Random
1864
+ UCB F1
1865
+ UCB F2
1866
+ MVA
1867
+ EHI
1868
+ Proposed
1869
+ Computational time
1870
+ 0.000
1871
+ 0.068
1872
+ 0.067
1873
+ 0.135
1874
+ 16.21
1875
+ 0.139
1876
+ (Standard error)
1877
+ (0.000)
1878
+ (0.000)
1879
+ (0.000)
1880
+ (0.001)
1881
+ (0.011)
1882
+ (0.001)
1883
+ Computational time ratio
1884
+ 0.000
1885
+ 0.496
1886
+ 0.488
1887
+ 0.985
1888
+ 118.68
1889
+ 1
1890
+ (Standard error)
1891
+ (0.000)
1892
+ (0.004)
1893
+ (0.004)
1894
+ (0.006)
1895
+ (0.548)
1896
+ (0)
1897
+ Here, because the maximum information gains κ(1)
1898
+ T
1899
+ and κ(2)
1900
+ T
1901
+ are known to be sublinear with respect to T
1902
+ under mild assumptions [Srinivas et al., 2010], and the order of β1,T = β2,T is O(log T), the positive integer T
1903
+ satisfying the inequality in Theorem 4.2 exists.
1904
+ We emphasize that Theorem 4.1 also holds in the use phase setting and a similar theorem holds for Theorem
1905
+ 4.2 under mild additional conditions. Moreover, by appropriately designing the family of candidate distributions
1906
+ using the empirical distribution as the reference distribution, the proposed method provides an arbitrarily
1907
+ accurate solution for the expected PF based on the true distribution, even when the true distribution is unknown.
1908
+ Details are provided in Appendix A.
1909
+ 5. Numerical Experiments
1910
+ Here, we confirm the performance of the proposed method using synthetic functions and real-world simulation
1911
+ models. In this experiment, we used a one-dimensional design variable x and environmental variable w and the
1912
+ following Gaussian kernels:
1913
+ k(1)((x, w), (x′, w′)) = σ2
1914
+ f,1 exp(−∥ν − ν′∥2
1915
+ 2/L1),
1916
+ k(2)((x, w), (x′, w′)) = σ2
1917
+ f,2 exp(−∥ν − ν′∥2
1918
+ 2/L2),
1919
+ where ν = (x, w) and ν′ = (x′, w′). Moreover, we used the L1-norm as the distance between distributions. In
1920
+ all experiments except computational time experiments, we used the following two indicators R1 and R2 based
1921
+ on (4.1) and (4.2) to evaluate the goodness of ˆΠt estimated by each method:
1922
+ R1 = inf{a ∈ R | F (ˆΠt) ⊂ Za},
1923
+ R2 = inf{a ∈ R | Par(F (ˆΠt)) ⊂ Za}.
1924
+ Experimental details and additional experiments, which are not included in the main body, are described in
1925
+ Appendix C.
1926
+ 7
1927
+
1928
+ 5.1. Synthetic Function
1929
+ We evaluate the performance in our proposed method through synthetic functions. First, the input space
1930
+ X × Ω was a set of 50 × 50 grid points equally spaced in [−10, 10] × [−10, 10]. In this experiment, we used the
1931
+ following (scaled) Himmelblau’s function f (1)(x, w), which is commonly used as a benchmark function in BO
1932
+ studies [Andrei, 2008], and sinusoidal function f (2)(x, w) as black-box functions:
1933
+ f (1)(x, w) = (x2 + w − 11)2
1934
+ 150
1935
+ + (x + w2 − 7)2
1936
+ 150
1937
+ − C,
1938
+ f (2)(x, w) = (80 sin(1.5x) − 50 cos(2w))/1.5,
1939
+ where C = 3321.291/150 is a constant to set the mean to zero.
1940
+ Under this setting, we compared the following six methods:
1941
+ Random: Determine the next evaluation point xt+1 at random.
1942
+ UCB F1: Select the next evaluation point by xt+1 = argmaxx∈X u(F (1))
1943
+ t
1944
+ (x).
1945
+ UCB F2: Select the next evaluation point by xt+1 = argmaxx∈X u(F (2))
1946
+ t
1947
+ (x).
1948
+ MVA: Select the next evaluation point by xt+1 = argmaxx∈Mt∪ˆΠt λt(x), where Mt and λt(x) are given in
1949
+ Section 3.2 of [Iwazaki et al., 2021].
1950
+ EHI: Select the next evaluation point xt+1 by maximizing an expected hypervolume improvement for the
1951
+ DR-PF calculated based on posterior means.
1952
+ Proposed: Select the next evaluation point xt+1 by Definition 3.1.
1953
+ Here, UCB F1 (or UCB F2) focuses on the maximization of F (1)(x) (or F (2)(x)) and does not consider the
1954
+ identification of the DR-PF. In contrast, MVA focuses on reducing the uncertainty of a potential optimal set,
1955
+ which is a set of input points that may constitute the DR-PF. The EHI method is the strategy that extends the
1956
+ expected hypervolume improvement strategy, which is commonly used in BO for ordinary Pareto optimization
1957
+ problems, to the DR-PF identification problem. Because the expected hypervolume improvement for the DR-PF
1958
+ cannot be calculated analytically, we approximated it using Monte Carlo sampling with a sample size of 100.
1959
+ Experiments were conducted under the following two settings for the observation of w:
1960
+ Simulator setting: At each time t, arbitrary w can be selected.
1961
+ Uncontrollable setting: At each time t, w cannot be selected and is observed as a random sample from the
1962
+ uniform distribution on Ω.
1963
+ The Simulator setting and Uncontrollable setting correspond to the development phase and use phase,
1964
+ respectively. In Simulator setting, we used p∗(w) = 1/50, and the next environmental variable to be evaluate
1965
+ for each method except Random was selected by
1966
+ wt+1 = argmax
1967
+ w∈Ω
1968
+ (σ(1)2
1969
+ t
1970
+ (xt+1, w) + σ(2)2
1971
+ t
1972
+ (xt+1, w)).
1973
+ In Random, wt+1 was selected as a random sample from the uniform distribution on Ω. In Uncontrollable
1974
+ setting, we allowed the use of a different reference distribution p∗
1975
+ t (w) for each iteration t and used the empirical
1976
+ distribution of w as p∗
1977
+ t (w).
1978
+ Under this setup, one initial point was taken at random and the algorithm was run until the number of
1979
+ iterations reached 500. This simulation was repeated 100 times and the average values of R1 and R2 at each
1980
+ iteration were calculated. From Fig. 3, it can be confirmed that R1 and R2 in Random are not zero even after
1981
+ 500 iterations for both settings. In UCB F1 and UCB F2, the value of R1 is good but the value of R2 is
1982
+ not good because they focus on one of the black-box functions. For MVA, EHI, and Proposed, which focus
1983
+ on improving the DR-PF, R1 and R2 tend to be zero in both settings, but Proposed converges to zero more
1984
+ quickly.
1985
+ 5.2. Computational Time Experiments
1986
+ We confirmed the computational time required to select xt+1 and wt+1 using each method. We performed the
1987
+ same experiment as in Simulator setting in the previous section to evaluate the computational time. Under
1988
+ this setup, one initial point was taken at random and the algorithm was run until the number of iterations
1989
+ reached 500. We computed the average computational time over 500 iterations. We also computed the ratio
1990
+ of the computational time of each method to that of the proposed method. From Table 1, it can be confirmed
1991
+ that Random, which does not require inf calculations, is faster than the proposed method, and UCB F1 (or
1992
+ 8
1993
+
1994
+ UCB F2), which uses only u(F (1))
1995
+ t
1996
+ (x) (or u(F (2))
1997
+ t
1998
+ (x)) required inf calculations, is about half the computational
1999
+ time of the proposed method.
2000
+ The proposed method and MVA using both u(F (1))
2001
+ t
2002
+ (x) and u(F (2))
2003
+ t
2004
+ (x) have
2005
+ comparable computational speed. On the other hand, EHI, which performs the same number of inf calculations
2006
+ for each Monte Carlo sample as the proposed method requires, takes about 100 times longer than the proposed
2007
+ method because the number of Monte Carlo samples is 100.
2008
+ 5.3. Infection Simulation
2009
+ We applied the proposed method to the Pareto optimization problem using a simulation model of a real-
2010
+ world infectious disease. We used the SIR model [Kermack and McKendrick, 1927], which is commonly used
2011
+ as the infection simulation model. In this experiment, we used the SIR model which has the infection rate
2012
+ β ∈ [0, 1] and the recovery γ ∈ [0, 1]. The input space X × Ω was defined as the set of grid points when the
2013
+ region [0.01, 0.5] × [0.01, 0.5] was equally divided into 50 × 50 grid points. Using the SIR model, we defined the
2014
+ following two risk functions which can be interpreted as economic risks:
2015
+ r1(β, γ) = n(β, γ) − 450β + 800γ − C1,
2016
+ r2(β, γ) = n(β, γ) − C2,
2017
+ where n(β, γ) is the maximum number of infected individuals during a given period, calculated using the SIR
2018
+ model, and C1 and C2 are constants. Notably, r1(β, γ) and r2(β, γ) were also used in [Inatsu et al., 2022]. In
2019
+ this experiment, we used the same parameter setting as them. To adapt it to our problem setup, we multiplied
2020
+ them by minus one because risk functions should be minimized. Because β and γ can be interpreted as both
2021
+ design variables and environmental variables, we considered the following two cases:
2022
+ Case1: f (1)(x, w) = −r1(x, w) and f (2)(x, w) = −r2(x, w), where x and w are the infection rate and recovery
2023
+ rate, respectively.
2024
+ Case2: f (1)(x, w) = −r1(x, w) and f (2)(x, w) = −r2(x, w), where x and w are the recovery rate and infection
2025
+ rate, respectively.
2026
+ In this experiment, we considered Simulator setting as in Section 5.1.
2027
+ Under this setup, one initial point was taken at random and the algorithm was run until the number of
2028
+ iterations reached 100. This simulation was repeated 100 times and the average values of R1 and R2 at each
2029
+ iteration were calculated. From Fig. 4, it can be confirmed that the proposed method achieves equal or better
2030
+ performance in all settings.
2031
+ 6. Conclusion
2032
+ In this study, we proposed an efficient BO method for identifying the DR-PF. We proved that the proposed
2033
+ method has theoretical guarantees on accuracy and convergence. Furthermore, through numerical experiments,
2034
+ we confirmed that the proposed method outperforms other comparative methods. Future work includes extend-
2035
+ ing the method to the case where w is a continuous random variable.
2036
+ Acknowledgement
2037
+ This work was partially supported by MEXT KAKENHI (20H00601), JST CREST (JPMJCR21D3, JP-
2038
+ MJCR21D3), JST Moonshot R&D (JPMJMS2033-05), JST AIP Acceleration Research (JPMJCR21U2), NEDO
2039
+ (JPNP18002, JPNP20006) and RIKEN Center for Advanced Intelligence Project.
2040
+ References
2041
+ [Amri et al., 2021] Amri, R. E., Riche, R. L., Helbert, C., Blanchet-Scalliet, C., and Da Veiga, S. (2021). A
2042
+ sampling criterion for constrained bayesian optimization with uncertainties. arXiv preprint arXiv:2103.05706.
2043
+ [Andrei, 2008] Andrei, N. (2008). An unconstrained optimization test functions collection. Adv. Model. Optim,
2044
+ 10(1):147–161.
2045
+ [Beland and Nair, 2017] Beland, J. J. and Nair, P. B. (2017). Bayesian optimization under uncertainty. In
2046
+ NIPS BayesOpt 2017 workshop.
2047
+ [Bogunovic et al., 2018] Bogunovic, I., Scarlett, J., Jegelka, S., and Cevher, V. (2018). Adversarially robust
2048
+ optimization with Gaussian processes. In Advances in neural information processing systems, pages 5760–
2049
+ 5770.
2050
+ [Emmerich, 2005] Emmerich, M. (2005). Single-and multi-objective evolutionary design optimization assisted
2051
+ by gaussian random field metamodels. PhD thesis, Dortmund, Univ., Diss., 2005.
2052
+ 9
2053
+
2054
+ [Fr¨ohlich et al., 2020] Fr¨ohlich, L., Klenske, E., Vinogradska, J., Daniel, C., and Zeilinger, M. (2020). Noisy-
2055
+ input entropy search for efficient robust bayesian optimization. In Chiappa, S. and Calandra, R., editors,
2056
+ Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, volume
2057
+ 108 of Proceedings of Machine Learning Research, pages 2262–2272. PMLR.
2058
+ [Gessner et al., 2020] Gessner, A., Gonzalez, J., and Mahsereci, M. (2020). Active multi-information source
2059
+ Bayesian quadrature. In Uncertainty in Artificial Intelligence, pages 712–721. PMLR.
2060
+ [Inatsu et al., 2022] Inatsu, Y., Takeno, S., Karasuyama, M., and Takeuchi, I. (2022). Bayesian optimization
2061
+ for distributionally robust chance-constrained problem. In Chaudhuri, K., Jegelka, S., Song, L., Szepesvari,
2062
+ C., Niu, G., and Sabato, S., editors, Proceedings of the 39th International Conference on Machine Learning,
2063
+ volume 162 of Proceedings of Machine Learning Research, pages 9602–9621. PMLR.
2064
+ [Iwazaki et al., 2021] Iwazaki, S., Inatsu, Y., and Takeuchi, I. (2021). Mean-variance analysis in bayesian opti-
2065
+ mization under uncertainty. In Banerjee, A. and Fukumizu, K., editors, Proceedings of The 24th International
2066
+ Conference on Artificial Intelligence and Statistics, volume 130 of Proceedings of Machine Learning Research,
2067
+ pages 973–981. PMLR.
2068
+ [Kermack and McKendrick, 1927] Kermack, W. O. and McKendrick, A. G. (1927).
2069
+ A contribution to the
2070
+ mathematical theory of epidemics. Proceedings of the royal society of london. Series A, Containing papers of
2071
+ a mathematical and physical character, 115(772):700–721.
2072
+ [Kirschner et al., 2020] Kirschner, J., Bogunovic, I., Jegelka, S., and Krause, A. (2020). Distributionally robust
2073
+ Bayesian optimization. In Chiappa, S. and Calandra, R., editors, Proceedings of the Twenty Third Interna-
2074
+ tional Conference on Artificial Intelligence and Statistics, volume 108 of Proceedings of Machine Learning
2075
+ Research, pages 2174–2184. PMLR.
2076
+ [Kirschner and Krause, 2018] Kirschner, J. and Krause, A. (2018). Information directed sampling and bandits
2077
+ with heteroscedastic noise. In Conference On Learning Theory, pages 358–384. PMLR.
2078
+ [Nguyen et al., 2020] Nguyen, T., Gupta, S., Ha, H., Rana, S., and Venkatesh, S. (2020).
2079
+ Distributionally
2080
+ robust Bayesian quadrature optimization.
2081
+ In Chiappa, S. and Calandra, R., editors, Proceedings of the
2082
+ Twenty Third International Conference on Artificial Intelligence and Statistics, volume 108 of Proceedings of
2083
+ Machine Learning Research, pages 1921–1931. PMLR.
2084
+ [Oliveira et al., 2019] Oliveira, R., Ott, L., and Ramos, F. (2019).
2085
+ Bayesian optimisation under uncertain
2086
+ inputs. In The 22nd International Conference on Artificial Intelligence and Statistics, pages 1177–1184.
2087
+ [Qing et al., 2022] Qing, J., Couckuyt, I., and Dhaene, T. (2022). A robust multi-objective bayesian optimiza-
2088
+ tion framework considering input uncertainty. arXiv preprint arXiv:2202.12848.
2089
+ [Rahimian and Mehrotra, 2019] Rahimian, H. and Mehrotra, S. (2019). Distributionally robust optimization:
2090
+ A review. arXiv preprint arXiv:1908.05659.
2091
+ [Scarf, 1958] Scarf, H. (1958). A min-max solution of an inventory problem. Studies in the mathematical theory
2092
+ of inventory and production, 10:201–209.
2093
+ [Settles, 2009] Settles, B. (2009). Active learning literature survey. Technical report, University of Wisconsin-
2094
+ Madison Department of Computer Sciences.
2095
+ [Shahriari et al., 2016] Shahriari, B., Swersky, K., Wang, Z., Adams, R. P., and De Freitas, N. (2016). Taking
2096
+ the human out of the loop: A review of Bayesian optimization. Proceedings of the IEEE, 104(1):148–175.
2097
+ [Srinivas et al., 2010] Srinivas, N., Krause, A., Kakade, S., and Seeger, M. (2010). Gaussian process optimization
2098
+ in the bandit setting: No regret and experimental design. In Proceedings of the 27th International Conference
2099
+ on International Conference on Machine Learning, ICML’10, pages 1015–1022, USA. Omnipress.
2100
+ [Suzuki et al., 2020] Suzuki, S., Takeno, S., Tamura, T., Shitara, K., and Karasuyama, M. (2020).
2101
+ Multi-
2102
+ objective bayesian optimization using pareto-frontier entropy. In International Conference on Machine Learn-
2103
+ ing, pages 9279–9288. PMLR.
2104
+ [Toscano-Palmerin and Frazier, 2018] Toscano-Palmerin, S. and Frazier, P. I. (2018). Bayesian optimization
2105
+ with expensive integrands. arXiv preprint arXiv:1803.08661.
2106
+ [Williams and Rasmussen, 2006] Williams, C. K. and Rasmussen, C. E. (2006). Gaussian processes for machine
2107
+ learning. the MIT Press, 2(3):4.
2108
+ [Zuluaga et al., 2016] Zuluaga, M., Krause, A., and P¨uschel, M. (2016). ε-pal: an active learning approach to
2109
+ the multi-objective optimization problem. The Journal of Machine Learning Research, 17(1):3619–3650.
2110
+ 10
2111
+
2112
+ Appendix
2113
+ A. Generalization of Problem Setup
2114
+ Here, we consider a more general problem setting, including the setting introduced in the main text. Specif-
2115
+ ically, we consider the following three settings:
2116
+ • The case with three or more objective functions.
2117
+ • Environment variables cannot be controlled even during optimization.
2118
+ • The setting where reference distributions, control parameter ξ, and candidate distribution family A set
2119
+ differently at each time.
2120
+ Furthermore, by combining (ii) and (iii), we show that under appropriate assumptions, the solution to the
2121
+ distributionally robust Pareto optimization problem is also a good solution to the Pareto optimization problem
2122
+ defined by the true expectation.
2123
+ A.1. Extended Problem Setting
2124
+ Let f (1), . . . , f (m) : X × Ω → R be expensive-to-evaluate black-box functions, where 2 ≤ m. Also let X and
2125
+ Ω be finite sets. Here, for each (x, w) ∈ X ×Ω and j ∈ {1, . . . , m} ≡ [m], the value of f (j)(x, w) is observed with
2126
+ Gaussian noise ε(j) as y(j) = f (j)(x, w) + ε(j), where ε(1), . . . , ε(m) are mutually independent, and ε(j) follows
2127
+ Normal distribution with mean zero and variance σ(j)2
2128
+ noise, that is, ε(j) ∼ N(0, σ(j)2
2129
+ noise). In this section, we assume
2130
+ that w ∈ Ω is a discrete random variable and follows some unknown distribution P †. Here, for environmental
2131
+ variables, we consider either settings in the development phase or settings in the use phase. That is, in the
2132
+ former, environmental variables are completely controllable as design variables; in the latter, environmental
2133
+ variables are uncontrollable and observed as realizations from the true distribution. Furthermore, let At denote
2134
+ the candidate distribution family of P † at each time t, and consider the following At:
2135
+ At = {p(w) | d(p(w), p∗
2136
+ t (w)) ≤ ξt},
2137
+ where p∗
2138
+ t (w) is a user-specified reference distribution, d(·, ·) is a given distance function between distribu-
2139
+ tions, and ξt ≥ 0. Then, for each design variable x ∈ X and time t, the distributionally robust expectations
2140
+ F (1)
2141
+ t
2142
+ (x), . . . , F (m)
2143
+ t
2144
+ (x) are defined as follows:
2145
+ F (j)
2146
+ t
2147
+ (x) =
2148
+ inf
2149
+ p(w)∈At
2150
+
2151
+ w∈Ω
2152
+ f (j)(x, w)p(w), j ∈ [m].
2153
+ Hereafter, we aim to efficiently identify the PF Z∗
2154
+ t determined by F (1)
2155
+ t
2156
+ (x), . . . , F (m)
2157
+ t
2158
+ (x). For each x ∈ X, subset
2159
+ E ⊂ X and time t, let Ft(x) = (F (1)
2160
+ t
2161
+ (x), . . . , F (m)
2162
+ t
2163
+ (x)) and Ft(E) = {Ft(x) | x ∈ E}. Moreover, for a set
2164
+ B ⊂ Rm, the domain Dom(B) dominated by B and the Pareto-frontier Par(B) of B are given by
2165
+ Dom(B) = {y ∈ Rm |∃ y′ ∈ B s.t. y ⪯ y′},
2166
+ Par(B) = ∂(Dom(B)).
2167
+ Then, the PF Z∗
2168
+ t defined by F (1)
2169
+ t
2170
+ (x), . . . , F (m)
2171
+ t
2172
+ (x) can be expressed as follows:
2173
+ Z∗
2174
+ t = Par(Ft(X)).
2175
+ A.1.1. Gaussian Process
2176
+ Next, we construct predictive models for the black-box functions.
2177
+ As in the main body, GPs are used to
2178
+ model the black-box functions f (1), . . . , f (m). First, for each j ∈ [m], assume that f (j) follows a GP prior
2179
+ GP(0, k(j)((x, w), (x′, w′))), where k(j)((x, w), (x′, w′)) is a positive-definite kernel.
2180
+ Then, under the given
2181
+ dataset {(xi, wi, y(j)
2182
+ i )}t
2183
+ i=1, the posterior distribution of f (j) is again a GP, and its posterior mean µ(j)
2184
+ t (x, w)
2185
+ and posterior variance σ(j)2
2186
+ t
2187
+ (x, w) are given by
2188
+ µ(j)
2189
+ t (x, w) = k(j)
2190
+ t (x, w)⊤(K(j)
2191
+ t
2192
+ + σ(j)2
2193
+ noiseIt)−1y(j)
2194
+ t ,
2195
+ σ(j)2
2196
+ t
2197
+ (x, w) = k(j)((x, w), (x, w)) − k(j)
2198
+ t (x, w)⊤(K(j)
2199
+ t
2200
+ + σ(j)2
2201
+ noiseIt)−1k(j)
2202
+ t (x, w),
2203
+ where k(j)
2204
+ t (x, w) is the t-dimensional vector whose kth element is k(j)((x, w), (xk, wk)), y(j)
2205
+ t
2206
+ = (y(j)
2207
+ 1 , . . . , y(j)
2208
+ t )⊤,
2209
+ K(j)
2210
+ t
2211
+ is the t × t matrix whose (k, l)th element is k(j)((xk, wk), (xl, wl)) and It is the t × t identity matrix.
2212
+ 11
2213
+
2214
+ A.2. Proposed Method in the Generalized Setting
2215
+ Here, we propose a BO method for efficiently identifying Z∗
2216
+ t . Using the same argument as the method used in
2217
+ the main body, we construct credible intervals interval for F (1)
2218
+ t
2219
+ (x), . . . , F (m)
2220
+ t
2221
+ (x) using the method proposed by
2222
+ [Kirschner et al., 2020], and give an estimation method for the PF based on the constructed credible intervals.
2223
+ A.2.1. Composition of Credible Intervals and Pareto-frontier Estimation
2224
+ For each (x, w) ∈ X ×Ω, j ∈ [m] and time t, let Q(f (j))
2225
+ t
2226
+ (x, w) = [l(f (j))
2227
+ t
2228
+ (x, w), u(f (j))
2229
+ t
2230
+ (x, w)] be a credible interval
2231
+ of f (j)(x, w). Here, l(f (j))
2232
+ t
2233
+ (x, w) and u(f (j))
2234
+ t
2235
+ (x, w) are given by
2236
+ l(f (j))
2237
+ t
2238
+ (x, w) = µ(j)
2239
+ t (x, w) − β1/2
2240
+ j,t σ(j)
2241
+ t (x, w),
2242
+ u(f (j))
2243
+ t
2244
+ (x, w) = µ(j)
2245
+ t (x, w) + β1/2
2246
+ j,t σ(j)
2247
+ t (x, w),
2248
+ where β1/2
2249
+ j,t ≥ 0. Then, the credible interval for F (j)
2250
+ t
2251
+ (x) is denoted as Q(F (j)
2252
+ t
2253
+ )
2254
+ t
2255
+ (x) ≡ [l(F (j)
2256
+ t
2257
+ )
2258
+ t
2259
+ (x), u(F (j)
2260
+ t
2261
+ )
2262
+ t
2263
+ (x)], where
2264
+ its lower and upper are given by
2265
+ l
2266
+ (F (j)
2267
+ j
2268
+ )
2269
+ t
2270
+ (x) =
2271
+ inf
2272
+ p(w)∈At
2273
+
2274
+ w∈Ω
2275
+ l(f (j))
2276
+ t
2277
+ (x, w)p(w),
2278
+ u
2279
+ (F (j)
2280
+ j
2281
+ )
2282
+ t
2283
+ (x) =
2284
+ inf
2285
+ p(w)∈At
2286
+
2287
+ w∈Ω
2288
+ u(f (j))
2289
+ t
2290
+ (x, w)p(w).
2291
+ Next, for each x ∈ X, subset E ⊂ X and time t, we define LCB(m)
2292
+ t
2293
+ (x), UCB(m)
2294
+ t
2295
+ (x) and LCB(m)
2296
+ t
2297
+ (E) as
2298
+ LCB(m)
2299
+ t
2300
+ (x) = (l(F (1)
2301
+ t
2302
+ )
2303
+ t
2304
+ (x), . . . , l(F (m)
2305
+ t
2306
+ )
2307
+ t
2308
+ (x)), UCB(m)
2309
+ t
2310
+ (x) = (u(F (1)
2311
+ t
2312
+ )
2313
+ t
2314
+ (x), . . . , u(F (m)
2315
+ t
2316
+ )
2317
+ t
2318
+ (x)),
2319
+ LCB(m)
2320
+ t
2321
+ (E) = {LCB(m)
2322
+ t
2323
+ (x) | x ∈ E}.
2324
+ Using this, we define the estimated Pareto solutions set ˆΠ(m)
2325
+ t
2326
+ ⊂ X for design variables as
2327
+ ˆΠ(m)
2328
+ t
2329
+ = {x ∈ X | LCB(m)
2330
+ t
2331
+ (x) ∈ Par(LCB(m)
2332
+ t
2333
+ (X))}.
2334
+ Hereafter, for simplicity, we denote LCB(m)
2335
+ t
2336
+ (x), UCB(m)
2337
+ t
2338
+ (x), LCB(m)
2339
+ t
2340
+ (E) and ˆΠ(m)
2341
+ t
2342
+ as LCBt(x), UCBt(x),
2343
+ LCBt(E) and ˆΠt, respectively.
2344
+ A.2.2. Acquisition Function
2345
+ Here, we propose an AF to determine the next evaluation point. Similar to the main body, we define the AF
2346
+ at(x) for x ∈ X as
2347
+ at(x) = dist(UCBt(x), Dom(LCBt(ˆΠt))).
2348
+ Then, the next evaluation point is selected as follows:
2349
+ Definition A.1 (For the setting in the development phase). The next design variable xt+1 to be evaluated is
2350
+ selected by
2351
+ xt+1 = argmax
2352
+ x∈X
2353
+ at(x).
2354
+ Similarly, the next environmental variable wt+1 to be evaluated is selected by
2355
+ wt+1 = argmax
2356
+ w∈Ω
2357
+ {σ(1)2
2358
+ t
2359
+ (xt+1, w) + · · · + σ(m)2
2360
+ t
2361
+ (xt+1, w)}.
2362
+ Notably, since wt+1 cannot be selected in the setting at the use phase, wt+1 is the realized value from P †
2363
+ at time t + 1. Here, at(x) can be computed analytically by the following lemma:
2364
+ Lemma A.1. Let UCBt(x) = (u1, , . . . , um) and LCBt(ˆΠt) = {(l(i)
2365
+ 1 , . . . , l(i)
2366
+ m ) | 1 ≤ i ≤ k}. Then, at(x) can
2367
+ be computed as follows:
2368
+ at(x) = max{˜at(x), 0},
2369
+ ˜at(x) = min
2370
+ 1≤i≤k max{u1 − l(i)
2371
+ 1 , . . . , um − l(i)
2372
+ m }.
2373
+ A.2.3. Stopping Condition
2374
+ Here, we give a stopping condition of our proposed algorithm. As in the main body, let ϵ > 0 be a user-
2375
+ specified stopping parameter. Then, algorithms terminate if at(x) ≤ ϵ is satisfied. Finally, the pseudo-codes
2376
+ of the proposed algorithm in the development phase and use phase settings are given in Algorithm 2 and 3,
2377
+ respectively.
2378
+ 12
2379
+
2380
+ Algorithm 2 BO for identifying DR-PF in the development phase setting
2381
+ Input: GP prior GP(0, k(j)), candidate distribution family At, tradeoff parameter {βj,t}t≥0, stopping param-
2382
+ eter ϵ > 0, j ∈ [m]
2383
+ t ← 1
2384
+ while at(x) > ϵ do
2385
+ Compute Q(F (j)
2386
+ t
2387
+ )
2388
+ t
2389
+ (x) for each x ∈ X and j ∈ [m]
2390
+ Select the next evaluation point (xt, wt)
2391
+ Observe y(j)
2392
+ t
2393
+ = f (j)(xt, wt) + ε(j)
2394
+ t
2395
+ for each j ∈ [m]
2396
+ Update GPs by adding observed points
2397
+ t ← t + 1
2398
+ end while
2399
+ Output: Return ˆΠt as the estimated set of design variables comprising the DR-PF
2400
+ Algorithm 3 BO for identifying DR-PF in the use phase setting
2401
+ Input: GP prior GP(0, k(j)), candidate distribution family At, tradeoff parameter {βj,t}t≥0, stopping param-
2402
+ eter ϵ > 0, j ∈ [m]
2403
+ t ← 1
2404
+ while at(x) > ϵ do
2405
+ Compute Q(F (j)
2406
+ t
2407
+ )
2408
+ t
2409
+ (x) for each x ∈ X and j ∈ [m]
2410
+ Select the next evaluation point xt
2411
+ Generate wt from P †
2412
+ Observe y(j)
2413
+ t
2414
+ = f (j)(xt, wt) + ε(j)
2415
+ t
2416
+ for each j ∈ [m]
2417
+ Update GPs by adding observed points
2418
+ t ← t + 1
2419
+ end while
2420
+ Output: Return ˆΠt as the estimated set of design variables comprising the DR-PF
2421
+ A.3. Theoretical Analysis
2422
+ Here, we give theorems on the accuracy and convergence of the proposed algorithms. First, to give theoretical
2423
+ guarantees, we assume that for each j ∈ [m], f (j) follows GP GP(0, k(j)((x, w), (x′, w′))). In addition, we assume
2424
+ that each prior variance k(j)((x, w), (x, w)) ≡ σ(j)2
2425
+ 0
2426
+ (x, w) satisfies
2427
+ max
2428
+ (x,w)∈X×Ω σ(j)2
2429
+ 0
2430
+ (x, w) ≤ 1,
2431
+ ∀j ∈ [m].
2432
+ Furthermore, let κ(j)
2433
+ T
2434
+ be a maximum information gain for f (j) at time T. Moreover, as in the main body,
2435
+ we define an ϵ-accurate Pareto region Zϵ,t to quantify the goodness of the predicted ˆΠt as input points that
2436
+ constitute the PF. For a positive number ϵ and the m-dimensional vector ϵ = (ϵ, . . . , ϵ), we define Zϵ,t as
2437
+ Zϵ,t = {y ∈ Rm |∃ y′ ∈ Z∗
2438
+ t s.t. y ⪯ y′ and ∃y′′ ∈ Z∗
2439
+ t s.t. y′′ ⪯ y + ϵ}.
2440
+ Using Zϵ,t, we define the accuracy of ˆΠt as follows:
2441
+ Definition A.2 (Accuracy for ˆΠt). Let ϵ be a positive number.
2442
+ Then, we define ˆΠt to be an ϵ-accurate
2443
+ estimated solution set if the following holds:
2444
+ Ft(ˆΠt) ⊂ Zϵ,t.
2445
+ (A.1)
2446
+ In addition, we define ˆΠt to be an ϵ-accurate estimated Pareto solution set if the following holds:
2447
+ Par(Ft(ˆΠt)) ⊂ Zϵ,t.
2448
+ (A.2)
2449
+ Then, the following theorem guarantees that the proposed algorithms satisfy both (A.1) and (A.2) with a
2450
+ high probability.
2451
+ Theorem A.1. Let t ≥ 1 and δ ∈ (0, 1), and define β1,t = · · · = βm,t = 2 log(m|X × Ω|π2t2/(6δ)) ≡ βt.
2452
+ Moreover, let ϵ > 0 be a user-specified stopping parameter.
2453
+ Then, when Algorithm 2 terminates, with a
2454
+ probability of at least 1 − δ, ˆΠt satisfies both (A.1) and (A.2) for any At.
2455
+ Next, we give a theorem on convergence in the development phase setting. The following theorem gives
2456
+ convergence guarantees for Algorithm 2:
2457
+ 13
2458
+
2459
+ Theorem A.2. Under the same condition as in Theorem A.1, let T be the smallest positive integer satisfying
2460
+ the following inequality:
2461
+ βT (C1κ(1)
2462
+ T
2463
+ + · · · + Cmκ(m)
2464
+ T
2465
+ )
2466
+ T
2467
+ ≤ ϵ2
2468
+ 4 ,
2469
+ where Cj = 2/ log(1 + σ(j)−2
2470
+ noise ) and j ∈ [m]. Then, Algorithm 2 terminates after at most T iterations.
2471
+ Next, we give the theorem on convergence under the setting in the use phase. Unlike the setting in the
2472
+ development phase, we cannot control w in the use phase. Therefore, to make a reasonable inference, the
2473
+ uncertainty at all points must be able to be reduced stochastically. However, if the value of the true probability
2474
+ function p†(w) at some w ∈ Ω is zero, the uncertainty of f (j)(x, w) containing this point cannot be sufficiently
2475
+ small. To avoid this problem, we make the following assumption on the true probability function:
2476
+ min
2477
+ w∈Ω p†(w) ≡ pmin > 0.
2478
+ Then, the following theorem holds:
2479
+ Theorem A.3. Under the same condition as in Theorem A.1, assume that pmin > 0. Let T be the smallest
2480
+ positive integer satisfying the following inequality:
2481
+ βT ( ˜C1κ(1)
2482
+ T
2483
+ + · · · + ˜Cmκ(m)
2484
+ T
2485
+ + ˜C)
2486
+ T
2487
+ ≤ ϵ2
2488
+ 4 ,
2489
+ where ˜Cj = (4p−1
2490
+ min)/ log(1 + σ(j)−2
2491
+ noise ), ˜C = 8mp−1
2492
+ min log(8m/δ) and j ∈ [m]. Then, with a probability of at least
2493
+ 1 − δ, Algorithm 3 terminates after at most T trials.
2494
+ Finally, we show that under appropriate assumptions, the solution to the distributionally robust Pareto
2495
+ optimization problem is also a good solution to the Pareto optimization problem defined by the true expectation
2496
+ in the use phase setting. Here, the expectation function ˜F (j)(x) determined by the true probability function
2497
+ p†(w) is given by
2498
+ ˜F (j)(x) =
2499
+
2500
+ w∈Ω
2501
+ f (j)(x, w)p†(w), j ∈ [m].
2502
+ In addition, for each x ∈ X and E ⊂ X, let ˜F (x) = ( ˜F (1)(x), . . . , ˜F (m)(x)) and ˜F (E) = { ˜F (x) | x ∈ E}.
2503
+ Then, the PF ˜Z∗ defined by ˜F (1)(x), . . . , ˜F (m)(x) can be expressed as follows:
2504
+ ˜Z∗ = Par( ˜F (X)).
2505
+ Furthermore, as in the case of Z∗
2506
+ t , we define an ϵ-accurate Pareto region ˜Zϵ for ˜Z∗. For a positive number ϵ
2507
+ and an m-dimensional vector ϵ = (ϵ, . . . , ϵ), we define ˜Zϵ as
2508
+ ˜Zϵ = {y ∈ Rm |∃ y′ ∈ ˜Z∗ s.t. y ⪯ y′ and ∃y′′ ∈ ˜Z∗ s.t. y′′ ⪯ y + ϵ}.
2509
+ Using ˜Zϵ, we define the accuracy of ˆΠt for ˜Z∗.
2510
+ Definition A.3 (Accuracy of ˆΠt for ˜Z∗). Let ϵ be a positive number. Then, we define ˆΠt to be an ϵ-accurate
2511
+ estimated solution set for ˜Z∗ if the following holds:
2512
+ Ft(ˆΠt) ⊂ ˜Zϵ.
2513
+ Moreover, we define ˆΠt to be an ϵ-accurate estimated Pareto solution set for ˜Z∗ if the following holds:
2514
+ Par(Ft(ˆΠt)) ⊂ ˜Zϵ.
2515
+ Then, the following theorem holds:
2516
+ Theorem A.4. Under the use phase setting, let t ≥ 1 and δ ∈ (0, 1), and define β1,t = · · · = βm,t =
2517
+ 2 log(m|X × Ω|π2t2/(6δ)) ≡ βt. Moreover, let ϵ > 0 be a user-specified stopping parameter. Furthermore, let
2518
+ the reference distribution p∗
2519
+ t (w) be the empirical distribution function for w, and define ξt and the distance
2520
+ between distributions d(·, ·) as
2521
+ ξt = |Ω|
2522
+
2523
+ 1
2524
+ 2t log
2525
+ �|Ω|π2t2
2526
+
2527
+
2528
+ ,
2529
+ d(p1(w), p2(w)) =
2530
+
2531
+ w∈Ω
2532
+ |p1(w) − p2(w)|.
2533
+ Then, if Algorithm 3 terminates at t ≥ T after time T, with a probability of at least 1−2δ, ˆΠt is the 2ϵ-accurate
2534
+ estimated set and estimated Pareto set, that is, the following holds:
2535
+ Ft(ˆΠt) ⊂ ˜Z2ϵ,
2536
+ Par(Ft(ˆΠt)) ⊂ ˜Z2ϵ.
2537
+ Here, T is the smallest positive integer satisfying the following inequality:
2538
+ ∀n ≥ T, 2β1/2
2539
+ 1
2540
+ ξn ≤ ϵ.
2541
+ (A.3)
2542
+ 14
2543
+
2544
+ B. Proofs
2545
+ Here, we give proofs of Lemma A.1 and Theorem A.1–A.4. Notably, Lemma 3.1 and Theorem 4.1–4.2 in the
2546
+ main body are special cases of Lemma A.1 and Theorem A.1–A.2, respectively. First, we prove Lemma A.1.
2547
+ Proof. Let UCBt(x) = (u1, . . . , um) ≡ u and LCBt(ˆΠt) = {(l(i)
2548
+ 1 , . . . , l(i)
2549
+ m ) | 1 ≤ i ≤ k} ≡ L.
2550
+ Here, if
2551
+ u ∈ Dom(L), then the following holds from the definition of dist(a, B):
2552
+ at(x) = dist(u, Dom(L)) =
2553
+ inf
2554
+ b∈Dom(L) d∞(u, b) = d∞(u, u) = 0.
2555
+ In addition, since u ∈ Dom(L), there exists (l(i)
2556
+ 1 , . . . , l(i)
2557
+ m ) such that uj ≤ l(i)
2558
+ j
2559
+ for any j ∈ [m]. Thus, we have
2560
+ max{u1 − l(i)
2561
+ 1 , . . . , um − l(i)
2562
+ m } ≤ 0. This implies that
2563
+ ˜at(x) = min
2564
+ 1≤i≤k max{u1 − l(i)
2565
+ 1 , . . . , um − l(i)
2566
+ m } ≤ 0
2567
+ and max{˜at(x), 0} = 0. Therefore, we get at(x) = max{˜at(x), 0}. Next, we consider the case where u /∈
2568
+ Dom(L). Let at(x) = η. Then, noting that u /∈ Dom(L), for any i ∈ {1, . . . , k}, there exists j ∈ [m] such that
2569
+ uj > l(i)
2570
+ j . This implies that
2571
+ ˜at(x) = min
2572
+ 1≤i≤k max{u1 − l(i)
2573
+ 1 , . . . , um − l(i)
2574
+ m } ≡ ˜η > 0
2575
+ and max{˜at(x), 0} = ˜at(x) = ˜η. For this ˜η, there exists i such that
2576
+ uj − l(i)
2577
+ j
2578
+ ≤ ˜η
2579
+ ∀j ∈ [m].
2580
+ Hence, we have ˜u ≡ (u1 − ˜η, . . . , um − ˜η) ∈ Dom(L) because uj − ˜η ≤ l(i)
2581
+ j
2582
+ for any j ∈ [m]. Thus, from the
2583
+ definition of at(x), the following holds:
2584
+ η = at(x) = dist(u, Dom(L)) =
2585
+ inf
2586
+ b∈Dom(L) d∞(u, b) ≤ d∞(u, ˜u) = ˜η.
2587
+ Here, we assume η < ˜η. Then, noting that Dom(L) is the closed set, there exists ˜l = (˜l1, . . . , ˜lm) ∈ Dom(L)
2588
+ such that d∞(u, ˜l) = η. Therefore, ˜l can be expressed as ˜l = (u1 − s1, . . . , um − sm), where 0 ≤ |sj| ≤ η and at
2589
+ least one of s1, . . . , sm is η. Thus, since (u1 − η, . . . , um − η) ⪯ ˜l, noting that (u1 − η, . . . , um − η) ∈ Dom(L)
2590
+ there exists i such that
2591
+ uj − η ≤ l(i)
2592
+ j
2593
+ ∀j ∈ [m].
2594
+ This implies that max{u1 − l(i)
2595
+ 1 , . . . , um − l(i)
2596
+ m } ≤ η. Hence, it follows that
2597
+ ˜η = min
2598
+ 1≤i≤k max{u1 − l(i)
2599
+ 1 , . . . , um − l(i)
2600
+ m } ≤ η.
2601
+ However, this is a contradiction with η < ˜η. Consequently, we obtain at(x) = max{˜at(x), 0}.
2602
+ Next, we prove Theorem A.1.
2603
+ Proof. First, we prove Ft(ˆΠt) ⊂ Zϵ,t. Since ˆΠt ⊂ X, for any y ∈ Ft(ˆΠt), there exists y′ ∈ Z∗
2604
+ t such that
2605
+ y ⪯ y′. Thus, it is sufficient to show that there exists y′′ ∈ Z∗
2606
+ t such that y′′ ⪯ y +ϵ. Here, under the theorem’s
2607
+ assumption, with a probability of at least 1 − δ, the following holds for any (x, w) ∈ X × Ω, j ∈ [m] and time
2608
+ t ≥ 1:
2609
+ f (j)(x, w) ∈ Q(f (j))
2610
+ t
2611
+ (x, w),
2612
+ where this relation can be derived by using Lemma 5.1 of [Srinivas et al., 2010]. Hence, we have F (j)
2613
+ t
2614
+ (x) ∈
2615
+ Q(F (j)
2616
+ t
2617
+ )
2618
+ t
2619
+ (x). In addition, since Z∗
2620
+ t is the closed set, for any x ∈ ˆΠt, there exist a ≥ 0 and Ft(x) + (a, . . . , a) ≡
2621
+ y′′ ∈ Z∗
2622
+ t such that
2623
+ dist(Ft(x), Z∗
2624
+ t ) = d∞(Ft(x), y′′) ≤ d∞((l(F (1)
2625
+ t
2626
+ )
2627
+ t
2628
+ (x), . . . , l(F (m)
2629
+ t
2630
+ )
2631
+ t
2632
+ (x)), y′′′),
2633
+ where y′′′ ∈ Z∗
2634
+ t can be given by using s ≥ a ≥ 0 as y′′′ = (l(F (1)
2635
+ t
2636
+ )
2637
+ t
2638
+ (x), . . . , l(F (m)
2639
+ t
2640
+ )
2641
+ t
2642
+ (x)) + (s, . . . , s). Here, for some
2643
+ ˆx ∈ X satisfying y′′′ ⪯ Ft(ˆx), the following holds:
2644
+ d∞((l(F (1)
2645
+ t
2646
+ )
2647
+ t
2648
+ (x), . . . , l(F (m)
2649
+ t
2650
+ )
2651
+ t
2652
+ (x)), y′′′) ≤ dist(Ft(ˆx), Dom(LCBt(ˆΠt))).
2653
+ 15
2654
+
2655
+ Moreover, the right hand side is bounded from above as
2656
+ dist(Ft(ˆx), Dom(LCBt(ˆΠt)))
2657
+ ≤ dist(UCBt(ˆx), Dom(LCBt(ˆΠt)))
2658
+ ≤ max
2659
+ x†∈X dist(UCBt(x†), Dom(LCBt(ˆΠt))) = at(xt+1).
2660
+ Therefore, if at(xt+1) ≤ ϵ, then d∞(Ft(x), y′′) ≤ ϵ. It follows that y′′ ⪯ Ft(x) + ϵ. Since x is an arbitrary
2661
+ element of ˆΠt, we have Ft(ˆΠt) ⊂ Zϵ,t. Next, we prove Par(Ft(ˆΠt)) ⊂ Zϵ,t. As before, noting that ˆΠt ⊂ X, for
2662
+ any y ∈ Par(Ft(ˆΠt)), there exists y′ ∈ Z∗
2663
+ t such that y ⪯ y′. In addition, since Z∗
2664
+ t is the closed set, for any
2665
+ y ∈ Par(Ft(ˆΠt)), there exist a ≥ 0 and y + (a, . . . , a) ≡ y′′ ∈ Z∗
2666
+ t such that
2667
+ dist(y, Z∗
2668
+ t ) = d∞(y, y′′).
2669
+ Here, for some ˆx ∈ X satisfying y′′ ⪯ Ft(ˆx), the following holds:
2670
+ d∞(y, y′′) ≤ d∞(y′′′, Ft(ˆx)) ≤ dist(Ft(ˆx), Dom(LCBt(ˆΠt))),
2671
+ where y′′′ ∈ Par(Ft(ˆΠt)) can be given by using s′ ≥ a ≥ 0 as y′′′ = Ft(ˆx) − (s′, . . . , s′). Then, we obtain
2672
+ dist(Ft(ˆx), Dom(LCBt(ˆΠt)))
2673
+ ≤ dist(UCBt(ˆx), Dom(LCBt(ˆΠt)))
2674
+ ≤ max
2675
+ x†∈X dist(UCBt(x†), Dom(LCBt(ˆΠt))) = at(xt+1).
2676
+ Thus, if at(xt+1) ≤ ϵ, then d∞(y, y′′) ≤ ϵ. This implies that y′′ ⪯ y + ϵ. Consequently, since y is an arbitrary
2677
+ element of Par(Ft(ˆΠt)), we have Par(Ft(ˆΠt)) ⊂ Zϵ,t.
2678
+ Next, we prove Theorem A.2.
2679
+ Proof. Let xt = argmaxx∈X at−1(x). Here, since LCB t−1(xt) ∈ Dom(LCB t−1(ˆΠt−1)), the following in-
2680
+ equality holds:
2681
+ at−1(xt) = dist(UCBt−1(xt), Dom(LCB t−1(ˆΠt−1)))
2682
+ ≤ d∞(UCB t−1(xt), LCB t−1(xt))
2683
+ = max
2684
+ 1≤j≤m{u
2685
+ (F (j)
2686
+ t−1)
2687
+ t−1
2688
+ (xt) − l
2689
+ (F (j)
2690
+ t−1)
2691
+ t−1
2692
+ (xt)}.
2693
+ Therefore, from the definition of u
2694
+ (F (j)
2695
+ t−1)
2696
+ t−1
2697
+ (xt) and l
2698
+ (F (j)
2699
+ t−1)
2700
+ t−1
2701
+ (xt), we get
2702
+ u
2703
+ (F (j)
2704
+ t−1)
2705
+ t−1
2706
+ (xt) − l
2707
+ (F (j)
2708
+ t−1)
2709
+ t−1
2710
+ (xt) ≤ 2β1/2
2711
+ t
2712
+ max
2713
+ w∈Ω σ(j)
2714
+ t−1(xt, w).
2715
+ Hence, the following inequality holds:
2716
+ a2
2717
+ t−1(xt) ≤ 4βt max
2718
+ 1≤j≤m max
2719
+ w∈Ω σ(j)2
2720
+ t−1 (xt, w).
2721
+ Furthermore, since wt is selected by
2722
+ wt = argmax
2723
+ w∈Ω
2724
+ (σ(1)2
2725
+ t−1 (xt, w) + · · · + σ(m)2
2726
+ t−1 (xt, w)),
2727
+ the following holds:
2728
+ a2
2729
+ t−1(xt) ≤ 4βt max
2730
+ 1≤j≤m max
2731
+ w∈Ω σ(j)2
2732
+ t−1 (xt, w)
2733
+ ≤ 4βt(σ(1)2
2734
+ t−1 (xt, wt) + · · · + σ(m)2
2735
+ t−1 (xt, wt)).
2736
+ In addition, let T be the number given by Theorem A.2. Then, we get
2737
+ T min
2738
+ 1≤t≤T a2
2739
+ t−1(xt) ≤
2740
+ T
2741
+
2742
+ t=1
2743
+ a2
2744
+ t−1(xt)
2745
+ ≤ 4βT
2746
+ m
2747
+
2748
+ j=1
2749
+ T
2750
+
2751
+ t=1
2752
+ σ(j)2
2753
+ t−1 (xt, wt)
2754
+ ≤ 4βT (C1κ(1)
2755
+ T
2756
+ + · · · + Cmκ(m)
2757
+ T
2758
+ ),
2759
+ 16
2760
+
2761
+ where the last inequality can be derived by using Lemma 5.3 and 5.4 of [Srinivas et al., 2010].
2762
+ Therefore,
2763
+ dividing both sides by T, we obtain
2764
+ min
2765
+ 1≤t≤T a2
2766
+ t−1(xt) ≤ 4βT
2767
+ C1κ(1)
2768
+ T
2769
+ + · · · + Cmκ(m)
2770
+ T
2771
+ T
2772
+ ≤ ϵ2.
2773
+ Hence, we get min1≤t≤T at−1(xt) ≤ ϵ. This implies that there exists t′ ∈ {1, . . . , T} such that at′−1(xt′) ≤ ϵ.
2774
+ Next, we prove Theorem A.3.
2775
+ Proof. Using the same argument as in the proof of Theorem A.2, we have
2776
+ a2
2777
+ t−1(xt) ≤ 4βt max
2778
+ 1≤j≤m max
2779
+ w∈Ω σ(j)2
2780
+ t−1 (xt, w).
2781
+ Furthermore, since pmin > 0, the following inequality holds:
2782
+ max
2783
+ w∈Ω σ(j)2
2784
+ t−1 (xt, w) ≤
2785
+
2786
+ wΩ
2787
+ σ(j)2
2788
+ t−1 (xt, w)
2789
+ =
2790
+
2791
+ wΩ
2792
+ (p†(w))−1p†(w)σ(j)2
2793
+ t−1 (xt, w)
2794
+ ≤ p−1
2795
+ min
2796
+
2797
+ wΩ
2798
+ p†(w)σ(j)2
2799
+ t−1 (xt, w)
2800
+ ≡ p−1
2801
+ minEw[σ(j)2
2802
+ t−1 (xt, w)].
2803
+ Using this, we get
2804
+ max
2805
+ 1≤j≤m max
2806
+ w∈Ω σ(j)2
2807
+ t−1 (xt, w) ≤
2808
+ m
2809
+
2810
+ j=1
2811
+ max
2812
+ w∈Ω σ(j)2
2813
+ t−1 (xt, w)
2814
+ ≤ p−1
2815
+ min
2816
+ m
2817
+
2818
+ j=1
2819
+ Ew[σ(j)2
2820
+ t−1 (xt, w)]
2821
+ = p−1
2822
+ minEw
2823
+
2824
+
2825
+ m
2826
+
2827
+ j=1
2828
+ σ(j)2
2829
+ t−1 (xt, w)
2830
+
2831
+ � .
2832
+ Here, let T be the number given by Theorem A.3. Then, we obtain
2833
+ T min
2834
+ 1≤t≤T a2
2835
+ t−1(xt) ≤
2836
+ T
2837
+
2838
+ t=1
2839
+ a2
2840
+ t−1(xt)
2841
+ ≤ 4βT p−1
2842
+ min
2843
+ T
2844
+
2845
+ t=1
2846
+ Ew
2847
+
2848
+
2849
+ m
2850
+
2851
+ j=1
2852
+ σ(j)2
2853
+ t−1 (xt, w)
2854
+
2855
+ � .
2856
+ (B.1)
2857
+ Noting that �m
2858
+ j=1 σ(j)2
2859
+ t−1 (xt, w) is a non-negative random variable and �m
2860
+ j=1 σ(j)2
2861
+ t−1 (xt, w) ≤ m, from Lemma 3
2862
+ of [Kirschner and Krause, 2018], the following holds with a probability of at least 1 − δ:
2863
+ T
2864
+
2865
+ t=1
2866
+ Ew
2867
+
2868
+
2869
+ m
2870
+
2871
+ j=1
2872
+ σ(j)2
2873
+ t−1 (xt, w)
2874
+
2875
+ � ≤ 2
2876
+ m
2877
+
2878
+ j=1
2879
+ T
2880
+
2881
+ t=1
2882
+ σ(j)2
2883
+ t−1 (xt, w) + 4m log 1
2884
+ δ + 8m log 4m + 1.
2885
+ Moreover, since 4m log 1
2886
+ δ ≤ 8m log 1
2887
+ δ and 1 ≤ 8m log 2, we have
2888
+ 4m log 1
2889
+ δ + 8m log 4m + 1 ≤ 8m log 1
2890
+ δ + 8m log 4m + 8m log 2
2891
+ = 8m log 8m
2892
+ δ
2893
+ and
2894
+ T
2895
+
2896
+ t=1
2897
+ Ew
2898
+
2899
+
2900
+ m
2901
+
2902
+ j=1
2903
+ σ(j)2
2904
+ t−1 (xt, w)
2905
+
2906
+ � ≤ 2
2907
+ m
2908
+
2909
+ j=1
2910
+ T
2911
+
2912
+ t=1
2913
+ σ(j)2
2914
+ t−1 (xt, w) + 8m log 8m
2915
+ δ .
2916
+ (B.2)
2917
+ 17
2918
+
2919
+ Hence, by substituting (B.2) into (B.1), from Lemma 5.3 and 5.4 of [Srinivas et al., 2010], we get
2920
+ T min
2921
+ 1≤t≤T a2
2922
+ t−1(xt) ≤ 4βT ( ˜C1κ(1)
2923
+ T
2924
+ + · · · + ˜Cmκ(m)
2925
+ T
2926
+ + ˜C).
2927
+ Therefore, from the definition of T, dividing both sides by T, we obtain
2928
+ min
2929
+ 1≤t≤T a2
2930
+ t−1(xt) ≤ 4βT
2931
+ ˜C1κ(1)
2932
+ T
2933
+ + · · · + ˜Cmκ(m)
2934
+ T
2935
+ + ˜C
2936
+ T
2937
+ ≤ ϵ2.
2938
+ Thus, we get min1≤t≤T at−1(xt) ≤ ϵ. This implies that there exists t′ ∈ {1, . . . , T} such that at′−1(xt′) ≤ ϵ.
2939
+ Finally, we prove Theorem A.4.
2940
+ Proof. Suppose that p∗
2941
+ t (w) is the empirical distribution function of w. Then, from Hoeffding’s inequality, the
2942
+ following inequality holds for any w:
2943
+ P(|p∗
2944
+ t (w) − p†(w)| ≥ λ) ≤ 2 exp(−2tλ2).
2945
+ Here, let
2946
+ λ =
2947
+
2948
+ 1
2949
+ 2t log
2950
+ �|Ω|π2t2
2951
+
2952
+
2953
+ .
2954
+ Then, with a probability of at least 1 − δ, the following holds for any t ≥ 1 and w ∈ Ω:
2955
+ |p∗
2956
+ t (w) − p†(w)| ≤ λ.
2957
+ In addition, from the definition of d(·, ·), we get
2958
+ d(p∗
2959
+ t (w), p†(w)) =
2960
+
2961
+ w∈Ω
2962
+ |p∗
2963
+ t (w) − p†(w)| ≤ |Ω|λ = ξt.
2964
+ This implies that p†(w) ∈ At. Furthermore, from the definition of ˜F (j)(x) and F (j)
2965
+ t
2966
+ (x), the following inequality
2967
+ holds for any t ≥ 1, j ∈ [m] and x ∈ X:
2968
+ F (j)
2969
+ t
2970
+ (x) ≤ ˜F (j)(x).
2971
+ Therefore, it follows that
2972
+ Ft(x) ⪯ ˜F (x)
2973
+ ∀x ∈ X,∀ t ≥ 1.
2974
+ (B.3)
2975
+ Here, for any x ∈ X, t ≥ 1 and j ∈ [m], let ¯p(j)
2976
+ t,x(w) ∈ At be the probability function satisfying
2977
+ F (j)
2978
+ t
2979
+ (x) =
2980
+
2981
+ w∈Ω
2982
+ f (j)(x, w)¯p(j)
2983
+ t,x(w).
2984
+ Then, the following inequality holds:
2985
+ | ˜F (j)(x) − F (j)
2986
+ t
2987
+ (x)| ≤
2988
+
2989
+ w∈Ω
2990
+ |f (j)(x, w)||p†(w) − ¯p(j)
2991
+ t,x(w)|.
2992
+ Moreover, from Lemma 5.1 of [Srinivas et al., 2010], with a probability of at least 1 − δ, the following holds for
2993
+ any x ∈ X, w ∈ Ω and j ∈ [m]:
2994
+ |f (j)(x, w)| ≤ β1/2
2995
+ 1
2996
+ σ(j)
2997
+ 0 (x, w) ≤ β1/2
2998
+ 1
2999
+ .
3000
+ Hence, we have
3001
+ ˜F (j)(x) − F (j)
3002
+ t
3003
+ (x) ≤ | ˜F (j)(x) − F (j)
3004
+ t
3005
+ (x)|
3006
+ ≤ β1/2
3007
+ 1
3008
+
3009
+ w∈Ω
3010
+ |p†(w) − ¯p(j)
3011
+ t,x(w)|
3012
+ = β1/2
3013
+ 1
3014
+ d(p†(w), ¯p(j)
3015
+ t,x(w))
3016
+ ≤ β1/2
3017
+ 1
3018
+ (d(p†(w), p∗
3019
+ t (w)) + d(p∗
3020
+ t (w), ¯p(j)
3021
+ t,x(w))) ≤ 2β1/2
3022
+ 1
3023
+ ξt.
3024
+ In addition, let T be the smallest positive integer satisfying (A.3). Then, for any t ≥ T, the following inequality
3025
+ holds:
3026
+ ˜F (j)(x) ≤ F (j)
3027
+ t
3028
+ (x) + ϵ.
3029
+ 18
3030
+
3031
+ Thus, we obtain
3032
+ ˜F (x) ⪯ Ft(x) + ϵ
3033
+ ∀x ∈ X,∀ t ≥ T.
3034
+ (B.4)
3035
+ Therefore, by combining (B.3) and (B.4), we have
3036
+ Par(Ft(X)) ⊂ ˜Zϵ
3037
+ ∀t ≥ T.
3038
+ (B.5)
3039
+ Finally, from Theorem A.1, the following holds at t′, the time at which the algorithm terminates:
3040
+ Ft′(ˆΠt′) ⊂ Zϵ,t′, Par(Ft′(ˆΠt′)) ⊂ Zϵ,t′.
3041
+ (B.6)
3042
+ Consequently, if t′ ≥ T, using (B.5) and (B.6) we get
3043
+ Ft′(ˆΠt′) ⊂ ˜Z2ϵ, Par(Ft′(ˆΠt′)) ⊂ ˜Z2ϵ.
3044
+ C. Experimental Details and Additional Experiments
3045
+ Here, we give experimental details and additional experiments in Section 5.
3046
+ Experimental Setup
3047
+ The experimental parameters used in each experiment are described in Table 2.
3048
+ Table 2: Experimental parameters for each setting
3049
+ Parameters
3050
+ Simulator setting
3051
+ σ2
3052
+ f,1 = 1000, L1 = 2, σ(1)2
3053
+ noise = 10−4, β1/2
3054
+ 1,t = 3, σ2
3055
+ f,2 = 1000, L2 = 2, σ(2)2
3056
+ noise = 10−4, β1/2
3057
+ 2,t = 3, ξ = 0.05
3058
+ Uncontrollable setting
3059
+ σ2
3060
+ f,1 = 1000, L1 = 2, σ(1)2
3061
+ noise = 10−4, β1/2
3062
+ 1,t = 3, σ2
3063
+ f,2 = 1000, L2 = 2, σ(2)2
3064
+ noise = 10−4, β1/2
3065
+ 2,t = 3, ξ = 0.05
3066
+ SIR (Case1)
3067
+ σ2
3068
+ f,1 = 5000, L1 = 0.1, σ(1)2
3069
+ noise = 10−8, β1/2
3070
+ 1,t = 3, σ2
3071
+ f,2 = 105, L2 = 0.01, σ(2)2
3072
+ noise = 10−4, β1/2
3073
+ 2,t = 2, ξ = 0.15
3074
+ SIR (Case2)
3075
+ σ2
3076
+ f,1 = 104, L1 = 0.1, σ(1)2
3077
+ noise = 10−3, β1/2
3078
+ 1,t = 2, σ2
3079
+ f,2 = 105, L2 = 0.1, σ(2)2
3080
+ noise = 10−3, β1/2
3081
+ 2,t = 3, ξ = 0.15
3082
+ MVA
3083
+ The MVA method is based on reducing the uncertainty in the potential optimal set Mt and the
3084
+ estimated PF solution set ˆΠt. Using ˆΠt, Mt is defined as follows:
3085
+ Mt = {x ∈ X \ ˆΠt |∀ x′ ∈ ˆΠt, u(F (1))
3086
+ t
3087
+ (x) > l(F (1))
3088
+ t
3089
+ (x′) or u(F (2))
3090
+ t
3091
+ (x) > l(F (2))
3092
+ t
3093
+ (x′)}.
3094
+ The uncertainty λt(x) is given by
3095
+ λt(x) =
3096
+
3097
+ (u(F (1))
3098
+ t
3099
+ (x) − l(F (1))
3100
+ t
3101
+ (x))2 + (u(F (2))
3102
+ t
3103
+ (x) − l(F (2))
3104
+ t
3105
+ (x))2.
3106
+ EHI
3107
+ The EHI method is based on the expected hypervolume improvement for a bounded region defined by
3108
+ PFs and reference points. Let B ⊂ R2 be a set, and let r = (r1, r2) ∈ R2 be a reference point satisfying r ⪯ B.
3109
+ Then, let us denote the bounded region dominated by B and r, by
3110
+ Dom(B; r) = Dom(B) ∩ [r1, ∞) × [r2, ∞).
3111
+ In EHI, for each j ∈ {1, 2} we calculated the estimated value of F (j)(x) by using posterior means as
3112
+ µ(F (j))
3113
+ t
3114
+ (x) =
3115
+ inf
3116
+ p(w)∈A
3117
+
3118
+ w∈Ω
3119
+ µ(j)
3120
+ t (x, w)p(w).
3121
+ For a point x ∈ X a subset E ⊂ X, we define µ(F )
3122
+ t
3123
+ (x) and µ(F )
3124
+ t
3125
+ (E) as
3126
+ µ(F )
3127
+ t
3128
+ (x) = (µ(F (1))
3129
+ t
3130
+ (x), µ(F (2))
3131
+ t
3132
+ (x)),
3133
+ µ(F )
3134
+ t
3135
+ (E) = {µ(F )
3136
+ t
3137
+ (x) | x ∈ E}.
3138
+ In our experiments, we defined the reference point rt = (rt,1, rt,2) for each iteration t as
3139
+ rt,1 = min
3140
+ x∈X µ(F (1))
3141
+ t
3142
+ (x),
3143
+ rt,2 = min
3144
+ x∈X µ(F (2))
3145
+ t
3146
+ (x).
3147
+ Then, the expected hypervolume improvement for x ∈ X is given by
3148
+ EHIt(x) = EF (1)(x),F (2)(x)[Vol(Dom(µ(F )
3149
+ t
3150
+ (X) ∪ {(F (1)(x), F (2)(x))}; rt) \ Dom(µ(F )
3151
+ t
3152
+ (X); rt))].
3153
+ 19
3154
+
3155
+ Table
3156
+ 3: Computational time (second) and computational time ratio for each setting when Nx = 50 and
3157
+ Nw = 100
3158
+ Random
3159
+ UCB F1
3160
+ UCB F2
3161
+ MVA
3162
+ EHI
3163
+ Proposed
3164
+ Computational time
3165
+ 0.000
3166
+ 0.181
3167
+ 0.185
3168
+ 0.375
3169
+ 45.77
3170
+ 0.364
3171
+ (Standard error)
3172
+ (0.000)
3173
+ (0.001)
3174
+ (0.001)
3175
+ (0.001)
3176
+ (0.025)
3177
+ (0.001)
3178
+ Computational time ratio
3179
+ 0.000
3180
+ 0.500
3181
+ 0.510
3182
+ 1.031
3183
+ 126.15
3184
+ 1
3185
+ (Standard error)
3186
+ (0.000)
3187
+ (0.002)
3188
+ (0.002)
3189
+ (0.003)
3190
+ (0.327)
3191
+ (0)
3192
+ Table
3193
+ 4: Computational time (second) and computational time ratio for each setting when Nx = 100 and
3194
+ Nw = 50
3195
+ Random
3196
+ UCB F1
3197
+ UCB F2
3198
+ MVA
3199
+ EHI
3200
+ Proposed
3201
+ Computational time
3202
+ 0.000
3203
+ 0.134
3204
+ 0.135
3205
+ 0.272
3206
+ 31.97
3207
+ 0.268
3208
+ (Standard error)
3209
+ (0.000)
3210
+ (0.001)
3211
+ (0.001)
3212
+ (0.001)
3213
+ (0.015)
3214
+ (0.001)
3215
+ Computational time ratio
3216
+ 0.000
3217
+ 0.503
3218
+ 0.507
3219
+ 1.019
3220
+ 119.92
3221
+ 1
3222
+ (Standard error)
3223
+ (0.000)
3224
+ (0.002)
3225
+ (0.002)
3226
+ (0.004)
3227
+ (0.346)
3228
+ (0)
3229
+ Table
3230
+ 5: Computational time (second) and computational time ratio for each setting when Nx = 100 and
3231
+ Nw = 100
3232
+ Random
3233
+ UCB F1
3234
+ UCB F2
3235
+ MVA
3236
+ EHI
3237
+ Proposed
3238
+ Computational time
3239
+ 0.000
3240
+ 0.360
3241
+ 0.362
3242
+ 0.719
3243
+ 91.82
3244
+ 0.726
3245
+ (Standard error)
3246
+ (0.000)
3247
+ (0.001)
3248
+ (0.001)
3249
+ (0.002)
3250
+ (0.099)
3251
+ (0.002)
3252
+ Computational time ratio
3253
+ 0.000
3254
+ 0.496
3255
+ 0.500
3256
+ 0.991
3257
+ 127.02
3258
+ 1
3259
+ (Standard error)
3260
+ (0.000)
3261
+ (0.001)
3262
+ (0.001)
3263
+ (0.002)
3264
+ (0.412)
3265
+ (0)
3266
+ Here, for a bounded set A, Vol(A) represents the hypervolume of A.
3267
+ Because F (1)(x) and F (2)(x) do not
3268
+ follow GPs, we cannot calculate EHIt(x) analytically. Thus, we approximate it by using samples from posterior
3269
+ distributions.
3270
+ Let M be a number of Monte Carlo sampling, and let (f (j)
3271
+ t,(l)(x, w1), . . . , f (j)
3272
+ t,(l)(x, w|Ω|)) be an
3273
+ lth sample from the posterior distribution of (f (j)(x, w1), . . . , f (j)(x, w|Ω|)) at iteration t, where 1 ≤ l ≤ M,
3274
+ j ∈ {1, 2} and x ∈ X. Then, for each t, we calculate F (1)
3275
+ t,(l)(x) and F (2)
3276
+ t,(l)(x) as
3277
+ F (1)
3278
+ t,(l)(x) =
3279
+ inf
3280
+ p(w)∈A
3281
+
3282
+ w∈Ω
3283
+ f (1)
3284
+ t,(l)(x, w)p(w),
3285
+ F (2)
3286
+ t,(l)(x) =
3287
+ inf
3288
+ p(w)∈A
3289
+
3290
+ w∈Ω
3291
+ f (2)
3292
+ t,(l)(x, w)p(w).
3293
+ Using this, we approximate EHIt(x) as
3294
+ 1
3295
+ M
3296
+ M
3297
+
3298
+ l=1
3299
+ Vol(Dom(µ(F )
3300
+ t
3301
+ (X) ∪ {(F (1)
3302
+ t,(l)(x), F (2)
3303
+ t,(l)(x))}; rt) \ Dom(µ(F )
3304
+ t
3305
+ (X); rt)).
3306
+ Additional Computational Time Experiments
3307
+ We also compared the computational time of each method
3308
+ by changing input space settings conducted in Section 5.2. In this experiment, the input space X × Ω was a set
3309
+ of grid points divided into [−10, 10] × [−10, 10] equally spaced at Nx × Nw. We compared computational times
3310
+ using (50, 100), (100, 50) and (100, 100) as (Nx, Nw). From Table 3–5, it can be confirmed that the results are
3311
+ similar to the experimental results conducted in Section 5.2.
3312
+ 20
3313
+
7dFJT4oBgHgl3EQfmywg/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8tE1T4oBgHgl3EQfUAOX/content/tmp_files/2301.03085v1.pdf.txt ADDED
@@ -0,0 +1,726 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Granger causality test for heteroskedastic and
2
+ structural-break time series using generalized least squares
3
+ Hugo J. Bello ∗
4
+ January 10, 2023
5
+ Abstract
6
+ This paper proposes a novel method (GLS Granger test) to determine causal relation-
7
+ ships between time series based on the estimation of the autocovariance matrix and gener-
8
+ alized least squares. We show the effectiveness of proposed autocovariance matrix estimator
9
+ (the sliding autocovariance matrix) and we compare the proposed method with the classical
10
+ Granger F-test with via a synthetic dataset and a real dataset composed by cryptocurren-
11
+ cies. The simulations show that the proposed GLS Granger test captures causality more
12
+ accurately than Granger F-tests in the cases of heteroskedastic or structural-break residu-
13
+ als. Finally, we use the proposed method to unravel unknown causal relationships between
14
+ cryptocurrencies.
15
+ Keywords:
16
+ Granger Test, Causality, Generalized Least Squares, Wald Test.
17
+ 1
18
+ Introduction
19
+ Granger causality is a statistical concept that helps us determine whether the information in
20
+ one time series is useful in predicting another. It is widely used in numerous fields, including
21
+ economics, finance, geology, genetics and neuroscience, to understand the relationships between
22
+ variables and to identify possible causal connections.
23
+ The main tool for studying time series causality is the Granger causality F-test ([Gra69],
24
+ [Gra80]) which is based on ordinary least squares (OLS) estimation and therefore is tied to the
25
+ assumptions of OLS (among them homocedasticity of the residuals)
26
+ In many real-world applications, we are confronted with time series suffering from a variety
27
+ of problems such as heteroscedasticity (non-equal variance amongst time observations) or struc-
28
+ tural breaks (the appearance of two or more stationary periods with different means). In these
29
+ situations OLS is not recommended and Granger F-test can be inadequate.
30
+ The aim of this paper is to present a method for determining Granger causality based on
31
+ generalized least squares based on the estimation of the autocovariance matrix of the residuals.
32
+ 1.1
33
+ Preliminaries
34
+ In this section we will present introducing notation and definitions. We also review the notion
35
+ of Granger causality.
36
+ ∗hugojose.bello@uva.es Department of Applied Mathematics, University of Valladolid (Campus Soria)
37
+ 1
38
+ arXiv:2301.03085v1 [stat.ME] 8 Jan 2023
39
+
40
+ 1.1.1
41
+ Granger causality F-test
42
+ The Granger causality ([Gra69], [Gra80]) test is a statistical hypothesis test for determining
43
+ whether one time series x = (xt)N
44
+ t=0 is useful in forecasting another y = (yt)N
45
+ t=0. In particular
46
+ Granger causality focuses on the possibility of x and y to predict future values of y significatively
47
+ better than those of y alone. In this case it is said that x Granger causes y
48
+ The idea behind this is that a cause should be helpful in predicting the future effects, beyond
49
+ what can be predicted solely based on their own past values.
50
+ The test null hypothesis states that the linear regression model
51
+ yt = β0 +
52
+ p
53
+
54
+ k=1
55
+ βkyt−k + εt
56
+ (1)
57
+ approximates y significatively better than the model
58
+ yt = β0 +
59
+ p
60
+
61
+ k=1
62
+ βkyt−k +
63
+ p
64
+
65
+ k=1
66
+ β′
67
+ kxt−k + εt
68
+ (2)
69
+ If the null hypothesis is correct, this will imply that the lagged values of x add explanatory
70
+ power to the prediction of y and therefore the process behind x causes y.
71
+ To test if model (2) is significatively more accurate than (1) the following statistic is used
72
+ (SSRRM − SSRUM)/N
73
+ SSEUM/(N − 2)(p − 1)
74
+ (3)
75
+ where SSRRM and SSRUM are the sum of residuals for the restricted and unrestricted models
76
+ respectively
77
+ SSRRM = Σt(yt − β0 −
78
+ p
79
+
80
+ k=1
81
+ βkyt−k)2
82
+ SSRUM = Σt(yt − β0 −
83
+ p
84
+
85
+ k=1
86
+ βkyt−k −
87
+ p
88
+
89
+ k=1
90
+ β′
91
+ kxt−k)2
92
+ If the necessary assumptions for ordinary least of squares are satisfied, (3) follows a F(p, N −
93
+ 2p − 1) distribution under the null hypothesis.
94
+ Observation 1. Notice that 1 can be understood as writing y as a linear combination of the
95
+ lagged time series Bky (using the backward operatior notation), that is:
96
+ y = β0 +
97
+ L
98
+
99
+ k=1
100
+ βkBky + ε
101
+ Similarly 1
102
+ y = β0 +
103
+ L
104
+
105
+ k=1
106
+ βkBky +
107
+ L
108
+
109
+ k=1
110
+ βkBkx + ε
111
+ Therefore Granger causality can be understood as the use of a F-test to compare two multi-
112
+ linear regression models.
113
+ 2
114
+
115
+ 1.1.2
116
+ Generalized Least Squares
117
+ For a linear regression model of the form
118
+ yi = β1 xi1 + β2 xi2 + · · · + βp xip + εi,
119
+ (4)
120
+ The following assumptions must be satisfied for ordinary least squares (OLS) to have the
121
+ desired asymptotic properties:
122
+ (P1) Correct specification.
123
+ Te underlying process generating the data must be in esence
124
+ linear.
125
+ (P2) Strict exogeneity. The errors in the regression must have conditional mean zero: E[ ε | X ] = 0..
126
+ (P3) No linear dependence. The regressors must all be linearly independent.
127
+ (P4) Homoscedasticity E[ε2
128
+ i |X] = σ2 ∀i. The error term has the same variance σ2 in each
129
+ observation.
130
+ (P5) No autocorrelation E[εiεj|X] = 0 ∀i ̸= j. The errors are uncorrelated between observa-
131
+ tions.
132
+ (P6) Normality. It is sometimes additionally assumed that the errors have normal distribution
133
+ conditional on the regressors
134
+ If homocedasticity (P4) or non-autocorrelation (P5) assumptions are not satisfied we can use
135
+ Generalized Least Squares (GLS) to better approximate the parameters of (4).
136
+ Using the standard matricial notation (4) can be written as
137
+ y = Xβ + ε
138
+ where y = (yi), X = (xT
139
+ 1 . . . xT
140
+ p ) is the design matrix and ε is the error term. if the error
141
+ term satisfies that E[ε|X] = 0 and denoting cov[ε|X] = Ω the non-singular covariance matrix of
142
+ the residuals. the GLS estimate for β is
143
+ �βGLS = argminβ(y − Xβ)T Ω(y − Xβ) =
144
+
145
+ XTΩ−1X
146
+ �−1 XTΩ−1y
147
+ (5)
148
+ (see [Gre03, §9.3]) Notice that for Ω = σ2I (where I is the identity matrix) we are under the
149
+ assumptions of OLS and the resulting estimator is
150
+ �βOLS =
151
+
152
+ XTX
153
+ �−1 XTy
154
+ (6)
155
+ It is known that
156
+ E[�βGLS] = βGLS
157
+ (7)
158
+ cov[�βGLS] = V = (XT Ω−1X)−1
159
+ (8)
160
+ In fact
161
+
162
+ N(�βGLS − βGLS) −→D N(0, V )
163
+ 1.1.3
164
+ Wald Test
165
+ The Wald test is a statistical hypothesis test that assesses constrains on statistical parameters
166
+ for regression models based on the weighted distance between an unrestricted estimate and its
167
+ hypothesized value under the null hypothesis (see [Gre03, §5.3]).
168
+ Let �β the sample estimate for the regression model (GLS or OLS) model with covariance V
169
+ as described before. If Q hypothesis on the p parameters are expressed in the form of a Q × p
170
+ matrix R:
171
+ 3
172
+
173
+ H0 : Rβ = r
174
+ H1 : Rβ ̸= r
175
+ The wald test statistic is
176
+ (R�β − r)T ·
177
+
178
+ R�V RT · 1
179
+ n
180
+ �−1
181
+ · (R�β − r)
182
+ (9)
183
+ Under the null hypothesis, the Wald statistic (9) follows a F(Q, N − p) distribution.
184
+ Granger F-test as a Wald Test
185
+ The Granger F-Test described in (3) is in fact a particular case of the Wald test. If we consider
186
+ �βOLS, then we can stablish the unrestricted regression model
187
+ y = β0 + β1By + . . . + βpBpy + β′
188
+ 1Bx + . . . + β′
189
+ pBpx
190
+ (10)
191
+ Where B is the backshift operator Bkx = (xt−k)t. So for y to be caused by x the coefficients
192
+ β′
193
+ 1, . . . β′
194
+ p must be zero, therefore we need to test the hypothesis
195
+ H0 :β′
196
+ k = 0 for all k ≤ p
197
+ (11)
198
+ H1 :β′
199
+ k ̸= 0 for some k ≤ p
200
+ Defining the matrices
201
+ R =
202
+
203
+
204
+
205
+
206
+
207
+
208
+
209
+
210
+
211
+
212
+ 0
213
+ ...
214
+ 0
215
+ 1
216
+ ...
217
+ 1
218
+
219
+
220
+
221
+
222
+
223
+
224
+
225
+
226
+
227
+
228
+ ; β =
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+
238
+
239
+ β1
240
+ ...
241
+ βp
242
+ β′
243
+ 1
244
+ ...
245
+ β′
246
+ p
247
+
248
+
249
+
250
+
251
+
252
+
253
+
254
+
255
+
256
+
257
+ ; r =
258
+
259
+
260
+
261
+ 0
262
+ ...
263
+ 0
264
+
265
+
266
+
267
+ We can codify the test 11 as
268
+ H0 :Rβ = 0
269
+ (12)
270
+ H1 :Rβ ̸= 0
271
+ It can be shown [Gre03, §5.4], that with this notation the corresponding wald statistic (9) in
272
+ fact coincides with the F-test statistic (3)
273
+ 2
274
+ Methodology
275
+ The Granger F-test (3) assumes that conditions (4) are satisfied. We aim to present a version
276
+ of the Granger test based on generalized least squares, for that we need �Ω, an estimate for the
277
+ covariance matrix cov[ε|X] = Ω.
278
+ 4
279
+
280
+ In most cases Ω is not known and a reasonable approach is to use the βOLS to obtain the
281
+ residuals
282
+ rt(β) = yt − β0 −
283
+ p
284
+
285
+ k=1
286
+ yt−kβk −
287
+ p
288
+
289
+ k=1
290
+ xt−kβ′
291
+ k
292
+ And attempt to estimate Ω using the covariance matrix of rt. This procedure is often called
293
+ feasible least squares.
294
+ The difficulty lies in the fact that the covariance matrix of a time series (which is often called
295
+ autocovariance matrix) is not known in general. To overcome this problem in many cases rt is
296
+ assumed to follow a known model such as AR(1), whose theoretical autocovariance matrix is
297
+ known and can be obtained from the model parameters. This approach is very restrictive since
298
+ in general rt can take many forms, for this reason we will first tackle the following problem:
299
+ Problem 2. Given a time series x = (xt) how can we estimate the covariance matrix Ω =
300
+ (cov(xt, xt′))t,t′?
301
+ Since in general the previous problem can be really difficult to tackle we will impose certain
302
+ assumptions.
303
+ We will focus on the following realm of very general time series: the locally
304
+ jointly-stationary which as we see admit a convenient estimation of their covariance (which
305
+ we will call the the sliding autocovariance matrix)
306
+ 2.1
307
+ Locally jointly-stationarity and the sliding autocovariance matrix
308
+ Definition 3. A time series x = (xt) is locally jointly-stationary if there exists an increas-
309
+ ing sequence of time instances 0 < t1 < t2 < . . . < tn (called time breaks) such that each
310
+ subsequence
311
+ x(k) = xtk:tk+1 = {xt : t ∈ [tk, tk+1]}
312
+ is stationary and jointly-stationary with respect to the rest of the subsequences.
313
+ Recall that two time series x, y are jointly-stationary if they satisfy cov(xt, yt) = cov(xt+h, yt+h)
314
+ Example 4. Stationary time series are locally jointly-stationary. This is very easy to verify
315
+ since every subseries of a stationary time series will be cross stationary with any other subseries.
316
+ One can consider any instance T and the initial subseries x0:T is trivially cross stationary with
317
+ the rest of the series by definition.
318
+ Example 5. A time series (xt) is called stationary with structural breaks if it satisfies
319
+ xt = α + δDt + εt
320
+ where
321
+ Dt =
322
+
323
+ 1
324
+ if t ≥ TB + 1
325
+ 0
326
+ otherwise
327
+ for α, δ ∈ R and εt stationary. These time series were introduced by Perron (see [Per89] and
328
+ [LS01]).
329
+ Property 6. Stationary time series with structural breaks are locally jointly-stationary.
330
+ 5
331
+
332
+ Proof. Consider the subsampled time series at = α + εt defined for values of t between 0 and Tb,
333
+ and bt = α + δ + εt. Since εt is stationary, this two time series are jointly-stationary:
334
+ cov(at1, bt2) = cov(α + εt1, α + δ + εt1)
335
+ = cov(εt1, εt2) = cov(εt1+h, εt2+h)
336
+ = cov(α + εt1+h, α + δ + εt1+h)
337
+ = cov(at1+h, bt2+h)
338
+ Therefore x satisfies definition 3, taking the partition 0 ≤ t ≤ Tb and Tb < t.
339
+ Definition 7. Given a time series x = (xt), we define the window of length τ at t0 as
340
+ wτ(x, t0) = xt0:t0−τ = {xt : t ∈ [t0 − τ, t0]}
341
+ Definition 8. Let x = (xt) be a time series, and two time instants t1, t2. Consider the windows
342
+ of length τ
343
+ w1 = wτ(x, t1)
344
+ w2 = wτ(x, t2)
345
+ We will call the windowed sample autocovariance of length τ at t1, t2 to
346
+ �γτ(t, t′) = �γw1w2(t, t′)
347
+ (13)
348
+ = 1
349
+ τ
350
+ τ
351
+
352
+ k=0
353
+ (w1
354
+ k − w1)(w2
355
+ k − w2)
356
+ (14)
357
+ = 1
358
+ τ
359
+ τ
360
+
361
+ k=0
362
+ (xt−k − w1)(xt′−k − w2)
363
+ (15)
364
+ which coincides with the sample cross-covariance 1 between the time series wτ(x, t) and
365
+ wτ(x, t′)
366
+ Property 9. Let x = (xt) be a locally jointly-stationary time series with time breaks 0 < t1 <
367
+ t2 < . . . < tn. Given t, t′, taking
368
+ τ = argmin
369
+ 1≤m≤n
370
+ T =t,t′
371
+ |T − tm|
372
+ the windowed sample autocovariance of length τ is an estimator for cov(xt, xt′)
373
+ Proof. Suppose that the time break immediately lower that t is tm and that the one immediately
374
+ lower than t′ is tm′. We will consider first the case that tm and t′
375
+ m are different.
376
+ Notice that (following the notation in 3), by the choice of τ
377
+ wτ(x, t, τ) = wτ(x(tm), t, τ)
378
+ wτ(x, t′, τ) = wτ(x(tm′), t′, τ)
379
+ 1The sample cross-covariance of two (jointly-stationary) time series x and y is defined as �γxy(h) = �(xt+h −
380
+ x)(yt+h − y). See example 1.23 [SSS00]
381
+ 6
382
+
383
+ Therefore, �γτ(t, t′), the windowed sample autocovariance of length τ coincides with the sample
384
+ cross covariance of the previous two subseries windows wτ(x(tm), t, τ), wτ(x(tm′), t′, τ).
385
+ Since the subsequences x(tm) and x(tm′) are jointly-stationary, �γτ(t, t′) estimates the covari-
386
+ ance
387
+ cov(wτ(x(tm), t, τ), wτ(x(tm′), t′, τ))
388
+ which must coincide with cov(x(tm)
389
+ t
390
+ , x(tm′)
391
+ t′
392
+ ) = cov(xt, xt′).
393
+ If tm = t′
394
+ m then in the previous argument x(tm) = x(tm′) and the same consequence follows
395
+ using the stationarity of x(tm).
396
+ Observation 10. Notice that since the sample cross-covariance for jointly-stationary time se-
397
+ ries is a biased estimator, the windowed sample autocovariance �γτ(t, t′) is a biased estimator.
398
+ Nevertheless, in the case that the expected value E[x] is known, replacing the average by the
399
+ expected value in the formula the cross-covariance becomes unbiased and therefore the same
400
+ holds for �γτ(t, t′) in view of the previous proof.
401
+ Definition 11. The sliding autocovariance matrix of length τ is the N × N matrix Ωτ
402
+ defined thewindowed sample autocovariance �γτ(t, t′) for every pair of time instances, that is
403
+ Ωτ = (�γτ(t, t′))t,t′
404
+ (16)
405
+ By prop. 9 Ωτ is an estimator for the covariance matrix Ω in the case that the series x is
406
+ locally jointly-stationary. By prop. 6 if x is stationary with structural breaks, Ωτ estimates Ω.
407
+ Observation 12. Notice that in (16) for low values of t, t′ the estimation �γτ(t, t′))t,t′ becomes
408
+ imprecise due to the small number of values before. One way to fix this problem in certain
409
+ situations is to complete the time series with values before 0 using x−t = xt.
410
+ Example 13. Consider time series xt = φ1xt−1 + εt with φ1 = 0.9. Since the time series follows
411
+ an AR(1) model, we know that the autocovariance
412
+ cov(xt, xt+h) = φh
413
+ 1 · var(xt)
414
+ (17)
415
+ Figure 1 shows a simulation of this time seres at the top, the theoretical covariance matrix
416
+ using the previous formula 17 is shown on the left side and the sliding covariance matrix estimated
417
+ using (16) is shown on the left. For the imprecision around low values we used the procedure
418
+ described in obs. 12. To calculate the autocovariance matrix we used the value τ = N/3 where
419
+ N is the sample size for the time series, lower values of τ produce similar estimations.
420
+ 7
421
+
422
+ Figure 1: Autocovariance matrix and estimated sliding autocovariance matrix.
423
+ 2.2
424
+ Generalized least squares Granger causality test
425
+ Going back to Granger causality test, in this section we present a novel Granger causality test
426
+ based on wald tests and the estimation of the covariance matrix of the residuals via the sliding
427
+ autocovariance matrix.
428
+ Method 14 (GLS Granger Causality test). Given two time series x, y, in order to assess
429
+ whether x causes y with lag L, we follow the following procedure, which is a variation of the
430
+ classical Granger causality test:
431
+ 1. Use OLS to obtain an estimate (βOLS, β′
432
+ OLS) for the model
433
+ yt = β0 +
434
+ p
435
+
436
+ k=1
437
+ βkyt−k +
438
+ p
439
+
440
+ k=1
441
+ β′
442
+ kxt−k + εt
443
+ (18)
444
+ 2. Using the residuals of the previous model
445
+ rt = yt − β0 −
446
+ p
447
+
448
+ k=1
449
+ βkyt−k −
450
+ p
451
+
452
+ k=1
453
+ β′
454
+ kxt−k
455
+ estimate their covariance matrix using the sliding autocovariance matrix Ωτ as in (16)
456
+ 8
457
+
458
+ at=0.9at-1+Et
459
+ 0.06
460
+ 0.04
461
+ 0.02
462
+ 0.00
463
+ 0.02
464
+ 0.04
465
+ 0.06
466
+ 0
467
+ 200
468
+ 400
469
+ 600
470
+ 800
471
+ 1000
472
+ 0
473
+ 0
474
+ 0.0004
475
+ 200
476
+ 200
477
+ 0.0002
478
+ 400
479
+ 400
480
+ 0.0000
481
+ 600
482
+ 600
483
+ -0.0002
484
+ 800
485
+ 800
486
+ -0.0004
487
+ 0
488
+ 200
489
+ 400
490
+ 600
491
+ 800
492
+ 0
493
+ 200
494
+ 400
495
+ 600
496
+ 800
497
+ Theorethical autocovariancematrix
498
+ Estimatedautocovariancematrix3. Use GLS and the previous covariance matrix to estimate again the parameters (βGLS, β′
499
+ GLS)
500
+ in the model (18) as in (5).
501
+ 4. Use a Wald test with null hypothesis
502
+ H0 : β′
503
+ GLS k = 0 for all k ≤ p
504
+ If the null hypothesis is rejected conclude that x causes y otherwise conclude the opposite.
505
+ 3
506
+ Results
507
+ We proceed now to assess the efficacy of the proposed GLS Granger causality test (14) in com-
508
+ parison with the classical Granger F-Test (sec. 1.1.1).
509
+ 3.1
510
+ Simulated dataset
511
+ Given a time series x we applied the following procedure to consistently generate a caused series
512
+ y. The procedure consists of defining y in the following way
513
+ yt =
514
+ L
515
+
516
+ k=1
517
+ xt−k · βk + εt
518
+ (19)
519
+ where βk are generated randomly and ε is a time series that can be constructed in several
520
+ ways depending in the type of causality that we want to simulate. We can consider:
521
+ (M1) ε stationary time series, for instance a white noise εt ∼ N(0, σ2).
522
+ (M2) ε is stationary with structural breaks, for instance considering εt =∼ N(µt, σ2) with µt = 0
523
+ for t ≤ tb and µt = µ for t > tb.
524
+ (M3) ε non-stationary time series with changing variance for instance εt ∼ N(0, (t · σ)2).
525
+ On the other hand, to simulate non causality, we will simply simulate two time series x
526
+ and y by using auto-regressive processes with different parameters
527
+ xt = xt−1φ + εt
528
+ (AR1)
529
+ yt = yt−1φ′ + εt
530
+ Observation 15. Notice that a regression model applied to predict y from the lagged time
531
+ series Bky and Bky (using the backward operator as in obs. 1). The regression parameters will
532
+ approximate β1, . . . βL residuals of the regression will approximate ε.
533
+ With this in mind, (M1) will produce time series in which classical Granger F-test will be
534
+ very effective. In contrast (M2) will give us stationary with structural breaks residuals and (M3)
535
+ will produce heteroskedastic residuals, therefore the classical Granger F-test will be less effective
536
+ with these time series.
537
+ For this reason the introduced dataset (simulated using M1, M2 and M3) will be suitable for
538
+ comparing the proposed GLS Granger causality test with the classical Granger F-Test.
539
+ 9
540
+
541
+ Example 16. In the following figure 2 we show three examples of the generated dataset using
542
+ (M1), (M2) and (M3).
543
+ Notice that in the graphs of figure 2 we can observe the causality, in the sense that changes
544
+ x (shown in blue) cause changes in y after a number of lags.
545
+ In the second graph the figure we see the structural break introduced in the residual of y
546
+ (M2).
547
+ Finally, in the last graph of the figure we appreciate the residual with growing variance
548
+ introduced by (M3) in y.
549
+ Figure 2: Three pairs of time series generated using the previous method (for L = 15 and random
550
+ β1, . . . , βL). In blue, the original time series x generated using an AR(1) process. In red the
551
+ caused time series y generated using the three methods (M1), (M2) and (M3) respectively.
552
+ Experiment results
553
+ We perform four experiments, each with 150 pairs of time series each with 600 points. The lag
554
+ used to simulate the causality is L = 15.
555
+ The first three experiments consist on testing the performance of Classical Granger against
556
+ the proposed GLS Granger by simulating causal relationships using methods (M1), (M2) and
557
+ (M3). For the sake of this comparison, we record the percentage of correct predictions by each
558
+ method.
559
+ The last experiment attempts to search for false positives. In this experiment we generate
560
+ non-caused time series using the method (AR1) described before.
561
+ Simulated causal
562
+ relationships
563
+ simulation
564
+ procedure
565
+ % of correct classical
566
+ Granger F-test
567
+ % of correct
568
+ GLS-Granger
569
+ y caused by x
570
+ (M1) stationary residual
571
+ 75.0%
572
+ 96.6%
573
+ y caused by x
574
+ (M2) structural breaks residual
575
+ 57.3%
576
+ 85.5%
577
+ y caused by x
578
+ (M3) heteroskedastic residual
579
+ 32.6%
580
+ 42.6%
581
+ y not caused by x
582
+ (AR1)
583
+ 94.0%
584
+ 94.7%
585
+ Table 1: Experiment results table
586
+ The window length τ used for the sliding autocovariance matrix estimation was τ = N/5
587
+ where N is the number of observations. This value was obtained using cross-validation, but
588
+ greater values of τ produced very similar results.
589
+ In view of table 1, the proposed method gets more accurate results than the Granger F-test
590
+ in every one of the datasets simulated.
591
+ 10
592
+
593
+ 4 -
594
+ 10
595
+ 3 -
596
+ 2 -
597
+ -5
598
+ -10
599
+ -1
600
+ -15
601
+ -20
602
+ 0
603
+ 25
604
+ 50
605
+ 75
606
+ 100
607
+ 125
608
+ 150
609
+ 175
610
+ 200
611
+ 0
612
+ 25
613
+ 50
614
+ 100
615
+ 125
616
+ 150
617
+ 175
618
+ 200
619
+ 25
620
+ 50
621
+ 75
622
+ 100
623
+ 125
624
+ 150
625
+ 175
626
+ 2003.1.1
627
+ Real dataset
628
+ Cryptocoins are known for their volatility and interdependence. Granger causality is a known tool
629
+ to study the interdependence of cryptocoins, for instance [KCP21] found a strong relationship
630
+ between Bitcoin (BTN) and Ethereum (ETH) and [Yav22] points out complex interdependence
631
+ between the main cryptocoins.
632
+ We will use a dataset composed by the values of the main 10 cryptocurrencies (Bitcoin,Ethereum,
633
+ Aave, BinanceCoin, Cardano, ChainLink, Cosmos, CryptocomCoin, Dogecoin, EOS, Iota, Lite-
634
+ coin, Monero) from July 2020 to July 2021.
635
+ The trend component of these time series was removed applying first order differentiation.
636
+ Even after differentiation a progressive change in variance is observed in the time series (see
637
+ figure 3). This suggests that even though in some cases the series pass a Augmented Dickey-
638
+ Fuller stationarity test, the OLS estimation performed in every Granger F-test will be imprecise
639
+ or problematic. This situation has many similarities to the simulation preformed in (M3), for
640
+ this reason our proposed method is more suitable to deal with the heteroskedastic behavior of
641
+ the residuals. (see sec. 3.1 and fig. 2).
642
+ Figure 3: Differentated data of the cryptocoin Ethereum from July 2020 to July 2021
643
+ We applied a Granger F-test and our proposed GLS Granger test on each pair of cryptocoins
644
+ considered composing causals graphs, i.e. a graph that has as nodes all the time series and as
645
+ edges the causal relationships (if x causes y we draw x → y)
646
+ We used the lag L = 1, the optimal lag was obtained using Akaike Information Criterion
647
+ (AIC).
648
+ The result is shown in Figure 4. The left graph of 4 shows the Granger F-test causal graph,
649
+ whereas the right graph show the resulting GLS Granger Graph. We obtained a very connected
650
+ causal network as it is to expect from the behavior of cryptocurrencies. Interestingly, the pro-
651
+ posed method was able to capture more causal relationships, showing an even more connected
652
+ network. It also noteworthy that the GLS Granger graph shows many causal relationship that
653
+ connect the two leading cryptocoins Bitcoin and Ethereum with the rest of them. For instance
654
+ the proposed method finds the relations Ethereum → cardano, Bitcoin → EOS, Bitcoin →
655
+ ChainLink, Iota → Bitcoin.
656
+ 11
657
+
658
+ 600
659
+ 400
660
+ 200
661
+ -200
662
+ -400
663
+ -600
664
+ -800Figure 4: Causal graphs
665
+ 4
666
+ Conclusions and Future work
667
+ In this paper, we propose a generalization of the Granger F-test to uncover the temporal causal
668
+ structures from heteroskedastic and structural-breaks time series trough the estimation of the
669
+ residual autocovariance matrix and GLS.
670
+ We demonstrate its effectiveness on four simulation datasets and one real application dataset.
671
+ For future work, we are interested in researching other uses of the sliding covariance matrix
672
+ in the field of time series classification and machine learning.
673
+ Code availability
674
+ Datasets and scripts for this article are available at github: https://github.com/Granger-Causality-
675
+ GLS
676
+ References
677
+ [Gra69]
678
+ Clive WJ Granger, Investigating causal relations by econometric models and cross-
679
+ spectral methods, Econometrica: journal of the Econometric Society (1969), 424–438.
680
+ [Gra80]
681
+ , Testing for causality: a personal viewpoint, Journal of Economic Dynamics
682
+ and control 2 (1980), 329–352.
683
+ [Gre03]
684
+ William H Greene, Econometric analysis, Pearson Education India, 2003.
685
+ [KCP21] Myeong Jun Kim, Nguyen Phuc Canh, and Sung Y Park, Causal relationship among
686
+ cryptocurrencies: A conditional quantile approach, Finance Research Letters 42 (2021),
687
+ 101879.
688
+ [LS01]
689
+ Junsoo Lee and Mark Strazicich, Testing the null of stationarity in the presence of a
690
+ structural break, Applied Economics Letters 8 (2001), no. 6, 377–382.
691
+ [Per89]
692
+ Pierre Perron, The great crash, the oil price shock, and the unit root hypothesis, Econo-
693
+ metrica: journal of the Econometric Society (1989), 1361–1401.
694
+ [SSS00]
695
+ Robert H Shumway, David S Stoffer, and David S Stoffer, Time series analysis and its
696
+ applications, vol. 3, Springer, 2000.
697
+ 12
698
+
699
+ cosms
700
+ binance
701
+ cosmes
702
+ binance
703
+ opero
704
+ oherc
705
+ dogec
706
+ dogec新
707
+ chainL
708
+ chainLink
709
+ ave
710
+ cryptocomcpin
711
+ cryptocomcin
712
+ etherum
713
+ etherum
714
+ cardao
715
+ ec
716
+ oin
717
+ cal
718
+ iota
719
+ ota
720
+ Titecotn
721
+ Classical Granger F-test causal graph
722
+ GLS Granger test causal graph[Yav22]
723
+ G¨UL Yavuz, Causality and cointegration in cryptocurrency markets, Uluslararası
724
+ ˙Iktisadi ve ˙Idari ˙Incelemeler Dergisi (2022), no. 34, 129–142.
725
+ 13
726
+
8tE1T4oBgHgl3EQfUAOX/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,252 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf,len=251
2
+ page_content='Granger causality test for heteroskedastic and structural-break time series using generalized least squares Hugo J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
3
+ page_content=' Bello ∗ January 10, 2023 Abstract This paper proposes a novel method (GLS Granger test) to determine causal relation- ships between time series based on the estimation of the autocovariance matrix and gener- alized least squares.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
4
+ page_content=' We show the effectiveness of proposed autocovariance matrix estimator (the sliding autocovariance matrix) and we compare the proposed method with the classical Granger F-test with via a synthetic dataset and a real dataset composed by cryptocurren- cies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
5
+ page_content=' The simulations show that the proposed GLS Granger test captures causality more accurately than Granger F-tests in the cases of heteroskedastic or structural-break residu- als.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
6
+ page_content=' Finally, we use the proposed method to unravel unknown causal relationships between cryptocurrencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
7
+ page_content=' Keywords: Granger Test, Causality, Generalized Least Squares, Wald Test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
8
+ page_content=' 1 Introduction Granger causality is a statistical concept that helps us determine whether the information in one time series is useful in predicting another.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
9
+ page_content=' It is widely used in numerous fields, including economics, finance, geology, genetics and neuroscience, to understand the relationships between variables and to identify possible causal connections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
10
+ page_content=' The main tool for studying time series causality is the Granger causality F-test ([Gra69],' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
11
+ page_content=' [Gra80]) which is based on ordinary least squares (OLS) estimation and therefore is tied to the assumptions of OLS (among them homocedasticity of the residuals) In many real-world applications,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
12
+ page_content=' we are confronted with time series suffering from a variety of problems such as heteroscedasticity (non-equal variance amongst time observations) or struc- tural breaks (the appearance of two or more stationary periods with different means).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
13
+ page_content=' In these situations OLS is not recommended and Granger F-test can be inadequate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
14
+ page_content=' The aim of this paper is to present a method for determining Granger causality based on generalized least squares based on the estimation of the autocovariance matrix of the residuals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
15
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
16
+ page_content='1 Preliminaries In this section we will present introducing notation and definitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
17
+ page_content=' We also review the notion of Granger causality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
18
+ page_content=' ∗hugojose.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
19
+ page_content='bello@uva.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
20
+ page_content='es Department of Applied Mathematics, University of Valladolid (Campus Soria) 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
21
+ page_content='03085v1 [stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
22
+ page_content='ME] 8 Jan 2023 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
23
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
24
+ page_content='1 Granger causality F-test The Granger causality ([Gra69], [Gra80]) test is a statistical hypothesis test for determining whether one time series x = (xt)N t=0 is useful in forecasting another y = (yt)N t=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
25
+ page_content=' In particular Granger causality focuses on the possibility of x and y to predict future values of y significatively better than those of y alone.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
26
+ page_content=' In this case it is said that x Granger causes y The idea behind this is that a cause should be helpful in predicting the future effects, beyond what can be predicted solely based on their own past values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
27
+ page_content=' The test null hypothesis states that the linear regression model yt = β0 + p � k=1 βkyt−k + εt (1) approximates y significatively better than the model yt = β0 + p � k=1 βkyt−k + p � k=1 β′ kxt−k + εt (2) If the null hypothesis is correct, this will imply that the lagged values of x add explanatory power to the prediction of y and therefore the process behind x causes y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
28
+ page_content=' To test if model (2) is significatively more accurate than (1) the following statistic is used (SSRRM − SSRUM)/N SSEUM/(N − 2)(p − 1) (3) where SSRRM and SSRUM are the sum of residuals for the restricted and unrestricted models respectively SSRRM = Σt(yt − β0 − p � k=1 βkyt−k)2 SSRUM = Σt(yt − β0 − p � k=1 βkyt−k − p � k=1 β′ kxt−k)2 If the necessary assumptions for ordinary least of squares are satisfied,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
29
+ page_content=' (3) follows a F(p,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
30
+ page_content=' N − 2p − 1) distribution under the null hypothesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
31
+ page_content=' Observation 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
32
+ page_content=' Notice that 1 can be understood as writing y as a linear combination of the lagged time series Bky (using the backward operatior notation), that is: y = β0 + L � k=1 βkBky + ε Similarly 1 y = β0 + L � k=1 βkBky + L � k=1 βkBkx + ε Therefore Granger causality can be understood as the use of a F-test to compare two multi- linear regression models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
33
+ page_content=' 2 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
34
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
35
+ page_content='2 Generalized Least Squares For a linear regression model of the form yi = β1 xi1 + β2 xi2 + · · · + βp xip + εi, (4) The following assumptions must be satisfied for ordinary least squares (OLS) to have the desired asymptotic properties: (P1) Correct specification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
36
+ page_content=' Te underlying process generating the data must be in esence linear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
37
+ page_content=' (P2) Strict exogeneity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
38
+ page_content=' The errors in the regression must have conditional mean zero: E[ ε | X ] = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
39
+ page_content='. (P3) No linear dependence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
40
+ page_content=' The regressors must all be linearly independent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
41
+ page_content=' (P4) Homoscedasticity E[ε2 i |X] = σ2 ∀i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
42
+ page_content=' The error term has the same variance σ2 in each observation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
43
+ page_content=' (P5) No autocorrelation E[εiεj|X] = 0 ∀i ̸= j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
44
+ page_content=' The errors are uncorrelated between observa- tions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
45
+ page_content=' (P6) Normality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
46
+ page_content=' It is sometimes additionally assumed that the errors have normal distribution conditional on the regressors If homocedasticity (P4) or non-autocorrelation (P5) assumptions are not satisfied we can use Generalized Least Squares (GLS) to better approximate the parameters of (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
47
+ page_content=' Using the standard matricial notation (4) can be written as y = Xβ + ε where y = (yi), X = (xT 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
48
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
49
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
50
+ page_content=' xT p ) is the design matrix and ε is the error term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
51
+ page_content=' if the error term satisfies that E[ε|X] = 0 and denoting cov[ε|X] = Ω the non-singular covariance matrix of the residuals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
52
+ page_content=' the GLS estimate for β is �βGLS = argminβ(y − Xβ)T Ω(y − Xβ) = � XTΩ−1X �−1 XTΩ−1y (5) (see [Gre03, §9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
53
+ page_content='3]) Notice that for Ω = σ2I (where I is the identity matrix) we are under the assumptions of OLS and the resulting estimator is �βOLS = � XTX �−1 XTy (6) It is known that E[�βGLS] = βGLS (7) cov[�βGLS] = V = (XT Ω−1X)−1 (8) In fact √ N(�βGLS − βGLS) −→D N(0, V ) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
54
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
55
+ page_content='3 Wald Test The Wald test is a statistical hypothesis test that assesses constrains on statistical parameters for regression models based on the weighted distance between an unrestricted estimate and its hypothesized value under the null hypothesis (see [Gre03, §5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
56
+ page_content='3]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
57
+ page_content=' Let �β the sample estimate for the regression model (GLS or OLS) model with covariance V as described before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
58
+ page_content=' If Q hypothesis on the p parameters are expressed in the form of a Q × p matrix R: 3 H0 : Rβ = r H1 : Rβ ̸= r The wald test statistic is (R�β − r)T · � R�V RT · 1 n �−1 (R�β − r) (9) Under the null hypothesis, the Wald statistic (9) follows a F(Q, N − p) distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
59
+ page_content=' Granger F-test as a Wald Test The Granger F-Test described in (3) is in fact a particular case of the Wald test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
60
+ page_content=' If we consider �βOLS, then we can stablish the unrestricted regression model y = β0 + β1By + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
61
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
62
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
63
+ page_content=' + βpBpy + β′ 1Bx + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
64
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
65
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
66
+ page_content=' + β′ pBpx (10) Where B is the backshift operator Bkx = (xt−k)t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
67
+ page_content=' So for y to be caused by x the coefficients β′ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
68
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
69
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
70
+ page_content=' β′ p must be zero, therefore we need to test the hypothesis H0 :β′ k = 0 for all k ≤ p (11) H1 :β′ k ̸= 0 for some k ≤ p Defining the matrices R = � � � � � � � � � � 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
71
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
72
+ page_content=' 0 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
73
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
74
+ page_content=' 1 � � � � � � � � � � ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
75
+ page_content=' β = � � � � � � � � � � β1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
76
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
77
+ page_content=' βp β′ 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
78
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
79
+ page_content=' β′ p � � � � � � � � � � ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
80
+ page_content=' r = � � � 0 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
81
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
82
+ page_content=' 0 � � � We can codify the test 11 as H0 :Rβ = 0 (12) H1 :Rβ ̸= 0 It can be shown [Gre03, §5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
83
+ page_content='4], that with this notation the corresponding wald statistic (9) in fact coincides with the F-test statistic (3) 2 Methodology The Granger F-test (3) assumes that conditions (4) are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
84
+ page_content=' We aim to present a version of the Granger test based on generalized least squares, for that we need �Ω, an estimate for the covariance matrix cov[ε|X] = Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
85
+ page_content=' 4 In most cases Ω is not known and a reasonable approach is to use the βOLS to obtain the residuals rt(β) = yt − β0 − p � k=1 yt−kβk − p � k=1 xt−kβ′ k And attempt to estimate Ω using the covariance matrix of rt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
86
+ page_content=' This procedure is often called feasible least squares.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
87
+ page_content=' The difficulty lies in the fact that the covariance matrix of a time series (which is often called autocovariance matrix) is not known in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
88
+ page_content=' To overcome this problem in many cases rt is assumed to follow a known model such as AR(1), whose theoretical autocovariance matrix is known and can be obtained from the model parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
89
+ page_content=' This approach is very restrictive since in general rt can take many forms, for this reason we will first tackle the following problem: Problem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
90
+ page_content=' Given a time series x = (xt) how can we estimate the covariance matrix Ω = (cov(xt, xt′))t,t′?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
91
+ page_content=' Since in general the previous problem can be really difficult to tackle we will impose certain assumptions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
92
+ page_content=' We will focus on the following realm of very general time series: the locally jointly-stationary which as we see admit a convenient estimation of their covariance (which we will call the the sliding autocovariance matrix) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
93
+ page_content='1 Locally jointly-stationarity and the sliding autocovariance matrix Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
94
+ page_content=' A time series x = (xt) is locally jointly-stationary if there exists an increas- ing sequence of time instances 0 < t1 < t2 < .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
95
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
96
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
97
+ page_content=' < tn (called time breaks) such that each subsequence x(k) = xtk:tk+1 = {xt : t ∈ [tk, tk+1]} is stationary and jointly-stationary with respect to the rest of the subsequences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
98
+ page_content=' Recall that two time series x, y are jointly-stationary if they satisfy cov(xt, yt) = cov(xt+h, yt+h) Example 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
99
+ page_content=' Stationary time series are locally jointly-stationary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
100
+ page_content=' This is very easy to verify since every subseries of a stationary time series will be cross stationary with any other subseries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
101
+ page_content=' One can consider any instance T and the initial subseries x0:T is trivially cross stationary with the rest of the series by definition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
102
+ page_content=' Example 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
103
+ page_content=' A time series (xt) is called stationary with structural breaks if it satisfies xt = α + δDt + εt where Dt = � 1 if t ≥ TB + 1 0 otherwise for α, δ ∈ R and εt stationary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
104
+ page_content=' These time series were introduced by Perron (see [Per89] and [LS01]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
105
+ page_content=' Property 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
106
+ page_content=' Stationary time series with structural breaks are locally jointly-stationary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
107
+ page_content=' 5 Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
108
+ page_content=' Consider the subsampled time series at = α + εt defined for values of t between 0 and Tb, and bt = α + δ + εt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
109
+ page_content=' Since εt is stationary, this two time series are jointly-stationary: cov(at1, bt2) = cov(α + εt1, α + δ + εt1) = cov(εt1, εt2) = cov(εt1+h, εt2+h) = cov(α + εt1+h, α + δ + εt1+h) = cov(at1+h, bt2+h) Therefore x satisfies definition 3, taking the partition 0 ≤ t ≤ Tb and Tb < t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
110
+ page_content=' Definition 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
111
+ page_content=' Given a time series x = (xt), we define the window of length τ at t0 as wτ(x, t0) = xt0:t0−τ = {xt : t ∈ [t0 − τ, t0]} Definition 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
112
+ page_content=' Let x = (xt) be a time series, and two time instants t1, t2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
113
+ page_content=' Consider the windows of length τ w1 = wτ(x, t1) w2 = wτ(x, t2) We will call the windowed sample autocovariance of length τ at t1, t2 to �γτ(t, t′) = �γw1w2(t, t′) (13) = 1 τ τ � k=0 (w1 k − w1)(w2 k − w2) (14) = 1 τ τ � k=0 (xt−k − w1)(xt′−k − w2) (15) which coincides with the sample cross-covariance 1 between the time series wτ(x, t) and wτ(x, t′) Property 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
114
+ page_content=' Let x = (xt) be a locally jointly-stationary time series with time breaks 0 < t1 < t2 < .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
115
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
116
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
117
+ page_content=' < tn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
118
+ page_content=' Given t, t′, taking τ = argmin 1≤m≤n T =t,t′ |T − tm| the windowed sample autocovariance of length τ is an estimator for cov(xt, xt′) Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
119
+ page_content=' Suppose that the time break immediately lower that t is tm and that the one immediately lower than t′ is tm′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
120
+ page_content=' We will consider first the case that tm and t′ m are different.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
121
+ page_content=' Notice that (following the notation in 3), by the choice of τ wτ(x, t, τ) = wτ(x(tm), t, τ) wτ(x, t′, τ) = wτ(x(tm′), t′, τ) 1The sample cross-covariance of two (jointly-stationary) time series x and y is defined as �γxy(h) = �(xt+h − x)(yt+h − y).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
122
+ page_content=' See example 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
123
+ page_content='23 [SSS00] 6 Therefore, �γτ(t, t′), the windowed sample autocovariance of length τ coincides with the sample cross covariance of the previous two subseries windows wτ(x(tm), t, τ), wτ(x(tm′), t′, τ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
124
+ page_content=' Since the subsequences x(tm) and x(tm′) are jointly-stationary, �γτ(t, t′) estimates the covari- ance cov(wτ(x(tm), t, τ), wτ(x(tm′), t′, τ)) which must coincide with cov(x(tm) t , x(tm′) t′ ) = cov(xt, xt′).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
125
+ page_content=' If tm = t′ m then in the previous argument x(tm) = x(tm′) and the same consequence follows using the stationarity of x(tm).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
126
+ page_content=' Observation 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
127
+ page_content=' Notice that since the sample cross-covariance for jointly-stationary time se- ries is a biased estimator, the windowed sample autocovariance �γτ(t, t′) is a biased estimator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
128
+ page_content=' Nevertheless, in the case that the expected value E[x] is known, replacing the average by the expected value in the formula the cross-covariance becomes unbiased and therefore the same holds for �γτ(t, t′) in view of the previous proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
129
+ page_content=' Definition 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
130
+ page_content=' The sliding autocovariance matrix of length τ is the N × N matrix Ωτ defined thewindowed sample autocovariance �γτ(t, t′) for every pair of time instances, that is Ωτ = (�γτ(t, t′))t,t′ (16) By prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
131
+ page_content=' 9 Ωτ is an estimator for the covariance matrix Ω in the case that the series x is locally jointly-stationary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
132
+ page_content=' By prop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
133
+ page_content=' 6 if x is stationary with structural breaks, Ωτ estimates Ω.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
134
+ page_content=' Observation 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
135
+ page_content=' Notice that in (16) for low values of t, t′ the estimation �γτ(t, t′))t,t′ becomes imprecise due to the small number of values before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
136
+ page_content=' One way to fix this problem in certain situations is to complete the time series with values before 0 using x−t = xt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
137
+ page_content=' Example 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
138
+ page_content=' Consider time series xt = φ1xt−1 + εt with φ1 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
139
+ page_content='9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
140
+ page_content=' Since the time series follows an AR(1) model, we know that the autocovariance cov(xt, xt+h) = φh 1 · var(xt) (17) Figure 1 shows a simulation of this time seres at the top, the theoretical covariance matrix using the previous formula 17 is shown on the left side and the sliding covariance matrix estimated using (16) is shown on the left.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
141
+ page_content=' For the imprecision around low values we used the procedure described in obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
142
+ page_content=' 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
143
+ page_content=' To calculate the autocovariance matrix we used the value τ = N/3 where N is the sample size for the time series, lower values of τ produce similar estimations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
144
+ page_content=' 7 Figure 1: Autocovariance matrix and estimated sliding autocovariance matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
145
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
146
+ page_content='2 Generalized least squares Granger causality test Going back to Granger causality test, in this section we present a novel Granger causality test based on wald tests and the estimation of the covariance matrix of the residuals via the sliding autocovariance matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
147
+ page_content=' Method 14 (GLS Granger Causality test).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
148
+ page_content=' Given two time series x, y, in order to assess whether x causes y with lag L, we follow the following procedure, which is a variation of the classical Granger causality test: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
149
+ page_content=' Use OLS to obtain an estimate (βOLS, β′ OLS) for the model yt = β0 + p � k=1 βkyt−k + p � k=1 β′ kxt−k + εt (18) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
150
+ page_content=' Using the residuals of the previous model rt = yt − β0 − p � k=1 βkyt−k − p � k=1 β′ kxt−k estimate their covariance matrix using the sliding autocovariance matrix Ωτ as in (16) 8 at=0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
151
+ page_content='9at-1+Et 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
152
+ page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
153
+ page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
154
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
155
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
156
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
157
+ page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
158
+ page_content='06 0 200 400 600 800 1000 0 0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
159
+ page_content='0004 200 200 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
160
+ page_content='0002 400 400 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
161
+ page_content='0000 600 600 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
162
+ page_content='0002 800 800 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
163
+ page_content='0004 0 200 400 600 800 0 200 400 600 800 Theorethical autocovariancematrix Estimatedautocovariancematrix3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
164
+ page_content=' Use GLS and the previous covariance matrix to estimate again the parameters (βGLS, β′ GLS) in the model (18) as in (5).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
165
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
166
+ page_content=' Use a Wald test with null hypothesis H0 : β′ GLS k = 0 for all k ≤ p If the null hypothesis is rejected conclude that x causes y otherwise conclude the opposite.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
167
+ page_content=' 3 Results We proceed now to assess the efficacy of the proposed GLS Granger causality test (14) in com- parison with the classical Granger F-Test (sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
168
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
169
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
170
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
171
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
172
+ page_content='1 Simulated dataset Given a time series x we applied the following procedure to consistently generate a caused series y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
173
+ page_content=' The procedure consists of defining y in the following way yt = L � k=1 xt−k · βk + εt (19) where βk are generated randomly and ε is a time series that can be constructed in several ways depending in the type of causality that we want to simulate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
174
+ page_content=' We can consider: (M1) ε stationary time series, for instance a white noise εt ∼ N(0, σ2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
175
+ page_content=' (M2) ε is stationary with structural breaks, for instance considering εt =∼ N(µt, σ2) with µt = 0 for t ≤ tb and µt = µ for t > tb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
176
+ page_content=' (M3) ε non-stationary time series with changing variance for instance εt ∼ N(0, (t · σ)2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
177
+ page_content=' On the other hand, to simulate non causality, we will simply simulate two time series x and y by using auto-regressive processes with different parameters xt = xt−1φ + εt (AR1) yt = yt−1φ′ + εt Observation 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
178
+ page_content=' Notice that a regression model applied to predict y from the lagged time series Bky and Bky (using the backward operator as in obs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
179
+ page_content=' 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
180
+ page_content=' The regression parameters will approximate β1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
181
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
182
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
183
+ page_content=' βL residuals of the regression will approximate ε.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
184
+ page_content=' With this in mind, (M1) will produce time series in which classical Granger F-test will be very effective.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
185
+ page_content=' In contrast (M2) will give us stationary with structural breaks residuals and (M3) will produce heteroskedastic residuals, therefore the classical Granger F-test will be less effective with these time series.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
186
+ page_content=' For this reason the introduced dataset (simulated using M1, M2 and M3) will be suitable for comparing the proposed GLS Granger causality test with the classical Granger F-Test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
187
+ page_content=' 9 Example 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
188
+ page_content=' In the following figure 2 we show three examples of the generated dataset using (M1), (M2) and (M3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
189
+ page_content=' Notice that in the graphs of figure 2 we can observe the causality, in the sense that changes x (shown in blue) cause changes in y after a number of lags.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
190
+ page_content=' In the second graph the figure we see the structural break introduced in the residual of y (M2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
191
+ page_content=' Finally, in the last graph of the figure we appreciate the residual with growing variance introduced by (M3) in y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
192
+ page_content=' Figure 2: Three pairs of time series generated using the previous method (for L = 15 and random β1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
193
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
194
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
195
+ page_content=' , βL).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
196
+ page_content=' In blue, the original time series x generated using an AR(1) process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
197
+ page_content=' In red the caused time series y generated using the three methods (M1), (M2) and (M3) respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
198
+ page_content=' Experiment results We perform four experiments, each with 150 pairs of time series each with 600 points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
199
+ page_content=' The lag used to simulate the causality is L = 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
200
+ page_content=' The first three experiments consist on testing the performance of Classical Granger against the proposed GLS Granger by simulating causal relationships using methods (M1), (M2) and (M3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
201
+ page_content=' For the sake of this comparison, we record the percentage of correct predictions by each method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
202
+ page_content=' The last experiment attempts to search for false positives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
203
+ page_content=' In this experiment we generate non-caused time series using the method (AR1) described before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
204
+ page_content=' Simulated causal relationships simulation procedure % of correct classical Granger F-test % of correct GLS-Granger y caused by x (M1) stationary residual 75.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
205
+ page_content='0% 96.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
206
+ page_content='6% y caused by x (M2) structural breaks residual 57.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
207
+ page_content='3% 85.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
208
+ page_content='5% y caused by x (M3) heteroskedastic residual 32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
209
+ page_content='6% 42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
210
+ page_content='6% y not caused by x (AR1) 94.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
211
+ page_content='0% 94.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
212
+ page_content='7% Table 1: Experiment results table The window length τ used for the sliding autocovariance matrix estimation was τ = N/5 where N is the number of observations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
213
+ page_content=' This value was obtained using cross-validation, but greater values of τ produced very similar results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
214
+ page_content=' In view of table 1, the proposed method gets more accurate results than the Granger F-test in every one of the datasets simulated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
215
+ page_content=' 10 4 - 10 3 - 2 - 5 10 1 15 20 0 25 50 75 100 125 150 175 200 0 25 50 100 125 150 175 200 25 50 75 100 125 150 175 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
216
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
217
+ page_content='1 Real dataset Cryptocoins are known for their volatility and interdependence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
218
+ page_content=' Granger causality is a known tool to study the interdependence of cryptocoins, for instance [KCP21] found a strong relationship between Bitcoin (BTN) and Ethereum (ETH) and [Yav22] points out complex interdependence between the main cryptocoins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
219
+ page_content=' We will use a dataset composed by the values of the main 10 cryptocurrencies (Bitcoin,Ethereum, Aave, BinanceCoin, Cardano, ChainLink, Cosmos, CryptocomCoin, Dogecoin, EOS, Iota, Lite- coin, Monero) from July 2020 to July 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
220
+ page_content=' The trend component of these time series was removed applying first order differentiation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
221
+ page_content=' Even after differentiation a progressive change in variance is observed in the time series (see figure 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
222
+ page_content=' This suggests that even though in some cases the series pass a Augmented Dickey- Fuller stationarity test, the OLS estimation performed in every Granger F-test will be imprecise or problematic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
223
+ page_content=' This situation has many similarities to the simulation preformed in (M3), for this reason our proposed method is more suitable to deal with the heteroskedastic behavior of the residuals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
224
+ page_content=' (see sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
225
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
226
+ page_content='1 and fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
227
+ page_content=' 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
228
+ page_content=' Figure 3: Differentated data of the cryptocoin Ethereum from July 2020 to July 2021 We applied a Granger F-test and our proposed GLS Granger test on each pair of cryptocoins considered composing causals graphs, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
229
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
230
+ page_content=' a graph that has as nodes all the time series and as edges the causal relationships (if x causes y we draw x → y) We used the lag L = 1, the optimal lag was obtained using Akaike Information Criterion (AIC).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
231
+ page_content=' The result is shown in Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
232
+ page_content=' The left graph of 4 shows the Granger F-test causal graph, whereas the right graph show the resulting GLS Granger Graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
233
+ page_content=' We obtained a very connected causal network as it is to expect from the behavior of cryptocurrencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
234
+ page_content=' Interestingly, the pro- posed method was able to capture more causal relationships, showing an even more connected network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
235
+ page_content=' It also noteworthy that the GLS Granger graph shows many causal relationship that connect the two leading cryptocoins Bitcoin and Ethereum with the rest of them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
236
+ page_content=' For instance the proposed method finds the relations Ethereum → cardano, Bitcoin → EOS, Bitcoin → ChainLink, Iota → Bitcoin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
237
+ page_content=' 11 600 400 200 200 400 600 800Figure 4: Causal graphs 4 Conclusions and Future work In this paper, we propose a generalization of the Granger F-test to uncover the temporal causal structures from heteroskedastic and structural-breaks time series trough the estimation of the residual autocovariance matrix and GLS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
238
+ page_content=' We demonstrate its effectiveness on four simulation datasets and one real application dataset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
239
+ page_content=' For future work, we are interested in researching other uses of the sliding covariance matrix in the field of time series classification and machine learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
240
+ page_content=' Code availability Datasets and scripts for this article are available at github: https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
241
+ page_content='com/Granger-Causality- GLS References [Gra69] Clive WJ Granger, Investigating causal relations by econometric models and cross- spectral methods, Econometrica: journal of the Econometric Society (1969), 424–438.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
242
+ page_content=' [Gra80] , Testing for causality: a personal viewpoint, Journal of Economic Dynamics and control 2 (1980), 329–352.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
243
+ page_content=' [Gre03] William H Greene, Econometric analysis, Pearson Education India, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
244
+ page_content=' [KCP21] Myeong Jun Kim, Nguyen Phuc Canh, and Sung Y Park, Causal relationship among cryptocurrencies: A conditional quantile approach, Finance Research Letters 42 (2021), 101879.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
245
+ page_content=' [LS01] Junsoo Lee and Mark Strazicich, Testing the null of stationarity in the presence of a structural break, Applied Economics Letters 8 (2001), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
246
+ page_content=' 6, 377–382.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
247
+ page_content=' [Per89] Pierre Perron, The great crash, the oil price shock, and the unit root hypothesis, Econo- metrica: journal of the Econometric Society (1989), 1361–1401.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
248
+ page_content=' [SSS00] Robert H Shumway, David S Stoffer, and David S Stoffer, Time series analysis and its applications, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
249
+ page_content=' 3, Springer, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
250
+ page_content=' 12 cosms binance cosmes binance opero oherc dogec dogec新 chainL chainLink ave cryptocomcpin cryptocomcin etherum etherum cardao ec oin cal iota ota Titecotn Classical Granger F-test causal graph GLS Granger test causal graph[Yav22] G¨UL Yavuz, Causality and cointegration in cryptocurrency markets, Uluslararası ˙Iktisadi ve ˙Idari ˙Incelemeler Dergisi (2022), no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
251
+ page_content=' 34, 129–142.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
252
+ page_content=' 13' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8tE1T4oBgHgl3EQfUAOX/content/2301.03085v1.pdf'}
9dE0T4oBgHgl3EQfwwE1/content/tmp_files/2301.02636v1.pdf.txt ADDED
@@ -0,0 +1,1293 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CENTRAL H-SPACES AND BANDED TYPES
2
+ ULRIK BUCHHOLTZ, J. DANIEL CHRISTENSEN, JARL G. TAXER˚AS FLATEN, AND EGBERT RIJKE
3
+ Abstract. We introduce and study central types, which are generalizations of Eilenberg–Mac Lane
4
+ spaces. A type is central when it is equivalent to the component of the identity among its own self-
5
+ equivalences. From centrality alone we construct an infinite delooping in terms of a tensor product
6
+ of banded types, which are the appropriate notion of torsor for a central type. Our constructions are
7
+ carried out in homotopy type theory, and therefore hold in any ∞-topos.
8
+ Even when interpreted into the ∞-topos of spaces, our main results and constructions are new.
9
+ In particular, we give a description of the moduli space of H-space structures on an H-space which
10
+ generalizes a formula of Arkowitz–Curjel and Copeland which counts the number of path components
11
+ of this moduli space.
12
+ Contents
13
+ 1.
14
+ Introduction
15
+ 1
16
+ 2.
17
+ H-spaces and evaluation fibrations
18
+ 3
19
+ 2.1.
20
+ H-space structures
21
+ 3
22
+ 2.2.
23
+ Evaluation fibrations
24
+ 7
25
+ 2.3.
26
+ Unique H-space structures
27
+ 9
28
+ 3.
29
+ Central types
30
+ 10
31
+ 4.
32
+ Bands and torsors
33
+ 13
34
+ 4.1.
35
+ Types banded by a central type
36
+ 13
37
+ 4.2.
38
+ Tensoring bands
39
+ 15
40
+ 4.3.
41
+ Bands and torsors
42
+ 17
43
+ 5.
44
+ Examples and non-examples
45
+ 18
46
+ 5.1.
47
+ The H-space of G-torsors
48
+ 19
49
+ 5.2.
50
+ Eilenberg–Mac Lane spaces
51
+ 20
52
+ 5.3.
53
+ Products of Eilenberg–Mac Lane spaces
54
+ 21
55
+ References
56
+ 21
57
+ 1. Introduction
58
+ In this paper we study H-spaces and their deloopings. We work in homotopy type theory, so our
59
+ results apply to any ∞-topos. Many of our results are new, even for the ∞-topos of spaces.
60
+ A key concept is that of a central type. A pointed type A is central if the map (A → A)(id) → A
61
+ sending a function f to f(pt) is an equivalence. Here (A → A)(id) denotes the identity component of
62
+ the type of all self-maps of A, and pt denotes the base point of A. Every central type is a connected
63
+ H-space, and a connected H-space is central precisely when the type A →∗ A of pointed self-maps is
64
+ a set. We prove this and other characterizations of central types in Proposition 3.6. It follows, for
65
+ example, that every Eilenberg–Mac Lane space K(G, n), with G abelian and n ≥ 1, is central. We
66
+ show in Section 5.3 that some, but not all, products of Eilenberg–Mac Lane spaces are central. We
67
+ don’t know whether every central type is a product of Eilenberg–Mac Lane spaces.
68
+ Our first result is:
69
+ Date: January 6, 2023.
70
+ 1
71
+ arXiv:2301.02636v1 [math.AT] 6 Jan 2023
72
+
73
+ 2
74
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
75
+ Theorem 4.6. Let A be a central type. Then A has a unique delooping.
76
+ The key ingredient of this result and much of the paper is that we have a concrete description of
77
+ the delooping of A. It is given by the type BAut1(A) :≡ ΣX:U∥A = X∥0 of types banded by A, which
78
+ is the 1-connected cover of BAut(A). As an example, since K(G, n) is central for G abelian and n ≥ 1,
79
+ this gives an alternative way to define K(G, n + 1) in terms of K(G, n), as previously indicated by the
80
+ first author [Buc19].
81
+ We also show:
82
+ Theorem 4.10. Let A be a central type. Then every pointed map f : A →∗ A is uniquely deloopable
83
+ to a map Bf : BAut1(A) →∗ BAut1(A).
84
+ It follows that the type of pointed self-maps of BAut1(A) is a set, since it is equivalent to A →∗ A.
85
+ One of the motivations for studying BAut1(A) is that one can define a tensoring operation. Given
86
+ two banded types X and Y in BAut1(A), the type X∗ = Y has a natural banding, where X∗ is a certain
87
+ dual of X. We write X ⊗ Y for this banded type, and show in Theorem 4.19 that it makes BAut1(A)
88
+ into an abelian H-space. Combined with Theorem 4.6, Theorem 4.10, and the characterization of
89
+ central types mentioned earlier, we therefore deduce:
90
+ Corollary 4.20. For a central type A, the type BAut1(A) is again central. Therefore, A is an infinite
91
+ loop space, in a unique way. Moreover, every pointed map A →∗ A is infinitely deloopable, in a unique
92
+ way.
93
+ Our tensoring operation gives a new description of the H-space structure on K(G, n), which will
94
+ be helpful for calculations of Euler classes in work in progress and is what originally motivated this
95
+ work.
96
+ We also give an alternate description of the delooping of a central type A as a certain type of
97
+ A-torsors, and give an analogous description of K(G, 1) for any group G.
98
+ To prove the above results, we first need to further develop the theory of H-spaces. One difference
99
+ between our work and classical work in topology is that we emphasize the moduli space HSpace(A)
100
+ of H-space structures on a pointed type A, rather than just the set of components. For example, we
101
+ prove:
102
+ Theorem 2.27. Let A be an H-space such that for all a : A, the map a · − is an equivalence. Then
103
+ the type HSpace(A) of H-space structures on A is equivalent to the type A ∧ A →∗ A of pointed maps.
104
+ This generalizes a classical formula of Arkowitz–Curjel and Copeland, which plays a key role in
105
+ classical results on the number of H-space structures on various spaces. The classical formula only de-
106
+ termines the path components of the type of H-space structures, while our formula gives an equivalence
107
+ of types. From our formula it immediately follows, for example, that the type of H-space structures on
108
+ the 3-sphere is Ω6S3. The proof of Theorem 2.27 uses evaluation fibrations, which generalize the map
109
+ appearing in the definition of “central.” In fact, these evaluation fibrations play an important role in
110
+ much of the paper. For example, we include results relating the existence of sections of an evaluation
111
+ fibration to the vanishing of Whitehead products, and use this to show that no even spheres besides
112
+ S0 admit H-space structures.
113
+ In Proposition 3.3 we show that every central type has a unique H-space structure, in the strong
114
+ sense that the type HSpace(A) is contractible. We prove several results about types with unique
115
+ H-space structures. For example, we show that such H-space structures are associative and coherently
116
+ abelian, and that every pointed self-map is an H-space map, a weaker version of the delooping above.
117
+ We also give an example showing that not every type with a unique H-space structure is central.
118
+ We note that these results rely on us defining “H-space” to include a coherence between the two
119
+ unit laws (see Definition 2.1).
120
+ Outline. In Section 2, we give results about H-spaces which do not depend on centrality, including a
121
+ description of the moduli space of H-space structures, results about Whitehead products and H-space
122
+
123
+ CENTRAL H-SPACES AND BANDED TYPES
124
+ 3
125
+ structures on spheres, and results about unique H-space structures. In Section 3, we define central
126
+ types, show that central types have a unique H-space structure, give a characterization of which H-
127
+ spaces are central, and prove other results needed in the next section. Section 4 is the heart of the
128
+ paper. It defines the type BAut1(A) of bands for a central type A, shows that it is a unique delooping
129
+ of A, proves that it is an H-space under a tensoring operation, and shows that central types and their
130
+ self-maps are uniquely infinitely deloopable. We also give the alternate description of the delooping
131
+ in terms of A-torsors. Finally, Section 5 gives examples and non-examples of central types, mostly
132
+ related to Eilenberg–Mac Lane spaces and their products.
133
+ Notation and conventions. In general, we follow the notation used in [Uni13]. For example, we
134
+ write path composition in diagrammatic order: given paths p : x = y and q : y = z, their composite
135
+ is p � q. The reflexivity path is written refl.
136
+ Given a type A and an element a : A, we write (A, a) for the type A pointed at a. If A is already a
137
+ pointed type with unspecified base point, then we write pt for the base point. If A and B are pointed
138
+ types, and f, g : A →∗ B are pointed maps, then f =∗ g is the type of pointed homotopies between f
139
+ and g. If A is an H-space, then we write x · y for the product of two elements x, y : A (unless another
140
+ notation for the multiplication is given). For a pointed type A, we write HSpace(A) for the type of
141
+ H-space structures on A with the basepoint as the identity element (Definition 2.1). We write Sn for
142
+ the n-sphere, and U for a fixed universe of types.
143
+ Acknowledgements. We would like to thank David Jaz Myers for many lively discussions on the
144
+ content of this paper, especially related to bands and torsors. We also thank David W¨arn for fruitful
145
+ discussions and for sharing drafts of his forthcoming work.
146
+ Egbert Rijke gratefully acknowledges the support by the Air Force Office of Scientific Research
147
+ through grant FA9550-21-1-0024, and support by the Slovenian Research Agency research programme
148
+ P1-0294. Dan Christensen and Jarl Flaten both acknowledge the support of the Natural Sciences and
149
+ Engineering Research Council of Canada (NSERC), RGPIN-2022-04739.
150
+ 2. H-spaces and evaluation fibrations
151
+ In Section 2.1, we begin by recalling the notion of a (coherent) H-space structure on a pointed type
152
+ A. We discuss the type of pointed extensions of a map B ∨ C →∗ A to B × C, and show that the type
153
+ of H-space structures on A is equivalent to the type of pointed extensions of the fold map. We relate
154
+ the existence of extensions to the vanishing of Whitehead products, and use this to show that there
155
+ are no H-space structures on even spheres except S0. In addition, we show that for any n-connected
156
+ H-space A, the Freudenthal map π2n+1(A) → π2n+2(ΣA) is an isomorphism, not just a surjection.
157
+ In Section 2.2, we study evaluation fibrations. We show that the type of H-space structures is
158
+ equivalent to a type of sections of an evaluation fibration, and use this to show that the type of
159
+ H-space structures on a left-invertible H-space A is equivalent to A ∧ A →∗ A, generalizing a classical
160
+ formula of Arkowitz–Curjel and Copeland. It immediately follows, for example, that the type of H-
161
+ space structures on the 3-sphere is Ω6S3. We end with a result relating the existence of sections of an
162
+ evaluation fibration to the vanishing of Whitehead products.
163
+ Section 2.3 is a short section which studies the case when the type of H-space structures is con-
164
+ tractible. We stress that this is not the same as HSpace(A) having a single component, which is what
165
+ is classically meant by “A has a unique H-space structure.” This situation is interesting in its own
166
+ right. We show that such H-space structures are associative and coherently abelian, and we prove
167
+ that all pointed self-maps of A are automatically H-space maps.
168
+ 2.1. H-space structures. We begin by giving the notion of H-space structure that we will consider
169
+ in this paper.
170
+ Definition 2.1. Let A be a pointed type.
171
+ (1) A non-coherent H-space structure on A consists of a binary operation µ : A → A → A,
172
+ along with two homotopies µl : µ(pt, −) = idA and µr : µ(−, pt) = idA;
173
+
174
+ 4
175
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
176
+ (2) A (coherent) H-space structure on A consists of a non-coherent H-space structure µ on
177
+ A along with a coherence µlr : µl(pt) =µ(pt,pt)=pt µr(pt).
178
+ (3) We write HSpace(A) for the type of (coherent) H-space structures on A.
179
+ When the H-space structure is clear from the context we may write x · y :≡ µ(x, y). Any H-space
180
+ structure yields a non-coherent H-space structure by forgetting the coherence.
181
+ Suppose A has a
182
+ (non)coherent H-space structure µ.
183
+ (4) If µ(a, −) : A → A is an equivalence for all a : A, then µ is left-invertible, and we write
184
+ x\y :≡ µ(x, −)−1(y). Right-invertible is defined dually, and we write x/y :≡ µ(−, y)−1(x).
185
+ (5) The twist µT of µ is the natural (non)coherent H-space structure with operation
186
+ µT (a0, a1) :≡ µ(a1, a0).
187
+ When we say “H-space” we mean the coherent notion—we will only say “coherent” for emphasis.
188
+ The notion of H-space structure considered in [Uni13, Def. 8.5.4] corresponds to our non-coherent H-
189
+ space structures. While many constructions can be carried out for non-coherent H-spaces (such as the
190
+ Hopf construction), the coherent case is more natural for our purposes. Moreover, any non-coherent
191
+ H-space can be made coherent by simply changing one of the unit laws:
192
+ Proposition 2.2. Any non-coherent H-space structure on a pointed type A gives rise to a coherent
193
+ H-space structure with the same underlying binary operation.
194
+ Proof. Let (A, µ, µl, µr) be a non-coherent H-space. We define a new homotopy µ′
195
+ r : µ(−, pt) = id as
196
+ the concatenation of paths
197
+ µ(x, pt)
198
+ µ(x, µ(pt, pt))
199
+ µ(x, pt)
200
+ x.
201
+ apµ(x)(µr(pt))−1
202
+ apµ(x)(µl(pt))
203
+ µr(x)
204
+ We claim that µl(pt) = µ′
205
+ r(pt). To see this, it suffices to show that the square
206
+ µ(pt, µ(pt, pt))
207
+ µ(pt, pt)
208
+ µ(pt, pt)
209
+ pt
210
+ apµ(pt)(µl(pt))
211
+ apµ(pt)(µr(pt))
212
+ µr(pt)
213
+ µl(pt)
214
+ commutes. We will show that the top path is equal to µl(µ(pt, pt)), and this turns the square into a
215
+ naturality square for the homotopy µl, which always commutes. To see that
216
+ apµ(pt)(µl(pt)) = µl(µ(pt, pt)),
217
+ observe that µl is a homotopy µ(pt) = id, and for any homotopy H : f = id we have apf Hx = Hf(x)
218
+ for all x.
219
+
220
+ The proposition implies that the types of non-coherent and coherent H-space structures on a pointed
221
+ type are logically equivalent. However, they are not generally equivalent as types (see Remark 3.4).
222
+ We’ll be interested in abelian and associative H-spaces later on.
223
+ Definition 2.3. Let A be an H-space with multiplication µ.
224
+ (1) If there is a homotopy h : Πa,bµ(a, b) = µ(b, a) then µ is abelian.
225
+ (2) If µ = µT in HSpace(A) then µ is coherently abelian.
226
+ (3) If there is a homotopy α : Πa,b,c:Aµ(µ(a, b), c) = µ(a, µ(b, c)) then µ is associative.
227
+ The following lemma gives a convenient way of constructing abelian H-space structures, and will
228
+ be used in Theorem 4.19.
229
+ Lemma 2.4. Let A be a pointed type with a binary operation µ, a symmetry σa,b : µ(a, b) = µ(b, a)
230
+ for every a, b : A such that σpt,pt = refl, and a left unit law µl : µ(pt, −) = idA. Then A becomes an
231
+ abelian H-space with the right unit law induced by symmetry.
232
+
233
+ CENTRAL H-SPACES AND BANDED TYPES
234
+ 5
235
+ Proof. For b : A, the right unit law is given by the path σb,pt � µl(b) of type µ(b, pt) = b. For coherence
236
+ we need to show that the following triangle commutes:
237
+ µ(pt, pt)
238
+ µ(pt, pt)
239
+ pt .
240
+ µl
241
+ σpt,pt
242
+ µl
243
+ By our assumption that σpt,pt = refl, the triangle is filled reflµl.
244
+
245
+ For any right-invertible H-space A, for b : A one can define the two operations (−)/b and (−)·(pt/b)
246
+ of type A → A. If A is associative, then these coincide:
247
+ Lemma 2.5. Let A be an associative H-space. For any a, b : A, we have that a/b = a · (pt/b).
248
+ Proof. For all a, b : A we have (a · (pt/b)) · b = a · ((pt/b) · b) = a · pt = a. Thus by dividing by b on
249
+ the right, we deduce a · (pt/b) = a/b.
250
+
251
+ We collect a few basic facts about H-spaces. The following lemma generalizes a result of Evan
252
+ Cavallo, who formalized the fact that unpointed homotopies between pointed maps into a homogeneous
253
+ type A can be upgraded to pointed homotopies. Being a homogeneous type is logically equivalent to
254
+ being a left-invertible H-space [Cav21]. Here we do not need to assume left-invertibility, and we factor
255
+ this observation through a further generalization.
256
+ Lemma 2.6. Let A be a pointed type, and consider the following three conditions:
257
+ (1) A is an H-space.
258
+ (2) The evaluation map (idA = idA) → (pt = pt) has a section.
259
+ (3) For every pointed type B and pointed maps f, g : B →∗ A, there is a map (f = g) → (f =∗ g)
260
+ which upgrades unpointed homotopies to pointed homotopies.
261
+ Then (1) implies (2) and (2) implies (3).
262
+ Proof. To show that (1) implies (2), suppose that A is an H-space, and let p : pt = pt. For any x : A
263
+ we define the path px : x = x to be the concatenation
264
+ x
265
+ x · pt
266
+ x · pt
267
+ x .
268
+ µ−1
269
+ r
270
+ apµ(x)(p)
271
+ µr
272
+ This defines a map s : (pt = pt) → (idA = idA). To see that this map is a section of the evaluation
273
+ map, it suffices to show that the square
274
+ pt · pt
275
+ pt · pt
276
+ pt
277
+ pt
278
+ apµ(pt)(p)
279
+ µr
280
+ µr
281
+ p
282
+ commutes. To see this, note that µr = µl. If we replace µr by µl in the above square, we obtain a
283
+ naturality square of homotopies, which always commutes.
284
+ We next show that (2) implies (3). Let f, g : B →∗ A be pointed maps and let H : f = g be an
285
+ unpointed homotopy. By path induction on H, we can assume we have a single function f : B → A
286
+ with two pointings, fpt and f ′
287
+ pt : f(pt) = pt. Our goal is to define a homotopy K : f = f such that
288
+ Kpt = r, where r :≡ fpt · f ′pt : f(pt) = f(pt). By path induction on fpt, we can assume that the
289
+ basepoint of A is f(pt). By (2), we have s : (f(pt) = f(pt)) → (idA = idA) such that s(p, f(pt)) = p
290
+ for all p : f(pt) = f(pt). For b : B, define Kb to be s(r, f(b)). Then Kpt = r, as required.
291
+
292
+ The following result is straightforward and has been formalized, so we do not include a proof.
293
+
294
+ 6
295
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
296
+ Proposition 2.7. Suppose A is a (left-invertible) H-space. For any pointed type B, the mapping
297
+ type B →∗ A based at the constant map is naturally a (left-invertible) H-space under pointwise mul-
298
+ tiplication.
299
+ Similarly, for any type B, the mapping type B → A based at the constant map is a
300
+ (left-invertible) H-space under pointwise multiplication.
301
+
302
+ In particular, if A is left-invertible then for any f : B →∗ A there is a self-equivalence of B →∗ A
303
+ which sends the constant map to f—namely, the pointwise multiplication by f on the left.
304
+ Our next goal is to rule out H-space structures on even spheres using Brunerie’s computation of
305
+ Whitehead products. (See [Bru16, Section 3.3] for their definition.) To do so, we prove some results
306
+ about Whitehead products from [Whi46] which relate to H-spaces.
307
+ Definition 2.8. Let α : B →∗ A and β : C →∗ A be pointed maps. An (α, β)-extension is a
308
+ pointed map f : B × C →∗ A equipped with a pointed homotopy filling the following diagram:
309
+ B ∨ C
310
+ A
311
+ B × C .
312
+ α∨β
313
+ f
314
+ Remark 2.9. It is equivalent to consider the type of unpointed (α, β)-extensions consisting of unpointed
315
+ maps f : B × C → A and unpointed fillers. The additional data in a pointed extension is a path
316
+ fpt : f(pt, pt) = pt and a 2-path that determines fpt in terms of the other data.
317
+ These form a
318
+ contractible pair.
319
+ When α and β are maps between spheres, Whitehead instead says that f is “of type (α, β)” but we
320
+ prefer to stress that we work with a structure and not a property, as the following lemma illustrates:
321
+ Lemma 2.10. H-space structures on a pointed type A correspond to (idA, idA)-extensions.
322
+
323
+ The proof consists of straightforward reshuffling of data.
324
+ Lemma 2.11. If A is an H-space, then there is an (α, β)-extension for every pair α : B →∗ A and
325
+ β : C →∗ A of pointed maps.
326
+ Proof. Using naturality of the left and right unit laws and coherence, one can show that the map
327
+ (b, c) �→ α(b)·β(c) : B ×C → A is an (α, β)-extension. Alternatively, observe that the (α, β)-extension
328
+ problem factors through the (idA, idA)-extension problem via the map α × β : B × C → A × A.
329
+
330
+ The lemmas explain the relation between H-space structures and (α, β)-extensions, which are in
331
+ turn related to Whitehead products via the next two results.
332
+ Proposition 2.12 ([Whi46, Corollary 3.5]). Let m, n > 0 be natural numbers and consider two
333
+ pointed maps α : Sm →∗ A and β : Sn →∗ A. The type of (α, β)-extensions is equivalent to the type
334
+ of witnesses that the map [α, β] : Sm+n−1 →∗ A is constant (as a pointed map).
335
+ Proof. Consider the diagram of pointed maps below, where the composite of the top two maps is [α, β]
336
+ and the left diamond is a pushout of pointed types:
337
+ Sm ∨ Sn
338
+ Sm+n−1
339
+ Sm × Sn
340
+ A .
341
+ 1
342
+ α∨β
343
+ f
344
+ An (α, β)-extension is the same as a pointed map f along with a pointed homotopy filling the top-right
345
+ triangle. Since the bottom-right triangle is filled by a unique pointed homotopy, an (α, β)-extension
346
+ thus corresponds exactly to the data of a filler in the outer diagram, i.e., a homotopy witnessing that
347
+ [α, β] is constant as a pointed map.
348
+
349
+
350
+ CENTRAL H-SPACES AND BANDED TYPES
351
+ 7
352
+ With the notation of the previous proposition, we have the following:
353
+ Corollary 2.13 ([Whi46, Corollary 3.6]). Suppose A is an H-space. Then [α, β] is constant.
354
+ Proof. The follows from Lemma 2.11 and Proposition 2.12.
355
+
356
+ Using the above results, we can rule out H-space structures on even spheres in positive dimensions.
357
+ Proposition 2.14. The n-sphere merely admits an H-space structure if and only if [ιn, ιn] = 0. In
358
+ particular, there are no H-space structures on the n-sphere when n > 0 is even.
359
+ Proof. The implication (→) is immediate by Corollary 2.13. Conversely, Proposition 2.12 implies that
360
+ [ιn, ιn] = 0 if and only if an (idSn, idSn)-extension merely exists, which by Lemma 2.10 happens if and
361
+ only if Sn merely admits an H-space structure.
362
+ Finally, Brunerie showed that [ιn, ιn] = 2 in π2n−1(Sn) for even n > 0 [Bru16, Proposition 5.4.4],
363
+ which by the above implies that Sn cannot admit an H-space structure.
364
+
365
+ We also record the following result and a corollary.
366
+ Proposition 2.15. Let A be a left-invertible H-space. The unit η : A →∗ ΩΣA has a pointed retrac-
367
+ tion, given by the connecting map δ : ΩΣA →∗ A associated to the Hopf fibration of A.
368
+ Proof. Let δ : ΩΣA →∗ A be the connecting map associated to the Hopf fibration of A. Recall that
369
+ for a loop p : N = N, we have δ(p) :≡ p∗(pt) where p∗ : A → A denotes transport and A is the fibre
370
+ above N. By definition of the Hopf fibration, a path merid(a) : N =ΣA S sends an element x of the
371
+ fibre A to a · x. Now define a homotopy δ ◦ η = id by
372
+ δ(η(a)) ≡ δ(merid(a) � merid(pt)−1) = merid(pt)−1
373
+ ∗ (merid(a)∗(pt)) ≡ pt\(a · pt) = a.
374
+ Finally, we promote this to a pointed homotopy using Lemma 2.6.
375
+
376
+ It follows that for any n-connected H-space A, the Freudenthal map π2n+1(A) → π2n+2(ΣA) is an
377
+ isomorphism, not just a surjection. In particular, we have:
378
+ Corollary 2.16. The natural map π5(S3) → π6(S4) is an isomorphism.
379
+
380
+ The fact that the unit η : A →∗ ΩΣA has a retraction when A is a left-invertible H-space also follows
381
+ from James’ reduced product construction, as shown in [Jam55]. Using [Bru16], one can see that this
382
+ goes through in homotopy type theory. However, the above argument is much more elementary. We
383
+ don’t know if this argument had been observed before.
384
+ 2.2. Evaluation fibrations. We now begin our study of evaluation fibrations and their relation to
385
+ H-space structures and (α, β)-extensions from the previous section. Given a pointed map f : B →∗ A,
386
+ we will simply write ev : (B → A, f) →∗ A for the map which evaluates at pt : B. This map is
387
+ pointed since f is. If no map f is specified, then we mean that f ≡ id.
388
+ In a moment we will define evaluation fibrations to be the restriction of ev to a component, but
389
+ first we make a useful observation.
390
+ Definition 2.17. Let e : X →∗ A and g : B →∗ A be pointed maps. A pointed lift of g through
391
+ e consists of a pointed map s : B →∗ X along with a pointed homotopy e ◦ s =∗ g. If g ≡ id, then s
392
+ is more specifically a pointed section of e.
393
+ Proposition 2.18. Let f : B →∗ A and g : C →∗ A be pointed maps. The type of (f, g)-extensions
394
+ is equivalent to the type of pointed lifts of g through ev : (B → A, f) →∗ A.
395
+
396
+ We stress that the domain of ev is the type of unpointed maps B → A, pointed by (the underlying
397
+ map of) f. The proof of the statement is a straightforward reshuffling of data. Diagrammatically, it
398
+ gives a correspondence between the dashed arrows below, with pointed homotopies filling the triangles:
399
+ B ∨ C
400
+ A
401
+ (B → A, f)
402
+ B × C
403
+ C
404
+ A
405
+ f∨g
406
+ ev
407
+ g
408
+
409
+ 8
410
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
411
+ Combining Lemma 2.10 with the previous proposition, we deduce:
412
+ Corollary 2.19. Let A be a pointed type. The type of H-space structures on A is equivalent to the
413
+ type of pointed sections of ev : (A → A, id) →∗ A.
414
+
415
+ Remark 2.20. Phrased another way, an H-space structure on a pointed type A is equivalent to a family
416
+ µ : Π(a:A)(A, pt) →∗ (A, a).
417
+ If A is a higher inductive type with a point pt, one can define µ(pt) :≡ id to simplify the task.
418
+ Definition 2.21. Let A be a type and a : ∥A∥0. The path component of a in A is
419
+ A(a) :≡ Σa′:A(|a′|0 = a).
420
+ If a : A then we abuse notation and write A(a) for A(|a|0), and in this case A(a) is pointed at (a, refl).
421
+ Definition 2.22. For any pointed map α : B →∗ A, the evaluation fibration (at α) is the pointed
422
+ map evα : (B → A)(α) →∗ A induced by evaluating at the base point of B.
423
+ Observe that the component (A → A)(id) is equivalent to (A ≃ A)(id), since being an equivalence is
424
+ a property of a map. We permit ourselves to pass freely between the two.
425
+ Since pointed maps out of connected types land in the component of the base point of the codomain,
426
+ we have the following consequence of Corollary 2.19.
427
+ Corollary 2.23. Let A be a pointed, connected type. The type of H-space structures on A is equivalent
428
+ to the type of pointed sections of evid : (A ≃ A)(id) →∗ A.
429
+
430
+ For certain H-spaces, various evaluation fibrations become trivial:
431
+ Proposition 2.24. Suppose A is a left-invertible H-space. We have a pointed equivalence over A
432
+ (A → A)
433
+ (A →∗ A) × A
434
+ A ,
435
+ ev
436
+
437
+ pr2
438
+ where the mapping spaces are both pointed at their identity maps. This pointed equivalence restricts
439
+ to pointed equivalences (A ≃ A) ≃∗ (A ≃∗ A) × A over A, and (A → A)(id) ≃∗ (A →∗ A)(id) × A(pt)
440
+ over A(pt).
441
+ Proof. Define e : (A → A) → (A →∗ A) × A by e(f) :≡ (a �→ f(pt)\f(a), f(pt)) where the first
442
+ component is a pointed map in the obvious way. Clearly e is a map over A, and moreover e is pointed.
443
+ It is straightforward to check that the triangle above is filled by a pointed homotopy. (One could also
444
+ apply Lemma 2.6, but a direct inspection suffices in this case.)
445
+ Finally, it’s straightforward to check that e has an inverse given by
446
+ (g, a) �→ (x �→ a · g(x)).
447
+ Hence e is an equivalence, as desired. The restrictions to equivalences and path components follow by
448
+ functoriality.
449
+
450
+ The hypotheses of the proposition are satisfied, for example, by connected H-spaces.
451
+ Example 2.25. We obtain three pointed equivalences for any abelian group A and n ≥ 1:
452
+
453
+ K(A, n) → K(A, n)
454
+
455
+ ≃∗ Ab(A, A) × K(A, n),
456
+
457
+ K(A, n) ≃ K(A, n)
458
+
459
+ ≃∗ AutAb(A) × K(A, n), and
460
+
461
+ K(A, n) → K(A, n)
462
+
463
+ (id) ≃∗ K(A, n).
464
+
465
+ CENTRAL H-SPACES AND BANDED TYPES
466
+ 9
467
+ Example 2.26. Taking A :≡ S3 in the previous proposition, by virtue of the H-space structure on
468
+ the 3-sphere constructed in [BR18], we get three pointed equivalences:
469
+ (S3 → S3) ≃∗ Ω3S3 × S3,
470
+ (S3 ≃ S3) ≃∗ Ω3
471
+ ±1S3 × S3,
472
+ and
473
+ (S3 ≃ S3)(id) ≃∗ (S3 ≃∗ S3)(id) × S3,
474
+ where Ω3
475
+ ±1S3 :≡ (Ω3S3)(1)⊔(Ω3S3)(−1) and 1 and −1 refer to the corresponding elements of π3(S3) = Z.
476
+ By combining our results thus far, we obtain the following equivalence which generalizes a classical
477
+ formula of [Cop59, Theorem 5.5A], independently shown by [AC63], for counting homotopy classes of
478
+ H-space structures on certain spaces.
479
+ Theorem 2.27. Let A be a left-invertible H-space. The type HSpace(A) of H-space structures on A
480
+ is equivalent to A ∧ A →∗ A.
481
+ Proof. By Corollary 2.19, the type of H-space structures on A is equivalent to the type of pointed
482
+ sections of ev : (A → A) → A. By Proposition 2.24, this type is equivalent to the type of pointed
483
+ sections of pr2 : (A →∗ A) × A → A, which are simply pointed maps A →∗ (A →∗ A, id), where
484
+ the codomain is pointed at the identity. The latter type is equivalent to A →∗ (A →∗ A), where
485
+ the codomain is pointed at the constant map, by Proposition 2.7. Finally, this type is equivalent to
486
+ A ∧ A →∗ A by the smash–hom adjunction for pointed types [vDoo18, Theorem 4.3.28].
487
+
488
+ Example 2.28. It follows from the proposition that HSpace(S1) ≃ 1 and HSpace(S3) ≃ Ω6S3.
489
+ We record the following result which relates Whitehead products and evaluation fibrations.
490
+ Proposition 2.29 ([Han74, Lemma 2.2]). Let n, m ≥ 2 and let α : πm(Sn).
491
+ The evaluation
492
+ fibration evα : (Sm → Sn)(α) → Sn merely has a section if and only if the Whitehead product
493
+ [α, ιn] : πn+m−1(Sn) vanishes.
494
+ Proof. As we are proving a proposition, we may pick a representative α : Sm →∗ Sn throughout.
495
+ Using Proposition 2.18 and that Sn is connected, we see that [α, ιn] vanishes if and only if there
496
+ merely exists a pointed section of evα. The fibre of the forgetful map from pointed sections of evα
497
+ to unpointed sections of evα over some section (s, h) is equivalent to
498
+
499
+ k:s(pt,−)=α
500
+ h(pt) =s(pt,pt)=pt k(pt) � αpt,
501
+ where αpt : α(pt) = pt is the pointing of α. This fibre is (−1)-connected since s lands in the component
502
+ of α and the inner part of the Σ-type is a double path space of Sn with n ≥ 2. In other words, this
503
+ forgetful map is an epimorphism. A pointed section of evα therefore merely exists if and only if an
504
+ unpointed section merely exists, completing the proof.
505
+
506
+ 2.3. Unique H-space structures. We collect results about H-space structures which are unique, in
507
+ the sense that the type of H-space structures is contractible. In particular, we give elementary proofs
508
+ that such H-space structures are automatically coherently abelian and associative. Moreover, pointed
509
+ self-maps of such are automatically H-space self-maps.
510
+ Lemma 2.30. Let A be a pointed type and suppose HSpace(A) is contractible.
511
+ Then the unique
512
+ H-space structure µ on A is coherently abelian.
513
+ Proof. Since HSpace(A) is contractible, there is an identification µ = µT of H-space structures. (Here,
514
+ µT is the twist, defined in Definition 2.1.)
515
+
516
+ For the next result, we use the definition of the smash product from [vDoo18, Definition 4.3.6]
517
+ (see also [CS20, Definition 2.29]) which avoids higher paths. For pointed types (X, x0) and (Y, y0),
518
+ the smash product X ∧ Y is the higher inductive type with point constructors sm : X × Y →
519
+ X ∧ Y and auxl, auxr : X ∧ Y , and path constructors gluel : �
520
+ y:Y sm(x0, y) = auxl and gluer :
521
+
522
+ x:X sm(x, y0) = auxr.
523
+ It is pointed by auxl.
524
+ The smash product was shown to be associative
525
+ in [vDoo18, Definition 4.3.33].
526
+
527
+ 10
528
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
529
+ Proposition 2.31. Suppose A is a pointed type with a unique H-space structure, and suppose moreover
530
+ that this H-space structure is left-invertible. Then any pointed map f : A →∗ A is an H-space map,
531
+ i.e., we have f(a · b) = f(a) · f(b) for all a, b : A.
532
+ Proof. Let f : A →∗ A be a pointed map. We will define an associated map ν : A ∧ A →∗ A, which
533
+ records how f deviates from being an H-space map. We define ν(sm(a, b)) :≡
534
+
535
+ f(a · b)/f(b)
536
+
537
+ /f(a),
538
+ ν(auxl) :≡ pt, and ν(auxr) :≡ pt. For b : A, we have a path ν(sm(pt, b)) ≡
539
+
540
+ f(pt · b)/f(b)
541
+
542
+ /f(pt) =
543
+
544
+ f(b)/f(b)
545
+
546
+ /pt = pt/pt = pt, and similarly for the other path constructor. Since A admits a unique
547
+ H-space structure, the type A∧A →∗ A is contractible by Theorem 2.27. Consequently, ν is constant,
548
+ whence for all a, b : A we have
549
+
550
+ f(a · b)/f(b)
551
+
552
+ /f(a) = pt, and therefore
553
+ f(a · b) = f(a) · f(b).
554
+
555
+ Remark 2.32. Note that when A and B are two pointed types, each with unique H-space structures,
556
+ it is not necessarily the case that every pointed map f : A →∗ B is an H-space map. For example, the
557
+ squaring operation gives a natural transformation H2(X; Z) → H4(X; Z) which is represented by a
558
+ map K(Z, 2) →∗ K(Z, 4). But since squaring isn’t a homomorphism, this map isn’t an H-space map.
559
+ Proposition 2.33. Suppose A is a pointed type with a unique H-space structure which is left-invertible.
560
+ Then the H-space structure is necessarily associative.
561
+ Proof. Let a : A. Define a map ν : A ∧ A →∗ A as follows. We let ν(sm(b, c)) :≡ ((a · b) · c)/(a · (b · c)),
562
+ ν(auxl) :≡ pt, and ν(auxr) :≡ pt. For c : A, we have a path ν(sm(pt, c)) ≡ ((a · pt) · c)/(a · (pt · c)) =
563
+ (a · c)/(a · c) = pt, and similarly for the other path constructor. Since A admits a unique H-space
564
+ structure, the type A ∧ A →∗ A is contractible by Theorem 2.27. Consequently, for each a, ν is
565
+ constant. It follows that for all a, b, c : A we have ((a · b) · c)/(a · (b · c)) = pt, and therefore
566
+ (a · b) · c = a · (b · c).
567
+
568
+ Note that if A ∧ A →∗ A is contractible, then it follows from the smash-hom adjunction that
569
+ A∧n →∗ A is contractible for each n ≥ 2, where A∧n denotes the smash power.
570
+ 3. Central types
571
+ In this and the next section we focus on pointed types which we call central. Centrality is an
572
+ elementary property with remarkable consequences. For example, in the next section we will see that
573
+ every central type is an infinite loop space (Corollary 4.20). To show this, we require a certain amount
574
+ of theory about central types. We first show that every central type has a unique H-space structure.
575
+ When A is already known to be an H-space, we give several conditions which are equivalent to A
576
+ being central. From this, it follows that every Eilenberg–Mac Lane space K(G, n), with G abelian and
577
+ n ≥ 1, is central. We also prove several other results which we will need in the next section.
578
+ Definition 3.1. Let A be a pointed type. The center of A is the type ZA :≡ (A → A)(id), which
579
+ comes with a natural map evid : ZA →∗ A (see Definition 2.22). If the map evid is an equivalence,
580
+ then A is central.
581
+ Remark 3.2. The terminology “central” comes from higher group theory. Suppose A :≡ BG is the
582
+ delooping of an ∞-group G. The center of G is the ∞-group ZG :≡ Πx:G(x = x) with delooping
583
+ BZG :≡ (BG ≃ BG)(id), which is our ZA.
584
+ Central types and H-spaces are connected through evaluation fibrations:
585
+ Proposition 3.3. Suppose that A is central. Then A admits a unique H-space structure. In addition,
586
+ A is connected, so this H-space structure is both left- and right-invertible.
587
+ Proof. Since evid is an equivalence, it has a unique section. By Corollary 2.23, we deduce that A has
588
+ a unique H-space structure µ. It follows from Lemma 2.30 that it is coherently abelian. Finally, the
589
+ equivalence evid : (A → A)(id) ≃ A implies that A is connected. Then, since µ(pt, −) and µ(−, pt) are
590
+ both equal to the identity, it follows that µ is left- and right-invertible.
591
+
592
+
593
+ CENTRAL H-SPACES AND BANDED TYPES
594
+ 11
595
+ It follows from Proposition 2.33 and Lemma 2.30 that the unique H-space structure on a central
596
+ type is associative and coherently abelian.
597
+ Remark 3.4. In contrast, the type of non-coherent H-space structures on a central type A is rarely
598
+ contractible. We’ll show here that it is equivalent to the loop space ΩA. First consider the type of
599
+ binary operations µ : A → (A → A) which merely satisfy the left unit law. This is equivalent to the
600
+ type of maps A → (A → A)(id), since A is connected. Such a map µ satisfies the right unit law if and
601
+ only if the composite evid ◦µ : A → A is the identity map. In other words, µ must be a section of the
602
+ equivalence evid, so there is a contractible type of such µ.
603
+ The left unit law says that µ sends pt to id. After post-composing with evid, it therefore says that
604
+ it sends pt to id(pt), which equals pt. So the type of left unit laws is pt = pt, i.e., the loop space ΩA.
605
+ Note that we imposed the left unit law both merely and purely, but that doesn’t change the type. So
606
+ it follows that the type of all non-coherent H-space structures on a central type A is ΩA.
607
+ We give conditions for an H-space to be central, in which case the H-space structure is the unique
608
+ one coming from centrality. For the next two results, write
609
+ F :≡ Σf:A→∗A∥f = id∥
610
+ for the fibre of evid : (A → A)(id) →∗ A over pt : A. Note that the equality f = id is in the type of
611
+ unpointed maps A → A.
612
+ Lemma 3.5. Suppose that A is a connected H-space. Then F ≃ (A →∗ A)(id).
613
+ Proof. By our assumptions, Proposition 2.24 gives a trivialization of evid over A:
614
+ t : (A → A)(id) ≃∗ (A →∗ A)(id) × A.
615
+ Passing to the fibres of evid and pr2 over pt : A gives the desired equivalence.
616
+
617
+ The lemma can also be shown using Lemma 2.6.
618
+ Proposition 3.6. Let A be a pointed type. Then the following are logically equivalent:
619
+ (1) A is central;
620
+ (2) A is a connected H-space and A →∗ A is a set;
621
+ (3) A is a connected H-space and A ≃∗ A is a set;
622
+ (4) A is a connected H-space and A →∗ ΩA is contractible;
623
+ (5) A is a connected H-space and ΣA →∗ A is contractible.
624
+ Proof. (1) =⇒ (2): Assume that A is central. Then Proposition 3.3 implies that A is a connected H-
625
+ space. Since A is a left-invertible H-space, so is A →∗ A, by Proposition 2.7. Therefore all components
626
+ of A →∗ A are equivalent to (A →∗ A)(id), and thus to F by Lemma 3.5. Now, F is contractible since
627
+ evid is an equivalence, and consequently A →∗ A is a set since all of its components are contractible.
628
+ (2) =⇒ (3): This follows from the fact that A ≃∗ A embeds into A →∗ A.
629
+ (3) =⇒ (1): If (A ≃∗ A) is a set, then its component (A →∗ A)(id) is contractible. Therefore F is
630
+ contractible, by Lemma 3.5. It follows that evid is an equivalence, since A is connected. Hence A is
631
+ central.
632
+ (3) ⇐⇒ (4): Since A is a left-invertible H-space, so is A →∗ A. The latter is therefore a set if and
633
+ only if the component of the constant map is contractible, which is true if and only if the loop space
634
+ Ω(A →∗ A) is contractible. Finally, the equivalence Ω(A →∗ A) ≃ (A →∗ ΩA) shows that this is true
635
+ if and only if A →∗ ΩA is contractible.
636
+ (4) ⇐⇒ (5): This follows from the equivalence (A →∗ ΩA) ≃ (ΣA →∗ A).
637
+
638
+ Example 3.7. Consider the Eilenberg–Mac Lane space K(G, n) for n ≥ 1 and G an abelian group.
639
+ It is a pointed, connected type.
640
+ Since K(G, n) ≃ Ω K(G, n + 1), it is an H-space.
641
+ By [BvDR18,
642
+ Theorem 5.1], K(G, n) ≃∗ K(G, n) is equivalent to the set of automorphisms of G. It therefore follows
643
+ from Proposition 3.6 that K(G, n) is central. We will see in Proposition 5.9 a more self-contained
644
+ proof of this result.
645
+
646
+ 12
647
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
648
+ Example 3.8. Brunerie showed that π4(S3) ≃ Z/2 [Bru16]. Therefore, S4 →∗ S3 is not contractible,
649
+ and so S3 is not central, by Proposition 3.6(5). Since this is in the stable range, it follows that Sn is
650
+ not central for n ≥ 3.
651
+ Remark 3.9. For a pointed type A, we have seen that A being central is logically equivalent to A being
652
+ a connected H-space such that A ≃∗ A is a set. It is natural to ask whether the reverse implication
653
+ holds without the assumption that A is an H-space. However, this is not the case. Consider, for
654
+ example, the pointed, connected type K(G, 1) for a non-abelian group G. Then K(G, 1) ≃∗ K(G, 1)
655
+ is equivalent to the set of group automorphisms of G. If K(G, 1) were central, then G would be twice
656
+ deloopable, which would contradict G being non-abelian.
657
+ By the previous proposition, the type A →∗ A is a set whenever A is central. Presently we observe
658
+ that it is in fact a ring.
659
+ Corollary 3.10. For any central type A, the set A →∗ A is a ring under pointwise multiplication
660
+ and function composition.
661
+ Proof. It follows from A being a commutative and associative H-space that the set A →∗ A is an
662
+ abelian group. The only nontrivial thing we need to show is that function composition is linear. Let
663
+ f, g, φ : A →∗ A, and consider a : A. By Proposition 2.31, φ is an H-space map. Consequently,
664
+
665
+ φ ◦ (f · g)
666
+
667
+ (a) ≡ φ(f(a) · g(a)) = φ(f(a)) · φ(g(a)) ≡
668
+
669
+ (φ ◦ f) · (φ ◦ g)
670
+
671
+ (a).
672
+
673
+ The following remark gives some insight into the nature of the ring A →∗ A.
674
+ Remark 3.11. If BG is an ∞-group and X is a pointed type, recall that a bundle over X is G-principal
675
+ if it is classified by a map X →∗ BG (see e.g. [Sco20, Def. 2.23] for a formal definition which easily
676
+ generalizes to arbitrary ∞-groups). In particular, it is not hard to see that the Hopf fibration of G
677
+ (as the loop space of BG) is a G-principal bundle, i.e., classified by a map ΣG →∗ BG.
678
+ In Proposition 4.4 we will see that any central type A has a delooping BAut1(A). This means we
679
+ have equivalences
680
+ (A →∗ A) ≃
681
+
682
+ A →∗ (A ≃ A)(id)
683
+
684
+ ≃ (ΣA →∗ BAut1(A)).
685
+ Thus we see that A →∗ A is the ring of principal A-bundles over ΣA. The equivalence above maps the
686
+ identity id : A →∗ A to the Hopf fibration of A (as a principal A-bundle), meaning the Hopf fibration
687
+ is the multiplicative unit from this perspective.
688
+ In the remainder of this section we collect various results which are needed later on. The first result
689
+ is that “all” of the evaluation fibrations of a central type A are equivalences:
690
+ Proposition 3.12. Let A be a central type and let f : A →∗ A be a pointed map. The evaluation
691
+ fibration evf : (A → A)(f) →∗ A is an equivalence, with inverse given by a �→ a · f(−).
692
+ Proof. The type A → A is a left-invertible H-space via pointwise multiplication, by Proposition 2.7.
693
+ So there is an equivalence (A → A)(id) → (A → A)(f) sending g to f · g. Since f is pointed, we have
694
+ evf(f · g) ≡ (f · g)(pt) ≡ f(pt) · g(pt) = pt · g(pt) = g(pt) = evid(g).
695
+ In other words, evf ◦(f · −) = evid, which shows that evf is an equivalence. Since f is pointed, the
696
+ stated map is a section of evf, hence is an inverse.
697
+
698
+ Corollary 3.13. Let A be a central type, let f : A →∗ A, and let g : (A → A)(f). Then for all a : A,
699
+ we have g(a) = g(pt) · f(a).
700
+
701
+ Any central type has an inversion map, which plays a key role in the next section.
702
+ Definition 3.14. Suppose that A is central. The inversion map id∗ : A → A sends a to a∗ :≡ pt/a.
703
+
704
+ CENTRAL H-SPACES AND BANDED TYPES
705
+ 13
706
+ The defining property of a∗ is that a∗·a = pt. Since A is abelian, we also have a·a∗ = pt, so it would
707
+ have been equivalent to define the inversion to be a �→ a\pt. From associativity of a central H-space
708
+ it follows that pt∗ = pt and a∗∗ = a for all a, so the inversion map id∗ is a pointed self-equivalence of
709
+ A and an involution.
710
+ A curious property is that on the component of id∗, inversion of equivalences is homotopic to the
711
+ identity. This comes up in the next section.
712
+ Proposition 3.15. The map φ �→ φ−1 : (A ≃ A)(id∗) → (A ≃ A)(id∗) is homotopic to the identity.
713
+ Proof. Let φ : (A ≃ A)(id∗). We need to show that φ = φ−1, or equivalently that φ(φ(pt)) = pt, since
714
+ evid is an equivalence. (Note that φ ◦ φ : (A ≃ A)(id).) Using Corollary 3.13, we have that
715
+ φ(φ(pt)) = φ(pt) · φ(pt)∗ = pt.
716
+
717
+ 4. Bands and torsors
718
+ We begin in Section 4.1 by defining and studying types banded by a central type A, also called
719
+ A-bands. We show that the type BAut1(A) of banded types is a delooping of A, that A has a unique
720
+ delooping, and that every pointed self-map A →∗ A has a unique delooping.
721
+ In Section 4.2, we show that BAut1(A) is itself an H-space under a tensoring operation, from which
722
+ it follows that it is again a central type. Thus we may iteratively consider banded types to obtain
723
+ an infinite loop space structure on A, which is unique. As a special case, taking A to be K(G, n) for
724
+ some abelian group G produces a novel description of the infinite loop space structure on K(G, n), as
725
+ described in Section 5.2.
726
+ In Section 4.3, we define the type of A-torsors, which we show is equivalent to the type of A-bands
727
+ when A is central, thus providing an alternate description of the delooping of A. The type of A-torsors
728
+ has been independently studied by David W¨arn, who has shown that it is a delooping of A under the
729
+ weaker assumption that A has a unique H-space structure.
730
+ 4.1. Types banded by a central type. We now study types banded by a central type A. On this
731
+ type we will construct an H-space structure, which will be seen to be central.
732
+ Definition 4.1. For a type A, let BAut1(A) :≡ ΣX:U∥A = X∥0. The elements of BAut1(A) are types
733
+ which are banded by A or A-bands, for short. We denote A-bands by Xp, where p : ∥A = X∥0 is
734
+ the band. The type BAut1(A) is pointed by A|refl|0.
735
+ Given a band p : ∥A = X∥0, we will write ˜p : ∥X ≃ A∥0 for the associated equivalence.
736
+ Remark 4.2. It’s not hard to see that BAut1(A) is a connected, locally small type—hence essentially
737
+ small, by the join construction [Rij17].
738
+ The characterization of paths in Σ-types tells us what paths between banded types are.
739
+ Lemma 4.3. Consider two A-bands Xp and Yq. A path Xp = Yq of A-bands corresponds to a path
740
+ e : X = Y between the underlying types making the following triangle of truncated paths commute:
741
+ A
742
+ X
743
+ Y .
744
+ p
745
+ q
746
+ |e|0
747
+ In other words, there is an equivalence (Xp = Yq) ≃ (X = Y )(¯p � q).
748
+
749
+ For the remainder of this section, let A be a central type. We begin by showing that the type of
750
+ A-bands is a delooping of A.
751
+ Proposition 4.4. We have that Ω BAut1(A) ≃ A.
752
+ Proof. We have Ω BAut1(A) ≃ (A = A)(refl) ≃ (A ≃ A)(id) ≃ A, where the first equivalence uses
753
+ Lemma 4.3 and the last equivalence is by centrality.
754
+
755
+
756
+ 14
757
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
758
+ Corollary 4.5. The unique H-space structure on A is deloopable.
759
+
760
+ Note that this gives an independent proof that it is associative (cf. Proposition 2.33).
761
+ Theorem 4.6. The type A has a unique delooping.
762
+ Proof. We must show that the type ΣB:U* (ΩB ≃∗ A) is contractible. We will use BAut1(A), with the
763
+ equivalence ψ from Proposition 4.4, as the center of contraction. Let B : U* be a pointed type with a
764
+ pointed equivalence φ : ΩB ≃∗ A. Given x : B, consider pt =B x. Since A is connected, B is simply
765
+ connected. Therefore, to give a banding on pt =B x, it suffices to do so when x is pt, in which case
766
+ we use φ. So we have defined a map f : B → BAut1(A), and it is easy to see that it is pointed.
767
+ We claim that the following triangle commutes:
768
+ ΩB
769
+ Ω BAut1(A)
770
+ A .
771
+ φ
772
+
773
+ Ωf
774
+ ψ
775
+
776
+ Let q : pt =B pt. Then (Ωf)(q) is the path associated to the equivalence
777
+ A ≃ (pt =B pt) ≃ (pt =B pt) ≃ A.
778
+ The first equivalence is φ−1 and the last is φ, as these give the pointedness of f. The middle equivalence
779
+ is the map sending p to p�q. The map ψ comes from the evaluation fibration, so to compute ψ((Ωf)(q))
780
+ we compute what happens to the base point of A. It gets sent to refl, then q, and then φ(q). This
781
+ shows that the triangle commutes.
782
+ It follows that Ωf is an equivalence. Since B and BAut1(A) are connected, f is an equivalence as
783
+ well. So f and the commutativity of the triangle provide a path from (B, φ) to (BAut1(A), ψ) in the
784
+ type of deloopings.
785
+
786
+ We conclude this section by showing how to deloop maps A →∗ A.
787
+ Definition 4.7. Given f : A →∗ A, define Bf : BAut1(A) →∗ BAut1(A) by
788
+ Bf(Xp) :≡ (X → A)(f ∗◦˜p−1),
789
+ where f ∗ :≡ f ◦id∗, and we have used that f ∗ ◦ ˜p−1 is well-defined as an element of the set-truncation.
790
+ To give a banding of (X → A)(f ∗◦˜p−1) we may induct on p and use Proposition 3.12.
791
+ The same
792
+ argument shows that Bf is a pointed map.
793
+ Note that f(a∗) = f(a)∗ for any a : A, since f is an H-space map by Proposition 2.31, so there’s
794
+ no choice involved in this definition.
795
+ Let g : BAut1(A) →∗ BAut1(A). Given a loop q : pt = pt, the loop (Ωg)(q) is the composite
796
+ pt = g(pt) = g(pt) = pt,
797
+ which uses pointedness of g and apg(q). We will identify (pt = pt) with A and then write
798
+ Ω′g : A ≃∗ (pt = pt)
799
+ Ωg
800
+ −−→∗ (pt = pt) ≃∗ A.
801
+ Proposition 4.8. We have that Ω′Bf = f for any f : A →∗ A.
802
+ Proof. The following diagram describes how Bf acts on a loop p : pt =BAut1(A) pt:
803
+ Arefl
804
+ (A → A)(f ∗)
805
+ A
806
+ Arefl
807
+ (A → A)(f ∗)
808
+ A
809
+ p
810
+ g�→g◦˜p−1
811
+
812
+
813
+
814
+ CENTRAL H-SPACES AND BANDED TYPES
815
+ 15
816
+ Since ˜p is in the component of the identity, we have ˜p(a) = x · a for all a : A, where x = ˜p(pt). So
817
+ ˜p−1(a) = x\a. Then the composite A ≃ A on the right is seen to be
818
+ a �→ evf ∗
819
+ ��
820
+ a · f ∗(−)
821
+
822
+ ◦ ˜p−1
823
+
824
+ = evf ∗
825
+
826
+ a · f ∗�
827
+ x\(−)
828
+ ��
829
+ = a · f(x∗∗) = a · f(x).
830
+ The domain Arefl = Arefl is identified with A by sending a path p to ˜p(pt), which in this case is the x
831
+ above. The codomain (A ≃ A)(id) is identified with A using evid, which sends the displayed function
832
+ to pt · f(x), which equals f(x). So we have that ΩBf = f. By Lemma 2.6, they are equal as pointed
833
+ maps.
834
+
835
+ Proposition 4.9. We have that BΩ′g = g for any g : BAut1(A) →∗ BAut1(A).
836
+ Proof. Given an A-band Xp, we need to show that g(Xp) = (X → A)((Ω′g)∗◦˜p−1). First we construct
837
+ a map of the underlying types from left to right. For y : g(Xp), define the map
838
+ Gy : X
839
+
840
+ −→ (pt = Xp) ≃ (Xp = pt)
841
+ apg
842
+ −−→ (g(Xp) = g(pt)) ≃ (pt = pt) → A,
843
+ where the second map is path inversion, and the fourth map uses the trivialization of g(Xp) associated
844
+ to y and pointedness of g. The identification pt = g(pt) corresponds to a unique point y0 : g(pt).
845
+ To check that Gy lies in the right component, we may induct on p and assume y ≡ y0 since g(pt) is
846
+ connected. We then get the map
847
+ Gy0 : A
848
+ id∗
849
+ −−→ A ≃ (pt = pt)
850
+ Ωg
851
+ −−→ (pt = pt) → A,
852
+ since path inversion on (pt = pt) corresponds to inversion on A, and y0 corresponds to the pointing
853
+ of g. This map is precisely the definition of (Ω′g)∗, so G lands in the desired component.
854
+ To check that G defines an equivalence of bands we may again induct on p. Write �y0 : pt ≃ g(pt)
855
+ for the equivalence associated to the point y0 : g(pt), which is a lift of the (equivalence associated to
856
+ the) banding of g(pt). It then suffices to check that the diagram
857
+ g(pt)
858
+ (A → A)((Ω′g)∗)
859
+ pt
860
+
861
+ y0
862
+ −1
863
+ G
864
+ ev(Ω′g)∗
865
+ commutes. Let y : g(pt), which we identify with a trivialization y′ : pt = g(pt). Chasing through the
866
+ definition of G and using that apg(refl) = refl, we see that
867
+ Gy(pt) = ev(y′ � y0) = �y0
868
+ −1(y′(pt)) ≡ �y0
869
+ −1(y),
870
+ where ev : (pt = pt) → A is the last map in the definition of Gy, which transports pt along a path.
871
+ Thus we see that the triangle above commutes, whence G is an equivalence of bands, as required.
872
+
873
+ Theorem 4.10. We have inverse equivalences
874
+ Ω′ : (BAut1(A) →∗ BAut1(A)) ≃ (A →∗ A) : B.
875
+ In particular, the type BAut1(A) →∗ BAut1(A) is a set.
876
+ Proof. Combine Propositions 4.8 and 4.9.
877
+
878
+ 4.2. Tensoring bands. In this section, we will construct an H-space structure on BAut1(A), where
879
+ we continue to assume that A is a central type. This H-space structure is interesting in its own right,
880
+ and also implies that BAut1(A) is itself central. It that follows that A is an infinite loop space.
881
+ This elementary lemma will come up frequently.
882
+ Lemma 4.11. Let P : BAut1(A) → U be a set-valued type family. Then �
883
+ Xp P(Xp) is equivalent to
884
+ P(pt).
885
+
886
+ 16
887
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
888
+ Proof. Since each P(Xp) is a set, �
889
+ Xp P(Xp) is equivalent to �
890
+ X:U
891
+
892
+ p:A=X P(X|p|0). By path in-
893
+ duction, this is equivalent to P(A|refl|0), i.e., P(pt).
894
+
895
+ A consequence of the following result is that any pointed A-band is trivial.
896
+ Proposition 4.12. Let Xp be an A-band. Then there is an equivalence (pt =BAut1(A) Xp) → X.
897
+ Proof. By Lemma 4.3, there is an equivalence (pt =BAut1(A) Xp) ≃ (A ≃ X)(˜p). We will show that
898
+ evp : (A ≃ X)(˜p) → X is an equivalence. By Lemma 4.11, it’s enough to prove this when Xp ≡ pt,
899
+ and this holds because A is central.
900
+
901
+ We now show that path types between A-bands are themselves banded. This underlies the main
902
+ results of this section.
903
+ Proposition 4.13. Let Xp and Yq be A-bands. The type Xp =BAut1(A) Yq is banded by A.
904
+ Proof. We need to construct a band ∥A = (Xp = Yq)∥0. Since the goal is a set, we may induct on p
905
+ and q, thus reducing the goal to ∥A = (pt =BAut1(A) pt)∥0. Using that (pt =BAut1(A) pt) ≃ (A ≃ A)(id)
906
+ and that A is central, we may give the set truncation of the inverse of the evaluation fibration at
907
+ idA.
908
+
909
+ The following is an immediate corollary of Proposition 4.12.
910
+ Corollary 4.14. For any A-band Xp, the A-band (Xp = Xp) is trivial.
911
+
912
+ We next define a tensor product of banded types, using the notion of duals of bands.
913
+ Write
914
+ refl∗ : A = A for the self-identification of A associated to the inversion map id∗ (Definition 3.14) via
915
+ univalence.
916
+ Definition 4.15. Let Xp be an A-band. The band p∗ :≡ |refl∗| � p is the dual of p, and the A-band
917
+ X∗
918
+ p :≡ Xp∗ is the dual of Xp.
919
+ Since id∗ is an involution, it follows that taking duals defines an involution on BAut1(A), meaning
920
+ that X∗∗
921
+ p
922
+ = Xp.
923
+ Lemma 4.16. We have pt = pt∗ in BAut1(A).
924
+ Proof. The underlying type of pt∗ is A, which has a base point, so this follows from Proposition 4.12.
925
+
926
+ We now show how to tensor types banded by A.
927
+ Definition 4.17. For Xp, Yq : BAut1(A), define Xp ⊗ Yq :≡ (X∗
928
+ p = Yq), with the banding from
929
+ Proposition 4.13.
930
+ It follows from Lemma 4.3 that the type Xp ⊗Yq is equivalent to (X = Y )(p∗ � q). Since taking duals
931
+ is an involution, we also have equivalences Xp ⊗ Yq ≡ (X∗
932
+ p = Yq) ≃ (Xp = Y ∗
933
+ q ) ≃ (X = Y )(p � q∗).
934
+ Moreover, from Corollary 4.14, we see that X∗
935
+ p ⊗ Xp = pt.
936
+ Tensoring defines a binary operation on BAut1(A), and we now show that this operation is sym-
937
+ metric.
938
+ Proposition 4.18. For any Xp, Yq : BAut1(A), there is a path σ(Xp,Yq) : Xp ⊗ Yq =BAut1(A) Yq ⊗ Xp
939
+ such that σpt,pt = 1.
940
+ Proof. By univalence and the characterization of paths between bands, we begin by giving an equiv-
941
+ alence between the underlying types. The equivalence will be path-inversion, as a map
942
+ (X = Y )(p � q∗) −→ (Y = X)(q � p∗).
943
+ To see that this is valid it suffices to show that the inversion of p � q∗ is q � p∗. We have:
944
+ p � q∗ ≡ p � refl∗ �q = refl∗ �q � p = q � refl∗ � p = q � refl∗ �p ≡ q � p∗,
945
+
946
+ CENTRAL H-SPACES AND BANDED TYPES
947
+ 17
948
+ where we have used associativity of path composition, and that refl∗ = refl∗ by Proposition 3.15.
949
+ To prove the transport condition, we may path induct on both p and q which then yields the
950
+ following triangle:
951
+ (A = A)(refl∗)
952
+ (A = A)(refl∗)
953
+ A .
954
+ evrefl∗
955
+ p�→p
956
+ evrefl∗
957
+ Here we are writing evrefl∗ for the composite (A = A)(refl∗) ≃ (A ≃ A)(id∗)
958
+ evid∗
959
+ −−−→ A. The horizontal
960
+ map is given by path-inversion, which is homotopic to the identity by Proposition 3.15, hence the
961
+ triangle commutes.
962
+ Paths between paths between banded types correspond to homotopies between the underlying
963
+ equivalences. Thus σpt,pt = 1 since path-inversion on (A = A)(refl∗) is homotopic to the identity.
964
+
965
+ We now use Lemma 2.4 to make BAut1(A) into an H-space.
966
+ Theorem 4.19. The binary operation ⊗ makes BAut1(A) into an abelian H-space.
967
+ Proof. We start by showing the left unit law. Since pt∗ = pt, we instead consider the goal (pt = Xp) =
968
+ Xp. An equivalence between the underlying types is given by Proposition 4.12, which after inducting
969
+ on p clearly respects the bands. Using Proposition 4.18 and Lemma 2.4, we obtain the desired H-space
970
+ structure.
971
+
972
+ Corollary 4.20. For a central type A, the type BAut1(A) is again central. Therefore, A is an infinite
973
+ loop space, in a unique way. Moreover, every pointed map A →∗ A is infinitely deloopable, in a unique
974
+ way.
975
+ Proof. That BAut1(A) is central follows from condition (2) of Proposition 3.6, using Theorems 4.10
976
+ and 4.19 as inputs.
977
+ That A is a infinite loop space then follows from Proposition 4.4: writing
978
+ BAut0
979
+ 1(A) :≡ A and BAutn+1
980
+ 1
981
+ (A) :≡ BAut1(BAutn
982
+ 1(A)), we see that BAutn
983
+ 1(A) is an n-fold delooping
984
+ of A. The uniqueness follows from Theorem 4.6. That every pointed self-map is infinitely deloopable
985
+ in a unique way follows by iterating Theorem 4.10.
986
+
987
+ Note that BAut1(A) is essentially small (Remark 4.2), so these deloopings can be taken to be in
988
+ the same universe as A.
989
+ From Theorem 4.19 we deduce another characterization of central types:
990
+ Proposition 4.21. A pointed, connected type A is central if and only if ΣX:BAut1(A) X is contractible.
991
+ Proof. If A is central, then by the left unit law of Theorem 4.19, we have
992
+ ΣX:BAut1(A) X ≃ ΣX:BAut1(A) (pt∗ =BAut1(A) X) ≃ 1.
993
+ Conversely, if ΣX:BAut1(A) X is contractible, then so is its loop space. But the loop space is equivalent
994
+ to Σf:A→∗A ∥f = id∥, i.e., the fibre of evid over the base point. Thus evid is an equivalence, since A
995
+ is connected.
996
+
997
+ 4.3. Bands and torsors. Let A be a central type. We define a notion of A-torsor which turns out
998
+ to be equivalent to the notion of A-band from the previous section. Under our centrality assumption,
999
+ it follows that the resulting type of A-torsors is a delooping of A. An equivalent type of A-torsors has
1000
+ been independently studied by David W¨arn, who has also shown that it gives a delooping of A under
1001
+ the weaker hypothesis that A has a unique H-space structure.
1002
+ Definition 4.22. An action of A on a type X is a map α : A × X → X such that α(pt, x) = x for
1003
+ all x : X. If X has an A-action, we say that it is an A-torsor if it is merely inhabited and α(−, x) is
1004
+ an equivalence for every x : X. The type of A-torsor structures on a type X is
1005
+ TA(X) :≡
1006
+
1007
+ α:A×X→X
1008
+ (α(pt, −) = idX) × ∥X∥−1 ×
1009
+
1010
+ x:X
1011
+ IsEquiv α(−, x),
1012
+
1013
+ 18
1014
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
1015
+ and the type of A-torsors is �
1016
+ X:U TA(X).
1017
+ Since A is connected, an A-action on X is the same as a pointed map A →∗ (X ≃ X)(id). Normally
1018
+ one would require at a minimum that this map sends multiplication in A to composition. We explain
1019
+ in Remark 4.28 why our definition suffices.
1020
+ The condition that α(−, x) is an equivalence for all x is equivalent to requiring that for every
1021
+ x0, x1 : X, there exists a unique a : A with α(a, x0) = x1.
1022
+ It is also equivalent to saying that
1023
+ (α, pr2) : A × X → X × X is an equivalence.
1024
+ For any type X, write ev≃ : (A ≃ X) → X for the evaluation fibration which sends an equivalence
1025
+ e to e(pt). For a map f, write Sect(f) for the type of (unpointed) sections of f.
1026
+ Lemma 4.23. For any X, we have an equivalence
1027
+ TA(X) ≃ ∥X∥−1 × Sect(ev≃).
1028
+ Proof. This is simply a reshuffling of the data. The map from left to right sends a torsor structure
1029
+ with action α : A × X → X to the map X → (A → X) sending x to α(−, x). By assumption, this
1030
+ lands in the type of equivalences, and the condition α(pt, −) = idX says that it is a section. We leave
1031
+ the remaining details to the reader.
1032
+
1033
+ Lemma 4.24. Let X be an A-torsor. Then X is connected.
1034
+ Proof. Since X is merely inhabited and our goal is a proposition, we may assume that we have x0 : X.
1035
+ Then we have an equivalence α(−, x0) : A → X. A is connected by Proposition 3.3, so it follows that
1036
+ X is.
1037
+
1038
+ Proposition 4.25. Let X be an A-torsor. Then X is banded by A.
1039
+ Proof. Associated to the torsor structure on X is a section X → (A ≃ X) of ev≃.
1040
+ Since X is
1041
+ 0-connected, it lands in a component of A ≃ X. By univalence, this determines a banding of X.
1042
+
1043
+ Theorem 4.26. Let X be a type. There is an equivalence TA(X) ≃ ∥A = X∥0. Therefore, there is
1044
+ an equivalence between the type of A-torsors and BAut1(A).
1045
+ Proof. Proposition 4.25 gives a map f. We check that the fibres are contractible. Let p : ∥A = X∥0 be
1046
+ a banding of X. An A-torsor structure t on X with f(t) = p consists of a section s of ev≃ that lands in
1047
+ the component (A ≃ X)(˜p), where ˜p denotes the equivalence associated to p. But by Proposition 4.12,
1048
+ the evaluation fibration (A ≃ X)(˜p) → X is an equivalence, so it has a unique section.
1049
+
1050
+ Remark 4.27. It follows that TA(X) is a set. One can also show this using Corollary 4.14 and Propo-
1051
+ sition 3.6.
1052
+ Remark 4.28. Let X be an A-torsor, or equivalently, an A-band. By Corollary 4.14, we have an
1053
+ equivalence e : A ≃ (X ≃ X)(id). Since A has a unique H-space structure, this equivalence is an
1054
+ equivalence of H-spaces, where the codomain has the H-space structure coming from composition.
1055
+ Since A is connected, the A-action on X gives a map α′ : A →∗ (X ≃ X)(id). (In fact, α′ = e, but
1056
+ we won’t use this fact.) Using the equivalence e, it follows from Theorem 4.10 that any map with the
1057
+ same type as α′ is deloopable in a unique way. That is, it has the structure of a group homomorphism
1058
+ in the sense of higher groups (see [BvDR18]). This explains why our naive definition of an A-action
1059
+ is correct in this situation.
1060
+ 5. Examples and non-examples
1061
+ We show that the Eilenberg–Mac Lane spaces K(G, n) are central whenever G is abelian and n > 0.
1062
+ In addition, we produce examples of products of Eilenberg–Mac Lane spaces which are central and
1063
+ examples which are not central. At present, we do not know whether there exist central types which are
1064
+ not products of Eilenberg–Mac Lane spaces. Along the way, we use our results to give a self-contained,
1065
+ independent construction of Eilenberg–Mac Lane spaces. To this end, we begin by discussing the base
1066
+ case K(G, 1).
1067
+
1068
+ CENTRAL H-SPACES AND BANDED TYPES
1069
+ 19
1070
+ 5.1. The H-space of G-torsors. Given a group G, we construct the type TG of G-torsors and show
1071
+ that it is a K(G, 1). Specifically, a pointed type X is a K(G, 1) if it is connected and comes equipped
1072
+ with a pointed equivalence ΩX ≃∗ G which sends composition of loops to multiplication in G. (We
1073
+ always point ΩX at refl.)
1074
+ When G is abelian, we can tensor G-torsors to obtain an H-space structure on TG which is analogous
1075
+ to the tensor product of bands of Theorem 4.19. These constructions are all classical and we therefore
1076
+ omit some details.
1077
+ Definition 5.1. Let G be a group. A G-set is a set X with a group homomorphism α : G → Aut(X).
1078
+ If the set X is merely inhabited and the map α(−, x) : G → X is an equivalence for every x : X, then
1079
+ (X, α) is a G-torsor. We write TG for the type of G-torsors. Given two G-sets X and Y , we write
1080
+ X →G Y for the set of G-equivariant maps from X to Y , defined in the usual way.
1081
+ We may write g · x instead of α(g, x) when no confusion can arise. The following is straightforward
1082
+ to check:
1083
+ Lemma 5.2. Let X and Y be G-torsors. There is a natural equivalence (X =T G Y ) ≃ (X →G Y ).
1084
+ In particular, a G-equivariant map between G-torsors is automatically an equivalence.
1085
+
1086
+ Any group G acts on itself by left translation, making G into a G-torsor which constitutes the base
1087
+ point pt of both TG and the type of G-sets. Since a G-equivariant map pt →G X is determined by
1088
+ where it sends 1 : G, the map (pt →G X) → X that evaluates at 1 is an equivalence. It is clear that
1089
+ the type TG is a 1-type, which implies that its loop space is a group.
1090
+ Proposition 5.3. We have a group isomorphism ΩTG ≃ G.
1091
+ We only sketch a proof since this is a classical result.
1092
+ Proof. Since paths between G-torsors correspond to G-equivariant maps, we have equivalences of sets
1093
+ (pt =T G pt) ≃ (pt →G pt) ≃ G,
1094
+ where the second equivalence is given by evaluation at 1. The first equivalence sends path compo-
1095
+ sition to composition of maps, which reverses the order—i.e., it’s an anti-isomorphism. The second
1096
+ equivalence evaluates a map at 1 : G. Thus, for φ, ψ : pt →G pt we have
1097
+ φ(ψ(1)) = φ(ψ(1) · 1) = ψ(1) · φ(1),
1098
+ where · denotes the multiplication in G.
1099
+ In other words, evaluation at 1 is an anti-isomorphism,
1100
+ meaning the composite (pt =T G pt) ≃ G is an isomorphism of groups.
1101
+
1102
+ The following proposition says that the G-torsors are precisely those G-sets which lie in the com-
1103
+ ponent of the base point.
1104
+ Proposition 5.4. A G-set (X, α) is a G-torsor if and only if there merely exists a G-equivariant
1105
+ equivalence from pt to X.
1106
+ Proof. Suppose X is a G-torsor. To produce a mere G-equivariant equivalence pt ≃G X we may
1107
+ assume we have some x : X, since X is merely inhabited. Then (−) · x : G → X yields an equivalence
1108
+ which is clearly G-equivariant, as required.
1109
+ Conversely, assume that there merely exists a G-equivariant equivalence from pt to X. Since being
1110
+ a G-torsor is a proposition, we may assume we have an actual G-equivariant equivalence. But then
1111
+ we are done since pt is a G-torsor.
1112
+
1113
+ It follows that TG is connected. Thus by Proposition 5.3 we deduce:
1114
+ Corollary 5.5. The type TG is a K(G, 1).
1115
+ For the remainder of this section, let G be an abelian group.
1116
+ Proposition 5.6. For any two G-torsors S and T, the path type S =T G T is again a G-torsor.
1117
+
1118
+ 20
1119
+ BUCHHOLTZ, CHRISTENSEN, FLATEN, AND RIJKE
1120
+ Proof. First we make S =T G T into a G-set. This path type is equivalent to the type S →G T. Using
1121
+ that G is abelian, it’s easy to check that the map
1122
+ (g, φ) �−→
1123
+
1124
+ s �→ g · φ(s)
1125
+
1126
+ : G × (S →G T) −→ (S →G T)
1127
+ is well-defined and makes S →G T into a G-set.
1128
+ To check that the above yields a G-torsor, we may assume that S ≡ pt ≡ T, by the previous lemma.
1129
+ One can check that Proposition 5.3 gives an equivalence of G-sets, where pt →G pt is equipped with
1130
+ the G-action just described. Thus pt →G pt is a G-torsor, as required.
1131
+
1132
+ In order to describe the tensor product of G-torsors, we first need to define duals.
1133
+ Definition 5.7. Let (X, α) be a G-torsor. The dual X∗ of X is the G-torsor X with action
1134
+ α∗(g, x) :≡ α(g−1, x).
1135
+ The tensor product of G-torsors is now defined as X ⊗ Y :≡ (X∗ =T G Y ).
1136
+ Proposition 5.8. The tensor product of G-torsors makes TG into an H-space.
1137
+ Proof. We verify the hypotheses of Lemma 2.4. Thus our first goal is to construct a symmetry
1138
+ σX,Y : (X∗ =T G Y ) =T G (Y ∗ =T G X).
1139
+ After identifying paths of G-torsors with G-equivariant equivalences, we may consider the map which
1140
+ inverts such an equivalence. A short calculation shows that if φ : X∗ →G Y is G-equivariant, then
1141
+ φ−1 : Y ∗ →G X is again G-equivariant. We need to check that the map sending φ to φ−1 is itself
1142
+ G-equivariant, so let φ : X∗ →G Y and let g : G. Since the inverse of g · (−) is g−1 · (−), we have:
1143
+ (g · φ)−1 = φ−1(g−1 · (−)) = g · φ−1(−),
1144
+ using that φ−1 : Y ∗ →G X is G-equivariant. Thus inversion is G-equivariant, yielding the required
1145
+ symmetry σ.
1146
+ Now we argue that σpt,pt = refl, or, equivalently, that maps pt∗ →G pt are their own inverses. Such
1147
+ a map is uniquely determined by where it sends 1 : G, so it suffices to show that φ(φ(1)) = 1 for every
1148
+ φ : pt∗ →G pt. Fortunately, we have
1149
+ φ(φ(1)) = φ(φ(1) · 1) = φ(1)−1 · φ(1) = 1.
1150
+ Lastly, it is straightforward to check that the map (pt∗ →G X) → X which evaluates at 1 : G is
1151
+ G-equivariant, for any G-torsor X. This yields the left unit law for the tensor product ⊗. As such we
1152
+ have fulfilled the hypotheses of Lemma 2.4, giving us the desired H-space structure.
1153
+
1154
+ Using Proposition 3.6, one can check that TG is a central H-space. (See Proposition 5.9.)
1155
+ 5.2. Eilenberg–Mac Lane spaces. We now use our results to give a new construction of Eilenberg–
1156
+ Mac Lane spaces. For an abelian group G, recall that a pointed type X is a K(G, 1) if it is connected
1157
+ and there is a pointed equivalence ΩX ≃∗ G which sends composition of paths to multiplication in
1158
+ G. For n > 1, a pointed type X is a K(G, n + 1) if it is connected and ΩX is a K(G, n). It follows
1159
+ that such an X is an n-connected (n + 1)-type with Ωn+1X ≃∗ G as groups.
1160
+ In the previous section we saw that the type TG of G-torsors is a K(G, 1) and is central whenever
1161
+ G is abelian. The following proposition may be seen as a higher analog of this fact.
1162
+ Proposition 5.9. Let G be an abelian group and let n > 0. If a type A is a K(G, n) and an H-space,
1163
+ then A is central and BAut1(A) is a K(G, n + 1) and an H-space.
1164
+ The fact that BAut1(A) is a K(G, n + 1) also follows from [Shu], using the fact that BAut1(A) is
1165
+ the 1-connected cover of BAut(A).
1166
+ Proof. Suppose that A is a K(G, n) and an H-space.
1167
+ Then A →∗ ΩA is contractible, since it is
1168
+ equivalent to ∥A∥n−1 →∗ ΩA, and ∥A∥n−1 is contractible.
1169
+ So Proposition 3.6 implies that A is
1170
+ central.
1171
+ By Proposition 4.4, Ω BAut1(A) ≃ A, so BAut1(A) is a K(G, n + 1).
1172
+ By Theorem 4.19,
1173
+ BAut1(A) is also an H-space.
1174
+
1175
+
1176
+ REFERENCES
1177
+ 21
1178
+ We can use the previous proposition to define K(G, n) for all n > 0 by induction. For the base case
1179
+ n ≡ 1 we let K(G, 1) :≡ TG, the type of G-torsors from the previous section. When G is abelian, we
1180
+ saw that TG is an H-space, which lets us apply the previous proposition. By induction, we obtain a
1181
+ K(G, n) for all n. Note that this construction produces a K(G, n) which lives n − 1 universes above
1182
+ the given K(G, 1), but that it is essentially small by the join construction [Rij17].
1183
+ 5.3. Products of Eilenberg–Mac Lane spaces. Here is our first example of a central type that is
1184
+ not an Eilenberg–Mac Lane space.
1185
+ Example 5.10. Let K = K(Z/2, 1) = RP ∞ and L = K(Z, 2) = CP ∞, and consider A = K × L.
1186
+ This is a connected H-space, and
1187
+
1188
+ K × L →∗ Ω(K × L)
1189
+
1190
+
1191
+
1192
+ K →∗ Ω(K × L)
1193
+
1194
+ since K = ∥K × L∥1
1195
+
1196
+
1197
+ K →∗ ΩL
1198
+
1199
+ since K is connected
1200
+
1201
+
1202
+ Z/2 →Ab Z)
1203
+ by [BvDR18, Theorem 5.1]
1204
+ ≃ 1.
1205
+ So it follows from Proposition 3.6(4) that A is central.
1206
+ On the other hand, not every product of Eilenberg–Mac Lane spaces is central.
1207
+ Example 5.11. Let K = K(Z/2, 1) = RP ∞ and L′ = K(Z/2, 2). A calculation like the above shows
1208
+ that K × L′ →∗ Ω(K × L′) is not contractible, so K × L′ is not central.
1209
+ As another example, [Cur68, Proposition Ia] shows that K(Z, 1) × K(Z, 2)) (i.e., S1 × CP ∞) has
1210
+ infinitely many distinct H-space structures classically. So it is not central, by Proposition 3.3.
1211
+ Clearly both of these examples can be generalized to other groups and shifted to higher dimensions.
1212
+ By Proposition 3.3, centrality of a type implies that it has a unique H-space structure.
1213
+ The
1214
+ converse fails, as we now demonstrate. We are grateful to David W¨arn for bringing our attention to
1215
+ this example.
1216
+ Example 5.12. The type A :≡ K(Z, 2) × K(Z, 3) is not central, by a computation similar to the one
1217
+ in the previous example. However, we note that it admits a unique H-space structure. Since A is a
1218
+ loop space it admits an H-space structure, and the type of H-space structures is given by A ∧ A →∗ A
1219
+ according to Theorem 2.27. Since A is 1-connected, by [CS20, Corollary 2.32] the smash product
1220
+ A ∧ A is 3-connected. It follows that A ∧ A ��∗ A is contractible, since A is 3-truncated. In other
1221
+ words, the space of H-space structures on A is contractible.
1222
+ References
1223
+ [AC63]
1224
+ M. Arkowitz and C. R. Curjel. “On the number of multiplications of an H–space”. In:
1225
+ Topology 2 (1963), pp. 205–207.
1226
+ [BR18]
1227
+ Ulrik Buchholtz and Egbert Rijke. “The Cayley-Dickson construction in homotopy type
1228
+ theory”. In: High. Struct. 2.1 (2018), pp. 30–41. doi: https://doi.org/10.21136/HS.
1229
+ 2018.02.
1230
+ [Bru16]
1231
+ Guillaume Brunerie. “On the homotopy groups of spheres in homotopy type theory”.
1232
+ PhD thesis. Laboratoire J.A. Dieudonn´e, 2016. arXiv: 1606.05916.
1233
+ [Buc19]
1234
+ Ulrik Buchholtz. Non-abelian cohomology (Groups, Torsors, Gerbes, Bands & all that).
1235
+ Invited talk at the workshop Geometry in Modal Homotopy Type Theory, Carnegie Mellon
1236
+ University. 2019. url: https://youtu.be/eB6HwGLASJI.
1237
+ [BvDR18]
1238
+ U. Buchholtz, F. van Doorn, and E. Rijke. “Higher Groups in Homotopy Type Theory”.
1239
+ In: Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science.
1240
+ LICS ’18. Oxford, United Kingdom: ACM, 2018, pp. 205–214. isbn: 978-1-4503-5583-4.
1241
+ doi: 10.1145/3209108.3209150.
1242
+
1243
+ 22
1244
+ REFERENCES
1245
+ [Cav21]
1246
+ Evan Cavallo. Pointed functions into a homogeneous type are equal as soon as they are
1247
+ equal as unpointed functions. Agda formalization, part of the cubical library. 2021. url:
1248
+ https://agda.github.io/cubical/Cubical.Foundations.Pointed.Homogeneous.
1249
+ html#1616.
1250
+ [Cop59]
1251
+ A. H. Copeland. “Binary operations on sets of mapping classes.” In: Michigan Mathemat-
1252
+ ical Journal 6 (1959), pp. 7–23.
1253
+ [CS20]
1254
+ J. Daniel Christensen and Luis Scoccola. The Hurewicz theorem in homotopy type theory.
1255
+ To appear in Algebraic & Geometric Topology. 2020. arXiv: 2007.05833v2.
1256
+ [Cur68]
1257
+ C. R. Curjel. “On the H-space structures of finite complexes”. In: Comment. Math. Helv.
1258
+ 43 (1968), pp. 1–17. doi: 10.1007/BF02564376.
1259
+ [Han74]
1260
+ Vagn Lundsgaard Hansen. “The homotopy problem for the components in the space of
1261
+ maps on the n-sphere”. In: Q. J. Math. 25.1 (Jan. 1974), pp. 313–321. eprint: https:
1262
+ //academic.oup.com/qjmath/article-pdf/25/1/313/4366416/25-1-313.pdf.
1263
+ [Jam55]
1264
+ I. M. James. “Reduced product spaces”. In: Ann. of Math. (2) 62 (1955), pp. 170–197.
1265
+ doi: 10.2307/2007107.
1266
+ [Rij17]
1267
+ E. Rijke. The join construction. 2017. arXiv: 1701.07538.
1268
+ [Sco20]
1269
+ Luis Scoccola. “Nilpotent types and fracture squares in homotopy type theory”. In:
1270
+ Mathematical Structures in Computer Science 30.5 (2020), pp. 511–544. doi: 10.1017/
1271
+ s0960129520000146.
1272
+ [Shu]
1273
+ Mike Shulman. Fibrations with fiber an Eilenberg-MacLane space. Blog post at homotopy-
1274
+ typetheory.org. url: https://homotopytypetheory.org/2014/06/30/fibrations-
1275
+ with-em-fiber/.
1276
+ [Uni13]
1277
+ Univalent Foundations Program. Homotopy Type Theory: Univalent Foundations of Math-
1278
+ ematics. Institute for Advanced Study: http://homotopytypetheory.org/book/, 2013.
1279
+ [vDoo18]
1280
+ Floris van Doorn. “On the Formalization of Higher Inductive Types and Synthetic Ho-
1281
+ motopy Theory”. PhD thesis. Carnegie Mellon University, 2018. arXiv: 1808.10690.
1282
+ [Whi46]
1283
+ George W. Whitehead. “On products in homotopy groups”. In: Annals of Mathematics
1284
+ 47 (1946), pp. 460–475.
1285
+ University of Nottingham, Nottingham, United Kingdom
1286
+ Email address: ulrik.buchholtz@nottingham.ac.uk
1287
+ University of Western Ontario, London, Ontario, Canada
1288
+ Email address: jdc@uwo.ca
1289
+ University of Western Ontario, London, Ontario, Canada
1290
+ Email address: jtaxers@uwo.ca
1291
+ University of Ljubljana, Ljubljana, Slovenia
1292
+ Email address: e.m.rijke@gmail.com
1293
+
9dE0T4oBgHgl3EQfwwE1/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ENE4T4oBgHgl3EQffQ0N/content/tmp_files/2301.05105v1.pdf.txt ADDED
@@ -0,0 +1,598 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
2
+ WWW.INFOSOC.IIS.RU
3
+
4
+ _____________________________
5
+ © Калужский М.Л., 2022.
6
+ Производство и хостинг журнала «Информационное общество» осуществляется Институтом развития
7
+ информационного общества.
8
+ Данная статья распространяется на условиях международной лицензии Creative Commons «Атрибуция —
9
+ Некоммерческое использование — На тех же условиях» Всемирная 4.0 (Creative Commons Attribution – NonCommercial -
10
+ ShareAlike 4.0 International; CC BY-NC-SA 4.0). См. https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.ru
11
+ https://doi.org/10.52605/16059921_2022_06_59
12
+ Цифровая экономика
13
+ ИНСТИТУЦИОНАЛИЗАЦИЯ ЦИФРОВОЙ ТОРГОВЛИ В РОССИЙСКОЙ
14
+ ФЕДЕРАЦИИ: ОБРАТНЫЙ ОТСЧЕТ
15
+ Статья рекомендована к публикации главным редактором Т.В. Ершовой 31.07.2022.
16
+ Калужский Михаил Леонидович
17
+ Кандидат философских наук, доцент
18
+ МОФ «Фонд региональной стратегии развития», исполнительный директор
19
+ Омский государственный технический университет, каф. «Организация и управление наукоемкими
20
+ производствами», доцент
21
+ Омск, Российская Федерация
22
+ frsr@inbox.ru
23
+ Аннотация
24
+ Институционализация цифровой торговли является одним из важнейших направлений формирования
25
+ информационного общества в Российской Федерации. Исследования отражают наметившееся отставание
26
+ российского индекса готовности экономики поддерживать онлайн-покупки. Автор анализирует причины
27
+ отставания в контексте институциональных особенностей развития цифровой торговли. В качестве
28
+ основного препятствия, снижающего экономическую эффективность и конкурентоспособность цифровой
29
+ торговли, выделяется недостаточное внимание государства формированию инновационных институций
30
+ цифрового рынка.
31
+ Ключевые слова
32
+ сетевая экономика; цифровая торговля; цифровой рынок; электронная коммерция; институциональная
33
+ политика; контрактное производство; сетевое предпринимательство; маркетплейсы; логистический
34
+ провайдинг
35
+ Введение
36
+ Цифровизация не просто определяет ключевое направление развития российской экономики, но
37
+ служит источником институционального роста цифровой торговли. Указом Президента РФ № 203
38
+ от 09.05.2017 г. определены национальные интересы, затрагивающие сферу цифровой торговли,
39
+ среди которых следует выделить:
40
+ 1) формирование виртуальных рынков и обеспечение лидерства на них за счет развития
41
+ российской экосистемы цифровой экономики;
42
+ 2) обеспечение недискриминационного доступа к товарам и услугам российских
43
+ поставщиков;
44
+ 3) поддержка отраслей, использующих преимущества информационных технологий;
45
+ 4) увеличение экспорта за рубеж несырьевых товаров и услуг;
46
+ 5) создание платежной и логистической инфраструктуры интернет-торговли.
47
+ Перед Правительством РФ поставлена задача формирования технологической основы
48
+ цифровой экономики, в том числе через повышение доступности электронных форм коммерческих
49
+ отношений предприятиям малого и среднего бизнеса [1]. Для ее решения приняты и реализуются
50
+ «Стратегия развития информационного общества в Российской Федерации на 2017-2030 годы»,
51
+ национальная программа «Цифровая экономика Российской Федерации» и федеральные проекты
52
+ «Информационная инфраструктура», «Цифровые технологии», «Цифровые услуги и сервисы
53
+ онлайн» и др.
54
+
55
+ KyPHAA
56
+ HOOPMALOHHOE
57
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
58
+ WWW.INFOSOC.IIS.RU
59
+ 60
60
+
61
+ 1 Российская цифровая торговля в мировых рейтингах
62
+ Рейтинговые оценки цифровой торговли в России свидетельствуют о том, что пока рано говорить
63
+ о значительных успехах. Согласно аналитическому отчету «Интернет-торговля в России: 2021»
64
+ компании Data Insight институциональное и инфраструктурное развитие цифровой торговли в
65
+ Россия пока далеко от совершенства (см. табл. 1) [2, с. 26].
66
+ Таблица 1. Рейтинг Российской Федерации в мировой системе цифровой торговли
67
+ Рейтинг
68
+ Место
69
+ Best Countries For Investment In E-commerce And Digital Sector (Ceoworld)
70
+ – индекс привлекательности страны для инвестирования в электронную
71
+ коммерцию и цифровой сектор
72
+ 15
73
+ The Inclusive Internet Index
74
+ – индекс доступности цифровой инфраструктуры, цен, локального контента,
75
+ вовлеченности пользователей и культурных факторов
76
+ 25
77
+ The Ease of Doing Business Index
78
+ – индекс благоприятности условий предпринимательской деятельности
79
+ 28
80
+ UNCTAD B2C E-commerce Index Ranking (UNCTAD)
81
+ – индекс готовности экономики поддерживать онлайн-покупки
82
+ 41
83
+
84
+ В целом приведенный рейтинг довольно наглядно отражает сложившееся положение в
85
+ цифровой торговле. Индекс Ceoworld показывает лучший результат за счет доминирования на
86
+ рынке крупных торговых сетей, интернет-магазинов и маркетплейсов. Inclusive Internet Index
87
+ демонстрирует вовлеченность пользователей в среду цифровой торговли. Ease of Doing Business Index
88
+ отражает отставание предложения отечественных продавцов от покупательского спроса.
89
+ Хуже всех выглядит индекс UNCTAD (ООН), согласно которому в 2020 г. готовность
90
+ экономических институтов поддерживать онлайн-покупки в России находилась на 41 месте из 152
91
+ стран мира [3, с. 14]. Именно этот индекс отражает недостаточную эффективность
92
+ институциональной политики государства в сфере цифровой торговли.
93
+ 2 Институциональные процессы в цифровой торговле
94
+ Цифровая торговля являет собой типичный пример технологической инновации, выступающей
95
+ следствием очередного институционального цикла [4, с. 25]. Институциональный цикл проходит в
96
+ своем развитии те же этапы, что и любой жизненный цикл в экономике, менеджменте или
97
+ маркетинге: выход на рынок, рост, зрелость и упадок. На первых этапах институционального цикла
98
+ доминируют институции (поведенческие шаблоны и традиции), спонтанно возникающие в
99
+ рыночной среде за пределами влияния государства. На последних этапах государство
100
+ регламентирует и ставит под свой контроль экономическую активность. Этот процесс и называется
101
+ институционализацией.
102
+ Развитие институций всегда опережает развитие институтов, поскольку они возникают
103
+ вследствие экономической активности рыночных субъектов, пытающихся выжить под гнетом
104
+ рыночных доминантов и государства. Тогда как институты представляют собой результат
105
+ реактивной деятельности государства на сокращение налогооблагаемой базы вследствие
106
+ вытеснения традиционных субъектов рынка его неинституционализированными игроками.
107
+ Проще говоря, государство озаботилось институционализацией цифровой торговли после того, как
108
+ покупатели стали отворачиваться от традиционных продавцов, а объем отправлений с AliExpress
109
+ превысил объем внутренних отправлений через ФГУП «Почта России».
110
+ Поэтому не следует ожидать синхронного развития институтов и институций цифровой
111
+ торговли. Это противоречило бы самой природе институционального развития. Речь идет о
112
+ естественном несовершенстве институциональной политики государства и ошибках при
113
+ определении ее приоритетов. Внедрение экономических новаций неизбежно связано с высокой
114
+ вероятностью незапланированного поведения рыночных субъектов. Оно нуждается в мониторинге
115
+ ситуации и корректировке.
116
+
117
+ KyPHAA
118
+ HOOPMALOHHOE
119
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
120
+ WWW.INFOSOC.IIS.RU
121
+ 61
122
+
123
+ 3 Институциональная эволюция цифровой торговли
124
+ В основе институций рынка цифровой торговли лежат конкурентные преимущества ее субъектов,
125
+ связанные с экономией транзакционных издержек при совершении сделок [5, с. 8]. Цифровая
126
+ экономика предоставила им неограниченный доступ к аудитории, автоматизацию продаж и
127
+ сетевую инфраструктуру логистики. Причем, на различных стадиях институционального цикла
128
+ цифровой торговли указанные преимущества доминируют в определенной последовательности
129
+ (см. рис. 1).
130
+
131
+ Рис. 1. Конкурентные преимущества на разных стадиях институционального цикла цифровой торговли
132
+ На первой стадии появилась возможность совершать сделки через электронные доски
133
+ объявлений, в социальных сетях и на интернет-форумах. Начался бум интернет-магазинов,
134
+ возникли первые интернет-аукционы, сервисы совместных покупок и дропшиппинг. Структурные
135
+ изменения происходили вне внимания государства, поскольку на потребительском рынке сделки
136
+ совершались втемную, налоги с них – не выплачивались. Государственная статистика фиксировала
137
+ лишь кратное увеличение почтовых отправлений.
138
+ На второй стадии начался взрывной рост электронной коммерции. Увеличение масштабов
139
+ интернет-продаж
140
+ привело
141
+ к
142
+ появлению
143
+ на
144
+ рынке
145
+ провайдеров
146
+ логистических
147
+ услуг,
148
+ сформировавших
149
+ альтернативную
150
+ инфраструктуру
151
+ цифровой
152
+ торговли.
153
+ Сильнее
154
+ всего
155
+ пострадали традиционные оптово-розничные посредники, кредитно-финансовые организации, а
156
+ также обеспечиваемые ими налоговые поступления. Государству пришлось приступить к
157
+ институциональному регулированию цифровой торговли.
158
+ Третья стадия знаменуется завершением структурной перестройки экономического
159
+ ландшафта, доминированием укрупняющихся ключевых игроков рынка и сменой их
160
+ стратегических приоритетов. Если прежде основными конкурентами субъектов цифровой
161
+ торговли выступали традиционные оптово-розничные продавцы, то здесь они терпят
162
+ сокрушительное поражение и вытесняются на задворки рынка. Конкурентная борьба
163
+ разворачивается
164
+ за
165
+ повышение
166
+ эффективности
167
+ и
168
+ оптимизацию
169
+ бизнес-процессов
170
+ при
171
+ возрастающей роли государственного регулирования.
172
+ Что будет происходить на четвертой, завершающей стадии институционального цикла
173
+ цифровой торговли пока трудно предсказать, как и сроки ее начала. Сформируются новые
174
+ институции и их носители, действующие за рамками институционального регулирования
175
+ государства. Их появление станет очередной попыткой участников рынка вырваться за рамки
176
+ удушающего влияния действующих доминантов цифрового рынка. Сейчас до этого еще далеко и
177
+ на повестке дня стоят совсем иные проблемы.
178
+ 4 Смена институционального вектора
179
+ Российская экономика находится в самом начале третьей стадии институционального цикла
180
+ цифровой торговли, где ведущим фактором конкурентоспособности становится сравнительная
181
+ эффективность бизнес-процессов [6, с. 334]. Между участниками рынка обостряется конкуренция,
182
+ сам рынок структурируется, значение государственного регулирования возрастает [7, с. 8]. Кроме
183
+ того, доминирующая роль в вопросах ассортимента, ценообразования и сбыта переходит от
184
+ продавцов к потребителям. Они голосуют рублем, и глобализация предоставляет им для этого все
185
+ возможности.
186
+ Институциональная политика государства осложняется новизной стоящих задач. Основная
187
+ проблема состоит в определении ориентиров и приоритетов институционального строительства.
188
+ Любая ошибка неизбежно приводит к институциональному тупику, оттоку покупателей и
189
+ отставанию в развитии цифрового рынка. В результате он переходит под контроль более успешных
190
+ доступ к
191
+ аудитории
192
+ Стадия
193
+ 1
194
+ автоматизация
195
+ продаж
196
+ Стадия
197
+ 2
198
+ сетевая
199
+ логистика
200
+ Стадия
201
+ 3
202
+
203
+ KyPHAA
204
+ HOOPMALOHHOE
205
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
206
+ WWW.INFOSOC.IIS.RU
207
+ 62
208
+
209
+ зарубежных конкурентов [8, с. 113-114]. С другой стороны, наличие успешных конкурентов
210
+ позволяет изучить их опыт и применить его в своей практике.
211
+ Так, к примеру, на непродовольственном рынке цифровой торговли в России доминируют
212
+ два противоборствующих течения: розничные сети (Эльдорадо, DNS, Leroy Merlin и пр.) и
213
+ маркетплейсы (Wildberries, Lamoda, Ozon, Яндекс-Маркет, Сбермаркет и др.). Их противостояние
214
+ обусловлено разной моделью ведения бизнеса: розничные сети извлекают прибыль из своих
215
+ продаж, тогда как маркетплейсы получают ее от оказания торговых услуг. Розничные сети
216
+ стремятся закрыть и защитить каналы сбыта, а маркетплейсы, наоборот, стремятся максимально
217
+ открыть их.
218
+ Первоначально пальма первенства была у розничных сетей, довольно успешно
219
+ лоббировавших свои интересы через АКИТ (Ассоциация компаний интернет-торговли). Их
220
+ главный
221
+ интерес
222
+ состоял
223
+ в
224
+ создании
225
+ институциональных
226
+ барьеров
227
+ для
228
+ неинституционализированной трансграничной торговли. Образно говоря, сделать так, чтобы
229
+ покупка телефона Xiaomi на Aliexpress обходилась покупателям столь же дорого, как в России.
230
+ Максимальным
231
+ успехом
232
+ лоббирования
233
+ торговых
234
+ сетей
235
+ стало
236
+ снижение
237
+ порога
238
+ беспошлинного ввоза товаров для личного пользования до 200 евро. Институциональный эффект
239
+ такого
240
+ решения
241
+ представляется
242
+ весьма
243
+ спорным,
244
+ поскольку
245
+ поддержку
246
+ получили
247
+ не
248
+ производители отечественной продукции, а сфера торговли. В убытке оказались частные
249
+ потребители, чья покупательская способность снизилась. При этом институциональный цикл
250
+ торговых сетей уже находится в начале четвертой стадии: на рынке цифровой торговли взрывной
251
+ рост продаж показывают не они, а маркетплейсы [9].
252
+ Главный интерес маркетплейсов заключается в росте продаж через привлечение
253
+ максимального числа потребителей, для которых главным фактором является цена товара.
254
+ Маркетплейсы не извлекают прибыль от продажи товаров – она формируется в процессе оказания
255
+ логистических услуг продавцам. В отличие от розничных сетей, низкие цены для них не беда, а
256
+ источник финансирования и институционального роста.
257
+ Со сменой рыночного доминанта на глазах меняется и институциональная политика
258
+ государства. Так, с 28.03.2022 в ЕАЭС порог беспошлинного ввоза товаров физическими лицами
259
+ (временно) возвращен к 1000 евро. Кроме того, лидирующие позиции членов АКИТ перешли к
260
+ крупнейшим маркетплейсам (Wildberries, Ozon, Avito, Lamoda, Яндекс-Маркет), что не могло не
261
+ сказаться на смене приоритетов ее лоббистской деятельности.1 Вектор институционального
262
+ развития
263
+ цифровой
264
+ торговли
265
+ в
266
+ России
267
+ сменился
268
+ от
269
+ попыток
270
+ ограничить
271
+ свободу
272
+ неинституционализованных ее участников к формированию ориентированной на них рыночной
273
+ инфраструктуры.
274
+ 5 Большой разворот
275
+ Роль маркетплейсов на рынке цифровой торговли трудно переоценить. Первоначально
276
+ источником их институционального роста был переток покупателей из традиционной торговли с
277
+ более высоким уровнем трансакционных издержек и розничных цен. Однако к концу 2010-х гг. этот
278
+ ресурс исчерпал себя. Сегодня на потребительском рынке сопротивление им оказывают розничные
279
+ сети, с разной степенью успешности осваивающие цифровую торговлю. Наиболее эффективным
280
+ оружием против них является снижение розничных цен и повышение доступности товаров для
281
+ покупателей.
282
+ 2021 год ознаменовался тектоническими изменениями ценовой политики ведущих
283
+ российских маркетплейсов: они кратно снизили комиссию для продавцов. Снижение комиссии
284
+ маркетплейсов составило у Wildberries до 5-15% (было 38%), у Ozon.ru до 5-8% (было 5-25%), у Яндекс-
285
+ Маркета до 2% (было 3-20%). Правильность принятого решения подтвердилось феноменальным
286
+ приростом продаж (в 2-3 раза) (см. табл. 2) [10].
287
+
288
+
289
+
290
+ 1 Стандарты качества / Бизнесу // АКИТ. URL: https://akit.ru/business/standards (дата обращения 12.06.2022).
291
+
292
+ KyPHAA
293
+ HOOPMALOHHOE
294
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
295
+ WWW.INFOSOC.IIS.RU
296
+ 63
297
+
298
+ Таблица 2. Результаты лидирующих маркетплейсов России за 2021 г.
299
+ Маркетплейс
300
+ онлайн-продажи
301
+ заказы
302
+ средний чек
303
+ млрд. руб.
304
+ прирост
305
+ млн. шт.
306
+ прирост
307
+ руб.
308
+ прирост
309
+ Wildberries
310
+ 805,7
311
+ +95%
312
+ 771,9
313
+ +153%
314
+ 1040
315
+ -23%
316
+ Ozon
317
+ 446,7
318
+ +126%
319
+ 221,2
320
+ +199%
321
+ 2020
322
+ -24%
323
+ Яндекс-Маркет
324
+ 132,6
325
+ +180%
326
+ 29,7
327
+ +151%
328
+ 4110
329
+ +12%
330
+ AliExpress
331
+ 106,1
332
+ +116%
333
+ 48
334
+ +152%
335
+ 2210
336
+ -14%
337
+ Lamoda
338
+ 71,2
339
+ +34%
340
+ 14,1
341
+ +15%
342
+ 5050
343
+ +17%
344
+
345
+ При этом прирост продаж был обратно пропорционален размеру среднего чека: чем
346
+ меньше сумма покупки, тем больше желающих ее совершить. Из общей картины несколько
347
+ выбивается Яндекс-Маркет, но только за счет широкого присутствия на нем розничных сетей,
348
+ наоборот, ориентированных на прирост среднего чека.
349
+ Особняком на этом фоне стоит маркетплейс Lamoda, демонстративно игнорирующий
350
+ институциональные тренды цифрового рынка. У него самые высокие тарифы – 35-70% от
351
+ розничной цены продаваемых товаров. Можно предположить, что его прибыль значительно
352
+ превосходит прибыль продавцов товара. В этом Lamoda похож на розничные сети. Неудивительно,
353
+ что прирост его показателей стабильно ниже прироста продаж других лидеров цифрового рынка.
354
+ Следует особо отметить наличие огромного потенциала продаж, связанного со снижением
355
+ суммы среднего чека. Все это задает тренд на совершенствование логистических технологий,
356
+ направленных на уменьшение транзакционных издержек и снижение розничных цен для
357
+ покупателей. Участники цифровой торговли, действующие в рамках указанного тренда,
358
+ добиваются наилучших результатов.
359
+ 6 Новые горизонты цифровой торговли
360
+ Практика показывает, что институции цифровой торговли оказывают решающее влияние на
361
+ конкурентоспособность ее субъектов [11, с. 60-61]. Отставание E-commerce Index Ranking лишь
362
+ подтверждает необходимость корректировки институционального регулирования цифровой
363
+ торговли и смены его приоритетов. Игнорирование рыночных трендов и закономерностей резко
364
+ снижает эффективность государственной политики и конкурентоспособность российской
365
+ цифровой экономики в целом.
366
+ В качестве институциональных ориентиров следует выделить три приоритетных
367
+ направления развития сетевой экономики и покупательский спрос как движущую силу рыночного
368
+ механизма. Выделение этих ориентиров связано с наиболее успешными институциями,
369
+ определяющими вектор институционального развития цифровой торговли.
370
+ 1. Контрактное производство – институция, основанная на изготовлении продукции
371
+ независимым производителем по техническому заданию заказчика с отгрузкой «под ключ». Такое
372
+ производство пере��одит из категории работ в категорию услуг. Оно не производит собственную
373
+ продукцию,
374
+ оказывая
375
+ предоплаченные
376
+ услуги
377
+ заказчикам,
378
+ что
379
+ обеспечивает
380
+ большую
381
+ экономическую эффективность.
382
+ Контрактное производство не нуждается в кредитовании, имеет отрицательную
383
+ оборачиваемость средств и не несет предпринимательских рисков в торговле. В этой модели
384
+ инициаторами производства выступают независимые заказчики, отслеживающие конъюнктуру
385
+ рынка, принимающие на себя предпринимательские риски и финансирующие производство за
386
+ счет
387
+ собственных
388
+ средств.
389
+ Контрактное
390
+ производство
391
+ становится
392
+ придатком
393
+ торговли,
394
+ ориентирующейся на потребительский спрос.
395
+ Пример: Биржа контрактного производства Московского инновационного кластера.2
396
+ 2. Логистический провайдинг (англ. Third Party Logistics) – институция, основанная на
397
+ делегировании нестратегических внутрифирменных функций независимым провайдерам
398
+
399
+ 2 Биржа контрактного производства // Московский инновационный кластер. URL: https://i.moscow/contract_exchange (дата
400
+ обращения: 18.06.2022).
401
+
402
+ KyPHAA
403
+ HOOPMALOHHOE
404
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
405
+ WWW.INFOSOC.IIS.RU
406
+ 64
407
+
408
+ логистических услуг. Такой провайдинг также переходит из категории работ в категорию услуг.
409
+ Провайдеры делятся с заказчиками экономией на масштабе оказываемых услуг, за счет своей узкой
410
+ специализации обеспечивая более высокое качество и эффективность.
411
+ Практически любая внутрифирменная функция может быть передана независимому
412
+ провайдеру: бухгалтерский учет, обработка заказов, разработка технической документации,
413
+ организация продаж, документооборота и т.д. [12, с. 57]. Высший уровень логистического
414
+ провайдинга (5PL) предполагает делегирование как функции, так и контроля за ее реализацией по
415
+ принципу «передал и забыл». В идеальной модели заказчик сосредотачивается на стратегическом
416
+ направлении деятельности, а все сопутствующие функции делегирует внешним провайдерам.
417
+ Примеры: маркетплейсы, аутсорсинговые и фулфилментовые компании, бухгалтерские
418
+ сервисы и т.д.
419
+ 3. Сетевое предпринимательство – институция, основанная на использовании преимуществ
420
+ виртуальной среды, сетевой экономики и цифровой торговли. Они позволяют сократить
421
+ затратность ведения бизнеса и снижают входной барьер для участников цифрового рынка,
422
+ сокращая временные затраты на реализацию бизнес-проектов.
423
+ Идеальная модель сетевого предпринимательства стремится к тому, что называется
424
+ «виртуальная организация», не имеющая ни офиса, ни постоянного штата сотрудников [13, с. 279-
425
+ 281]. Предприниматель здесь выступает в роли организатора и координатора «цепочек создания
426
+ ценностей», потенциал которых он использует для реализации своего бизнес-проекта. В качестве
427
+ его сетевых партнеров выступают как контрактные производители, так и провайдеры
428
+ логистических услуг.
429
+ Пример: Самодеятельные продавцы маркетплейсов (Ozon, Wildberries и Яндекс-Маркет),
430
+ продающие контрактные товары под своими брендами.
431
+ В своей совокупности все институции образуют экосреду цифровой экономики, в которой
432
+ цифровая торговля инициирует не только процесс товародвижения, но и товарного производства.
433
+ Покупатель своим спросом инициирует предпринимательскую активность продавца, который на
434
+ свой страх и риск организует контрактное производство востребованных товаров и привлекает
435
+ сетевых провайдеров логистических услуг.
436
+ В корне меняются институциональные роли участников сетевого рынка:
437
+ Покупатели – получают возможность неограниченного выбора, ставя продавцов в условия
438
+ совершенной конкуренции.
439
+ Продавцы – откликаются на запросы покупателей, первичный спрос которых инициирует их
440
+ вторичную предпринимательскую активность.
441
+ Сетевые провайдеры – оказывают логистические услуги продавцам (не покупателям!),
442
+ принимая на себя отдельные функции организации товародвижения.
443
+ Производители – оказывают услуги контрактного производства продавцам, соревнуюсь
444
+ между собой в гибкости производства и скорости выполнения заказов.
445
+ Пока наибольшую эффективность показывает институция, в рамках которой покупатель
446
+ взаимодействует с маркетплейсом, принимающим на себя все заботы по организации товаропотока
447
+ (Wildberries, Ozon, AliExpress). Однако уже сегодня многие продавцы продают свои товары
448
+ одновременно на нескольких маркетплейсах, а нелояльные покупатели, сравнивая цены, покупают
449
+ там, где дешевле. Свобода потребительского выбора размоет диктат маркетплейсов, как они сегодня
450
+ размывают диктат розничных сетей.
451
+ Рано или поздно и маркетплейсы достигнут предела институционального развития и
452
+ перейдут в категорию «при прочих равных» за счет обострения внутривидовой конкуренции. Если
453
+ это
454
+ произойдет,
455
+ то
456
+ между
457
+ продавцами
458
+ и
459
+ покупателями
460
+ сформируется
461
+ логистическая
462
+ инфраструктура, в равной мере доступная всем участникам цифрового рынка. Аналогично
463
+ электричество или компьютеры были когда-то источником рыночной конкурентоспособности, а
464
+ сегодня воспринимаются как естественная часть рыночного ландшафта.
465
+ Заключение
466
+ Приоритетом институциональной политики государства может стать превращение цифровой
467
+ торговли в один из локомотивов экономического роста. Для этого необходимо сосредоточиться на
468
+
469
+ KyPHAA
470
+ HOOPMALOHHOE
471
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
472
+ WWW.INFOSOC.IIS.RU
473
+ 65
474
+
475
+ снижении транзакционных издержек в сетях товародвижения. В традиционной торговле
476
+ потребительскими товарами транзакционные издержки (маржа оптово-розничных сетей)
477
+ составляли 80-100% от конечной цены товара. В маркетплейсах типа Lamoda они и сегодня
478
+ составляют 30-70% от цены продавца.
479
+ Вместе с тем, практика институционального развития цифровой торговли задает совсем иной
480
+ вектор. Более продвинутые м��ркетплейсы (Wildberries, Ozon, Яндекс-Маркет) еще в начале 2021 года
481
+ инициативно снизили размер своей комиссии до 3-5% и это привело к впечатляющим результатам.
482
+ Так, например, продажи самозанятых на Wildberries только в первом квартале 2022 года выросли на
483
+ 410% (до 2 млрд руб.), а их численность увеличилась почти пятикратно (до 150 тыс. чел.).3
484
+ В условиях экономического кризиса и западных санкций снижение транзакционных
485
+ издержек в цифровой торговле способно компенсировать снижение покупательной способности
486
+ населения.
487
+ Важно
488
+ сохранить
489
+ доступность
490
+ товаров
491
+ массового
492
+ спроса
493
+ и
494
+ поддержать
495
+ товаропроизводителей. Вытесняя из торговой цепочки посредническое звено за счет ускоренной
496
+ цифровизации торговли, можно не только способствовать решению социальных задач, но и
497
+ стимулировать рост предпринимательской активности в производственной сфере. Представляется,
498
+ что именно эта цель должна стать одним из приоритетов институциональной политики
499
+ государства в отношении цифровой торговли на ближайшие годы.
500
+ Литература
501
+ 1. Указ Президента РФ № 203 от 09.05.2017 г. «О Стратегии развития информационного
502
+ общества в Российской Федерации на 2017-2030 годы» / Документы // Президент России.
503
+ URL: http://kremlin.ru/acts/bank/41919.
504
+ 2. Интернет-торговля в России 2021: Аналитический отчет. М.: Data Insight, 2022. 156 с.
505
+ 3. The UNCTAD B2C E-commerce Index 2020 / UNCTAD Technical Notes on ICT for
506
+ Development 2021 // UNCTAD ONU. 2022. № 17. 22 р.
507
+ 4. Блуммарт Т. Четвертая промышленная революция и бизнес: как конкурировать и
508
+ развиваться в эпоху сингулярности. М.: Альпина Паблишер, 2019. 204 с.
509
+ 5. Данные для лучшей жизни: Обзор доклада о мировом развитии. Washington:
510
+ Международный банк реконструкции и развития / Всемирный банк, 2021. 39 с.
511
+ 6. Кочетков Е.П. Цифровая трансформация экономики и технологические революции:
512
+ вызовы для текущей парадигмы менеджмента и антикризисного управления //
513
+ Стратегические решения и риск-менеджмент. 2019. Т. 10. № 4. С. 330-341. DOI:
514
+ 10.17747/2618-947X-2019-4-330-341.
515
+ 7. Антимонопольное регулирование в цифровую эпоху: как защищать конкуренцию в
516
+ условиях глобализации и четвертой промышленной революции: монография. М.: ВШЭ,
517
+ 2019. 391 с.
518
+ 8. Борисова В.В., Юань Х., Тан Л. Стратегии развития электронной платформы Aliexpress в
519
+ России // Вестник Ростовского государственного экономического университета (РИНХ).
520
+ 2020. № 4 (72). С. 110-115.
521
+ 9. Романова Т. Маркетплейсы рвутся вверх: за счет чего выросли обороты крупнейших
522
+ ретейлеров России / Бизнес // Forbes. [Электронный ресурс]. 7 июня 2022 г. URL:
523
+ https://www.forbes.ru/biznes/467927-marketplejsy-rvutsa-vverh-za-scet-cego-vyrosli-oboroty-
524
+ krupnejsih-retejlerov-rossii (дата обращения: 15.06.2022).
525
+ 10. Рейтинг ТОП-100 крупнейших российских интернет-магазинов. М.: Data Insight, 2022. URL:
526
+ https://top100.datainsight.ru (дата обращения: 17.06.2022).
527
+ 11. Слонимская М.А. Сетевые формы организации экономики. Мн.: Беларуская навука, 2018.
528
+ 279 с.
529
+ 12. Tan A., Shukkla S. Digital transformation of the supply chain: a practical guide for. Danvers
530
+ (USA): World Scientific Publishing, 2021. 152 p.
531
+ 13. Уорнер М., Витцель М. Виртуальные организации. Нов��е формы ведения бизнеса в XXI
532
+ веке. М.: Добрая книга, 2005. 296 с.
533
+
534
+
535
+
536
+ 3 Продажи самозанятых из России на Wildberries выросли на 410% с января 2022 года. 29.06.2022. / Экономика // ТАСС. URL:
537
+ https://tass.ru/ekonomika/15065193 (дата обращения 13.07.2022).
538
+
539
+ KyPHAA
540
+ HOOPMALOHHOE
541
+ 6ECTB0ИНФОРМАЦИОННОЕ ОБЩЕСТВО | 2022 | № 6
542
+ WWW.INFOSOC.IIS.RU
543
+ 66
544
+
545
+ INSTITUTIONALIZATION OF DIGITAL TRADE IN THE RUSSIAN
546
+ FEDERATION: COUNTDOWN
547
+ Kaluzhsky, Mikhail Leonidovich
548
+ Candidate of philosophical sciences, associate professor
549
+ Fund of Regional Development Strategy, executive director
550
+ Omsk State Technical University, department “Organization and management of science-intensive industries”,
551
+ associate professor
552
+ Omsk, Russian Federation
553
+ frsr@inbox.ru
554
+ Abstract
555
+ The institutionalization of digital trade is one of the most important directions in the formation of the information
556
+ society in the Russian Federation. The studies reflect the emerging lag in the Russian economy readiness index to
557
+ support online shopping. The author analyzes the reasons for the lag in the context of the institutional features of
558
+ the development of digital trade. As the main obstacle that reduces the economic efficiency and competitiveness of
559
+ digital trade, insufficient attention of the state to the formation of innovative institutions of the digital market is
560
+ highlighted.
561
+ Keywords
562
+ network economy; digital trade; digital market; e-commerce; institutional policy; contract manufacturing; network
563
+ entrepreneurship; marketplaces; logistics providers
564
+ References
565
+ 1. Ukaz Prezidenta RF № 203 ot 09.05.2017 g. «O Strategii razvitiya informacionnogo obshchestva v
566
+ Rossijskoj Federacii na 2017-2030 gody» / Dokumenty // Prezident Rossii. URL:
567
+ http://kremlin.ru/acts/bank/41919.
568
+ 2. Internet-torgovlya v Rossii 2021: Analiticheskij otchet. M.: Data Insight, 2022. 156 s.
569
+ 3. The UNCTAD B2C E-commerce Index 2020 / UNCTAD Technical Notes on ICT for
570
+ Development 2021 // UNCTAD ONU. 2022. № 17. 22 r.
571
+ 4. Blummart T. Chetvertaya promyshlennaya revolyuciya i biznes: kak konkurirovat' i razvivat'sya
572
+ v ehpokhu singulyarnosti. M.: Al'pina Pablisher, 2019. 204 s.
573
+ 5. Dannye dlya luchshej zhizni: Obzor doklada o mirovom razvitii. Washington: Mezhdunarodnyj
574
+ bank rekonstrukcii i razvitiya / Vsemirnyj bank, 2021. 39 s.
575
+ 6. Kochetkov E.P. Cifrovaya transformaciya ehkonomiki i tekhnologicheskie revolyucii: vyzovy dlya
576
+ tekushchej paradigmy menedzhmenta i antikrizisnogo upravleniya // Strategicheskie resheniya i
577
+ risk-menedzhment. 2019. T. 10. № 4. S. 330-341. DOI: 10.17747/2618-947X-2019-4-330-341.
578
+ 7.
579
+ Antimonopol'noe regulirovanie v cifrovuyu ehpokhu: kak zashchishchat' konkurenciyu v usloviyakh
580
+ globalizacii i chetvertoj promyshlennoj revolyucii: monografiya. M.: VSHEH, 2019. 391 s.
581
+ 8. Borisova V.V., Yuan' KH., Tan L. Strategii razvitiya ehlektronnoj platformy Aliexpress v Rossii
582
+ // Vestnik Rostovskogo gosudarstvennogo ehkonomicheskogo universiteta (RINKH). 2020. № 4
583
+ (72). S. 110-115.
584
+ 9. Romanova T. Marketplejsy rvutsya vverkh: za schet chego vyrosli oboroty krupnejshikh
585
+ retejlerov Rossii / Biznes // Forbes. [Ehlektronnyj resurs]. 7 iyunya 2022 g. URL:
586
+ https://www.forbes.ru/biznes/467927-marketplejsy-rvutsa-vverh-za-scet-cego-vyrosli-oboroty-
587
+ krupnejsih-retejlerov-rossii (data obrashcheniya: 15.06.2022).
588
+ 10. Rejting TOP-100 krupnejshikh rossijskikh internet-magazinov. M.: Data Insight, 2022. URL:
589
+ https://top100.datainsight.ru (data obrashcheniya: 17.06.2022).
590
+ 11. Slonimskaya M.A. Setevye formy organizacii ehkonomiki. Mn.: Belaruskaya navuka, 2018. 279 s.
591
+ 12. Tan A., Shukkla S. Digital transformation of the supply chain: a practical guide for. Danvers
592
+ (USA): World Scientific Publishing, 2021. 152 p.
593
+ 13. Uorner M., Vitcel' M. Virtual'nye organizacii. Novye formy vedeniya biznesa v XXI veke. M.:
594
+ Dobraya kniga, 2005. 296 s.
595
+
596
+ KyPHAA
597
+ HOOPMALOHHOE
598
+ 6ECTB0
ENE4T4oBgHgl3EQffQ0N/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ENFQT4oBgHgl3EQfQTaG/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9AyT4oBgHgl3EQf5Pp6/content/tmp_files/2301.00801v1.pdf.txt ADDED
@@ -0,0 +1,2919 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00801v1 [stat.ML] 2 Jan 2023
2
+ Causal Inference (C-inf) — asymmetric scenario of
3
+ typical phase transitions
4
+ Agostino Capponi ∗ Mihailo Stojnic †
5
+ Department of Industrial Engineering and Operations Research
6
+ Columbia University, New York, NY 10027, USA
7
+ Abstract
8
+ In this paper, we revisit and further explore a mathematically rigorous connection between Causal in-
9
+ ference (C-inf) and the Low-rank recovery (LRR) established in [10]. Leveraging the Random duality
10
+ - Free probability theory (RDT-FPT) connection, we obtain the exact explicit typical C-inf asymmetric
11
+ phase transitions (PT). We uncover a doubling low-rankness phenomenon, which means that exactly two
12
+ times larger low rankness is allowed in asymmetric scenarios compared to the symmetric worst case ones con-
13
+ sidered in [10]. Consequently, the final PT mathematical expressions are as elegant as those obtained in [10],
14
+ and highlight direct relations between the targeted C-inf matrix low rankness and the time of treatment.
15
+ Our results have strong implications for applications, where C-inf matrices are not necessarily symmetric.
16
+ Index Terms: Causal inference; Random duality theory; Algorithms; Matrix completion; Spar-
17
+ sity.
18
+ 1
19
+ Introduction
20
+ Causal inference (C-inf) deals with the design of estimation strategies that allow researchers to draw
21
+ causal conclusions based on data. The overarching goal is to draw a conclusion regarding the effect of a
22
+ causal variable, which is typically referred to as the “treatment” or the “intervention” on some outcome of
23
+ interest. For example, suppose we want to estimate the causal effect of a drug on deadly cancer progression
24
+ (vs no exposure to the drug). Then we want to compare metastasis in the patient’s body one month after
25
+ the drug regime has begun versus metastasis in the absence of exposure to the drug. The main challenge for
26
+ causal inference is that we are not generally able to observe both of these states: at the point in time when
27
+ we are measuring the outcomes, each individual either has had drug exposure or has not.
28
+ The problem of estimating the counterfactual, i.e., what would have been the outcome in the absence
29
+ of a treatement, is central in many disciplines, including economics, health, and social sciences (see, e.g.
30
+ [2,11,13,14,32,33,50]), machine learning and theoretical computer science (see, e.g. [25–28]). Methodological
31
+ developments to estimate causal effects have been based on experimental or observational data. Experimental
32
+ research offers the most plausibly unbiased estimates, but experiments are frequently infeasible because they
33
+ are costly or subject to moral objections.
34
+ Observational data instead are becoming increasing available
35
+ due to technological advancements in the design of sensor and hardware devices. Our focus is on causal
36
+ inference in observational studies, and specifically on the design of efficient algorithmic techniques to estimate
37
+ counterfactuals.
38
+ The C-inf approaches can be broadly classified into three categories: 1) the unconfoundedness (see,
39
+ e.g. [14, 32]); 2) the synthetic control (see, e.g. [1, 2, 11]); and 3) the matrix completion (see, e.g. [3, 4, 15].
40
+ Matrix completion methods build upon the foundation works of [7,9,29]). Perhaps unexpectedly, all three
41
+ methods heavily rely on mathematical, statistical, and ultimately algorithmic concepts with very deep roots
42
+ ∗e-mail: ac3827@columbia.edu
43
+ †e-mail: flatoyer@gmail.com
44
+ 1
45
+
46
+ in information theory. Our work is positioned within the third line of work that mathematically resembles
47
+ the matrix completion (MC) problem.
48
+ Along the same lines, our work extends significantly the analysis developed in the companion paper [10].
49
+ Therein, we obtained the exact explicit typical worst case C-inf phase transitions (PT), and further showed
50
+ that these phase transitions are achievable by the symmetric targeted C-inf matrices. In the present paper,
51
+ we consider a generic asymmetric context, to deal with the situation that C-inf matrices are not necessarily
52
+ always symmetric in real applications.
53
+ This allows us improving upon the results from [10] in certain
54
+ scenarios. We build further upon the RDT-FPT synergistic mechanisms considered in [10], and precisely
55
+ characterize the corresponding asymmetric PTs. We also uncover a doubling low-rankness phenomenon,
56
+ which means that exactly two times larger low rankness is allowed in asymmetric scenarios compared to the
57
+ symmetric worst case ones of [10].
58
+ 2
59
+ Causal inference mathematical setup
60
+ In this section, we revisit the explicit causal inference (C-inf) ↔ matrix completion (MC) connection,
61
+ established in [10]. Therein, we have discussed the connection between low rank recovery (LRR), matrix
62
+ completion (MC), and the causal inference (C-inf). Mathematically speaking, one has that the MC is a
63
+ special case of the LRR and the C-inf is a special case of the MC itself. Consequently, the mathematical
64
+ models that describe the LRR problems can be used to describe the MC and ultimately the C-inf ones as
65
+ well. Below we present the C-inf mathematical setup developed through such a connection in [10].
66
+ We start with a low rank matrix Xsol ∈ Rn×n with the singular value decomposition (SVD)
67
+ X = UΣV T ,
68
+ (1)
69
+ where
70
+ σ(X) ≜ diag(Σ)
71
+ and
72
+ U T U = In×n
73
+ and
74
+ V T V = In×n,
75
+ (2)
76
+ with In×n being the n × n identity matrix and diag(·) being the operator that creates a column vector of
77
+ the diagonal elements of its matrix argument. We then define ℓ∗
78
+ p(X) to be the so-called ℓp (quasi) norm of
79
+ σ(X) (the vector of the singular values of X), i.e.
80
+ ℓ∗
81
+ p(X) ≜ ℓp(σ(X)), p ∈ R+.
82
+ (3)
83
+ The following limiting ℓp(·) connections are important as well
84
+ ℓ∗
85
+ 0(Xsol) ≜ ℓ0(σ(Xsol)) = ∥σ(Xsol)∥0 = lim
86
+ p−→0 ∥σ(Xsol)∥p = lim
87
+ p−→0 ℓp(σ(Xsol)) = lim
88
+ p−→0 ℓ∗
89
+ p(Xsol).
90
+ (4)
91
+ Moreover, we also define the so-called block masking matrix M as (see Figure 1 as well)
92
+ M matrix in block causal inference (C-inf):
93
+ M ≜ M (l) ≜ 1n×11T
94
+ n×1 − I(l)(I(l))T 1n×11T
95
+ n×1I(l)(I(l))T
96
+ and
97
+ I(l) ≜
98
+ � 0l×(n−l)
99
+ I(n−l)×(n−l)
100
+
101
+ .
102
+ (5)
103
+ One then has the following two optimization problems that are at the heart of the C-inf ↔ MC connection
104
+ ℓ∗
105
+ 0-minimization (C-inf – MMT)
106
+ min
107
+ X
108
+ ℓ∗
109
+ 0(X)
110
+ subject to
111
+ Y = M ◦ X.
112
+ (6)
113
+ ℓ∗
114
+ 1-minimization (C-inf – MMT)
115
+ min
116
+ X
117
+ ℓ∗
118
+ 1(X)
119
+ subject to
120
+ Y = M ◦ X,
121
+ (7)
122
+ 2
123
+
124
+ M =
125
+ 1
126
+ Matrix M – block causal inference (C-inf)
127
+ 1
128
+ 0
129
+ 1
130
+ 0 and 1 grouped in blocks
131
+ l × l block of all 1s
132
+ l × (n − l) block of all 1s
133
+ (n − l) × (n − l) block of all 0s
134
+ (n − l) × l block of all 1s
135
+ Figure 1: Matrix M ≜ M (l) – block causal inference (C-inf) setup
136
+ where ◦ stands for the component-wise multiplication. Namely, keeping in mind that ℓ∗
137
+ 0(X) effectively counts
138
+ the number of the nonzero singular values of X, the optimization problem in (6) is exactly the recovery of
139
+ the C-inf targeted low rank matrix X from the linear observations Y obtained through a masking via M.
140
+ Moreover, the problem in (6) (with a generic M) is a standard matrix completion setup which on the other
141
+ hand is a special case of the LRR problems (expressed in the “masking matrix terminology” (MMT)). On
142
+ the other hand, the optimization problem in (7) is the tightest convex relaxation heuristic typically utilized
143
+ in the matrix completion literature for solving NP-hard problem (6). For more on the origin of these two
144
+ problems and their connection within the LRR and MC context we refer to the introductory LRR/MC
145
+ papers [7,30,36]. More on their importance and different related algorithmic considerations can be found in
146
+ many papers that followed (see, e.g. [8,16–22,31]).
147
+ Here though, we would particularly like to point out reference [4] where the very same C-inf context
148
+ was considered and the very same C-inf ↔ MC connection recognized. Considerations from [4] are in
149
+ fact especially convenient to properly understand in what C-inf contexts the block structure of the matrix
150
+ M might appear. To see that one can connect it to the so-called counterfactuals and the units/treatments
151
+ terminology employed in [4].
152
+ First we note that M can be alternatively defined as
153
+ Mi,j =
154
+
155
+ 1,
156
+ (i, j)-th element of Xsol is observed
157
+ 0,
158
+ otherwise.
159
+ (8)
160
+ It is then rather clear that ones in M allow reading out the corresponding elements of Xsol while zeros block
161
+ (mask) them. Then the context of [4] is roughly as follows. One first assumes that the matrix X contains
162
+ observations about a certain set of, say, n units (e.g. individuals, subpopulations, and geographic regions)
163
+ over a period of say, n, time instances. After that the rows of X are allocated to the units and the columns
164
+ to the time instances and one would like to estimate the effects that a certain treatment may have on the
165
+ treated units. A subset of the units (say those that correspond to the rows i > l) is then at time l exposed
166
+ to an irreversible treatment. Examples of treatments include health therapies, socio-economic policies, and
167
+ taxes. To ensure an appropriate assessment of the resulting treatment effects, in addition to having the
168
+ values of X after the treatment, one would need to have the access to the so-called counterfactuals – the
169
+ values of the treated units – had the treatment not been applied. Relating back to the matrix completion
170
+ terminology, one would basically need to estimate (a presumably low rank) X while not having access to its
171
+ 3
172
+
173
+ portion covered by the block-mask M = M (l). In other words, one would need to solve (6) with M = M (l).
174
+ The above describes the C-inf via counterfactuals and the underlying role of matrix M. Moreover, if
175
+ one views things in the time domain, i.e. if the columns of M represent time axis, then the observations
176
+ in ceratin rows will not be available after a fixed point in time. In the block scenario this point is fixed
177
+ across the affected rows. However, it does not necessarily need to be fixed (for more in this direction we refer
178
+ to [2] (in particular, the California tobacco example), [49] (in particular, the latent factor modeling in the
179
+ context of the simultaneous/staggered treatment adoption), and to [5, 6, 34] (in particular, the health care
180
+ applications) as excellent references for understanding the need of various C-inf scenarios). As this and [10]
181
+ are the introductory papers, where we present the overall methodology, we selected the block causal inference
182
+ scenario as probably the most representative and well-known one. In some of our companion papers we will
183
+ show how the methodology that we are introducing here can be utilized to handle other C-inf scenarios as
184
+ well.
185
+ 3
186
+ ℓ∗
187
+ 0 − ℓ∗
188
+ 1 equivalence
189
+ As mentioned earlier, solving the generic LRR (and consequently the C-inf as its a special case) might be
190
+ difficult due to a highly non-convex objective function in (6). Various heuristics can be employed depend-
191
+ ing on the practical scenarios that one can face. In the mathematically most challenging so-called linear
192
+ regime, the above mentioned ℓ∗
193
+ 1-minimization relaxation heuristic (often called nuclear norm minimization)
194
+ is typically viewed as the best known provably polynomial one. We adopt the same view in what follows
195
+ and take it as a current benchmark for the algorithmic handling of the C-inf. As mentioned above, a rather
196
+ remarkable feature of this heuristic is that sometimes it can actually solve the underlying problems exactly.
197
+ When that happens we say that the following ℓ∗
198
+ 0 − ℓ∗
199
+ 1-equivalence phenomenon occurs.
200
+ ℓ∗
201
+ 0 − ℓ∗
202
+ 1-equivalence (C-inf): ℓ∗
203
+ 0 ⇐⇒ ℓ∗
204
+ 1
205
+ Let Xsol be the solution of (6) and let ˆX be a solution of (7) and set
206
+ RMSE ≜ ∥vec( ˆX) − vec(Xsol)∥2.
207
+ If and only if ( ˆX = Xsol and RMSE = 0)
208
+ then
209
+ (ℓ∗
210
+ 0 − minimization ⇐⇒ ℓ∗
211
+ 1 − minimization).
212
+ (9)
213
+ The above basically means that when the ℓ∗
214
+ 0 − ℓ∗
215
+ 1-equivalence happens the optimization problems in (6)
216
+ and (7) are equivalent and as such replaceable by each other. We denote such a phenomenon as ℓ∗
217
+ 0 ⇐⇒ ℓ∗
218
+ 1.
219
+ That would, of course, be an ideal scenario where it would be basically possible to replace the non-convex
220
+ optimization problem with the convex one without losing anything in terms of the accuracy of the obtained
221
+ solutions. Since the mere existence of such a phenomenon is rather remarkable we will in this paper be
222
+ interested in uncovering the underlying intricacies that enable for it ro happen. Moreover, as it will turn
223
+ out that its occurrence is not an anomaly but rather a consequence of a generic property, we will then
224
+ raise the bar accordingly and attempt to provide not only the proof of its existence but also its a complete
225
+ analytical characterization. This will include a full characterization as to how often and in what scenarios it
226
+ might happen. To do so we will combine the Random Duality Theory (RDT) tools from [37–44] and several
227
+ advanced sophisticated probabilistic concepts that we will introduce along the way in the sections that follow
228
+ below.
229
+ We start with some algebraic ℓ∗
230
+ 0 − ℓ∗
231
+ 1-equivalence preliminaries which are borrowed from the RDT. The
232
+ first one is a generic LRR ℓ∗
233
+ 0−ℓ∗
234
+ 1-equivalence result (the result is basically an adaptation of the corresponding
235
+ CS equivalence condition from [39–41] (similar adaptation can also be found in [24])).
236
+ Theorem 1. ( [10] ℓ∗
237
+ 0 − ℓ∗
238
+ 1-equivalence condition (LRR) – general X) Consider a ¯U ∈ Rn×k such that
239
+ ¯U T ¯U = Ik×k and a ¯V ∈ Rn×k such that ¯V T ¯V = Ik×k and a rank− k matrix Xsol = X ∈ Rn×n with all of its
240
+ columns belonging to the span of ¯U and all of its rows belonging to the span of ¯V T . Also, let the orthogonal
241
+ spans ¯U ⊥ ∈ Rn×(n−k) and ¯V ⊥ ∈ Rn×(n−k) be such that U ≜
242
+ � ¯U
243
+ ¯U ⊥�
244
+ and V ≜
245
+ � ¯V
246
+ ¯V ⊥�
247
+ and
248
+ U T U ≜
249
+ � ¯U
250
+ ¯U ⊥�T � ¯U
251
+ ¯U ⊥�
252
+ = In×n
253
+ and
254
+ V T V ≜
255
+ � ¯V
256
+ ¯V ⊥�T � ¯V
257
+ ¯V ⊥�
258
+ = In×n.
259
+ (10)
260
+ 4
261
+
262
+ For a given matrix A ∈ Rm×n2 (m ≤ n2) assume that y = Avec(X) = Avec(Xsol) ∈ Rm and let ˆX be the
263
+ solution of (7). If
264
+ (∀W ∈ Rn×n|Avec(W) = 0m×1, W ̸= 0n×n)
265
+ − tr ( ¯U T W ¯V ) < ℓ∗
266
+ 1(( ¯U ⊥)T W ¯V ⊥),
267
+ (11)
268
+ then
269
+ ℓ∗
270
+ 0 ⇐⇒ ℓ∗
271
+ 1
272
+ and
273
+ RMSE = ∥vec( ˆX) − vec(Xsol)∥2 = 0,
274
+ (12)
275
+ and the solutions of (6) and (7) coincide. Moreover, if
276
+ (∃W ∈ Rn×n|Avec(W) = 0m×1, W ̸= 0n×n)
277
+ − tr ( ¯U T W ¯V ) ≥ ℓ∗
278
+ 1(( ¯U ⊥)T W ¯V ⊥),
279
+ (13)
280
+ then there is an X from the above set of matrices with columns belonging to the span of ¯U and rows belonging
281
+ to the span of ¯V such that the solutions of (6) and (7) are different.
282
+ Proof. The proof is a trivial adaptation of the proof for symmetric matrices given in Appendix A.
283
+ Continuing further in the spirit of the RDT the following corollary is a matrix completion specific variant
284
+ of the above theorem.
285
+ Corollary 1. ( [10] ℓ∗
286
+ 0 − ℓ∗
287
+ 1-equivalence condition via masking matrix (MC/C-inf) – general X)
288
+ Assume the setup of Theorem 1 with Xsol being the unique solution of (6). Let the masking matrix M ∈ Rn×n
289
+ have m ones and (n2−m) zeros and let A be generated via M, i.e. let A be the matrix obtained after removing
290
+ all the zero rows from diag−1(vec(M))In2×n2. If and only if
291
+ min
292
+ W,W T W=1,M◦W=0n×n
293
+ tr ( ¯U T W ¯V ) + ℓ∗
294
+ 1(( ¯U ⊥)T W ¯V ⊥) ≥ 0,
295
+ (14)
296
+ then
297
+ ℓ∗
298
+ 0 ⇐⇒ ℓ∗
299
+ 1
300
+ and
301
+ RMSE = ∥vec( ˆX) − vec(Xsol)∥2 = 0,
302
+ (15)
303
+ and the solutions of (6) and (7) coincide.
304
+ Finally, the following spectral oriented corollary was proven in [10] as well.
305
+ Corollary 2. ( [10] ℓ∗
306
+ 0−ℓ∗
307
+ 1-equivalence condition via mask-modified bases spectra (C-inf) – general
308
+ X) Assume the setup of Theorem 1 with k ≤ l. Let M ≜ M (l) ∈ Rn×n and I(l) ∈ Rn×(n−l) be as defined in
309
+ (5). Set
310
+ ΛV
311
+
312
+ ((I(l))T ¯V ⊥)−1(I(l))T ¯V
313
+ ΛU
314
+
315
+ ((I(l))T ¯U ⊥)−1(I(l))T ¯U
316
+ Q
317
+ =
318
+
319
+ (I(l))T ¯V ⊥( ¯V ⊥)T I(l)�−1
320
+ − I
321
+ Q⊥
322
+ 1
323
+ =
324
+
325
+ (I(l))T ¯U ⊥( ¯U ⊥)T I(l)�−1
326
+ − I.
327
+ (16)
328
+ C-inf perfectly succeeds: ℓ∗
329
+ 0 ⇐⇒ ℓ∗
330
+ 1
331
+ and
332
+ RMSE = ∥vec( ˆX) − vec(Xsol)∥2 = 0
333
+ If and only if
334
+ λmax(ΛT
335
+ V ΛV ΛT
336
+ UΛU) ≤ 1.
337
+ (17)
338
+ Moreover, if
339
+ λmax (Q) λmax
340
+
341
+ Q⊥
342
+ 1
343
+
344
+ ≤ 1,
345
+ (18)
346
+ then again ℓ∗
347
+ 0 ⇐⇒ ℓ∗
348
+ 1 and RMSE = ∥vec( ˆX − vec(Xsol)∥2 = 0 and the C-inf perfectly succeeds as well.
349
+ 5
350
+
351
+ Since we will be working in the mathematically most challenging large n linear regime, we find it useful
352
+ to introduce the following large dimensional scalings
353
+ β ≜ lim
354
+ n→∞
355
+ k
356
+ n
357
+ and
358
+ η ≜ lim
359
+ n→∞
360
+ l
361
+ n
362
+ and
363
+ α ≜ lim
364
+ n→∞
365
+ m
366
+ n2 = lim
367
+ n→∞
368
+ n2 − (n − l)2
369
+ n2
370
+ = 1 − (1 − η)2.
371
+ (19)
372
+ The key highlight result of [10] is the following theorem obtained through an analysis that relied on the
373
+ above corollary and a combination of the Random duality theory (RDT) and Free probability theory (FPT).
374
+ It basically establishes the worst case phase-transition (PT) that ℓ∗
375
+ 1, tightest convex relaxation heuristic,
376
+ exhibits when used for solving C-inf in a typical statistical scenario.
377
+ Theorem 2. (ℓ∗
378
+ 1 – phase transition – C-inf (typical worst case)) Consider a rank-k matrix Xsol =
379
+ X ∈ Rn×n with the Haar distributed ( not necessarily independent) bases of its orthogonal row and column
380
+ spans ¯U ⊥ ∈ Rn×(n−k) and ¯V ⊥ ∈ Rn×(n−k) (XT
381
+ sol ¯U ⊥ = Xsol ¯V ⊥ = 0n×(n−k)). Let M ≜ M (l) ∈ Rn×n be as
382
+ defined in (5). Assume a large n linear regime with β ≜ limn→∞ k
383
+ n and η ≜ limn→∞ l
384
+ n and let βwc and η
385
+ satisfy the following
386
+ C-inf ℓ∗
387
+ 1 worst case phase transition (PT) characterization
388
+ ξ(wc)
389
+ η
390
+ (β) ≜ β − 1
391
+ 2 +
392
+
393
+ η − η2 = 0.
394
+ (20)
395
+ If and only if β ≤ βwc
396
+ lim
397
+ n→∞ P(ℓ∗
398
+ 0 ⇐⇒ ℓ∗
399
+ 1) =
400
+ lim
401
+ n→∞ P(RMSE = 0) = 1,
402
+ (21)
403
+ and the solutions of (6) and (7) coincide with overwhelming probability.
404
+ The results obtained based on the above theorem are shown in Figure 2, where one can clearly see that
405
+ the phase transition curve splits the entire (β, η) region into two subregions: 1) the first one (below (or to
406
+ the right of) the curve) where the ℓ∗
407
+ 0 − ℓ∗
408
+ 1-equivalence phenomenon occurs; and 2) the second one (above (or
409
+ to the left of) the curve) where the ℓ∗
410
+ 0 − ℓ∗
411
+ 1-equivalence is lacking. This means that one can recover Xsol
412
+ masked by M as in (6) via the ℓ∗
413
+ 1 heuristic from (7) with the residual mean square error (RMSE) equal to
414
+ zero. In other words, for the system parameters (β, η) that belong to the subregion below the curve one has
415
+ a perfect recovery with Xsol and ˆX (the respective solutions of (6) and (7)) being equal to each other and
416
+ consequently with RMSE = ∥vec( ˆX) − vec(Xsol)∥2 = 0. On the other hand, in the subregion above the
417
+ curve, the ℓ∗
418
+ 1 heuristic fails and one can even find an Xsol for which RMSE → ∞.
419
+ 4
420
+ Analysis of the ℓ∗
421
+ 0 −ℓ∗
422
+ 1-equivalence – typical asymmetric scenario
423
+ In this section we consider when the conditions given in Corollary 2 are met. As in [10], we will be working
424
+ in a “typical” statistical context. On the other hand, differently from [10], instead of focusing on the worst
425
+ case (symmetric) scenario we here consider a typical asymmetric scenario setup. Practically this means
426
+ two things: 1) as in [10], both ¯V and ¯U will be assumed as Haar distributed; and 2) differently from Theorem
427
+ 2 and [10], ¯V and ¯U will now be assumed as independent of each other. In a way one can view the worst case
428
+ scenario from [10] as an extreme where ¯V and ¯U are “not independent at all” (or, in other words, equal to
429
+ each other). Along similar lines, one can then view the scenario that we will consider here as another extreme
430
+ where ¯V and ¯U are “not dependent at all” (or, in other words, completely independent). In situations where
431
+ no particular structure of a low rank nonsymmetric Xsol is favored over any other this one would naturally be
432
+ a most reasonable choice. In other words, it is not only an extreme case, but actually the one that typically
433
+ might most faithfully describe the performance of the underlying C-inf heuristics.
434
+ 4.1
435
+ Free probability theory (FPT) – preliminaries
436
+ Below we provide a short preview of the most basic FPT concepts needed for our analysis (we refer to our
437
+ companion paper [10] for a more detail treatment). As is by now well known, the work od Dan Voiculescu
438
+ 6
439
+
440
+ η
441
+ 0.5
442
+ 0.55
443
+ 0.6
444
+ 0.65
445
+ 0.7
446
+ 0.75
447
+ 0.8
448
+ 0.85
449
+ 0.9
450
+ 0.95
451
+ 1
452
+ β
453
+ 0
454
+ 0.05
455
+ 0.1
456
+ 0.15
457
+ 0.2
458
+ 0.25
459
+ 0.3
460
+ 0.35
461
+ 0.4
462
+ 0.45
463
+ 0.5
464
+ (β, η) region of success/failure — C-inf ℓ∗1 PT
465
+ RMSE −→ ∞, ℓ∗1
466
+ fails
467
+ RMSE = 0, ℓ∗1 succeeds
468
+ ℓ∗1’s PT: ξ(wc)
469
+ η
470
+ (β) = β − 1
471
+ 2 + �η − η2 = 0
472
+ Figure 2: Causal inference (C-inf) – typical worst case ℓ∗
473
+ 1 phase transition
474
+ on group theories (see, e.g. [46–48]) established the foundations of the FPT. As the practical importance
475
+ of FPT became immediately evident a substantial interest for further studying was generated and, in the
476
+ years that followed, quite a few nice results appeared that made the whole theory more approachable and
477
+ ultimately presentable in an easily understandable way. Along the same lines, we follow into the footsteps
478
+ of [10], leave all the abstractions out and focus on the FPT’s key practically applicable components (for
479
+ further details see also, e.g. [12,23,35,45–48]).
480
+ 4.1.1
481
+ Basics of FPT – random matrix variables
482
+ We assume large n linear regime and consider two symmetric matrices A = AT ∈ Rn×n and B = BT ∈ Rn×n
483
+ with Haar distributed eigenspaces. We also assume that their individual respective spectral laws are fA(·)
484
+ and fB(·). Three different transforms of these spectral densities will be needed. We start with the first one,
485
+ the so-called Stieltjes (or G) transform
486
+ G(z)
487
+
488
+
489
+ If
490
+ f(x)
491
+ z − xdx,
492
+ z ∈ C \ If,
493
+ (22)
494
+ where If is the domain of f(·). The following inverse relation is also well known
495
+ f(x) = lim
496
+ ǫ→0+
497
+ G(x − iǫ) − G(x + iǫ)
498
+ 2iπ
499
+ or
500
+ f(x) = − lim
501
+ ǫ→0+
502
+ imag(G(x + iǫ))
503
+ π
504
+ .
505
+ (23)
506
+ For the above to hold it makes things easier to implicitly assume that f(x) is continuous. We will, however,
507
+ utilize it even in discrete (or semi-discrete) scenarios since the obvious asymptotic translation to continuity
508
+ would make it fully rigorous. A bit later though, when we see some concrete examples where things of this
509
+ nature may appear, we will say a few more words and explain more thoroughly what exactly can be discrete
510
+ and how one can deal with such a discreteness. In the meantime we proceed with general principles not
511
+ necessarily worrying about all the underlying technicalities that may appear in scenarios deviating from the
512
+ typically seen ones and potentially requiring additional separate addressing. To that end we continue by
513
+ considering the R(·)- and S(·)-transforms that satisfy the following
514
+ R(G(z)) +
515
+ 1
516
+ G(z) = z,
517
+ (24)
518
+ 7
519
+
520
+ and
521
+ S(z) =
522
+ 1
523
+ R(zS(z))
524
+ and
525
+ R(z) =
526
+ 1
527
+ S(zR(z)).
528
+ (25)
529
+ Let fA(·) and fB(·) be the spectral distributions of A and B and let RA(z)/SA(z) and RB(z)/SB(z) be their
530
+ associated R(·)-/S(·)-transforms. One then has the following
531
+ Key Voiculescu’s FPT concepts [46, 47]:
532
+ C
533
+ =
534
+ A + B
535
+ =⇒
536
+ RC(z)
537
+ =
538
+ RA(z) + RB(z)
539
+ C
540
+ =
541
+ AB
542
+ =⇒
543
+ SC(z)
544
+ =
545
+ SA(z)SB(z).
546
+ (26)
547
+ Now it is relatively easy to see that (22)-(26) are sufficient to determine the spectral distribution of the sum
548
+ or the product of two independent matrices with given spectral densities and the Haar distributed bases of
549
+ eigenspaces. The above is of course a generic principle. It can be applied pretty much always as long as
550
+ one has access to the statistics of the underlying matrices A and B. In the following section we will raise
551
+ the bar a bit higher and show that in the C-inf context one can use all of the above in such a manner that
552
+ eventually all the quantities of interest are explicitly determined.
553
+ 4.1.2
554
+ Spectral preliminaries
555
+ We start by recalling on Q from (16) and introducing Q1
556
+ Q1
557
+
558
+ ΛT
559
+ V ΛV
560
+ Q
561
+
562
+
563
+ (I(l))T ¯V ⊥( ¯V ⊥)T I(l)�−1
564
+ − I
565
+ Sp(Q1)
566
+ ⇐⇒\0
567
+ Sp(Q),
568
+ (27)
569
+ where Sp(·) stands for the spectrum of the matrix argument and ⇐⇒\0 means the equivalence of the parts
570
+ of the spectra outside the zero eigenvalues. It is rather obvious that it will then be sufficient to handle the
571
+ spectrum of
572
+ D
573
+
574
+ (I(l))T ¯V ⊥( ¯V ⊥)T I(l).
575
+ (28)
576
+ Consider Haar distributed ¯U ⊥
577
+ D ∈ Rn×(n−l) with ( ¯U ⊥
578
+ D)T ¯U ⊥
579
+ D = I(n−l)×(n−l) and let
580
+ UD
581
+ =
582
+ � ¯UD
583
+ ¯U ⊥
584
+ D
585
+
586
+ with
587
+ U T
588
+ DUD = In×n.
589
+ (29)
590
+ Also, we assume that ¯U ⊥
591
+ D (and UD) are independent of ¯V ⊥. After setting
592
+ ¯D
593
+
594
+ (I(l))T U T
595
+ D ¯V ⊥( ¯V ⊥)T UDI(l),
596
+ (30)
597
+ we have that the spectra of D and ¯D are statistically identical, i.e.
598
+ Sp(D) ≜ Sp((I(l))T ¯V ⊥( ¯V ⊥)T I(l)) ⇐⇒P Sp((I(l))T U T
599
+ D ¯V ⊥( ¯V ⊥)T UDI(l)) ≜ Sp( ¯D),
600
+ (31)
601
+ where ⇐⇒P stands for the statistical/probabilistic equivalence. Two facts enable the above statistical iden-
602
+ tity: 1) the spectrum of the projector ¯V ⊥( ¯V ⊥)T does not change under pre- and post-unitary multiplications
603
+ on both sides; and 2) the Haar structure of ¯V ⊥ remains preserved. Modulo zero eigenvalues, we then further
604
+ have
605
+ Sp((I(l))T U T
606
+ D ¯V ⊥( ¯V ⊥)T UDI(l)) ⇐⇒P\0 Sp( ¯V ⊥( ¯V ⊥)T UDI(l)(I(l))T U T
607
+ D) ⇐⇒ Sp( ¯V ⊥( ¯V ⊥)T ¯U ⊥
608
+ D( ¯U ⊥
609
+ D)T ), (32)
610
+ where, similarly as above, ⇐⇒P\0 stands for the statistical/probabilistic equivalence in the part of the
611
+ spectrum outside the zero eignevalues (introduced due to the non-square underlying matrices). Clearly, the
612
+ 8
613
+
614
+ key object of our interest below will be
615
+ ˜D
616
+
617
+ ¯V ⊥( ¯V ⊥)T ¯U ⊥
618
+ D( ¯U ⊥
619
+ D)T ,
620
+ (33)
621
+ where both ¯V ⊥ and ¯U ⊥
622
+ D are Haar distributed and independent of each other. After setting
623
+ V
624
+
625
+ ¯V ⊥( ¯V ⊥)T
626
+ U
627
+
628
+ ¯U ⊥
629
+ D( ¯U ⊥
630
+ D)T ,
631
+ (34)
632
+ we easily have from (33)
633
+ ˜D
634
+
635
+ VU.
636
+ (35)
637
+ The following lemma proven in [10] characterizes the G-transform of ˜D..
638
+ Lemma 1. ( [10]) Let ¯V ⊥ ∈ Rn×(n−k) and ¯U ⊥
639
+ D ∈ Rn×(n−k) be Haar distributed unitary bases of (n − k)-
640
+ dimensional subspaces of Rn. Let V and U be as in (34) and ˜D as in (35), i.e.
641
+ V
642
+
643
+ ¯V ⊥( ¯V ⊥)T
644
+ U
645
+
646
+ ¯U ⊥
647
+ D( ¯U ⊥
648
+ D)T
649
+ ˜D
650
+
651
+ VU.
652
+ (36)
653
+ In the large n linear regime, with β ≜ limn→∞ k
654
+ n, the G-transform of the spectral density of ˜D, f ˜
655
+ D(·), is
656
+
657
+ ˜
658
+ D(z) = z − (β + η) ±
659
+
660
+ (z − (β + η))2 + 4βη(z − 1)
661
+ 2(z2 − z)
662
+ .
663
+ (37)
664
+ 4.2
665
+ Asymmetric scenario – FPT analysis of the ℓ∗
666
+ 0 − ℓ∗
667
+ 1-equivalence
668
+ As in [10], we will again rely on the free probability theory. This time though things will be a bit more
669
+ complicated as we will be determining, so to say, the “joint spectrum” of λT
670
+ V λV λT
671
+ UλU. In other words, based
672
+ on Corollary 2 and (17), we have
673
+ ℓ∗
674
+ 0 − ℓ∗
675
+ 1 − −equivalence
676
+ ⇐⇒
677
+ λmax(λT
678
+ V λV λT
679
+ UλU) ≤ 1,
680
+ (38)
681
+ and consequently determining the upper edge of the “joint spectrum” of λT
682
+ V λV λT
683
+ UλU would be then sufficient
684
+ to establish ℓ∗
685
+ 0 − ℓ∗
686
+ 1-equivalence. We recall that in [10] we determined only the individual spectra λT
687
+ V λV and
688
+ λT
689
+ UλU (which in the worst case was sufficient to ultimately obtain corresponding C-inf ℓ∗
690
+ 1 PT). While the
691
+ calculations and supporting technicalities might on occasion be a bit heavy the overall methodology will be
692
+ fairly similar to what we presented in [10]. In fact, to make things easier to follow we will try to parallel the
693
+ presentation from [10] as much as possible. We start by recalling on Q1 and introducing Q⊥
694
+ 1 , and Q1
695
+ Q1
696
+
697
+ λT
698
+ V λV
699
+ Q⊥
700
+ 1
701
+
702
+ λT
703
+ UλU
704
+ Q1
705
+
706
+ Q1Q⊥
707
+ 1 .
708
+ (39)
709
+ We also recall on the definitions of Q and Q⊥ and introduce Q in the following way
710
+ Q
711
+
712
+
713
+ (I(l))T ¯V ⊥( ¯V ⊥)T I(l)�−1
714
+ − I
715
+ Q⊥
716
+
717
+
718
+ (I(l))T ¯U ⊥( ¯U ⊥)T I(l)�−1
719
+ − I
720
+ Q
721
+
722
+ QQ⊥.
723
+ (40)
724
+ 9
725
+
726
+ 4.2.1
727
+ The spectrum of Q1 ≜ λT
728
+ V λV λT
729
+ UλU – theoretical considerations
730
+ Since (Q1, Q) and (Q⊥
731
+ 1 , Q⊥) are statistically identical pairs, we will, for the time being, focus on only one of
732
+ them, say (Q1, Q). To that end, we first recall the statistical relations within the pairs
733
+ Q1
734
+
735
+ ΛT
736
+ V ΛV
737
+ Q
738
+
739
+
740
+ (I(l))T ¯V ⊥( ¯V ⊥)T I(l)�−1
741
+ − I = D−1 − I
742
+ Sp(Q1)
743
+ ⇐⇒\0
744
+ Sp(Q),
745
+ (41)
746
+ where ⇐⇒\0 stands for the spectral equivalence outside the zeros eigenvalues. We will also find it convenient
747
+ to work with the spectrum of Q. Later on we will make the necessary adjustments so that the results fully
748
+ fit the spectrum of Q1. To start things off we first note
749
+ GQ(z) = GD−1(z + 1).
750
+ (42)
751
+ To see that (42) indeed holds, we first observe that the spectral functions of Q and D−1, fQ(x) and fD−1(x),
752
+ can be connected in the following way
753
+ fQ(x) = fD−1(x + 1).
754
+ (43)
755
+ Then from (22) we have
756
+ GQ(z) =
757
+ � fQ(x)
758
+ z − x dx =
759
+ � fD−1(x + 1)
760
+ z − x
761
+ dx =
762
+
763
+ fD−1(x + 1)
764
+ z + 1 − (x + 1)dx =
765
+
766
+ fD−1(x)
767
+ z + 1 − xdx = GD−1(z + 1).
768
+ (44)
769
+ From (41) and (42) we also have
770
+ RQ(z) = RD−1(z) − 1.
771
+ (45)
772
+ Namely, (24) first gives
773
+ RQ(GQ(z)) = z −
774
+ 1
775
+ GQ(z),
776
+ (46)
777
+ and then
778
+ RQ(z)
779
+ =
780
+ G−1
781
+ Q (z) − 1
782
+ z
783
+ ⇐⇒
784
+ z
785
+ =
786
+ GQ
787
+
788
+ RQ(z) + 1
789
+ z
790
+
791
+ RD−1(z)
792
+ =
793
+ G−1
794
+ D−1(z) − 1
795
+ z
796
+ ⇐⇒
797
+ z
798
+ =
799
+ GD−1 �
800
+ RD−1(z) + 1
801
+ z
802
+
803
+ .
804
+ (47)
805
+ Combining (42) and (47) we obtain
806
+ GQ
807
+
808
+ RQ(z) + 1
809
+ z
810
+
811
+ =
812
+ GD−1 �
813
+ RD−1(z) + 1
814
+ z
815
+
816
+ ⇐⇒
817
+ GQ
818
+
819
+ RQ(z) + 1
820
+ z
821
+
822
+ =
823
+ GQ
824
+
825
+ RD−1(z) + 1
826
+ z − 1
827
+
828
+ ⇐⇒
829
+ RQ(z) + 1
830
+ z
831
+ =
832
+ RD−1(z) + 1
833
+ z − 1
834
+ ⇐⇒
835
+ RQ(z)
836
+ =
837
+ RD−1(z) − 1,
838
+ (48)
839
+ which is exactly (46). From (25) we further have
840
+ SQ(z) =
841
+ 1
842
+ RQ(zSQ(z)) =
843
+ 1
844
+ RD−1(zSQ(z)) − 1,
845
+ (49)
846
+ and
847
+ RD−1(zSQ(z)) =
848
+ 1
849
+ SQ(z) + 1.
850
+ (50)
851
+ 10
852
+
853
+ Relying further on (25) we also have
854
+ RD−1(zSQ(z)) =
855
+ 1
856
+ SD−1(zSQ(z)RD−1(zSQ(z)) =
857
+ 1
858
+ SD−1
859
+
860
+ zSQ(z)
861
+
862
+ 1
863
+ SQ(z) + 1
864
+ �� =
865
+ 1
866
+ SD−1 (z + zSQ(z)).
867
+ (51)
868
+ A combination of (50) and (51) gives a way to connect the S-transforms of D−1 and Q
869
+ 1
870
+ SD−1 (z + zSQ(z)) =
871
+ 1
872
+ SQ(z) + 1.
873
+ (52)
874
+ From (40) and the key FPT principles (26) we find
875
+ SQ(z) = SQ(z)SQ⊥(z) = (SQ(z))2,
876
+ (53)
877
+ where we used the fact that Q and Q⊥ are statistically identical and as such have the same S-transform.
878
+ One can now rewrite (52) with z → zRQ(z) and utilize (25) to obtain
879
+ 1
880
+ SD−1 (zRQ(z)+zRQ(z)SQ(zRQ(z)))
881
+ =
882
+ 1
883
+ SQ(zRQ(z)) + 1
884
+ ⇐⇒
885
+ 1
886
+ SD−1
887
+
888
+ zRQ(z)+zRQ(z)√
889
+ SQ(zRQ(z))
890
+
891
+ =
892
+ 1
893
+
894
+ SQ(zRQ(z)) + 1
895
+ ⇐⇒
896
+ 1
897
+ SD−1
898
+
899
+ zRQ(z)+z√
900
+ RQ(z)
901
+
902
+ =
903
+
904
+ RQ(z) + 1.
905
+ (54)
906
+ Replacing z → GQ(z), (54) can be further rewritten
907
+ 1
908
+ SD−1
909
+
910
+ zRQ(z)+z√
911
+ RQ(z)
912
+
913
+ =
914
+
915
+ RQ(z) + 1
916
+ ⇐⇒
917
+ 1
918
+ SD−1
919
+
920
+ GQ(z)RQ(GQ(z))+GQ(z)√
921
+ RQ(GQ(z))
922
+
923
+ =
924
+
925
+ RQ(GQ(z)) + 1.
926
+ (55)
927
+ From (24) we find
928
+ RQ(GQ(z)) +
929
+ 1
930
+ GQ(z)
931
+ =
932
+ z
933
+ ⇐⇒
934
+ GQ(z)RQ(GQ(z))
935
+ =
936
+ zGQ(z) − 1.
937
+ (56)
938
+ Combining further (55) and (56) we also have
939
+ 1
940
+ SD−1
941
+
942
+ GQ(z)RQ(GQ(z))+GQ(z)√
943
+ RQ(GQ(z))
944
+
945
+ =
946
+
947
+ RQ(GQ(z)) + 1
948
+ ⇐⇒
949
+ 1
950
+ SD−1
951
+
952
+ zGQ(z)−1+√
953
+ GQ(z)√
954
+ zGQ(z)−1
955
+
956
+ =
957
+
958
+ zGQ(z)−1
959
+ GQ(z)
960
+ + 1.
961
+ (57)
962
+ As in [12] one has for the connection between the S-transforms of the matrix and its inverse
963
+ SD(z) =
964
+ 1
965
+ SD−1(−1 − z).
966
+ (58)
967
+ Keeping (58) in mind, one can rewrite (57) in the following way
968
+ 1
969
+ SD−1
970
+
971
+ GQ(z)RQ(GQ(z))+GQ(z)√
972
+ RQ(GQ(z))
973
+
974
+ =
975
+
976
+ RQ(GQ(z)) + 1
977
+ ⇐⇒
978
+ SD
979
+
980
+ −zGQ(z) −
981
+
982
+ GQ(z)
983
+
984
+ zGQ(z) − 1
985
+
986
+ =
987
+
988
+ zGQ(z)−1
989
+ GQ(z)
990
+ + 1.
991
+ (59)
992
+ We will make a SD(z) − GD(z) connection below. however, before doing so, we will need to make certain
993
+ adjustments in the GD(z) transform itself.
994
+ i) Adjusting GD(z) for the difference between ˜D and ¯D
995
+ 11
996
+
997
+ We now briefly recall on the connection between ˜D, ¯D, and D. First, from (32) and (19) we have
998
+ ˜D
999
+ =
1000
+ ¯V ⊥( ¯V ⊥)T ¯U ⊥
1001
+ D( ¯U ⊥
1002
+ D)T
1003
+ ¯D
1004
+ =
1005
+ ( ¯U ⊥
1006
+ D)T ¯V ⊥( ¯V ⊥)T ¯U ⊥
1007
+ D.
1008
+ (60)
1009
+ The spectra of ˜D and ¯D are modulo scalings practically identical. Since ¯D has all the eigenvalues that ˜D
1010
+ has with l = ηn zero eigenvalues removed one can connect their G-transforms in the following way.
1011
+ G ¯
1012
+ D(z)
1013
+ =
1014
+ 1
1015
+ 1 − η
1016
+
1017
+ G ˜
1018
+ D(z) − η
1019
+ z
1020
+
1021
+ .
1022
+ (61)
1023
+ To see that (61) is indeed true we first connect the spectral pdfs of ˜D and ¯D
1024
+ f ¯
1025
+ D(x)
1026
+ =
1027
+ 1
1028
+ 1 − η (f ˜
1029
+ D(x) − ηδ(x)) .
1030
+ (62)
1031
+ Then from (22) we have
1032
+ G ¯
1033
+ D(x) =
1034
+ � f ¯
1035
+ D(x)
1036
+ z − x dx =
1037
+ 1
1038
+ 1 − η
1039
+ �� f ˜
1040
+ D(x)
1041
+ z − x dx − η
1042
+
1043
+ δ(x)
1044
+ z − xdx
1045
+
1046
+ =
1047
+ 1
1048
+ 1 − η
1049
+
1050
+ G ˜
1051
+ D(z) − η
1052
+ z
1053
+
1054
+ .
1055
+ (63)
1056
+ Connecting beginning and end in (63) we obtain (61).
1057
+ ii) Adjusting GD(z) for the difference between Q1 and Q
1058
+ We recall that Q1 has the same eigenvalues as Q minus n − l − k zero eigenvalues (when n − l − k ≤ 0 that
1059
+ means that Q1 has all the eigenvalues of Q plus |n−l−k| zero eigenvalues). To account for this difference we
1060
+ find it useful to introduce a matrix D1 obtained by removing/adding |n − (l + k)| ones into the spectrum of
1061
+ D. As these added ones are inversion invariant they remain in the spectrum after the inversion. This means
1062
+ that after the inversion of D1 and subtraction of the identity matrix they become zeros and basically have
1063
+ an effect on Q as if |n − (l + k)| zeros were added or removed which is exactly what we need to account for
1064
+ the difference between Q1 and Q. To put everything in the right mathematical context, let D1 be a matrix
1065
+ with the Haar distributed eigen-space basis and the spectral function defined int he following way
1066
+ fD1 =
1067
+ 1
1068
+ 1 − η − (1 − (β + η)) (f ˜
1069
+ D − ηδ(x) − (1 − (β + η))δ(x − 1)) ,
1070
+ (64)
1071
+ where we have now taken into the account the above mentioned adjusting between ˜D and ¯D ( ¯D and D have
1072
+ identical spectral functions). Utilizing again (22) we similarly to (63) have
1073
+ GD1(z) =
1074
+ 1
1075
+ 1 − η − (1 − β + η)
1076
+
1077
+ G ˜
1078
+ D(z) − η
1079
+ z − 1 − (β + η)
1080
+ z − 1
1081
+
1082
+ .
1083
+ (65)
1084
+ Recalling once again on (24) we have
1085
+ RD1(GD1(z)) +
1086
+ 1
1087
+ GD1(z)
1088
+ =
1089
+ z
1090
+ ⇐⇒
1091
+ RD1(z) + 1
1092
+ z
1093
+ =
1094
+ G−1
1095
+ D1(z).
1096
+ (66)
1097
+ After taking z → RD1(z) + 1
1098
+ z we can rewrite (65) as
1099
+ GD1
1100
+
1101
+ RD1(z) + 1
1102
+ z
1103
+
1104
+ = 1
1105
+ β
1106
+
1107
+ G ˜
1108
+ D
1109
+
1110
+ RD1(z) + 1
1111
+ z
1112
+
1113
+
1114
+ η
1115
+ RD1(z) + 1
1116
+ z
1117
+
1118
+ 1 − (β + η)
1119
+ RD1(z) + 1
1120
+ z − 1
1121
+
1122
+ ,
1123
+ (67)
1124
+ and after utilizing (66)
1125
+ z = 1
1126
+ β
1127
+
1128
+ G ˜
1129
+ D
1130
+
1131
+ RD1(z) + 1
1132
+ z
1133
+
1134
+
1135
+ η
1136
+ RD1(z) + 1
1137
+ z
1138
+
1139
+ 1 − (β + η)
1140
+ RD1(z) + 1
1141
+ z − 1
1142
+
1143
+ .
1144
+ (68)
1145
+ 12
1146
+
1147
+ After another replacement, z → zSD1(z), (68) becomes
1148
+ zSD1(z) = 1
1149
+ β
1150
+
1151
+ G ˜
1152
+ D
1153
+
1154
+ RD1(zSD1(z)) +
1155
+ 1
1156
+ zSD1(z)
1157
+
1158
+
1159
+ η
1160
+ RD1(zSD1(z)) +
1161
+ 1
1162
+ zSD1 (z)
1163
+
1164
+ 1 − (β + η)
1165
+ RD1(zSD1(z)) +
1166
+ 1
1167
+ zSD1 (z) − 1
1168
+
1169
+ .
1170
+ (69)
1171
+ Using (25) we from (69) further find
1172
+ zSD1(z) = 1
1173
+ β
1174
+
1175
+ G ˜
1176
+ D
1177
+
1178
+ 1
1179
+ SD1(z) +
1180
+ 1
1181
+ zSD1(z)
1182
+
1183
+
1184
+ η
1185
+ 1
1186
+ SD1 (z) +
1187
+ 1
1188
+ zSD1 (z)
1189
+
1190
+ 1 − (β + η)
1191
+ 1
1192
+ SD1(z) +
1193
+ 1
1194
+ zSD1(z) − 1
1195
+
1196
+ ,
1197
+ (70)
1198
+ and
1199
+ zSD1(z) = 1
1200
+ β
1201
+
1202
+ G ˜
1203
+ D
1204
+ � z + 1
1205
+ zSD1(z)
1206
+
1207
+
1208
+ η
1209
+ z+1
1210
+ zSD1 (z)
1211
+ − 1 − (β + η)
1212
+ z+1
1213
+ zSD1(z) − 1
1214
+
1215
+ .
1216
+ (71)
1217
+ Taking D → D1 in (41) and correspondingly denoting Q → Q1 and Q → Q1, one can repeat all the steps
1218
+ between (41) and (59) to arrive at the following
1219
+ SD1
1220
+
1221
+ −zGQ1(z) −
1222
+
1223
+ GQ1(z)
1224
+
1225
+ zGQ1(z) − 1
1226
+
1227
+ =
1228
+
1229
+ zGQ1(z) − 1
1230
+ GQ1(z)
1231
+ + 1.
1232
+ (72)
1233
+ Setting
1234
+ z1(z)
1235
+
1236
+ −zGQ1(z) −
1237
+
1238
+ GQ1(z)
1239
+
1240
+ zGQ1(z) − 1
1241
+ y(z)
1242
+
1243
+ z1(z) + 1
1244
+ z1(z)SD1(z1(z)),
1245
+ (73)
1246
+ one has from (72)
1247
+ SD1(z1(z))
1248
+ =
1249
+
1250
+ zGQ1(z) − 1
1251
+ GQ1(z)
1252
+ + 1.
1253
+ (74)
1254
+ After taking z → z1 and rewriting (71) one finally obtains
1255
+ z1(z) + 1
1256
+ y(z)
1257
+ = 1
1258
+ β
1259
+
1260
+ G ˜
1261
+ D(y(z)) −
1262
+ η
1263
+ y(z) − 1 − (β + η)
1264
+ y(z) − 1
1265
+
1266
+ .
1267
+ (75)
1268
+ We summarize the above results in the following lemma.
1269
+ Lemma 2. Let Q1 be as in (39). Then its G-transform, GQ1(z), satisfies
1270
+ z1(z) + 1
1271
+ y(z)
1272
+ = 1
1273
+ β
1274
+
1275
+ G ˜
1276
+ D(y(z)) −
1277
+ η
1278
+ y(z) − 1 − (β + η)
1279
+ y(z) − 1
1280
+
1281
+ .
1282
+ (76)
1283
+ with z1(z) and y(z) as in (73), SD1(z1(z)) as in (74), and G ¯
1284
+ D(y(z)) as in Lemma 1.
1285
+ A combination of Lemma 1 (where G ˜
1286
+ D(·) is explicitly given) and (73)-(75) is then sufficient to determine
1287
+ GQ1(z) . Utilizing (23) then enables one to fully determine the spectral distribution. This is a generic
1288
+ procedure that in principle works. Below we will move things a step further and provide a more detailed
1289
+ analysis of the edges of the spectrum as they play a critical role in the ℓ∗
1290
+ 0 − ℓ∗
1291
+ 1-equivalence. It will turn
1292
+ out that one can provide their a sufficiently explicit characterization so that the explicit closed form for the
1293
+ corresponding C-inf phase transitions can again be obtained. Later on we will return to the above described
1294
+ procedure for determining the entire spectrum of Q1 and show what type of results such a procedure actually
1295
+ produces.
1296
+ 13
1297
+
1298
+ 4.2.2
1299
+ Explicit characterization of Q1’s spectral edges
1300
+ As we have seen earlier, the upper edge of the spectrum of Q (or Q1), λmax(Q) = λmax(Q1) is directly
1301
+ related to the success of the ℓ∗
1302
+ 1-minimization heuristic in causal inference. More precisely, as Corollary 2
1303
+ states, one will have the ℓ∗
1304
+ 0 − ℓ∗
1305
+ 1-equivalence if and only if λmax(Q) = λmax(Q1) ≤ 1. Clearly, an explicit
1306
+ characterization of λmax(Q) = λmax(Q1) will be sufficient to explicitly characterize the ℓ∗
1307
+ 0 − ℓ∗
1308
+ 1-equivalence.
1309
+ That will then be enough to conclude when ℓ∗
1310
+ 1 can be used reliable to handle the casual inference.
1311
+ To provide an explicit characterization of λmax(Q) = λmax(Q1) ≤ 1 we rely on the results that we
1312
+ presented in the previous section. We start by observing that the spectral function of Q1, fQ1(x), can be
1313
+ obtained by utilizing (23) and the above discussed GQ1(z) transform. Moreover, at the edge of the spectrum
1314
+ GQ1(z) should be real (the edge of the spectrum is actually the breaking point where the GQ1(z) becomes
1315
+ complex, i.e. starts having a nonzero imaginary part). That basically means that at the edge of the spectrum
1316
+ one should have (76) satisfied for a real GQ1(z). Moreover, since our targeted edge of the spectrum is one
1317
+ that means that (76) needs to be satisfied for a real GQ1(1). Rewriting (73)-(75) for z = 1 gives
1318
+ z1(1)
1319
+ =
1320
+ −GQ1(1) −
1321
+
1322
+ GQ1(1)
1323
+
1324
+ GQ1(1) − 1
1325
+ y(1)
1326
+
1327
+ z1(1) + 1
1328
+ z1(1)SD1(z1(1)),
1329
+ (77)
1330
+ and
1331
+ SD1(z1(1))
1332
+ =
1333
+
1334
+ GQ1(1) − 1
1335
+ GQ1(1)
1336
+ + 1 = − z1(1)
1337
+ GQ1(1),
1338
+ (78)
1339
+ and
1340
+ z1(1) + 1
1341
+ y(1)
1342
+ = 1
1343
+ β
1344
+
1345
+ G ˜
1346
+ D(y(1)) −
1347
+ η
1348
+ y(1) − 1 − (β + η)
1349
+ y(1) − 1
1350
+
1351
+ .
1352
+ (79)
1353
+ From (77) one further finds
1354
+ GQ1(1)
1355
+ =
1356
+ − (z1(1))2
1357
+ 1 + 2z1(1)
1358
+ y(1)
1359
+ =
1360
+ −(z1(1) + 1)GQ1(1)
1361
+ (z1(1))2
1362
+ = z1(1) + 1
1363
+ 1 + 2z1(1).
1364
+ (80)
1365
+ The second equality then also gives
1366
+ z1(1)
1367
+ =
1368
+ y(1) − 1
1369
+ 1 − 2y(1),
1370
+ (81)
1371
+ and
1372
+ z1(1) + 1
1373
+ =
1374
+ y(1)
1375
+ 2y(1) − 1.
1376
+ (82)
1377
+ Plugging (82) into (79) one has
1378
+ 1
1379
+ 2y(1) − 1 = 1
1380
+ β
1381
+
1382
+ G ˜
1383
+ D(y(1)) −
1384
+ η
1385
+ y(1) − 1 − (β + η)
1386
+ y(1) − 1
1387
+
1388
+ ,
1389
+ (83)
1390
+ or
1391
+ ζ1(y) ≜ −
1392
+ 1
1393
+ 2y − 1 + 1
1394
+ β
1395
+
1396
+ G ˜
1397
+ D(y) − η
1398
+ y − 1 − (β + η)
1399
+ y − 1
1400
+
1401
+ = 0.
1402
+ (84)
1403
+ Utilizing G ˜
1404
+ D(z) (with the “−” sign as the lower edge in the bulk of the spectrum of ˜D corresponds to the
1405
+ 14
1406
+
1407
+ upper edge in the spectrum of Q) from Lemma 1 we further have
1408
+ ζ1(y) = −
1409
+ 1
1410
+ 2y − 1 +
1411
+ 2β − 1
1412
+ 2β(y − 1) +
1413
+ 1
1414
+ 2βy(y − 1)
1415
+
1416
+ −β + η −
1417
+
1418
+ (y − (β + η))2 + 4βη(y − 1)
1419
+
1420
+ = 0,
1421
+ (85)
1422
+ and
1423
+ ζ1(y)
1424
+ =
1425
+ −2βy(y − 1) + y(2β − 1)(2y − 1) + (2y − 1)
1426
+
1427
+ −β + η −
1428
+
1429
+ (y − (β + η))2 + 4βη(y − 1)
1430
+
1431
+ 2βy(y − 1)(2y − 1)
1432
+ =
1433
+ 2(β − 1)y2 + (1 − 2β + 2η)y + β − η − (2y − 1)
1434
+
1435
+ (y − (β + η))2 + 4βη(y − 1)
1436
+ 2βy(y − 1)(2y − 1)
1437
+ .
1438
+ (86)
1439
+ Setting
1440
+ ζ2(y)
1441
+
1442
+ 2(β − 1)y2 + (1 − 2β + 2η)y + β − η − (2y − 1)
1443
+
1444
+ (y − (β + η))2 + 4βη(y − 1)
1445
+ ζ(y)
1446
+
1447
+ (2(β − 1)y2 + (1 − 2β + 2η)y + β − η)2 − ((2y − 1)
1448
+
1449
+ (y − (β + η))2 + 4βη(y − 1))2,
1450
+ (87)
1451
+ we easily have
1452
+ ζ1(y) = 0
1453
+ ⇐⇒
1454
+ ζ2(y) = 0
1455
+ ⇐⇒
1456
+ ζ(y) = 0.
1457
+ (88)
1458
+ We therefore below focus on ζ(y). After squaring and grouping the terms we have
1459
+ ζ(y) = 4β(c3y4 + c2y3 + c1y2 + c0y + c00),
1460
+ (89)
1461
+ with
1462
+ c3
1463
+ =
1464
+ β − 2
1465
+ c2
1466
+ =
1467
+ 5 − 2β − 2η
1468
+ c1
1469
+ =
1470
+ β − 4 + 3η
1471
+ c0
1472
+ =
1473
+ 1 − η
1474
+ c00
1475
+ =
1476
+ 0.
1477
+ (90)
1478
+ From (89) we then also have
1479
+ ζ(y) = 4βy(c3y3 + c2y2 + c1y + c0).
1480
+ (91)
1481
+ Since we are interested in an edge or a breaking point of the spectrum ζ(y) should touch zero for certain y
1482
+ which means that it should have a stationary point at such y. To find such a stationary point we take the
1483
+ derivative
1484
+ d
1485
+
1486
+ ζ(y)
1487
+ 4βy
1488
+
1489
+ dy
1490
+ = 3c3y2 + 2c2y + c1 = 0.
1491
+ (92)
1492
+ Solving over y gives
1493
+ y = −c2 +
1494
+
1495
+ c2
1496
+ 2 − 3c1c3
1497
+ 3c3
1498
+ .
1499
+ (93)
1500
+ Setting
1501
+ r ≜ c2
1502
+ 2 − 3c1c3 = 1 + β2 + 4η2 − 2β − 2η − βη,
1503
+ (94)
1504
+ 15
1505
+
1506
+ we have from (93)
1507
+ yopt = −c2 + √r
1508
+ 3c3
1509
+ .
1510
+ (95)
1511
+ First we set
1512
+ ζ3(y) ≜ c3y3 + c2y2 + c1y + c0.
1513
+ (96)
1514
+ Clearly, from (91) one has
1515
+ ζ(y) = 4βyζ3(y).
1516
+ (97)
1517
+ Then we plug the value for yopt from (95) and after a bit of algebraic transformations obtain
1518
+ ζ3(yopt) = −2(√r)3 − c3
1519
+ 2 + 3rc2 + 27c2
1520
+ 3c0.
1521
+ (98)
1522
+ From (90) we first have
1523
+ c2
1524
+ =
1525
+ −2c3 − 1 + 2c0
1526
+ c1
1527
+ =
1528
+ c3 − 3c0 + 1,
1529
+ (99)
1530
+ and then from (94)
1531
+ r = c2
1532
+ 3 + 1 + 4c2
1533
+ 0 + c3 − 4c0 + c0c3.
1534
+ (100)
1535
+ Combining (98)-(100) after a bit of additional algebraic transformations gives
1536
+ ζ3(yopt) = −2(√r)3 + 2c3
1537
+ 3 − 3c3 + 6c3c2
1538
+ 0 + 3c2
1539
+ 3 + 3c3c0 + 3c0c2
1540
+ 3 − 2 − 24c2
1541
+ 0 + 12c0 + 16c3
1542
+ 0.
1543
+ (101)
1544
+ Below we show that
1545
+ c2
1546
+ 3 = −1 − 2c3 + 4c0 − 4c2
1547
+ 0
1548
+ ⇐⇒
1549
+ ζ3(yopt) = 0.
1550
+ (102)
1551
+ We first use (102) to systematically linearize ζ3(yopt) in c3 and obtain
1552
+ ζ3(yopt) = −2(√r)3 + (−3c3 + 5c3c0 − 2c3c2
1553
+ 0 − 1 − 8c2
1554
+ 0 + 5c0 + 4c3
1555
+ 0).
1556
+ (103)
1557
+ Transforming further we also have
1558
+ ζ3(yopt)
1559
+ =
1560
+ −2(√r)3 + (−3c3 + 5c3c0 − 2c3c2
1561
+ 0 − 1 − 8c2
1562
+ 0 + 5c0 + 4c3
1563
+ 0)
1564
+ =
1565
+ −2(√r)3 + (c3(c0 − 1)(3 − 2c0) + (−4c0 + 1 + 4c2
1566
+ 0)(c0 − 1))
1567
+ =
1568
+ 2(√c3
1569
+
1570
+ c0 − 1)3 + (c3(c0 − 1)(3 − 2c0) + (−4c0 + 1 + 4c2
1571
+ 0)(c0 − 1))
1572
+ =
1573
+
1574
+ 2(√c3)3√
1575
+ c0 − 1 + (c3(3 − 2c0) + (−4c0 + 1 + 4c2
1576
+ 0))
1577
+
1578
+ (c0 − 1).
1579
+ (104)
1580
+ where the third equality follows after noting that with condition (102) in place r in 100) becomes
1581
+ c2
1582
+ 3 = −1 − 2c3 + 4c0 − 4c2
1583
+ 0
1584
+ =⇒
1585
+ r = −c3 + c0c3.
1586
+ (105)
1587
+ We find it useful to rewrite (104) as
1588
+ ζ3(yopt)
1589
+ =
1590
+ ζ(1)
1591
+ 3 (yopt) + ζ(2)
1592
+ 3 (yopt),
1593
+ (106)
1594
+ where
1595
+ ζ(1)
1596
+ 3 (yopt)
1597
+
1598
+ 2(√c3)3√
1599
+ c0 − 1
1600
+ ζ(2)
1601
+ 3 (yopt)
1602
+
1603
+ c3(3 − 2c0) + (−4c0 + 1 + 4c2
1604
+ 0).
1605
+ (107)
1606
+ 16
1607
+
1608
+ We then look at the squared values of these quantities. First we start with ζ(1)
1609
+ 3 (yopt)
1610
+ (ζ(1)
1611
+ 3 (yopt))2 = 4c3
1612
+ 3(c0 − 1),
1613
+ (108)
1614
+ and utilize the condition (102) to systematically linearize in c3. First we remove the cubic c3 term to arrive
1615
+ at the following
1616
+ (ζ(1)
1617
+ 3 (yopt))2
1618
+ =
1619
+ 4c3
1620
+ 3(c0 − 1)
1621
+ =
1622
+ 4c3(−1 − 2c3 + 4c0 − 4c2
1623
+ 0)(c0 − 1)
1624
+ =
1625
+ −8c2
1626
+ 3c0 + 32c3c2
1627
+ 0 − 16c3c3
1628
+ 0 − 8 − 12c3 + 32c0 − 32c2
1629
+ 0 − 20c3c0,
1630
+ (109)
1631
+ and apply the same procedure again to arrive at a fully linearized form
1632
+ (ζ(1)
1633
+ 3 (yopt))2 = 4(c3((−2c2
1634
+ 0 + c0 + 1)(2c0 − 3)) − 2(1 − c0)(2c0 − 1)2).
1635
+ (110)
1636
+ Then we turn to ζ(2)
1637
+ 3 (yopt)
1638
+ (ζ(2)
1639
+ 3 (yopt))2 = (c3(3 − 2c0) + (−4c0 + 1 + 4c2
1640
+ 0))2,
1641
+ (111)
1642
+ and again utilize the condition (102) to linearize in c3. This time the procedure is simpler as there is only a
1643
+ quadratic term in c3 and there is no need to apply the procedure from above in two steps. Instead only one
1644
+ step suffices and we have
1645
+ (ζ(2)
1646
+ 3 (yopt))2
1647
+ =
1648
+ (c3(3 − 2c0) + (−4c0 + 1 + 4c2
1649
+ 0))2
1650
+ =
1651
+ c2
1652
+ 3(3 − 2c0)2 + (−4c0 + 1 + 4c2
1653
+ 0)2 + 2(−4c0 + 1 + 4c2
1654
+ 0)c3(3 − 2c0)
1655
+ =
1656
+ (−1 − 2c3 + 4c0 − 4c2
1657
+ 0)(3 − 2c0)2 + (−4c0 + 1 + 4c2
1658
+ 0)2 + 2(−4c0 + 1 + 4c2
1659
+ 0)c3(3 − 2c0)
1660
+ =
1661
+ −2c3(9 − 12c0 + 4c2
1662
+ 0 − (−4c0 + 1 + 4c2
1663
+ 0)(3 − 2c0)) − (−4c0 + 1 + 4c2
1664
+ 0)(8 − 8c0)
1665
+ =
1666
+ 4(c3((−2c2
1667
+ 0 + c0 + 1)(2c0 − 3)) − 2(1 − c0)(2c0 − 1)2).
1668
+ (112)
1669
+ Comparing (110) and (112) we have
1670
+ (ζ(1)
1671
+ 3 (yopt))2
1672
+ =
1673
+ (ζ(2)
1674
+ 3 (yopt))2.
1675
+ (113)
1676
+ Now we will show that one also has (ζ(1)
1677
+ 3 (yopt))2 = −(ζ(2)
1678
+ 3 (yopt))2. We again look at the condition in (102)
1679
+ and replace the values for c0 and c3 from (91) to obtain
1680
+ c2
1681
+ 3
1682
+ =
1683
+ −1 − 2c3 + 4c0 − 4c2
1684
+ 0
1685
+ ⇐⇒
1686
+ (β − 2)2
1687
+ =
1688
+ −1 − 2(β − 2) + 4(1 − η) − 4(1 − η)2
1689
+ ⇐⇒
1690
+ (β − 2)2 + 2(β − 2) + 1
1691
+ =
1692
+ 4(1 − η) − 4(1 − η)2
1693
+ ⇐⇒
1694
+ (β − 2 + 1)2
1695
+ =
1696
+ 4η(1 − η)
1697
+ ⇐⇒
1698
+ β
1699
+ =
1700
+ 1 − 2
1701
+
1702
+ η(1 − η).
1703
+ (114)
1704
+ From (107) we then also have
1705
+ ζ(1)
1706
+ 3 (yopt)
1707
+
1708
+ 2(√c3)3√c0 − 1 = 2(
1709
+
1710
+ β − 2)3√−η = 2(2 − β)
1711
+
1712
+ η(2 − β) ≥ 0.
1713
+ (115)
1714
+ Similarly, we have
1715
+ ζ(2)
1716
+ 3 (yopt)
1717
+
1718
+ c3(3 − 2c0) + (−4c0 + 1 + 4c2
1719
+ 0)
1720
+ =
1721
+ (β − 2)(1 + 2η) + (1 − 2η)2
1722
+ =
1723
+ (−1 − 2
1724
+
1725
+ η(1 − η))(1 + 2η) + (1 − 2η)2
1726
+ =
1727
+ −2
1728
+
1729
+ η(1 − η)(1 + 2η) − 6η + 4η2
1730
+ 17
1731
+
1732
+
1733
+ −2
1734
+
1735
+ η(1 − η)(1 + 2η) − 6η + 4η
1736
+ =
1737
+ −2
1738
+
1739
+ η(1 − η)(1 + 2η) − 2η
1740
+
1741
+ 0.
1742
+ (116)
1743
+ A combination of (106), (107), (113), (115), and (116) finally gives
1744
+ (ζ(1)
1745
+ 3 (yopt))2
1746
+ (113)
1747
+ =
1748
+ (ζ(2)
1749
+ 3 (yopt))2
1750
+ (115),(116)
1751
+ ⇐⇒
1752
+ ζ(1)
1753
+ 3 (yopt)
1754
+ =
1755
+ −ζ(2)
1756
+ 3 (yopt)
1757
+ ⇐⇒
1758
+ ζ(1)
1759
+ 3 (yopt) + ζ(2)
1760
+ 3 (yopt)
1761
+ =
1762
+ 0
1763
+ (106)
1764
+ ⇐⇒
1765
+ ζ3(yopt)
1766
+ =
1767
+ 0.
1768
+ (117)
1769
+ Moreover, a combination of (102), (114), and (117) gives
1770
+ β = 1 − 2
1771
+
1772
+ η(1 − η)
1773
+ ⇐⇒
1774
+ c2
1775
+ 3 = −1 − 2c3 + 4c0 − 4c2
1776
+ 0
1777
+ ⇐⇒
1778
+ ζ3(yopt) = 0.
1779
+ (118)
1780
+ After combining (97) and (118) one then also has
1781
+ β = 1 − 2
1782
+
1783
+ η(1 − η)
1784
+ ⇐⇒
1785
+ c2
1786
+ 3 = −1 − 2c3 + 4c0 − 4c2
1787
+ 0
1788
+ ⇐⇒
1789
+ ζ3(yopt) = 0
1790
+ ⇐⇒
1791
+ ζ(yopt) = 0. (119)
1792
+ From (88) one then has that for yopt
1793
+ ζ1(yopt) = ζ2(yopt) = 0,
1794
+ (120)
1795
+ which means that y = yopt is indeed a choice for y that ensures that functional equation used to determine
1796
+ GQ1(z) is satisfied. Moreover, since the derivative condition is met as well, i.e. since ζ(yopt) = 0, one has
1797
+ that not only is yopt a point where ζ(y) crosses zero, it is actually a point where it touches zero. That is
1798
+ exactly what is needed to determine an edge of the spectrum. Since we operated using the “−” sign in the
1799
+ definition of G ˜
1800
+ D(z) that means (based on the considerations from [10]) that we have determined the lower
1801
+ edge in the corresponding spectrum of ˜D (or any of ¯D and D) which after the inversion means that we have
1802
+ determined the upper edge in the spectrum of Q1 or Q.
1803
+ One can even explicitly determine yopt. From (90), (95), (99), and (105) we obtain
1804
+ yopt = −c2 + √r
1805
+ 3c3
1806
+ = −(5 − 2β − 2η) +
1807
+
1808
+ η(2 − β)
1809
+ 3(β − 2)
1810
+ .
1811
+ (121)
1812
+ In Figure 3 we show yopt as a function of η. The whole mechanism of “touching zero” as β decreases is
1813
+ shown in Figure for η = 0.9. As can be seen from the figure, for β > 1−2
1814
+
1815
+ η(1 − η) = 0.4 ζ1(y) remains below
1816
+ zero one therefore can not be a part of the spectrum. On the other hand, for β ≤ 1−2
1817
+
1818
+ η(1 − η) = 0.4 ζ1(y)
1819
+ does intersect zero line which implies that one is now in the spectrum (there is y = y(11) and consequently
1820
+ a real GQ1(1) such that ζ1(y) = 0). The borderline or the breaking point happens exactly when the ζ1(y)
1821
+ curve touches the zero line. As figure indicates that happens for y = yopt = 0.25, exactly as the theory
1822
+ predicts.
1823
+ We summarize the above results in the following lemma.
1824
+ Lemma 3. Assume the setup of Lemmas 1 and 2 with Q1 as in (39). Then we have for the upper edge of
1825
+ the Q1’s spectrum
1826
+ β = 1 − 2
1827
+
1828
+ η(1 − η)
1829
+ ⇐⇒
1830
+ λmax(Q1) = 1.
1831
+ (122)
1832
+ Moreover,
1833
+ β ≤ 1 − 2
1834
+
1835
+ η(1 − η)
1836
+ ⇐⇒
1837
+ λmax(Q1) ≤ 1.
1838
+ (123)
1839
+ Proof. Follows from the above discussion.
1840
+ 18
1841
+
1842
+ η
1843
+ 0.5
1844
+ 0.55
1845
+ 0.6
1846
+ 0.65
1847
+ 0.7
1848
+ 0.75
1849
+ 0.8
1850
+ 0.85
1851
+ 0.9
1852
+ 0.95
1853
+ 1
1854
+ yopt
1855
+ 0
1856
+ 0.05
1857
+ 0.1
1858
+ 0.15
1859
+ 0.2
1860
+ 0.25
1861
+ 0.3
1862
+ 0.35
1863
+ 0.4
1864
+ 0.45
1865
+ 0.5
1866
+ yopt as a function of η
1867
+ yopt =
1868
+ √1−η
1869
+ √η−√1−η
1870
+ η = 0.9
1871
+ =⇒
1872
+ yopt =
1873
+ √1−η
1874
+ √η+√1−η = 0.25
1875
+ Figure 3: yopt as a function of η
1876
+ 4.2.3
1877
+ The spectrum of Q1 ≜ λT
1878
+ V λV λT
1879
+ UλU – practical evaluations
1880
+ Now that we have fully characterized the upper edge of the Q1’s spectrum we can return to the consideration
1881
+ of the entire spectrum. Relying on the above presented machinery we can establish the following lemma.
1882
+ Lemma 4. Assume the setup of Lemmas 1 and 2 with Q1 as in (39). Let GQ1(z) be the solution of the
1883
+ following system of equations:
1884
+ y(z)
1885
+ =
1886
+
1887
+ zGQ1(z) − 1
1888
+
1889
+ zGQ1(z) − 1 + z
1890
+
1891
+ GQ1(z)
1892
+ G ˜
1893
+ D(y(z))
1894
+ =
1895
+ y(z) − (β + η) ±
1896
+
1897
+ (y(z) − (β + η))2 + 4βη(y(z) − 1)
1898
+ 2((y(z))2 − y(z))
1899
+ 1
1900
+ β
1901
+
1902
+ G ˜
1903
+ D(y(z)) −
1904
+ η
1905
+ y(z) − 1 − (β + η)
1906
+ y(z) − 1
1907
+
1908
+ =
1909
+ −(
1910
+
1911
+ zGQ1(z) − 1 +
1912
+
1913
+ GQ1(z))(
1914
+
1915
+ zGQ1(z) − 1 + z
1916
+
1917
+ GQ1(z)).
1918
+ (124)
1919
+ Then the spectral function of Q1, fQ1(x), is obtained as
1920
+ fQ1(x) = − lim
1921
+ ǫ→0+
1922
+ imag(GQ1(x + iǫ))
1923
+ π
1924
+ .
1925
+ (125)
1926
+ Proof. Follows from Lemma 2 through a combination of the results of Lemma 1 (where G ˜
1927
+ D(·) is explicitly
1928
+ given) and (73)-(75). The following two sequences of identities are then sufficient to prove the lemma
1929
+ y(z)
1930
+ =
1931
+ z1(z) + 1
1932
+ z1(z)SD(z1(z))
1933
+ =
1934
+ ((−zGQ1(z) −
1935
+
1936
+ GQ1(z)
1937
+
1938
+ zGQ1(z) − 1) + 1)
1939
+
1940
+ GQ1(z)
1941
+ (−zGQ1(z) −
1942
+
1943
+ GQ1(z)
1944
+
1945
+ zGQ1(z) − 1)(
1946
+
1947
+ zGQ1(z) − 1 +
1948
+
1949
+ GQ1(z))
1950
+ =
1951
+
1952
+ zGQ1(z) − 1
1953
+
1954
+ zGQ1(z) − 1 + z
1955
+
1956
+ GQ1(z)
1957
+ ,
1958
+ (126)
1959
+ 19
1960
+
1961
+ y
1962
+ 0
1963
+ 0.05
1964
+ 0.1
1965
+ 0.15
1966
+ 0.2
1967
+ 0.25
1968
+ ζ1(y)
1969
+ -0.25
1970
+ -0.2
1971
+ -0.15
1972
+ -0.1
1973
+ -0.05
1974
+ 0
1975
+ 0.05
1976
+ ζ1(y) as a function of y; η = 0.9
1977
+ β = 0.41
1978
+ β = 0.4
1979
+ β = 0.39
1980
+ β = 0.4, η = 0.9
1981
+ =⇒
1982
+ yopt =
1983
+ √1−η
1984
+ √η+√1−η = 0.25
1985
+ Figure 4: ζ1y as a function of y
1986
+ and
1987
+ z1(z) + 1
1988
+ y(z)
1989
+ =
1990
+ SD(z1(z))
1991
+ z1(z)
1992
+ =
1993
+ (−zGQ1(z) −
1994
+
1995
+ GQ1(z)
1996
+
1997
+ zGQ1(z) − 1)(
1998
+
1999
+ zGQ1(z) − 1 +
2000
+
2001
+ GQ1(z))
2002
+
2003
+ GQ1(z)
2004
+ =
2005
+ (
2006
+
2007
+ zGQ1(z) − 1 + z
2008
+
2009
+ GQ1(z))(
2010
+
2011
+ zGQ1(z) − 1 +
2012
+
2013
+ GQ1(z)).
2014
+ (127)
2015
+ In Figure 5 we show the entire spectrum of fQ1(x). We chose β = 0.4 and η = 0.9 and ran the experiments
2016
+ with n = 4000. As can be seen from the figure, the obtained numerical results are in a strong agreement
2017
+ with what the theory predicts.
2018
+ 4.2.4
2019
+ ℓ∗
2020
+ 0 − ℓ∗
2021
+ 1-equivalence via the spectral limit – asymmetric scenario
2022
+ From Corollary 2, (17), and (38) one has in the asymmetric scenario
2023
+ ℓ∗
2024
+ 0 − ℓ∗
2025
+ 1 − equivalence
2026
+ ⇐⇒
2027
+ λmax(λT
2028
+ V λV λT
2029
+ UλU) ≤ 1
2030
+ ⇐⇒
2031
+ λmax(Q1) ≤ 1.
2032
+ (128)
2033
+ From (123) and (128) we finally have
2034
+ ℓ∗
2035
+ 0 − ℓ∗
2036
+ 1 − equivalence
2037
+ ⇐⇒
2038
+ β ≤ 1 − 2
2039
+
2040
+ η − η2.
2041
+ (129)
2042
+ Analogously to Theorem 2 we can now establish a precise asymmetric scenario location of the phase transition
2043
+ in a typical statistical context.
2044
+ Theorem 3. (ℓ∗
2045
+ 1 – phase transition – C-inf (typical asymmetric scenario)) Assume the setup of
2046
+ Theorem 2 with rank-k matrix Xsol = X ∈ Rn×n that now has Haar distributed independent bases of its
2047
+ orthogonal row and column spans ¯U ��� ∈ Rn×(n−k) and ¯V ⊥ ∈ Rn×(n−k) (XT
2048
+ sol ¯U ⊥ = Xsol ¯V ⊥ = 0n×(n−k)).
2049
+ Let M ≜ M (l) ∈ Rn×n be as defined in (5). Let βac and η satisfy the following
2050
+ 20
2051
+
2052
+ x
2053
+ 0
2054
+ 0.1
2055
+ 0.2
2056
+ 0.3
2057
+ 0.4
2058
+ 0.5
2059
+ 0.6
2060
+ 0.7
2061
+ 0.8
2062
+ 0.9
2063
+ 1
2064
+ fQ1(x)
2065
+ 0
2066
+ 0.2
2067
+ 0.4
2068
+ 0.6
2069
+ 0.8
2070
+ 1
2071
+ 1.2
2072
+ 1.4
2073
+ 1.6
2074
+ 1.8
2075
+ 2 Spectral distribution fQ1(x); η = .4; β = .9; n = 4000
2076
+ simulated
2077
+ theory
2078
+ fQ1(x)
2079
+ Bulk
2080
+ Figure 5: fQ1(x) – spectral function of Q1; β = 0.4 and η = 0.9
2081
+ C-inf ℓ∗
2082
+ 1 asymmetric scenario phase transition (PT) characterization
2083
+ ξ(ac)
2084
+ η
2085
+ (β) ≜ β − 1 + 2
2086
+
2087
+ η − η2 = 0.
2088
+ (130)
2089
+ If and only if β ≤ βac
2090
+ lim
2091
+ n→∞ P(ℓ∗
2092
+ 0 ⇐⇒ ℓ∗
2093
+ 1) =
2094
+ lim
2095
+ n→∞ P(RMSE = 0) = 1,
2096
+ (131)
2097
+ and the solutions of (6) and (7) coincide with overwhelming probability.
2098
+ Proof. Follows from Lemma 3 and the above discussion.
2099
+ The results related to the use of the ℓ∗
2100
+ 1-minimization heuristic for solving the causal inference problems
2101
+ obtained based on the above theorem are shown in Figure 6.
2102
+ As in the worst case scenario, the phase
2103
+ transition (PT) curve splits the (β, η) region into two separate subregions where the ℓ∗
2104
+ 0 − ℓ∗
2105
+ 1-equivalence
2106
+ phenomenon either occurs or fails to occur. Basically, below the curve one has a perfect recovery with the
2107
+ residual RMSE = ∥vec( ˆX) − vec(Xsol)∥2 = 0. Contrary to that, above the curve though, there is an Xsol
2108
+ for which RMSE → ∞ and ℓ∗
2109
+ 1 fails.
2110
+ The following corollary adapts the above results so that they fit the standard (α, β) representation
2111
+ typically used in the compressed sensing (CS), low rank recovery (LRR), and matrix completion (MC)
2112
+ literature.
2113
+ Corollary 3. (ℓ∗
2114
+ 1 – phase transition – C-inf (typical asymmetric scenario; standard (α, β) rep-
2115
+ resentation)) Assume the setup of Theorem 3. Let m be the total number of ones in matrix M and let
2116
+ α ≜ limn→∞ m
2117
+ n2 . Let β and αw satisfy the
2118
+ C-inf ℓ∗
2119
+ 1 asymmetric scenario PT (standard (α, β) representation)
2120
+ ξ(wc,s)
2121
+ β
2122
+ (α) ≜ β − 1 + 2
2123
+ �√
2124
+ 1 − α − 1 + α = 0.
2125
+ (132)
2126
+ 21
2127
+
2128
+ η
2129
+ 0.5
2130
+ 0.55
2131
+ 0.6
2132
+ 0.65
2133
+ 0.7
2134
+ 0.75
2135
+ 0.8
2136
+ 0.85
2137
+ 0.9
2138
+ 0.95
2139
+ 1
2140
+ β
2141
+ 0
2142
+ 0.1
2143
+ 0.2
2144
+ 0.3
2145
+ 0.4
2146
+ 0.5
2147
+ 0.6
2148
+ 0.7
2149
+ 0.8
2150
+ 0.9
2151
+ 1
2152
+ (η, β) region of success/failure — C-inf ℓ∗1 PT; asymmetric scenario
2153
+ worst case
2154
+ average case
2155
+ RMSE −→ ∞, ℓ∗1
2156
+ fails
2157
+ ℓ∗1’s PT: ξ(ac)
2158
+ η
2159
+ (β) = β − 1 + 2�η − η2 = 0
2160
+ RMSE = 0, ℓ∗1 succeeds
2161
+ Doubling low rankness:
2162
+ ξ(ac)
2163
+ η
2164
+ (2β) = 2ξ(wc)
2165
+ η
2166
+ (β)
2167
+ Figure 6: Causal inference (C-inf) – typical asymmetric scenario ℓ∗
2168
+ 1 phase transition
2169
+ If and only if α ≥ αw
2170
+ lim
2171
+ n→∞ P(ℓ∗
2172
+ 0 ⇐⇒ ℓ∗
2173
+ 1) =
2174
+ lim
2175
+ n→∞ P(RMSE = 0) = 1,
2176
+ (133)
2177
+ and the solutions of (6) and (7) coincide with overwhelming probability.
2178
+ Proof. Follows as a direct consequence of Theorem 3 after noting that m = n2 − (n − l)2 and consequently
2179
+ α = 1 − (1 − η)2.
2180
+ Figure 7 shows the results obtained based on the above corollary in the standard (α, β) region format.
2181
+ As usual in the PT considerations, the entire (α, β) region is split in the part below the curve where
2182
+ RMSE = ∥vec( ˆX) − vec(Xsol)∥2 = 0 and the part above the curve where even RMSE → ∞ is achievable.
2183
+ We should point out an interesting similarity between what we observed here in the above corollary and
2184
+ in Figure 7 on the one side and what is known to hold in generic LRR. Namely, as Corollary 3 states (and as
2185
+ is emphasized in Figure 7), for the same value of α one achieves exactly two times larger β in the asymmetric
2186
+ case than in the worst case. As the worst case is basically symmetric, one has that the PTs of the symmetric
2187
+ and the nonsymmetric scenarios are distinguished by a factor of two. Similar observation was in place when
2188
+ it comes to the comparison between the LRR of the symmetric and the general (nonsymmetric) matrices.
2189
+ However, one should keep in mind a fundamental difference as well. In LRR the underlying symmetry is a
2190
+ priori known and can be utilized in the algorithms design whereas here it is just the choice of the worst case
2191
+ problem instance and is not assumed to be known to the algorithm itself. Of course, given the properties of
2192
+ the LRR, such a choice is not necessarily very surprising.
2193
+ 4.3
2194
+ Numerical results
2195
+ To complement the above theoretical findings and see how successful in characterizing the utilization of the
2196
+ ℓ∗
2197
+ 1-minimization in C-inf problems they indeed are, we conducted a set of numerical experiments and show
2198
+ the obtained results in Figure 8. As in [10], we again observe both the PT’s existence and a solid agreement
2199
+ between its theoretical prediction and the results obtained through the simulations.
2200
+ In the conducted numerical experiments we chose n = 80 and η in the range [0.6, 0.95]. Clearly, such fairly
2201
+ small matrix sizes correspond to the settings quite opposite from the ones that we used in the theoretical
2202
+ analysis. Still, even though the theory is predicated on the large n assumption, it is not impossible that
2203
+ its conclusions remain valid for smaller values of n as well. The results form Figure 8 confirm that this is
2204
+ 22
2205
+
2206
+ α
2207
+ 0.75
2208
+ 0.8
2209
+ 0.85
2210
+ 0.9
2211
+ 0.95
2212
+ 1
2213
+ β/α
2214
+ 0
2215
+ 0.1
2216
+ 0.2
2217
+ 0.3
2218
+ 0.4
2219
+ 0.5
2220
+ 0.6
2221
+ 0.7
2222
+ 0.8
2223
+ 0.9
2224
+ 1
2225
+ (α, β) region of success/failure — C-inf ℓ∗1 PT; asymmetric scenario
2226
+ worst case
2227
+ average case
2228
+ RMSE = 0, ℓ∗1 succeeds
2229
+ RMSE −→ ∞, ℓ∗1
2230
+ fails
2231
+ ℓ∗1’s PT: ξ(ac,s)
2232
+ β
2233
+ (α) = β − 1 + 2
2234
+ �√1 − α − 1 + α = 0
2235
+ ξ(ac,s)
2236
+
2237
+ (α) = 2ξ(ac,s)
2238
+ β
2239
+ (α)
2240
+ Figure 7: Causal inference (C-inf) – typical asymmetric scenario ℓ∗
2241
+ 1 phase transition ((α, β) region)
2242
+ indeed the case. Moreover, one can then say that the large n regime, needed for the theoretical consideration,
2243
+ practically may start ro kick in already for rather small (of order of a few tens!) values of n. This ultimately
2244
+ means that the presented results, although theoretical in nature, have in themselves a strong practical
2245
+ component as well. Finally, we should also add that for larger values of n an even better agreement between
2246
+ the theoretical and the simulated results is to be expected.
2247
+ A few additional points regarding the simulations setup might be useful. First, one should emphasize,
2248
+ that in order to be in an agreement with the theoretical considerations, we, in all numerical experiments,
2249
+ considered the so-called typical behavior. Following further into the footsteps of the theoretical consider-
2250
+ ations, the presented simulations results were obtained for the square matrices. As was the case in [10],
2251
+ all theoretical considerations can be repeated assuming the non-square scenarios as well. We, however, (as
2252
+ in [10]) prioritized the clarity of the presentations over simple generalizations and opted for the square sce-
2253
+ narios which are substantially easier to present. Also, all the simulations needed for Figure 8 were done with
2254
+ the singular values of the unknown targeted matrices equal to one. While we refer to [10] for a bit more
2255
+ complete discussion regarding such a choice, we here briefly mention that choices of this type are known
2256
+ to serve as the worst case examples in establishing the reversal ℓ0 − ℓ1-equivalence conditions. As in [10],
2257
+ we also ran the simulations where the singular values were randomly chosen with results either identically
2258
+ matching or improving on the ones shown in Figure 8.
2259
+ 5
2260
+ Conclusion
2261
+ In this paper, we have built on the mathematical Causal inference (C-inf) ↔ low-rank recovery
2262
+ (LRR) connection established in [10] to deal with asymmetric PTs phenomena. The results of [10] proved
2263
+ that the nuclear norm (ℓ∗
2264
+ 1) minimization heuristic, when used for solving the low rank recovery C-inf problems,
2265
+ exhibits the so-called phase transition (PT) phenomenon. Moreover, in a typical statistical scenario, [10]
2266
+ characterized the exact location of the worst case PT. This effectively meant that there are problem in-
2267
+ stances where the ℓ∗
2268
+ 1 predicated behavior might be improved upon. Here we showed that this is indeed true.
2269
+ Considering an asymmetric scenario (in contrast with the symmetric worst case one from [10]) we deter-
2270
+ mined the underlying exact phase transitions locations. Moreover, we uncovered a doubling low rankness
2271
+ phenomenon, which means that, throughout the entire region of allowed system parameters, matrices of
2272
+ exactly two times larger rank can be recovered when compared to the worst case scenario from [10]. Such a
2273
+ phenomenon also ensures that the simplicity of the worst case PTs from [10] is preserved in the asymmetric
2274
+ 23
2275
+
2276
+ η
2277
+ 0.5
2278
+ 0.6
2279
+ 0.7
2280
+ 0.8
2281
+ 0.9
2282
+ 1
2283
+ β
2284
+ 0
2285
+ 0.1
2286
+ 0.2
2287
+ 0.3
2288
+ 0.4
2289
+ 0.5
2290
+ 0.6
2291
+ 0.7
2292
+ 0.8
2293
+ 0.9
2294
+ 1
2295
+ (η, β) region of success/failure — ℓ∗1’s PT; simulated/theory
2296
+ ℓ∗
2297
+ 1’s PT – simulated
2298
+ ℓ∗
2299
+ 1’s PT – theory
2300
+ 0
2301
+ 0.1
2302
+ 0.2
2303
+ 0.3
2304
+ 0.4
2305
+ 0.5
2306
+ 0.6
2307
+ 0.7
2308
+ 0.8
2309
+ 0.9
2310
+ 1
2311
+ Success
2312
+ Failure
2313
+ Figure 8: C-inf ℓ∗
2314
+ 1’s asymmetric scenario phase transition (PT)
2315
+ scenarios as well. Consequently, one is again able to elegantly pin down the relation between the low rankness
2316
+ of the target C-inf matrix and the time when the treatment is applied.
2317
+ Throughout the process of creating the theoretical phase transitions characterizations we also established
2318
+ several mathematical results that are of independent interest. All of our theoretical findings we supplemented
2319
+ with the results obtained from the corresponding numerical experiments. Moreover, in all cases we observed
2320
+ a rather overwhelming agreement between what the theory predicts and what the simulations provide.
2321
+ To achieve the desired phase transition results we relied on a combination of the ideas from the Random
2322
+ duality theory (RDT) and the Free probability theory (FPT). As a result, we obtained a very powerful
2323
+ and generic mathematical apparatus that will serve as a theoretical platform in further explorations. As this
2324
+ and the companion paper [10] are of an introductory nature we stopped short of showcasing how the created
2325
+ theory fairs when utilized for handling more complex problem instances (these among others include the,
2326
+ practically very relevant, noisy and approximately low-rank corresponding ones). Our companion papers will
2327
+ establish results along these directions relying on the mathematical framework presented here and in [10].
2328
+ References
2329
+ [1] A. Abadie. Using synthetic controls: Feasibility, data requirements, and methodological aspects. Journal
2330
+ of Economic Literature, 2019.
2331
+ [2] A. Abadie, A. Diamond, and J. Hainmueller. Synthetic control methods for comparative case stud-
2332
+ ies: Estimating the effect of california’s tobacco control program. Journal of the American Statistical
2333
+ Association, 105:493–505, 2010.
2334
+ [3] A. Agarwal, M. Dahel, D. Shah, and D. Shen. Causal matrix completion. available online at arxiv.
2335
+ [4] S. Athey, M. Bayati, N. Doudchenko, G. Imbens, and K. Khosravi. Matrix completion methods for
2336
+ causal panel data models. Journal of the American Statistical Association, 116(536):1716–1730, 2021.
2337
+ [5] S. Athey and G. W. Imbens. Design-based analysis in differencein- differences settings with staggered
2338
+ adoption. Technical Report, National Bureau of Economic Research, 2018.
2339
+ 24
2340
+
2341
+ [6] S. Athey and S. Stren. The impact of information technology on emergency health care outcomes. The
2342
+ RAND Journal of Economics, 33:399–432, 2002.
2343
+ [7] E. J. Candes and B. Recht. Exact matrix completion via convex optimization. Foundations of Compu-
2344
+ tational Mathematics, (9):717, 2009.
2345
+ [8] E. J. Candes and T. Tao. The power of convex relaxation: Near-optimalmatrix completion. IEEE
2346
+ Transactions on Information Theory, 56:2053–2080, 2010.
2347
+ [9] E. J. Cand`es and Y. Plan. Matrix completion with noise. Proceedings of the IEEE, 98:925–936, 2010.
2348
+ [10] A. Capponi and M. Stojnic. Causal inference (C-inf) — closed form worst case typical phase transitions.
2349
+ available online at arxiv.
2350
+ [11] N. Doudchenko and G. W. Imbens. Balancing, regression, difference-in-differences and synthetic control
2351
+ methods: A synthesis. Technical Report, National Bureau of Economic Research, 2016.
2352
+ [12] U. Haagerup. On Voiculescu’s R- and S-transforms for free non-commuting random variables. In: Free
2353
+ Probability Theory, Fields Institute Communications, 12:127–148, 1997.
2354
+ [13] M. A. Hernan and J. M. Robins. Causal Inference. Boca Raton, FL: CRC Press, 2010.
2355
+ [14] G. W. Imbens and D. B. Rubin. Causal Inference in Statistics, Social, and Biomedical Sciences. New
2356
+ York: Cambridge University Press, 2015.
2357
+ [15] N. Kallus, X. Mao, and M. Udell.
2358
+ Causal inference with noisy and missing covariates via matrix
2359
+ factorization. Proceedings of the 32rd International Conference on Neural Information Processing, pages
2360
+ 6921—-6932, December 2018. available online.
2361
+ [16] R. H. Keshavan, A. Montanari, and S. Oh. Matrix completion from a few entries. IEEE Transactions
2362
+ on Information Theory, 56:2980–2998, 2010.
2363
+ [17] R. H. Keshavan, A. Montanari, and S. Oh. Matrix completion from noisy entries. Journal of Machine
2364
+ Learning Research, 11:2057–2078, 2010.
2365
+ [18] O. Klopp. Noisy low-rank matrix completion with general sampling distribution. Bernoulli, 20:282–303,
2366
+ 2014.
2367
+ [19] V. Koltchinskii, K. Lounici, and A. B. Tsybakov. Nuclear-norm penalization and optimal rates for noisy
2368
+ low-rank matrix completion. The Annals of Statistics, 39:2302–2329, 2011.
2369
+ [20] R. Mazumder, T. Hastie, and R. Tibshirani.
2370
+ Spectral regularization algorithms for learning large
2371
+ incomplete matrices. Journal of Machine Learning Research, 11:2287–2322, 2010.
2372
+ [21] S. N. Negahban and M. J. Wainwright. Estimation of (near) low-rank matriceswith noise and high-
2373
+ dimensional scaling. The Annals of Statistics, 39:1069–1097, 2011.
2374
+ [22] S. N. Negahban and M. J. Wainwright. Restricted strong convexity and weighted matrix completion:
2375
+ Optimal bounds with noise. Journal of Machine Learning Research, 13:1685–1697, 2012.
2376
+ [23] A. Nica and R. Speicher.
2377
+ London Mathematical Society Lecture Note Series, vol. 335.
2378
+ Cambridge
2379
+ University Press, 2006.
2380
+ [24] S. Oymak and B. Hassibi. New null space results and recovery thresholds for matrix rank minimization.
2381
+ Nov 2010. available online at http://arxiv.org/abs/1011.6326.
2382
+ [25] J. Pearl. Causal inference in statistics: An overview. Statistics Surveys, 3:96–146, 2009.
2383
+ [26] J. Pearl. Causality: Models, Reasoning, and Inference. 2nd. Cambridge University Press, New York,
2384
+ 2009.
2385
+ 25
2386
+
2387
+ [27] J. Pearl and E. Bareinboim. A note on ‘generalizability of study results’. Journal of Epidemiology,
2388
+ 30:186–188, 2019.
2389
+ [28] J. Pearl and D. Mackenzie. The Book of Why. Basic Books, New York, 2018.
2390
+ [29] B. Recht. A simpler approach to matrix completion. Journal of Machine Learning Research, 12:3413–
2391
+ 3430, 2011.
2392
+ [30] B. Recht, M. Fazel, and P. A. Parrilo. Guaranteed minimum-rank solution of linear matrix equations
2393
+ via nuclear norm minimization. 2007. available online at http://www.dsp.ece.rice.edu/cs/.
2394
+ [31] A. Rohde and A. B. Tsybakov. Estimation of high-dimensional low-rank matrices.
2395
+ The Annals of
2396
+ Statistics, 39:887–930, 2011.
2397
+ [32] P. R. Rosenbaum and D. B. Rubin. Thecentral role of the propensity score in observational studies for
2398
+ causal effects. Biometrika, 70, 1983.
2399
+ [33] D. B. Rubin. Matched Sampling for Causal Effects. Cambridge: Cambridge University Press, 2006.
2400
+ [34] A. Shaikh and P. Toulis.
2401
+ Randomization tests in observational studies with staggered adoption of
2402
+ treatment.
2403
+ University of Chicago, Becker Friedman Institute for Economics Working Paper, (144),
2404
+ 2019.
2405
+ [35] R. Speicher. Free probability and random matrices. In: Proc. ICM, III:477–501, 2014.
2406
+ [36] N. Srebro, N. Alon, and T. S. Jaakkola. Generalization error bounds for collaborative prediction with
2407
+ low-rank matrices. in Advances in Neural Information Processing Systems, 17:1321–1328, 2005. eds. L.
2408
+ K. Saul, Y.Weiss, and L. Bottou.
2409
+ [37] M. Stojnic. A framework for perfromance characterization of LASSO algortihms. available online at
2410
+ http://arxiv.org/abs/1303.7291.
2411
+ [38] M. Stojnic. Regularly random duality. available online at http://arxiv.org/abs/1303.7295.
2412
+ [39] M. Stojnic. Upper-bounding ℓ1-optimization weak thresholds. available online at http://arxiv.org/
2413
+ abs/1303.7289.
2414
+ [40] M. Stojnic. Various thresholds for ℓ1-optimization in compressed sensing. available online at http://
2415
+ arxiv.org/abs/0907.3666.
2416
+ [41] M. Stojnic. A simple performance analysis of ℓ1-optimization in compressed sensing. ICASSP, Inter-
2417
+ national Conference on Acoustics, Signal and Speech Processing, pages 3021–3024, 15-19 April 2009.
2418
+ Taipei, Taiwan.
2419
+ [42] M. Stojnic. ℓ1 optimization and its various thresholds in compressed sensing. ICASSP, IEEE Inter-
2420
+ national Conference on Acoustics, Signal and Speech Processing, pages 3910–3913, 14-19 March 2010.
2421
+ Dallas, TX.
2422
+ [43] M. Stojnic. Recovery thresholds for ℓ1 optimization in binary compressed sensing. ISIT, IEEE Inter-
2423
+ national Symposium on Information Theory, pages 1593 – 1597, 13-18 June 2010. Austin, TX.
2424
+ [44] M. Stojnic. Towards improving ℓ1 optimization in compressed sensing. ICASSP, IEEE International
2425
+ Conference on Acoustics, Signal and Speech Processing, pages 3938–3941, 14-19 March 2010. Dallas,
2426
+ TX.
2427
+ [45] A. M. Tulino and S. Verd´u. Random Matrix Theory and Wireless Communications. Foundations and
2428
+ Trends® in Communications and Information Theory: Vol. 1. Now Publishers, Hanover, 2004.
2429
+ [46] D. Voiculescu. Addition of certain non-commuting random variables. J. Funct. Anal., 66(3):323–346,
2430
+ 1986.
2431
+ 26
2432
+
2433
+ [47] D. Voiculescu. Multiplication of certain noncommuting random variables. J. Operator Theory, 18:2223–
2434
+ 2235, 1987.
2435
+ [48] D. Voiculescu. Limit laws for random matrices and free products. Invent. Math., 104(1):201–220, 1991.
2436
+ [49] R. Xiong and M. Pelger. Large dimensional latent factor modeling with missing observations and appli-
2437
+ cations to causal inference. 2018. Electronic copy available at: https://ssrn.com/abstract=3465357.
2438
+ [50] Y. Xu. Generalized synthetic control method: Causal inference with interactive fixed effects models.
2439
+ Political Analysis, 25:57–76, 2017.
2440
+ A
2441
+ Proof of Theorem 1
2442
+ As mentioned earlier, the proof of Theorem 1 is conceptually identical to the corresponding proof when
2443
+ matrix X is symmetric. A detailed proof for the symmetric matrices is given below. Before being able to
2444
+ present the proof we need a couple of technical lemmas.
2445
+ Lemma 5. Let C = CT ∈ Rn×n. Also let all eigenvalues of C belong to the interval [−1, 1]. Finally, let the
2446
+ first k entries on the main diagonal, Ci,i, 1 ≤ i ≤ k, be larger than or equal to 1. Then the upper k × k left
2447
+ block of C, C1:k,1:k, is an identity matrix, i.e.
2448
+ C1:k,1:k
2449
+ =
2450
+ Ik×k.
2451
+ (134)
2452
+ Proof. Let λmax(C) be the maximum eigenvalue of C. Then
2453
+ λmax(C)
2454
+
2455
+ max
2456
+ ∥c∥2=1 cT Cc.
2457
+ (135)
2458
+ Since by assumptions 1 ≤ Ci,i, 1 ≤ i ≤ k and λmax(C) ≤ 1 we also have for any 1 ≤ i ≤ k
2459
+ 1 ≤ Ci,i ≤ max
2460
+ ∥c∥2=1 cT Cc ≜ λmax(C) ≤ 1,
2461
+ (136)
2462
+ which implies C(i, i) = 1, 1 ≤ i ≤ k. The proof that all other elements of C1:k,1:k are equal to zero proceeds
2463
+ inductively.
2464
+ 1) Induction move from l = 1 to l = 2: First we look at the upper block of size 2 × 2, i.e. at C1:2,1:2.
2465
+ We then have
2466
+ 1 ≥ max
2467
+ ∥c∥2=1 cT Cc ≥
2468
+ max
2469
+ ∥c1:2∥2=1 cT
2470
+ 1:2C1:2,1:2c1:2
2471
+
2472
+ max
2473
+ ∥c1:2∥2=1 (∥c1:2∥2 + 2|c1c2C1,2|)
2474
+
2475
+ max
2476
+ ∥c1:2∥2=1 (1 + 2|c1c2C1,2|) ≥ 1,
2477
+ (137)
2478
+ which implies C1,2 = 0.
2479
+ 2) Induction move from l to l + 1: Now we look at the upper block of size (l + 1) × (l + 1), i.e. at
2480
+ C1:l+1,1:l+1 while assuming that C1:l,1:l = Il×l. We then have
2481
+ 1
2482
+
2483
+ max
2484
+ ∥c∥2=1 cT Cc
2485
+
2486
+ max
2487
+ ∥c1:l+1∥2=1 cT
2488
+ 1:l+1C1:l+1,1:l+1c1:l+1
2489
+
2490
+ max
2491
+ ∥c1:l+1∥2=1
2492
+
2493
+ ∥c1:l+1∥2 + 2|cT
2494
+ 1:lC1:l,l+1cl+1|
2495
+
2496
+
2497
+ max
2498
+ ∥c1:l+1∥2=1
2499
+
2500
+ 1 + 2|cT
2501
+ 1:lC1:l,l+1cl+1|
2502
+
2503
+
2504
+ 1,
2505
+ (138)
2506
+ which implies C1:l,l+1 = 0l×1 and completes the proof.
2507
+ 27
2508
+
2509
+ Lemma 6. Assume the setup of Lemma 5. Then the upper k × k left block of C, C1:k,1:k, is an identity
2510
+ matrix and the upper k × (n − k) right block of C, C1:k,n−k+1:n is a zero matrix, i.e.
2511
+ C1:k,1:k
2512
+ =
2513
+ Ik×k
2514
+ C1:k,n−k+1:n
2515
+ =
2516
+ 0k×(n−k).
2517
+ (139)
2518
+ Proof. The first part follows by Lemma 5. We now focus on the second part. Consider the following partition
2519
+ of matrix C
2520
+ C
2521
+ =
2522
+
2523
+ C1:k,1:k
2524
+ C1:k,n−k+1:n
2525
+ Cn−k+1:n,1:k
2526
+ Cn−k+1:n,n−k+1:n
2527
+
2528
+ =
2529
+
2530
+ Ik×k
2531
+ C1:k,n−k+1:n
2532
+ Cn−k+1:n,1:k
2533
+ Cn−k+1:n,n−k+1:n
2534
+
2535
+ .
2536
+ (140)
2537
+ Then assuming that the largest nonzero singular value of C1:k,n−k+1:n is equal to b > 0, we have
2538
+ 1
2539
+
2540
+ max
2541
+ ∥c∥2=1 cT Cc
2542
+
2543
+ max
2544
+ ∥c1:k∥2=a,cn−k+1:n
2545
+
2546
+ cT
2547
+ 1:kC1:k,1:kc1:k + 2|cT
2548
+ 1:kC1:k,n−k+1:ncn−k+1:n| + cT
2549
+ n−k+1:nCn−k+1:n,n−k+1:ncn−k+1:n
2550
+
2551
+
2552
+ max
2553
+ ∥c1:k∥2=a,cn−k+1:n
2554
+
2555
+ a2 + 2|cT
2556
+ 1:kC1:k,n−k+1:ncn−k+1:n| + cT
2557
+ n−k+1:nCn−k+1:n,n−k+1:ncn−k+1:n
2558
+
2559
+
2560
+ max
2561
+ ∥c1:k∥2=a,cn−k+1:n
2562
+
2563
+ a2 + 2|cT
2564
+ 1:kC1:k,n−k+1:ncn−k+1:n| − cT
2565
+ n−k+1:ncn−k+1:n
2566
+
2567
+
2568
+ max
2569
+ a∈[0,1]
2570
+
2571
+ a2 + 2ba
2572
+
2573
+ 1 − a2 − (1 − a2)
2574
+
2575
+ =
2576
+ max
2577
+ a∈[0,1]
2578
+
2579
+ 2a2 − 1 + 2ba
2580
+
2581
+ 1 − a2
2582
+
2583
+ ,
2584
+ (141)
2585
+ where the fourth inequality follows since the minimum eigenvalue of Cn−k+1:n,n−k+1:n is larger than or equal
2586
+ to the minimum eigenvalue of C which is by the lemma’s assumption larger than or equal to -1. Now, we
2587
+ further have
2588
+ c ≜ 2a
2589
+
2590
+ 1 − a2
2591
+ and
2592
+ 2a2 − 1 + 2ba
2593
+
2594
+ 1 − a2 =
2595
+
2596
+ 1 − c2 + bc,
2597
+ (142)
2598
+ and
2599
+ d(
2600
+
2601
+ 1 − c2 + bc)
2602
+ dc
2603
+ =
2604
+ −c
2605
+
2606
+ 1 − c2 + b = 0.
2607
+ (143)
2608
+ From (143) we then easily obtain
2609
+ c =
2610
+ b
2611
+
2612
+ 1 + b2 .
2613
+ (144)
2614
+ A combination of (141), (142), and (144) gives
2615
+ 1 ≥ max
2616
+ ∥c∥2=1 cT Cc ≥ max
2617
+ a∈[0,1]
2618
+
2619
+ 2a2 − 1 + 2ba
2620
+
2621
+ 1 − a2
2622
+
2623
+ =
2624
+
2625
+ 1 + b2,
2626
+ (145)
2627
+ which implies b = 0 and automatically C1:k,n−k+1:n = 0k×1. This completes the proof.
2628
+ Now we can consider the above mentioned theorem that adapts the general ℓ1 equivalence condition
2629
+ result from [39–41] to the corresponding one for the ℓ1 norm of the singular/eigenvalues (similar adaptation
2630
+ can also be found in [24]).
2631
+ Theorem 4. (ℓ∗
2632
+ 0 − ℓ∗
2633
+ 1-equivalence condition (LRR) – symmetric X) Consider a ¯U ∈ Rn×k such that
2634
+ ¯U T ¯U = Ik×k and a rank − k a priori known to be symmetric matrix Xsol = X ∈ Rn×n with all of its
2635
+ columns belonging to the span of ¯U. For concreteness, and without loss of generality, assume that X has only
2636
+ 28
2637
+
2638
+ positive nonzero eigenvalues. For a given matrix A ∈ Rm×n2 (m ≤ n2) assume that y = Avec(X) ∈ Rm. If
2639
+ (∀W ∈ Rn×n|Avec(W) = 0m×1, W = W T ̸= 0n×n)
2640
+ − tr ( ¯U T W ¯U) < ℓ∗
2641
+ 1(( ¯U ⊥)T W ¯U ⊥),
2642
+ (146)
2643
+ then the solutions of (6) and (7) coincide. Moreover, if
2644
+ (∃W ∈ Rn×n|Avec(W) = 0m×1, W = W T ̸= 0n×n)
2645
+ − tr ( ¯U T W ¯U) ≥ ℓ∗
2646
+ 1(( ¯U ⊥)T W ¯U ⊥),
2647
+ (147)
2648
+ then there is an X from the above set of the symmetric matrices with columns belonging to the span of ¯U
2649
+ such that the solutions of (6) and (7) are different.
2650
+ Proof. The proof follows literally step-by-step the proof of the corresponding theorem in [39–41] and adapts
2651
+ it to matrices or their singular/eigenvalues. For experts in the field this adaptation is highly likely to be
2652
+ viewed as trivial and certainly doesn’t need to be as detailed as we will make it to be. Nonetheless, to ensure
2653
+ a perfect clarity of all arguments we provide a step-by-step instructional derivation. For concreteness and
2654
+ without loss of generality we also assume that the eigen-decomposition of X is
2655
+ X = UΛU T =
2656
+ � ¯U
2657
+ ¯U ⊥� �
2658
+ ¯ΛX
2659
+ 0k×(n−k)
2660
+ 0(n−k)×k
2661
+ ¯Λ⊥
2662
+ X
2663
+ � � ¯U
2664
+ ¯U ⊥�T .
2665
+ (148)
2666
+ (i) =⇒ (the if part): Following step-by-step the proof of Theorem 2 in [41], we start by assuming that
2667
+ ˆX is the solution of (7). Then we want to show that if (146) holds then ˆX = X. As usual, we instead of that,
2668
+ assume opposite, i.e. we assume that (146) holds but ˆX ̸= X. Then since y = Avec( ˆ
2669
+ X) and y = Avec(X)
2670
+ must hold simultaneously there must exist W such that ˆX = X + W with W ̸= 0, Avec(W) = 0. Moreover,
2671
+ since ˆX is the solution of (7) one must also have
2672
+ ℓ∗
2673
+ 1(X + W) = ℓ∗
2674
+ 1( ˆX)
2675
+
2676
+ ℓ∗
2677
+ 1(X)
2678
+ ⇐⇒
2679
+ ℓ∗
2680
+ 1(
2681
+ � ¯U
2682
+ ¯U ⊥�T (X + W)
2683
+ � ¯U
2684
+ ¯U ⊥�
2685
+ )
2686
+
2687
+ ℓ∗
2688
+ 1(X)
2689
+ =⇒
2690
+ ℓ∗
2691
+ 1( ¯U T (X + W) ¯U) + ℓ∗
2692
+ 1(( ¯U ⊥)T (X + W) ¯U ⊥)
2693
+
2694
+ ℓ∗
2695
+ 1(X).
2696
+ (149)
2697
+ The last implication follows after one trivially notes
2698
+ ℓ∗
2699
+ 1(
2700
+ � ¯U
2701
+ ¯U ⊥�T (X + W)
2702
+ � ¯U
2703
+ ¯U ⊥�
2704
+ )
2705
+ =
2706
+ max
2707
+ Λ∗=ΛT
2708
+ ∗ ∈L∗
2709
+ tr (Λ∗
2710
+ � ¯U
2711
+ ¯U ⊥�T (X + W)
2712
+ � ¯U
2713
+ ¯U ⊥�
2714
+ )
2715
+
2716
+ max
2717
+ Λ∗=ΛT
2718
+ ∗ ∈L0∗
2719
+ tr (Λ∗
2720
+ � ¯U
2721
+ ¯U ⊥�T (X + W)
2722
+ � ¯U
2723
+ ¯U ⊥�
2724
+ )
2725
+ =
2726
+ ℓ∗
2727
+ 1( ¯U T (X + W) ¯U) + ℓ∗
2728
+ 1(( ¯U ⊥)T (X + W) ¯U ⊥),
2729
+ (150)
2730
+ where
2731
+ L0
2732
+
2733
+
2734
+
2735
+ Λ∗ ∈ Rn×n|Λ∗ = ΛT
2736
+ ∗ , Λ∗ΛT
2737
+ ∗ ≤ I, Λ∗ =
2738
+
2739
+ Λ∗,1
2740
+ 0k×(n−k)
2741
+ 0(n−k)×k
2742
+ Λ∗,2
2743
+ ��
2744
+
2745
+
2746
+ Λ∗ ∈ Rn×n|Λ∗ = ΛT
2747
+ ∗ , Λ∗ΛT
2748
+ ∗ ≤ I
2749
+
2750
+ ≜ L∗.
2751
+ (151)
2752
+ The key observation – “Removing the absolute values”:
2753
+ Now, the key observation made in [41] comes into play. Namely, one notes that the absolute values can
2754
+ be removed in the nonzero part and that the ℓ∗
2755
+ 1(·) can be “replaced” by tr (·). Such a simple observation
2756
+ is the most fundamental reason for all the success of the RDT when used for the exact performance
2757
+ characterization of the structured objects’ recovery. From (149) we then have
2758
+ ℓ∗
2759
+ 1( ¯U T (X + W) ¯U) + ℓ∗
2760
+ 1(( ¯U ⊥)T (X + W) ¯U ⊥)
2761
+
2762
+ ℓ∗
2763
+ 1(X)
2764
+ =⇒
2765
+ tr ( ¯U T (X + W) ¯U) + ℓ∗
2766
+ 1(( ¯U ⊥)T (W) ¯U ⊥)
2767
+
2768
+ ℓ∗
2769
+ 1(X)
2770
+ ⇐⇒
2771
+ tr ( ¯U T W ¯U) + ℓ∗
2772
+ 1(( ¯U ⊥)T W ¯U ⊥)
2773
+
2774
+ 0.
2775
+ (152)
2776
+ 29
2777
+
2778
+ We have arrived at a contradiction as the last inequality in (152) is exactly the opposite of (146). This
2779
+ implies that our initial assumption ˆX ̸= X cannot hold and we therefore must have ˆX = X. This is precisely
2780
+ the claim of the first part of the theorem.
2781
+ (ii) ⇐= (the only if part): We now assume that (147) holds, i.e.
2782
+ (∃W ∈ Rn×n|Avec(W) = 0m×1, W ̸= 0n×n)
2783
+ − tr (( ¯U)T W ¯U) ≥ ℓ∗
2784
+ 1(( ¯U ⊥)T W ¯U ⊥)
2785
+ (153)
2786
+ and would like to show that for such a W there is a symmetric rank-k matrix X with the columns belonging
2787
+ to the span of ¯U such that y = Avec(X), and the following holds
2788
+ ℓ∗
2789
+ 1(X + W) < ℓ∗
2790
+ 1(X).
2791
+ (154)
2792
+ Existence of such an X would ensure that it both, satisfies all the constraints in (7) and is not the
2793
+ solution of (7). Following the strategy of [39] one can reverse all the above steps from (153) to (149) with
2794
+ strict inequalities and arrive at the first inequality in (149) which is exactly (154). There are two implications
2795
+ that cause problems in such a reversal process, the one in (153) and the one in (149). If these implications
2796
+ were equivalences everything would be fine. We address these two implications separately.
2797
+ 1) the implication in (152) – particular X to “overwhelm” W: Assume X = ¯UΛx ¯U T with Λx >
2798
+ 0 being a diagonal matrix with arbitrarily large elements on the main diagonal (here it is sufficient even to
2799
+ choose diagonal of Λx so that its smallest element is larger than the maximum eigenvalue of ¯U T W ¯U). Now
2800
+ one of course sees the main idea behind the “removing the absolute values” concept from [39,41]. Namely,
2801
+ for such an X one has that ℓ∗
2802
+ 1( ¯U T X + W) ¯U) = tr(ℓ∗
2803
+ 1( ¯U T X + W) ¯U)) since for symmetric matrices the ℓ∗
2804
+ 1(·)
2805
+ (as the sum of the argument’s absolute eigenvalues) and tr (·) (as the sum of the argument’s eigenvalues) are
2806
+ equal. That basically means that when going backwards the second inequality in (152) not only follows from
2807
+ the first one but also implies it as well. In other words, for X = ¯UΛx ¯U T (with Λx > 0 and arbitrarily large)
2808
+ tr ( ¯U T W ¯U) + ℓ∗
2809
+ 1(( ¯U ⊥)T W ¯U ⊥)
2810
+
2811
+ 0
2812
+ ⇐⇒
2813
+ tr ( ¯U T (X + W) ¯U ) + ℓ∗
2814
+ 1(( ¯U ⊥)T (W) ¯U ⊥)
2815
+
2816
+ ℓ∗
2817
+ 1(X)
2818
+ ⇐⇒
2819
+ ℓ∗
2820
+ 1( ¯U T (X + W) ¯U) + ℓ∗
2821
+ 1(( ¯U ⊥)T (X + W) ¯U ⊥)
2822
+
2823
+ ℓ∗
2824
+ 1(X),
2825
+ (155)
2826
+ which basically mans that there is an X that can “overwhelm” W (in the span of ¯U) and ensures that the
2827
+ “removing the absolute values” is not only a sufficient but also a necessary concept for creating the
2828
+ relaxation equivalence condition.
2829
+ 2) the implication in (149): One would now need to somehow show that the third inequality in (149)
2830
+ not only follows from the second one but also implies it as well. This boils down to showing that inequality in
2831
+ (150) can be replaced with an equality or, alternatively, that L0 and L are provisionally equivalent. Neither
2832
+ of these statements is generically true. However, since we have a set of X at our disposal there might be an
2833
+ X for which they actually hold. We continue to assume X = ¯UΛx ¯U T with Λx > 0 being a diagonal matrix
2834
+ with arbitrarily large entries on the main diagonal. Then the last equality in (150) gives
2835
+ ℓ∗
2836
+ 1( ¯U T (X + W) ¯U) + ℓ∗
2837
+ 1(( ¯U ⊥)T (X + W) ¯U ⊥)
2838
+
2839
+ ℓ∗
2840
+ 1(X)
2841
+ ⇐⇒
2842
+ maxΛ∗=ΛT
2843
+ ∗ ∈L0∗ tr (Λ∗
2844
+ � ¯U
2845
+ ¯U ⊥�T (X + W)
2846
+ � ¯U
2847
+ ¯U ⊥�
2848
+ )
2849
+
2850
+ ℓ∗
2851
+ 1(X).
2852
+ (156)
2853
+ Also, one has
2854
+ maxΛ∗=ΛT
2855
+ ∗ ∈L0∗ tr (Λ∗
2856
+ � ¯U
2857
+ ¯U ⊥�T (X + W)
2858
+ � ¯U
2859
+ ¯U ⊥�
2860
+ )
2861
+
2862
+ ℓ∗
2863
+ 1(X)
2864
+ ⇐⇒
2865
+ maxΛ∗,i=ΛT
2866
+ ∗,i,Λ∗,iΛT
2867
+ ∗,i≤I,i∈{1,2} tr (Λ∗,1 ¯U T X ¯U + Λ∗,2( ¯U ⊥)T W ¯U ⊥)
2868
+
2869
+ ℓ∗
2870
+ 1(X)
2871
+ ⇐⇒
2872
+ maxΛ∗,i=ΛT
2873
+ ∗,i,Λ∗,iΛT
2874
+ ∗,i≤I,i∈{1,2} tr (Λ∗,1Λx + Λ∗,2( ¯U ⊥)T W ¯U ⊥)
2875
+
2876
+ tr (Λx).
2877
+ (157)
2878
+ Now, if at least one of the elements on the main diagonal of Λ∗,1, diag(Λ∗,1), is smaller than 1, then the
2879
+ corresponding element on the diagonal of Λx can be made arbitrarily large compared to the other elements
2880
+ 30
2881
+
2882
+ of Λx and one would have
2883
+ maxΛ∗,i=ΛT
2884
+ ∗,i,Λ∗,iΛT
2885
+ ∗,i≤I,i∈{1,2} tr (Λ∗,1Λx + Λ∗,2( ¯U ⊥)T W ¯U ⊥)
2886
+ <
2887
+ tr (Λx)
2888
+ ⇐⇒
2889
+ maxΛ∗=ΛT
2890
+ ∗ ∈L0∗ tr (Λ∗
2891
+ � ¯U
2892
+ ¯U ⊥�T (X + W)
2893
+ � ¯U
2894
+ ¯U ⊥�
2895
+ )
2896
+ <
2897
+ ℓ∗
2898
+ 1(X)
2899
+ ⇐⇒
2900
+ maxΛ∗=ΛT
2901
+ ∗ ∈L∗ tr (Λ∗
2902
+ � ¯U
2903
+ ¯U ⊥�T (X + W)
2904
+ � ¯U
2905
+ ¯U ⊥�
2906
+ )
2907
+ <
2908
+ ℓ∗
2909
+ 1(X),
2910
+ (158)
2911
+ where the last equivalence holds since the difference of the terms on the left-hand side in the last two
2912
+ inequalities is bounded independently of X. Also, the last inequality in (158) together with the first equality
2913
+ in (150) and the first inequality in (149) produces (154). Therefore the only scenario that is left as potentially
2914
+ not producing (154) is when all the elements on the main diagonal are larger than or equal to 1. However,
2915
+ the two lemmas preceding the theorem show that in such a scenario L0 = L and one consequently has an
2916
+ equality instead of the inequality in (150) which then, together with (149), implies (154). This completes
2917
+ the proof of the second (“the only if”) part of the theorem and therefore of the entire theorem.
2918
+ 31
2919
+
F9AyT4oBgHgl3EQf5Pp6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FtFKT4oBgHgl3EQfbC5a/content/2301.11810v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6a219af5adf52db7ff9ec43d3613dcfbb5150bd68025aca911d3244de90bcb45
3
+ size 523609
FtFKT4oBgHgl3EQfbC5a/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5656c33deaa6be49a31e48e5ef285416b6043b3f687de3f567754fe020ac0cf8
3
+ size 1966125
FtFKT4oBgHgl3EQfbC5a/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:50944cd9d2dd8c99e51fbedad10974e656f4836af9c245cbb03c845e74b17c00
3
+ size 75624
G9E1T4oBgHgl3EQfrQVc/content/tmp_files/2301.03352v1.pdf.txt ADDED
@@ -0,0 +1,1131 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE
2
+ MINIATURIZATION FOR NEUROMORPHIC COMPUTING
3
+ A PREPRINT
4
+ A. S. Goossens 1,2,*, M. Ahmadi 1,2, D. Gupta 1,2, I. Bhaduri 1,2, B. J. Kooi 1,2, and T. Banerjee 1,2.*
5
+ 1Groningen Cognitive Systems and Materials Center, University of Groningen, Groningen, The Netherlands
6
+ 2Zernike Institute for Advanced Materials, University of Groningen, Groningen, The Netherlands
7
+ *{a.s.goossens,t.banerjee}@rug.nl
8
+ January, 2023
9
+ ABSTRACT
10
+ The areal footprint of memristors is a key consideration in material-based neuromorophic comput-
11
+ ing and large-scale architecture integration. Electronic transport in the most widely investigated
12
+ memristive devices is mediated by filaments, posing a challenge to their scalability in architecture
13
+ implementation. Here we present a compelling alternative memristive device and demonstrate that
14
+ areal downscaling leads to enhancement in memristive memory window, while maintaining analogue
15
+ behavior, contrary to expectations. Our device designs directly integrated on semiconducting Nb-
16
+ SrTiO3 allows leveraging electric field effects at edges, increasing the dynamic range in smaller
17
+ devices. Our findings are substantiated by studying the microscopic nature of switching using scan-
18
+ ning transmission electron microscopy, in different resistive states, revealing an interfacial layer
19
+ whose physical extent is influenced by applied electric fields. The ability of Nb-SrTiO3 memristors
20
+ to satisfy hardware and software requirements with downscaling, while significantly enhancing
21
+ memristive functionalities, makes them strong contenders for non-von Neumann computing, beyond
22
+ CMOS.
23
+ Keywords Interface memristor, Areal scaling, Beyond CMOS, Neuromorphic computing, Scanning transmission
24
+ electron microscopy (STEM)
25
+ 1
26
+ Introduction
27
+ The growing demand for applications such as artificial intelligence and the Internet of Things has given rise to critical
28
+ challenges in the storage and processing of big data using existing computational architectures [1]. The currently
29
+ employed von Neumann architecture, using complementary metal-oxide-semiconductor (CMOS) hardware, suffers
30
+ from limited transmission speed [2, 3, 4] due to a memory throughput bottleneck as well as energy inefficiency and
31
+ limited scalability [4, 5, 6]. Moving away from CMOS technology, towards logic-in-memory chips would alleviate
32
+ some of the above issues but requires us to massively rethink every aspect of computing [7]. The first step towards this
33
+ is identifying novel materials and devices with suitable physical properties. Resistive switching devices, or memristors,
34
+ are one such class of devices where the resistance can be switched between several states. Reported in different ionic
35
+ materials, they are distinguished by the switching mechanism as either occurring through the material bulk between
36
+ two electrodes or interface-type where switching takes place in a localized region underneath the area of the electrodes
37
+ [8]. Their ability to co-locate memory and computation, and exhibit characteristics absent in digital computing makes
38
+ them important for novel computing approaches. Given the robust way in which the human brain is able to process
39
+ large amounts of data with remarkably low power, it is unsurprising that it serves as a source of inspiration to the
40
+ development of computing beyond using CMOS. As the brain utilizes a vast network, downscaling memristive devices
41
+ is a crucial area of research to develop large scale neuromorphic systems.
42
+ arXiv:2301.03352v1 [cs.ET] 9 Jan 2023
43
+
44
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
45
+ For this material-driven research, the areal footprint in unconventional computing architectures that seek to integrate
46
+ in-memory computing devices such as memristors is a prime consideration. Considerable research has been devoted to
47
+ this in the realm of non-volatile conventional filamentary devices. The challenges in their implementation in such novel
48
+ architectures, besides the requirement for unfavourable electroforming processes, lie in their switching endurance [9],
49
+ and their efficacy to exhibit discernible analogue resistance states. Memristive devices that exhibit more than two stable
50
+ states also greatly enhance integration density because each device can store multiple data bits in an analogue manner.
51
+ In valence change memristors, where switching originates from filaments, such behavior is observed in large areal
52
+ dimensions but is lost when devices are downscaled and conduction is mediated by a single nanoscale filament causing
53
+ an abrupt transition between the two resistance states [10]. Further, the effects of Joule heating on filaments are
54
+ an important consideration as devices shrink; Joule heating can cause a wide distribution of switching voltages and
55
+ endurance deterioration. These limitations in device stability, endurance and associated enhanced power of operation
56
+ are major roadblocks in the successful implementation of filamentary devices in large scale architectures.
57
+ Memristive devices have the potential to be integrated in large scale architectures, for which they should exhibit large
58
+ memory windows, high endurance and low variability [11]. Herein the areal switching mechanism is a strong contender.
59
+ A model system in which this mechanism is dominant is Schottky contacts on Nb-doped SrTiO3 (Nb:STO), formed at
60
+ the interface with a high work function metal. It is widely accepted that in these material systems it is not the bulk of
61
+ the device, but an area close to the interface that is responsible for the switching, a more detailed discussion on the
62
+ proposed mechanisms is presented in Supporting Information section S3.
63
+ Distinguishing Nb:STO from conventional semiconductors such as Si, widely used in conventional architectures, is its
64
+ dielectric permittivity which is comparatively large (300) and is strongly dependent on electric field. This property
65
+ extends the parameter space for designing functionality: electric fields can be used to tune the barrier height and width
66
+ relevant for memristive device design. We have previously shown that such Schottky contacts form robust memristors,
67
+ exhibiting non-linear transport and continuous conductance modulation [12], and that their behavior can be described
68
+ by a power-law which can be successfully implemented as a learning algorithm [13]. However, for the applicability of
69
+ Nb:STO-based memristors as hardware elements for non-von Neumann computing architecture beyond CMOS, the
70
+ focus should be on establishing their memristive performance with device miniaturization, which has not been shown
71
+ on such semiconducting platforms. In this work, we demonstrate that memristive devices of Co Schottky contacts
72
+ on Nb:STO exhibit an increase in the analogue memristive memory window in devices down to 1 μm, contrary to
73
+ expectations. Ionic defects are at the heart of memristive behavior, hence one of the following two scenarios is expected.
74
+ For a homogeneous areal mechanism, the current density will scale with device area so that the device resistance in
75
+ both the high resistance state (HRS) and the low resistance state (LRS) scales with the electrode size, but the ratio
76
+ between them is area independent. Alternatively, the resistance window can be severely reduced or even vanish with
77
+ downscaling due to insufficient ionic defects. However, we observe an enhancement in the memory window as the
78
+ device area is reduced, with minimal device-to-device variation, an unforeseen finding.
79
+ To understand the microscopic nature of the switching, we conducted scanning transmission electron microscopy
80
+ (STEM) on virgin samples and on samples subjected to either a positive (SET) or negative (RESET) voltage . Using
81
+ integrated differential phase contrast (iDPC) we image oxygen atomic columns next to the heavy metal atomic columns.
82
+ Figure 1: State stability and multilevel memristive operation. a Schematic of the fabricated devices on Nb-doped
83
+ SrTiO3, electrical connections. Black lines are used to represent the varying overall electric fields acting over each area.
84
+ The field strengths at the interface are also indicated by a color gradient, showing the fields are weakest in the central
85
+ area (blue) and strongest around the perimeter (red). b Current read at +0.3 V for device sizes of 100 μm (black), 10 μm
86
+ (blue) and 1 μm (red). c Current read at 0.3 V after switching between a SET voltage of +1 V (black, red and blue) or
87
+ +2 V (green, purple and orange) and a RESET voltage of -2 V (black and green), -2.5 V (red and purple) or -3 V (blue
88
+ and orange). Each combination was repeated over 100 cycles.
89
+ 2
90
+
91
+ +2 V
92
+ +2 V
93
+ 2.5
94
+ Nb-doped SrTiO.
95
+ 3 VMEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
96
+ Figure 2: Characterization of memristive devices in the virgin state. Electrical characteristics of virgin devices. The
97
+ compliance current was fixed at 100 mA for all measurements. Results are shown for four devices of each area in a-f.
98
+ Virgin samples show the existence of a layer near the interface with neither the perovskite structure of the substrate nor
99
+ that of the Co electrode. Applying a bias across the interface results in oxygen vacancy movement, which is a key factor
100
+ controlling the resistance states. These new revelations are consolidated with a mathematical model describing the
101
+ kinetics of trapping and de-trapping in dielectric materials and relates experimental results to the effective trapping
102
+ density. Surprisingly, this is found to be larger for smaller junctions, suggesting that an increase in the density of traps
103
+ is responsible for the increased resistance ratio and attributed to inhomogeneous distribution of the electric field due to
104
+ device edges.
105
+ These memristive devices, integrated directly on a semiconducting platform, demonstrate multistate analogue switching
106
+ with remarkably high memory windows with downscaling, as well as high endurance and low device and cycle variation
107
+ down to the smallest devices. Their ability to meet both hardware and software requirements for unconventional
108
+ computing, make Nb:STO memristors strong material contenders for physical computing beyond CMOS.
109
+ 2
110
+ Results
111
+ 2.1
112
+ Electrical Characterization
113
+ Figure 1a shows a schematic of the device structure used for the electrical measurements. An array of circular Co
114
+ electrodes of varying sizes are fabricated on a semiconducting Nb:STO single crystalline substrate. The bottom of the
115
+ substrate serves as a back contact for the devices. The top electrodes were patterned by a two-step electron lithography
116
+ process using aluminium oxide as an insulation layer to define the contact areas and to prevent electronic cross talk.
117
+ After fabrication, we performed small range voltage sweeps to characterize the virgin states of each device on a chip.
118
+ The results for devices with radial dimension from 100 μm to 800 nm are shown in Fig. 2, where each sweep followed a
119
+ voltage sequence from 0 to +1 V to -1 V and back to 0 V. We show four devices of each area, which are plotted in Fig.
120
+ 2a-f.
121
+ The current magnitudes for different devices of the same area show no significant differences down to 1 μm, indicating
122
+ device-to-device variations are minimal. Establishing this is important as this signifies the sole influence of device area
123
+ in determining the resistance ratio and rules out contributions from device-to-device variation. The 800 nm devices
124
+ show a greater degree of variation; this is likely due to small differences in their areas and edges arising from the
125
+ fabrication process and not inherent to the material or due to device fallibility. No significant differences in the current
126
+ 3
127
+
128
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
129
+ Figure 3: Resistance ratio, cycling endurance and state stability. a-f show 1000 consecutive current-voltage sweeps
130
+ from +2 V to -3 V to +2 V at a rate of 1.52 Vs−1 for devices of 100 μm down to 800 nm. Starting from a SET voltage
131
+ of +2 V, each device is in an LRS, represented by the upper branch reaching the RESET voltage of -3 V and sweeping
132
+ back, the devices are switched to an HRS (represented by the lower branch.
133
+ densities at low bias values are found in the virgin state, confirming that the entire device area contributes to the charge
134
+ transport (Supporting Information Fig. S1). For all the devices, the current gradually increases and exhibits a small
135
+ hysteretic effect from the virgin state, indicating that no forming step is required.
136
+ Figure 3a-f shows 1000 consecutive current-voltage (I-V) sweeps of these devices. Starting from a SET voltage of +2 V,
137
+ each device is in an LRS, represented by the upper branches. After reaching the RESET voltage of -3 V and sweeping
138
+ back, the devices are switched to an HRS (represented by the lower branches). In all device areas both the SET and
139
+ RESET operation remain continuous, indicating the resistive switching retains its analog nature when downscaling. The
140
+ cycling endurance was measured for over 105 switching cycles without device failure, illustrating an endurance of >105.
141
+ The current in the HRSs scales approximately with area at low bias values, while the low resistance current, is less
142
+ closely correlated to the area. As a result, the resistance window increases with decreasing device area in both forward
143
+ and reverse bias. Figure 1b and Supporting Information Fig. S2 show the current and current density at a low read
144
+ voltage of 0.3 V, respectively. Minimal cycle-to-cycle variations at low reading voltages are found with reproducible
145
+ switching between clearly distinguishable states without degradation in device performance. This also establishes
146
+ the low power operation of these devices after downscaling, which is important for memristor operation. As shown
147
+ in Supporting Information Fig. S3, the device-to-device variation remains low down to 1 μm. The variation in the
148
+ resistance ratio in the 800 nm devices is larger (Fig. S4), and will be discussed later.
149
+ The SET and RESET transitions are gradual and highly tunable. To demonstrate this, a 1 μm device was subjected to
150
+ voltage sweeps varying between different positive (SET) and negative (RESET) voltages. Figure 1c shows that a wide
151
+ range of stable states is available at a low read voltage of +0.3 V. The wide dynamic range combined with the large
152
+ number of distinct addressable states ensures device reliability and increased memory storage capabilities. Each state
153
+ maintains a narrow distribution of current values over the 100 cycles shown, reiterating the stability of the switching
154
+ process.
155
+ 2.2
156
+ Scanning Transmission Electron Microscopy
157
+ A microscopy study of the Schottky interface was carried out using STEM. Figure 4 shows atomic resolution cross-
158
+ section STEM-integrated Differential Phase Contrast (iDPC) images of the Co/Nb:STO interface for samples in the
159
+ 4
160
+
161
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
162
+ Figure 4: Visualization of oxygen vacancy migration using STEM. iDPC-STEM images of Co/Nb:STO samples in
163
+ a the virgin (unbiased) state, b the LRS and (c the HRS, highlighting the structure close and far from the interface. The
164
+ perovskite unit cell of STO, showing Sr in green, O in dark red and Ti in light red, viewed along the <110> in d the
165
+ pristine state and (e with oxygen vacancies. The deficiency of O causes Ti atoms to move away from the vacancies as
166
+ shown by the arrows. f shows a schematic representation of how the interfacial layer is affected by biasing.
167
+ unbiased virgin condition (Fig. 4a), the LRS state (Fig. 4b) and the HRS state (Fig. 4c). To image lighter oxygen atoms,
168
+ integrated into a matrix with heavier Sr and Ti atoms, we utilized STEM-integrated Differential Phase Contrast (iDPC)
169
+ instead of the more commonly employed STEM-High-angle annular dark-field (HAADF) imaging technique.[14, 15].
170
+ The STEM images in Fig. 4a show that, apart from a thin interfacial region, the bulk STO consists of a cubic perovskite
171
+ lattice and no defects are observable. All images taken within the bulk did not show any dislocation and possessed
172
+ the expected perovskite structure as shown in Fig. 4d. However, the structure close to the interface deviates from this
173
+ perovskite structure and is deficient in oxygen. The migration of oxygen ions near the interface towards Co causes
174
+ positively charged Ti ions to be displaced so that they no longer sit equidistantly from the Sr ions along <001>. Figure
175
+ 4e illustrates how the loss of O ions gives rise to Ti displacements along the <001> direction away from the interface
176
+ as well as along <1-10> (see Supporting Information Fig. S7) and is similar to what was reported in ref. [16] in
177
+ La0.67Sr0.33MnO3/Hf0.5Zr0.5O2. We believe the creation of this thin layer to be related to the formation of a Schottky
178
+ barrier. The analysis for a non-memristive interface with Ti contacts can be found in Supporting Information Fig. S6.
179
+ Figure 4b shows analogous results to Fig. 4a, but now for the sample switched to the LRS, representing the upper
180
+ branch in Fig. 3, after the application of a positive bias voltage of 2 V. Comparing the two figures shows that in the
181
+ LRS state the extent of the interfacial layer has decreased. This suggests that under the influence of a positive voltage,
182
+ the labile bonds between O and interfacial Co atoms are broken and oxygen moves back into the STO substrate. A
183
+ negative bias voltage of -3 V (corresponding to the lower branch in Fig. 3), on the other hand, causes oxygen to move
184
+ from STO to cobalt causing the formation of CoO and more oxygen vacancies in the STO, highlighted by a larger
185
+ region over which Ti ions are displaced (see Fig. 4c). This indicates that the formation of the CoO switches the sample
186
+ to the HRS state. It has been shown [17, 18] that the oxygen vacancy distribution inside the system will determine
187
+ how the oxygen vacancies are affected by the applied voltage. The formation of an oxygen deficient interfacial layer
188
+ confirms that in these samples the oxygen vacancies are concentrated near the interface. In this case, it is expected
189
+ that the application of a positive voltage will cause oxygen vacancies to be repelled from the interface while a negative
190
+ voltage will cause oxygen vacancies to be attracted to the interface, consistent with our findings. After removing the
191
+ 5
192
+
193
+ (a
194
+ middle of STO
195
+ middle of STO
196
+ Virgin state
197
+ Low resistance state
198
+ High resistance state
199
+ (d)
200
+ (f)
201
+ (e)
202
+ <001>
203
+ Virgin state
204
+ LR state
205
+ HR state
206
+ Co
207
+ Co
208
+ Co
209
+ oxygen deficient areal
210
+ oxygen deficient area
211
+ STO
212
+ STO
213
+ STO
214
+ → <1-10>
215
+ Zone axis: <110>MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
216
+ voltage, the interfacial layer did not reform over time, suggesting the presence of an oxygen-migration blocking layer.
217
+ These results are summarized in Fig. 4f.
218
+ Our results directly confirm the existence of a homogeneous oxygen deficient layer at the interface. The homogeneous
219
+ nature of the defect state layer ensures ionic defects are retained with downscaling. We furthermore show that the
220
+ physical extent of the layer is reduced or extended when a positive or negative voltage is applied respectively. Although
221
+ the uniform nature of the ionic contribution to switching is now verified, this does not explain the origin of the
222
+ unexpected enhancement of the resistance window with downscaling. This we discuss next by considering the trapping
223
+ of electronic charges at oxygen vacancy sites.
224
+ 2.3
225
+ Model
226
+ In order to understand how the electrical properties of the devices are influenced by these oxygen vacancies, we
227
+ consider the interaction between electrons and defect states. This interaction is most strongly evidenced by the retention
228
+ characteristics, which have a slow decaying component. This behavior is caused by the detrapping of charges. It has
229
+ been shown that this occurs over long timescales and the different states will remain clearly distinguishable for long
230
+ time periods of hours and that the retention time is tunable by the applied stimuli [12]. We utilized short voltage pulses
231
+ to measure the retention characteristics of each device in both an HRS and LRS. This was done by applying alternating
232
+ SET and RESET pulses of +2 V and -3 V respectively, and reading the small-signal current at either +0.3 V or -0.5 V
233
+ after each writing event. The state retention characteristics of the different devices are shown in Fig. 5 for the LRS (red)
234
+ and HRS (black). Over time, the current in both states tends to an intermediate value. For the LRS, the rate of change
235
+ follows a power law that is commonly observed for charge trapping under bias in high-κ dielectrics, referred to as the
236
+ Curie-von Schweidler law.
237
+ This law describes a non-Debye type relaxation in dielectrics. Empirical evidence of this behavior is seen in a wide
238
+ variety of materials, but the precise physical origin remains unclear. Here we consider the effect of injected electrons
239
+ becoming trapped in defects states within the dielectric. The space charge generated by these trapped electrons lowers
240
+ the electric field, in turn reducing the flow of current through the dielectric. In this case the trapping rate can be
241
+ expressed as:
242
+ dn
243
+ dt = n0σ Jvth
244
+ qvd
245
+ e− nh
246
+ V
247
+ (1)
248
+ where n0 is the maximum number of traps available, J/q is the net flux density, vth and vd are the thermal and drift
249
+ velocities respectively, and σ is capture cross-section. Solving this equation yields the following expression for n:
250
+ n = V
251
+ h ln
252
+ � Q
253
+ Q∗ + 1
254
+
255
+ (2)
256
+ where Q =
257
+
258
+ Jdt is the total injected charge and
259
+ Q∗ =
260
+ V vdq
261
+ n0hvthσ
262
+ (3)
263
+ Expressing the current as J = Jst−α and extending this analysis results in:
264
+ α
265
+ 1 − α ln(Js) ≈ mEap + n
266
+ (4)
267
+ where m is a constant.
268
+ We can also directly relate the trapping rate to the current. QT represents the charge that is trapped when charge Q is
269
+ injected into the dielectric. The ratio dQT
270
+ dQ is a function of current. The current can be written as:
271
+ J = Js
272
+ t
273
+ t0
274
+ −1/(α+1)
275
+ (5)
276
+ where α ≥0 and Js depends on the transport mechanism. For conduction following an exponential relation:
277
+ Js ∝ e
278
+ (1−1/(α+1))V
279
+ V0
280
+ (6)
281
+ Here, V0 is a constant. The full derivation is shown in Supporting Information Section S1 and Fig. S8, and is also
282
+ extended to show that it holds for other transport mechanisms.
283
+ Equations 4 and 6 serve as a direct mathematical proof that the exponent α in the power law is related to the effective
284
+ trap density or capacity of the dielectric to trap electrons. This derivation is applicable to a wider range of systems,
285
+ irrespective of the choice of dielectric material. In Table 1 we show the LRS exponents, α for each device. Larger
286
+ values are observed for smaller devices indicating that the trap density is higher in the smallest device compared to the
287
+ larger device.
288
+ 6
289
+
290
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
291
+ Figure 5: Trapping dynamics and Schottky interface energy landscapes. Retention characteristics of differently
292
+ sized devices read at +0.3 V a-c) and -0.5 V (d-f) after a SET voltage of +2 V (red) or -3 V (black). g shows the energy
293
+ landscape of a Schottky interface in equilibrium when the dielectric constant does not depend on electric field (solid
294
+ line) and when the dielectric constant is field-dependent (dashed line). EF and EC are the Fermi level and conduction
295
+ band respectively. The energy landscapes at the center and edge of a device are compared in h in equilibrium and i in
296
+ reverse bias. Red circles represent oxygen vacancy states and the green arrow indicates electron tunneling.
297
+ area
298
+ ���������
299
+ |Exponent|
300
+ Radius (μm)
301
+ Read at +0.3 V
302
+ Read at -0.5 V
303
+ 1
304
+ 0.85±0.03
305
+ 2.17±0.02
306
+ 10
307
+ 0.47±0.02
308
+ 0.987±0.002
309
+ 100
310
+ 0.041±0.004
311
+ 0.626±0.007
312
+ ���������
313
+ trapping density
314
+ Table 1: Magnitude of exponents, α, extracted by fitting a power-law to the low resistance states in the graphs in Fig. 5.
315
+ 3
316
+ Discussion
317
+ While this model provides a clear correlation between trapping density and device area, it does not give information
318
+ about the traps; we implicitly take all traps to be of the same kind, while in reality, the nature of traps can vary greatly.
319
+ The trapping rate can depend on the spatial location of the traps and new traps can be generated via defect migration.
320
+ For a more precise picture of the mechanism, we need to consider a distribution of traps with respect to their location
321
+ within the dielectric. Evidenced by the STEM study, oxygen vacancies are the most important class of trapping defects
322
+ to consider. They are abundantly present in SrTiO3 due to their low formation (0.51 eV[19]) and migration (0.62
323
+ eV[20]) enthalpies and their locations within the energy landscape are well documented[21].
324
+ 7
325
+
326
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
327
+ From the discussion above, it is clear that the energy landscape of these Schottky junctions is far more complex than is
328
+ captured by the most commonly used models that are based solely on parameters of the individual materials forming
329
+ the contact [22, 23]. Transport through these junctions is usually described by the thermionic emission equation, which
330
+ includes an ideality factor accounting for the deviating transport from this ideal diode equation. This model furthermore
331
+ does not consider that the interfacial area is not spatially homogeneous and that in devices of finite areas the boundary
332
+ of the device will be relevant. In particular, it is known that near the edges crowding of the field lines leads to an
333
+ enhancement in the field strength which can decrease the barrier width [24, 25]. This is supported by the results of
334
+ the finite element simulations in Supporting Information Fig. S11 and S12, showing a significant enhancement in the
335
+ electric field around the edge and when downscaling. From the simulations it is evident that there is still a clear field
336
+ gradient in the 1 μm devices, indicating that a further increase in ratio with downscaling can be expected, and the areal
337
+ field shows no apparent saturation till around 10 nm (Fig. S13).
338
+ The observed enhancement is especially important in Nb:STO-based memristive devices as the dielectric constant of
339
+ the substrate strongly depends on electric fields [26, 27]. This will further alter the potential landscape of the Schottky
340
+ interface in such memristive devices. In particular, the dielectric permittivity of Nb:STO rapidly decreases in the
341
+ presence of large electric fields which results in a decrease in the effective Schottky barrier width as illustrated in Fig.
342
+ 5g. Consequently, a large reduction in the barrier width is expected to occur near the device edges (Fig. 5h). It has also
343
+ been shown that an electric field can modify the defect states and significantly affect trapping parameters[28].
344
+ Given that the charge transport is governed by the potential landscape, this will hugely impact the measured current,
345
+ pictured in Fig. 5i. Tunneling through the barrier will be enhanced near the device edges leading to a larger current near
346
+ the device perimeter. This will be especially important in the LRS where the interface is depleted of trapped charges
347
+ and the Schottky barrier is narrower, leading to more tunneling [29, 12].
348
+ Transport across the interface is comprised of thermionic emission and tunneling. The thermionic current density is
349
+ expected to be independent of area and is the dominant mechanism in the HRS at low bias voltages, giving rise to the
350
+ decreasing current in the HRS around zero with downscaling observed in Fig. 3. At higher voltage values, however,
351
+ tunneling will also contribute to the current; the tunneling current density will increase with decreasing area. In Fig. 1b,
352
+ the current is read at +0.3 V where we expect both thermionic emission and tunneling to contribute to transport, giving
353
+ rise to similar currents measured for the 10 and 1 μm devices in the HRS. The tunneling contribution increases in the
354
+ LRS, especially in smaller devices due to the larger electric fields, resulting in the observed increase in current density
355
+ with reducing area.
356
+ By applying a potential over the Schottky barrier, the Fermi level is shifted such that tunneling electrons sample different
357
+ oxygen vacancy energy levels. As the reverse bias voltage is increased, electrons are gradually exposed to larger ranges
358
+ of states in which they can become trapped. In addition, in reverse bias, the electric field at the interface becomes
359
+ larger leading to a reduction in the dielectric constant and a corresponding decrease of the Schottky barrier widths. This
360
+ decrease in width will be more pronounced in regions closer to the edge due to the local field enhancement. As a result
361
+ of the narrower barrier, electron-electron scattering will be reduced and the trap states will act as the main barrier for
362
+ transport. The stronger edge field may additionally facilitate the migration of oxygen vacancies resulting in a higher
363
+ number of vacancies accumulating around the perimeter. Consequently, the trapping efficiency will be greater near the
364
+ edge than in the center. This is a unique effect enabled by the electric field control of the dielectric permittivity, does
365
+ not occur in conventional semiconductors and is relevant for Nb:STO memristive device design.
366
+ We can express the area and perimeter of a device with radius r as A = πr2 and p = 2πr respectively. The ratio of the
367
+ perimeter to area:
368
+ p
369
+ A = 2πr
370
+ πr2 = 2
371
+ r
372
+ (7)
373
+ indicates that the edge effects become more dominant as the device area is reduced. As a result, current flow at the
374
+ perimeter will constitute a larger percentage to the overall transport behavior in smaller devices. This explains the
375
+ enhanced current densities observed when downscaling after applying large bias voltages as well as the larger effective
376
+ trapping densities for smaller devices. Specifically, this field enhancement around the device edges gives rise to an
377
+ increase in the dynamic range in smaller devices, and explains the unexpected resistance window scaling.
378
+ 4
379
+ Conclusions
380
+ As a first demonstration of exploiting edge effect related additional electric fields, our work successfully demonstrates
381
+ the ability to increase the resistance window by device miniaturization of interface memristors from 100 μm down
382
+ to 1 μm, contrary to expectations, with exceptional robustness to device-to-device and cycle variability. Scanning
383
+ transmission electron microscopy images taken in the virgin, high and low resistance states prove the existence of a
384
+ homogeneous interfacial layer, deficient in oxygen, whose physical extent is influenced by applying an electric field.
385
+ 8
386
+
387
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
388
+ This, however, does not explain the enhancement in the resistance window with device downscaling. A model describing
389
+ the interaction of electrons with oxygen vacancy trap states shows an increase in the effective trapping density with
390
+ downscaling. The advantage of direct integration of devices on a semiconducting platform of Nb-doped SrTiO3 allows
391
+ for the locally enhanced fields to controllably tune the interfacial energy landscape at the interface, leading to a greater
392
+ contribution of edge effects in smaller devices as confirmed by finite element simulations. With rapid advances made in
393
+ the palette of materials and devices available for neuromorphic hardware, the thrust now should be in their efficient
394
+ integration on semiconducting platforms for on-chip applications with substantial reduction in areal footprint. In this,
395
+ our work provides an encouraging direction.
396
+ 5
397
+ Experimental Section
398
+ 5.1
399
+ Electrical Device Fabrication
400
+ We investigated a series of Co/Nb-doped SrTiO3 devices, where the device area was varied across the series over a
401
+ range spanning five orders of magnitude ranging from 10−12 to 10−8 m2, with radii between 800 nm and 100 μm.
402
+ The devices were fabricated using Nb-doped SrTiO3 (001) substrates with a doping concentration of 0.1 wt% from
403
+ Crystec. SrTiO3 consists of alternating SrO and TiO2 planes along the [001] direction. The as-received substrates
404
+ have a slight miscut from the exact crystallographic direction and as a result, a mixture of both terminations exists at
405
+ the surface. It has been shown that the local properties of Schottky barriers grown on the different terminations may
406
+ differ, hence to minimize the variation of different areas on the substrate a single termination is desired. To ensure that
407
+ the terminating layer is TiO2, a chemical treatment was carried out with buffered hydrofluoric acid (BHF). A further
408
+ annealing treatment at 960 ◦C in an O2 flow of 300 ccmin−1 to facilitate the reorientation of surface atoms to form
409
+ an atomically flat and straight terraced surface. Atomic force microscopy images were taken at different parts of the
410
+ substrate and confirmed the existence of uniform terraces. The substrate was then coated with a negative resist (AZ
411
+ nLOF 2020) and using electron beam lithography circles of different areas were patterned. A thick insulation layer of
412
+ AlOx was deposited using electron beam evaporation and lift-off was carried out to define a set of direct contacts to
413
+ the substrate. By means of a second lithography step with a positive resist (950 K PMMA), square contact pads were
414
+ defined, each covering a hole and part of the surrounding AlOx: the dimensions of these pads were identical for each
415
+ device to minimize spurious effects arising from significantly different contact resistances. Co (20 nm) and a capping
416
+ layer of Au (100 nm) were then deposited using electron beam evaporation in high vacuum (∼10−6 Torr).
417
+ 5.2
418
+ Electrical Characterization
419
+ Electrical measurements were conducted using probes connected to two remote-sense and switch units (RSU) of a
420
+ Keysight B1500A Semiconductor Device Parameter Analyzer. During the voltage sweeping measurements, conducted
421
+ using a sweeping measurement unit (SMU), the bottom of the substrate is held at 0 V while a voltage is applied to
422
+ the top electrode. Due to the diodic nature of the devices in conjunction with large degrees of resistive switching,
423
+ the measured currents during a single sweeping measurement span up to 9 orders of magnitude. For this reason, the
424
+ measurements were performed using auto range for the measured current. The effects of this can be observed in the
425
+ endurance cycling measurements which were performed at high sweeping rates in the form of plateaus in the current
426
+ whenever a limit of the SMU range is reached.
427
+ 5.3
428
+ Scanning Transmission Electron Microscopy
429
+ The samples discussed in this work use SrTiO3 (001) substrates with an Nb-doping in place of Ti of 0.1 wt% from
430
+ Crystec. The surface was prepared using a chemical treatment with buffered hydrofluoric acid (BHF). Next, the
431
+ substrates were annealed at 960◦C in an O2 flow of 300 ccmin−1. For STEM samples films were deposited by electron
432
+ beam evaporation of 20 nm of Co capped with 20 nm of Au and 20 nm of Pt. From this, three types of STEM lamellae
433
+ were prepared: virgin (unbiased) samples, low resistance state (LRS) samples and high resistance state (HRS) samples.
434
+ Using a probe station, samples are subjected to bias values of +2 V and -3 V to prepare samples in the LRS and HRS
435
+ respectively. STEM lamellae were extracted from samples along the <110> direction using a Helios G4 CX dual beam
436
+ system with a Ga focused ion beam. The lamellae were thinned to make them transparent to electrons using the focused
437
+ ion beam. Imaging was carried out using a Thermo Fisher Scientific Themis Z S/TEM system operating at 300 kV.
438
+ STEM-High-angle annular dark-field (HAADF) images are most widely used, because they are readily interpretable
439
+ with atomic columns being bright spots in a dark surrounding, where the brightness of the spots scale with the average
440
+ atomic number Z (∼Z1.7). This technique is well suited to image heavy elements, but lighter elements, such as oxygen,
441
+ are harder to detect, and cannot be detected properly when integrated into a matrix with much heavier elements (like Sr).
442
+ Therefore, to gain more insight into the important role played here by the oxygen ions, we utilized here STEM-iDPC
443
+ 9
444
+
445
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
446
+ instead of STEM-HAADF imaging. This technique uses a four-quadrant annular bright field detector and can be used
447
+ to acquire the projected local electrostatic potential of the sample (when thin) and has clear advantages over traditional
448
+ annular bright field (ABF) imaging [14, 15].
449
+ 5.4
450
+ Simulations
451
+ Finite element modeling of the electric field profile at the interface was carried out using COMSOL Multiphysics.
452
+ 5.5
453
+ Statistical Analysis
454
+ For the |current|-voltage graphs, the absolute value of the measured current is taken; to determine the current density,
455
+ the measured current was divided by the area of the Co contact. The values in Table 1 were derived by iteratively fitting
456
+ the data in Fig. 5a-f using a power-law equation of the form I = I0(t − t0)−α by means of the Levenberg-Marquardt
457
+ algorithm; the reported errors are the standard errors calculated by this method. The fits are shown in supporting Fig.
458
+ S9. The inverse scaling of the exponent and device area was verified for different devices and different reading and SET
459
+ voltages. Plotting and analysis of electrical measurements was done using OriginPro 8.5. Measurements were repeated
460
+ on four devices of each area to check reproducibility and validity of results.
461
+ For STEM images, multiple regions for each one of the three bias conditions were taken to verify the results. The idpc
462
+ images were filtered by applying a high-pass Gaussian filter using Velox.
463
+ Acknowledgements
464
+ A.G. is supported by the CogniGron Center, University of Groningen. Device fabrication was realized using NanoLab
465
+ NL facilities. We acknowledge technical support from J. G. Holstein, H. H. de Vries, A. Joshua, T. Schouten, and H.
466
+ Adema. We thank R. J. E Hueting, P. Nukala, S. de Graaf and T. Kenyon for useful discussions. A.G., D.G, I.B, and
467
+ T.B. benefited from helpful discussions with the members of the Spintronics of Functional Materials group.
468
+ Conflict of Interest
469
+ The authors declare no conflict of interest
470
+ Author Contributions
471
+ A.G. and T.B. conceived the idea and designed the devices. A.G. and D.G. fabricated devices for electrical measurements
472
+ and performed electrical measurements, along with I.B.. D.G. derived the mathematical model discussed in the
473
+ manuscript. M.A. and A.G. fabricated lamalae for STEM and M.A. took STEM images. Finite element simulations
474
+ were done by A.G.. All authors analyzed the data, discussed the results and agreed on their implications. All authors
475
+ contributed to the preparation of the manuscript.
476
+ References
477
+ [1] S. Hamdioui, M. Taouil, H. A. Du Nguyen, A. Haron, L. Xie, and K. Bertels. Memristor: the enabler of computation-
478
+ in-memory architecture for big-data. In 2015 International Conference on Memristive Systems (MEMRISYS), pages
479
+ 1–3. IEEE, 2015.
480
+ [2] M. V. Wilkes. The memory wall and the CMOS end-point. ACM SIGARCH Computer Architecture News, 23(4):4–6,
481
+ 1995.
482
+ [3] S. A. McKee. Reflections on the memory wall. In Proceedings of the 1st Conference on Computing Frontiers, page
483
+ 162, 2004.
484
+ [4] M. Horowitz. 1.1 computing’s energy problem (and what we can do about it). In 2014 IEEE International
485
+ Solid-State Circuits Conference Digest of Technical Papers (ISSCC), pages 10–14. IEEE, 2014.
486
+ [5] K. Lahiri and A. Raghunathan. Power analysis of system-level on-chip communication architectures. In Proceedings
487
+ of the 2nd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, pages
488
+ 236–241, 2004.
489
+ [6] S. Hamdioui, D. Gizopoulos, G. Guido, M. Nicolaidis, A. Grasset, and P. Bonnot. Reliability challenges of real-time
490
+ systems in forthcoming technology nodes. In 2013 Design, Automation & Test in Europe Conference & Exhibition
491
+ (DATE), pages 129–134. IEEE, 2013.
492
+ [7] S. Manipatruni, D. E. Nikonov, and I. A. Young. Beyond cmos computing with spin and polarization. Nature
493
+ Physics, 14(4):338–343, 2018.
494
+ 10
495
+
496
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
497
+ [8] A. Sawa. Resistive switching in transition metal oxides. Materials Today, 11(6):28–36, 2008.
498
+ [9] L. Zhang, B. Neely, D. Franklin, D. Strukov, Y. Xie, and F. T. Chong. Mellow writes: Extending lifetime in
499
+ resistive memories through selective slow write backs. In 2016 ACM/IEEE 43rd Annual International Symposium
500
+ on Computer Architecture (ISCA), pages 519–531. IEEE, 2016.
501
+ [10] D. S. Ang, Y. Zhou, K. S. Yew, and D. Berco. On the area scalability of valence-change memristors for
502
+ neuromorphic computing. Applied Physics Letters, 115(17), 2019.
503
+ [11] M. Lanza, A. Sebastian, W. D. Lu, M. Le Gallo, M.-F. Chang, D. Akinwande, F. M. Puglisi, H. N. Alshareef,
504
+ M. Liu, and J. B. Roldan. Memristive technologies for data storage, computation, encryption, and radio-frequency
505
+ communication. Science, 376(6597):eabj9979, 2022.
506
+ [12] A. S. Goossens, A. Das, and T. Banerjee. Electric field driven memristive behavior at the Schottky interface of
507
+ Nb-doped SrTiO3. Journal of Applied Physics, 124(15):152102, 2018.
508
+ [13] T. F. Tiotto, A. S. Goossens, T. Banerjee, J. P. Borst, and N. A. Taatgen. Learning to approximate functions using
509
+ Nb-doped SrTiO3 memristors. Frontiers in Neuroscience, 14:1456, 2020.
510
+ [14] I. Lazi´c, E. G. T. Bosch, and S. Lazar. Phase contrast STEM for thin samples: Integrated differential phase
511
+ contrast. Ultramicroscopy, 160:265–280, 2016.
512
+ [15] S. de Graaf, J. Momand, C. Mitterbauer, S. Lazar, and B. J. Kooi. Resolving hydrogen atoms at metal-metal
513
+ hydride interfaces. Science Advances, 6(5):eaay4312, 2020.
514
+ [16] P. Nukala, M. Ahmadi, Y. Wei, S. de Graaf, E. Stylianidis, T. Chakrabortty, S. Matzen, H. W. Zandbergen,
515
+ A. Björling, D. Mannix, et al. Reversible oxygen migration and phase transitions in hafnia-based ferroelectric
516
+ devices. Science, 372(6542):630–635, 2021.
517
+ [17] J. Sung Lee, S. Buhm Lee, B. Kahng, and T. Won Noh. Two opposite hysteresis curves in semiconductors with
518
+ mobile dopants. Applied Physics Letters, 102(25):253503, 2013.
519
+ [18] S. Lee, J. S. Lee, J.-B. Park, Y. Koo Kyoung, M.-J. Lee, and T. Won Noh. Anomalous effect due to oxygen
520
+ vacancy accumulation below the electrode in bipolar resistance switching Pt/Nb: SrTiO3 cells. APL Materials,
521
+ 2(6):066103, 2014.
522
+ [19] R. A. De Souza, V. Metlenko, D. Park, and T. E. Weirich. Behavior of oxygen vacancies in single-crystal SrTiO3:
523
+ Equilibrium distribution and diffusion kinetics. Physical Review B, 85(17):174109, 2012.
524
+ [20] L. Iglesias, A. Sarantopoulos, C. Magén, and F. Rivadulla. Oxygen vacancies in strained SrTiO3 thin films:
525
+ Formation enthalpy and manipulation. Physical Review B, 95(16):165138, 2017.
526
+ [21] C. Freysoldt, B. Grabowski, T. Hickel, J. Neugebauer, G. Kresse, A. Janotti, and C. G. Van de Walle. First-
527
+ principles calculations for point defects in solids. Reviews of Modern Physics, 86(1):253, 2014.
528
+ [22] W. Schottky. Zur halbleitertheorie der sperrschicht-und spitzengleichrichter. Zeitschrift für Physik, 113(5):367–414,
529
+ 1939.
530
+ [23] N. F. Mott. The theory of crystal rectifiers. Proceedings of the Royal Society of London. Series A. Mathematical
531
+ and Physical Sciences, 171(944):27–38, 1939.
532
+ [24] E. H. Rhoderick. Metal-semiconductor contacts. IEE Proceedings I-Solid-State and Electron Devices, 129(1):1,
533
+ 1982.
534
+ [25] A. J. Willis. Edge effects in Schottky diodes. Solid-State Electronics, 33(5):531–536, 1990.
535
+ [26] J. H. Barrett. Dielectric constant in perovskite type crystals. Physical Review, 86(1):118, 1952.
536
+ [27] R. A. van der Berg, P. W. M. Blom, J. F. M. Cillessen, and R. M. Wolf. Field dependent permittivity in
537
+ metal-semiconducting SrTiO3 Schottky diodes. Applied Physics Letters, 66(6):697–699, 1995.
538
+ [28] G. A. Dussel and R. H. Bube. Electric field effects in trapping processes. Journal of Applied Physics, 37(7):2797–
539
+ 2804, 1966.
540
+ [29] E. Mikheev, B. D. Hoskins, D. B. Strukov, and S. Stemmer. Resistive switching and its suppression in Pt/Nb:SrTiO3
541
+ junctions. Nature Communications, 5(1):1–9, 2014.
542
+ 11
543
+
544
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
545
+ Supplementary Data
546
+ Figure S1: Current densities of virgin devices. Results are shown for devices of radial dimensions of 100 μm (black),
547
+ 10 μm (blue) and 1 μm (red).
548
+ Figure S2: Cycle-to-cycle variation. The current density read at +0.3 V for device sizes of 100 μm (black), 10 μm
549
+ (blue) and 1 μm (red).
550
+ S1
551
+
552
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
553
+ Figure S3: Device-to-device variation. Current-voltage sweeps from +2 V to -3 V to +2 V at a rate of 1.52 Vs−1
554
+ measured between a SET voltage of +2 V and a -3 V RESET voltage. Measurements are shown for different devices to
555
+ demonstrate the low device-to-device variability.
556
+ Figure S4: Measurements of 800 nm devices: device-to-device variation when controlled with a larger voltage range.
557
+ The red graph is the device presented in the main text. These devices show a greater degree of variation, due to small
558
+ differences in their areas and edges arising from the fabrication process. There resistance ratios, however remain high.
559
+ S2
560
+
561
+ 32 μm
562
+ 10 μm
563
+ 3.2 μm
564
+ 1 μm10'3
565
+ 10-5
566
+ ICurrentl (A)
567
+ 10'
568
+ 109
569
+ 10
570
+ 11
571
+ TT
572
+ -3
573
+ -2
574
+ -1
575
+ 0
576
+ 1
577
+ 2
578
+ Voltage (V)MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
579
+ Figure S5: Side wall profile of electrical measurement device: (a) and (b) STEM-HAADF images. The inset in (b)
580
+ marks the interfacial region close to the edge. STEM-energy-dispersive X-ray spectroscopy (STEM-EDX) elemental
581
+ mapping image of (c) Au, (d) Sr, (e) O, (f) Ti, (g) Al and (h) Co.
582
+ S3
583
+
584
+ (a)
585
+ (b)
586
+ 400nm
587
+ 200nm
588
+ Au
589
+ Sr
590
+ (c)
591
+ (d)
592
+ 0
593
+ Ti
594
+ (e)
595
+ (f)
596
+ (g)
597
+ Al
598
+ (h)
599
+ CoMEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
600
+ Figure S6: Nb:STO/Ti interface: (a) STEM-EDX elemental map of Sr Ti and O. (b) elemental intensity as a function
601
+ of position along the line scan in (a). STEM-iDPC images of (c) the interface and (d) away from the interface.
602
+ S4
603
+
604
+ (a)
605
+ Sr
606
+ Ti
607
+ line scan
608
+ 2 nm
609
+ (b)
610
+ Net Intensity / Counts
611
+ Intensity / kCounts
612
+ PositionMEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
613
+ Figure S7: Ti-column displacement: iDPC-STEM image inside Nb:STO substrate close to the interface. Some of the
614
+ Ti ions occupying ideal perovskite positions are marked in yellow while displaced ions are marked in red with arrows
615
+ highlighting the direction of displacement.
616
+ S5
617
+
618
+ QQ0
619
+ 000
620
+ 000
621
+ 000
622
+ 0Q0
623
+ unmMEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
624
+ S1. Derivation of the relation between trapping density and exponent.
625
+ Figure S8: Schematic of parameters in section S1: Eap and x represent the applied electric field and centroid of
626
+ trapped charge, defined with respect to the interface, respectively. The number density of trapped charges, n, is depicted
627
+ by the black curve as a function of position in the dielectric.
628
+ If we assume that the rate of trapping has no dependence on the location of traps, the electric field, E, can be expressed
629
+ as:
630
+ E = Eap − qnx
631
+ η
632
+ (S1)
633
+ where Eap is the applied electric field, q the electric charge, n is the number density of trapped charges, x is the centroid
634
+ of the trapped charge with respect to the interface and η is the dielectric permittivity. In [S1], charge trapping was
635
+ analyzed on the basis of three mechanisms, namely first-order trapping, first-order trapping with Coulombic interactions,
636
+ and trapping which increases during injection due to the generation of states. The expressions for current they derive
637
+ are qualitatively similar for each mechanism. Hence, for simplicity, we consider the rate of trapping density to be a
638
+ decay in first order with the addition of electron-electron interactions. Coulombic repulsion may inactivate trapping
639
+ sites surrounding a trapped electron. This is included in the rate equation by multiplying a probability factor. If the
640
+ volume of dielectric rendered inactive by a trap is h, then the trapping is reduced by a factor of (1 − h
641
+ V ), where V is the
642
+ volume of the dielectric. For n trapped charges, the factor is (1 − h
643
+ V )n. The trapping rate can be expressed as:
644
+ dn
645
+ dt = (n0 − n)σ Jvth
646
+ qvd
647
+
648
+ 1 − h
649
+ V
650
+ �n
651
+ (S2)
652
+ where n0 is the maximum number of traps available, J/q is the net flux density, vth and vd are the thermal and drift
653
+ velocities respectively, and σ is capture cross-section. Assuming the total volume of the dielectric to be much larger
654
+ than the volume deactivated by trapping events so that, 1≫ h/V and n0 ≫ n, this expression can be simplified to:
655
+ dn
656
+ dt = n0σ Jvth
657
+ qvd
658
+ e− nh
659
+ V
660
+ (S3)
661
+ S6
662
+
663
+ E
664
+ apMEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
665
+ Solving this equation yields the following expression for n:
666
+ n = V
667
+ h ln
668
+ � Q
669
+ Q∗ + 1
670
+
671
+ (S4)
672
+ where Q =
673
+
674
+ Jdt is the total injected charge and
675
+ Q∗ =
676
+ V vdq
677
+ n0hvthσ
678
+ (S5)
679
+ We express the current in terms of the electric field as:
680
+ ln
681
+ � J
682
+ J0
683
+
684
+ = E
685
+ E0
686
+ = 1
687
+ E0
688
+
689
+ Eap − V
690
+ h
691
+ qx
692
+ η ln
693
+ � Q
694
+ Q∗ + 1
695
+ ��
696
+ (S6)
697
+ The current follows a decaying power law with time, J = Jst−α, and the injected charge as a function of time is given
698
+ by:
699
+ Q(t) =
700
+
701
+ Jdt = Jst1−α
702
+ 1 − α
703
+ (S7)
704
+ Substituting S7 into S6 when Q/Q∗ ≫ yields and noting β = V qx
705
+ hE0ϵ:
706
+ ln
707
+ � J
708
+ J0
709
+
710
+ = 1
711
+ E0
712
+
713
+ Eap − β ln
714
+
715
+ Jst1−α
716
+ Q∗(1 − α)
717
+ ��
718
+ = 1
719
+ E0
720
+
721
+ Eap − β ln
722
+
723
+ Jst
724
+ Q∗(1 − α)
725
+
726
+ − β(1 − α) ln t
727
+
728
+ (S8)
729
+ Comparing S8 with J = Jst−α implies
730
+ α = β(1 − α)
731
+ =
732
+ β
733
+ 1 + β
734
+ (S9)
735
+ and
736
+ Js ≈ mEap + n − β ln(Js)
737
+ (S10)
738
+ Where m encompasses several material parameters. Writing β in terms of α, and since measured currents are less than
739
+ 10−4 A, Js can be neglected in comparison to ln(Js), leading to:
740
+ α
741
+ 1 − α ln(Js) ≈ mEap + n
742
+ (S11)
743
+ β is positive, we know from Eq. S9 that α lies between 0 and 1, and is a monotonically increasing function of β.
744
+ Considering that β = V
745
+ h
746
+ qx
747
+ E0 , an increase in either the effective density, V/h or in x gives rise to an increase in α, with
748
+ the former being physically more likely.
749
+ Instead of deriving an explicit expression for the number density of trapped charge, we can also directly relate the
750
+ trapping rate to the current, as was done in for example [S2]. We use QT to denote the charge that is trapped when
751
+ charge Q is injected into the dielectric. The ratio dQT
752
+ dQ is assumed to be a function of current, i.e.
753
+ dQT
754
+ dQ = f
755
+ � J
756
+ J0
757
+
758
+ (S12)
759
+ Substituting Eq. S12 into Eq. S1 gives:
760
+ dE
761
+ dt = Jx
762
+
763
+ dQT
764
+ dQ
765
+ (S13)
766
+ where l is the length of the dielectric and J = dQ
767
+ dt . To relate this to the power law, we assume a solution of the form
768
+ dQT
769
+ dQ =
770
+ � J
771
+ J0
772
+ �α
773
+ (S14)
774
+ with α ≥ 0. A general expression for the current assumes the form:
775
+ J(E) = J0(E)eg(E0)
776
+ (S15)
777
+ S7
778
+
779
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
780
+ where the specific functions are determined by the relevant conduction mechanisms. Specifically here, using Eq. S14
781
+ we can express the current as
782
+ J = Js
783
+ t
784
+ t0
785
+ −1/(α+1)
786
+ (S16)
787
+ For conduction given by an exponential relation as in Eq. S6:
788
+ Js ∝ e
789
+ (1−1/(α+1)V
790
+ V0
791
+ (S17)
792
+ while for conduction determined by Frenkle-Poole equation, we arrive at:
793
+ Js ∝ V e
794
+ (1−1/(α+1)V
795
+ 1
796
+ 2
797
+ V0
798
+ (S18)
799
+ and for Fowler-Nordheim conduction we get:
800
+ Js ∝ V 2e
801
+ (1−1/(α+1))V −1
802
+ V0
803
+ (S19)
804
+ Here, V0 is a constant.
805
+ The dominant transport mechanism in a system can be determined by plotting the current versus voltage on a double
806
+ logarithmic scale. Equations S9, S11, S17, S18 and S19 indicate a clear theoretical proof that the exponent in the power
807
+ law is directly proportional to the effective trap density or capacity of the dielectric to trap electrons, independent of
808
+ which transport mechanism is dominant.
809
+ S8
810
+
811
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
812
+ Figure S9: Fits of the retention data to extract the exponents α: The model used is |I| = I0(t − t0)−α), where |I|
813
+ and t are the absolute current and time respectively, and I0 and t0 are fitting parameters. The adjusted R2 values of the
814
+ fits are (a) 0.99237, (b) 0.99475, (c) 0.99689, (d) 0.99717, (e) 0.99995, and (f) 0.99996. (g) shows the dependence of
815
+ the exponents on area.
816
+ S2. Modeling the edge effects
817
+ To visualize the field profiles in our devices we used finite element analysis (COMSOL). The modeling geometry is
818
+ shown in Fig S10. In each simulation, the Nb:STO substrate was modelled as a cube with a dielectric constant of 300
819
+ and a thickness of 0.5 mm (along z), corresponding to the thickness used in the experimental study. A circular Co
820
+ electrode of radius 1 μm, 10 μm or 100 μm was placed on the top surface of the substrate (z=0.5 mm). A ground node
821
+ was placed on the bottom of the substrate (z=0), while a voltage was applied to the top Co electrode. For the simulations
822
+ in Fig. S13. the size of the substrate was reduced to improve the resolution of the mesh. This was required to retain the
823
+ circular nature of the electrodes for the 10 nm devices; this was determined not to influence the electric field strength.
824
+ S9
825
+
826
+ 100 μum read at +0.3 V
827
+ 10 μum read at +0.3 V
828
+ 1 μm read at +0.3 V
829
+ α=0.041±0.004
830
+ α=0.47±0.02
831
+ α=0.85±0.03
832
+ 104
833
+ 10~5
834
+ 105
835
+ I (A)
836
+ [Currentl
837
+ ICurrentl
838
+ ICurrentl
839
+ 10°
840
+ 10
841
+ (a)
842
+ (b)
843
+ 107
844
+ (c)
845
+ 10°
846
+ 10°
847
+ Time (a.u.)
848
+ Time (a.u.)
849
+ Time (a.u.)
850
+ 100 μm read at -0.5 V
851
+ 10 μm read at -0.5 V
852
+ 1 μm read at -0.5 V
853
+ α=0.626±0.007
854
+ α=0.987±0.002
855
+ 10~5
856
+ α=2.17±0.02
857
+ 10°5
858
+ 10°
859
+ 10*6
860
+ Currentl (A)
861
+ W10*
862
+ ICurrentl (A)
863
+ 10-
864
+ ICurrentl
865
+ 10°
866
+ 10
867
+ 10°
868
+ 109
869
+ (d)
870
+ 10~8
871
+ (e)
872
+ ()
873
+ 10°
874
+ 10-
875
+ Time (a.u.)
876
+ Time (a.u.)
877
+ Time (a.u.)
878
+ Read at +0.3
879
+ 2.0
880
+ Read at -0.5
881
+ 1.5
882
+ 1.0
883
+ 0.5
884
+ 0.0
885
+ (g)
886
+ 10-12
887
+ 10-11
888
+ 10-10
889
+ 10-9
890
+ 108
891
+ Area (m²)MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
892
+ Figure S10: Model sample geometry: the Nb:STO substrate is represented by a cube with a thickness of 0.5 mm
893
+ (along z). Circular Co electrode of radii (a) 1 μm, (b) 10 μm and (c) 100 μm is placed on the top surface of the substrate
894
+ (z=0.5 mm). A ground node is placed on the bottom of the substrate (z=0), while a voltage is applied to the top Co
895
+ electrode.
896
+ Figure S11: Electric field at -3 V: along the surface normal (z direction) for (a)+(d) 1 μm, (b)+(e) 10 μm and (c)+(f)
897
+ 100 μm devices, The plots on the top row ((a)-(c)) have the same scale bar, with a maximum field value of 3.5 ×106
898
+ Vm−1. For the bottom row, the scale bar has a maximum value of (d) 2 ×107 Vm−1, (e) 2 ×106 Vm−1 and (f) 3 ×105
899
+ Vm−1.
900
+ S10
901
+
902
+ (a)
903
+ ×10*4 m
904
+ (b)
905
+ ×10'4 m
906
+ (c)
907
+ ×10'4 m
908
+ 2
909
+ 2
910
+ 2
911
+ 0
912
+ ×104 m
913
+ 2
914
+ ×10*4 m
915
+ ×104 m
916
+ ×104 m(a)
917
+ X10°
918
+ (b)
919
+ 310°
920
+ (c)
921
+ X10%
922
+ 3
923
+ 3
924
+ 3
925
+ 2.5
926
+ 2.5
927
+ 2.5
928
+ 2
929
+
930
+ 2
931
+ 1.5
932
+ 1.5
933
+ 1.5
934
+ 1
935
+ 0.5
936
+ 0.5
937
+ 0.5
938
+ (d)
939
+ X107
940
+ (e)
941
+ (f)
942
+ ×106
943
+ X105
944
+ 2
945
+ 2
946
+ 1.8
947
+ 1.8
948
+ 2.5
949
+ 1.6
950
+ 1.6
951
+ 1.4
952
+ 1.4
953
+ 1.2
954
+ 1.2
955
+ 1
956
+ 1
957
+ 1.5
958
+ 0.8
959
+ 0.8
960
+ 0.6
961
+ 0.6
962
+ 0.4
963
+ 0.4
964
+ 0.5
965
+ 0.2
966
+ 0.2MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
967
+ Figure S12: Electric field at +2 V: along the surface normal (z direction) for (a)+(d) 1 μm, (b)+(e) 10 μm and (c)+(f)
968
+ 100 μm devices, The plots on the top row ((a)-(c)) have the same scale bar, with a maximum field strength of -3 ×106
969
+ Vm−1. For the bottom row, the scale bar has a maximum value of (d) -1 ×107 Vm−1, (e) -1.5 ×106 Vm−1 and (f) -2
970
+ ×105 Vm−1.
971
+ Figure S13: Electric field at -3 V: along the surface normal (z direction) for (a) 100 nm, (b) 50 nm and (c) 10 nm
972
+ devices. No saturation of the field is observed in (a) and (b) and the field appears to saturate in the 10 nm devices.
973
+ S11
974
+
975
+ (a)
976
+ (b)
977
+ (c)
978
+ X106
979
+ X106
980
+ 0
981
+ 0
982
+ -0.5
983
+ -0.5
984
+ -0.5
985
+ -1
986
+ -1
987
+ -1
988
+ -1.5
989
+ -1.5
990
+ -1.5
991
+ -2
992
+ -2
993
+ -2.5
994
+ -2.5
995
+ -2.5
996
+ -3
997
+ -3
998
+ -3
999
+ (d)
1000
+ (e)
1001
+ (f)
1002
+ ×107
1003
+ X106
1004
+ X105
1005
+ 10
1006
+ 0
1007
+ 10
1008
+ -0.1
1009
+ -0.2
1010
+ -0.2
1011
+ -0.2
1012
+ -0.4
1013
+ -0.4
1014
+ -0.3
1015
+ -0.6
1016
+ -0.4
1017
+ -0.6
1018
+ -0.8
1019
+ 0.5
1020
+ 1
1021
+ -0.8
1022
+ -0.6
1023
+ -1.2
1024
+ -1
1025
+ 0.7
1026
+ -1.4
1027
+ -0.8
1028
+ -1.2
1029
+ -1.6
1030
+ -0.9
1031
+ -1.8
1032
+ -1.4
1033
+ .1
1034
+ -2(a)
1035
+ (b)
1036
+ (c)
1037
+ X107
1038
+ ×107
1039
+ X108
1040
+ 9
1041
+ 1.3
1042
+ 8.8
1043
+ 1.29
1044
+ 5.5
1045
+ 8.6
1046
+ 1.28
1047
+ 8.4
1048
+ 1.27
1049
+ 8.2
1050
+ 1.26
1051
+ 5
1052
+ 8
1053
+ 1.25
1054
+ 7.8
1055
+ 1.24.
1056
+ 4.5
1057
+ 7.6
1058
+ 1.23
1059
+ 7.4
1060
+ 1.22
1061
+ 4
1062
+ 7.2
1063
+ 1.21
1064
+ 3.5
1065
+ 7
1066
+ 1.2MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
1067
+ S3. Literature survey of interfacial switching
1068
+ It is often suggested that a layer close to the interface layer is responsible for the switching [29, S4, S5]. Some groups
1069
+ have shown that both high and low resistance states show an area-independent current density, eluding to a switching
1070
+ mechanism that occurs homogeneously over the entire device area [S6]. Often this is explained in terms of a change
1071
+ in the Schottky barrier height and width induced by charge trapping at the interface [S7, 29, S4, S8, 12, S10] and
1072
+ movement of oxygen vacancies [S8, S10]. Other explanations are proposed where the barrier profile is unchanged
1073
+ and interfacial changes happen at local regions. Explanation of this type includes It has also been proposed that the
1074
+ application of a positive bias results in the generation of oxygen vacancies, forming tunnelling paths and giving rise to a
1075
+ LRS where tunnelling, rather than thermionic emission dominate charge transport. The application of a negative bias
1076
+ results in the accumulated of large amounts of oxygen in the vacancies which prevents tunnelling and gives a HRS
1077
+ [S11, S12].
1078
+ Rodenbücher et al. used local-conductivity AFM on highly doped Nb:STO to show the presence of nanoscale
1079
+ conducting and switchable clusters. Suggesting that in this case switching is a local phenomenon related to the presence
1080
+ of conducting clusters with higher Nb content than their surroundings [S13].
1081
+ Finally Chen et al. used scanning tunnelling microscopy and spectroscopy to study the resistive switching in Nb-doped
1082
+ SrTiO3 without an electrode, demonstrating that oxygen migration is the results in a variation of electronic structure
1083
+ during the switching. With a negative voltage, oxygen anions at the interface near the STM tip were oxidised into oxygen
1084
+ molecules and left the lattice. Simultaneously, oxygen vacancies diffuse into the sample, which act like donor-like
1085
+ levels causing distortions in LDOS near conduction band and enhance the carrier concentration with electron hopping,
1086
+ thus increasing the sample’s conducting. With a positive voltage, oxygen anions return into the sample and the influence
1087
+ of the donor-like level became weak and the conductivity decreased [S14].
1088
+ Despite a large number of contradictory results and explanations, factors of importance that have been identified include
1089
+ the semiconductor doping concentration, electrode material and the quality of the interface.
1090
+ S12
1091
+
1092
+ MEMRISTIVE MEMORY ENHANCEMENT BY DEVICE MINIATURIZATION
1093
+ References
1094
+ [S1] D. R. Wolters and J. J. van der Schoot. Kinetics of charge trapping in dielectrics. Journal of Applied Physics,
1095
+ 58(2):831–837, 1985.
1096
+ [S2] R. H. Walden. A method for the determination of high-field conduction laws in insulating films in the presence
1097
+ of charge trapping. Journal of Journal of Applied Physics, 43(3):1178–1186, 1972.
1098
+ [S3] E. Mikheev, B. D. Hoskins, D. B. Strukov, and S. Stemmer.
1099
+ Resistive switching and its suppression in
1100
+ Pt/Nb:SrTiO3 junctions. Nature Communications, 5(1):1–9, 2014.
1101
+ [S4] E. M. Bourim, Y. Kim, and D.-W. Kim. Interface state effects on resistive switching behaviors of Pt/Nb-doped
1102
+ SrTiO3 single-crystal Schottky junctions. ECS Journal of Solid State Science and Technology, 3(7):N95, 2014.
1103
+ [S5] Z. Fan, H. Fan, L. Yang, P. Li, Z. Lu, G. Tian, Z. Huang, Z. Li, J. Yao, Q. Luo, et al. Resistive switching induced
1104
+ by charge trapping/detrapping: a unified mechanism for colossal electroresistance in certain Nb:SrTiO3-based
1105
+ heterojunctions. Journal of Materials Chemistry C, 5(29):7317–7327, 2017.
1106
+ [S6] H. Sim, H. Choi, D. Lee, M. Chang, D. Choi, Y. Son, E.-H. Lee, W. Kim, Y. Park, I.-K. Yoo, et al. Excellent
1107
+ resistance switching characteristics of Pt/SrTiO3 Schottky junction for multi-bit nonvolatile memory application.
1108
+ In IEEE International Electron Devices Meeting, 2005. IEDM Technical Digest., pages 758–761. IEEE, 2005.
1109
+ [S7] M. C. Ni, S. M. Guo, H. F. Tian, Y. G. Zhao, and J. Q. Li. Resistive switching effect in SrTiO3−δ/ Nb-doped
1110
+ SrTiO3 heterojunction. Applied Physics Letters, 91(18):183502, 2007.
1111
+ [S8] X.-B. Yin, Z.-H. Tan, and X. Guo. The role of Schottky barrier in the resistive switching of SrTiO3: direct
1112
+ experimental evidence. Physical Chemistry Chemical Physics, 17(1):134–137, 2015.
1113
+ [S9] A. S. Goossens, A. Das, and T. Banerjee. Electric field driven memristive behavior at the Schottky interface of
1114
+ Nb-doped SrTiO3. Journal of Applied Physics, 124(15):152102, 2018.
1115
+ [S10] J. Li, G. Yang, Y. Wu, W. Zhang, and C. Jia. Asymmetric resistive switching effect in Au/Nb: SrTiO3 Schottky
1116
+ junctions. Physica Status Solidi (a), 215(6):1700912, 2018.
1117
+ [S11] T. Fujii, M. Kawasaki, A. Sawa, Y. Kawazoe, H. Akoh, and Y. Tokura. Electrical properties and colossal
1118
+ electroresistance of heteroepitaxial SrRuO3/SrTi1−xNbxO3 (0.0002≤x≤0.02) Schottky junctions. Physical
1119
+ Review B, 75(16):165101, 2007.
1120
+ [S12] D.-J. Seong, D. Lee, M. Pyun, J. Yoon, and H. Hwang. Understanding of the switching mechanism of a
1121
+ Pt/Ni-doped SrTiO3 junction via current–voltage and capacitance–voltage measurements. Japanese Journal of
1122
+ Applied Physics, 47(12R):8749, 2008.
1123
+ [S13] C. Rodenbücher, W. Speier, G. Bihlmayer, U. Breuer, R. Waser, and K. Szot. Cluster-like resistive switching of
1124
+ SrTiO3:Nb surface layers. New Journal of Physics, 15(10):103017, 2013.
1125
+ [S14] Y. L. Chen, J. Wang, C. M. Xiong, R. F. Dou, J. Y. Yang, and J. C. Nie.
1126
+ Scanning tunneling mi-
1127
+ croscopy/spectroscopy studies of resistive switching in Nb-doped SrTiO3.
1128
+ Journal of Applied Physics,
1129
+ 112(2):023703, 2012.
1130
+ S13
1131
+
G9E1T4oBgHgl3EQfrQVc/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HNAzT4oBgHgl3EQfHfvA/content/2301.01047v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:347c75e2070c8bbeea3449c5a3f023237cab41996bd91cd29f746cf2999f16fc
3
+ size 432312
HNAzT4oBgHgl3EQfHfvA/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3d74d4fd64da200be31faea70da63198cd775f411e55de8129a456646c645172
3
+ size 2818093
HdAzT4oBgHgl3EQfxf76/content/2301.01741v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cbdcb0ab814c9c80105ecfef97916f1420d9d03e4a8663755321bfbfbb211e64
3
+ size 777116
HdAzT4oBgHgl3EQfxf76/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2c718ff664c26d69d562f6fb934af8340ee619df79f4234906d9ac0f6988ba15
3
+ size 2359341
HdAzT4oBgHgl3EQfxf76/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ed98cf1f670059484fa30468f7f44e0c3bcef24f7cdb9f9062deef4a84cf0979
3
+ size 93192
HtFJT4oBgHgl3EQfui1l/content/2301.11622v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5f477eda7b254492866edab91915f99f714fd82e430e0adc622c194a5308b45d
3
+ size 289888
HtFJT4oBgHgl3EQfui1l/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7574205e52c51d121f699715013b43e268cb4cf0f8aafbdbd0762f1178d6831c
3
+ size 97947
I9E4T4oBgHgl3EQfIgyC/content/2301.04913v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d8847f92840705475a001c6df1e0ed6acc4450409299c4e46b8afda3442a5355
3
+ size 610268
I9E4T4oBgHgl3EQfIgyC/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d98fc67fb7512b73287c22bcf3f48223e1c5145390fdbabe9c4da1d0bb0031a8
3
+ size 155996
IdAyT4oBgHgl3EQf5vqw/content/tmp_files/2301.00811v1.pdf.txt ADDED
@@ -0,0 +1,2623 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ The Fermi-Dirac staircase occupation of Floquet bands and current rectification inside
2
+ the optical gap of metals: a rigorous perspective
3
+ Oles Matsyshyn,1, 2 Justin C. W. Song,2 Inti Sodemann Villadiego,3, 1, ∗ and Li-kun Shi1, 3, †
4
+ 1Max-Planck-Institut für Physik komplexer Systeme, Nöthnitzer Straße 38, 01187 Dresden, Germany
5
+ 2Division of Physics and Applied Physics, School of Physical and Mathematical Sciences,
6
+ Nanyang Technological University, Singapore 637371, Republic of Singapore
7
+ 3Institut für Theoretische Physik, Universität Leipzig, Brüderstraße 16, 04103, Leipzig, Germany
8
+ (Dated: January 4, 2023)
9
+ We consider a model of a Bloch band subjected to an oscillating electric field and coupled to a
10
+ featureless fermionic heat bath, which can be solved exactly. We demonstrate rigorously that in the
11
+ limit of vanishing coupling to this bath (so that it acts as an ideal thermodynamic bath) the occu-
12
+ pation of the Floquet band is not a simple Fermi-Dirac distribution function of the Floquet energy,
13
+ but instead it becomes a “staircase” version of this distribution. We show that this distribution
14
+ generically leads to a finite rectified electric current within the optical gap of a metal even in the
15
+ limit of vanishing carrier relaxation rates, providing a rigorous demonstration that such rectification
16
+ is generically possible and clarifying previous statements in the optoelectronics literature. We show
17
+ that this current remains non-zero even up to the leading perturbative second order in the amplitude
18
+ of electric fields, and that it approaches the standard perturbative expression of the Jerk current
19
+ obtained from a simpler Boltzmann description within a relaxation time approximation when the
20
+ frequencies are small compared to the bandwidth.
21
+ INTRODUCTION
22
+ Quantum many body systems that are periodically
23
+ driven in time have garnered attention over the last
24
+ decades as rich platforms to realize novel collective phe-
25
+ nomena and non-equilibrium states beyond those realized
26
+ in equilibrium [1–25]. A phenomenon that can arise in
27
+ such periodically driven systems and which is forbidden
28
+ in equilibrium, is the existence of an average net recti-
29
+ fied particle flow or ratchet effect. In particular for the
30
+ case of electrons in crystals driven by oscillating electric
31
+ fields, these effects have enjoyed recent renewed attention
32
+ due to their interesting interplay with the dispersions and
33
+ Berry phases of band structures and their potential for
34
+ novel opto-electronic devices [26–32]. Despite their nat-
35
+ ural connection, only a handful of studies have studied
36
+ current rectification effects in Bloch bands through the
37
+ lens of Floquet theory [33–35]. This is in part due to the
38
+ difficulty that even for non-interacting systems, there is
39
+ no simple general formula dictating the occupation of
40
+ Floquet bands analogous to the Fermi-Dirac distribution
41
+ that dictates the occupation of bands in equilibrium [36–
42
+ 41].
43
+ One of the central goals of our study is to provide
44
+ simple analytical formulae for the occupation of a single
45
+ Floquet band coupled to a “featureless fermionic bath”
46
+ (which is a commonly used model of bath that for exam-
47
+ ple was employed in Refs. [33, 35, 42]). This featureless
48
+ bath is a physical system that has a finite coupling to
49
+ the fermionic system of interest and is characterized by
50
+ a single relaxation scale Γ. The dynamics of the system
51
+ ∗ sodemann@itp.uni-leipzig.de
52
+ † shi@itp.uni-leipzig.de
53
+ 0.5
54
+ 1
55
+ 0
56
+ -2
57
+ 0
58
+ -1
59
+ 1
60
+ 2
61
+ 3
62
+ 4
63
+ (a)
64
+ (b)
65
+ FIG. 1.
66
+ (a) Time independent limΓ→0 pn as a function of
67
+ ¯ϵn/ω calculated using Eq. (46) showing a ladder-like occupa-
68
+ tion. Parameters used: β/ω = 50, µ/ω = 1. (b) Schematic of
69
+ the ladder-like occupation for a Bloch band.
70
+ coupled to this bath can be described in an exact man-
71
+ ner thanks to the fact that we will take the combined
72
+ system plus bath as a non-interacting fermionic system.
73
+ As we will see, this featureless fermionic bath behaves
74
+ as an ideal thermodynamic bath in the limit in which
75
+ its coupling to system is vanishingly small (Γ → 0), and
76
+ in particular in this limit it relaxes the system towards
77
+ the equilibrium Fermi-Dirac occupation of the bands in
78
+ arXiv:2301.00811v1 [cond-mat.mes-hall] 2 Jan 2023
79
+
80
+ 2
81
+ the absence of an external periodic drive.
82
+ As we will
83
+ show, however, when the system is periodically driven in
84
+ time, this bath leads to a self-consistent occupation the
85
+ Floquet bands that is sharply different from that of the
86
+ equilibrium Fermi-Dirac distribution, but which we can
87
+ determine analytically with no approximations. This oc-
88
+ cupation is instead a staircase version of the Fermi-Dirac
89
+ distribution with several jumps that occur at copies of
90
+ the chemical potential shifted by all the harmonics of
91
+ the driving frequency [see Fig. 1(a)]. In the limit of an
92
+ ideal bath (Γ → 0), we will show that this distribution
93
+ coincides with the distribution that has been previously
94
+ obtained within the Boltzmann approach to Floquet sys-
95
+ tems (see in particular Eq. (12) of Ref. [38]).
96
+ Another central purpose of our study is to exploit the
97
+ Floquet formalism to further elaborate on our recent find-
98
+ ing [43] that it is indeed possible for time dependent os-
99
+ cillating electric fields with a frequency that lies within
100
+ the optical gap of a metal, to induce a net rectified DC
101
+ electric current. We will see that this is true even when
102
+ the electric field has a single monochromatic frequency
103
+ ω that is much larger than the relaxation rates and this
104
+ current remains finite in the limit when these rates van-
105
+ ish (Γ → 0) (and therefore does not rely on the fre-
106
+ quency difference effect [44] or in the Raman scattering
107
+ effect [45, 46]). We will demonstrate that this is possi-
108
+ ble by choosing a simple model containing a single Bloch
109
+ band with no Berry curvature, which in a simpler relax-
110
+ ation time Boltzmann description would give rise to the
111
+ so-called “Jerk” effect described in Refs. [43, 47].
112
+ Our
113
+ aim is to use this simple model because it will allow us
114
+ to carry out calculations of its response coupled to the
115
+ fermionic bath in a clear and exact analytical manner.
116
+ We are motivated to do this rigorously in order to
117
+ clarify a series of misconceptions that originated from
118
+ the work of Belinicher, Ivchenko and Pikus [48] and that
119
+ have propagated into some of the subsequent literature
120
+ [43, 45, 46, 49, 50]. In Appendix E we comment in more
121
+ detail about some of these previous works and point out
122
+ more specifically some of their imprecisions.
123
+ One of the central messages of our study is that it is in-
124
+ deed possible to have a net rectified current in response
125
+ to a monochromatic oscillating electric field whose fre-
126
+ quency lies within the optical gap of a system, in the limit
127
+ of vanishing carrier relaxation rates. We will demonstrate
128
+ this within a self-consistent picture of the occupation of
129
+ Floquet Bloch band in the steady state of the system.
130
+ More specifically we will show that in the limit of an
131
+ ideal bath (Γ → 0) the average rectified current in the
132
+ non-equilibrium steady state of the system is given by:
133
+ ¯j =
134
+
135
+ k
136
+ pk∇k¯ϵk,
137
+ (1)
138
+ where ¯ϵk is the Floquet energy of the band, pk is the occu-
139
+ pation of the Floquet band, ¯j is the current averaged over
140
+ one period, and the integral is over the crystal momen-
141
+ tum in the Brillouin zone with the usual normalization
142
+ of 1/(2π)d.
143
+ The crucial difference between the above expression
144
+ and that for the average current in an equilibrium sys-
145
+ tem, is that the occupation function pk is not simply the
146
+ Fermi-Dirac distribution associated with ¯ϵk, but instead
147
+ it is precisely the stair-case occupation function depicted
148
+ in Fig. 1. Crucially, we will show that generically this
149
+ stair-case occupation is a function that depends on all the
150
+ information of the time dependence of the Hamiltonian,
151
+ and cannot be expressed as a function of only ¯ϵk. We
152
+ will then show that as a consequence of this, the rectified
153
+ current is in fact generically non-zero in the optical gap
154
+ of a metal that breaks inversion and time-reversal sym-
155
+ metries. This result remains true even to second order
156
+ in the amplitude of the oscillating electric field, which is
157
+ the leading order at which rectification currents appear,
158
+ and therefore implies a non-vanishing rectification con-
159
+ ductivity within the optical gap of metals, in agreement
160
+ with our previous results [43]. For other previous dis-
161
+ cussions of the possibility of in-gap rectification see also
162
+ Refs. [46, 51–55].
163
+ Our paper is organized as follows.
164
+ In Section I, we
165
+ setup the approach to open quantum systems, obtain ex-
166
+ act occupation functions for diagonal and time-periodic
167
+ Hamiltonians coupled to a featureless fermionic bath. In
168
+ Section II, based on the exact occupation functions, we
169
+ calculate exact linear and rectification conductivities and
170
+ show that there is a net rectified current in response to a
171
+ monochromatic oscillating electric field whose frequency
172
+ lies within the optical gap of a metal, in the limit of van-
173
+ ishing carrier relaxation rates.
174
+ I.
175
+ THE OPEN-SYSTEM SCHRÖDINGER
176
+ EQUATION APPROACH TO OPEN QUANTUM
177
+ SYSTEMS
178
+ In descriptions of quantum open systems it is typically
179
+ natural to view the combined Hilbert space of the “sys-
180
+ tem” and the “bath” as a tensor product of their Hilbert
181
+ spaces in isolation. There are situations, however, where
182
+ it is possible to alternatively cast this separation of sys-
183
+ tem and bath as a direct sum of their individual Hilbert
184
+ spaces. As we will show, such separation into sums of
185
+ Hilbert spaces is extremely powerful and convenient, be-
186
+ cause it allows to integrate out the dynamics of the “bath”
187
+ in an exact manner and to obtain a simple non-Hermitian
188
+ generalization of Schrödinger’s equation for the system
189
+ which captures its coupling to the bath without any ap-
190
+ proximations.
191
+ One example of the class of models which admits such
192
+ direct sum separation into system and bath are those of
193
+ non-interacting particles. To see this let us imagine that
194
+ the system and the bath as a whole can be described by a
195
+ non-interacting model. For concreteness we can imagine
196
+ this to be a tight biding model of particles hopping on
197
+ a lattice. Because the problem is non-interacting, then
198
+ the dynamics can be analyzed by computing the trajecto-
199
+ ries of single individual particles and then adding them
200
+
201
+ 3
202
+ up. However, for a single particle the Hilbert space of
203
+ the “system” and the “bath” can be naturally viewed as
204
+ a direct sum. For example, in the case of a tight-binding
205
+ model, some sites can be viewed as belonging to the sys-
206
+ tem and the remainder sites as belonging to the bath.
207
+ Let us then consider that the Hilbert space of the sys-
208
+ tem and the bath can be decomposed into a direct sum,
209
+ namely their Hamiltonian and states have block form as
210
+ follows:
211
+ H(t) =
212
+
213
+ HS(t)
214
+ HSB(t)
215
+ HBS(t)
216
+ HB(t)
217
+
218
+ ,
219
+ |ψ(t)⟩ =
220
+
221
+ |ψS(t)⟩
222
+ |ψB(t)⟩
223
+
224
+ ,
225
+ (2)
226
+ where HBS(t) = H†
227
+ SB(t).
228
+ From Eq. (2), the coupled
229
+ Schrödinger equations for system and bath states then
230
+ read:
231
+ i∂t |ψS(t)⟩ = HS(t) |ψS(t)⟩ + HSB(t) |ψB(t)⟩ ,
232
+ (3)
233
+ i∂t |ψB(t)⟩ = HBS(t) |ψS(t)⟩ + HB(t) |ψB(t)⟩ ,
234
+ (4)
235
+ where we set ℏ = 1 throughout the paper. By integrating
236
+ Eq. (4) over time and inserting it into Eq. (3) allows
237
+ to formally eliminate the bath state dynamics |ψB(t)⟩
238
+ and to obtain the open-system Schrödinger equation for
239
+ |ψS(t)⟩:
240
+ i∂t |ψS(t)⟩ = HS(t) |ψS(t)⟩ + HSB(t)UB(t, t0) |ψB(t0)⟩
241
+ − iHSB(t)
242
+ � t
243
+ t0
244
+ dt′ UB(t, t′)HBS(t′) |ψS(t′)⟩ ,
245
+ (5)
246
+ where UB(t, t′) is the bath (intrinsic) evolution operator
247
+ satisfying i∂tUB(t, t0) = HB(t)UB(t, t0). This procedure
248
+ is often carried within the Schwinger-Keldysh formalism
249
+ by integrating out part of the action describing the de-
250
+ grees of freedom of the bath (see e.g. Refs. [33, 35, 42]).
251
+ But this is easier and more physically transparent in our
252
+ first quantization notation and the final results would be
253
+ identical.
254
+ A.
255
+ Featureless fermionic bath
256
+ We will now specialize the above equation to a model of
257
+ a “featureless fermionic bath”, which we define as having
258
+ the following characteristics:
259
+ (i) In a featureless fermionic bath every state of the
260
+ system is coupled to a collection of identical sites with
261
+ the same energy spectrum and the same coupling λ [see
262
+ Fig. 2(a)]. If the system states (basis) are denoted by
263
+ |χn⟩ and the bath states (basis) by |ϕn,j⟩, the bath and
264
+ the system-bath coupling are
265
+ HB =
266
+
267
+ n,j
268
+ εj |ϕn,j⟩ ⟨ϕn,j| ,
269
+ (6)
270
+ HSB = λ
271
+
272
+ n,j
273
+ |χn⟩ ⟨ϕn,j| ,
274
+ (7)
275
+ where εj is the energy for the bath state |ϕn,j⟩. This
276
+ model of the bath is identical to that employed in
277
+ Refs. [35, 43, 56–62].
278
+ (ii) The featureless fermionic bath is prepared in an ini-
279
+ tial condition at t0 with a Fermi-Dirac distribution that
280
+ only has weight on the bath sites, described by
281
+ ρS(t0) = 0,
282
+ ρB(t0) = �
283
+ n,jf0(εj) |ϕn,j⟩ ⟨ϕn,j| ,
284
+ (8)
285
+ f0(εj) =
286
+ 1
287
+ exp[β0(εj − µ0)] + 1,
288
+ (9)
289
+ where µ0 is the chemical potential of and β0 = 1/kBT0
290
+ denotes the temperature of the bath, respectively. The
291
+ assumption of the initial density matrix only having
292
+ weight on the bath is useful but it is not strictly nec-
293
+ essary. This is because in the limit in which the bath
294
+ spectrum becomes a dense continuum, the information
295
+ of the initial condition for the component of density ma-
296
+ trix on the system will decay over time and only the in-
297
+ formation of the initial condition for the density matrix
298
+ on the bath will dictate the late time steady state [this
299
+ will become more clear in Eq. (16) which is a subsequent
300
+ version of Eq. (5)]. Notice also that we have equated the
301
+ evolution of the single particle density matrix with that
302
+ of the many-body one-particle density matrix (equal time
303
+ Greens function), which is possible thanks to the fact that
304
+ the system is non-interacting.
305
+ With assumptions (i) and (ii), by evolving the initial
306
+ condition in Eq. (8) under Eqs. (3) and (4), one finds that
307
+ the one-body density matrix projected onto the system
308
+ at time t is given by
309
+ ρS(t) =
310
+
311
+ n,j
312
+ f0(εj) |ψ(j)
313
+ n (t)⟩ ⟨ψ(j)
314
+ n (t)| ,
315
+ (10)
316
+ where |ψ(j)
317
+ n (t)⟩ is the component within system Hilbert
318
+ space that evolves out of the initial state |ψB(t0)⟩ =
319
+ |ϕn,j⟩ in the bath at t0. Eq. (10) states that the density
320
+ matrix for the system is the weighted sum of contribu-
321
+ tions from all bath states with their corresponding initial
322
+ occupations.
323
+ Using Eqs. (5), (6), and (7), we obtain the open-system
324
+ Schrödinger equation for |ψ(j)
325
+ n (t)⟩:
326
+ i∂t |ψ(j)
327
+ n (t)⟩ = HS(t) |ψ(j)
328
+ n (t)⟩ + λ exp[−iεj(t − t0)] |χn⟩
329
+ − i
330
+ � ∞
331
+ t0
332
+ dt′ γ(t − t′) |ψ(j)
333
+ n (t′)⟩ .
334
+ (11)
335
+ system
336
+ DoS
337
+ energy
338
+ bath
339
+ (a)
340
+ (b)
341
+ (c)
342
+ FIG. 2. (a) Schematic of the system-bath coupling HSB. (b)
343
+ The bath’s density of states is much wider than that of the
344
+ system, and we simplify it to be flat in the energy range of
345
+ interest. (c) Schematic of the bath acting as a source as well
346
+ as a sink for the system [see Eq. (27)].
347
+
348
+ 4
349
+ Here, λ exp[−iεj(t−t0)] |χn⟩ is a source term for |ψ(j)
350
+ n (t)⟩
351
+ arising from the bath, while the memory function in the
352
+ second line is given by,
353
+ γ(t) = λ2Θ(t)
354
+
355
+ j
356
+ exp(−iεjt),
357
+ (12)
358
+ which encodes the memory of decay for |ψ(j)
359
+ n (t)⟩ due to
360
+ the bath. This memory function makes the Schrödinger
361
+ equation for open systems non-local in time, and in gen-
362
+ eral it incorporates decay and renormalizations of the
363
+ system energies due to their coupling to the bath [see
364
+ Fig. 2 for a depiction].
365
+ (iii) To remove the finite memory delay, we impose one
366
+ further property defining the featureless fermionic bath,
367
+ namely that it has an infinitely broad and flat spectrum
368
+ [see Fig. 2(b)], i.e., the bath density of state is constant:
369
+ νB(ωb) = 2π
370
+
371
+ j
372
+ δ(ωb − εj) ≡ ν0.
373
+ (13)
374
+ With this simplification, the finite delay or non-local
375
+ memory of the past time t′ in Eq. (11) is lost, the memory
376
+ function becomes:
377
+ γ(t) = λ2Θ(t)
378
+
379
+ j
380
+ � +∞
381
+ −∞
382
+ dωb δ(ωb − εj) exp(−iωbt)
383
+ = λ2ν0Θ(t)
384
+ � +∞
385
+ −∞
386
+ dωb
387
+ 2π exp(−iωbt) = δ(t) Γ,
388
+ (14)
389
+ where we used Eq. (13) to obtain the second equation
390
+ and defined
391
+ Γ ≡ λ2ν0
392
+ 2
393
+ .
394
+ (15)
395
+ With the above simplification of infinitely broad spec-
396
+ trum for the bath, the open-system Schrödinger’s equa-
397
+ tion reduces to:
398
+ i∂t |ψ(j)
399
+ n (t)⟩ =
400
+
401
+ HS(t) − iΓ
402
+
403
+ |ψ(j)
404
+ n (t)⟩
405
+ + λ exp[−iεj(t − t0)] |χn⟩ .
406
+ (16)
407
+ The above equation is remarkably simple. It is a sim-
408
+ ple non-Hermitian version of the Schrödinger equation in
409
+ which the system Hamiltonian is dressed by a constant
410
+ imaginary part “−iΓ” which captures the decay into the
411
+ bath. Many recent studies of open quantum systems have
412
+ used non-Hermitian Schrödinger equations that only in-
413
+ clude the first line of Eq. (16). However, we see that the
414
+ influence of the bath is not merely to induce decay, but
415
+ it also produces the second term that acts a source and
416
+ makes the equation inhomogeneous. The balance of these
417
+ two terms is what allows the existence of non-trivial late
418
+ time steady states (see Fig. 2 for depiction).
419
+ B.
420
+ Ideal fermionic bath
421
+ To illustrate that our bath leads to the expected equi-
422
+ librium when the system is not driven in time, we first
423
+ consider the the special case in which HS(t) is time in-
424
+ dependent,
425
+ HS(t) → H0 =
426
+
427
+ n
428
+ ϵn |χn⟩ ⟨χn| ,
429
+ (17)
430
+ Eq. (16) can be equivalently expressed as
431
+ i∂ts(j)
432
+ n
433
+ = [ϵn − iΓ]s(j)
434
+ n + λ exp[−iεj(t − t0)],
435
+ (18)
436
+ where
437
+ s(j)
438
+ n
439
+ = ⟨χn|ψ(j)
440
+ n (t)⟩ ,
441
+ (19)
442
+ is the amplitude for the system state |χn⟩. Solving the
443
+ above Eq. (18) gives
444
+ s(j)
445
+ n
446
+ = −iλ exp
447
+
448
+ − i
449
+ � t
450
+ t0
451
+ dt′ (ϵn − iΓ)
452
+
453
+ ×
454
+ � t
455
+ t0
456
+ dt′ exp
457
+
458
+ i
459
+ � t′
460
+ t0
461
+ dt′′(ϵn − iΓ − εj)
462
+
463
+ =
464
+ λ
465
+ ϵn − iΓ − εj
466
+
467
+ e−(Γ+iϵn)(t−t0) − e−iεj(t−t0)�
468
+ . (20)
469
+ Then using Eq. (10), we obtain the steady state, diagonal
470
+ density matrix for the system:
471
+ ρS(t → +∞) =
472
+
473
+ n
474
+ fΓ(ϵn) |χn⟩ ⟨χn| ,
475
+ (21)
476
+ in which fΓ(ϵn) = limt→+∞
477
+
478
+ j f0(εj)|s(j)
479
+ n |2 and reads
480
+ explicitly as
481
+ fΓ(ϵn) =
482
+
483
+ j
484
+ f0(εj)
485
+ λ2
486
+ (ϵn − iΓ − εj)(ϵn + iΓ − εj)
487
+ =
488
+ � +∞
489
+ −∞
490
+ dωb f0(ωb)
491
+ λ2 �
492
+ j δ(ωb − εj)
493
+ (ϵn − iΓ − ωb)(ϵn + iΓ − ωb)
494
+ =
495
+ � +∞
496
+ −∞
497
+ dωb
498
+ π f0(ωb)
499
+ Γ
500
+ (ϵn − ωb)2 + Γ2 ,
501
+ (22)
502
+ where we used Eqs. (13) and (15) in obtaining the last
503
+ equation. The above distribution fΓ(ϵn) shows that when
504
+ HS(t) is time independent, the system “thermalizes” by
505
+ approaching a time independent steady state dictated by
506
+ the initial condition of the bath, f0(ωb), while a finite Γ
507
+ accounts for the broadening of the energy levels of the
508
+ system due to its coupling to the bath.
509
+ Importantly, taking the limit in which the coupling to
510
+ the bath vanishes from Eq. (22), we obtain
511
+ lim
512
+ Γ→0 fΓ(ϵn) = f0(ϵn),
513
+ (23)
514
+ i.e., fΓ(ϵn) reduces to the ideal Fermi-Dirac distribution
515
+ in the limit of Γ → 0. We will then call this Γ → 0 limit
516
+ of the “featureless fermionic bath” an “ideal fermionic
517
+ bath”. The fact that the ideal Fermi-Dirac distribution
518
+
519
+ 5
520
+ appears only when the coupling to the bath is vanish-
521
+ ingly weak is consistent with general considerations of
522
+ statistical physics.
523
+ However, Eq. (22) still allow us to obtain analytically
524
+ the modified occupation at finite coupling to the bath,
525
+ which will be used in subsequent manipulations. By in-
526
+ tegrating over ωb in Eq. (22) using Cauchy’s residue the-
527
+ orem, we find that:
528
+ fΓ(ϵ) = 1
529
+ 2
530
+
531
+ f+(ϵ) + f−(ϵ)
532
+
533
+ ,
534
+ (24)
535
+ where f+(ϵ) = [f−(ϵ)]∗ and they are given by:
536
+ f±(ϵ) = 1
537
+ 2 ± i
538
+ π Ψ(0)
539
+ �1
540
+ 2 ± iβ ϵ ∓ iΓ − µ
541
+
542
+
543
+ ,
544
+ (25)
545
+ with Ψ(0) the 0-th order Polygamma function (or the
546
+ digamma function). f±(ϵ) will also appear repeatedly in
547
+ more general cases.
548
+ C.
549
+ Diagonal and time-periodic Hamiltonians
550
+ 1.
551
+ Diagonal system Hamiltonian
552
+ In this work, we will develop the above general for-
553
+ malism to the special case where the system Hamilto-
554
+ nian HS(t) is time dependent but diagonal in the system
555
+ states. Let us then take the following form for the system
556
+ Hamiltonian:
557
+ ⟨χn|HS(t)|χm⟩ = δnm[ϵn + Vn(t)] = δnmϵn(t).
558
+ (26)
559
+ With this, Eq. (16) then reduces to
560
+ i∂ts(j)
561
+ n
562
+ = [ϵn(t) − iΓ]s(j)
563
+ n + λ exp[−iεj(t − t0)].
564
+ (27)
565
+ Solving the above Eq. (27) gives
566
+ s(j)
567
+ n (t) = −iλ exp
568
+
569
+ − i
570
+ � t
571
+ t0
572
+ dt′ [ϵn(t′) − iΓ]
573
+
574
+ ×
575
+ � t
576
+ t0
577
+ dt′ exp
578
+
579
+ i
580
+ � t′
581
+ t0
582
+ dt′′[ϵn(t′′) − iΓ − εj]
583
+
584
+ ,
585
+ (28)
586
+ and then with Eq. (10), we obtain the diagonal density
587
+ matrix for the system:
588
+ ρS(t) =
589
+
590
+ n
591
+ pn(t) |χn⟩ ⟨χn| ,
592
+ (29)
593
+ pn(t) =
594
+
595
+ j
596
+ f0(εj)|s(j)
597
+ n (t)|2.
598
+ (30)
599
+ 2.
600
+ Periodic system Hamiltonian
601
+ Now we consider a periodically driven system. Namely,
602
+ we take the diagonal elements of the Hamiltonian to be
603
+ periodic in time:
604
+ ϵn(t + T) = ϵn(t) =
605
+ +∞
606
+
607
+ l=−∞
608
+ ϵ(l)
609
+ n exp[−ilω(t − t0)],
610
+ (31)
611
+ where T is the period and ω = 2π/T is the frequency,
612
+ and
613
+ ϵ(l)
614
+ n =
615
+ � T
616
+ 0
617
+ dt
618
+ T ϵn(t) exp[ilω(t − t0)]
619
+ (32)
620
+ is the l-th Fourier coefficient for ϵn(t). In particular,
621
+ ¯ϵn ≡ ϵ(0)
622
+ n
623
+ =
624
+ � T
625
+ 0
626
+ dt
627
+ T ϵn(t),
628
+ (33)
629
+ is the time-average of the diagonal element of the Hamil-
630
+ tonian, which as we will show next, coincides with the
631
+ Floquet energy of state n. To see this, notice that the
632
+ wavefunction that would solve the system Schrödinger’s
633
+ equation in the absence of the bath, can be expressed as
634
+ follows:
635
+ exp
636
+
637
+ − i
638
+ � t
639
+ t0
640
+ dt′ ϵn(t′)
641
+
642
+ = exp
643
+
644
+ − i
645
+ � t
646
+ t0
647
+ dt′[ϵn(t′) − ¯ϵn]
648
+
649
+ × exp
650
+
651
+ − i
652
+ � t
653
+ t0
654
+ ¯ϵn
655
+
656
+ ≡ φn(t) × exp
657
+
658
+ − i¯ϵn(t − t0)
659
+
660
+ .
661
+ (34)
662
+ The periodicity of the first factor denoted by φn(t) can
663
+ be shown explicitly:
664
+ φn(t + T) = φn(t) × exp
665
+
666
+ − i
667
+ � t+T
668
+ t
669
+ dt′[ϵn(t′) − ¯ϵn]
670
+
671
+ = φn(t),
672
+ (35)
673
+ where we used Eq. (33) in obtaining the second equation.
674
+ Therefore we see from second factor in the last line of
675
+ Eq. (35), that the time-average of the diagonal element
676
+ of the Hamiltonian is the Floquet energy itself.
677
+ Let us now consider the Fourier expansion of the peri-
678
+ odic part of the Floquet wavefunction:
679
+ φn(t) = exp
680
+
681
+ − i
682
+ � t
683
+ t0
684
+ dt′[ϵn(t′) − ¯ϵn]
685
+
686
+ =
687
+ +∞
688
+
689
+ l=−∞
690
+ φ(l)
691
+ n exp[−ilω(t − t0)],
692
+ (36)
693
+ or equivalently,
694
+ φ(l)
695
+ n = 1
696
+ T
697
+ � t0+T
698
+ t0
699
+ dt
700
+
701
+ exp[ilω(t − t0)]
702
+ × exp
703
+
704
+ − i
705
+ � t
706
+ t0
707
+ dt′[ϵn(t′) − ¯ϵn]
708
+ ��
709
+ . (37)
710
+ The above expression makes clear that the amplitude of
711
+ the harmonics of the wavefunction, φ(l)
712
+ n , are functions
713
+
714
+ 6
715
+ of the full time dependence of the instantaneous energy
716
+ ϵn(t), and are independent of the Floquet energy ¯ϵn. This
717
+ property will be crucial later on for purposes of under-
718
+ standing why there is in-gap rectification. In other words,
719
+ Eq. (37) defines φ(l)
720
+ n as a function of all the harmonics of
721
+ the time dependent energy from Eq. (32) as follows:
722
+ φ(l)
723
+ n = φ(l)
724
+ n (ϵ(±1)
725
+ n
726
+ , ϵ(±2)
727
+ n
728
+ , · · · ).
729
+ (38)
730
+ Also from Eq. (36) it can be shown that these amplitudes
731
+ satisfy the following normalization condition:
732
+ +∞
733
+
734
+ l=−∞
735
+ ��φ(l)
736
+ n
737
+ ��2 = 1.
738
+ (39)
739
+ With Eqs. (28), (30), (36), and (13), and by taking
740
+ the late-time limit that allows to neglect transient terms
741
+ of the form exp[−Γ(t − t0)] → 0, we obtain the system
742
+ steady state occupation:
743
+ pn(t) =
744
+ � +∞
745
+ −∞
746
+ dωb
747
+ π f0(ωb)
748
+ × Γ
749
+ �����
750
+ +∞
751
+
752
+ l=−∞
753
+ φ(l)
754
+ n
755
+ exp[−ilω(t − t0)]
756
+ ¯ϵn − ωb − lω − iΓ
757
+ �����
758
+ 2
759
+ .
760
+ (40)
761
+ Similar to Eq. (22), by integrating over ωb in Eq. (40),
762
+ we find that:
763
+ pn(t) =
764
+ +∞
765
+
766
+ l,m=−∞
767
+
768
+ φ(m)
769
+ n
770
+ �∗φ(l)
771
+ n exp
772
+
773
+ i(m − l)ω(t − t0)
774
+
775
+ ×
776
+ Γ
777
+ 2Γ + i(m − l)ω
778
+
779
+ f+(¯ϵn − lω) + f−(¯ϵn − mω)
780
+
781
+ ,
782
+ (41)
783
+ where f±(ϵ) is given in Eq. (25). The Eq. (41) is one of
784
+ the central formulas of our work because it allows to com-
785
+ pute expectation values of any equal-time system observ-
786
+ ables, even at a finite coupling Γ to featureless fermionic
787
+ bath.
788
+ The expression in Eq. (41) captures the steady state
789
+ occupation of the n-th state in the case of featureless
790
+ fermionic bath, and thus it replaces what would be the
791
+ Fermi-Dirac distribution in equilibrium. One important
792
+ feature of this steady state is that it displays “synchro-
793
+ nization”, namely, it is strictly periodic in the drive:
794
+ pn(t + T) = pn(t).
795
+ (42)
796
+ Remarkably, in the limit of an “ideal bath” (Γ → 0) the
797
+ above distribution becomes time independent and it is
798
+ given by:
799
+ lim
800
+ Γ→0 pn =
801
+ +∞
802
+
803
+ l=−∞
804
+ |φ(l)
805
+ n |2f0(¯ϵn − lω).
806
+ (43)
807
+ Here ¯ϵn is the Floquet energy of n-th state, and φ(l)
808
+ n are
809
+ the Harmonics of the periodic part of the wave-functions
810
+ defined in Eq. (37). The reader is encouraged to contrast
811
+ this occupation function with that in Eq. (23) obtained
812
+ when the Hamiltonian was time independent. Notice also
813
+ that because the occupation function becomes time inde-
814
+ pendent in this limit, there are no time fluctuations of the
815
+ average fermion occupation of each state n.
816
+ Thus the distribution is an infinite sum of sev-
817
+ eral Fermi-Dirac distributions with chemical potentials
818
+ shifted by the various harmonics of the driving frequency
819
+ lω and weighed by amplitudes of the harmonics of the
820
+ Floquet wavefunctions |φ(l)
821
+ n |2. It is therefore clear that
822
+ the occupation of the state is completely different from
823
+ how the state is filled in equilibrium [see Fig. 1(a) for an
824
+ illustration of the non-equilibrium occupation function].
825
+ One recovers an occupation similar to equilibrium when
826
+ one neglects all the higher harmonics of φ(l)
827
+ n
828
+ with l ̸= 0
829
+ and forces by hand the amplitude of the l = 0 term to
830
+ be φ(0)
831
+ n
832
+ → 1, but this is not justified in general (not even
833
+ perturbatively as we will illustrate in Sec. II B). We note
834
+ that the idea that Floquet states are not filled in the
835
+ same way as equilibrium states has been emphasized in
836
+ several studies, by using a variety of models for the re-
837
+ laxation when the system is coupled to a heat bath [36–
838
+ 39, 41, 63]. In fact the expression for the non-equilibrium
839
+ time independent steady states we find in Eq. (43) has
840
+ been reported before, and is in particular the same kind
841
+ of expression shown in Eq. (12) of Ref. [38].
842
+ 3.
843
+ Harmonic time dependent driving
844
+ Computing analytically the integral in Eq. (37) that
845
+ relates the harmonics of the Floquet wavefunction to the
846
+ harmonics of the energy is in general involved. There is
847
+ a simple case where these integrals can be computed in
848
+ a simple closed analytical form, which is when the time
849
+ dependent part Vn(t) of the Hamiltonian has a single
850
+ harmonic:
851
+ Vn(t) = Vn cos[ω(t − t0)].
852
+ (44)
853
+ In this case the coefficients φ(l)
854
+ n from Eq. (37) correspond
855
+ to the l-th Bessel function:
856
+ φ(l)
857
+ n = Jl
858
+
859
+ Vn/ω
860
+
861
+ .
862
+ (45)
863
+ Substitution of Eq. (45) into Eq. (41) leads to the fol-
864
+ lowing non-perturbative expression for the occupation of
865
+ the states in the limit of Γ → 0:
866
+ lim
867
+ Γ→0 pn =
868
+ +∞
869
+
870
+ l=−∞
871
+ J2
872
+ l
873
+
874
+ Vn/ω
875
+
876
+ f0(¯ϵn − lω).
877
+ (46)
878
+ We therefore see that the occupation in the case of the
879
+ ideal fermionic bath becomes a sum of several Fermi-
880
+ Dirac distributions boosted by the different harmonics of
881
+ the Floquet quasi-energies ¯ϵn − lω (l ∈ Z). It is interest-
882
+ ing to note that this ladder-like behavior is analogous to
883
+
884
+ 7
885
+ the Tien-Gordon effect that arises in nanostructures that
886
+ are simultaneously subjected to AC and DC drives [64].
887
+ Similarly as in that case, the ladder behaviour becomes
888
+ more pronounced as the driving becomes stronger [see
889
+ Fig. 1(a)].
890
+ II.
891
+ SINGLE BAND MODEL UNDER
892
+ MONOCHROMATIC LIGHT
893
+ In this section we will use the formalism developed in
894
+ the previous ones to determine the self-consistent occupa-
895
+ tion of an electronic band driven by an oscillating electric
896
+ field and demonstrate the existence of in-gap rectifica-
897
+ tion. Because we are primarily interested here in proving
898
+ and clarifying the origin of in-gap rectification, we will
899
+ focus on a simple model of a Bloch band that has vanish-
900
+ ing Berry connections. These bands can display however
901
+ the in-gap Jerk current effect that arises from the energy
902
+ band dispersions [43]. However, other mechanisms driven
903
+ by the Berry phases, such as the non-linear Hall effect,
904
+ can also lead to in-gap rectification as we have recently
905
+ demonstrated [43].
906
+ Let us now consider our system Hamiltonian to be a
907
+ tight-binding model with a single site per unit cell and
908
+ a trivial single Bloch band (with no Berry connections)
909
+ coupled to a uniform monochromatic electric field. The
910
+ time dependent system Hamiltonian is:
911
+ HS(t) =
912
+
913
+ k
914
+ ϵk(t) |χk⟩ ⟨χk| ,
915
+ (47)
916
+ ϵk(t) ≡ ϵ(k − A(t)),
917
+
918
+ k
919
+
920
+
921
+ BZ
922
+ dk
923
+ (2π)d .
924
+ (48)
925
+ The system states are now labelled by the wave vector k
926
+ and ϵ(k) is the unperturbed band dispersion. We assume
927
+ a monochromatic electric field which leads to the periodic
928
+ vector potential using E(t) = −∂tA(t):
929
+ A(t) = − i
930
+ ω Eω exp(−iωt) + c. c.
931
+ (49)
932
+ A.
933
+ Electric current in the steady state
934
+ Since the system Hamiltonian is diagonal in crystal
935
+ momenta k, we can apply the formalism of Sec. I C to
936
+ compute the steady state occupation of each momenta
937
+ k, by replacing the label in previous sections n → k. If
938
+ we denote the occupation of each state by pk(t), then the
939
+ system’s electric current reads as follows:
940
+ j(t) =
941
+
942
+ k
943
+ pk(t)∇kϵk(t)
944
+ =
945
+ +∞
946
+
947
+ s=−∞
948
+ j(s) exp[−isω(t − t0)],
949
+ (50)
950
+ where we set e = ℏ = 1 throughout the paper. By com-
951
+ bining Eqs. (32) and (41), the weight of each oscillating
952
+ mode of the electric current can be written as:
953
+ j(s) =
954
+
955
+ k
956
+ +∞
957
+
958
+ m,l=−∞
959
+ Γ
960
+ 2Γ + i(l − s)ω
961
+
962
+ φ(m)
963
+ k
964
+ �∗φ(s+m−l)
965
+ k
966
+ ×
967
+
968
+ f+(¯ϵk − (s + m − l)ω) + f−(¯ϵk − mω)
969
+
970
+ ∇kϵ(l)
971
+ k . (51)
972
+ Interestingly, as discussed in Sec. I C, in the limit of an
973
+ ideal heat bath Γ → 0, the distribution function pk(t) be-
974
+ comes time independent, and therefore the time averaged
975
+ electric current (also referred to as rectified current), is
976
+ given by:
977
+ ¯j =
978
+ � T
979
+ 0
980
+ dt
981
+ T j(t) =
982
+
983
+ k
984
+ pk∇k¯ϵk,
985
+ (52)
986
+ where ¯ϵk is the Floquet energy of the band and in our
987
+ current simple single-band model, and is given by the
988
+ time averaged band energy (l = 0 component):
989
+ ¯ϵk ≡ ϵ(0)
990
+ k
991
+ =
992
+ � T
993
+ 0
994
+ dt
995
+ T ϵ(k − A(t)).
996
+ (53)
997
+ Therefore, we see that Eq. (52) has a resemblance to
998
+ how one would compute the current in a time indepen-
999
+ dent equilibrium system, but with the equilibrium Fermi-
1000
+ Dirac distribution replaced by occupation function pk,
1001
+ and the bare band dispersion replaced by the dressed
1002
+ Floquet band energy ¯ϵk.
1003
+ At first glance, this point of
1004
+ view might suggest that the time averaged rectified cur-
1005
+ rent vanishes in the ideal limit of ω ≫ Γ → 0, just in
1006
+ the same way it is expected to vanish in a time inde-
1007
+ pendent equilibrium system. In fact, several classic and
1008
+ more recent works have incorrectly taken this point of
1009
+ view that the non-equilibrium steady state occupation pk
1010
+ is a Fermi-Dirac distribution of the dressed Floquet band
1011
+ energy [45, 46, 48–50] (see Appendix E for detailed com-
1012
+ ments on previous works). However, as we have shown
1013
+ in Sec. I C, the correct occupation of the states in the
1014
+ non-equilibrium steady state is not a simple Fermi-Dirac
1015
+ distribution, but it is given by the following expression
1016
+ [see Eqs. (38) and (43)]:
1017
+ pk(¯ϵk, ϵ(±1)
1018
+ k
1019
+ , · · · ) ≡
1020
+ +∞
1021
+
1022
+ l=−∞
1023
+ |φ(l)
1024
+ k |2f0(¯ϵk − lω).
1025
+ (54)
1026
+ In the argument of pk in the above expression, we have
1027
+ emphasized that pk is not only a function of the Flo-
1028
+ quet band energy ¯ϵk, but also of all the higher har-
1029
+ monics ϵ(±1)
1030
+ k
1031
+ , ϵ(±2)
1032
+ k
1033
+ · · · of the time dependent energy
1034
+ ϵk(t) through its dependence on the amplitudes φ(l)
1035
+ k [see
1036
+ Eqs. (37) and (38)]. Precisely because of this, the recti-
1037
+ fication current ¯j can not be expressed as an integral of
1038
+ a total derivative over the Brillouin zone and generally
1039
+ does not vanish, i.e.,
1040
+ ¯j ̸=
1041
+
1042
+ k
1043
+ ∇k ˜P(¯ϵk) = 0,
1044
+ (55)
1045
+
1046
+ 8
1047
+ where ˜P(¯ϵk) would be defined through
1048
+ ∂ ˜P(¯ϵk)
1049
+ ∂¯ϵk
1050
+ ≡ ˜pk(¯ϵk),
1051
+ (56)
1052
+ which would be possible if the occupation depended only
1053
+ on the dressed Floquet energy pk → ˜pk(¯ϵk) [but this is
1054
+ not the case for Eq. (55)].
1055
+ Therefore, we see that in general a non-zero rectified
1056
+ current is expected in the non-equilibrium steady state,
1057
+ even in the limit of the ω ≫ Γ → 0. As we will show
1058
+ in detail in the following section, this finite rectified cur-
1059
+ rent remains non-zero within the optical gap of a metal,
1060
+ even within the usual second order of perturbation the-
1061
+ ory in the amplitude of the electric field for which recti-
1062
+ fication currents are typically computed. These findings
1063
+ further substantiate our recent work showing the exis-
1064
+ tence of in-gap rectification [43] but appear in tension
1065
+ with some other statements in the literature [44–46, 48–
1066
+ 50]. In Appendix E, we comment in more detail on some
1067
+ of these other works clarifying some partial agreements
1068
+ but also pointing out some of their imprecisions and in-
1069
+ correct statements.
1070
+ B.
1071
+ Perturbative results
1072
+ In this subsection we will compute perturbatively the
1073
+ electric current in powers of electric field to the currents
1074
+ at modes [see Eqs. (50) and (51)]: s = 0 representing
1075
+ rectification conductivity, s = 1 representing linear con-
1076
+ ductivity. s = 2 representing second harmonic generation
1077
+ is discussed in Appendix A. We will show explicitly that
1078
+ even to 2nd order in electric fields, the non-equilibrium
1079
+ distribution in the steady state for an ideal bath, pk, dif-
1080
+ fers clearly from the naive Fermi-Dirac distribution eval-
1081
+ uated in the dressed Floquet bands. This will allow us
1082
+ to compute analytically the rectification conductivities
1083
+ and prove rigorously that they remain finite within the
1084
+ optical gap of the metal.
1085
+ Although our conclusions and formulae are valid and
1086
+ can be used for any single band model (with no Berry
1087
+ connections) in arbitrary dimensions, for simplicity we
1088
+ will illustrate our results for a simple 1D model with the
1089
+ following band dispersion:
1090
+ ϵ(kx) = −t1 cos(a0kx) − t2 sin(2a0kx) + ϵ0,
1091
+ (57)
1092
+ where ϵ0 is a constant that we have added for convenience
1093
+ in order to shift the band energy so that it lies within 0
1094
+ and ∆ [See Fig. 3(b)], and a0 is the lattice constant.
1095
+ Notice that the above band-structure breaks not only
1096
+ inversion, which is always needed to have rectification,
1097
+ but also time-reversal symmetry, and therefore it has no
1098
+ symmetry relating k → −k. As we will see, this is indeed
1099
+ crucial in order to obtain a non-zero in-gap rectification
1100
+ conductivities for the models without Berry curvature
1101
+ that we are considering in this study. More generally, as
1102
+ discussed in Ref. [43], in the case of bands with non-trivial
1103
+ Berry connections one can alternatively obtain a non-
1104
+ zero in-gap rectification, e.g., via the Berry-Dipole effect
1105
+ by breaking time reversal symmetry only by having a
1106
+ circularly polarized light instead of having a time-reversal
1107
+ breaking band-structure.
1108
+ 1.
1109
+ Occupation function to the second order of electric field
1110
+ We begin by deriving the explicit perturbative expres-
1111
+ sions for ϵ(l)
1112
+ k
1113
+ and φ(l)
1114
+ k
1115
+ discussed in the previous sections
1116
+ and can be computed from Eqs. (32) and (37) by replac-
1117
+ ing n → k. Up to the second order in the electric field,
1118
+ it is sufficient to expand the band dispersion up to the
1119
+ same second order, namely:
1120
+ ϵ(k − A(t)) = ¯ϵk + ϵ(1)
1121
+ k e−iω(t−t0) + ϵ(−1)
1122
+ k
1123
+ eiω(t−t0)
1124
+ + ϵ(2)
1125
+ k e−2iω(t−t0) + ϵ(−2)
1126
+ k
1127
+ e2iω(t−t0) + · · · ,
1128
+ (58)
1129
+ Using Eq. (49), this perturbative expansion leads to the
1130
+ following expressions for ϵ(l)
1131
+ k :
1132
+ ¯ϵk ≡ ϵ(0)
1133
+ k
1134
+ = ϵ(k) + 1
1135
+ ω2
1136
+
1137
+ αβ
1138
+ ∂α∂βϵ(k) Eα
1139
+ ωEβ
1140
+ −ω + O(|Eω|4),
1141
+ ϵ(1)
1142
+ k
1143
+ = i
1144
+ ω
1145
+
1146
+ α
1147
+ ∂αϵ(k) Eα
1148
+ ω + O(|Eω|3),
1149
+ ϵ(2)
1150
+ k
1151
+ = − 1
1152
+ 2ω2
1153
+
1154
+ αβ
1155
+ ∂α∂βϵ(k) Eα
1156
+ ωEβ
1157
+ ω + O(|Eω|4),
1158
+ ϵ(−l)
1159
+ k
1160
+ =
1161
+
1162
+ ϵ(l)
1163
+ k
1164
+ �∗.
1165
+ (59)
1166
+ We can use Eq. (37) to perturbatively evaluate φ(l)
1167
+ k lead-
1168
+ ing to:
1169
+ φ(0)
1170
+ k
1171
+ = 1 − ϵ(1)
1172
+ k
1173
+ − ϵ(−1)
1174
+ k
1175
+ ω
1176
+ +
1177
+
1178
+ ϵ(1)
1179
+ k
1180
+ �2 +
1181
+
1182
+ ϵ(−1)
1183
+ k
1184
+ �2 − 4ϵ(1)
1185
+ k ϵ(−1)
1186
+ k
1187
+ − ϵ(2)
1188
+ k
1189
+ + ϵ(−2)
1190
+ k
1191
+ 2ω2
1192
+ ,
1193
+ φ(1)
1194
+ k
1195
+ = −ϵ(1)
1196
+ k
1197
+ ω − ϵ(1)
1198
+ k
1199
+
1200
+ ϵ(1)
1201
+ k
1202
+ − ϵ(−1)
1203
+ k
1204
+
1205
+ ω2
1206
+ ,
1207
+ φ(−1)
1208
+ k
1209
+ = ϵ(−1)
1210
+ k
1211
+ ω
1212
+ − ϵ(−1)
1213
+ k
1214
+
1215
+ ϵ(−1)
1216
+ k
1217
+ − ϵ(1)
1218
+ k
1219
+
1220
+ ω2
1221
+ ,
1222
+ φ(2)
1223
+ k
1224
+ =
1225
+
1226
+ ϵ(1)
1227
+ k
1228
+ �2 − ϵ(2)
1229
+ k
1230
+ 2ω2
1231
+ ,
1232
+ φ(−2)
1233
+ k
1234
+ =
1235
+
1236
+ ϵ(−1)
1237
+ k
1238
+ �2 + ϵ(−2)
1239
+ k
1240
+ 2ω2
1241
+ .
1242
+ (60)
1243
+ The other φ(l)
1244
+ k
1245
+ with |l| > 2 will scale with higher powers
1246
+ of electric fields, and therefore can be neglected to second
1247
+ order. The norm squared of those terms above are:
1248
+ ��φ(0)
1249
+ k
1250
+ ��2 = 1 − 2
1251
+ ��ϵ(1)
1252
+ k
1253
+ ��2
1254
+ ω2
1255
+ + O(|Eω|3),
1256
+ ��φ(1)
1257
+ k
1258
+ ��2 =
1259
+ ��ϵ(1)
1260
+ k
1261
+ ��2
1262
+ ω2
1263
+ + O(|Eω|3),
1264
+ ��φ(2)
1265
+ k
1266
+ ��2 = O(|Eω|4).
1267
+ (61)
1268
+
1269
+ 9
1270
+ Therefore the ideal occupation function pk in the limit
1271
+ Γ → 0 to second order in electric fields reads as
1272
+ pk =
1273
+
1274
+ 1 − 2
1275
+ ��ϵ(1)
1276
+ k
1277
+ ��2
1278
+ ω2
1279
+
1280
+ f0(¯ϵk)
1281
+ +
1282
+ ��ϵ(1)
1283
+ k
1284
+ ��2
1285
+ ω2
1286
+ f0(¯ϵk − ω) +
1287
+ ��ϵ(−1)
1288
+ k
1289
+ ��2
1290
+ ω2
1291
+ f0(¯ϵk + ω).
1292
+ (62)
1293
+ The above expansion contains all the correct terms to sec-
1294
+ ond order in electric fields, even though it is not strictly
1295
+ perturbative, because the Floquet band energy ¯ϵk also in-
1296
+ cludes implicitly a correction of order |Eω|2 [see Eq. (59)].
1297
+ In other words, if one wants to obtain a strictly pertur-
1298
+ bative expansion to order |Eω|2 one simply needs to Tay-
1299
+ lor expand the Fermi-Dirac distribution f0(¯ϵk) above as
1300
+ well. However we find it convenient to keep the above
1301
+ form, with the understanding that we can only trust its
1302
+ predictions to order |Eω|2.
1303
+ Let us now comment on the significance of Eq. (62).
1304
+ We see above that even to second order, the non-
1305
+ equilibrium distribution, pk, contains not only the Fermi-
1306
+ Dirac distribution evaluated for the Floquet bands,
1307
+ f0(¯ϵk), but also several other terms that make it clearly
1308
+ deviate from f0(¯ϵk).
1309
+ As we will see these additional
1310
+ terms, are precisely the ones that lead to a finite in-
1311
+ gap rectification in the clean limit Γ → 0.
1312
+ In Ap-
1313
+ pendix D, we also demonstrate that the above occupa-
1314
+ tion function agrees with the one obtained from a sim-
1315
+ pler Boltzmann/relaxation-time description in the limit
1316
+ ω ≪ ¯ϵk. Notice also that the above occupation differs
1317
+ even to up second order |Eω|2 from the naive Fermi-Dirac
1318
+ occupation of the Floquet band, f0(¯ϵk), that was pres-
1319
+ sumed in Refs. [45, 46, 48–50] (see Appendix Appendix E
1320
+ for further comments on previous studies).
1321
+ 2.
1322
+ Linear conductivity
1323
+ The linear conductivity is defined from:
1324
+ j(1)
1325
+ α
1326
+ = σαβ
1327
+ Γ (ω)Eβ
1328
+ ω + O(|Eω|3),
1329
+ (63)
1330
+ where the sub-index Γ emphasizes a finite coupling of the
1331
+ system to the bath. Using Eqs. (51), (37), (32), the exact
1332
+ conductivity of our model at finite coupling to the bath
1333
+ is found to be:
1334
+ σαβ
1335
+ Γ (ω) = i
1336
+ ω
1337
+
1338
+ k
1339
+ fΓ(¯ϵk)∂α∂β¯ϵk
1340
+ +
1341
+
1342
+ k
1343
+ ∂α¯ϵk∂β¯ϵk
1344
+ ω2
1345
+
1346
+ 2Γ − iω L1(¯ϵk, ω),
1347
+ (64)
1348
+ where ∂γ ≡ ∂/∂kγ, and
1349
+ L1(¯ϵk, ω) = f+(¯ϵk) + f−(¯ϵk + ω)
1350
+ − f+(¯ϵk − ω) − f−(¯ϵk),
1351
+ (65)
1352
+ where f± are defined in Eq. (25). Just as for Eq. (62),
1353
+ we have kept the dressed Floquet band energy, ¯ϵk, in the
1354
+ integrands of Eq. (64), and therefore this is not a strictly
1355
+ perturbative expression. But if desired, the strictly per-
1356
+ turbative expression can simply be obtained from the
1357
+ one above by replacing the dressed Floquet band en-
1358
+ ergy dispersion by the bare unperturbed band dispersion:
1359
+ ¯ϵk → ϵ(k). This also applies to the subsequent formulas
1360
+ of this section.
1361
+ In the clean limit (ω ̸= 0 and Γ → 0), the above ex-
1362
+ pression reduces to the standard Drude form:
1363
+ lim
1364
+ Γ→0 σαβ
1365
+ Γ (ω) = i
1366
+ ω
1367
+
1368
+ k
1369
+ f0(¯ϵk)∂α∂β¯ϵk.
1370
+ (66)
1371
+ Therefore, we see that the real part of the linear con-
1372
+ ductivity at finite frequency vanishes when Γ → 0. In
1373
+ Fig. 3(c) we illustrate this in detail for the simple model
1374
+ 1D from Eq. (57). The above Drude form follows from
1375
+ the fact that to the linear order of the electric field, the
1376
+ ideal occupation function pk in the limit Γ → 0 is the
1377
+ same with the equilibrium Fermi-Dirac distribution [see
1378
+ Eq. (62)].
1379
+ In the DC limit ω → 0 the linear conductivity ap-
1380
+ proaches a finite Drude-like value (see Appendix A for
1381
+ details):
1382
+ lim
1383
+ ω→0 σαβ
1384
+ Γ (ω) = 1
1385
+ 2
1386
+
1387
+ k
1388
+ ∂α∂β¯ϵk
1389
+ �fΓ(¯ϵk)
1390
+ Γ
1391
+ − ∂gΓ(¯ϵk)
1392
+ ∂¯ϵk
1393
+
1394
+ ≈ 1
1395
+ 2
1396
+
1397
+ k
1398
+ ∂α∂β¯ϵk
1399
+ �f0(¯ϵk)
1400
+ Γ
1401
+ + O(Γ)
1402
+
1403
+ ,
1404
+ (67)
1405
+ in which
1406
+ gΓ(ϵ) = 1
1407
+ 2i
1408
+
1409
+ f+(ϵ) − f−(ϵ)
1410
+
1411
+ (68)
1412
+ is the imaginary part of f+(ϵ) defined in Eq. (25). There-
1413
+ fore the clean limit of the DC conductivity resembles the
1414
+ prediction of the classic Drude theory for τ ≡ 1/(2Γ), and
1415
+ has a Drude peak in the DC limit when the chemical po-
1416
+ tential of the bath is within the bandwidth of the system
1417
+ µ ∈ [0, ∆] [see Fig. 3(c)]. The fact that the conductivity
1418
+ is finite when ω → 0 and has the expected Drude behav-
1419
+ ior, evidences that our simple bath produces the correct
1420
+ behavior for the relaxation of currents.
1421
+ In the limit in which the frequency is small compared
1422
+ to the bandwidth but much larger than Γ, we obtain
1423
+ the usual decay power 1/ω2 associated with the Drude
1424
+ behavior [see Fig. 3(e), left-hand side region]:
1425
+ lim
1426
+ Γ≪ω≪∆ Re
1427
+
1428
+ σαβ
1429
+ Γ (ω)
1430
+
1431
+ = −2Γ
1432
+ ω2
1433
+
1434
+ k
1435
+ (∂α¯ϵk)(∂β¯ϵk)∂f(¯ϵk)
1436
+ ∂¯ϵk
1437
+ .
1438
+ (69)
1439
+ On the other hand, in the ultra-large frequency regime
1440
+ when the frequency greatly exceeds even the bandwidth,
1441
+ the real part of the linear conductivity has a different
1442
+ scaling from that of Drude theory:
1443
+ lim
1444
+ ω≫∆ Re
1445
+
1446
+ σαβ
1447
+ Γ (ω)
1448
+
1449
+ = Γ
1450
+ ω3
1451
+
1452
+ k
1453
+ (∂α¯ϵk)(∂β¯ϵk),
1454
+ (70)
1455
+ decaying as 1/ω3 [see Fig. 3(e), right-hand side region].
1456
+
1457
+ 10
1458
+ 0.2
1459
+ 0.4
1460
+ 0
1461
+ (c)
1462
+ 0
1463
+ 1
1464
+ 2
1465
+ (d)
1466
+ 0
1467
+ 10
1468
+ 20
1469
+ 0.2
1470
+ 0.4
1471
+ 0
1472
+ (a)
1473
+ 0
1474
+ (b)
1475
+ 0
1476
+ 1
1477
+ 2
1478
+ 3
1479
+ 0
1480
+ 1
1481
+ 2
1482
+ -1
1483
+ -2
1484
+ (e)
1485
+ -10
1486
+ 0
1487
+ (f)
1488
+ -5
1489
+ 0
1490
+ 5
1491
+ 0
1492
+ -1
1493
+ -2
1494
+ 1
1495
+ FIG. 3.
1496
+ (a) The 1D tight binding model whose inversion
1497
+ and time-reversal symmetries are broken by the next-nearest-
1498
+ neighbour hopping ±it2/2, and its (b) dispersion relation with
1499
+ 0 the band bottom and ∆ the band top. (c) Real part of the
1500
+ dimensionless linear conductivity Re σxx
1501
+ Γ (ω)/σ(1)
1502
+ 0
1503
+ illustrating
1504
+ how it vanishes at finite frequency as Γ → 0 (which defines the
1505
+ optical transparency region), and (d) dimensionless rectifica-
1506
+ tion conductivity σxxx
1507
+ Γ
1508
+ (ω, −ω)/σ(2)
1509
+ 0
1510
+ for different Γ illustrating
1511
+ the existence of in-gap rectification in the metal, namely that
1512
+ it approaches a finite non-zero value in the limit of Γ → 0 at
1513
+ finite ω. The characteristic linear and second order conductiv-
1514
+ ities in 1D used here are σ(1)
1515
+ 0
1516
+ = a0·e2/ℏ and σ(2)
1517
+ 0
1518
+ = a2
1519
+ 0τ0·e3/ℏ2
1520
+ with τ0 = ℏ/t1. (e) and (f) Log-log plots of Re σxx
1521
+ Γ (ω)/σ(1)
1522
+ 0
1523
+ and σxxx
1524
+ Γ
1525
+ (ω, −ω)/σ(2)
1526
+ 0
1527
+ for different Γ illustrating their power
1528
+ dependencies over ω in different frequency ranges. Parame-
1529
+ ters used: a0 = 1, t1/t2 = 2, µ = 5t1/7, β0 = 109/t1.
1530
+ 3.
1531
+ Rectification conductivity
1532
+ The rectification conductivity is a three-index tensor
1533
+ that relates the time averaged current [namely the aver-
1534
+ age DC current corresponding to s = 0 in Eq. (50)] to the
1535
+ bilinears of electric field amplitudes. Without loss of gen-
1536
+ erality, we define it by choosing the following symmetry
1537
+ convention for indices of the electric field bilinears:
1538
+ j(0)
1539
+ γ
1540
+ = σγαβ
1541
+ Γ
1542
+ (ω, −ω)Eα
1543
+ ω(Eβ
1544
+ ω)∗
1545
+ + σγαβ
1546
+ Γ
1547
+ (−ω, ω)(Eα
1548
+ ω)∗Eβ
1549
+ ω + O(|Eω|4).
1550
+ (71)
1551
+ The exact rectification conductivity of our model at finite
1552
+ coupling to the bath, Γ, is given by:
1553
+ σγαβ
1554
+ Γ
1555
+ (ω, −ω)
1556
+ =
1557
+
1558
+ k
1559
+ ∂γ¯ϵk∂α¯ϵk∂β¯ϵk
1560
+ 2ω4
1561
+ [fΓ(¯ϵk + ω) + fΓ(¯ϵk − ω) − 2fΓ(¯ϵk)]
1562
+ +
1563
+ Γ
1564
+ 2Γ − iω
1565
+
1566
+ k
1567
+ ∂α¯ϵk∂γ∂β¯ϵk
1568
+ 2ω3
1569
+ L1(¯ϵk, ω)
1570
+ +
1571
+ Γ
1572
+ 2Γ + iω
1573
+
1574
+ k
1575
+ ∂β¯ϵk∂γ∂α¯ϵk
1576
+ 2ω3
1577
+ L∗
1578
+ 1(¯ϵk, ω).
1579
+ (72)
1580
+ The DC limit of the rectification conductivity can be
1581
+ shown to be (see Appendix B for details):
1582
+ lim
1583
+ ω→0 σγαβ
1584
+ Γ
1585
+ (ω, −ω)
1586
+ = 1
1587
+ 4
1588
+
1589
+ k
1590
+ ∂α∂β∂γ¯ϵk
1591
+ �fΓ(¯ϵk)
1592
+ Γ2
1593
+ − 1
1594
+ Γ
1595
+ ∂gΓ(¯ϵk)
1596
+ ∂¯ϵk
1597
+ − 1
1598
+ 3
1599
+ ∂2fΓ(¯ϵk)
1600
+ ∂¯ϵ2
1601
+ k
1602
+
1603
+ ≈ 1
1604
+ 4
1605
+
1606
+ k
1607
+ ∂α∂β∂γ¯ϵk
1608
+ �f0(¯ϵk)
1609
+ Γ2
1610
+ + O(Γ0)
1611
+
1612
+ .
1613
+ (73)
1614
+ The leading term of the above expression in the sec-
1615
+ ond line coincides with the Jerk conductivity predicted
1616
+ within the relaxation time approximation from a simple
1617
+ Boltzmann-relaxation-time formalism [43, 47, 51].
1618
+ For
1619
+ an illustration see Fig. 3(d). We have also verified that
1620
+ the above ω → 0 limit of the rectification conductivity
1621
+ is identical to the ω → 0 limit of the second-harmonic
1622
+ generation conductivity σγαβ
1623
+ Γ
1624
+ (ω, ω) (see Appendix C for
1625
+ details).
1626
+ Let us now focus on the main regime of our interest,
1627
+ which is the “clean-limit” in which the relaxation rate
1628
+ vanishes (Γ → 0) while the frequency remains finite. The
1629
+ exact expression for the rectification conductivity in this
1630
+ limit is given by:
1631
+ lim
1632
+ Γ→0σγαβ
1633
+ Γ
1634
+ (ω, −ω) =
1635
+ 1
1636
+ 2ω4
1637
+
1638
+ k
1639
+ (∂γ¯ϵk)(∂α¯ϵk)(∂β¯ϵk)
1640
+ ×
1641
+
1642
+ f0(¯ϵk + ω) + f0(¯ϵk − ω) − 2f0(¯ϵk)
1643
+
1644
+ .
1645
+ (74)
1646
+ Notice that the above rectification conductivity would
1647
+ vanish under any symmetry that enforces ¯ϵk = ¯ϵ−k, such
1648
+ as time reversal or inversion symmetry.
1649
+ Therefore, the
1650
+ above expression proves one of our central claims, namely
1651
+ that the rectification conductivity remains finite at finite
1652
+ frequency within the optical transparency region of the
1653
+ metal. The “transparency” here refers to the fact that
1654
+ the real part of the linear conductivity vanishes in this
1655
+ same limit ω ≫ Γ → 0. We illustrate this behavior in
1656
+ Fig. 3(d) for our toy 1D model, confirming that the in
1657
+ gap rectification is possible. The origin of this finite rec-
1658
+ tification conductivity can be traced back to the fact that
1659
+
1660
+ 11
1661
+ (b)
1662
+ 0
1663
+ 1
1664
+ 10
1665
+ 15
1666
+ 5
1667
+ 0
1668
+ 0
1669
+ (a)
1670
+ 0
1671
+ -2
1672
+ 2
1673
+ 4
1674
+ (c)
1675
+ -8
1676
+ -4
1677
+ 0
1678
+ 0
1679
+ 1
1680
+ -1
1681
+ -2
1682
+ 2
1683
+ FIG. 4. (a) Schematic of the original band (denoted by solid
1684
+ line l = 0) and the boosted Floquet bands (denoted by dashed
1685
+ lines l = ±1).
1686
+ Here the chemical potential µ is below the
1687
+ original band. The threshold frequency ωt is the minimum
1688
+ frequency for boosted Floquet bands to cross the chemical
1689
+ potential. (b) and (c) dimensionless rectification conductivity
1690
+ σxxx
1691
+ Γ
1692
+ (ω, −ω)/σ(2)
1693
+ 0
1694
+ and its Log-log plots for different Γ, show-
1695
+ ing that rectification conductivity is non-zero when ω > ωt.
1696
+ Parameters used are the same with those in Fig. 3.
1697
+ to the second order of the electric field, the ideal occupa-
1698
+ tion function pk in the limit Γ → 0 is different from the
1699
+ equilibrium Fermi-Dirac distribution [see Eq. (62)].
1700
+ While the expression of Eq. (74) is the exact clean limit
1701
+ of the rectification conductivity in our model, it can be
1702
+ shown that this expression reduces to the more famil-
1703
+ iar expression for the Jerk current prediction of the sim-
1704
+ ple Boltzmann-relaxation-time expression in the limit in
1705
+ which the frequency is small compared to the bandwidth,
1706
+ namely Γ ≪ ω ≪ ∆, and it is given by:
1707
+ lim
1708
+ ω→0 lim
1709
+ Γ→0 σγαβ
1710
+ Γ
1711
+ (ω, −ω) = 1
1712
+ ω2
1713
+
1714
+ k
1715
+ f0(¯ϵk)∂α∂β∂γ¯ϵk,
1716
+ (75)
1717
+ which coincides with Eq. (21) of Ref. [43] for the
1718
+ Jerk mechanism which has a 1/ω2 decaying power [see
1719
+ Fig. 3(f), left-hand side region].
1720
+ More details of this
1721
+ agreement with the simpler Boltzmann approach are dis-
1722
+ cussed in Appendix D.
1723
+ Interestingly, in the “ultra-high” frequency limit, when
1724
+ the frequency is much larger than the bandwidth ω ≫ ∆,
1725
+ the clean rectification conductivity transits to a different
1726
+ scaling and decays much faster [see Fig. 3(f), right-hand
1727
+ side region]:
1728
+ lim
1729
+ ω≫∆ lim
1730
+ Γ→0 σγαβ
1731
+ Γ
1732
+ (ω, −ω)
1733
+ =
1734
+ 1
1735
+ 2ω4
1736
+
1737
+ k
1738
+
1739
+ 1 − 2f0(¯ϵk)
1740
+
1741
+ (∂α¯ϵk)(∂β¯ϵk)(∂γ¯ϵk).
1742
+ (76)
1743
+ In contrast to the Boltzmann-relaxation-time result
1744
+ where the large frequency regime is controlled by the
1745
+ third momentum derivative of the band dispersion, here,
1746
+ the large frequency response is controlled by the third
1747
+ power of band velocity, which is a different intrinsic prop-
1748
+ erty of the band.
1749
+ It is interesting to note that the expression in Eq. (76)
1750
+ remains finite even when the unperturbed band is either
1751
+ fully occupied [f0(¯ϵk) = 1] or fully empty [f0(¯ϵk) = 0],
1752
+ namely the system would be nominally an insulator with-
1753
+ out a Fermi surface. This behavior is possible because our
1754
+ bath does not conserve the total particle number of the
1755
+ system, and therefore, there appears a finite occupation
1756
+ of the bands when they are driven by the electric field,
1757
+ even if the bands were initially empty in the distant past
1758
+ before turning on the time dependent drive.
1759
+ In other
1760
+ words, all our calculations are performed strictly for a
1761
+ bath with fixed chemical potential but not fixed density.
1762
+ The appearance of a finite occupation of the bands to
1763
+ second order of perturbation theory occurs when the fre-
1764
+ quency exceeds the threshold so that one of the copies of
1765
+ the Floquet bands boosted by ±ω crosses the chemical
1766
+ potential, as depicted in Fig. 4.
1767
+ III.
1768
+ SUMMARY AND DISCUSSION
1769
+ We have shown rigorously that the occupation of states
1770
+ in a periodically driven fermionic system coupled to a fea-
1771
+ tureless fermionic heat bath approaches a time indepen-
1772
+ dent occupation function in the limit in which the cou-
1773
+ pling to this bath is vanishingly small. This occupation
1774
+ function can be computed analytically and differs from
1775
+ the naive Fermi-Dirac occupation of the dressed Floquet
1776
+ energies. This non-equilibrium steady state occupation
1777
+ instead resembles a staircase version of the Fermi-Dirac
1778
+ distribution [see Fig. 1(a) for an illustration], and also
1779
+ cannot be expressed as a function of the Floquet energy
1780
+ alone, but in general contains information on all the har-
1781
+ monics encoding the full time dependence of the Hamil-
1782
+ tonian.
1783
+ We applied these results to the case in which the
1784
+ fermionic system has a Hamiltonian corresponding to a
1785
+ single Bloch band without Berry connections (e.g. aris-
1786
+ ing from a tight-binding model with a single site per unit
1787
+ cell) driven by a monochromatic electric field. We showed
1788
+ that this staircase Fermi-Dirac distribution leads to a fi-
1789
+ nite rectification conductivity within the optical trans-
1790
+ parency region of a metal, which at small frequencies
1791
+ compared to the bandwidth agrees exactly with the pre-
1792
+ diction of the Jerk current effect expected from a simpler
1793
+ Boltzmann-relaxation-time description [43, 47]. Because
1794
+
1795
+ 12
1796
+ the oscillating electric field is monochromatic, this rec-
1797
+ tification conductivity does not arise because of the fre-
1798
+ quency difference effect of Ref. [44] or the Raman-like
1799
+ scattering effect of Refs. [45, 46].
1800
+ Our results validate our recent findings [43] that in-
1801
+ gap rectification within the optical transparency region
1802
+ of metals are indeed possible, even in the limit in which
1803
+ carrier relaxation rates vanish, and clarify a discussion
1804
+ surrounding this matter [44–46, 48–50]. More details of
1805
+ the partial agreement with some of these references but
1806
+ also the corrections of imprecisions and incorrect state-
1807
+ ments in some of them can be found in Appendix E.
1808
+ ACKNOWLEDGMENTS
1809
+ We would like to thank Yugo Onishi, Naoto Nagaosa,
1810
+ Liang Fu, Victor Yakovenko, Sergey Ganichev, Bing-
1811
+ hai Yan, and Fernando de Juan for stimulating discus-
1812
+ sions and correspondence. We are particularly thankful
1813
+ to Mikhail Glazov and Leonid Golub for patiently and
1814
+ openly discussing with us their views on Ref. [48] and
1815
+ also some of the subtle aspects of the physics of in-gap
1816
+ rectification, from which we benefited and gained key in-
1817
+ sights for composing Appendix E.
1818
+ [1] T. Oka and H. Aoki, Photovoltaic hall effect in graphene,
1819
+ Physical Review B 79, 081406 (2009).
1820
+ [2] T. Kitagawa, E. Berg, M. Rudner, and E. Demler, Topo-
1821
+ logical characterization of periodically driven quantum
1822
+ systems, Physical Review B 82, 235114 (2010).
1823
+ [3] T. Kitagawa, T. Oka, A. Brataas, L. Fu, and E. Dem-
1824
+ ler, Transport properties of nonequilibrium systems un-
1825
+ der the application of light: Photoinduced quantum hall
1826
+ insulators without landau levels, Physical Review B 84,
1827
+ 235108 (2011).
1828
+ [4] N. H. Lindner, G. Refael, and V. Galitski, Floquet topo-
1829
+ logical insulator in semiconductor quantum wells, Nature
1830
+ Physics 7, 490 (2011).
1831
+ [5] L.
1832
+ Jiang,
1833
+ T.
1834
+ Kitagawa,
1835
+ J.
1836
+ Alicea,
1837
+ A.
1838
+ Akhmerov,
1839
+ D. Pekker, G. Refael, J. I. Cirac, E. Demler, M. D. Lukin,
1840
+ and P. Zoller, Majorana fermions in equilibrium and in
1841
+ driven cold-atom quantum wires, Physical review letters
1842
+ 106, 220402 (2011).
1843
+ [6] M. S. Rudner, N. H. Lindner, E. Berg, and M. Levin,
1844
+ Anomalous edge states and the bulk-edge correspondence
1845
+ for periodically driven two-dimensional systems, Physical
1846
+ Review X 3, 031005 (2013).
1847
+ [7] P. Ponte, Z. Papić, F. Huveneers, and D. A. Abanin,
1848
+ Many-body localization in periodically driven systems,
1849
+ Physical review letters 114, 140401 (2015).
1850
+ [8] A. Lazarides, A. Das, and R. Moessner, Fate of many-
1851
+ body localization under periodic driving, Physical review
1852
+ letters 115, 030402 (2015).
1853
+ [9] D.
1854
+ Carpentier,
1855
+ P.
1856
+ Delplace,
1857
+ M.
1858
+ Fruchart,
1859
+ and
1860
+ K. Gawędzki, Topological index for periodically driven
1861
+ time-reversal
1862
+ invariant
1863
+ 2d
1864
+ systems,
1865
+ Physical
1866
+ review
1867
+ letters 114, 106806 (2015).
1868
+ [10] D. A. Abanin, W. De Roeck, and F. Huveneers, Theory
1869
+ of many-body localization in periodically driven systems,
1870
+ Annals of Physics 372, 1 (2016).
1871
+ [11] V. Khemani, A. Lazarides, R. Moessner, and S. L.
1872
+ Sondhi, Phase structure of driven quantum systems,
1873
+ Physical review letters 116, 250401 (2016).
1874
+ [12] D. V. Else, B. Bauer, and C. Nayak, Floquet time crys-
1875
+ tals, Physical review letters 117, 090402 (2016).
1876
+ [13] N. Y. Yao, A. C. Potter, I.-D. Potirniche, and A. Vish-
1877
+ wanath, Discrete time crystals: Rigidity, criticality, and
1878
+ realizations, Physical review letters 118, 030401 (2017).
1879
+ [14] S. Choi, J. Choi, R. Landig, G. Kucsko, H. Zhou, J. Isoya,
1880
+ F. Jelezko, S. Onoda, H. Sumiya, V. Khemani, et al., Ob-
1881
+ servation of discrete time-crystalline order in a disordered
1882
+ dipolar many-body system, Nature 543, 221 (2017).
1883
+ [15] J. Zhang, P. W. Hess, A. Kyprianidis, P. Becker, A. Lee,
1884
+ J. Smith, G. Pagano, I.-D. Potirniche, A. C. Potter,
1885
+ A. Vishwanath, et al., Observation of a discrete time crys-
1886
+ tal, Nature 543, 217 (2017).
1887
+ [16] P. Titum, E. Berg, M. S. Rudner, G. Refael, and
1888
+ N. H. Lindner, Anomalous floquet-anderson insulator as
1889
+ a nonadiabatic quantized charge pump, Physical Review
1890
+ X 6, 021013 (2016).
1891
+ [17] A. C. Potter, T. Morimoto, and A. Vishwanath, Classi-
1892
+ fication of interacting topological floquet phases in one
1893
+ dimension, Physical Review X 6, 041001 (2016).
1894
+ [18] D. V. Else and C. Nayak, Classification of topological
1895
+ phases in periodically driven interacting systems, Physi-
1896
+ cal Review B 93, 201103 (2016).
1897
+ [19] C. W. von Keyserlingk and S. L. Sondhi, Phase structure
1898
+ of one-dimensional interacting floquet systems. i. abelian
1899
+ symmetry-protected topological phases, Physical Review
1900
+ B 93, 245145 (2016).
1901
+ [20] R. Roy and F. Harper, Floquet topological phases with
1902
+ symmetry in all dimensions, Physical Review B 95,
1903
+ 195128 (2017).
1904
+ [21] H. C. Po, L. Fidkowski, T. Morimoto, A. C. Potter, and
1905
+ A. Vishwanath, Chiral floquet phases of many-body lo-
1906
+ calized bosons, Physical Review X 6, 041070 (2016).
1907
+ [22] H. C. Po, L. Fidkowski, A. Vishwanath, and A. C. Pot-
1908
+ ter, Radical chiral floquet phases in a periodically driven
1909
+ kitaev model and beyond, Physical Review B 96, 245116
1910
+ (2017).
1911
+ [23] F. Nathan, D. Abanin, E. Berg, N. H. Lindner, and M. S.
1912
+ Rudner, Anomalous floquet insulators, Physical Review
1913
+ B 99, 195133 (2019).
1914
+ [24] I. L. Aleiner, Bethe ansatz solutions for certain periodic
1915
+ quantum circuits, Annals of Physics 433, 168593 (2021).
1916
+ [25] A. Morvan, T. I. Andersen, X. Mi, C. Neill, A. Petukhov,
1917
+ K. Kechedzhi, D. Abanin, R. Acharya, F. Arute, K. Arya,
1918
+ et al., Formation of robust bound states of interacting
1919
+ photons, arXiv preprint arXiv:2206.05254 (2022).
1920
+ [26] S. M. Young and A. M. Rappe, First principles calcu-
1921
+ lation of the shift current photovoltaic effect in ferro-
1922
+ electrics, Physical review letters 109, 116601 (2012).
1923
+ [27] O. Matsyshyn, U. Dey, I. Sodemann, and Y. Sun, The
1924
+
1925
+ 13
1926
+ berry phase rectification tensor and the solar rectification
1927
+ vector, Journal of Physics D: Applied Physics 54, 404001
1928
+ (2021).
1929
+ [28] J. A. Brehm, S. M. Young, F. Zheng, and A. M. Rappe,
1930
+ First-principles calculation of the bulk photovoltaic effect
1931
+ in the polar compounds liass2, liasse2, and naasse2, The
1932
+ Journal of chemical physics 141, 204704 (2014).
1933
+ [29] T. Rangel, B. M. Fregoso, B. S. Mendoza, T. Mori-
1934
+ moto, J. E. Moore, and J. B. Neaton, Large bulk photo-
1935
+ voltaic effect and spontaneous polarization of single-layer
1936
+ monochalcogenides, Physical review letters 119, 067402
1937
+ (2017).
1938
+ [30] A. M. Cook, B. M Fregoso, F. De Juan, S. Coh, and J. E.
1939
+ Moore, Design principles for shift current photovoltaics,
1940
+ Nature communications 8, 1 (2017).
1941
+ [31] T. Morimoto, M. Nakamura, M. Kawasaki, and N. Na-
1942
+ gaosa, Current-voltage characteristic and shot noise of
1943
+ shift current photovoltaics, Physical review letters 121,
1944
+ 267401 (2018).
1945
+ [32] D. Kumar, C.-H. Hsu, R. Sharma, T.-R. Chang, P. Yu,
1946
+ J. Wang, G. Eda, G. Liang, and H. Yang, Room-
1947
+ temperature nonlinear hall effect and wireless radiofre-
1948
+ quency rectification in weyl semimetal tairte4, Nature
1949
+ Nanotechnology 16, 421 (2021).
1950
+ [33] T. Morimoto and N. Nagaosa, Topological nature of
1951
+ nonlinear optical effects in solids, Science advances 2,
1952
+ e1501524 (2016).
1953
+ [34] T. Morimoto, S. Zhong, J. Orenstein, and J. E. Moore,
1954
+ Semiclassical theory of nonlinear magneto-optical re-
1955
+ sponses
1956
+ with
1957
+ applications
1958
+ to
1959
+ topological
1960
+ dirac/weyl
1961
+ semimetals, Physical Review B 94, 245121 (2016).
1962
+ [35] O. Matsyshyn, F. Piazza, R. Moessner, and I. Sodemann,
1963
+ Rabi regime of current rectification in solids, Physical
1964
+ Review Letters 127, 126604 (2021).
1965
+ [36] T. Bilitewski and N. R. Cooper, Scattering theory for
1966
+ floquet-bloch states, Physical Review A 91, 033601
1967
+ (2015).
1968
+ [37] T. Shirai, T. Mori, and S. Miyashita, Condition for emer-
1969
+ gence of the floquet-gibbs state in periodically driven
1970
+ open systems, Physical Review E 91, 030101 (2015).
1971
+ [38] K. I. Seetharam, C.-E. Bardyn, N. H. Lindner, M. S.
1972
+ Rudner, and G. Refael, Controlled population of floquet-
1973
+ bloch states via coupling to bose and fermi baths, Phys-
1974
+ ical Review X 5, 041050 (2015).
1975
+ [39] M. Genske and A. Rosch, Floquet-boltzmann equation
1976
+ for periodically driven fermi systems, Physical Review A
1977
+ 92, 062108 (2015).
1978
+ [40] T. Shirai, J. Thingna, T. Mori, S. Denisov, P. Hänggi,
1979
+ and S. Miyashita, Effective floquet–gibbs states for dis-
1980
+ sipative quantum systems, New Journal of Physics 18,
1981
+ 053008 (2016).
1982
+ [41] I. Esin, M. S. Rudner, G. Refael, and N. H. Lindner,
1983
+ Quantized transport and steady states of floquet topo-
1984
+ logical insulators, Physical Review B 97, 245401 (2018).
1985
+ [42] J. Park, O. Golan, Y. Vinkler-Aviv, and A. Rosch, Ther-
1986
+ mal hall response: Violation of gravitational analogs and
1987
+ einstein relations, Physical Review B 105, 205419 (2022).
1988
+ [43] L.-k. Shi, O. Matsyshyn, J. C. Song, and I. S. Villadiego,
1989
+ The berry dipole photovoltaic demon and the thermo-
1990
+ dynamics of photo-current generation within the optical
1991
+ gap of metals, arXiv preprint arXiv:2207.03496 (2022).
1992
+ [44] F. de Juan, Y. Zhang, T. Morimoto, Y. Sun, J. E.
1993
+ Moore, and A. G. Grushin, Difference frequency genera-
1994
+ tion in topological semimetals, Physical Review Research
1995
+ 2, 012017 (2020).
1996
+ [45] Y. Onishi, H. Watanabe, T. Morimoto, and N. Nagaosa,
1997
+ Effects of relaxation on the photovoltaic effect and pos-
1998
+ sibility for photocurrent within the transparent region,
1999
+ Physical Review B 106, 235110 (2022).
2000
+ [46] L. Golub and M. Glazov, Raman photogalvanic effect:
2001
+ Photocurrent at inelastic light scattering, Physical Re-
2002
+ view B 106, 205205 (2022).
2003
+ [47] O. Matsyshyn and I. Sodemann, Nonlinear hall acceler-
2004
+ ation and the quantum rectification sum rule, Physical
2005
+ review letters 123, 246602 (2019).
2006
+ [48] V. Belinicher, E. Ivchenko, and G. Pikus, Transient
2007
+ photocurrent
2008
+ in
2009
+ gyrotropic
2010
+ crystals,
2011
+ Soviet
2012
+ Physics
2013
+ Semiconductors-Ussr 20, 558 (1986).
2014
+ [49] E.
2015
+ Ivchenko,
2016
+ Y.
2017
+ B.
2018
+ Lyanda-Geller,
2019
+ and
2020
+ G.
2021
+ Pikus,
2022
+ Magneto-photogalvanic effects in noncentrosymmetric
2023
+ crystals, Ferroelectrics 83, 19 (1988).
2024
+ [50] S. S. Pershoguba and V. M. Yakovenko, Direct current
2025
+ in a stirred optical lattice, Annals of Physics , 169075
2026
+ (2022).
2027
+ [51] I. Sodemann and L. Fu, Quantum nonlinear hall effect in-
2028
+ duced by berry curvature dipole in time-reversal invariant
2029
+ materials, Physical review letters 115, 216806 (2015).
2030
+ [52] D. Kaplan, T. Holder, and B. Yan, Nonvanishing sub-
2031
+ gap photocurrent as a probe of lifetime effects, Physical
2032
+ Review Letters 125, 227401 (2020).
2033
+ [53] L. Gao, Z. Addison, E. Mele, and A. M. Rappe, Intrinsic
2034
+ fermi-surface contribution to the bulk photovoltaic effect,
2035
+ Physical Review Research 3, L042032 (2021).
2036
+ [54] H. Watanabe and Y. Yanase, Chiral photocurrent in
2037
+ parity-violating magnet and enhanced response in topo-
2038
+ logical antiferromagnet, Physical Review X 11, 011001
2039
+ (2021).
2040
+ [55] L. Golub, E. Ivchenko, and B. Spivak, Semiclassical the-
2041
+ ory of the circular photogalvanic effect in gyrotropic sys-
2042
+ tems, Physical Review B 102, 085202 (2020).
2043
+ [56] N. Nagaosa and T. Morimoto, Concept of quantum ge-
2044
+ ometry in optoelectronic processes in solids: application
2045
+ to solar cells, Advanced Materials 29, 1603345 (2017).
2046
+ [57] L. Gerchikov, D. Parshin, and A. Shabaev, Theory of
2047
+ resonance saturation of ir absorption in semiconductors
2048
+ with degenerate resonance bands in electric and magnetic
2049
+ fields, Zh. Eksp. Teor. Fiz 96, 1046 (1989).
2050
+ [58] B. M. Fregoso, Y. Wang, N. Gedik, and V. Galitski,
2051
+ Driven electronic states at the surface of a topological
2052
+ insulator, Physical Review B 88, 155129 (2013).
2053
+ [59] A. Kamenev, Many-body theory of non-equilibrium sys-
2054
+ tems, arXiv preprint arXiv:cond-mat/0412296 (2004).
2055
+ [60] K. Johnsen and A.-P. Jauho, Quasienergy spectroscopy
2056
+ of excitons, Physical review letters 83, 1207 (1999).
2057
+ [61] A.-P. Jauho, N. S. Wingreen, and Y. Meir, Time-
2058
+ dependent transport in interacting and noninteracting
2059
+ resonant-tunneling systems, Physical Review B 50, 5528
2060
+ (1994).
2061
+ [62] S. Kohler, J. Lehmann, and P. Hänggi, Driven quantum
2062
+ transport on the nanoscale, Physics Reports 406, 379
2063
+ (2005).
2064
+ [63] K. I. Seetharam, C.-E. Bardyn, N. H. Lindner, M. S.
2065
+ Rudner, and G. Refael, Steady states of interacting flo-
2066
+ quet insulators, Physical Review B 99, 014307 (2019).
2067
+ [64] Y. V. Nazarov and Y. M. Blanter, Quantum transport:
2068
+ introduction to nanoscience (Cambridge university press,
2069
+ 2009).
2070
+
2071
+ 14
2072
+ Appendix A: Linear conductivity in the DC limit
2073
+ In this appendix we show additional details of the linear conductivity in the DC limit discussed in the main text.
2074
+ In the DC limit ω → 0 the linear conductivity [see Eq. (64) in the main text] becomes:
2075
+ lim
2076
+ ω→0 σαβ
2077
+ Γ (ω) = 1
2078
+ 2
2079
+
2080
+ k
2081
+ ∂α∂β¯ϵk
2082
+ �fΓ(¯ϵk)
2083
+ Γ
2084
+ − ∂gΓ(¯ϵk)
2085
+ ∂¯ϵk
2086
+
2087
+ = 1
2088
+ 2
2089
+
2090
+ k
2091
+ ∂α∂β¯ϵk
2092
+ �f0(¯ϵk)
2093
+ Γ
2094
+ + Γ
2095
+ 2
2096
+ ∂3f0(¯ϵk)
2097
+ ∂¯ϵ3
2098
+ k
2099
+ + Γ2
2100
+ 3
2101
+ ∂3g0(¯ϵk)
2102
+ ∂¯ϵ3
2103
+ k
2104
+ + O(Γ3)
2105
+
2106
+ ,
2107
+ (A-1)
2108
+ in which
2109
+ gΓ(ϵ) = 1
2110
+ 2i
2111
+
2112
+ f+(ϵ) − f−(ϵ)
2113
+
2114
+ ,
2115
+ g0(ϵ) ≡ lim
2116
+ Γ→0 gΓ(ϵ),
2117
+ (A-2)
2118
+ where gΓ(ϵ) is the imaginary part of f+(ϵ) defined in Eq. (25) in the main text, and we used the Cauchy–Riemann
2119
+ equations satisfied by fΓ(ϵ) and gΓ(ϵ)
2120
+ ∂fΓ(ϵ)
2121
+ ∂Γ
2122
+ = ∂gΓ(ϵ)
2123
+ ∂ϵ
2124
+ ,
2125
+ ∂fΓ(ϵ)
2126
+ ∂ϵ
2127
+ = −∂gΓ(ϵ)
2128
+ ∂Γ
2129
+ ,
2130
+ (A-3)
2131
+ and the resulting relation
2132
+ fΓ(ϵ) = f0(ϵ) + Γ∂g0(ϵ)
2133
+ ∂ϵ
2134
+ + O(Γ2),
2135
+ (A-4)
2136
+ to obtaining the second equation of Eq. (A-1).
2137
+ Therefore the clean limit of the DC conductivity resembles the
2138
+ prediction of the classic Drude theory for τ ≡ 1/(2Γ):
2139
+ lim
2140
+ Γ→0 lim
2141
+ ω→0 σαβ
2142
+ Γ (ω) = 1
2143
+
2144
+
2145
+ k
2146
+ f0(¯ϵk)∂α∂β¯ϵk,
2147
+ (A-5)
2148
+ and linear conductivity has a Drude peak in the DC limit when the chemical potential of the bath is within the
2149
+ bandwidth of the system µ ∈ [0, ∆]. The system can still have a finite linear DC conductivity even if the band is
2150
+ nominally fully empty or occupied at finite Γ, namely,
2151
+ lim
2152
+ ω→0 σαβ
2153
+ Γ (ω) = 1
2154
+ 2
2155
+
2156
+ k
2157
+ ∂α∂β¯ϵk
2158
+ �Γ2
2159
+ 3
2160
+ ∂3g0(¯ϵk)
2161
+ ∂¯ϵ3
2162
+ k
2163
+ + O(Γ3)
2164
+
2165
+ ∝ Γ2 + O(Γ3),
2166
+
2167
+ T0 → 0, µ /∈ [0, ∆]
2168
+
2169
+ .
2170
+ (A-6)
2171
+ This conductance vanishes when Γ → 0.
2172
+ Appendix B: Rectification conductivity in the DC limit
2173
+ In this appendix we show more details of the rectification conductivity in the DC limit discussed in the main text.
2174
+ In the DC limit, the rectification conductivity [see Eq. (72) in the main text] is:
2175
+ lim
2176
+ ω→0 σγαβ
2177
+ Γ
2178
+ (ω, −ω) = 1
2179
+ 4
2180
+
2181
+ k
2182
+ ∂α∂β∂γ¯ϵk
2183
+ �fΓ(¯ϵk)
2184
+ Γ2
2185
+ − 1
2186
+ Γ
2187
+ ∂gΓ(¯ϵk)
2188
+ ∂¯ϵk
2189
+ − 1
2190
+ 3
2191
+ ∂2fΓ(¯ϵk)
2192
+ ∂¯ϵ2
2193
+ k
2194
+
2195
+ = 1
2196
+ 4
2197
+
2198
+ k
2199
+ ∂α∂β∂γ¯ϵk
2200
+ �f0(¯ϵk)
2201
+ Γ2
2202
+ + 1
2203
+ 6
2204
+ ∂2f0(¯ϵk)
2205
+ ∂¯ϵ2
2206
+ k
2207
+ + Γ2
2208
+ 24
2209
+ ∂4f0(¯ϵk)
2210
+ ∂¯ϵ4
2211
+ k
2212
+ + Γ3
2213
+ 45
2214
+ ∂5g0(¯ϵk)
2215
+ ∂¯ϵ5
2216
+ k
2217
+ + O(Γ4)
2218
+
2219
+ ,
2220
+ (B-1)
2221
+ where we again used Eq. (A-4) in arriving at the second equation. In the clean limit Γ → 0, this coincides with the
2222
+ Jerk conductivity predicted within the relaxation time approximation, but here we also present the sub-leading in Γ
2223
+ correction:
2224
+ lim
2225
+ Γ→0 lim
2226
+ ω→0σγαβ
2227
+ Γ
2228
+ (ω, −ω) = 1
2229
+ 4
2230
+
2231
+ k
2232
+ ∂α∂β∂γ¯ϵk
2233
+ �f0(¯ϵk)
2234
+ Γ2
2235
+ + 1
2236
+ 6
2237
+ ∂2f0(¯ϵk)
2238
+ ∂¯ϵ2
2239
+ k
2240
+
2241
+ .
2242
+ (B-2)
2243
+ Therefore, similarly to the linear conductivity, second order rectification conductivity has a Jerk peak at DC limit
2244
+ when the chemical potential is within the bandwidth of the system µ ∈ [0, ∆]. When the band is nominally fully
2245
+ empty or occupied, for the rectification conductivity we now have
2246
+ lim
2247
+ ω→0σγαβ
2248
+ Γ
2249
+ (ω, −ω) = 1
2250
+ 4
2251
+
2252
+ k
2253
+ ∂α∂β∂γ¯ϵk
2254
+ �Γ3
2255
+ 45
2256
+ ∂5g0(¯ϵk)
2257
+ ∂¯ϵ5
2258
+ k
2259
+ + O(Γ4)
2260
+
2261
+ ∝ Γ3 + O(Γ4),
2262
+
2263
+ T0 → 0, µ /∈ [0, ∆]
2264
+
2265
+ .
2266
+ (B-3)
2267
+ This finite DC rectification conductivity again vanishes in the clean limit Γ → 0.
2268
+
2269
+ 15
2270
+ Appendix C: Second harmonic generation
2271
+ In this appendix we show the second harmonic conductivity mentioned in the main text. The second harmonic
2272
+ conductivity is the one that controls the response oscillating at the double frequency of the drive (s = 2), we define
2273
+ it as:
2274
+ j(2)
2275
+ γ
2276
+ = σγαβ
2277
+ Γ
2278
+ (ω, ω)Eα
2279
+ ωEβ
2280
+ ω + O(|Eω|3),
2281
+ (C-1)
2282
+ and it is given by the following expression:
2283
+ σγαβ
2284
+ Γ
2285
+ (ω, ω) = − 1
2286
+ 2ω2
2287
+
2288
+ k
2289
+ fΓ∂α∂β∂γ¯ϵk − 1
2290
+ ω3
2291
+ Γ
2292
+ 2Γ − iω
2293
+
2294
+ k
2295
+ (∂α¯ϵk)(∂β∂γ¯ϵk)L1(¯ϵk, ω)
2296
+
2297
+ 1
2298
+ 2ω4
2299
+ Γ
2300
+ 2Γ − 2iω
2301
+
2302
+ k
2303
+ (∂γ¯ϵk)
2304
+
2305
+ (∂α¯ϵk)(∂β¯ϵk)L2(¯ϵk, ω) + ω
2306
+ 2 ∂α∂β¯ϵkL1(¯ϵk, 2ω)
2307
+
2308
+ ,
2309
+ (C-2)
2310
+ where
2311
+ L2(¯ϵk, ω) = f+(¯ϵk − 2ω) − 2f+(¯ϵk − ω) + f+(¯ϵk) + f−(¯ϵk) − 2f−(¯ϵk + ω) + f−(¯ϵk + 2ω).
2312
+ (C-3)
2313
+ The low frequency limit of second harmonic conductivity coincides with the low frequency limit of rectification
2314
+ conductivity from Eq. (73) in the main text:
2315
+ lim
2316
+ ω→0 σγαβ
2317
+ Γ
2318
+ (ω, ω) = 1
2319
+ 4
2320
+
2321
+ k
2322
+ ∂α∂β∂γ¯ϵk
2323
+ �fΓ(¯ϵn)
2324
+ Γ2
2325
+ − 1
2326
+ Γ
2327
+ ∂gΓ(¯ϵn)
2328
+ ∂¯ϵn
2329
+ − 1
2330
+ 3
2331
+ ∂2fΓ(¯ϵn)
2332
+ ∂¯ϵ2n
2333
+
2334
+ .
2335
+ (C-4)
2336
+ Interestingly, at large frequencies ω ≫ ∆ the real part of the second harmonic conductivity decays as 1/ω2 in contrast
2337
+ to 1/ω4 power decay of the rectification conductivity.
2338
+ Appendix D: Relation to the Boltzmann theory
2339
+ In this appendix we discuss the relation between our result and that from a simpler Boltzmann/relaxation-time
2340
+ approach. We begin by writing a Boltzmann equation for a single band system in the relaxation time approximation:
2341
+ ∂tf(k, t) + E(t) · ∇kf(k, t) = −[f(k, t) − f0(ϵk)]/τ,
2342
+ (D-1)
2343
+ where E(t) = Eωe−iωt + c. c. is a monochromatic electric field.
2344
+ The above equations are written in a different gauge with respect to the main text: here k is viewed as a gauge
2345
+ invariant mechanical crystal momentum, which corresponds to k−A(t) in the main text. In order to obtain expressions
2346
+ for occupation functions in the same gauge as in the main text, we convert to a gauge in which we keep track of the
2347
+ occupation of canonical crystal momenta, using the following relation:
2348
+ p(k, t) ≡ f(k − A(t), t).
2349
+ (D-2)
2350
+ The occupation function p(k, t) satisfies the following equation
2351
+ ∂tp(k, t) = ∂tf(k − A(t), t) − ∂tA(t) · ∇kf(k − A(t), t)
2352
+ = ∂tf(k − A(t), t) + E(t) · ∇kf(k − A(t), t)
2353
+ = −[f(k − A(t), t) − f0(ϵk−A(t))]/τ,
2354
+ (D-3)
2355
+ where we used Eq. (D-1) in obtaining the last equation. Therefore we see that the distribution function p(k, t) satisfies
2356
+ an equation without explicit electric field derivative term:
2357
+ ∂tp(k, t) = −[p(k, t) − f0(ϵk−A(t))]/τ.
2358
+ (D-4)
2359
+ Using the fact that the late-time steady state distribution is periodic, we perform Fourier series expansions for both
2360
+ p(k, t) and f0(ϵk−A(t)):
2361
+ p(k, t) =
2362
+ +∞
2363
+
2364
+ l=−∞
2365
+ p(l)(k) exp(−ilωt),
2366
+ p(l)(k) =
2367
+ � T
2368
+ 0
2369
+ dt
2370
+ T p(k, t) exp(ilωt);
2371
+ f0(ϵk−A(t)) =
2372
+ +∞
2373
+
2374
+ l=−∞
2375
+ f (l)
2376
+ 0 (k) exp(−ilωt),
2377
+ f (l)
2378
+ 0 (k) =
2379
+ � T
2380
+ 0
2381
+ dt
2382
+ T f0(ϵk−A(t)) exp(ilωt).
2383
+ (D-5)
2384
+
2385
+ 16
2386
+ With the above expansions, Eq. (D-4) becomes
2387
+ −ilωp(l)(k) = −p(l)(k)/τ + f (l)
2388
+ 0 (k)/τ,
2389
+ (D-6)
2390
+ and leads to
2391
+ p(l)(k) =
2392
+ 1
2393
+ 1 − ilωτ f (l)
2394
+ 0 (k).
2395
+ (D-7)
2396
+ The above solution in general requires an explicit calculation of the following mixed harmonics of the distribution:
2397
+ f (l)
2398
+ 0 (k) =
2399
+ � T
2400
+ 0
2401
+ dt
2402
+ T f0(ϵ(0)
2403
+ k
2404
+ + ϵ(1)
2405
+ k e−iωt + ϵ(−1)
2406
+ k
2407
+ eiωt + · · · ) exp(ilωt),
2408
+ (D-8)
2409
+ where
2410
+ ϵk−A(t) =
2411
+ +∞
2412
+
2413
+ l=−∞
2414
+ ϵ(l)
2415
+ k exp(−ilωt),
2416
+ ϵ(l)
2417
+ k =
2418
+ � T
2419
+ 0
2420
+ dt
2421
+ T ϵk−A(t) exp(ilωt).
2422
+ (D-9)
2423
+ Let us consider however the clean limit τ → +∞.
2424
+ Notice that f (l)
2425
+ 0 (k) is independent of τ, therefore for l ̸= 0
2426
+ components we have
2427
+ lim
2428
+ τ→+∞ p(l̸=0)(k) =
2429
+ lim
2430
+ τ→+∞
2431
+ 1
2432
+ 1 − ilωτ f (l)
2433
+ 0 (k) = 0.
2434
+ (D-10)
2435
+ However the l = 0 component, or time averaged component, which is independent of τ and therefore remains finite
2436
+ as τ → +∞, is given by:
2437
+ p(0)(k) = f (0)
2438
+ 0 (k) =
2439
+ � T
2440
+ 0
2441
+ dt
2442
+ T f0(ϵ(0)
2443
+ k
2444
+ + ϵ(1)
2445
+ k e−iωt + ϵ(−1)
2446
+ k
2447
+ eiωt + · · · ).
2448
+ (D-11)
2449
+ Therefore, similarly to Eq. (54) obtained from the full formalism with the bath, the distribution from the Boltzmann
2450
+ theory becomes time independent in the canonical crystal momentum, but not in the mechanical physical momentum,
2451
+ in the analogous ideal limit of τ → +∞. Notice, however, that the above result has to be viewed as a limit of τ → +∞,
2452
+ and not as a situation in which there is no relaxation. This is because in the strict absence of relaxation mechanisms
2453
+ there is no unique late-time steady state, namely by taking 1/τ = 0 and neglecting altogether the relaxations in the
2454
+ right hand side of Eq. (D-4) any time-independent distribution of the canonical momenta would be a solution.
2455
+ If we expand up to the second order of electric fields Eq. (D-11) we obtain:
2456
+ p(0)(k) =
2457
+ � T
2458
+ 0
2459
+ dt
2460
+ T
2461
+
2462
+ f0(¯ϵk) +
2463
+
2464
+ ϵ(1)
2465
+ k e−iωt + ϵ(−1)
2466
+ k
2467
+ eiωt + ϵ(2)
2468
+ k e−i2ωt + ϵ(−2)
2469
+ k
2470
+ ei2ωt�
2471
+ f ′
2472
+ 0(¯ϵk)
2473
+ + 1
2474
+ 2
2475
+
2476
+ ϵ(1)
2477
+ k e−iωt + ϵ(−1)
2478
+ k
2479
+ eiωt�2f ′′
2480
+ 0 (¯ϵk) + O(|Eω|3)
2481
+
2482
+ = f0(¯ϵk) + |ϵ(1)
2483
+ k |2f ′′
2484
+ 0 (¯ϵk) + O(|Eω|3).
2485
+ (D-12)
2486
+ Interestingly the above distribution function coincides with the asymptotic behavior of the staircase distribution
2487
+ function discussed in the main text [see e.g., Eq. (62)] in limit of ∆ ≫ ω ≫ Γ → 0:
2488
+ lim
2489
+ ω→0 lim
2490
+ Γ→0 pk = lim
2491
+ ω→0
2492
+ ��
2493
+ 1 − 2
2494
+ ��ϵ(1)
2495
+ k
2496
+ ��2
2497
+ ω2
2498
+
2499
+ f0(¯ϵk) +
2500
+ ��ϵ(1)
2501
+ k
2502
+ ��2
2503
+ ω2
2504
+ f0(¯ϵk − ω) +
2505
+ ��ϵ(−1)
2506
+ k
2507
+ ��2
2508
+ ω2
2509
+ f0(¯ϵk + ω)
2510
+
2511
+ = f0(¯ϵk) + |ϵ(1)
2512
+ k |2f ′′
2513
+ 0 (¯ϵk).
2514
+ (D-13)
2515
+ Therefore the expectation value of all equal time observables, such as the electric current, coincide with those of the
2516
+ more microscopic Floquet-bath theory of the main text, at least to second order in electric fields. In particular one
2517
+ obtains the same rectification conductivity in the above limit as that in Eq. (75) of the main text, that we refer to as
2518
+ Jerk effect.
2519
+
2520
+ 17
2521
+ Appendix E: Comments and connections to other works in the literature
2522
+ There has been a long-standing debate in the literature about the possibility of in-gap rectification which has been
2523
+ clouded by previous imprecise and incorrect statements. In this section we will try to clarify some of this. We begin by
2524
+ defining precisely what do we mean by in-gap rectification. The optical gap is defined as the region in the frequency
2525
+ domain in which the the hermitian symmetric part of the conductivity tensor vanishes in the limit of low temperatures
2526
+ and small scattering rates (see Ref. [43] for a review). We then say that a system has in-gap rectification if any of the
2527
+ elements of the rectification conductivity tensor that lead to finite DC currents generated by a monochromatic AC
2528
+ electric field with a frequency within the optical gap remain non-zero in that same limit. More specifically:
2529
+ Definition of “optical gap” :
2530
+ lim
2531
+ T0→0 lim
2532
+ Γ→0
2533
+
2534
+ σαβ(ω) + [σβα(ω)]∗�
2535
+ → 0,
2536
+ when ω ∈ optical gap.
2537
+ (E-1)
2538
+ Definition of “in-gap rectification” :
2539
+ lim
2540
+ T0→0 lim
2541
+ Γ→0 σγαβ(ω, −ω) ̸= 0,
2542
+ when ω ∈ optical gap.
2543
+ (E-2)
2544
+ Therefore our current manuscript and our previous work in Ref. [43], demonstrate rigorously that in-gap rectification
2545
+ in the above sense is indeed possible.
2546
+ Nevertheless, some confusion in the literature appears to have originated from different interpretations of the work
2547
+ of Belinicher, Ivchenko, and Pikus (BIP) in Ref. [48]. That paper contained statements such as “The conclusion
2548
+ that a steady-state photocurrent may appear on illumination in the transparency range of a crystal, reached in earlier
2549
+ publications, is shown to be in error”. This statement could be read as implying the impossibility of in-gap rectification
2550
+ in the sense we defined above. In fact, this reading of the BIP paper appears to have been made in several references
2551
+ claiming that in-gap rectification in the above sense is impossible [44, 45, 50]. Even us in our recent work of Ref. [43],
2552
+ read the BIP paper as trying to prove that in-gap rectification is impossible in the above sense.
2553
+ However, part of the issue with reading the aforementioned BIP paper, is that it left several crucial gaps in its
2554
+ discussion and its derivations that can make it hard to know in a precise way what exactly BIP implied at various
2555
+ places and the precise framework that BIP used for reaching such conclusions. For example, a crucial point that can
2556
+ lead to a different readings of the BIP paper relates to the definition of the term “gn” that appears in the right hand
2557
+ side of their Eq. (8) in Ref. [48], which is a central equation from which various conclusions are derived. Unfortunately
2558
+ BIP never spelled out an explicit form for this term, but simply wrote that “gn is the generation function, i.e., the
2559
+ rate of change of the distribution function due to optical transitions.”. This leaves open to interpretation what exactly
2560
+ they had in mind for “optical transitions”. For example, one could read this by interpreting “gn” as associated only
2561
+ with inter-band optical transitions, and in this case, one would be lead to read the BIP paper as trying to imply that
2562
+ in-gap rectification in the above sense is impossible.
2563
+ There is however an alternative way to interpret “gn” and the notion of “optical transitions” in Ref. [48] as a
2564
+ more general notion of irreversible “transitions” that can take place even within what would nominally be the optical
2565
+ gap defined in the above sense. This more nuanced way of interpreting the BIP paper has indeed been recently
2566
+ emphasized by Glazov and Golub in Ref. [46]. For example Golub and Glazov write in Ref. [46] that “... even for
2567
+ transparent media, real electronic transitions should occur to enable the photocurrent.” and that “We reiterate that
2568
+ in the absence of any real electronic transitions DC current is forbidden. It is obvious from general reasons: If a DC
2569
+ current is generated then this current results in a Joule heat in the sample or in the external circuit connected to the
2570
+ sample. It is forbidden by the energy conservation law in the absence of real transitions.”. What Golub and Glazov
2571
+ are trying to explain there is in line with our recent thermodynamic analysis in Ref. [43], where we emphasized that in
2572
+ order to guarantee the positivity of entropy production, specially when the system is connected to an external circuit,
2573
+ it is always important to view the scattering rate Γ as possibly arbitrarily small but not strictly zero. This requirement
2574
+ means that physically it is important to have always a non-zero absorption within the nominal optical gap of the
2575
+ material. In fact Golub, Ivchenko himself and Spivak, have also emphasized a related aspect of this in Ref. [55] where
2576
+ they demonstrated that the CPGE effect associated with the Berry dipole term remains finite within the optical in
2577
+ the limit of Γ → 0, but also coexists the other contributions that originate from impurity scattering mechanisms that
2578
+ scale in the same way with frequency and remain finite inside of the gap in the limit of Γ → 0. One way to state this
2579
+ state of affairs, that has been emphasized by Golub and Glazov to us in private communications, is that while the
2580
+ real transitions associated with scattering lead to a vanishingly small linear dissipative conductivity in the limit of
2581
+ Γ → 0, there are cancellations of the scattering rate that lead to finite rectification conductivity in this limit but the
2582
+ “real electronic transitions” are still taking place. These “real electronic transitions” are therefore the more general
2583
+ notion of “optical transitions” that can contribute to the term “gn” in the BIP reference. Therefore, within this point
2584
+ of view, one can say that the BIP should not be read as implying that in-gap rectification is impossible in the sense
2585
+ we defined above. We are in agreement with the physics of this point of view broadly speaking.
2586
+ There is however another crucial aspect of the BIP work in Ref. [48] with which we still find ourselves in disagreement
2587
+ and that we believe our current paper provides good evidence to be incorrect in general. BIP stated that “... in
2588
+
2589
+ 18
2590
+ the case of continuous illumination the steady-state distribution function is f0(¯ϵk) irrespective of how weak is the
2591
+ interaction of electrons with phonons.” In this statement f0 is the “equilibrium distribution function” (the Fermi-
2592
+ Dirac occupation function) and ¯ϵk is the Floquet energy of the band. These statement has been echoed in several
2593
+ subsequent works [45, 46, 49, 50]. However, our current work demonstrates that in the limit of Γ → 0 the distribution
2594
+ function is sharply different from the naive Fermi-Dirac occupation, but becomes instead the non-trivial Fermi-Dirac
2595
+ staircase discussed in the main text, even to the leading order |Eω|2 in the driving monochromatic field. Crucially
2596
+ the resulting occupation function cannot be expressed as a function of the Floquet energy alone [see Fig. 1, Eq. (54),
2597
+ and Eq. (62) of the main text]. Notice that in order to have a unique and well defined steady state at late times, we
2598
+ must necessarily view the relaxation rate Γ as being arbitrarily small but not strictly zero. Therefore, the notion of
2599
+ the ideal occupation in the steady state has to be necessarily interpreted as the limit of Γ → 0 of the occupation of
2600
+ systems with a finite Γ. This is because systems with strictly zero relaxation rate (Γ = 0) do not have a way to erase
2601
+ the memory of their initial conditions and therefore their steady state in the presence of the monochromatic light is
2602
+ not uniquely defined.
2603
+ We have demonstrated rigorously that at least for an ideal fermionic bath the occupation of states in the limit of
2604
+ Γ → 0 is not f0(¯ϵk) as Refs. [45, 46, 48–50] presumed. We would like to emphasize that while the fermionic bath
2605
+ might appear to be a somewhat artificial approximation to the true mechanisms of relaxation for certain realistic
2606
+ physical situations, it behaves as an ideal thermal bath in the limit Γ → 0. In particular, the particle number becomes
2607
+ effectively conserved in such limit since the self-consistent occupations at each momentum become a time independent
2608
+ function as we have shown. We have in particular demonstrated that in equilibrium this bath leads to the expected
2609
+ Fermi-Dirac occupation of the system.
2610
+ More generally speaking, in equilibrium one expects a universality of all
2611
+ intensive thermodynamic physical properties of the system of interest for a large class of baths regardless of their
2612
+ details, which essentially defines the class of “ideal thermodynamic baths”. However, how this universality carries over
2613
+ to non-equilibrium settings is still unclear to us. Therefore whether other baths or other relaxation mechanisms such
2614
+ as coupling to phonons, impurities or self-thermalization via electron-electron interactions lead to a similar stair-case
2615
+ occupation to the one we have found in the limit of vanishing relaxation rates Γ → 0, remains an interesting open
2616
+ problem. We note however that none of the aforementioned Refs. [45, 46, 48–50] has provided a rigorous and controlled
2617
+ derivation of the self-consistent occupation of Floquet bands based on any microscopically explicit mechanism of
2618
+ relaxation, like the one we have provided. Therefore we do not see any rigorous substance to their claim that the
2619
+ occupation is f0(¯ϵk) even for other microscopic relaxation mechanisms such as phonons. Moreover, it has become
2620
+ abundantly clear in the study of thermalization of Floquet systems in recent years that the self-consistent occupation
2621
+ of Floquet bands coupled to baths that are also bosonic differs clearly from the naive Fermi-Dirac distribution of the
2622
+ Floquet bands f0(¯ϵk) [36–41].
2623
+
IdAyT4oBgHgl3EQf5vqw/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
IdFAT4oBgHgl3EQfuh5k/content/2301.08670v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:eb13ad20ace408aab77aaf74602f29dedac9d11fad1995b6a3f81f0d9b722c38
3
+ size 779091
IdFAT4oBgHgl3EQfuh5k/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bcf5854cffbf5c4cba6b53dc69628d59032fe33821e06fc11273b2acfec30524
3
+ size 3801133
IdFAT4oBgHgl3EQfuh5k/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5cb8915c64a9b37b670bcce705f8951cd0b9e081196b977134b00a5fcb5408db
3
+ size 160602
JNAzT4oBgHgl3EQfx_7e/content/tmp_files/2301.01748v1.pdf.txt ADDED
@@ -0,0 +1,1834 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Cost-Sensitive Stacking: an Empirical Evaluation
2
+ Natalie Lawrance* ID(�)1, Marie-Anne Guerry ID 1, and George Petrides ID 2
3
+ 1Department of Business Technology and Operations, Vrije Universiteit Brussel (VUB), Brussels, Belgium
4
+ 2Department of Mathematics and Statistics, University of Cyprus, Nicosia, Cyprus
5
+ Abstract
6
+ Many real-world classification problems are cost-sensitive in nature, such that the misclassification costs vary be-
7
+ tween data instances. Cost-sensitive learning adapts classification algorithms to account for differences in misclassifica-
8
+ tion costs. Stacking is an ensemble method that uses predictions from several classifiers as the training data for another
9
+ classifier, which in turn makes the final classification decision.
10
+ While a large body of empirical work exists where stacking is applied in various domains, very few of these works
11
+ take the misclassification costs into account. In fact, there is no consensus in the literature as to what cost-sensitive
12
+ stacking is. In this paper we perform extensive experiments with the aim of establishing what the appropriate setup
13
+ for a cost-sensitive stacking ensemble is. Our experiments, conducted on twelve datasets from a number of application
14
+ domains, using real, instance-dependent misclassification costs, show that for best performance, both levels of stacking
15
+ require cost-sensitive classification decision.
16
+ Keywords
17
+ Cost-sensitive learning, classification, ensemble learning, stacked generalization, stacking, blending
18
+ 1
19
+ Introduction
20
+ Cost-sensitive learning is relevant in many real-world classification problems, where different misclassification errors incur
21
+ different costs. A prominent example is the field of medicine, where misdiagnosing an ill patient for a healthy one (a false
22
+ negative) entails delayed treatment and potentially life-threatening consequences, while an error in the opposite direction (a
23
+ false positive) would incur unnecessary medical examination costs and stress for the patient. Cost-sensitive classifiers can
24
+ account for the differences in costs not only between different classes, but also between data instances, making instance-
25
+ dependent cost-sensitive classification decisions.
26
+ Many cost-sensitive classifiers employ ensemble methods, which combine predictions from several classifiers to obtain
27
+ better generalisation performance. Superiority of ensembles over individual classifiers is very well known and has been
28
+ extensively studied ([8, 37]). Most cost-sensitive classification ensembles are homogeneous in nature, meaning their
29
+ components are instantiated using the same learning algorithm.
30
+ Stacked generalization or stacking [31] is a well known and widely applied heterogeneous ensemble, where the pre-
31
+ dictions of classifiers produced by different learning algorithms (the base-learners) are used as training inputs to another
32
+ learning algorithm (the meta-learner) to produce a meta classifier, which makes the final classification decision. In the
33
+ literature, the base- and meta- levels of stacking are also referred to level-0 and level-1.
34
+ Homogeneous cost-sensitive ensembles such as cost-sensitive boosting and bagging are widely studied and have been
35
+ shown very successful [25]. Examples of cost-sensitive stacking, on the other hand, are scarce and unsystematic, represent-
36
+ ing for the most part applications to single domains, where the classifiers are trained on synthetic, class-dependent costs
37
+ and are evaluated with cost-insensitive performance metrics. For a discussion on the importance of real costs for a proper
38
+ evaluation see the work by [25]. In fact, there is currently no consensus as to how a cost-sensitive stacking ensemble is to
39
+ be composed and at what stage (level-0 or level-1) cost-sensitive decision-making should be used. This can be clearly seen
40
+ in Table 1, which gives an overview of existing cost-sensitive stacking literature. Stacking is typically made cost-sensitive
41
+ simply through the application of a cost-sensitive classifier either at level-0 (CS-CiS), level-1 (CiS-CS) or at both levels of
42
+ *Email: natalie.lawrance@vub.be
43
+ 1
44
+ arXiv:2301.01748v1 [cs.LG] 4 Jan 2023
45
+
46
+ the the ensemble (CS-CS), resulting in a total of three possible stacking setups. To the best of our knowledge, no compari-
47
+ son of all three setups on multiple domains with appropriate evaluation exists in the literature. Previous related work used
48
+ arbitrary artificial costs in model training and evaluated cost-sensitive models using performance metrics that are either
49
+ cost-invariant or that focus on the performance of only the positive class.
50
+ In this work we aim to fill this gap by providing a thorough comparison of various cost-sensitive stacking ensembles on
51
+ multiple domains using real, instance-dependent costs and performance metrics appropriate for cost-sensitive problems.
52
+ 1.1
53
+ Our contributions
54
+ • The main contribution of this work is a rigorous empirical comparison of different setups of cost-sensitive stacking
55
+ ensembles over multiple domains. We evaluate using appropriate performance metrics and attempt to establish best
56
+ practice.
57
+ • Secondly, we introduce a novel cost-sensitive classifier combination method, inspired by MEC-voting and stacking,
58
+ which we call MEC-weighted-stacking.
59
+ • Finally, we present a list of publicly available datasets with clearly defined instance-dependent misclassification
60
+ costs. The costs are based either on the literature, or are defined by us based on both the literature and expert
61
+ knowledge of the data providers. We also define instance-dependent costs for a well known ‘credit-g’ dataset from
62
+ the UCI Machine learning repository, for which only class-dependent costs were available to date.
63
+ 1.2
64
+ Outline
65
+ The remainder of the paper is structured as follows. Section 2 presents an overview of the relevant literature. MEC-
66
+ weighted stacking is introduced in Section 3. Our hypotheses to be tested, the experimental setup and the datasets used in
67
+ the study are discussed in Section 4. Section 5 details the results of our extensive experiments, while the main outcomes
68
+ and limitations are discussed in Section 6. Section 7 concludes the paper.
69
+ 2
70
+ Related work
71
+ While stacking has been widely used in machine learning applications (the interested reader is invited to peruse the survey
72
+ on stacking literature by [27]), few works are dedicated to the study of cost-sensitive stacking.
73
+ We identified in the literature three different cost-sensitive stacking setups: CiS-CS, CS-CiS or CS-CS, where the
74
+ ensemble was made cost-sensitive simply through the application of a cost-sensitive classifier either at level-0, level-1
75
+ or at both levels of the ensemble. In most cases, the method used to make the classification cost-sensitive is the direct
76
+ cost-sensitive decision as introduced by [35], also called DMECC [25].
77
+ One of the first papers to discuss stacking in a cost-sensitive context was [6]. The authors propose cost-insensitive
78
+ level-0 and cost-sensitive level-1 stacking setup (CiS-CS setup), which was compared to a number of different classifier
79
+ combinations schemes on 16 classification problems. The misclassification costs they used were artificially generated by
80
+ randomly and uniformally sampling costs from on the interval [1,10]. Several other studies followed adopting the same
81
+ CiS-CS stacking setup, however none of the studies explicitly reasoned or justified this choice.
82
+ Several more papers demonstrated similar examples of multiple-domain studies of CiS-CS stacking with arbitrary costs
83
+ ( [7, 33, 34]). These mainly differ in the type and the number of algorithms that are employed in the ensemble. We note
84
+ that all of them used cost-insensitive metrics for classifier evaluation.
85
+ [19] considers a stacking setup, where level-0 classifiers were cost-sensitive while level-1 was cost-insensitive (CS-
86
+ CiS setup). The misclassification costs were assumed to be equal to the inverse of the class priors. This approach is very
87
+ commonly adopted in the absence of information about real misclassification costs. It is, however, not appropriate, see [25]
88
+ for a discussion. The resulting stacking classifier was compared to known ensemble methods using classification accuracy,
89
+ a metric that by design assumes equal misclassification costs.
90
+ Most examples of stacking use different learning algorithms in level-0, however in his original work Wolpert suggested
91
+ that this must not be the case and the technique can also be applied when a single algorithm is considered. [5] propose a
92
+ cost-sensitive variant of bag-stacking, a method originally proposed by [29], using bagged cost-sensitive decision trees in
93
+ level-0 and using cost-sensitive logistic regression in level-1, thus implicitly proposing a CS-CS stacking setup. To the best
94
+ 2
95
+
96
+ Table 1: Summary of cost-sensitive stacking literature
97
+ Publication
98
+ Stacking
99
+ Level-0
100
+ Level-1
101
+ Real
102
+ Costs
103
+ CS
104
+ setup
105
+ algorithm
106
+ algorithm
107
+ costs
108
+ type
109
+ evaluation
110
+ [6]
111
+ CiS-CS
112
+ DT, KNN, NB
113
+ LR
114
+ c
115
+
116
+ [19]
117
+ CS-CiS
118
+ DT, KNN, NB
119
+ MT
120
+ c
121
+ [5]
122
+ CS-CS
123
+ DT
124
+ LR
125
+
126
+ i
127
+
128
+ [34]
129
+ CiS-CS
130
+ DT, KNN, NB
131
+ LR
132
+ c
133
+ [7]
134
+ CiS-CS
135
+ ExT, GBDT, LDA, LR, RF
136
+ LR
137
+ c
138
+ [33]
139
+ CiS-CS
140
+ DT, KNN, RF, SVM
141
+ DT, KNN, NB, SVM
142
+ c
143
+ [13]
144
+ CiS-CS, CS-CiS, CS-CS
145
+ DT, NB, KNN, SVM
146
+ LR, ExT
147
+ c
148
+
149
+ this paper
150
+ CiS-CS, CS-CiS, CS-CS
151
+ DT, KNN, LR, SVM
152
+ Adab, DT, KNN, LR, RF, SVM
153
+
154
+ i
155
+
156
+ Costs type:
157
+ c: class-dependent, i: instance-dependent
158
+ Algorithms:
159
+ Adab: Adaboost, DT:decision tree, ExT: extremely randomised trees, GBDT: gradient boosted trees, KNN: k-nearest neighbour,
160
+ LDA: linear discriminant, LR: logistic regression, MT: Meta Decision Trees, NB: naive bayes, RF: random forest, SVM: support vector machines
161
+ of our knowledge, this study is the only example where real instance-dependent costs were used in model training. Models
162
+ were evaluated using a cost-sensitive metric called the savings score, proposed in [2].
163
+ The only study to date that considers all three different cost-sensitive stacking setups is one by [13] on the application
164
+ domain of software defect prediction. The misclassification costs were selected based on a literature however the authors
165
+ emphasised that they treated costs as one of the hyperparameters of the classifier, which, we must note, is incorrect, as was
166
+ previously discussed in [15]. The experiments are run on 15 datasets using the same class-dependent cost matrix on all.
167
+ Balanced error-based metrics were used for evaluation together with cost-based evaluation metrics.
168
+ Identifying real misclassification costs is a complex task, which for many applications may prove too difficult to de-
169
+ fine and compute. Most studies resort to artificially generated misclassification costs (see [25] for a discussion on why
170
+ this is inappropriate) and error-based evaluation metrics are typically employed to assess generalisation performance of
171
+ cost-sensitive stacking. Examples of metrics used include the AUC, the arithmetic or geometric mean of class-specific
172
+ accuracies, the F-measure, and the Matthew’s correlation coefficient (MCC). All of these metrics assume equal misclassi-
173
+ fication costs, and the F-measure does not incorporate the performance on the negative class, so using these metrics is not
174
+ compatible with cost-sensitive learning [17].
175
+ One of the challenges of stacking is the choice of the learning algorithms for the ensemble. Earlier studies proposed to
176
+ use linear regression to combine level-0 inputs [30], however Wolpert does not impose any particular restrictions on which
177
+ algorithm to use in level-1, and he believed that his famous ‘No Free Lunch Theorem’ [32] applies to the meta-learner as
178
+ well. For the overview of which learning algorithms were used in cost-sensitive stacking ensembles to date we refer our
179
+ reader to the summary Table 1.
180
+ 3
181
+ MEC-weighted stacked generalization
182
+ In the typical supervised classification framework, a learning algorithm A is presented with a set S of data instances
183
+ (xi,yi), each describing some object i. We call xi a feature vector, and yi the class label of that object, drawn from a finite,
184
+ discrete set of classes {1,...,K}. In this paper we will consider the binary classification problem, where yi ∈ {0,1}. The
185
+ learning algorithm A, given S as input, after a process called training, produces a classifier C, whose task is to predict the
186
+ correict class label ˆyC(xj) ∈ {0,1} for a previously unseen feature vector xj.
187
+ Training any number L of learning algorithms on the same set of data instances S , we obtain a set of classifiers
188
+ C = {C1 ...CL}, and for each feature vector xi the corresponding set of predictions
189
+ ˆ
190
+ Y (xi) = {ˆyC1(xi),..., ˆyCL(xi)}. C is
191
+ called an ensemble of classifiers if the predictions from
192
+ ˆ
193
+ Y (xi) are combined, in some way, into a single prediction of the
194
+ class label for the data instance xi.
195
+ Stacking differs from other classifier ensembles in that the predictions from the set
196
+ ˆ
197
+ Y (xi) are combined with the
198
+ original class label yi to form the set Smeta = {(ˆyC1(xi),..., ˆyCL(xi)),yi} of meta level data instances subsequently used in
199
+ another round of algorithm training to produce a new classifier, which is used to obtain the final predictions.
200
+ The novel method we propose in this paper is inspired by the cost-sensitive weights for model votes paradigm described
201
+ in [25], and consequently called MEC-weighted stacking. To each classifier C, we can assign a weight wC based on that
202
+ classifier’s cost-performance on the validation set: wC = f(ε), where ε is the sum of the misclassification costs of all data
203
+ 3
204
+
205
+ Table 2: Characteristics of the datasets used in our experiments
206
+ Application
207
+ Dataset alias
208
+ # instances
209
+ # Attr
210
+ % positives
211
+ Instance-dependent
212
+ domain
213
+ costs source
214
+ 1
215
+ Bankruptcy
216
+ bankruptcy (private)
217
+ 404999
218
+ 221
219
+ 3.31
220
+ this publication
221
+ 2
222
+ Churn
223
+ churn kgl (Kaggle*)
224
+ 7043
225
+ 21
226
+ 26.54
227
+ [25]
228
+ 3
229
+ Churn
230
+ churn AB [3]
231
+ 9410
232
+ 45
233
+ 4.83
234
+ [3]
235
+ 4
236
+ Credit risk
237
+ credit kgl (Kaggle*)
238
+ 112915
239
+ 15
240
+ 11.70
241
+ [2]
242
+ 5
243
+ Credit risk
244
+ credit de uci [12]
245
+ 1000
246
+ 20
247
+ 30.00
248
+ this publication
249
+ 6
250
+ Credit risk
251
+ credit kdd09 [28]
252
+ 38938
253
+ 39
254
+ 19.89
255
+ [2]
256
+ 7
257
+ Credit risk
258
+ credit ro vub [24]
259
+ 18918
260
+ 24
261
+ 16.95
262
+ [24]
263
+ 8
264
+ Direct marketing
265
+ dm pt uci [12, 22]
266
+ 45211
267
+ 17
268
+ 11.27
269
+ [4]
270
+ 9
271
+ Direct marketing
272
+ dm kdd98 [12]
273
+ 95412 (train)
274
+ 479
275
+ 5.08
276
+ [25]
277
+ 96367 (test)
278
+ 5.06
279
+ 10
280
+ Fraud detection
281
+ fraud ulb kgl [21]
282
+ 284807
283
+ 31
284
+ 0.17
285
+ [25]
286
+ 11
287
+ Fraud detection
288
+ fraud ieee kgl (Kaggle*)
289
+ 590540
290
+ 432
291
+ 3.50
292
+ [25]
293
+ 12
294
+ HR analytics
295
+ absenteeism be (private)
296
+ 36853 (train)
297
+ 71
298
+ 14.50
299
+ [20]
300
+ 35884 (test)
301
+ 10.76
302
+ * Kaggle: https://www.kaggle.com/
303
+ instances incorrectly classified by C on a validation set and f(ε) is a transformation function, which for example can take
304
+ one of the following forms: f(ε) = ln((1−ε)/ε), f(ε) = 1−ε, f(ε) = exp((1−ε)/ε), and f(ε) = ((1−ε)/ε)2.
305
+ The general stacking procedure is thus modified with the additional step of collecting the MEC-weights for each of
306
+ the predictions from the set ˆ
307
+ Y (xi), yielding the weighted set of predictions ˆ
308
+ YMEC(xi) = {(wC1 ˆyC1(xi),...,wCL ˆyCL(xi)),yi},
309
+ which is used in meta classifier training instead of ˆ
310
+ Y (xi).
311
+ 4
312
+ Experimental setup
313
+ 4.1
314
+ Data
315
+ In this study we use a collection of 10 publicly available datasets and 2 private datasets, for which misclassification costs
316
+ have either already been defined or will be defined here. This collection of datasets represents a number of application
317
+ domains: credit scoring, customer churn prediction, direct marketing, credit card fraud detection, and HR analytics.
318
+ 4.2
319
+ Misclassification costs
320
+ Table 2 presents the references both to the datasets and to relevant publications where the instance-dependent misclassifi-
321
+ cation costs for a given domain were introduced. Most of the datasets are large, the number of instances ranging between
322
+ 1000 and almost 600000. The number of input features ranges from 15 to 479. All of these datasets demonstrate a large
323
+ degree of class imbalance, where the percentage of positives reaches at most 30%, and in dataset fraud ulb kgl less than
324
+ 1%.
325
+ In this work we propose instance-dependent costs for these two datasets, for which no costs were previously defined.
326
+ The German credit dataset is well known and is referred to as credit de uci in Table 2. Only class-dependent costs
327
+ were available for this data set, where the prediction task is to identify customers that will default on their loan. We define
328
+ instance-dependent costs using the conceptual framework proposed by [2]. For any data instance i, the cost of a false
329
+ negative Ci
330
+ FN is defined as loss given default and constitutes 75% of the credit line, while the cost of a false positive Ci
331
+ FP is
332
+ the loss of the potential profit from rejecting a good customer, plus the sum of the average expected loss and the average
333
+ expected profit estimated on the training sample. We define profits as simply the interests earned on the credit line in the
334
+ current year. The profits are calculated using historic interest rates for the year 2000 in Germany, which we apply randomly
335
+ and uniformly to the whole sample.
336
+ The bankruptcy dataset was provided by the credit risk department of a European utilities-provider, who was interested
337
+ 4
338
+
339
+ in predicting the risk of corporate bankruptcy for new customers. With minor modifications, it readily transfers to the same
340
+ credit risk model described above. Here the credit line is equivalent 90 days of utilities usage by the customer, which, in
341
+ case of default, the provider loses in full, so Ci
342
+ FP equals the credit amount. The profit margins were provided to us and
343
+ are calculated per customer based on the assumption of a 12-month contract. Thus, the Ci
344
+ FP then equals the annual profit
345
+ margins for the potentially good customer plus the expected average loss and expected average profit calculated on the
346
+ given sample.
347
+ 4.2.1
348
+ Data preprocessing
349
+ We take care to employ the same preprocessing steps for each of the datasets in the sample, as recommended by the works
350
+ that first published them.
351
+ In addition to that, we apply the following preprocessing steps to all datasets. All numeric variables are rescaled
352
+ using the quantile statistics, which are robust to outliers. Missing values of numeric variables are imputed with sample
353
+ median, and of categorical variables are encoded as a separate category. All categorical variables are transformed using
354
+ weight-of-evidence coding [1].
355
+ 4.2.2
356
+ Data partitioning
357
+ The classifier performance estimates are obtained by means of repeated stratified k-fold cross-validation. The 5×2 cross-
358
+ validation suggested by [10] is used to train and evaluate stacking ensembles. This resampling is repeated 5 times using
359
+ different random seeds, and the results are averaged across folds and across iterations. Large datasets with more than
360
+ 100000 observations, to keep training times manageable, were split into five disjoint subsets, uniformly at random.
361
+ We note that two datasets in our sample are provided with a separate test set, used to evaluate model performance. In
362
+ this case, for fairness of comparison, we perform the split into folds on each of the training and test datasets using the
363
+ same seed, we then proceed using the training partition of the training set and the test partition of the test set. The training
364
+ partition of the test set remains unused in evaluation. When training and test data sets contain the same observations at
365
+ different time periods (e.g. in bankruptcy prediction) we ensure that training and test datasets are disjoint and do not contain
366
+ overlapping data instances.
367
+ 4.3
368
+ Learning algorithms
369
+ The choice of the algorithms for the base- and meta-level of stacking remains one of the challenges of stacked generaliza-
370
+ tion. To the best of our knowledge, no study exists that demonstrates the necessity to use a specific algorithm combination
371
+ in either base- or meta-level of stacking. The main requirement for the base classifiers of any ensemble is that they are
372
+ sufficiently accurate (meaning they predict better than a random guess) and sufficiently diverse (meaning their errors are
373
+ uncorrelated) [11]. In a heterogeneous ensemble, where the decisions of different learning algorithms are combined, the
374
+ number of base-learners need not be large [26]. All algorithms below have previously been described and discussed in
375
+ detail in a number of machine learning textbooks, for example [16], so we refrain from repeating these descriptions here.
376
+ 4.3.1
377
+ Base-learners
378
+ The base learners in our experiments are four well known classification algorithms, which are: CART Decision Tree
379
+ (DT), K-Nearest Neighbors (KNN), Support Vector Machines (SVM) and Logistic Regression (LR). Unlike [7] and [33]
380
+ before us, we choose not to use ensembles such as Random Forest or Extremely Randomised Trees in the base level of
381
+ stacking. The reasons for this are two-fold. Firstly, ensembles in general, and stacking in particular are typically built
382
+ on weak base-learners, which these very powerful models, which are themselves ensembles, certainly are not. Secondly
383
+ these methods are based on decision trees and their errors will be correlated with DT. In our choice we also considered
384
+ the recommendations of [8], one of the largest empirical studies known to date comparing algorithm performance on
385
+ 121 datasets. Their results on binary problems (55 UCI datasets) demonstrate that Random Forest, SVM, Bagging and
386
+ Decision Trees have the highest probability of obtaining more than 95% of accuracy, while classifiers of the Naive Bayes
387
+ (NB) family are not competitive in comparison. We therefore do not include NB in our experiments, unlike some previous
388
+ studies in cost-sensitive stacking.
389
+ 5
390
+
391
+ 4.3.2
392
+ Meta-learners
393
+ The choice of the meta-learner constitutes a challenge as well, as was called ’the black art’ by the original author of stacked
394
+ generalization [31]. To keep the scale of our experiments manageable and to allow for statistical comparison between
395
+ stacking and base classifiers, we use the same four algorithms that were used in the level-0 of stacking. In addition to that
396
+ we also use two homogeneous ensemble methods that, according to [8], perform well on most problems, namely Adaboost
397
+ (Ada) and Random Forest (RF).
398
+ 4.3.3
399
+ Cost-sensitive learners
400
+ While many variants of cost-sensitive learning algorithms exist that can incorporate the misclassification costs during
401
+ classifier training [25], in this study we are not interested in comparing cost-sensitive learning algorithms, but in ways of
402
+ combining cost-sensitive and cost-insensitive learners in a single ensemble. For our purposes it is important that the two
403
+ classifiers we compare are different in all but one thing, that is the composition of the ensemble. We therefore choose
404
+ to turn known cost-insensitive classifiers cost sensitive by applying a cost-sensitive threshold adjustment method called
405
+ DMECC [25]. In this method, each data instance is classified according to its individual cost-sensitive decision threshold,
406
+ which is based on the ratio of misclassification costs of that particular data instance. The threshold is calculated as follows:
407
+ T i
408
+ cs =
409
+ Ci
410
+ FP−Ci
411
+ TN
412
+ Ci
413
+ FP−Ci
414
+ TN+Ci
415
+ FN−Ci
416
+ TP , where Ci
417
+ TN and Ci
418
+ TP refer to the costs of correct classification, and Ci
419
+ FN and Ci
420
+ FP refer to the
421
+ misclassification costs of the positive and negative data instances respectively. A given record is classified as positive
422
+ when its estimated probability of being positive exceeds its individual cost-sensitive threshold T i
423
+ cs [35].
424
+ Since some learning algorithms (such as DT or SVM) are known not to produce reliable probability estimates, we
425
+ applied isotonic calibration [36] to all base-learners.
426
+ 4.3.4
427
+ Cost-sensitive stacking
428
+ To the best of our knowledge no definition exists of what constitutes cost-sensitive stacking. Based on the insights from
429
+ the literature earlier discussed in Section 2, we see three main possibilities of introducing cost-sensitivity into the ensemble
430
+ structure.
431
+ 1. Level-0 classifiers are cost-sensitive, level-1 classifiers are cost-insensitive.
432
+ 2. Level-0 classifiers are cost-insensitive, level-1 classifiers are cost-sensitive.
433
+ 3. Both level-0 and level-1 classifiers are cost-sensitive.
434
+ We consider 4 functional forms for the MEC-weights as introduced in Section 3, which resulted in a total of 15 stacking
435
+ setups to be compared. The complete list of ensemble compositions is presented in Table 3.
436
+ MEC-weighted stacking renders the level-1 classifier cost sensitive through manipulation of the training data in a
437
+ cost-sensitive way by applying MEC-weights to the training data of the level-1 classifier. We consider it an alternative to
438
+ obtaining an ensemble where both training levels are cost-sensitive, which is the third stacking setup stated above.
439
+ 4.3.5
440
+ Software used
441
+ All of our experiments were performed using the Python programming language (version 3.8). Cost-insensitive algorithm
442
+ implementations came from the scikit-learn (version 1.1.1) Python library [23], while the cost-sensitive implementations
443
+ are our own.
444
+ 4.4
445
+ Evaluation
446
+ 4.4.1
447
+ Evaluation metrics
448
+ Contrary to previous studies in cost-sensitive stacking, we would like to emphasise the importance of using appropriate
449
+ evaluation metrics for cost-sensitive classifiers. Most authors use traditional evaluation metrics such as ROC AUC, Preci-
450
+ sion or F1 metric. ROC AUC is known to be cost-invariant, since it is a measure that aggregates classifier performance over
451
+ all possible class-dependent thresholds, thus implicitly averaging performance over multiple class-dependent costs, which
452
+ 6
453
+
454
+ Table 3: The complete list of stacking setups compared in our study.
455
+ Stacking setup
456
+ Level-0
457
+ Level-1
458
+ Level-1
459
+ alias
460
+ algorithm type
461
+ input weights f(ε)
462
+ algorithm type
463
+ 1
464
+ type-1
465
+ CS
466
+ 1
467
+ CiS
468
+ 2
469
+ type-1 exp
470
+ CS
471
+ exp((1−ε)/ε)
472
+ CiS
473
+ 3
474
+ type-1 ln
475
+ CS
476
+ ln((1−ε)/ε)
477
+ CiS
478
+ 4
479
+ type-1 sq
480
+ CS
481
+ ((1−ε)/ε)2
482
+ CiS
483
+ 5
484
+ type-1 acc
485
+ CS
486
+ 1−ε
487
+ CiS
488
+ 6
489
+ type-2
490
+ CiS
491
+ 1
492
+ CS
493
+ 7
494
+ type-2 exp
495
+ CiS
496
+ exp((1−ε)/ε)
497
+ CS
498
+ 8
499
+ type-2 ln
500
+ CiS
501
+ ln((1−ε)/ε)
502
+ CS
503
+ 9
504
+ type-2 sq
505
+ CiS
506
+ ((1−ε)/ε)2
507
+ CS
508
+ 10
509
+ type-2 acc
510
+ CiS
511
+ 1−ε
512
+ CS
513
+ 11
514
+ type-3
515
+ CS
516
+ 1
517
+ CS
518
+ 12
519
+ type-3 exp
520
+ CS
521
+ exp((1−ε)/ε)
522
+ CS
523
+ 13
524
+ type-3 ln
525
+ CS
526
+ ln((1−ε)/ε)
527
+ CS
528
+ 14
529
+ type-3 sq
530
+ CS
531
+ ((1−ε)/ε)2
532
+ CS
533
+ 15
534
+ type-3 acc
535
+ CS
536
+ 1−ε
537
+ CS
538
+ is not appropriate. Other error-based metrics typically assume equal class-dependent costs, which, again, is not appropri-
539
+ ate, when instance-dependent costs are known at estimation time. Cost-sensitive learning aims to adapt the classification
540
+ decision of a learning algorithm to the differences between misclassification costs assigned to each of the classes. It is
541
+ therefore important that the evaluation metrics used to assess the performance of cost-sensitive classifiers is also adapted
542
+ to account for the difference in misclassification costs. The typical evaluation metric used in cost-sensitive literature is the
543
+ total misclassification cost [14], that simply adds up the errors weighted with their individual misclassification costs, as
544
+ defined on the test set. Another option is to normalise the total misclassification cost over some budget constraint, which
545
+ will depend on the application domain. A more general way to do this is to use the savings score proposed in [2], where
546
+ the total misclassification costs are normalised with the cost of either misclassifying all positives as negatives, or misclas-
547
+ sifying all negatives as positives, which ever is smallest. This gives a metric on the interval between 0 and 1, facilitating
548
+ comparison across different datasets, when necessary.
549
+ Since the majority of comparisons in our study is performed based on average ranks, it requires no commensurability
550
+ of the evaluation metrics, so the models are ranked according to their total misclassification costs, which allows for more
551
+ precise outcome.
552
+ 4.4.2
553
+ Multiple classifier comparison
554
+ In order to compare multiple classifiers on multiple datasets, we use the standard approach of the combination of the
555
+ Friedman omnibus test and post-hoc Nemenyi test [18]. The Friedman test is conducted under the null-hypothesis that
556
+ all algorithms in comparison are equivalent in performance. If this null-hypothesis is rejected, the post-hoc test can be
557
+ performed to identify pairs of classifiers whose performance is significantly different, which is measured using the critical
558
+ difference statistic, and can be visualised using the critical differences diagrams [9]. The non-parametric tests, such as the
559
+ Friedman test, are preferred in case where the number of datasets in comparison is less than 30, which is the number of
560
+ datasets necessary to satisfy the normality assumptions of parametric statistical tests, such as ANOVA [9]. The post-hoc
561
+ test is known to be of low power, not rejecting the null even if the null was rejected for the Friedman test. In this case,
562
+ we additionally apply Wilcoxon signed-ranks test, as appropriate, which is used for pairwise comparisons of classifiers on
563
+ multiple datasets. This test ranks differences in performances of a given pair of classifiers, under the null hypothesis that
564
+ the median difference in ranks is zero. It therefore allows establishing whether the observed differences in performance
565
+ between two classifiers are significant. It is considered more powerful than its parametric equivalent, the paired t-test when
566
+ the assumptions of the latter cannot be guaranteed. It is also considered more powerful than the Sign test, which counts
567
+ the number of wins, losses and ties [9].
568
+ 7
569
+
570
+ Ada
571
+ DT
572
+ KNN
573
+ LR
574
+ RF
575
+ SVM
576
+ Level-1 algorithm
577
+ type-1
578
+ type-1_acc
579
+ type-1_exp
580
+ type-1_ln
581
+ type-1_sq
582
+ type-2
583
+ type-2_acc
584
+ type-2_exp
585
+ type-2_ln
586
+ type-2_sq
587
+ type-3
588
+ type-3_acc
589
+ type-3_exp
590
+ type-3_ln
591
+ type-3_sq
592
+ Stacking setup
593
+ 75.10
594
+ 72.30
595
+ 60.70
596
+ 74.60
597
+ 71.30
598
+ 72.10
599
+ 72.40
600
+ 69.10
601
+ 61.20
602
+ 74.60
603
+ 70.10
604
+ 72.70
605
+ 71.90
606
+ 71.30
607
+ 57.50
608
+ 70.70
609
+ 71.60
610
+ 73.50
611
+ 71.50
612
+ 70.70
613
+ 59.30
614
+ 70.60
615
+ 70.40
616
+ 72.30
617
+ 70.70
618
+ 70.50
619
+ 59.20
620
+ 69.00
621
+ 70.80
622
+ 72.30
623
+ 42.90
624
+ 45.00
625
+ 53.30
626
+ 44.40
627
+ 44.50
628
+ 47.60
629
+ 43.60
630
+ 45.30
631
+ 52.70
632
+ 47.20
633
+ 44.50
634
+ 46.10
635
+ 45.10
636
+ 46.00
637
+ 51.90
638
+ 42.40
639
+ 46.30
640
+ 49.50
641
+ 46.50
642
+ 49.20
643
+ 54.00
644
+ 46.20
645
+ 43.40
646
+ 53.70
647
+ 45.20
648
+ 44.80
649
+ 51.90
650
+ 45.40
651
+ 45.40
652
+ 51.30
653
+ 8.00
654
+ 6.00
655
+ 31.00
656
+ 7.00
657
+ 5.90
658
+ 29.20
659
+ 13.40
660
+ 16.70
661
+ 30.90
662
+ 9.00
663
+ 14.60
664
+ 34.30
665
+ 16.60
666
+ 13.60
667
+ 30.40
668
+ 10.40
669
+ 14.90
670
+ 49.40
671
+ 14.30
672
+ 14.30
673
+ 30.30
674
+ 9.60
675
+ 12.30
676
+ 37.50
677
+ 12.80
678
+ 13.80
679
+ 29.90
680
+ 8.00
681
+ 14.00
682
+ 41.60
683
+ 20
684
+ 40
685
+ 60
686
+ 80
687
+ Figure 1: Comparing all classifiers by average rank across 10 datasets. Lower numbers correspond to better rank.
688
+ 5
689
+ Experimental results
690
+ The purpose of our experiments is twofold. Firstly, we would like to compare the performance of the different cost-
691
+ sensitive stacking setups in order to determine which of them results in the lowest cost-loss and can be recommended to
692
+ practitioners. Secondly, we aim to empirically evaluate MEC-weighted stacking, which is a new cost-sensitive stacking
693
+ method we earlier described in Section 3.
694
+ Despite our best efforts, not all classifiers trained successfully on all 12 datasets. In particular, we were unable to
695
+ collect results for the MEC-weighted stacking where the weights were defined by the logarithmic function on the credit
696
+ scoring problem credit ro vub, and MEC-weighted stacking with exponential weights were missing on the fraud detection
697
+ dataset fraud ulb kgl. The full results for all 15 stacking setups are thus available on 10 datasets, instead of 12. Unweighted
698
+ stacking results, however, are available on all 12 datasets, which we briefly discuss, for completeness.
699
+ 5.1
700
+ Finding the best cost-senstive stacking setup
701
+ 5.1.1
702
+ Overall comparison
703
+ We begin with an overall comparison, where all classifiers are evaluated and ranked on each of the 10 datasets, and for each
704
+ of them an average rank is computed across all datasets. Figure 1 presents the average ranks for all stacking classifiers,
705
+ where the vertical axis shows the stacking setup and the horizontal axis shows the corresponding level-1 algorithm. The
706
+ comparison consists of a total of 90 classifiers (6 algorithms and 15 stacking setups). For brevity, we adopt the aliases for
707
+ each of the stacking setups earlier presented in Table 3.
708
+ We notice immediately that the ranking demonstrates clusters with stacking ensembles of type-3 ranking the best,
709
+ while type-1 ensembles rank the worst. We note that models built with KNN and SVM algorithms tend to rank lower
710
+ than decision tree based models or logistic regression. However, the general picture of type-3 stacking ranking the best
711
+ and type-1 ranking the worst remains unchanged for KNN and SVM, although the differences in ranks between the three
712
+ groups are smaller than for other algorithms.
713
+ Whether these differences in ranks are statistically significant will be discussed in the following subsection, where we
714
+ demonstrate the outcomes of statistical tests that compare the performance of various stacking classifiers across multiple
715
+ domains.
716
+ 5.1.2
717
+ Comparing unweighted stacking setups on 12 datasets
718
+ We begin by testing the null hypothesis that the three unweighted stacking setups show no difference in performance. The
719
+ comparison is performed for each of the six classification algorithms used as level-1 learners. The null hypothesis of the
720
+ 8
721
+
722
+ Table 4: The outcome of the Friedman multiple hypothesis testing.
723
+ Test statistic (χ(k−1))
724
+ Ada
725
+ DT
726
+ KNN
727
+ LR
728
+ RF
729
+ SVM
730
+ Unweighted (k = 3,n = 12)
731
+ 6.5
732
+ 32.69**
733
+ 32.59**
734
+ 32.79**
735
+ 32.69**
736
+ 32.59**
737
+ 32.59**
738
+ All (k = 15,n = 10)
739
+ 3.94
740
+ 132.44**
741
+ 132.09**
742
+ 132.35**
743
+ 132.29**
744
+ 132.09**
745
+ 132.09**
746
+ ** significant at 0.01 level
747
+ k: number of stacking setups in comparison, n: number of datasets in comparison
748
+ (a) Adaboost
749
+ (b) Decision Tree
750
+ (c) K-Nearest Neighbors
751
+ (d) Logistic Regression
752
+ (e) Random Forest
753
+ (f) Support-Vector Machine
754
+ Figure 2: Pairwise comparison of the three unweighted stacking setups on 12 datasets using Nemenyi test at 0.05 significance level.
755
+ Friedman test was rejected for all 6 comparisons, and the test statistics are presented in row 1 of Table 4.
756
+ We proceed with the post-hoc Nemenyi test to evaluate the alternative hypothesis that the performance of three stack-
757
+ ings setups is not equal. Figure 2 presents the results of the post-hoc tests at the 0.05 significance level. We find that type-3
758
+ stacking ranks best and is significantly different from both type-2 and type-1 for all algorithms except SVM, where the
759
+ difference is only significant for the comparison between type-3 and type-1, but no conclusions can be made regarding the
760
+ differences between ensembles of type-3 and type-2. Similarly, no conclusions can be made regarding the differences in
761
+ rank between type-2 and type-1 stacking ensembles.
762
+ Since the outcome of the post-hoc tests are ambiguous in the case of SVM, we also perform the Wilcoxon rank sum
763
+ test under the null hypothesis that the median of the paired differences is zero. For the comparison between type-3 and
764
+ type-2 unweighted stacking the null is rejected at 0.05 level.
765
+ We conclude from these tests that type-3 stacking performs significantly better than the other two stacking setups.
766
+ 5.1.3
767
+ Comparing all cost-sensitive stacking setups on 10 datasets
768
+ We proceed to compare all 15 stacking classifiers on 10 datasets. The outcome of the Friedman rank sum test can be found
769
+ in row 2 of Table 4. The null hypothesis of the Friedman test is rejected for every meta-learner at the 1% significance level,
770
+ so we conclude that the performance of all 15 models is not equal and proceed with the post-hoc test. Figure 3 shows the
771
+ outcome of the Nemenyi test at 0.05 significance level.
772
+ These are for the most part consistent with what we observed in Figure 1, where the classifiers tend to cluster by
773
+ stacking setup, type-3 being the leader, type-2 the second-best and type-1 ranking worst. Similar to what we observed
774
+ above with unweighted stacking, we can reject the null that type-3 stacking and its MEC-weighted variants are equal in
775
+ performance to type-1 stacking and variants. This holds for all algorithms except KNN and SVM. For stacking ensembles
776
+ with KNN in level-1 type-3 and type-3 acc classifiers are not significantly different from type-1 exp and type-1 sq, while
777
+ for SVM no significant differences were detected between type-3 exp and type-3 sq and other type-1 ensembles.
778
+ Since Nemenyi post hoc test is not powerful enough to establish whether the differences between the three stacking
779
+ setups are statistically significant, additional testing is required. From the outcomes of the post hoc test we observed that
780
+ type-3 stacking generally tends to rank highest, and is therefore of most interest to us. We therefore perform the Wilcoxon
781
+ rank sum test for all combinations of pairwise comparisons of stacking algorithms of type-3 vs type-1 and of type-3 vs
782
+ type-2 under the null hypothesis that the median of the rank differences between the two groups is equal to zero. The
783
+ complete tables with the obtained test statistics and p-values can be found in the Appendix. We find that the null could be
784
+ confidently rejected for all comparisons between type-3 and type-1 stacking ensembles, we refer the reader to the Table 7
785
+ 9
786
+
787
+ CD
788
+ 1
789
+ 2
790
+ 3
791
+ type-3
792
+ type-1
793
+ type-2CD
794
+ 1
795
+ 2
796
+ 3
797
+ type-3
798
+ type-1
799
+ type-2CD
800
+ H
801
+ 1
802
+ 2
803
+ 3
804
+ type-3
805
+ type-1
806
+ type-2CD
807
+ H
808
+ Y
809
+ 1
810
+ 2
811
+ 3
812
+ type-3
813
+ type-1
814
+ type-2CD
815
+ 1
816
+ 2
817
+ 3
818
+ type-3
819
+ type-1
820
+ type-2CD
821
+ H
822
+ 2
823
+ type-3
824
+ type-1
825
+ type-2(a) Adaboost
826
+ (b) Decision Tree
827
+ (c) K-Nearest Neighbors
828
+ (d) Logistic Regression
829
+ (e) Random Forest
830
+ (f) Support-Vector Machine
831
+ Figure 3: Comparing all stacking setups on 10 datasets using Nemenyi post-hoc test at 0.05 significance level.
832
+ in the Appendix for details.
833
+ As for the comparison of stacking type-3 with type-2, the only algorithm where the null could not be rejected was
834
+ SVM. We found that the differences between all type-3 MEC-weighted stacking variants and type-2 stacking ensembles
835
+ were not significant. However, type-3 unweighted stacking was significantly different from all type-2 stacking variants,
836
+ see Table A.2 for details.
837
+ We can therefore recommend type-3 stacking, where both levels of stacking are cost-sensitive, as the winner.
838
+ 5.2
839
+ Evaluating MEC-weighted stacking
840
+ Our next research question is whether within the same setup, MEC-weighted stacking offers any improvement over the
841
+ unweighted stacking. To determine whether there is a statistically significant difference in performance between the MEC-
842
+ weighted stacking models and their unweighted counterparts we perform pairwise comparison using Wilcoxon rank sum
843
+ test. The test statistics and corresponding p-values from the 72 comparisons are reported in Table 5. Values that are
844
+ significant at 5% level were highlighted with boldface text, weakly significant values at 10% level were highlighted with
845
+ italics. As previously, the results are reported per learning algorithm used as the level-1 classifier.
846
+ We find almost no significant differences in performance between unweighted and weighted stacking for setups of
847
+ type-1 and type-2 with rare exceptions. Surprisingly, only one comparison of stacking type-1, where the level-1 classi-
848
+ fier is cost-insensitive shows a significant difference in performance. Namely, the stacking setup type-1 sq learned with
849
+ Logistic Regression in level-1. Referring back to the average rankings reported in Figure 1 it happens to be the best
850
+ performing Logistic Regression stacking of type-1, so in this instance MEC-weighted stacking is significantly better than
851
+ its counterpart with equally weighted meta-inputs. It is, however, an exception, and we must conclude that introducing
852
+ cost-sensitivity through MEC-weights into level-1 of stacking has no positive impact on type-1 stacking performance.
853
+ Similar conclusions can be drawn for stacking of type-2, where base classifiers are cost-insensitive but the meta-
854
+ classifier is made cost-sensitive using DMECC. Here we observe only two statistically significant test outcomes, both of
855
+ which have lower average ranks than the unweighted stacking of type-2.
856
+ For the setup of type-3 where both level-0 and level-1 of stacking are made cost-sensitive using DMECC, the null
857
+ could not be rejected for AdaBoost, Logistic Regression and KNN. Most of the MEC-weighted ensembles built with
858
+ Decision Tree, Random Forest and SVM were significantly different from unweighted stacking of type-3. Looking at the
859
+ differences in the average ranks, however we note that unweighted stacking of type-3 ranks noticeably better than any of
860
+ the MEC-weighted models.
861
+ We must therefore conclude that MEC-weighted stacking does not offer a statistically significant improvement over
862
+ conventional stacking.
863
+ 10
864
+
865
+ CD
866
+ 12345
867
+ 6
868
+ 7
869
+ 89101112131415
870
+ type-3_sq
871
+ type-1_acc
872
+ type-3_In
873
+ type-1_in
874
+ type-3_exp
875
+ type-i
876
+ type-3_acc
877
+ type-1_exp
878
+ type-3
879
+ type-1_sq
880
+ type-2_exp
881
+ type-2_ln
882
+ type-2_sq
883
+ type-2
884
+ type-2_accCD
885
+ 234567
886
+ 8
887
+ 9101112131415
888
+ type-3
889
+ type-1_acc
890
+ type-3_acc
891
+ type-1
892
+ type-3_sq
893
+ type-1_exp
894
+ type-3_in
895
+ type-i_in
896
+ type-3_exp
897
+ type-1_sq
898
+ type-2_exp
899
+ type-2_sq
900
+ type-2
901
+ type-2_acc
902
+ type-2_InCD
903
+ 234567
904
+ 8
905
+ 9101112131415
906
+ type-3
907
+ type-1_exp
908
+ type-3_In
909
+ type-1
910
+ type-3_acc
911
+ type-1_sq
912
+ type-3_sq
913
+ type-i_in
914
+ type-3_exp
915
+ type-1_acc
916
+ type-2_In
917
+ type-2_exp
918
+ type-2_acc
919
+ type-2_sq
920
+ type-2CD
921
+ 2345
922
+ 6
923
+ 9 101112131415
924
+ type-3
925
+ type-1.
926
+ exp
927
+ type-3_acc
928
+ type-1_acc
929
+ type-3_In
930
+ type-1_In
931
+ type-3_sq
932
+ type-1_sq
933
+ type-2_acc
934
+ type-1
935
+ type-2
936
+ type-3_
937
+ exp
938
+ type-2_exp
939
+ type-2_sq
940
+ type-2_InCD
941
+ 1
942
+ 23456
943
+ 57
944
+ 8
945
+ 9101112131415
946
+ type-3
947
+ type-1
948
+ type-3_sq
949
+ type-1_acc
950
+ type-3_In
951
+ type-1_ln
952
+ type-3_acc
953
+ type-1_exp
954
+ type-3_exp
955
+ type-1_sq
956
+ type-2
957
+ type-2_in
958
+ type-2_acc
959
+ type-2_sq
960
+ type-2_expCD
961
+ 1234567
962
+ 9101112131415
963
+ type-3
964
+ type-1
965
+ type-3_exp
966
+ type-1_sq
967
+ type-3_sq
968
+ type-1_ln
969
+ type-3n
970
+ type-1_exp
971
+ type-3_acc
972
+ type-1_acc
973
+ type-2_sq
974
+ type-2_in
975
+ type-2_acc
976
+ type-2
977
+ type-2_expTable 5: Pairwise comparison of unweighted and MEC-weighted stacking using Wilcoxon rank sum test. Statistically significant
978
+ values are marked with boldface (significance 0.05) and italics (significance 0.1).
979
+ Level-1
980
+ Unweighted stacking type-1 vs
981
+ algorithm
982
+ type-1 acc
983
+ type-1 exp
984
+ type-1 ln
985
+ type-1 sq
986
+ Ada
987
+ 18.0 (0.3)
988
+ 18.0 (0.3)
989
+ 18.0 (0.3)
990
+ 18.0 (0.3)
991
+ DT
992
+ 23.0 (0.63)
993
+ 23.0 (0.63)
994
+ 23.0 (0.63)
995
+ 23.0 (0.63)
996
+ KNN
997
+ 27.5 (1.0)
998
+ 21.0 (0.56)
999
+ 17.0 (0.32)
1000
+ 26.5 (0.92)
1001
+ LR
1002
+ 27.0 (0.96)
1003
+ 14.0 (0.15)
1004
+ 22.0 (0.56)
1005
+ 10.5 (0.08)
1006
+ RF
1007
+ 23.0 (0.63)
1008
+ 23.0 (0.63)
1009
+ 23.0 (0.63)
1010
+ 23.0 (0.63)
1011
+ SVM
1012
+ 18.0 (0.3)
1013
+ 27.0 (0.96)
1014
+ 22.0 (0.56)
1015
+ 27.0 (0.96)
1016
+ Unweighted stacking type-2 vs
1017
+ type-2 acc
1018
+ type-2 exp
1019
+ type-2 ln
1020
+ type-2 sq
1021
+ Ada
1022
+ 22.0 (0.56)
1023
+ 23.0 (0.63)
1024
+ 23.0 (0.63)
1025
+ 23.0 (0.63)
1026
+ DT
1027
+ 27.5 (1.0)
1028
+ 27.5 (1.0)
1029
+ 26.5 (0.92)
1030
+ 18.5 (0.35)
1031
+ KNN
1032
+ 25.0 (0.8)
1033
+ 21.0 (0.5)
1034
+ 25.0 (0.8)
1035
+ 21.0 (0.5)
1036
+ LR
1037
+ 10.5 (0.08)
1038
+ 20.5 (0.47)
1039
+ 24.5 (0.76)
1040
+ 16.5 (0.26)
1041
+ RF
1042
+ 27.5 (1.0)
1043
+ 22.5 (0.61)
1044
+ 17.5 (0.3)
1045
+ 26.5 (0.92)
1046
+ SVM
1047
+ 23.5 (0.68)
1048
+ 19.5 (0.41)
1049
+ 18.5 (0.36)
1050
+ 10.5 (0.08)
1051
+ Unweighted stacking type-3 vs
1052
+ type-3 acc
1053
+ type-3 exp
1054
+ type-3 ln
1055
+ type-3 sq
1056
+ Ada
1057
+ 13.0 (0.16)
1058
+ 19.0 (0.43)
1059
+ 19.0 (0.43)
1060
+ 19.0 (0.43)
1061
+ DT
1062
+ 2.0 (0.01)
1063
+ 11.0 (0.11)
1064
+ 0.0 (0.0)
1065
+ 10.0 (0.08)
1066
+ KNN
1067
+ 24.0 (0.77)
1068
+ 17.0 (0.32)
1069
+ 24.0 (0.77)
1070
+ 16.0 (0.28)
1071
+ LR
1072
+ 13.0 (0.16)
1073
+ 19.0 (0.43)
1074
+ 14.0 (0.19)
1075
+ 24.0 (0.77)
1076
+ RF
1077
+ 4.0 (0.01)
1078
+ 8.0 (0.05)
1079
+ 3.0 (0.01)
1080
+ 9.0 (0.06)
1081
+ SVM
1082
+ 10.0 (0.08)
1083
+ 0.0 (0.0)
1084
+ 9.0 (0.06)
1085
+ 7.0 (0.04)
1086
+ 5.3
1087
+ Comparing cost-sensitive stacking with single cost-sensitive models
1088
+ Finally, one might ask whether the effort involved in training the level-1 classifier is worth it. To answer this we compare
1089
+ the best stacking classifier with the corresponding single classifier. Having previously determined the best stacking setup,
1090
+ where DMECC was applied in both levels, and no MEC-weights are applied, we will omit other classifiers from this
1091
+ analysis. We average classifier performance across cross-validation folds using the savings metric (see Section 4.4) for
1092
+ commensurability. We also rank the resulting selection of classifiers by savings and average ranks across 12 datasets. The
1093
+ results are reported in Table 6, where the winning classifier (per algorithm) is marked with boldface font, the best performer
1094
+ per dataset is marked with italics.
1095
+ We note that cost-sensitive stacking always achieves positive savings, meaning its total misclassification costs are lower
1096
+ than the predetermined budget. Stacking has higher average savings on all algorithms except KNN and Random Forest. In
1097
+ terms of average ranks, stacking wins for all level-1 algorithms except KNN, which, we note, is one of the worst ranking
1098
+ algorithms in our study.
1099
+ 6
1100
+ Discussion
1101
+ Outcome 1: using cost-sensitive models in both levels of stacking is recommended
1102
+ The results presented in this paper,
1103
+ have demonstrated that there is a statistically significant difference in performance between the three different stacking
1104
+ setups considered in our experiments, namely CiS-CS, CS-CiS, and CS-CS. Contrary to the majority of cost-sensitive
1105
+ stacking papers that assumed that one level of cost-sensitive decision-making is sufficient, our experiments demonstrate
1106
+ that stacking models where the DMECC was applied in both levels of stacking achieved the highest ranking.
1107
+ While these conclusions hold for this particular post-training method, cost-sensitivity can be introduced either before
1108
+ or during training of the learning algorithm. Further experiments are required to investigate how different cost-sensitive
1109
+ methods affect our conclusions. Now that we have established how cost-sensitive stacking should be built, future work
1110
+ can focus on combining various kinds of cost-sensitive algorithms, including pre-, during- and post-training cost-sensitive
1111
+ methods [25]. Another interesting avenue for future research would be investigating homogeneous cost-sensitive stacking,
1112
+ an example of which was proposed in [5] using cost-sensitive decision trees as base classifiers and cost-sensitive logistic
1113
+ 11
1114
+
1115
+ Table 6: Comparing single classifiers with type-3 unweighted stacking. Savings score is reported for each classifier, higher is better.
1116
+ Best model per dataset is marked with italics. The winning classifier is marked with boldface letters.
1117
+ Ada
1118
+ DT
1119
+ KNN
1120
+ LR
1121
+ RF
1122
+ SVM
1123
+ Dataset
1124
+ Single
1125
+ Stacking
1126
+ Single
1127
+ Stacking
1128
+ Single
1129
+ Stacking
1130
+ Single
1131
+ Stacking
1132
+ Single
1133
+ Stacking
1134
+ Single
1135
+ Stacking
1136
+ absenteeism be 1
1137
+ 0.188
1138
+ 0.225
1139
+ 0.219
1140
+ 0.242
1141
+ 0.199
1142
+ 0.224
1143
+ 0.188
1144
+ 0.23
1145
+ 0.172
1146
+ 0.243
1147
+ 0.188
1148
+ 0.223
1149
+ bankruptcy
1150
+ 0.03
1151
+ 0.123
1152
+ 0.112
1153
+ 0.123
1154
+ 0.105
1155
+ 0.058
1156
+ -0.043
1157
+ 0.126
1158
+ 0.31
1159
+ 0.123
1160
+ -0.024
1161
+ 0.024
1162
+ churn AB
1163
+ 0.171
1164
+ 0.081
1165
+ 0.052
1166
+ 0.087
1167
+ 0.07
1168
+ 0.019
1169
+ 0.062
1170
+ 0.082
1171
+ 0.1
1172
+ 0.086
1173
+ 0.033
1174
+ 0.04
1175
+ churn kgl
1176
+ 0.311
1177
+ 0.295
1178
+ 0.0
1179
+ 0.297
1180
+ 0.242
1181
+ 0.031
1182
+ 0.302
1183
+ 0.295
1184
+ 0.273
1185
+ 0.296
1186
+ 0.225
1187
+ 0.066
1188
+ credit de uci
1189
+ 0.399
1190
+ 0.391
1191
+ 0.293
1192
+ 0.387
1193
+ 0.337
1194
+ 0.351
1195
+ 0.396
1196
+ 0.388
1197
+ 0.424
1198
+ 0.386
1199
+ 0.405
1200
+ 0.354
1201
+ credit kdd09
1202
+ 0.318
1203
+ 0.303
1204
+ 0.277
1205
+ 0.302
1206
+ 0.287
1207
+ 0.276
1208
+ 0.312
1209
+ 0.303
1210
+ 0.313
1211
+ 0.302
1212
+ 0.289
1213
+ 0.279
1214
+ credit kgl
1215
+ 0.511
1216
+ 0.411
1217
+ 0.156
1218
+ 0.411
1219
+ 0.408
1220
+ 0.202
1221
+ -0.053
1222
+ 0.411
1223
+ 0.499
1224
+ 0.411
1225
+ 0.378
1226
+ 0.175
1227
+ credit ro vub
1228
+ 1.793
1229
+ 1.796
1230
+ 1.787
1231
+ 1.795
1232
+ 1.786
1233
+ 1.785
1234
+ 1.727
1235
+ 1.793
1236
+ 1.762
1237
+ 1.797
1238
+ 1.773
1239
+ 1.786
1240
+ dm kdd98 train
1241
+ 0.108
1242
+ 0.143
1243
+ 0.033
1244
+ 0.147
1245
+ 0.035
1246
+ 0.061
1247
+ 0.122
1248
+ 0.119
1249
+ 0.059
1250
+ 0.147
1251
+ 0.036
1252
+ 0.044
1253
+ dm pt uci
1254
+ 0.568
1255
+ 0.558
1256
+ 0.537
1257
+ 0.557
1258
+ 0.551
1259
+ 0.511
1260
+ 0.562
1261
+ 0.558
1262
+ 0.556
1263
+ 0.557
1264
+ 0.551
1265
+ 0.529
1266
+ fraud ieee kgl
1267
+ 0.109
1268
+ 0.494
1269
+ 0.444
1270
+ 0.505
1271
+ 0.477
1272
+ 0.438
1273
+ 0.372
1274
+ 0.495
1275
+ 0.584
1276
+ 0.506
1277
+ 0.407
1278
+ 0.444
1279
+ fraud ulb kgl
1280
+ -0.062
1281
+ 0.714
1282
+ 0.625
1283
+ 0.701
1284
+ 0.679
1285
+ 0.706
1286
+ 0.75
1287
+ 0.72
1288
+ 0.762
1289
+ 0.728
1290
+ -0.124
1291
+ 0.688
1292
+ Avg Savings
1293
+ 0.37
1294
+ 0.461
1295
+ 0.378
1296
+ 0.463
1297
+ 0.431
1298
+ 0.389
1299
+ 0.391
1300
+ 0.46
1301
+ 0.484
1302
+ 0.465
1303
+ 0.345
1304
+ 0.388
1305
+ Avg Rank
1306
+ 5.08
1307
+ 4.17
1308
+ 9.42
1309
+ 4.33
1310
+ 8.17
1311
+ 9.17
1312
+ 6.75
1313
+ 4.08
1314
+ 4.58
1315
+ 3.83
1316
+ 9.25
1317
+ 9.08
1318
+ regression as level-1 classifier.
1319
+ Outcome 2: cost-insensitive classifiers do not perform well when costs are known, even in stacking
1320
+ As was pre-
1321
+ viously shown in [20] cost-insensitive classifiers, having no way to account for differences in misclassification costs,
1322
+ typically perform worse than cost-sensitive models when evaluated using cost-based performance metrics. In our study,
1323
+ we observed yet another confirmation to this in the context of heterogeneous ensembles, where base-learners were cost-
1324
+ sensitive and meta-learners were cost-insensitive. It is, however, surprising that applying MEC-weights has no positive
1325
+ impact on the performance of these cost-insensitive meta-learners. So we conclude that the transfer of cost information
1326
+ via cost-sensitive decision-making of the base-classifiers, and via MEC-weights was not sufficient to influence the final
1327
+ decision of the meta-learner. And even though application of MEC-weights to the meta-inputs makes the meta-level cost-
1328
+ sensitive, the performance of this method is inferior to unweighted stacking models. We can hypothesise that it may be
1329
+ different if the meta-learner used misclassification costs internally, but this questions is left for future research.
1330
+ Limitations
1331
+ Our current work is not without limitations, which we address below. The choice of the algorithms to be
1332
+ used in stacking is likely to impact its performance. In order to keep our experiments manageable, we limited ourselves
1333
+ to algorithms used previously in the cost-sensitive stacking literature. No parameter tuning was performed to preserve
1334
+ the same base-classifier composition across domains. Those familiar with SVM classifiers could remark that not tuning
1335
+ this algorithm is a mistake. We are aware of this limitation, which resulted in possibly poor comparative performance of
1336
+ SVM-based ensembles, however the purpose of the work was to ensure that the ensembles compared differ in only one
1337
+ thing, which is the inclusion of cost-sensitive decision-making into different levels of the ensemble. We are interested
1338
+ in relative performance of stacking setups, not in optimal performance of every learning algorithm on every domain. In
1339
+ order to perform statistical tests, we had to ensure that the classifiers were the same in every ensemble for every dataset,
1340
+ while parameter tuning will have resulted in different parameter settings on different datasets, which would have prevented
1341
+ us from performing statistical comparison. In future work we may experiment with homogeneous stacking, where the
1342
+ diversity of the ensemble will be created by hyperparameter tuning of the base classifiers.
1343
+ 7
1344
+ Conclusions
1345
+ Stacking is a well established state-of-the-art ensemble method, that has been widely applied to many application domains.
1346
+ In this work we provide insights into ways to make stacking cost-sensitive. We compare 90 stacking models built with
1347
+ 15 different compositions of the stacking ensemble using 6 well known classification algorithms. We evaluate on 12 real-
1348
+ world cost-sensitive problems with clearly defined, non-synthetic, instance-dependent misclassification costs. In contrast
1349
+ 12
1350
+
1351
+ to the absolute majority of cost-sensitive literature, our experimental results demonstarate that for the best results, not one,
1352
+ but two layers of cost-sensitive decision-making are required.
1353
+ We also found that applying MEC-weights to the training inputs of the level-1 classifier in stacking did not significantly
1354
+ change the performance of stacking models where the level-1 algorithm applied the default decision threshold to classify.
1355
+ Moreover, MEC-weighted stacking models where both levels were cost-sensitive performed worse than the unweighted
1356
+ stacking of the same type, indicating that two levels of cost-sensitivity is sufficient for good performance.
1357
+ Another contribution of our work is the consolidation of all publically available datasets with record-dependent costs
1358
+ in one place. In addition to that we derive instance-dependent costs for the well known credit-g dataset from the UCI
1359
+ repository.
1360
+ References
1361
+ [1] Frederik P Agterberg. Systematic approach to dealing with uncertainty of geoscience information in mineral explo-
1362
+ ration. APCO 89, pages 165–178, 1989.
1363
+ [2] Alejandro Correa Bahnsen, Djamia Aouada, and Bj¨orn Ottersten. Example-dependent cost-sensitive logistic re-
1364
+ gression for credit scoring. In 2014 13th International Conference on Machine Learning and Applications, pages
1365
+ 263–269. IEEE, 2014.
1366
+ [3] Alejandro Correa Bahnsen, Djamila Aouada, and Bj¨orn Ottersten. A novel cost-sensitive framework for customer
1367
+ churn predictive modeling. Decision Analytics, 2(1):1–15, 2015.
1368
+ [4] Alejandro Correa Bahnsen, Aleksandar Stojanovic, Djamila Aouada, and Bj¨orn Ottersten. Improving credit card
1369
+ fraud detection with calibrated probabilities. In Proceedings of the 2014 SIAM International Conference on Data
1370
+ Mining, pages 677–685. SIAM, 2014.
1371
+ [5] Alejandro Correa Bahnsen, Sergio Villegas, Djamila Aouada, and Bj¨orn Ottersten. Fraud detection by stacking
1372
+ cost-sensitive decision trees. In Data Science for Cyber-Security, pages 251–266. World Scientific, 2019.
1373
+ [6] R. Mike Cameron-Jones and Andrew Charman-Williams. Stacking for misclassification cost performance. In Cana-
1374
+ dian Conference on AI, 2001.
1375
+ [7] Chenjie Cao and Zhe Wang. Imcstacking: Cost-sensitive stacking learning with feature inverse mapping for imbal-
1376
+ anced problems. Knowledge-Based Systems, 150:27–37, 2018.
1377
+ [8] Manuel Fern´andez Delgado, Eva Cernadas, Sen´en Barro, and Dinani Gomes Amorim. Do we need hundreds of
1378
+ classifiers to solve real world classification problems? Journal of Machine Learning Research, 15:3133–3181, 2014.
1379
+ [9] Janez Demˇsar. Statistical comparisons of classifiers over multiple data sets. The Journal of Machine learning re-
1380
+ search, 7:1–30, 2006.
1381
+ [10] Thomas G. Dietterich. Approximate statistical tests for comparing supervised classification learning algorithms.
1382
+ Neural Computation, 10:1895–1923, 1998.
1383
+ [11] Thomas G. Dietterich. Ensemble methods in machine learning. In Multiple Classifier Systems, 2000.
1384
+ [12] Dheeru Dua and Casey Graff. UCI machine learning repository. http://archive.ics.uci.edu/ml, 2017.
1385
+ [13] Zeinab Eivazpour and Mohammad Reza Keyvanpour. Cssg: A cost-sensitive stacked generalization approach for
1386
+ software defect prediction. Software Testing, Verification and Reliability, page e1761, 2021.
1387
+ [14] Charles Elkan. The foundations of cost-sensitive learning. In International Joint Conference on Artificial Intelligence,
1388
+ volume 17, pages 973–978, 2001.
1389
+ [15] David J Hand. Measuring classifier performance: a coherent alternative to the area under the roc curve. Machine
1390
+ Learning, 77(1):103–123, 2009.
1391
+ 13
1392
+
1393
+ [16] Trevor Hastie, Robert Tibshirani, Jerome H Friedman, and Jerome H Friedman. The Elements of Statistical Learning:
1394
+ Data Mining, Inference, and Prediction, volume 2. Springer, 2009.
1395
+ [17] Bao-Gang Hu and Wei-Ming Dong. A study on cost behaviors of binary classification measures in class-imbalanced
1396
+ problems. arXiv preprint arXiv:1403.7100, 2014.
1397
+ [18] Nathalie Japkowicz and Mohak Shah. Evaluating Learning Algorithms: a Classification Perspective. Cambridge
1398
+ University Press, 2011.
1399
+ [19] S. Kotsiantis. Stacking cost sensitive models. 2008 Panhellenic Conference on Informatics, pages 217–221, 2008.
1400
+ [20] Natalie Lawrance, George Petrides, and Marie-Anne Guerry. Predicting employee absenteeism for cost effective
1401
+ interventions. Decision Support Systems, page 113539, 2021.
1402
+ [21] Yann-A Le Borgne and Gianluca Bontempi. Machine learning for credit card fraud detection-practical handbook.
1403
+ ACM SIGKDD Explorations Newsletter, 6(1):1–6, 2004.
1404
+ [22] S´ergio Moro, Paulo Cortez, and Paulo Rita. A data-driven approach to predict the success of bank telemarketing.
1405
+ Decision Support Systems, 62:22–31, 2014.
1406
+ [23] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss,
1407
+ V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn:
1408
+ Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011.
1409
+ [24] George Petrides, Darie Moldovan, Lize Coenen, Tias Guns, and Wouter Verbeke. Cost-sensitive learning for profit-
1410
+ driven credit scoring. Journal of the Operational Research Society, 73(2):338–350, 2022.
1411
+ [25] George Petrides and Wouter Verbeke. Cost-sensitive ensemble learning: a unifying framework. Data Mining and
1412
+ Knowledge Discovery, 36(1):1–28, 2022.
1413
+ [26] Lior Rokach. Taxonomy for characterizing ensemble methods in classification tasks: A review and annotated bibli-
1414
+ ography. Computational Statistics & Data Analysis, 53(12):4046–4072, 2009.
1415
+ [27] M Paz Sesmero, Agapito I Ledezma, and Araceli Sanchis. Generating ensembles of heterogeneous classifiers using
1416
+ stacked generalization. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 5(1):21–34, 2015.
1417
+ [28] Thanaruk Theeramunkong, Cholwich Nattee, Paulo JL Adeodato, Nitesh Chawla, Peter Christen, Philippe Lenca,
1418
+ Josiah Poon, and Graham Williams. New Frontiers in Applied Data Mining: PAKDD 2009 International Workshops,
1419
+ Bangkok, Thailand, April 27-30, 2010. Revised Selected Papers, volume 5669. Springer, Bangkok, Thailand, 2010.
1420
+ [29] K. Ting and I. Witten. Stacking bagged and dagged models. In ICML, 1997.
1421
+ [30] Kai Ming Ting and Ian H Witten. Issues in stacked generalization. Journal of Artificial Intelligence Research,
1422
+ 10:271–289, 1999.
1423
+ [31] David H Wolpert. Stacked generalization. Neural Networks, 5(2):241–259, 1992.
1424
+ [32] David H Wolpert and William G Macready. No free lunch theorems for optimization. IEEE Transactions on Evolu-
1425
+ tionary Computation, 1(1):67–82, 1997.
1426
+ [33] Yueling Xiong, Mingquan Ye, and Changrong Wu. Cancer classification with a cost-sensitive naive bayes stacking
1427
+ ensemble. Computational and Mathematical Methods in Medicine, 2021, 2021.
1428
+ [34] Jianhong Yan and Suqing Han. Classifying imbalanced data sets by a novel re-sample and cost-sensitive stacked
1429
+ generalization method. Mathematical Problems in Engineering, 2018:1–13, 2018.
1430
+ [35] Bianca Zadrozny and Charles Elkan. Learning and making decisions when costs and probabilities are both unknown.
1431
+ In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
1432
+ pages 204–213. ACM, 2001.
1433
+ 14
1434
+
1435
+ [36] Bianca Zadrozny and Charles Elkan. Transforming classifier scores into accurate multiclass probability estimates.
1436
+ In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
1437
+ pages 694–699, 2002.
1438
+ [37] Zhi-Hua Zhou. Ensemble methods: foundations and algorithms. CRC press, 2012.
1439
+ A
1440
+ Additional results
1441
+ A.1
1442
+ Pairwise comparison of stacking setups of type-3 and type-1.
1443
+ Table 7: Wilcoxon test statistics (p-values).
1444
+ Level-1 algorithm
1445
+ type-3
1446
+ type-3 acc
1447
+ type-3 exp
1448
+ type-3 ln
1449
+ type-3 sq
1450
+ Ada
1451
+ type-1
1452
+ 0.0 (0.0)
1453
+ 0.0 (0.0)
1454
+ 0.0 (0.0)
1455
+ 0.0 (0.0)
1456
+ 0.0 (0.0)
1457
+ type-1 acc
1458
+ 0.0 (0.0)
1459
+ 0.0 (0.0)
1460
+ 0.0 (0.0)
1461
+ 0.0 (0.0)
1462
+ 0.0 (0.0)
1463
+ type-1 exp
1464
+ 0.0 (0.0)
1465
+ 0.0 (0.0)
1466
+ 0.0 (0.0)
1467
+ 0.0 (0.0)
1468
+ 0.0 (0.0)
1469
+ type-1 ln
1470
+ 0.0 (0.0)
1471
+ 0.0 (0.0)
1472
+ 0.0 (0.0)
1473
+ 0.0 (0.0)
1474
+ 0.0 (0.0)
1475
+ type-1 sq
1476
+ 0.0 (0.0)
1477
+ 0.0 (0.0)
1478
+ 0.0 (0.0)
1479
+ 0.0 (0.0)
1480
+ 0.0 (0.0)
1481
+ DT
1482
+ type-1
1483
+ 0.0 (0.0)
1484
+ 0.0 (0.0)
1485
+ 0.0 (0.0)
1486
+ 0.0 (0.0)
1487
+ 0.0 (0.0)
1488
+ type-1 acc
1489
+ 0.0 (0.0)
1490
+ 0.0 (0.0)
1491
+ 0.0 (0.0)
1492
+ 0.0 (0.0)
1493
+ 0.0 (0.0)
1494
+ type-1 exp
1495
+ 0.0 (0.0)
1496
+ 0.0 (0.0)
1497
+ 0.0 (0.0)
1498
+ 0.0 (0.0)
1499
+ 0.0 (0.0)
1500
+ type-1 ln
1501
+ 0.0 (0.0)
1502
+ 0.0 (0.0)
1503
+ 0.0 (0.0)
1504
+ 0.0 (0.0)
1505
+ 0.0 (0.0)
1506
+ type-1 sq
1507
+ 0.0 (0.0)
1508
+ 0.0 (0.0)
1509
+ 0.0 (0.0)
1510
+ 0.0 (0.0)
1511
+ 0.0 (0.0)
1512
+ KNN
1513
+ type-1
1514
+ 0.0 (0.0)
1515
+ 0.0 (0.0)
1516
+ 0.0 (0.0)
1517
+ 0.0 (0.0)
1518
+ 0.0 (0.0)
1519
+ type-1 acc
1520
+ 0.0 (0.0)
1521
+ 0.0 (0.0)
1522
+ 0.0 (0.0)
1523
+ 0.0 (0.0)
1524
+ 0.0 (0.0)
1525
+ type-1 exp
1526
+ 0.0 (0.0)
1527
+ 0.0 (0.0)
1528
+ 0.0 (0.0)
1529
+ 0.0 (0.0)
1530
+ 0.0 (0.0)
1531
+ type-1 ln
1532
+ 0.0 (0.0)
1533
+ 0.0 (0.0)
1534
+ 0.0 (0.0)
1535
+ 0.0 (0.0)
1536
+ 0.0 (0.0)
1537
+ type-1 sq
1538
+ 0.0 (0.0)
1539
+ 0.0 (0.0)
1540
+ 0.0 (0.0)
1541
+ 0.0 (0.0)
1542
+ 0.0 (0.0)
1543
+ LR
1544
+ type-1
1545
+ 0.0 (0.0)
1546
+ 0.0 (0.0)
1547
+ 0.0 (0.0)
1548
+ 0.0 (0.0)
1549
+ 0.0 (0.0)
1550
+ type-1 acc
1551
+ 0.0 (0.0)
1552
+ 0.0 (0.0)
1553
+ 0.0 (0.0)
1554
+ 0.0 (0.0)
1555
+ 0.0 (0.0)
1556
+ type-1 exp
1557
+ 0.0 (0.0)
1558
+ 0.0 (0.0)
1559
+ 0.0 (0.0)
1560
+ 0.0 (0.0)
1561
+ 0.0 (0.0)
1562
+ type-1 ln
1563
+ 0.0 (0.0)
1564
+ 0.0 (0.0)
1565
+ 0.0 (0.0)
1566
+ 0.0 (0.0)
1567
+ 0.0 (0.0)
1568
+ type-1 sq
1569
+ 0.0 (0.0)
1570
+ 0.0 (0.0)
1571
+ 0.0 (0.0)
1572
+ 0.0 (0.0)
1573
+ 0.0 (0.0)
1574
+ RF
1575
+ type-1
1576
+ 0.0 (0.0)
1577
+ 0.0 (0.0)
1578
+ 0.0 (0.0)
1579
+ 0.0 (0.0)
1580
+ 0.0 (0.0)
1581
+ type-1 acc
1582
+ 0.0 (0.0)
1583
+ 0.0 (0.0)
1584
+ 0.0 (0.0)
1585
+ 0.0 (0.0)
1586
+ 0.0 (0.0)
1587
+ type-1 exp
1588
+ 0.0 (0.0)
1589
+ 0.0 (0.0)
1590
+ 0.0 (0.0)
1591
+ 0.0 (0.0)
1592
+ 0.0 (0.0)
1593
+ type-1 ln
1594
+ 0.0 (0.0)
1595
+ 0.0 (0.0)
1596
+ 0.0 (0.0)
1597
+ 0.0 (0.0)
1598
+ 0.0 (0.0)
1599
+ type-1 sq
1600
+ 0.0 (0.0)
1601
+ 0.0 (0.0)
1602
+ 0.0 (0.0)
1603
+ 0.0 (0.0)
1604
+ 0.0 (0.0)
1605
+ SVM
1606
+ type-1
1607
+ 0.0 (0.0)
1608
+ 0.0 (0.0)
1609
+ 8.0 (0.05)
1610
+ 1.0 (0.0)
1611
+ 6.0 (0.03)
1612
+ type-1 acc
1613
+ 0.0 (0.0)
1614
+ 0.0 (0.0)
1615
+ 8.0 (0.05)
1616
+ 1.0 (0.0)
1617
+ 6.0 (0.03)
1618
+ type-1 exp
1619
+ 0.0 (0.0)
1620
+ 0.0 (0.0)
1621
+ 8.0 (0.05)
1622
+ 1.0 (0.0)
1623
+ 6.0 (0.03)
1624
+ type-1 ln
1625
+ 0.0 (0.0)
1626
+ 0.0 (0.0)
1627
+ 8.0 (0.05)
1628
+ 1.0 (0.0)
1629
+ 6.0 (0.03)
1630
+ type-1 sq
1631
+ 0.0 (0.0)
1632
+ 0.0 (0.0)
1633
+ 8.0 (0.05)
1634
+ 1.0 (0.0)
1635
+ 6.0 (0.03)
1636
+ 15
1637
+
1638
+ A.2
1639
+ Pairwise comparison of stacking setups of type-3 and type-2.
1640
+ Table 8: Wilcoxon test statistics (p-values).
1641
+ Level-1 algorithm
1642
+ type-3
1643
+ type-3 acc
1644
+ type-3 exp
1645
+ type-3 ln
1646
+ type-3 sq
1647
+ Ada
1648
+ type-2
1649
+ 0.0 (0.0)
1650
+ 0.0 (0.0)
1651
+ 3.0 (0.01)
1652
+ 3.0 (0.01)
1653
+ 0.0 (0.0)
1654
+ type-2 acc
1655
+ 0.0 (0.0)
1656
+ 0.0 (0.0)
1657
+ 3.0 (0.01)
1658
+ 3.0 (0.01)
1659
+ 0.0 (0.0)
1660
+ type-2 exp
1661
+ 0.0 (0.0)
1662
+ 0.0 (0.0)
1663
+ 0.0 (0.0)
1664
+ 0.0 (0.0)
1665
+ 0.0 (0.0)
1666
+ type-2 ln
1667
+ 0.0 (0.0)
1668
+ 0.0 (0.0)
1669
+ 0.0 (0.0)
1670
+ 0.0 (0.0)
1671
+ 0.0 (0.0)
1672
+ type-2 sq
1673
+ 0.0 (0.0)
1674
+ 0.0 (0.0)
1675
+ 0.0 (0.0)
1676
+ 0.0 (0.0)
1677
+ 0.0 (0.0)
1678
+ DT
1679
+ type-2
1680
+ 0.0 (0.0)
1681
+ 4.0 (0.01)
1682
+ 3.0 (0.01)
1683
+ 3.0 (0.01)
1684
+ 3.0 (0.01)
1685
+ type-2 acc
1686
+ 0.0 (0.0)
1687
+ 3.0 (0.01)
1688
+ 3.0 (0.01)
1689
+ 3.0 (0.01)
1690
+ 3.0 (0.01)
1691
+ type-2 exp
1692
+ 0.0 (0.0)
1693
+ 3.0 (0.01)
1694
+ 2.0 (0.01)
1695
+ 0.0 (0.0)
1696
+ 3.0 (0.01)
1697
+ type-2 ln
1698
+ 0.0 (0.0)
1699
+ 0.0 (0.0)
1700
+ 0.0 (0.0)
1701
+ 0.0 (0.0)
1702
+ 0.0 (0.0)
1703
+ type-2 sq
1704
+ 0.0 (0.0)
1705
+ 4.0 (0.01)
1706
+ 3.0 (0.01)
1707
+ 3.0 (0.01)
1708
+ 3.0 (0.01)
1709
+ KNN
1710
+ type-2
1711
+ 7.0 (0.04)
1712
+ 7.0 (0.04)
1713
+ 7.0 (0.04)
1714
+ 7.0 (0.04)
1715
+ 8.0 (0.05)
1716
+ type-2 acc
1717
+ 7.0 (0.04)
1718
+ 7.0 (0.04)
1719
+ 7.0 (0.04)
1720
+ 7.0 (0.04)
1721
+ 7.0 (0.04)
1722
+ type-2 exp
1723
+ 7.0 (0.04)
1724
+ 7.0 (0.04)
1725
+ 7.0 (0.04)
1726
+ 7.0 (0.04)
1727
+ 8.0 (0.05)
1728
+ type-2 ln
1729
+ 5.0 (0.02)
1730
+ 7.0 (0.04)
1731
+ 7.0 (0.04)
1732
+ 7.0 (0.04)
1733
+ 7.0 (0.04)
1734
+ type-2 sq
1735
+ 7.0 (0.04)
1736
+ 7.0 (0.04)
1737
+ 7.0 (0.04)
1738
+ 7.0 (0.04)
1739
+ 8.0 (0.05)
1740
+ LR
1741
+ type-2
1742
+ 0.0 (0.0)
1743
+ 0.0 (0.0)
1744
+ 0.0 (0.0)
1745
+ 0.0 (0.0)
1746
+ 0.0 (0.0)
1747
+ type-2 acc
1748
+ 0.0 (0.0)
1749
+ 0.0 (0.0)
1750
+ 0.0 (0.0)
1751
+ 0.0 (0.0)
1752
+ 0.0 (0.0)
1753
+ type-2 exp
1754
+ 0.0 (0.0)
1755
+ 0.0 (0.0)
1756
+ 0.0 (0.0)
1757
+ 0.0 (0.0)
1758
+ 0.0 (0.0)
1759
+ type-2 ln
1760
+ 0.0 (0.0)
1761
+ 0.0 (0.0)
1762
+ 0.0 (0.0)
1763
+ 0.0 (0.0)
1764
+ 0.0 (0.0)
1765
+ type-2 sq
1766
+ 0.0 (0.0)
1767
+ 0.0 (0.0)
1768
+ 0.0 (0.0)
1769
+ 0.0 (0.0)
1770
+ 0.0 (0.0)
1771
+ RF
1772
+ type-2
1773
+ 0.0 (0.0)
1774
+ 3.0 (0.01)
1775
+ 4.0 (0.01)
1776
+ 3.0 (0.01)
1777
+ 4.0 (0.01)
1778
+ type-2 acc
1779
+ 0.0 (0.0)
1780
+ 3.0 (0.01)
1781
+ 3.0 (0.01)
1782
+ 3.0 (0.01)
1783
+ 3.0 (0.01)
1784
+ type-2 exp
1785
+ 0.0 (0.0)
1786
+ 4.0 (0.01)
1787
+ 4.0 (0.01)
1788
+ 3.0 (0.01)
1789
+ 4.0 (0.01)
1790
+ type-2 ln
1791
+ 0.0 (0.0)
1792
+ 4.0 (0.01)
1793
+ 4.0 (0.01)
1794
+ 3.0 (0.01)
1795
+ 4.0 (0.01)
1796
+ type-2 sq
1797
+ 0.0 (0.0)
1798
+ 3.0 (0.01)
1799
+ 3.0 (0.01)
1800
+ 3.0 (0.01)
1801
+ 4.0 (0.01)
1802
+ SVM
1803
+ type-2
1804
+ 6.0 (0.03)
1805
+ 13.0 (0.16)
1806
+ 25.0 (0.85)
1807
+ 13.0 (0.16)
1808
+ 20.0 (0.49)
1809
+ type-2 acc
1810
+ 6.0 (0.03)
1811
+ 14.0 (0.19)
1812
+ 24.0 (0.77)
1813
+ 14.0 (0.19)
1814
+ 20.0 (0.49)
1815
+ type-2 exp
1816
+ 6.0 (0.03)
1817
+ 13.0 (0.16)
1818
+ 24.0 (0.77)
1819
+ 13.0 (0.16)
1820
+ 19.0 (0.43)
1821
+ type-2 ln
1822
+ 6.0 (0.03)
1823
+ 13.0 (0.16)
1824
+ 25.0 (0.85)
1825
+ 13.0 (0.16)
1826
+ 20.0 (0.49)
1827
+ type-2 sq
1828
+ 6.0 (0.03)
1829
+ 13.0 (0.16)
1830
+ 25.0 (0.85)
1831
+ 13.0 (0.16)
1832
+ 19.0 (0.43)
1833
+ 16
1834
+
JNAzT4oBgHgl3EQfx_7e/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
JdAzT4oBgHgl3EQfyP4s/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bc73409693aa8dff46bb1e11afe12bca338f60a6034cb9fa8e6b69354c0beb4c
3
+ size 18350125
KdE1T4oBgHgl3EQfGgND/content/tmp_files/2301.02914v1.pdf.txt ADDED
@@ -0,0 +1,2404 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Gravastar-like black hole solutions in q-theory
2
+ M. Selch, J. Miller, and M.A.Zubkov
3
+ Ariel University, Ariel, 40700, Israel
4
+ (Dated: January 10, 2023)
5
+ We present a stationary spherically symmetric solution of the Einstein equations, with a source
6
+ generated by a scalar field of q-theory.
7
+ In this theory Riemannian gravity, as described by the
8
+ Einstein - Hilbert action, is coupled to a three - form field that describes the dynamical vacuum.
9
+ Formally it behaves like a matter field with its own stress - energy tensor, equivalent to a scalar
10
+ field minimally coupled to gravity. The asymptotically flat solutions obtained to the field equations
11
+ represent black holes. For a sufficiently large horizon radius the energy density is localized within
12
+ a thin spherical shell situated just outside of the horizon, analogous to a gravastar. The resulting
13
+ solutions to the field equations, which admit this class of configurations, satisfy existence conditions
14
+ that stem from the Black Hole no - hair theorem, thanks to the presence of a region in space in
15
+ which the energy density is negative.
16
+ I.
17
+ Introduction
18
+ General Relativity (GR) is based on the axiom that the gravitational field is encoded by the geometry of spacetime:
19
+ in a perfect vacuum spacetime is flat, while massive objects distort the surrounding spacetime from being otherwise
20
+ flat to having a curved geometry. Test particles move along geodesics of the background spacetime in a way such
21
+ that the trajectory depends on the geometry of the spacetime. In flat space the trajectory is a straight line, while in
22
+ curved space it gets accelerated away from straight line motion. This is the equivalence principle: the gravitational
23
+ field is equivalent to acceleration in the background spacetime. In this manner Newton’s ‘action at a distance’ theory
24
+ of gravity is replaced by Einstein’s field theory approach, in which the field is the very geometry of the spacetime.
25
+ The vacuum Einstein field equations contain a cosmological constant [1], which relates the large-scale expansion of
26
+ the universe in cosmological models. In turn the cosmological constant is related to the vacuum energy density [2–6].
27
+ Its value according to astronomical observations lies at a typical energy scale of the order of 10−3 eV [7–9], while its
28
+ range of values as inferred from theoretical models is much larger [10–14].
29
+ Volovik and Klinkhamer have suggested [15, 16] that the smallness of the observed vacuum energy density can
30
+ be explained on the basis of a thermodynamic argument by which the vacuum energy density is exactly canceled in
31
+ equilibrium (perfect quantum vacuum). q-theory appears as a low-energy effective theory [17–20] as opposed to a
32
+ purely fundamental theory [10–14], and as a result contributions to the vacuum energy density become suppressed at
33
+ macroscopic scales and reside in small perturbations of the equilibrium state. In the Klinkhamer Volovik model, the
34
+ effective vacuum energy density that enters the low-energy field equations is described by a vacuum field variable. At
35
+ high energies it may be described by the 3-form field Aβγδ, which is antisymmetric with respect to permutation of
36
+ indices. From this tensor the scalar q-field, the low energy vacuum variable, is composed as q2 = − 1
37
+ 24FαβγδF αβγδ,
38
+ where Fαβγδ = ∇[αAβγδ] is the field strength. The equilibrium value of q alters if the vacuum is perturbed towards a
39
+ new equilibrium state. More details can be found in §II.
40
+ Black holes (BHs) are unstable due to several effects. They may evaporate gradually resulting in Hawking radiation
41
+ [21]. Alternatively a BH may undergo a transition to a white hole [22], through quantum mechanical tunneling from
42
+ inside a trapped region to an anti-trapped region. Another possible outcome is the formation of a vacuum star. In this
43
+ model the event horizon takes the form of a boundary between different phases of the quantum vacuum [23]. There
44
+ are a number of similar phenomena between semi-metals and BHs, for example the event horizon emerging on the
45
+ boundary between type I and type II Weyl semimetals. Volovik [24] has discussed an analogous process that occurs
46
+ in Dirac and Weyl semimetals that suggests the viability of the formation of a gravastar or vacuum star after vacuum
47
+ reconstruction, once Hawking radiation has been ended. According to [24] (and unlike conventional gravastars [25])
48
+ the gravastar admits three distinct regions: the vacuum inside the Cauchy horizon with the de Sitter metric, the
49
+ vacuum inside the thin shell between the Cauchy horizon and the event horizon, and the vacuum outside the event
50
+ horizon with the ordinary Schwarzschild metric. Even classically, BHs may be unstable. Regarding it as an ‘excited
51
+ state’, decay due to exponential growth of the metric (plus soliton) perturbations becomes possible [26].
52
+ The geometry of the spacetime in a neighbourhood of a gravastar can be described using the action of a q-field
53
+ coupled to gravity, where the q-field, as mentioned above, is related to the energy density of the quantum vacuum
54
+ [27, 28]. The goal of this work is to show (by numerical means) that (static and spherically symmetric) “scalar-haired”
55
+ BHs exist within q-theory induced by the scalar q-field minimally coupled to gravity. The solutions are discussed
56
+ thoroughly and are interpreted within the context of gravastars. A similar (numerical) calculation by Nucamendi and
57
+ Salgado can be found in refs. [29], in which solutions to the field equations are derived for the case of a scalar field
58
+ arXiv:2301.02914v1 [gr-qc] 7 Jan 2023
59
+
60
+ 2
61
+ coupled minimally as well, in a generic static, spherically symmetric and asymptotically flat spacetime very similar
62
+ but not identical to our considerations within q-theory. There, “scalar-hair” BH solutions were shown to exist.
63
+ As mentioned above, such BH solutions admit non-trivial “hair” associated with the scalar field. A general BH
64
+ “no-hair” conjecture was originally proposed by Ruffini and Wheeler [30] (see also Hawking 1975 [21] for a thorough
65
+ pedagogical overview). A set of conditions arise from no-hair theorems [31] for the existence of a solution to the
66
+ Einstein equations with a scalar field source, one of which is the the no-hair integral, defined in (60), of the solution.
67
+ It is shown in §IV that these criteria are satisfied for the solutions obtained in this work.
68
+ For a given spacetime the presence of an event horizon can be inferred from analyzing ingoing null trajectories,
69
+ as explained in §III. A set of coordinates convenient for both tracking null trajectories and describing the whole
70
+ neighborhood of an event horizon are Painlevé-Gullstrand (PG) coordinates, originally suggested in [32, 33]. Below
71
+ can be found a brief description of how they are derived and the manner in which PG coordinates describe null
72
+ trajectories. More complex spacetime tensors including the stress-energy and Einstein tensors in PG coordinates are
73
+ given in §III A.
74
+ PG coordinates were originally suggested as an alternative to Schwarzschild coordinates for describing radial null
75
+ trajectories in Schwarzschild spacetime. The unique solution of the Einstein equation that is spherically-symmetric,
76
+ stationary, non-spinning with no net charge is the Schwarzschild metric with the form
77
+ ds2 = −fdt2 + 1
78
+ f dr2 + r2dΩ2,
79
+ (1)
80
+ where dΩ2 = dθ2 +sin2 θdϕ2 is the line-element of a unit two-sphere and f = 1−2M/r is the Schwarzschild term with
81
+ M being the mass of the background. The four-velocity U µ = dxµ/dτ ≡ ˙xµ (τ being proper time along the worldline)
82
+ satisfies the normalization condition −1 = gµνU µU ν = −f ˙t2 + f −1 ˙r2 = U 2 �
83
+ −f + f −1(dr/dt)2�
84
+ where U ≡ dt/dτ.
85
+ The quantity ε = −gµνξµU ν = fU is a constant of motion, since ξµ = (∂/∂t)µ is a timelike Killing field. Accordingly,
86
+ the four velocity of a radially outgoing or ingoing spherically-symmetric worldline is
87
+ U µ =
88
+ � ε
89
+ f , −
90
+
91
+ ε2 − f, 0, 0
92
+
93
+ .
94
+ (2)
95
+ In PG coordinates, the time coordinate, denoted tp to distinguish it from the t in Schwarzschild coordinates, is the
96
+ proper time along the worldline of the geodesic. As such the four velocity now has the more natural form
97
+ U µ
98
+ p =
99
+ � ˙tp, ˙r, ˙θ, ˙φ
100
+
101
+ =
102
+
103
+ 1 , −
104
+
105
+ ε2 − f, 0, 0
106
+
107
+ ≡ (1, −v, 0, 0)
108
+ (3)
109
+ where a ‘dot’ refers to a derivative with respect to tp, and
110
+ v =
111
+
112
+ ε2 − f
113
+ (4)
114
+ is the radial component of the velocity on the free-falling trajectory. The PG time coordinate tp is related to the
115
+ Schwarzschild time coordinate as
116
+ dtp = εdts +
117
+
118
+ ε2 − f
119
+ f
120
+ dr.
121
+ (5)
122
+ After writing the Schwarzschild metric (1) in PG coordinates the Painlevé-Gullstrand metric is obtained with the
123
+ form
124
+ ds2 = −dtp
125
+ 2 + 1
126
+ ε2 (dr + vdtp)2 + r2dΩ2.
127
+ (6)
128
+ Note that as pointed out in [34], the form of the metric in (6) is somewhat analogous to the conserved Newtonian
129
+ energy
130
+ E = 1
131
+ 2
132
+ � dr
133
+ dtp
134
+ �2
135
+ + Φ(r)
136
+ (7)
137
+ where Φ(r) = −M/r is a Newtonian type potential and E = (ε2 − 1)/2 is constant. If the particle falls from rest at
138
+ infinity, ε = 1, E = 0, such that (6) reduces to the standard Painlevé Gullstrand metric
139
+ ds2 = −dtp
140
+ 2 +
141
+
142
+ dr +
143
+
144
+ 2M
145
+ r dtp
146
+ �2
147
+ + r2dΩ2.
148
+ (8)
149
+
150
+ 3
151
+ Both forms of the metric in (6) and (8) are regular at the horizon r = 2M, ergo the spacetime geometry inside and
152
+ outside the horizon of a black hole can be related without the emergence of any singularities. As explained in [34], the
153
+ Newtonian type energy motivates the following ansatz for the metric in the generalized Painlevé-Gullstrand form:
154
+ ds2 = −dtp
155
+ 2 +
156
+ 1
157
+ 1 + 2E(tp, r)
158
+
159
+ dr + v(tp, r)dtp
160
+ �2
161
+ + r2dΩ2,
162
+ (9)
163
+ where
164
+ v(tp, r) =
165
+
166
+ 2E(tp, r) + 2m(tp, r)
167
+ r
168
+ .
169
+ (10)
170
+ Here E and M are not constant values, rather they are functions of tp and r. The metric in (10) is the one used in
171
+ this paper, but without an explicit dependence on tp, namely only stationary solutions are considered.
172
+ The metric signature is taken to be (−1, 1, 1, 1), and we use natural units, namely c = ℏ = 1 is assumed. In the
173
+ opening section we defer setting the Newtonian constant G = 1 for the purpose of offering clarity in our calculations,
174
+ but later it will be set to unity.
175
+ This paper is structured in the following way. In section II we introduce our model for q-theory, which is effectively
176
+ a scalar field theory with a double-well potential interaction, minimally coupled to Einstein gravity.
177
+ In section
178
+ III the Einstein equations are given for the case of a static spherically symmetric spacetime, in two different sets
179
+ of coordinates: generalized Painlevé-Gullstrand, and those that shall be referred to as generalized Schwarzschild
180
+ coordinates. In section IV the restrictions on solutions to the field equations are explain, which arise due to the no-
181
+ hair theorems that hold for scalar field theories minimally coupled to gravity. Section V contains a detailed discussion
182
+ of one specific static and spherically symmetric q-theory solution to the field equations. Section VI builds on section V,
183
+ containing a local scan of the space of solutions around the solution considered in section V. In section VII instabilities
184
+ of the obtained solutions are addressed, both due to classical perturbations as well as due to Hawking radiation. We
185
+ end our work in VIII with a conclusion of our findings.
186
+ II.
187
+ The model under consideration
188
+ In this paper we consider a gravitating dynamical vacuum of the type introduced in Refs. [15, 16]. One way to
189
+ describe such a system is through a 3-form field Aβγδ, antisymmetric with respect to permutation of indices. From a
190
+ stand point, this system can be considered to be matter described by a field Aβγδ, interacting with the gravitational
191
+ field. The secondary scalar field q, which is the effective degree of freedom at low energies, is composed of a three
192
+ form field Aβγδ as
193
+ q2 = − 1
194
+ 24FαβγδF αβγδ,
195
+ Fαβγδ = ∇[αAβγδ],
196
+ (11)
197
+ Fαβγδ = ±q√−gεαβγδ,
198
+ F αβγδ = ±q
199
+ 1
200
+ √−g εαβγδ ,
201
+ (12)
202
+ where εαβγδ and εαβγδ are completely antisymmetric, namely ε0123 = 1 and ε0123 = −1. The square brackets denote
203
+ antisymmetrization of indices. From these relations it follows that
204
+ δq
205
+ δgαβ = 1
206
+ 2qgαβ .
207
+ (13)
208
+ The action of the model has the form
209
+ S =
210
+
211
+ d4x√−g
212
+
213
+ R
214
+ 16πG − ϵ(q) − 1
215
+ 2gαβ∇αq∇βq
216
+
217
+ (14)
218
+ where G is Newton’s constant. ϵ is a polynomial function in q that has the form
219
+ ϵ(q) = λ
220
+ 4
221
+
222
+ q4 − 1
223
+ aGq2
224
+
225
+ .
226
+ (15)
227
+ λ and a are real numbers assumed to be O(1)-parameters with λ, a > 0. The scale associated with the potential
228
+ function is due to G and, therefore, it is the Planck scale.
229
+
230
+ 4
231
+ Variation of the action with respect to the metric results in the Einstein equations:
232
+ Rαβ − 1
233
+ 2gαβR = −8πG
234
+
235
+ gαβ
236
+
237
+ ρ(q) + 1
238
+ 2∇αq∇αq
239
+
240
+ − ∇αq∇βq + 2□q δq
241
+ δgαβ
242
+
243
+ (16)
244
+ where
245
+ ρ(q) = ϵ(q) − dϵ
246
+ dq
247
+ �1
248
+ 2gµν δq
249
+ δgµν
250
+
251
+ = ϵ(q) − dϵ
252
+ dq q
253
+ (17)
254
+ follows directly from (13). The function ρ enters the Einstein equations in the same way as the cosmological constant.
255
+ The shift from ϵ to ρ, as well as the final term on the right hand side of the Einstein equations, follow from the relation
256
+ q = q(gµν). A self-sustained quantum vacuum fulfills
257
+ 0 = P = −ρ
258
+ (18)
259
+ in thermodynamic equilibrium, where P refers to pressure and ρ is the energy density. This yields, in our example,
260
+ the equilibrium values qeq = 0, ±
261
+ 1
262
+
263
+ 3aG, which satisfy ρ(qeq) = 0. By further analogy with thermodynamics, a chemical
264
+ potential µ may be defined (up to a constant) as
265
+ µ = dϵ
266
+ dq
267
+ ����
268
+ q=qeq
269
+ .
270
+ (19)
271
+ Given that the original potential function is even with respect to q, and assuming that the vacuum has a non-trivial
272
+ equilibrium configuration, it shall be assumed that qeq =
273
+ 1
274
+
275
+ 3aG from now on. The energy density function is then
276
+ given by
277
+ ρ(q) = ϵ(q) − µq = λ
278
+ 4
279
+
280
+ q4 − 1
281
+ aGq2 +
282
+ 2
283
+ (3aG)
284
+ 3
285
+ 2 q
286
+
287
+ .
288
+ (20)
289
+ It has a local minimum at q = qmin = −( 1
290
+
291
+ 3 + 1)
292
+ 1
293
+
294
+ 4aG, a local maximum at q = qmax = (− 1
295
+
296
+ 3 + 1)
297
+ 1
298
+
299
+ 4aG and another
300
+ local minimum at the equilibrium value q = qeq =
301
+ 1
302
+
303
+ 3aG with ρ(q = qeq) = 0. Consequently, the equilibrium value is
304
+ also a double root of ρ. The other roots are located at q = 0 and q0 = −
305
+ 2
306
+
307
+ 3aG.
308
+ Vacuum stability requires the vacuum compressibility χvac to be positive :
309
+ χ−1
310
+ vac =
311
+
312
+ q2 d2ϵ
313
+ dq2
314
+ � ����
315
+ q=qeq
316
+ =
317
+ λ
318
+ 6a2G2 ≥ 0 ,
319
+ (21)
320
+ fulfilled for λ, a > 0.
321
+ The energy density function for λ = 1 and different values of a is plotted in Fig. (1) with the black line marking
322
+ the level of vanishing energy density. The potential has the same basic characteristic of two wells: the well containing
323
+ the equilibrium value of the q-field as a minimum with zero energy density, and the well that is deeper and hence
324
+ allows for negative energy densities. The region of negative energy densities starts at q = q0 and ends at q = 0.
325
+ The action in (14) lacks higher derivative terms of the q-field, which usually appear in the effective field theory
326
+ description without fine tuning.
327
+ These terms are (in the absence of an intermediate high-energy physics scale)
328
+ suppressed by the Planck energy scale. As long as the q-field varies slowly (q′ ≪ 1 in units with G = 1), these
329
+ contributions are negligible. This is the approach adopted in the following part of the discussion.
330
+ Variation of the action with respect to the three - form field Aαβγ yields the generalized Maxwell equation
331
+ ∇α(√−g
332
+
333
+ −dϵ(q)
334
+ dq
335
+ δq
336
+ δFαβγδ
337
+ + □q
338
+ δq
339
+ δFαβγδ
340
+ )
341
+
342
+ = 0
343
+ (22)
344
+ ⇔ ϵαβγδ∇α
345
+
346
+ −dϵ(q)
347
+ dq
348
+ + □q
349
+
350
+ = 0
351
+ (23)
352
+ ⇔ dϵ(q)
353
+ dq
354
+ − □q = µ
355
+ (24)
356
+ Here µ is the integration constant. Inserting this into the Einstein equations (16) yields
357
+ Rαβ − 1
358
+ 2gαβR = −8πG
359
+
360
+ gαβ(ϵ(q) − µq + 1
361
+ 2∇αq∇αq) − ∇αq∇βq
362
+
363
+ (25)
364
+
365
+ 5
366
+ Figure 1. The energy density of the q-field for λ = 1 and different values of a is depicted. While λ sets the absolute scale, a
367
+ determines the depth and separation width of the potential wells.
368
+ which comprises both the gravitational field and the matter (generalized Maxwell) equations. The fact that the q-field
369
+ is not fundamental, but rather only an effective degree of freedom leads to the effective replacement of ϵ with ρ. In
370
+ equilibrium, the scalar-field value corresponds to a minimum of the energy density ρ, which is located at the value
371
+ zero.
372
+ This shows that the problem reduces to that of solving the (modified) Einstein equations given by (25).
373
+ It is
374
+ equivalent to a scalar field theory minimally coupled to gravity with a scalar field potential ρ.
375
+ III.
376
+ Static and spherically symmetric solutions of the Einstein equations
377
+ The discussion is now about solving the static, spherically symmetric Einstein equations in order to find asymptotically
378
+ flat solutions that describe a BH with a non-trivial q-field behavior. The q-field, as well as all the other functions,
379
+ depend on a single coordinate only, which we choose to be the standard radial coordinate. The q-field is expected
380
+ to relax to the equilibrium value at large values of the radial coordinate, and to deviate from the equilibrium value
381
+ approaching smaller and smaller values for the radial coordinate.
382
+ In the following, two different ansätze are used for the metric in order to solve the Einstein equations:
383
+
384
+ β = 8πG(Tq)α
385
+ β, Gα
386
+ β = Rα
387
+ β − 1
388
+ 2gα
389
+ βR
390
+ (26)
391
+ where the Einstein tensor is Gα
392
+ β and the q-field energy-momentum tensor is (Tq)α
393
+ β. Primes above symbols label
394
+ derivatives with respect to the radial variable, throughout this work.
395
+ A.
396
+ Generalized Painlevé coordinates
397
+ The first ansatz is a generalized Painlevé-Gullstrand metric with the form
398
+ ds2 = −dt2 +
399
+ 1
400
+ 1 + 2E(r)(dr + v(r)dt)2 + r2dΩ2
401
+ (27)
402
+ and
403
+ v(r) =
404
+
405
+ 2E(r) + 2Gm(r)
406
+ r
407
+ (28)
408
+ while
409
+ dΩ2 = dθ2 + sin2(θ)dφ2 .
410
+ (29)
411
+
412
+ energy density p(q)
413
+ energy density pgi,zoomed
414
+ 14.0
415
+ a = 0.1
416
+ a = 0.1
417
+ a = 0.2
418
+ 7.5
419
+ a = 0.2
420
+ a=0.5
421
+ a=0.5
422
+ 50
423
+ a=l
424
+ a=l
425
+ a=2
426
+ 5.D
427
+ a=2
428
+ 40
429
+ a= 5
430
+ a= 5
431
+ 25
432
+ (b)d
433
+ 30
434
+ (b)d
435
+ 0.D
436
+ 24
437
+ 2.5
438
+ 5.0
439
+ 0
440
+ -7.5
441
+ -10
442
+ -2
443
+ L-
444
+ 2
445
+ 10.0
446
+ 4
447
+ E-
448
+ 0
449
+ 1
450
+ 3
451
+ 4
452
+ 1.0
453
+ 0.5
454
+ 0.D
455
+ 0.5
456
+ 1D
457
+ 1'5
458
+ 2D
459
+ a
460
+ q6
461
+ As explained in the introductory remarks, the terms E and v in the metric are related to the kinematical quantities
462
+ of a particle in motion in the background. As elucidated in [34], v(r) may be interpreted as the velocity of a freely
463
+ falling test particle as it falls in towards a (spherically symmetric) gravitating object from infinity, while E(r), at least
464
+ asymptotically, can be related to the normalized total energy of a test particle (E(∞) = (e2−1)
465
+ 2
466
+ , where e represents
467
+ the total energy per unit rest mass of a test particle at infinity). This motivates labeling v a velocity function, and E
468
+ an energy function.
469
+ For the first metric ansatz, the non-vanishing Einstein tensor components are
470
+ Gt
471
+ t = −2Gm′
472
+ r2
473
+ , Gt
474
+ r =
475
+ −2E′
476
+ r(1 + 2E)
477
+
478
+ 2E + 2Gm
479
+ r
480
+ ,
481
+ (30)
482
+ Gr
483
+ r = −2rE′ + 4E′Gm − 4EGm′ − 2Gm′
484
+ (1 + 2E)r2
485
+ ,
486
+ (31)
487
+
488
+ θ = Gφ
489
+ φ = (3r2(1 − 2Gm
490
+ r
491
+ )(E′)2 + 3r(1 + 2E)E′Gm′ − (r + m)(1 + 2E)E′
492
+ (32)
493
+ − r2(1 − 2Gm
494
+ r
495
+ )(1 + 2E)E′′ − r(1 + 2E)2Gm′′)/((1 + 2E)2r2)
496
+ The energy momentum tensor (Tq)α
497
+ β for the q-field takes the form
498
+ (Tq)α
499
+ β = −(gα
500
+ β(ρ(q) + 1
501
+ 2gαβ∇αq∇βq) − gαγ∇γq∇βq)
502
+ (33)
503
+ with non-vanishing components
504
+ (Tq)t
505
+ t = (Tq)θ
506
+ θ = (Tq)φ
507
+ φ = −(ρ(q) + 1
508
+ 2(1 − 2Gm
509
+ r
510
+ )(q′)2),
511
+ (34)
512
+ (Tq)t
513
+ r =
514
+
515
+ 2E + 2Gm
516
+ r
517
+ (q′)2,
518
+ (35)
519
+ (Tq)r
520
+ r = −(ρ(q) − 1
521
+ 2(1 − 2Gm
522
+ r
523
+ )(q′)2).
524
+ (36)
525
+ The Einstein equations can thus be brought into the following form
526
+ Gm′ = 4πGr2(ρ(q) + 1
527
+ 2(1 − 2Gm
528
+ r
529
+ )(q′)2))
530
+ (37)
531
+ 2E′
532
+ 1 + 2E = −8πGr(q′)2
533
+ (38)
534
+ q′′ = (1 − 2Gm
535
+ r
536
+ )−1(−2q′
537
+ r + 2Gmq′
538
+ r2
539
+ + 8πGrρq′ + dρ
540
+ dq ).
541
+ (39)
542
+ The first two equations are obtained from the radial and time components of the Einstein equations. Using these to
543
+ simplify the equation due to the angular components leads to the third equation.
544
+ The second equation can be solved for E. With the definition F = ln(1 + 2E) and E(∞) = lim
545
+ r→∞ E(r) the result is
546
+ F(r) = ln(1 + 2E(∞)) + 8πG
547
+ � ∞
548
+ r
549
+ s(q′(s))2 ds .
550
+ (40)
551
+ This leaves the first and third equations, which are solved numerically.
552
+ B.
553
+ Generalized Schwarzschild coordinates
554
+ An analogous procedure for the second ansatz yields the metric in the form
555
+ ds2 = −f(r)dt2 +
556
+ 1
557
+ h(r)dr2 + r2dΩ2,
558
+ (41)
559
+
560
+ 7
561
+ which shall be referred to as generalized Schwarzschild coordinates.
562
+ From this form of the metric the following
563
+ non-vanishing components of the Einstein tensor are derived:
564
+ Gt
565
+ t = rh′ + h − 1
566
+ r2
567
+ , Gr
568
+ r = rhf ′ + hf − f
569
+ r2f
570
+ ,
571
+ (42)
572
+
573
+ θ = Gφ
574
+ φ = −1
575
+ 4(rh(f ′)2 − 2rfhf ′′ − 2fhf ′ − (rff ′ + 2f 2)h′)/(rf 2)
576
+ (43)
577
+ The non-vanishing components of the corresponding energy momentum tensor are
578
+ (Tq)t
579
+ t = (Tq)θ
580
+ θ = (Tq)φ
581
+ φ = −(ρ(q) + 1
582
+ 2h(q′)2), (Tq)r
583
+ r = −(ρ(q) − 1
584
+ 2h(q′)2).
585
+ (44)
586
+ The Einstein equations can finally be brought into the following form
587
+ 1 − h − rh′ = 8πGr2(ρ + 1
588
+ 2h(q′)2)
589
+ (45)
590
+ f ′
591
+ f − h′
592
+ h = 8πGr(q′)2
593
+ (46)
594
+ q′′ = 1
595
+ h
596
+
597
+ dq − h′
598
+ h q′ − 2
599
+ r q′ − 4πGr(q′)3.
600
+ (47)
601
+ The first two equations are obtained from the radial and time components of the Einstein equations, and subsequently
602
+ used to simplify the relation for the angular components. This results in the third equation. The second equation can
603
+ be solved and reads, with k = ln(f) and the assumption k(r = ∞) = 0, as
604
+ k(r) = −
605
+ � ∞
606
+ r
607
+ �h′(s)
608
+ h(s) + 8πGs(q′(s))2)
609
+
610
+ ds .
611
+ (48)
612
+ The connection between the two parameterizations is provided by the relation
613
+ h(r) = 1 − 2Gm(r)
614
+ r
615
+ (49)
616
+ according to which the first and third equations of the two ansätze are identical. For convenience and for the purpose
617
+ of being consistent with other literature on this topic, we introduce the notation
618
+ f(r) = h(r)e2δ(r)
619
+ (50)
620
+ and
621
+ ˜δ(r1, r2) =
622
+ � r2
623
+ r1
624
+ 4πGs q′(s)2 ds .
625
+ (51)
626
+ C.
627
+ Black hole spacetime characteristics
628
+ In §V we will start from the assumptions that there exists an event horizon at a certain radial coordinate value r = rh,
629
+ and that spacetime is asymptotically flat. It then follows that
630
+ δ(r) = −˜δ(rh, ∞) + ˜δ(rh, r),
631
+ F(r) = ln(1 + 2E(∞)) + 2˜δ(r, ∞).
632
+ (52)
633
+ In order to check for the existence of an event horizon, radial null geodesics in generalized Painlevé-Gullstrand
634
+ coordinates or generalized Schwarzschild coordinates need to be discussed. The requirement ds2|θ=θ0,φ=φ0 = 0 leads
635
+ to
636
+ −dt2 + (dr + vdt)2
637
+ 1 + 2E
638
+ = 0 ⇔ dr
639
+ dt = ±
640
+
641
+ 1 + 2E − v
642
+ (53)
643
+ in generalized Painlevé-Gullstrand coordinates and
644
+ −fdt2 + 1
645
+ hdr2 = 0 ⇔ dr
646
+ dt = ±
647
+
648
+ fh
649
+ (54)
650
+
651
+ 8
652
+ in generalized Schwarzschild coordinates. The plus sign is associated with outward motion, while the minus sign
653
+ corresponds to inward motion. If dr
654
+ dt < 0 for both signs and every r < r0, then r0 marks an event horizon. More
655
+ precisely, it marks the locus of an apparent horizon. In a static (or more generally in a stationary) spacetime, the
656
+ apparent and the event horizon coincide. Generalized Schwarzschild coordinates are only valid on one side of the
657
+ event horizon, since they become singular at an event horizon (with at least either f = 0 or h = 0). In the vicinity of
658
+ an event horizon, h(r) ≪ 1, and the outward velocity of a massless particle may be approximated by
659
+ (dr
660
+ dt )out =
661
+
662
+ 1 + 2E(r) − v(r) =
663
+
664
+ 1 + 2E(r) −
665
+
666
+ 2E(r) + 2Gm
667
+ r
668
+ (55)
669
+ =
670
+
671
+ 1 + 2E(r) −
672
+
673
+ 2E(r) + 1 − h(r) =
674
+ h(r)
675
+ 2
676
+
677
+ 1 + 2E(r)
678
+ + O(h(r)2).
679
+ As a result, r = rh marks an event horizon if h(rh) = 0. Taking a look back at the Einstein equations in the generalized
680
+ Painlevé-Gullstrand ansatz (39), it can be observed that, although the coordinates are regular on the horizon, the
681
+ inclusion of a scalar field in Einstein gravity leads to singular behavior as the horizon is approached. This is manifest
682
+ in the third Einstein equation for both ansätze.
683
+ Of particular interest about solutions in q-theory is the distribution of energy density inside and outside the event
684
+ horizon, as well as the question of whether or not out solutions are singular at the origin.
685
+ To answer these questions it is convenient to define
686
+ −(Tq)t
687
+ t = V (r) + T(r),
688
+ V (r) = ρ(q(r)),
689
+ T(r) = 1
690
+ 2h(r)(q′(r))2
691
+ (56)
692
+ such that the energy density into a potential part V and a kinetic part T.
693
+ The latter quantity may be deduced from the Kretschmann invariant
694
+ K(r) = RµνρσRµνρσ
695
+ (57)
696
+ as r → 0, where Rµνρσ is the Riemann curvature tensor. For generalized Schwarzschild coordinates it takes the
697
+ explicit form
698
+ Kq−theory(r) = 1
699
+ r4 [4r4h2(r)(δ′(r))4 + 8r4h2(r)(δ′(r))2δ′′(r) + 4r4h2(r)(δ′′(r))2
700
+ + 8r2h2(r)(δ′(r))2 + r4(h′′(r))2 + (9r4(δ′(r))2 + 4r2)(h′(r))2
701
+ + 4(3r4h(r)(δ′(r))3 + 3r4h(r)δ′(r)δ′′(r) + 2r2h(r)δ′(r))h′(r)
702
+ + 2(2r4h(r)(δ′(r))2 + 2r4h(r)δ′′(r) + 3r4δ′(r)h′(r))h′′(r) + 4(h(r) − 1)2].
703
+ (58)
704
+ For Schwarzschild spacetime with h(r) = f(r) = 1 − 2GM
705
+ r
706
+ and Schwarzschild mass parameter M the Kretschmann
707
+ scalar reads
708
+ KSchwarz(r) = 48G2M 2
709
+ r6
710
+ .
711
+ (59)
712
+ Black hole spacetimes with minimally coupled scalar fields underlie a series of criteria to be fulfilled as dictated by
713
+ the black hole no-hair theorems. These criteria are the topic of the next chapter. From now on we will work in units
714
+ with G = 1.
715
+ IV.
716
+ Black hole no-hair theorems
717
+ In this section the BH no-hair theorems are explained, that restrict the set of allowed solutions of scalar hair black
718
+ holes (SHBH’s) in curved spacetime, which is the same class of solutions considered in this work.
719
+ The BH no-hair theorems, as discussed in [31, 35], assert the following:
720
+ 1. In the absence of event horizons there exist no non-trivial, regular scalar soliton solutions, that satisfy the dom-
721
+ inant energy condition but violate the strong energy condition, at every point in asymptotically flat spacetimes.
722
+ 2. In the presence of an event horizon in a static, spherically symmetric and asymptotically flat spacetime, no
723
+ non-trivial regular scalar-field solution exists outside the event horizon, if the dominant energy condition holds
724
+ but the strong energy condition is violated.
725
+
726
+ 9
727
+ 3. Any SHBH solution must necessarily have V (rh) < 0 where rh denotes the radial location of the event horizon,
728
+ and V is the potential energy density of the scalar field. The vicinity of the event horizon is enveloped by a
729
+ region of negative scalar-field energy density.
730
+ The strong energy condition is defined by the requirement that Tαβkαkβ ≥ 0, where Tαβ is the covariant energy
731
+ momentum tensor and kα is an arbitrary null vector field, and the requirement that −T α
732
+ βpβ must be a future
733
+ pointing causal vector field whenever pα is. The strong energy condition stipulates that for every timelike vector field
734
+ uα, the condition (Tαβ − 1
735
+ 2Tµνgµνgαβ)uαuβ ≥ 0 holds.
736
+ If in the first case, spherical symmetry is assumed with a positive scalar field potential, hence the dominant energy
737
+ condition does not need to be imposed in order to infer the absence of non-trivial scalar field solutions. From the
738
+ first two criteria, it is immediate that within the domain of outer communications (the region from the event horizon
739
+ to asymptotically flat infinity), the scalar field energy density must have negative values. The third criterion then
740
+ specifies where this region of negative energy density must be located.
741
+ This leaves as the only possibility for a non-trivial SHBH solution in the considered setup a q-field which asymptot-
742
+ ically relaxes to its equilibrium value but sweeps over field values corresponding to negative potential energy density
743
+ as the horizon is approached, for sure in the horizon proximity.
744
+ Both SHBH’s, and scalar solitons, have to fulfill an integral equation as a necessary condition for existence, as
745
+ derived from a scaling argument [31]. These conditions are written below in our notation convention. A necessary
746
+ condition for the existence of a scalar soliton (scalaron) in curved spacetime, in a non BH geometry is
747
+ � ∞
748
+ 0
749
+ 4πr2 exp (2δ(r))
750
+
751
+ Eflat
752
+ kin (r) + 3V (r)
753
+
754
+ dr = 0
755
+ (60)
756
+ It comprises the flat space kinetic energy density Eflat
757
+ kin (r) = 1
758
+ 2(q′(r))2, as well as the potential energy density V (r) =
759
+ ρ(q(r)). Analogously, a necessary condition for the existence of a SHBH solution is
760
+ � ∞
761
+ rh
762
+ 4πr2 exp(2δ(r))
763
+ �2rh
764
+ r
765
+
766
+ 1 − m(r)
767
+ r
768
+
769
+ − 1
770
+
771
+ Eflat
772
+ kin (r) +
773
+ �2rh
774
+ r
775
+ − 3
776
+
777
+ Vpot(r))dr = 0.
778
+ (61)
779
+ where rh is the radial coordinate of the event horizon. The fulfillment of this latter condition is taken as a tool to
780
+ fine-tune the shooting parameter q(rh) (introduced and discussed in section V), in finding SHBH solutions. In the
781
+ limit rh → 0 (60) is recovered. For future convenience we introduce the function
782
+ nhf(r) =
783
+ � r
784
+ rh
785
+ s2 exp(2δ(s))
786
+ �2rh
787
+ s (1 − m(s)
788
+ s
789
+ ) − 1
790
+
791
+ Eflat
792
+ kin (s) +
793
+ �2rh
794
+ s
795
+ − 3
796
+
797
+ V (s)) ds
798
+ (62)
799
+ which is then supposed to fulfill lim
800
+ r→∞ nhf(r) = 0.
801
+ V.
802
+ A representative SHBH solution for q-theory
803
+ The existence of SHBH solutions has been known for some time and was first considered numerically in [29] for a scalar
804
+ field minimally coupled to gravity in a double well scalar field interaction potential. Subsequently, these solutions
805
+ have been discussed in the framework of the of isolated horizons [36]. The latter formalism has been treated in detail
806
+ in [26] and references cited therein. The difference between this work and [29] is in the more restrictive potential
807
+ of q-theory. There are only two free parameters, the absolute scale provided by λ and the depth or separation of
808
+ the wells as parameterized by a. A shift in the q-field, accompanied by a corresponding change in the scalar energy
809
+ density function, does not lead to a further quantitative change in the solution as induced by the shift in the q-field
810
+ itself. It can be seen as fixed by the condition ρ(q = 0) = 0. The scalar potential in [29] has three free parameters
811
+ and allows for adjusting the positions of the wells, independently. Consequently, the solutions found and presented
812
+ within that work cannot be used for q-theory, since they lie outside the parameter space spanned by λ and a. In the
813
+ following, we replace the parameter a by the location of the minimum qeq =
814
+ 1
815
+
816
+ 3a of the shallow potential well.
817
+ We use Python for plotting and numerically solving the Einstein equations for the minimally coupled q-field. The
818
+ solver is non-adaptive and makes use of a refined (fourth order) Runge-Kutta method. Refined means that the grid
819
+ size close to the horizon is smaller than further away. This is due to the observation that the equations become
820
+ singular at the horizon. We will nevertheless employ a prescription of how to start “close” to the horizon.
821
+ This comes about since only one of the three boundary conditions of the differential equations (q(r = rbound),
822
+ q′(r = rbound) and m(r = rbound) at radial coordinate boundary position r = rbound) is free for an asymptotically
823
+ flat black hole spacetime regular at the horizon which we are searching for.
824
+ This freedom resides in the radial
825
+
826
+ 10
827
+ Figure 2. A representative SHBH solution for q-theory outside the event horizon is shown for a horizon radius of rh = 1, q-field
828
+ potential parameters λ = 1 and qeq = 0.158, a grid size of 106 and shift parameter ϵ = 10−6.
829
+ coordinate location of the event horizon for a fixed scalar field potential function, as is the case for Schwarzschild
830
+ spacetime. The dependencies of the boundary values on the horizon radius are known precisely only at the horizon
831
+ except for one parameter, the “shooting” parameter. How the singular behavior at the horizon is circumvented is
832
+ explained further below, together with an account of numerical errors. The results have been confirmed by an adaptive
833
+ routine of the NDsolve-method in Mathematica, which is the most accurate. We will still stick with Python in the
834
+ following discussion, since the difference between the solving routines is negligibly small for tiny grid sizes (of the
835
+ order ∼ 105 − 106), as used in Python.
836
+ Both a discussion of how to numerically avoid the singularity in the third Einstein equation at the horizon, as well
837
+ as a discussion of numerical errors are lacking in [29], but will be provided in the following. We shall start with a
838
+ qualitative discussion of a representative solution in this section before focusing on the space of solutions in the next
839
+ section.
840
+ A.
841
+ Outside the event horizon
842
+ The method of finding solutions for q-theory, makes use of previously discovered solutions, insofar as they are used
843
+ as a starting point in an interpolation of solutions between the respective parameter spaces. For a horizon radius of
844
+ rh = 1, q-field potential parameters λ = 1 and qeq = 0.158, a grid size of 106 and shift parameter ϵ = 10−6 (to be
845
+ introduced further below) the solution is shown in Fig. (2) for the region outside the event horizon (also termed the
846
+ domain of outer communications). It is in qualitative agreement with that of [29].
847
+ The q-field starts with a negative value such that q0 < q(r = rh) < 0, which is equivalent to V (r) = ρ(q(r)) < 0, as
848
+ is required by the no-hair theorems. More specifically we have qmin < q(r = rh) < 0. The q-field starts in the right
849
+ half of the deep potential well shown in Fig. (1) with the characteristic points of the double well potential named
850
+ as discussed in section I. It increases into the positive energy density domain, passes the local maximum and relaxes
851
+ asymptotically to the equilibrium value qeq.
852
+ The metric function m(r), termed mass function, starts from the horizon with m(rh) = 1
853
+ 2rh, initially decreases as
854
+
855
+ q-field
856
+ potential and kinetic energy densities versus q'
857
+ 0.02
858
+ q (r)
859
+ 0.1 -
860
+ Vr vs. T(r) vs. q'(r)
861
+ 0.D1
862
+ T(r)
863
+ ..
864
+ 50V(r)
865
+ 0.D
866
+ q(r)
867
+ 0.00
868
+ 0.02
869
+ 0.2
870
+ 0.03
871
+ 0.3
872
+ 15
873
+ 25
874
+ 0.04
875
+ 0.0
876
+ 0.5
877
+ 1b
878
+ 20
879
+ 3.D
880
+ 0.0
881
+ S0
882
+ 15
883
+ 2D
884
+ 25
885
+ 3.D
886
+ logia(r/rh?
887
+ logia(r/rh?
888
+ evolution of the mass function
889
+ metric functions
890
+ 3.D
891
+ h(r)
892
+ 25
893
+ f(r)
894
+ 5 -
895
+ (μ)g
896
+ 20
897
+ m(r)
898
+ 0
899
+ 5-
900
+ LD
901
+ OT-
902
+ 0.5
903
+ 15 +
904
+ 0.D
905
+ 0.0
906
+ 0.5
907
+ 1D
908
+ 15
909
+ 2D
910
+ 25
911
+ 3.D
912
+ 0.D
913
+ 15
914
+ 20
915
+ 25
916
+ 3.D
917
+ logia(r/rh?
918
+ logia(rfrh?
919
+ relabive ermor of the q-field solution
920
+ no-hair function
921
+ 2.00
922
+ 0
923
+ f.n.d.,5-p.s.m for g
924
+ f.n.d.,5-p.s.m for q
925
+ 175
926
+ -2
927
+ Jogia of the relative
928
+ -4
929
+ f.n.d.,5-p.s.m for m
930
+ 150
931
+ 6
932
+ 125
933
+ 1LDo
934
+ oT-
935
+ 0.75
936
+ -12
937
+ 0.50 -
938
+ -14
939
+ 0.25
940
+ -16
941
+ 00
942
+ 0.2
943
+ 0.4
944
+ 0.6
945
+ 0.B
946
+ 12
947
+ 16
948
+ 0.DO
949
+ 14
950
+ 0.D
951
+ 0.5
952
+ 15
953
+ 20
954
+ 25
955
+ 3.D
956
+ logia(r/rh?
957
+ logia(r/rh?11
958
+ ρ(q) < 0 until reaching a global minimum. It is located at a radial coordinate value shortly advancing that of q = 0,
959
+ since the kinetic energy density T(r) = 1
960
+ 2h(r)(q′(r))2 is positive everywhere outside the horizon. The mass function
961
+ increases until finally approaching its asymptotic value, the ADM mass of the spacetime, from below. The potential
962
+ and kinetic energy densities, as introduced in equation (56), are shown together with the derivative of the q-field on
963
+ the upper right. The potential energy density is seen to be of minor size as compared to the kinetic part.
964
+ Further shown are the metric functions in generalized Schwarzschild coordinates in the central plot on the right
965
+ hand side. As is required by asymptotic flatness we have the limits
966
+ lim
967
+ r→∞ f(r) = 1,
968
+ lim
969
+ r→∞ h(r) = 1,
970
+ lim
971
+ r→∞ δ(r) = 0,
972
+ (63)
973
+ while limr→∞ E(r) remains a free parameter for the generalized Painlevé-Gullstrand coordinates. This free parameter
974
+ is mostly irrelevant for the discussion of SHBH solutions and only of interest for test particle motion. Its variation
975
+ will be discussed in Appendix A but is of no crucial importance elsewhere in the discussion.
976
+ The lowermost plot on the left shows the error sizes. We calculate the relative error of the solution by taking the first
977
+ numerical derivative (f.n.d.) of q, q′ and m and comparing it with the solution as given by q′, q′′ and m′ and obtained
978
+ from the non-adaptive, refined (fourth order) Runge-Kutta algorithm. The first numerical derivative is calculated
979
+ using a central 5-point stencil method (5-p.s.m.). On a formal level this method approximates the derivative of a
980
+ five times differentiable function accurately up to O((∆r)4)-corrections where ∆r represents the grid spacing. The
981
+ grid size is 106. The first four peaks mark the radial coordinate values where the grid size changes abruptly and are
982
+ artificial, since the 5-p.s.m. formula we employed is based on equal grid size spacing. The final peaks for the relative
983
+ errors are due to the appearance of the local extrema of q′ as well as m. Apart from these points the relative error
984
+ can be seen to be smaller than 10−7 throughout.
985
+ The lowermost plot on the right shows the function nhf(r) introduced in the last section in equation (62) which
986
+ indeed fulfills limr→∞ nhf(r) = 0. This latter property was taken to fine-tune the shooting parameter q(rh), though,
987
+ which will be discussed shortly.
988
+ It can be seen that the plot of the relative errors do not reach as far out as the other plots. An asymptotic analysis
989
+ of the third Einstein equation with δq(r) = q(r) − qeq yields the linear approximation
990
+ (δq)′′ = −2(δq)′
991
+ r
992
+ + ρ′ = −2(δq)′
993
+ r
994
+ + λ
995
+ 2aδq ,
996
+ (64)
997
+ which has the solution
998
+ δq(r) = c1
999
+ 1
1000
+ r exp
1001
+
1002
+
1003
+
1004
+ λ
1005
+ 2ar
1006
+
1007
+ + c2
1008
+ 1
1009
+ r exp
1010
+
1011
+ +
1012
+
1013
+ λ
1014
+ 2ar
1015
+
1016
+ .
1017
+ (65)
1018
+ The asymptotic behavior of the relevant functions can be deduced from the first Einstein equation and the condition
1019
+ limr→∞ m(r) < ∞. A first order Taylor expansion of the potential energy density and its derivatives around q = qeq is
1020
+ well justified for δq ≪
1021
+ 1
1022
+ √a. The approximation of the third Einstein equation is well justified for 2m(r)
1023
+ r
1024
+ , 4πr2ρ(q(r)) ≪
1025
+ 1. Taken together we then obtain (64). The asymptotic solution has an exponentially growing and an exponentially
1026
+ depleting part.
1027
+ In the search of a solution it is found that when the q-field and the mass function approach their asymptotic
1028
+ values they leave them again after some critical value. This can not be avoided and is an artifact of the numerical
1029
+ approximation. It induces a non-vanishing coefficient c2 and therefore exponential growth due to numerical uncer-
1030
+ tainty. Therefore the exponentially depleting part is fitted onto the functions q, q′ and m after they tend to change
1031
+ very slowly by approaching their asymptotic values. This fitting of the free parameter c1 takes place at those radial
1032
+ coordinate values where the relative error plots end. At this point δq(r)
1033
+ qeq , m(∞)−m(r)
1034
+ m(∞)
1035
+ , nhf(r) ≪ 1 hold.
1036
+ We now turn to the near horizon region. We search for solutions regular at the horizon by imposing limr→rh q′′(r) <
1037
+ ∞. The third Einstein equation as well as the assumptions of the existence of an event horizon and of asymptotic
1038
+ flatness then reduce the freedom of the boundary conditions of q, q′ and m to one parameter. This parameter may
1039
+ be declared as the horizon radius.
1040
+ After fixing the scalar field potential parameters and thereby the theory, the
1041
+ space of solutions is one dimensional and parameterized by rh as is Schwarzschild spacetime. Up to one degree of
1042
+ freedom, the boundary values are known at the horizon. The event horizon condition h(r) = 0 on the one hand and
1043
+ limr→rh q′′(r) < ∞ on the other hand imply
1044
+ m(rh) = rh
1045
+ 2 ,
1046
+ q′(rh) = rh
1047
+
1048
+ dq
1049
+ (q(rh))
1050
+ (1 − 8πr2
1051
+ hρ(q(rh))) .
1052
+ (66)
1053
+
1054
+ 12
1055
+ Figure 3. A representative SHBH solution for q-theory inside the event horizon is shown for a horizon radius of rh = 1, q-field
1056
+ potential parameters λ = 1 and qeq = 0.158, a grid size of 106 and shift parameter ϵ = 10−6.
1057
+ The remaining freedom then resides in the value of q(rh). It is adjusted so as to yield ("shoot" towards) an asymptot-
1058
+ ically flat solution and therefore termed shooting parameter. By choosing it more and more accurately the approach
1059
+ of q, q′ and m to their asymptotic values may be improved. This suggests that there exists exactly one shooting pa-
1060
+ rameter which is appropriate for ensuring asymptotic flatness. We can only approach it to within a certain numerical
1061
+ accuracy. As soon as the solutions to the first and third Einstein equations are obtained, the horizon values of E(r)
1062
+ and δ(r) may be deduced by integration of the second Einstein equation. They are given by
1063
+ E(rh) = ((1 + 2E(∞)) exp(
1064
+ � ∞
1065
+ rh
1066
+ r(q′(r))2dr) − 1)/2,
1067
+ δ(rh) = −˜δ(rh, ∞).
1068
+ (67)
1069
+ The singular behaviour of the third Einstein equation at r = rh is avoided by the prescription r → r(1 + iϵ). We call
1070
+ ϵ the shift parameter and choose it such that 0 < ϵ ≪ 1. The quantities plotted in Fig. (2) are then understood as
1071
+ the real parts of the functions of the (total, complex valued) solution. The accuracy of the numerical calculations due
1072
+ to finiteness of grid size as well as shift parameter is analyzed in Appendix B.
1073
+ B.
1074
+ Inside the event horizon
1075
+ In extension of the plots of Fig. 2, the solution for a horizon radius of rh = 1, q-field potential parameters λ = 1
1076
+ and qeq = 0.158, a grid size of 106 and shift parameter ϵ = 10−6 is shown in Fig. 3 for the region inside the event
1077
+ horizon. In distinction to the corresponding figure for the outside region the lowermost plot on the right hand side
1078
+ highlights the energy function. The relative error size remains below 10−5 for all of the functions q′, q′′ and m′. The
1079
+ peaks mark again those radial coordinate values where the grid size changes abruptly. Close to the event horizon it
1080
+ has been chosen smaller as in the case of the region outside the event horizon. Of interest is the behaviour in the limit
1081
+ where the radial coordinate tends to zero. The solution is found to be singular in the q-field in this limit. The mass
1082
+ function, in contrary, tends to a constant value of about limr→0 m(r) = 0.503. An expansion of the third Einstein
1083
+
1084
+ q-field
1085
+ potential and kinetic energy densities versus q
1086
+ 0.19B
1087
+ 40
1088
+ 0.200
1089
+ V(r) vs. T(r vs. q'(r)
1090
+ log 1o(T(r)
1091
+ log 1o(V(r)
1092
+ 0.202
1093
+
1094
+ 0.204
1095
+ 0.206
1096
+ 0.20B
1097
+ 10
1098
+ .210
1099
+ 5
1100
+ 4
1101
+ -2
1102
+ L-
1103
+ 4
1104
+ -2
1105
+ 0
1106
+ logia(r/rh?
1107
+ Iogia(rfrh)
1108
+ evolution of the mass function
1109
+ metric-functions
1110
+ 0.504
1111
+ log 1o(h(r)
1112
+ EOS'0
1113
+ 4
1114
+ 2
1115
+ 0.502
1116
+ (sjuu
1117
+ 0
1118
+ 0.501
1119
+ azis
1120
+ 0.50
1121
+ 4
1122
+ 0.499
1123
+ 6
1124
+ + 60
1125
+ 5
1126
+ -4
1127
+ E-
1128
+ -2
1129
+ -1
1130
+ 4
1131
+ E-
1132
+ -2
1133
+ -1
1134
+ logia(r/rh?
1135
+ logia(rfrn)
1136
+ relabive ermor of the q-field solution
1137
+ energy function
1138
+ 0
1139
+ fogia of the relative error
1140
+ f.n.d.,5-p.s.m. for q
1141
+ 2
1142
+ f.n.d.,5-p.s.m. for q
1143
+ f.n.d.,5-p.s.m. for m
1144
+ Jogia(E(r) - E(rh))
1145
+ 6
1146
+ 9-
1147
+ ot-
1148
+ -12
1149
+ 714
1150
+ -16
1151
+ -3
1152
+ 4
1153
+ E-
1154
+ -2
1155
+ -1
1156
+ -
1157
+ logia(r/rh?
1158
+ Iogia(rfrh?13
1159
+ Figure 4. The Kretschmann invariant for a representative SHBH solution for q-theory inside and outside the event horizon is
1160
+ shown for a horizon radius of rh = 1, q-field potential parameters λ = 1 and qeq = 0.158, a grid size of 106 and shift parameter
1161
+ ϵ = 10−6.
1162
+ equation for r ≪ 1 yields the approximate equation
1163
+ q′′ = −q′
1164
+ r
1165
+ (68)
1166
+ with solution
1167
+ q(r) = d1 log10(r) + d2.
1168
+ (69)
1169
+ It is found that d1 = 0.0010±0.0001 and d2 = −0.2010±0.0001 by a straight line fit. This implies the approximations
1170
+ F(r) ≈ ln(1 + 2E(rh)) + 8π
1171
+ � rh
1172
+ r0
1173
+ r(q′(r))2dr + 8πd2
1174
+ 1(ln(r0) − ln(r))
1175
+ (70)
1176
+ = C + 8πd2
1177
+ 1ln(1
1178
+ r )
1179
+ ⇔ E(r) ≈ exp(C)
1180
+ 2
1181
+ r−8πd2
1182
+ 1 − 1
1183
+ 2
1184
+ δ(r) ≈ δ(rh) −
1185
+ � rh
1186
+ r0
1187
+ 4πr(q′(r))2dr − 4πd2
1188
+ 1(ln(r0) − ln(r))
1189
+ (71)
1190
+ = D − 4πd2
1191
+ 1ln(1
1192
+ r ) ⇔ exp(2δ(r)) ≈ exp(2D)r8πd2
1193
+ 1,
1194
+ h(r) ≈ 1 − 2m(0)
1195
+ r
1196
+ (72)
1197
+ for r < r0 ≪ 1 with for the further discussion irrelevant constants C and D. Consequently the limits
1198
+ lim
1199
+ r→0 q(r) = −∞,
1200
+ lim
1201
+ r→0 q′(r) = ∞
1202
+ (73)
1203
+ for the q-field and its derivative and
1204
+ lim
1205
+ r→0 E(r) = ∞,
1206
+ lim
1207
+ r→0 h(r) = −∞,
1208
+ lim
1209
+ r→0 δ(r) = −∞
1210
+ (74)
1211
+ for the metric functions follow. Since d1 ≪
1212
+ 1
1213
+
1214
+ 8π, E(r) and exp(2δ(r)) vary very slowly as compared to h(r). Therefore
1215
+ the behavior of the metric as r → 0 will asymptote that of Schwarzschild spacetime. Especially, very close to the
1216
+ center the energy density will change sign again and becomes positive. The metric can not be continued to the radial
1217
+ coordinate origin. There is a curvature singularity in the limit r → 0 as is well known for Schwarzschild spacetime.
1218
+ The Kretschmann invariants for q-theory and Schwarzschild spacetime are shown in Fig. (4). While they differ visibly
1219
+ asymptotically far from the horizon where both tend to zero, they show the same
1220
+ 1
1221
+ r6 -divergence as r → 0.
1222
+ After discussing one solution in detail we proceed with a local scan of the space of solutions around that just
1223
+ presented. Both grid size and shift parameter will no longer be mentioned from now on and chosen to be very large
1224
+ in the former case and negligibly small in the latter as has been done within this section.
1225
+
1226
+ Kretschmann invariant
1227
+ 30
1228
+ K5chaz(r)
1229
+ 25
1230
+ 21
1231
+ ((u)xjDTbo)
1232
+ 15
1233
+ 1
1234
+ 5 -
1235
+ 5-
1236
+ -10
1237
+ E-
1238
+ -2
1239
+ -1
1240
+ 1
1241
+ fogia(rfrh?14
1242
+ VI.
1243
+ The parameter space of SHBH solutions for q-theory
1244
+ The qualitative features of the representative solution presented in the previous section are common to all SHBH
1245
+ solutions in q-theory. The space of solutions is parametrized by the horizon radius rh as well as the q-field potential
1246
+ parameters λ and qeq (or as well a). In order to understand the differences between solutions we perform a local
1247
+ scan around the representative solution in the space of solutions and extract different quantities for each individual
1248
+ solution, in part in analogy with [29, 36].
1249
+ The ADM mass of a (static and spherically symmetric) solution is given by
1250
+ MADM(rh, λ, qeq) = lim
1251
+ r→∞ mrh,λ,qeq(r).
1252
+ (75)
1253
+ We decompose it into two contributions
1254
+ MADM(rh, λ, qeq) = M Schwarz
1255
+ ADM
1256
+ (rh) + Mhair(rh, λ, qeq).
1257
+ (76)
1258
+ The first contribution is the mass parameter of a Schwarzschild black hole of horizon radius rh, M Schwarz
1259
+ ADM
1260
+ (rh) = rh
1261
+ 2 .
1262
+ It is independent of the scalar field potential parameters, as it describes a (static and spherically symmetric) black
1263
+ hole in vacuum. The dressing by the non-constant q-field outside the event horizon yields the non-vanishing additional
1264
+ contribution
1265
+ Mhair(rh, λ, qeq) = −
1266
+ � ∞
1267
+ rh
1268
+ 4πr2T t
1269
+ tdr
1270
+ (77)
1271
+ =
1272
+ � ∞
1273
+ rh
1274
+ 4πr2(ρ(q(r)) + 1
1275
+ 2h(r)(q′(r))2)dr.
1276
+ (78)
1277
+ Further quantities of interest are the shooting parameter as well as the radial coordinate location relative to rh and
1278
+ absolute depth of the global minimum of the mass function as functions of the parameters of the space of solutions.
1279
+ The relative radial coordinate location of the global minimum of the mass function is important insofar as it marks
1280
+ the region where both the q-field and the mass function vary significantly.
1281
+ A.
1282
+ Dependence on the horizon radius
1283
+ Fig. 5 illustrates the characteristic quantities introduced above for a horizon radius range 10−3 < rh < 103 and scalar
1284
+ field potential parameters coincident with those of the representative solution presented in section V. The lower limit
1285
+ has been chosen such that the asymptotic dependence on rh is visible. The upper bound is due to lack of precision of
1286
+ fitting the asymptotic part of the q-field and mass function. The asymptotic plateau becomes difficult to identify, since
1287
+ both q-field and mass function behave less and less smooth in the fitting region. The asymptotics for large horizon
1288
+ radii seem to be deducible from the plots as well, though. We will assume that the plots show the true asymptotics
1289
+ in both extreme situations rh ≪ 1 and rh ≫ 1.
1290
+ We may then draw the following conclusions:
1291
+ 1) The shooting parameter qshoot(rh) = q(rh) varies significantly. Its asymptotic values are limrh→0 qshoot(rh) =
1292
+ 0.913qmin and limrh→∞ qshoot(rh) = 0.500qmin, respectively.
1293
+ 2) For rh ≪ 1 the ADM mass and scalar hair mass converge towards the value
1294
+ limrh→0 log10(MADM(rh)), log10(Mscalar hair(rh)) = 0.817. For rh ≫ 1 both ADM mass and scalar hair mass
1295
+ increase linearly with the horizon radius and may be parameterized by
1296
+ log10(MADM(rh)) = c1 log10(rh) + c2
1297
+ (79)
1298
+ log10(Mscalar hair(rh)) = c3 log10(rh) + c4
1299
+ (80)
1300
+ with c1 = 1.0031 ± 0.0001, c2 = −0.1985 ± 0.0001, c3 = 1.0136 ± 0.0001 and c4 = −0.8747 ± 0.0001 obtained
1301
+ by a straight line fit. The q-theory ADM mass is a monotonically increasing function of the horizon radius and
1302
+ everywhere larger than the corresponding Schwarzschild spacetime ADM mass (which coincides with the mass
1303
+ parameter).
1304
+ 3) The region outside the event horizon where the q-field and mass function vary significantly approaches the event
1305
+ horizon relative to its size for rh ≫ 1. So it seems that in this regime the q-field behaves non-trivially only just
1306
+
1307
+ 15
1308
+ Figure 5. The variation of several characteristic quantities of SHBH solutions for q-theory with respect to the horizon radius
1309
+ rh is shown for the q-field potential parameters λ = 1 and qeq = 0.158. These quantities include shooting parameter, ADM
1310
+ mass, scalar-hair mass, relative location of the global minimum of the mass function as well as the absolute value of the global
1311
+ minimum of the mass function.
1312
+ outside the horizon and relaxes to its equilibrium value very quickly in the near horizon regime. This region of
1313
+ significant change does not approach the horizon infinitely close but relaxes to the value
1314
+ limrh→∞ rmin(rh)/rh = 1 + e−0.916 = 1.400.
1315
+ In the opposite limit rh ≪ 1 the region of significant change of both q-field and mass function gets pushed
1316
+ further and further away from the horizon region. This implies that for the very limit rh → 0 no scalar soliton
1317
+ (scalaron) exists (contrary to the conclusions drawn in [29]). Rather the q-field remains constant outside the
1318
+ event horizon with a value of qshoot(0) = limrh→0 qshooot(rh) = 0.913qmin. The corresponding energy density is
1319
+ negative resulting in a Schwarzschild-anti de Sitter spacetime with cosmological constant Λ = 8πGρ(qshoot(0)).
1320
+ 4) The size of the global minimum of the mass function converges to a constant for rh ≪ 1 with value
1321
+ limrh→0 log10(−min(m)(rh)) = 1.125.
1322
+ For rh ≫ 1 it decreases linearly and faster than the negative ADM
1323
+ mass. It may be parametrized by
1324
+ log10((−min(m)(rh)) = d1 log10(rh) + d2
1325
+ (81)
1326
+ with d1 = 3.0268 ± 0.0001 and d2 = −3.5790 ± 0.0002.
1327
+ B.
1328
+ Dependence on the parameters of the scalar field potential
1329
+ We now consider changes in the scalar field potential parameters. The effect of a variation of the scalar field potential
1330
+ parameter λ for a horizon radius range
1331
+ 1
1332
+ 10 ≤ rh ≤ 10 and fixed scalar field potential parameter qeq = 0.158 for the
1333
+ characteristic functions presented previously in Fig. (5) is visualized in Fig. (6). The radial parameters and masses
1334
+ have been rescaled in a particular way following [29]. It can be seen that the rescaled quantities seem to depend only
1335
+
1336
+ value of the shooting parameter
1337
+ ADM-massoftheblackholesolution
1338
+ 0.9
1339
+ 2
1340
+ MSchwa2
1341
+ 0.B
1342
+ 1
1343
+ 0
1344
+ 0.7
1345
+ -1
1346
+ 0.6
1347
+ -2
1348
+ -3
1349
+ 0.5
1350
+ -2
1351
+ -1
1352
+ 0
1353
+ i
1354
+ 2
1355
+ 3
1356
+ E-
1357
+ -2
1358
+ -1
1359
+ 0
1360
+ i
1361
+ 2
1362
+ 3
1363
+ Iogia(rh)
1364
+ fogia(rh)
1365
+ relative location of the global minmum of m
1366
+ global minimum of m(rh)
1367
+ log 1o(rmin/rn)
1368
+ log 1o(rmin rn)/rn)
1369
+ Jogia(Fmin/rh) vs. Jogia(Fmin - Fh)/rh)
1370
+ 5 -
1371
+ 3
1372
+ logia(-min(m(rh)))
1373
+ 3
1374
+ 1
1375
+ 2
1376
+ 0
1377
+ 1
1378
+ -1
1379
+ 0 1
1380
+ E-
1381
+ -2
1382
+ -1
1383
+ 0
1384
+ 1
1385
+ 2
1386
+ 3
1387
+ E-
1388
+ -2
1389
+ -1
1390
+ 0
1391
+ 1
1392
+ 2
1393
+ 3
1394
+ logia(rh?
1395
+ Iogia(rh?16
1396
+ Figure 6. The variation of several characteristic quantities of SHBH solutions for q-theory with respect to the scalar field
1397
+ potential parameter λ is shown for a horizon radius of rh = 1 and remaining q-field potential parameter qeq = 0.158. These
1398
+ quantities include shooting parameter, ADM mass, scalar-hair mass, relative location of the global minimum of the mass
1399
+ function as well as absolute value of the global minimum of the mass function.
1400
+ on two instead of three parameters. To be more precise about the parameter dependencies define
1401
+ �rh =
1402
+
1403
+ λrh,
1404
+
1405
+ rmin =
1406
+
1407
+ λrmin,
1408
+ ˆ
1409
+ MADM =
1410
+
1411
+ λMADM,
1412
+
1413
+ min(m) =
1414
+
1415
+ λmin(m).
1416
+ (82)
1417
+ It then follows that
1418
+
1419
+ rmin = 1,
1420
+ ˆ
1421
+ MADM = ˆ
1422
+ MADM( �rh, qeq),
1423
+
1424
+ min(m) =
1425
+
1426
+ min(m)( �rh, qeq).
1427
+ (83)
1428
+ The effect of a variation of the scalar field potential parameter qeq for a horizon radius range
1429
+ 1
1430
+ 10 ≤ rh ≤ 10 and fixed
1431
+ scalar field potential parameter λ = 1 for the characteristic functions presented previously is visualized in Fig. (7).
1432
+ As qeq increases, the potential wells of the scalar field potential recede from each other and become more pronounced.
1433
+ All quantities (with minor exceptions) seem to be monotonically growing (monotonically decreasing in the case of
1434
+ the negative valued quantity min(m)) with qeq. The dependence of the different characteristic quantities of SHBH
1435
+ solutions on qeq is not so easily deducible. Nevertheless it seems that, with exception of large horizon radius values,
1436
+ the dependence on qeq may be factorized from that on �rh.
1437
+ The local scan of the parameter space of solutions has revealed that the space of solutions is effectively only two
1438
+ dimensional with the dependence on the two parameters factorizing by a monotonically increasing function of qeq to
1439
+ good approximation within the represented parameter space area.
1440
+ The topic of the following section will be a stability analysis of SHBH solutions due to perturbations of the q-field
1441
+ solution.
1442
+ VII.
1443
+ Stability of the SHBH solutions
1444
+ An important question to ask is whether SHBHs are stable. Do perturbation modes of the q-field and the metric
1445
+ which grow exponentially in the SHBH spacetime of our q-theory model exist? The question of classical instability
1446
+
1447
+ value of the shooting parameter
1448
+ ADM-massoftheblackholesolution
1449
+ 0.95
1450
+ 14
1451
+ 入=4
1452
+ ^=1
1453
+ 13
1454
+ ^=1
1455
+ 0.50
1456
+ 12
1457
+ 0.B5
1458
+ (4)o%b
1459
+ 0.B0
1460
+ 1f
1461
+ ●入=4
1462
+ ^=1
1463
+ 0.75
1464
+ 入=1
1465
+ 8:
1466
+ 入=
1467
+ 0.70 -
1468
+ 2.0
1469
+ 1.5
1470
+ -1.0
1471
+ 0.5
1472
+ 0.0
1473
+ 0.5
1474
+ 1'D
1475
+ 2.0
1476
+ 1.5
1477
+ 1.0
1478
+ 0.5
1479
+ 0.D
1480
+ 0.5
1481
+ 1D
1482
+ fogiatVArn)
1483
+ logia(VArn)
1484
+ relative location of the global minimum of m
1485
+ globalminimum ofm.
1486
+ ●^=4
1487
+ -2
1488
+ ●^=4
1489
+ 225
1490
+ + ^=1
1491
+ ← ^=1
1492
+ 入=1
1493
+ 200
1494
+ 4 -
1495
+ 入= 4
1496
+ 175
1497
+ → =2
1498
+ 6
1499
+ 150
1500
+ 125
1501
+ 1D0
1502
+ -10
1503
+ 0.75
1504
+ 0.50
1505
+ -12
1506
+ 0.25
1507
+ 1.00
1508
+ 0.50
1509
+ 0.25
1510
+ o.bo
1511
+ 0.25
1512
+ 0.50
1513
+ 0.75
1514
+ 1D0
1515
+ 2.0
1516
+ 1.5
1517
+ 1.0
1518
+ d.5
1519
+ 0.D
1520
+ 0.5
1521
+ 1'D
1522
+ Iogia(rh?
1523
+ ogia( VArh?17
1524
+ Figure 7. The variation of several characteristic quantities of SHBH solutions for q-theory with respect to the scalar field
1525
+ potential parameter qeq is shown for a horizon radius of rh = 1 and remaining q-field potential parameter λ = 1.
1526
+ These
1527
+ quantities include shooting parameter, ADM mass, scalar-hair mass, relative location of the global minimum of the mass
1528
+ function as well as absolute value of the global minimum of the mass function.
1529
+ has been discussed for spherically symmetric, time dependent perturbations of the metric and scalar field (here the
1530
+ q-field) in [29]. Following a similar notation to that introduced in [29] (see Eqs. (17)-(19) therein) we define the
1531
+ s-wave perturbations by
1532
+ ˜q(t, r) = q(r) + δq(r, t) ,
1533
+ (84)
1534
+ ˜f(r, t) = f(r)(1 − h1(r, t)) ,
1535
+ (85)
1536
+ ˜h(r, t) = h(r)(1 − h2(r, t))
1537
+ (86)
1538
+ in generalized Schwarzschild coordinates. The functions q(r), f(r) and h(r) represent the unperturbed solutions for
1539
+ q-theory in the generalized Schwarzschild coordinates, while δq(r, t), h1(r, t) and h2(r, t) denote small perturbations
1540
+ to the non-perturbed solution. Note that in Eq. (86) h2 is defined as a small correction to h with grr = 1/h in (41),
1541
+ whereas in Eq. (19) in [29] it is defined as a small correction to grr directly with a different sign. The two relations
1542
+ are equivalent, as is easily checked by substituting h(1 − h2) for h in grr = 1/h and then expanding.
1543
+ After linearization of the Einstein equations (45-47) it can be shown that [29]
1544
+ ∂rh1(r, t) = ���rh2(r, t) − 16πr ( ∂r q(r) ) (∂r δq(r)) ,
1545
+ h2(r, t) = 8πr ( ∂r q(r) ) δq(r).
1546
+ (87)
1547
+ As such the metric perturbations are expressible in terms of the q-field perturbation. The latter may be determined
1548
+ by solving a one-dimensional Schrödinger equation of the form [29]
1549
+ � 1
1550
+ 2m(−i∂r∗)2 + V ∗
1551
+ eff(r∗)
1552
+
1553
+ ψ(r∗) =
1554
+ 1
1555
+ 2m(i∂t)2ψ(r∗),
1556
+ dr∗(r)
1557
+ dr
1558
+ = exp(−δ(r))
1559
+ h(r)
1560
+ (88)
1561
+ where ψ(r∗(r)) ≡ rδq(r) and r∗ is the “tortoise” coordinate. The scalar field mass m is obtained as follows. Insert
1562
+ ˜q(t, r) into the action functional and expand in δq(t, r) around q(r). Far away from the event horizon when q(r) is
1563
+ close to its equilibrium value qeq, the kinetic cross terms as well as the linear potential term in δq are negligible and
1564
+
1565
+ value of the shooting parameter
1566
+ ADM-massoftheblackholesolution
1567
+ 22.5
1568
+ 0.98
1569
+
1570
+ 24.0
1571
+ O qeg = 0.223
1572
+ 0.96
1573
+ ★ qeg = 0.193
1574
+ 17.5
1575
+ qeg = 0.173
1576
+ + qeg = 0.158
1577
+ 60
1578
+ 15.0
1579
+ (4.jb
1580
+ (usjnavw
1581
+ qeg = 0.129
1582
+ +qeg=0.112
1583
+ 12.5
1584
+ 0.92
1585
+ 14.0
1586
+ qeg = 0.223
1587
+ 0.90
1588
+ qeg = 0.193
1589
+ qeo = 0.173
1590
+ 7.5
1591
+ qeg = 0.158
1592
+ 0.8 -
1593
+ ★ qeg =0.129
1594
+ 5.D
1595
+ → q= 0.112
1596
+ 1.00
1597
+ 0.50
1598
+ 0.25
1599
+ 0.00
1600
+ 0.25
1601
+ 0.50
1602
+ 0.75
1603
+ LDo
1604
+ 1.00
1605
+ 0.50
1606
+ 0.25
1607
+ 0.0
1608
+ 0.25
1609
+ 0.50
1610
+ 0.75
1611
+ LDO
1612
+ fogia(rh)
1613
+ fogia(rh)
1614
+ relative location of the global minimum of m
1615
+ globalminimumofm.
1616
+ -qeg=0.223
1617
+ 0+
1618
+ 25
1619
+ + qe = 0.193
1620
+ qeg = 0.173
1621
+ → qea = 0.158
1622
+ ★ qeg = 0.129
1623
+ DOT-
1624
+ 2D
1625
+ ← qeg= 0.112
1626
+ Jogia(rmin/rh)
1627
+ O qeg =0.223
1628
+ tusjujuu
1629
+ Qeg = 0.193
1630
+ 200
1631
+ qeg = 0.173
1632
+ 15
1633
+ qea = 0.158
1634
+ ★ qea = 0.129
1635
+ ← qeg=0.112
1636
+ 300
1637
+ 1D
1638
+ 0.5
1639
+ 400
1640
+ 1.00
1641
+ 0.50
1642
+ .25
1643
+ 0.00
1644
+ 0.25
1645
+ 0.50
1646
+ 0.75
1647
+ LDO
1648
+ 1.00
1649
+ 0.50
1650
+ ±.25
1651
+ 0.DO
1652
+ 0.25
1653
+ 0.50
1654
+ 0.75
1655
+ LDO
1656
+ fogia(rh)
1657
+ Iogia(rh?18
1658
+ the action with dynamical field (perturbation) δq has a proper kinetic term with at least quadratic potential terms.
1659
+ The quadratic term yields m in the same way as does the real Klein Gordon action with (self-)interactions. The so
1660
+ obtained value for m reads
1661
+ m =
1662
+
1663
+ d2ρ(q)
1664
+ dq2
1665
+ ������
1666
+ q=qeq
1667
+ =
1668
+
1669
+ 3
1670
+ 2λq2eq.
1671
+ (89)
1672
+ It will formally not be needed in the following but has been introduced in order to provide a properly normalized
1673
+ Schrödinger problem. The effective potential reads [29] (note that the expression for Veff in this work is defined with
1674
+ a factor of
1675
+ 1
1676
+ 2m compared to Eq. (22) in [29])
1677
+ Veff(r∗(r)) =
1678
+ 1
1679
+ 2mh(r) exp(2δ(r))[h(r)
1680
+ r
1681
+ (δ′(r) + h′(r)
1682
+ h
1683
+ )
1684
+ − 8πrh(r)(q′(r))2(δ′(r) + h′(r)
1685
+ h(r) + 1
1686
+ r )
1687
+ + 16πrq′(r)dρ
1688
+ dq (q(r)) + d2ρ
1689
+ dq2 (q(r))].
1690
+ (90)
1691
+ The separation ansatz ψ(r∗(r)) = ξ (r∗(r)) exp
1692
+
1693
+ ±i
1694
+
1695
+ 2mEt
1696
+
1697
+ leads to the following stationary Schrödinger equation
1698
+ for ξ (r∗(r))
1699
+ � 1
1700
+ 2m(−i∂r∗)2 + V ∗
1701
+ eff(r∗)
1702
+
1703
+ ξ(r∗) = Eξ(r∗)
1704
+ (91)
1705
+ with energy eigenvalue E. A sufficient condition for static, spherically symmetric configurations to be unstable [37]
1706
+ is that the differential operator on the left-hand side of (91), is negative in the Hilbert space L2(M), where M is the
1707
+ spacetime manifold on which the metric is defined. Accordingly, a sufficient condition for unstable solutions is the
1708
+ existence of a bound state E < 0 in the Schrödinger problem. In the same manner the existence of bound states
1709
+ that correspond to E < 0 in the Schrödinger problem with potential Veff is equivalent to the existence of unstable
1710
+ perturbations of q-theory solutions. The exponential factor of the perturbation becomes of order unity after a time
1711
+ of order
1712
+ τ =
1713
+ 1
1714
+ √−2mEmin
1715
+ .
1716
+ (92)
1717
+ The subscript min on E signifies the lowest bound state energy which is of most importance for giving the scale of
1718
+ τ (for a discrete and finite bound state spectrum, as is the case here). This time can be seen as the lifetime of the
1719
+ SHBH in the presence of these perturbations.
1720
+ In order to determine the value Emin, the lowest eigenvalue of bound state energies of the effective Schrödinger
1721
+ equation (91), we solve the eigenvalue problem numerically in the variable r for horizon radii in the range 1 ≤ rh ≤ 1000
1722
+ by approximating the equation on a grid of finite size. The differential operator is approximated by a central point
1723
+ stencil method accurate to fourth order of the grid spacing. The Runge Kutta solver shares this level of accuracy.
1724
+ We employ vanishing boundary conditions for the eigenfunctions in the limits r → 0 as well as r → ∞. To get an
1725
+ impression of the shape of the eigenfunction to the eigenvalue Emin, we replace the effective potential, illustrated
1726
+ in Fig. (8) for different horizon radii, by an auxiliary potential. This auxiliary potential is a parabola fitted to the
1727
+ negative potential well of the effective potential in the region shown in red in the figure (where Veff < 0). Outside
1728
+ it is set to zero. This yields a finite depth harmonic oscillator potential. The solutions of the wave equation may be
1729
+ determined exactly in this auxiliary potential. Finding the bound state energy eigenvalues is then identical to the
1730
+ quantum harmonic oscillator except for them being finite in amount, while the eigenfunctions are compromised due
1731
+ to the vanishing of the potential. Nevertheless, as is in concordance with the results in [29], the expectation is that
1732
+ the lowest energy bound state eigenfunction is close to a Gaussian in shape which is the exact eigenfunction in this
1733
+ case for the quantum harmonic oscillator. That this expectation is also fulfilled in our case is illustrated in Fig. (9).
1734
+ We plot the normalized eigenfunctions corresponding to the lowest bound state energy eigenvalues for several horizon
1735
+ radii and scalar field potential parameters λ = 1 and qeq = 0.158. A comparison with Fig. (8) shows that the peaks
1736
+ of the eigenfunctions are situated almost exactly at the minimum of the effective Schrödinger potential. It becomes
1737
+ apparent here and has been observed that for increasing horizon radii the Gaussians loose their shape and tend to
1738
+ disappear. In this regime the lowest eigenvalues approach zero very quickly from below. This inspires the conclusion
1739
+
1740
+ 19
1741
+ Figure 8. The effective potential of the scalar perturbation mode ξ(r∗) is shown for different horizon radii and scalar field
1742
+ potential parameters λ = 1 and qeq = 0.158. It comprises a negative valued well where the wave function of bound states are
1743
+ predominantly located. The well is highlighted in red. A zoom makes this region visible for the horizon radii rh = 100 and
1744
+ rh = 1000.
1745
+ Figure 9. Normalized eigenfunction solutions to the lowest bound state eigenvalue for the scalar perturbation mode ξ(r∗) are
1746
+ shown for different horizon radii and scalar field potential parameters λ = 1 and qeq = 0.158. They are almost perfect Gaussians
1747
+ in shape which is the case for the quantum harmonic oscillator.
1748
+ that large SHBHs are indeed stable and opposes that found in [29]. In Fig. (10) the lifetime τ = τ(rh) of SHBHs
1749
+ as a function of the horizon radius and scalar field potential parameters λ = 1 and qeq = 0.158 is shown. We fit the
1750
+ obtained lifetimes τ = τ(rh) corresponding to the solutions for the lowest eigenvalues e = e(rh) to the function
1751
+ f(rh) = a · (log10(rh))ntan(c · log10(rh) − b) + d
1752
+ (93)
1753
+ parameterized by the scale parameters a and c, the horizontal shift parameter b, the vertical shift parameter d and
1754
+ the power parameter n with optimal parameters popt and covariance matrix pcov given by
1755
+ popt =
1756
+
1757
+
1758
+
1759
+
1760
+
1761
+ a
1762
+ b
1763
+ c
1764
+ d
1765
+ n
1766
+
1767
+
1768
+
1769
+
1770
+ � =
1771
+
1772
+
1773
+
1774
+
1775
+
1776
+ 1.53
1777
+ 1.14
1778
+ 1.73
1779
+ 5.31
1780
+ 1.23
1781
+
1782
+
1783
+
1784
+
1785
+ � ,
1786
+ pcov =
1787
+
1788
+
1789
+
1790
+
1791
+
1792
+ 0.044
1793
+ 0.082 0.053 0.037 −0.007
1794
+ 0.081
1795
+ 0.179 0.115 0.085
1796
+ 0.014
1797
+ 0.053
1798
+ 0.115 0.074 0.055
1799
+ 0.009
1800
+ 0.037
1801
+ 0.085 0.055 0.043
1802
+ 0.010
1803
+ −0.007 0.014 0.009 0.010
1804
+ 0.028
1805
+
1806
+
1807
+
1808
+
1809
+ � .
1810
+ (94)
1811
+ The lifetime then becomes infinite at the finite horizon radius r0
1812
+ h = π+2b
1813
+ 2c
1814
+ and the SHBHs are therefore stable beyond
1815
+ the threshold r0
1816
+ h for the chosen scalar field potential parameters.
1817
+
1818
+ effective Schrodinger potential for the q-field perturbation
1819
+ 0.125
1820
+ 0.002
1821
+ (u)"PA
1822
+ 000'0
1823
+ 0.05
1824
+ 0.002
1825
+ 0.025
1826
+ 0.105
1827
+ 0.110
1828
+ 0.115
1829
+ log 1o(r/rn)
1830
+ 0.00
1831
+ rn = 1
1832
+ In = 5
1833
+ .025
1834
+ F = 10
1835
+ Tn = 25
1836
+ .050
1837
+ rn = 100
1838
+ rn= 1000
1839
+ 0.0
1840
+ 0.5
1841
+ 1D
1842
+ 15
1843
+ 2D
1844
+ 25
1845
+ 3.D
1846
+ fogia(rtrh)eigenfunctionwith corresponding eigenvalue E-E
1847
+ 0.6
1848
+ T = 1
1849
+ - rh= 5
1850
+ 0.5
1851
+ - rn = 25
1852
+ .
1853
+ 0.4
1854
+ !!
1855
+ tts)*
1856
+ *3
1857
+ 0.3
1858
+ !!
1859
+ :1
1860
+ 0.2
1861
+ 0.1
1862
+ 0.D .
1863
+ 0.D
1864
+ 0.5
1865
+ LD
1866
+ 15
1867
+ 20
1868
+ 25
1869
+ 3.D
1870
+ logia(r/rn?20
1871
+ Figure 10. The lifetime of SHBHs due to s-wave q-field and metric perturbations represented by the scalar perturbation mode
1872
+ ξ(r∗) is shown as a function of the horizon radius with scalar field potential parameters λ = 1 and qeq = 0.158. The lifetime is
1873
+ finite for small SHBHs below a certain radius or mass threshold value, whereas SHBHs are stable beyond this threshold. The
1874
+ threshold is highlighted in red.
1875
+ The stability analysis has revealed that SHBH are unstable due to classical s-wave perturbations of both the q-
1876
+ field and the metric below a certain size or equivalently mass threshold and stable beyond (at least for the chosen
1877
+ parameters).
1878
+ VIII.
1879
+ Conclusion
1880
+ In the present paper we consider q-theory comprising a scalar field q minimally coupled to gravity.
1881
+ The q-field
1882
+ describes a dynamical gravitating vacuum. According to the estimates proposed in [24], this theory may contain BH
1883
+ solutions that resemble that of a gravastar, i.e. a configuration with energy concentrated inside a thin spherical shell.
1884
+ Contrary to the conventional gravastar, the state proposed in [24] contains an event horizon. Using direct numerical
1885
+ calculations, we confirm the existence of similar BH configurations, with some reservations, though. Namely, inside
1886
+ the event horizon space - time resembles the interior of the Schwarzschild BH, and does not contain the de Sitter - like
1887
+ domain. Besides, the mentioned thin shell is located outside the event horizon, not inside. Furthermore, there should
1888
+ exist a region in space, where the energy density is negative. This is required to satisfy the “no-hair” theorems. As
1889
+ a result, the thin shell situated just outside of the horizon contains both a piece of negative energy and a piece with
1890
+ positive energy density. The integration of the energy density inside the shell yields a total positive energy resulting
1891
+ in the ADM mass perceived by the distant observer.
1892
+ According to Eq. (30) the energy density is proportional to the derivative of the mass function m(r). The latter
1893
+ function is represented within Fig. 2. One can see that for the given example solution, the spherical shell of finite
1894
+ thickness exists and is situated just outside the horizon. Inside this shell the essential variation of m(r) is localized.
1895
+ Close to but outside the event horizon, the energy density is negative, then it passes through zero, and becomes
1896
+ positive in the second piece of the shell. The shell ends where m(r) exponentially approaches its asymptotic value,
1897
+ the constant that represents the black hole mass seen by the infinitely distant observer.
1898
+ The results of section VI demonstrate that the spherical shell approaches the horizon relative to its size when the
1899
+ horizon radius is increased. In the limit of very large BHs, virtually the entire energy due to the q-field is localized
1900
+ in the thin shell situated outside the horizon and close to it. It does not approach the event horizon ifinitely close,
1901
+ but stops, such that the energy density sign transition is positioned around 7
1902
+ 5rh, where rh denotes the event horizon
1903
+ radius.
1904
+ A stability analysis with respect to the s-wave metric and q-field perturbations shows that the BH solutions of the
1905
+ type considered in the present paper may be classically unstable . However, the corresponding configurations are
1906
+ stable for sufficiently large BHs. We therefore claim that stable heavy SHBHs do exist.
1907
+ We do not discuss here questions related to the stability of the considered configurations on the quantum level.
1908
+ This issue remains outside of the scope of the present paper.
1909
+ In conclusion, in this work we confirm the supposition of [24] about the existence of BH solutions in q-theory that
1910
+ look similar to gravastars. These states escape the conditions of the no-hair theorem, due to the region in space with
1911
+ negative energy density. At spatial infinity these solutions approach the Schwarzschild solution, but differ from it
1912
+
1913
+ lifetime of aSHBH duetoperturbations
1914
+ 120
1915
+ fit
1916
+ threshold
1917
+ data
1918
+ 140
1919
+ 8+
1920
+ 40
1921
+ 24
1922
+ 0.+
1923
+ 0.D
1924
+ 0.5
1925
+ 1b
1926
+ 15
1927
+ 2D
1928
+ 25
1929
+ 3.D
1930
+ logiatrh?21
1931
+ Figure 11. The effect of different choices of E(∞) on the SHBH solution for q-theory outside the event horizon is shown for a
1932
+ horizon radius of rh = 1, q-field potential parameters λ = 1 and qeq = 0.158, a grid size of 106 and shift parameter ϵ = 10−6.
1933
+ The inward and outward massless particle velocities are shown for both Schwarzschild spacetime and q-theory spacetime with
1934
+ Schwarzschild mass parameter M = mq−theory(rh).
1935
+ essentially close to the horizon. Inside the horizon, the vacuum density is negative and changes sign very close to the
1936
+ center. The singularity of curvature at r = 0 is the same as that of the Schwarzschild solution.
1937
+ The authors are grateful to G.E.Volovik for the proposition to consider the given problem, and for useful discussions
1938
+ during the initial stage of the work.
1939
+ Appendix A. Test particle characteristics.
1940
+ We discuss here the properties of test particles contained in the free parameter E(∞) = limr→∞ E(r). It is related
1941
+ to the total energy per unit rest mass of a test particle e by E(∞) = (e2 − 1)/2 which moves towards the SHBH
1942
+ horizon starting at infinity with initial velocity v(∞) =
1943
+
1944
+ 2E(∞) where v(∞) = limr→∞ v(r). Different values for
1945
+ E(∞) correspond to different initial kinetic energies of a test particle. The choice E(∞) = 0 corresponds to a particle
1946
+ at rest, while E(∞) > 0 corresponds to a particle initially moving towards the SHBH. E(∞) < 0 is not possible, since
1947
+ then v(r) would become imaginary while approaching asymptotically flat infinity. The motivation for the introduction
1948
+ of generalized Painlevé-Gullstrand coordinates as well as their relation to test particle motion are presented in more
1949
+ detail in [34].
1950
+ The numerical solution presented in Fig. 2 for different initial values of the free parameter E(∞) is shown in Fig. 11.
1951
+ The function E(r) is monotonically decreasing with r as is v(r) in q-theory, whereas E(r) is constant for Schwarzschild
1952
+ spacetime while v(r) is also decreasing. This is in concordance with the increase of the kinetic energy of a test particle
1953
+ as it moves towards the event horizon of the black hole. The inward and outward velocities of a massless particle
1954
+ ( dr
1955
+ dt )in/out are monotonically increasing with r, as the gravitational pull of the black hole decreases by further recession
1956
+ from the horizon. This is true for both Schwarzschild and q-theory spacetime with one exception in q-theory. In the
1957
+ region of large change of the q-field the velocity of outward moving massless particles has a small dip before increasing
1958
+ again. In this region the energy density of the q-field becomes positive. As expected, the outward motion tends to
1959
+
1960
+ energy function
1961
+ velocity function
1962
+ 3.5
1963
+ 6
1964
+ E() = 0
1965
+ E() = 0
1966
+ 3.D
1967
+ E(∞) = 0.01
1968
+ E() = 0.01
1969
+ E(∞) = 0.05
1970
+ 5
1971
+ E() = 0.05
1972
+ 25
1973
+ E() = 0.1
1974
+ E() = 0.1
1975
+ +2E(r)
1976
+ E() = 0.5
1977
+ .
1978
+ E() = 0.5
1979
+ 2D
1980
+ E(∞) = 1
1981
+ - E(∞) = 1
1982
+ foge(1
1983
+ 15
1984
+ LD
1985
+ 2 -
1986
+ 0.5 -
1987
+ 1 -
1988
+ 00
1989
+ 0 +
1990
+ 0.D
1991
+ 0.5
1992
+ 15
1993
+ 2D
1994
+ 25
1995
+ 3.0
1996
+ 0.D
1997
+ 0.5
1998
+ 15
1999
+ 2D
2000
+ 25
2001
+ 3.D
2002
+ Iogia(rfrh?
2003
+ logia(r/rh?
2004
+ massless particle outward velocity (Schwarzschild)
2005
+ massless particle inward velocity (Schwarzschild)
2006
+ LD
2007
+ 1.0
2008
+ 0.B
2009
+ 1.5
2010
+ 0.6
2011
+ E(∞) = 0
2012
+ 2.0
2013
+ E(∞) = 0.01
2014
+ 0.4
2015
+ E() = 0.05
2016
+ E(∞) = 0.1
2017
+ E(o) = 0
2018
+ 2.5
2019
+ E(∞) = 0.5
2020
+ 0.2
2021
+ E() = 0.01
2022
+ E() = 1
2023
+ E() = 0.05
2024
+ E() = 0.1
2025
+ 3.0
2026
+ 0.D
2027
+ E(∞) = 0.5
2028
+ E(∞) = 1
2029
+ 0.2
2030
+ 3.5
2031
+ 0.D
2032
+ 0.5
2033
+ 15
2034
+ 2D
2035
+ 25
2036
+ 3.D
2037
+ 0.0
2038
+ 0.5
2039
+ 1D
2040
+ 15
2041
+ 2D
2042
+ 25
2043
+ 3.D
2044
+ Iogia(rfrh)
2045
+ Iogia(rfrh)
2046
+ massless particle outward velocity (q-theory)
2047
+ massless particle inward velocity (g-theory)
2048
+ LD
2049
+ E() = 0
2050
+ E() = 0
2051
+ 0.B
2052
+ E(∞) = 0.01
2053
+ E() = 0.01
2054
+ E() = 0.05
2055
+ E(∞) = 0.05
2056
+ E(∞) = 0.1
2057
+ E(∞) = 0.1
2058
+ 0.6
2059
+ E() = 0.5
2060
+ E(∞) = 0.5
2061
+ E(∞) = 1
2062
+ E(∞) = 1
2063
+ 0.4
2064
+ 0.2
2065
+
2066
+ 0.0
2067
+ -10
2068
+ 0.2
2069
+ 0.0
2070
+ 0.5
2071
+ 15
2072
+ 2D
2073
+ 25
2074
+ 3.D
2075
+ 0.0
2076
+ 0.5
2077
+ LD
2078
+ 15
2079
+ 2D
2080
+ 25
2081
+ 3.D
2082
+ Iogia(rfrh)
2083
+ logia(rfrh)22
2084
+ Figure 12. The effect of different shift parameters on SHBH solutions for q-theory outside the event horizon is shown for a
2085
+ horizon radius of rh = 1, q-field potential parameters λ = 1 and qeq = 0.158 and a grid size of 106.
2086
+ zero as the event horizon is approached. We chose the Schwarzschild mass parameter M = mq−theory(rh). Choosing
2087
+ M = mq−theory(∞) instead would have implied that the graphs for ( dr
2088
+ dt )out in the Schwarzschild case cross zero
2089
+ already outside the event horizon as set by q-theory. Close to the event horizon both inward and outward massless
2090
+ particle velocities are smaller for q-theory spacetime as compared to Schwarzschild spacetime. This suggests that
2091
+ black hole absorptivity is greater for q-theory spacetime as compared to Schwarzschild spacetime.
2092
+ Appendix B. Accuracy estimates.
2093
+ The numerical solution presented in Fig. (2) is approximate both because of finite grid size and finite shift parameter.
2094
+ The solution with rh = 1 and q-field potential parameters λ = 1 and qeq = 0.158 is analyzed in Fig. (12) and Fig.
2095
+ (13) with respect to variations of the shift parameter and grid size, respectively.
2096
+ The plots in (12) show that absolute differences of q-fields and mass functions for different neighboring shift parameters
2097
+ ϵ are almost exactly coincident with the absolute size of the imaginary part of the q-fields and mass functions for
2098
+ the larger shift parameter present in the corresponding absolute difference plots. The maximal value of the absolute
2099
+ size of the imaginary parts of the represented q-fields and mass functions shrinks by one order of magnitude for each
2100
+ decrease of the shift parameter by one order of magnitude as expected. It is about two order of magnitude smaller
2101
+ than the shift parameter for the q-fields and about one order of magnitude larger than that of the shift parameter
2102
+ for the mass functions, though. We choose a shift parameter of ϵ = 10−6 in most of our plots, as it is seen to be
2103
+ negligibly small to have any effect. The same choice argument will be applied for the grid size to which we now turn.
2104
+ The plots in (13) show the absolute differences of q-fields and mass functions for different neighboring grid sizes as well
2105
+ as relative error estimates for the functions q′, q′′ and m′ analogous to the lowermost left plot in Fig. (2) for different
2106
+ grid sizes. The expectation that the differences between the q-fields and mass functions as well as the error estimates
2107
+ decrease with increasing grid size are fulfilled. The differences of the q-fields and mass function decrease by about
2108
+ one order of magnitude for a grid size increase of one order of magnitude. The error estimates are comparable for
2109
+ the different grid sizes close to the horizon. This indicates that no mayor improvement may be achieved with further
2110
+ increase of the grid size. Further away from the horizon the error estimates indeed decrease visibly with increasing
2111
+ grid size.
2112
+ [1] Albert Einstein. Cosmological Considerations in the General Theory of Relativity. Sitzungsber. Preuss. Akad. Wiss. Berlin
2113
+ (Math. Phys. ), 1917:142–152, 1917.
2114
+ [2] M. Bronstein. Über den spontanen Zerfall der Photonen. Phys. Z. Sowjetunion, 10(4):686–688, 1936.
2115
+ [3] Lev Davidovich Landau and M. Bronstein. On the Second Law of Thermodynamics and the Universe. Phys. Z. Sowjetunion,
2116
+ 4, 1933.
2117
+ [4] Y. B. Zeldovich. Cosmological Constant and Elementary Particles. JETP Lett., 6:316, 1967.
2118
+
2119
+ difference of q-fields with respect to
2120
+ absolute size of im(qtr) with respect to
2121
+ 4
2122
+ 4
2123
+ Jog1alqs (r) - qz (r3)
2124
+ 6
2125
+ fog1a(im(qe(r)l)
2126
+ 8
2127
+ -10
2128
+ -10
2129
+ -12
2130
+ =10-8+=10-9
2131
+ -12
2132
+ =10-8
2133
+ E=10-7 +E= 10-8
2134
+ = 10~7
2135
+ -14
2136
+ E= 10-°+E= 10-7
2137
+ -14
2138
+ ++++.
2139
+ = 106
2140
+ -16
2141
+ = 10-5 = 10-6
2142
+ -16
2143
+ = 10~5
2144
+ -1B
2145
+ = 10-4+= 10-5
2146
+ -1B
2147
+ = 10-4
2148
+ E=10-3 += 10-4
2149
+ = 10~3
2150
+ 20
2151
+ LD
2152
+ 12
2153
+ 20
2154
+ 0.D
2155
+ 0.2
2156
+ 0.4
2157
+ 0.6
2158
+ 0.B
2159
+ 14
2160
+ 16
2161
+ 0.0
2162
+ 0.2
2163
+ 0.4
2164
+ 0.6
2165
+ 0.B
2166
+ LD
2167
+ 12
2168
+ 14
2169
+ 16
2170
+ Iogia(rfrh)
2171
+ Iogia(rfrh)
2172
+ difference of the mass functions with respect to 2
2173
+ absolute size of im(mtr) with respect to z
2174
+ 2
2175
+ -2
2176
+ JogialIme, (r) - me, (rl)
2177
+ logia(m(me(r))
2178
+ -6
2179
+ 6
2180
+ -8
2181
+ -10
2182
+ =10-8+=10
2183
+ =10-8
2184
+ -10
2185
+ = 10-7
2186
+ -12
2187
+ E = 106 +
2188
+ E= 10°
2189
+ -12
2190
+ = 10-6
2191
+ 14
2192
+ 14
2193
+ = 10-5
2194
+ 16
2195
+ E=10-4+=10
2196
+ = 10-4
2197
+ =10-3+=10-4
2198
+ ~16
2199
+ = 10~3
2200
+ 0.D
2201
+ 0.4
2202
+ 0.6
2203
+ 0.B
2204
+ 12
2205
+ 14
2206
+ 16
2207
+ 00
2208
+ 0.2
2209
+ t0
2210
+ 0.6
2211
+ 0.B
2212
+ 1D
2213
+ 12
2214
+ 14
2215
+ 16
2216
+ Iogia(rfrh)
2217
+ Iogia(rfrh)23
2218
+ Figure 13. The effect of different grid sizes on SHBH solutions for q-theory outside the event horizon are shown for a horizon
2219
+ radius of rh = 1, q-field potential parameters λ = 1 and qeq = 0.158 and shift parameter ϵ = 10−6.
2220
+ [5] Steven Weinberg. Gravitation and Cosmology: Principles and Applications of the General Theory of Relativity. John Wiley
2221
+ and Sons, New York, 1972.
2222
+ [6] M. J. G. Veltman. Quantum Theory of Gravitation. Conf. Proc. C, 7507281:265–327, 1975.
2223
+ [7] P. de Bernardis et al. A Flat universe from high resolution maps of the cosmic microwave background radiation. Nature,
2224
+ 404:955–959, 2000.
2225
+ [8] G. Hinshaw et al.
2226
+ Three-year Wilkinson Microwave Anisotropy Probe (WMAP) observations: temperature analysis.
2227
+ Astrophys. J. Suppl., 170:288, 2007.
2228
+ [9] Adam G. Riess et al. New Hubble Space Telescope Discoveries of Type Ia Supernovae at z>=1: Narrowing Constraints
2229
+ on the Early Behavior of Dark Energy. Astrophys. J., 659:98–121, 2007.
2230
+ [10] Steven Weinberg. The Cosmological Constant Problem. Rev. Mod. Phys., 61:1–23, 1989.
2231
+ [11] Varun Sahni and Alexei A. Starobinsky.
2232
+ The Case for a positive cosmological Lambda term.
2233
+ Int. J. Mod. Phys. D,
2234
+ 9:373–444, 2000.
2235
+ [12] T. Padmanabhan. Cosmological constant: The Weight of the vacuum. Phys. Rept., 380:235–320, 2003.
2236
+ [13] Stefan Nobbenhuis. Categorizing different approaches to the cosmological constant problem. Found. Phys., 36:613–680,
2237
+ 2006.
2238
+
2239
+ difference of q-fields with respect to grid size
2240
+ 4
2241
+ Iu)Yob-
2242
+ -6
2243
+ grid size = 5 10° +grid size = 2.5 · 104
2244
+ grid size = 10§ + grid size = 5 - 104
2245
+ grid size = 2.5 - 105 + grid size = 105
2246
+ 10
2247
+ grid size = 5 · 10° ++ grid size = 2.5 · 105
2248
+ -12
2249
+ grid size = 10° + grid size = 5 - 105
2250
+ -14
2251
+ -16
2252
+ 0.D
2253
+ 0.2
2254
+ 0.4
2255
+ 0.6
2256
+ 0.B
2257
+ 1D
2258
+ 12
2259
+ 14
2260
+ 16
2261
+ logiatrfrn?
2262
+ relative size of the solution error (5-p.s.m.) for q' with respect to grid size
2263
+ 00
2264
+ -2.5
2265
+ grid size = 5 · 104
2266
+ Jog1a(/Agiel)
2267
+ 5.0
2268
+ grid size = 105
2269
+ grid size = 2.5 · 105
2270
+ 7.5
2271
+ grid size = 5 · 105
2272
+ 10.0
2273
+ grid size = 106
2274
+ grid size = 2.5 - 106
2275
+ 12.5
2276
+ 15.0
2277
+ 0
2278
+ 0.2
2279
+ t0
2280
+ 0.6
2281
+ 0.B
2282
+ LD
2283
+ 12
2284
+ 14
2285
+ 16
2286
+ ogiatr/rh?
2287
+ relative size of the solution error (5-p.s.m.) for q" with respect to grid size
2288
+ 0.D
2289
+ -2.5
2290
+ grid size = 5 · 104
2291
+ Jog1a(/Agtel)
2292
+ 0'5-
2293
+ grid size = 105
2294
+ grid size = 2.5 · 105
2295
+ -7.5
2296
+ grid size = 5 · 105
2297
+ 10.0
2298
+ grid size = 106
2299
+ grid size = 2.5 · 100
2300
+ -12.5
2301
+ 15.0
2302
+ 00
2303
+ 0.2
2304
+ 0.4
2305
+ 0.6
2306
+ 0.B
2307
+ LD
2308
+ 12
2309
+ 14
2310
+ 16
2311
+ logia(rfrn)
2312
+ difference of the mass functions with respect to grid size
2313
+ m(.(rl)
2314
+ 4
2315
+ grid size =5. 10° + grid size = 2.5 - 104
2316
+ -6 :
2317
+ grid size = 105 +grid size = 5 - 104
2318
+ Jogia(Im(ms(r) -
2319
+ grid size = 2.5 - 105 +grid size = 105
2320
+ .- grid size = 5 - 105 + grid size = 2.5 - 105
2321
+ grid size = 10° + grid size = 5 - 105
2322
+ -10
2323
+ -12
2324
+ 0.D
2325
+ 0.2
2326
+ 0.4
2327
+ 0.6
2328
+ 0.B
2329
+ LD
2330
+ 12
2331
+ 14
2332
+ 16
2333
+ fogia(rfrh)
2334
+ relative size of the solution error (5-p.s.m.) for m' with respect to grid size
2335
+ 00
2336
+ -2.5
2337
+ grid size = 5 · 104
2338
+ fog1a(/Amiel)
2339
+ grid size = 105
2340
+ 5.0
2341
+ grid size = 2.5 · 105
2342
+ 7.5
2343
+ grid size = 5 . 105
2344
+ 10.0
2345
+ grid size = 10°
2346
+ grid size = 2.5 · 106
2347
+ 12.5
2348
+ 15.0
2349
+ 0.D
2350
+ 0.2
2351
+ 0.4
2352
+ 0.6
2353
+ 0.B
2354
+ 1D
2355
+ 12
2356
+ 14
2357
+ 16
2358
+ logia(rfrh?24
2359
+ [14] Joseph Polchinski. The Cosmological Constant and the String Landscape. In 23rd Solvay Conference in Physics: The
2360
+ Quantum Structure of Space and Time, pages 216–236, 3 2006.
2361
+ [15] F. R. Klinkhamer and G. E. Volovik. Self-tuning vacuum variable and cosmological constant. Phys. Rev. D, 77:085015,
2362
+ 2008.
2363
+ [16] F. R. Klinkhamer and G. E. Volovik. Dynamic vacuum variable and equilibrium approach in cosmology. Phys. Rev. D,
2364
+ 78:063528, 2008.
2365
+ [17] G. E. Volovik. Fermi-point scenario of emergent gravity. In From Quantum to Emergent Gravity: Theory and Phenomenol-
2366
+ ogy, 9 2007.
2367
+ [18] C. D. Froggatt and H. B. Nielsen. Derivation of Poincare invariance from general quantum field theory. Annalen Phys.,
2368
+ 517:115, 2005.
2369
+ [19] James Bjorken. Emergent gauge bosons. In 4th Workshop on What Comes Beyond the Standard Model?, 11 2001.
2370
+ [20] Gian Francesco Giudice. Theories for the Fermi scale. J. Phys. Conf. Ser., 110:012014, 2008.
2371
+ [21] S. W. Hawking.
2372
+ Particle Creation by Black Holes.
2373
+ Commun. Math. Phys., 43:199–220, 1975.
2374
+ [Erratum:
2375
+ Com-
2376
+ mun.Math.Phys. 46, 206 (1976)].
2377
+ [22] Farshid Soltani, Carlo Rovelli, and Pierre Martin-Dussaud.
2378
+ End of a black hole’s evaporation. II.
2379
+ Phys. Rev. D,
2380
+ 104(6):066015, 2021.
2381
+ [23] G. Chapline, E. Hohlfeld, R. B. Laughlin, and D. I. Santiago. Quantum phase transitions and the breakdown of classical
2382
+ general relativity. Int. J. Mod. Phys. A, 18:3587–3590, 2003.
2383
+ [24] G. E. Volovik. Type-II Weyl Semimetal versus Gravastar. JETP Lett., 114(4):236–242, 2021.
2384
+ [25] Pawel O. Mazur and Emil Mottola. Gravitational condensate stars: An alternative to black holes. 9 2001.
2385
+ [26] Abhay Ashtekar, Alejandro Corichi, and Daniel Sudarsky. Hairy black holes, horizon mass and solitons. Class. Quant.
2386
+ Grav., 18:919–940, 2001.
2387
+ [27] S. W. Hawking. The Cosmological Constant Is Probably Zero. Phys. Lett. B, 134:403, 1984.
2388
+ [28] Antonio Aurilia, H. Nicolai, and P. K. Townsend. Hidden Constants: The Theta Parameter of QCD and the Cosmological
2389
+ Constant of N=8 Supergravity. Nucl. Phys. B, 176:509–522, 1980.
2390
+ [29] Ulises Nucamendi and Marcelo Salgado. Scalar hairy black holes and solitons in asymptotically flat space-times. Phys.
2391
+ Rev. D, 68:044026, 2003.
2392
+ [30] Remo Ruffini and John A. Wheeler. Introducing the black hole. Phys. Today, 24(1):30, 1971.
2393
+ [31] Markus Heusler. No hair theorems and black holes with hair. Helv. Phys. Acta, 69(4):501–528, 1996.
2394
+ [32] P. Painlevé. C. R. Acad. Sci., 173, 1921.
2395
+ [33] Allvar Gullstrand. Allgemeine Lösung des statischen Einkörperproblems in der Einsteinschen Gravitationstheorie, volume
2396
+ 16,8 of Arkiv för matematik, astronomi och fysik. Almqvist & Wiksell, Stockholm, 1922.
2397
+ [34] Yuki Kanai, Masaru Siino, and Akio Hosoya. Gravitational collapse in Painleve-Gullstrand coordinates. Prog. Theor.
2398
+ Phys., 125:1053–1065, 2011.
2399
+ [35] D. Sudarsky. A Simple proof of a no hair theorem in Einstein Higgs theory,. Class. Quant. Grav., 12:579–584, 1995.
2400
+ [36] Alejandro Corichi, Ulises Nucamendi, and Marcelo Salgado. Scalar hairy black holes and scalarons in the isolated horizons
2401
+ formalism. Phys. Rev. D, 73:084002, 2006.
2402
+ [37] Robert M. Wald. On the instability of the n=1 Einstein Yang-Mills black holes and mathematically related systems. J.
2403
+ Math. Phys., 33:248–255, 1992.
2404
+
KdE1T4oBgHgl3EQfGgND/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LNE3T4oBgHgl3EQfAgnY/content/tmp_files/2301.04259v1.pdf.txt ADDED
@@ -0,0 +1,2199 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Astronomy & Astrophysics manuscript no. SOAP_GPU
2
+ ©ESO 2023
3
+ January 12, 2023
4
+ SOAP-GPU: Efficient Spectral Modelling of Stellar Activity Using
5
+ Graphical Processing Units
6
+ Yinan Zhao1 and Xavier Dumusque1
7
+ Department of Astronomy of the University of Geneva, 51 chemin de Pegasi, 1290 Versoix, Switzerland
8
+ e-mail: yinan.zhao@unige.ch
9
+ January 12, 2023
10
+ ABSTRACT
11
+ Context. Stellar activity mitigation is one of the major challenges for the detection of earth-like exoplanets in radial velocity mea-
12
+ surements. Several promising techniques are now investigating the use of spectral time-series, to differentiate between stellar and
13
+ planetary perturbations. In this context, developing a software that can efficiently explore the parameter space of stellar activity at the
14
+ spectral level is of great importance.
15
+ Aims. The goal of this paper is to present a new version of the Spot Oscillation And Planet (SOAP) 2.0 code that can model stellar
16
+ activity at the spectral level using graphical processing units (GPUs).
17
+ Methods. We take advantage of the computational power of GPUs to optimise the computationally expensive algorithms behind the
18
+ original SOAP 2.0 code. For that purpose, we developed GPU kernels that allow to model stellar activity on any given wavelength
19
+ range. In addition to the treatment of stellar activity at the spectral level, SOAP-GPU also includes the change of spectral line
20
+ bisectors from center to limb, and can take as input PHOENIX spectra to model the quiet photosphere, spots and faculae, which allow
21
+ to simulate stellar activity for a wider space in stellar properties.
22
+ Results. Benchmark calculations show that for the same accuracy, this new code improves the computational speed by a factor of 60
23
+ compared with a modified version of SOAP 2.0 that generates spectra, when modeling stellar activity on the full visible spectral range
24
+ with a resolution of R=115’000. Although the code now includes the variation of spectral line bisector with center-to-limb angle,
25
+ the effect on the derived RVs is small. We also show that it is not possible to fully separate the flux from the convective blueshift
26
+ effect when modeling spots, due to their lower temperature and thus the appearance of molecular absorption in their spectra. Rather
27
+ negligible for the Sun, this degeneracy between the flux and convective blueshift effect become more important when we move to
28
+ cooler stars, however, this issue does not impact the estimation of the total effect (flux plus convection), and therefore users can trust
29
+ this output.
30
+ Conclusions. The publicly available SOAP-GPU code allows to efficiently model stellar activity at the spectral level, which is essential
31
+ to test further stellar activity mitigation techniques working at the level of spectral timeseries not affected by other sources of noise.
32
+ Besides a huge gain in performance, SOAP-GPU also includes more physics and is able to model different stars than the Sun, from
33
+ F to K dwarfs, thanks to the use of the PHOENIX spectral library. We however note that due to the limited understanding of stellar
34
+ convection and activity on other stars than the Sun, the more we go away from the solar case, the more the output of the code should
35
+ be taken with care.
36
+ Key words. Methods: data analysis – Techniques: radial velocities – Techniques: spectroscopic - Stars: activity
37
+ 1. Introduction
38
+ The radial velocity (RV) method has been proven to be one of
39
+ the most successful method to detect exoplanets since the dis-
40
+ covery of the first exoplanet orbiting a solar-type star (Mayor
41
+ & Queloz 1995). In order to detect earth-like planets orbiting in
42
+ the habitable zone of its parent star, a precision of a few dozens
43
+ of cms−1 must be reached. Although the state-of-the-art spec-
44
+ trographs such as ESPRESSO, and EXPRESS are not far from
45
+ that precision (50 and 58 cms−1, respectively Pepe et al. 2021;
46
+ Brewer et al. 2020), the main limitation to detect Earth-like plan-
47
+ ets with the RV technique is stellar activity. Two major physical
48
+ processes dominating stellar activity on a time scale of the host
49
+ star’s rotational period are the flux imbalance due to the temper-
50
+ ature difference and therefore contrast between active and quiet
51
+ regions (hereafter flux effect. (e.g. Saar & Donahue 1997; Du-
52
+ musque et al. 2014; Donati et al. 2017)) and the inhibition of
53
+ convective blueshift (hereafter CB effect). The CB effect is due
54
+ to the presence of strong local magnetic fields inside active re-
55
+ gions, which suppress the CB inside those regions and leads to
56
+ positive RV variations (e.g. Cavallini et al. 1985a; Meunier et al.
57
+ 2010).
58
+ Many methods have been proposed to mitigate activity-
59
+ induced variations using photometric and spectroscopic time se-
60
+ ries. In the one-dimensional time series space, many parametric
61
+ models based on analytic forms or different Gaussian process
62
+ (GP) frameworks have been developed to model stellar activ-
63
+ ity using photometry or spectroscopic activity indicators (e.g.
64
+ Aigrain et al. 2012; Rajpaul et al. 2015; Aigrain et al. 2016;
65
+ Gilbertson et al. 2020b; Barragán et al. 2022). Jointly modeling
66
+ the data with Keplerians to model planets in addition to a GP to
67
+ model stellar activity may significantly reduce the stellar activity
68
+ but may also lead to overfitting when the GP kernel or priors are
69
+ not wisely set. This is particularly dangerous when the planetary
70
+ properties are not constrained from transit observations.
71
+ Due to inherent problems in modeling stellar activity in one-
72
+ dimensional time series, the community is now shifting toward
73
+ modeling it in a two-dimensional space. Collier Cameron et al.
74
+ Article number, page 1 of 17
75
+ arXiv:2301.04259v1 [astro-ph.SR] 11 Jan 2023
76
+
77
+ A&A proofs: manuscript no. SOAP_GPU
78
+ (2021) calculated the autocorrelation function (ACF) of cross-
79
+ correlation function (hereafter CCF Baranne et al. 1996), to iso-
80
+ late Doppler shift from shape shift variations and applied prin-
81
+ ciple component analysis (PCA) on the obtained ACFs to model
82
+ shape changes related to stellar activity. A planet signal of am-
83
+ plitude ∼ 40 cm/s can be recovered when the algorithm is ap-
84
+ plied to the HARPS-N solar data (Dumusque et al. 2015; Col-
85
+ lier Cameron et al. 2019; Dumusque et al. 2021). Zhao et al.
86
+ (2022a) projected CCFs time series onto the Fourier basis func-
87
+ tions and modelled line variability using different basis. Results
88
+ on simulated data show a 48% reduction in RV rms. de Beurs
89
+ et al. (2022) trained a convolutional neural network (CNN) on
90
+ both simulated CCFs and HARPS-N solar CCFs and were able
91
+ to significantly reduce stellar activity effects.
92
+ The idea behind building the CCF is to extract with the best
93
+ precision the RV information contained in a spectrum. How-
94
+ ever, key variations at the spectral level related to stellar activ-
95
+ ity may be lost when performing the dimensionality reduction
96
+ imposed by the CCF. Therefore, several methods have been pro-
97
+ posed to disentangle stellar activities at the spectral level. Davis
98
+ et al. (2017) applied PCA to simulated spectral time series and
99
+ demonstrated that eigen-vectors are spectral line dependent. Ra-
100
+ jpaul et al. (2020) used GP to directly derive RV information
101
+ from spectral time series. Jones et al. (2017) also applied mul-
102
+ tivariate GP to model stellar activity on PCA-reduced spectral
103
+ dataset. Cretignier et al. (2022), based on the knowledge that the
104
+ impact of stellar activity is line-depth dependant (Cretignier et al.
105
+ 2020a), used PCA to model stellar activity in the flux-flux gra-
106
+ dient space (named the “shell” space) and results on HD10700
107
+ (τ Ceti) and HD12861 (α Cen B) indicates the method can
108
+ successfully remove variations from non-Doppler origin. Last
109
+ by not least, Binnenfeld et al. (2020, 2022) are developing the
110
+ unit-sphere representation periodogram (USuRPER), to seper-
111
+ ate Doppler from other RV variations. This technique is based
112
+ on representing spectra as unit vectors in a multidimensional hy-
113
+ perspace.
114
+ The spectral time series used to evaluate the performance of
115
+ the algorithms developed to mitigate stellar activity at the spec-
116
+ tral level are either obtained from simulated data or real obser-
117
+ vations. The major issue with simulations, is that most of them
118
+ only model the RV activity effect at the CCF level (e.g. Du-
119
+ musque et al. 2014; Herrero et al. 2016) due to computational
120
+ inefficiency. A few other libraries of simulated spectra affected
121
+ by stellar activity exist, but generating them takes hours to run,
122
+ which is not convenient when exploring the parameter space in
123
+ stellar activity and properties (e.g. Gilbertson et al. 2020a; Du-
124
+ musque 2016). Regarding real observations, solar data obtained
125
+ by the HARPS-N solar telescope (Collier Cameron et al. 2019;
126
+ Dumusque et al. 2021), HELIOS on HARPS1 and more recently
127
+ the solar feed of NEID (Lin et al. 2022) are the best we can get, in
128
+ terms of S/N and sampling. However, those spectra corresponds
129
+ for the most part to quiet activity phases of the Sun (end of cy-
130
+ cle 24 end beginning of cycle 25) and can only used to mitigate
131
+ stellar activity for star very similar to the Sun. When moving to
132
+ stellar observations, the recent Extreme precision Spectrograph
133
+ (EXPRES) Stellar Signals Project (ESSP) shared some valuable
134
+ data. However, due to the small number of stars and the rather
135
+ small number of spectra available, it was rather difficult to com-
136
+ pare different activity mitigation techniques together (Zhao et al.
137
+ 2022b). As a conclusion of this discussion, it is essential for the
138
+ community to have access to a code that can simulate efficiently
139
+ 1 https://www.eso.org/public/announcements/ann18033/
140
+ stellar activity at the spectral level, and for a wide range of stellar
141
+ properties.
142
+ In this paper, we present a new code, Spot Oscillation And
143
+ Planet Graphical Process Unit (SOAP-GPU) based on GPU
144
+ computation that can efficiently model simplified and realistic
145
+ stellar activity at the spectral level. In Sect 2, we revisit the ar-
146
+ chitecture of the SOAP 2.0 code it is based on (Dumusque et al.
147
+ 2014) and discuss about its limitations. The algorithms behind
148
+ SOAP-GPU are presented in Sect 3. In Sect 4, we explore the
149
+ physical parameters of stellar activity and simulation of different
150
+ cases are presented. Finally, we draw our conclusion in Sect 5.
151
+ The SOAP-GPU code is publicly available on Github and Zen-
152
+ odo2 along with a brief manual and some examples.
153
+ 2. Revisiting SOAP 2.0
154
+ In this section, we revisit the code Spot Oscillation And Planet
155
+ (SOAP 2.0 Dumusque et al. 2014). This code aims at modeling
156
+ both the flux effect and the CB effect of active regions affecting
157
+ RV measurements. Although the public version of the SOAP 2.0
158
+ code can only simulate stellar activity at the level of the CCFs,
159
+ modeling the effect at the spectral level follow the same ideas. In
160
+ this section, we first discuss the basic algorithms behind SOAP
161
+ 2.0 and demonstrate the limit of the code, in terms of computa-
162
+ tional efficiency, when we want to model stellar activity at the
163
+ spectral level.
164
+ Fig. 1. The stellar disk is initialized with velocity and intensity fields.
165
+ Left: The intensity in each cell is computed depending on a limb dark-
166
+ ening law. Right: The velocity in each cell is computed considering ro-
167
+ tational period, stellar inclination and radius of the star. As we can see,
168
+ iso-velocity lines are not vertical as we implemented differential rota-
169
+ tion in SOAP-GPU, which was not the case in SOAP 2.0.
170
+ 2.1. The structure of SOAP 2.0
171
+ SOAP 2.0 first computes the “quiet” (without any active region)
172
+ emission spectrum of the star. To do so, a 2-dimension stellar
173
+ disk containing N × N cells is initialized (N being the resolu-
174
+ tion of the disk, the same parameter called “grid” in Boisse et al.
175
+ 2012). Velocity and intensity of all disk cells are computed based
176
+ on the physical configuration of the star (rotational period, stel-
177
+ lar inclination and radius of the star) and a limb darkening law
178
+ (as shown in Fig. 1). In each cell, the quiet photosphere spectrum
179
+ is injected, weighted by the cell intensity (limb-darkening), and
180
+ Doppler-shifted to the projected velocity of that cell (rotation).
181
+ Linear interpolation is applied at this step to project the Doppler-
182
+ shifted spectrum into the original wavelength grid, to make sure
183
+ that spectra in different cells are on a common wavelength grid.
184
+ We note that the public version of SOAP 2.0 was using the CCF
185
+ 2 code available here https://github.com/YinanZhao21/SOAP_
186
+ GPU and https://doi.org/10.5281/zenodo.7499461
187
+ Article number, page 2 of 17
188
+
189
+ Light ratio field
190
+ Velocity field (km/s)
191
+ 300
192
+ 1.0
193
+ 300
194
+ 2.0
195
+ 1.5
196
+ 250
197
+ 0.9
198
+ 250
199
+ 1.0
200
+ 200
201
+ 0.8
202
+ 200
203
+ 0.5
204
+ 0.7
205
+ 150
206
+ 150
207
+ 0.0
208
+ 0.6
209
+ -0.5
210
+ 100
211
+ 100
212
+ -1.0
213
+ 0.5
214
+ 50
215
+ 50
216
+ -1.5
217
+ 0.4
218
+ 0 +
219
+ 0 +
220
+ 2.0
221
+ 0
222
+ 50
223
+ 100
224
+ 150
225
+ 200
226
+ 250
227
+ 300
228
+ 0
229
+ 50
230
+ 100
231
+ 150
232
+ 200
233
+ 250
234
+ 300Yinan Zhao et al.: SOAP-GPU
235
+ of the high-resolution Kitt Peak Observatory Fourier Transform
236
+ Spectrograph (FTS) quiet photosphere spectrum (S quiet(λ), Wal-
237
+ lace et al. 1998) as approximation of the quiet Sun to increase
238
+ computational speed. However, injecting the original spectrum is
239
+ possible, with the only difference that the dimension of the input
240
+ is ∼500000, compared to 400 for the CCF, and that we will need
241
+ to apply a Doppler-shift each time we want to change the veloc-
242
+ ity of this spectrum, while a simple translation was sufficient in
243
+ the case of the CCF. After injecting the quiet photosphere spec-
244
+ trum in each cells, the integrated quiet solar spectrum is obtained
245
+ by summing the content of all the cells together. All those pro-
246
+ cesses are summarized in the pseudo code below (Algorithm 1).
247
+ Algorithm 1 Quiet spectrum integration
248
+ 1: for Xlocation = 1, 2, . . . N do
249
+ 2:
250
+ for Ylocation = 1, 2, . . . , N do
251
+ 3:
252
+ Shift S quiet(λ) with velocity velX,Y. S quiet(λ)
253
+
254
+ S quiet(λ
255
+ ′).
256
+ 4:
257
+ Do linear interpolation to project the spectrum back
258
+ to the original wavelength grid. S quiet(λ
259
+ ′) → S
260
+
261
+ quiet(λ)
262
+ 5:
263
+ Weight S
264
+
265
+ quiet(λ) by limb-darkening intensity IX,Y and
266
+ integrate spectra along disk surface. Squiet+ = IX,Y ×S
267
+
268
+ quiet(λ)
269
+ 6:
270
+ end for
271
+ 7: end for
272
+ The next step consists in initializing the active regions us-
273
+ ing the following parameters: the number of active regions, their
274
+ size, their corresponding latitudes and longitudes, their types (ei-
275
+ ther spot or faculae) and the resolution of the active region con-
276
+ tour. An active region spectrum is also needed at this step to
277
+ model the CB effect. The original SOAP 2.0 code uses the CCF
278
+ of the observed spot spectrum in the visible obtained from the
279
+ Kitt Peak Observatory FTS (S active(λ) with λ the same as for
280
+ S quiet(λ) Wallace et al. 2005). The spectrum used for faculae re-
281
+ gions is the same, with the difference that the contrast of such
282
+ a region follow what is observed in the Sun (e.g. Fig. 3 in Me-
283
+ unier et al. 2010), thus brighter than the quiet sun and with a
284
+ center-to-limb brightening. Other groups use synthetic spectra at
285
+ different temperature to model the quiet photospehere, spots and
286
+ faculae, and include the effect of CB using results from magneto-
287
+ hydrodynamical simulations (e.g. the STARSIM 2 code3 Herrero
288
+ et al. 2016). We note that injecting observed or synthetic spectra
289
+ have their advantages and drawbacks. Using observed spectra
290
+ allows to better model the inhibition of convection inside ac-
291
+ tive regions, but we note that if we use the observed spectra of
292
+ a spot to model a facula (because an observed spectrum of a
293
+ facula across the entire visible spectral range does not seem to
294
+ exist), molecular features will be present in the facula spectrum
295
+ despite the temperature being higher. Using synthetic spectra on
296
+ the contrary allows to better model the temperature, and there-
297
+ fore spectral features, of the injected spectra. The choice of the
298
+ spectra will be addressed in the later sections.
299
+ In order to simulate a spectral time series, we need to calcu-
300
+ late the disk location of active regions at each timestamp. As
301
+ shown in Equation 1 and Equation 2 of (Boisse et al. 2012),
302
+ active regions are first put in the center of the disk and their
303
+ initial configuration is obtained using a rotation matrix. Next,
304
+ to get the position of those active regions as a function of
305
+ time, another rotation matrix is used. At each timestamp, the
306
+ code evaluates which active regions are visible, and which ones
307
+ 3 code available here https://github.com/rosich/starsim-2
308
+ are hidden behind the star. This is performed by the function
309
+ Localize(lat, long, i, ph), where lat and long are the latitude and
310
+ longitude of the active region center, i is the inclination angle of
311
+ the stellar disk and ph is the rotational phase. The output of this
312
+ function is a binary; one if visible, zero otherwise. If a region is
313
+ visible, the code proceed to estimate the difference between the
314
+ quiet solar spectrum and active spectrum at the location of the
315
+ active regions.
316
+ The difference for the flux effect, the CB effect and the com-
317
+ bination of the two (total) in each cell can be calculated using
318
+ the following equations:
319
+ ∆S
320
+
321
+ flux(X, Y) = S
322
+
323
+ quiet(X, Y) − Iratio × S
324
+
325
+ quiet(X, Y),
326
+ (1)
327
+ ∆S
328
+
329
+ bconv(X, Y) = S
330
+
331
+ quiet(X, Y) − S
332
+
333
+ active(X, Y),
334
+ (2)
335
+ ∆S
336
+
337
+ tot(X, Y) = S
338
+
339
+ quiet(X, Y) − Iratio × S
340
+
341
+ active(X, Y),
342
+ (3)
343
+ where Iratio is the contrast of the spot or faculae region. The code
344
+ then integrates over all the cells covered by active regions to get
345
+ final difference between the quiet spectrum and active spectrum.
346
+ The final spectrum of each effect at each timestamp can be cal-
347
+ culated by:
348
+ Sintegrated, final = Sintegrated,quiet − ∆Sintegrated,quiet−active.
349
+ (4)
350
+ Once a spectrum for each timestamp is obtained, the code then
351
+ lowers the resolution of the integrated spectrum to match the
352
+ resolution provided in the configuration file. The pseudo code
353
+ that describes how active regions are included, and how the final
354
+ integrated spectra is obtained is summarized below.
355
+ 2.2. The limitation of SOAP 2.0
356
+ The structure of SOAP 2.0 provides an efficient way to estimate
357
+ stellar activities on spectroscopic measurement by simulating
358
+ CCFs at different timestamps. The major drawback when chang-
359
+ ing the input from CCFs to spectra is the dimension of the data.
360
+ The dimension of the input CCFs in SOAP 2.0 was 400 in veloc-
361
+ ity space while the input high-resolution spectra we want to use
362
+ have a dimension of ∼ 500000 in the wavelength domain. From
363
+ Algorithm 1 and Algorithm 2, we clearly see that the linear in-
364
+ terpolation is repeatedly called when injecting the spectrum in
365
+ each cell, which is computationally expensive for an array with
366
+ dimension of ∼ 500000. For example, SOAP 2.0 takes ∼ 800
367
+ seconds to calculate an integrated quiet sun spectrum using a
368
+ 300×300 disk-grid. Another issue is how the code handles multi-
369
+ ple active regions. Each active region is modeled independently,
370
+ without information from other regions. This algorithm cannot
371
+ handle the case in which some active regions overlap with each
372
+ other. From real observations, we know that some active regions
373
+ have complicated configurations. For example, most of active re-
374
+ gions are a combination of a large faculae presenting a small spot
375
+ in its center. In this context, a more computationally efficient and
376
+ generalized algorithm is needed.
377
+ 3. Description of SOAP-GPU
378
+ In the previous section we’ve demonstrated the limitation of
379
+ SOAP 2.0 when modeling stellar activity at the spectral level.
380
+ Here, we present a new version of SOAP, based on Graphical
381
+ Processing Unit (GPU) computing, that is much more efficient
382
+ in term of computational speed, but also that adds some physical
383
+ complexity.
384
+ Article number, page 3 of 17
385
+
386
+ A&A proofs: manuscript no. SOAP_GPU
387
+ Algorithm 2 Active region updates
388
+ 1: for nregion = 1, 2, . . . N do
389
+ 2:
390
+ for ttimestep = 1, 2, . . . , T do
391
+ 3:
392
+ Localize(lat, long, i, ph).
393
+ 4:
394
+ if Localize = 1 then
395
+ 5:
396
+ Shift S quiet(λ) with velocity velX,Y. S quiet(λ) →
397
+ S quiet(λ
398
+ ′).
399
+ 6:
400
+ Do linear interpolation to project the spectrum
401
+ back to the original wavelength space. S quiet(λ
402
+ ′) → S
403
+
404
+ quiet(λ)
405
+ 7:
406
+ Weight S
407
+
408
+ quiet(λ) by limb-darkening intensity IX,Y
409
+ 8:
410
+ Shift S active(λ) with velocity velX,Y. S active(λ) →
411
+ S active(λ
412
+ ′).
413
+ 9:
414
+ Do linear interpolation to project the spec-
415
+ trum back to the original wavelength space. S active(λ
416
+ ′) →
417
+ S
418
+
419
+ active(λ)
420
+ 10:
421
+ Weight S
422
+
423
+ active(λ) by limb-darkening intensity
424
+ IX,Y
425
+ 11:
426
+ Use Equations 1 to 3 to calculate the difference
427
+ of each effect
428
+ 12:
429
+ end if
430
+ 13:
431
+ Compute summation of ∆S
432
+ ′(X, Y) for each effect.
433
+ 14:
434
+ end for
435
+ 15: end for
436
+ 16: for ttimestep = 1, 2, . . . , T do
437
+ 17:
438
+ for nregion = 1, 2, . . . N do
439
+ 18:
440
+ Use Equation 4 to update final spectrum at tT.
441
+ 19:
442
+ Lower the resolution of final spectrum at tT to match
443
+ the HARPS-N observation.
444
+ 20:
445
+ end for
446
+ 21: end for
447
+ 3.1. The basic concept of GPU computing
448
+ The popularity of artificial intelligence has in recent year sig-
449
+ nificantly increased due to the programmability of graphic hard-
450
+ wares. GPU computing uses graphical card as a co-processor for
451
+ parallel computing. Compared with CPU, GPU solves problems
452
+ by breaking them into separate tasks and processing them simul-
453
+ taneously. The basic computational unit that can independently
454
+ perform simple calculation in a graphic card is called a thread.
455
+ A group of threads that communicate and share memory with
456
+ each other is called a block.
457
+ The new version of SOAP presented here, SOAP-GPU,
458
+ is written using the Compute Unified Device Architecture
459
+ (CUDA). CUDA is a compiler and toolkit for programming
460
+ NVIDIA GPUs, and is an extension of the C/C++ programming
461
+ language. CUDA invokes kernel functions by using the syntax of
462
+ <<< Nblocks, Nthreads >>>. This syntax allows the user to define
463
+ the thread hierarchy before launching in parallel the same pro-
464
+ gram function called kernel to many threads. In order to launch
465
+ the computation at the level of the GPU, a host function defined
466
+ in CPU controls the data transfer between CPU and GPU and
467
+ can execute the kernel function inside the GPU.
468
+ Threads in the same block can be accessed as 1D, 2D or
469
+ 3D structures. In order to perform the thread level calculation,
470
+ the index of individual thread and block need to be accessed.
471
+ The index of each thread in the same block can be expressed
472
+ as threadIdx. If the block is launched as the 1D structure, each
473
+ thread in the same block can be accessed as threadIdx.x. The
474
+ number of the treads used in each 1D block can be obtained
475
+ as blockDim.x. Grid is a group of blocks. It can be either 1D,
476
+ 2D or 3D. For the 1D grid, the index of each block in the
477
+ grid can be expressed as blockIdx.x. Since the input spectra
478
+ of quiet sun and active region are both 1D, we used the con-
479
+ figuration of 1D grid with 1D block and the global index is
480
+ index = blockIdx.x ∗ blockDim.x + threadIdx.x.
481
+ 3.2. Fast linear interpolation with GPU
482
+ As mentioned in previous sections, the major limitation in SOAP
483
+ 2.0 is the way it handles linear interpolation in each disk cell. A
484
+ GPU provides thousands of cores which can be implement for
485
+ linear interpolation for large data array. Considering that both
486
+ quiet sun and spot spectra are evenly sampled in the wavelength
487
+ domain, then the input wavelength can be described as:
488
+ λn = λ0 + nk,
489
+ (5)
490
+ where n is the pixel number and k is the step size. When a
491
+ Doppler shift is applied, the wavelength array is modified as fol-
492
+ low:
493
+ λ
494
+
495
+ n = λn + λn f(β),
496
+ (6)
497
+ where f(β) = −
498
+
499
+ 1 −
500
+
501
+ (1+β)
502
+ (1−β)
503
+
504
+ and β = v/c. The variable v is the
505
+ velocity for each cell and c is the speed of light. Since we need
506
+ to project the shifted spectrum back to the original wavelength
507
+ space S (λ
508
+ ′) → S
509
+ ′(λ), we have to find the index m which satisfies
510
+ λ
511
+
512
+ n < λm < λ
513
+
514
+ n+1. For the left side, we have:
515
+ λ
516
+
517
+ n < λm,
518
+ λ
519
+
520
+ n = λn + λn f(β) = λ0 + nk + λ0 f(β) + nk f(β) < λ0 + mk,
521
+ so we have:
522
+ n(1 + f(β)) + f(β)λ0
523
+ k
524
+ < m.
525
+ (7)
526
+ For the right side, we have:
527
+ m < (n + 1)(1 + f(β)) + f(β)λ0
528
+ k
529
+ .
530
+ (8)
531
+ Once the integer m is known, we can estimate the flux for λm
532
+ using the spectrum derivative:
533
+ S
534
+
535
+ m =
536
+ ∆S n
537
+
538
+
539
+ n+1 − λ
540
+
541
+ n) × (λm − λ
542
+
543
+ n) + S n,
544
+ (9)
545
+ where S n = S (λn) and ∆S n = S n+1 − S n.
546
+ Equations 7 to 9 can be parallelised using GPU. We launch
547
+ 1D grid of 1D blocks with <<< Nblocks, Nthreads >>> to per-
548
+ form the linear interpolation mentioned above and the number of
549
+ blocks and threads satisfies Diminput_spectrum = Nblocks × Nthreads.
550
+ The pseudo code for this part is summarised in Algorithm 3 and
551
+ the quiet sun spectra integration can be rewritten as Algorithm
552
+ 4.
553
+ Algorithm 3 Fast interpolation with GPU
554
+ 1: index = blockIdx.x ∗ blockDim.x + threadIdx.x
555
+ 2: indextarget = ceil(index ∗ (1 + f(β)) + f(β) ∗ λ0/k)
556
+ 3: S
557
+
558
+ indextarget =
559
+ ∆S index
560
+ (λ′
561
+ index+1−λ′
562
+ index) × (λindextarget − λ
563
+
564
+ index) + S index.
565
+ Article number, page 4 of 17
566
+
567
+ Yinan Zhao et al.: SOAP-GPU
568
+ Algorithm 4 Quiet spectrum integration with GPU
569
+ 1: for Xlocation = 1, 2, . . . N do
570
+ 2:
571
+ for Ylocation = 1, 2, . . . , N do
572
+ 3:
573
+ Apply Doppler shift with velocity velX,Y and derive
574
+ S
575
+
576
+ quiet(λ) using GPU fast interpolation
577
+ 4:
578
+ Weight S
579
+
580
+ quiet(λ) by limb-darkening intensity IX,Y and
581
+ integrate spectra along disk surface. Squiet+ = IX,Y ×S
582
+
583
+ quiet(λ)
584
+ 5:
585
+ end for
586
+ 6: end for
587
+ 3.3. Active region updates
588
+ As addressed in the previous section, one of the disadvantage of
589
+ SOAP 2.0 is that each active region is modeled independently,
590
+ which makes the code unable to handle complicated active re-
591
+ gion configurations: some active regions may overlap with each
592
+ other; spots may be surrounded by facualae regions. Here we
593
+ propose a revised algorithm to update active regions: an empty
594
+ disk map called In foMap is allocated in the GPU first. At each
595
+ timestamp, A list of active regions with their properties is up-
596
+ loaded and the code calculates the location of active regions pro-
597
+ jected on the disk map. If some regions are visible, we update
598
+ the corresponding pixels with their active region types in the
599
+ information map. For example, if a faculae region is visible at
600
+ (xn, yn), In foMap(xn, yn) = 1.0. If there are multiple regions
601
+ with the same type overlapping with each other, the overlapping
602
+ region in the information map will remain the same. This will
603
+ avoid the over-calculation for the overlapping region issue in the
604
+ SOAP 2.0 since each acitve region is calculated independently.
605
+ This algorithm can also simulate complicated active region con-
606
+ figurations. For example, a spot surrounded by a large faculae
607
+ can be simulated by updating the information map with a fac-
608
+ ulae first. If the spot region is embedded inside the faculae, the
609
+ overlapping region in the information map will be updated with
610
+ the type of the spot. The pseudo code of this part is summarised
611
+ in Algorithm 5.
612
+ Algorithm 5 Active region updates with GPU
613
+ 1: for ttimestep = 1, 2, . . . , T do
614
+ 2:
615
+ for nregion = 1, 2, . . . N do
616
+ 3:
617
+ Localize(lat, long, i, ph).
618
+ 4:
619
+ if Localize = 1 then
620
+ 5:
621
+ Updating InfoMap(xn, yn) = the type of active
622
+ region.
623
+ 6:
624
+ end if
625
+ 7:
626
+ end for
627
+ 8:
628
+ Inject velocity velX,Y with GPU fast interpolation for the
629
+ active regions in the information map. and derive S
630
+
631
+ active(λ).
632
+ 9:
633
+ Weight S
634
+
635
+ active(λ) by limb-darkening intensity IX,Y
636
+ 10:
637
+ Use Equations 1 to 3 to calculate the difference of each
638
+ effect
639
+ 11:
640
+ Compute summation of ∆S
641
+ ′(X, Y) for each effect.
642
+ 12:
643
+ Use Equation 4 to derive the final spectrum at tT.
644
+ 13:
645
+ Lower the resolution of final spectrum at tT to match the
646
+ HARPS-N observation.
647
+ 14: end for
648
+ 3.4. Differential rotation
649
+ In the original SOAP 2.0 code, there is no differential rotation
650
+ implemented. In order to better model stellar activity, differential
651
+ rotation is included when the stellar disk is initialized according
652
+ to the equation ω = ω0 + ω1 sin2(θ), where ω0 = 14.371◦/day
653
+ and ω1 = −2.587◦/day for the Sun (Borgniet et al. 2015). To
654
+ generalise this for other stars, the user can select in the configu-
655
+ ration of SOAP-GPU a rotation period and a differential rotation
656
+ rate. ω0 is then equal to 360/PROT and ω1 to DIFF_ROT*PROT
657
+ (PROT=25.05 and DIFF_ROT=-0.18 for the solar case to repro-
658
+ duce the above equation).
659
+ 4. Results
660
+ Fig. 2. The computation speed comparison between SOAP 2.0 and
661
+ SOAP GPU: The integrated quiet sun spectrum is calculated with dif-
662
+ ferent disk resolutions. When disk resolution is below 10, SOAP 2.0
663
+ is faster than SOAP-GPU since the communication between CPU and
664
+ GPU in SOAP-GPU is time-consuming. For resolutions above 10,
665
+ SOAP-GPU is significantly faster than SOAP 2.0. With a typical res-
666
+ olution value of 300, the quiet disk spectrum integration in SOAP-GPU
667
+ is 100 times faster than in SOAP 2.0
668
+ 4.1. Performance and precision comparison with SOAP 2.0
669
+ We examined the performance of SOAP-GPU in two aspects:
670
+ computational speed and accuracy. SOAP-GPU code is executed
671
+ on a Nvidia RTX-3090 card while we run the modified SOAP 2.0
672
+ that generates spectra in a MacBook Pro with 2.6 GHz 6-Core
673
+ Intel Core i7. We analysed the speed performance of SOAP-
674
+ GPU by calculating the time it takes to obtain an integrated quiet
675
+ sun spectrum. The input quiet sun spectrum has a dimension of
676
+ 547840, thus the kernel function fast interpolation is launched
677
+ with <<< Nblocks, Nthreads >>>=<<< 1070, 512 >>>. We note
678
+ that Nthreads is fixed to 512 and Nblocks is an adaptive number
679
+ based on the dimension of the input. SOAP 2.0 is executed with
680
+ the same simulation configuration on a single CPU. We com-
681
+ puted the integrated quiet sun spectrum with different disk res-
682
+ olution and their computational time is show in Figure 2. When
683
+ the disk resolution is very low, smaller than 10, SOAP 2.0 is
684
+ faster than SOAP-GPU. This is not surprising since the data
685
+ transfer between GPU and CPU in SOAP-GPU is the dominating
686
+ factor. When the disk resolution increases, SOAP-GPU is signif-
687
+ icantly faster than SOAP 2.0. When the resolution is above 100,
688
+ the quiet sun spectrum integration of SOAP-GPU is 100 times
689
+ faster than SOAP 2.0 and both computational curves linearly in-
690
+ crease in log-log space.
691
+ Article number, page 5 of 17
692
+
693
+ 103
694
+ SOAP 2.0
695
+ SOAP GPU
696
+ time (seconds)
697
+ 102
698
+ 101
699
+ Comuputation
700
+ 100
701
+ 10-1
702
+ 100
703
+ 101
704
+ 102
705
+ Disk resolution (N)A&A proofs: manuscript no. SOAP_GPU
706
+ Boisse et al. (2012) found no significant change in their re-
707
+ sults with resolution beyond 300, therefore, we used this disk
708
+ resolution for the following of the paper. For the typical disk
709
+ resolution of 300, a spot at disc center with an area of 1% of the
710
+ entire disk will be contained in a grid of 34×34 cells. Due to the
711
+ small size of the grid for such a configuration, the fast interpo-
712
+ lation algorithm (see Algorithm 3) is only able to gain a factor
713
+ of ∼10 in computation time. If the spot size increases to 9% of
714
+ the entire disk, the simulation can then gain almost the full speed
715
+ boost from fast interpolation (100 time faster). Fast interpolation
716
+ at the level of the active region modelisation makes therefore sig-
717
+ nificant improvements in computational speed when considering
718
+ high-resolution simulations or simulations with large active re-
719
+ gions.
720
+ Fig. 3. Comparison of the RVs derived from the simulated spectra mod-
721
+ eled by SOAP2.0 and SOAP-GPU. A single equatorial spot with 1%
722
+ area of the entire disk surface is simulated. It took 1749.3 seconds to
723
+ simulate those spectra with SOAP 2.0 while only 27.9 seconds with
724
+ SOAP-GPU on a Nvidia RTX-3090 card. The computation speed is im-
725
+ proved by a factor of 63.
726
+ We also examined the accuracy of SOAP-GPU. We simu-
727
+ lated a single equatorial spot with a 1% area of the entire disk
728
+ surface using a disk resolution of 300. It took 1749.3 seconds to
729
+ simulate those spectra with SOAP 2.0 for 100 timestamps while
730
+ only 27.9 seconds using SOAP-GPU, which corresponds to a
731
+ gain of a factor 63. The modeled RVs relative to the flux effect,
732
+ the CB effect and the total effect are derived from the simulated
733
+ spectra by cross-correlating them with the same mask originally
734
+ used in SOAP 2.0, and measuring the RV as the mean of a Gaus-
735
+ sian profile fitted to the obtained CCFs. Figure 3 illustrates that
736
+ the simulated spectra from SOAP-GPU provides the same RVs
737
+ as the spectra from SOAP 2.0.
738
+ 4.2. Exploration of active region properties
739
+ The dynamics of active regions plays an important role for un-
740
+ derstanding the stellar activity-induced RVs. Most of previous
741
+ study aimed at investigating these effects with real observations.
742
+ For example, Meunier et al. (2010) derived the stellar activity
743
+ induced RVs by using Michelson Doppler Imager/Solar and He-
744
+ liospheric Observatory (MDI/SOHO) magnetograms images. At
745
+ the simulation level, Gilbertson et al. (2020a) investigated the ef-
746
+ fect of spot evolution on the long-term and at the spectral level,
747
+ using a modified version of SOAP 2.0. However, they only con-
748
+ sidered spots, and only their decaying phase. In order to illustrate
749
+ the effects of active region dynamics, we discuss in this section
750
+ the photometric and RV variations observed when an active re-
751
+ gion changes in size, when different number of active regions are
752
+ present and when the active region configuration changes.
753
+ 4.2.1. The size evolution of active region
754
+ To explore different active region evolution scenarios, we de-
755
+ veloped and included an evolution module in SOAP-GPU. This
756
+ module can model evolution in three different ways: i) a linear
757
+ growing phase, ii) a linear decaying phase or iii) a growing and
758
+ decaying phase modeled by an an asymmetric Gaussian func-
759
+ tion (Muraközy et al. 2014). Other user-defined functions can be
760
+ added to this module if desired. We show in Fig. 4 the impact
761
+ of active region evolution on the light-curve and on the differ-
762
+ ent RVs derived (flux, CB and total effects). For the asymmet-
763
+ ric Gaussian evolution phase, the maximum size is set to 10000
764
+ millionths of solar hemisphere (MSH) equivalent to 1% of the
765
+ visible hemisphere, the FWHM to 10 days and an asymmetry
766
+ factor of 0.09. For the growing only, or decaying only evolution
767
+ phases, the initial size is set to 10000 MSH and the growth or
768
+ decay rate is set to 400 MSH/day. We found that both flux and
769
+ CB effects are sensitive to the evolution of active regions.
770
+ 4.2.2. Complex active regions
771
+ SOAP-GPU also allows users to simulate complex active region
772
+ configurations. From the observational point of view, facluae and
773
+ spots are not independent from each other. The facula distribu-
774
+ tion is based on the spot distribution. This leads to a complex
775
+ configuration in which spots may overlap faculae (Borgniet et al.
776
+ 2015; Chapman et al. 2001). In order to model such a configu-
777
+ ration, the SOAP-GPU config file allows users to define the dis-
778
+ tribution of active regions, as a sequence of spots and faculae
779
+ with given properties (size, initial longitude, initial latitude). For
780
+ example, in order to simulate a spot surrounded by a facula, the
781
+ user can define the location and the size of the large facula first
782
+ and then define a smaller spot at the same location. The region of
783
+ overlap will be replaced by the spot as mentioned in Algorithm
784
+ 5. A simulation of this case is illustrated in Figure 5, with a 1%
785
+ spot surrounded by a 9% facula. Since the spot has a higher con-
786
+ trast than the faculae, the light curve and RVs of the flux effect
787
+ is dominated by the spot while the RVs of the CB effect is domi-
788
+ nated by facula. Overall, the CB RV effect induced by the facula
789
+ dominates all the other contributions, and thus the total RVs is
790
+ affected mainly by the facula, as it was already demonstrated in
791
+ several studies (e.g. Meunier et al. 2010; Dumusque et al. 2014;
792
+ Milbourne et al. 2019).
793
+ 4.3. Exploration of spectral properties
794
+ In this section, we explore the input spectra properties and
795
+ demonstrate how the derived RV behaves depending on the
796
+ wavelength domain.
797
+ 4.3.1. Chromatic effects of different wavelength coverage
798
+ To explore the effect induced by different wavelength coverage,
799
+ we injected into SOAP-GPU only the red or only the blue part of
800
+ the quiet sun and spot spectra (see Fig. 6). The red and blue parts
801
+ have the same dimension of 204800, which is different from the
802
+ full spectra. As the fast interpolation kernel function depends
803
+ on the dimensions of the input spectra, the code automatically
804
+ configures the kernel with the option <<< 400, 512 >>>.
805
+ Article number, page 6 of 17
806
+
807
+ CPU Tot
808
+ CPU FIux
809
+ CPU Bconv
810
+ 4
811
+ GPU Tot
812
+ GPU FIuX
813
+ GPUBconv
814
+ 2
815
+ [s/u]
816
+ RV
817
+ 0
818
+ -2
819
+ 0.0
820
+ 0.2
821
+ 0.4
822
+ 0.6
823
+ 0.8
824
+ 1.0
825
+ PhaseYinan Zhao et al.: SOAP-GPU
826
+ Fig. 4. SOAP-GPU simulation of different active region evolution curves: A single spot with a latitude of 30◦and longitude of 180◦is simulated.
827
+ Three spot size evolution types are demonstrated: i) a fast growth and slow decay evolution is shown in the first column, ii) a linear decay evolution
828
+ curve in the second column and iii) a linear growth curve in the third column. The evolution curves and the simulated light curves are shown in the
829
+ first two rows. The RVs of the total effect, the flux effect and the CB effect are present in the rest of the rows. The simulation of an non-evolving
830
+ spot (red dashed line ) is also shown in each figure for comparison.
831
+ The measured RVs are shown in Figure 7. The RVs of the CB
832
+ effect are different between the blue and red parts. One notable
833
+ thing is that the RVs of the CB effect simulated from the red
834
+ inputs goes below zero, while we expect the CB effect to only
835
+ be positive, as it corresponds to an inhibition of CB. To confirm
836
+ that nothing was wrong at the level of the code, we injected for
837
+ the spotted region the same spectrum as the quiet Sun, but we
838
+ red-shifted it by 300 m/s to model at first order the inhibition of
839
+ CB. In this idealist case, the CB effect does not provide negative
840
+ values. After further investigation, those negative values comes
841
+ from the fact that the spot temperature is lower than the quiet
842
+ photosphere. Thus, spectral lines will change in depth, which
843
+ will induce a flux effect even when not considering the contrast
844
+ of the active regions when estimating the CB effect (see Eq. 2).
845
+ In the case of the Sun, this flux effect seen in the CB derived RVs
846
+ is mainly coming from the red part of the spectrum due to molec-
847
+ ular absorption that can be seen in the spot spectrum, but not in
848
+ the quiet photosphere spectrum. As we will see in Sect. 4.3.3,
849
+ we do not obtain negative values when injecting PHOENIX solar
850
+ equivalent spectra for the quiet and active Sun instead of the Kitt
851
+ Peak solar quiet and active atlases, however we still see a slight
852
+ asymmetry in the derived CB RV effect, pointing toward a small
853
+ flux effect contribution. This is likely because PHOENIX spectra
854
+ are not able to model all the absorptions coming from molecular
855
+ bands, and thus the flux effect seen in the CB estimation only is
856
+ stronger for the real solar spectra than for the synthetic spectra.
857
+ This issue prevent us of fully separating the flux from the CB
858
+ effect, however, we note that the total effect (flux + CB) should
859
+ be modeled properly. We note that this feature was not visible in
860
+ SOAP 2.0, as after computing the CCF for the quiet and actives
861
+ regions, we were renormalising them.
862
+ We note that in SOAP 2.0, we used a fixed contrast to model
863
+ the flux effect of active regions. This contrast was derived by
864
+ comparing the Planck function of the quiet Sun effective tem-
865
+ perature and of the spot or facula temperature4, at the average
866
+ wavelength of the input spectra 5293 Å. Now that we use spectra
867
+ 4 the config file in SOAP 2.0 allows to give an effective temperature for
868
+ the quiet photosphere, 5778 K for the Sun, and a temperature difference
869
+ with respect to this former value for the spot spectrum (663 K as the
870
+ default value in SOAP 2.0). For a facula, the temperature is dependent
871
+ on the center-to-limb angle and was following what is observed on the
872
+ Sun (e.g. Fig. 3 in Meunier et al. 2010).
873
+ Article number, page 7 of 17
874
+
875
+ 20000
876
+ Gauss
877
+ Decay
878
+ Growth
879
+ Non
880
+ Non
881
+ Non
882
+ area
883
+ 15000
884
+ Active region
885
+ 10000
886
+ 5000
887
+ 0
888
+ 1.000
889
+ Light
890
+ 0.996
891
+ 0.994
892
+ Non
893
+ Non
894
+ Non
895
+ Gauss
896
+ Decay
897
+ Growth
898
+ 7.5
899
+ Non
900
+ Non
901
+ Non
902
+ 5.0
903
+ Gauss
904
+ Decay
905
+ Growth
906
+ RV (m/s)
907
+ 2.5
908
+ 0.0
909
+ Tot
910
+ 2.5
911
+ -5.0
912
+ Non
913
+ Non
914
+ Non
915
+ 4
916
+ Gauss
917
+ Decay
918
+ Growth
919
+ RV (m/s)
920
+ 2
921
+ 0
922
+ Flux
923
+ -2
924
+ -4
925
+ -6
926
+ 4
927
+ Non
928
+ Non
929
+ Non
930
+ Gauss
931
+ Decay
932
+ Growth
933
+ 0
934
+ 0.0
935
+ 0.2
936
+ 0.4
937
+ 0.6
938
+ 0.8
939
+ 1.0
940
+ 0.0
941
+ 0.2
942
+ 0.4
943
+ 0.6
944
+ 0.8
945
+ 1.0
946
+ 0.0
947
+ 0.2
948
+ 0.4
949
+ 0.6
950
+ 0.8
951
+ 1.0
952
+ Phase
953
+ Phase
954
+ PhaseA&A proofs: manuscript no. SOAP_GPU
955
+ Fig. 5. Three different active region configurations are simulated. A sin-
956
+ gle spot located at the latitude of 30◦and the longitude of 180◦with a
957
+ fixed size of 1% of the entire solar disk is present in black. A single fac-
958
+ ula with the same coordinates and a fixed size of 9% of the entire solar
959
+ disk is shown in blue line. The 1% spot region surrounded with 9% fa-
960
+ clua region is labeled in red dashed line. The top panel demonstrates the
961
+ light curves of different configurations and the rest of the panels shows
962
+ the RVs of the total effect, the flux effect and the CB effect.
963
+ Fig. 6. Injecting different size of spectra in SOAP-GPU input. Three
964
+ different sets of quiet sun and spot spectra, with different wavelength
965
+ ranges are used as input to SOAP-GPU: The entire spectra with length
966
+ 547840 is labeled in black. The blue and red parts of the spectra with
967
+ length 204800 are over plotted in blue and red, respectively.
968
+ as input, and not CCFs, we implemented a contrast that is wave-
969
+ length dependant to model the chromatic effects of stellar activ-
970
+ ity. To do so, we introduced a new GPU kernel function called
971
+ SOAPcontrast <<< Nblocks, Nthreads >>>. This new kernel al-
972
+ lows to perform the wavelength dependent contrast calculation:
973
+ each wavelength pixel is first accessed by the global index of the
974
+ kernel. Next on each thread, it derives the contrast by calculating
975
+ the ratio of two Planck functions at two different effective tem-
976
+ peratures. The absolute value of the contrast in the blue part of
977
+ the spectrum is higher than in the red part. This implies that the
978
+ Fig. 7. The chromatic effect of RVs. SOAP-GPU is initialized with three
979
+ different spectra: entire wavelength coverage, and only red and blue
980
+ spectral parts (see Sect. 6). A single spot with a size of 1%, a latitude of
981
+ 30◦and a longitude of 180◦is modeled by the code. The measured RVs
982
+ with different input spectra are labeled with black, red and blue, respec-
983
+ tively. Top: The measured RVs of the total effect. Middle: The measured
984
+ RVs of the flux effect. An offset of 1 ms−1 is added in the red and blue
985
+ RVs. Bottom: The measured RVs of the CB effect.
986
+ flux effect for the blue part is stronger than in the red part, which
987
+ can be seen in the middle panel of Fig. 7.
988
+ 4.3.2. Convection as a function of center-to-limb angle
989
+ Solar spectral line profiles become asymmetric due to convective
990
+ motions varying with physical depth inside the solar photosphere
991
+ (e.g. Dravins et al. 1981; Gray 2009). This effect also leads to a
992
+ change in shape of the bisector of spectral lines from disk-center
993
+ to the limb, as photons are coming from different physical depths
994
+ (e.g. Cavallini et al. 1985b). In order to better model the effect of
995
+ convection in SOAP-GPU, we derived this effect from very-high
996
+ spatial and spectral resolution observations of the Sun (Löhner-
997
+ Böttcher et al. 2018; Stief et al. 2019; Löhner-Böttcher et al.
998
+ 2019).
999
+ We note that the varying shape of spectral line with center-
1000
+ to-limb µ angle is also modelled in the STARSIM 2 code (Her-
1001
+ rero et al. 2016) by fitting a fourth-order polynomial function
1002
+ on magneto-hydrodynamic CIFIST 3D models (Ludwig et al.
1003
+ 2009). However, this fifth-order polynomial is only valid for line
1004
+ depth as strong as ∼ 0.5 (see Fig. 6 in Herrero et al. 2016)5. This
1005
+ was enough to model the shape change of the CCFs in STAR-
1006
+ SIM 2, which does not go deeper. However, when working at the
1007
+ spectral line level, this polynomial will give completely wrong
1008
+ estimate for the core of deep lines, due to extrapolation. We
1009
+ therefore used the quiet sun observations at different µ angles
1010
+ provided in Löhner-Böttcher et al. (2019). We first measured the
1011
+ bisectors of all the available iron deep lines at different µ angle in
1012
+ 5 The parameters mentioned here are derived from the published code
1013
+ ( https://github.com/rosich/starsim-2)
1014
+ Article number, page 8 of 17
1015
+
1016
+ Light curve
1017
+ 1.002
1018
+ 1.000
1019
+ 0.998
1020
+ Spot only
1021
+ Faculae only
1022
+ 0.996
1023
+ Combined
1024
+ Spot only
1025
+ Tot RV (m/s)
1026
+ 20
1027
+ Faculae only
1028
+ Combined
1029
+ 10
1030
+ 0
1031
+ Flux RV (m/s)
1032
+ 4
1033
+ Spot only
1034
+ Faculae only
1035
+ 2
1036
+ Combined
1037
+ -2
1038
+ Bconv RV (m/s)
1039
+ Spot only
1040
+ 20
1041
+ Faculae only
1042
+ Combined
1043
+ 10
1044
+ 0
1045
+ 0.0
1046
+ 0.2
1047
+ 0.4
1048
+ 0.6
1049
+ 0.8
1050
+ 1.0
1051
+ Phase1.0
1052
+ Iflux
1053
+ 0.8
1054
+ Normalized
1055
+ 0.6
1056
+ 0.4
1057
+ 0.2
1058
+ Quiet
1059
+ Quiet_blue
1060
+ 1:8:
1061
+ Quiet_red
1062
+ I flux
1063
+ 0.8
1064
+ Normalized
1065
+ 0.6
1066
+ 0.4
1067
+ 0.2
1068
+ Spot
1069
+ Spot_blue
1070
+ 0.0
1071
+ Spot_red
1072
+ 4000
1073
+ 4500
1074
+ 5000
1075
+ 5500
1076
+ 6000
1077
+ 6500
1078
+ Wavelength (A)5.0
1079
+ Full
1080
+ Blue
1081
+ Tot RV (m/s)
1082
+ 2.5
1083
+ Red
1084
+ 0.0
1085
+ -2.5
1086
+ -5.0
1087
+ 4
1088
+ Full
1089
+ Flux RV (m/s)
1090
+ Blue
1091
+ 2
1092
+ Red
1093
+ 0
1094
+ 2
1095
+ -4
1096
+ 4
1097
+ Full
1098
+ Bconv RV (m/s)
1099
+ Blue
1100
+ 2
1101
+ Red
1102
+ 0
1103
+ -2
1104
+ 0.0
1105
+ 0.2
1106
+ 0.4
1107
+ 0.6
1108
+ 0.8
1109
+ 1.0
1110
+ PhaseYinan Zhao et al.: SOAP-GPU
1111
+ Löhner-Böttcher et al. (2019)6 , and fitted them using polynomial
1112
+ functions. For µ angle smaller then 0.5, we used a straight line
1113
+ to fit the bisectors of the selected deep lines, to prevent strong
1114
+ divergence when extrapolating the fit towards very large depths.
1115
+ For µ angle larger or equal to 0.5, 3rd order polynomial func-
1116
+ tions are used to capture the curvature of the bisectors around
1117
+ disk center. The final bisectors, shown in Fig. 8 are obtained by
1118
+ interpolating and extrapolating those bisectors from depth 0 to
1119
+ 1.
1120
+ To obtain the dependency of the spectral line bisector as a
1121
+ function of µ in an active region, we use the observations pre-
1122
+ sented in Cavallini et al. (1985a). We parameterised the bisec-
1123
+ tors of the FeI at 6301.5008Å, for the disk center (µ = 1) and
1124
+ different center-to-limb angles (µ = 0.82, 0.66 and 0.44). The
1125
+ bottom part of the bisectors, below 0.5, is fitted using a straight
1126
+ line, the upper part for which we have data, using a 5th-order
1127
+ polynomial. Rather than extrapolating the fitted polynomial to-
1128
+ wards very shallow depths, which can give unrealistic redshifted
1129
+ values, we decided to use the more redshifted data value of the
1130
+ top bisector for extrapolation. We show in Fig. 8 the obtained
1131
+ active bisectors from depth 0.0 to 1.0.
1132
+ Once we have our model for line bisectors at different µ an-
1133
+ gles, we can use the Python module Convec.model to apply those
1134
+ bisectors to the original spectra, and thus obtain different spec-
1135
+ tra for different µ angles. Each cell in the stellar disk takes the
1136
+ bisector that has the closest µ angle. However, the code first has
1137
+ to remove the original bisector from the spectral lines of the in-
1138
+ put quiet and active Kitt Peak solar spectra. To do so, we select
1139
+ the same lines as in Löhner-Böttcher et al. (2019) in the input
1140
+ spectra and measure their individual bisectors. To model the av-
1141
+ erage bisector of the lines selected in the quiet spectrum, we use
1142
+ a second-order polynomial. For the active spectrum, due to the
1143
+ lower effective temperature, the wings of certain lines fitted are
1144
+ blended, which strongly impact the bisector measurement. We
1145
+ therefore rejected bisector points that are significantly off. Then,
1146
+ we model the average active bisector of the lines by fitting the
1147
+ regions below and above a depth of 0.5 with two different linear
1148
+ models. Fitting a higher-order polynomial for those active bi-
1149
+ sectors was giving unrealistic values when extrapolating to very
1150
+ small or very large depths. The measured individual bisectors
1151
+ with our models are shown in Fig. 9. To finally obtain quiet and
1152
+ active spectra with proper bisector shape as a function of µ an-
1153
+ gles, we remove the original bisectors of the quiet and active
1154
+ Kitt peak solar spectra, and then add the bisectors measured for
1155
+ different µ angles. This is done by shifting each point in those
1156
+ spectra depending on their normalised depth.
1157
+ To inject the proper bisectors for different µ angles in our
1158
+ original spectra, we first remove the original bisector, which
1159
+ changes any CB difference between the quiet and active solar
1160
+ spectra. We therefore need to impose a shift between the bisec-
1161
+ tors of quiet and active regions in order to properly model the in-
1162
+ hibition of CB inside active regions. We here make two assump-
1163
+ tions: i) the CB is fully inhibited at µ=0.2 in the quiet Sun, and
1164
+ ii) it is also fully inhibited for magnetic regions, and this at all µ
1165
+ angles. Using the first assumption, we measure for the quiet Sun
1166
+ the maximum shift between the bisector at µ=0.85, which is the
1167
+ bisector that is the most blueshifted, and the bisector at µ=0.2.
1168
+ This maximum happens at a depth of 0.58 and equals to 375 m/s.
1169
+ This value is extremely similar to the 340 m/s CB value derived
1170
+ from a fit to the data of Liebing et al. (2021) (see Sect. 4.3.3).
1171
+ 6 We use the following lines: FeI 5250.2084Å, FeI 5250.6453Å, FeI
1172
+ 5434.5232Å, FeI 5432.9470Å, FeI 5576.0881Å, FeII 6149.2460Å, FeI
1173
+ 6173.3344Å, FeI 6301.5008Å and FeI 6302.4932Å
1174
+ To match the CB relation derived in Sect. 4.3.3, we rescale the
1175
+ maximum difference between the µ = 0.85 and µ = 0.2 to be
1176
+ 340 m/s. We note that this rescaling is negligible in the case of
1177
+ the Sun, however, it will be really needed in Sect. 4.3.3 when
1178
+ using PHOENIX spectra as input. Using the second assumption,
1179
+ we impose that at the same depth of 0.58, the difference in veloc-
1180
+ ity between the quiet bisector at µ=0.85 and all active bisectors
1181
+ is also 340 m/s. We show the proper shift between the quiet and
1182
+ active bisectors in Fig. 8.
1183
+ We show the RV impact of considering the µ angle depen-
1184
+ dency on the observed solar spectra in Fig. 10. As we can see,
1185
+ the impact is not significant when looking at the shape of the
1186
+ signal as a function of phase. This come from the fact that due
1187
+ to limb-darkening and the projection of active regions on the
1188
+ limb, most of the signal comes from larger µ angles (close to
1189
+ disc center). The only significant difference is for the amplitude
1190
+ of the CB effect. This is because we forced the CB difference be-
1191
+ tween the quiet and active sun to be 340 m/s, while the CB differ-
1192
+ ence between the quiet and active Kitt peak solar spectra is less
1193
+ than 300 m/s when measuring the average difference between the
1194
+ quiet and active CCF bissectors (see Fig. 2 in Dumusque et al.
1195
+ 2014). We note that the complexity of modifying the bisectors
1196
+ depending on the center-to-limb angle is not strongly justified
1197
+ when using real solar spectra as input due to the small difference
1198
+ observed in the estimated RVs, however, this step is critical when
1199
+ working with synthetic spectra that does not include the proper
1200
+ bisectors, as described in Setc. 4.3.3.
1201
+ We are conscious that depending on the magnetic field of an
1202
+ active region, the inhibition of the CB will be different and there-
1203
+ fore the bisectors more or less redshifted compared to the quiet
1204
+ Sun, as seen in Fig. 1 in Cavallini et al. (1985a). Also, faculae
1205
+ tend to have weaker magnetic fields than spots and in our case,
1206
+ we model those two active regions with the same bisectors and
1207
+ the same CB inhibition. It is therefore likely that the CB effect
1208
+ for faculae is slightly overestimated, and this will translate in
1209
+ larger RV amplitudes when modeling the CB effect for faculae.
1210
+ In summary, in this subsection we present a framework to
1211
+ model the Sun but also other stars (see also next subsection).
1212
+ Different bisectors at different µ are derived from the quiet pho-
1213
+ totsphere (Löhner-Böttcher et al. 2019) and facuale (Cavallini
1214
+ et al. 1985b) and are injected into the input spectra for which we
1215
+ have removed any variation in line bisector from a vertical line.
1216
+ 4.3.3. Simulation based on the PHOENIX spectral database
1217
+ The implementation of convective motions described in the pre-
1218
+ ceding section allow us to use synthetic spectra as input, since
1219
+ the effect of convection can be injected using the Convec.model
1220
+ module. In order to study stellar activity affecting the data used
1221
+ in RV, a high resolution spectral library is needed. For SOAP-
1222
+ GPU, we decided to make it easy for the user to use as input
1223
+ PHOENIX high-resolution spectra (Husser et al. 2013). We note
1224
+ however that SOAP-GPU can accept other spectral libraries, but
1225
+ it might be a little more difficult for the users to properly setup
1226
+ the inputs since the parameters to remove bisectors of input spec-
1227
+ tra are only optimized for the PHOENIX spectra and the so-
1228
+ lar atlas from the Kitt Peak Observatory FTS (Wallace et al.
1229
+ 2005). The PHOENIX library propose a collection of spectra
1230
+ with the wavelength coverage from 500Å to 5.5µm with reso-
1231
+ lutions of 500,000 in the optical. The library covers stellar ef-
1232
+ fective temperature from 2300K to 12000K. Since the spectra
1233
+ in the PHOENIX library are not normalized, which is critical to
1234
+ perform the injection of CB described in the preceding section,
1235
+ Article number, page 9 of 17
1236
+
1237
+ A&A proofs: manuscript no. SOAP_GPU
1238
+ Fig. 8. Average bisectors of quiet and active solar regions from the disk center (µ = 1.0) to the limb (µ = 0.2). Continuous lines: Fifth-order poly-
1239
+ nomial fit to the quiet sun bisectors of the FeI 5250.2084Å, FeI 5250.6453Å, FeI 5434.5232Å, FeI 5432.9470Å, FeI 5576.0881Å, FeI 6149.2460Å,
1240
+ FeI 6173.3344Å, FeI 6301.5008Å and FeI 6302.4932Å lines as measured by the Laser Absolute Reference Spectrograph (LARS) at the German
1241
+ Vacuum Tower Telescope (Löhner-Böttcher et al. 2019). Dashed lines: Fit of the bisectors of the FeI 6301.5008Å spectral line inside a faculae
1242
+ region, as measured by the Fabry-Perot interferometer at the Donati Solar Tower (Cavallini et al. 1985a). Below a depth of 0.5, a linear fit is per-
1243
+ formed, while a fifht-order polynomial is used to model the top part of the bisector. To prevent unrealistic value when interpolating the polynomial
1244
+ above a normalised flux of 0.9 where no measurement exists, we selected the most redshifted part of the top bisector, explaining the vertical values
1245
+ for very shallow depths. The two vertical lines are shifted by 340 m/s which corresponds to the solar convective blueshift value derived from a fit
1246
+ to the data of Liebing et al. (2021) (see Sect. 4.3.3). The active bisectors at different µ angles are all shifted by those 340 m/s at a depth of 0.58 as
1247
+ we make the hypothesis that convection is fully suppressed in magnetic regions (see Sect 4.3.2 for more information).
1248
+ Fig. 9. Bisectors of the FeI lines used in Löhner-Böttcher et al. (2019) and fitted model to account for the CB. Left: Bisectors from the quiet Kitt
1249
+ Peak solar spectrum. Right: Bisectors from the active Kitt Peak solar spectrum. We rejected the bottom part of the 6301.5008Å bisector because it
1250
+ was significantly off by 2500 m/s due to strong contamination by other weak lines.
1251
+ we used the open source package “Rassine” (Cretignier et al.
1252
+ (2020b)) to perform spectral normalization first. The continuum
1253
+ or spectral energy distribution (SED) of input spectra derived
1254
+ from “Rassine” are denoted as SEDquiet and SEDactive respec-
1255
+ tively.
1256
+ The inhibition of CB when working with PHOENIX spectra
1257
+ can be rewritten as:
1258
+ ∆S
1259
+
1260
+ bconv(X, Y) = S
1261
+
1262
+ quiet,n(X, Y) − S
1263
+
1264
+ active,n(X, Y),
1265
+ (10)
1266
+ where S
1267
+
1268
+ quiet,n and S
1269
+
1270
+ active,n are the normalized quiet and active
1271
+ spectra. Since the contrast between the quiet and active region
1272
+ Article number, page 10 of 17
1273
+
1274
+ 1.0
1275
+ μ = 0.20
1276
+ μ=0.30
1277
+ 0.8
1278
+ μ=0.40
1279
+ μ=0.50
1280
+ μ=0.60
1281
+ Normalized flux
1282
+ 0.6
1283
+ μ= 0.70
1284
+ μ=0.80
1285
+ μ=0.85
1286
+ μ=0.90
1287
+ 0.4
1288
+ μ= 0.95
1289
+ μ = 1.00
1290
+ Active region μ =0.44
1291
+ Active region μ =0.66
1292
+ 0.2
1293
+ Active region μ =0.82
1294
+ Active region μ =l.0
1295
+ 0.0
1296
+ -200
1297
+ 0
1298
+ 200
1299
+ 400
1300
+ Doppler velocity (m/s)1.0
1301
+ 1.0
1302
+ 0.8
1303
+ 0.8
1304
+ Fit
1305
+ Binned data
1306
+ = 0.6
1307
+ Fel5250.2084A
1308
+ 0.6
1309
+ Normalized
1310
+ Normalized
1311
+ Fel 5250.6453A
1312
+ Fel5434.5232A
1313
+ Fel 5432.9470 A
1314
+ Fit
1315
+ 0.4
1316
+ 0.4
1317
+ Binned data
1318
+ Fel5576.0881A
1319
+ Fel 5250.2084A
1320
+ Fel 6301.5008A
1321
+ Fel5250.6453A
1322
+ 0.2
1323
+ 0.2
1324
+ Fel 5434.5232A
1325
+ Fel5432.9470A
1326
+ Fel5576.0881A
1327
+ 0.0
1328
+ 0.0
1329
+ Fel 6301.5008 A
1330
+ -200
1331
+ -100
1332
+ 0
1333
+ 100
1334
+ 200
1335
+ 300
1336
+ -300-250-200-150-100
1337
+ -50
1338
+ 0
1339
+ 50
1340
+ Doppler Velocity (m/s)
1341
+ Doppler Velocity (m/s)Yinan Zhao et al.: SOAP-GPU
1342
+ Fig. 10. Comparison of the RVs derived using two different configu-
1343
+ rations for the input spectra. A single equatorial spot with 1% area of
1344
+ the entire disk surface is simulated in both cases. Red line: RVs derived
1345
+ from simulated spectra with observed quiet sun and spot spectra without
1346
+ µ dependent bisector injection. Dotted line: RVs derived from simulated
1347
+ spectra with µ dependent bisector injection. The input spectra with µ-
1348
+ angle dependency are generated with the Python module Convec.model.
1349
+ The RVs of the flux, CB and total effect don’t change significantly when
1350
+ the µ-dependent CB is introduced.
1351
+ is naturally included in the continuum of input PHOENIX spec-
1352
+ tra, the flux effect can be rewritten as:
1353
+ ∆S
1354
+
1355
+ flux(X, Y) = S
1356
+
1357
+ quiet,n(X, Y) × SEDquiet
1358
+ − LB(X, Y) × S
1359
+
1360
+ quiet,n(X, Y) × SEDactive,
1361
+ (11)
1362
+ where LB is the function of limb brightening. For simulation of
1363
+ spot regions, LB = 1.0 along the disk. For simulation of faculae
1364
+ regions, SOAP 2.0 was using ∆T f = 250.9 − 407.7µ + 190.9µ2
1365
+ to model the limb brightening in temperature domain (Meu-
1366
+ nier et al. 2010). Since this equation is only valid for the Sun,
1367
+ we use the empirical equation derived from 3D MHD simula-
1368
+ tions to model other spectral types. 3D MHD simulations mod-
1369
+ elling faculae on the Sun can reproduce extremely well the limb-
1370
+ brightening observed for faculae (Norris et al. 2017). Using sim-
1371
+ ilar simulations, Johnson et al. (2021a) model what would be
1372
+ the limb-brightening on other stars (see Figure 3 and Table 1 in
1373
+ Johnson et al. (2021a)). Using the parametrisation in Johnson
1374
+ et al. (2021a), we derived the limb brightening curves of faculae
1375
+ for a G2, K0 and M0 dwarfs. We then linearly interpolated be-
1376
+ tween the G2 and K0 and K0 and M0 simulations to obtain the
1377
+ limb-brightening dependence for a G8 and G9 dwarf, and a K2
1378
+ dwarf, respectively. To obtain the dependence for a F9 dwarf, we
1379
+ linearly extrapolated from the G2 and K0 models. The derived
1380
+ limb brightening curves from F9 to K2 are shown in Figure 11.
1381
+ Finally, the total effect from flux and convection can be de-
1382
+ rived using the following equation:
1383
+ ∆S
1384
+
1385
+ tot(X, Y) = S
1386
+
1387
+ quiet,n(X, Y) × SEDquiet
1388
+ − LB(X, Y) × S
1389
+
1390
+ active,n(X, Y) × SEDactive.
1391
+ (12)
1392
+ Convection velocity changes with spectral type, and de-
1393
+ creases towards cooler stars than the Sun. This is a well known
1394
+ Fig. 11. Faculae intensity contrast as a function of µ for different spec-
1395
+ tral types. The limb brightening curves for the G2, K0 and M0 dwarfs
1396
+ are derived from the parametrisation of MHD simulations for 500G fac-
1397
+ ulae, shown in Table 1 in Johnson et al. (2021a). The limb brightening
1398
+ curves for other spectral types are linearly interpolated by using the two
1399
+ closet limb brightening curves. For spectral types hotter than G2, we ob-
1400
+ tain limb brightening by performing linear extrapolation using the G2
1401
+ and K0 curves. The limb brightening derived from Meunier et al. (2010)
1402
+ is labeled with orange.
1403
+ effect, that comes out from observations (e.g. Meunier et al.
1404
+ 2017; Liebing et al. 2021) and magneto hydrodynamic mod-
1405
+ els of stellar phostophere (e.g. Allende Prieto et al. 2013). As
1406
+ in Liebing et al. (2021), we show in the top panel of Fig. 12
1407
+ that the CB is a cubic function of effective temperature in the
1408
+ range 4800 to 6300 K. The parametrisation that we obtain is
1409
+ CBvel = 95.2388 × ((Teff − 4400)/1000)3 + 91.2791. Once we
1410
+ have this relation to measure the velocity of CB as a function of
1411
+ effective temperature, we simply have to rescale the difference
1412
+ between the quiet Sun bisectors for µ = 0.85 and µ = 0.2 at
1413
+ depth 0.58 to be equal to the value given by our relation, and
1414
+ we also impose that the active bisectors are shifted by the same
1415
+ value, at the same depth (see Sect. 4.3.2 for justification). This
1416
+ allows us to model properly the change of convective velocity as
1417
+ a function of stellar effective temperature. We note that as in the
1418
+ case of the Sun, before injecting the proper bisector for the quiet
1419
+ and active regions, we first have to remove the bisector present
1420
+ in the PHOENIX spectra that we use. This is a necessary step as
1421
+ the PHOENIX spectral library is obtained from 1D atmospheric
1422
+ models and cannot properly reproduce line bisector shape. We
1423
+ show in the appendix, like for Fig. 9 in the case of the Sun, how
1424
+ the bisector of the original PHOENIX spectra for the quiet stellar
1425
+ region, a faculae and a spot, are fitted before being removed.
1426
+ In Fig. 13, we show the results of a few simulations consid-
1427
+ ering µ dependent input spectra and a single 1% equatorial spot
1428
+ (left panel) or a single 1% facula (right panel). We highlight the
1429
+ RV outputs of SOAP-GPU when using PHOENIX spectra, with
1430
+ the quiet Sun temperature set to Teff = 5778K, the spot temper-
1431
+ ature set to Teff = 5115K, 5015K and 5215K and the facula tem-
1432
+ perature set to Teff = 5928K, 6028K and 6128K. We also show
1433
+ the result when inputting the Kitt Peak solar quiet and spot or
1434
+ facula spectra (Teff = 5778K and 5115K or 6028K at disk cen-
1435
+ ter, respectively) as modified in Sect. 4.3.2, and including (us-
1436
+ ing Eq. 11, 10 and 12) the SED from corresponding PHOENIX
1437
+ spectra. As we can see, the amplitude of the RV flux effect in-
1438
+ creases with an increase in temperature difference between the
1439
+ quiet photosphere and the spot or facula. The CB effect does not
1440
+ change in amplitude with temperature difference and thus the
1441
+ larger amplitude observed for larger difference in temperature
1442
+ Article number, page 11 of 17
1443
+
1444
+ 6
1445
+ With μ-conv
1446
+ Tot RV (m/s)
1447
+ Without μ-conv
1448
+ 2
1449
+ -2
1450
+ -4
1451
+ 4
1452
+ Withμ-conv
1453
+ Flux RV (m/s)
1454
+ 2
1455
+ Without μ-conv
1456
+ 0
1457
+ -2
1458
+ 4
1459
+ Withμ-conv
1460
+ Bconv RV (m/s)
1461
+ 3
1462
+ Without μ-conv
1463
+ 2
1464
+ 1
1465
+ 0
1466
+ 0.0
1467
+ 0.2
1468
+ 0.4
1469
+ 0.6
1470
+ 0.8
1471
+ 1.0
1472
+ Phase0.25
1473
+ Spectral type: F9
1474
+ Spectraltype: G8
1475
+ Spectral type: G9
1476
+ 0.20
1477
+ Spectral type: K2
1478
+ G2 Meunier et al. 2010
1479
+ Intensity Contrast
1480
+ G2 500G
1481
+ 0.15
1482
+ K0 500G
1483
+ M0500G
1484
+ 0.10
1485
+ 0.05
1486
+ 0.00
1487
+ 0.2
1488
+ 0.4
1489
+ 0.6
1490
+ 0.8
1491
+ 1.0
1492
+ μA&A proofs: manuscript no. SOAP_GPU
1493
+ Fig. 12. CB velocity as a function of spectral type. Top: Data from
1494
+ Liebing et al. (2021) and cubic fit to them, giving as relation CBvel =
1495
+ 95.2388 × ((Teff − 4400)/1000)3 + 91.2791. We show with coloured
1496
+ stars the CB velocity value for different spectral types that we model in
1497
+ the paper. Bottom: The bisector of the quiet photosphere measured from
1498
+ Löhner-Böttcher et al. (2019) at µ = 0.85 (thin lines) and the bisector of
1499
+ an active region measured from Cavallini et al. (1985a) at µ = 1.0 (thick
1500
+ lines) for different spectral types. We impose that the maximum differ-
1501
+ ence between the quiet bisector at µ = 0.85 and µ = 0.2 (not shown
1502
+ here), happening at a depth of 0.58 is equal to the CB velocity given by
1503
+ the relation found in the top panel. We also force the difference between
1504
+ the quiet bisector at µ = 0.85 and the active bisectors, independent of
1505
+ their µ angle, to be equal to the same value at a depth of 0.58.
1506
+ between quiet and active regions is solely driven by the change
1507
+ in contrast of the active regions with temperature. While for the
1508
+ flux effect, the simulation using PHOENIX spectra or observed
1509
+ solar spectra as input gives the same results, which is not surpris-
1510
+ ing as we use the same SED, this is not the case for the CB ef-
1511
+ fect. The amplitude derived show a small discrepancy of ∼20%,
1512
+ and the maximum has a slight phase shift. This likely comes
1513
+ from a different flux effect contribution seen in the derived CB
1514
+ RV, due to molecular absorption not perfectly modeled in the
1515
+ PHOENIX spectra compared to solar real observations (see dis-
1516
+ cussion in Sect. 4.3.1). We note that this asymmetry was already
1517
+ something seen in the original SOAP 2.0 paper (see Fig. 6 in Du-
1518
+ musque et al. 2014). Something also interesting to note, that we
1519
+ see when using as input both the PHOENIX and solar spectra is
1520
+ the bump in the CB RV effect when the active region crosses the
1521
+ center of the disk (phase=0.5). This is induced by the fact that
1522
+ CB is maximum at µ = 0.85 and not at disk center, as was shown
1523
+ in Löhner-Böttcher et al. (2019).
1524
+ In Fig.14 we show the result of the estimated CB RV effect
1525
+ for an equatorial 1% spot or facula for stars of different tempera-
1526
+ ture (i.e. spectral type): 6050 K (F9), 5778 K (G2), 5480 K (G8),
1527
+ 5380 K (G9) and 5100 K (K2). For the spot, we see a positive
1528
+ only effect for the F9 and G2 simulations, which is expected, but
1529
+ for later spectral type, we start to see the emergence of a flux
1530
+ effect. This effect, as already discussed in Sect.4.3.1 comes from
1531
+ the absorption of molecules, that change significantly over a few
1532
+ hundreds of Kelvin for the quiet photosphere at 5480 K and a
1533
+ spot at 4817 K for the G8 simulation for example. Also, we see
1534
+ that the more we go towards cooler stars, the more the CB ef-
1535
+ fect show a flux contribution, and this comes from the fact that
1536
+ molecular absorption is not linear with effective temperature. Al-
1537
+ though molecular absorption prevent us of clearly separating the
1538
+ flux effect of spots from the CB effect like in the case of the
1539
+ F9 or G2 star, the total RV effect including both contributions is
1540
+ still properly estimated. Therefore, users should be careful when
1541
+ interpreting the estimated RV induced by the inhibition of con-
1542
+ vection for spots on stars with spectral type later than the Sun,
1543
+ however, they can trust the total RV effect estimated. Regarding
1544
+ the facula, we observe a positive only effect for all spectral type,
1545
+ and thus the CB effect is properly modeled for this type of active
1546
+ regions.
1547
+ 4.3.4. Limitation of SOAP-GPU when moving away from
1548
+ solar twins
1549
+ On a careful note, we want to warn the user that a lot of the
1550
+ physics included in SOAP-GPU is based on solar observations,
1551
+ like for example the variation of the bisector of the quiet photo-
1552
+ sphere with respect to the center-to-limb angle (Löhner-Böttcher
1553
+ et al. 2019), or the bisector of an active region extracted from
1554
+ solar observations (Cavallini et al. 1985a). Therefore, although
1555
+ we try to correct for some effects, like the variation of CB veloc-
1556
+ ity as a function of spectral type, the more we go away from the
1557
+ solar case, the more we should be careful about interpreting the
1558
+ results coming out of SOAP-GPU.
1559
+ We note that when modifying the bisector shape of solar or
1560
+ PHEONIX spectra for the disk center, to account for different
1561
+ convection velocity across spectral type, we model the effect of
1562
+ the “third signature” of granulation (Gray 2009). The inherent
1563
+ shape of the bisector (known as the “second signature” of granu-
1564
+ lation) and how it varies with µ (Löhner-Böttcher et al. 2019) is
1565
+ still the one observed for the Sun and it is well known in the liter-
1566
+ ature that the bisector shape of disc-integrated observations, and
1567
+ therefore by analogy at disk center, varies significantly among
1568
+ luminosity class and spectral type (see Figure 17.15 in Gray
1569
+ 2008; Ba¸stürk et al. 2011). In those papers, we see that inside the
1570
+ small range from early G’s dwarfs to early K’s dwarfs, the bisec-
1571
+ tor shapes does not change drastically and therefore, although
1572
+ the integrated spectra for those stars won’t be realist in terms of
1573
+ line bisector, the way SOAP-GPU models stellar activity should
1574
+ still be quite realistic as in the end, what counts is the differential
1575
+ between the activity and quiet phases. As we can see in the pre-
1576
+ ceding subsection, besides SOAP-GPU not being able anymore
1577
+ to separate the inhibition of the CB effect from the flux effect
1578
+ for early K’s, the tests we performed show that the code seems
1579
+ to behaves quite well in estimating the total RV effect induced
1580
+ by spots and faculae. However, outside of this small range from
1581
+ G to K dwarfs, bisectors are completely different, and we warn
1582
+ the users that the present version of SOAP-GPU might give very
1583
+ unrealistic stellar integrated spectra and estimation of stellar ac-
1584
+ tivity. There is perhaps only one exception for dwarfs cooler than
1585
+ early K’s, for which the velocity of convection decreases to level
1586
+ that are very difficult to measure. For those stars, stellar activity
1587
+ is dominated by the flux effect from spot and faculae. Therefore,
1588
+ for such stars, users should ignore the output from the CB effect
1589
+ and only consider the flux effect.
1590
+ To better model stellar activity for stars different than the
1591
+ Sun, we would require disk-resolved spectra for other stars.
1592
+ Those could come from 3D MHD simulations (e.g. Johnson et al.
1593
+ 2021b; Dravins et al. 2021), or thanks to spatially resolved spec-
1594
+ troscopic observation across stellar surfaces thanks to transiting
1595
+ Article number, page 12 of 17
1596
+
1597
+ 700
1598
+ Datafrom Liebing etal.2021
1599
+ Cubic fit
1600
+ 600
1601
+ Spectral type: F9
1602
+ Spectraltype:G2 (Sun)
1603
+ Spectraltype:G8
1604
+ 500
1605
+ Spectral type: G9
1606
+ RV (m/s)
1607
+ Spectraltype:K2
1608
+ 400
1609
+ 300
1610
+ CB
1611
+ 200
1612
+ 100
1613
+ 4800
1614
+ 5000
1615
+ 5200
1616
+ 5400
1617
+ 5600
1618
+ 5800
1619
+ 6000
1620
+ 6200
1621
+ Teff (K)
1622
+ 1.0
1623
+ Spectral type: F9
1624
+ Spectral type: G2 (Sun)
1625
+ Spectraltype:G8
1626
+ Spectral type: G9
1627
+ 0.8
1628
+ Spectral type:K2
1629
+ I flux
1630
+ Normalized
1631
+ 0.6
1632
+ 0.4
1633
+ 0.2
1634
+ 0.0
1635
+ -400
1636
+ -200
1637
+ 0
1638
+ 200
1639
+ 400
1640
+ Doppler velocity (m/s)Yinan Zhao et al.: SOAP-GPU
1641
+ Fig. 13. Simulation of an equatorial 1% spot (left) and 1% facula (right) with different temperatures using PHOENIX spectral library. The quiet
1642
+ Sun spectrum is extracted from PHOENIX spectral library with log(g) of 4.5 and Teff = 5778K. The effective temperature of the spot spectra
1643
+ are 5015K, 5115K and 5215K, and for the facula spectra 5928K, 6028K and 6128K. We also show the results of using the observed Kitt Peak
1644
+ solar spectra including the PHOENIX SEDs (using Eq. 11, 10 and 12). The µ dependent CB is included in the simulations. Left: For the spot we
1645
+ see that when the difference in temperature between the spot and the quiet photosphere increases, the RV flux effect becomes larger. We note a
1646
+ rather large discrepancy in the CB effect between the observed solar and PHOENIX input spectra. This is likely due to the fact that the observed
1647
+ solar spectra are not well normalized (see Sect 4.3.3). Right: For the facula, we note the same problem of negative values for the CB effect, which
1648
+ expected as the same badly normalised solar active spectrum is used. We also see that considering the corresponding PHOENIX SED when using
1649
+ the observed solar spectra significantly change the flux contribution (see Sect 4.3.3). Considering the PHOENIX SED gives results much closer to
1650
+ the PHOENIX simulations.
1651
+ Fig. 14. Simulation of the CB RV effect of an equatorial 1% spot (top)
1652
+ and 1% facula (bottom) for different temperature of the quiet photo-
1653
+ sphere (i.e. different spectral type) using the PHOENIX spectral library.
1654
+ The temperature difference between the quiet photosphere ∆Teff for spot
1655
+ and facula is fixed to 663K and 250 K, respectively. Due to the strong
1656
+ absorption effect of molecules in spots on stars cooler than the Sun, we
1657
+ see the appearance of a flux effect in the derivation for the CB effect
1658
+ only (see Sect 4.3.3).
1659
+ planets (e.g. Dravins et al. 2017). Both approach are challeng-
1660
+ ing, however could led to a much more realistic modelisation
1661
+ of stellar activity from other stars than our Sun. We note that
1662
+ it is rather easy to input different spectra in SOAP-GPU than
1663
+ the ones provided (the Sun and PHEONIX spectra), and there-
1664
+ fore if users have access to disk-resolved spectra with more re-
1665
+ alistic line-bisectors, SOAP-GPU could still be used to obtain
1666
+ efficiently disk-integrated spectra and model the corresponding
1667
+ stellar activity effect. We note that the CB injection part is an
1668
+ individual module in SOAP-GPU that users can easily modify.
1669
+ 5. Conclusions
1670
+ In this paper, we present a GPU-based improvement to SOAP
1671
+ 2.0, named SOAP-GPU, that allows to efficiently model stellar
1672
+ activity at the spectral level. With the implementation of GPU in-
1673
+ terpolation and summation, benchmark calculations demonstrate
1674
+ that SOAP-GPU improves the computational speed by a factor of
1675
+ 60 when modeling stellar activity on a full visible spectral range
1676
+ at R=115’000 of resolution, while having the same accuracy.
1677
+ Beside the huge gain in speed, SOAP-GPU also provides
1678
+ a more complex modelisation of stellar activity compared to
1679
+ SOAP 2.0. Complex active region scenarios, with regions over-
1680
+ lapping is now handled by the code. This is mainly useful when
1681
+ modeling active phases of a star like the Sun, with hundreds of
1682
+ active regions. The contrast of the active regions is now wave-
1683
+ length dependant, and therefore change for each wavelength
1684
+ of the modeled spectra. The dependence of line bisector with
1685
+ center-to-limb angle µ, following the work of Löhner-Böttcher
1686
+ et al. (2019) and Cavallini et al. (1985a), is also now accounted
1687
+ for for the Kitt Peak observed quiet and active atlases, but also
1688
+ for PHOENIX spectra. Although the induced RV effect is rather
1689
+ negligible when using the observed solar spectra as input, includ-
1690
+ ing the framework to change line bisector is crucial to properly
1691
+ model convection when injecting PHOENIX spectra as input.
1692
+ The use of PHOENIX spectra allows us now to model a wide
1693
+ variety of stars with different stellar and active region properties,
1694
+ and allows us as well to better model faculae, as the correspond-
1695
+ ing spectrum now has the proper effective temperature (SOAP
1696
+ 2.0 was using the Kitt Peak sunspot atlas to model faculae).
1697
+ Article number, page 13 of 17
1698
+
1699
+ 6
1700
+ SolarspectrawithPhoenixSED
1701
+ Phoenix spectra,spot Teff=5015K
1702
+ 4
1703
+ Phoenix spectra,spot Teff=5115K
1704
+ : RV (m/s)
1705
+ Phoenixspectra,spotTeff=5215K
1706
+ 2
1707
+ Tot
1708
+ 0
1709
+ -2
1710
+ 4
1711
+ Flux RV (m/s)
1712
+ 2
1713
+ 0
1714
+ -2
1715
+ 4
1716
+ RV (m/s)
1717
+ 3
1718
+ 2
1719
+ Bconv F
1720
+ 1
1721
+ 0
1722
+ 0.0
1723
+ 0.2
1724
+ 0.4
1725
+ 0.6
1726
+ 0.8
1727
+ 1.0
1728
+ Phase6
1729
+ Solar spectra with Phoenix SED
1730
+ Phoenixspectra,faculaeTeff=5928K
1731
+ 4
1732
+ Phoenix spectra,faculae Teff=6028K
1733
+ Tot RV (m/s)
1734
+ Phoenix spectra,faculaeTeff=6128K
1735
+ 2
1736
+ 0
1737
+ -2
1738
+ 4
1739
+ Flux RV (m/s)
1740
+ 2
1741
+ 0
1742
+ -2
1743
+ -4
1744
+ 4
1745
+ RV (m/s)
1746
+ 3
1747
+ 2
1748
+ Bconv
1749
+ 1
1750
+ 0
1751
+ 0.0
1752
+ 0.2
1753
+ 0.4
1754
+ 0.6
1755
+ 0.8
1756
+ 1.0
1757
+ PhaseF9Teff=6050K
1758
+ G2 Teff=5779K
1759
+ Spot RV (m/s)
1760
+ G8Teff=5480K
1761
+ G9Teff=5380K
1762
+ 2
1763
+ K2Teff=5100K
1764
+ 0
1765
+ 4
1766
+ Faculae RV (m/s)
1767
+ 3
1768
+ 2
1769
+ 1
1770
+ 0
1771
+ 0.0
1772
+ 0.2
1773
+ 0.4
1774
+ 0.6
1775
+ 0.8
1776
+ 1.0
1777
+ PhaseA&A proofs: manuscript no. SOAP_GPU
1778
+ When modeling the inhibition of CB effect using as input
1779
+ the solar Kitt Peak quiet and active spectral atlases, we noticed
1780
+ that the derived RVs go negative, which is not expected. This
1781
+ comes from molecular absorption that can be seen in the spot
1782
+ spectrum due to lower temperature compared to the quiet Sun.
1783
+ Even though we do not include the contrast of the active region
1784
+ when modeling the RV CB effect only (see Eqs. 2 and 10), the
1785
+ difference in flux at the level of molecular absorption bands will
1786
+ show up as a flux effect in the estimated CB RVs. Positive val-
1787
+ ues will be added to the CB RV effect before the spot crosses
1788
+ the stellar center, and negative values after, therefore creating an
1789
+ asymmetry.
1790
+ When modeling other stars than the Sun using PHOENIX
1791
+ spectral library, users should be aware that a lot of physics in-
1792
+ cluded in SOAP-GPU are based on solar observations, and al-
1793
+ though the code tries to correct for known effects like the vari-
1794
+ ation of CB velocity as a function of effective temperature (i.e
1795
+ spectral type, see Sect. 4.3.3), the more we go away from the
1796
+ Sun, the more the results should be interpreted with caution (see
1797
+ discussion in Sect. 4.3.4). The modelisation of stellar activity
1798
+ for other stars than the Sun is currently limited by the knowl-
1799
+ edge we have about disk-resolved bisectors for such stars. Such
1800
+ information is very challenging to obtain, however, 3D MHD
1801
+ simulations (e.g. Johnson et al. 2021b; Dravins et al. 2021) and
1802
+ resolved spectroscopic observation of other stars due to plane-
1803
+ tary transits (e.g. Dravins et al. 2017) could significantly help.
1804
+ Also, when modeling stars of later spectral type than the Sun,
1805
+ we are not able anymore to separate clearly the inhibition of
1806
+ CB effect from the flux effect due to the strong absorption of
1807
+ molecules. However, the output for the total RV effect (flux plus
1808
+ inhibition of CB effects) should be modeled properly. SOAP-
1809
+ GPU have been tested up to a K2 star (Teff = 5100 K) with spots
1810
+ 663 K cooler and give satisfactory results. Modeling later spec-
1811
+ tral type is challenging mainly due to continuum normalisation
1812
+ of the PHOENIX spectra and injection of spectral line bisector
1813
+ due to line blending, and users should be very careful about the
1814
+ interpretation of the results for such stars with the present code.
1815
+ There are still some improvements that could be made to bet-
1816
+ ter model the physics at play. Although the spot and facula spec-
1817
+ trum used when considering PHOENIX spectra as input are of
1818
+ different temperature, and therefore in spectral content, we still
1819
+ associate to those regions the same active bisector as measured
1820
+ for the Sun on a facula (Cavallini et al. 1985a). Spots are induced
1821
+ by stronger magnetic fields than facula, and thus it is likely that
1822
+ the bisector of spectral lines will be slightly different. Although
1823
+ it is possible to know what is the bisector of a few spectral lines
1824
+ inside a spot at disk center, to our knowledge, no measurement
1825
+ of spot line bisectors for different µ angles are published. Cav-
1826
+ allini et al. (1985a) also show in their Fig. 1 that depending on
1827
+ the facula observed, the bisector shape changes due likely to dif-
1828
+ ferent magnetic field strength and therefore different level of CB
1829
+ inhibition. As can be seen in Fig. 10, the effect of inducing µ
1830
+ dependant spectral line shape in the quiet and active regions is
1831
+ rather small, and although with more solar data about spots and
1832
+ faculae we could better model the physics at play, results in terms
1833
+ of RV derivation would be rather similar. This likely comes from
1834
+ the fact due to limb-darkening, most of the weight is put on the
1835
+ disk center, where spectral lines does not change significantly in
1836
+ shape.
1837
+ With the performance of SOAP-GPU, it is now possible to
1838
+ model activity at the spectral level for complex stellar surfaces
1839
+ with many active regions and for a long period of time. A so-
1840
+ lar activity simulator, either based on statistical properties of so-
1841
+ lar active regions (similar to Borgniet et al. 2015) or on the ob-
1842
+ served distribution of those (similar to e.g. Meunier et al. 2010)
1843
+ will be published in a forthcoming paper. We encourage any per-
1844
+ son working on techniques to separate the activity effect from
1845
+ planetary signals at the spectral level, to test their framework on
1846
+ SOAP-GPU simulations, where photon-noise, instrumental and
1847
+ telluric systematics are not perturbing the spectral timeseries.
1848
+ Acknowledgements. We thank the anonymous referee for the insightful and con-
1849
+ structive comments on this paper. We thank Michael Crerignier for his help in
1850
+ normalizing PHOENIX spectra with RASSINE. We also thank Xiang Gao for
1851
+ the constructive comments on GPU computing. This project has received fund-
1852
+ ing from the European Research Council (ERC) under the European Union’s
1853
+ Horizon 2020 research and innovation programme (grant agreement SCORE No
1854
+ 851555). This work has been carried out within the framework of the National
1855
+ Centre of Competence in Research PlanetS supported by the Swiss National Sci-
1856
+ ence Foundation. The authors acknowledge the financial support of the SNSF.
1857
+ References
1858
+ Aigrain, S., Parviainen, H., & Pope, B. J. S. 2016, MNRAS, 459, 2408
1859
+ Aigrain, S., Pont, F., & Zucker, S. 2012, MNRAS, 419, 3147
1860
+ Allende Prieto, C., Koesterke, L., Ludwig, H.-G., Freytag, B., & Caffau, E. 2013,
1861
+ A&A, 550, A103
1862
+ Ba¸stürk, Ö., Dall, T. H., Collet, R., Lo Curto, G., & Selam, S. O. 2011, A&A,
1863
+ 535, A17
1864
+ Baranne, A., Queloz, D., Mayor, M., et al. 1996, A&AS, 119, 373
1865
+ Barragán, O., Aigrain, S., Rajpaul, V. M., & Zicher, N. 2022, MNRAS, 509, 866
1866
+ Binnenfeld, A., Shahaf, S., Anderson, R. I., & Zucker, S. 2022, A&A, 659, A189
1867
+ Binnenfeld, A., Shahaf, S., & Zucker, S. 2020, A&A, 642, A146
1868
+ Boisse, I., Bonfils, X., & Santos, N. C. 2012, A&A, 545, 109
1869
+ Borgniet, S., Meunier, N., & Lagrange, A. M. 2015, A&A, 581, A133
1870
+ Brewer, J. M., Fischer, D. A., Blackman, R. T., et al. 2020, AJ, 160, 67
1871
+ Cavallini, F., Ceppatelli, G., & Righini, A. 1985a, A&A, 143, 116
1872
+ Cavallini, F., Ceppatelli, G., & Righini, A. 1985b, A&A, 150, 256
1873
+ Chapman, G. A., Cookson, A. M., Dobias, J. J., & Walton, S. R. 2001, ApJ, 555,
1874
+ 462
1875
+ Collier Cameron, A., Ford, E. B., Shahaf, S., et al. 2021, MNRAS, 505, 1699
1876
+ Collier Cameron, A., Mortier, A., Phillips, D., et al. 2019, MNRAS, 487, 1082
1877
+ Cretignier, M., Dumusque, X., Allart, R., Pepe, F., & Lovis, C. 2020a, A&A,
1878
+ 633, A76
1879
+ Cretignier, M., Dumusque, X., & Pepe, F. 2022, A&A, 659, A68
1880
+ Cretignier, M., Francfort, J., Dumusque, X., Allart, R., & Pepe, F. 2020b, A&A,
1881
+ 640, A42
1882
+ Davis, A. B., Cisewski, J., Dumusque, X., Fischer, D. A., & Ford, E. B. 2017,
1883
+ ApJ, 846, 59
1884
+ de Beurs, Z. L., Vanderburg, A., Shallue, C. J., et al. 2022, AJ, 164, 49
1885
+ Donati, J. F., Yu, L., Moutou, C., et al. 2017, MNRAS, 465, 3343
1886
+ Dravins, D., Lindegren, L., & Nordlund, A. 1981, A&A, 96, 345
1887
+ Dravins, D., Ludwig, H.-G., Dahlén, E., & Pazira, H. 2017, A&A, 605, A91
1888
+ Dravins, D., Ludwig, H.-G., & Freytag, B. 2021, A&A, 649, A16
1889
+ Dumusque, X. 2016, A&A, 593, A5
1890
+ Dumusque, X., Boisse, I., & Santos, N. C. 2014, ApJ, 796, 132
1891
+ Dumusque, X., Cretignier, M., Sosnowska, D., et al. 2021, A&A, 648, A103
1892
+ Dumusque, X., Glenday, A., Phillips, D. F., et al. 2015, ApJ, 814, L21
1893
+ Gilbertson, C., Ford, E. B., & Dumusque, X. 2020a, Research Notes of the Amer-
1894
+ ican Astronomical Society, 4, 59
1895
+ Gilbertson, C., Ford, E. B., Jones, D. E., & Stenning, D. C. 2020b, ApJ, 905, 155
1896
+ Gray, D. F. 2008, The Observation and Analysis of Stellar Photospheres, ed.
1897
+ U. C. U. P. Cambridge
1898
+ Gray, D. F. 2009, ApJ, 697, 1032
1899
+ Herrero, E., Ribas, I., Jordi, C., et al. 2016, A&A, 586, A131
1900
+ Husser, T. O., Wende-von Berg, S., Dreizler, S., et al. 2013, A&A, 553, A6
1901
+ Johnson, L. J., Norris, C. M., Unruh, Y. C., et al. 2021a, MNRAS, 504, 4751
1902
+ Johnson, L. J., Norris, C. M., Unruh, Y. C., et al. 2021b, MNRAS, 504, 4751
1903
+ Jones, D. E., Stenning, D. C., Ford, E. B., et al. 2017, arXiv e-prints,
1904
+ arXiv:1711.01318
1905
+ Liebing, F., Jeffers, S. V., Reiners, A., & Zechmeister, M. 2021, A&A, 654, A168
1906
+ Lin, A. S. J., Monson, A., Mahadevan, S., et al. 2022, AJ, 163, 184
1907
+ Löhner-Böttcher, J., Schmidt, W., Schlichenmaier, R., Steinmetz, T., &
1908
+ Holzwarth, R. 2019, A&A, 624, A57
1909
+ Löhner-Böttcher, J., Schmidt, W., Stief, F., Steinmetz, T., & Holzwarth, R. 2018,
1910
+ A&A, 611, A4
1911
+ Ludwig, H. G., Caffau, E., Steffen, M., et al. 2009, Mem. Soc. Astron. Italiana,
1912
+ 80, 711
1913
+ Mayor, M. & Queloz, D. 1995, Nature, 378, 355
1914
+ Meunier, N., Desort, M., & Lagrange, A.-M. 2010, A&A, 512, A39
1915
+ Article number, page 14 of 17
1916
+
1917
+ Yinan Zhao et al.: SOAP-GPU
1918
+ Meunier, N., Lagrange, A.-M., Mbemba Kabuiku, L., et al. 2017, A&A, 597,
1919
+ A52
1920
+ Milbourne, T. W., Haywood, R. D., Phillips, D. F., et al. 2019, ApJ, 874, 107
1921
+ Muraközy, J., Baranyi, T., & Ludmány, A. 2014, Sol. Phys., 289, 563
1922
+ Norris, C. M., Beeck, B., Unruh, Y. C., et al. 2017, A&A, 605, A45
1923
+ Pepe, F., Cristiani, S., Rebolo, R., et al. 2021, A&A, 645, A96
1924
+ Rajpaul, V., Aigrain, S., Osborne, M. A., Reece, S., & Roberts, S. 2015, MN-
1925
+ RAS, 452, 2269
1926
+ Rajpaul, V. M., Aigrain, S., & Buchhave, L. A. 2020, MNRAS, 492, 3960
1927
+ Saar, S. H. & Donahue, R. A. 1997, ApJ, 485, 319
1928
+ Stief, F., Löhner-Böttcher, J., Schmidt, W., Steinmetz, T., & Holzwarth, R. 2019,
1929
+ A&A, 622, A34
1930
+ Wallace, L., Hinkle, K., & Livingston, W. 1998, An atlas of the spectrum of the
1931
+ solar photosphere from 13,500 to 28,000 cm-1 (3570 to 7405 A)
1932
+ Wallace, L., Hinkle, K., & Livingston, W. C. 2005, An atlas of sunspot umbral
1933
+ spectra in the visible from 15,000 to 25,500 cm-1 (3920 to 6664 Å)
1934
+ Zhao, J., Ford, E. B., & Tinney, C. G. 2022a, ApJ, 935, 75
1935
+ Zhao, L. L., Fischer, D. A., Ford, E. B., et al. 2022b, AJ, 163, 171
1936
+ Article number, page 15 of 17
1937
+
1938
+ A&A proofs: manuscript no. SOAP_GPU
1939
+ Appendix A: Line bisectors of PHOENIX spectra
1940
+ As discussed in Sects. 4.3.2 and 4.3.3, before injecting the µ
1941
+ dependant bisector for solar or PHOENIX spectra to properly
1942
+ model CB and its inhibition close to the limb and in active re-
1943
+ gions, we need to remove any bisector shape already present
1944
+ in the input spectra. As PHOENIX spectral library is gener-
1945
+ ated from 1D spectral synthesis, the line bisectors cannot include
1946
+ properly the CB effect and therefore should be close to straight.
1947
+ In Fig. A.1, we show for each simulation of different spectral
1948
+ types the bisector of a few iron lines that are used in Löhner-
1949
+ Böttcher et al. (2019). For each spectral type simulated, we show
1950
+ the bisectors for the quiet photosphere, but also for simulated
1951
+ spot and faculae, 663 K cooler or 250 K hotter, respectively. As
1952
+ expected, most of the bisector are close to straight lines. We how-
1953
+ ever fitted the average bisector with a second order polynomial to
1954
+ remove the small curvatures observed before injecting the proper
1955
+ bisectors at different µ angles (see Sect. 4.3.2). It is not clear if
1956
+ those curvatures are real effect in the spectral synthesis, or sim-
1957
+ ply due to blends. The correction performed is small compared
1958
+ to the bisectors that we inject afterward, therefore if only due to
1959
+ blends, this process does not significantly change the outputs.
1960
+ Article number, page 16 of 17
1961
+
1962
+ Yinan Zhao et al.: SOAP-GPU
1963
+ Fig. A.1. Bisector of PHOENIX spectra. For each input seed spectrum using PHOENIX spectral library, we use five strong iron lines: FeI
1964
+ 5250.2084Å (green), FeI 5250.6453Å (cyan), FeI 5434.5232Å (purple), FeI 6173.3344Å (orange) and FeI 6301.5008Å (yellow) to measure the
1965
+ average bisector of the input spectra. Bisector outliers outside a window of 0.1Å around each line center are rejected to avoid those points, certainly
1966
+ affected by line blending, to bias our measurement of line bisector. Each line correspond to a different spectral type, and from left to right, we can
1967
+ see the bisector of the spectrum used for the quiet photosphere, a spot region (663 K cooler) and a facula region (250 K hotter). We average those
1968
+ line bisectors at certain depth (as shown by the red dots) and fit the obtained data with a second order polynomial. The fitted bisector is used to
1969
+ remove the bisector of input seed spectrum.
1970
+ Article number, page 17 of 17
1971
+
1972
+ F9 Teff = 6050 K
1973
+ F9 Teff = 5387K
1974
+ F9 Teff = 6300 K
1975
+ 1.0 -
1976
+ 1.0
1977
+ 1.0
1978
+ 0.8
1979
+ 0.8
1980
+ 8'0
1981
+ 0.6 -
1982
+ 0.6 -
1983
+ 0.6
1984
+ 0.4 -
1985
+ 0.4
1986
+ 0.4
1987
+ 0.2
1988
+ 0.2 -
1989
+ 0.2
1990
+ 0.0 -
1991
+ 00
1992
+ 00
1993
+ -200
1994
+ -150
1995
+ -100
1996
+ -50
1997
+ 50
1998
+ 100
1999
+ 150
2000
+ 200
2001
+ -200
2002
+ -150
2003
+ -100
2004
+ -50
2005
+ 50
2006
+ 100
2007
+ 150
2008
+ 200
2009
+ 200
2010
+ -150
2011
+ -100
2012
+ -50
2013
+ 50
2014
+ 100
2015
+ 150
2016
+ 200
2017
+ G2 Teff = 5778 K
2018
+ G2 Teff = 5115 K
2019
+ G2 Teff = 6028 K
2020
+ 1.0
2021
+ 1.0
2022
+ 1.0
2023
+ 0.8
2024
+ 0.8
2025
+ 8'0
2026
+ 0.6 -
2027
+ 0.6
2028
+ 0.6
2029
+ 0.4 -
2030
+ 0.4
2031
+ 0.4
2032
+ 0.2
2033
+ 0.2 -
2034
+ 0.2
2035
+ 0.0 -
2036
+ 0'0
2037
+ 0.0
2038
+ -200
2039
+ -150
2040
+ -100
2041
+ -50
2042
+ 0
2043
+ 50
2044
+ 100
2045
+ 150
2046
+ 200
2047
+ -200
2048
+ -150
2049
+ -100
2050
+ -50
2051
+ 0
2052
+ 50
2053
+ 100
2054
+ 150
2055
+ 200
2056
+ -200
2057
+ -150
2058
+ -100
2059
+ -50
2060
+ 0
2061
+ 50
2062
+ 100
2063
+ 150
2064
+ 200
2065
+ G8 Teff = 5480 K
2066
+ G8 Teff = 4817 K
2067
+ G8 Teff = 5730 K
2068
+ 1.0
2069
+ 1.0
2070
+ 1.0
2071
+ 0.8
2072
+ 80
2073
+ 0.8
2074
+ 0.6
2075
+ 0.6
2076
+ 0.6
2077
+ 0.4 -
2078
+ 0.4
2079
+ 0.4 -
2080
+ 0.2
2081
+ 0.2 -
2082
+ 0.2
2083
+ 0.0 -
2084
+ 0.0 -
2085
+ 0.0
2086
+ -200
2087
+ -150
2088
+ -100
2089
+ -50
2090
+ 50
2091
+ 100
2092
+ 150
2093
+ 200
2094
+ 200
2095
+ -150
2096
+ -100
2097
+ -50
2098
+ 0
2099
+ 50
2100
+ 100
2101
+ 150
2102
+ 200
2103
+ 200
2104
+ -150
2105
+ -100
2106
+ -50
2107
+ 50
2108
+ 100
2109
+ 150
2110
+ 200
2111
+ G9 Teff = 5380 K
2112
+ G9 Teff = 4717 K
2113
+ G9 Teff = 5630 K
2114
+ 1.0 -
2115
+ 1.0
2116
+ 1.0
2117
+ 0.8
2118
+ 0.8
2119
+ 0.8
2120
+ 0.6
2121
+ 0.6 -
2122
+ 0.6
2123
+ 0.4
2124
+ 0.4
2125
+ 0.4
2126
+ 0.2 -
2127
+ 0.2 -
2128
+ 0.2
2129
+ 0.0 -
2130
+ 0'0
2131
+ 0.0
2132
+ 200
2133
+ -150
2134
+ -100
2135
+ -50
2136
+ 50
2137
+ 100
2138
+ 150
2139
+ 200
2140
+ -200-150-100
2141
+ -50
2142
+ 0
2143
+ 50
2144
+ 100
2145
+ 150
2146
+ 200
2147
+ -200
2148
+ -150-100-50
2149
+ 50
2150
+ 100
2151
+ 150
2152
+ 200
2153
+ K2 Teff = 5100 K
2154
+ K2 Teff = 4437 K
2155
+ K2 Teff = 5350 K
2156
+ 1.0
2157
+ 1.0
2158
+ 1.0
2159
+ 0.8
2160
+ 80
2161
+ 0.8
2162
+ 0.6 -
2163
+ 0.6
2164
+ 0.6
2165
+ 0.4 -
2166
+ 0.4
2167
+ 0.4
2168
+ 0.2 -
2169
+ 0.2
2170
+ 0.2
2171
+ 0.0 -
2172
+ 0'0
2173
+ 0'0
2174
+ -200
2175
+ 150
2176
+ 100
2177
+ 50
2178
+ 0
2179
+ 50
2180
+ 100
2181
+ 150
2182
+ 200
2183
+ -200
2184
+ -150
2185
+ 100
2186
+ 50
2187
+ 50
2188
+ 100
2189
+ 150
2190
+ 200
2191
+ 200
2192
+ 150
2193
+ 100
2194
+ -50
2195
+ 0
2196
+ 50
2197
+ 100
2198
+ 150
2199
+ 200
LNE3T4oBgHgl3EQfAgnY/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LNE4T4oBgHgl3EQfiQ3g/content/tmp_files/2301.05133v1.pdf.txt ADDED
@@ -0,0 +1,683 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.05133v1 [cs.AI] 12 Jan 2023
2
+ Is AI Art Another Industrial Revolution in the Making?
3
+ Alexis Newton, Kaustubh Dhole
4
+ Department of Computer Science
5
+ Emory University
6
+ {annewto, kdhole}@emory.edu
7
+ Abstract
8
+ A major shift from skilled to unskilled workers was one of
9
+ the many changes caused by the Industrial Revolution, when
10
+ the switch to machines contributed to decline in the social
11
+ and economic status of artisans, whose skills were dismem-
12
+ bered into discrete actions by factory-line workers. We con-
13
+ sider what may be an analogous computing technology: the
14
+ recent introduction of AI-generated art software. AI art gener-
15
+ ators such as Dall-E and Midjourney can create fully rendered
16
+ images based solely on a user’s prompt, just at the click of a
17
+ button. Some artists fear if the cheaper price and conveyor-
18
+ belt speed that comes with AI-produced images is seen as
19
+ an improvement to the current system, it may permanently
20
+ change the way society values/views art and artists. In this ar-
21
+ ticle, we consider the implications that AI art generation in-
22
+ troduces through a post-industrial revolution historical lens.
23
+ We then reflect on the analogous issues that appear to arise
24
+ as a result of the AI art revolution, and we conclude that the
25
+ problems raised mirror those of industrialization, giving a vi-
26
+ tal glimpse into what may lie ahead.
27
+ Introduction
28
+ The industrial revolution caused a major shift from skilled to
29
+ unskilled labor when machines contributed to a massive lay-
30
+ off of artisans in favor of factory-line workers. William Pelz
31
+ describes how prior to the industrial revolution people had
32
+ been working in much the same way for thousands of years,
33
+ producing goods through human labor with some assistance
34
+ via animals or water power. However, he says, “All of this
35
+ changed with the rise of the machine: tools would no longer
36
+ serve people, but rather people would serve machines” (Pelz
37
+ 2016). Pelz argues that due to this massive change in goods
38
+ production, the people became an “appendage” to the ma-
39
+ chine, as humans were suddenly at the mercy of machines
40
+ using them to make goods. As factory life took hold, com-
41
+ pensation was no longer based on paying for skill, but rather
42
+ on paying for time. This helped to usher in a different kind of
43
+ day-to-day experience for most commoners–that of a time-
44
+ work discipline. Maxine Berg (2014) notes the change to a
45
+ mechanized factory sector from pre-industrial handicrafts.
46
+ Many traditional workers had to transition to this type of
47
+ work, or risk being left behind by a quickly transforming
48
+ industry, leading to the devaluation and destruction of busi-
49
+ nesses that could not compete with the cheaper and faster
50
+ production that industrialization had to offer.
51
+ Creative AI Across Modalities 2023 (creativeai-ws.github.io),
52
+ Thirty-Seventh
53
+ AAAI
54
+ Conference
55
+ on
56
+ Artificial
57
+ Intelligence
58
+ (www.aaai.org), February 7-23, Washington, D.C., USA
59
+ With the recent introduction of AI-based art models
60
+ (Ho, Jain, and Abbeel 2020; Ramesh et al. 2022; Ruiz et al.
61
+ 2022), we argue that a shift largely reminiscent of the post-
62
+ industrial revolution is unfolding. As AI-based models be-
63
+ come more and more common, issues artisans experienced
64
+ in the mid 1800s are reemerging, which similarly question
65
+ the very existence of artists today. As we are on the precipice
66
+ of this revolution, it is imperative for all stakeholders, viz,
67
+ policymakers, ethicists, computer scientists and artists to un-
68
+ derstand what such a shift would entail in order to manage
69
+ the consequences of that shift.
70
+ In this article, our aim is to view recent developments in
71
+ the art industry due to the introduction of artificial intelli-
72
+ gence models through a post-industrial lens. In the follow-
73
+ ing sections, we first discuss how technologies influenced
74
+ views on independent artisans in the aftermath of the indus-
75
+ trial revolution. Next, we discuss the positive and negative
76
+ implications of the post-industrial view on AI generated art.
77
+ Finally, we consider current issues raised by these models,
78
+ and conclude by reflecting on the analogous issues seen in
79
+ the industrial revolution.
80
+ A Historical Shift
81
+ From Individual to Factory Worker
82
+ The switch from an individualist working environment to a
83
+ factory-centered one would permanently change the way so-
84
+ ciety viewed independent artisans, bringing in a new age of
85
+ commercialization that was predicated on the swift produc-
86
+ tion of machine-made products over man-made ones. This
87
+ difference on workforce style in is how the Industrial Rev-
88
+ olution led to a change in “people’s relationship to crafts-
89
+ manship, time, community and their own role in society as a
90
+ whole”.
91
+ Such a change in working style was caused that it is hard
92
+ to imagine a time where machines were not at the fore-
93
+ front of civilization. As the industry transformed resemble
94
+ today’s working world, small-scale artisans were pushed out
95
+ of people’s minds in favor of production that was faster and
96
+ cheaper. The individual craftsman all but disappeared from
97
+ the forefront of the business world. By the 1850s, most in-
98
+ dependent shoemakers had been replaced by shoe factories,
99
+ independent weavers had gone out of business, and women
100
+ with hand looms were quickly outstripped by the factories
101
+ and machines bringing more people cheaper goods of higher
102
+ average quality (Smail 1992).
103
+ However, a plethora of small-scale and skill-intensive sec-
104
+ tors, like those in the metal trades and textile industries,
105
+
106
+ managed to develop alongside the rise of factories (Berg
107
+ 2014). Parts of the world also still value individually-made
108
+ fine arts objects, especially cultures in the east like China
109
+ and India. Berg points to the idea of luxury fashion in France
110
+ or small-scale building restoration which is popular in Eu-
111
+ rope (Berg 2014). Though factorization still prevails, it is
112
+ also important to note that the since the early 2000s demand
113
+ for “niche” artisans has actually shown an upward trend.
114
+ The Alliance for Artisan Enterprise (2012) reports that the
115
+ global market for artisan-made products has increased by
116
+ more than 8% per year since 2002, and is worth more than
117
+ $32 billion. One of the reasons for such a trend has been an
118
+ increased willingness to pay a premium for distinctive vis-
119
+ `a-vis mass-produced, goods.
120
+ Machines Have Politics
121
+ Winner (1996) provides an illuminating example of trans-
122
+ forming industry in “Do Artifacts Have Politics?” when
123
+ he looks at the industrial mechanization of Chicago in the
124
+ 1880s where the switch to factory production hurt skilled
125
+ workers. When pneumatic molding machines were imple-
126
+ mented by Cyrus McCormick’s reaper manufacturing plants,
127
+ it drove individuals out of business (Winner 1996). In many
128
+ other industries, this happened because the factory process
129
+ was cheaper, but that was not the case here. In this instance,
130
+ McCormick and the National Union of Iron Molders were
131
+ at war, so even though the iron molding machines were not
132
+ cheaper, they were used to push the previous workers away
133
+ from unionization and out of business. Therefore, while the
134
+ addition of industrial manufacturing hurt many skilled la-
135
+ borers naturally through cheaper replacements, it also hurt
136
+ them unnaturally through the furthering of political agendas
137
+ (Winner 1996).
138
+ Unarguably, Winner concludes that the molding machine
139
+ thus has politics in that its technical arrangements have be-
140
+ come a form of order. Instead of subscribing to the use of
141
+ pneumatic molding machines to speed up or cheapen pro-
142
+ duction, these machines expressed human motives in their
143
+ use towards achieving authority over others. It is undeniable
144
+ that even if artifacts and machines do not have politics, they
145
+ do indeed have power.
146
+ In his famous essay “The Work of Art in the Age of
147
+ Mechanical Reproduction,” Benjamin (1935) discusses the
148
+ change in perception of art in the age of mass production.
149
+ Before mechanical reproduction, art was unique and valued
150
+ for its “aura” – which was derived from its authenticity and
151
+ its physical and cultural context. However, with the ability
152
+ to mechanically reproduce works of art, the traditional bases
153
+ of cultural authority and hierarchy were challenged. As art
154
+ moved to being based on politics instead of tied to rituals,
155
+ it began to serve as a tool for political activism and resis-
156
+ tance, ultimately bringing about social and political change
157
+ (Benjamin 1935).
158
+ Historically, it seems fair to say that the introduction of
159
+ new technologies in the industrial revolution had many im-
160
+ pacts on the individual craftsmen. Some of these impacts
161
+ might be considered a natural course of action, but it is
162
+ imperative as we move forward to acknowledge that other
163
+ forms of use can be exacted through the introduction of new
164
+ technology–use beyond that of merely what a machine phys-
165
+ ically produces.
166
+ AI Art Generation
167
+ We focus on the recent introduction of AI-generated art soft-
168
+ ware to the current art world. AI-based art generators such as
169
+ Dall-E (Ramesh et al. 2021, 2022) and Midjourney are rel-
170
+ atively new pieces of technology that can now create fully
171
+ rendered images based solely on a user’s prompt, often pro-
172
+ ducing impressive and intricate results. If the industrial rev-
173
+ olution changed the way society viewed artisans and crafts-
174
+ men, how might the AI art revolution do the same? We now
175
+ examine AI image generators as a computing technology
176
+ that has the potential to cause this analogous shift in the art
177
+ industry.
178
+ The Perception of AI Art
179
+ The most general fear associated with AI-generated art is
180
+ that it could drastically reduce the amount of jobs available
181
+ to working commercial artists today in areas such as illustra-
182
+ tion, animation, and graphic design. However, some others
183
+ are concerned with the idea that the more “traditional” no-
184
+ tion of art may also be modified by AI-generated art.
185
+ In “The Culture Industry: Enlightenment as Mass De-
186
+ ception,” Adorno and Horkheimer (1944) introduce the term
187
+ “culture industry,” and compare technological advancement
188
+ of mass media and creation to factory production of goods.
189
+ They refer to the “assembly-line character of the culture in-
190
+ dustry, the synthetic, planned method of turning out its prod-
191
+ ucts” as creating a passive society that is being manipulated
192
+ into being satisfied by the products of capitalism, rather than
193
+ by way of true psychological needs such as freedom, creativ-
194
+ ity and happiness (Adorno and Horkheimer 1944).
195
+ In 2018, the art-collective Obvious, produced an art piece
196
+ “Edmond de Belamy,” via a generative adversarial network
197
+ (GAN) software package. The artwork was printed onto a
198
+ canvas and sold at auction for $432, 500, over 43 times
199
+ its pre-auction estimated value (Cohen 2018). Adorno and
200
+ Horkheimer might argue that artwork created by an AI
201
+ is created to be an ideal of art, and that AI artwork is
202
+ merely feeding into mass-media culture industry that threat-
203
+ ens “high arts.”
204
+ Oppositionally, the idea that AI-created art could be
205
+ worthwhile in itself as an art piece, as seen in its high price
206
+ valuation, points heavily towards James Moor’s prediction
207
+ that technology is shifting the questions we ask from “How
208
+ well does a computer do such and such an activity?” to
209
+ “What is the nature and value of such and such an activity?”
210
+ (Moor 1985). In our case, the question shifts from “How
211
+ well can computers make art?” to “What is art?”.
212
+ What is Art?
213
+ The current literature on human attitudes towards AI-
214
+ generated art presents some evidence as to what people
215
+ might feel of this shift in viewpoint. In two recent studies
216
+ (Hong and Curran 2019; Mikalonyt 2022) on attitudes to-
217
+ wards artwork produced by humans versus by artificial intel-
218
+ ligence, researchers found that while most test subjects felt
219
+
220
+ that AI-generated art could be considered “art,” they were
221
+ much less inclined to consider the art to be produced by an
222
+ “artist”. This is a significant distinction because it implies
223
+ that while artwork contains artistic value just by existing,
224
+ artwork is not made just by putting pen to paper.
225
+ Thus we might push the shift Moor describes even further,
226
+ from the question of “What is art?” to “What is an artist?”.
227
+ “When judging whether an object falls under the category
228
+ of ‘artwork,’ the intent of the creator is seen as more impor-
229
+ tant than even the appearance of the object in question” -
230
+ Mikalonyt (2022) seem to think, this is the reason that their
231
+ participants were not unwilling to consider art created by a
232
+ “robot” to be “art,” but were significantly more at odds with
233
+ calling a “robot” an “artist.”
234
+ In shifting the question from the object to the character-
235
+ istic identity, we come to a yet unsolved question about AI
236
+ art: If artwork generated by AI can be called “art”, but the
237
+ model is arguably not an “artist,” then who is the author of
238
+ such a piece? Mikalonyte and Kneer posit that this question
239
+ has not yet been solved, suggesting that the lack of answer is
240
+ reflected in the fact that autonomously generated AI artwork
241
+ has yet to be copyrighted, with proposals to give copyright
242
+ to the human designers of the artificial intelligence, as well
243
+ as to redefine “authorship” so as to include robots in the def-
244
+ inition (Mikalonyt 2022).
245
+ Human Art from Ends to Means
246
+ Besides raising questions in moral philosophy, such an attri-
247
+ bution to the functional aspects of art vis-`a-vis the aesthetics
248
+ could mean a lot of hope for traditional artists, especially
249
+ those who were dependent on the techniques rather than the
250
+ aesthetics of the final product. Artists who would only be
251
+ differentiated by techniques might resort to promoting un-
252
+ usual techniques which are beyond the current scope of AI
253
+ art models, or at least AI art models at present (e.g painting
254
+ on paper towels or woodblocks, using the back of the paint-
255
+ brush, using fingernails to paint). It wouldn’t be surprising
256
+ if artists would resort to differentiating factors relying on
257
+ “means” rather than “ends”. Artists would especially want
258
+ their work to be intrinsically different - earlier that could be
259
+ achieved via both unique propositions of outcomes and of
260
+ methodology, but now it would largely be the latter. It won’t
261
+ be a surprise to witness more conservative forms being re-
262
+ inforced (Browne 2022). Analogous possible trends of in-
263
+ creased interest in niche artworks as against mass-produced
264
+ ones would actually further promote such resorting to tradi-
265
+ tional artistry and differentiating means.
266
+ Fast-Paced Computational Creativity
267
+ Pelz’s viewpoint that people became appendages to ma-
268
+ chines during the industrial revolution clearly has art
269
+ analogues today. Over the years, a large section of the
270
+ art industry has already resorted to computational meth-
271
+ ods (Li, Hashim, and Jacobs 2021; Feldman 2017) after wit-
272
+ nessing the benefits of generative art. In generative art, new
273
+ concepts, forms, shapes, colors, or patterns are created algo-
274
+ rithmically. Artists or programmers first establish some cri-
275
+ teria, post-which a computer creates new art forms adhering
276
+ to those criteria. Such generative art is considered more aes-
277
+ thetically pleasing than functional (Ball 2019). Hence wher-
278
+ ever the functional aspects of art would be irrelevant, like
279
+ in branding and advertising or the larger design sector, this
280
+ transition towards computational art can accelerate people’s
281
+ dependence on art designs which can be quickly iterated.
282
+ Reduced Dependency on Traditional Artists
283
+ Suddenly, a piece of art that may have taken days to produce
284
+ by a professional can be done with a handful of suggested
285
+ words by almost anyone. It must be noted that if the emer-
286
+ gence of this technology follows a similar path to that of
287
+ mechanization following the industrial revolution, it could
288
+ devalue commercial artists significantly and create massive
289
+ job loss in an industry that was previously known to require
290
+ a deeply human touch. Everything from storyboarding, con-
291
+ cept art, and movie creation to advertising work and social
292
+ media would be significantly different, causing a massive
293
+ problem for the individual artists who may have trained for
294
+ years to perfect their skill sets.
295
+ Benefits to Business
296
+ Art has previously been far from a process one could au-
297
+ tomate, but these AI art generators might be the cause of a
298
+ grand shift from skilled to unskilled labor in the free-lance
299
+ art world. In the past few months, several online publications
300
+ have tested using tools like Dall-E or MidJourney to provide
301
+ art to accompany their written content (Warzel 2022).
302
+ Access to AI art generation tools could be seen as an im-
303
+ provement to the current system for many business owners
304
+ where there is a strong demand for commercial art. Being
305
+ able to generate content for websites, branding, marketing
306
+ and sales in a virtually cost-free manner could help small-
307
+ business owners to reach bigger audiences. Online publica-
308
+ tions have largely stepped away from free-lance artists any-
309
+ ways, with many publications hosting content that was cre-
310
+ ated elsewhere (i.e. embedded tweets or stock photography).
311
+ Stock photography businesses sell royalty-free pictures
312
+ for personal or commercial use, usually paying 15 − 40%
313
+ to the creator of the photo for each license (Vincent 2022).
314
+ Recently, AI have been breaking into this market, with the
315
+ distinct art styles of Dall-E or Midjourney popping up on
316
+ stock photo websites (Edwards 2022). Shutterstock, one of
317
+ the largest stock photo retailers, announced that along-with
318
+ OpenAI, they would be banning artwork from other AI gen-
319
+ erators from being uploaded to their site, and it would also
320
+ create a “Contributor Fund” to help pay the artists whose
321
+ work was used to train the AI software (Vincent 2022).
322
+ Art Democratization
323
+ Platforms like YouTube, Instagram and TikTok, which have
324
+ become hosts of content creation, have been able to at-
325
+ tract millions of content creators who make money us-
326
+ ing their services by providing them with fame and mon-
327
+ etary rewards. This has largely happened with the reduced
328
+ technical and social barriers that these arguably demo-
329
+ cratic platforms have provided. AI art models could also
330
+ tread the same path. Democratization of art would mean
331
+
332
+ almost anyone can produce artistic creations, including a
333
+ person without limbs or someone with a neurological dis-
334
+ order that affects their ability to draw or paint. AI-art
335
+ models might be exclusively seen as potential attackers
336
+ on the most talented segments of the artistic society, but
337
+ they will doubtlessly open up a level playing field for
338
+ those who considered art out of reach. Besides, such de-
339
+ mocratization would also be reflected in crowd-sourced
340
+ efforts (Bigham, Kulkarni, and Lasecki 2017; Kittur et al.
341
+ 2013, 2019; Dhole et al. 2021; Srivastava et al. 2022) which
342
+ would seek contributions to aid in developing large creative
343
+ models fairly.
344
+ Increased Amount of Plagiarism
345
+ The Industrial Revolution was replete with examples of in-
346
+ dustrial espionage (Harris 1985; Christopher Klein 2019)
347
+ where large businesses often stole the work and ideas of
348
+ people who had historically performed it. Governments reg-
349
+ ularly encouraged individuals to steal ideas, especially from
350
+ abroad, since it hardly required applicants to be inventors,
351
+ especially if the invention was abroad. The current AI art
352
+ models already have been exposed to the artworks of many
353
+ artists without giving them proper attribution or even seek-
354
+ ing their permission. Millions of generations of artwork have
355
+ already been utilizing these styles. Besides artists’ work
356
+ being plagiarized, it is unclear how credit would get di-
357
+ vided amongst the artists, model trainers and users writing
358
+ prompts. While there have attempts to legally delineate the
359
+ complete generation pipeline (Fjeld and Kortz 2017; Kim
360
+ 2020), the black box nature would make it hard for fair credit
361
+ attribution.
362
+ Increased Carbon Emissions
363
+ The dramatic increase in coal and gas usage, which sky-
364
+ rocketed pollution levels across major cities and indus-
365
+ trial zones, was an unfavorable side consequence of the
366
+ Industrial Revolution. Today, with large groups of peo-
367
+ ple expected to move towards careers of computational
368
+ art, it would be inevitable that training these AI-art mod-
369
+ els would also be performed more frequently, via re-
370
+ searchers as well as artists raising concerns of carbon
371
+ emissions. Strubell, Ganesh, and McCallum (2020)’s lifecy-
372
+ cle assessment of training popular large language models re-
373
+ vealed that a typical training process took nearly five times
374
+ the lifetime carbon emissions of the average American car.
375
+ Besides, the largeness of these models also necessitates GPU
376
+ usage during inference time.
377
+ Furthering Political Agendas
378
+ Winner (1996) has been helpful for giving convincing argu-
379
+ ments that artifacts and machines in general can have biases.
380
+ The 9ft clearance levels of Long Island bridges were a de-
381
+ sign decision made by urban planner Robert Moses in order
382
+ to restrict buses filled with low-income people and racial mi-
383
+ norities from accessing parkways. As a result of the biases
384
+ implicit in these designs, people were given limited access
385
+ to parts of their own city (Winner 1996).
386
+ Benjamin (1935) had argued that as art’s authenticity di-
387
+ minishes due to the ease of mechanization, it begins to be
388
+ based on politics rather than on rituals. Just like the Long
389
+ Island bridges, political agendas intertwined with design
390
+ have had crucial consequences. Therefore, it wouldn’t be a
391
+ surprise if biases mirrored in the AI art generation of to-
392
+ day (Bansal et al. 2022) were exploited to further political
393
+ agendas. Hassine and Neeman (2019) revealed that AI gen-
394
+ erated art skews mostly white, both in depiction and in rep-
395
+ resentation. Unless age, sex or race is specified, prompts to
396
+ the system have built in biases towards young white men
397
+ (Srinivasan and Uchino 2020). This unconscious bias could
398
+ have a manifestation in the real world, just as Robert Moses’
399
+ designs manifested for racial minorities in New York City.
400
+ Questions of Concern
401
+ Finally, we consider the issues to pubic welfare and society
402
+ that AI-art generation introduces through its effects on the
403
+ artists of today. We also consider the scope of involvement
404
+ that computer scientists and AI have had in creating or con-
405
+ tributing to these issues.
406
+ Is the threatened change in the status of artists
407
+ characterized by the primary and essential
408
+ involvement of AI models?
409
+ Industrial “sweatshops” mass-producing art for commercial
410
+ consumption have been a constant long before the computer
411
+ became an element in the equation. From the comic strips of
412
+ the 1880s - 1960s to the comic books of the 1930s - present
413
+ day, to the mass produced landscape art created for furniture
414
+ stores in Asian factories since the mid-1950s, art has been
415
+ commoditized long before the computer (Hersch 2021). In
416
+ these assembly lines, one person would sketch the outlines
417
+ of image, another would pencil in details of the people, an-
418
+ other would ink those images, yet another would draw in the
419
+ backgrounds, and a final hand would color the image. Pro-
420
+ duced by an assembly line usually called a “studio,” the art
421
+ would be signed either by an arbitrarily selected worker or
422
+ even by a completely fictitious artist (Hersch 2021). More to
423
+ the point — this was art created by “factory workers” who
424
+ acted the same role in production as today’s graphics pro-
425
+ grams do (Campbell 2022). Therefore, one could also argue
426
+ that AI models might not be essential to the problem. How-
427
+ ever, what distinctively stands out with the usage of AI art
428
+ models, is the rapid pace of artwork creation and prolifera-
429
+ tion, unlike what was witnessed before the arrival of com-
430
+ puters or the internet.
431
+ Does the threatened change in the status of artists
432
+ occur because of exploiting some unique property
433
+ of AI models?
434
+ The primary difference created by technology is mass ac-
435
+ cess. To staff a “studio” with bit-work artists requires a sub-
436
+ stantial investment in infrastructure, equipment, and labor
437
+ costs. Such programs as are available today are much more
438
+ economical and widely available to individuals — from hob-
439
+ byists to serious artists to mercenary corporations — than
440
+ at any time in our history. So it is legitimate to argue that
441
+ AI models have uniquely driven the scale and creativity of
442
+
443
+ the problem far more broadly than earlier technology could
444
+ have.
445
+ Could this issue have even arisen without the
446
+ involvement of AI models?
447
+ The answer depends heavily on the question of whether AI-
448
+ art generation programs are considered as tools or entities.
449
+ Motion-picture technology created entirely new art forms.
450
+ One could create art with motion across space and time in
451
+ a way that entirely changed how our culture thought about
452
+ visual art. But the cameras themselves have never — for all
453
+ their technological sophistication — been more than tools.
454
+ Cameras do not set out with purpose to make movies, and
455
+ AI art generation programs do not set out independently to
456
+ create images. Both must be employed by users.
457
+ Conclusion
458
+ Perhaps what AI-art generation software is doing is forc-
459
+ ing our society to confront a much larger issue about artists.
460
+ Instead of threatening the status of artists, advances in com-
461
+ puter technology require us to confront the idea that the view
462
+ of artists has already changed, and has been changing.
463
+ While on the surface AI-generated art seems unique,
464
+ many of the issues that it is raising concerning society’s
465
+ views of art and artists are merely more complex callbacks
466
+ to the mechanization of artisan’s projects in the industrial
467
+ revolution. Specifically, the art generated by AI-generation
468
+ algorithms creates problems that mirror those of industrial-
469
+ ization. In the same way that the artisan was pushed out, so
470
+ too is the artist today. In the same way intellectual property
471
+ was compromised during the 1800s, legal loopholes may en-
472
+ sure many artists are not duly credited without proper AI
473
+ regulation.
474
+ Our study of the industrial revolution analogues serves as
475
+ a warning to look backwards at the past treatment of creators
476
+ and consumers of industry in the wake of newly introduced
477
+ technologies. We pose that this may be an important step to
478
+ take before experiencing the consequences of the technical
479
+ revolutions that unfold before us today.
480
+ But these analogies should not be taken as a discourage-
481
+ ment against developing large models or to undermine the
482
+ efforts of the field of AI in general. We should actively
483
+ strive to improve technical parameters of these models, by
484
+ accounting for the possibility of potential damage early on,
485
+ as these models have and already display tremendous poten-
486
+ tial for business as well as for democratization.
487
+ Limitations
488
+ How AI art generation tools will affect artists is an extremely
489
+ subjective and multifaceted subject, and forecasting it pre-
490
+ cisely will not be easy. We have provided comparisons based
491
+ on events that occurred post the industrial revolution. How-
492
+ ever, we think that empirical evidence would be helpful in
493
+ better understanding many of the issues raised. Our objec-
494
+ tive was to present as thorough and comprehensive an anal-
495
+ ysis as possible by considering the technical, political and
496
+ industrial implications of art. Our section on “What is Art?”
497
+ is quite limited due to the rich history concerning this ques-
498
+ tion from a philosophical point of view, but we still feel it
499
+ was important to include. Nonetheless, we believe that our
500
+ work will serve as a crucial gateway for both the engineering
501
+ and humanities disciplines to facilitate dialogue and advance
502
+ debate about the impact of AI art tools.
503
+ Acknowledgments
504
+ We thank Dr. Kristin Williams and Dr. Steve Newton for
505
+ their crucial thoughts and feedback in numerous drafts. We
506
+ also thank the anonymous reviewers and meta reviewer for
507
+ their invaluable suggestions.
508
+ References
509
+ Adorno, T.; and Horkheimer, M. 1944.
510
+ Dialectic
511
+ of
512
+ Enlightenment.
513
+ Philosophy
514
+ Archive
515
+ @
516
+ marx-
517
+ ists.org.
518
+ Translated
519
+ by
520
+ Andy
521
+ Blunden
522
+ (1998),
523
+ https://www.marxists.org/reference/archive/adorno/1944/culture-industry.htm.
524
+ Ball,
525
+ M.
526
+ 2019.
527
+ How
528
+ to
529
+ Start
530
+ Creative
531
+ Coding.
532
+ https://www.arts.ac.uk/study-at-ual/short-courses/stories/how-to-start-creative-coding.
533
+ Bansal, H.; Yin, D.; Monajatipoor, M.; and Chang, K.-W.
534
+ 2022. How well can Text-to-Image Generative Models un-
535
+ derstand Ethical Natural Language Interventions?
536
+ arXiv
537
+ preprint arXiv:2210.15230.
538
+ Benjamin, W. 1935. The Work of Art in the Age of Mechan-
539
+ ical Reproduction, 1936.
540
+ Berg, M. 2014. Skill, Craft and Histories of Industrializa-
541
+ yion in Europe and Asia. Transactions of the Royal Histori-
542
+ cal Society, 24: 127–148.
543
+ Bigham, J. P.; Kulkarni, C.; and Lasecki, W. S. 2017.
544
+ Crowdsourcing and Crowd Work.
545
+ In Proceedings of the
546
+ 2017 CHI Conference Extended Abstracts on Human Fac-
547
+ tors in Computing Systems, CHI EA ’17, 1186–1189. New
548
+ York, NY, USA: Association for Computing Machinery.
549
+ ISBN 9781450346566.
550
+ Browne, K. 2022. Who (or what) is an AI Artist? Leonardo,
551
+ 55(2): 130–134.
552
+ Campbell,
553
+ K.
554
+ 2022.
555
+ How
556
+ the
557
+ Marvel
558
+ Cine-
559
+ matic
560
+ Universe
561
+ Exploits
562
+ Comic
563
+ Book
564
+ Artists.
565
+ https://hyperallergic.com/728217/comic-book-superhero-artist-film-compensation/.
566
+ Christopher
567
+ Klein.
568
+ 2019.
569
+ The
570
+ Spies
571
+ Who
572
+ Launched
573
+ America’s
574
+ Industrial
575
+ Revolution.
576
+ https://www.history.com/news/industrial-revolution-spies-europe.
577
+ Cohen, G. 2018. AI Art at Christie’s Sells for $432, 500.
578
+ https://www.nytimes.com/2018/10/25/arts/design/ai-art-sold-christies.html.
579
+ Accessed: 2022-10-015.
580
+ Dhole, K. D.; Gangal, V.; Gehrmann, S.; Gupta, A.; Li,
581
+ Z.; Mahamood, S.; Mahendiran, A.; Mille, S.; Srivastava,
582
+ A.; Tan, S.; et al. 2021. Nl-augmenter: A framework for
583
+ task-sensitive natural language augmentation. arXiv preprint
584
+ arXiv:2112.02721.
585
+ Edwards, B. 2022. Artists begin selling AI-generated art-
586
+ work on stock photography websites.
587
+ Feldman, S. 2017. Co-creation: human and AI collaboration
588
+ in creative expression. Electronic Visualisation and the Arts
589
+ (EVA 2017), 422–429.
590
+
591
+ Fjeld, J.; and Kortz, M. 2017.
592
+ A legal anatomy of AI-
593
+ generated art: Part I. Journal of Law and Technology.
594
+ Harris, J. R. 1985. The Rolt Memorial Lecture, 1984 In-
595
+ dustrial Espionage in the Eighteenth Century. Industrial Ar-
596
+ chaeology Review, 7(2): 127–138.
597
+ Hassine, T.; and Neeman, Z. 2019. The Zombification of
598
+ art history: how AI resurrects dead masters, and perpetuates
599
+ historical biases. Journal of Science and Technology of the
600
+ Arts, 11(2): 28–35.
601
+ Hersch, P. 2021. The Early, Wild, Exploited, and Sometimes
602
+ Radical Days of the Comic Book Industry in America.
603
+ Ho, J.; Jain, A.; and Abbeel, P. 2020. Denoising diffusion
604
+ probabilistic models. Advances in Neural Information Pro-
605
+ cessing Systems, 33: 6840–6851.
606
+ Hong, J.-W.; and Curran, N. M. 2019. Artificial Intelligence,
607
+ Artists, and Art: Attitudes Toward Artwork Produced by Hu-
608
+ mans vs. Artificial Intelligence. 15(2s).
609
+ Kim, D. 2020. ‘AI-Generated Inventions’: Time to Get the
610
+ Record Straight? GRUR International, 69(5): 443–456.
611
+ Kittur, A.; Nickerson, J. V.; Bernstein, M.; Gerber, E.; Shaw,
612
+ A.; Zimmerman, J.; Lease, M.; and Horton, J. 2013. The
613
+ future of crowd work. In Proceedings of the 2013 conference
614
+ on Computer supported cooperative work, 1301–1318.
615
+ Kittur, A.; Yu, L.; Hope, T.; Chan, J.; Lifshitz-Assaf, H.;
616
+ Gilon, K.; Ng, F.; Kraut, R. E.; and Shahaf, D. 2019. Scaling
617
+ up analogical innovation with crowds and AI. Proceedings
618
+ of the National Academy of Sciences, 116(6): 1870–1877.
619
+ Li, J.; Hashim, S.; and Jacobs, J. 2021. What We Can Learn
620
+ From Visual Artists About Software Development. In Pro-
621
+ ceedings of the SIGCHI Conference on Human Factors in
622
+ Computing Systems, CHI ’21. New York, NY, USA: Associ-
623
+ ation for Computing Machinery. ISBN 978145038096.
624
+ Mikalonyt, K. 2022. Can Artificial Intelligence Make Art?:
625
+ Folk Intuitions as to Whether AI-Driven Robots Can Be
626
+ Viewed as Artists and Produce Art. 11(4).
627
+ Moor, J. H. 1985. What is Computer Ethics?*. Metaphilos-
628
+ ophy, 16(4): 266–275.
629
+ Pelz, W. A. 2016. Pluto Press. ISBN 9780745332468.
630
+ Ramesh, A.; Dhariwal, P.; Nichol, A.; Chu, C.; and Chen, M.
631
+ 2022. Hierarchical text-conditional image generation with
632
+ clip latents. arXiv preprint arXiv:2204.06125.
633
+ Ramesh, A.; Pavlov, M.; Goh, G.; Gray, S.; Voss, C.; Rad-
634
+ ford, A.; Chen, M.; and Sutskever, I. 2021. Zero-shot text-to-
635
+ image generation. In International Conference on Machine
636
+ Learning, 8821–8831. PMLR.
637
+ Ruiz, N.; Li, Y.; Jampani, V.; Pritch, Y.; Rubinstein, M.;
638
+ and Aberman, K. 2022. Dreambooth: Fine tuning text-to-
639
+ image diffusion models for subject-driven generation. arXiv
640
+ preprint arXiv:2208.12242.
641
+ Smail, J. 1992. Manufacturer or Artisan? The Relationship
642
+ between Economic and Cultural Change in the Early Stages
643
+ of the Eighteenth-Century Industrialization. Journal of So-
644
+ cial History, 25(4): 791–814.
645
+ Srinivasan, R.; and Uchino, K. 2020. Biases in Generative
646
+ Art - A Causal Look from the Lens of Art History. CoRR,
647
+ abs/2010.13266.
648
+ Srivastava, A.; Rastogi, A.; Rao, A.; Shoeb, A. A. M.; Abid,
649
+ A.; Fisch, A.; Brown, A. R.; Santoro, A.; Gupta, A.; Garriga-
650
+ Alonso, A.; et al. 2022. Beyond the Imitation Game: Quanti-
651
+ fying and extrapolating the capabilities of language models.
652
+ arXiv preprint arXiv:2206.04615.
653
+ Strubell, E.; Ganesh, A.; and McCallum, A. 2020.
654
+ En-
655
+ ergy and policy considerations for modern deep learning re-
656
+ search. In Proceedings of the AAAI Conference on Artificial
657
+ Intelligence, volume 34, 13693–13696.
658
+ The
659
+ Alliance
660
+ for
661
+ Artisan
662
+ Enterprise.
663
+ 2012.
664
+ Bringing
665
+ Artisan
666
+ Enterprise
667
+ to
668
+ Scale.
669
+ https://www.aspeninstitute.org/wp-content/.
670
+ Accessed:
671
+ 2022-11-04.
672
+ Vincent, J. 2022. Shutterstock will start selling AI-generated
673
+ stock imagery with help from OpenAI.
674
+ Warzel, C. 2022. I Went Viral in the Bad Way.
675
+ Winner.
676
+ 1996.
677
+ Do
678
+ artifacts
679
+ have
680
+ politics?
681
+ https://link.springer.com/article/10.1007/BF02583549#citeas.
682
+ Accessed: 2022-10-015.
683
+
LNE4T4oBgHgl3EQfiQ3g/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LdFOT4oBgHgl3EQf0DSF/content/2301.12934v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:45f500824dbfef28e10d9f4561a4ea213e84f48eda14a43323325aa77d529a50
3
+ size 5629203